This completed downloadable of Artificial Intelligence and Security 6th International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part III Xingming Sun
Instant downloaded Artificial Intelligence and Security 6th International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part III Xingming Sun pdf docx epub after payment.
Product details:
- ISBN 10: 9811580863
- ISBN 13: 9789811580864
- Author: Xingming Sun
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
Table of contents:
Kernel Fuzzy C Means Clustering with New Spatial Constraints
GSSM: An Integration Model of Heterogeneous Factors for Point-of-Interest Recommendation
Contrast Adjustment Forensics Based on Second-Order Statistical and Deep Learning Features
Hybrid Low Rank Model Based Deep Neural Network Compression with Application in Data Recovery
Research on Rail Traffic Safety Factor Model Based on Deep Learning
Research on Pseudo Code Ranging Technology Using Burst DSSS Signal
A Study on PN Code Phase and Carrier Frequency Fast Estimation Technology for DSSS Signal
Research of Software Information Hiding Algorithm Based on Packing Technology
A Free-Space Quantum Secure Direct Communication Scheme Based on Prefixed-Threshold Real-Time Selection Method
Internet of Things
Design of Intelligent Mobile Robot Control System Based on Gesture Recognition
Multimodal Biometric Recognition Based on Convolutional Neural Networks
Multiple Graph Regularized Non-negative Matrix Factorization Based on L2,1 Norm for Face Recognition
Facial Expression Recognition Method Based on Convolution Neural Network Combining Attention Mechanism
Behavior Compatibility Analysis for Service Mashup with Model Checking
Study on Practical IoT Applications in Civil Aviation Industry
Study on IoT Solutions in Smart Airports
MultiSec: A Bionics Security Architecture of Ad-hoc Network
A Large-Scale Parallel Network Intrusion Detection Model Based on K-Means in Security Audit System
Task Offloading Strategy in Cloud Collaborative Edge Computing
A Review of Wireless Sensor Network Simulation Tools
Research on Ozone Prediction Based on Genetic Neural Network for Multi-city Collaboration
The Shape Classification of Snowflakes Based on BP Neural Network
Fabric Hair Ball Pilling Detection Based on Memristive Cell Neural Network
Propagator Method Based on Virtual Array Manifold Matching Algorithm for 2D DOA Estimation
Two-Dimensional Seismic Data Reconstruction Method Based on Compressed Sensing
Optimal Location for Electric Vehicles Charging Stations Based on P-Median Model
A Succinct Power Management Circuit for Wireless Sensor Network Nodes
Survival Analysis of a Stochastic Single-Species System with Diffusion Under the Effect of Environmental Toxins in Polluted Environments
Precipitation Phase Inversion Algorithm for Extremely Unbalanced Data
Vehicular Trajectory Big Data: Driving Behavior Recognition Algorithm Based on Deep Learning
Measurement-Device-Independent Quantum Identity Authentication Based on Single Photon
Quantifying Community Detection Algorithms in Student Networks of Book Borrowing via Demographic Characterists
Knowledge Extraction and Knowledge Graph Construction Based on Campus Security Logss
Research on the Influence of Different Network Topologies on Cache Performance for NDN
Research on Vehicle Network Routing Algorithm Based on Statistical Behavior
Design of Automatic Fire Extinguishing Device for IoT Transformer Box
A Practical Quantum Private Query Protocol Based on Bell States and Single Photons
Improved Analytic Hierarchy Process Based on Fuzzy Synthesis Theory for User Behavior Evaluation
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
Safety Helmet Detection Method Based on Faster R-CNN
Transmission Line Galloping Detection Based on SURF Feature and FLANN Matching Algorithm
A Method to Improve Identification Performance of UHF RFID Systems
A New Multi-tree Search Algorithm for RFID Tag Identification
A Direct Self-adaptive Fuzzy Control System for a Single-Arm Manipulator
Research and Design of Intelligent Gas Concentration Monitoring and Alarming Instrument Based on PIC Single Chip Microcomputer
A Method to Construct Large Scale Boolean Functions
Information Security
Banknote Infrared Characteristics Discrimination Based on PCA and LDA
A Novel Approach to File Deduplication in Cloud Storage Systems
Cooperative Detection Model for Phishing Websites Based on Approach
Associated Hazard Assessment of IoT Vulnerability Based on Risk Matrix
DFDM – A DeepFakes Detection Model Based on Steganography Forensic Network
An Image Steganalysis Model Combined with the Directionality of Residuals
A New Method for Computing the Variety of Saturation Ideal of Triangular Set
Impact of Climate Change on Farmland Production Potentialin the Coastal Areas of Jiangsu Province During Nearly 50 Years
Network Abnormal Behavior Detection Method Based on Affinity Propagation
A Multi-blockchain Architecture Supporting Cross-Blockchain Communication
Blockchain-Based Authentication in Wireless Sensor Networks
A Word-Oriented Modular Division Algorithm and Its Efficient Implementation Based on CSA
Defense Against Adversarial Attack Using PCA
Medical Image Digital Watermarking Algorithm Based on DWT-DFRFT
A Robust Color Image Zero-Watermarking Based on SURF and DCT Features
Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model
Current Status and Prospects of Blockchain Technology
A DDoS Attack Defense Method Based on Blockchain for IoTs Devices
A Reputation Incentive Mechanism of Crowd Sensing System Based on Blockchain
Correction to: Research on Vehicle Network Routing Algorithm Based on Statistical Behavior
People also search:
artificial intelligence security in healthcare
artificial intelligence in security guard
artificial intelligence for security analytics
role of artificial intelligence in national security
artificial intelligence for security