Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part VI 1st edition by Xingming Sun, Zhaoqing Pan, Elisa Bertino – Ebook PDF Instant Download/DeliveryISBN: 3030000219, 9783030000219
Full download Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part VI 1st edition after payment.
Product details:
ISBN-10 : 3030000219
ISBN-13 : 9783030000219
Author: Xingming Sun, Zhaoqing Pan, Elisa Bertino
This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part VI 1st table of contents:
- Safety Traceability System of Livestock and Poultry Industrial Chain
- Secure Device Pairing via Facial Image Similarity
- Security Classification Transmission Method Based on SDN in Industrial Networks
- Security Solution for Real-Time Data Access in Wireless Sensor Networks
- Security Threat and Protection in Industrial Control System
- Sharing Economy Protocol with Privacy Preservation and Fairness Based on Blockchain
- Smart Transportation Systems for Cities in the Framework of Future Networks
- Study on the Internet of Things from Applications to Security Issues
- Survey on IMD and Wearable Devices Security Threats and Protection Methods
- Temperature and Humidity Monitoring System for Bulk Grain Container Based on LoRa Wireless Technology
- Terrain-Aided Strapdown Inertial Navigation System with Improved ICCP
- The Construction of Solar Greenhouse Control System Based on IoT Data Security
- The Internet of Things and Big Data in the Submarine Cable Release Process of Finite Element Simulation and Matlab Simulation
- The Traceability Information Management Platform of Duck Product Industry Chain
- Topic Model Based Management Frame Authentication Using CSI Information
- Towards Rule Consistent Updates in Software-Defined Wireless Sensor Networks
- Towards Secure Device Pairing via Vibration Detection
- TRFIoT: Trust and Reputation Model for Fog-based IoT
- Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location Systems
- Water and Fertilizer Integration Intelligent Control System of Tomato Based on Internet of Things
- Multimedia Forensics
- 3D Steganalysis Using Laplacian Smoothing at Various Levels
- A Modified U-Net for Brain MR Image Segmentation
- A Multichannel Convolutional Neural Network Based Forensics-Aware Scheme for Cyber-Physical-Social Systems
- A Novel Nonlinear Multi-feature Fusion Algorithm: Multiple Kernel Multiset Integrated Canonical Correlation Analysis
- A Novel Watermark-Based Access Control Model for Digital Imagines
- A Recommender for Personalized Travel Itineraries
- A Replay Voice Detection Algorithm Based on Multi-feature Fusion
- A Robust Recoverable Algorithm Used for Digital Speech Forensics Based on DCT
- A Steganographic Method Based on High Bit Rates Speech Codec of G.723.1
- A Variable-Angle-Distance Quantum Evolutionary Algorithm for 2D HP Model
- A Word Embeddings Training Method Based on Modified Skip-Gram and Align
- AAC Audio Compression Detection Based on QMDCT Coefficient
- Accurate Hand Detection Method for Noisy Environments
- Adaptive Image Filtering Based on Convolutional Neural Network
- Aggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech Recognition
- An Adaptive Construction Test Method Based on Geometric Calculation for Linearly Separable Problems
- An Optimized Resolution Coefficient Algorithm of Gray Relation Classifier
- Analysis and Research on the Temporal and Spatial Correlation of Traffic Accidents and Illegal Activities
- Architecture and Parameter Analysis to Convolutional Neural Network for Hand Tracking
- Attention-Based Bidirectional Recurrent Neural Networks for Description Generation of Videos
- Based on Data Analysis and JC Retrofit Scheme of Dam Risk Function and the Simulation Experiment
- Community-Based Matrix Factorization Model for Recommendation
- Composite Descriptors and Deep Features Based Visual Phrase for Image Retrieval
- Defect Detection of Alumina Substrate with Adaptive Edge Detection Algorithm
- Disseminating Quality-Based Analysis of Microblog Users’ Influencing Ability
- Emotion Effect Detection with a Two-Stage Model
- Exploring Methods of Assessing Influence Relevance of News Articles
- Generative Steganography Based on GANs
- How the Variance of Hotel Dominance Attribute Affects the Consumer Recommendation Rate: An Empirical Study with the Data from Ctrip.com
- Image Recovery via Truncated Weighted Schatten-p Norm Regularization
- Improving Semantic Annotation Using Semantic Modeling of Knowledge Embedding
- JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter
- Multilevel Features Fusion in Deep Convolutional Neural Networks
- Personality Trait Prediction Based on 2.5D Face Feature Model
- Recaptured Image Detection Through Enhanced Residual-Based Correlation Coefficients
- Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach
- Research on Cascading Failures in Complex Network
- Research on Dynamic Performance and Road Performance of Dense-Gradation Asphalt Mixture
- Research on Image Classification of Marine Pollutants with Convolution Neural Network
- Robust Manifold Learning Based Ordinal Discriminative Correlation Regression
- Signal Subtle Feature Extraction Algorithm Based on Improved Fractal Box-Counting Dimension
- Study on Topic Intensity Evolution Law of Web News Topic Based on Topic Content Evolution
- Team Formation in Social Networks Using Imperialist Competitive Algorithm
- The Ship Struck by Lightning Indirect Effect Simulation and Data Analysis
- Discriminative Dictionary Learning with Local Constraints for Face Recognition with Occlusion
People also search for Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018 Revised Selected Papers Part VI 1st:
sec388 introduction to cloud computing and security
cyberspace cloud computing and security
fit5225 cloud computing and security
cloud computing and security vtu notes
cloud computing and security vtu question papers
Tags: Cloud Computing, Security, International Conference, Haikou China, Revised Selected, Xingming Sun, Zhaoqing Pan, Elisa Bertino