000 07991nam a22006015i 4500
001 978-981-15-8083-3
003 DE-He213
005 20240423130151.0
007 cr nn 008mamaa
008 200912s2020 si | s |||| 0|eng d
020 _a9789811580833
_9978-981-15-8083-3
024 7 _a10.1007/978-981-15-8083-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aArtificial Intelligence and Security
_h[electronic resource] :
_b6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
_cedited by Xingming Sun, Jinwei Wang, Elisa Bertino.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXXIX, 719 p. 123 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1252
505 0 _aFast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
520 _aThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
650 0 _aData protection.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aArtificial intelligence.
650 1 4 _aData and Information Security.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aArtificial Intelligence.
650 2 4 _aComputer Communication Networks.
700 1 _aSun, Xingming.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Jinwei.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBertino, Elisa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811580826
776 0 8 _iPrinted edition:
_z9789811580840
830 0 _aCommunications in Computer and Information Science,
_x1865-0937 ;
_v1252
856 4 0 _uhttps://doi.org/10.1007/978-981-15-8083-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185787
_d185787