語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Artificial Intelligence and Security...
~
Wang, Jinwei.
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Artificial Intelligence and Security/ edited by Xingming Sun, Jinwei Wang, Elisa Bertino.
其他題名:
6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
其他作者:
Bertino, Elisa.
面頁冊數:
XXIX, 719 p. 337 illus., 187 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Communication Networks. -
電子資源:
https://doi.org/10.1007/978-981-15-8083-3
ISBN:
9789811580833
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
Artificial Intelligence and Security
6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /[electronic resource] :edited by Xingming Sun, Jinwei Wang, Elisa Bertino. - 1st ed. 2020. - XXIX, 719 p. 337 illus., 187 illus. in color.online resource. - Communications in Computer and Information Science,12521865-0929 ;. - Communications in Computer and Information Science,498.
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvement of Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
ISBN: 9789811580833
Standard No.: 10.1007/978-981-15-8083-3doiSubjects--Topical Terms:
669310
Computer Communication Networks.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Artificial Intelligence and Security = 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
LDR
:07193nam a22004095i 4500
001
1028946
003
DE-He213
005
20200912070449.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811580833
$9
978-981-15-8083-3
024
7
$a
10.1007/978-981-15-8083-3
$2
doi
035
$a
978-981-15-8083-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Artificial Intelligence and Security
$h
[electronic resource] :
$b
6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /
$c
edited by Xingming Sun, Jinwei Wang, Elisa Bertino.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XXIX, 719 p. 337 illus., 187 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
1252
505
0
$a
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvement of Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
520
$a
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
700
1
$a
Bertino, Elisa.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
675398
700
1
$a
Wang, Jinwei.
$e
editor.
$1
https://orcid.org/0000-0002-9366-5671
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1313075
700
1
$a
Sun, Xingming.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171801
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811580826
776
0 8
$i
Printed edition:
$z
9789811580840
830
0
$a
Communications in Computer and Information Science,
$x
1865-0929 ;
$v
498
$3
1253583
856
4 0
$u
https://doi.org/10.1007/978-981-15-8083-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入