First International Artificial Intelligence Conference, IAIC 2023, Nanjing, China, November 25-27, 2023, Revised Selected Papers, Part I Herausgegeben:Jin, Hai; Pan, Yi; Lu, Jianfeng
First International Artificial Intelligence Conference, IAIC 2023, Nanjing, China, November 25-27, 2023, Revised Selected Papers, Part I Herausgegeben:Jin, Hai; Pan, Yi; Lu, Jianfeng
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023, held in Nanjing, China, in November 2023. The 85 full papers presented were carefully reviewed and selected from 428 submissions. The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research and developments in artificial intelligence and its applications in machine learning, natural language processing, computer vision, robotics, and ethical considerations. …mehr
This 3-volume set, CCIS 2058-2060 constitutes the First International Conference, on Artificial Intelligence, IAIC 2023, held in Nanjing, China, in November 2023. The 85 full papers presented were carefully reviewed and selected from 428 submissions. The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research and developments in artificial intelligence and its applications in machine learning, natural language processing, computer vision, robotics, and ethical considerations.
Produktdetails
Produktdetails
Communications in Computer and Information Science 2058
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Artificial Intelligence and Machine Learning.- Data Science and Information Security.- Computer Networks and IoT.-FedTag: Towards Automated Attack Investigation Using Federated Learning.-Deep Learning Based SQL Injection Attack Detection.- M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC.- A Survey of Homogeneous and Heterogeneous Multi-source Information Fusion Based on Rough Set.- Data Science and Information Security.-Prudent Promotion, Steady Development: Capability and Safety Considerations for Applying Large Language Models in Medicine.- Blockchain-enhanced Device to Device Network Identity Verification Based on Zero Knowledge Proof.- A Privacy-preserving Searchable Encryption Scheme for Data Protection in Smart Grid.- Data-driven Distributed Autonomous Architecture for 6G Networks.- Decoupled Knowledge Distillation in Data-free Federated Learning.- An Improved SSD Seal Detection Algorithm Based on Channel-Spatial Attention.- A Multiple Fire Zones Detection Method for UAVs Based on Improved Ant Colony Algorithm.- Research on the Regulation and Network Security of Smart Tourism Public Information Service Platform.- A Study Based on Logistic Regression Algorithm to Teaching Indicators.- A Spellcheck Technique for Tibetan Syllables Based on Grammatical Vector Multiplication.- Fine-grained Image Classification Network Based on Complementary Learning.- An overview of Graph Data Missing Value Imputation.- Speech Emotion Recognition Method Based on Cross-Layer Intersectant Fusion.- Clothed Human Model Estimation from Unseen Partial Point Clouds with Meta-learning.- LCA-BERT: A Local and Context Fusion Sentiment Analysis Model Based on BERT.
Artificial Intelligence and Machine Learning.- Data Science and Information Security.- Computer Networks and IoT.-FedTag: Towards Automated Attack Investigation Using Federated Learning.-Deep Learning Based SQL Injection Attack Detection.- M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC.- A Survey of Homogeneous and Heterogeneous Multi-source Information Fusion Based on Rough Set.- Data Science and Information Security.-Prudent Promotion, Steady Development: Capability and Safety Considerations for Applying Large Language Models in Medicine.- Blockchain-enhanced Device to Device Network Identity Verification Based on Zero Knowledge Proof.- A Privacy-preserving Searchable Encryption Scheme for Data Protection in Smart Grid.- Data-driven Distributed Autonomous Architecture for 6G Networks.- Decoupled Knowledge Distillation in Data-free Federated Learning.- An Improved SSD Seal Detection Algorithm Based on Channel-Spatial Attention.- A Multiple Fire Zones Detection Method for UAVs Based on Improved Ant Colony Algorithm.- Research on the Regulation and Network Security of Smart Tourism Public Information Service Platform.- A Study Based on Logistic Regression Algorithm to Teaching Indicators.- A Spellcheck Technique for Tibetan Syllables Based on Grammatical Vector Multiplication.- Fine-grained Image Classification Network Based on Complementary Learning.- An overview of Graph Data Missing Value Imputation.- Speech Emotion Recognition Method Based on Cross-Layer Intersectant Fusion.- Clothed Human Model Estimation from Unseen Partial Point Clouds with Meta-learning.- LCA-BERT: A Local and Context Fusion Sentiment Analysis Model Based on BERT.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826