6th International Conference, ICAIS 2020, Hohhot, China, July 17¿20, 2020, Proceedings, Part I Herausgegeben:Sun, Xingming; Wang, Jinwei; Bertino, Elisa
6th International Conference, ICAIS 2020, Hohhot, China, July 17¿20, 2020, Proceedings, Part I Herausgegeben:Sun, Xingming; Wang, Jinwei; Bertino, Elisa
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial…mehr
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.
The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows:
Part I: artificial intelligence;
Part II: artificial intelligence; Internet of things; information security;
Part III: information security; big data and cloud computing; information processing.
Produktdetails
Produktdetails
Communications in Computer and Information Science 1252
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT.- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition.- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System.- Intelligent Contract for Power Market Transaction Based on the BlockChain.- Survey on Zero-trust Network Security.- A Novel Consensus Algorithm for Alliance Chain.- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm.- The Study of Fog Computing Security Situation Prediction in Industrial Internet.- A novel keypoints-based image registration method with fully convolutional neural network.- Image super-resolution reconstruction with dense residual attention module.- GF-2 image blue roof building extraction method based on object-oriented classification technology.- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor.- Parallel optimization of stencil computation base on Sunway TaihuLight.- Chinese News Data Extraction System Based On Readability Algorithm.- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD.- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning.- Research Progress of Knowledge Graph Embedding.- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network.- E ective Android Malware Detection based on Deep Learning.- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking.- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis.- Research on Leisure Sports Activities Based on Decision Tree Algorithm.- Semantic Integrity Analysis Based on Transformer.- An improvementof Coherent Semantic Attention for Image Inpainting.- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL.- Nonlinear Correction Based on Depth Neural Network.- Spatial-temporal co-attention network for action recognition.- Improved SSD for object detection.- Sentiment Analysis on Weibo Platform for Stock Prediction.- Refinement Measurement and Evaluation of Streets in Shanghai Old City.- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China.- Research Progress in Blind Forensics of Digital Image Smooth Filtering.- Research on video violence detection technology of UAV on cloud platform.- A Generative Steganography Method Based on WGAN-GP.- A deep learning network for coarse-to-fine deformable medical image registration.- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus.- Research on the data reference model of NMIS.- A Real-time Recommender System Design Based on Spark Streaming.- A Novel Clone Detection Scheme Based on Generative Adversarial Networks.- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform.- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person.- An exploratory study of blending Smart classroom in database course.- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function.- Research and Analysis of Fine Management of Engineering Cost Based on BIM.- Survey of Software-Defined Network Security Issues.- A Fall Detection Algorithm Based on a Support Vector Machine.- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization.- An efficient quantum private comparison protocol based on conjugate coding.- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence.- Deep neural network watermarking based on texture analysis.- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique.- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper.- Research on Emotional Recognition of EEG Signals in Experimental Paradigm.- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method.- Salary Satisfaction of University Teachers with Different Professional Positions.- Defining Cost Function for Robust Embedding.- Efficient Identity-Based Signature authentication scheme for smart home system.- A Resource Allocation Mechanism for Edge-blockchain.- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment.- Multi-layer quantum secret sharing based on GHZ states.- Robot scheduling system based on semantic recognition.- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT.- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition.- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System.- Intelligent Contract for Power Market Transaction Based on the BlockChain.- Survey on Zero-trust Network Security.- A Novel Consensus Algorithm for Alliance Chain.- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm.- The Study of Fog Computing Security Situation Prediction in Industrial Internet.- A novel keypoints-based image registration method with fully convolutional neural network.- Image super-resolution reconstruction with dense residual attention module.- GF-2 image blue roof building extraction method based on object-oriented classification technology.- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor.- Parallel optimization of stencil computation base on Sunway TaihuLight.- Chinese News Data Extraction System Based On Readability Algorithm.- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD.- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning.- Research Progress of Knowledge Graph Embedding.- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network.- E ective Android Malware Detection based on Deep Learning.- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking.- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis.- Research on Leisure Sports Activities Based on Decision Tree Algorithm.- Semantic Integrity Analysis Based on Transformer.- An improvementof Coherent Semantic Attention for Image Inpainting.- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL.- Nonlinear Correction Based on Depth Neural Network.- Spatial-temporal co-attention network for action recognition.- Improved SSD for object detection.- Sentiment Analysis on Weibo Platform for Stock Prediction.- Refinement Measurement and Evaluation of Streets in Shanghai Old City.- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China.- Research Progress in Blind Forensics of Digital Image Smooth Filtering.- Research on video violence detection technology of UAV on cloud platform.- A Generative Steganography Method Based on WGAN-GP.- A deep learning network for coarse-to-fine deformable medical image registration.- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus.- Research on the data reference model of NMIS.- A Real-time Recommender System Design Based on Spark Streaming.- A Novel Clone Detection Scheme Based on Generative Adversarial Networks.- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform.- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person.- An exploratory study of blending Smart classroom in database course.- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function.- Research and Analysis of Fine Management of Engineering Cost Based on BIM.- Survey of Software-Defined Network Security Issues.- A Fall Detection Algorithm Based on a Support Vector Machine.- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization.- An efficient quantum private comparison protocol based on conjugate coding.- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence.- Deep neural network watermarking based on texture analysis.- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique.- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper.- Research on Emotional Recognition of EEG Signals in Experimental Paradigm.- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method.- Salary Satisfaction of University Teachers with Different Professional Positions.- Defining Cost Function for Robust Embedding.- Efficient Identity-Based Signature authentication scheme for smart home system.- A Resource Allocation Mechanism for Edge-blockchain.- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment.- Multi-layer quantum secret sharing based on GHZ states.- Robot scheduling system based on semantic recognition.- Pedestrian Counting without Tracking for the Security Application of IoT Framework.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826