Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III

Edited by , Edited by , Edited by , Edited by
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows:

Part I: artificial intelligence;

Part II: artificial intelligence; big data; cloud computing and security; 

Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. 
Cloud Computing and Security.- Design and Implementation of Information
Detection System Based On Privacy Sensitive Data.- Performance Modeling of
OpenMP Program Based On LLVM Compilation Platform.- A Method of network
attack recognition Based on CNN+LSTM Model.- Encryption and
Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network
Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level
Collaboration Framework for Cyber Situation Awareness and Information
Sharing.- VABox: A Virtualization-based Analysis Framework of
Virtualization-Obfuscated Packed Executables.- Imbalance Malware
Classification by Decoupling Representation and Classifier- The promotion of
online communication ability of mainstream media- HNN-based Prediction Method
Supporting Discovery of Production Abnormal.- Efficient Forward and Backward
Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature
extracting and matching system based on magic-number and AC-algorithm.- A
Review: How to detect malicious domains.- A Homomorphic Encryption Method for
Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in
Smart Contracts: A Survey.- Detection of false data injection attacks in
Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method
Based on Image Low-frequency Information.- Information Hiding.- A Robust
Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural
Network.- Research on Content Authentication Technology of Electronic Bills
Based on Text Watermarking Algorithm.- Finding the better distortion function
from prior scheme for Image Steganography.- Application in Aviation Customer
Churn Prediction Using Classification Algorithm Based on Machine Learning.-
Color Image Steganography Scheme Based on Convolutional Neural Network.-
Robust JPEG steganography using singular value decomposition in DCT domain.-
3D Coverless Image SteganographyScheme Based on 3D Slice Technology.-
Software Information Hiding Algorithm Based on Import Table of Portable
Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG
Compression.- A Common Steganalysis Method of Low Embedding Rate
Steganography in Compressed Speech Based on Hierarchy Feature Extraction and
Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT
Security.- Integration Innovation of Competitive Intelligence, AI and Big
Data Analysis.- A Comprehensive Review of IoT Technologies and Applications
for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based
health monitoring platform for Ambient Assisted Living,. Design and
Development of Field Mobile Monitoring System for Forest Fire Fighting.-
ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler
Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing
Satellite Internet of Things by Perceiving Content Semantics.- Research on
Cultivating Senior Technical Talents Based on the Internet of Things
Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear
Time-invariant System Reduced-order Finite-time Observer.- Research on
invulnerability of WSN based on small world characteristics of complex
networks.- Collaboration energy efficiency with mobile edge computing for
target tracking in IOT.- Realization of CSI-based Human Behavior Recognition:
A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy
Vulnerability as an Example.- Research on Data Security Protection System of
Monitoring and Acquisition System  Based on Block Chain Technology.- Adaptive
Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted
Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle
Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide
Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG
Image Steganography Based onSVD in Wavelet Domain.- Raw Material Traceability
of Industrial Control System based on Blockchain.- Survey: Research on
Blockchain Consensus Mechanism in IoT Security.- Research on Life Prediction
Model of Field Seismic Equipment Based on IFA-RVM Algorithm.- Optimization of
Location Technology in Meteorological Wireless Sensor Network.- A Survey on
the Applications of Wi-Fi Sensing.- Efficient Partially Policy-Hidden CP-ABE
for IoT assisted Smart Health.- A Novel Hand Gesture Recognition Method for
FMCW Radar.- A Novel Blockchain-based Revocable Permission Management on
CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with
Hybrid Feature Selection.- A Practical Blockchain Framework for Securing IoT
Applications.- A Blockchain-based Internet of Things Forensics Model.-
Network Device Identification based on MAC Boundary Inference.- Providing
Network-based Datasets and Multi-dimensional Features for IoT Botnet
Detection Research.- The cross-domain identity authentication scheme has no
trusted authentication center in the cloud environment.- A Caching Strategy
Based On Content Popularity Level for NDN.