My Account Log in

1 option

Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II / edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Sun, Xingming, Editor.
Zhang, Xiaorui., Editor.
Xia, Zhihua, Editor.
Bertino, Elisa, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI ; SL 3, 12737
Information Systems and Applications, incl. Internet/Web, and HCI ; 12737
Language:
English
Subjects (All):
Application software.
Computer engineering.
Computer networks.
Data protection.
Artificial intelligence.
Cryptography.
Data encryption (Computer science).
Computer and Information Systems Applications.
Computer Engineering and Networks.
Data and Information Security.
Artificial Intelligence.
Cryptology.
Local Subjects:
Computer and Information Systems Applications.
Computer Engineering and Networks.
Data and Information Security.
Artificial Intelligence.
Cryptology.
Physical Description:
1 online resource (XXIII, 753 pages) : 353 illustrations, 246 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics.
Contents:
Big Data
Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis
Exploring the informationization of Land Reserve Archives Management
Research and Implementation of Anomaly Detection Algorithm in Data Mining
An Empirical Study on Data Sampling for Just-in-Time Defect Prediction
Design and Implementation of Data Adapter in SWIM
Cloud Computing and Security
Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking
A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing
A Computing Task Offloading Scheme for Mobile Edge Computing
Security Transmission Scheme of Sensitive Data for Mobile Terminal
Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain
A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring
Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network
Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature
Detection of Virtual Machines based on Thread Scheduling
Graph Attention Network for Word Embeddings
Firewall Filtering Technology And Application Based On Decision Tree
Encryption and Cybersecurity
A DAPP business data storage model based on blockchain and IPFS
IPv6-Darknet Network Traffic Detection
Neural Control Based Research of Endogenous Security Model
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes
A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy
A transaction model of bill service based on blockchain
An N-gram Based Deep Learning Method for Network Traffic Classification
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning
Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture
A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain
Information Hiding
Covert Communication via Modulating Soft Label of Neural Network
DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography
Halftone Image Steganography Based on Reassigned Distortion Measurement
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units
High efficiency quantum image steganography protocol based on ZZW framework
Halftone Image Steganalysis by Reconstructing Grayscale Image
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition
Research and Implementation of Medical Information Protection and Sharing based on Blockchain
IoT Security
LoRa Network Security Schemes Based on RF Fingerprint
Smart Home based Sleep Disorder Recognition for Ambient Assisted Living
Blockchain-based reliable collection mechanism for smart meter quality data
Power Blockchain Guarantee Mechanism Based on Trusted Computing
Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol
Sensor Failure Detection Based on Programmable Switch and Machine Learning
A Solution to Reduce Broadcast Storm in VANET
a Vehicle Intrusion Detection System Based on Time Interval and Data Field
An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption
A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections
Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA
Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments
Security analysis of measurement automation system based on threat intelligence
A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network
Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning
Recent Development, Trends and Challenges in IoT Security
Energy Optimization for Wild Animal Tracker basing on watchdog technology
Performance comparison of curve fitting and compressed sensing in channel state information feature extraction
Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength
Wi-Fi Indoor Positioning Using D-S Evidence Theory
A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System
Multimedia Forensics
Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain
Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method
A Fast Tongue Image Color Correction Method Based on Gray World Method
Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval.
Other Format:
Printed edition:
ISBN:
978-3-030-78612-0
9783030786120
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account