Artificial Intelligence and Security International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part I 6th editon by Elisa Bertino, Jinwei Wang, Xingming Sun – Ebook PDF Instant Download/Delivery: 3030578844, 9783030578848
Full dowload Artificial Intelligence and Security International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part I 6th editon after payment

Product details:
ISBN 10: 3030578844
ISBN 13: 9783030578848
Author: Elisa Bertino; Jinwei Wang; Xingming Sun
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing.
Artificial Intelligence and Security International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part I 6th Table of contents:
- Artificial Intelligence
- Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection
- Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embedding
- An Overview of Cross-Language Information Retrieval
- A Formal Method for Safety Time Series Simulation of Aerospace
- Tuple Measure Model Based on CFI-Apriori Algorithm
- Deep Learning Video Action Recognition Method Based on Key Frame Algorithm
- Optimization and Deployment of Vehicle Trajectory Prediction Scheme Based on Real-Time ANPR Traffic Big Data
- Ear Recognition Based on Gabor-SIFT
- Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Caching
- Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice
- Detecting Bluetooth Attacks Against Smartphones by Device Status Recognition
- Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks
- An Efficient Method for Generating Matrices of Quantum Logic Circuits
- A Mobile Device Multitasking Model with Multiple Mobile Edge Computing Servers
- A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tags
- An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network
- A Research for 2-m Temperature Prediction Based on Machine Learning
- A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Networks
- On Enterprises’ Total Budget Management Based on Big Data Analysis
- IoT Device Recognition Framework Based on Network Protocol Keyword Query
- Application of ARIMA Model in Financial Time Series in Stocks
- A Topological Control Algorithm Based on Energy Consumption Analysis and Locomotion of Nodes in Ad Hoc Network
- A Simulation Platform for the Brain-Computer Interface (BCI) Based Smart Wheelchair
- A Learning Resource Recommendation Model Based on Fusion of Sequential Information
- A Convolutional Neural Network-Based Complexity Reduction Scheme in 3D-HEVC
- Air Quality Index Prediction Based on Deep Recurrent Neural Network
- Sparse Representation for Face Recognition Based on Projective Dictionary Pair Learning
- An Improved HF Channel Wideband Detection Method Based on Scattering Function
- Research on Quality Control of Marine Monitoring Data Based on Extreme Learning Machine
- Study on the Extraction of Target Contours of Underwater Images
- Short-Term Demand Forecasting of Shared Bicycles Based on Long Short-Term Memory Neural Network Model
- An Effective Bacterial Foraging Optimization Based on Conjugation and Novel Step-Size Strategies
- A Coding Scheme Design for the Shape Code of Standardized Yi Characters in Liangshan
- Police: An Effective Truth Discovery Method in Intelligent Crowd Sensing
- Improve Data Freshness in Mobile Crowdsensing by Task Assignment
- Access Control Based on Proxy Re-encryption Technology for Personal Health Record Systems
- Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification
- QR Code Detection with Faster-RCNN Based on FPN
- General Virtual Images Construction Using Pixel Scrambling for Face Recognition
- Knowledge Graph Construction of Personal Relationships
- Blind Spectrum Sensing Based on the Statistical Covariance Matrix and K-Median Clustering Algorithm
- An Efficient Web Caching Replacement Algorithm
- Carrier-Phase Based Ranging Algorithm with Multipath Suppression in RFID System
- Research on Vehicle Routing Problem Based on Tabu Search Algorithm
- Unsupervised Situational Assessment for Power Grid Voltage Stability Monitoring Based on Siamese Autoencoder and k-Means Clustering
- The Mathematical Applications of Majorization Inequalities to Quantum Mechanics
- The Numerical Results of Binary Coherent-State Signal’s Quantum Detection in the Presence of Noise
- An Adaptive Parameters Density Cluster Algorithm for Data Cleaning in Big Data
- Relevance and Time Based Collaborative Filtering for Recommendation
- A Displacement Data Acquisition and Transmission System Based on a Wireless Body Domain Network
- Data Cleaning Algorithm Based on Body Area Network
- Improving Performance of Colour-Histogram-Based CBIR Using Bin Matching for Similarity Measure
- A Survey on Risk Zonation of Lightning
- Joint Extraction of Entity and Semantic Relation Using Encoder – Decoder Model Based on Attention Mechanism
- Internet of Things
- Image Segmentation of Manganese Nodules Based on Background Gray Value Computation
- A Portable Intelligent License Plate Recognition System Based on off-the-Shelf Mini Camera
- Mechanical Analysis and Dynamic Simulation of Ship Micro In-pipe Robot
- LoRa Devices Identification Based on Differential Constellation Trace Figure
- Improved Helmet Wearing Detection Method Based on YOLOv3
- MobiMVL: A Model-Driven Mobile Application Development Approach for End-Users
- Analysis on Buffer-Aided Energy Harvesting Device-to-Device Communications
- Research on Traceability of Agricultural Products Supply Chain System Based on Blockchain and Internet of Things Technology
- Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT
- Super-Resolution Reconstruction of Electric Power Inspection Images Based on Very Deep Network Super Resolution
- Single Color Image Dehazing Based on Vese-Osher Model and Dark Channel Prior Algorithm
- Traffic-Behavioral Anomaly Detection of Endhosts Based on Community Discovery
- A Lightweight Indoor Location Method Based on Image Fingerprint
- Performance Analysis and Optimization for Multiple Carrier NB-IoT Networks
- A Short Flows Fast Transmission Algorithm Based on MPTCP Congestion Control
- Analysis of Public Transport System Efficiency Based on Multi-layer Network
- Fast Video Classification with CNNs in Compressed Domain
- Back Matter
People also search for Artificial Intelligence and Security International Conference ICAIS 2020 Hohhot China July 17 20 2020 Proceedings Part I 6th :
international conference on security surveillance and artificial intelligence
international conference on artificial intelligence security and privacy
international conference on communication security and artificial intelligence