default search action
6th ICAIS 2020: Hohhot, China - Part II
- Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0
Internet of Things
- Bo Wang, Zhibin Zhang:
Green Crop Image Segmentation Based on Superpixel Blocks and Decision Tree. 3-17 - Chen Yang, GuoGen Wan, Peilin He, Yuanyuan Huang, Shibin Zhang:
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process. 18-29 - Yizhuo Liu, Jin Shi, Jin Han, Mingxin Lu:
Research on Chain of Evidence Based on Knowledge Graph. 30-41 - Yiting Li, Jin Shi, Jin Han, Mingxin Lu, Yan Zhang:
Research on the Construction of Intelligent Catalog System for New Media Information Resources. 42-52
Information Security
- Ee Duan, Xiaoni Du, Tianxin Wang, Ji-Xiang Du:
Construction of a Class of Four-Weight Linear Codes. 55-64 - Fujun Zhang, Xiaoni Du, Jinxia Hu:
Designs from the Narrow-Sense Primitive BCH Codes C(q, qm-1, δ 3, 1). 65-73 - Yan Li, Jianjing Shen, Wei Liu, Wei Zou:
A Survey on Side-Channel Attacks of Strong PUF. 74-85 - Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu:
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code. 86-97 - Hui Zeng, Anjie Peng, Xiangui Kang:
Hiding Traces of Camera Anonymization by Poisson Blending. 98-108 - Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:
A Deep Learning Approach to Detection of Warping Forgery in Images. 109-118 - Li Wu, Jun Yang:
The Course Design of Applied Talent Statistics Based on Fuzzy Control and Grey Measure Model. 119-130 - Qianyu Xie, Xutao Yang, Laixin Chi, Xuejie Zhang, Jixian Zhang:
Reinforcement Learning-Based Resource Allocation in Edge Computing. 131-142 - Yachuan Zhang, Hao Li, Rongjing Bu, Chenming Song, Tao Li, Yan Kang, Tie Chen:
Fuzzy Multi-objective Requirements for NRP Based on Particle Swarm Optimization. 143-155 - Yu Song, Zhigui Liu, He Xiao:
A Clustering Algorithm for Wireless Sensor Networks Using Geographic Distribution Information and Genetic Algorithms. 156-165 - Jingjun Zhou, Jingbing Li, Hui Li, Jing Liu, Qianning Dai, Saqib Ali Nawaz, Jian Shen:
Dual Residual Global Context Attention Network for Super-Resolution. 166-178 - Fengming Qin, Jingbing Li, Hui Li, Jing Liu, Saqib Ali Nawaz, Yanlin Liu:
A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences. 179-190 - Minghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng:
Encryption Algorithm for TCP Session Hijacking. 191-202 - Huiling Li, Yayi Zou, Wenjia Yi, Ziyi Ye, Yi Ma:
A Covert Information Transmission Scheme Based on High Frequency Acoustic Wave Channel. 203-214 - Zhijun Zhang, Zeng Shou, Zhiyan Ning, Dan Wang, Yingjian Gao, Kai Lu, Qi Zhang:
Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud. 215-224 - Gui Liu, Wei Zhou, Yongyong Dai, Haijiang Xu, Li Wang:
Unsupervised Data Transmission Scheduling in Cloud Computing Environment. 225-235 - Mingda Liu, Yijuan Shi:
DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain. 236-245 - Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng:
A Semi-quantum Group Signature Scheme Based on Bell States. 246-257 - Peilin He, Yuanyuan Huang, Jialing Dai, Shibin Zhang:
An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication. 258-266 - Gongxin Shen:
A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of Things. 267-279 - Xue-Yang Li, Yan Chang, Shibin Zhang:
Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States. 280-288 - Zheng Tao, Shibin Zhang, Yan Chang, Lili Yan:
A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States. 289-297 - Ji-Zhong Wu, Lili Yan:
Quantum Key Distribution Protocol Based on GHZ Like State and Bell State. 298-306 - Jianchao Gan, Zhiwei Sheng, Shibin Zhang, Yang Zhao:
Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System. 307-317 - Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei:
A Blockchain Based Distributed Storage System for Knowledge Graph Security. 318-327 - Xizi Peng, Jinquan Zhang, Shibin Zhang:
A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average. 328-340 - Li Mao, Naqin Zhou, Tong Zhang, Wei Du, Han Peng, Lina Zhu:
An AHP/DEA Methodology for the Public Safety Evaluation. 341-352 - Chunlai Du, Shenghui Liu, Yanhui Guo, Lei Si, Tong Jin:
Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox Fuzzing. 353-364 - Li Xu, Yanbin Sun:
Summary of Research on Information Security Protection of Smart Grid. 365-379 - Lingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han:
Framework Design of Environment Monitoring System Based on Machine Learning. 380-392 - Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, Zhenghui Liu:
Compression Detection of Audio Waveforms Based on Stacked Autoencoders. 393-404 - Weipeng Wang, Huan Luo, Quan Zheng, Cheng Wang, Wenzhong Guo:
A Deep Reinforcement Learning Framework for Vehicle Detection and Pose Estimation in 3D Point Clouds. 405-416 - Ran Zhang, Min Liu, Qikun Zhang, Zengyu Cai:
A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA. 417-427 - Lei Zhu, Yufeng Liu, Wei Zhang, Kehua Yang:
Research on User Preference Film Recommendation Based on Attention Mechanism. 428-439 - Xiaoxiao Tang, Wencui Li, Jing Shen, Feng Qi, Shaoyong Guo:
Traffic Anomaly Detection for Data Communication Networks. 440-450 - Yanyan Song, Li Tan, Lina Zhou, Xinyue Lv, Zihao Ma:
Video Action Recognition Based on Hybrid Convolutional Network. 451-462 - Aziguli Wulamu, Ning Chen, Lijia Yang, Li Wang, Jiaxing Shi:
Identification of Botany Terminology Based on Bert-BLSTM-CRF. 463-474 - Yujiao Liu, Lin He, Duohui Li, Xiaozhao Luo, Guo Peng, Xiaoping Fan, Guang Sun:
Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data. 475-486 - Hanxiao Zhang, Jiansheng Peng:
Visual SLAM Location Methods Based on Complex Scenes: A Review. 487-498 - Wenpan Tan, Yong He, Bing Zhu:
Improvement of Co-training Based Recommender System with Machine Learning. 499-509 - Yao Xiao, Junguo Liao:
Privacy Security Classification (PSC) Model for the Attributes of Social Network Users. 510-522 - Wu Zeng, Yingxian Jiang, ZhanXiong Huo, Kun Hu:
Clustering Analysis of Extreme Temperature Based on K-means Algorithm. 523-533 - Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo:
Network Topology Boundary Routing IP Identification for IP Geolocation. 534-544 - Bin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, Yun-Qing Shi:
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package. 545-556 - Wei She, Jian-Sen Chen, Feng Xian He, Xiaoyu Yang, Xuhong Lu, Zhihao Gu, Wei Liu, Zhao Tian:
A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment. 557-569 - Wei She, Li Xu, Huibo Xu, Xiaoqing Zhang, Yue Hu, Zhao Tian:
Multilayer Perceptron Based on Joint Training for Predicting Popularity. 570-580 - Wei Liu, Yufei Peng, Zhao Tian, Yang Li, Wei She:
A Medical Blockchain Privacy Protection Model Based on Mimicry Defense. 581-592 - Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Junxiang Wang, Changlong Lu:
Securing Data Communication of Internet of Things in 5G Using Network Steganography. 593-603 - Hua Wang, Weiwei Li, Jiqiang Niu, Dianfeng Liu:
The Use of the Multi-objective Ant Colony Optimization Algorithm in Land Consolidation Project Site Selection. 604-616 - Xiang Wang, Canji Yang, Lingling Jiao, Qingqi Pei:
Image Content Location Privacy Preserving in Social Network Travel Image Sharing. 617-628 - Renjie Liang, Peijia Zheng, Yanmei Fang, Tingting Song:
A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform. 629-641 - Jinrun Guo, Xiehua Li, Jie Jiang:
A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System. 642-652
Big Data and Cloud Computing
- Xiaofeng Du, Yueming Lu, Daoqi Han:
Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things. 655-663 - Qin Miao, Li Wu, Jun Yang:
Classification of Tourism English Talents Based on Relevant Features Mining and Information Fusion. 664-673 - Li Wu, Jun Yang:
Research on Application of Big Data Combined with Probability Statistics in Training Applied Talents. 674-685 - Shuqiang Guo, Baohai Yue, Qianlong Bai, Huanqiang Lin, Xinxin Zhou:
Region Proposal for Line Insulator Based on the Improved Selective Search Algorithm. 686-696 - Dun Li, Cui Wang, Lun Li, Zhiyun Zheng:
A Collaborative Filtering Algorithm Based on the User Characteristics and Time Windows. 697-709 - Kai Yang, Zhaowei Qu, Xiaoru Wang, Fu Li, Yueli Li, Dongbai Jia:
MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement Mechanism. 710-721
Information Processing
- Zhaojin Hong, Chenyang Wei, Yuan Zhuang, Ying Wang, Yiting Wang, Li Zhao:
Research on Psychological Counseling and Personality Analysis Algorithm Based on Speech Emotion. 725-737 - Yan Zhou, Yibin Tang, Guanying Huo, Dabing Yu:
Underwater Image Enhancement Based on Color Balance and Edge Sharpening. 738-747 - Jiale Zhang, Yan Zhou, Qingwu Li, Huixing Sheng, Dabing Yu, Xinyue Chang:
Stereo Matching Using Discriminative Feature-Oriented and Gradient-Constrained Dictionary Learning. 748-759 - Wei Wang, Weidong Liu, Jinming Liu:
Acoustic Emission Recognition Based on Spectrogram and Acoustic Features. 760-768 - Jin Zhang, Mengqiong Ge, Xiaoyu Shi, Zhuohao Weng, Jian Zhang:
Polyhedron Target Structure Information Extraction Method in Single Pixel Imaging System. 769-775 - Baoyu Xiang, Zhuo Yu, Ke Xie, Shaoyong Guo, Meiling Dai, Sujie Shao:
Design and Implementation of Four-Meter Reading Sharing System Based on Blockchain. 776-785 - Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, Shaoyong Guo:
Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity. 786-797 - Ruide Li, Feng Wang, XinXin Zhang, Jiajun Chen, Jie Tong:
Reliability Improvement Algorithm of Power Communication Network Based on Network Fault Characteristics. 798-804 - Xuehan Zhang, Xiaojuan Wang, Lianping Zhang:
Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal Networks. 805-814
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.