Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III

Author:   Xingming Sun ,  Xiaorui Zhang ,  Zhihua Xia ,  Elisa Bertino
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1424
ISBN:  

9783030786205


Pages:   758
Publication Date:   29 June 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III


Add your own review!

Overview

Full Product Details

Author:   Xingming Sun ,  Xiaorui Zhang ,  Zhihua Xia ,  Elisa Bertino
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1424
Weight:   1.169kg
ISBN:  

9783030786205


ISBN 10:   303078620
Pages:   758
Publication Date:   29 June 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cloud Computing and Security.- Design and Implementation of Information Detection System Based On Privacy Sensitive Data.- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform.- A Method of network attack recognition Based on CNN+LSTM Model.- Encryption and Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing.- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables.- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal.- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature extracting and matching system based on magic-number and AC-algorithm.- A Review: How to detect malicious domains.- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in Smart Contracts: A Survey.- Detection of false data injection attacks in Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method Based on Image Low-frequency Information.- Information Hiding.- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network.- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm.- Finding the better distortion function from prior scheme for Image Steganography.- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning.- Color Image Steganography Scheme Based on Convolutional Neural Network.- Robust JPEG steganography using singular value decomposition in DCT domain.- 3D Coverless Image Steganography Scheme Based on 3D Slice Technology.- Software Information Hiding Algorithm Based on Import Table of Portable Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG Compression.- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT Security.- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis.- A Comprehensive Review of IoT Technologies and Applications for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living,. Design and Development of Field Mobile Monitoring System for Forest Fire Fighting.- ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing Satellite Internet of Things by Perceiving Content Semantics.- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear Time-invariant System Reduced-order Finite-time Observer.- Research on invulnerability of WSN based on small world characteristics of complex networks.- Collaboration energy efficiency with mobile edge computing for target tracking in IOT.- Realization of CSI-based Human Behavior Recognition: A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example.- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology.- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG Image Steganography Based on SVD in Wavelet Domain.- Raw Material Traceability of Industrial Control System based on Blockchain.- Survey: Research on Blockchain Consensus Mechanism in IoT Security.- Research on Life Prediction Model of Field Seismic Equipment Based on IFA-RVM Algorithm.- Optimization of Location Technology in Meteorological Wireless Sensor Network.- A Survey on the Applications of Wi-Fi Sensing.- Efficient Partially Policy-Hidden CP-ABE for IoT assisted Smart Health.- A Novel Hand Gesture Recognition Method for FMCW Radar.- A Novel Blockchain-based Revocable Permission Management on CP-ABE Scheme.-Automated Authentication of Large-scale IoT Devices with Hybrid Feature Selection.- A Practical Blockchain Framework for Securing IoT Applications.- A Blockchain-based Internet of Things Forensics Model.- Network Device Identification based on MAC Boundary Inference.- Providing Network-based Datasets and Multi-dimensional Features for IoT Botnet Detection Research.- The cross-domain identity authentication scheme has no trusted authentication center in the cloud environment.- A Caching Strategy Based On Content Popularity Level for NDN.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List