5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II /
نام نخستين پديدآور
edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
وضعیت ویراست
وضعيت ويراست
1st ed. 2019.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham :
نام ناشر، پخش کننده و غيره
Springer International Publishing,
تاریخ نشرو بخش و غیره
2019.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (xvii, 665 pages) :
ساير جزييات
375 illustrations, 189 illustrations in color
فروست
عنوان فروست
Lecture notes in computer science ;
عنوان فروست
LNCS sublibrary: SL4 - security and cryptology
مشخصه جلد
11633
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes author index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Robust Encrypted Watermarking for Medical Images Based on DWT-DCT and Tent Mapping in Encrypted Domain -- An Analysis of A Three-Factor Authentication Scheme and Its Improved Fix -- A Novel Content Based Image Retrieval Scheme in Cloud Computing -- Mobile Image Retrieval System for Cloud Service Based on Convolutional Neural Network and Hadoop -- Formal Specification of Concurrent Enforcement Ucon Model with CTL Logic -- Design of Real-Time Resource-Aware Network Resource Allocation Mechanism Under SDN Background -- RSCM: A Reliability-Aware Service Chain Mapping ystems -- Task Scheduling Algorithm based on Campus Cloud Platform -- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine -- Prediction on Payment Volume from Customer Service Electricity Channel -- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV -- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV -- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354 -- Probe Recommendation Algorithm for Link Delay Detection -- Recommendation with Heterogeneous Information Networks Based on Meta-Graph -- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy -- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network -- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment -- Research on the Optimization of Spark Big Table Equal Join -- Gait Recognition based on spatial-temporal information -- Research on Load Balancing Algorithm Optimization Based on Spark Platform -- A System for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data Application System -- Urban traffic flow forecast based on ST-SEResNet -- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation -- Input-Output Analysis of Chinese National Agricultural Science and Technology Park -- A Power Grid Operations Monitoring Platform Based on Big Data Technology -- An Efficient Social-Aware Routing Strategy in Mobile Social Networks -- Cloud Computing and Security -- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure -- Cloud Management Systems -- Load Balancing Algorithms and VDI Implementation Techniques -- When Side Channel becomes Good: Kernel Malware Attack Investigation
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.