default search action
6th ICAIS 2021: Dublin, Ireland - Part II
- Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3
Big Data
- Suzhen Wang, Zhiting Jia, Wenli Wang:
Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform. 3-13 - Si-Yuan He, Shan Li, Chao Guo:
Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis. 14-26 - Yuxian Zhu:
Exploring the Informationization of Land Reserve Archives Management. 27-40 - Yang Zhou, Fazhou Liu, Shan Li, Chao Guo:
Research and Implementation of Anomaly Detection Algorithm in Data Mining. 41-53 - Haitao Xu, Ruifeng Duan, Shengsong Yang, Lei Guo:
An Empirical Study on Data Sampling for Just-in-Time Defect Prediction. 54-69 - Yangfei Sun, Yuanchun Jiang:
Design and Implementation of Data Adapter in SWIM. 70-81
Cloud Computing and Security
- Xiehua Li, Gang Long, Sijie Li:
Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking. 85-101 - Zhaofeng Yu, Lin Ye, Hongli Zhang, Dongyang Zhan:
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing. 102-111 - Ben Wang, Tingrui Li, Xun Han, Huahui Li:
A Computing Task Offloading Scheme for Mobile Edge Computing. 112-123 - Jicheng He, Minghui Gao, Zhijun Zhang, Li Ma, Zhiyan Ning, Jingyi Cao:
Security Transmission Scheme of Sensitive Data for Mobile Terminal. 124-134 - Hongyan Zhang, Bo Liu, Long Qin, Jing Zhang, Weichao Gong:
Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain. 135-146 - Chunru Zhou, Guo Wu, Junhao Li, Chunrui Zhang:
A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring. 147-156 - Yuan Sun, Jiaya Liang, Pengchao Niu:
Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network. 157-166 - Pengwei Wang, Yi Wei, Zhaohui Zhang:
Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature. 167-179 - Zhi Lin, Yubo Song, Jun-Bo Wang:
Detection of Virtual Machines Based on Thread Scheduling. 180-190 - Yunfei Long, Huosheng Xu, Pengyuan Qi, Liguo Zhang, Jun Li:
Graph Attention Network for Word Embeddings. 191-201 - Yujie Jin, Qun Wang:
Firewall Filtering Technology and Application Based on Decision Tree. 202-215
Encryption and Cybersecurity
- Xiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, Jieren Cheng:
A DAPP Business Data Storage Model Based on Blockchain and IPFS. 219-230 - Chenhuan Liu, Qiankun Liu, Shanshan Hao, CongXiao Bao, Xing Li:
IPv6-Darknet Network Traffic Detection. 231-241 - Tao Li, Xu Hu, Aiqun Hu:
Neural Control Based Research of Endogenous Security Model. 242-252 - Xuanang Yu, Yang Lu, Jinmei Tian, Fen Wang:
Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes. 253-264 - Mengwei Zhang, Xiubo Chen:
A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy. 265-278 - Xinyan Wang, Jianxun Guo, Dong Li, Xin Chen, Kailin Wang:
A Transaction Model of Bill Service Based on Blockchain. 279-288 - Xiaojuan Wang, Kaiwenlv Kacuila, Mingshu He:
An N-gram Based Deep Learning Method for Network Traffic Classification. 289-304 - Mingshu He, Lei Jin, Mei Song:
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning. 305-320 - Shunbin Li, Kun Zhang, Ruyun Zhang, Mingxing Zhu, Hanguang Luo, Shaoyong Wu:
Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture. 321-331 - Rui Zhang, Zhaoxuan Li, Lijuan Zheng:
Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain. 332-345
Information Hiding
- Gen Liu, Hanzhou Wu, Xinpeng Zhang:
Covert Communication via Modulating Soft Label of Neural Network. 349-359 - Xin Zheng, Chunjie Cao, Jiaxian Deng:
DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography. 360-375 - Wenbo Xu, Wanteng Liu, Cong Lin, Ke Wang, Wenbin Wang, Wei Lu:
Halftone Image Steganography Based on Reassigned Distortion Measurement. 376-387 - Xiaolin Yin, Mujian Yu, Lili Chen, Ke Wang, Wei Lu:
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units. 388-399 - Hanrong Sun, Zhiguo Qu:
High Efficiency Quantum Image Steganography Protocol Based on ZZW Framework. 400-411 - Junwei Luo, Cong Lin, Lingwen Zeng, Jifan Liang, Wei Lu:
Halftone Image Steganalysis by Reconstructing Grayscale Image. 412-423 - Mujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen, Wei Lu:
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition. 424-436 - Wei Fang, Xuelei Jia, Wei Jia:
Research and Implementation of Medical Information Protection and Sharing Based on Blockchain. 437-449
IoT Security
- Siqing Chen, Yu Jiang, Wen Sun:
LoRa Network Security Schemes Based on RF Fingerprint. 453-465 - Lulu Zhang, Shiqi Chen, Xuran Jin, Jie Wan:
Smart Home Based Sleep Disorder Recognition for Ambient Assisted Living. 466-475 - Yan Liu, Angang Zheng, Huaiying Shang, Lingda Kong, Guang Shen, Shuming Shen:
Blockchain-Based Reliable Collection Mechanism for Smart Meter Quality Data. 476-487 - Yong Yan, Tianhong Su, Shaoyong Guo, Song Kang:
Power Blockchain Guarantee Mechanism Based on Trusted Computing. 488-501 - Yonggui Wang, Zhu Liu, Lvchao Huang:
Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol. 502-513 - Xiaolong Zhang, Rengbo Yang, Guangfeng Guo, Junxing Zhang:
Sensor Failure Detection Based on Programmable Switch and Machine Learning. 514-525 - Subo He, Lei Xiang, Ying Wang, Minna Xia, Yaling Hong:
A Solution to Reduce Broadcast Storm in VANET. 526-537 - Xun He, Zhen Yang, Yongfeng Huang:
A Vehicle Intrusion Detection System Based on Time Interval and Data Fields. 538-549 - Fei Xia, Jiaming Mao, Zhipeng Shao, Liangjie Xu, Ran Zhao, Yunzhi Yang:
An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption. 550-562 - Mingming Zhang, Jiaming Mao, Lu Chen, Nige Li, Lei Fan, Leshan Shuang:
A Load-Balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections. 563-574 - Yuxin Du, Xiaoli He, Weijian Yang, Xinwen Cheng, Yongming Huang:
Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA. 575-587 - Zhihan Qi, YunChao Pan, Hao Du, Na Zhang, ZongHan Bai, Gang Xu:
Opportunistic Network Performance Optimization Model Based on a Combination of Neural Networks and Orthogonal Experiments. 588-600 - Shaocheng Wu, Tao Liu, Jin Li, HeFang Jiang, Xiaowei Chen, Xiaohong Cao:
Security Analysis of Measurement Automation System Based on Threat Intelligence. 601-610 - Qinghai Ou, Yanru Wang, Yongjie Li, Jizhao Lu, Hongkang Tian, Wenjie Ma, Hui Liu:
A MOEA-D-Based Service Quality Matching Optimization Algorithm in Electric Power Communication Network. 611-621 - Qi Liu, Bowen Zhang, Jianming Zhao, Chuanzhi Zang, Xibo Wang, Tong Li:
Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning. 622-632 - Morteza Talezari, Shanshan Tu, Sadaqat ur Rehman, Chuangbai Xiao, Basharat Ahmad, Muhammad Waqas, Obaid Ur Rehman:
Recent Development, Trends and Challenges in IoT Security. 633-646 - Zhenggang Xu, Wenhan Zhai, Chen Liang, Yunlin Zhao, Tian Huang, Minghui Zhou, Libo Zhou, Guiyan Yang, Zhiyuan Hu:
Energy Optimization for Wild Animal Tracker Basing on Watchdog Technology. 647-655 - Xiaolong Wang, Xiaolong Yang, Mu Zhou, Liangbo Xie:
Performance Comparison of Curve Fitting and Compressed Sensing in Channel State Information Feature Extraction. 656-666 - Min Chen, Xiaolong Yang, Yue Jin, Mu Zhou:
Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength. 667-677 - Zhu Liu, Yong Wang, Yuexin Long, Yaohua Li, Mu Zhou:
Wi-Fi Indoor Positioning Using D-S Evidence Theory. 678-687 - Zengshan Tian, Xixi Liu, Kaikai Liu, Liangbo Xie:
A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System. 688-699
Multimedia Forensics
- Shaoyong Guo, Cheng Huang, Yong Yan, Liandong Chen, Sujie Shao:
Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium Blockchain. 703-714 - Zhimao Lai, Yufei Wang, Weize Sun, Peng Zhang:
Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method. 715-723 - Guojiang Xin, Lei Zhu, Hao Liang, Changsong Ding:
A Fast Tongue Image Color Correction Method Based on Gray World Method. 724-735 - Ezekiel Mensah Martey, Hang Lei, Xiaoyu Li, Obed Appiah, Nicodemus Songose Awarayi:
Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. 736-747
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.