Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part III, Sun Xingming, Wang Jinwei, Bertino Elisa
Описание: The selected papers cover a wide range of topics, including machine learning, pattern recognition, natural language processing, knowledge representation, cognitive aspects of AI, ethics of AI, and other important aspects of AI research.
Описание: The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020.
Описание: The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions.
Описание: Full Papers.- Reinforcement Learning based Group Event Invitation Algorithm.- OSCD: An Online Charging Scheduling Algorithm to Optimize Cost and Smoothness.- Maximizing The Expected In uence in Face of The Non-Progressive Adversary.- A Novel Anti-attack Revenue Optimization Algorithm in the Proof-of-work based Blockchain.- Can the Max-Min Fair Allocation be Trustful in a Centralized Resource System.- A Novel Blockchain Network Structure Based on Logical Nodes.- Dynamic Distribution Routing Algorithm Based on Probability for Maritime Delay Tolerant Networks.- Learning-Aided Mobile Charging for Rechargeable Sensor Networks.- A Social Relationship Enabled Cooperative Jamming Scheme for Wireless Communications.- Multi-Job Associated Task Scheduling based on Task Duplication and Insertion for Cloud Computing.- Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union.- Approximation Algorithm for the Offloading Problem in Edge Computing.- Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning.- Camera Style Guided Feature Generation for Person Re-Identification.- Sync or Fork: Node-Level Synchronization Analysis of Blockchain.- Multi-user Cooperative Computation Offloading in Mobile Edge Computing.- SDTCNs: A Symmetric Double Temporal Convolutional Network for Chinese NER.- Verifiable Encrypted Search with Forward Secure Updates for Blockchain-based System.- Capacity Analysis of Ambient Backscatter System with Bernoulli Distributed Excitation.- Multiset Synchronization with Counting Cuckoo Filters.- Privacy-Aware Online Task Offloading for Mobile-Edge Computing.- A Class Incremental Temporal-Spatial Model Based on Wireless Sensor Networks for Activity Recognition.- Sensor Deployment for Composite Event Monitoring in Battery-free Sensor Networks.- Optimizing Motion Estimation With an ReRAM-based PIM Architecture.- Trajectory-based Data Delivery Algorithm in Maritime Vessel Networks based on Bi-LSTM.- Cold start and Learning Resource Recommendation Mechanism Based on Opportunistic network in the context of campus collaborative learning.- Outsourced Multi-Authority ABE with White-box Traceability for Cloud-IoT.- Deep Learning Enabled Quickest Detection of Identity Spoo ng Attacks.- On-Line Learning-Based Allocation of Base Stations and Channels in Cognitive Radio Networks.- A Deep Spatial-Temporal Network for Vehicle Trajectory Prediction.- Beamforming for MISO Cognitive Radio Networks Based on Successive Convex Approximation.- K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data.- Incentive Mechanism for Socially-Aware Mobile Crowdsensing: A Bayesian Stackelberg Game.- Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks.- An improved parallel network tra c anomaly detection method based on Bagging and GRU.- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs.- Blockchain-based Privacy-preserving Dynamic Spectrum Sharing.- A Survey: Applications of Blockchains in the Internet of Vehicles.- A Secure Topology Control Mechanism for SDWSNs Using Identity-based Cryptography.- A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage.- A New Fully Homomorphic Signatures from Standard Lattices.- An Efficient Malicious User Detection Mechanism for Crowdsensing System.- Implementation of Video Transmission over Maritime Ad Hoc Network.- A Reliable Multi-task Allocation Based on Reverse Auction for Mobile Crowdsensing.- A Blockchain based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme.- CPBA: An Efficient Conditional Privacy-preserving Batch Authentication Scheme for VANETs.- Consensus in Wireless Blockchain System.- Blockchain-based Service Recommendation Supporting Data Sharing.- Multi-objective disaster backup in inter-datacenter using reinforcement learning.- Detecting Internet-scale NATs for IoT Devices Based on Tri-net.- Data integrity
Описание: The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020.
Описание: This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
Описание: The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
Описание: The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
Описание: This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
Описание: The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.
The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:
Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
A deep learning neural network for classifying good and bad photos.- Adapting and Enhancing Evolutionary Art for Casual Creation.- Comparing Fuzzy Rule Based Approaches for Music Genre Classification.- Quantum Zentanglement: Combining Picbreeder and Wave Function Collapse to Create Zentangles.- Emerging Technology System Evolution.- Fusion of Hilbert-Huang Transform and Deep Convolutional Neural Network for Predominant Musical Instruments Recognition.- Genetic Reverb: Synthesizing Artificial Reverberant Fields Via Genetic Algorithms.- Portraits of No One: An Interactive Installation.- Understanding Aesthetic Evaluation with Deep Learning.- An Aesthetic-Based Fitness Measure and a Framework for Guidance of Evolutionary Design in Architecture.- Objective Evaluation of Tonal Fitness for Chord Progressions.- Coevolving Artistic Images Using OMNIREP.- Sound Cells in Genetic Improvisation: An Evolutionary Model for Improvised Music.- Controlling Self-Organization in Generative Creative Systems.- Emulation Games. See and Be Seen, a Subjective Approach to Analog Computational Neuroscience.
Описание: This book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru