


default search action
6th ICAIS 2020: Hohhot, China - Part II
- Xingming Sun, Jinwei Wang

, Elisa Bertino
:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0
Internet of Things
- Bo Wang, Zhibin Zhang:

Green Crop Image Segmentation Based on Superpixel Blocks and Decision Tree. 3-17 - Chen Yang, GuoGen Wan, Peilin He

, Yuanyuan Huang, Shibin Zhang:
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process. 18-29 - Yizhuo Liu, Jin Shi, Jin Han, Mingxin Lu:

Research on Chain of Evidence Based on Knowledge Graph. 30-41 - Yiting Li, Jin Shi, Jin Han, Mingxin Lu, Yan Zhang:

Research on the Construction of Intelligent Catalog System for New Media Information Resources. 42-52
Information Security
- Ee Duan, Xiaoni Du, Tianxin Wang, Ji-Xiang Du:

Construction of a Class of Four-Weight Linear Codes. 55-64 - Fujun Zhang, Xiaoni Du, Jinxia Hu:

Designs from the Narrow-Sense Primitive BCH Codes C(q, qm-1, δ 3, 1). 65-73 - Yan Li, Jianjing Shen, Wei Liu, Wei Zou:

A Survey on Side-Channel Attacks of Strong PUF. 74-85 - Fei Hu, Yuanzhi Yao

, Weihai Li, Nenghai Yu:
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code. 86-97 - Hui Zeng

, Anjie Peng, Xiangui Kang:
Hiding Traces of Camera Anonymization by Poisson Blending. 98-108 - Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:

A Deep Learning Approach to Detection of Warping Forgery in Images. 109-118 - Li Wu, Jun Yang:

The Course Design of Applied Talent Statistics Based on Fuzzy Control and Grey Measure Model. 119-130 - Qianyu Xie, Xutao Yang, Laixin Chi, Xuejie Zhang, Jixian Zhang

:
Reinforcement Learning-Based Resource Allocation in Edge Computing. 131-142 - Yachuan Zhang, Hao Li, Rongjing Bu, Chenming Song, Tao Li, Yan Kang, Tie Chen:

Fuzzy Multi-objective Requirements for NRP Based on Particle Swarm Optimization. 143-155 - Yu Song, Zhigui Liu, He Xiao:

A Clustering Algorithm for Wireless Sensor Networks Using Geographic Distribution Information and Genetic Algorithms. 156-165 - Jingjun Zhou

, Jingbing Li, Hui Li, Jing Liu, Qianning Dai, Saqib Ali Nawaz, Jian Shen:
Dual Residual Global Context Attention Network for Super-Resolution. 166-178 - Fengming Qin, Jingbing Li, Hui Li, Jing Liu, Saqib Ali Nawaz

, Yanlin Liu:
A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences. 179-190 - Minghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng:

Encryption Algorithm for TCP Session Hijacking. 191-202 - Huiling Li, Yayi Zou, Wenjia Yi, Ziyi Ye, Yi Ma:

A Covert Information Transmission Scheme Based on High Frequency Acoustic Wave Channel. 203-214 - Zhijun Zhang, Zeng Shou, Zhiyan Ning, Dan Wang, Yingjian Gao, Kai Lu, Qi Zhang:

Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud. 215-224 - Gui Liu, Wei Zhou, Yongyong Dai, Haijiang Xu, Li Wang:

Unsupervised Data Transmission Scheduling in Cloud Computing Environment. 225-235 - Mingda Liu

, Yijuan Shi
:
DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain. 236-245 - Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng:

A Semi-quantum Group Signature Scheme Based on Bell States. 246-257 - Peilin He

, Yuanyuan Huang, Jialing Dai, Shibin Zhang:
An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication. 258-266 - Gongxin Shen:

A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of Things. 267-279 - Xue-Yang Li, Yan Chang, Shibin Zhang:

Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States. 280-288 - Zheng Tao

, Shibin Zhang, Yan Chang, Lili Yan:
A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States. 289-297 - Ji-Zhong Wu, Lili Yan:

Quantum Key Distribution Protocol Based on GHZ Like State and Bell State. 298-306 - Jianchao Gan, Zhiwei Sheng, Shibin Zhang, Yang Zhao:

Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System. 307-317 - Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei:

A Blockchain Based Distributed Storage System for Knowledge Graph Security. 318-327 - Xizi Peng, Jinquan Zhang, Shibin Zhang:

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average. 328-340 - Li Mao

, Naqin Zhou
, Tong Zhang
, Wei Du
, Han Peng
, Lina Zhu
:
An AHP/DEA Methodology for the Public Safety Evaluation. 341-352 - Chunlai Du, Shenghui Liu, Yanhui Guo, Lei Si

, Tong Jin:
Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox Fuzzing. 353-364 - Li Xu, Yanbin Sun:

Summary of Research on Information Security Protection of Smart Grid. 365-379 - Lingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han:

Framework Design of Environment Monitoring System Based on Machine Learning. 380-392 - Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo

, Zhenghui Liu:
Compression Detection of Audio Waveforms Based on Stacked Autoencoders. 393-404 - Weipeng Wang

, Huan Luo, Quan Zheng, Cheng Wang, Wenzhong Guo:
A Deep Reinforcement Learning Framework for Vehicle Detection and Pose Estimation in 3D Point Clouds. 405-416 - Ran Zhang, Min Liu, Qikun Zhang, Zengyu Cai:

A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA. 417-427 - Lei Zhu, Yufeng Liu, Wei Zhang, Kehua Yang:

Research on User Preference Film Recommendation Based on Attention Mechanism. 428-439 - Xiaoxiao Tang, Wencui Li, Jing Shen, Feng Qi, Shaoyong Guo:

Traffic Anomaly Detection for Data Communication Networks. 440-450 - Yanyan Song, Li Tan, Lina Zhou, Xinyue Lv, Zihao Ma:

Video Action Recognition Based on Hybrid Convolutional Network. 451-462 - Aziguli Wulamu, Ning Chen, Lijia Yang, Li Wang, Jiaxing Shi:

Identification of Botany Terminology Based on Bert-BLSTM-CRF. 463-474 - Yujiao Liu, Lin He, Duohui Li, Xiaozhao Luo, Guo Peng, Xiaoping Fan, Guang Sun:

Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data. 475-486 - Hanxiao Zhang, Jiansheng Peng:

Visual SLAM Location Methods Based on Complex Scenes: A Review. 487-498 - Wenpan Tan, Yong He, Bing Zhu:

Improvement of Co-training Based Recommender System with Machine Learning. 499-509 - Yao Xiao, Junguo Liao:

Privacy Security Classification (PSC) Model for the Attributes of Social Network Users. 510-522 - Wu Zeng, Yingxian Jiang, ZhanXiong Huo, Kun Hu:

Clustering Analysis of Extreme Temperature Based on K-means Algorithm. 523-533 - Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo:

Network Topology Boundary Routing IP Identification for IP Geolocation. 534-544 - Bin Ma, Qi Li

, Xiaoyu Wang, Chunpeng Wang, Yun-Qing Shi:
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package. 545-556 - Wei She

, Jian-Sen Chen, Feng Xian He, Xiaoyu Yang, Xuhong Lu, Zhihao Gu, Wei Liu, Zhao Tian
:
A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment. 557-569 - Wei She

, Li Xu, Huibo Xu, Xiaoqing Zhang
, Yue Hu, Zhao Tian
:
Multilayer Perceptron Based on Joint Training for Predicting Popularity. 570-580 - Wei Liu, Yufei Peng, Zhao Tian

, Yang Li, Wei She
:
A Medical Blockchain Privacy Protection Model Based on Mimicry Defense. 581-592 - Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Junxiang Wang, Changlong Lu:

Securing Data Communication of Internet of Things in 5G Using Network Steganography. 593-603 - Hua Wang, Weiwei Li, Jiqiang Niu, Dianfeng Liu:

The Use of the Multi-objective Ant Colony Optimization Algorithm in Land Consolidation Project Site Selection. 604-616 - Xiang Wang, Canji Yang, Lingling Jiao, Qingqi Pei:

Image Content Location Privacy Preserving in Social Network Travel Image Sharing. 617-628 - Renjie Liang, Peijia Zheng, Yanmei Fang, Tingting Song:

A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform. 629-641 - Jinrun Guo, Xiehua Li, Jie Jiang:

A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System. 642-652
Big Data and Cloud Computing
- Xiaofeng Du, Yueming Lu, Daoqi Han:

Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things. 655-663 - Qin Miao, Li Wu, Jun Yang:

Classification of Tourism English Talents Based on Relevant Features Mining and Information Fusion. 664-673 - Li Wu, Jun Yang:

Research on Application of Big Data Combined with Probability Statistics in Training Applied Talents. 674-685 - Shuqiang Guo, Baohai Yue, Qianlong Bai, Huanqiang Lin, Xinxin Zhou:

Region Proposal for Line Insulator Based on the Improved Selective Search Algorithm. 686-696 - Dun Li, Cui Wang, Lun Li, Zhiyun Zheng:

A Collaborative Filtering Algorithm Based on the User Characteristics and Time Windows. 697-709 - Kai Yang, Zhaowei Qu, Xiaoru Wang, Fu Li, Yueli Li, Dongbai Jia:

MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement Mechanism. 710-721
Information Processing
- Zhaojin Hong, Chenyang Wei, Yuan Zhuang, Ying Wang, Yiting Wang, Li Zhao:

Research on Psychological Counseling and Personality Analysis Algorithm Based on Speech Emotion. 725-737 - Yan Zhou, Yibin Tang, Guanying Huo, Dabing Yu:

Underwater Image Enhancement Based on Color Balance and Edge Sharpening. 738-747 - Jiale Zhang, Yan Zhou, Qingwu Li, Huixing Sheng, Dabing Yu, Xinyue Chang:

Stereo Matching Using Discriminative Feature-Oriented and Gradient-Constrained Dictionary Learning. 748-759 - Wei Wang, Weidong Liu, Jinming Liu:

Acoustic Emission Recognition Based on Spectrogram and Acoustic Features. 760-768 - Jin Zhang, Mengqiong Ge, Xiaoyu Shi, Zhuohao Weng, Jian Zhang:

Polyhedron Target Structure Information Extraction Method in Single Pixel Imaging System. 769-775 - Baoyu Xiang, Zhuo Yu, Ke Xie, Shaoyong Guo, Meiling Dai, Sujie Shao:

Design and Implementation of Four-Meter Reading Sharing System Based on Blockchain. 776-785 - Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, Shaoyong Guo:

Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity. 786-797 - Ruide Li, Feng Wang, XinXin Zhang, Jiajun Chen, Jie Tong:

Reliability Improvement Algorithm of Power Communication Network Based on Network Fault Characteristics. 798-804 - Xuehan Zhang, Xiaojuan Wang, Lianping Zhang:

Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal Networks. 805-814

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














