


default search action
5th ICAIS 2019: New York, NY, USA
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1
Cloud Computing and Security
- Yinghua Zhang

, Lei Wang
, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun:
Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server. 3-12 - Yuanyuan Xu

, Shan Li:
Virtualization of 5G Cellular Networks: A Combinatorial Share-Averse Auction Approach. 13-24 - Shanting Su, Xiangmao Chang, Yuan Qiu, Jing Li, Tong Li:

Equipment Fault Detection Based on SENCForest. 25-34 - Fei Xiao, Shaofeng Lin, Wei Tan, Fengchen Qian, Xiaopeng Li:

Research on Telemedical Monitoring System Based on Homomorphic Encryption. 35-46 - Yi Qin:

Phase Retrieval via Accelerated Gradient Descent. 47-55 - Zhiguo Qu, Zhexi Zhang, Zhenwen Cheng:

Anti-noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model. 56-67 - Hua Dai, Yan Ji, Liang Liu, Geng Yang, Xun Yi:

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds. 68-80 - Zhihua Wang, Pingzeng Liu:

Application of Blockchain Technology in Agricultural Product Traceability System. 81-90 - Yao Xiong, Chujun Wu:

Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve. 91-103 - Rayan Mohammed, Xiaoni Du, Li Li:

Linear Complexity of r-ary Sequences Derived from Euler Quotients Modulo 2p. 104-112
Information Hiding
- Zichi Wang, Zhenxing Qian

, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. 115-127 - Shaokang Wang, Dan Liu, Jingning Sun, Yinping Bai, Zhaofeng Zhou:

Research on Application of OFD Technology in Secure Electronic Bills. 128-139 - Gaopeng Xie, Yuling Liu, Guojiang Xin, Peng Yang:

Review on Text Watermarking Resistant to Print-Scan, Screen-Shooting. 140-149 - Yujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin

:
A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image. 150-160
IoT Security
- Te Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo:

An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement. 163-177 - Bo Mi, Darong Huang

, Jianqiu Cao, Ping Long, Hongyang Pan:
Multiplicative Linear Secret Sharing Without Interaction. 178-187 - Longyu Zhou, Ning Yang, Ke Zhang:

Positioning Improvement Algorithm Based on LoRa Wireless Networks. 188-198 - Zhiqiang Ruan, Haibo Luo, Ge Xu:

Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks. 199-210 - Yao Wang, Gengyu Wei:

An Implementation of CoAP-Based Semantic Resource Directory in Californium. 211-222 - Mingxu Sun, Williams Dannah, Qi Liu, Xiaodong Liu:

A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency. 223-231 - Yinghua Zhang

, Yanfang Dong
, Lei Wang
, Jian Liu, Yunfeng Peng:
Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks. 232-243 - Sheng Liu, Jing Zhao, Wei Li:

Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar. 244-252 - Xiaohong Zhang, Qiuli Wang, Yungang Jin:

Under-Determined Blind Source Separation Anti-collision Algorithm for RFID Based on Adaptive Tree Grouping. 253-265 - Hua Yan, Zhengyu Yang, Fei Ding, Shijie Xu, Dengyin Zhang:

Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles. 266-275 - Mingxu Sun, Zhiyun Yang, Hao Wu, Qi Liu, Xiaodong Liu:

An Approach to Deep Learning Service Provision with Elastic Remote Interfaces. 276-286 - Fei Ding, Zhiliang Li, Chengwan Ai, Ruoyu Su, Dengyin Zhang, Hongbo Zhu:

Design of an IoT-Based Efficient Security Scheme in Home Wireless System. 287-296 - Yanruixuan Ma, Zhendan Li, Yanglijuan Liu, Huijie Liu, Shengqian Ma:

Discussion on the Application of Industrial Internet. 297-308 - Sijia Lou, En Tong, Fei Ding:

Performance Analysis of a NB-IoT Based Smart Lamp Solution with Application Enabled Platform. 309-318 - Mengyi Zhang, Tianxing Wu, Qiu Ji, Guilin Qi, Zhixin Sun:

Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding. 319-328 - Xiaoyong Yan, Xiang Feng, Zhixin Sun:

Accurate and Fast DV-Hop Localization Algorithm in Irregular Networks. 329-340 - Songle Chen, Xuejian Zhao, Zhe Sun, Feng Xiang, Zhixin Sun:

Shape Recognition with Recurrent Neural Network. 341-350 - Huizong Li, Xiangqian Wang, Bin Ge, Jie Wang, Yujie Ma, Chaoyu Yang, Haixia Gui:

WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model. 351-361 - Lining Liu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li, Jainghang Fu:

Tobacco Intelligent Management System Based on Internet of Things. 362-372 - Jianyong Zhang, Pingzeng Liu, Xueru Yu, Jianhang Fu:

Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System. 373-383 - Lin Guo, Lijun Yang:

Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission. 384-393 - Jianhang Fu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li:

Intelligent Irrigation System of Balcony Flowers Based on Internet of Things. 394-402
Multimedia Forensics
- Sajida Karim, Hui He, Ghulam Ali Mallah, Asif Ali Laghari

, Hina Madiha, Raja Sohail Ahmed Larik:
The Impact of Using Facebook on the Academic Performance of University Students. 405-418 - Jinquan Zhang, Xizi Peng, Shibin Zhang:

Robust Audio Watermarking Algorithm Based on Moving Average and DCT. 419-429 - Tianxiao Xue, Qingbao Li, Ping Zhang, Zhifeng Chen, Peijun Feng, Nan Luo:

Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm. 430-441 - Xing Lu, Fangjun Huang, Hyoung Joong Kim:

Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification. 442-454 - Qi Shen, Yan Zhao:

Image Hashing Based on CS-LBP and DCT for Copy Detection. 455-466 - Xiyuan Zheng, Xiaonan Fang, Yanyan Tan, Lili Meng, Huaxiang Zhang:

KM ^3 SVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering. 467-475 - Xinyi Wang

, He Wang, Shaozhang Niu:
An Image Forensic Method for AI Inpainting Using Faster R-CNN. 476-487 - Lina Wei, Quansen Sun, Xizhan Gao:

Kernel Generalized Canonical Correlation and a New Feature Fusion Strategy. 488-500 - Yuhua Fan

, Luping Zhou
, Liya Fan, Jing Yang:
Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks. 501-513
Encryption and Cybersecurity
- Ke Ma

, Geng Yang
:
CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data. 517-529 - Hang Yang, Yan Jia, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiao-Juan Zhao:

Calculation of Network Security Index Based on Convolution Neural Networks. 530-540 - Delei Nie, Hong Yu, Xiaobin Lu, Chao Cui:

A Method to Defense APT Based on Dynamic ID Transformation. 541-550 - Lu Zhang, Xu Wu, Xiaqing Xie, Jin Xu, Tianle Zhang:

Emergency Analysis Based on Affective Computing in Universities Forum. 551-563 - Liang Liu, Cheng Huang, Yong Fang

, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. 564-575 - Bo Li, Minghui Gao, Li Ma, Ye Liang, Guifeng Chen:

Web Application-Layer DDoS Attack Detection Based on Generalized Jaccard Similarity and Information Entropy. 576-585 - Yinghua Zhang

, Lei Wang
, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun:
Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model. 586-595 - Qianning Dai, Jingbing Li, Uzair Aslam Bhatti, Jieren Cheng, Xiaobo Bai:

An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos. 596-608 - Yamin Li, Ping Zhang:

Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme. 609-617 - Jie Jian, Xiaoming Yu, Yufei Yuan:

Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey. 618-631 - Lingren Wang, Jingbing Li, Uzair Aslam Bhatti, Yanlin Liu:

Anomaly Detection in Wireless Sensor Networks Based on KNN. 632-643 - Longjuan Wang, Fangming Tang:

Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique. 644-657

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














