


default search action
SAI 2020: London, UK
- Kohei Arai, Supriya Kapoor, Rahul Bhatia:

Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3. Advances in Intelligent Systems and Computing 1230, Springer 2020, ISBN 978-3-030-52242-1 - Kálmán Szentannai, Jalal Al-Afandi, András Horváth

:
Preventing Neural Network Weight Stealing via Network Obfuscation. 1-11 - Raheleh Jafari

, Sina Razvarz, Alexander E. Gegov:
Applications of Z-Numbers and Neural Networks in Engineering. 12-25 - Jan Sher Khan

, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan
:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. 26-36 - Leon René Sütfeld, Flemming Brieger, Holger Finger, Sonja Füllhase, Gordon Pipa:

Adaptive Blending Units: Trainable Activation Functions for Deep Neural Networks. 37-50 - Mahmoud Zaki Iskandarani

:
Application of Neural Networks to Characterization of Chemical Sensors. 51-60 - Owolafe Otasowie

:
Application of Machine Learning in Deception Detection. 61-76 - Hossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj, Ali Sharifi

:
A New Approach to Estimate the Discharge Coefficient in Sharp-Crested Rectangular Side Orifices Using Gene Expression Programming. 77-96 - Sandra Mae W. Famador, Tardi Tjahjadi:

DiaTTroD: A Logical Agent Diagnostic Test for Tropical Diseases. 97-115 - Abduljalil Mohamed, Amer Mohamed, Yasir Mustafa:

A Weighted Combination Method of Multiple K-Nearest Neighbor Classifiers for EEG-Based Cognitive Task Classification. 116-131 - Abdelfettah Miraoui, Lotfi Merad Sidi, Sidi Mohammed Meriah

:
Detection and Localization of Breast Tumor in 2D Using Microwave Imaging. 132-141 - Osama Abuomar, Folly Patterson, R. K. Prabhu:

Regression Analysis of Brain Biomechanics Under Uniaxial Deformation. 142-149 - Nandana Prabhu, Deepak Bhoir, Nita Shanbhag, Uma Rao:

Exudate-Based Classification for Detection of Severity of Diabetic Macula Edema. 150-160 - Vibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave

:
Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning. 161-173 - Krzysztof Michalik

, Katarzyna Kucharska
:
Implementation of Deep Neural Networks in Facial Emotion Perception in Patients Suffering from Depressive Disorder: Promising Tool in the Diagnostic Process and Treatment Evaluation. 174-184 - Saleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail:

Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata Transform. 185-197 - Hosam Alamleh

, Ali Abdullah S. AlQahtani, Dalia Alamleh:
Implementing Variable Power Transmission Patterns for Authentication Purposes. 198-203 - Anthony Demeri, William Diehl, Ahmad Salman

:
SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. 204-223 - Robert Heras, Alexander Perez-Pons

:
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices. 224-243 - Ovidiu Negoita, Mihai Carabas:

Enhanced Security Using Elasticsearch and Machine Learning. 244-254 - Mohammad Amanul Islam:

Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data Stream. 255-277 - Muhammed Jassem Al-Muhammed, Ahmad A. Al-Daraiseh

, Raed Abu Zitar
:
Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques. 278-301 - Bertrand Cambou, Mohammad Mohammadi

, Christopher Robert Philabaum, Duane Booher:
Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable Functions. 302-321 - Raghda Fawzey Hriez, Ali Hadi, Jalal Omer Atoum:

Towards an Intelligent Intrusion Detection System: A Proposed Framework. 322-335 - Yuri Bobbert, Nese Ozkanli:

LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy. 336-347 - Julius Ceasar Aguma, Bruce M. McMillin, Amelia Regan

:
Introduction of a Hybrid Monitor for Cyber-Physical Systems. 348-360 - Sareh Assiri, Bertrand Cambou, Duane Booher, Mohammad Mohammadinodoushan

:
Software Implementation of a SRAM PUF-Based Password Manager. 361-379 - Sunday Alabi

, Martin White
, Natalia Beloff:
Contactless Palm Vein Authentication Security Technique for Better Adoption of e-Commerce in Developing Countries. 380-390 - Mouhammd Al-Kasassbeh, Mohammad Ali Abbadi, Ahmed M. Al-Bustanji:

LightGBM Algorithm for Malware Detection. 391-403 - Jakub Klemsa, Martin Novotný

:
Exploiting Linearity in White-Box AES with Differential Computation Analysis. 404-419 - Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:

Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. 420-430 - Ahmad Ghafarian, Deniz Keskin:

Windows 10 Hibernation File Forensics. 431-445 - Pranieth Chandrasekara, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, Kavinga Yapa Abeywardana

:
Behavior and Biometrics Based Masquerade Detection Mobile Application. 446-458 - Ammar S. Salman, Odai S. Salman:

Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric Features. 459-470 - Amari N. Lewis

, Amelia C. Regan
:
Enabling Paratransit and TNC Services with Blockchain Based Smart Contracts. 471-481 - Neda Shabani, Arslan Munir

:
A Review of Cyber Security Issues in Hospitality Industry. 482-493 - Yuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri:

Extended Protocol Using Keyless Encryption Based on Memristors. 494-510 - Jason Jaskolka

:
Recommendations for Effective Security Assurance of Software-Dependent Systems. 511-531 - Manisha

, Nitin Kumar:
On Generating Cancelable Biometric Templates Using Visual Secret Sharing. 532-544 - Naresh Kumar Giri, Arslan Munir

, Joonho Kong:
An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems. 545-559 - Sergei Koltcov, Vera Ignatenko, Sergei Pashakhin

:
How Many Clusters? An Entropic Approach to Hierarchical Cluster Analysis. 560-569 - Yojiro Harie

, Katsumi Wasaki
:
Analysis of Structural Liveness and Boundedness in Weighted Free-Choice Net Based on Circuit Flow Values. 570-580 - James Spooner

, Madeline Cheah, Vasile Palade, Stratis Kanarachos
, Alireza Daneshkhah
:
Classification of a Pedestrian's Behaviour Using Dual Deep Neural Networks. 581-597 - Eva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu

, Filomena Bufano, Antonio Calanducci, Alessandro Costa, Mario Raciti
, Simone Riggi:
Towards Porting Astrophysics Visual Analytics Services in the European Open Science Cloud. 598-606 - Ahmed Imran:

Computer Graphics-Based Analysis of Anterior Cruciate Ligament in a Partially Replaced Knee. 607-612 - Mihai Caramihai

, Irina Severin
, Ana Maria Bogatu:
An Assessment Algorithm for Evaluating Students Satisfaction in e-Learning Environments: A Case Study. 613-621 - Yevgenia A. Daineko, Nurzhan T. Duzbayev

, K. B. Kozhaly, Madina T. Ipalakova
, Zh. M. Bekaulova
, N. Zh. Nalgozhina, R. N. Sharshova:
The Use of New Technologies in the Organization of the Educational Process. 622-627 - Milena Karova, Ivaylo Penev, Daniel Marinov:

Design and Implementation of Cryptocurrency Price Prediction System. 628-643 - Boris Morose, Sabina Aledort, Gal Zaidman:

Strategic Behavior Discovery of Multi-agent Systems Based on Deep Learning Technique. 644-651 - Nikita A. Andriyanov

:
Development of Prediction Methods for Taxi Order Service on the Basis of Intellectual Data Analysis. 652-664 - Rosemary Papa, Karen Moran Jackson, Ric Brown, David Jackson:

Discourse Analysis on Learning Theories and AI. 665-672 - Charles Roberto Telles

:
False Asymptotic Instability Behavior at Iterated Functions with Lyapunov Stability in Nonlinear Time Series. 673-693 - Sipovskaya Yana Ivanovna:

The Influence of Methodological Tools on the Diagnosed Level of Intellectual Competence in Older Adolescents. 694-701 - Ali K. Abed, Rami Qahwaji

:
The Automated Solar Activity Prediction System (ASAP) Update Based on Optimization of a Machine Learning Approach. 702-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














