default search action
5th ICAIS 2019: New York, NY, USA
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1
Cloud Computing and Security
- Yinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun:
Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server. 3-12 - Yuanyuan Xu, Shan Li:
Virtualization of 5G Cellular Networks: A Combinatorial Share-Averse Auction Approach. 13-24 - Shanting Su, Xiangmao Chang, Yuan Qiu, Jing Li, Tong Li:
Equipment Fault Detection Based on SENCForest. 25-34 - Fei Xiao, Shaofeng Lin, Wei Tan, Fengchen Qian, Xiaopeng Li:
Research on Telemedical Monitoring System Based on Homomorphic Encryption. 35-46 - Yi Qin:
Phase Retrieval via Accelerated Gradient Descent. 47-55 - Zhiguo Qu, Zhexi Zhang, Zhenwen Cheng:
Anti-noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model. 56-67 - Hua Dai, Yan Ji, Liang Liu, Geng Yang, Xun Yi:
A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds. 68-80 - Zhihua Wang, Pingzeng Liu:
Application of Blockchain Technology in Agricultural Product Traceability System. 81-90 - Yao Xiong, Chujun Wu:
Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve. 91-103 - Rayan Mohammed, Xiaoni Du, Li Li:
Linear Complexity of r-ary Sequences Derived from Euler Quotients Modulo 2p. 104-112
Information Hiding
- Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. 115-127 - Shaokang Wang, Dan Liu, Jingning Sun, Yinping Bai, Zhaofeng Zhou:
Research on Application of OFD Technology in Secure Electronic Bills. 128-139 - Gaopeng Xie, Yuling Liu, Guojiang Xin, Peng Yang:
Review on Text Watermarking Resistant to Print-Scan, Screen-Shooting. 140-149 - Yujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin:
A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image. 150-160
IoT Security
- Te Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo:
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement. 163-177 - Bo Mi, Darong Huang, Jianqiu Cao, Ping Long, Hongyang Pan:
Multiplicative Linear Secret Sharing Without Interaction. 178-187 - Longyu Zhou, Ning Yang, Ke Zhang:
Positioning Improvement Algorithm Based on LoRa Wireless Networks. 188-198 - Zhiqiang Ruan, Haibo Luo, Ge Xu:
Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks. 199-210 - Yao Wang, Gengyu Wei:
An Implementation of CoAP-Based Semantic Resource Directory in Californium. 211-222 - Mingxu Sun, Williams Dannah, Qi Liu, Xiaodong Liu:
A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency. 223-231 - Yinghua Zhang, Yanfang Dong, Lei Wang, Jian Liu, Yunfeng Peng:
Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks. 232-243 - Sheng Liu, Jing Zhao, Wei Li:
Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar. 244-252 - Xiaohong Zhang, Qiuli Wang, Yungang Jin:
Under-Determined Blind Source Separation Anti-collision Algorithm for RFID Based on Adaptive Tree Grouping. 253-265 - Hua Yan, Zhengyu Yang, Fei Ding, Shijie Xu, Dengyin Zhang:
Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles. 266-275 - Mingxu Sun, Zhiyun Yang, Hao Wu, Qi Liu, Xiaodong Liu:
An Approach to Deep Learning Service Provision with Elastic Remote Interfaces. 276-286 - Fei Ding, Zhiliang Li, Chengwan Ai, Ruoyu Su, Dengyin Zhang, Hongbo Zhu:
Design of an IoT-Based Efficient Security Scheme in Home Wireless System. 287-296 - Yanruixuan Ma, Zhendan Li, Yanglijuan Liu, Huijie Liu, Shengqian Ma:
Discussion on the Application of Industrial Internet. 297-308 - Sijia Lou, En Tong, Fei Ding:
Performance Analysis of a NB-IoT Based Smart Lamp Solution with Application Enabled Platform. 309-318 - Mengyi Zhang, Tianxing Wu, Qiu Ji, Guilin Qi, Zhixin Sun:
Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding. 319-328 - Xiaoyong Yan, Xiang Feng, Zhixin Sun:
Accurate and Fast DV-Hop Localization Algorithm in Irregular Networks. 329-340 - Songle Chen, Xuejian Zhao, Zhe Sun, Feng Xiang, Zhixin Sun:
Shape Recognition with Recurrent Neural Network. 341-350 - Huizong Li, Xiangqian Wang, Bin Ge, Jie Wang, Yujie Ma, Chaoyu Yang, Haixia Gui:
WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model. 351-361 - Lining Liu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li, Jainghang Fu:
Tobacco Intelligent Management System Based on Internet of Things. 362-372 - Jianyong Zhang, Pingzeng Liu, Xueru Yu, Jianhang Fu:
Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System. 373-383 - Lin Guo, Lijun Yang:
Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission. 384-393 - Jianhang Fu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li:
Intelligent Irrigation System of Balcony Flowers Based on Internet of Things. 394-402
Multimedia Forensics
- Sajida Karim, Hui He, Ghulam Ali Mallah, Asif Ali Laghari, Hina Madiha, Raja Sohail Ahmed Larik:
The Impact of Using Facebook on the Academic Performance of University Students. 405-418 - Jinquan Zhang, Xizi Peng, Shibin Zhang:
Robust Audio Watermarking Algorithm Based on Moving Average and DCT. 419-429 - Tianxiao Xue, Qingbao Li, Ping Zhang, Zhifeng Chen, Peijun Feng, Nan Luo:
Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm. 430-441 - Xing Lu, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification. 442-454 - Qi Shen, Yan Zhao:
Image Hashing Based on CS-LBP and DCT for Copy Detection. 455-466 - Xiyuan Zheng, Xiaonan Fang, Yanyan Tan, Lili Meng, Huaxiang Zhang:
KM ^3 SVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering. 467-475 - Xinyi Wang, He Wang, Shaozhang Niu:
An Image Forensic Method for AI Inpainting Using Faster R-CNN. 476-487 - Lina Wei, Quansen Sun, Xizhan Gao:
Kernel Generalized Canonical Correlation and a New Feature Fusion Strategy. 488-500 - Yuhua Fan, Luping Zhou, Liya Fan, Jing Yang:
Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks. 501-513
Encryption and Cybersecurity
- Ke Ma, Geng Yang:
CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data. 517-529 - Hang Yang, Yan Jia, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiao-Juan Zhao:
Calculation of Network Security Index Based on Convolution Neural Networks. 530-540 - Delei Nie, Hong Yu, Xiaobin Lu, Chao Cui:
A Method to Defense APT Based on Dynamic ID Transformation. 541-550 - Lu Zhang, Xu Wu, Xiaqing Xie, Jin Xu, Tianle Zhang:
Emergency Analysis Based on Affective Computing in Universities Forum. 551-563 - Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. 564-575 - Bo Li, Minghui Gao, Li Ma, Ye Liang, Guifeng Chen:
Web Application-Layer DDoS Attack Detection Based on Generalized Jaccard Similarity and Information Entropy. 576-585 - Yinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun:
Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model. 586-595 - Qianning Dai, Jingbing Li, Uzair Aslam Bhatti, Jieren Cheng, Xiaobo Bai:
An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos. 596-608 - Yamin Li, Ping Zhang:
Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme. 609-617 - Jie Jian, Xiaoming Yu, Yufei Yuan:
Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey. 618-631 - Lingren Wang, Jingbing Li, Uzair Aslam Bhatti, Yanlin Liu:
Anomaly Detection in Wireless Sensor Networks Based on KNN. 632-643 - Longjuan Wang, Fangming Tang:
Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control Technique. 644-657
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.