You are here

Back to top

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part I (Paperback)

Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part I Cover Image
By Xingming Sun (Editor), Zhaoqing Pan (Editor), Elisa Bertino (Editor)
$71.49
Usually Ships in 1-5 Days

Description


Cloud Computing.- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching.- NOAA-LSTM: A New Method of Dialect Identification.- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network.- Research on the Promotion of Tibetan New Words and Platform Design.- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm.- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields.- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM.- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud.- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network.- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process.- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix.- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory.- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation.- A Novel Noise Filter Based on Multiple Voting.- Fuzzy Control Method for Path Tracking System of Combine Harvester.- Research on Opinion Spam Detection by Time Series Anomaly Detection.- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images.- Intra-class Classification of Architectural Styles Using Visualization of CNN.- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks.- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module.- A Novel Distributed Knowledge Reasoning Model.- Research on Detection Method Of Abnormal Traffic In SDN.- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth.- PPD-DL: Privacy-Preserving Decentralized Deep Learning.- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids.- Android Malware Identification Based on Traffic Analysis.- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary.- Research on the Efficiency and Application of Ship- helicopter Cooperative Search.- Cellular Neural Network Based Contour Detection for Seismic Image.- Discovering New Sensitive Words Based on Sensitive Information Categorization.- A Dynamic Event Region Tracking Approach Based on Node Calibration.- A Graph Updating Method of Data Theft Detection Based on Rough Set.- A Tutorial of Graph Representation.- Ground-based Cloud Images Recognition Based on GAN and PCANet.- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules.- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising.- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging.- DWI Fiber Tracking with Functional MRI of White Matter.- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm.- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network.- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI.- Convolutional Neural Networks for Scene Image Recognition.- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology.- Research on Detection Method of Unhealthy Message in Social Network.- Image Authentication by Single Target Region Detection.- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security.- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks.- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption.- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning.- Facial Expression Recognition Based o.


Product Details
ISBN: 9783030242732
ISBN-10: 3030242730
Publisher: Springer
Publication Date: July 11th, 2019
Pages: 655
Language: English
Series: Lecture Notes in Computer Science