Buch, Englisch, 753 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1159 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II
Buch, Englisch, 753 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1159 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-030-78611-3
Verlag: Springer International Publishing
The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows:
Part I: Artificial intelligence; and big data
Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Big Data.- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform.- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis.- Exploring the informationization of Land Reserve Archives Management.- Research and Implementation of Anomaly Detection Algorithm in Data Mining.- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction.- Design and Implementation of Data Adapter in SWIM.- Cloud Computing and Security.- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking.- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing.- A Computing Task Offloading Scheme for Mobile Edge Computing.- Security Transmission Scheme of Sensitive Data for Mobile Terminal.- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain.- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring.- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network.- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature.- Detection of Virtual Machines based on Thread Scheduling.- Graph Attention Network for Word Embeddings.- Firewall Filtering Technology And Application Based On Decision Tree.- Encryption and Cybersecurity.- A DAPP business data storage model based on blockchain and IPFS.- IPv6-Darknet Network Traffic Detection.- Neural Control Based Research of Endogenous Security Model.- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes.- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy.- A transaction model of bill service based on blockchain.- An N-gram Based Deep Learning Method for Network Traffic Classification.- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning.- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture.- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain.- Information Hiding.- Covert Communication via Modulating Soft Label of Neural Network.- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography.- Halftone Image Steganography Based on Reassigned Distortion Measurement.- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units.- High efficiency quantum image steganography protocol based on ZZW framework.- Halftone Image Steganalysis by Reconstructing Grayscale Image.- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition.- Research and Implementation of Medical Information Protection and Sharing based on Blockchain.- IoT Security.- LoRa Network Security Schemes Based on RF Fingerprint.- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living.- Blockchain-based reliable collection mechanism for smart meter quality data.- Power Blockchain Guarantee Mechanism Based on Trusted Computing.- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol.- Sensor Failure Detection Based on Programmable Switch and Machine Learning.- A Solution to Reduce Broadcast Storm in VANET.- a Vehicle Intrusion Detection System Based on Time Interval and Data Field.- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption.- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections.- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA.- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments.- Security analysis of measurement automation system based on threat intelligence.- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network.- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning.- Recent Development, Trends and Challenges in IoT Security.- Energy Optimization for Wild Animal Tracker basing on watchdog technology.- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction.- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength.- Wi-Fi Indoor Positioning Using D-S Evidence Theory.- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System.- Multimedia Forensics.- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain.- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method.- A Fast Tongue Image Color Correction Method Based on Gray World Method.- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval.