


default search action
6th ICAIS 2021: Dublin, Ireland - Part II
- Xingming Sun

, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino
:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3
Big Data
- Suzhen Wang, Zhiting Jia, Wenli Wang:

Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform. 3-13 - Si-Yuan He, Shan Li, Chao Guo:

Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis. 14-26 - Yuxian Zhu:

Exploring the Informationization of Land Reserve Archives Management. 27-40 - Yang Zhou, Fazhou Liu, Shan Li, Chao Guo:

Research and Implementation of Anomaly Detection Algorithm in Data Mining. 41-53 - Haitao Xu, Ruifeng Duan, Shengsong Yang, Lei Guo:

An Empirical Study on Data Sampling for Just-in-Time Defect Prediction. 54-69 - Yangfei Sun, Yuanchun Jiang:

Design and Implementation of Data Adapter in SWIM. 70-81
Cloud Computing and Security
- Xiehua Li, Gang Long, Sijie Li:

Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking. 85-101 - Zhaofeng Yu

, Lin Ye, Hongli Zhang, Dongyang Zhan
:
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing. 102-111 - Ben Wang, Tingrui Li, Xun Han, Huahui Li:

A Computing Task Offloading Scheme for Mobile Edge Computing. 112-123 - Jicheng He, Minghui Gao, Zhijun Zhang, Li Ma, Zhiyan Ning, Jingyi Cao:

Security Transmission Scheme of Sensitive Data for Mobile Terminal. 124-134 - Hongyan Zhang, Bo Liu, Long Qin, Jing Zhang, Weichao Gong:

Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain. 135-146 - Chunru Zhou, Guo Wu, Junhao Li, Chunrui Zhang:

A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring. 147-156 - Yuan Sun

, Jiaya Liang
, Pengchao Niu:
Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network. 157-166 - Pengwei Wang, Yi Wei, Zhaohui Zhang:

Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature. 167-179 - Zhi Lin, Yubo Song

, Jun-Bo Wang:
Detection of Virtual Machines Based on Thread Scheduling. 180-190 - Yunfei Long, Huosheng Xu, Pengyuan Qi, Liguo Zhang, Jun Li:

Graph Attention Network for Word Embeddings. 191-201 - Yujie Jin, Qun Wang:

Firewall Filtering Technology and Application Based on Decision Tree. 202-215
Encryption and Cybersecurity
- Xiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, Jieren Cheng:

A DAPP Business Data Storage Model Based on Blockchain and IPFS. 219-230 - Chenhuan Liu, Qiankun Liu, Shanshan Hao, CongXiao Bao, Xing Li:

IPv6-Darknet Network Traffic Detection. 231-241 - Tao Li, Xu Hu

, Aiqun Hu:
Neural Control Based Research of Endogenous Security Model. 242-252 - Xuanang Yu, Yang Lu, Jinmei Tian, Fen Wang:

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes. 253-264 - Mengwei Zhang, Xiubo Chen:

A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy. 265-278 - Xinyan Wang, Jianxun Guo, Dong Li, Xin Chen, Kailin Wang:

A Transaction Model of Bill Service Based on Blockchain. 279-288 - Xiaojuan Wang

, Kaiwenlv Kacuila
, Mingshu He
:
An N-gram Based Deep Learning Method for Network Traffic Classification. 289-304 - Mingshu He

, Lei Jin
, Mei Song:
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning. 305-320 - Shunbin Li

, Kun Zhang
, Ruyun Zhang
, Mingxing Zhu
, Hanguang Luo
, Shaoyong Wu
:
Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture. 321-331 - Rui Zhang, Zhaoxuan Li, Lijuan Zheng:

Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain. 332-345
Information Hiding
- Gen Liu, Hanzhou Wu, Xinpeng Zhang:

Covert Communication via Modulating Soft Label of Neural Network. 349-359 - Xin Zheng, Chunjie Cao, Jiaxian Deng:

DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography. 360-375 - Wenbo Xu, Wanteng Liu, Cong Lin, Ke Wang, Wenbin Wang, Wei Lu

:
Halftone Image Steganography Based on Reassigned Distortion Measurement. 376-387 - Xiaolin Yin, Mujian Yu, Lili Chen, Ke Wang, Wei Lu

:
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units. 388-399 - Hanrong Sun, Zhiguo Qu:

High Efficiency Quantum Image Steganography Protocol Based on ZZW Framework. 400-411 - Junwei Luo, Cong Lin, Lingwen Zeng, Jifan Liang, Wei Lu:

Halftone Image Steganalysis by Reconstructing Grayscale Image. 412-423 - Mujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen, Wei Lu:

Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition. 424-436 - Wei Fang, Xuelei Jia, Wei Jia:

Research and Implementation of Medical Information Protection and Sharing Based on Blockchain. 437-449
IoT Security
- Siqing Chen, Yu Jiang, Wen Sun:

LoRa Network Security Schemes Based on RF Fingerprint. 453-465 - Lulu Zhang, Shiqi Chen, Xuran Jin, Jie Wan:

Smart Home Based Sleep Disorder Recognition for Ambient Assisted Living. 466-475 - Yan Liu, Angang Zheng, Huaiying Shang, Lingda Kong, Guang Shen, Shuming Shen:

Blockchain-Based Reliable Collection Mechanism for Smart Meter Quality Data. 476-487 - Yong Yan, Tianhong Su, Shaoyong Guo, Song Kang:

Power Blockchain Guarantee Mechanism Based on Trusted Computing. 488-501 - Yonggui Wang

, Zhu Liu, Lvchao Huang:
Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol. 502-513 - Xiaolong Zhang, Rengbo Yang, Guangfeng Guo, Junxing Zhang:

Sensor Failure Detection Based on Programmable Switch and Machine Learning. 514-525 - Subo He, Lei Xiang, Ying Wang, Minna Xia, Yaling Hong:

A Solution to Reduce Broadcast Storm in VANET. 526-537 - Xun He

, Zhen Yang, Yongfeng Huang
:
A Vehicle Intrusion Detection System Based on Time Interval and Data Fields. 538-549 - Fei Xia, Jiaming Mao, Zhipeng Shao, Liangjie Xu, Ran Zhao, Yunzhi Yang:

An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption. 550-562 - Mingming Zhang, Jiaming Mao, Lu Chen, Nige Li, Lei Fan, Leshan Shuang:

A Load-Balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections. 563-574 - Yuxin Du, Xiaoli He, Weijian Yang, Xinwen Cheng, Yongming Huang:

Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA. 575-587 - Zhihan Qi

, YunChao Pan, Hao Du, Na Zhang, ZongHan Bai, Gang Xu
:
Opportunistic Network Performance Optimization Model Based on a Combination of Neural Networks and Orthogonal Experiments. 588-600 - Shaocheng Wu, Tao Liu, Jin Li, HeFang Jiang, Xiaowei Chen, Xiaohong Cao:

Security Analysis of Measurement Automation System Based on Threat Intelligence. 601-610 - Qinghai Ou, Yanru Wang, Yongjie Li, Jizhao Lu, Hongkang Tian, Wenjie Ma, Hui Liu:

A MOEA-D-Based Service Quality Matching Optimization Algorithm in Electric Power Communication Network. 611-621 - Qi Liu, Bowen Zhang, Jianming Zhao, Chuanzhi Zang, Xibo Wang, Tong Li:

Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning. 622-632 - Morteza Talezari, Shanshan Tu, Sadaqat ur Rehman, Chuangbai Xiao, Basharat Ahmad

, Muhammad Waqas
, Obaid Ur Rehman
:
Recent Development, Trends and Challenges in IoT Security. 633-646 - Zhenggang Xu, Wenhan Zhai, Chen Liang, Yunlin Zhao, Tian Huang, Minghui Zhou, Libo Zhou, Guiyan Yang, Zhiyuan Hu:

Energy Optimization for Wild Animal Tracker Basing on Watchdog Technology. 647-655 - Xiaolong Wang, Xiaolong Yang, Mu Zhou, Liangbo Xie:

Performance Comparison of Curve Fitting and Compressed Sensing in Channel State Information Feature Extraction. 656-666 - Min Chen, Xiaolong Yang, Yue Jin, Mu Zhou:

Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength. 667-677 - Zhu Liu, Yong Wang, Yuexin Long, Yaohua Li, Mu Zhou:

Wi-Fi Indoor Positioning Using D-S Evidence Theory. 678-687 - Zengshan Tian, Xixi Liu, Kaikai Liu, Liangbo Xie:

A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System. 688-699
Multimedia Forensics
- Shaoyong Guo, Cheng Huang, Yong Yan, Liandong Chen, Sujie Shao:

Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium Blockchain. 703-714 - Zhimao Lai, Yufei Wang, Weize Sun, Peng Zhang:

Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method. 715-723 - Guojiang Xin, Lei Zhu, Hao Liang

, Changsong Ding:
A Fast Tongue Image Color Correction Method Based on Gray World Method. 724-735 - Ezekiel Mensah Martey, Hang Lei, Xiaoyu Li, Obed Appiah, Nicodemus Songose Awarayi:

Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. 736-747

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














