


default search action
7th ICAIS 2022: Qinghai, China - Part II
- Xingming Sun, Xiaorui Zhang

, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7
Artificial Intelligence
- Zhengran Wang, Tao Wu, Yifan Wang, Yuke Li:

Remface: Study on Mini-sized Mobilenetv2 and Retinaface. 3-15 - Shuwen Jia, Tingting Yang, Zhiyong Sui:

Research on Application of Principal Component Analysis in 3d Video Dimension Reduction. 16-26 - Jiayu Bai, Xiaoyu Li, Shijie Hu, Chenjing Su, Hang Lei, Weizhong Qian, Cong Zhang, Yutra Abel Zenebe:

Single Platform Passive Location Algorithm Using Position Information and Azimuth. 27-37 - Xiaoyu Lin, Chunjie Cao, Longjuan Wang, Zhiyuan Liu, Mengqian Li, Haiying Ma:

DCAL: A New Method for Defending Against Adversarial Examples. 38-50 - Yuanxin Wang, Deyu Yuan, Yuyan Meng, Meng Ding:

Anomaly Detection Model for Key Places Based on Improved YOLOv5. 51-61 - Juncun Wei, Jiancheng Zou, Jiaxin Li, Zhengzheng Li, Xin Yang:

Non-contact Heart Rate Detection Based on Fusion Method of Visible Images and Infrared Images. 62-75 - Keyu Wang, Weizhong Qian, Xi Yang, Xiaohu Li, Caiqiong Yang, Shuqin Yue, Xiaoyu Li:

Intelligent Data Analysis System Based on Edge Computing. 76-89 - Qinghai Li

, Hao Wu, Weizhong Qian, Xiaoyu Li, Qinsheng Zhu, Shan Yang:
Portfolio Optimization Based on Quantum HHL Algorithm. 90-99 - Zhaoying Liu, Junran He, Ting Zhang, Ran Tang, Yujian Li, Muhammad Waqas

:
Infrared Ship Video Target Tracking Based on Cross-Connection and Spatial Transformer Network. 100-114 - Xiong Bo, Feng Wenlong, Jin Zhang:

Whale Optimization Algorithm Based on Artificial Fish Swarm Algorithm. 115-128 - Mengxing Huang, Jinjin Ye, Shenghan Zhu, Yang Chen, Yuanyuan Wu, Di Wu, Siling Feng

, Feng Shu:
An Underwater Image Color Correction Algorithm Based on Underwater Scene Prior and Residual Network. 129-139 - Xin Zheng, Tiantian Zhou, Yintong Wang, Shuo Li:

An Improved TextRank-Based Method for Chinese Text Summarization. 140-149 - Kuntharrgyal Khysru, Yangzhuoma Qie, Haiqiang Shi, Qilong Sun, Jianguo Wei

:
Lhasa Dialect Recognition of Different Phonemes Based on TDNN Method. 150-160 - Youjun Feng, Jinman Luo, Zhaocong Wen, Zirui Yao:

A Power Grid Equipment Fault Prediction Model Based on Faster RCNN and Video Streaming. 161-172 - Liyuan Liu, Jinman Luo, Piao Liu, Ruijing Ye:

A Wireless Transmission Model of Power Grid Equipment State Based on Compressed Sensing. 173-182 - Changcheng Xiao, Xi Wu:

Multi-sequence Satellite Image Cloud Removal Based on Dual Residual Network. 183-193 - Guowei Fan, Tao Wu, Yamei Lei:

Research on Rumor Detection Based on RoBERTa-BiGRU Model. 194-204 - Shuoyu Dong, Xiaozhang Liu, Xiulai Li, GengQuan Xie, Xin Tang:

A Novel Pruning Method Based on Correlation Applied in Full-Connection Layer Neurons. 205-215
Big Data
- Rui Ban, Hongding Wang, Yufei Hao, Salem Osman:

Research and Application of Carrier User Viscosity Evaluation Method Based on CNN Algorithm Model. 219-229 - Yannan Qian:

A Non-autonom SIR Model in Epidemiology. 230-238 - Na Liu, Dandan Chen, Haijie Huang, Xiangdang Huang, Qiuling Yang, Neal N. Xiong:

Anomaly Detection of Underwater Sensor Data Based on Temporal and Spatial Correlation. 239-252 - Xiaoyu Chen, Shiqi Zhang, Xiaowen Fan, Huan Liu

, Yacong Li:
Knowledge Sharing Behavior for Academic Users of Social Media and Its Empirical Research. 253-263 - Hang He, Haining Ding, Shuyue Liu, Yao Li, Jinghui Zhang:

Airport Cargo Volume Forecasting Based on Equal Dimensional and New Information Grey Markov Model. 264-276 - Guangliang Gao, Aiqin Sun, Haiyan Gu:

Community Detection Based on Topology and Node Features in Social Networks. 277-288 - Bo Zhang, Bin Lv, Liang Tang, Hongtao Qi, Yuanjie Zheng, Pin Wang, Shikang Zhang, Xiaowei Liang, Jinyue Xia:

Development of Intelligent Integrated Energy System Based on MVC. 289-299 - Hai Tang, Huan Zhang:

Study on IoT Big Data Direction in Civil Aviation. 300-309 - Yun Wu, Chen Jin:

Evaluation of the Impact of Haze with Uncertain Probabilistic Linguistic Term Sets. 310-320 - Zuyan Li, Guang Sun:

Research on the Application of Ant Colony Clustering in Commodity Classification. 321-332 - Jiang Wu, Jianjun Zhang, Wenwu Tan, Yifu Sheng, Sirao Zhang, Liangqing Meng, Xiongwei Zou, Haijun Lin, Guang Sun, Peng Guo:

Prediction of the Total Phosphorus Index Based on ARIMA. 333-347 - Ruhao Ma, Haiwen Du, Fansheng Meng, Dongjie Zhu:

Research on Regional Development Efficiency and Influencing Factors of China's Ocean Energy Equipment Manufacturing. 348-359 - Lihao Liu

, Zhao Qiu, Jiale Lin, Mengyang Li, Qianfan Liu
, Hancheng Huang
:
EAC-GAN: Semi-supervised Image Enhancement Technology to Improve CNN Classification Performance. 360-372 - Huan Jin, Mingfang Jiang

, Si Chen, Yin Jiang, Xiyuan Liu, ZhiChen Gao:
A Comprehensive Utilization Model of Informationization Teaching Resources. 373-385 - Yundong Sun

, Yuchen Tian, Xiaofang Li, Rongning Qu, Lang Cheng, Shitao Peng, Jianna Jia, Dongjie Zhu, Zhaoshuo Tian:
SRPAIS: Spectral Matching Algorithm Based on Raman Peak Alignment and Intensity Selection. 386-399 - Siyao An, Tianhao Wang, Lirui Wang, Mingjun Zhong

, Baili Zhang
:
A Semantic Representation Scheme for Medical Dispute Judgment Documents Based on Elements Extraction. 400-414 - Tao Xu, Maoyang Zou

, Zhongyue Fan, Yuxin Chen, Yiran Zhang, Pan Min:
Study on the Portrait of Online Learners' Personality and Attitude. 415-424
Cloud Computing and Security
- Gui Liu, Wei Xia, Haijiang Xu, Yongyong Dai, Wansu Chen:

Research on Resilience Cloud Environment Capability Evaluation System Under Complex Cyber Threat. 427-437 - Junyi Lu

, Yong Hu, Xiaoyu Li, Qin-Sheng Zhu, Hao Wu, Shan Yang:
A New Stock Forecasting Model by Hidden Quantum Markov Models. 438-447 - Jiangyuan Yao

, Shengjun Lin
, Chunxiang Xu
, Min Jing, Deshun Li
, Minrui Wang, Xingcan Cao:
Review of Detection and Avoidance of Interference Among Multiple Applications in Software-Defined Networks. 448-459 - Chi Zhang, Cheng Qian, Jiaxing Qu, Zhou Fang, Yinggang Sun, Chao Ma:

Intelligent Optimization Method of Microservice Redeployment for Communication Power Supply and Computer Room Environment Monitoring Platform. 460-472 - Jiangyuan Yao

, Minrui Wang, Weiping Yang, Shuhua Weng, Zheng Jiang, Min Jing, Deshun Li
, Xingcan Cao:
Test Traffic Control Based on REST API for Software-Defined Networking. 473-486 - Minna Xia, Lei Xiang, Ying Wang, Yang Liu:

A Study of Heterogeneous Database Integration Based on Web Service and XML. 487-499 - Jiangyuan Yao

, Chunxiang Xu
, Deshun Li
, Shengjun Lin
, Xingcan Cao:
Formal Verification of Security Protocols: ProVerif and Extensions. 500-512 - Huicong Zeng, Zhiwei Cai, Peijia Zheng, Hongmei Liu, Weiqi Luo

:
Secure Evaluation of Discrete Sine Transform in Homomorphic Encrypted Domain. 513-525 - Xiongjie Fang, Ruopan Lai, Zhipeng Zhou, Ziyang Chen, Peijia Zheng, Wei Lu:

Efficient and Secure Outsourced Image Watermarking in Cloud Computing. 526-537 - Weiyu Shi, Xiaoqian Liu:

Research on SQL Injection Defense Technology Based on Deep Learning. 538-549 - Liandong Chen, Rui Xin, Kai Cheng, Jing Lin, Shaoyong Guo

:
Efficient Management and Analysis Mechanism of Power Internet of Things Resources Based on Blockchain. 550-559 - Deshun Li

, Ganghua Cao, Lu Xiao, Jiangyuan Yao
, Xingcan Cao:
Research Progress and Trend of Coflow Time-Optimal Scheduling in Data Center Network. 560-572 - Hao Guo, Jieren Cheng, Janghao Wang, Tao Chen, Yuming Yuan, Hui Li, Victor S. Sheng:

IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption. 573-586 - Ming Zhuo

, Peng Yang
, Junyi Chen
, Leyuan Liu
, Chenrui Liu:
Adaptive Optimization of Dynamic Heterogeneous Network Topologies: A Simulated Annealing Methodology. 587-612 - Yuhang Zhang, Jie Xu, Chengyi Gao, Guanghui Su, Fan Yang, Shuang Zhou, Jiaying Li, Yuren Feng:

An SIR Model with Two Kinds of Local Information Based Behavioral Responses in Complex Network. 613-623
Multimedia Forensics
- Wei Liu

, Jiakang Li, Chunyu Wei, Meng Sun
, Xiongwei Zhang, Yongqiang Li:
A Novel Method to Evaluate the Privacy Protection in Speaker Anonymization. 627-636 - Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang, Nenghai Yu:

Capturing the Lighting Inconsistency for Deepfake Detection. 637-647 - Liangpei Hu, Yuanman Li, Jiaxiang You, Rongqin Liang

, Xia Li:
An Edge-Aware Transformer Framework for Image Inpainting Detection. 648-660 - Wu Meng:

Research on Cooperative Formation Motion Control Method of Multi Ground Unmanned Platforms. 661-669 - Guangjun Liang, Zhen Jia, Xueli Ni, Xiangmin Guo, Ling-Ling Xia:

Research on UAV Forensics and Its Key Technologies. 670-679

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














