


default search action
7th ICAIS 2022: Qinghai, China - Part III
- Xingming Sun, Xiaorui Zhang

, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7
Encryption and Cybersecurity
- Tengteng Zhao, Wei Zhang, Xiaolong Li, Wenjing Wang, Xu Niu, Hui Guo:

Research on Offense and Defense of DDos Based on Evolutionary Game Theory. 3-15 - Bin Gu, Yunfeng Zou, Dongyang Cai, Huanyu Fan:

A Method of Data Distribution and Traceability Based on Blockchain. 16-27 - Yunan Zhu, Wei Che, Chao Shan, Shen Zhao:

Data Provenance in Large-Scale Distribution. 28-42 - Fujin Hou, Kun Zhou, Longbin Li, Yuan Tian, Jie Li, Jian Li:

A Vulnerability Detection Algorithm Based on Transformer Model. 43-55 - Xvhao Xiao

, Xiaojun Li, Junping Yao
, Shaochen Li, Bilal Anwar
:
Research on Video Falsity Detection Based on Publisher and Publishing Environment Features. 56-70 - Hongtao Chen, Shuo Guo, Yanbo Shi, Weixuan Wei, Kaidi Wang:

Intrusion Detection Model Based on KNN-AE-DNN. 71-83 - Lu Kang

, Qingbing Ji
, Lvlin Ni, Jiaxin Li:
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information. 84-96 - Lan Guo, Yang Lu, Qing Miao, Guangao Zu, Zhongqi Wang:

An Efficient Certificate-Based Encryption Scheme Without Random Oracles. 97-107 - Huali Zhang

, Bichen Che, Zhao Dou, Hengji Li, Yu Yang, Xiubo Chen, Jian Li:
A Rational Hierarchical Quantum State Sharing Protocol. 108-119 - Qiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia:

Blockchain-Based Efficient Incentive Mechanism in Crowdsensing. 120-132 - Huailin Pu, Wunan Wan, Zhi Qin, Jinquan Zhang, Qiulu Jiang, Shibin Zhang, Jinyue Xia:

BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios. 133-143 - Jing Shi, Mingyang Chen, Jiazheng Jiao:

Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP. 144-156 - Xiaojun Gou, Shunhui Luo, Liang Xiao:

Multi-objective Dual-Route Planning Algorithm for Grid Communication Network. 157-170 - Zhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia:

Blockchain Cross-Chain Research Based on Verifiable Ring Signatures. 171-183 - Xiao Feng, Yuanzheng Wang, Tengfei Dong, Yingxia Liao, Yixin Zhang, Yi Lin:

A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy. 184-193 - Hanyang Wang, Sirui Zhou, Honglei Li, Juan Hu, Xinran Du, Jinghui Zhou, Yunlong He, Fa Fu, Houqun Yang:

Deep Learning Network Intrusion Detection Based on Network Traffic. 194-207 - Yuanshen Li, Jieren Cheng, Hui Li, Yuming Yuan, Victor S. Sheng:

A Survey of Consensus Mechanism Based on Reputation Model. 208-221 - Meng Li

:
A Survey on Ethereum Illicit Detection. 222-232 - Hongwei Ye, Xiaozhang Liu, Anli Yan, Lang Li, Xiulai Li

:
Detect Adversarial Examples by Using Feature Autoencoder. 233-242 - Firew Tadele

, Jianguo Wei
, Kiyoshi Honda, Ruiteng Zhang, Wenhao Yang:
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese. 243-256 - Kaixin Zhang

, Bing Huang
, Yunfeng Wu
, Chuchu Chai, Jiufa Zhang
, Zhengjing Bao:
A WGAN-Based Method for Generating Malicious Domain Training Data. 257-270 - Wenting Zhou, Jie Liu, Bao Feng, Xiao Ye, Tianbing Zhang, Yuxiang Bian, Wenjie Liu:

A Data Reconciliation Model Based on QLDPC for Satellite-Ground Quantum Key Distribution Network. 271-279
Information Hiding
- Feng Wang

, Hang Zhou
, Han Fang
, Weiming Zhang, Nenghai Yu
:
Noise Simulation-Based Deep Optical Watermarking. 283-298 - Xuan Zhu

, Qun Mo, Fengyong Li
, Lei Zhang, Chuan Qin
:
Behavior Steganography in Social Network via Secret Sharing. 299-308 - Yongjin Xian, Xingyuan Wang, Xiaoyu Wang, Qi Li

, Bin Ma:
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication. 309-322 - Shiyi Chen, Yi Chen, Yanli Chen, Limengnan Zhou, Hanzhou Wu

:
Robust Video Watermarking Using Normalized Zernike Moments. 323-336 - Xiaomei Liu, Bolin Zhang, Yuchen Wen, Xin Tang, Haibo Su:

An Improved Image Authentication Method Using QR Code Watermarking Approach. 337-348 - Bin Ma, Dongqi Li, Chunpeng Wang, Jian Li, Gang Li, Xinan Cui:

A Cyberspace Security Knowledge System Based on Knowledge Graph. 349-362 - Zuwei Tian, ZhiChen Gao:

Multi-carrier Steganography Algorithm Based on Executable Program. 363-372 - Ruopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu, Wei Lu, Weiqi Luo

:
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption. 373-385 - Yuan Li, Jingbing Li, Chunyan Shao, Uzair Aslam Bhatti, Jixin Ma:

Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCT. 386-399 - Jiangqun Ni

, Yichen Tong
, Xianglei Hu
, Wenkang Su
, Xiangui Kang
:
Spatial Image Steganography Using a Correlational Model. 400-411 - Yichen Tong

, Jiangqun Ni
, Wenkang Su
, Xianglei Hu
:
Spatial Image Steganography Incorporating Adjacent Dependencies. 412-423
IoT Security
- Kun Liang, Shijie Sun, Xiangdang Huang, Qiuling Yang, Neal Naixue Xiong:

A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks. 427-440 - Shaoyong Guo, Baoyu Xiang, Liandong Chen, Huifeng Yang, Dongxiao Yu:

Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City. 441-454 - Junjie Fu

, Xiaoliang Wang
, Yuzhen Liu, Qing Yang, Frank Jiang
:
A Scheme to Improve the Security of IoT Communication. 455-468 - Qiang Tang, Linjiang Li, Jin Wang, Gwang-Jun Kim, Bin Tang:

Energy Efficiency Maximization for UAV and Electric Vehicle Assisted Mobile Edge Computing on the Edge Side. 469-481 - Weihua Li, Shaocheng Wu, Yue Ma, Tao Liu, Yali Bai, Jinxin Zuo:

Risk Assessment of Electric Energy Metering Automation System Based on Bayesian Network. 482-495 - Jing Zhou, Qian Wu, Jin Li, Jiaxin Li:

Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm. 496-506 - Zaojian Dai, Nige Li, Yong Li, Guoquan Yuan, Xinjian Zhao, Ran Zhao, Fan Wu:

Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust. 507-519 - Yuheng Li, Yongzhong Li, Shipeng Zhang:

A New Transparent File Encryption Method Based on SM4 for Android Platform. 520-531 - Tao Wang, Pengyu Liu, Wenjing Zhang, Xiaowei Jia, Yanming Wang, Jiachun Yang:

Calibration of Multi-dimensional Air Pressure Sensor Based on LSTM. 532-543 - Jie Chen

, Yaping Liu, Shuo Zhang, Bing Chen, Zhiyu Han:
A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning. 544-557 - Jianbin Liu, Sha Li, Zhe Zhang, Jie Zhang:

Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-Resonance. 558-571 - Peng Yan, Yao Xiang:

Distributed State Estimation for Topology Random Switching in Sensor Networks. 572-585 - Xuetao Bai, Shanshan Tu, Muhammad Waqas

, Aiming Wu, Yihe Zhang, Yongjie Yang:
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage. 586-597 - Lu Chen, Xinjian Zhao, Ran Zhao, Guoquan Yuan, Song Zhang, Shi Chen, Fan Wu:

Mobile Internet Access Control Strategy Based on Trust Perception. 598-611 - Yong Li, Lu Chen, Nige Li, Ziang Lu, Zaojian Dai, Fan Wu:

Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework. 612-624 - Wei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu, Xian Wang, Xin He, Fan Wu:

Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. 625-638 - Ji Lai, Shuo Li, Qigui Yao:

A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks. 639-650 - Pingping Yu, Zihui Xu, Xiaodong Zhao, Eugene Murray:

Simulation Research on Iron Core Air Gap of Energy-Taking Current Transformer (CT) Based on Ansys. 651-662 - Xiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu:

A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment. 663-677 - Ning Cao, Yansong Wang

, Xiaofang Li, Rongning Qu, Yuxuan Wang, Zhikun Liang, Zijian Zhu, Chi Zhang, Dongjie Zhu:
MGDP: Architecture Design of Intelligent Detection Platform for Marine Garbage Based on Intelligent Internet of Things. 678-688 - Jingwen Fang, Qian Shao, Zhongyi Xu, Penghui Li, Baotong Chen, Haoliang Lan:

Dark Chain Detection Based on the IP Address. 689-699 - Zhonglu Zou, Hao Xu, Yin Yuan:

High-Reliability Mapping Algorithm Based on Network Topology Characteristics in Network Slicing Environment. 700-709 - Xiaowei Chen, HeFang Jiang, Shaocheng Wu, Tao Liu, Tong An, Zhongwei Xu, Man Zhang, Muhammad Shafiq

:
New Generation Power System Security Protection Technology Based on Dynamic Defense. 710-721

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














