Free shipping on orders over $99
Artificial Intelligence and Security

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II

by Xingming SunZhaoqing Pan and Elisa Bertino
Paperback
Publication Date: 25/08/2019

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay

Artificial Intelligence.- CCNET: Cascading Convolutions for Cardiac Segmentation.- A Deep Belief Networks Based Prediction Method for Identification of Disease-associated Non-coding SNPs in Human Genome.- On Human-like Performance Artificial Intelligence - A Demonstration Using an Atari Game.- Implementation of Multiplicative Seasonal ARIMA modeling and Flood Prediction based on Long-Term Time Series Data in Indonesia.- Improved Bayesian Method with Collision Recovery for RFID Anti-Collision.- Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph.- A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection.- On True Language Understanding.- The l2,1-Norm Stacked Robust Autoencoders via Adaptation Regularization for Domain Adaptation.- Molecular Dynamics Simulation Optimization Based on GROMACS on Sunway TaihuLight.- A Review of Network Representation Learning.- A Two-stage Deep Neural Network for Sequence Labeling.- Reinforcement Learning based Content Push Policy for HetNets with Energy Harvesting Small Cells.- A Comparative Research on Open Source Edge Computing Systems.- Weather Forecasting Using Artificial Neural Network.- A New Quantitative Evaluation Method for Fuzzing.- Classification of ECG Arrhythmia Using CNN, SVM and LDA.- Discrete Similarity Preserving Hashing for Cross-Modal Retrieval.- Classification of Vitiligo Based on Convolutional Neural Network.- Big Data.- Multi-scale and Hierarchical Embedding for Polarity Shift Sensitive Sentiment Classification.- Trade-off between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem.- FSampleJoin: A Fixed-sample-based Method for String Similarity Joins using MapReduce.- Mass Diffusion Recommendation Algorithm Based on Multi-Subnet Composited Complex Network Model.- Optimizing Word Embedding for Fine-grained Sentiment Analysis.- A Sentiment Classification Model Based on Multiple Multi-classifier Systems.- Task Scheduling Algorithm based on Campus Cloud Platform.- Automatic Self-feedback for the Studying effect of MOOC Based on Support Vector Machine.- Prediction on Payment Volume from Customer Service Electricity Channel.- Delay-Tolerant Rendezvous-based Data collection for Target Tracking in Large-Scale Wireless Sensor Networks with UGV.- Energy-Efficient Data-Collection with Rendezvous-Based Approaches in Large-Scale WSNs with multi-UGV.- Analysis of the Efficiency-Energy with Regression and Classification in Household using K-NN 354.- Probe Recommendation Algorithm for Link Delay Detection.- Recommendation with Heterogeneous Information Networks Based on Meta-Graph.- A GA-optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy.- Modeling and Simulation of Network Public Opinion Propagation Model Based on Interest Matching in Social Network.- Power Consumption and Coverage Test of NB-IoT in the Substation Edge Computing Environment.- Research on the Optimization of Spark Big Table Equal Join.- Gait Recognition based on spatial-temporal information .- Research on Load Balancing Algorithm Optimization Based on Spark Platform.- A System for Calculating the Amount of Motion Based on 3D Pose Estimation.- Design of Security Portrait Big Data Application System.- Urban traffic flow forecast based on ST-SEResNet.- A Novel Power System Anomaly Data Identification Method Based on Neural Network and Affine Propagation.- Input-Output Analysis of Chinese National Agricultural Science and Technology Park.- A Power Grid Operations Monitoring Platform Based on Big Data Technology.- An Efficient Social-Aware Routing Strategy in Mobile Social Networks.- Cloud Computing and Security.- Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure.- Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques.- When Side Channel becomes Good: Kernel Malware Attack Investigation.- Robust Encryp

ISBN:
9783030242640
9783030242640
Category:
Computer security
Format:
Paperback
Publication Date:
25-08-2019
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Dimensions (mm):
235x155mm
Weight:
1.04kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Artificial Intelligence and Security.