Free shipping on orders over $99
Artificial Intelligence and Security

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III

by Xingming SunZhaoqing Pan and Elisa Bertino
Paperback
Publication Date: 25/08/2019

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay

Cloud Computing and Security.- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server.- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach.- Equipment Fault Detection Based on SENCForest.- Research on Telemedical Monitoring System Based on Homomorphic Encryption.- Phase Retrieval via Accelerated Gradient Descent.- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model.- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.- Application of Blockchain Technology in Agricultural Product Traceability System.- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve.- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p.- Information Hiding.- An Improved Steganalysis Method Using Feature Combinations.- Research on Application of OFD Technology in Secure Electronic Bills.- A Generative Method for Image Steganography Based on Semantics.- Review on Text Watermarking Resistant to Print-scan, Screen-shooting.- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image.- IoT Security.- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement.- Multiplicative Linear Secret Sharing without Interaction.- Positioning Improvement Algorithm Based on LoRa Wireless Networks.- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks.- An Implementation of CoAP-Based Semantic Resource Directory in Californium.- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency.- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks.- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar.- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping.- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles.- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces.- Design of an IoT-based Efficient Security Scheme in Home Wireless System.- Discussion on the Application of Industrial Internet.- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform.- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding.- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks.- Shape Recognition with Recurrent Neural Network.- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model.- Tobacco Intelligent Management System Based on Internet of Things.- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System.- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission.- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things.- Multimedia Forensics.- The Impact of Using Facebook on the Academic Performance of University Students.- Robust Audio Watermarking Algorithm Based on Moving Average and DCT.- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification.- Image Hashing based on CS-LBP and DCT for Copy Detection.- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering.- An Image Forensic Method for AI Inpainting Using Faster R-CNN.- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy.- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks.- Encryption and Cybersecurity.- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data.- Calculation of Network Security Index Based on Convolution Neural Networks.- A Method to Defense APT based on Dynamic ID Transformation.- Emergency analysis Based on Affective Comput

ISBN:
9783030242701
9783030242701
Category:
Computer security
Format:
Paperback
Publication Date:
25-08-2019
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Dimensions (mm):
235x155mm
Weight:
1.03kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Artificial Intelligence and Security.