Free shipping on orders over $99
Artificial Intelligence and Security

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I

by Xingming SunZhaoqing Pan and Elisa Bertino
Paperback
Publication Date: 25/08/2019

Share This Book:

  $84.99
or 4 easy payments of $21.25 with
afterpay

Cloud Computing.- Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching.- NOAA-LSTM: A New Method of Dialect Identification.- Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network.- Research on the Promotion of Tibetan New Words and Platform Design.- A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm.- Studying L-Diversity and K-Anonymity over Datasets with Sensitive Fields.- Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM.- A No-pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud.- E-sports Ban/Pick Prediction Based On Bi-LSTM Meta Learning Network.- Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process.- Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix.- Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory.- Legal Case Inspection: An Analogy-based Approach to Judgment Evaluation.- A Novel Noise Filter Based on Multiple Voting.- Fuzzy Control Method for Path Tracking System of Combine Harvester.- Research on Opinion Spam Detection by Time Series Anomaly Detection.- Application of Machine Learning Methods for Material Classification with Multi-energy X-ray Transmission Images.- Intra-class Classification of Architectural Styles Using Visualization of CNN.- MSE-Net: Pedestrian Attribute Recognition using MLSC and SE-Blocks.- CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module.- A Novel Distributed Knowledge Reasoning Model.- Research on Detection Method Of Abnormal Traffic In SDN.- Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-growth.- PPD-DL: Privacy-Preserving Decentralized Deep Learning.- Towards Edge Computing based Distributed Data Analytics Framework in Smart Grids.- Android Malware Identification Based on Traffic Analysis.- Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary.- Research on the Efficiency and Application of Ship- helicopter Cooperative Search.- Cellular Neural Network Based Contour Detection for Seismic Image.- Discovering New Sensitive Words Based on Sensitive Information Categorization.- A Dynamic Event Region Tracking Approach Based on Node Calibration.- A Graph Updating Method of Data Theft Detection Based on Rough Set.- A Tutorial of Graph Representation.- Ground-based Cloud Images Recognition Based on GAN and PCANet.- Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules.- Local Smoothing Constraint in Convolutional Neural Network for Image Denoising.- Perceptual Loss based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging.- DWI Fiber Tracking with Functional MRI of White Matter.- Multi-objective Investment Decision Making Based on An Improved SPEA2 Algorithm.- Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network.- Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI.- Convolutional Neural Networks for Scene Image Recognition.- A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network.-Research on Artificial Intelligence Technology in Computer Network Technology.- Research on Detection Method of Unhealthy Message in Social Network.- Image Authentication by Single Target Region Detection.- Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security.- Probe-Polling: A polling based MAC protocol for Energy Harvesting Wireless Sensor Networks.- An Dynamic Protocol for the Quantum Secure Multi-party Summation based on Commutative Encryption.- Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning.- Facial Expression Recognition Based o

ISBN:
9783030242732
9783030242732
Category:
Computer security
Format:
Paperback
Publication Date:
25-08-2019
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Dimensions (mm):
235x155mm
Weight:
1.02kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Artificial Intelligence and Security.