Free shipping on orders over $99
Artificial Intelligence and Security

Artificial Intelligence and Security

6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I

by Xingming SunJinwei Wang and Elisa Bertino
Paperback
Publication Date: 16/11/2020

Share This Book:

  $169.75
or 4 easy payments of $42.44 with
afterpay
This item qualifies your order for FREE DELIVERY
Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT.- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition.- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System.- Intelligent Contract for Power Market Transaction Based on the BlockChain.- Survey on Zero-trust Network Security.- A Novel Consensus Algorithm for Alliance Chain.- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm.- The Study of Fog Computing Security Situation Prediction in Industrial Internet.- A novel keypoints-based image registration method with fully convolutional neural network.- Image super-resolution reconstruction with dense residual attention module.- GF-2 image blue roof building extraction method based on object-oriented classification technology.- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor.- Parallel optimization of stencil computation base on Sunway TaihuLight.- Chinese News Data Extraction System Based On Readability Algorithm.- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD.- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning.- Research Progress of Knowledge Graph Embedding.- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network.- Effective Android Malware Detection based on Deep Learning.- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking.- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis.- Research on Leisure Sports Activities Based on Decision Tree Algorithm.- Semantic Integrity Analysis Based on Transformer.- An improvement of Coherent Semantic Attention for Image Inpainting.- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL.- Nonlinear Correction Based on Depth Neural Network.- Spatial-temporal co-attention network for action recognition.- Improved SSD for object detection.- Sentiment Analysis on Weibo Platform for Stock Prediction.- Refinement Measurement and Evaluation of Streets in Shanghai Old City.- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China.- Research Progress in Blind Forensics of Digital Image Smooth Filtering.- Research on video violence detection technology of UAV on cloud platform.- A Generative Steganography Method Based on WGAN-GP.- A deep learning network for coarse-to-fine deformable medical image registration.- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus.- Research on the data reference model of NMIS.- A Real-time Recommender System Design Based on Spark Streaming.- A Novel Clone Detection Scheme Based on Generative Adversarial Networks.- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform.- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person.- An exploratory study of blending Smart classroom in database course.- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function.- Research and Analysis of Fine Management of Engineering Cost Based on BIM.- Survey of Software-Defined Network Security Issues.- A Fall Detection Algorithm Based on a Support Vector Machine.- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization.- An efficient quantum private comparison protocol based on conjugate coding.-
ISBN:
9789811580826
9789811580826
Category:
Computer security
Format:
Paperback
Publication Date:
16-11-2020
Language:
English
Publisher:
Springer
Country of origin:
United States
Dimensions (mm):
235x155mm
Weight:
1.13kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Artificial Intelligence and Security.