ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II

دانلود کتاب هوش مصنوعی و امنیت: ششمین کنفرانس بین المللی، ICAIS 2020، هوهات، چین، 17 تا 20 ژوئیه، 2020، مجموعه مقالات، بخش دوم

Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II

مشخصات کتاب

Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II

ویرایش: 1st ed. 
نویسندگان: , ,   
سری: Communications in Computer and Information Science 1253 
ISBN (شابک) : 9789811580857, 9789811580864 
ناشر: Springer Singapore;Springer 
سال نشر: 2020 
تعداد صفحات: 727 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 71 مگابایت 

قیمت کتاب (تومان) : 53,000



کلمات کلیدی مربوط به کتاب هوش مصنوعی و امنیت: ششمین کنفرانس بین المللی، ICAIS 2020، هوهات، چین، 17 تا 20 ژوئیه، 2020، مجموعه مقالات، بخش دوم: است



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 6


در صورت تبدیل فایل کتاب Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش مصنوعی و امنیت: ششمین کنفرانس بین المللی، ICAIS 2020، هوهات، چین، 17 تا 20 ژوئیه، 2020، مجموعه مقالات، بخش دوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب هوش مصنوعی و امنیت: ششمین کنفرانس بین المللی، ICAIS 2020، هوهات، چین، 17 تا 20 ژوئیه، 2020، مجموعه مقالات، بخش دوم



توضیحاتی درمورد کتاب به خارجی

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.

The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows:

Part I: artificial intelligence;

Part II: artificial intelligence; Internet of things; information security;

Part III: information security; big data and cloud computing; information processing.




فهرست مطالب

Front Matter ....Pages i-xviii
Front Matter ....Pages 1-1
Kernel Fuzzy C Means Clustering with New Spatial Constraints (Limei Wang, Sijie Niu, Leilei Geng)....Pages 3-14
GSSM: An Integration Model of Heterogeneous Factors for Point-of-Interest Recommendation (Qing Yang, Yiheng Chen, Peicheng Luo, Jingwei Zhang)....Pages 15-26
Contrast Adjustment Forensics Based on Second-Order Statistical and Deep Learning Features (Xinyi Wang, Shaozhang Niu, He Wang)....Pages 27-37
Hybrid Low Rank Model Based Deep Neural Network Compression with Application in Data Recovery (Chuanxiang Xu, Weize Sun, Lei Huang, Jingxin xu, Min Huang)....Pages 38-50
Research on Rail Traffic Safety Factor Model Based on Deep Learning (Ping Zhao, Lian-ying Sun, Shuai Tu, Jin-Feng Wang, Ying Wan)....Pages 51-59
Research on Pseudo Code Ranging Technology Using Burst DSSS Signal (Jianzhong Qi, Qingping Song)....Pages 60-68
A Study on PN Code Phase and Carrier Frequency Fast Estimation Technology for DSSS Signal (Jianzhong Qi, Qingping Song)....Pages 69-76
Research of Software Information Hiding Algorithm Based on Packing Technology (Zuwei Tian, Hengfu Yang)....Pages 77-89
A Free-Space Quantum Secure Direct Communication Scheme Based on Prefixed-Threshold Real-Time Selection Method (Hao Yu, Qianqian Hu, Zhenwei Li, Bao Feng)....Pages 90-98
Front Matter ....Pages 99-99
Design of Intelligent Mobile Robot Control System Based on Gesture Recognition (Dong Dai, Wei Zhuang, Yixian Shen, Lu Li, Haiyan Wang)....Pages 101-111
Multimodal Biometric Recognition Based on Convolutional Neural Networks (Hui Xu, Jun Kong, Miao Qi, Yinghua Lu)....Pages 112-123
Multiple Graph Regularized Non-negative Matrix Factorization Based on L2,1 Norm for Face Recognition (Minghai Yao, Jinsong Li, Changyu Zhou)....Pages 124-135
Facial Expression Recognition Method Based on Convolution Neural Network Combining Attention Mechanism (Peizhi Wen, Ying Ding, Yayuan Wen, Zhenrong Deng, Zhi Xu)....Pages 136-147
Behavior Compatibility Analysis for Service Mashup with Model Checking (Zhongyi Zhai, Guibing Lai, Lingzhong Zhao, Junyan Qian)....Pages 148-159
Study on Practical IoT Applications in Civil Aviation Industry (Yuanqing He)....Pages 160-169
Study on IoT Solutions in Smart Airports (Huan Zhang)....Pages 170-179
MultiSec: A Bionics Security Architecture of Ad-hoc Network (Muyao Wang, Yun Yang, Zongtao Duan)....Pages 180-188
A Large-Scale Parallel Network Intrusion Detection Model Based on K-Means in Security Audit System (Xueming Qiao, Yuan Zhang, Yanhong Liu, Hao Hu, Dongjie Zhu, Zhi Qiu et al.)....Pages 189-198
Task Offloading Strategy in Cloud Collaborative Edge Computing (Wenli Wang, Yanfeng Bai, Suzhen Wang)....Pages 199-209
A Review of Wireless Sensor Network Simulation Tools (Ning Cao, Pingping Yu)....Pages 210-220
Research on Ozone Prediction Based on Genetic Neural Network for Multi-city Collaboration (Haichuan Li, Haoran Xu, Qi Gao, Yaning Nie)....Pages 221-231
The Shape Classification of Snowflakes Based on BP Neural Network (Haichuan Li, Xu Zhang, Shuhai Wang, Shikun Song)....Pages 232-242
Fabric Hair Ball Pilling Detection Based on Memristive Cell Neural Network (Jingyun Wang, Jincan Yin, Wenjie Duan, Yang Li)....Pages 243-254
Propagator Method Based on Virtual Array Manifold Matching Algorithm for 2D DOA Estimation (Sheng Liu, Jing Zhao, Weizhi Xiong, Xiangjun Dai)....Pages 255-264
Two-Dimensional Seismic Data Reconstruction Method Based on Compressed Sensing (Caifeng Cheng, Xiang’e Sun, Deshu Lin)....Pages 265-277
Optimal Location for Electric Vehicles Charging Stations Based on P-Median Model (Daxin Tian, Huiwen Yan, Xuting Duan, Yue Cao, Jianshan Zhou, Wei Hao et al.)....Pages 278-289
A Succinct Power Management Circuit for Wireless Sensor Network Nodes (Gang Li, Wenxian Zheng, Zhenbing Li, Zhong Huang, Yongjun Yang, Guangjun Wen)....Pages 290-299
Survival Analysis of a Stochastic Single-Species System with Diffusion Under the Effect of Environmental Toxins in Polluted Environments (Xiangjun Dai, Suli Wang, Sheng Liu, Weizhi Xiong)....Pages 300-311
Precipitation Phase Inversion Algorithm for Extremely Unbalanced Data (Shengchun Wang, Chengcheng Jiang, Jingui Huang, Jinyu Xu, Hong Deng, Long Huang et al.)....Pages 312-323
Vehicular Trajectory Big Data: Driving Behavior Recognition Algorithm Based on Deep Learning (Xiaorun Yang, Fei Ding, Dengyin Zhang, Min Zhang)....Pages 324-336
Measurement-Device-Independent Quantum Identity Authentication Based on Single Photon (Yu Cheng, Xiaoping Lou, Wensheng Tang, Zehong Liu, Yu Wang, Guan Huang)....Pages 337-345
Quantifying Community Detection Algorithms in Student Networks of Book Borrowing via Demographic Characterists (Fanjing Kong, Zhiqiang Meng, Songtian Che)....Pages 346-353
Knowledge Extraction and Knowledge Graph Construction Based on Campus Security Logss (Songfei Cao, Xiaoqiang Di, Yue Gong, Weiwu Ren, Xingxu Zhang)....Pages 354-364
Research on the Influence of Different Network Topologies on Cache Performance for NDN (Min Feng, Huanqi Ma, Yong Hu, Meiju Yu)....Pages 365-375
Research on Vehicle Network Routing Algorithm Based on Statistical Behavior (Hui Li, Jun Feng, Yanli Gong, Jialing Liu)....Pages 376-383
Design of Automatic Fire Extinguishing Device for IoT Transformer Box (Ruihang Wang, Liangliang Li, Jianfu Chen, Xiaorong Zhao)....Pages 384-392
A Practical Quantum Private Query Protocol Based on Bell States and Single Photons (Dong-Mei Liu, Li-Li Yan, Yan Chang, Shi-Bing Zhang)....Pages 393-402
Improved Analytic Hierarchy Process Based on Fuzzy Synthesis Theory for User Behavior Evaluation (Yishan Gao, Shibin Zhang, Yuanyuan Huang)....Pages 403-411
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles (Peng-shou Xie, Xue-ming Han, Tao Feng, Yan Yan, Guo-qiang Ma)....Pages 412-422
Safety Helmet Detection Method Based on Faster R-CNN (Shuqiang Guo, Dongxue Li, Zhiheng Wang, Xinxin Zhou)....Pages 423-434
Transmission Line Galloping Detection Based on SURF Feature and FLANN Matching Algorithm (Shuqiang Guo, Qianlong Bai, Baohai Yue, Xianjin Li, Xinxin Zhou)....Pages 435-443
A Method to Improve Identification Performance of UHF RFID Systems (Jiang Xu)....Pages 444-454
A New Multi-tree Search Algorithm for RFID Tag Identification (Jiang Xu)....Pages 455-463
A Direct Self-adaptive Fuzzy Control System for a Single-Arm Manipulator (Xiaokan Wang, Qiong Wang)....Pages 464-473
Research and Design of Intelligent Gas Concentration Monitoring and Alarming Instrument Based on PIC Single Chip Microcomputer (Xiaokan Wang, Qiong Wang)....Pages 474-483
A Method to Construct Large Scale Boolean Functions (Daxing Zhang, Erguan Cai)....Pages 484-489
Front Matter ....Pages 491-491
Banknote Infrared Characteristics Discrimination Based on PCA and LDA (Ruoxi Li, Yinong Zhao, Xuedong Zhang, Yuhan Cao, Xiaojing Chen)....Pages 493-502
A Novel Approach to File Deduplication in Cloud Storage Systems (Aiwu Shi, Ke Liu, Denghui Pei, Qifan Huang)....Pages 503-512
Cooperative Detection Model for Phishing Websites Based on Approach (He Wang, Guoyuan Lin, Menghua Fang)....Pages 513-524
Associated Hazard Assessment of IoT Vulnerability Based on Risk Matrix (Jinglan Yang, Yatian Xue, Min Lei, Bichen Che)....Pages 525-535
DFDM - A DeepFakes Detection Model Based on Steganography Forensic Network (Yang Zeng, Xiaochun Guo, Yu Yang, Rui Zhan)....Pages 536-545
An Image Steganalysis Model Combined with the Directionality of Residuals (Zhujun Jin, Hao Li, Yu Yang, Jialin Lin)....Pages 546-556
A New Method for Computing the Variety of Saturation Ideal of Triangular Set (Zhenyi Ji, Jiankang Liu, Cheng Liu, Bing Jiang)....Pages 557-567
Impact of Climate Change on Farmland Production Potentialin the Coastal Areas of Jiangsu Province During Nearly 50 Years (Jing Liu, Wenzheng Yu)....Pages 568-581
Network Abnormal Behavior Detection Method Based on Affinity Propagation (Junjie Chen, Shaoyong Guo, Wencui Li, Jing Shen, Xuesong Qiu, Sujie Shao)....Pages 582-591
A Multi-blockchain Architecture Supporting Cross-Blockchain Communication (Xingtang Xiao, Zhuo Yu, Ke Xie, Shaoyong Guo, Ao Xiong, Yong Yan)....Pages 592-603
Blockchain-Based Authentication in Wireless Sensor Networks (Mingfang Zhou, Xiaojun Wang, Mingxing Luo)....Pages 604-615
A Word-Oriented Modular Division Algorithm and Its Efficient Implementation Based on CSA (Xiaoting Hu, Zhongping Qin, Yali Liu, Qi Yang)....Pages 616-626
Defense Against Adversarial Attack Using PCA (Jie Yang, Man Wu, Xiao-Zhang Liu)....Pages 627-636
Medical Image Digital Watermarking Algorithm Based on DWT-DFRFT (Yanlin Liu, Jingbing Li, Jing Liu, Yanwei Chen, Hui Li, Jian Shen)....Pages 637-649
A Robust Color Image Zero-Watermarking Based on SURF and DCT Features (Saqib Ali Nawaz, Jingbing Li, Uzair Aslam Bhatti, Hui Li, Baoru Han, Anum Mehmood et al.)....Pages 650-660
Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model (Tao Feng, Manfang Dou, Pengshou Xie, Junli Fang)....Pages 661-673
Current Status and Prospects of Blockchain Technology (Jieren Cheng, Jinyang Song, Dong Fan, Yuan Zhang, Wen Feng)....Pages 674-684
A DDoS Attack Defense Method Based on Blockchain for IoTs Devices (Meizhu Chen, Xiangyan Tang, Jieren Cheng, Naixue Xiong, Jun Li, Dong Fan)....Pages 685-694
A Reputation Incentive Mechanism of Crowd Sensing System Based on Blockchain (Jieren Cheng, Hai Long, Xiangyan Tang, Jun Li, Meizhu Chen, Naixue Xiong)....Pages 695-706
Back Matter ....Pages 707-713




نظرات کاربران