Artificial intelligence and security : Part II / 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings. Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino (eds.).

This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing...

Full description

Saved in:
Bibliographic Details
Corporate Author: ICAIS (Conference) Dublin, Ireland)
Other Authors: Sun, Xingming (Editor), Zhang, Xiaorui (Editor), Xia, Zhihua (Editor), Bertino, Elisa (Editor)
Format: eBook
Language:English
Published: Cham, Switzerland : Springer, [2021]
Series:Lecture notes in computer science ; 12737.
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1260684532
003 OCoLC
005 20240504213016.0
006 m o d
007 cr cnu|||unuuu
008 210720s2021 sz a o 101 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d OCLCO  |d OCLCF  |d EBLCP  |d DCT  |d COM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1266812273 
020 |a 9783030786120  |q (electronic bk.) 
020 |a 3030786129  |q (electronic bk.) 
020 |z 9783030786113  |q (print) 
024 7 |a 10.1007/978-3-030-78612-0  |2 doi 
035 |a (OCoLC)1260684532  |z (OCoLC)1266812273 
037 |b Springer 
050 4 |a Q334 
072 7 |a UB  |2 bicssc 
072 7 |a COM018000  |2 bisacsh 
072 7 |a UB  |2 thema 
049 |a HCDD 
111 2 |a ICAIS (Conference)  |n (7th :  |d 2021 :  |c Dublin, Ireland) 
245 1 0 |a Artificial intelligence and security :  |b 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings.  |n Part II /  |c Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino (eds.). 
246 3 |a ICAIS 2021 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2021] 
300 |a 1 online resource (xxiv, 753 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a Lecture notes in computer science ;  |v 12737 
490 1 |a LNCS sublibrary, SL 3, Information systems and applications, incl. internet/web, and HCI 
505 0 |a Big Data -- Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform -- Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis -- Exploring the informationization of Land Reserve Archives Management -- Research and Implementation of Anomaly Detection Algorithm in Data Mining -- An Empirical Study on Data Sampling for Just-in-Time Defect Prediction -- Design and Implementation of Data Adapter in SWIM -- Cloud Computing and Security -- Encrypted Medical Records Search with Supporting of Fuzzy Multi-Keyword and Relevance Ranking -- A Container-oriented Virtual-machine-introspection-based Security Monitor to Secure Containers in Cloud Computing -- A Computing Task Offloading Scheme for Mobile Edge Computing -- Security Transmission Scheme of Sensitive Data for Mobile Terminal -- Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain -- A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring -- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network -- Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature -- Detection of Virtual Machines based on Thread Scheduling -- Graph Attention Network for Word Embeddings -- Firewall Filtering Technology And Application Based On Decision Tree -- Encryption and Cybersecurity -- A DAPP business data storage model based on blockchain and IPFS -- IPv6-Darknet Network Traffic Detection -- Neural Control Based Research of Endogenous Security Model -- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes -- A Post-Quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy -- A transaction model of bill service based on blockchain -- An N-gram Based Deep Learning Method for Network Traffic Classification -- Interpretability Framework of Network Security Traffic Classification Based on Machine Learning -- Random Parameter Normalization Technique for Mimic Defense based on Multi-queue Architecture -- A Secure and Efficient Key Hierarchical Management and Collaborative Signature Scheme of Blockchain -- Information Hiding -- Covert Communication via Modulating Soft Label of Neural Network -- DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography -- Halftone Image Steganography Based on Reassigned Distortion Measurement -- Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units -- High efficiency quantum image steganography protocol based on ZZW framework -- Halftone Image Steganalysis by Reconstructing Grayscale Image -- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition -- Research and Implementation of Medical Information Protection and Sharing based on Blockchain -- IoT Security -- LoRa Network Security Schemes Based on RF Fingerprint -- Smart Home based Sleep Disorder Recognition for Ambient Assisted Living -- Blockchain-based reliable collection mechanism for smart meter quality data -- Power Blockchain Guarantee Mechanism Based on Trusted Computing -- Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol -- Sensor Failure Detection Based on Programmable Switch and Machine Learning -- A Solution to Reduce Broadcast Storm in VANET -- a Vehicle Intrusion Detection System Based on Time Interval and Data Field -- An Authentication Mechanism for IoT Devices Based on Accountable and Revocable Identify-based Encryption -- A Load-balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections -- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA -- Opportunistic network performance optimization model based on a combination of neural networks and orthogonal experiments -- Security analysis of measurement automation system based on threat intelligence -- A MOEA-D-based Service Quality Matching Optimization Algorithm in Electric Power Communication Network -- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning -- Recent Development, Trends and Challenges in IoT Security -- Energy Optimization for Wild Animal Tracker basing on watchdog technology -- Performance comparison of curve fitting and compressed sensing in channel state information feature extraction -- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength -- Wi-Fi Indoor Positioning Using D-S Evidence Theory -- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System -- Multimedia Forensics -- Trusted digital asset copyright confirmation and transaction mechanism based on consortium blockchain -- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method -- A Fast Tongue Image Color Correction Method Based on Gray World Method -- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval. 
500 |a Includes author index. 
520 |a This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 20, 2021). 
650 0 |a Artificial intelligence  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Cloud computing  |x Security measures  |v Congresses. 
650 7 |a Artificial intelligence  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Sun, Xingming,  |e editor  |1 https://orcid.org/0000-0001-7982-726X 
700 1 |a Zhang, Xiaorui,  |e editor  |0 (orcid)0000-0002-7571-2593  |1 https://orcid.org/0000-0002-7571-2593 
700 1 |a Xia, Zhihua,  |e editor  |0 (orcid)0000-0001-6860-647X  |1 https://orcid.org/0000-0001-6860-647X 
700 1 |a Bertino, Elisa,  |e editor  |1 https://orcid.org/0000-0002-4029-7051 
758 |i has work:  |a Artificial Intelligence and Security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXJTJWCDhxR3JRcVpTRCXq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Printed edition:  |z 9783030786113 
776 0 8 |i Printed edition:  |z 9783030786137 
830 0 |a Lecture notes in computer science ;  |v 12737. 
830 0 |a LNCS sublibrary.  |n SL 3,  |p Information systems and applications, incl. Internet/Web, and HCI. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-030-78612-0  |y Click for online access 
903 |a SPRING-COMP2021 
994 |a 92  |b HCD