Narrow your search

Library

KU Leuven (32)

VUB (32)

Odisee (31)

Thomas More Kempen (31)

Thomas More Mechelen (31)

UCLL (31)

UGent (31)

ULB (31)

ULiège (31)

VIVES (31)

More...

Resource type

book (64)

digital (12)


Language

English (64)


Year
From To Submit

2022 (15)

2021 (15)

2020 (14)

2019 (8)

2018 (6)

More...
Listing 1 - 10 of 64 << page
of 7
>>
Sort by

Book
Advances in Artificial Intelligence and Security : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I
Author:
ISBN: 3030786153 3030786145 Year: 2021 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. .

Keywords

Artificial intelligence --- Computer security --- Data protection. --- Machine learning. --- Computer engineering. --- Computer networks. --- Image processing --- Computer vision. --- Social sciences --- Education --- Data and Information Security. --- Machine Learning. --- Computer Engineering and Networks. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Computer Application in Social and Behavioral Sciences. --- Computers and Education. --- Digital techniques. --- Data processing. --- Digital image processing --- Digital electronics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computers --- Learning, Machine --- Machine theory --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Distributed processing --- Design and construction --- Intel·ligència artificial --- Seguretat informàtica --- Computació en núvol


Book
Advances in artificial intelligence and security. Part II. : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings
Author:
ISBN: 3030786188 303078617X Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advances in artificial intelligence and security. : 7th international conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, proceedings
Author:
ISBN: 3030786218 303078620X Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cloud Computing and Security.- Design and Implementation of Information Detection System Based On Privacy Sensitive Data.- Performance Modeling of OpenMP Program Based On LLVM Compilation Platform.- A Method of network attack recognition Based on CNN+LSTM Model.- Encryption and Cybersecurity.- Recognition Method of Abnormal Data in Local Area Network Common Channel Based on Convolutional Neural Network.- MCF-CSA: A Multi-level Collaboration Framework for Cyber Situation Awareness and Information Sharing.- VABox: A Virtualization-based Analysis Framework of Virtualization-Obfuscated Packed Executables.- Imbalance Malware Classification by Decoupling Representation and Classifier- The promotion of online communication ability of mainstream media- HNN-based Prediction Method Supporting Discovery of Production Abnormal.- Efficient Forward and Backward Private Searchable Symmetric Encryption for Multiple Data Sources.- A feature extracting and matching system based on magic-number and AC-algorithm.- A Review: How to detect malicious domains.- A Homomorphic Encryption Method for Power Data Based on Improved Paillier Algorithm.- The Vulnerabilities in Smart Contracts: A Survey.- Detection of false data injection attacks in Smart Grid based on Machine Learning.- An Adversarial Examples Defense Method Based on Image Low-frequency Information.- Information Hiding.- A Robust Watermarking Algorithm for Video Game Artwork Based on Pose Estimation Neural Network.- Research on Content Authentication Technology of Electronic Bills Based on Text Watermarking Algorithm.- Finding the better distortion function from prior scheme for Image Steganography.- Application in Aviation Customer Churn Prediction Using Classification Algorithm Based on Machine Learning.- Color Image Steganography Scheme Based on Convolutional Neural Network.- Robust JPEG steganography using singular value decomposition in DCT domain.- 3D Coverless Image Steganography Scheme Based on 3D Slice Technology.- Software Information Hiding Algorithm Based on Import Table of Portable Executable File.- A Novel Robust Reversible Watermarking Method Against JPEG Compression.- A Common Steganalysis Method of Low Embedding Rate Steganography in Compressed Speech Based on Hierarchy Feature Extraction and Fusion.- TStego-THU: Large-scale Text Steganalysis Dataset.- IoT Security.- Integration Innovation of Competitive Intelligence, AI and Big Data Analysis.- A Comprehensive Review of IoT Technologies and Applications for Healthcare.- A Pervasive Narrow-band Internet of Things (NB-IoT) based health monitoring platform for Ambient Assisted Living, . Design and Development of Field Mobile Monitoring System for Forest Fire Fighting.- ZigBee Wireless Network Attack and Detection.- Joint ToF and Doppler Estimation for Reflection Path Under the Wi-Fi TTW Scenario.- Securing Satellite Internet of Things by Perceiving Content Semantics.- Research on Cultivating Senior Technical Talents Based on the Internet of Things Platform.- Liquid Metal Droplet Series Based Wire Oscillation.- Linear Time-invariant System Reduced-order Finite-time Observer.- Research on invulnerability of WSN based on small world characteristics of complex networks.- Collaboration energy efficiency with mobile edge computing for target tracking in IOT.- Realization of CSI-based Human Behavior Recognition: A Survey.- Security Analysis of Blockchain Smart Contract: Taking Reentrancy Vulnerability as an Example.- Research on Data Security Protection System of Monitoring and Acquisition System Based on Block Chain Technology.- Adaptive Active Immune Policy for Sensing Nodes in Internet of Things.- ELM Forecasted Model of Ammonia Nitrogen in Lake Taihu Combined with Adaboost and Particle Swarm Optimization Algorithms.- Study on Identification of Multiple Pesticide Residues in Lettuce Leaves Based on Hyperspectral Technology.- Robust JPEG Image Steganography Based on


Book
Artificial intelligence andsecurity. : 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021 : proceedings
Author:
ISBN: 3030786099 3030786080 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Artificial intelligence and security. : 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings
Author:
ISBN: 3031067886 3031067878 Year: 2022 Publisher: Cham, Switzerland : Springer International Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Artificial intelligence and security. : 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings
Author:
ISBN: 3031067940 3031067932 Year: 2022 Publisher: Cham, Switzerland : Springer International Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Artificial intelligence and security. : 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings
Author:
ISBN: 3031067908 3031067916 Year: 2022 Publisher: Cham, Switzerland : Springer International Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advances in artificial intelligence and security. : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15-20, 2022 : proceedings
Author:
ISBN: 3031067630 3031067649 Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I
Author:
ISBN: 3031067665 3031067673 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security. .

Keywords

Artificial intelligence. --- Artificial intelligence --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Data protection. --- Image processing --- Computer vision. --- Education --- Social sciences --- Computer networks. --- Data and Information Security. --- Artificial Intelligence. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Computers and Education. --- Computer Application in Social and Behavioral Sciences. --- Computer Communication Networks. --- Digital techniques. --- Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer uses in education --- Computers in education --- Educational computing --- Microcomputer uses in education --- Microcomputers in education --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Digital image processing --- Digital electronics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing


Book
Advances in Artificial Intelligence and Security : 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II
Author:
ISBN: 3031067606 3031067614 Year: 2022 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security. .

Keywords

Artificial intelligence. --- Artificial intelligence --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Data protection. --- Computer engineering. --- Computer networks. --- Image processing --- Computer vision. --- Data and Information Security. --- Computer Engineering and Networks. --- Computer Communication Networks. --- Artificial Intelligence. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Digital techniques. --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Digital image processing --- Digital electronics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Design and construction

Listing 1 - 10 of 64 << page
of 7
>>
Sort by