


default search action
5th ICAIS 2019: New York, NY, USA
- Xingming Sun, Zhaoqing Pan, Elisa Bertino:

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11632, Springer 2019, ISBN 978-3-030-24273-2
Cloud Computing
- Zhenyu Zhang, Wencheng Sun, Zhiping Cai, Ningzheng Luo, Ming Wang:

Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching. 3-15 - Shuai Ye, Cuixia Li, Ruoyan Zhao, Weidong Wu

:
NOAA-LSTM: A New Method of Dialect Identification. 16-26 - Pengchao Niu, Yuan Sun, Wei Song, Shijiao Zhang:

Evaluation Method of Teachers' Teaching Ability Based on BP Neural Network. 27-38 - Hao Li, Yuan Sun, Wei Song, Jie Qin:

Research on the Promotion of Tibetan New Words and Platform Design. 39-50 - Tianyue Chen

, Haiyan Gu
:
A Classification Model for Drug Addicts Based on Improved Random Forests Algorithm. 51-62 - Franck Seigneur Nininahazwe

:
Studying L-Diversity and K-Anonymity Over Datasets with Sensitive Fields. 63-73 - Bo Li, Ting Wen, Chao Hu, Bo Zhou:

Power System Transient Stability Prediction Algorithm Based on ReliefF and LSTM. 74-84 - Xin Qian, Zhen Yang, Shihui Wang, Yongfeng Huang

:
A No-Pairing Proxy Re-Encryption Scheme for Data Sharing in Untrusted Cloud. 85-96 - Cheng Yu

, Wanning Zhu, Yumeng Sun:
E-Sports Ban/Pick Prediction Based on Bi-LSTM Meta Learning Network. 97-105 - Hong Zhang, Hanshuo Wei, Youchen Shen, Hui Wang, Qiumei Pu:

Bottlenecks and Feasible Solutions of Data Field Clustering in Impact Factor, Time Resolution, Selecting Core Objects and Merging Process. 106-120 - Chunhui Deng, Huifang Deng, Youjun Liu:

Detection of Microblog Overlapping Community Based on Multidimensional Information and Edge Distance Matrix. 121-136 - Congrong Tang, Xin Xu, Haiyan Ding:

Research on Settlement Deformation of Asphalt Pavement Structure in Soft Soil Zone Based on Pavement Settlement Theory. 137-147 - Shang Li

, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. 148-158 - Weiwei Zhu, Hao Yuan, Liang Wang, Ming Wan, Xing Li, Jingbin Ren:

A Novel Noise Filter Based on Multiple Voting. 159-170 - Nan Qiao, Lihui Wang, Yuexin Zhang, Xinhua Tang:

Fuzzy Control Method for Path Tracking System of Combine Harvester. 171-181 - Ye Wang, Wanli Zuo, Ying Wang:

Research on Opinion Spam Detection by Time Series Anomaly Detection. 182-193 - Qingqing Chang, Weijiao Li, Jiamin Chen:

Application of Machine Learning Methods for Material Classification with Multi-energy X-Ray Transmission Images. 194-204 - Rui Wang, Donghao Gu, Zhaojing Wen, Kai Yang, Shaohui Liu, Feng Jiang:

Intra-class Classification of Architectural Styles Using Visualization of CNN. 205-216 - Miaomiao Lou, Zhenxia Yu, Feng Guo, Xiaoqiang Zheng:

MSE-Net: Pedestrian Attribute Recognition Using MLSC and SE-Blocks. 217-226 - Bing Ma, Xiaoru Wang, Heng Zhang, Fu Li, Jiawang Dan:

CBAM-GAN: Generative Adversarial Networks Based on Convolutional Block Attention Module. 227-236 - Yashen Wang, Yifeng Liu, Haiyong Xie:

A Novel Distributed Knowledge Reasoning Model. 237-247 - Yabin Xu, Chenxiao Cui, Ting Xu, Yangyang Li:

Research on Detection Method of Abnormal Traffic in SDN. 248-259 - Wentao Yu, Mianzhu Yi, Zhufeng Li:

Research on Constructing Technology of Implicit Hierarchical Topic Network Based on FP-Growth. 260-272 - Lei Song

, Chunguang Ma
, Peng Wu
, Yun Zhang
:
PPD-DL: Privacy-Preserving Decentralized Deep Learning. 273-282 - Chunhe Song, Tong Li, Xu Huang, Zhongfeng Wang, Peng Zeng

:
Towards Edge Computing Based Distributed Data Analytics Framework in Smart Grids. 283-292 - Rong Chen, Yangyang Li, Weiwei Fang:

Android Malware Identification Based on Traffic Analysis. 293-303 - Qi Jia

, Yonghong Xie, Cong Xu, Yue Zhou, Dezheng Zhang:
Unsupervised Traditional Chinese Medicine Text Segmentation Combined with Domain Dictionary. 304-314 - Yan Xu, Yan-jie Niu, Wei-gang Fang, Ting-Ting Zhang:

Research on the Efficiency and Application of Ship-Helicopter Cooperative Search. 315-326 - Jiangang Xie

, Guiying He, Xiaohong Xiao:
Cellular Neural Network Based Contour Detection for Seismic Image. 327-337 - Panyu Liu, Yangyang Li, Zhiping Cai, Shuhui Chen:

Discovering New Sensitive Words Based on Sensitive Information Categorization. 338-346 - Xiang Yu, Hui Lu, Le Wang, Dapeng Man:

A Dynamic Event Region Tracking Approach Based on Node Calibration. 347-357 - Xiang Yu, Le Wang, Shuang Chen, Yanbo Li:

A Graph Updating Method of Data Theft Detection Based on Rough Set. 358-367 - Yuanyuan Chen, Hui Lu, Jing Qiu, Le Wang:

A Tutorial of Graph Representation. 368-378 - Liling Zhao, Yi Lin, Zelin Zhang, Siqi Wang:

Ground-Based Cloud Images Recognition Based on GAN and PCANet. 379-390 - Yunhua Cao, Ying Fu, Guang Yang:

Sparse Representation-Based Radiomics in the Diagnosis of Thyroid Nodules. 391-401 - Yonghong Guo, Feng Jiang, Dongyang Zhao, Zhaojing Wen, Shaohui Liu:

Local Smoothing Constraint in Convolutional Neural Network for Image Denoising. 402-410 - Guang Yang, Yunhua Cao, Xiaoyang Xing, Min Wei:

Perceptual Loss Based Super-Resolution Reconstruction from Single Magnetic Resonance Imaging. 411-424 - Xiaofeng Dong, Dan Xiao, Zhipeng Yang:

DWI Fiber Tracking with Functional MRI of White Matter. 425-433 - Xi Liu, Dan Zhang:

Multi-objective Investment Decision Making Based on an Improved SPEA2 Algorithm. 434-443 - Junbo Wu, Ping Zhang, Zheng Zheng, Min Xia:

Power Load Forecasting Based on Adaptive Deep Long Short-Term Memory Network. 444-453 - Dan Xiao, Xiaofeng Dong, Zhipeng Yang:

Optimized White Matter Fiber Reconstruction Using Combination of Diffusion and Functional MRI. 454-462 - Yulian Li, Chao Luo, Hao Yang, Tao Wu:

Convolutional Neural Networks for Scene Image Recognition. 463-474 - Junyu Zhou, Guoming Luo, Chao Hu, Yiguo Chen:

A Classification Model of Power Equipment Defect Texts Based on Convolutional Neural Network. 475-487 - Tingting Yang, Shuwen Jia:

Research on Artificial Intelligence Technology in Computer Network Technology. 488-496 - Yabin Xu, Yongqing Jiao, Shujuan Chen, Yangyang Li:

Research on Detection Method of Unhealthy Message in Social Network. 497-508 - Huanrong Tang, Zhuosong Fu, Jian-quan Ouyang, Yunhua Song:

Image Authentication by Single Target Region Detection. 509-515 - Micheal Ernest Taylor, David Aboagye-Darko

:
Security Approaches and Crypto Algorithms in Mobile Cloud Storage Environment to Ensure Data Security. 516-524 - Yu Han, Guangjun Wen, Chu Chu, Jian Su

:
Probe-Polling: A Polling Based MAC Protocol for Energy Harvesting Wireless Sensor Networks. 525-536 - Wen Liu, Min-Yao Ma:

An Dynamic Protocol for the Quantum Secure Multi-party Summation Based On Commutative Encryption. 537-547 - Xiaoli He, Hong Jiang, Yu Song, Xiufeng Yang, He Xiao:

Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning. 548-560 - Pingping Yu, Yaning Nie, Ning Cao, Russell Higgs

:
Facial Expression Recognition Based on Complete Local Binary Pattern and Convolutional Neural Network. 561-572 - Shu-Wei Wang, Gang Zhou, Ji-Cang Lu, Feng-juan Zhang:

A Novel Malware Detection and Classification Method Based on Capsule Network. 573-584 - Qiang Cheng

, Aidong Deng, Jing Li, Yimeng Zhai:
Application of Gradient Boosting Decision Tree in Wind Turbine Drivetrain Recognition. 585-594 - Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang:

Implementation of MD5 Collision Attack in Program. 595-604 - Liwen Zheng, Xiaohan Helu, Mohan Li, Hui Lu:

Automatic Discovery Mechanism of Blockchain Nodes Based on the Kademlia Algorithm. 605-616 - Yifei Chen, Liling Zhao, Pengjiang Mei:

Monochromatic Mutual Nearest Neighbor Queries Over Uncertain Data. 617-629 - Jing Qiu, Yaqi Si, Yuhan Chai, Yan Liu, Dongwen Zhang, Hao Han, Le Wang:

Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse. 630-639 - Chuanyan Hao, Bo Jiang, Weiming Wu, Sijiang Liu, Liping He:

Efficient PatchMatch-Based Image Registration and Retargeting for Cartoon Animation. 640-651

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














