


default search action
7th ICAIS 2022: Qinghai, China - Part II
- Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7
Artificial Intelligence
- Zhengran Wang, Tao Wu, Yifan Wang, Yuke Li:
Remface: Study on Mini-sized Mobilenetv2 and Retinaface. 3-15 - Shuwen Jia, Tingting Yang, Zhiyong Sui:
Research on Application of Principal Component Analysis in 3d Video Dimension Reduction. 16-26 - Jiayu Bai, Xiaoyu Li, Shijie Hu, Chenjing Su, Hang Lei, Weizhong Qian, Cong Zhang, Yutra Abel Zenebe:
Single Platform Passive Location Algorithm Using Position Information and Azimuth. 27-37 - Xiaoyu Lin, Chunjie Cao, Longjuan Wang, Zhiyuan Liu, Mengqian Li, Haiying Ma:
DCAL: A New Method for Defending Against Adversarial Examples. 38-50 - Yuanxin Wang, Deyu Yuan, Yuyan Meng, Meng Ding:
Anomaly Detection Model for Key Places Based on Improved YOLOv5. 51-61 - Juncun Wei, Jiancheng Zou, Jiaxin Li, Zhengzheng Li, Xin Yang:
Non-contact Heart Rate Detection Based on Fusion Method of Visible Images and Infrared Images. 62-75 - Keyu Wang, Weizhong Qian, Xi Yang, Xiaohu Li, Caiqiong Yang, Shuqin Yue, Xiaoyu Li:
Intelligent Data Analysis System Based on Edge Computing. 76-89 - Qinghai Li
, Hao Wu, Weizhong Qian, Xiaoyu Li, Qinsheng Zhu, Shan Yang:
Portfolio Optimization Based on Quantum HHL Algorithm. 90-99 - Zhaoying Liu, Junran He, Ting Zhang, Ran Tang, Yujian Li, Muhammad Waqas
:
Infrared Ship Video Target Tracking Based on Cross-Connection and Spatial Transformer Network. 100-114 - Xiong Bo, Feng Wenlong, Jin Zhang:
Whale Optimization Algorithm Based on Artificial Fish Swarm Algorithm. 115-128 - Mengxing Huang, Jinjin Ye, Shenghan Zhu, Yang Chen, Yuanyuan Wu, Di Wu, Siling Feng, Feng Shu:
An Underwater Image Color Correction Algorithm Based on Underwater Scene Prior and Residual Network. 129-139 - Xin Zheng, Tiantian Zhou, Yintong Wang, Shuo Li:
An Improved TextRank-Based Method for Chinese Text Summarization. 140-149 - Kuntharrgyal Khysru, Yangzhuoma Qie, Haiqiang Shi, Qilong Sun, Jianguo Wei
:
Lhasa Dialect Recognition of Different Phonemes Based on TDNN Method. 150-160 - Youjun Feng, Jinman Luo, Zhaocong Wen, Zirui Yao:
A Power Grid Equipment Fault Prediction Model Based on Faster RCNN and Video Streaming. 161-172 - Liyuan Liu, Jinman Luo, Piao Liu, Ruijing Ye:
A Wireless Transmission Model of Power Grid Equipment State Based on Compressed Sensing. 173-182 - Changcheng Xiao, Xi Wu:
Multi-sequence Satellite Image Cloud Removal Based on Dual Residual Network. 183-193 - Guowei Fan, Tao Wu, Yamei Lei:
Research on Rumor Detection Based on RoBERTa-BiGRU Model. 194-204 - Shuoyu Dong, Xiaozhang Liu, Xiulai Li, GengQuan Xie, Xin Tang:
A Novel Pruning Method Based on Correlation Applied in Full-Connection Layer Neurons. 205-215
Big Data
- Rui Ban, Hongding Wang, Yufei Hao, Salem Osman:
Research and Application of Carrier User Viscosity Evaluation Method Based on CNN Algorithm Model. 219-229 - Yannan Qian:
A Non-autonom SIR Model in Epidemiology. 230-238 - Na Liu, Dandan Chen, Haijie Huang, Xiangdang Huang, Qiuling Yang, Neal N. Xiong:
Anomaly Detection of Underwater Sensor Data Based on Temporal and Spatial Correlation. 239-252 - Xiaoyu Chen, Shiqi Zhang, Xiaowen Fan, Huan Liu
, Yacong Li:
Knowledge Sharing Behavior for Academic Users of Social Media and Its Empirical Research. 253-263 - Hang He, Haining Ding, Shuyue Liu, Yao Li, Jinghui Zhang:
Airport Cargo Volume Forecasting Based on Equal Dimensional and New Information Grey Markov Model. 264-276 - Guangliang Gao, Aiqin Sun, Haiyan Gu:
Community Detection Based on Topology and Node Features in Social Networks. 277-288 - Bo Zhang, Bin Lv, Liang Tang, Hongtao Qi, Yuanjie Zheng, Pin Wang, Shikang Zhang, Xiaowei Liang, Jinyue Xia:
Development of Intelligent Integrated Energy System Based on MVC. 289-299 - Hai Tang, Huan Zhang:
Study on IoT Big Data Direction in Civil Aviation. 300-309 - Yun Wu, Chen Jin:
Evaluation of the Impact of Haze with Uncertain Probabilistic Linguistic Term Sets. 310-320 - Zuyan Li, Guang Sun:
Research on the Application of Ant Colony Clustering in Commodity Classification. 321-332 - Jiang Wu, Jianjun Zhang, Wenwu Tan, Yifu Sheng, Sirao Zhang, Liangqing Meng, Xiongwei Zou, Haijun Lin, Guang Sun, Peng Guo:
Prediction of the Total Phosphorus Index Based on ARIMA. 333-347 - Ruhao Ma, Haiwen Du, Fansheng Meng, Dongjie Zhu:
Research on Regional Development Efficiency and Influencing Factors of China's Ocean Energy Equipment Manufacturing. 348-359 - Lihao Liu
, Zhao Qiu, Jiale Lin, Mengyang Li, Qianfan Liu
, Hancheng Huang:
EAC-GAN: Semi-supervised Image Enhancement Technology to Improve CNN Classification Performance. 360-372 - Huan Jin, Mingfang Jiang
, Si Chen, Yin Jiang, Xiyuan Liu, ZhiChen Gao:
A Comprehensive Utilization Model of Informationization Teaching Resources. 373-385 - Yundong Sun
, Yuchen Tian, Xiaofang Li, Rongning Qu, Lang Cheng, Shitao Peng, Jianna Jia, Dongjie Zhu, Zhaoshuo Tian:
SRPAIS: Spectral Matching Algorithm Based on Raman Peak Alignment and Intensity Selection. 386-399 - Siyao An, Tianhao Wang, Lirui Wang, Mingjun Zhong
, Baili Zhang
:
A Semantic Representation Scheme for Medical Dispute Judgment Documents Based on Elements Extraction. 400-414 - Tao Xu, Maoyang Zou
, Zhongyue Fan, Yuxin Chen, Yiran Zhang, Pan Min:
Study on the Portrait of Online Learners' Personality and Attitude. 415-424
Cloud Computing and Security
- Gui Liu, Wei Xia, Haijiang Xu, Yongyong Dai, Wansu Chen:
Research on Resilience Cloud Environment Capability Evaluation System Under Complex Cyber Threat. 427-437 - Junyi Lu
, Yong Hu, Xiaoyu Li, Qin-Sheng Zhu, Hao Wu, Shan Yang:
A New Stock Forecasting Model by Hidden Quantum Markov Models. 438-447 - Jiangyuan Yao
, Shengjun Lin
, Chunxiang Xu
, Min Jing, Deshun Li
, Minrui Wang, Xingcan Cao:
Review of Detection and Avoidance of Interference Among Multiple Applications in Software-Defined Networks. 448-459 - Chi Zhang, Cheng Qian, Jiaxing Qu, Zhou Fang, Yinggang Sun, Chao Ma:
Intelligent Optimization Method of Microservice Redeployment for Communication Power Supply and Computer Room Environment Monitoring Platform. 460-472 - Jiangyuan Yao
, Minrui Wang, Weiping Yang, Shuhua Weng, Zheng Jiang, Min Jing, Deshun Li
, Xingcan Cao:
Test Traffic Control Based on REST API for Software-Defined Networking. 473-486 - Minna Xia, Lei Xiang, Ying Wang, Yang Liu:
A Study of Heterogeneous Database Integration Based on Web Service and XML. 487-499 - Jiangyuan Yao
, Chunxiang Xu
, Deshun Li
, Shengjun Lin
, Xingcan Cao:
Formal Verification of Security Protocols: ProVerif and Extensions. 500-512 - Huicong Zeng, Zhiwei Cai, Peijia Zheng, Hongmei Liu, Weiqi Luo:
Secure Evaluation of Discrete Sine Transform in Homomorphic Encrypted Domain. 513-525 - Xiongjie Fang, Ruopan Lai, Zhipeng Zhou, Ziyang Chen, Peijia Zheng, Wei Lu:
Efficient and Secure Outsourced Image Watermarking in Cloud Computing. 526-537 - Weiyu Shi, Xiaoqian Liu:
Research on SQL Injection Defense Technology Based on Deep Learning. 538-549 - Liandong Chen, Rui Xin, Kai Cheng, Jing Lin, Shaoyong Guo
:
Efficient Management and Analysis Mechanism of Power Internet of Things Resources Based on Blockchain. 550-559 - Deshun Li
, Ganghua Cao, Lu Xiao, Jiangyuan Yao
, Xingcan Cao:
Research Progress and Trend of Coflow Time-Optimal Scheduling in Data Center Network. 560-572 - Hao Guo, Jieren Cheng, Janghao Wang, Tao Chen, Yuming Yuan, Hui Li, Victor S. Sheng:
IoT Data Blockchain-Based Transaction Model Using Zero-Knowledge Proofs and Proxy Re-encryption. 573-586 - Ming Zhuo
, Peng Yang
, Junyi Chen
, Leyuan Liu
, Chenrui Liu:
Adaptive Optimization of Dynamic Heterogeneous Network Topologies: A Simulated Annealing Methodology. 587-612 - Yuhang Zhang, Jie Xu, Chengyi Gao, Guanghui Su, Fan Yang, Shuang Zhou, Jiaying Li, Yuren Feng:
An SIR Model with Two Kinds of Local Information Based Behavioral Responses in Complex Network. 613-623
Multimedia Forensics
- Wei Liu
, Jiakang Li, Chunyu Wei, Meng Sun
, Xiongwei Zhang, Yongqiang Li:
A Novel Method to Evaluate the Privacy Protection in Speaker Anonymization. 627-636 - Wenxuan Wu, Wenbo Zhou, Weiming Zhang, Han Fang, Nenghai Yu:
Capturing the Lighting Inconsistency for Deepfake Detection. 637-647 - Liangpei Hu, Yuanman Li, Jiaxiang You, Rongqin Liang
, Xia Li:
An Edge-Aware Transformer Framework for Image Inpainting Detection. 648-660 - Wu Meng:
Research on Cooperative Formation Motion Control Method of Multi Ground Unmanned Platforms. 661-669 - Guangjun Liang, Zhen Jia, Xueli Ni, Xiangmin Guo, Ling-Ling Xia:
Research on UAV Forensics and Its Key Technologies. 670-679

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.