


default search action
SAI 2020: London, UK
- Kohei Arai, Supriya Kapoor, Rahul Bhatia:
Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3. Advances in Intelligent Systems and Computing 1230, Springer 2020, ISBN 978-3-030-52242-1 - Kálmán Szentannai, Jalal Al-Afandi, András Horváth:
Preventing Neural Network Weight Stealing via Network Obfuscation. 1-11 - Raheleh Jafari, Sina Razvarz, Alexander E. Gegov:
Applications of Z-Numbers and Neural Networks in Engineering. 12-25 - Jan Sher Khan
, Ahsen Tahir, Jawad Ahmad, Syed Aziz Shah, Qammer H. Abbasi, Gordon Russell, William J. Buchanan
:
5G-FOG: Freezing of Gait Identification in Multi-class Softmax Neural Network Exploiting 5G Spectrum. 26-36 - Leon René Sütfeld, Flemming Brieger, Holger Finger, Sonja Füllhase, Gordon Pipa:
Adaptive Blending Units: Trainable Activation Functions for Deep Neural Networks. 37-50 - Mahmoud Zaki Iskandarani
:
Application of Neural Networks to Characterization of Chemical Sensors. 51-60 - Owolafe Otasowie
:
Application of Machine Learning in Deception Detection. 61-76 - Hossein Bonakdari, Bahram Gharabaghi, Isa Ebtehaj, Ali Sharifi
:
A New Approach to Estimate the Discharge Coefficient in Sharp-Crested Rectangular Side Orifices Using Gene Expression Programming. 77-96 - Sandra Mae W. Famador, Tardi Tjahjadi:
DiaTTroD: A Logical Agent Diagnostic Test for Tropical Diseases. 97-115 - Abduljalil Mohamed, Amer Mohamed, Yasir Mustafa:
A Weighted Combination Method of Multiple K-Nearest Neighbor Classifiers for EEG-Based Cognitive Task Classification. 116-131 - Abdelfettah Miraoui, Lotfi Merad Sidi, Mohamed Meriah:
Detection and Localization of Breast Tumor in 2D Using Microwave Imaging. 132-141 - Osama Abuomar, Folly Patterson, R. K. Prabhu:
Regression Analysis of Brain Biomechanics Under Uniaxial Deformation. 142-149 - Nandana Prabhu, Deepak Bhoir, Nita Shanbhag, Uma Rao:
Exudate-Based Classification for Detection of Severity of Diabetic Macula Edema. 150-160 - Vibhu Garg, Madhur Bansal, A. Sanjana, Mayank Dave
:
Analysis and Detection of Brain Tumor Using U-Net-Based Deep Learning. 161-173 - Krzysztof Michalik
, Katarzyna Kucharska
:
Implementation of Deep Neural Networks in Facial Emotion Perception in Patients Suffering from Depressive Disorder: Promising Tool in the Diagnostic Process and Treatment Evaluation. 174-184 - Saleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail:
Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata Transform. 185-197 - Hosam Alamleh
, Ali Abdullah S. AlQahtani, Dalia Alamleh:
Implementing Variable Power Transmission Patterns for Authentication Purposes. 198-203 - Anthony Demeri, William Diehl, Ahmad Salman
:
SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. 204-223 - Robert Heras, Alexander Perez-Pons
:
Malware Analysis with Machine Learning for Evaluating the Integrity of Mission Critical Devices. 224-243 - Ovidiu Negoita, Mihai Carabas:
Enhanced Security Using Elasticsearch and Machine Learning. 244-254 - Mohammad Amanul Islam:
Memory Incentive Provenance (MIP) to Secure the Wireless Sensor Data Stream. 255-277 - Muhammed Jassem Al-Muhammed, Ahmad A. Al-Daraiseh
, Raed Abu Zitar
:
Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques. 278-301 - Bertrand Cambou, Mohammad Mohammadi, Christopher Robert Philabaum, Duane Booher:
Statistical Analysis to Optimize the Generation of Cryptographic Keys from Physical Unclonable Functions. 302-321 - Raghda Fawzey Hriez, Ali Hadi, Jalal Omer Atoum:
Towards an Intelligent Intrusion Detection System: A Proposed Framework. 322-335 - Yuri Bobbert, Nese Ozkanli:
LockChain Technology as One Source of Truth for Cyber, Information Security and Privacy. 336-347 - Julius Ceasar Aguma, Bruce M. McMillin, Amelia Regan
:
Introduction of a Hybrid Monitor for Cyber-Physical Systems. 348-360 - Sareh Assiri, Bertrand Cambou, Duane Booher, Mohammad Mohammadinodoushan
:
Software Implementation of a SRAM PUF-Based Password Manager. 361-379 - Sunday Alabi, Martin White
, Natalia Beloff:
Contactless Palm Vein Authentication Security Technique for Better Adoption of e-Commerce in Developing Countries. 380-390 - Mouhammd Al-Kasassbeh, Mohammad Ali Abbadi, Ahmed M. Al-Bustanji:
LightGBM Algorithm for Malware Detection. 391-403 - Jakub Klemsa, Martin Novotný
:
Exploiting Linearity in White-Box AES with Differential Computation Analysis. 404-419 - Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. 420-430 - Ahmad Ghafarian, Deniz Keskin:
Windows 10 Hibernation File Forensics. 431-445 - Pranieth Chandrasekara, Hasini Abeywardana, Sammani Rajapaksha, Sanjeevan Parameshwaran, Kavinga Yapa Abeywardana
:
Behavior and Biometrics Based Masquerade Detection Mobile Application. 446-458 - Ammar S. Salman, Odai S. Salman:
Spoofed/Unintentional Fingerprint Detection Using Behavioral Biometric Features. 459-470 - Amari N. Lewis
, Amelia C. Regan
:
Enabling Paratransit and TNC Services with Blockchain Based Smart Contracts. 471-481 - Neda Shabani, Arslan Munir
:
A Review of Cyber Security Issues in Hospitality Industry. 482-493 - Yuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri:
Extended Protocol Using Keyless Encryption Based on Memristors. 494-510 - Jason Jaskolka
:
Recommendations for Effective Security Assurance of Software-Dependent Systems. 511-531 - Manisha
, Nitin Kumar:
On Generating Cancelable Biometric Templates Using Visual Secret Sharing. 532-544 - Naresh Kumar Giri, Arslan Munir
, Joonho Kong:
An Integrated Safe and Secure Approach for Authentication and Secret Key Establishment in Automotive Cyber-Physical Systems. 545-559 - Sergei Koltcov, Vera Ignatenko, Sergei Pashakhin
:
How Many Clusters? An Entropic Approach to Hierarchical Cluster Analysis. 560-569 - Yojiro Harie
, Katsumi Wasaki
:
Analysis of Structural Liveness and Boundedness in Weighted Free-Choice Net Based on Circuit Flow Values. 570-580 - James Spooner
, Madeline Cheah, Vasile Palade, Stratis Kanarachos
, Alireza Daneshkhah
:
Classification of a Pedestrian's Behaviour Using Dual Deep Neural Networks. 581-597 - Eva Sciacca, Fabio Vitello, Ugo Becciani, Cristobal Bordiu
, Filomena Bufano, Antonio Calanducci, Alessandro Costa, Mario Raciti
, Simone Riggi:
Towards Porting Astrophysics Visual Analytics Services in the European Open Science Cloud. 598-606 - Ahmed Imran:
Computer Graphics-Based Analysis of Anterior Cruciate Ligament in a Partially Replaced Knee. 607-612 - Mihai Caramihai
, Irina Severin
, Ana Maria Bogatu:
An Assessment Algorithm for Evaluating Students Satisfaction in e-Learning Environments: A Case Study. 613-621 - Yevgenia A. Daineko, Nurzhan T. Duzbayev
, K. B. Kozhaly, Madina T. Ipalakova
, Zh. M. Bekaulova
, N. Zh. Nalgozhina, R. N. Sharshova:
The Use of New Technologies in the Organization of the Educational Process. 622-627 - Milena Karova, Ivaylo Penev, Daniel Marinov:
Design and Implementation of Cryptocurrency Price Prediction System. 628-643 - Boris Morose, Sabina Aledort, Gal Zaidman:
Strategic Behavior Discovery of Multi-agent Systems Based on Deep Learning Technique. 644-651 - Nikita A. Andriyanov
:
Development of Prediction Methods for Taxi Order Service on the Basis of Intellectual Data Analysis. 652-664 - Rosemary Papa, Karen Moran Jackson, Ric Brown, David Jackson:
Discourse Analysis on Learning Theories and AI. 665-672 - Charles Roberto Telles
:
False Asymptotic Instability Behavior at Iterated Functions with Lyapunov Stability in Nonlinear Time Series. 673-693 - Sipovskaya Yana Ivanovna:
The Influence of Methodological Tools on the Diagnosed Level of Intellectual Competence in Older Adolescents. 694-701 - Ali K. Abed, Rami Qahwaji:
The Automated Solar Activity Prediction System (ASAP) Update Based on Optimization of a Machine Learning Approach. 702-717

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.