標題: Titlebook: Artificial Intelligence and Security; 5th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2019 Springer Nat [打印本頁] 作者: 誓約 時間: 2025-3-21 20:04
書目名稱Artificial Intelligence and Security影響因子(影響力)
書目名稱Artificial Intelligence and Security影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Security被引頻次
書目名稱Artificial Intelligence and Security被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Security年度引用
書目名稱Artificial Intelligence and Security年度引用學(xué)科排名
書目名稱Artificial Intelligence and Security讀者反饋
書目名稱Artificial Intelligence and Security讀者反饋學(xué)科排名
作者: Throttle 時間: 2025-3-21 20:41
Donna C. Stidolph,James Whiteheadon test is designed on the Windows platform. The results and conclusion provide some reference for the future research of “cloud medicine” technology and give some advise on the application of homomorphic encryption technology.作者: organic-matrix 時間: 2025-3-22 00:34
Visual verification of safety and liveness,e detailed mathematical analysis, the protocol has functioned well not only on improving the efficiency of information transmission, throughput and link utilization in the quantum network, but also on enhancing reliability and anti-eavesdropping attacks.作者: 貧困 時間: 2025-3-22 05:14
https://doi.org/10.1007/978-3-8348-2217-8ud and ensure data security. If the blockchain is combined with the traceability of agricultural products, the safety of traceable data and the tampering of data can be guaranteed to the greatest extent, the producer’s production behavior can be regulated, and consumers’ confidence in food quality c作者: 弄污 時間: 2025-3-22 10:05
FMEA - Einführung und Moderationtance. The experimental results show that the proposed algorithm can effectively evaluate the reliability of landmarks: among the experimental results on 8000 network landmarks in 4 cities in the United States, compared with the typical database query-based landmark obtaining, the city-level accurac作者: AUGER 時間: 2025-3-22 13:57
Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server the whole PCI-E physical link are measured using High-Speed Digital Oscilloscope and BERT (Bit Error Ratio Tester) Scope. Prospective results are achieved and robustness of the server system is evaluated.作者: 危險 時間: 2025-3-22 17:14
Research on Telemedical Monitoring System Based on Homomorphic Encryptionon test is designed on the Windows platform. The results and conclusion provide some reference for the future research of “cloud medicine” technology and give some advise on the application of homomorphic encryption technology.作者: Institution 時間: 2025-3-22 21:39 作者: Acupressure 時間: 2025-3-23 04:40
Application of Blockchain Technology in Agricultural Product Traceability Systemud and ensure data security. If the blockchain is combined with the traceability of agricultural products, the safety of traceable data and the tampering of data can be guaranteed to the greatest extent, the producer’s production behavior can be regulated, and consumers’ confidence in food quality c作者: 有節(jié)制 時間: 2025-3-23 05:49
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurementtance. The experimental results show that the proposed algorithm can effectively evaluate the reliability of landmarks: among the experimental results on 8000 network landmarks in 4 cities in the United States, compared with the typical database query-based landmark obtaining, the city-level accurac作者: 小淡水魚 時間: 2025-3-23 10:20 作者: Cognizance 時間: 2025-3-23 15:31 作者: 整頓 時間: 2025-3-23 21:59
Equipment Fault Detection Based on SENCForestand classify it. Existing fault detection methods are only suitable for detecting and classifying known faults, and cannot detect and classify new emerging unknown faults efficiently. By using the anomaly detection principle of the iForest, this paper proposes an effective classification method for 作者: 雄偉 時間: 2025-3-23 23:14 作者: Common-Migraine 時間: 2025-3-24 04:41 作者: Offensive 時間: 2025-3-24 09:06
Anti-noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Modeln the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti-noise quantum network coding protocol is proposed in this paper. The new protocol encodes and transmits classical information by virtue of Bell states. It can guarantee the transparency of the inte作者: 懶惰人民 時間: 2025-3-24 14:28 作者: Verify 時間: 2025-3-24 17:17
Application of Blockchain Technology in Agricultural Product Traceability Systemsociety and the government; the original agricultural product traceability system is too difficult to tamper with data due to the excessive concentration of data storage, it faces the challenge of fraudulent data tracing, and it is difficult for consumers to trust such traceability results. Moreover作者: 防水 時間: 2025-3-24 22:28
Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curvetion is also been given a lot of attention. In this paper, we propose a session key agreement scheme bases on elliptic curve for machine-to-machine communication in cyber-physical system. At first, it is easy to calculate, so that it could reduce the occupations of resources; Second, the messages ar作者: 航海太平洋 時間: 2025-3-24 23:42 作者: 使成核 時間: 2025-3-25 06:22
An Improved Steganalysis Method Using Feature Combinationsrt is obtained by employing an existing feature extraction method on a suspicious image. With a content-correlative operation, differences of the image features are enlarge between the cover and the stego. The second part is obtained by employing the same feature extraction method on the obtained im作者: 拍下盜公款 時間: 2025-3-25 11:04
Research on Application of OFD Technology in Secure Electronic Billshe research on the security of electronic bill documents has become more and more important. This paper proposes an electronic document generation method based on OFD (Open Fixed-layout Document) technology, and combines traditional electronic seal, digital signature and multiple digital watermarkin作者: 瑣事 時間: 2025-3-25 15:30
Review on Text Watermarking Resistant to Print-Scan, Screen-Shootingceable form of transmission. Whether it is the copyright protection of book authors or the prevention of the leakage of confidential documents, there is an urgent need for text watermarking resistant to print-scan attacks. Due to the complex influence of print-scan process and the particularity of t作者: BRAVE 時間: 2025-3-25 19:36
A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Imagepressed image in encrypted domain. In this paper, a reversible data hiding scheme based on encrypted VQ-compressed image is proposed. On the content owner side, codebook is supposed to be reorganized firstly, and codewords in codebook are then grouped into codeword pair after reorganization. After t作者: 固執(zhí)點好 時間: 2025-3-25 23:21
An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurementouter host names in network-developed areas often imply geographical location information, this paper proposes a city-level landmark evaluation algorithm based on router identification. Firstly, router host name matching rules are formulated by using plenty of network topology information obtained t作者: prolate 時間: 2025-3-26 02:04
Multiplicative Linear Secret Sharing Without Interactionta. Though addition and constant multiplication are extremely easy thanks to the linear operation over shared secrets, how to efficiently multiply multiple shares remains an open problem. In this paper, we devised a non-interactive multiplication scheme based on Shamir’s secret sharing without param作者: Coronary-Spasm 時間: 2025-3-26 06:00
https://doi.org/10.1007/978-3-030-24271-8artificial intelligence; authentication; computer crime; cryptography; data security; digital watermarkin作者: 拋射物 時間: 2025-3-26 09:50 作者: paroxysm 時間: 2025-3-26 14:02 作者: –scent 時間: 2025-3-26 20:39
Alexandre Mota,Paulo Borba,Augusto Sampaioroblem of resource allocation between an InP and multiple mobile virtual network operators (MVNOs) appear. Several existing works only considered how to assign the resources to one MVNO without sharing with other MVNOs. However, shareness plays an important role in maximizing utilization of resource作者: nerve-sparing 時間: 2025-3-26 22:51 作者: flaunt 時間: 2025-3-27 01:18 作者: 意外 時間: 2025-3-27 07:08
Visual verification of safety and liveness,runcated Wirtinger Flow (TWF), where the updating can be regarded as stochastic gradient descent, we present the Accelerated Wirtinger Flow (AWF), which updates the iterative process with accelerated steepest descent. WF algorithm solves the problem by two steps: (a) initialization signal with trunc作者: 罐里有戒指 時間: 2025-3-27 09:58
Visual verification of safety and liveness,n the butterfly network model and the characteristics of easy preparation of Bell states, a novel anti-noise quantum network coding protocol is proposed in this paper. The new protocol encodes and transmits classical information by virtue of Bell states. It can guarantee the transparency of the inte作者: ELATE 時間: 2025-3-27 16:45 作者: follicle 時間: 2025-3-27 17:51
https://doi.org/10.1007/978-3-8348-2217-8society and the government; the original agricultural product traceability system is too difficult to tamper with data due to the excessive concentration of data storage, it faces the challenge of fraudulent data tracing, and it is difficult for consumers to trust such traceability results. Moreover作者: AVID 時間: 2025-3-27 23:15
FMEA Using Fuzzy Digraph and Matrix Approachtion is also been given a lot of attention. In this paper, we propose a session key agreement scheme bases on elliptic curve for machine-to-machine communication in cyber-physical system. At first, it is easy to calculate, so that it could reduce the occupations of resources; Second, the messages ar作者: 小隔間 時間: 2025-3-28 03:42
FMEA Using Fuzzy Digraph and Matrix Approachor of .. We determine exact values of the linear complexity of the new sequences under the assumption ., which are larger than half of the period. For cryptographic purpose, the linear complexities of the sequences in this paper are of desired values.作者: FRAX-tool 時間: 2025-3-28 09:25 作者: 圓木可阻礙 時間: 2025-3-28 12:45 作者: 同來核對 時間: 2025-3-28 15:27
FMEA Using Fuzzy Digraph and Matrix Approachceable form of transmission. Whether it is the copyright protection of book authors or the prevention of the leakage of confidential documents, there is an urgent need for text watermarking resistant to print-scan attacks. Due to the complex influence of print-scan process and the particularity of t作者: 傳授知識 時間: 2025-3-28 22:11
https://doi.org/10.1007/978-981-10-1466-6pressed image in encrypted domain. In this paper, a reversible data hiding scheme based on encrypted VQ-compressed image is proposed. On the content owner side, codebook is supposed to be reorganized firstly, and codewords in codebook are then grouped into codeword pair after reorganization. After t作者: antenna 時間: 2025-3-29 00:48
FMEA - Einführung und Moderationouter host names in network-developed areas often imply geographical location information, this paper proposes a city-level landmark evaluation algorithm based on router identification. Firstly, router host name matching rules are formulated by using plenty of network topology information obtained t作者: 束縛 時間: 2025-3-29 03:24 作者: 要求比…更好 時間: 2025-3-29 09:09 作者: 結(jié)束 時間: 2025-3-29 11:29
Artificial Intelligence and Security978-3-030-24271-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 易發(fā)怒 時間: 2025-3-29 17:30 作者: Affluence 時間: 2025-3-29 22:43 作者: 娘娘腔 時間: 2025-3-30 02:58 作者: 大約冬季 時間: 2025-3-30 07:38
An Improved Steganalysis Method Using Feature Combinationsage. The two parts are combined together to form the new feature set. With the new feature set, the modifications made by steganography can be recognized more efficiently. Experimental results show that the detection accuracy of existing feature extraction methods is increased using the proposed method.作者: prostatitis 時間: 2025-3-30 09:00 作者: GNAW 時間: 2025-3-30 13:57
Conference proceedings 20199 submissions. The papers were organized in topical sections as follows:..Part I: cloud computing;. Part II: artificial intelligence; big data; and cloud computing and security;. Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;. Part IV: encryption and cybersecurity..作者: modish 時間: 2025-3-30 18:04
0302-9743 igence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS..The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selecte作者: 無節(jié)奏 時間: 2025-3-30 23:57
Lecture Notes in Computer Sciencefaults. Then by setting reasonable partition boundaries according to the distribution characteristics of known anomaly data, we achieve the classification for unknown faults. Real data based simulations show the feasibility and effectiveness of our proposed classification method.作者: 繞著哥哥問 時間: 2025-3-31 01:42