default search action
7th ICAIS 2022: Qinghai, China - Part III
- Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7
Encryption and Cybersecurity
- Tengteng Zhao, Wei Zhang, Xiaolong Li, Wenjing Wang, Xu Niu, Hui Guo:
Research on Offense and Defense of DDos Based on Evolutionary Game Theory. 3-15 - Bin Gu, Yunfeng Zou, Dongyang Cai, Huanyu Fan:
A Method of Data Distribution and Traceability Based on Blockchain. 16-27 - Yunan Zhu, Wei Che, Chao Shan, Shen Zhao:
Data Provenance in Large-Scale Distribution. 28-42 - Fujin Hou, Kun Zhou, Longbin Li, Yuan Tian, Jie Li, Jian Li:
A Vulnerability Detection Algorithm Based on Transformer Model. 43-55 - Xvhao Xiao, Xiaojun Li, Junping Yao, Shaochen Li, Bilal Anwar:
Research on Video Falsity Detection Based on Publisher and Publishing Environment Features. 56-70 - Hongtao Chen, Shuo Guo, Yanbo Shi, Weixuan Wei, Kaidi Wang:
Intrusion Detection Model Based on KNN-AE-DNN. 71-83 - Lu Kang, Qingbing Ji, Lvlin Ni, Jiaxin Li:
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information. 84-96 - Lan Guo, Yang Lu, Qing Miao, Guangao Zu, Zhongqi Wang:
An Efficient Certificate-Based Encryption Scheme Without Random Oracles. 97-107 - Huali Zhang, Bichen Che, Zhao Dou, Hengji Li, Yu Yang, Xiubo Chen, Jian Li:
A Rational Hierarchical Quantum State Sharing Protocol. 108-119 - Qiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia:
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing. 120-132 - Huailin Pu, Wunan Wan, Zhi Qin, Jinquan Zhang, Qiulu Jiang, Shibin Zhang, Jinyue Xia:
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios. 133-143 - Jing Shi, Mingyang Chen, Jiazheng Jiao:
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP. 144-156 - Xiaojun Gou, Shunhui Luo, Liang Xiao:
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network. 157-170 - Zhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia:
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures. 171-183 - Xiao Feng, Yuanzheng Wang, Tengfei Dong, Yingxia Liao, Yixin Zhang, Yi Lin:
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy. 184-193 - Hanyang Wang, Sirui Zhou, Honglei Li, Juan Hu, Xinran Du, Jinghui Zhou, Yunlong He, Fa Fu, Houqun Yang:
Deep Learning Network Intrusion Detection Based on Network Traffic. 194-207 - Yuanshen Li, Jieren Cheng, Hui Li, Yuming Yuan, Victor S. Sheng:
A Survey of Consensus Mechanism Based on Reputation Model. 208-221 - Meng Li:
A Survey on Ethereum Illicit Detection. 222-232 - Hongwei Ye, Xiaozhang Liu, Anli Yan, Lang Li, Xiulai Li:
Detect Adversarial Examples by Using Feature Autoencoder. 233-242 - Firew Tadele, Jianguo Wei, Kiyoshi Honda, Ruiteng Zhang, Wenhao Yang:
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese. 243-256 - Kaixin Zhang, Bing Huang, Yunfeng Wu, Chuchu Chai, Jiufa Zhang, Zhengjing Bao:
A WGAN-Based Method for Generating Malicious Domain Training Data. 257-270 - Wenting Zhou, Jie Liu, Bao Feng, Xiao Ye, Tianbing Zhang, Yuxiang Bian, Wenjie Liu:
A Data Reconciliation Model Based on QLDPC for Satellite-Ground Quantum Key Distribution Network. 271-279
Information Hiding
- Feng Wang, Hang Zhou, Han Fang, Weiming Zhang, Nenghai Yu:
Noise Simulation-Based Deep Optical Watermarking. 283-298 - Xuan Zhu, Qun Mo, Fengyong Li, Lei Zhang, Chuan Qin:
Behavior Steganography in Social Network via Secret Sharing. 299-308 - Yongjin Xian, Xingyuan Wang, Xiaoyu Wang, Qi Li, Bin Ma:
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication. 309-322 - Shiyi Chen, Yi Chen, Yanli Chen, Limengnan Zhou, Hanzhou Wu:
Robust Video Watermarking Using Normalized Zernike Moments. 323-336 - Xiaomei Liu, Bolin Zhang, Yuchen Wen, Xin Tang, Haibo Su:
An Improved Image Authentication Method Using QR Code Watermarking Approach. 337-348 - Bin Ma, Dongqi Li, Chunpeng Wang, Jian Li, Gang Li, Xinan Cui:
A Cyberspace Security Knowledge System Based on Knowledge Graph. 349-362 - Zuwei Tian, ZhiChen Gao:
Multi-carrier Steganography Algorithm Based on Executable Program. 363-372 - Ruopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu, Wei Lu, Weiqi Luo:
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption. 373-385 - Yuan Li, Jingbing Li, Chunyan Shao, Uzair Aslam Bhatti, Jixin Ma:
Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCT. 386-399 - Jiangqun Ni, Yichen Tong, Xianglei Hu, Wenkang Su, Xiangui Kang:
Spatial Image Steganography Using a Correlational Model. 400-411 - Yichen Tong, Jiangqun Ni, Wenkang Su, Xianglei Hu:
Spatial Image Steganography Incorporating Adjacent Dependencies. 412-423
IoT Security
- Kun Liang, Shijie Sun, Xiangdang Huang, Qiuling Yang, Neal Naixue Xiong:
A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks. 427-440 - Shaoyong Guo, Baoyu Xiang, Liandong Chen, Huifeng Yang, Dongxiao Yu:
Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City. 441-454 - Junjie Fu, Xiaoliang Wang, Yuzhen Liu, Qing Yang, Frank Jiang:
A Scheme to Improve the Security of IoT Communication. 455-468 - Qiang Tang, Linjiang Li, Jin Wang, Gwang-Jun Kim, Bin Tang:
Energy Efficiency Maximization for UAV and Electric Vehicle Assisted Mobile Edge Computing on the Edge Side. 469-481 - Weihua Li, Shaocheng Wu, Yue Ma, Tao Liu, Yali Bai, Jinxin Zuo:
Risk Assessment of Electric Energy Metering Automation System Based on Bayesian Network. 482-495 - Jing Zhou, Qian Wu, Jin Li, Jiaxin Li:
Dynamic Encryption of Power Internet of Things Data Based on National Secret Algorithm. 496-506 - Zaojian Dai, Nige Li, Yong Li, Guoquan Yuan, Xinjian Zhao, Ran Zhao, Fan Wu:
Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust. 507-519 - Yuheng Li, Yongzhong Li, Shipeng Zhang:
A New Transparent File Encryption Method Based on SM4 for Android Platform. 520-531 - Tao Wang, Pengyu Liu, Wenjing Zhang, Xiaowei Jia, Yanming Wang, Jiachun Yang:
Calibration of Multi-dimensional Air Pressure Sensor Based on LSTM. 532-543 - Jie Chen, Yaping Liu, Shuo Zhang, Bing Chen, Zhiyu Han:
A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning. 544-557 - Jianbin Liu, Sha Li, Zhe Zhang, Jie Zhang:
Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-Resonance. 558-571 - Peng Yan, Yao Xiang:
Distributed State Estimation for Topology Random Switching in Sensor Networks. 572-585 - Xuetao Bai, Shanshan Tu, Muhammad Waqas, Aiming Wu, Yihe Zhang, Yongjie Yang:
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage. 586-597 - Lu Chen, Xinjian Zhao, Ran Zhao, Guoquan Yuan, Song Zhang, Shi Chen, Fan Wu:
Mobile Internet Access Control Strategy Based on Trust Perception. 598-611 - Yong Li, Lu Chen, Nige Li, Ziang Lu, Zaojian Dai, Fan Wu:
Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework. 612-624 - Wei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu, Xian Wang, Xin He, Fan Wu:
Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm. 625-638 - Ji Lai, Shuo Li, Qigui Yao:
A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks. 639-650 - Pingping Yu, Zihui Xu, Xiaodong Zhao, Eugene Murray:
Simulation Research on Iron Core Air Gap of Energy-Taking Current Transformer (CT) Based on Ansys. 651-662 - Xiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu:
A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment. 663-677 - Ning Cao, Yansong Wang, Xiaofang Li, Rongning Qu, Yuxuan Wang, Zhikun Liang, Zijian Zhu, Chi Zhang, Dongjie Zhu:
MGDP: Architecture Design of Intelligent Detection Platform for Marine Garbage Based on Intelligent Internet of Things. 678-688 - Jingwen Fang, Qian Shao, Zhongyi Xu, Penghui Li, Baotong Chen, Haoliang Lan:
Dark Chain Detection Based on the IP Address. 689-699 - Zhonglu Zou, Hao Xu, Yin Yuan:
High-Reliability Mapping Algorithm Based on Network Topology Characteristics in Network Slicing Environment. 700-709 - Xiaowei Chen, HeFang Jiang, Shaocheng Wu, Tao Liu, Tong An, Zhongwei Xu, Man Zhang, Muhammad Shafiq:
New Generation Power System Security Protection Technology Based on Dynamic Defense. 710-721
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.