Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.] 9783030578800, 9783030578817

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artific

283 45 48MB

English Pages XXVII, 820 [841] Year 2020

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Front Matter ....Pages i-xxvii
Front Matter ....Pages 1-1
Green Crop Image Segmentation Based on Superpixel Blocks and Decision Tree (Bo Wang, Zhibin Zhang)....Pages 3-17
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process (Chen Yang, Guogen Wan, Peilin He, Yuanyuan Huang, Shibin Zhang)....Pages 18-29
Research on Chain of Evidence Based on Knowledge Graph (Yizhuo Liu, Jin Shi, Jin Han, Mingxin Lu)....Pages 30-41
Research on the Construction of Intelligent Catalog System for New Media Information Resources (Yiting Li, Jin Shi, Jin Han, Mingxin Lu, Yan Zhang)....Pages 42-52
Front Matter ....Pages 53-53
Construction of a Class of Four-Weight Linear Codes (Ee Duan, Xiaoni Du, Tianxin Wang, Jiawei Du)....Pages 55-64
Designs from the Narrow-Sense Primitive BCH Codes \(\mathcal {C}_{(q, q^m-1, \delta _3, 1)}\) (Fujun Zhang, Xiaoni Du, Jinxia Hu)....Pages 65-73
A Survey on Side-Channel Attacks of Strong PUF (Yan Li, Jianjing Shen, Wei Liu, Wei Zou)....Pages 74-85
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code (Fei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu)....Pages 86-97
Hiding Traces of Camera Anonymization by Poisson Blending (Hui Zeng, Anjie Peng, Xiangui Kang)....Pages 98-108
A Deep Learning Approach to Detection of Warping Forgery in Images (Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu)....Pages 109-118
The Course Design of Applied Talent Statistics Based on Fuzzy Control and Grey Measure Model (Li Wu, Jun Yang)....Pages 119-130
Reinforcement Learning-Based Resource Allocation in Edge Computing (Qianyu Xie, Xutao Yang, Laixin Chi, Xuejie Zhang, Jixian Zhang)....Pages 131-142
Fuzzy Multi-objective Requirements for NRP Based on Particle Swarm Optimization (Yachuan Zhang, Hao Li, Rongjing Bu, Chenming Song, Tao Li, Yan Kang et al.)....Pages 143-155
A Clustering Algorithm for Wireless Sensor Networks Using Geographic Distribution Information and Genetic Algorithms (Yu Song, Zhigui Liu, He Xiao)....Pages 156-165
Dual Residual Global Context Attention Network for Super-Resolution (Jingjun Zhou, Jingbing Li, Hui Li, Jing Liu, Qianning Dai, Saqib Ali Nawaz et al.)....Pages 166-178
A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences (Fengming Qin, Jingbing Li, Hui Li, Jing Liu, Saqib Ali Nawaz, Yanlin Liu)....Pages 179-190
Encryption Algorithm for TCP Session Hijacking (Minghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng)....Pages 191-202
A Covert Information Transmission Scheme Based on High Frequency Acoustic Wave Channel (Huiling Li, Yayi Zou, Wenjia Yi, Ziyi Ye, Yi Ma)....Pages 203-214
Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud (Zhijun Zhang, Zeng Shou, Zhiyan Ning, Dan Wang, Yingjian Gao, Kai Lu et al.)....Pages 215-224
Unsupervised Data Transmission Scheduling in Cloud Computing Environment (Gui Liu, Wei Zhou, Yongyong Dai, Haijiang Xu, Li Wang)....Pages 225-235
DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain (Mingda Liu, Yijuan Shi)....Pages 236-245
A Semi-quantum Group Signature Scheme Based on Bell States (Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng)....Pages 246-257
An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication (Peilin He, Yuanyuan Huang, Jialing Dai, Shibin Zhang)....Pages 258-266
A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of Things (Gongxin Shen)....Pages 267-279
Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States (Xue-Yang Li, Yan Chang, Shi-Bin Zhang)....Pages 280-288
A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States (Tao Zheng, Shi-Bin Zhang, Yan Chang, Lili Yan)....Pages 289-297
Quantum Key Distribution Protocol Based on GHZ Like State and Bell State (Ji-Zhong Wu, Lili Yan)....Pages 298-306
Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System (Jianchao Gan, Zhiwei Sheng, Shibin Zhang, Yang Zhao)....Pages 307-317
A Blockchain Based Distributed Storage System for Knowledge Graph Security (Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei)....Pages 318-327
A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average (Xizi Peng, Jinquan Zhang, Shibin Zhang)....Pages 328-340
An AHP/DEA Methodology for the Public Safety Evaluation (Li Mao, Naqin Zhou, Tong Zhang, Wei Du, Han Peng, Lina Zhu)....Pages 341-352
Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox Fuzzing (Chunlai Du, Shenghui Liu, Yanhui Guo, Lei Si, Tong Jin)....Pages 353-364
Summary of Research on Information Security Protection of Smart Grid (Li Xu, Yanbin Sun)....Pages 365-379
Framework Design of Environment Monitoring System Based on Machine Learning (Lingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han)....Pages 380-392
Compression Detection of Audio Waveforms Based on Stacked Autoencoders (Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, Zhenghui Liu)....Pages 393-404
A Deep Reinforcement Learning Framework for Vehicle Detection and Pose Estimation in 3D Point Clouds (Weipeng Wang, Huan Luo, Quan Zheng, Cheng Wang, Wenzhong Guo)....Pages 405-416
A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA (Ran Zhang, Min Liu, Qikun Zhang, Zengyu Cai)....Pages 417-427
Research on User Preference Film Recommendation Based on Attention Mechanism (Lei Zhu, Yufeng Liu, Wei Zhang, Kehua Yang)....Pages 428-439
Traffic Anomaly Detection for Data Communication Networks (Xiaoxiao Tang, Wencui Li, Jing Shen, Feng Qi, Shaoyong Guo)....Pages 440-450
Video Action Recognition Based on Hybrid Convolutional Network (Yanyan Song, Li Tan, Lina Zhou, Xinyue Lv, Zihao Ma)....Pages 451-462
Identification of Botany Terminology Based on Bert-BLSTM-CRF (Aziguli Wulamu, Ning Chen, Lijia Yang, Li Wang, Jiaxing Shi)....Pages 463-474
Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data (Yujiao Liu, Lin He, Duohui Li, Xiaozhao Luo, Guo Peng, Xiaoping Fan et al.)....Pages 475-486
Visual SLAM Location Methods Based on Complex Scenes: A Review (Hanxiao Zhang, Jiansheng Peng)....Pages 487-498
Improvement of Co-training Based Recommender System with Machine Learning (Wenpan Tan, Yong He, Bing Zhu)....Pages 499-509
Privacy Security Classification (PSC) Model for the Attributes of Social Network Users (Yao Xiao, Junguo Liao)....Pages 510-522
Clustering Analysis of Extreme Temperature Based on K-means Algorithm (Wu Zeng, YingXiang Jiang, ZhanXiong Huo, Kun Hu)....Pages 523-533
Network Topology Boundary Routing IP Identification for IP Geolocation (Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo)....Pages 534-544
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package (Bin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, Yunqing Shi)....Pages 545-556
A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment (Wei She, Jiansen Chen, Xianfeng He, Xiaoyu Yang, Xuhong Lu, Zhihao Gu et al.)....Pages 557-569
Multilayer Perceptron Based on Joint Training for Predicting Popularity (Wei She, Li Xu, Huibo Xu, Xiaoqing Zhang, Yue Hu, Zhao Tian)....Pages 570-580
A Medical Blockchain Privacy Protection Model Based on Mimicry Defense (Wei Liu, Yufei Peng, Zhao Tian, Yang Li, Wei She)....Pages 581-592
Securing Data Communication of Internet of Things in 5G Using Network Steganography (Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Junxiang Wang, Changlong Lu)....Pages 593-603
The Use of the Multi-objective Ant Colony Optimization Algorithm in Land Consolidation Project Site Selection (Hua Wang, Weiwei Li, Jiqiang Niu, Dianfeng Liu)....Pages 604-616
Image Content Location Privacy Preserving in Social Network Travel Image Sharing (Wang Xiang, Canji Yang, Lingling Jiao, Qingqi Pei)....Pages 617-628
A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform (Renjie Liang, Peijia Zheng, Yanmei Fang, Tingting Song)....Pages 629-641
A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System (Jinrun Guo, Xiehua Li, Jie Jiang)....Pages 642-652
Front Matter ....Pages 653-653
Point-to-Point Offline Authentication Consensus Algorithm in the Internet of Things (Xiao-Feng Du, Yue-Ming Lu, Dao-Qi Han)....Pages 655-663
Classification of Tourism English Talents Based on Relevant Features Mining and Information Fusion (Qin Miao, Li Wu, Jun Yang)....Pages 664-673
Research on Application of Big Data Combined with Probability Statistics in Training Applied Talents (Li Wu, Jun Yang)....Pages 674-685
Region Proposal for Line Insulator Based on the Improved Selective Search Algorithm (Shuqiang Guo, Baohai Yue, Qianlong Bai, Huanqiang Lin, Xinxin Zhou)....Pages 686-696
A Collaborative Filtering Algorithm Based on the User Characteristics and Time Windows (Dun Li, Cui Wang, Lun Li, Zhiyun Zheng)....Pages 697-709
MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement Mechanism (Kai Yang, Zhaowei Qu, Xiaoru Wang, Fu Li, Yueli Li, Dongbai Jia)....Pages 710-721
Front Matter ....Pages 723-723
Research on Psychological Counseling and Personality Analysis Algorithm Based on Speech Emotion (Zhaojin Hong, Chenyang Wei, Yuan Zhuang, Ying Wang, Yiting Wang, Li Zhao)....Pages 725-737
Underwater Image Enhancement Based on Color Balance and Edge Sharpening (Yan Zhou, Yibin Tang, Guanying Huo, Dabing Yu)....Pages 738-747
Stereo Matching Using Discriminative Feature-Oriented and Gradient-Constrained Dictionary Learning (Jiale Zhang, Yan Zhou, Qingwu Li, Huixing Sheng, Dabing Yu, Xinyue Chang)....Pages 748-759
Acoustic Emission Recognition Based on Spectrogram and Acoustic Features (Wei Wang, Weidong Liu, Jinming Liu)....Pages 760-768
Polyhedron Target Structure Information Extraction Method in Single Pixel Imaging System (Jin Zhang, Mengqiong Ge, Xiaoyu Shi, Zhuohao Weng, Jian Zhang)....Pages 769-775
Design and Implementation of Four-Meter Reading Sharing System Based on Blockchain (Baoyu Xiang, Zhuo Yu, Ke Xie, Shaoyong Guo, Meiling Dai, Sujie Shao)....Pages 776-785
Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity (Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, Shaoyong Guo)....Pages 786-797
Reliability Improvement Algorithm of Power Communication Network Based on Network Fault Characteristics (Ruide Li, Feng Wang, XinXin Zhang, Jiajun Chen, Jie Tong)....Pages 798-804
Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal Networks (Xuehan Zhang, Xiaojuan Wang, Lianping Zhang)....Pages 805-814
Back Matter ....Pages 815-820

Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part II [1st ed.]
 9783030578800, 9783030578817

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers