E-Books durchsuchen

2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications [2022]

1
Reversible Data Hiding in Encrypted Image Based on MSB Inversion
2
Comments on the Visual Binary QR Code
3
NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services
4
Efficient Steganographic Method Based on Modulo Cube
5
A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding
6
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
7
A Prototype Design on Privacy-Preserving Outsourced Bayesian Network
8
The Security Challenge of Consumers’ Mobile Payment
9
Research on the Analysis of Key Attack Modes in a Wireless Environment
10
Default Risk Prediction Using Random Forest and XGBoosting Classifier
11
An RFID Ownership Transfer Based on Multiple Owners with Different Weights
12
Comments on a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-Agreement
13
A LWE-Based Receiver-Deniable Encryption Scheme
14
Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems
15
Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion Detection
16
An Active User-Side Detector for Evil Twins
17
Evaluation of Recurrent Neural Network Model Training for Health Care Suggestions
18
E-learning Behavior Analytics in the Curriculum of Big Data Visualization Application
19
Malware Detection Based on Image Conversion
20
Automobile Theft Detection by Driving Behavior Identification Using Deep Autoencoder
21
Combining a Bi-LSTM-Based Siamese Network with Word2Vec Algorithm for Classifying High-Dimensional Dataset
22
Real Time Drowsiness Detection Based on Facial Dynamic Features
23
Gradient Deep Learning Boosting and Its Application on the Imbalanced Datasets Containing Noises in Manufacturing
24
Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variational Autoencode and Generative Adversarial Network
25
A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector Machines
26
Study of Contribution Verifiability for Privacy-preserving Federated Learning
27
Design and Application of Handwritten Numeral Recognizer Based on Convolutional Neural Network
28
Collision Avoidance in Crowded Zone Using Adversarial Reinforcement Learning
29
Cryptanaylsis to Sowjanya et al.’s ABEs from ECC
30
IIoT Key Distribution and Authentication Technology Based on Physical Unclonable Function
31
Lattice-Based Anonymous Multi-Receiver ID-Based Encryption
32
The Design of Concurrent Signature Combined with Blind Signature Generation and Its Application on E-commerce
33
Identification of the Issues in IoT Devices with HSTS Not Enforced and Their Exploitation
34
A Critique of a Lightweight Authentication and Key Agreement Scheme for Internet of Drones
35
A Blockchain-Based Custody System for Preserving Critical Video Evidence
36
Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment
37
Reconfigurable PM2.5 Sensor Green Deployment Mechanism Based on Blockchain Technology
38
Trustworthy Blockchain Oracles for Smart Contracts
39
Analysis and Acquisition of APFS Data from a Forensic Perspective
Feedback