Advertisement

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I

  • Xingming Sun
  • Zhaoqing Pan
  • Elisa Bertino
Conference proceedings ICAIS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11632)

Also part of the Security and Cryptology book sub series (LNSC, volume 11632)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Cloud Computing

    1. Front Matter
      Pages 1-1
    2. Zhenyu Zhang, Wencheng Sun, Zhiping Cai, Ningzheng Luo, Ming Wang
      Pages 3-15
    3. Shuai Ye, Cuixia Li, Ruoyan Zhao, Weidong Wu
      Pages 16-26
    4. Pengchao Niu, Yuan Sun, Wei Song, Shijiao Zhang
      Pages 27-38
    5. Hao Li, Yuan Sun, Wei Song, Jie Qin
      Pages 39-50
    6. Xin Qian, Zhen Yang, Shihui Wang, Yongfeng Huang
      Pages 85-96
    7. Cheng Yu, Wan-ning Zhu, Yu-meng Sun
      Pages 97-105
    8. Shang Li, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang
      Pages 148-158
    9. Weiwei Zhu, Hao Yuan, Liang Wang, Ming Wan, Xing Li, Jingbin Ren
      Pages 159-170
    10. Nan Qiao, Li-hui Wang, Yue-xin Zhang, Tang Xinhua
      Pages 171-181
    11. Ye Wang, Wanli Zuo, Ying Wang
      Pages 182-193
    12. Rui Wang, Donghao Gu, Zhaojing Wen, Kai Yang, Shaohui Liu, Feng Jiang
      Pages 205-216
    13. Miaomiao Lou, Zhenxia Yu, Feng Guo, Xiaoqiang Zheng
      Pages 217-226
    14. Bing Ma, Xiaoru Wang, Heng Zhang, Fu Li, Jiawang Dan
      Pages 227-236
    15. Yashen Wang, Yifeng Liu, Haiyong Xie
      Pages 237-247
    16. Yabin Xu, Chenxiao Cui, Ting Xu, Yangyang Li
      Pages 248-259
    17. Lei Song, Chunguang Ma, Peng Wu, Yun Zhang
      Pages 273-282
    18. Chunhe Song, Tong Li, Xu Huang, Zhongfeng Wang, Peng Zeng
      Pages 283-292
    19. Rong Chen, Yangyang Li, Weiwei Fang
      Pages 293-303
    20. Qi Jia, Yonghong Xie, Cong Xu, Yue Zhou, Dezheng Zhang
      Pages 304-314
    21. Yan Xu, Yan-jie Niu, Wei-gang Fang, Ting-ting Zhang
      Pages 315-326
    22. Jiangang Xie, Guiying He, Xiaohong Xiao
      Pages 327-337
    23. Panyu Liu, Yangyang Li, Zhiping Cai, Shuhui Chen
      Pages 338-346
    24. Xiang Yu, Hui Lu, Le Wang, Dapeng Man
      Pages 347-357
    25. Xiang Yu, Le Wang, Shuang Chen, Yanbo Li
      Pages 358-367
    26. Yuanyuan Chen, Hui Lu, Jing Qiu, Le Wang
      Pages 368-378
    27. Liling Zhao, Yi Lin, Zelin Zhang, Siqi Wang
      Pages 379-390
    28. Yonghong Guo, Feng Jiang, Dongyang Zhao, Zhaojing Wen, Shaohui Liu
      Pages 402-410
    29. Guang Yang, Yunhua Cao, Xiaoyang Xing, Min Wei
      Pages 411-424
    30. Xiaofeng Dong, Dan Xiao, Zhipeng Yang
      Pages 425-433
    31. Junbo Wu, Ping Zhang, Zheng Zheng, Min Xia
      Pages 444-453
    32. Yulian Li, Chao Luo, Hao Yang, Tao Wu
      Pages 463-474
    33. Yabin Xu, Yongqing Jiao, Shujuan Chen, Yangyang Li
      Pages 497-508
    34. Huanrong Tang, Zhuosong Fu, Jianquan Ouyang, Yunhua Song
      Pages 509-515

Other volumes

  1. Artificial Intelligence and Security
    5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I
  2. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
  3. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III
  4. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV

About these proceedings

Introduction

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.

The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:

Part I: cloud computing;
Part II: artificial intelligence; big data; and cloud computing and security;
Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;
Part IV: encryption and cybersecurity.

Keywords

artificial intelligence computational linguistics computer crime computer networks data mining data security image reconstruction internet machine learning neural networks radio sensor nodes signal processing Support Vector Machines (SVM) telecommunication networks telecommunication traffic wireless networks wireless sensor networks wireless telecommunication systems World Wide Web

Editors and affiliations

  1. 1.Nanjing University of Information Science and TechnologyNanjingChina
  2. 2.Nanjing University of Information Science and TechnologyNanjingChina
  3. 3.Purdue UniversityWest LafayetteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-24274-9
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-24273-2
  • Online ISBN 978-3-030-24274-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site