menu 简单麦麦
account_circle

智能计算与大数据服务安全:第二届智能计算与大数据服务安全国际会议纪要(SICBS-2018)-Security with Intelligent Computing and Big-data Serv文件编号:1176

已经帮助了2595人找到了他们想要的文件
上传于 2020年2月27日 10:23
0次下载
5382次围观
评分:4.5/5 ★ ★ ★ ★ ★
标题(title):Security with Intelligent Computing and Big-data Services: Proceedings of the Second International Conference on Security with Intelligent Computing and Big Data Services (SICBS-2018)
智能计算与大数据服务安全:第二届智能计算与大数据服务安全国际会议纪要(SICBS-2018)
作者(author):Ching-Nung Yang, Sheng-Lung Peng, Lakhmi C. Jain
出版社(publisher):Springer International Publishing
大小(size):92 MB (96829970 bytes)
格式(extension):pdf
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀



This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent computing, blockchain technology, and network security have attracted a growing number of researchers. Discussing topics in areas including blockchain technology and applications; multimedia security; information processing; network, cloud and IoT security; cryptography and cryptosystems; as well as learning and intelligent computing and information hiding, the book provides a platform for researchers, engineers, academics and industrial professionals from around the globe to present their work in security-related areas. It not only introduces novel and interesting ideas, but also stimulates discussions and inspires new ideas.


Table of contents :
Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
Fast Adaptive Blockchain’s Consensus Algorithm via Wlan Mesh Network (Xin Jiang, Mingzhe Liu, Feixiang Zhao, Qin Zhou, Ruili Wang)....Pages 3-16
Toward a Blockchain Based Image Network Copyright Transaction Protection Approach (Chengqiang Zhao, Mingzhe Liu, Yanhan Yang, Feixiang Zhao, Shijie Chen)....Pages 17-28
A Blockchain-Based Scheme for Secure Sharing of X-Ray Medical Images (Bingqi Liu, Mingzhe Liu, Xin Jiang, Feixiang Zhao, Ruili Wang)....Pages 29-42
Blockchain Based Data Trust Sharing Mechanism in the Supply Chain (Luya Wang, Shaoyong Guo)....Pages 43-53
Designing Smart-Contract Based Auctions (Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Michael Baronchelli)....Pages 54-64
Blockchain-Based Autonomous Peer to Peer Information Interaction System in Financial Audit (Yu Zhuo, Dong Aiqiang, Yan Yong)....Pages 65-75
Front Matter ....Pages 77-77
Relations Between Secret Sharing and Secret Image Sharing (Xuehu Yan, Jinming Li, Yuliang Lu, Lintao Liu, Guozheng Yang, Huixian Chen)....Pages 79-93
Enhanced Secret Image Sharing Using POB Number System (Yan-Xiao Liu, Ching-Nung Yang)....Pages 94-102
Study on Security Enhancing of Generalized Exploiting Modification Directions in Data Hiding (Wen-Chung Kuo, Ren-Jun Xiao, Chun-Cheng Wang, Yu-Chih Huang)....Pages 103-115
High-Fidelity Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram (Tengfei Dong, Zhigao Hong, Zhaoxia Yin)....Pages 116-128
A Lossless Polynomial-Based Secret Image Sharing Scheme Utilizing the Filtering Operation (Lintao Liu, Yuliang Lu, Xuehu Yan, Wanmeng Ding, Qitian Xuan)....Pages 129-139
CT Image Secret Sharing Based on Chaotic Map and Singular Value Decomposition (Feixiang Zhao, Mingzhe Liu, Xianghe Liu, Xin Jiang, Zhirong Tang)....Pages 140-155
Front Matter ....Pages 157-157
Robust Speaker Recognition Using Improved GFCC and Adaptive Feature Selection (Xingyu Zhang, Xia Zou, Meng Sun, Penglong Wu)....Pages 159-169
Outlier Detection Based on Local Density of Vector Dot Product in Data Stream (Zhaoyu Shou, Fengbo Zou, Hao Tian, Simin Li)....Pages 170-184
Multi-level Competitive Swarm Optimizer for Large Scale Optimization (Li Zhang, Yu Zhu, Si Zhong, Rushi Lan, Xiaonan Luo)....Pages 185-197
Experimental Comparison of Free IP Geolocation Services (Wei Xu, Yaodong Tao, Xin Guan)....Pages 198-208
Integrating Multiple Feature Descriptors for Computed Tomography Image Retrieval (Xiaoqin Wang, Huadeng Wang, Rushi Lan, Xiaonan Luo)....Pages 209-220
Automatic Forgery Localization via Artifacts Analysis of JPEG and Resampling (Hongbin Wei, Heng Yao, Chuan Qin, Zhenjun Tang)....Pages 221-234
Arbitrary Style Transfer of Facial Image Based on Feed-Forward Network and Its Application in Aesthetic QR Code (Shanqing Zhang, Shengqi Su, Li Li, Jianfeng Lu, Ching-Chun Chang, Qili Zhou)....Pages 235-250
Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern (Li Li, Min He, Jier Yu, Jianfeng Lu, Qili Zhou, Xiaoqing Feng et al.)....Pages 251-266
A Heterogeneous Multiprocessor Independent Task Scheduling Algorithm Based on Improved PSO (Xiaohui Cheng, Fei Dai)....Pages 267-279
Cross-Domain Text Sentiment Classification Based on Wasserstein Distance (Guoyong Cai, Qiang Lin, Nannan Chen)....Pages 280-291
WebRTC-Based On-Site Operation and Maintenance Adaptive Video Streaming Rate Control Strategy (Chuang Liu, Sujie Shao, Shaoyong Guo, Xuesong Qiu)....Pages 292-303
Evaluation of Enzymatic Extract with Lipase Activity of Yarrowia Lipolytica. An Application of Data Mining for the Food Industry Wastewater Treatment (Heidy Posso Mendoza, Rosangela Pérez Salinas, Arnulfo Tarón Dunoyer, Claudia Carvajal Tatis, W. B. Morgado-Gamero, Margarita Castillo Ramírez et al.)....Pages 304-313
Load-Balancing-Based Reliable Mapping Algorithm for Virtual Resources in Power Communication Network (Nie Junhao, Qi Feng, Li Wenjing, Zhang Zhe)....Pages 314-325
Front Matter ....Pages 327-327
Enhancing Network Intrusion Detection System Method (NIDS) Using Mutual Information (RF-CIFE) (Nyiribakwe Dominique, Zhuo Ma)....Pages 329-342
You Are What You Search: Attribute Inference Attacks Through Web Search Queries (Tianyu Du, Tao Tao, Bijing Liu, Xueqi Jin, Jinfeng Li, Shouling Ji)....Pages 343-358
New Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking (Changsong Yang, Xiaoling Tao)....Pages 359-372
A Transient Grid Security Control Algorithm Based on EMS System (Yang Su, Song Liu, Zhihong Liang, Zhizhong Qiao, Xiaodong Li)....Pages 373-382
Security Analysis of Bioinformatics WEB Application (Tao Tao, Yuan Chen, Bijing Liu, Xueqi Jin, Mingyuan Yan, Shouling Ji)....Pages 383-397
Dynamic Network Configuration: An Effective Defensive Protocol for Public Blockchain (Zhengwei Jiang, Chenyang Lv, Bo Zhang, Chao Zhang, Wei Lu, Shouling Ji)....Pages 398-413
Survival Model for WiFi Usage Forecasting in National Formosa University (Jutarat Kositnitikul, Ji-Han Jiang)....Pages 414-422
An Auditing Scheme for Cloud-Based Checkout Systems (Tao-Ku Chang, Cheng-Yen Lu)....Pages 423-437
Implementation of an IP Management and Risk Assessment System Based on PageRank (Chia-Ling Hou, Cheng-Chung Kuo, I-Hsien Liu, Chu-Sing Yang)....Pages 438-450
Integrated Forensic Tool for Network Attacks (Chia-Mei Chen, Gu-Hsin Lai, Zheng-Xun Tsai)....Pages 451-455
Cryptanalysis of Anonymous Three Factor-Based Authentication Schemes for Multi-server Environment (Jiaqing Mo, Hang Chen, Wei Shen)....Pages 456-468
LWE-Based Single-Server Block Private Information Retrieval Protocol (Shuai Liu, Bin Hu)....Pages 469-480
Design and Implementation of an Automatic Scanning Tool of SQL Injection Vulnerability Based on Web Crawler (Xiaochun Lei, Jiashi Qu, Gang Yao, Junyan Chen, Xin Shen)....Pages 481-488
Malware Detection Based on Opcode Sequence and ResNet (Xuetao Zhang, Meng Sun, Jiabao Wang, Jinshuang Wang)....Pages 489-502
Design of Elderly Care System Integrated with SLAM Algorithm (Jun-Yan Chen, Long Huang)....Pages 503-513
A Fog-Based Collusion Detection System (Po-Yang Hsiung, Chih Hung Li, Shih Hung Chang, Bo-Chao Cheng)....Pages 514-525
A Real-Time Online Security Situation Prediction Algorithm for Power Network Based on Adaboost and SVM (Haizhu Wang, Wenxin Guo, Ruifeng Zhao, Bo Zhou, Chao Hu)....Pages 526-534
A Pi-Based Beehive IoT System Design (Yi-Liang Chen, Hung-Yu Chien, Ting-Hsuan Hsu, Yi-Jhen Jing, Chun-Yu Lin, Yi-Chun Lin)....Pages 535-543
PLVSNs: A Privacy-Preserving Location-Sharing System for Vehicular Social Networks (Chang Xu, Xuan Xie, Liehuang Zhu, Chuan Zhang, Yining Liu)....Pages 544-557
Front Matter ....Pages 559-559
Witness-Based Searchable Encryption with Aggregative Trapdoor (Xin Xie, Yu-Chi Chen, Jun-Rui Wang, Yingjie Wu)....Pages 561-573
Robust/Recover Provable Data Possession Protocol (Chao Feng, Honghong Wang, Wenbo Wan, Qinghua Li, Fangzhou Xu)....Pages 574-587
A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings (Changji Wang, Hui Huang, Yuan Yuan)....Pages 588-597
Efficient Computation Method of Participants’ Weights in Shamir’s Secret Sharing (Long Li, Tianlong Gu, Liang Chang, Jingjing Li)....Pages 598-605
An Identity-Set-Based Provable Data Possession Scheme (Changlu Lin, Fucai Luo, Jinglong Luo, Yali Liu)....Pages 606-618
(2, 2) Threshold Robust Visual Secret Sharing Scheme for QR Code Based on Pad Codewords (Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Jinrui Chen)....Pages 619-628
Hybrid Chain Based Hierarchical Name Resolution Service in Named Data Network (Zhuo Yu, Aiqiang Dong, Xin Wei, Shaoyong Guo, Yong Yan)....Pages 629-637
A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification (Yong-Zhong He, Xue-Jiao Xu, Dao-Shun Wang, Shun-Dong Li, Xiang-Hui Zhao, Ching-Nung Yang)....Pages 638-649
Game-Based Security Proofs for Secret Sharing Schemes (Zhe Xia, Zhen Yang, Shengwu Xiong, Ching-Fang Hsu)....Pages 650-660
Dress Identification for Camp Security (Jiabao Wang, Yang Li, Yihang Xiong, Zhixuan Zhao, Dexing Kong)....Pages 661-672
ETSB: Energy Trading System Based on Blockchain (Xia Dong, Wei Zaoyu, Mao Hua, Xu Jing, Yang Debo, Wang Fanjin et al.)....Pages 673-684
An Analysis on Inverted Mirrored Moiré and Ribbon of Band Moiré (Hui-Ying Liu, Dao-Shun Wang, Xiang-Hui Zhao, Shun-Dong Li, Ching-Nung Yang)....Pages 685-698
Front Matter ....Pages 699-699
A LSTM-Based Approach to Haze Prediction Using a Self-organizing Single Hidden Layer
想了解更多信息?可向上传者提问。点击提问
欢迎您上传文件!
费劲心机找到了自己想要的文件?
不如上传简单麦麦!
分享给别人!还能赚取收益
下载须知
1.如有解压密码 提取码都在下面 注意查看
2.如果有问题 可以通过卖家联系方式 联系卖家 如果没有或无法解决可以联系官方客服
3.本文件为公益分享,文件由网上采集而来,如有侵权等问题,请及时联系客服删除

常见问题及官方客服联系方式:点击前往 售后问题处理方式:点击前往
-到底部了哦-
expand_less