001437938 000__ 08667cam\a2200685\i\4500 001437938 001__ 1437938 001437938 003__ OCoLC 001437938 005__ 20230309004240.0 001437938 006__ m\\\\\o\\d\\\\\\\\ 001437938 007__ cr\cn\nnnunnun 001437938 008__ 210709s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001437938 019__ $$a1266811225 001437938 020__ $$a9783030786151$$q(electronic bk.) 001437938 020__ $$a3030786153$$q(electronic bk.) 001437938 020__ $$z9783030786144 001437938 0247_ $$a10.1007/978-3-030-78615-1$$2doi 001437938 035__ $$aSP(OCoLC)1259515707 001437938 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dDCT$$dN$T$$dOCLCO$$dBRX$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001437938 049__ $$aISEA 001437938 050_4 $$aQ334 001437938 08204 $$a006.3$$223 001437938 1112_ $$aICAIS (Conference)$$n(7th :$$d2021 :$$cDublin, Ireland) 001437938 24510 $$aAdvances in artificial intelligence and security :$$b7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings.$$nPart I /$$cXingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino (eds.). 001437938 2463_ $$aICAIS 2021 001437938 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001437938 300__ $$a1 online resource (xxx, 730 pages) :$$billustrations (some color) 001437938 336__ $$atext$$btxt$$2rdacontent 001437938 337__ $$acomputer$$bc$$2rdamedia 001437938 338__ $$aonline resource$$bcr$$2rdacarrier 001437938 347__ $$atext file 001437938 347__ $$bPDF 001437938 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v1422 001437938 500__ $$aIncludes author index. 001437938 5050_ $$aArtificial Intelligence -- A Load Balancing Mechanism for a Multi-Controller Software Defined WiFi Network -- HGC:Hybrid Gradient Compression in Distributed Deep Learning -- Application of Lidar INS Integrated Positioning in Automatic Driving -- A Review of Named Entity Recognition in Chinese Medical Text -- Robust liver vessel extraction using DV-Net with D-BCE loss function -- Cloud computing-based graph convolutional network power consumption prediction method -- Intelligent Intrusion Detection of Measurement Automation System Based on Deep Learning -- LSTM-Exploit:Intelligent Penetration Based On LSTM Tool -- Pig target detection from image based on improved YOLO V3 -- ICPM: An Intelligent Compound Prediction Model Based on GA and GRNN -- A new method of halftoning and inverse halftoning based on GAN Network -- Sow Estrus Diagnosis from Sound Samples based on Improved Deep Learning -- Research on YOLO Model and its application in Fault Status recognition of freight trains -- Feedforward Deep Neural Network-Based Model for the Forecast of Severe Convective Wind -- Asynchronous Compatible D-ML System for Edge Devices -- Ball K-Medoids: Faster and Exacter -- GVNP: Global Vectors for Node Representation -- Investigation on Loan Approval Based on Convolutional Neural Network -- Chinese Verb-Object Collocation Knowledge Graph Construction and Application -- Optimal Deployment of Underwater Sensor Networks Based on Hungarian Algorithm -- Discrete Multi-Height Wind Farm Layout Optimization for Optimal Energy Output -- Multilevel Threshold Image Segmentation Based on Modified Moth-flame Optimization Algorithm -- Research on critical illness fundraising methods based on blockchain and smart contracts -- Collaboration Energy Efficiency with Mobile Edge Computing for Data Collection in IoT -- Improving the Transformer Translation Model with Back-Translation -- Rigid Image Registration based on Graph Matching -- A Multi-scale Fusion Method For Dense Crowd Counting -- Chinese text classification based on adversarial training -- Research on SVM Parameter Optimization Mechanism Based on Particle Swarm Optimization -- A parameter selection method based on reinforcement learning: the QoS-privacy trade-off for adversarial training framework -- Word Research on Sentiment Analysis of Foreign News Reports Concerning China Based On the Hybrid Model of Opinion Sentence and BLSTM-Attention -- Cascaded Convolutional Neural Network for Image Super-Resolution -- Risk Probability Forecast Technology of the Gust in Beijing Winter Olympic Games based on the Theory of Digital Image Processing -- Depth estimation based on optical flow and depth prediction -- The Algorithms for Word Segmentation and Named Entity Recognition of Chinese Medical Records -- Temperature forecasting based on LSTM in coastal city -- Recent Progress of Medical CT Image Processing based on Deep Learning -- Road Damage Detection and Classification based on M2det -- Weather Temperature Prediction Based on LSTM-Bayesian Optimization -- Research Situation and Development Trends of Deep Learning application in Meteorology -- Exploiting Spatial-Spectral Feature for Hyperspectral Image Classification based on 3-D CNN and Bi-LSTM -- Automated Methods for Symptom Normalization in Traditional Chinese Medicine Records -- A Nested Named Entity Recognition Method for Traditional Chinese Medicine Records -- Face Feature Extraction and Recognition Based on Lighted Deep Convolutional Neural Network -- Non-Orthogonal Multiple Access is Used for Power Allocation to MaximizeThroughput in Cognitive Radio Network Systems -- Research on Drug Response Prediction Model Based on Big Data -- A Cross-Modal Image-Text Retrieval System with Deep Learning -- Research on Behavioral Decision Reward Mechanism of Unmanned Swarm System in Confrontational Environment -- A Variable Step-Size based Iterative Algorithm for High-precision Ranging using FMCW Radar -- Research on the Smart Management and Service of Smart Classrooms in Colleges and Universities -- Performance Analysis of Hard Fusion Rules in Cognitive Radio Networks over Composite Channels -- Performance Analysis of Spectrum Sensing in Cognitive Radio Networks Based on AD Goodness of Fit under Noise Uncertainty -- Research on Prediction Algorithm for Heavy Overload of Main Equipment in Distribution Network -- Review of Attention Mechanism in Electric Power Systems -- Comprehensive review of intelligent operation and maintenance of power system in China -- An Incremental Learning Method for Fault Diagnosis Based on Random Forest -- Research on Short-term Flow Forecast of Intelligent Traffic -- Research on Stock Price Forecasting Based on BP Neural Network -- Trust Computing Model of online transaction based on Social Network and Mobile Agent -- An Adaptive Momentum Term based Optimization Method for Image Restoration -- Research on Situational Awareness Security Defense of Intrusion Link Based on Data Element Characteristic Network Transmission Signal -- Research on Proofreading Method of Semantic Collocation Error in Chinese. 001437938 506__ $$aAccess limited to authorized users. 001437938 520__ $$aThe 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security. 001437938 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 9, 2021). 001437938 650_0 $$aArtificial intelligence$$vCongresses. 001437938 650_0 $$aComputer security$$vCongresses. 001437938 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 001437938 650_6 $$aIntelligence artificielle$$vCongrès. 001437938 650_6 $$aSécurité informatique$$vCongrès. 001437938 650_6 $$aInfonuagique$$xSécurité$$xMesures$$vCongrès. 001437938 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001437938 655_7 $$aConference papers and proceedings.$$2lcgft 001437938 655_7 $$aActes de congrès.$$2rvmgf 001437938 655_0 $$aElectronic books. 001437938 7001_ $$aSun, Xingming,$$eeditor$$1https://orcid.org/0000-0003-1390-399X 001437938 7001_ $$aZhang, Xiaorui,$$eeditor$$0(orcid)0000-0002-7571-2593$$1https://orcid.org/0000-0002-7571-2593 001437938 7001_ $$aXia, Zhihua,$$eeditor$$0(orcid)0000-0001-6860-647X$$1https://orcid.org/0000-0001-6860-647X 001437938 7001_ $$aBertino, Elisa,$$eeditor$$1https://orcid.org/0000-0002-4029-7051 001437938 77608 $$iPrint version:$$z9783030786144 001437938 77608 $$iPrint version:$$z9783030786168 001437938 830_0 $$aCommunications in computer and information science ;$$v1422.$$x1865-0929 001437938 852__ $$bebk 001437938 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-78615-1$$zOnline Access$$91397441.1 001437938 909CO $$ooai:library.usi.edu:1437938$$pGLOBAL_SET 001437938 980__ $$aBIB 001437938 980__ $$aEBOOK 001437938 982__ $$aEbook 001437938 983__ $$aOnline 001437938 994__ $$a92$$bISE