001448195 000__ 05943cam\a2200625\i\4500 001448195 001__ 1448195 001448195 003__ OCoLC 001448195 005__ 20230310004226.0 001448195 006__ m\\\\\o\\d\\\\\\\\ 001448195 007__ cr\cn\nnnunnun 001448195 008__ 220718s2022\\\\sz\\\\\\o\\\\\101\0\eng\d 001448195 019__ $$a1334655141$$a1334888232$$a1336412566 001448195 020__ $$a9783031067884$$q(electronic bk.) 001448195 020__ $$a3031067886$$q(electronic bk.) 001448195 020__ $$z9783031067877 001448195 020__ $$z3031067878 001448195 0247_ $$a10.1007/978-3-031-06788-4$$2doi 001448195 035__ $$aSP(OCoLC)1336491805 001448195 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dSFB$$dOCLCF$$dOCLCQ 001448195 049__ $$aISEA 001448195 050_4 $$aQA76.585 001448195 08204 $$a005.8$$223/eng/20220718 001448195 1112_ $$aInternational Conference on Artifical Intelligence and Security$$n(8th :$$d2022 :$$cQinghai Sheng, China) 001448195 24510 $$aArtificial intelligence and security :$$b8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings.$$nPart II /$$cXingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino (eds.). 001448195 264_1 $$aCham, Switzerland :$$bSpringer,$$c2022. 001448195 300__ $$a1 online resource (1 volume) 001448195 336__ $$atext$$btxt$$2rdacontent 001448195 337__ $$acomputer$$bc$$2rdamedia 001448195 338__ $$aonline resource$$bcr$$2rdacarrier 001448195 4901_ $$aLecture notes in computer science ;$$v13339 001448195 500__ $$aIncludes author index. 001448195 5050_ $$aIntro -- Preface -- Organization -- Contents - Part II -- Artificial Intelligence -- Remface: Study on Mini-sized Mobilenetv2 and Retinaface -- 1 Introduction -- 2 Related Works -- 2.1 Background Researches -- 2.2 Description of RetinaFace Model -- 2.3 Loss Function -- 2.4 Anchor Box -- 2.5 MobileNet -- 3 Related Works -- 3.1 Theory of the MobileNetV2 -- 3.2 Mini-MV2 -- 3.3 Improved Fusion of Mini-MV2 with RetinaFace -- 4 Related Works -- 5 Conclusion -- References -- Research on Application of Principal Component Analysis in 3d Video Dimension Reduction -- 1 Introduction 001448195 5058_ $$a2 Commonly Used Video Image Dimensionality Reduction Method -- 2.1 Classification of Dimensionality Reduction Methods -- 2.2 The Effect of Dimension Reduction -- 2.3 Purpose of Dimension Reduction -- 2.4 Application Scope of Principal Component Analysis -- 2.5 Principal Component Analysis Method -- 2.6 Assumptions for PCA Application -- 3 Work Flow and Principle of Principal Component Analysis -- 3.1 Principal Component Analysis Workflow -- 3.2 Principle of Principal Component Analysis -- 4 Application Effect of Principal Component Analysis in 3d Video Image Dimensionality Reduction 001448195 5058_ $$a5 Conclusion -- References -- Single Platform Passive Location Algorithm Using Position Information and Azimuth -- 1 Introduction -- 2 Target Location Calculation Method -- 2.1 Storage of Sensor Incoming Longitude, Latitude and Azimuth Data Using Sliding Time Windows -- 2.2 Datum Point Establishment -- 2.3 The Solution of r and -- 2.4 Using Linear Regression to Obtain the Anti-noise R -- 2.5 Determine if R Has Converged -- 2.6 Use R and Azimuth to Derive the Target Position -- 3 Simulation Experiment -- 4 Conclusion -- References -- DCAL: A New Method for Defending Against Adversarial Examples 001448195 5058_ $$a1 Introduction -- 2 Relate Work -- 2.1 Adversarial Examples -- 2.2 Adversarial Attack Algorithm -- 2.3 Existing Methods for Defenses -- 3 Method -- 3.1 Overview -- 3.2 Objective Function -- 4 Experiments -- 4.1 Dataset -- 4.2 Defense Evaluation -- 5 Conclusion -- References -- Anomaly Detection Model for Key Places Based on Improved YOLOv5 -- 1 Introduction -- 2 Related Work -- 3 Anomaly Detection Models and Improvements -- 3.1 Network Structure of YOLOv5 -- 3.2 YOLOv5 Algorithm Improvements -- 3.3 Improving the FPN Structure -- 4 Experimental Procedure and Results -- 4.1 Experimental Preparation 001448195 5058_ $$a4.2 Simulation and Experimental Results -- 5 Conclusion -- 5.1 Internet-Related Terrorist Content Remains a Concern and is Being Addressed -- 5.2 Existing Problems and Future Prospects -- References -- Non-contact Heart Rate Detection Based on Fusion Method of Visible Images and Infrared Images -- 1 Introduction -- 2 Related Work -- 2.1 Related Work About Non-contact Heart Rate Detection -- 2.2 Related Work About Fusion of Infrared Images and Visible Images -- 3 Heart Rate Detection Algorithm -- 4 Image Fusion Algorithm -- 4.1 A Subsection Sample -- 4.2 Fusion Method in the Fusion Layer 001448195 506__ $$aAccess limited to authorized users. 001448195 520__ $$aThis three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security. 001448195 588__ $$aDescription based on print version record. 001448195 650_0 $$aCloud computing$$xSecurity measures$$vCongresses. 001448195 650_0 $$aArtificial intelligence$$vCongresses. 001448195 655_0 $$aElectronic books. 001448195 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001448195 7001_ $$aSun, Xingming,$$eeditor. 001448195 7001_ $$aZhang, Xiaorui,$$eeditor. 001448195 7001_ $$aXia, Zhihua,$$eeditor. 001448195 7001_ $$aBertino, Elisa,$$eeditor.$$1https://isni.org/isni/0000000045732724 001448195 77608 $$iPrint version:$$aInternational Conference on Artifical Intelligence and Security (8th : 2022 : Qinghai Sheng, China), creator.$$tArtificial intelligence and security : Part II.$$dCham : Springer, 2022$$z9783031067877$$w(OCoLC)1314284189 001448195 830_0 $$aLecture notes in computer science ;$$v13339. 001448195 852__ $$bebk 001448195 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-06788-4$$zOnline Access$$91397441.1 001448195 909CO $$ooai:library.usi.edu:1448195$$pGLOBAL_SET 001448195 980__ $$aBIB 001448195 980__ $$aEBOOK 001448195 982__ $$aEbook 001448195 983__ $$aOnline 001448195 994__ $$a92$$bISE