000827257 000__ 06190cam\a2200577Ii\4500 000827257 001__ 827257 000827257 005__ 20230306144605.0 000827257 006__ m\\\\\o\\d\\\\\\\\ 000827257 007__ cr\cn\nnnunnun 000827257 008__ 180403s2018\\\\sz\\\\\\o\\\\\101\0\eng\d 000827257 020__ $$a9783319764511$$q(electronic book) 000827257 020__ $$a3319764519$$q(electronic book) 000827257 020__ $$z9783319764504 000827257 0247_ $$a10.1007/978-3-319-76451-1$$2doi 000827257 035__ $$aSP(OCoLC)on1030303342 000827257 035__ $$aSP(OCoLC)1030303342 000827257 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dN$T$$dYDX$$dEBLCP$$dOCLCA$$dUPM$$dOCLCF$$dUWO$$dMERER 000827257 049__ $$aISEA 000827257 050_4 $$aQA76.9.A25 000827257 08204 $$a005.8$$223 000827257 1112_ $$aInternational Conference on Security with Intelligent Computing and Big-data Services$$n(1st :$$d2017 :$$cTaiwan) 000827257 24510 $$aSecurity with intelligent computing and big-data services /$$cSheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editor. 000827257 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000827257 300__ $$a1 online resource. 000827257 336__ $$atext$$btxt$$2rdacontent 000827257 337__ $$acomputer$$bc$$2rdamedia 000827257 338__ $$aonline resource$$bcr$$2rdacarrier 000827257 347__ $$atext file$$bPDF$$2rda 000827257 4901_ $$aAdvances in intelligent systems and computing,$$x2194-5357 ;$$vvolume 733 000827257 500__ $$aIncludes author index. 000827257 5050_ $$aIntro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents; Algorithms and Security Analysis; A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor D ...; Abstract; 1 Introduction; 2 Data Clustering Based on Improved AFSA; 2.1 AFSA and Its Improvement 000827257 5058_ $$a2.2 Clustering Analysis Based on the Improved AFSA3 Tensor Model and Recommendation Algorithm; 3.1 Tensor and Tensor Decomposition; 3.2 Tensor Decomposition with Dynamic Incremental Updating; 3.3 Tensor Modeling and Recommendation Algorithm; 4 Experiment Design and Data Analysis; 4.1 Testing Datasets; 4.2 Algorithm Evaluation Indices; 4.3 Experiment Results and Discussions; 5 Conclusion; Acknowledgements; References; Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1 Introduction; 2 Representation Based Classification 000827257 5058_ $$a3 The Classification of the Nearest Neighbor Representation in Feature Space4 Numerical Experiments; 4.1 Results of Experiments on Standard Two-Class Datasets; 4.2 Results of Experiment on Face Databases; 5 Conclusion; References; A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1 Introduction; 2 The Proposed Algorithm of Aesthetic QR Code; 2.1 The Improved Salient Region Detection Algorithm; 2.2 The Generation of SPBVM; 2.3 The Synthetic Strategy; 3 Experimental Results; 3.1 Comparison Results with and Without Salient Region Detection 000827257 5058_ $$a3.2 Correctness of QR Code Decoding3.3 Comparison of Different Aesthetic QR Code Algorithms; 4 Conclusion; Acknowledgments; References; Compact Cat Swarm Optimization Algorithm; Abstract; 1 Introduction; 2 Related Work; 2.1 Virtual Population and Sampling Mechanism; 2.2 The Perturbation Vector Updating Rule; 2.3 Cat Swarm Optimization; 2.3.1 Seeking Mode; 2.3.2 Tracing Mode; 3 Compact Cat Swarm Optimization Algorithm; 3.1 Initialization and Perturbation Vector Updating Rules; 3.2 Seeking Mode; 3.3 Tracing Mode; 3.4 The Implementation Procedure and Details; 4 Experimental Results and Analyze 000827257 5058_ $$a4.1 Memory Usage for All Compared Algorithms4.2 Comparisons for Convergence Result; 5 Conclusion; References; Cryptanalysis and Detection Systems; Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1 Introduction; 2 Local Gabor Wavelets Patterns; 3 The Proposed Method; 3.1 Image Pre-processing; 3.2 Feature Extraction with LGWP; 3.3 Matching Block Pairs; 3.4 Post-processing; 4 Experimental Results; 5 Conclusions; References; A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1 Introduction; 1.1 Cluster Analysis 000827257 506__ $$aAccess limited to authorized users. 000827257 520__ $$aIn the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions. 000827257 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 5, 2018). 000827257 650_0 $$aComputer security$$vCongresses. 000827257 650_0 $$aArtificial intelligence$$vCongresses. 000827257 650_0 $$aBig data$$vCongresses. 000827257 7001_ $$aPeng, Sheng-Lung,$$eeditor. 000827257 7001_ $$aWang, Shiuh-Jeng,$$eeditor 000827257 7001_ $$aBalas, Valentina Emilia,$$eeditor. 000827257 7001_ $$aZhao, Ming,$$eeditor. 000827257 77608 $$iPrint version: $$z9783319764504 000827257 830_0 $$aAdvances in intelligent systems and computing ;$$v733. 000827257 852__ $$bebk 000827257 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-76451-1$$zOnline Access$$91397441.1 000827257 909CO $$ooai:library.usi.edu:827257$$pGLOBAL_SET 000827257 980__ $$aEBOOK 000827257 980__ $$aBIB 000827257 982__ $$aEbook 000827257 983__ $$aOnline 000827257 994__ $$a92$$bISE