Artificial intelligence and security : 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings. Part II /

Artificial intelligence and security : 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, proceedings. Part II / Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino (eds.). - 1 online resource (1 volume) - Lecture notes in computer science ; 13339 . - Lecture notes in computer science ; 13339. .

Includes author index.

Intro -- Preface -- Organization -- Contents - Part II -- Artificial Intelligence -- Remface: Study on Mini-sized Mobilenetv2 and Retinaface -- 1 Introduction -- 2 Related Works -- 2.1 Background Researches -- 2.2 Description of RetinaFace Model -- 2.3 Loss Function -- 2.4 Anchor Box -- 2.5 MobileNet -- 3 Related Works -- 3.1 Theory of the MobileNetV2 -- 3.2 Mini-MV2 -- 3.3 Improved Fusion of Mini-MV2 with RetinaFace -- 4 Related Works -- 5 Conclusion -- References -- Research on Application of Principal Component Analysis in 3d Video Dimension Reduction -- 1 Introduction 2 Commonly Used Video Image Dimensionality Reduction Method -- 2.1 Classification of Dimensionality Reduction Methods -- 2.2 The Effect of Dimension Reduction -- 2.3 Purpose of Dimension Reduction -- 2.4 Application Scope of Principal Component Analysis -- 2.5 Principal Component Analysis Method -- 2.6 Assumptions for PCA Application -- 3 Work Flow and Principle of Principal Component Analysis -- 3.1 Principal Component Analysis Workflow -- 3.2 Principle of Principal Component Analysis -- 4 Application Effect of Principal Component Analysis in 3d Video Image Dimensionality Reduction 5 Conclusion -- References -- Single Platform Passive Location Algorithm Using Position Information and Azimuth -- 1 Introduction -- 2 Target Location Calculation Method -- 2.1 Storage of Sensor Incoming Longitude, Latitude and Azimuth Data Using Sliding Time Windows -- 2.2 Datum Point Establishment -- 2.3 The Solution of r and -- 2.4 Using Linear Regression to Obtain the Anti-noise R -- 2.5 Determine if R Has Converged -- 2.6 Use R and Azimuth to Derive the Target Position -- 3 Simulation Experiment -- 4 Conclusion -- References -- DCAL: A New Method for Defending Against Adversarial Examples 1 Introduction -- 2 Relate Work -- 2.1 Adversarial Examples -- 2.2 Adversarial Attack Algorithm -- 2.3 Existing Methods for Defenses -- 3 Method -- 3.1 Overview -- 3.2 Objective Function -- 4 Experiments -- 4.1 Dataset -- 4.2 Defense Evaluation -- 5 Conclusion -- References -- Anomaly Detection Model for Key Places Based on Improved YOLOv5 -- 1 Introduction -- 2 Related Work -- 3 Anomaly Detection Models and Improvements -- 3.1 Network Structure of YOLOv5 -- 3.2 YOLOv5 Algorithm Improvements -- 3.3 Improving the FPN Structure -- 4 Experimental Procedure and Results -- 4.1 Experimental Preparation 4.2 Simulation and Experimental Results -- 5 Conclusion -- 5.1 Internet-Related Terrorist Content Remains a Concern and is Being Addressed -- 5.2 Existing Problems and Future Prospects -- References -- Non-contact Heart Rate Detection Based on Fusion Method of Visible Images and Infrared Images -- 1 Introduction -- 2 Related Work -- 2.1 Related Work About Non-contact Heart Rate Detection -- 2.2 Related Work About Fusion of Infrared Images and Visible Images -- 3 Heart Rate Detection Algorithm -- 4 Image Fusion Algorithm -- 4.1 A Subsection Sample -- 4.2 Fusion Method in the Fusion Layer

This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security.

9783031067884 3031067886

10.1007/978-3-031-06788-4 doi


Cloud computing--Security measures--Congresses.
Artificial intelligence--Congresses.
Infonuagique--Sécurité--Mesures--Congrès.
Intelligence artificielle--Congrès.
Artificial intelligence
Computació en núvol.
Seguretat informàtica.
Intel·ligència artificial.


proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Congressos.
Llibres electrònics.

QA76.585

005.8

Powered by Koha