Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings. Part I / Xingming Sun, Jinwei Wang, Elisa Bertino (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 12239. | LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.Publication details: Cham : Springer, [2020]Edition: [2-volume set]Description: 1 online resource (851 pages)Content type: - text
- computer
- online resource
- 9783030578848
- 3030578844
- ICAIS 2020
- Artificial intelligence -- Congresses
- Computer security -- Congresses
- Cloud computing -- Security measures -- Congresses
- Intelligence artificielle -- Congrès
- Sécurité informatique -- Congrès
- Infonuagique -- Sécurité -- Mesures -- Congrès
- Computer security
- Artificial intelligence
- Network hardware
- Information technology: general issues
- Machine learning
- Computers -- Security -- General
- Computers -- Intelligence (AI) & Semantics
- Computers -- Hardware -- Network Hardware
- Computers -- Social Aspects -- Human-Computer Interaction
- Computers -- Data Processing
- Artificial intelligence
- Computer security
- 006.3 23
- 005.8
- Q334
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
Print version record.
Intro -- Preface -- Organization -- Contents -- Part I -- Contents -- Part II -- Artificial Intelligence -- Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection -- 1 Introduction -- 2 Related Works -- 2.1 Malicious Software API Sequence -- 2.2 Attention Mechanism -- 2.3 Convolutional Neural Networks (CNN) -- 2.4 Gated Recurrent Unit (GRU) -- 3 The Malware Detection Model -- 3.1 Model Introduction -- 4 Experiment -- 4.1 Introduction to Experimental Data -- 4.2 Experimental Environment -- 4.3 Experimental Result -- 4.4 Comparative Test -- 5 Conclusion
References-Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embedding-1 Introduction-2 Related Work-2.1 Sentence Embedding-2.2 Syntactic Parsing-3 SynTree-WordVec Method-3.1 Main Idea-3.2 SynTree-WordVec's Framework-3.3 Computation Steps of SynTree-WordVec-3.4 Parameters Learning-4 Experiment and Analysis-4.1 Datasets and Evaluation Criterion-4.2 Weighting Parameter's Distribution-4.3 Parameters Learning of Part-of-speech-4.4 Comparison of Experimental Results-5 Conclusions and Future Work-References
An Overview of Cross-Language Information Retrieval -- 1 Introduction -- 2 Approaches in CLIR -- 2.1 Query Translation Approach -- 2.2 Document Translation -- 2.3 Pivotal Translation -- 3 Challenges in CLIR -- 3.1 Language Resources -- 3.2 Ambiguity -- 4 The Latest Algorithms and Technologies in CLIR -- 4.1 Word Embedding -- 4.2 Query Expansion -- 5 Conclusion and Future Work -- References -- A Formal Method for Safety Time Series Simulation of Aerospace -- 1 Background -- 2 Temporal Model -- 3 Software Design -- 4 Experiment -- 5 Conclusion -- References
Tuple Measure Model Based on CFI-Apriori Algorithm -- 1 Introduction -- 2 CFI-Apriori Algorithm -- 2.1 Disadvantages of Apriori Algorithm -- 2.2 CFI-Apriori Algorithm Working Process -- 3 Establishment of Tuple Measurement Model Based on CFI-Apriori Algorithm -- 3.1 Tuple Measurement Model -- 3.2 Tuple Measurement Model Based on Sum of Probability Weights -- 3.3 Tuple Measurement Model Based on Information Entropy -- 4 Simulation -- 4.1 CFI-Apriori Instance Analysis -- 4.2 Tuple Measurement Weight Setting and Case Analysis
4.3 Experimental Data and Analysis of Tuple Measurement Model Based on Sum of Probability Weights -- 4.4 Simulation Analysis of Correlation Data Tuple Measurement Model Based on Information Entropy -- 5 Conclusion -- References -- Deep Learning Video Action Recognition Method Based on Key Frame Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Key Frame Extraction -- 2.2 Action Recognition -- 3 Method -- 3.1 KGAF-Means Algorithm Model -- 3.2 Dual-Stream Variable Convolution Network -- 4 Experimental Results -- 4.1 Experimental Parameter Setting -- 4.2 Experimental Results -- 5 Conclusion
Includes bibliographical references and author index.
This is part 1 of the two-volume set LNCS 12239-12240 that constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 142 full papers presented in this two-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: Artificial intelligence and internet of things. Part II: Internet of things, information security, big data and cloud computing, and information processing