Advertisement

Artificial Intelligence and Security

5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III

  • Xingming Sun
  • Zhaoqing Pan
  • Elisa Bertino
Conference proceedings ICAIS 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11634)

Also part of the Security and Cryptology book sub series (LNSC, volume 11634)

Table of contents

  1. Front Matter
    Pages i-xvii
  2. Cloud Computing and Security

    1. Front Matter
      Pages 1-1
    2. Yinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun
      Pages 3-12
    3. Shanting Su, Xiangmao Chang, Yuan Qiu, Jing Li, Tong Li
      Pages 25-34
    4. Fei Xiao, Shaofeng Lin, Wei Tan, Fengchen Qian, Xiaopeng Li
      Pages 35-46
    5. Hua Dai, Yan Ji, Liang Liu, Geng Yang, Xun Yi
      Pages 68-80
  3. Information Hiding

    1. Front Matter
      Pages 113-113
    2. Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li
      Pages 115-127
    3. Shaokang Wang, Dan Liu, Jingning Sun, Yinping Bai, Zhaofeng Zhou
      Pages 128-139
    4. Gaopeng Xie, Yuling Liu, Guojiang Xin, Peng Yang
      Pages 140-149
    5. Yujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin
      Pages 150-160
  4. IoT Security

    1. Front Matter
      Pages 161-161
    2. Te Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo
      Pages 163-177
    3. Bo Mi, Darong Huang, Jianqiu Cao, Ping Long, Hongyang Pan
      Pages 178-187
    4. Longyu Zhou, Ning Yang, Ke Zhang
      Pages 188-198
    5. Yinghua Zhang, Yanfang Dong, Lei Wang, Jian Liu, Yunfeng Peng
      Pages 232-243
    6. Hua Yan, Zhengyu Yang, Fei Ding, Shijie Xu, Dengyin Zhang
      Pages 266-275
    7. Mingxu Sun, Zhiyun Yang, Hao Wu, Qi Liu, Xiaodong Liu
      Pages 276-286
    8. Fei Ding, Zhiliang Li, Chengwan Ai, Ruoyu Su, Dengyin Zhang, Hongbo Zhu
      Pages 287-296
    9. Yanruixuan Ma, Zhendan Li, Yanglijuan Liu, Huijie Liu, Shengqian Ma
      Pages 297-308
    10. Mengyi Zhang, Tianxing Wu, Qiu Ji, Guilin Qi, Zhixin Sun
      Pages 319-328
    11. Xiaoyong Yan, Xiang Feng, Zhixin Sun
      Pages 329-340
    12. Songle Chen, Xuejian Zhao, Zhe Sun, Feng Xiang, Zhixin Sun
      Pages 341-350
    13. Huizong Li, Xiagnqian Wang, Bin Ge, Jie Wang, Yujie Ma, Chaoyu Yang et al.
      Pages 351-361
    14. Lining Liu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li et al.
      Pages 362-372
    15. Jianhang Fu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li
      Pages 394-402
  5. Multimedia Forensics

    1. Front Matter
      Pages 403-403
    2. Sajida Karim, Hui He, Ghulam Ali Mallah, Asif Ali Laghari, Hina Madiha, Raja Sohail Ahmed Larik
      Pages 405-418
    3. Jinquan Zhang, Xizi Peng, Shibin Zhang
      Pages 419-429
    4. Tianxiao Xue, Qingbao Li, Ping Zhang, Zhifeng Chen, Peijun Feng, Nan Luo
      Pages 430-441
    5. Xing Lu, Fangjun Huang, Hyoung Joong Kim
      Pages 442-454
    6. Xiyuan Zheng, Xiaonan Fang, Yanyan Tan, Lili Meng, Huaxiang Zhang
      Pages 467-475
    7. Xinyi Wang, He Wang, Shaozhang Niu
      Pages 476-487
    8. Lina Wei, Quansen Sun, Xizhan Gao
      Pages 488-500
    9. Yuhua Fan, Luping Zhou, Liya Fan, Jing Yang
      Pages 501-513

Other volumes

  1. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I
  2. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II
  3. Artificial Intelligence and Security
    5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part III
  4. 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV

About these proceedings

Introduction

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.

The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:

Part I: cloud computing;
Part II: artificial intelligence; big data; and cloud computing and security;
Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity;
Part IV: encryption and cybersecurity.

Keywords

artificial intelligence authentication computer crime cryptography data security digital watermarking image processing image reconstruction internet Internet of Things (IoT) radio sensor nodes signal processing Support Vector Machines (SVM) telecommunication networks wireless wireless networks wireless sensor networks wireless telecommunication systems World Wide Web

Editors and affiliations

  1. 1.Nanjing University of Information Science and TechnologyNanjingChina
  2. 2.Nanjing University of Information Science and TechnologyNanjingChina
  3. 3.Purdue UniversityWest LafayetteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-24271-8
  • Copyright Information Springer Nature Switzerland AG 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-24270-1
  • Online ISBN 978-3-030-24271-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering