|
" Security with intelligent computing and big-data services / "
Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editors.
Document Type
|
:
|
BL
|
Record Number
|
:
|
865143
|
Main Entry
|
:
|
International Conference on Security with Intelligent Computing and Big-data Services(1st :2017 :, Taiwan)
|
Title & Author
|
:
|
Security with intelligent computing and big-data services /\ Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editors.
|
Publication Statement
|
:
|
Cham, Switzerland :: Springer,, 2018.
|
Series Statement
|
:
|
Advances in intelligent systems and computing,; volume 733
|
Page. NO
|
:
|
1 online resource (xvi, 372 pages) :: illustrations
|
ISBN
|
:
|
3319764519
|
|
:
|
: 9783319764511
|
|
:
|
3319764500
|
|
:
|
9783319764504
|
Notes
|
:
|
Includes author index.
|
Contents
|
:
|
Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents -- Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement
|
|
:
|
2.2. Clustering Analysis Based on the Improved AFSA; 3. Tensor Model and Recommendation Algorithm; 3.1. Tensor and Tensor Decomposition; 3.2. Tensor Decomposition with Dynamic Incremental Updating; 3.3. Tensor Modeling and Recommendation Algorithm; 4. Experiment Design and Data Analysis; 4.1. Testing Datasets; 4.2. Algorithm Evaluation Indices; 4.3. Experiment Results and Discussions; 5. Conclusion; Acknowledgements; References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1. Introduction; 2. Representation Based Classification
|
|
:
|
3. The Classification of the Nearest Neighbor Representation in Feature Space; 4. Numerical Experiments; 4.1. Results of Experiments on Standard Two-Class Datasets; 4.2. Results of Experiment on Face Databases; 5. Conclusion; References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1. Introduction; 2. The Proposed Algorithm of Aesthetic QR Code; 2.1. The Improved Salient Region Detection Algorithm; 2.2. The Generation of SPBVM; 2.3. The Synthetic Strategy; 3. Experimental Results; 3.1. Comparison Results with and Without Salient Region Detection
|
|
:
|
3.2. Correctness of QR Code Decoding; 3.3. Comparison of Different Aesthetic QR Code Algorithms; 4. Conclusion; Acknowledgments; References -- Compact Cat Swarm Optimization Algorithm; Abstract; 1. Introduction; 2. Related Work; 2.1. Virtual Population and Sampling Mechanism; 2.2. The Perturbation Vector Updating Rule; 2.3. Cat Swarm Optimization; 2.3.1. Seeking Mode; 2.3.2. Tracing Mode; 3. Compact Cat Swarm Optimization Algorithm; 3.1. Initialization and Perturbation Vector Updating Rules; 3.2. Seeking Mode; 3.3. Tracing Mode; 3.4. The Implementation Procedure and Details; 4. Experimental Results and Analyze
|
|
:
|
4.1. Memory Usage for All Compared Algorithms; 4.2. Comparisons for Convergence Result; 5. Conclusion; References -- Cryptanalysis and Detection Systems. Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1. Introduction; 2. Local Gabor Wavelets Patterns; 3. The Proposed Method; 3.1. Image Pre-processing; 3.2. Feature Extraction with LGWP; 3.3. Matching Block Pairs; 3.4. Post-processing; 4. Experimental Results; 5. Conclusions; References -- A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1. Introduction; 1.1. Cluster Analysis; 1.2. Feature Selection; 2. Methodology; 2.1. Dataset; 2.2. Discretization; 2.3. Cluster Analysis; 2.4. Correlation Based Feature Selection; 2.5. Machine Learning Algorithm; 3. Implementation and Results; 3.1. Evaluation Metrics; 3.2. Results with Cluster Analysis; 3.3. Results with Enhanced Anomaly Model; 3.4. Results with Proposed Method; 3.5. Additional Testing; 3.6. Compared with Other Work; 4. Conclusions; References
|
|
:
|
Mitigating DoS Attacks in SDN Using Offloading Path Strategies -- An Extension of Attack Trees -- Shamir's Secret Sharing Scheme in Parallel -- Network Security and Applications. A Cognitive Global Clock Synchronization Protocol in WSNs -- A Generic Web Application Testing and Attack Data Generation Method -- The Study of Improvement and Risk Evaluation for Mobile Application Security Testing -- Application of Pattern for New CAPTCHA Generation Idea -- Digital Forensics and Mobile Systems. An Automatic Approach of Building Threat Patterns in Android -- Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics -- Ant-Based Botnet C & C Server Traceback -- Public Key Systems and Data Processing. T-Brain: A Collaboration Platform for Data Scientists -- Feature Extraction in Security Analytics: Reducing Data Complexity with Apache Spark -- Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids -- Verifying the Validity of Public Key Certificates Using Edge Computing -- Blockchain Applications in Technology. A Study on Blockchain-Based Circular Economy Credit Rating System -- Using Blockchain to Support Data and Service Management in IoV/IoT -- A Blockchain-Based Traceable Certification System.
|
Abstract
|
:
|
In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.
|
Subject
|
:
|
Artificial intelligence, Congresses.
|
Subject
|
:
|
Big data, Congresses.
|
Subject
|
:
|
Computer security, Congresses.
|
Subject
|
:
|
Artificial intelligence.
|
Subject
|
:
|
Artificial intelligence.
|
Subject
|
:
|
Big data.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Intelligence (AI) Semantics.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25
|
Added Entry
|
:
|
Balas, Valentina Emilia
|
|
:
|
Peng, Sheng-Lung
|
|
:
|
Wang, Shiuh-Jeng
|
|
:
|
Zhao, Ming
|
| |