Security with intelligent computing and big-data services. (2018)
- Record Type:
- Book
- Title:
- Security with intelligent computing and big-data services. (2018)
- Main Title:
- Security with intelligent computing and big-data services
- Further Information:
- Note: Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao, editors.
- Editors:
- Peng, Sheng-Lung
Wang, Shiuh-Jeng
Balas, Valentina Emilia
Zhao, Ming - Other Names:
- International Conference on Security with Intelligent Computing and Big-data Services, 1st
- Contents:
- Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents -- Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement 2.2. Clustering Analysis Based on the Improved AFSA; 3. Tensor Model and Recommendation Algorithm; 3.1. Tensor and Tensor Decomposition; 3.2. Tensor Decomposition with Dynamic Incremental Updating; 3.3. Tensor Modeling and Recommendation Algorithm; 4. Experiment Design and Data Analysis; 4.1. Testing Datasets; 4.2. Algorithm Evaluation Indices; 4.3. Experiment Results and Discussions; 5. Conclusion; Acknowledgements; References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1. Introduction; 2. Representation Based Classification 3. The Classification of the Nearest Neighbor Representation in Feature Space; 4. Numerical Experiments; 4.1. Results of Experiments on Standard Two-Class Datasets; 4.2. Results of Experiment on Face Databases; 5. Conclusion; References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM;Intro; Preface; Organization; International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017); Honorary Chairs; General Chairs; International Advisory Committee; Program Chairs; Publicity Chairs; Publication Chairs; Organizing Chairs; Organizing Committee; Technical Program Committee; Contents -- Algorithms and Security Analysis. A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor Decomposition; Abstract; 1. Introduction; 2. Data Clustering Based on Improved AFSA; 2.1. AFSA and Its Improvement 2.2. Clustering Analysis Based on the Improved AFSA; 3. Tensor Model and Recommendation Algorithm; 3.1. Tensor and Tensor Decomposition; 3.2. Tensor Decomposition with Dynamic Incremental Updating; 3.3. Tensor Modeling and Recommendation Algorithm; 4. Experiment Design and Data Analysis; 4.1. Testing Datasets; 4.2. Algorithm Evaluation Indices; 4.3. Experiment Results and Discussions; 5. Conclusion; Acknowledgements; References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space; Abstract; 1. Introduction; 2. Representation Based Classification 3. The Classification of the Nearest Neighbor Representation in Feature Space; 4. Numerical Experiments; 4.1. Results of Experiments on Standard Two-Class Datasets; 4.2. Results of Experiment on Face Databases; 5. Conclusion; References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM; Abstract; 1. Introduction; 2. The Proposed Algorithm of Aesthetic QR Code; 2.1. The Improved Salient Region Detection Algorithm; 2.2. The Generation of SPBVM; 2.3. The Synthetic Strategy; 3. Experimental Results; 3.1. Comparison Results with and Without Salient Region Detection 3.2. Correctness of QR Code Decoding; 3.3. Comparison of Different Aesthetic QR Code Algorithms; 4. Conclusion; Acknowledgments; References -- Compact Cat Swarm Optimization Algorithm; Abstract; 1. Introduction; 2. Related Work; 2.1. Virtual Population and Sampling Mechanism; 2.2. The Perturbation Vector Updating Rule; 2.3. Cat Swarm Optimization; 2.3.1. Seeking Mode; 2.3.2. Tracing Mode; 3. Compact Cat Swarm Optimization Algorithm; 3.1. Initialization and Perturbation Vector Updating Rules; 3.2. Seeking Mode; 3.3. Tracing Mode; 3.4. The Implementation Procedure and Details; 4. Experimental Results and Analyze 4.1. Memory Usage for All Compared Algorithms; 4.2. Comparisons for Convergence Result; 5. Conclusion; References -- Cryptanalysis and Detection Systems. Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns; Abstract; 1. Introduction; 2. Local Gabor Wavelets Patterns; 3. The Proposed Method; 3.1. Image Pre-processing; 3.2. Feature Extraction with LGWP; 3.3. Matching Block Pairs; 3.4. Post-processing; 4. Experimental Results; 5. Conclusions; References -- A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset; Abstract; 1. Introduction; 1.1. Cluster Analysis; 1.2. Feature Selection; 2. Methodology; 2.1. Dataset; 2.2. Discretization; 2.3. Cluster Analysis; 2.4. Correlation Based Feature Selection; 2.5. Machine Learning Algorithm; 3. Implementation and Results; 3.1. Evaluation Metrics; 3.2. Results with Cluster Analysis; 3.3. Results with Enhanced Anomaly Model; 3.4. Results with Proposed Method; 3.5. Additional Testing; 3.6. Compared with Other Work; 4. Conclusions; References Mitigating DoS Attacks in SDN Using Offloading Path Strategies -- An Extension of Attack Trees -- Shamir's Secret Sharing Scheme in Parallel -- Network Security and Applications. A Cognitive Global Clock Synchronization Protocol in WSNs -- A Generic Web Application Testing and Attack Data Generation Method -- The Study of Improvement and Risk Evaluation for Mobile Application Security Testing -- Application of Pattern for New CAPTCHA Generation Idea -- Digital Forensics and Mobile Systems. An Automatic Approach of Building Threat Patterns in Android -- Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics -- Ant-Based Botnet C&C Server Traceback -- Public Key Systems and Data Processing. T-Brain: A Collaboration Platform for Data Scientists -- Feature Extraction in Security Analytics: Reducing Data Complexity with Apache Spark -- Storage-Saving Bi-dimensional Privacy-Preserving Data Aggregation in Smart Grids -- Verifying the Validity of Public Key Certificates Using Edge Computing -- Blockchain Applications in Technology. A Study on Blockchain-Based Circular Economy Credit Rating System -- Using Blockchain to Support Data and Service Management in IoV/IoT -- A Blockchain-Based Traceable Certification System. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xvi, 372 pages), illustrations
- Subjects:
- 005.8
Engineering
Computer security -- Congresses
Artificial intelligence -- Congresses
Big data -- Congresses
Artificial intelligence
Data protection
COMPUTERS / Intelligence (AI) & Semantics
Artificial intelligence
Big data
Computer security
Computers -- Intelligence (AI) & Semantics
Computers -- Security -- General
Artificial intelligence
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319764511
3319764519 - Related ISBNs:
- 9783319764504
3319764500 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed April 5, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.358633
- Ingest File:
- 02_339.xml