Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings.: 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings. Part I (2020)
- Record Type:
- Book
- Title:
- Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings.: 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings. Part I (2020)
- Main Title:
- Artificial intelligence and security : 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings.
- Other Titles:
- ICAIS 2020
- Further Information:
- Note: Xingming Sun, Jinwei Wang, Elisa Bertino (eds.).
- Other Names:
- Sun, Xingming
Wang, Jinwei
Bertino, Elisa
International Conference on Artificial Intelligence and Security, 6th - Contents:
- Intro -- Preface -- Organization -- Contents -- Part I -- Contents -- Part II -- Artificial Intelligence -- Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection -- 1 Introduction -- 2 Related Works -- 2.1 Malicious Software API Sequence -- 2.2 Attention Mechanism -- 2.3 Convolutional Neural Networks (CNN) -- 2.4 Gated Recurrent Unit (GRU) -- 3 The Malware Detection Model -- 3.1 Model Introduction -- 4 Experiment -- 4.1 Introduction to Experimental Data -- 4.2 Experimental Environment -- 4.3 Experimental Result -- 4.4 Comparative Test -- 5 Conclusion An Overview of Cross-Language Information Retrieval -- 1 Introduction -- 2 Approaches in CLIR -- 2.1 Query Translation Approach -- 2.2 Document Translation -- 2.3 Pivotal Translation -- 3 Challenges in CLIR -- 3.1 Language Resources -- 3.2 Ambiguity -- 4 The Latest Algorithms and Technologies in CLIR -- 4.1 Word Embedding -- 4.2 Query Expansion -- 5 Conclusion and Future Work -- References -- A Formal Method for Safety Time Series Simulation of Aerospace -- 1 Background -- 2 Temporal Model -- 3 Software Design -- 4 Experiment -- 5 Conclusion -- References Tuple Measure Model Based on CFI-Apriori Algorithm -- 1 Introduction -- 2 CFI-Apriori Algorithm -- 2.1 Disadvantages of Apriori Algorithm -- 2.2 CFI-Apriori Algorithm Working Process -- 3 Establishment of Tuple Measurement Model Based on CFI-Apriori Algorithm -- 3.1 Tuple Measurement Model -- 3.2 Tuple Measurement Model Based on Sum ofIntro -- Preface -- Organization -- Contents -- Part I -- Contents -- Part II -- Artificial Intelligence -- Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection -- 1 Introduction -- 2 Related Works -- 2.1 Malicious Software API Sequence -- 2.2 Attention Mechanism -- 2.3 Convolutional Neural Networks (CNN) -- 2.4 Gated Recurrent Unit (GRU) -- 3 The Malware Detection Model -- 3.1 Model Introduction -- 4 Experiment -- 4.1 Introduction to Experimental Data -- 4.2 Experimental Environment -- 4.3 Experimental Result -- 4.4 Comparative Test -- 5 Conclusion An Overview of Cross-Language Information Retrieval -- 1 Introduction -- 2 Approaches in CLIR -- 2.1 Query Translation Approach -- 2.2 Document Translation -- 2.3 Pivotal Translation -- 3 Challenges in CLIR -- 3.1 Language Resources -- 3.2 Ambiguity -- 4 The Latest Algorithms and Technologies in CLIR -- 4.1 Word Embedding -- 4.2 Query Expansion -- 5 Conclusion and Future Work -- References -- A Formal Method for Safety Time Series Simulation of Aerospace -- 1 Background -- 2 Temporal Model -- 3 Software Design -- 4 Experiment -- 5 Conclusion -- References Tuple Measure Model Based on CFI-Apriori Algorithm -- 1 Introduction -- 2 CFI-Apriori Algorithm -- 2.1 Disadvantages of Apriori Algorithm -- 2.2 CFI-Apriori Algorithm Working Process -- 3 Establishment of Tuple Measurement Model Based on CFI-Apriori Algorithm -- 3.1 Tuple Measurement Model -- 3.2 Tuple Measurement Model Based on Sum of Probability Weights -- 3.3 Tuple Measurement Model Based on Information Entropy -- 4 Simulation -- 4.1 CFI-Apriori Instance Analysis -- 4.2 Tuple Measurement Weight Setting and Case Analysis 4.3 Experimental Data and Analysis of Tuple Measurement Model Based on Sum of Probability Weights -- 4.4 Simulation Analysis of Correlation Data Tuple Measurement Model Based on Information Entropy -- 5 Conclusion -- References -- Deep Learning Video Action Recognition Method Based on Key Frame Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Key Frame Extraction -- 2.2 Action Recognition -- 3 Method -- 3.1 KGAF-Means Algorithm Model -- 3.2 Dual-Stream Variable Convolution Network -- 4 Experimental Results -- 4.1 Experimental Parameter Setting -- 4.2 Experimental Results -- 5 Conclusion … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (851 p.)
- Subjects:
- 006.3
005.8
Artificial intelligence -- Congresses
Computer security -- Congresses
Cloud computing -- Security measures -- Congresses
Application software
Computer security
Artificial intelligence
Computer networks
Machine learning
Electronic books - Languages:
- English
- ISBNs:
- 9783030578848
3030578844 - Related ISBNs:
- 9783030578831
- Notes:
- Note: References -- Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embedding -- 1 Introduction -- 2 Related Work -- 2.1 Sentence Embedding -- 2.2 Syntactic Parsing -- 3 SynTree-WordVec Method -- 3.1 Main Idea -- 3.2 SynTree-WordVec's Framework -- 3.3 Computation Steps of SynTree-WordVec -- 3.4 Parameters Learning -- 4 Experiment and Analysis -- 4.1 Datasets and Evaluation Criterion -- 4.2 Weighting Parameter's Distribution -- 4.3 Parameters Learning of Part-of-speech -- 4.4 Comparison of Experimental Results -- 5 Conclusions and Future Work -- References
Note: Includes bibliographical references and author index. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.550324
- Ingest File:
- 03_168.xml