author: xingming sun

Artificial Intelligence and Security: 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II

... network programming language. ACM Sigplan Notices 46(9), 279–291 (2011) 5 ... Function Virtualization, pp. 29–34 (2016) 10. Li, Y., Wang, Z., Yao, J., Yin ... H.P., Mishra, R., Gupta, A., Dutta, T.: Challenges and solutions in software ...

Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I

... Outline of the National Medical and health Service System Planning (2015 ... data portrait analysis and classification management for patients are conducive to meet ... evidence-based guide is formed to provide decision-making support for the ...

Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part II

... conversation and the topic created by it. The service publisher encapsulates information on a specific conversation topic on the JMS server. After the two types of service development are completed, the service can be published for the ...

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV

... Tongyici Cilin (Extended Version)”—which we refer to as “Cilin” from now on—is introduced. The vocabulary contains 77,343 words. Some words are composed of Chinese characters, and some single Chinese characters represent a word. Cilin ...

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V

4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018 ... amendment, continue to use the original measurement distance, the derivation ... flowchart Fig. 5. Influence of anchor node on location Fig. 6. 140 S. Xue et al.

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI

... Visual Studio 2013 development environment, OpenCV3.0 image processing ... chart for this article. In order to test the experimental results of this ... comparison results are shown in Fig. 7. Where a is the original. 1 if Pointhsv in ...

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part II

... Tree. Diagram. of. Tibetan. Case. Grammar. 4.1 Fillmore Case Grammar In Fillmore case grammar, a sentence consists of modality and proposition. If we represent a ... Grammar 4.1 Fillmore Case Grammar 4.2 Tibetan Tree Diagram Based on Case ...

Artificial Intelligence and Security: 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I

... (2017) 23. Tan, S., Lu, G., Jiang, Z., Huang, L.: Improved YOLOv5 network model and application in safety helmet detection. In 2021 IEEE International Conference on Intelligence and Safety for Robotics (ISR), pp. 330–333 (2021) 24. Li, X ...

Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I

8th International Conference on Artificial Intelligence and Security, ICAIS ... (2017) 17. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look ... helmet detection based on YOLOv5. In: IEEE International Conference on Power ...

Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I

... Deepface: closing the gap to human-level performance in face verification. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp.1701–1708 (2014) 4. Sun, Y., Wang, X., Tang, X.. Deep learning face ...

Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I

... Akll ? +2 || Pkx | lf , s.t | \ dill3 = 1 ( 8 ) k = 1 The objective function in Eq . ( 8 ) can be solved by alternatively updating matrix A and dictionary pair { D , P } . The minimization problem can be alternated between the following ...

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II

... Recovery System for vSphere Data Center Based on Swift Cloud Storage Yanchao Guo1(&), Linfeng Wei2, and Jianzhu Lu2 1 Information Network Center, Guangzhou Light Industry Technician College, Guangzhou 510220, China 457900493@qq.com 2 ...

Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I

... datasheet/Arduino_Nano_ robomania.pdf. Accessed 20 Feb 2017 Anonymous: Ultrasonic Ranging Module HC-SR04. http://www.micropik.com/PDF/ HCSR04.pdf. Accessed 20 Feb 2017 Anonymous: Piezoelectric Buzzers Datasheet, May 2011. https ...

Cloud Computing and Security: 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III

... describes the related work, and Sect. 6 concludes this paper. 2. Behavioral. Characteristics. Description. As the first step, our approach performs a lightweight static analysis of a given Android app. The behavioral characteristics we ...

Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV

5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV Xingming Sun, Zhaoqing Pan, Elisa Bertino. The above WeChat protocol login ... time, a packet with window.code = 408 will be sent to indicate ...

Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II

7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II Xingming Sun ... Affective Picture System (IAPS) compiled by Lang et al., which is used for the research of emotion, cognition, and ...

Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers

... does not receive any HTS packet in 2 SIFS duration after receiving a CTS packet, it extracts PsNonÀcoop from the CTS packet and then transmits the data packet. After that, the source waits for the ACK packet from the destiny node. Once ...

Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I

... Hamming weight could still be obtained using SPA, the attacker cannot ensure the exact position for the 4 non-ordered Hamming weight. Figure3 is an example of the available information of SPA attack for random order countermeasure. The ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.