会议文集


文集名Artificial Intelligence and Security
会议名8th International Conference on Artificial Intelligence and Security (ICAIS 2022)
中译名《第八届国际人工智能与安全会议,卷3》
会议日期July 15-20, 2022
会议地点Qinghai, China
出版年2022
馆藏号343428


题名作者出版年
Research on Offense and Defense of DDos Based on Evolutionary Game TheoryTengteng Zhao; Wei Zhang; Xiaolong Li; Wenjing Wang; Xu Niu; Hui Guo2022
A Method of Data Distribution and Traceability Based on BlockchainBin Gu; Yunfeng Zou; Dongyang Cai; Huanyu Fan2022
Data Provenance in Large-Scale DistributionYunan Zhu; Wei Che; Chao Shan; Shen Zhao2022
A Vulnerability Detection Algorithm Based on Transformer ModelFujin Hou; Kun Zhou; Longbin Li; Yuan Tian; Jie Li; Jian Li2022
Research on Video Falsity Detection Based on Publisher and Publishing Environment FeaturesXvhao Xiao; Xiaojun Li; Junping Yao; Shaochen Li; Bilal Anwar2022
Intrusion Detection Model Based on KNN-AE-DNNHongtao Chen; Shuo Guo; Yanbo Shi; Weixuan Wei; Kaidi Wang2022
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint InformationLu Kang; Qingbing Ji; Lvlin Ni; Jiaxin Li2022
An Efficient Certificate-Based Encryption Scheme Without Random OraclesLan Guo; Yang Lu; Qing Miao; Guangao Zu; Zhongqi Wang2022
A Rational Hierarchical Quantum State Sharing ProtocolHuali Zhang; Bichen Che; Zhao Dou; Hengji Li; Yu Yang; Xiubo Chen; Jian Li2022
Blockchain-Based Efficient Incentive Mechanism in CrowdsensingQiulu Jiang; Wunan Wan; Zhi Qin; Jinquan Zhang; Hui Han; Shibin Zhang; Jinyue Xia2022
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex ScenariosHuailin Pu; Wunan Wan; Zhi Qin; Jinquan Zhang; Qiulu Jiang; Shibin Zhang; Jinyue Xia2022
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRPJing Shi; Mingyang Chen; Jiazheng Jiao2022
Multi-objective Dual-Route Planning Algorithm for Grid Communication NetworkXiaojun Gou; Shunhui Luo; Liang Xiao2022
Blockchain Cross-Chain Research Based on Verifiable Ring SignaturesZhe Li; Zhiwei Sheng; Wunan Wan; Shibin Zhang; Zhi Qin; Jinquan Zhang; Jinyue Xia2022
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony StrategyXiao Feng; Yuanzheng Wang; Tengfei Dong; Yingxia Liao; Yixin Zhang; Yi Lin2022
Deep Learning Network Intrusion Detection Based on Network TrafficHanyang Wang; Sirui Zhou; Honglei Li; Juan Hu; Xinran Du; Jinghui Zhou; Yunlong He; Fa Fu; Houqun Yang2022
A Survey of Consensus Mechanism Based on Reputation ModelYuanshen Li; Jieren Cheng; Hui Li; Yuming Yuan; Victor S. Sheng2022
A Survey on Ethereum Illicit DetectionMeng Li2022
Detect Adversarial Examples by Using Feature AutoencoderHongwei Ye; Xiaozhang Liu; Anli Yan; Lang Li; Xiulai Li2022
Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin ChineseFirew Tadele; Jianguo Wei; Kiyoshi Honda; Ruiteng Zhang; Wenhao Yang2022
123