The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy SPIoT-2021 Volume 1

This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, sci...

Full description

Bibliographic Details
Other Authors: Macintyre, John (Editor), Zhao, Jinghua (Editor), Ma, Xiaomeng (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2022, 2022
Edition:1st ed. 2022
Series:Lecture Notes on Data Engineering and Communications Technologies
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03784nmm a2200397 u 4500
001 EB002007806
003 EBX01000000000000001170706
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220104 ||| eng
020 |a 9783030895082 
100 1 |a Macintyre, John  |e [editor] 
245 0 0 |a The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy  |h Elektronische Ressource  |b SPIoT-2021 Volume 1  |c edited by John Macintyre, Jinghua Zhao, Xiaomeng Ma 
250 |a 1st ed. 2022 
260 |a Cham  |b Springer International Publishing  |c 2022, 2022 
300 |a XXI, 1154 p. 337 illus., 190 illus. in color  |b online resource 
505 0 |a Application of Artificial Intelligence in Arrangement Creation -- Automatic Segmentation for Retinal Vessel Using Concatenate UNet++ -- Experimental Analysis of Mandarin Tone Pronunciation of Tibetan College Students for Artificial Intelligence Speech Recognition -- Exploration of Paths for Artificial Intelligence Technology to Promote Economic Development -- Influence of RPA Financial Robot on Financial Accounting and its Countermeasures -- Application of Artificial Intelligence Technology in English Online Learning Platform -- Spectral Identification Model of NIR Origin Based on Deep Extreme Learning Machine -- Frontier Application and Development Trend of Artificial Intelligence in New Media in the AI Era -- Analysis on the Application of Machine Learning Stock Selection Algorithm in the Financial Field -- Default Risk Prediction Based on Machine Learning under Big Data Analysis Technology -- Application of Intelligent Detection Technology and Machine Learning Algorithm in Music Intelligent System -- Application of 3D Computer Aided System in Dance Creation and Learning -- Data Selection and Machine Learning Algorithm Application under the Background of Big Data. 
653 |a Big data 
653 |a Computational intelligence 
653 |a Artificial Intelligence 
653 |a Computational Intelligence 
653 |a Data Engineering 
653 |a Artificial intelligence 
653 |a Cyber-Physical Systems 
653 |a Engineering / Data processing 
653 |a Cooperating objects (Computer systems) 
653 |a Big Data 
700 1 |a Zhao, Jinghua  |e [editor] 
700 1 |a Ma, Xiaomeng  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes on Data Engineering and Communications Technologies 
028 5 0 |a 10.1007/978-3-030-89508-2 
856 4 0 |u https://doi.org/10.1007/978-3-030-89508-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 620.00285 
520 |a This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field