|
|
|
|
LEADER |
02420nmm a2200433 u 4500 |
001 |
EB002018672 |
003 |
EBX01000000000000001181570 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220804 ||| eng |
020 |
|
|
|a 9783031067679
|
100 |
1 |
|
|a Sun, Xingming
|e [editor]
|
245 |
0 |
0 |
|a Advances in Artificial Intelligence and Security
|h Elektronische Ressource
|b 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part I
|c edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino
|
250 |
|
|
|a 1st ed. 2022
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2022, 2022
|
300 |
|
|
|a XXXII, 700 p. 324 illus., 225 illus. in color
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Image processing / Digital techniques
|
653 |
|
|
|a Education / Data processing
|
653 |
|
|
|a Computer vision
|
653 |
|
|
|a Computer Application in Social and Behavioral Sciences
|
653 |
|
|
|a Artificial Intelligence
|
653 |
|
|
|a Social sciences / Data processing
|
653 |
|
|
|a Computers and Education
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Imaging, Vision, Pattern Recognition and Graphics
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Artificial intelligence
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Zhang, Xiaorui
|e [editor]
|
700 |
1 |
|
|a Xia, Zhihua
|e [editor]
|
700 |
1 |
|
|a Bertino, Elisa
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Communications in Computer and Information Science
|
028 |
5 |
0 |
|a 10.1007/978-3-031-06767-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-06767-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.
|