Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV [1st ed.] 978-3-030-24267-1;978-3-030-24268-8

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on

400 57 38MB

English Pages XVII, 651 [667] Year 2019

Report DMCA / Copyright

DOWNLOAD FILE

Artificial Intelligence and Security: 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IV [1st ed.]
 978-3-030-24267-1;978-3-030-24268-8

Table of contents :
Front Matter ....Pages i-xvii
Front Matter ....Pages 1-1
A Gray-Box Vulnerability Discovery Model Based on Path Coverage (Chunlai Du, Xingbang Tan, Yanhui Guo)....Pages 3-12
Quantum Network Coding Based on Entanglement Distribution (Tao Shang, Ran Liu, Chengran Fang, Jianwei Liu)....Pages 13-24
Moving Target Defense in Preventing SQL Injection (Kaiyu Feng, Xiao Gu, Wei Peng, Dequan Yang)....Pages 25-34
Design and Security Analysis of Certificateless Aggregate Signature Scheme (Li Cui, Yang Heng, Wu Gang)....Pages 35-45
SuperEye: A Distributed Port Scanning System (Zibo Li, Xiangzhan Yu, Dawei Wang, Yiru Liu, Huaidong Yin, Shoushuai He)....Pages 46-56
An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data (Xige Dang, Xu Wu, Xiaqing Xie, Tianle Zhang)....Pages 57-66
NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior Analysis (Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu)....Pages 67-78
Short Text Topic Recognition and Optimization Method for University Online Community (Xu Wu, Haitao Wu, Xiaqing Xie, Jin Xu, Tianle Zhang)....Pages 79-90
A Survey on Network Traffic Identification (Qiuping Zhu, Dong Li, Yi Xin, Xiangzhan Yu, Guocai Mu)....Pages 91-100
A Survey of Network Security Situational Awareness Technology (Chen Chen, Lin Ye, Xiangzhan Yu, Bailang Ding)....Pages 101-109
Multi-function Quantum Cryptography Protocol Based on Bell State (Zheng Tao, Xiang Gao, Shibin Zhang, Yan Chang, Jinyue Xia)....Pages 110-119
The Attack Case of ECDSA on Blockchain Based on Improved Simple Power Analysis (Wan Wunan, Chen Hao, Chen Jun)....Pages 120-132
A Weight-Based Channel Estimation Implementation Algorithm (Jian Liu, Yalin Yuan)....Pages 133-142
Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function (Wenbin Yu, Zangqiang Dong, Wenjie Liu, Zhiguo Qu, Xiaolong Xu, Alex Xiangyang Liu)....Pages 143-154
BlockZone: A Blockchain-Based DNS Storage and Retrieval Scheme (Wentong Wang, Ning Hu, Xin Liu)....Pages 155-166
Robust Analysis of Grid System Based on Complex Network Attack Mode (Jun Xiang, Jiao Zhu, Shuyang Guo, Yue Chen, Zhizhong Qiao)....Pages 167-177
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHE (Bo Mi, Hongyang Pan, Darong Huang, Tiancheng Wei, Xingfeng Wang)....Pages 178-190
Research on SQL Injection and Defense Technology (Zongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun)....Pages 191-201
A Review of the Factorization Problem of Large Integers (Xinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun)....Pages 202-213
A Comparison of Machine Learning Algorithms for Detecting XSS Attacks (XiaoLong Chen, Mohan Li, Yu Jiang, Yanbin Sun)....Pages 214-224
A Survey of Privacy-Preserving Techniques for Blockchain (Yuchong Cui, Bing Pan, Yanbin Sun)....Pages 225-234
A Survey of Software Reverse Engineering Applications (Zhuangyou Chen, Bing Pan, Yanbin Sun)....Pages 235-245
A Fast IP Matching Algorithm Under Large Traffic (Guanjun Guo, Yi Xin, Xiangzhan Yu, Likun Liu, Houhua Cao)....Pages 246-255
An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers (Xiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen)....Pages 256-265
Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security Metric (Ziwei Ye, Yuanbo Guo, Ankang Ju)....Pages 266-278
Research on Content Extraction of Rich Text Web Pages (Hangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun)....Pages 279-287
Network Protocol Analysis Base on WeChat PC Version (Weixiang Chen, Hui Lu, Mohan Li, Yanbin Sun)....Pages 288-297
Bitcoin Network Size Estimation Based on Coupon Collection Model (Runnan Tan, Xiangyi Kong, Yu Zhang, Qingfeng Tan, Hui Lu, Mohan Li et al.)....Pages 298-307
A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques (Jian Jiang, Xiangzhan Yu, Yan Sun, Haohua Zeng)....Pages 308-317
A Distributed Cryptanalysis Framework Based on Mobile Phones (Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu)....Pages 318-331
A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated Verifier (Yu Liu, Tong Liu)....Pages 332-342
A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter Network (Renhui Hou, Dongbin Wang, Yao Wang, Zhouyi Zhu)....Pages 343-352
Fast Failover for Link Failures in Software Defined Networks (Zilong Yin, Dongbin Wang, Yinxing Zhao, Yaoyao Guo, Shuwen Han)....Pages 353-361
Steady-State Topology Discovery of Target Networks Based on Statistics Method (Di Yang, Yan Liu, Jing Chen)....Pages 362-374
A Novel Method for Weighted Throughput Fairness in Contention-Based WLANs with Multiple Priority Levels (Chun Shi, Zhi-qun Zheng, Zheng-jie Deng, Yu-juan Wang, Shu-qian He)....Pages 375-384
Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network Churn (Yu Zhang, Runan Tan, Xiangyi Kong, Qingfeng Tan, Xiangtao Liu)....Pages 385-395
DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory (Wei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo)....Pages 396-407
Webshell Detection Model Based on Deep Learning (Fangjian Tao, Chunjie Cao, Zhihui Liu)....Pages 408-420
A Security-Sensitive Function Mining Framework for Source Code (Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding)....Pages 421-432
Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri Net (Yong Yu, Ming Jing, Detao Ji, Yuanyuan Wang, Zhongwen Xie, Shudong Li)....Pages 433-442
Trusted Component Decomposition Based on OR-Transition Colored Petri Net (Na Zhao, Min Cao, Chenming Song, Shuang Shi, Yong Yu, Shudong Li)....Pages 443-451
High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range (Jiajun Xie, Chunrui Zhang, Fang Lou, Yu Cui, Lun An, Le Wang)....Pages 452-462
Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents Using Reinforcement Learning (Yibo Sun, Adil Khan, Kai Yang, Jiang Feng, Shaohui Liu)....Pages 463-475
Identify Influentials Based on User Behavior Across Different Topics (Yong Quan, Yichen Song, Lu Deng, Yan Jia, Bin Zhou, Weihong Han)....Pages 476-487
Taylor Series Localization Algorithm Based on Semi-definite Programming (Jianfeng Lu, Xuanyuan Yang)....Pages 488-497
Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural Scene (Xin Feng, Yangyang Li, Haomin Du, Hongbo Wang)....Pages 498-509
An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet Topology (Tao Tang, Guangmin Hu)....Pages 510-519
A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement Attack (Xi Chen, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin, Ruyi Chen et al.)....Pages 520-528
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid (Chenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng)....Pages 529-541
Blockchain Private Key Storage Algorithm Based on Image Information Hiding (Ning Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun)....Pages 542-552
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement Learning (Xi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li)....Pages 553-565
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network (Lin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han)....Pages 566-577
Quantum Algorithm for Support Vector Machine with Exponentially Improved Dependence on Precision (Xiao Feng, Jincheng Li, Changgui Huang, Jinze Li, Ruyin Chen, Jinfa Ke et al.)....Pages 578-587
Reliability-Based and QoS-Aware Service Redundancy Backup Method in IoT-Based Smart Grid (Yunmei Luo, Yuping Luo, Xueping Ye, Jun Lu, Shuqing Li)....Pages 588-598
A Privacy-Preserving Electricity Trading Scheme Based on Blockchain (Yu Xu, Zhoubin Liu, Lili Li, You Sun)....Pages 599-611
A Novel Facial Expression Recognition Scheme Based on Deep Neural Networks (Zhuohua Liu, Hui Suo, Bin Yang)....Pages 612-622
Active Defense System of Industrial Control System Based on Dynamic Behavior Analysis (Wenjin Yu, Yixiang Jiang, Yizhen Lin)....Pages 623-636
Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic Trust (Xiao Liang, Yunpeng Li, Baohua Zhao, Zhihao Wang, Ningyu An)....Pages 637-648
Back Matter ....Pages 649-651

Polecaj historie