1
Recent Trends in Image Processing and Pattern Recognition [E-Book] : 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part II /
Table of Contents: ... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...

Full text 
2
Recent Trends in Image Processing and Pattern Recognition [E-Book] : 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part I /
3
Advanced Data Mining and Applications [E-Book] : 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part II /
Table of Contents: ... Model -- Spatial Commonsense Reasoning for Machine Reading Comprehension -- Multimodal learning for Automatic Summarization: A Survey -- Deep Knowledge Tracing with Concept Trees -- Privacy and Security -- Cryptography-Inspired Federated Learning...

Full text 
4
Advanced Communication and Intelligent Systems [E-Book] : First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers /
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text 
5
Creativity in Intelligent Technologies and Data Science [E-Book] : 5th International Conference, CIT&DS 2023, Volgograd, Russia, September 11-15, 2023, Proceedings /
6
Cyberspace Safety and Security [E-Book] : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings /
Table of Contents: ...Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match...

Full text 
7
Digital Forensics and Watermarking [E-Book] : 20th International Workshop, IWDW 2021, Beijing, China, November 20-22, 2021, Revised Selected Papers /
8
Applied Informatics [E-Book] : 5th International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, Proceedings /
Table of Contents: ... -- Health Care Information Systems -- AESRSA: A New Cryptography Key for Electronic Health Record Security -- Detection of COVID-19 Using Denoising Autoencoders and Gabor Filters -- Development of Mobile Applications to Save Lives on Catastrophic Situations...

Full text 
9
New Trends in Computer Technologies and Applications [E-Book] : 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings /
Table of Contents: ... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...

Full text 
10
Advances in Neural Networks – ISNN 2013 [E-Book] : 10th International Symposium on Neural Networks, Dalian, China, July 4-6, 2013, Proceedings, Part I /
Table of Contents: ... Cryptography -- Bifurcation of a Discrete-Time Cohen-Grossberg-Type BAM Neural Network with Delays -- Stability Criteria for Uncertain Linear Systems with Time-Varying Delay -- Generalized Function Projective Lag Synchronization between Two Different Neural Networks...

Full text 
11
Mining Intelligence and Knowledge Exploration [E-Book] : First International Conference, MIKE 2013, Tamil Nadu, India, December 18-20, 2013. Proceedings /
Table of Contents: ... Region Incrementing Visual Cryptography Scheme Using Unexpanded Meaningful Shares -- Online Signature Verification Based on Recursive Subset Training -- An Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS -- A Novel Ensemble...

Full text