You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
Europe and China in the Cold War studies Sino-European relations from the establishment of the People’s Republic of China (PRC) in 1949 to the Tiananmen Square protests of 1989. Based on new multi-archival research, the international authorship presents and analyses diplomatic and personal relationships between Europe and China at the political, economic, military, cultural, and technological levels. In going beyond existing historiography, the book comparatively focuses on the relations of both Eastern and Western Europe with the PRC, and adopts a global history approach that also includes non-state and transnational actors. This will allow the reader to learn that the bloc logic and the Sino-Soviet split were indeed influential, yet not all-determining factors in the relations between Europe and China.
To many Chinese, the rise and expansion of Japanese power during the years between the two Sino-Japanese wars (1895–1945) presented a paradox: With its successful modernization, Japan became a model to be emulated; yet as the country’s imperial ambitions on the continent grew, it posed an ever-increasing threat. Drawing on an extraordinary array of source materials, Lu Yan shows that this attraction to and apprehension of Japan prompted the Chinese to engage in a variety of long-term relationships with the Japanese. Re-understanding Japan examines transnational and transcultural interactions between China and Japan during those five dramatic and tragic decades at the intimate level of pe...
This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.
Artificial intelligence, or AI, now affects the day-to-day life of almost everyone on the planet, and continues to be a perennial hot topic in the news. This book presents the proceedings of ECAI 2023, the 26th European Conference on Artificial Intelligence, and of PAIS 2023, the 12th Conference on Prestigious Applications of Intelligent Systems, held from 30 September to 4 October 2023 and on 3 October 2023 respectively in Kraków, Poland. Since 1974, ECAI has been the premier venue for presenting AI research in Europe, and this annual conference has become the place for researchers and practitioners of AI to discuss the latest trends and challenges in all subfields of AI, and to demonstrat...
With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, ...