Treffer 1 - 10 von 10 für Suche 'Ma, Xiaomeng', Suchdauer: 0,22s Treffer weiter einschränken
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
    Application of Artificial Intelligence in Arrangement Creation -- Automatic Segmentation for Retinal Vessel Using Concatenate UNet++ -- Experimental Analysis of Mandarin Tone Pronunciation of Tibetan College Students for Artificial Intelligence Speech Recognition -- Exploration of Paths for Artificial Intelligence Technology to Promote Economic Development -- Influence of RPA Financial Robot on Financial Accounting and its Countermeasures -- Application of Artificial Intelligence Technology in English Online Learning Platform -- Spectral Identification Model of NIR Origin Based on Deep Extreme Learning Machine -- Frontier Application and Development Trend of Artificial Intelligence in New Media in the AI Era -- Analysis on the Application of Machine Learning Stock Selection Algorithm in the Financial Field -- Default Risk Prediction Based on Machine Learning under Big Data Analysis Technology -- Application of Intelligent Detection Technology and Machine Learning Algorithm in Music Intelligent System -- Application of 3D Computer Aided System in Dance Creation and Learning -- Data Selection and Machine Learning Algorithm Application under the Background of Big Data. .
    This book presents the proceedings of the 2020 2nd International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2021), online conference, on 30 October 2021. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.
    UnknownFormat
  9. 9
  10. 10