{"title":"Reduced CNN Model for Face Image Detection with GAN Oversampling","authors":"Jiha Kim, Hyunhee Park","doi":"10.1007/978-3-030-79728-7_23","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_23","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application Practices","authors":"A. Liao","doi":"10.1007/978-3-030-79728-7_34","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_34","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132389875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C","authors":"Jaehyuk Lee, Kangbin Yim, Kyungroul Lee","doi":"10.1007/978-3-030-79728-7_7","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_7","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN","authors":"Nobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, L. Barolli","doi":"10.1007/978-3-030-79728-7_16","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_16","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124705348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS)","authors":"Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen","doi":"10.1007/978-3-030-79728-7_43","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_43","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116516623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Neighborhood-Connectivity of Locally Twisted Cube Networks","authors":"Tzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung","doi":"10.1007/978-3-030-79728-7_31","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_31","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129418887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scheme for Checking Similarity and Its Application in Outsourced Image Processing","authors":"Yunxuan Su, Xu An Wang, Yunlong Ge","doi":"10.1007/978-3-030-79728-7_52","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_52","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain","authors":"Shuai Zhou, Tianhan Gao","doi":"10.1007/978-3-030-79728-7_5","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_5","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, N. Javaid
{"title":"Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks","authors":"Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, N. Javaid","doi":"10.1007/978-3-030-79728-7_11","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_11","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ELF Recovery Method for Linux Malicious Process Detection","authors":"Zheng Wang, Bao Cui, Yang Zhang","doi":"10.1007/978-3-030-79728-7_28","DOIUrl":"https://doi.org/10.1007/978-3-030-79728-7_28","url":null,"abstract":"","PeriodicalId":189931,"journal":{"name":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}