Lecture Notes in Computer Science 12737

Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA

Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, , Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA More information about this subseries at http://www.springer.com/series/7409 Xingming Sun • Xiaorui Zhang • Zhihua Xia • Elisa Bertino (Eds.)

Artificial Intelligence and Security 7th International Conference, ICAIS 2021 Dublin, Ireland, July 19–23, 2021 Proceedings, Part II

123 Editors Xingming Sun Xiaorui Zhang University of Information Science Nanjing University of Information Science and Technology and Technology Nanjing, China Nanjing, China Zhihua Xia Elisa Bertino Jinan University Purdue University Guangzhou, China West Lafayette, IN, USA

ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-78611-3 ISBN 978-3-030-78612-0 (eBook) https://doi.org/10.1007/978-3-030-78612-0

LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© Springer Nature Switzerland AG 2021, corrected publication 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface

The 7th International Conference on Artificial Intelligence and Security (ICAIS 2021), formerly called the International Conference on Cloud Computing and Security (ICCCS), was held during July 16–19, 2021, in Dublin, Ireland. Over the past six years, ICAIS has become a leading conference for researchers and engineers to share their latest results of research, development, and applications in the fields of artificial intelligence and information security. We used the Microsoft Conference Management Toolkits (CMT) system to manage the submission and review processes of ICAIS 2021. We received 1013 submissions from authors in 20 countries and regions, including the USA, Canada, the UK, Italy, Ireland, Japan, Russia, France, Australia, South Korea, South Africa, Iraq, Kazakhstan, Indonesia, Vietnam, Ghana, China, Taiwan, and Macao, etc. The submissions covered the areas of artificial intelligence, big data, cloud computing and security, information hiding, IoT security, multimedia forensics, encryption and cybersecurity, and so on. We thank our Technical Program Committee (TPC) members and external reviewers for their efforts in reviewing the papers and providing valuable comments to the authors. From the total of 1013 submissions, and based on at least three reviews per submission, the Program Chairs decided to accept 122 papers to be published in two Lecture Notes in Computer Science (LNCS) volumes and 183 papers to be published in three Communications in Computer and Information Science (CCIS) volumes, yielding an acceptance rate of 30%. This volume of the conference proceedings contains all the regular, poster, and workshop papers. The conference program was enriched by a series of keynote presentations, and the keynote speakers included Michael Scott, MIRACL Labs, Ireland, and Sakir Sezer, Queen’s University of Belfast, UK. We enjoyed their wonderful speeches. There were 49 workshops organized as part of ICAIS 2021 which covered all the hot topics in artificial intelligence and security. We would like to take this moment to express our sincere appreciation for the contribution of all the workshop chairs and their participants. We would like to extend our sincere thanks to all authors who submitted papers to ICAIS 2021 and to all TPC members. It was a truly great experience to work with such talented and hard-working researchers. We also appreciate the external reviewers for assisting the TPC members in their particular areas of expertise. Moreover, we want to thank our sponsors: Association for Computing Machinery; Nanjing University of Information Science and Technology; Dublin City University; New York University; Michigan State University; University of Central Arkansas; Université Bretagne Sud; National Nature Science Foundation of China; Tech Science Press; Nanjing Normal University; Northeastern State University; Engineering Research Center of Digital Forensics, Ministry of Education, China; and ACM SIGWEB China.

April 2021 Xingming Sun Xiaorui Zhang Zhihua Xia Elisa Bertino Organization

General Chairs

Martin Collier Dublin City University, Ireland Xingming Sun Nanjing University of Information Science and Technology, China Yun Q. Shi New Jersey Institute of Technology, USA Mauro Barni University of Siena, Italy Elisa Bertino Purdue University, USA

Technical Program Chairs

Noel Murphy Dublin City University, Ireland Aniello Castiglione University of Salerno, Italy Yunbiao Guo China Information Technology Security Evaluation Center, China Suzanne K. McIntosh New York University, USA Xiaorui Zhang Engineering Research Center of Digital Forensics, Ministry of Education, China Q. M. Jonathan Wu University of Windsor, Canada

Publication Chairs

Zhihua Xia Nanjing University of Information Science and Technology, China Zhaoqing Pan Nanjing University of Information Science and Technology, China

Workshop Chair

Baowei Wang Nanjing University of Information Science and Technology, China

Organization Chairs

Xiaojun Wang Dublin City University, Ireland Genlin Ji Nanjing Normal University, China Zhangjie Fu Nanjing University of Information Science and Technology, China viii Organization

Technical Program Committee Members

Saeed Arif University of Algeria, Algeria Anthony Ayodele University of Maryland, USA Zhifeng Bao Royal Melbourne Institute of Technology, Australia Zhiping Cai National University of Defense Technology, China Ning Cao Qingdao Binhai University, China Paolina Centonze Iona College, USA Chin-chen Chang Feng Chia University, Taiwan, China Han-Chieh Chao Taiwan Dong Hwa University, Taiwan, China Bing Chen Nanjing University of Aeronautics and Astronautics, China Hanhua Chen Huazhong University of Science and Technology, China Xiaofeng Chen Xidian University, China Jieren Cheng Hainan University, China Lianhua Chi IBM Research Center, Australia Kim-Kwang Raymond University of Texas at San Antonio, USA Choo Ilyong Chung Chosun University, South Korea Robert H. Deng Singapore Management University, Singapore Jintai Ding University of Cincinnati, USA Xinwen Fu University of Central Florida, USA Zhangjie Fu Nanjing University of Information Science and Technology, China Moncef Gabbouj Tampere University of Technology, Finland Ruili Geng Spectral MD, USA Song Guo Hong Kong Polytechnic University, Hong Kong Mohammad Mehedi Hassan King Saud University, Saudi Arabia Russell Higgs University College Dublin, Ireland Dinh Thai Hoang University of Technology Sydney, Australia Wien Hong Nanfang College of Sun Yat-sen University, China Chih-Hsien Hsia National Ilan University, Taiwan, China Robert Hsu Chung Hua University, Taiwan, China Xinyi Fujian Normal University, China Yongfeng Huang Tsinghua University, China Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, China Patrick C. K. Hung University of Ontario Institute of Technology, Canada Farookh Hussain University of Technology Sydney, Australia Genlin Ji Nanjing Normal University, China Hai Jin Huazhong University of Science and Technology, China Sam Tak Wu Kwong City University of Hong Kong, China Chin-Feng Lai Taiwan Cheng Kung University, Taiwan, China Loukas Lazos University of Arizona, USA Organization ix

Sungyoung Lee Kyung Hee University, South Korea Chengcheng Li University of Cincinnati, USA Feifei Li Utah State University, USA Jin Li Guangzhou University, China Jing Li Rutgers University, USA Kuan-Ching Li Providence University, Taiwan, China Peng Li University of Aizu, Japan Yangming Li University of Washington, USA Luming Liang Uber Technology, USA Haixiang Lin Leiden University, Netherlands Xiaodong Lin University of Ontario Institute of Technology, Canada Zhenyi Lin Verizon Wireless, USA Alex Liu Michigan State University, USA Guangchi Liu Stratifyd Inc., USA Guohua Liu Donghua University, China Joseph Liu Monash University, Australia Quansheng Liu University of South Brittany, France Xiaodong Liu Edinburgh Napier University, UK Yuling Liu Hunan University, China Zhe Liu University of Waterloo, Canada Daniel Xiapu Luo Hong Kong Polytechnic University, Hong Kong Xiangyang Luo Zhengzhou Science and Technology Institute, China Tom Masino TradeWeb LLC, USA Suzanne K. McIntosh New York University, USA Nasir Memon New York University, USA Sangman Moh Chosun University, South Korea Yi Mu University of Wollongong, Australia Elie Naufal Applied Deep Learning LLC, USA Jiangqun Ni Sun Yat-sen University, China Rafal Niemiec University of Information Technology and Management, Poland Zemin Ning Wellcome Trust Sanger Institute, UK Shaozhang Niu Beijing University of Posts and Telecommunications, China Srikant Ojha Sharda University, India Jeff Z. Pan University of Aberdeen, UK Wei Pang University of Aberdeen, UK Chen Qian University of California, Santa Cruz, USA Zhenxing Qian Fudan University, China Chuan Qin University of Shanghai for Science and Technology, China Jiaohua Qin Central South University of Forestry and Technology, China Yanzhen Qu Colorado Technical University, USA Zhiguo Qu Nanjing University of Information Science and Technology, China x Organization

Yongjun Ren Nanjing University of Information Science and Technology, China Arun Kumar Sangaiah VIT University, India Di Shang Long Island University, USA Victor S. Sheng University of Central Arkansas, USA Zheng-guo Sheng University of Sussex, UK Robert Simon Sherratt University of Reading, UK Yun Q. Shi New Jersey Institute of Technology, USA Frank Y. Shih New Jersey Institute of Technology, USA Biao Song King Saud University, Saudi Arabia Guang Sun Hunan University of Finance and Economics, China Jianguo Sun Harbin University of Engineering, China Krzysztof Szczypiorski Warsaw University of Technology, Poland Tsuyoshi Takagi Kyushu University, Japan Shanyu Tang University of West London, UK Jing Tian National University of Singapore, Singapore Yoshito Tobe Aoyang University, Japan Cezhong Tong Washington University in St. Louis, USA Pengjun Wan Illinois Institute of Technology, USA Cai-Zhuang Wang Ames Laboratory, USA Ding Wang Peking University, China Guiling Wang New Jersey Institute of Technology, USA Honggang Wang University of Massachusetts Dartmouth, USA Jian Wang Nanjing University of Aeronautics and Astronautics, China Jie Wang University of Massachusetts Lowell, USA Jin Wang Changsha University of Science and Technology, China Liangmin Wang Jiangsu University, China Ruili Wang Massey University, New Zealand Xiaojun Wang Dublin City University, Ireland Xiaokang Wang St. Francis Xavier University, Canada Zhaoxia Wang A-Star, Singapore Sheng Wen Swinburne University of Technology, Australia Jian Weng Jinan University, China Edward Wong New York University, USA Eric Wong University of Texas at Dallas, USA Shaoen Wu Ball State University, USA Shuangkui Xia Beijing Institute of Electronics Technology and Application, China Lingyun Xiang Changsha University of Science and Technology, China Yang Xiang Deakin University, Australia Yang Xiao University of Alabama, USA Haoran Xie The Education University of Hong Kong, China Naixue Xiong Northeastern State University, USA Organization xi

Wei Qi Yan Auckland University of Technology, New Zealand Aimin Yang Guangdong University of Foreign Studies, China Ching-Nung Yang Taiwan Dong Hwa University, Taiwan, China Chunfang Yang Zhengzhou Science and Technology Institute, China Fan Yang University of Maryland, USA Guomin Yang University of Wollongong, Australia Qing Yang University of North Texas, USA Yimin Yang Lakehead University, Canada Ming Yin Purdue University, USA Shaodi You Australian National University, Australia Kun-Ming Yu Chung Hua University, Taiwan, China Weiming Zhang University of Science and Technology of China, China Xinpeng Zhang Fudan University, China Yan Zhang Simula Research Laboratory, Norway Yanchun Zhang Victoria University, Australia Yao Zhao Beijing Jiaotong University, China

Organization Committee Members

Xianyi Chen Nanjing University of Information Science and Technology, China Zilong Jin Nanjing University of Information Science and Technology, China Yiwei Li Columbia University, USA Yuling Liu Hunan University, China Zhiguo Qu Nanjing University of Information Science and Technology, China Huiyu Sun New York University, USA Le Sun Nanjing University of Information Science and Technology, China Jian Su Nanjing University of Information Science and Technology, China Qing Tian Nanjing University of Information Science and Technology, China Yuan Tian King Saud University, Saudi Arabia Qi Wang Nanjing University of Information Science and Technology, China Lingyun Xiang Changsha University of Science and Technology, China Zhihua Xia Nanjing University of Information Science and Technology, China Lizhi Xiong Nanjing University of Information Science and Technology, China Leiming Yan Nanjing University of Information Science and Technology, China xii Organization

Li Yu Nanjing University of Information Science and Technology, China Zhili Zhou Nanjing University of Information Science and Technology, China Contents – Part II

Big Data

Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform ...... 3 Suzhen Wang, Zhiting Jia, and Wenli Wang

Research and Implementation of Dimension Reduction Algorithm in Big Data Analysis ...... 14 Si Yuan He, Shan Li, and Chao Guo

Exploring the Informationization of Land Reserve Archives Management. . . . 27 YuXian Zhu

Research and Implementation of Anomaly Detection Algorithm in Data Mining ...... 41 Yang Zhou, Fazhou Liu, Shan Li, and Chao Guo

An Empirical Study on Data Sampling for Just-in-Time Defect Prediction . . . 54 Haitao Xu, Ruifeng Duan, Shengsong Yang, and Lei Guo

Design and Implementation of Data Adapter in SWIM ...... 70 Yangfei Sun and Yuanchun Jiang

Cloud Computing and Security

Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance Ranking ...... 85 Xiehua Li, Gang Long, and Sijie Li

A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing ...... 102 Zhaofeng Yu, Lin Ye, Hongli Zhang, Dongyang Zhan, Shen Su, and Zhihong Tian

A Computing Task Offloading Scheme for Mobile Edge Computing ...... 112 Wang Ben, Li Tingrui, Han Xun, and Li Huahui

Security Transmission Scheme of Sensitive Data for Mobile Terminal ...... 124 Jicheng He, Minghui Gao, Zhijun Zhang, Li Ma, Zhiyan Ning, and Jingyi Cao xiv Contents – Part II

Efficient Utilization of Cache Resources for Content Delivery Network Based on Blockchain...... 135 Hongyan Zhang, Bo Liu, Long Qin, Jing Zhang, and Weichao Gong

A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring...... 147 Chunru Zhou, Guo Wu, Junhao Li, and Chunrui Zhang

Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional Network...... 157 Yuan Sun, Jiaya Liang, and Pengchao Niu

Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature ...... 167 Pengwei Wang, Yi Wei, and Zhaohui Zhang

Detection of Virtual Machines Based on Thread Scheduling ...... 180 Zhi Lin, Yubo Song, and Junbo Wang

Graph Attention Network for Word Embeddings...... 191 Yunfei Long, Huosheng Xu, Pengyuan Qi, Liguo Zhang, and Jun Li

Firewall Filtering Technology and Application Based on Decision Tree . . . . . 202 Yujie Jin and Qun Wang

Encryption and Cybersecurity

A DAPP Business Data Storage Model Based on Blockchain and IPFS . . . . . 219 Xiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, and Jieren Cheng

IPv6-Darknet Network Traffic Detection ...... 231 ChenHuan Liu, QianKun Liu, ShanShan Hao, CongXiao Bao, and Xing Li

Neural Control Based Research of Endogenous Security Model ...... 242 Tao Li, Xu Hu, and Aiqun Hu

Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search Schemes ...... 253 Xuanang Yu, Yang Lu, Jinmei Tian, and Fen Wang

A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing Economy...... 265 Mengwei Zhang and Xiubo Chen Contents – Part II xv

A Transaction Model of Bill Service Based on Blockchain...... 279 Xinyan Wang, Jianxun Guo, Dong Li, Xin Chen, and Kailin Wang

An N-gram Based Deep Learning Method for Network Traffic Classification ...... 289 Wang Xiaojuan, Kaiwenlv Kacuila, and He Mingshu

Interpretability Framework of Network Security Traffic Classification Based on Machine Learning ...... 305 Mingshu He, Lei Jin, and Mei Song

Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture ...... 321 Shunbin Li, Kun Zhang, Ruyun Zhang, MingXing Zhu, Hanguang Luo, and Shaoyong Wu

Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain ...... 332 Rui Zhang, Zhaoxuan Li, and Lijuan Zheng

Information Hiding

Covert Communication via Modulating Soft Label of Neural Network...... 349 Gen Liu, Hanzhou Wu, and Xinpeng Zhang

DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography...... 360 Xin Zheng, Chunjie Cao, and Jiaxian Deng

Halftone Image Steganography Based on Reassigned Distortion Measurement ...... 376 Wenbo Xu, Wanteng Liu, Cong Lin, Ke Wang, Wenbin Wang, and Wei Lu

Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units ...... 388 Xiaolin Yin, Mujian Yu, Lili Chen, Ke Wang, and Wei Lu

High Efficiency Quantum Image Steganography Protocol Based on ZZW Framework...... 400 Hanrong Sun and Zhiguo Qu

Halftone Image Steganalysis by Reconstructing Grayscale Image ...... 412 Junwei Luo, Cong Lin, Lingwen Zeng, Jifan Liang, and Wei Lu

Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition...... 424 Mujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen, and Wei Lu xvi Contents – Part II

Research and Implementation of Medical Information Protection and Sharing Based on Blockchain ...... 437 Wei Fang, Xuelei Jia, and Wei Jia

IoT Security

LoRa Network Security Schemes Based on RF Fingerprint ...... 453 Siqing Chen, Yu Jiang, and Wen Sun

Smart Home Based Sleep Disorder Recognition for Ambient Assisted Living...... 466 Lulu Zhang, Shiqi Chen, Xuran Jin, and Jie Wan

Blockchain-Based Reliable Collection Mechanism for Smart Meter Quality Data...... 476 Liu Yan, Zheng Angang, Shang Huaiying, Kong Lingda, Shen Guang, and Shen Shuming

Power Blockchain Guarantee Mechanism Based on Trusted Computing . . . . . 488 Yong Yan, Tianhong Su, Shaoyong Guo, and Song Kang

Analysis and Implementation of Distributed DTU Communication Method Based on DDS Protocol ...... 502 Yonggui Wang, Zhu Liu, and Lvchao Huang

Sensor Failure Detection Based on Programmable Switch and Machine Learning ...... 514 Xiaolong Zhang, Rengbo Yang, Guangfeng Guo, and Junxing Zhang

A Solution to Reduce Broadcast Storm in VANET ...... 526 Subo He, Lei Xiang, Ying Wang, Minna Xia, and Yaling Hong

A Vehicle Intrusion Detection System Based on Time Interval and Data Fields...... 538 Xun He, Zhen Yang, and Yongfeng Huang

An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption...... 550 Fei Xia, Jiaming Mao, Zhipeng Shao, Liangjie Xu, Ran Zhao, and Yunzhi Yang

A Load-Balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections ...... 563 Mingming Zhang, Jiaming Mao, Lu Chen, Nige Li, Lei Fan, and Leshan Shuang Contents – Part II xvii

Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA ...... 575 Yuxin Du, Xiaoli He, Weijian Yang, Xinwen Cheng, and Yongming Huang

Opportunistic Network Performance Optimization Model Based on a Combination of Neural Networks and Orthogonal Experiments ...... 588 Zhihan Qi, YunChao Pan, Hao Du, Na Zhang, ZongHan Bai, and Gang Xu

Security Analysis of Measurement Automation System Based on Threat Intelligence...... 601 Shaocheng Wu, Tao Liu, Jin Li, Hefang Jiang, Xiaowei Chen, and Xiaohong Cao

A MOEA-D-Based Service Quality Matching Optimization Algorithm in Electric Power Communication Network ...... 611 Qinghai Ou, Yanru Wang, Yongjie Li, Jizhao Lu, Hongkang Tian, Wenjie Ma, and Hui Liu

Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature Learning ...... 622 Qi Liu, Bowen Zhang, Jianming Zhao, Chuanzhi Zang, Xibo Wang, and Tong Li

Recent Development, Trends and Challenges in IoT Security ...... 633 Morteza Talezari, Shanshan Tu, Sadaqat ur Rehman, Xiao Chuangbai, Basharat Ahmad, Muhammad Waqas, and Obaid ur Rehman

Energy Optimization for Wild Animal Tracker Basing on Watchdog Technology ...... 647 Zhenggang Xu, Wenhan Zhai, Chen Liang, Yunlin Zhao, Tian Huang, Minghui Zhou, Libo Zhou, Guiyan Yang, and Zhiyuan Hu

Performance Comparison of Curve Fitting and Compressed Sensing in Channel State Information Feature Extraction ...... 656 Xiaolong Wang, Xiaolong Yang, Mu Zhou, and Liangbo Xie

Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal Strength ...... 667 Min Chen, Xiaolong Yang, Yue Jin, and Mu Zhou

Wi-Fi Indoor Positioning Using D-S Evidence Theory...... 678 Zhu Liu, Yong Wang, Yuexin Long, Yaohua Li, and Mu Zhou

A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System ...... 688 Zengshan Tian, Xixi Liu, Kaikai Liu, and Liangbo Xie xviii Contents – Part II

Multimedia Forensics

Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium Blockchain ...... 703 Shaoyong Guo, Cheng Huang, Yong Yan, Liandong Chen, and Sujie Shao

Automatic Source Camera Identification Technique Based-on Hierarchy Clustering Method...... 715 Zhimao Lai, Yufei Wang, Weize Sun, and Peng Zhang

A Fast Tongue Image Color Correction Method Based on Gray World Method ...... 724 Guojiang Xin, Lei Zhu, Hao Liang, and Changsong Ding

Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image Retrieval ...... 736 Ezekiel Mensah Martey, Hang Lei, Xiaoyu Li, Obed Appiah, and Nicodemus Songose Awarayi

Correction to: A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing ...... C1 Zhaofeng Yu, Lin Ye, Hongli Zhang, Dongyang Zhan, Shen Su, and Zhihong Tian

Author Index ...... 749 Contents – Part I

Artificial Intelligence

Research on Spoofing Jamming of Integrated Navigation System on UAV. . . 3 Zeying Wang, Haiquan Wang, and Ning Cao

Multi-penalty Functions GANs via Multi-task Learning ...... 14 Hongyou Chen, Hongjie He, and Fan Chen

Community Detection Model Based on Graph Representation and Self-supervised Learning ...... 27 Feng Qiao, Chenxi Huang, Song Xu, and Jin Qi

Efficient Distributed Stochastic Gradient Descent Through Gaussian Averaging...... 41 Kaifan Hu, Chengkun Wu, and En Zhu

Application Research of Improved Particle Swarm Optimization Algorithm Used on Job Shop Scheduling Problem ...... 53 Guangzhi Xu and Tong Wu

Artificial Intelligence Chronic Disease Management System Based on Medical Resource Perception ...... 66 Yuntao Ma, Genxin Chen, Wenqing Yan, Bin Xu, and Jin Qi

Research on Deep Learning Denoising Method in an Ultra-Fast All-Optical Solid-State Framing Camera ...... 78 Jian Zhou, Zhuping Wang, Tao Wang, Qing Yang, Keyao Wen, Xin Yan, Kai He, Guilong Gao, Dong Yao, and Fei Yin

LSTM-XGBoost Application of the Model to the Prediction of Stock Price...... 86 Sun Yu, Liwei Tian, Yijun Liu, and Yuankai Guo

Test of Integrated Urban Rail Transit Vehicle-to-Ground Communication System Based on LTE-U Technology ...... 99 Tong Gan, Qiang Ma, Xin-Hua Shen, and Yi-Dong Jia

Research on Efficient Image Inpainting Algorithm Based on Deep Learning ...... 109 Tao Qin, Juanjuan Liu, and Wenchao Xue xx Contents – Part I

Subspace Classification of Attention Deficit Hyperactivity Disorder with Laplacian Regularization...... 121 Yuan Wang, Yuan Gao, Junping Jiang, Min Lin, and Yibin Tang

Study the Quantum Transport Process: Machine Learning Simulates Quantum Conditional Master Equation...... 132 Yong Hu, Xiao-Yu Li, and Qin-Sheng Zhu

Neural Network Study Quantum Synchronization and Quantum Correlation Under Non-zero Temperature ...... 144 Qing Yang, Qin-Sheng Zhu, Qing-Yu Meng, Yong Hu, and Xiao-Yu Li

Research on Intelligent Cloud Manufacturing Resource Adaptation Methodology Based on Reinforcement Learning ...... 155 Zixuan Fang, Qiao Hu, Hairong Sun, Genxin Chen, and Jin Qi

Automatic CT Lesion Detection Based on Feature Pyramid Inference with Multi-scale Response ...... 167 Yangyang Tang, Zhe Liu, Yuqing Song, Kai Han, Jun Su, Wenqiang Wang, Fan Hu, and Jiawen Zhang

A Survey of Chinese Anaphora Resolution...... 180 Shengnan Li, Weiguang Qu, Tingxin Wei, Junsheng Zhou, Yanhui Gu, and Bin Li

Efficient 3D Pancreas Segmentation Using Two-Stage 3D Convolutional Neural Networks...... 193 Wenqiang Wang, Zhe Liu, Yuqing Song, Jun Su, Yangyang Tang, Aihong Yu, and Xuesheng Liu

Multi-UAV Task Allocation Method Based on Improved Bat Algorithm . . . . 205 Jiaqi Shi, Li Tan, Xiaofeng Lian, Xinyue Lv, and Tianying Xu

Deep Learning Models for Intelligent Healthcare: Implementation and Challenges...... 214 Sadaqat ur Rehman, Shanshan Tu, Zubair Shah, Jawad Ahmad, Muhammad Waqas, Obaid ur Rehman, Anis Kouba, and Qammer H. Abbasi

An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection ...... 226 Hao Zhang, Zhiqiang Wang, Man Chen, Yumin Peng, Yanming Gao, and Junhuang Zhou

The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning ...... 239 Tao Liu, Shaocheng Wu, Tong Peng, Sijian Li, Jie Zhao, and Xiaohong Cao Contents – Part I xxi

Offline Writer Identification Using Convolutional Neural Network and VLAD Descriptors ...... 253 Dawei Liang, Meng Wu, and Yan Hu

A Light-Weight Prediction Model for Aero-Engine Surge Based on Seq2Seq ...... 265 Yu Peng, Xiaoyu Li, Chao Lu, Xiaolan Tang, and Bin Lin

Simulation Analysis of PLC/WLC Hybrid Communication with Traffic Model ...... 278 Zhixiong Chen, Leixin Zhi, Peiru Chen, and Lei Zhang

A Study on the Influence of Economic Growth on Urban-Rural Income Gap in Five Northwest Provinces Based on Unit Root and Co-integration Test . . . 290 Xidan Yao and Dunhong Yao

Research on Intrusion Detection of Industrial Control System Based on FastICA-SVM Method ...... 303 Haonan Chen, Xianda Liu, Tianyu Wang, and Xuejing Zhang

KCFuzz: Directed Fuzzing Based on Keypoint Coverage ...... 312 Shen Wang, Xunzhi Jiang, Xiangzhan Yu, and Shuai Sun

Deep Adversarial Learning Based Heterogeneous Defect Prediction...... 326 Ying Sun, Yanfei Sun, Fei Wu, and Xiao-Yuan Jing

Smart Grid Data Anomaly Detection Method Based on Cloud Computing Platform ...... 338 Jiahua Liu, Shang Wu, Wanwan Cao, Yang Guo, and Shuai Gong

A Flexible Planning Approach Using Label Member ...... 346 Li Xu, Wohuan Jia, Yueqi Li, and Linshan Shen

A Survey and Future Perspectives of Hybrid Deep Learning Models for Text Classification ...... 358 Samuel K. Akpatsa, Xiaoyu Li, and Hang Lei

Non-contact Heart Rate Measurement Based on Fusion Technology ...... 370 Jiancheng Zou, Yingyan Li, and Bo Zhang

Research on Cotton Impurity Detection Algorithm Based on Image Segmentation ...... 383 Haolong Yang, Chunqiang Hu, and Qi Diao

Improving Text Matching with Semantic Dependency Graph via Message Passing Neural Network...... 395 Yongkang Song, Dianqing Liu, Dazhan Mao, and Yanqiu Shao xxii Contents – Part I

Demonstration of Low Power and Low Cost Wireless Sensor Network with Edge Computing ...... 407 Sikong Han, Zhiyi Li, Lu Gao, Jian Xu, and Wu Zeng

Analysis on Spatial Pattern Evolution of Cultivated Land in Urban Area Based on Spatial Autocorrelation Analysis – A Case Study of Luoyang City ...... 417 Huang Wei, Wang Mengyu, and Chen Xueye

Research of Spatial Pattern for Cultivated Land Quality in Province Based on Spatial Autocorrelation ...... 429 Wang Hua, Zhu Yuxin, Wang Mengyu, Wang Yifan, and Chen Xueye

Preamble Selection and Allocation Algorithm Based on Q Learning ...... 443 Weibo Yuan, Yun Zang, and Lei Zhang

An Improved Object Detection Algorithm Based on CenterNet ...... 455 Jiancheng Zou, Bailin Ge, and Bo Zhang

Survey on Image Object Detection Algorithms Based on Deep Learning . . . . 468 Wei Fang, Liang Shen, and Yupeng Chen

Autocoder Guide Multi-category Topic Clustering for Keywords Matching ...... 481 Yang Ying, Yaru Sun, Xihai Deng, and Du Wenjia

Adversarial Defense Networks via Gaussian Noise and RBF ...... 494 Jingjie Li, Jiaquan Gao, Qi Jiang, and Guixia He

Intelligent Detection and Early Warning System of Railway Track ...... 505 Yunzuo Zhang and Wei Guo

Train Driver State Detection System Based on PCA and SVM ...... 516 Yunzuo Zhang and Yaning Guo

The Offset-Image Recognition Based on Dense Coding ...... 527 Junxiao Cao, Ziyu Yao, Jinjin Chen, Yuanyuan Zhang, Xingze Tai, Tian Zhang, and Jiaquan Gao

Self-supervision Adversarial Learning Network for Liver Lesion Classification ...... 540 Cong Ma, Zhe Liu, Yuqing Song, Chengjian Qiu, Aihong Yu, and Jiawen Zhang

Mining Consumer Brand Relationship from Social Media Data: A Natural Language Processing Approach ...... 553 Di Shang, Zhenda Hu, and Zhaoxia Wang Contents – Part I xxiii

Weighted Hierarchy Mechanism over BERT for Long Text Classification . . . 566 Yong Jin, Qisi Zhu, Xuan Deng, and Linli Hu

Corrosion Detection in Transformers Based on Hierarchical Annotation . . . . . 575 Yong Cao, Yinian Zhou, Zhao Zhang, Wenjun Wu, Xihai Chen, Sha Yang, and Baili Zhang

Fake Calligraphy Recognition Based on Deep Learning ...... 585 Junjie Liu, Yaochang Liu, Peiren Wang, Ruotong Xu, Wenxuan Ma, Youzhou Zhu, and Baili Zhang

A Top-k QoS-Optimal Service Composition Approach Under Dynamic Environment ...... 597 Cheng Tian, Zhao Zhang, Sha Yang, Shuxin Huang, Han Sun, Jing Wang, and Baili Zhang

Big Data

Analysis on the Influencing Factors of Mooc Construction Based on SPSS Analysis ...... 613 Chun Xu and Yuanbin Li

A Copyright Protection Scheme of Visual Media in Big Data Environment ...... 630 Shiqi Wang, Jiaohua Qin, Mingfang Jiang, and ZhiChen Gao

A Fast Sound Ray Tracking Method for Ultra-short Baseline Positioning . . . . 643 Rong Zhang, Jian Li, Jinxiang Zhang, and Zexi Wang

Research on Auxiliary Target Extraction and Recognition Technology in Big Data Environment ...... 659 Gui Liu, Yongyong Dai, Haijiang Xu, Wei Xia, and Wei Zhou

Analysis of Information Dissemination Orientation of New Media Police Microblog Platform ...... 666 Leyao Chen, Lei Hong, and Jiayin Liu

An Evaluation Method of Population Based on Geographic Raster and Logistic Regression ...... 676 Yannan Qian, Yao Tang, and Jin Han

Image Compression Algorithm Based on Time Series ...... 689 Jie Chen, Zhanman Deng, Yue Wang, Xinglu Cheng, Yingshuang Ye, Xingyu Zhang, and Jin Han

A Resource-Saving Multi-layer Fault-Tolerant Low Orbit Satellite Network ...... 701 Tianjiao Zhang, Fang Chen, Yan Sun, and Chao Guo xxiv Contents – Part I

Research on Business Travel Problem Based on Simulated Annealing and Tabu Search Algorithms ...... 714 Jianan Chen, Fang Chen, Chao Guo, and Yan Sun

Intelligent Security Image Classification on Small Sample Learning ...... 726 Zixian Chen, Xinrui Jia, Liguo Zhang, and Guisheng Yin

Intelligent Ecological Environment Control System Design...... 738 Juan Guo and Weize Xie

Author Index ...... 749