Lecture Notes in Computer Science 12240

Founding Editors Gerhard Goos Karlsruhe Institute of Technology, Karlsruhe, Germany Juris Hartmanis Cornell University, Ithaca, NY, USA

Editorial Board Members Elisa Bertino Purdue University, West Lafayette, IN, USA Wen Gao Peking University, , Bernhard Steffen TU Dortmund University, Dortmund, Germany Gerhard Woeginger RWTH Aachen, Aachen, Germany Moti Yung Columbia University, New York, NY, USA More information about this series at http://www.springer.com/series/7409 Xingming Sun • Jinwei Wang • Elisa Bertino (Eds.)

Artificial Intelligence and Security 6th International Conference, ICAIS 2020 , China, July 17–20, 2020 Proceedings, Part II

123 Editors Xingming Sun Jinwei Wang University of Information Science Nanjing University of Information Science Nanjing, China Nanjing, China Elisa Bertino Purdue University West Lafayette, IN, USA

ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notes in Computer Science ISBN 978-3-030-57880-0 ISBN 978-3-030-57881-7 (eBook) https://doi.org/10.1007/978-3-030-57881-7

LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Preface

The 6th International Conference on Artificial Intelligence and Security (ICAIS 2020), formerly called the International Conference on Cloud Computing and Security (ICCCS), was held during July 17–20, 2020, in Hohhot, China. Over the past five years, ICAIS has become a leading conference for researchers and engineers to share their latest results of research, development, and applications in the fields of artificial intelligence and information security. We used the Microsoft Conference Management Toolkits (CMT) system to manage the submission and review processes of ICAIS 2020. We received 1,064 submissions from 20 countries and regions, including Canada, Italy, Ireland, Japan, Russia, France, Australia, South Korea, South Africa, Iraq, Kazakhstan, Indonesia, Vietnam, Ghana, China, Taiwan, Macao, the USA, and the UK. The submissions cover the areas of artificial intelligence, big data, cloud computing and security, information hiding, IoT security, multimedia forensics, encryption, cybersecurity, and so on. We thank our Technical Program Committee (TPC) members and external reviewers for their efforts in reviewing papers and providing valuable comments to the authors. From the total of 1,064 submissions, and based on at least three reviews per submission, the program chairs decided to accept 142 papers, yielding an acceptance rate of 13%. The volume of the conference proceedings contains all the regular, poster, and workshop papers. The conference program was enriched by a series of keynote presentations, and the keynote speakers included: Xiang-Yang , University of Science and Technology of China, China; Hai Jin, Huazhong University of Science and Technology (HUST), China; and Jie Tang, Tsinghua University, China. We thank them for their wonderful speeches. There were 56 workshops organized in ICAIS 2020 which covered all the hot topics in artificial intelligence and security. We would like to take this moment to express our sincere appreciation for the contribution of all the workshop chairs and their partici- pants. We would like to extend our sincere thanks to all authors who submitted papers to ICAIS 2020 and to all TPC members. It was a truly great experience to work with such talented and hard-working researchers. We also appreciate the external reviewers for assisting the TPC members in their particular areas of expertise. Moreover, we want to thank our sponsors: Nanjing University of Information Science and Technology, New York University, ACM China, Michigan State University, University of Central Arkansas, Université Bretagne Sud, National Natural Science Foundation of China, Tech Science Press, Nanjing Normal University, University, and Northeastern State University.

May 2020 Xingming Sun Jinwei Wang Elisa Bertino Organization

General Chairs

Yun Q. Shi New Jersey Institute of Technology, USA Mauro Barni University of Siena, Italy Elisa Bertino Purdue University, USA Guanglai Gao Inner Mongolia University, China Xingming Sun Nanjing University of Information Science and Technology, China

Technical Program Chairs

Aniello Castiglione University of Salerno, Italy Yunbiao Guo China Information Technology Security Evaluation Center, China Suzanne K. McIntosh New York University, USA Jinwei Wang Nanjing University of Information Science and Technology, China Q. M. Jonathan Wu University of Windsor, Canada

Publication Chair

Zhaoqing Pan Nanjing University of Information Science and Technology, China

Workshop Chair

Baowei Wang Nanjing University of Information Science and Technology, China

Organization Chairs

Zhangjie Fu Nanjing University of Information Science and Technology, China Xiaorui Zhang Nanjing University of Information Science and Technology, China Wuyungerile Li Inner Mongolia University, China

Technical Program Committee Members

Saeed Arif University of Algeria, Algeria Anthony Ayodele University of Maryland, USA viii Organization

Zhifeng Bao Royal Melbourne Institute of Technology University, Australia Zhiping Cai National University of Defense Technology, China Ning Cao Qingdao Binhai University, China Paolina Centonze Iona College, USA Chin-chen Chang Feng Chia University, Taiwan, China Han-Chieh Chao Taiwan Dong Hwa University, Taiwan, China Bing Chen Nanjing University of Aeronautics and Astronautics, China Hanhua Chen Huazhong University of Science and Technology, China Xiaofeng Chen Xidian University, China Jieren Cheng University, China Lianhua Chi IBM Research Center, Australia Kim-Kwang Raymond The University of Texas at San Antonio, USA Choo Ilyong Chung Chosun University, South Korea Robert H. Deng Singapore Management University, Singapore Jintai Ding University of Cincinnati, USA Xinwen Fu University of Central Florida, USA Zhangjie Fu Nanjing University of Information Science and Technology, China Moncef Gabbouj Tampere University of Technology, Finland Ruili Geng Spectral MD, USA Song Guo Polytechnic University, Hong Kong, China Mohammad Mehedi Hassan King Saud University, Saudi Arabia Russell Higgs University College Dublin, Ireland Dinh Thai Hoang University Technology Sydney, Australia Wien Hong Sun Yat-sen University, China Chih-Hsien Hsia National Ilan University, Taiwan, China Robert Hsu Chung Hua University, Taiwan, China Xinyi Huang Normal University, China Yongfeng Huang Tsinghua University, China Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, China Patrick C. K. Hung Ontario Tech University, Canada Farookh Hussain University of Technology Sydney, Australia Genlin Ji Nanjing Normal University, China Hai Jin Huazhong University of Science and Technology, China Sam Tak Wu Kwong City University of Hong Kong, Hong Kong, China Chin-Feng Lai National Cheng Kung University, Taiwan, China Loukas Lazos University of Arizona, USA Sungyoung Lee Kyung Hee University, South Korea Chengcheng Li University of Cincinnati, USA Feifei Li Utah State University, USA Organization ix

Jin Li Guangzhou University, China Jing Li Rutgers University, USA Kuan-Ching Li Providence University, Taiwan, China Peng Li University of Aizu, Japan Yangming Li University of Washington, USA Luming Liang Uber Technology, USA Haixiang Lin Leiden University, The Netherlands Xiaodong Lin Ontario Tech University, Canada Zhenyi Lin Verizon Wireless, USA Alex Liu Michigan State University, USA Guangchi Liu Stratifyd Inc., USA Guohua Liu Donghua University, China Joseph Liu Monash University, Australia Quansheng Liu University of South Brittanny, France Xiaodong Liu Edinburgh Napier University, UK Yuling Liu University, China Zhe Liu University of Waterloo, Canada Daniel Xiapu Luo The Hong Kong Polytechnic University, Hong Kong, China Xiangyang Luo Zhengzhou Science and Technology Institute, China Tom Masino TradeWeb LLC, USA Suzanne K. McIntosh New York University, USA Nasir Memon New York University, USA Sangman Moh Chosun University, South Korea Yi Mu University of Wollongong, Australia Elie Naufal Applied Deep Learning LLC, USA Jiangqun Ni Sun Yat-sen University, China Rafal Niemiec University of Information Technology and Management, Poland Zemin Ning Wellcome Trust Sanger Institute, UK Shaozhang Niu Beijing University of Posts and Telecommunications, China Srikant Ojha Sharda University, India Jeff Z. Pan University of Aberdeen, UK Wei Pang University of Aberdeen, UK Chen Qian University of California Santa Cruz, USA Zhenxing Qian Fudan University, China Chuan Qin University of for Science and Technology, China Jiaohua Qin Central South University of Forestry and Technology, China Yanzhen Qu Colorado Technical University, USA Zhiguo Qu Nanjing University of Information Science and Technology, China Yongjun Ren Nanjing University of Information Science and Technology, China x Organization

Arun Kumar Sangaiah VIT University, India Di Shang Long Island University, USA Victor S. Sheng University of Central Arkansas, USA Zheng-guo Sheng University of Sussex, UK Robert Simon Sherratt University of Reading, UK Yun Q. Shi New Jersey Institute of Technology, USA Frank Y. Shih New Jersey Institute of Technology, USA Biao Song King Saud University, Saudi Arabia Guang Sun Hunan University of Finance and Economics, China Jianguo Sun Harbin University of Engineering, China Krzysztof Szczypiorski Warsaw University of Technology, Poland Tsuyoshi Takagi Kyushu University, Japan Shanyu Tang University of West London, UK Jing Tian National University of Singapore, Singapore Yoshito Tobe Aoyang University, Japan Cezhong Tong Washington University in St. Louis, USA Pengjun Wan Illinois Institute of Technology, USA Cai-Zhuang Wang Ames Laboratory, USA Ding Wang Peking University, China Guiling Wang New Jersey Institute of Technology, USA Honggang Wang University of Massachusetts-Dartmouth, USA Jian Wang Nanjing University of Aeronautics and Astronautics, China Jie Wang University of Massachusetts Lowell, USA Jin Wang Changsha University of Science and Technology, China Liangmin Wang University, China Ruili Wang Massey University, New Zealand Xiaojun Wang Dublin City University, Ireland Xiaokang Wang St. Francis Xavier University, Canada Zhaoxia Wang A*STAR, Singapore Sheng Wen Swinburne University of Technology, Australia Jian Weng Jinan University, China Edward Wong New York University, USA Eric Wong The University of Texas at Dallas, USA Shaoen Wu Ball State University, USA Shuangkui Xia Beijing Institute of Electronics Technology and Application, China Lingyun Xiang Changsha University of Science and Technology, China Yang Xiang Deakin University, Australia Yang Xiao The University of Alabama, USA Haoran Xie The Education University of Hong Kong, Hong Kong, China Naixue Xiong Northeastern State University, USA Wei Qi Yan Auckland University of Technology, New Zealand Organization xi

Aimin Yang University of Foreign Studies, China Ching-Nung Yang Taiwan Dong Hwa University, Taiwan, China Chunfang Yang Zhengzhou Science and Technology Institute, China Fan Yang University of Maryland, USA Guomin Yang University of Wollongong, Australia Qing Yang University of North Texas, USA Yimin Yang Lakehead University, Canada Ming Yin Purdue University, USA Shaodi You The Australian National University, Australia Kun-Ming Yu Chung Hua University, Taiwan, China Weiming Zhang University of Science and Technology of China, China Xinpeng Zhang Fudan University, China Yan Zhang Simula Research Laboratory, Norway Yanchun Zhang Victoria University, Australia Yao Zhao Beijing Jiaotong University, China

Organization Committee Members

Xianyi Chen Nanjing University of Information Science and Technology, China Yadang Chen Nanjing University of Information Science and Technology, China Beijing Chen Nanjing University of Information Science and Technology, China Baoqi Huang Inner Mongolia University, China Bing Jia Inner Mongolia University, China Jielin Jiang Nanjing University of Information Science and Technology, China Zilong Jin Nanjing University of Information Science and Technology, China Yan Kong Nanjing University of Information Science and Technology, China Yiwei Li Columbia University, USA Yuling Liu Hunan University, China Zhiguo Qu Nanjing University of Information Science and Technology, China Huiyu Sun New York University, USA Le Sun Nanjing University of Information Science and Technology, China Jian Su Nanjing University of Information Science and Technology, China Qing Tian Nanjing University of Information Science and Technology, China Yuan Tian King Saud University, Saudi Arabia Qi Wang Nanjing University of Information Science and Technology, China xii Organization

Lingyun Xiang Changsha University of Science and Technology, China Zhihua Xia Nanjing University of Information Science and Technology, China Lizhi Xiong Nanjing University of Information Science and Technology, China Leiming Yan Nanjing University of Information Science and Technology, China Li Yu Nanjing University of Information Science and Technology, China Zhili Zhou Nanjing University of Information Science and Technology, China Contents – Part II

Internet of Things

Green Crop Image Segmentation Based on Superpixel Blocks and Decision Tree ...... 3 Bo Wang and Zhibin Zhang

User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process ...... 18 Chen Yang, Guogen Wan, Peilin He, Yuanyuan Huang, and Shibin Zhang

Research on Chain of Evidence Based on Knowledge Graph ...... 30 Yizhuo Liu, Jin Shi, Jin Han, and Mingxin Lu

Research on the Construction of Intelligent Catalog System for New Media Information Resources ...... 42 Yiting Li, Jin Shi, Jin Han, Mingxin Lu, and Yan Zhang

Information Security

Construction of a Class of Four-Weight Linear Codes ...... 55 Ee Duan, Xiaoni Du, Tianxin Wang, and Jiawei Du

C m Designs from the Narrow-Sense Primitive BCH Codes ðq;q À1;d3;1Þ ...... 65 Fujun Zhang, Xiaoni Du, and Jinxia Hu

A Survey on Side-Channel Attacks of Strong PUF ...... 74 Yan Li, Jianjing Shen, Wei Liu, and Wei Zou

A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code ...... 86 Fei Hu, Yuanzhi Yao, Weihai Li, and Nenghai Yu

Hiding Traces of Camera Anonymization by Poisson Blending...... 98 Hui Zeng, Anjie Peng, and Xiangui Kang

A Deep Learning Approach to Detection of Warping Forgery in Images . . . . 109 Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, and Lihua Liu

The Course Design of Applied Talent Statistics Based on Fuzzy Control and Grey Measure Model ...... 119 Li Wu and Jun Yang xiv Contents – Part II

Reinforcement Learning-Based Resource Allocation in Edge Computing . . . . 131 Qianyu Xie, Xutao Yang, Laixin Chi, Xuejie Zhang, and Jixian Zhang

Fuzzy Multi-objective Requirements for NRP Based on Particle Swarm Optimization ...... 143 Yachuan Zhang, Hao Li, Rongjing Bu, Chenming Song, Tao Li, Yan Kang, and Tie Chen

A Clustering Algorithm for Wireless Sensor Networks Using Geographic Distribution Information and Genetic Algorithms ...... 156 Yu Song, Zhigui Liu, and He Xiao

Dual Residual Global Context Attention Network for Super-Resolution . . . . . 166 Jingjun Zhou, Jingbing Li, Hui Li, Jing Liu, Qianning Dai, Saqib Ali Nawaz, and Jian Shen

A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences...... 179 Fengming Qin, Jingbing Li, Hui Li, Jing Liu, Saqib Ali Nawaz, and Yanlin Liu

Encryption Algorithm for TCP Session Hijacking ...... 191 Minghan Chen, Fangyan Dai, Bingjie Yan, and Jieren Cheng

A Covert Information Transmission Scheme Based on High Frequency Acoustic Wave Channel...... 203 Huiling Li, Yayi Zou, Wenjia Yi, Ziyi Ye, and Yi Ma

Privacy Preserving Mining System of Association Rules in OpenStack-Based Cloud...... 215 Zhijun Zhang, Zeng Shou, Zhiyan Ning, Dan Wang, Yingjian Gao, Kai Lu, and Qi Zhang

Unsupervised Data Transmission Scheduling in Cloud Computing Environment...... 225 Gui Liu, Wei Zhou, Yongyong Dai, Haijiang Xu, and Li Wang

DUMPLING: Cross-Domain Data Security Sharing Based on Blockchain . . . 236 Mingda Liu and Yijuan Shi

A Semi-quantum Group Signature Scheme Based on Bell States...... 246 Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, and Tao Zheng

An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication ...... 258 Peilin He, Yuanyuan Huang, Jialing Dai, and Shibin Zhang Contents – Part II xv

A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of Things ...... 267 Gongxin Shen

Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States . . . . 280 Xue-Yang Li, Yan Chang, and Shi-Bin Zhang

A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States ...... 289 Tao Zheng, Shi-Bin Zhang, Yan Chang, and Lili Yan

Quantum Key Distribution Protocol Based on GHZ Like State and Bell State...... 298 Ji-Zhong Wu and Lili Yan

Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System ...... 307 Jianchao Gan, Zhiwei Sheng, Shibin Zhang, and Yang Zhao

A Blockchain Based Distributed Storage System for Knowledge Graph Security ...... 318 Yichuan Wang, Xinyue Yin, He Zhu, and Xinhong Hei

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average ...... 328 Xizi Peng, Jinquan Zhang, and Shibin Zhang

An AHP/DEA Methodology for the Public Safety Evaluation ...... 341 Li Mao, Naqin Zhou, Tong Zhang, Wei Du, Han Peng, and Lina Zhu

Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox Fuzzing...... 353 Chunlai Du, Shenghui Liu, Yanhui Guo, Lei Si, and Tong Jin

Summary of Research on Information Security Protection of Smart Grid . . . . 365 Li Xu and Yanbin Sun

Framework Design of Environment Monitoring System Based on Machine Learning...... 380 Lingxiao Meng, Shudong Li, Xiaobo Wu, and Weihong Han

Compression Detection of Audio Waveforms Based on Stacked Autoencoders ...... 393 Da Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, and Zhenghui Liu xvi Contents – Part II

A Deep Reinforcement Learning Framework for Vehicle Detection and Pose Estimation in 3D Point Clouds ...... 405 Weipeng Wang, Huan Luo, Quan Zheng, Cheng Wang, and Wenzhong Guo

A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA...... 417 Ran Zhang, Min Liu, Qikun Zhang, and Zengyu Cai

Research on User Preference Film Recommendation Based on Attention Mechanism...... 428 Lei Zhu, Yufeng Liu, Wei Zhang, and Kehua Yang

Traffic Anomaly Detection for Data Communication Networks...... 440 Xiaoxiao Tang, Wencui Li, Jing Shen, Feng Qi, and Shaoyong Guo

Video Action Recognition Based on Hybrid Convolutional Network ...... 451 Yanyan Song, Li Tan, Lina Zhou, Xinyue Lv, and Zihao Ma

Identification of Botany Terminology Based on Bert-BLSTM-CRF ...... 463 Aziguli Wulamu, Ning Chen, Lijia Yang, Li Wang, and Jiaxing Shi

Correlation Analysis of Chinese Pork Concept Stocks Based on Big Data . . . 475 Yujiao Liu, Lin He, Duohui Li, Xiaozhao Luo, Guo Peng, Xiaoping Fan, and Guang Sun

Visual SLAM Location Methods Based on Complex Scenes: A Review . . . . 487 Hanxiao Zhang and Jiansheng Peng

Improvement of Co-training Based Recommender System with Machine Learning ...... 499 Wenpan Tan, Yong He, and Bing Zhu

Privacy Security Classification (PSC) Model for the Attributes of Social Network Users ...... 510 Yao Xiao and Junguo Liao

Clustering Analysis of Extreme Temperature Based on K-means Algorithm . . . 523 Wu Zeng, YingXiang Jiang, ZhanXiong Huo, and Kun Hu

Network Topology Boundary Routing IP Identification for IP Geolocation. . . 534 Fuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, and Xiangyang Luo

Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package ...... 545 Bin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, and Yunqing Shi Contents – Part II xvii

A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment ...... 557 Wei She, Jiansen Chen, Xianfeng He, Xiaoyu Yang, Xuhong Lu, Zhihao Gu, Wei Liu, and Zhao Tian

Multilayer Perceptron Based on Joint Training for Predicting Popularity . . . . 570 Wei She, Li Xu, Huibo Xu, Xiaoqing Zhang, Yue Hu, and Zhao Tian

A Medical Blockchain Privacy Protection Model Based on Mimicry Defense ...... 581 Wei Liu, Yufei Peng, Zhao Tian, Yang Li, and Wei She

Securing Data Communication of Internet of Things in 5G Using Network Steganography ...... 593 Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Junxiang Wang, and Changlong Lu

The Use of the Multi-objective Ant Colony Optimization Algorithm in Land Consolidation Project Site Selection...... 604 Hua Wang, Weiwei Li, Jiqiang Niu, and Dianfeng Liu

Image Content Location Privacy Preserving in Social Network Travel Image Sharing ...... 617 Wang Xiang, Canji Yang, Lingling Jiao, and Qingqi Pei

A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform ...... 629 Renjie Liang, Peijia Zheng, Yanmei Fang, and Tingting Song

A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System ...... 642 Jinrun Guo, Xiehua Li, and Jie Jiang

Big Data and Cloud Computing

Point-to-Point Offline Authentication Consensus Algorithm in the Internet ofThings...... 655 Xiao-Feng Du, Yue-Ming Lu, and Dao-Qi Han

Classification of Tourism English Talents Based on Relevant Features Mining and Information Fusion...... 664 Qin Miao, Li Wu, and Jun Yang

Research on Application of Big Data Combined with Probability Statistics in Training Applied Talents ...... 674 Li Wu and Jun Yang xviii Contents – Part II

Region Proposal for Line Insulator Based on the Improved Selective Search Algorithm ...... 686 Shuqiang Guo, Baohai Yue, Qianlong Bai, Huanqiang Lin, and Xinxin Zhou

A Collaborative Filtering Algorithm Based on the User Characteristics and Time Windows ...... 697 Dun Li, Cui Wang, Lun Li, and Zhiyun Zheng

MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement Mechanism . . . . . 710 Kai Yang, Zhaowei Qu, Xiaoru Wang, Fu Li, Yueli Li, and Dongbai Jia

Information Processing

Research on Psychological Counseling and Personality Analysis Algorithm Based on Speech Emotion ...... 725 Zhaojin Hong, Chenyang Wei, Yuan Zhuang, Ying Wang, Yiting Wang, and Li Zhao

Underwater Image Enhancement Based on Color Balance and Edge Sharpening ...... 738 Yan Zhou, Yibin Tang, Guanying Huo, and Dabing Yu

Stereo Matching Using Discriminative Feature-Oriented and Gradient-Constrained Dictionary Learning ...... 748 Jiale Zhang, Yan Zhou, Qingwu Li, Huixing Sheng, Dabing Yu, and Xinyue Chang

Acoustic Emission Recognition Based on Spectrogram and Acoustic Features ...... 760 Wei Wang, Weidong Liu, and Jinming Liu

Polyhedron Target Structure Information Extraction Method in Single Pixel Imaging System ...... 769 Jin Zhang, Mengqiong Ge, Xiaoyu Shi, Zhuohao Weng, and Jian Zhang

Design and Implementation of Four-Meter Reading Sharing System Based on Blockchain ...... 776 Baoyu Xiang, Zhuo Yu, Ke Xie, Shaoyong Guo, Meiling Dai, and Sujie Shao

Edge-Feedback ICN Cooperative Caching Strategy Based on Relative Popularity ...... 786 Huansong Li, Zhuo Yu, Ke Xie, Xuesong Qiu, and Shaoyong Guo Contents – Part II xix

Reliability Improvement Algorithm of Power Communication Network Based on Network Fault Characteristics ...... 798 Ruide Li, Feng Wang, XinXin Zhang, Jiajun Chen, and Jie Tong

Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal Networks...... 805 Xuehan Zhang, Xiaojuan Wang, and Lianping Zhang

Author Index ...... 815 Contents – Part I

Artificial Intelligence

Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection ...... 3 Yabo Wang and Shuning Xu

Computing Sentence Embedding by Merging Syntactic Parsing Tree and Word Embedding ...... 14 Yong Wang , Maosheng Zhong, Lan Tao, and Shuixiu Wu

An Overview of Cross-Language Information Retrieval ...... 26 Liang Zhang and Xiaobing Zhao

A Formal Method for Safety Time Series Simulation of Aerospace ...... 38 Ti Zhou, Jinying Wang, and Yi Miao

Tuple Measure Model Based on CFI-Apriori Algorithm...... 49 Qing-Qing Wu, Xing-Shuo An, and Yan-yan Zhang

Deep Learning Video Action Recognition Method Based on Key Frame Algorithm ...... 62 Li Tan, Yanyan Song, Zihao Ma, Xinyue Lv, and Xu Dong

Optimization and Deployment of Vehicle Trajectory Prediction Scheme Based on Real-Time ANPR Traffic Big Data ...... 74 Zhe Long and Zuping Zhang

Ear Recognition Based on Gabor-SIFT ...... 86 Ying Tian, Huiwen Dong, and Libing Wang

Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Caching ...... 95 Zhenyuan Zhang, Fang Liu, Zhenhua Cai, Yihong Su, and Weijun Li

Conjunctive Keywords Searchable Encryption Scheme Against Inside Keywords Guessing Attack from Lattice ...... 107 Xiaoling Yu, Chungen Xu, and Bennian Dou

Detecting Bluetooth Attacks Against Smartphones by Device Status Recognition ...... 120 Fan Wei xxii Contents – Part I

Covered Face Recognition Based on Deep Convolution Generative Adversarial Networks ...... 133 Yanru Xiao, Mingming Lu, and Zhangjie Fu

An Efficient Method for Generating Matrices of Quantum Logic Circuits. . . . 142 Zhiqiang Li, Jiajia Hu, Xi Wu, Juan Dai, Wei Zhang, and Donghan Yang

A Mobile Device Multitasking Model with Multiple Mobile Edge Computing Servers ...... 151 Tao Deng, Yunkai Zhao, Ximing Zhang, Bin Xu, Jin Qi, and Yuntao Ma

A Localization Algorithm Based on Emulating Large Bandwidth with Passive RFID Tags ...... 162 Die Jiang, Liangbo Xie, and Qing Jiang

An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network ...... 173 Mingxi Yin, Jinliang Yu, Shanshan Tu, Muhammad Waqas, Sadaqat Ur Rehman, Ghulam Abbas, and Ziaul Haq Abbas

A Research for 2-m Temperature Prediction Based on Machine Learning. . . . 184 Kaiyin Mao, Chen Xue, Changming Zhao, and Jia He

A New Scheme for Essential Proteins Identification in Dynamic Weighted Protein-Protein Interaction Networks ...... 195 Wei Liu, Liangyu Ma, and Yuliang Tang

On Enterprises’ Total Budget Management Based on Big Data Analysis . . . . 207 Hangjun Zhou, Jie Li, Jing Wang, Jiayi Ren, Peng Guo, and Jianjun Zhang

IoT Device Recognition Framework Based on Network Protocol Keyword Query ...... 219 Zi-Xiao Xu, Qin-yun Dai, Gang Xu, He Huang, Xiu-Bo Chen, and Yi-Xian Yang

Application of ARIMA Model in Financial Time Series in Stocks...... 232 Jiajia Cheng, Huiyun Deng, Guang Sun, Peng Guo, and Jianjun Zhang

A Topological Control Algorithm Based on Energy Consumption Analysis and Locomotion of Nodes in Ad Hoc Network...... 244 Chaochao Li, Jiangxia Tan, Hanwen Xu, Zichuan Guo, and Qun Luo

A Simulation Platform for the Brain-Computer Interface (BCI) Based Smart Wheelchair ...... 257 Xinru Huang, Xianwei Xue, and Zhongyun Yuan Contents – Part I xxiii

A Learning Resource Recommendation Model Based on Fusion of Sequential Information...... 267 Ruofei Zhu, Zhengzhou Zhu, and Qun Guo

A Convolutional Neural Network-Based Complexity Reduction Scheme in 3D-HEVC ...... 279 Chang Liu, Ke-bin Jia, and Peng-yu Liu

Air Quality Index Prediction Based on Deep Recurrent Neural Network . . . . 291 Zhiyu Chen, Yuzhu Zhang, Gang Liu, and Jianwei Guo

Sparse Representation for Face Recognition Based on Projective Dictionary Pair Learning ...... 305 Yang Liu, Jianming Zhang, and Yangchun Liu

An Improved HF Channel Wideband Detection Method Based on Scattering Function...... 317 Lantu Guo, Yanan Liu, and Wenxin Li

Research on Quality Control of Marine Monitoring Data Based on Extreme Learning Machine ...... 327 Yuanshu Li, Feng Liu, Kai Wang, Hai Huang, Fenglin Wei, and Hong Qi

Study on the Extraction of Target Contours of Underwater Images ...... 339 Luyan Tong, Fenglin Wei, Yupeng Pan, and Kai Wang

Short-Term Demand Forecasting of Shared Bicycles Based on Long Short-Term Memory Neural Network Model ...... 350 Ming Du, Dandan Cao, Xi Chen, Shurui Fan, and Zirui Li

An Effective Bacterial Foraging Optimization Based on Conjugation and Novel Step-Size Strategies ...... 362 Ming Chen, Yikun Ou, Xiaojun Qiu, and Hong Wang

A Coding Scheme Design for the Shape Code of Standardized Yi Characters in Liangshan...... 375 Qiyan Hu, Xiaobing Zhao, and Liang Zhang

Police: An Effective Truth Discovery Method in Intelligent Crowd Sensing ...... 384 Ming Zhao and Jia Jiao

Improve Data Freshness in Mobile Crowdsensing by Task Assignment . . . . . 399 Ming Zhao and Shanshan Yang

Access Control Based on Proxy Re-encryption Technology for Personal Health Record Systems ...... 411 Baolu Liu and Jianbo Xu xxiv Contents – Part I

Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification ...... 422 Xiaohu Du, Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, and Qinbo Wu

QR Code Detection with Faster-RCNN Based on FPN ...... 434 Jinbo Peng, Song Yuan, and Xin Yuan

General Virtual Images Construction Using Pixel Scrambling for Face Recognition ...... 444 Yingnan Zhao and Jie Wu

Knowledge Graph Construction of Personal Relationships ...... 455 Yong Jin, Qiao Jin, and Xusheng Yang

Blind Spectrum Sensing Based on the Statistical Covariance Matrix and K-Median Clustering Algorithm ...... 467 Jiawei Zhuang, Yonghua Wang, Pin Wan, Shunchao Zhang, Yongwei Zhang, and Yi Li

An Efficient Web Caching Replacement Algorithm ...... 479 Fan You, Tong Liu, Xiaoyu Peng, Jiahao Liang, Baili Zhang, and Yinian Zhou

Carrier-Phase Based Ranging Algorithm with Multipath Suppression in RFID System ...... 489 Xiaohui Fu, Liangbo Xie, and Mu Zhou

Research on Vehicle Routing Problem Based on Tabu Search Algorithm . . . . 501 Jinhui Ge and Xiaoliang Liu

Unsupervised Situational Assessment for Power Grid Voltage Stability Monitoring Based on Siamese Autoencoder and k-Means Clustering ...... 510 Xiwei Bai and Jie Tan

The Mathematical Applications of Majorization Inequalities to Quantum Mechanics ...... 522 Mengke Xu, Zhihao Liu, Hanwu Chen, and Sihao Zheng

The Numerical Results of Binary Coherent-State Signal’s Quantum Detection in the Presence of Noise ...... 532 Wenbin Yu, Zijia Xiong, Zangqiang Dong, Yinsong Xu, Wenjie Liu, Zhiguo Qu, and Alex X. Liu

An Adaptive Parameters Density Cluster Algorithm for Data Cleaning in Big Data ...... 543 Xiaopeng Zhang, Ruijie Lin, and Haitao Xu Contents – Part I xxv

Relevance and Time Based Collaborative Filtering for Recommendation . . . . 554 Aobo Zhang, Ruijie Lin, and Haitao Xu

A Displacement Data Acquisition and Transmission System Based on a Wireless Body Domain Network ...... 564 Juan Guo, Feng Sheng, Jie Li, Chao Guo, and Dingbang Xie

Data Cleaning Algorithm Based on Body Area Network ...... 575 Juan Guo, Yuzhuo Zong, Fang Chen, Chao Guo, and Dingbang Xie

Improving Performance of Colour-Histogram-Based CBIR Using Bin Matching for Similarity Measure...... 586 Martey Ezekiel Mensah, Xiaoyu Li, Hang Lei, Appiah Obed, and Ninfaakanga Christopher Bombie

A Survey on Risk Zonation of Lightning ...... 597 Yunfei Wang and Meixuan Qu

Joint Extraction of Entity and Semantic Relation Using Encoder - Decoder Model Based on Attention Mechanism...... 607 Yubo Mai, Yatian Shen, Qi, and Xiajiong Shen

Internet of Things

Image Segmentation of Manganese Nodules Based on Background Gray Value Computation ...... 621 Ha-de Mao, Yu-liang Liu, Hong-zhe Yan, and Cheng Qian

A Portable Intelligent License Plate Recognition System Based on off-the-Shelf Mini Camera ...... 635 Haixia Yang, Wei Zhuang, Qingfeng Zhou, Dong Dai, and Weigong Zhang

Mechanical Analysis and Dynamic Simulation of Ship Micro In-pipe Robot ...... 646 Zhipeng Xu, Yuliang Liu, Han-de Mao, Sheng Chang, and Shuxun Li

LoRa Devices Identification Based on Differential Constellation Trace Figure...... 658 Xiuting Wu, Yu Jiang, and Aiqun Hu

Improved Helmet Wearing Detection Method Based on YOLOv3 ...... 670 Peizhi Wen, Mingyang Tong, Zhenrong Deng, Qinzhi Qin, and Rushi Lan xxvi Contents – Part I

MobiMVL: A Model-Driven Mobile Application Development Approach for End-Users ...... 682 Zhongyi Zhai, Ke Xiang, Lingzhong Zhao, and Junyan Qian

Analysis on Buffer-Aided Energy Harvesting Device-to-Device Communications ...... 695 Guangjun Liang, Qun Wang, Jianfang Xin, Lingling Xia, Xueli Ni, and Jie Xu

Research on Traceability of Agricultural Products Supply Chain System Based on Blockchain and Internet of Things Technology ...... 707 Hongyi Jiang, Xing Sun, and Xiaojun Li

Design of Remote-Control Multi-view Monitor for Vehicle-Mounted Mobile Phone Based on IoT...... 719 Qian Ni, Meixia Ji, Ning Cao, Shouxu Du, and Wei Huo

Super-Resolution Reconstruction of Electric Power Inspection Images Based on Very Deep Network Super Resolution ...... 729 Bowen Shi, Jilong Gao, Zhentao He, Tian Zhang, Tie Zhong, and Haipeng Chen

Single Color Image Dehazing Based on Vese-Osher Model and Dark Channel Prior Algorithm ...... 739 Wei Weibo, Zhao Hui, and Gao Zhuzhu

Traffic-Behavioral Anomaly Detection of Endhosts Based on Community Discovery ...... 751 Mingda Wang, Xuemeng Zhai, Hangyu Hu, and Guangmin Hu

A Lightweight Indoor Location Method Based on Image Fingerprint ...... 763 Ran Gao and Yanchao Zhao

Performance Analysis and Optimization for Multiple Carrier NB-IoT Networks ...... 775 Sijia Lou, En Tong, and Fei Ding

A Short Flows Fast Transmission Algorithm Based on MPTCP Congestion Control ...... 786 Hua Zhong, PingPing Dong, WenSheng Tang, Bo Yang, and JingYun Xie

Analysis of Public Transport System Efficiency Based on Multi-layer Network ...... 798 Lu Xu, Funing Yang, Zhezhou Yu, Qiuyang Huang, Xuan Ji, and Yuanbo Xu Contents – Part I xxvii

Fast Video Classification with CNNs in Compressed Domain...... 810 Lorxayxang Kai, Yang Wu, Xiaodong Dai, and Ming Ma

Author Index ...... 823