語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced intelligent computing techn...
~
Huang, De-Shuang.
FindBook
Google Book
Amazon
博客來
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part II /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced intelligent computing technology and applications/ edited by De-Shuang Huang ... [et al.].
其他題名:
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
其他題名:
ICIC 2025
其他作者:
Huang, De-Shuang.
團體作者:
International Conference on Intelligent Computing
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxi, 519 p. :ill. (chiefly col.), digital ;24 cm.
內容註:
Information Security. -- A High-efficiency Consensus Algorithm for Consortium Blockchain with Byzantine Fault Tolerance. -- LPT: Lightweight Pooling Transformer for Object Detection. -- Semantic-Enhanced Attack Scenario Reconstruction Using Property Graph and Modular Ontologies. -- Deep Forgery Detection Based on Staged Differential Feature Enhancement. -- Secure Trust-MM: A Multimodal Large Model Framework with Game Theoretic Adversarial Defense for Trustworthy Cybersecurity. -- Membership Inference Attack against Machine Learning based on Calibrated Frobenius Norm. -- Neural Networks. -- A Novel Fuzzy Cross Efficiency DEA Model Based on Prospect Theory. -- Two-Sided Preference-Aware Dynamic Ride Sharing: Optimizing Driver Income and Passenger Costs. -- Fine-Grained Sentiment Analysis of Microblogs Based on Multidimensional Interactive Attention Sentiment Guidance. -- RB-RAG: Intelligent Question Answering System of Rock Burst Knowledge Based on Retrieval-Augmented Generation. -- Side-Channel Hardware Trojan Detection Based on LSTM-TCN Network. -- Efficient Grouped Full Convolution Network for Semantic Segmentation. -- Spectral Topology Meets Local Geometry: A Dual-Block Graph Transformer with Provable Expressive Power. -- Enhancing Domain Adaptation in Speaker Verification via Partially Shared Adversarial Network. -- Path-Aware Graph Neural Network for Link Prediction in Latent Heterogeneous Graphs. -- Multi-Dimensional AGV Path Planning in 3D Warehouses Using Ant Colony Optimization and Advanced Neural Networks. -- Similarity-based Weighted Fusion and Token Retention Strategy for Efficient Vision Transformers. -- Autonomous Decision-making Spiking Neural Network based on Evidence Accumulation. -- Cross-Modal Shared Prompts for Aspect-Based Multimodal Sentiment Analysis. -- Spatio-Temporal Synergistic Sparse Transformer: Algorithm-Hardware Ecosystem Co-Design for Efficient Multimodal Learning. -- CSSCNet: Combining Square and Strip Convolution for Remote Sensing Object Detection. -- KAGAT: Kolmogorov-Arnold Graph Attention Network. -- A Learnable Threshold and Resistance Spiking Neuron for Efficient Spiking Neural Networks Training. -- Negative Sample optimization and Bias Mitigation for Robust Visual Question Answering. -- Point-Level Enhancement and Background Suppression Network for Point Supervised Temporal Action Localization. -- BiG-Mamba: Bidirectional Graph and Mamba Modeling for Multivariate Time Series Forecasting. -- Multimodal Collaborative Attention Fusion Network for Remote Sensing Visual Question Answering. -- Occlusion-Aware Self-Supervised Monocular Depth Estimation for Weak Texture Endoscopic Images. -- KC-UNet++: A Thymic Tumor Segmentation Method Based on Kolmogorov-Arnold Network and CBAM. -- MQBN: Data-Free Mixed-Precision Quantization via Batch Normalization Statistics. -- A Global-Local Interactive Multimodal Sentiment Analysis Framework with Adaptive Attention and Multi-Scale Feature Enhancement. -- Anomaly-Driven Defense: Mitigating Bit-Flip Attacks in Deep Neural Networks via Runtime Parameter Clipping. -- GlintNet: A Lightweight Global-Local Integration Network with Spatial Channel Mixed Attention for ReID. -- TGM: An Industrial Sensor Network Anomaly Detection. -- GNNCacheInfer: Efficient Graph Neural Network Inference via Embedding Cache. -- GatE2R: A novel method for Cement Industry Information Extraction. -- Fraud Detection on Multi-Relational Graphs via Semantic Extraction and Topological Enhancement. -- YOLOv8-LSI: Enhanced Weed Detection in Agricultural Fields Using Large Convolutional Kernels and Dimensionality-Expanded Channel Attention. -- YOLO-MobileNet: A Lightweight Model for Surgical Instrument Detection. -- A Lightweight Multi-Modal Dynamic Fusion Network Based Method for Person Re-Identification in Videos. -- A hybrid model based on CNN, Transformer and GRU for SOC estimation of lithium-ion batteries -- Enhancing Session-Based Social Recommendation with Multi-Interest Global Popularity Preferences. -- Frontiers of Spiking Neural Network Encoding Techniques: A Comprehensive Review.
Contained By:
Springer Nature eBook
標題:
Computational intelligence - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-9946-9
ISBN:
9789819699469
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part II /
Advanced intelligent computing technology and applications
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.Part II /[electronic resource] :ICIC 2025edited by De-Shuang Huang ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxi, 519 p. :ill. (chiefly col.), digital ;24 cm. - Communications in computer and information science,25651865-0937 ;. - Communications in computer and information science ;2565..
Information Security. -- A High-efficiency Consensus Algorithm for Consortium Blockchain with Byzantine Fault Tolerance. -- LPT: Lightweight Pooling Transformer for Object Detection. -- Semantic-Enhanced Attack Scenario Reconstruction Using Property Graph and Modular Ontologies. -- Deep Forgery Detection Based on Staged Differential Feature Enhancement. -- Secure Trust-MM: A Multimodal Large Model Framework with Game Theoretic Adversarial Defense for Trustworthy Cybersecurity. -- Membership Inference Attack against Machine Learning based on Calibrated Frobenius Norm. -- Neural Networks. -- A Novel Fuzzy Cross Efficiency DEA Model Based on Prospect Theory. -- Two-Sided Preference-Aware Dynamic Ride Sharing: Optimizing Driver Income and Passenger Costs. -- Fine-Grained Sentiment Analysis of Microblogs Based on Multidimensional Interactive Attention Sentiment Guidance. -- RB-RAG: Intelligent Question Answering System of Rock Burst Knowledge Based on Retrieval-Augmented Generation. -- Side-Channel Hardware Trojan Detection Based on LSTM-TCN Network. -- Efficient Grouped Full Convolution Network for Semantic Segmentation. -- Spectral Topology Meets Local Geometry: A Dual-Block Graph Transformer with Provable Expressive Power. -- Enhancing Domain Adaptation in Speaker Verification via Partially Shared Adversarial Network. -- Path-Aware Graph Neural Network for Link Prediction in Latent Heterogeneous Graphs. -- Multi-Dimensional AGV Path Planning in 3D Warehouses Using Ant Colony Optimization and Advanced Neural Networks. -- Similarity-based Weighted Fusion and Token Retention Strategy for Efficient Vision Transformers. -- Autonomous Decision-making Spiking Neural Network based on Evidence Accumulation. -- Cross-Modal Shared Prompts for Aspect-Based Multimodal Sentiment Analysis. -- Spatio-Temporal Synergistic Sparse Transformer: Algorithm-Hardware Ecosystem Co-Design for Efficient Multimodal Learning. -- CSSCNet: Combining Square and Strip Convolution for Remote Sensing Object Detection. -- KAGAT: Kolmogorov-Arnold Graph Attention Network. -- A Learnable Threshold and Resistance Spiking Neuron for Efficient Spiking Neural Networks Training. -- Negative Sample optimization and Bias Mitigation for Robust Visual Question Answering. -- Point-Level Enhancement and Background Suppression Network for Point Supervised Temporal Action Localization. -- BiG-Mamba: Bidirectional Graph and Mamba Modeling for Multivariate Time Series Forecasting. -- Multimodal Collaborative Attention Fusion Network for Remote Sensing Visual Question Answering. -- Occlusion-Aware Self-Supervised Monocular Depth Estimation for Weak Texture Endoscopic Images. -- KC-UNet++: A Thymic Tumor Segmentation Method Based on Kolmogorov-Arnold Network and CBAM. -- MQBN: Data-Free Mixed-Precision Quantization via Batch Normalization Statistics. -- A Global-Local Interactive Multimodal Sentiment Analysis Framework with Adaptive Attention and Multi-Scale Feature Enhancement. -- Anomaly-Driven Defense: Mitigating Bit-Flip Attacks in Deep Neural Networks via Runtime Parameter Clipping. -- GlintNet: A Lightweight Global-Local Integration Network with Spatial Channel Mixed Attention for ReID. -- TGM: An Industrial Sensor Network Anomaly Detection. -- GNNCacheInfer: Efficient Graph Neural Network Inference via Embedding Cache. -- GatE2R: A novel method for Cement Industry Information Extraction. -- Fraud Detection on Multi-Relational Graphs via Semantic Extraction and Topological Enhancement. -- YOLOv8-LSI: Enhanced Weed Detection in Agricultural Fields Using Large Convolutional Kernels and Dimensionality-Expanded Channel Attention. -- YOLO-MobileNet: A Lightweight Model for Surgical Instrument Detection. -- A Lightweight Multi-Modal Dynamic Fusion Network Based Method for Person Re-Identification in Videos. -- A hybrid model based on CNN, Transformer and GRU for SOC estimation of lithium-ion batteries -- Enhancing Session-Based Social Recommendation with Multi-Interest Global Popularity Preferences. -- Frontiers of Spiking Neural Network Encoding Techniques: A Comprehensive Review.
The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
ISBN: 9789819699469
Standard No.: 10.1007/978-981-96-9946-9doiSubjects--Topical Terms:
704428
Computational intelligence
--Congresses.
LC Class. No.: Q342 / .I58 2025
Dewey Class. No.: 006.3
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part II /
LDR
:06162nmm a2200349 a 4500
001
2413716
003
DE-He213
005
20250715124738.0
006
m d
007
cr nn 008maaau
008
260205s2025 si s 0 eng d
020
$a
9789819699469
$q
(electronic bk.)
020
$a
9789819699452
$q
(paper)
024
7
$a
10.1007/978-981-96-9946-9
$2
doi
035
$a
978-981-96-9946-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q342
$b
.I58 2025
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q342
$b
.I61 2025
111
2
$a
International Conference on Intelligent Computing
$n
(21st :
$d
2025 :
$c
Ningbo, China)
$3
3789965
245
1 0
$a
Advanced intelligent computing technology and applications
$h
[electronic resource] :
$b
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
$n
Part II /
$c
edited by De-Shuang Huang ... [et al.].
246
3
$a
ICIC 2025
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxi, 519 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
2565
505
0
$a
Information Security. -- A High-efficiency Consensus Algorithm for Consortium Blockchain with Byzantine Fault Tolerance. -- LPT: Lightweight Pooling Transformer for Object Detection. -- Semantic-Enhanced Attack Scenario Reconstruction Using Property Graph and Modular Ontologies. -- Deep Forgery Detection Based on Staged Differential Feature Enhancement. -- Secure Trust-MM: A Multimodal Large Model Framework with Game Theoretic Adversarial Defense for Trustworthy Cybersecurity. -- Membership Inference Attack against Machine Learning based on Calibrated Frobenius Norm. -- Neural Networks. -- A Novel Fuzzy Cross Efficiency DEA Model Based on Prospect Theory. -- Two-Sided Preference-Aware Dynamic Ride Sharing: Optimizing Driver Income and Passenger Costs. -- Fine-Grained Sentiment Analysis of Microblogs Based on Multidimensional Interactive Attention Sentiment Guidance. -- RB-RAG: Intelligent Question Answering System of Rock Burst Knowledge Based on Retrieval-Augmented Generation. -- Side-Channel Hardware Trojan Detection Based on LSTM-TCN Network. -- Efficient Grouped Full Convolution Network for Semantic Segmentation. -- Spectral Topology Meets Local Geometry: A Dual-Block Graph Transformer with Provable Expressive Power. -- Enhancing Domain Adaptation in Speaker Verification via Partially Shared Adversarial Network. -- Path-Aware Graph Neural Network for Link Prediction in Latent Heterogeneous Graphs. -- Multi-Dimensional AGV Path Planning in 3D Warehouses Using Ant Colony Optimization and Advanced Neural Networks. -- Similarity-based Weighted Fusion and Token Retention Strategy for Efficient Vision Transformers. -- Autonomous Decision-making Spiking Neural Network based on Evidence Accumulation. -- Cross-Modal Shared Prompts for Aspect-Based Multimodal Sentiment Analysis. -- Spatio-Temporal Synergistic Sparse Transformer: Algorithm-Hardware Ecosystem Co-Design for Efficient Multimodal Learning. -- CSSCNet: Combining Square and Strip Convolution for Remote Sensing Object Detection. -- KAGAT: Kolmogorov-Arnold Graph Attention Network. -- A Learnable Threshold and Resistance Spiking Neuron for Efficient Spiking Neural Networks Training. -- Negative Sample optimization and Bias Mitigation for Robust Visual Question Answering. -- Point-Level Enhancement and Background Suppression Network for Point Supervised Temporal Action Localization. -- BiG-Mamba: Bidirectional Graph and Mamba Modeling for Multivariate Time Series Forecasting. -- Multimodal Collaborative Attention Fusion Network for Remote Sensing Visual Question Answering. -- Occlusion-Aware Self-Supervised Monocular Depth Estimation for Weak Texture Endoscopic Images. -- KC-UNet++: A Thymic Tumor Segmentation Method Based on Kolmogorov-Arnold Network and CBAM. -- MQBN: Data-Free Mixed-Precision Quantization via Batch Normalization Statistics. -- A Global-Local Interactive Multimodal Sentiment Analysis Framework with Adaptive Attention and Multi-Scale Feature Enhancement. -- Anomaly-Driven Defense: Mitigating Bit-Flip Attacks in Deep Neural Networks via Runtime Parameter Clipping. -- GlintNet: A Lightweight Global-Local Integration Network with Spatial Channel Mixed Attention for ReID. -- TGM: An Industrial Sensor Network Anomaly Detection. -- GNNCacheInfer: Efficient Graph Neural Network Inference via Embedding Cache. -- GatE2R: A novel method for Cement Industry Information Extraction. -- Fraud Detection on Multi-Relational Graphs via Semantic Extraction and Topological Enhancement. -- YOLOv8-LSI: Enhanced Weed Detection in Agricultural Fields Using Large Convolutional Kernels and Dimensionality-Expanded Channel Attention. -- YOLO-MobileNet: A Lightweight Model for Surgical Instrument Detection. -- A Lightweight Multi-Modal Dynamic Fusion Network Based Method for Person Re-Identification in Videos. -- A hybrid model based on CNN, Transformer and GRU for SOC estimation of lithium-ion batteries -- Enhancing Session-Based Social Recommendation with Multi-Interest Global Popularity Preferences. -- Frontiers of Spiking Neural Network Encoding Techniques: A Comprehensive Review.
520
$a
The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
650
0
$a
Computational intelligence
$x
Congresses.
$3
704428
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Huang, De-Shuang.
$3
891203
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
2565.
$3
3789967
856
4 0
$u
https://doi.org/10.1007/978-981-96-9946-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519171
電子資源
11.線上閱覽_V
電子書
EB Q342 .I58 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入