Advanced intelligent computing techn...
International Conference on Intelligent Computing (2025 :)

FindBook      Google Book      Amazon      博客來     
  • Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part VI /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advanced intelligent computing technology and applications/ edited by De-Shuang Huang ... [et al.].
    其他題名: 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
    其他題名: ICIC 2025
    其他作者: Huang, De-Shuang.
    團體作者: International Conference on Intelligent Computing
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xxi, 561 p. :ill. (chiefly col.), digital ;24 cm.
    內容註: Information Security. -- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol. -- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning. -- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT. -- Hierarchical Knowledge Distillation for Federated Backdoor Defense. -- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method. -- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection. -- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding. -- Cross-domain Semantic Fusion Framework for Network Intrusion Detection. -- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection. -- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration. -- Anomaly Detection in Encrypted Videos Using Knowledge Distillation. -- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement. -- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network. -- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks. -- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective. -- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics. -- A Large Language Models-Powered Framework for Smart Contract Repair. -- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance. -- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks. -- TinyDF: Tiny and Effective Model for Deepfake Detection. -- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness. -- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification. -- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning. -- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection. -- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing. -- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost. -- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing. -- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things. -- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms. -- Face Recognition Differential Privacy Protection Method Based on NMF and PCA. -- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode. -- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation. -- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. -- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation. -- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate. -- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG. -- Intelligent Computing in Computer Vision. -- DFWGAN: Dual-feature Watermarking for StyleGAN. -- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search. -- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment. -- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors. -- PFA: Improving Adversarial Transferability via Prediction Feature. -- AI-generated Image Detection in Degraded Scenarios. -- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network. -- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball.
    Contained By: Springer Nature eBook
    標題: Computational intelligence - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-9958-2
    ISBN: 9789819699582
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9519173 電子資源 11.線上閱覽_V 電子書 EB Q342 .I58 2025 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入