語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced intelligent computing techn...
~
International Conference on Intelligent Computing (2025 :)
FindBook
Google Book
Amazon
博客來
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part VI /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced intelligent computing technology and applications/ edited by De-Shuang Huang ... [et al.].
其他題名:
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
其他題名:
ICIC 2025
其他作者:
Huang, De-Shuang.
團體作者:
International Conference on Intelligent Computing
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxi, 561 p. :ill. (chiefly col.), digital ;24 cm.
內容註:
Information Security. -- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol. -- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning. -- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT. -- Hierarchical Knowledge Distillation for Federated Backdoor Defense. -- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method. -- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection. -- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding. -- Cross-domain Semantic Fusion Framework for Network Intrusion Detection. -- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection. -- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration. -- Anomaly Detection in Encrypted Videos Using Knowledge Distillation. -- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement. -- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network. -- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks. -- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective. -- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics. -- A Large Language Models-Powered Framework for Smart Contract Repair. -- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance. -- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks. -- TinyDF: Tiny and Effective Model for Deepfake Detection. -- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness. -- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification. -- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning. -- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection. -- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing. -- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost. -- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing. -- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things. -- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms. -- Face Recognition Differential Privacy Protection Method Based on NMF and PCA. -- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode. -- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation. -- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. -- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation. -- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate. -- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG. -- Intelligent Computing in Computer Vision. -- DFWGAN: Dual-feature Watermarking for StyleGAN. -- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search. -- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment. -- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors. -- PFA: Improving Adversarial Transferability via Prediction Feature. -- AI-generated Image Detection in Degraded Scenarios. -- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network. -- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball.
Contained By:
Springer Nature eBook
標題:
Computational intelligence - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-9958-2
ISBN:
9789819699582
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part VI /
Advanced intelligent computing technology and applications
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.Part VI /[electronic resource] :ICIC 2025edited by De-Shuang Huang ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxi, 561 p. :ill. (chiefly col.), digital ;24 cm. - Communications in computer and information science,25691865-0937 ;. - Communications in computer and information science ;2569..
Information Security. -- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol. -- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning. -- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT. -- Hierarchical Knowledge Distillation for Federated Backdoor Defense. -- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method. -- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection. -- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding. -- Cross-domain Semantic Fusion Framework for Network Intrusion Detection. -- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection. -- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration. -- Anomaly Detection in Encrypted Videos Using Knowledge Distillation. -- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement. -- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network. -- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks. -- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective. -- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics. -- A Large Language Models-Powered Framework for Smart Contract Repair. -- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance. -- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks. -- TinyDF: Tiny and Effective Model for Deepfake Detection. -- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness. -- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification. -- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning. -- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection. -- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing. -- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost. -- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing. -- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things. -- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms. -- Face Recognition Differential Privacy Protection Method Based on NMF and PCA. -- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode. -- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation. -- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. -- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation. -- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate. -- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG. -- Intelligent Computing in Computer Vision. -- DFWGAN: Dual-feature Watermarking for StyleGAN. -- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search. -- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment. -- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors. -- PFA: Improving Adversarial Transferability via Prediction Feature. -- AI-generated Image Detection in Degraded Scenarios. -- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network. -- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball.
The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
ISBN: 9789819699582
Standard No.: 10.1007/978-981-96-9958-2doiSubjects--Topical Terms:
704428
Computational intelligence
--Congresses.
LC Class. No.: Q342 / .I58 2025
Dewey Class. No.: 006.3
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part VI /
LDR
:06096nmm a2200349 a 4500
001
2413718
003
DE-He213
005
20250715124747.0
006
m d
007
cr nn 008maaau
008
260205s2025 si s 0 eng d
020
$a
9789819699582
$q
(electronic bk.)
020
$a
9789819699575
$q
(paper)
024
7
$a
10.1007/978-981-96-9958-2
$2
doi
035
$a
978-981-96-9958-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q342
$b
.I58 2025
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q342
$b
.I61 2025
111
2
$a
International Conference on Intelligent Computing
$n
(21st :
$d
2025 :
$c
Ningbo, China)
$3
3789965
245
1 0
$a
Advanced intelligent computing technology and applications
$h
[electronic resource] :
$b
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
$n
Part VI /
$c
edited by De-Shuang Huang ... [et al.].
246
3
$a
ICIC 2025
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxi, 561 p. :
$b
ill. (chiefly col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
2569
505
0
$a
Information Security. -- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol. -- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning. -- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT. -- Hierarchical Knowledge Distillation for Federated Backdoor Defense. -- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method. -- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection. -- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding. -- Cross-domain Semantic Fusion Framework for Network Intrusion Detection. -- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection. -- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration. -- Anomaly Detection in Encrypted Videos Using Knowledge Distillation. -- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement. -- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network. -- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks. -- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective. -- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics. -- A Large Language Models-Powered Framework for Smart Contract Repair. -- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance. -- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks. -- TinyDF: Tiny and Effective Model for Deepfake Detection. -- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness. -- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification. -- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning. -- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection. -- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing. -- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost. -- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing. -- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things. -- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms. -- Face Recognition Differential Privacy Protection Method Based on NMF and PCA. -- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode. -- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation. -- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. -- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation. -- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate. -- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG. -- Intelligent Computing in Computer Vision. -- DFWGAN: Dual-feature Watermarking for StyleGAN. -- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search. -- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment. -- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors. -- PFA: Improving Adversarial Transferability via Prediction Feature. -- AI-generated Image Detection in Degraded Scenarios. -- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network. -- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball.
520
$a
The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
650
0
$a
Computational intelligence
$x
Congresses.
$3
704428
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Huang, De-Shuang.
$3
891203
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
2569.
$3
3789969
856
4 0
$u
https://doi.org/10.1007/978-981-96-9958-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519173
電子資源
11.線上閱覽_V
電子書
EB Q342 .I58 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入