Advanced intelligent computing techn...
International Conference on Intelligent Computing (2025 :)

FindBook      Google Book      Amazon      博客來     
  • Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part IV /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Advanced intelligent computing technology and applications/ edited by De-Shuang Huang ... [et al.].
    其他題名: 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
    其他題名: ICIC 2025
    其他作者: Huang, De-Shuang.
    團體作者: International Conference on Intelligent Computing
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xxi, 531 p. :ill. (some col.), digital ;24 cm.
    內容註: Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center.
    Contained By: Springer Nature eBook
    標題: Computational intelligence - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-9872-1
    ISBN: 9789819698721
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9519231 電子資源 11.線上閱覽_V 電子書 EB Q342 .I58 2025 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入