語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced intelligent computing techn...
~
International Conference on Intelligent Computing (2025 :)
FindBook
Google Book
Amazon
博客來
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part IV /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advanced intelligent computing technology and applications/ edited by De-Shuang Huang ... [et al.].
其他題名:
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
其他題名:
ICIC 2025
其他作者:
Huang, De-Shuang.
團體作者:
International Conference on Intelligent Computing
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxi, 531 p. :ill. (some col.), digital ;24 cm.
內容註:
Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center.
Contained By:
Springer Nature eBook
標題:
Computational intelligence - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-9872-1
ISBN:
9789819698721
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part IV /
Advanced intelligent computing technology and applications
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.Part IV /[electronic resource] :ICIC 2025edited by De-Shuang Huang ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxi, 531 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,158451611-3349 ;. - Lecture notes in computer science ;15845..
Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center.
This 20-volume set LNCS 15842-15861 constitutes - in conjunction with the 4-volume set LNAI 15862-15865 and the 4-volume set LNBI 15866-15869 - the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The total of 1206 regular papers were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
ISBN: 9789819698721
Standard No.: 10.1007/978-981-96-9872-1doiSubjects--Topical Terms:
704428
Computational intelligence
--Congresses.
LC Class. No.: Q342 / .I58 2025
Dewey Class. No.: 006.3
Advanced intelligent computing technology and applications = 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.. Part IV /
LDR
:06073nmm a2200349 a 4500
001
2413776
003
DE-He213
005
20250724130248.0
006
m d
007
cr nn 008maaau
008
260205s2025 si s 0 eng d
020
$a
9789819698721
$q
(electronic bk.)
020
$a
9789819698714
$q
(paper)
024
7
$a
10.1007/978-981-96-9872-1
$2
doi
035
$a
978-981-96-9872-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
Q342
$b
.I58 2025
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
090
$a
Q342
$b
.I61 2025
111
2
$a
International Conference on Intelligent Computing
$n
(21st :
$d
2025 :
$c
Ningbo Shi, China)
$3
3789974
245
1 0
$a
Advanced intelligent computing technology and applications
$h
[electronic resource] :
$b
21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025 : proceedings.
$n
Part IV /
$c
edited by De-Shuang Huang ... [et al.].
246
3
$a
ICIC 2025
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxi, 531 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15845
505
0
$a
Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center.
520
$a
This 20-volume set LNCS 15842-15861 constitutes - in conjunction with the 4-volume set LNAI 15862-15865 and the 4-volume set LNBI 15866-15869 - the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The total of 1206 regular papers were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".
650
0
$a
Computational intelligence
$x
Congresses.
$3
704428
650
1 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Huang, De-Shuang.
$3
891203
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15845.
$3
3790042
856
4 0
$u
https://doi.org/10.1007/978-981-96-9872-1
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519231
電子資源
11.線上閱覽_V
電子書
EB Q342 .I58 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入