Fr. 123.00

Advanced Intelligent Computing Technology and Applications - 21st International Conference, ICIC 2025, Ningbo, China, July 26–29, 2025, Proceedings, Part VI

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

List of contents

.- Information Security.
.- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol.
.- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning.
.- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT.
.- Hierarchical Knowledge Distillation for Federated Backdoor Defense.
.- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method.
.- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection.
.- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding.
.-  Cross-domain Semantic Fusion Framework for Network Intrusion Detection.
.- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection.
.- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration.
.- Anomaly Detection in Encrypted Videos Using Knowledge Distillation.
.- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement.
.- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network.
.- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks.
.- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective.
.- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics.
.- A Large Language Models-Powered Framework for Smart Contract Repair.
.- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance.
.- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks.
.- TinyDF: Tiny and Effective Model for Deepfake Detection.
.- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness.
.- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification.
.- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning.
.- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection.
.- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing.
.- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost.
.- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing.
.- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things.
.- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms.
.- Face Recognition Differential Privacy Protection Method Based on NMF and PCA.
.- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode.
.- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation.
.- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF.
.- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation.
.- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate.
.- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG.
.- Intelligent Computing in Computer Vision.
.- DFWGAN: Dual-feature Watermarking for StyleGAN.
.- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search.
.- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment.
.- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors.
.- PFA: Improving Adversarial Transferability via Prediction Feature.
.- AI-generated Image Detection in Degraded Scenarios.
.- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network.
.- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball.

Summary

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025.
The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions.
This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.