LEADER 07283nam 22006615 450 001 9911015622903321 005 20250715124738.0 010 $a981-9699-46-0 024 7 $a10.1007/978-981-96-9946-9 035 $a(MiAaPQ)EBC32212110 035 $a(Au-PeEL)EBL32212110 035 $a(CKB)39653446100041 035 $a(OCoLC)1528357896 035 $a(DE-He213)978-981-96-9946-9 035 $a(EXLCZ)9939653446100041 100 $a20250715d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Intelligent Computing Technology and Applications $e21st International Conference, ICIC 2025, Ningbo, China, July 26?29, 2025, Proceedings, Part II /$fedited by De-Shuang Huang, Qinhu Zhang, Chuanlei Zhang, Wei Chen 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (874 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2565 311 08$a981-9699-45-2 327 $a -- Information Security. -- A High-efficiency Consensus Algorithm for Consortium Blockchain with Byzantine Fault Tolerance. -- LPT: Lightweight Pooling Transformer for Object Detection. -- Semantic-Enhanced Attack Scenario Reconstruction Using Property Graph and Modular Ontologies. -- Deep Forgery Detection Based on Staged Differential Feature Enhancement. -- Secure Trust-MM: A Multimodal Large Model Framework with Game Theoretic Adversarial Defense for Trustworthy Cybersecurity. -- Membership Inference Attack against Machine Learning based on Calibrated Frobenius Norm. -- Neural Networks. -- A Novel Fuzzy Cross Efficiency DEA Model Based on Prospect Theory. -- Two-Sided Preference-Aware Dynamic Ride Sharing: Optimizing Driver Income and Passenger Costs. -- Fine-Grained Sentiment Analysis of Microblogs Based on Multidimensional Interactive Attention Sentiment Guidance. -- RB-RAG: Intelligent Question Answering System of Rock Burst Knowledge Based on Retrieval-Augmented Generation. -- Side-Channel Hardware Trojan Detection Based on LSTM-TCN Network. -- Efficient Grouped Full Convolution Network for Semantic Segmentation. -- Spectral Topology Meets Local Geometry: A Dual-Block Graph Transformer with Provable Expressive Power. -- Enhancing Domain Adaptation in Speaker Verification via Partially Shared Adversarial Network. -- Path-Aware Graph Neural Network for Link Prediction in Latent Heterogeneous Graphs. -- Multi-Dimensional AGV Path Planning in 3D Warehouses Using Ant Colony Optimization and Advanced Neural Networks. -- Similarity-based Weighted Fusion and Token Retention Strategy for Efficient Vision Transformers. -- Autonomous Decision-making Spiking Neural Network based on Evidence Accumulation. -- Cross-Modal Shared Prompts for Aspect-Based Multimodal Sentiment Analysis. -- Spatio-Temporal Synergistic Sparse Transformer: Algorithm-Hardware Ecosystem Co-Design for Efficient Multimodal Learning. -- CSSCNet: Combining Square and Strip Convolution for Remote Sensing Object Detection. -- KAGAT: Kolmogorov-Arnold Graph Attention Network. -- A Learnable Threshold and Resistance Spiking Neuron for Efficient Spiking Neural Networks Training. -- Negative Sample optimization and Bias Mitigation for Robust Visual Question Answering. -- Point-Level Enhancement and Background Suppression Network for Point Supervised Temporal Action Localization. -- BiG-Mamba: Bidirectional Graph and Mamba Modeling for Multivariate Time Series Forecasting. -- Multimodal Collaborative Attention Fusion Network for Remote Sensing Visual Question Answering. -- Occlusion-Aware Self-Supervised Monocular Depth Estimation for Weak Texture Endoscopic Images. -- KC-UNet++: A Thymic Tumor Segmentation Method Based on Kolmogorov-Arnold Network and CBAM. -- MQBN: Data-Free Mixed-Precision Quantization via Batch Normalization Statistics. -- A Global-Local Interactive Multimodal Sentiment Analysis Framework with Adaptive Attention and Multi-Scale Feature Enhancement. -- Anomaly-Driven Defense: Mitigating Bit-Flip Attacks in Deep Neural Networks via Runtime Parameter Clipping. -- GlintNet: A Lightweight Global-Local Integration Network with Spatial Channel Mixed Attention for ReID. -- TGM: An Industrial Sensor Network Anomaly Detection. -- GNNCacheInfer: Efficient Graph Neural Network Inference via Embedding Cache. -- GatE2R: A novel method for Cement Industry Information Extraction. -- Fraud Detection on Multi-Relational Graphs via Semantic Extraction and Topological Enhancement. -- YOLOv8-LSI: Enhanced Weed Detection in Agricultural Fields Using Large Convolutional Kernels and Dimensionality-Expanded Channel Attention. -- YOLO-MobileNet: A Lightweight Model for Surgical Instrument Detection. -- A Lightweight Multi-Modal Dynamic Fusion Network Based Method for Person Re-Identification in Videos. -- A hybrid model based on CNN, Transformer and GRU for SOC estimation of lithium-ion batteries. .-Enhancing Session-Based Social Recommendation with Multi-Interest Global Popularity Preferences. -- Frontiers of Spiking Neural Network Encoding Techniques: A Comprehensive Review. 330 $aThe 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2565 606 $aComputational intelligence 606 $aComputer networks 606 $aMachine learning 606 $aApplication software 606 $aComputational Intelligence 606 $aComputer Communication Networks 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aComputational intelligence. 615 0$aComputer networks. 615 0$aMachine learning. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aComputer Communication Networks. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aHuang$b De-Shuang$01732604 701 $aZhang$b Qinhu$01753360 701 $aZhang$b Chuanlei$01438977 701 $aChen$b Wei$0636150 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015622903321 996 $aAdvanced Intelligent Computing Technology and Applications$94408218 997 $aUNINA