LEADER 07177nam 22006495 450 001 9911015853203321 005 20250715124747.0 010 $a981-9699-58-4 024 7 $a10.1007/978-981-96-9958-2 035 $a(MiAaPQ)EBC32212076 035 $a(Au-PeEL)EBL32212076 035 $a(CKB)39653455900041 035 $a(DE-He213)978-981-96-9958-2 035 $a(EXLCZ)9939653455900041 100 $a20250715d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvanced Intelligent Computing Technology and Applications $e21st International Conference, ICIC 2025, Ningbo, China, July 26?29, 2025, Proceedings, Part VI /$fedited by De-Shuang Huang, Wei Chen, Yijie Pan, Haiming Chen 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (898 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2569 311 08$a981-9699-57-6 327 $a -- Information Security. -- Unresponsive IoT Devices: Breaking the Discovery in the Matter Protocol. -- Epileptic Detection Method for EEG Data Based on Model Pruning Federated Learning. -- PP-SSFL: A PUF-Paillier Dual-Factor Encryption Secret Sharing Federated Learning Frameworks for IoT. -- Hierarchical Knowledge Distillation for Federated Backdoor Defense. -- Towards Saturation Attack Detection in SDN: A Device Hyperedge Graph and Flow-Device Hypergraph Neural Network-based Method. -- DynaFlow Logic Transformer: A Neuro-Symbolic Approach to Industrial Control System Intrusion Detection. -- T-TBCLPA: A Secure Cross-Shard Consensus Mechanism for UAVs Based on Task State Network Sharding. -- Cross-domain Semantic Fusion Framework for Network Intrusion Detection. -- LCA-PRCA: Lowest Common Ancestor Embedding for Provenance-Based Intrusion Detection. -- PreFilter: Enhancing the Efficiency of Binary Code Similarity Detection by Efficient Prefiltration. -- Anomaly Detection in Encrypted Videos Using Knowledge Distillation. -- Reliable Multi-Bit Watermark for Large Language Models via Robust Encoding and Green-Zone Refinement. -- CGTdroid: Enhancing Android App Risk Assessment Through Cross Attention Network. -- Leveraging Multiple Metrics to Improve Difficulty Calibration in Membership Inference Attacks. -- FedFTL-R: Feature-Interactive Federated Transfer Learning from a Reinforcement Learning Perspective. -- FRVA: Content-aware Video Frame Redundancy Elimination for Bandwidth-limited Edge Video Analytics. -- A Large Language Models-Powered Framework for Smart Contract Repair. -- Federated Multi-Instance Multi-Label Learning Based on Label Richness and Balance. -- A Feature Fusion-based Detection Model Against Adversarial XSS Attacks. -- TinyDF: Tiny and Effective Model for Deepfake Detection. -- Staged Collaborative Adversarial Training: Leveraging Peer Models for Stronger Robustness. -- CIEGAN: An Innovative Generative Method for Solving the Sample Imbalance Problem in CDN Website Traffic Classification. -- PD-ADPVFL: Performance-Driven Adaptive Differential Privacy Vertical Federated Learning. -- A Communication-Efficient Federated Contrastive Learning Framework for Intrusion Detection. -- Graph-Temporal Double Deep Q Network (GT-DQNet) for Efficient Workflow Scheduling in Mobile Edge Computing. -- A meta-heuristic cloud resource scheduling strategy balancing timeliness and cost. -- Reversible Data Hiding in Encrypted Images Based on Block and Bit Plane Recomposing. -- Efficient Privacy-Preserving Spatial Data Query in Mobile Internet of Things. -- Link Failure Recovery in Hybrid SDN Using Prior Knowledge-Based Reinforcement Learning Algorithms. -- Face Recognition Differential Privacy Protection Method Based on NMF and PCA. -- CAT-AE2: A Robust IoT Intrusion Detection Model Based on Adversarial Autoencode. -- Enhancing Privacy Guarantees for Federated Learning with Local Differential Privacy and Secure Multi-party Computation. -- Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF. -- Balancing Interpretability and Cost in Binary Code Similarity Detection by LLM Distillation. -- Fake News Detection Model Based on Competitive Wisdom and Conflict Debate. -- KLRAG: Deep Learning Library Vulnerability Detection via Knowledge level RAG. -- Intelligent Computing in Computer Vision. -- DFWGAN: Dual-feature Watermarking for StyleGAN. -- Dual-Modal Structural Decoupling with Semantic Relation Distillation for Text-Based Person Search. -- Multi-Scale Context-Aware Attention Network with Theme Information for Image Aesthetic Assessment. -- RAdam-TOG: A Global Perturbation Adversarial Attack Scheme for Object Detectors. -- PFA: Improving Adversarial Transferability via Prediction Feature. -- AI-generated Image Detection in Degraded Scenarios. -- Detection of Underwater Multi-Targets Based on Self-Supervised Learning and Deformable Path Aggregation Feature Pyramid Network. -- CCD-YOLO11n: A Novel Approach for Player Detection in Floorball. 330 $aThe 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2569 606 $aComputational intelligence 606 $aComputer networks 606 $aMachine learning 606 $aApplication software 606 $aComputational Intelligence 606 $aComputer Communication Networks 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aComputational intelligence. 615 0$aComputer networks. 615 0$aMachine learning. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aComputer Communication Networks. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aHuang$b De-Shuang$01732604 701 $aChen$b Wei$0636150 701 $aPan$b Yijie$01758608 701 $aChen$b Haiming$01833175 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015853203321 996 $aAdvanced Intelligent Computing Technology and Applications$94409129 997 $aUNINA