LEADER 07088nam 22006255 450 001 9911057022003321 005 20260120120434.0 010 $a981-9552-94-X 024 7 $a10.1007/978-981-95-5294-8 035 $a(CKB)44998241900041 035 $a(MiAaPQ)EBC32506358 035 $a(Au-PeEL)EBL32506358 035 $a(DE-He213)978-981-95-5294-8 035 $a(EXLCZ)9944998241900041 100 $a20260120d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Applications $e40th CCF National Conference of Computer Applications, CCF NCCA 2025, Beijing, China, August 7?9, 2025, Proceedings /$fedited by Lan Huang, Bin Xu, Xuebin Chen, Shangguang Wang, Bing Xia, Jianguo Pan, Xianhua Song, Zeguang Lu 205 $a1st ed. 2026. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2026. 215 $a1 online resource (970 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2774 311 08$a981-9552-93-1 327 $aArtificial Intelligence and Applications -- A Fractional-Order Automatic Feature Matching Algorithm for Image Rotation and Scaling -- Multistrategy Improved Dung Beetle Optimization Algorithm and its Application in ALBP-1 -- Aggregation of Dialogue History Information and Utterance-Slot Attention for Dialogue State Tracking -- Research on Children's ADHD Detection Algorithm Based on BASA-FMGNet -- NAD-KRQG: Neural Association-Based Cognitive Diagnosis with Knowledge Recommendation and Question Generation -- NOTEARS-cMLP: Learning Nonparametric DAGs with Domain Knowledge -- Humanoid Robots Gate-Passing Method Based on SAC Algorithm with Generative Adversarial Networks -- Link Prediction Method Based on Structural Hole Characterization under Multi-Order Paths -- Research on an Elevator Group Control Method Based on Interactive Artificial Bee Colonies -- STUAformer: Spatio-Temporal Unified Aggregate Transformer Model for Traffic Speed Prediction -- STAGAT: Spatio-Temporal Aggregation Graph Attention Network for Traffic Prediction -- Intelligent Software Testing Platform Selection and Knowledge Graph-Driven Test Case Generation -- A Method for Generating Class Integration Test Sequences Based on Simulated Annealing Particle Swarm Optimization -- Research on Multi-Scale Lesion Detection in Human Lung CT Images Based on Deep Learning -- Riding the Wave of LLMs: Navigating Opportunities and Challenges in Chinese Information Technology Application Innovation -- Air Quality Inference with Multi-Source Heterogeneous Data and FSMoE-LSC Model -- CHOLD: Offensive Language Detection Method for Chinese Texts -- STMFNet: A Spatial-Temporal Masking and Feature Fusion Model for Traffic Flow Prediction -- Dual-Grained Alignment with Dynamic Clip Modeling for Partially Relevant Video Retrieval -- Content-Function Coupling Based Recommendation Mechanism for Holographic Communication -- Intelligent Question and Answer System for Policies Based on Graph Database -- Research Progress and Frontier Applications of Graph Neural Networks -- Cross-Consistent Dual-ConvMixer Network with Feature Alignment for Salivary Gland Tumor Ultrasound Image Segmentation -- Domain-Constrained BVAE-Based Method for Intelligent Plastic Formulation Design -- HDRS: Transmission, Computing and Caching Resource Scheduling for Holographic-Type Communication Based on In-Network Computing -- Interleaved Spatial-Temporal Attention Aggregation Gated Transformer for Traffic Flow Prediction -- Color Image Steganography Based on a GAM-CBAM Dual Attention Mechanism -- TIP: A multidimensional Feature Extraction Method for Extreme Financial Risk by Fusing Information Value Evaluation -- MLAF-G: A Lightweight Multilevel Feature Fusion Classification Network for Plant Diseases Based on Ghostnet -- Unsupervised Cluster-Generation Graph Learning for Industrial Equipment Anomaly Detection -- Research on Precision Prediction of Geospatial Choices for Postgraduate Graduation Destinations Based on Machine Learning Algorithms -- A Deep Forgery Detection Method Based on Adaptive Features in Both Spatial Domain and Frequency Domain -- Dual-PhysNet: A Physics-Guided Dual-Path Lightweight Network for Underwater Image Superresolution Reconstruction -- Cyberspace Security Technology -- Load-Balancing Routing Optimization in SDN: A QoS-Aware Approach with Improved Shortest Path and Adaptive Resource Allocation -- Source Code Vulnerability Detection Method Based on Hybrid Retrieval-Augmented Generation Technology -- Intrinsic Security of Artificial Intelligence: System Vulnerabilities, Defense Mechanisms, and Theoretical Deepening -- Research on Efficient Cross-Domain Authentication Scheme Based on Blockchain and Edge Computing -- Data Science and Big Data Technology -- CHAKE: A Lightweight Chameleon Hash Based Authenticated Key Exchange for IoT -- An Online Time Series Decomposition Algorithm with a Multiplicative Trend-Seasonality Relationship in an Additive Model -- Frontier Technology Applications -- Research on Convolutional Neural Network Implementation Methods for Embedded Systems -- Research on the Social Attributes of Power Grid Residents with the 3 M-CNN-SC-SRU Customer Profiling the 3 M-CNN-SC-SRU Model for Customer Profiling from Electricity Consumption Data -- Identification of Parkinson?s Disease Subtypes via a Multimodal Data Fusion Method -- Anomaly Prediction in Power Data Platforms Using a Transformer-BiLSTM Model. 330 $aThis book CCIS 2774 constitutes the refereed proceedings of the 40th CCF National Conference of Computer Applications, CCF NCCA 2025, held in Beijing, China, during August 7?9, 2025. The 43 full papers presented in this book were carefully selected and reviewed from 269 submissions. These papers have been organized in the following topical sections: Artificial Intelligence and Applications Cyberspace Security Technology Data Science and Big Data Technology Frontier Technology Applications. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2774 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputer networks 606 $aComputer systems 606 $aComputational Intelligence 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputer System Implementation 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 676 $a006.3 700 $aHuang$b Lan$01781588 701 $aHuang$01886115 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911057022003321 996 $aComputer Applications$94531694 997 $aUNINA