Vai al contenuto principale della pagina

Advanced Intelligent Computing Technology and Applications : 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part X / / edited by De-Shuang Huang, Chuanlei Zhang, Jiayang Guo



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Huang De-Shuang Visualizza persona
Titolo: Advanced Intelligent Computing Technology and Applications : 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part X / / edited by De-Shuang Huang, Chuanlei Zhang, Jiayang Guo Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (548 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Machine learning
Computer networks
Application software
Computational Intelligence
Machine Learning
Computer Communication Networks
Computer and Information Systems Applications
Intel·ligència computacional
Xarxes d'ordinadors
Aprenentatge automàtic
Programari d'aplicació
Soggetto genere / forma: Congressos
Llibres electrònics
Altri autori: ZhangChuanlei  
GuoJiayang  
Nota di contenuto: Intro -- Preface -- Organization -- Contents - Part X -- Information Security -- Eavesdropping Mobile Apps and Actions Through Wireless Traffic in the Open World -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 System Overview -- 3.2 Traffic Preprocessing -- 3.3 Multi-level Feature Extraction -- 3.4 App and Action Recognition -- 4 Evaluation -- 4.1 Evaluation Methodology -- 4.2 Experimental Results -- 5 Conclusion -- References -- Improving WiFi CSI Fingerprinting with IQ Samples -- 1 Introduction -- 2 Threat Model and CSI Features -- 2.1 Threat Model -- 2.2 CSI Features -- 3 System Design -- 3.1 System Overview -- 3.2 CSI Measurement Transformation -- 3.3 Feature Extraction and Recognition -- 4 Experimental Evaluation -- 4.1 Evaluation Methodology -- 4.2 Experimental Results -- 5 Conclusions -- References -- RIHNet: A Robust Image Hiding Method for JPEG Compression -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Overview -- 3.2 Secret Image Hiding Module (SIH) -- 3.3 Classifier -- 3.4 Denoising Module -- 3.5 Loss Function -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Comparison with SOTA -- 4.3 Ablation Experiments -- 5 Conclusion -- References -- HybridHash: An Efficient Hash Index for Encrypted Databases -- 1 Introduction -- 2 Related Work -- 3 Design of HybridHash -- 3.1 Overall Structure -- 3.2 Operations -- 4 Performance Evaluation -- 4.1 Read Performance -- 4.2 Bucket-Splitting Cost -- 4.3 Index Size -- 5 Conclusions and Future Work -- References -- Textual Backdoor Attack via Keyword Positioning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Threat Model -- 3.2 Overview -- 3.3 Calculation of the Importance Score -- 3.4 Trigger Selection -- 3.5 Generate Toxic Samples -- 3.6 Training-Time Poisoning -- 3.7 Test-Time Poisoning -- 4 Experimental Setup -- 4.1 Equipment -- 4.2 Datasets -- 4.3 Victim Models.
4.4 Baseline Methods -- 4.5 Evaluation Metrics -- 5 Experimental Results -- 5.1 Backdoor Attack Results and Discussion -- 5.2 The Impact of the Number of Operations -- 6 Conclusion -- References -- A Hybrid DCT/DST Based Embedding Framework for Video Steganography in H.265/HEVC -- 1 Introduction -- 2 Averting Intra-Distortion Drift and Spacing Coding -- 2.1 Averting Intra-Distortion Drift -- 2.2 Spacing Coding -- 3 The Architecture of the Hybrid Embedding Framework -- 3.1 Intra-Prediction Embedding and Extraction -- 3.2 Inter-Prediction Embedding and Extraction -- 4 Experimental Results -- 5 Security Analysis -- 6 Conclusion -- References -- Intelligent Computing in Computer Vision -- YOLO-FLC: Lightweight Traffic Sign Detection Algorithm -- 1 Introduction -- 2 Yolo-F -- 2.1 Improved C3 Module -- 2.2 Feature Pyramid Optimization -- 2.3 The Improvement of the Loss Function -- 2.4 Detection Scale Optimization -- 3 Model Compression -- 3.1 Pruning -- 3.2 Knowledge Distillation -- 4 Results of Experiments and Data Analysis -- 4.1 Dataset Processing -- 4.2 Evaluation Metrics -- 4.3 The Experimental Environment -- 4.4 The Experimental Results -- 5 Conclusion -- References -- Self-supervised Visual Anomaly Detection with Image Patch Generation and Comparison Networks -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Anomaly Detection Based on Reconstruction -- 2.2 VIT-Based Network -- 2.3 Siamese Network -- 3 Method -- 3.1 VIT-Based Patch Generation Network -- 3.2 Siamese-Based Fine-Grained Comparison Network -- 3.3 Bi-directional Inference Strategy -- 4 Experiment -- 4.1 Datasets and Metrics -- 4.2 Implementation Details -- 4.3 Evaluation on MVTec AD Dataset -- 4.4 Evaluation on Our Own Dataset -- 4.5 Ablation Study -- 5 Conclusion -- References -- Spatial-Temporal Transformer Network for Continuous Action Recognition in Industrial Assembly.
1 Introduction -- 2 Related Work -- 2.1 Action Recognition for Assembly Operation -- 2.2 Human Object Interaction -- 2.3 Video Transformer -- 3 Method -- 3.1 STTN for Action Recognition -- 3.2 Operation Procedure Edition for Action Sequence Recognition -- 3.3 Continual Learning with Worker-in-the-Loop -- 4 Experiments -- 4.1 Action Recognition on Public Dataset -- 4.2 Action Recognition on Industrial Assembly Dataset -- 4.3 Promotion on Production Quality and Efficiency -- 5 Conclusion -- References -- EVF-YOLO: A Lightweight Network for License Plate Detection Under Severe Weather Conditions -- 1 Introduction -- 2 Related Work -- 3 Model Construction and Analysis -- 3.1 EMA -- 3.2 Feature Fusion V-GFPN -- 3.3 Lightweight Detection Head -- 3.4 Overall Model -- 4 Experimental Design and Result Analysis -- 4.1 Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Experimental Results -- 5 Conclusion -- References -- Quantum Robust Coding for Quantum Image Watermarking -- 1 Introduction -- 2 Proposed Method -- 2.1 Quantum Robust Coding (QRC) -- 2.2 Quantum Image Watermarking Using QRC -- 3 Experiments and Results -- 3.1 Evaluation of Watermarking with and Without QRC -- 3.2 Quantum Watermarking Evaluation by Comparison -- 4 Conclusion -- References -- Quantum-Enhanced Support Vector Machine for Large-Scale Multi-class Stellar Classification -- 1 Introduction -- 1.1 Types of Stars and Current Methods of Classification -- 2 Methodology -- 2.1 Classical Support Vector Machine -- 2.2 Quantum-Enhanced SVM with Quantum Feature Map -- 3 Feature Engineering for Stellar Classification -- 4 Results and Discussion -- 4.1 QSVM for Large Stellar Dataset with Two Classes -- 4.2 Quantum Simulator for Quantum Kernel with GPU Acceleration Using cuQuantum SDK -- 5 Conclusion -- References -- DDNet: Detection-Focused Dehazing Network -- 1 Introduction -- 2 Related Work.
2.1 Object Detection -- 2.2 Image Dehazing -- 2.3 Object Detection Under Hazy Weather -- 3 Proposed Method -- 3.1 Rep-Inception -- 3.2 Dual-Branch Fusion Network -- 3.3 Parallel Differentiable Image Processing Module -- 4 Experiments -- 4.1 Datasets -- 4.2 Comparison with Other Methods -- 4.3 Ablation Study -- 5 Conclusion -- References -- A Secure Voting Scheme Based on Quantum Walk -- 1 Introduction -- 2 Preliminary -- 2.1 One-Dimensional Quantum Walk Model on the Line -- 2.2 Teleportation Based on Quantum Walks -- 3 Security Voting Scheme -- 3.1 Quantum Voting System Model -- 3.2 Authorization of Legitimate Voters -- 3.3 Security Testing -- 3.4 Voting Scheme -- 4 Security Analysis -- 4.1 Non-reusability -- 4.2 Verifiability -- 4.3 Privacy and Security -- 4.4 Fairness -- 5 Comparison -- 6 Conclusion -- References -- PyCIM: A Python Framework for the Dynamics of Coherent Ising Machine -- 1 Introduction -- 2 The Principle of CIM -- 3 The Architecture of PyCIM -- 3.1 Existing Theoretical Models Describing CIM -- 3.2 Design of PyCIM -- 4 Experiments -- 4.1 The Evolution of DOPO State in CIM Without Coupling -- 4.2 The Process of CIM Solving MAX-CUT Problem -- 4.3 The Influence of Coupling Strength and Pump Scheduling on Solution Performance -- 4.4 The Performance of PyCIM on G-Set -- 5 Conclusion -- References -- Dense Center Point Mechanism: A Novel Approach for Multi-expert Decision Integration in Portfolio Management -- 1 Introduction -- 2 Methodology -- 2.1 Problem Definition -- 2.2 Expert Consensus Decision-Making Method -- 3 Integrate Expert Decision Process -- 3.1 Behavior and Definition of CPESM Experts -- 3.2 Portfolio Optimization of Investor -- 4 Empirical Approach -- 4.1 Experimental Setup -- 4.2 DEDIS Results Analysis -- 4.3 Portfolio Results Analysis -- 5 Conclusion -- References.
Planning for Earth Imaging Tasks via Grid Significance Mapping -- 1 Introduction -- 2 Gird Division and Mapping -- 2.1 Introducing H3 Gridding -- 2.2 Significance Mapping of Points -- 3 Task Planning Using Grid Representations -- 3.1 Grid-Based Planning Model -- 3.2 Planning Problem Solving -- 4 Experiments and Evaluation -- 4.1 Experiment Settings -- 4.2 Significance of Weight Mapping -- 4.3 Experimental Analysis of Load Balancing -- 5 Conclusion and Future Work -- References -- Virtual Reality and Human-Computer Interaction -- FusionCraft: Fusing Emotion and Identity in Cross-Modal 3D Facial Animation -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Overview -- 3.2 Preliminaries -- 3.3 Text2Avatar -- 3.4 Emotion-Identity Fusion Module -- 3.5 Avatar Generator -- 3.6 Key Points Loss -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Evaluation Methods -- 4.3 Quantitative Evaluation -- 4.4 Qualitative Evaluation -- 4.5 User Study -- 5 Limitations and Future Work -- 6 Conclusion -- References -- DWMF: A Method for Hybrid Multimodal Intent Fusion Based on Dynamic Weights -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Algorithm Description -- 3.2 Analysis of Algorithm -- 4 Experiment Steps and Results -- 4.1 Experiment Setting -- 4.2 Experiment Methods -- 4.3 Experiment Results and Analysis -- 5 Conclusion -- References -- Panoramic Video Inter Frame Prediction and Viewport Prediction Based on Background Modeling -- 1 Introduction -- 2 Related Works -- 2.1 Panoramic Video Coding -- 2.2 Viewport Prediction -- 3 Methodology -- 3.1 Background Modeling -- 3.2 Background Modeling-Based Encoding -- 3.3 Viewport Prediction -- 4 Experiments -- 4.1 Background Modeling -- 4.2 Panoramic Video Encoding -- 4.3 Viewport Prediction -- 5 Conclusion -- References.
Efficient Sensing Network and Decoupled Neural Model for Hand Pose Estimation.
Sommario/riassunto: This 13-volume set LNCS 14862-14874 constitutes - in conjunction with the 6-volume set LNAI 14875-14880 and the two-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology. .
Titolo autorizzato: Advanced Intelligent Computing Technology and Applications  Visualizza cluster
ISBN: 9789819756094
981975609X
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910878046503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science, . 1611-3349 ; ; 14871