会议文集


文集名Advanced Intelligent Computing Technology and Applications
会议名21st International Conference on Intelligent Computing (ICIC 2025)
中译名《第二十一届国际智能计算会议,卷4》
会议日期July 26-29, 2025
会议地点Ningbo, China
出版年2025
馆藏号358585


题名作者出版年
DDos Attack Identification Based on Temporal FeaturesDing Li; Yi Pan; Yinlong Xu2025
An Intonation-Based Black-Box Generative Adversarial Attack Method for AudioWen Cui; Pengchuan Wang; Qianmu Li2025
RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head AttentionZhilu Wang; Peinan Li; Lingbo Zhao; Fengkai Yuan; Rui Hou; Dan Meng2025
Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE NetworksWenao Zhang; Shuhui Chen; Ziling Wei; Xinyu Zhang; Qianqian Xing; Jinshu Su2025
True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor DetectionBoyu Guo; Shujuan Ji; Shouhao Zhao2025
Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment DecompositionShizhe Xue; Yiyuan Chen; Wenze Shao2025
CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection SystemMinglong Cheng; Tingting Xu; Wei Chen; Weidong Fang; Jueting Liu; Xiang Zhong; Zehua Wang2025
PPAGAN: A Privacy-Preserving Self-attention GAN Framework for Image SynthesisMaojiang Wang; Yuchuan Luo; Yingwen Chen; Xu Yang; Zhiyu He; Shaojing Fu2025
ADPF: Adversarial Sample Detection Based on Prediction FeaturePengju Wang; Jing Liu2025
MvSMIA: Multi-view Source Membership Inference Attack in Federated LearningJiaxin Li; Hongyun Cai; Yuhang Yang2025
RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model PerformanceXiaoyi Wang; Fangmin Xie; Siying Liu; Xiangwei Lai2025
Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent OptimizationShiyuan Luo; Chuanqi Tao2025
Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation OffloadingJian Hou; Congcong Yang; Qiaosha Zou; Junkai Chen; Xiaotong Nie2025
Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-update Incremental LearningWeiye Zhang; Haohan Tan; Peng Zhou; Lixun Ma; Zhenguang Liu; Qinming He2025
ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object DetectorXiuying Li; Hongwei Liao; Haoze Li; Jianyi Zhang; Xiuyun Wu; E. Jiayan2025
MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-supervised Meta-learningYaohui Wang; Guanyao Du; Yuhai Lu; Chun Long; Wei Wan; Degang Sun2025
A Steganalysis Framework for Enhancing Model Generalization PerformanceRuiyao Yang; Gang Wang; Yu Yang; Linna Zhou; Yaotian Yang2025
Frequency-Aware Purification: A Black-Box Defense Against Backdoor AttacksJie Sun; Xu Ma; Xiaoyu Zhang; Youmei Wang; Zhenzhi Teng; Lingling Xu2025
Stealthy Backdoors in Vertical Federated LearningXu Yang; Yuchuan Luo; Shaojing Fu; Ming Xu2025
CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence SharingXuanye Peng; Guangxiang Dai; Peng Wang2025
123