


default search action
21st ICIC 2025: Ningbo, China - Part IV
- De-Shuang Huang, Wei Chen, Yijie Pan, Haiming Chen:

Advanced Intelligent Computing Technology and Applications - 21st International Conference, ICIC 2025, Ningbo, China, July 26-29, 2025, Proceedings, Part IV. Lecture Notes in Computer Science 15845, Springer 2025, ISBN 978-981-96-9871-4
Information Security
- Ding Li, Yi Pan, Yinlong Xu:

DDos Attack Identification Based on Temporal Features. 3-14 - Wen Cui, Pengchuan Wang, Qianmu Li:

An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. 15-26 - Zhilu Wang, Peinan Li, Lingbo Zhao, Fengkai Yuan, Rui Hou, Dan Meng:

RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-head Attention. 27-38 - Wenao Zhang, Shuhui Chen, Ziling Wei, Xinyu Zhang, Qianqian Xing, Jinshu Su:

Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. 39-53 - Boyu Guo, Shujuan Ji, Shouhao Zhao:

True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. 54-65 - Shizhe Xue, Yiyuan Chen, Wenze Shao

:
Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. 66-77 - Minglong Cheng

, Tingting Xu, Wei Chen, Weidong Fang, Jueting Liu, Xiang Zhong, Zehua Wang:
CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. 78-89 - Maojiang Wang, Yuchuan Luo, Yingwen Chen, Xu Yang, Zhiyu He, Shaojing Fu:

PPAGAN: A Privacy-Preserving Self-attention GAN Framework for Image Synthesis. 90-105 - Pengju Wang, Jing Liu:

ADPF: Adversarial Sample Detection Based on Prediction Feature. 106-116 - Jiaxin Li, Hongyun Cai, Yuhang Yang:

MvSMIA: Multi-view Source Membership Inference Attack in Federated Learning. 117-127 - Xiaoyi Wang, Fangmin Xie, Siying Liu, Xiangwei Lai:

RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. 128-139 - Shiyuan Luo, Chuanqi Tao:

Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. 140-151 - Jian Hou, Congcong Yang, Qiaosha Zou, Junkai Chen, Xiaotong Nie:

Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. 152-163 - Weiye Zhang, Haohan Tan, Peng Zhou, Lixun Ma, Zhenguang Liu, Qinming He:

Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-update Incremental Learning. 164-175 - Xiuying Li, Hongwei Liao, Haoze Li, Jianyi Zhang, Xiuyun Wu, E. Jiayan:

ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. 176-188 - Yaohui Wang, Guanyao Du, Yuhai Lu, Chun Long, Wei Wan, Degang Sun:

MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-supervised Meta-learning. 189-200 - Ruiyao Yang, Gang Wang, Yu Yang, Linna Zhou, Yaotian Yang:

A Steganalysis Framework for Enhancing Model Generalization Performance. 201-215 - Jie Sun, Xu Ma, Xiaoyu Zhang, Youmei Wang, Zhenzhi Teng, Lingling Xu:

Frequency-Aware Purification: A Black-Box Defense Against Backdoor Attacks. 216-226 - Xu Yang

, Yuchuan Luo
, Shaojing Fu
, Ming Xu
:
Stealthy Backdoors in Vertical Federated Learning. 227-238 - Xuanye Peng, Guangxiang Dai, Peng Wang:

CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. 239-250 - Guifen Zhang, Qinchun Su, Hongzi Li, Lina Ge:

Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. 251-262 - Ruizhong Du, Shenyu Li, Mingyue Li:

MSIAA: Multi-scale Inversion Adversarial Attack on Face Recognition. 263-274 - Haoyu Bin, Gaosheng Wang, Yimo Ren, Yubo Li, Zhi Li, Hongsong Zhu:

Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. 275-287 - Tianze Li, Sen Su:

MICD: Deepfake Detection with Masked Identity Consistency Detector. 288-299 - Chunbo Liu, Chunmiao Xiang, Mengyao Han, Xuying Meng, Wenli Song:

PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. 300-312 - Jionghui Jiang, Fengrui Hao, Tianlong Gu, Jinjie Lu:

Durability-Optimized Model Poisoning Attack Against Federated Learning Systems. 313-324 - Sonkarlay J. Y. Weamie

, Vinothkumar Kolluru
, Kahsay Birhanu Tsadik, Charan Sundar Telaganeni:
Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. 325-337 - Jianquan Ouyang, Liyuan Kuang:

FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. 338-350 - Mengyuan Zhang, Zihao Fu, Xiaochun Wu, Wanli Lyu:

Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. 351-362 - Jingxian Zhou, Fengxian Huang, Shuang Wang, Ping Chen:

FedFIP:A Personalized Federated Learning Optimization Method with Differential Privacy Protection. 363-374 - Wenfeng Lin, Yunfei Su, Shuai Zhang, Chaojing Tang:

ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-Box Metric. 375-386 - Haiyang Fan, Hua Sun, Jiyan Zhang, Yujie Xiong, Jiaqi Zhang, Zhenqi Zhang:

Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. 387-399 - Tengfan Weng, Xiaoyu Kang, Zhixin Shi:

APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. 400-410 - Shengze Yuan, Bin Zhang, Wenlei Chai:

Federated Knowledge Collaborative Recommendation System with Privacy-Preserving. 411-422 - Gang Yang

, Bo Wu, Jun He, Lin Ni, Tao Xia:
Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic Under Low-Quality Training Data. 423-434 - ZhaoLin Sun, YanEr Li, DingYu Shi, Cen Chen:

Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. 435-446 - Sijia Zhao, Zhanjun Si:

A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. 447-457 - Qihan Lan, Zhizheng Lai, Yusong Du, Peijia Zheng:

Secure Outsourced Matrix Multiplication of Floating Point Numbers. 458-469 - Wanqing Wu, Zhican Zhang:

Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. 470-481 - Liancheng Zhang, Mingyue Ren, Haojie Zhu, Yangxiang Zhou, Jichang Wang, Wenhao Xia, Yi Guo, Lanxin Cheng:

Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. 482-493 - Ruizhong Du, Shuo Han, Mingyue Li:

Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. 494-504 - Hongquan Xu, Hongyu Kuang, Feng Yang:

VulPelican: An LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. 505-516 - Haoran Ma, Qiang Liu, Hang Liu, Zaixing Sun, Chonglin Gu, Hejiao Huang:

Energy-Aware Task Scheduling Using DVFS and On/Off Switching in Data Center. 517-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














