default search action
Search dblp for Publications
export results for "toc:db/conf/icic/icic2024-9.bht:"
@inproceedings{DBLP:conf/icic/BaoCHYNLW24, author = {Haizhou Bao and Minhao Chen and Yiming Huo and Guorong Yu and Lei Nie and Peng Li and Yuxuan Wang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and {LSTM}}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {25--37}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_3}, doi = {10.1007/978-981-97-5606-3\_3}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/BaoCHYNLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/CaoWF24, author = {ShenHong Cao and Kaixi Wang and Yanbin Fan}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Steganalysis of VoIP Streams via Bidirectional Correlation Extract Network}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {316--327}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_27}, doi = {10.1007/978-981-97-5606-3\_27}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/CaoWF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ChenJH24, author = {Jian Chen and Ming Jiang and Fuyun He}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Model Construction and Empirical Research on Cross-Platform Propagation of Disinformation}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {397--408}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_34}, doi = {10.1007/978-981-97-5606-3\_34}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ChenJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/DingYCLHY24, author = {Kuiye Ding and Xin Yang and Jintao Chen and Chao Liu and Songyao Hou and Wenyuan Yang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {{UB-CRAF:} {A} User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in Clouds}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {340--351}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_29}, doi = {10.1007/978-981-97-5606-3\_29}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/DingYCLHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/DuSLW24, author = {Ruizhong Du and Xijie She and Mingyue Li and Ziyuan Wang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected Distributions}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {110--121}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_10}, doi = {10.1007/978-981-97-5606-3\_10}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/DuSLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/FanMLTCG24, author = {Hao Fan and Zhaoyang Ma and Yong Li and Rui Tian and Yunli Chen and Chenlong Gao}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {MixPrompt: Enhancing Generalizability and Adversarial Robustness for Vision-Language Models via Prompt Fusion}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {328--339}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_28}, doi = {10.1007/978-981-97-5606-3\_28}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/FanMLTCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/GeRMLH24, author = {Jian Ge and Jianwu Rui and Hengtai Ma and Bin Li and Yeping He}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction Graph}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {363--374}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_31}, doi = {10.1007/978-981-97-5606-3\_31}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/GeRMLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/GuoHFWFZ24, author = {Zhenkun Guo and Yeshen He and Yifan Fan and Xueliang Wang and Meiming Fu and Yiying Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A Dual Channel Attention Mechanism-Based Intrusion Detection Model for Advanced Metering Infrastructure}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {449--457}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_38}, doi = {10.1007/978-981-97-5606-3\_38}, timestamp = {Thu, 28 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icic/GuoHFWFZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/HsiehXKYM24, author = {Chao{-}Hsien Hsieh and Fengya Xu and Dehong Kong and Qingqing Yang and Yue Ma}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {{CSQF-BA:} Efficient Container Query Technology for Cloud Security Query Framework with Bat Algorithm}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {97--109}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_9}, doi = {10.1007/978-981-97-5606-3\_9}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/HsiehXKYM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/HuangCFCIY24, author = {Hao Huang and Wentao Chen and Weidong Fang and Wei Chen and Wai{-}Hung Ip and Kai{-}Leung Yung}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {38--48}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_4}, doi = {10.1007/978-981-97-5606-3\_4}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/HuangCFCIY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/HuoCMLZ24, author = {Chenghang Huo and Jindong Cui and Ru Ma and Yunfei Luo and Fuzhi Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Spammer Group Detection Approach Based on Deep Reinforcement Learning}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {233--244}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_20}, doi = {10.1007/978-981-97-5606-3\_20}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/HuoCMLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/JiLGJ24, author = {Shaojie Ji and Yan Liu and Xiaoyu Guo and Mengmeng Jia}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {The Micro-scale Adversarial Detection Algorithm for Overlapping Communities Based on Genetic Algorithms}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {306--315}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_26}, doi = {10.1007/978-981-97-5606-3\_26}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/JiLGJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/JiaLQCKLL24, author = {Jia Jia and Linghui Li and Pengfei Qiu and Binsi Cai and Xu Kang and Ximing Li and Xiaoyong Li}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {386--396}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_33}, doi = {10.1007/978-981-97-5606-3\_33}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/JiaLQCKLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/JingCWWTZ24, author = {Rui Jing and Wei Chen and Xiaoxin Wu and Zehua Wang and Zijian Tian and Fan Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {When Blockchain Meets Asynchronous Federated Learning}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {199--207}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_17}, doi = {10.1007/978-981-97-5606-3\_17}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/JingCWWTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiHZLWZ24, author = {Ziqian Li and Yeshen He and Yiying Zhang and Siwei Li and Cong Wang and Xiankun Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Attribute-Based Encryption Method for Data Privacy Security Protection}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {458--467}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_39}, doi = {10.1007/978-981-97-5606-3\_39}, timestamp = {Fri, 29 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icic/LiHZLWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiL24, author = {Zeshuai Li and Xiaoyan Liang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {281--293}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_24}, doi = {10.1007/978-981-97-5606-3\_24}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiLZ24, author = {Chenting Li and Dan Li and Yuqian Zhou}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A Dual Auditing Scheme of Cross-Chain Data Shared Among the Blockchain Network}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {245--256}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_21}, doi = {10.1007/978-981-97-5606-3\_21}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiPL24, author = {Yisheng Li and Xuekang Peng and Zhichao Lian}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Multi-texture Fusion Attack: {A} Robust Adversarial Camouflage in Physical World}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {186--198}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_16}, doi = {10.1007/978-981-97-5606-3\_16}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiWHLC24, author = {Hanwen Li and Shanshan Wang and Yadi Han and Changlin Liu and Zhenxiang Chen}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Constructing Adversarial Network Attacks in Realistic Network Environments}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {422--435}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_36}, doi = {10.1007/978-981-97-5606-3\_36}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiWHLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiZQWSM24, author = {Taiqiang Li and Zhen Zhang and Heng Qian and Qiuyue Wang and Guanqun Su and Lingzhen Meng}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential Privacy}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {208--219}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_18}, doi = {10.1007/978-981-97-5606-3\_18}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiZQWSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiuHWSLZWWZ24, author = {Chang Liu and Xiaowei He and Bin Wang and Xinru Sun and Yixuan Luo and Yiji Zeng and Xinyu Wang and Jianhang Wang and Haofei Zhao}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A Differential Privacy Federated Learning Scheme with Improved Noise Perturbation}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {61--71}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_6}, doi = {10.1007/978-981-97-5606-3\_6}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiuHWSLZWWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/LiuLZ24, author = {Zhihua Liu and Shenquan Liu and Jian Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {An Intrusion Detection Method for Industrial Internet Fusing Multi-Scale {TCN} and Transformer Network}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {82--96}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_8}, doi = {10.1007/978-981-97-5606-3\_8}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/LiuLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/MaDMWL24, author = {Bin Ma and Hongtao Duan and Ruihe Ma and Chunpeng Wang and Xiaolong Li}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {375--385}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_32}, doi = {10.1007/978-981-97-5606-3\_32}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/MaDMWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/MaLFWHZ24, author = {Hao Ma and Ting Li and Meiming Fu and Xueliang Wang and Yeshen He and Yiying Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {An Intrusion Detection Model of Incorporating Deep Residual Shrinking Networks for Power Internet of Things}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {479--490}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_41}, doi = {10.1007/978-981-97-5606-3\_41}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/MaLFWHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/MiJSXXM24, author = {Zhongjie Mi and Xinghao Jiang and Tanfeng Sun and Ke Xu and Qiang Xu and Laijin Meng}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {267--280}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_23}, doi = {10.1007/978-981-97-5606-3\_23}, timestamp = {Wed, 11 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icic/MiJSXXM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/MiZCCTLZ24, author = {Jian{-}Xun Mi and Xiangjin Zhao and Yongtao Chen and Xiao Cheng and Peng Tian and Xiaohong Lv and Jiayong Zhong}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Non-targeted Adversarial Attacks on Object Detection Models}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {3--12}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_1}, doi = {10.1007/978-981-97-5606-3\_1}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/MiZCCTLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/QianKY24, author = {Qing Qian and Yi{-}Lin Kuang and Yi Yue}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {EPTLENet: Replay Attack Detection with Efficient Parameter Transfer Learning Based on ERes2Net}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {409--421}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_35}, doi = {10.1007/978-981-97-5606-3\_35}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/QianKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ShiXMZ24, author = {Zhihao Shi and Yaozong Xu and Maode Ma and Yanan Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data Networks}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {158--167}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_14}, doi = {10.1007/978-981-97-5606-3\_14}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ShiXMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WangCZL24, author = {Liang Wang and Hao Chen and Lina Zuo and Haibo Liu}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {U-shaped Vertical Split Learning with Local Differential Privacy for Privacy Preserving}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {72--81}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_7}, doi = {10.1007/978-981-97-5606-3\_7}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WangCZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WangNGZ24, author = {Jialiang Wang and Liuyang Nie and Zhaojun Gu and Huan Zhao}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Real-Time Detection for {GPS} Spoofing of Quad-Rotor Helicopter Based on Data Fusion}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {294--305}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_25}, doi = {10.1007/978-981-97-5606-3\_25}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WangNGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WenXSDZ24, author = {Li Wen and Pengfei Xue and Yi Shen and Wanmeng Ding and Min Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Show Criminals' True Color: Chinese Variant Toxic Text Restoration Based on Pointer-Generator Network}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {132--145}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_12}, doi = {10.1007/978-981-97-5606-3\_12}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WenXSDZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WuSZSSW24, author = {Songyang Wu and Bochen Shen and Hao Zheng and Wenqi Sun and Qi Sun and Shuang Wang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {FedURL: {A} BERT-based Federated Malicious {URL} Detection Framework}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {122--131}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_11}, doi = {10.1007/978-981-97-5606-3\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WuSZSSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WuZLW24, author = {Lei Wu and Xiaofeng Zhong and Jingju Liu and Xiang Wang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {220--232}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_19}, doi = {10.1007/978-981-97-5606-3\_19}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WuZLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WuZYL24, author = {Xiaochun Wu and Jiawang Zhang and Qi Yao and Wanli Lyu}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Reversible Data Hiding Based on Octree Partitioning and Arithmetic Coding in Encrypted Three-Dimensional Mesh Models}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {49--60}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_5}, doi = {10.1007/978-981-97-5606-3\_5}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WuZYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/XieCZYS24, author = {Rongna Xie and Xiaoyu Chen and Xinru Zhang and Guang Yang and Guozhen Shi}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Block Cipher Algorithms Identification Scheme Based on {KFDA}}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {13--24}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_2}, doi = {10.1007/978-981-97-5606-3\_2}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/XieCZYS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/YangCDLLH24, author = {Xin Yang and Jintao Chen and Kuiye Ding and Chao Liu and Jiashen Liu and Songyao Hou}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {An Adaptive {VM} Allocation Approach for Mitigating Co-resident Attack in Cloud Based on Improved {NSGA-II}}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {436--448}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_37}, doi = {10.1007/978-981-97-5606-3\_37}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/YangCDLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/YangQHZL24, author = {Ziyuan Yang and Haipeng Qu and Ying Hua and Xiaoshuai Zhang and Xijun Lin}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Adversarial Attacks on Network Intrusion Detection Systems Based on Federated Learning}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {146--157}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_13}, doi = {10.1007/978-981-97-5606-3\_13}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/YangQHZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/YangWMFSH24, author = {Gang Yang and Bo Wu and Weifeng Mou and Linna Fan and Xuan Shen and Jun He}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {352--362}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_30}, doi = {10.1007/978-981-97-5606-3\_30}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/YangWMFSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhangDLZSL24, author = {Yiying Zhang and Yanping Dong and Ke Liu and Xiankun Zhang and Xianfan Sun and Siwei Li}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Intrusion Detection in Power Cyber-Physical Systems Using Denoising Autoencoder and {EQL} v2 Loss Function}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {468--478}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_40}, doi = {10.1007/978-981-97-5606-3\_40}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhangDLZSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhangSXXS24, author = {Botao Zhang and Fan Shi and Chengxi Xu and Pengfei Xue and Jiankun Sun}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {{CAKGC:} {A} Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature Fusion}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {168--185}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_15}, doi = {10.1007/978-981-97-5606-3\_15}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhangSXXS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhangXXMW24, author = {Yanan Zhang and Jingru Xing and Yaozong Xu and Maode Ma and Cong Wang}, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {{DM-CIFA:} Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNs}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, pages = {257--266}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3\_22}, doi = {10.1007/978-981-97-5606-3\_22}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhangXXMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icic/2024-9, editor = {De{-}Shuang Huang and Wei Chen and Jiayang Guo}, title = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {IX}}, series = {Lecture Notes in Computer Science}, volume = {14870}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5606-3}, doi = {10.1007/978-981-97-5606-3}, isbn = {978-981-97-5605-6}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/2024-9.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.