My Account Log in

1 option

Advanced Intelligent Computing Technology and Applications : 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part X / edited by De-Shuang Huang, Chuanlei Zhang, Jiayang Guo.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Author/Creator:
Huang, De-Shuang.
Contributor:
Zhang, Chuanlei.
Guo, Jiayang.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 14871
Language:
English
Subjects (All):
Computational intelligence.
Machine learning.
Computer networks.
Application software.
Computational Intelligence.
Machine Learning.
Computer Communication Networks.
Computer and Information Systems Applications.
Local Subjects:
Computational Intelligence.
Machine Learning.
Computer Communication Networks.
Computer and Information Systems Applications.
Physical Description:
1 online resource (548 pages)
Edition:
1st ed. 2024.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2024.
Summary:
This 13-volume set LNCS 14862-14874 constitutes - in conjunction with the 6-volume set LNAI 14875-14880 and the two-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology. .
Contents:
Intro
Preface
Organization
Contents - Part X
Information Security
Eavesdropping Mobile Apps and Actions Through Wireless Traffic in the Open World
1 Introduction
2 Threat Model
3 System Design
3.1 System Overview
3.2 Traffic Preprocessing
3.3 Multi-level Feature Extraction
3.4 App and Action Recognition
4 Evaluation
4.1 Evaluation Methodology
4.2 Experimental Results
5 Conclusion
References
Improving WiFi CSI Fingerprinting with IQ Samples
2 Threat Model and CSI Features
2.1 Threat Model
2.2 CSI Features
3.2 CSI Measurement Transformation
3.3 Feature Extraction and Recognition
4 Experimental Evaluation
5 Conclusions
RIHNet: A Robust Image Hiding Method for JPEG Compression
2 Related Work
3 Method
3.1 Overview
3.2 Secret Image Hiding Module (SIH)
3.3 Classifier
3.4 Denoising Module
3.5 Loss Function
4 Experiments
4.1 Experimental Settings
4.2 Comparison with SOTA
4.3 Ablation Experiments
HybridHash: An Efficient Hash Index for Encrypted Databases
3 Design of HybridHash
3.1 Overall Structure
3.2 Operations
4 Performance Evaluation
4.1 Read Performance
4.2 Bucket-Splitting Cost
4.3 Index Size
5 Conclusions and Future Work
Textual Backdoor Attack via Keyword Positioning
3 Methodology
3.1 Threat Model
3.2 Overview
3.3 Calculation of the Importance Score
3.4 Trigger Selection
3.5 Generate Toxic Samples
3.6 Training-Time Poisoning
3.7 Test-Time Poisoning
4 Experimental Setup
4.1 Equipment
4.2 Datasets
4.3 Victim Models.
4.4 Baseline Methods
4.5 Evaluation Metrics
5 Experimental Results
5.1 Backdoor Attack Results and Discussion
5.2 The Impact of the Number of Operations
6 Conclusion
A Hybrid DCT/DST Based Embedding Framework for Video Steganography in H.265/HEVC
2 Averting Intra-Distortion Drift and Spacing Coding
2.1 Averting Intra-Distortion Drift
2.2 Spacing Coding
3 The Architecture of the Hybrid Embedding Framework
3.1 Intra-Prediction Embedding and Extraction
3.2 Inter-Prediction Embedding and Extraction
4 Experimental Results
5 Security Analysis
Intelligent Computing in Computer Vision
YOLO-FLC: Lightweight Traffic Sign Detection Algorithm
2 Yolo-F
2.1 Improved C3 Module
2.2 Feature Pyramid Optimization
2.3 The Improvement of the Loss Function
2.4 Detection Scale Optimization
3 Model Compression
3.1 Pruning
3.2 Knowledge Distillation
4 Results of Experiments and Data Analysis
4.1 Dataset Processing
4.2 Evaluation Metrics
4.3 The Experimental Environment
4.4 The Experimental Results
Self-supervised Visual Anomaly Detection with Image Patch Generation and Comparison Networks
2.1 Unsupervised Anomaly Detection Based on Reconstruction
2.2 VIT-Based Network
2.3 Siamese Network
3.1 VIT-Based Patch Generation Network
3.2 Siamese-Based Fine-Grained Comparison Network
3.3 Bi-directional Inference Strategy
4 Experiment
4.1 Datasets and Metrics
4.2 Implementation Details
4.3 Evaluation on MVTec AD Dataset
4.4 Evaluation on Our Own Dataset
4.5 Ablation Study
Spatial-Temporal Transformer Network for Continuous Action Recognition in Industrial Assembly.
1 Introduction
2.1 Action Recognition for Assembly Operation
2.2 Human Object Interaction
2.3 Video Transformer
3.1 STTN for Action Recognition
3.2 Operation Procedure Edition for Action Sequence Recognition
3.3 Continual Learning with Worker-in-the-Loop
4.1 Action Recognition on Public Dataset
4.2 Action Recognition on Industrial Assembly Dataset
4.3 Promotion on Production Quality and Efficiency
EVF-YOLO: A Lightweight Network for License Plate Detection Under Severe Weather Conditions
3 Model Construction and Analysis
3.1 EMA
3.2 Feature Fusion V-GFPN
3.3 Lightweight Detection Head
3.4 Overall Model
4 Experimental Design and Result Analysis
4.1 Experimental Setup
4.3 Experimental Results
Quantum Robust Coding for Quantum Image Watermarking
2 Proposed Method
2.1 Quantum Robust Coding (QRC)
2.2 Quantum Image Watermarking Using QRC
3 Experiments and Results
3.1 Evaluation of Watermarking with and Without QRC
3.2 Quantum Watermarking Evaluation by Comparison
4 Conclusion
Quantum-Enhanced Support Vector Machine for Large-Scale Multi-class Stellar Classification
1.1 Types of Stars and Current Methods of Classification
2 Methodology
2.1 Classical Support Vector Machine
2.2 Quantum-Enhanced SVM with Quantum Feature Map
3 Feature Engineering for Stellar Classification
4 Results and Discussion
4.1 QSVM for Large Stellar Dataset with Two Classes
4.2 Quantum Simulator for Quantum Kernel with GPU Acceleration Using cuQuantum SDK
DDNet: Detection-Focused Dehazing Network
2 Related Work.
2.1 Object Detection
2.2 Image Dehazing
2.3 Object Detection Under Hazy Weather
3 Proposed Method
3.1 Rep-Inception
3.2 Dual-Branch Fusion Network
3.3 Parallel Differentiable Image Processing Module
4.1 Datasets
4.2 Comparison with Other Methods
4.3 Ablation Study
A Secure Voting Scheme Based on Quantum Walk
2 Preliminary
2.1 One-Dimensional Quantum Walk Model on the Line
2.2 Teleportation Based on Quantum Walks
3 Security Voting Scheme
3.1 Quantum Voting System Model
3.2 Authorization of Legitimate Voters
3.3 Security Testing
3.4 Voting Scheme
4 Security Analysis
4.1 Non-reusability
4.2 Verifiability
4.3 Privacy and Security
4.4 Fairness
5 Comparison
PyCIM: A Python Framework for the Dynamics of Coherent Ising Machine
2 The Principle of CIM
3 The Architecture of PyCIM
3.1 Existing Theoretical Models Describing CIM
3.2 Design of PyCIM
4.1 The Evolution of DOPO State in CIM Without Coupling
4.2 The Process of CIM Solving MAX-CUT Problem
4.3 The Influence of Coupling Strength and Pump Scheduling on Solution Performance
4.4 The Performance of PyCIM on G-Set
Dense Center Point Mechanism: A Novel Approach for Multi-expert Decision Integration in Portfolio Management
2.1 Problem Definition
2.2 Expert Consensus Decision-Making Method
3 Integrate Expert Decision Process
3.1 Behavior and Definition of CPESM Experts
3.2 Portfolio Optimization of Investor
4 Empirical Approach
4.2 DEDIS Results Analysis
4.3 Portfolio Results Analysis
References.
Planning for Earth Imaging Tasks via Grid Significance Mapping
2 Gird Division and Mapping
2.1 Introducing H3 Gridding
2.2 Significance Mapping of Points
3 Task Planning Using Grid Representations
3.1 Grid-Based Planning Model
3.2 Planning Problem Solving
4 Experiments and Evaluation
4.1 Experiment Settings
4.2 Significance of Weight Mapping
4.3 Experimental Analysis of Load Balancing
5 Conclusion and Future Work
Virtual Reality and Human-Computer Interaction
FusionCraft: Fusing Emotion and Identity in Cross-Modal 3D Facial Animation
2 Related Works
3.2 Preliminaries
3.3 Text2Avatar
3.4 Emotion-Identity Fusion Module
3.5 Avatar Generator
3.6 Key Points Loss
4.2 Evaluation Methods
4.3 Quantitative Evaluation
4.4 Qualitative Evaluation
4.5 User Study
5 Limitations and Future Work
DWMF: A Method for Hybrid Multimodal Intent Fusion Based on Dynamic Weights
3 Materials and Methods
3.1 Algorithm Description
3.2 Analysis of Algorithm
4 Experiment Steps and Results
4.1 Experiment Setting
4.2 Experiment Methods
4.3 Experiment Results and Analysis
Panoramic Video Inter Frame Prediction and Viewport Prediction Based on Background Modeling
2.1 Panoramic Video Coding
2.2 Viewport Prediction
3.1 Background Modeling
3.2 Background Modeling-Based Encoding
3.3 Viewport Prediction
4.1 Background Modeling
4.2 Panoramic Video Encoding
4.3 Viewport Prediction
Efficient Sensing Network and Decoupled Neural Model for Hand Pose Estimation.
ISBN:
9789819756094
981975609X
OCLC:
1450838005

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account