Cloud and Network Computing
Second International Conference, Iccnc 2025, Fuzhou, China, June 20-22, 2025, Proceedings
Herausgegeben:Lin, Limei; Lee, Chia-Wei
Cloud and Network Computing
Second International Conference, Iccnc 2025, Fuzhou, China, June 20-22, 2025, Proceedings
Herausgegeben:Lin, Limei; Lee, Chia-Wei
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20 22, 2025.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
Andere Kunden interessierten sich auch für
- Big Data Processing Using Spark in Cloud76,99 €
- Big Data Processing Using Spark in Cloud76,99 €
- Mobile Networks and Management38,99 €
- Wanming HaoIntelligent Mobile Edge Computing and Sensing151,99 €
- Green, Pervasive, and Cloud Computing57,99 €
- Richard BejtlichThe Practice of Network Security Monitoring60,99 €
- Research Advances in Cloud Computing83,99 €
-
-
-
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20 22, 2025.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.
They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.
Produktdetails
- Produktdetails
- Communications in Computer and Information Science 2539
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-95-0128-1
- Seitenzahl: 436
- Erscheinungstermin: 24. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9789819501281
- ISBN-10: 9819501288
- Artikelnr.: 74802099
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Communications in Computer and Information Science 2539
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-95-0128-1
- Seitenzahl: 436
- Erscheinungstermin: 24. Oktober 2025
- Englisch
- Abmessung: 235mm x 155mm
- ISBN-13: 9789819501281
- ISBN-10: 9819501288
- Artikelnr.: 74802099
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
.- Cloud & Edge Computing.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- Cloud & Edge Computing.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.
.- FPGA-Based Real-Time FIR Filter for Digital Audio Processing.
.- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework.
.- Multicast Communication in All-Optical Fat-Tree Networks.
.- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment.
.- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems.
.- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems.
.- The Optimization Problem of Delivery Platforms.
.- Network Computing.
.- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern.
.- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks.
.- Reliability Analysis of Folded Hypercube-Like Networks.
.- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks.
.- The Approximate Concept of Variable Precision Rough Set on Concept Lattice.
.- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol.
.- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model.
.- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment.
.- Big Data Analysis and Artificial Intelligence.
.- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation.
.- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks.
.- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection.
.- Concept-Aware Deep Representation Learning for Co-Evolving Sequences.
.- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection.
.- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network.
.- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks.
.- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning.
.- Security & Privacy.
.- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization.
.- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing.
.- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition.
.- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps.
.- DOL: A Dual Ownership License for Deep Neural Networks.
.- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring.
.- Improvement of Provable Data Possession Scheme.
.- Privacy-Preserving Scheme in Social Networks With Differential Privacy.