18th International Conference, Ksem 2025, Macao, China, August 4-7, 2025, Proceedings, Part VI Herausgegeben:Zhu, Tianqing; Zhou, Wanlei; Zhu, Congcong
18th International Conference, Ksem 2025, Macao, China, August 4-7, 2025, Proceedings, Part VI Herausgegeben:Zhu, Tianqing; Zhou, Wanlei; Zhu, Congcong
The six-volume proceedings set LNAI 15919, 15920, 15921, 15922, 15923 and 15924 constitutes the refereed proceedings of the 18th International Conference on Knowledge Science, Engineering and Management, KSEM 2025, held in Macao, China during August 4 7, 2025. The 106 papers and 66 short papers are included in these proceedings were carefully reviewed and selected from 354 submissions. They focus on all aspects of the exchange of research in artificial intelligence, data science, knowledge engineering, AI safety, large language models, and related frontier areas.
The six-volume proceedings set LNAI 15919, 15920, 15921, 15922, 15923 and 15924 constitutes the refereed proceedings of the 18th International Conference on Knowledge Science, Engineering and Management, KSEM 2025, held in Macao, China during August 4 7, 2025.
The 106 papers and 66 short papers are included in these proceedings were carefully reviewed and selected from 354 submissions. They focus on all aspects of the exchange of research in artificial intelligence, data science, knowledge engineering, AI safety, large language models, and related frontier areas.
Artikelnr. des Verlages: 89569767, 978-981-95-3071-7
Seitenzahl: 164
Erscheinungstermin: 14. November 2025
Englisch
Abmessung: 235mm x 155mm
ISBN-13: 9789819530717
ISBN-10: 9819530717
Artikelnr.: 75303435
Herstellerkennzeichnung
Libri GmbH
Europaallee 1
36244 Bad Hersfeld
gpsr@libri.de
Inhaltsangabe
.- Research on CAN Bus Intrusion Detection Method Based on Feature Fusion of Fourier Transform and Wavelet Transform. .- Research on Intelligent Classification Algorithm for Attack Detection Based on Pre-trained Fusion Network with Bimodal Features. .- Research on the Mechanism of Privacy-Enhanced Cross-Institutional Data Sharing. .- A Survey on Malware Analysis with Large Language Models. .- An Active Defense Scheme Integrating Traffic Anomaly Detection and Dynamic Key Update. .- Detection Method for Prompt Injection by Integrating Pre-trained Model and Heuristic Feature Engineering. .- A Comprehensive Survey on White-Box Security Threats for Large Language Models. .- FCA_XLNet_BiGRU Multi-Task Framework for Darknet Transactions. .- Knowledge-Driven Superpixel Shortest Path Optimization for Image Stitching. .- Edge-Knowledge-Driven Smoke Removal Based on Infrared and Visible Image Fusion. .- HDRIU-B:Hierarchical Data Rights Confirmation and Incremental Update Mechanism Based on NFT and SBT in Blockchain. .- A Blockchain Transaction Tracking Methoad Based on Dynamic Graph Link Prediction. .- Online-Learning based Task Scheduling in Industrial Internet-of-Things: Tackling Resource Skew with Dynamic Optimization. .- A Federated Learning Approach for Malware Detection in Data Heterogeneous Environments.
.- Research on CAN Bus Intrusion Detection Method Based on Feature Fusion of Fourier Transform and Wavelet Transform. .- Research on Intelligent Classification Algorithm for Attack Detection Based on Pre-trained Fusion Network with Bimodal Features. .- Research on the Mechanism of Privacy-Enhanced Cross-Institutional Data Sharing. .- A Survey on Malware Analysis with Large Language Models. .- An Active Defense Scheme Integrating Traffic Anomaly Detection and Dynamic Key Update. .- Detection Method for Prompt Injection by Integrating Pre-trained Model and Heuristic Feature Engineering. .- A Comprehensive Survey on White-Box Security Threats for Large Language Models. .- FCA_XLNet_BiGRU Multi-Task Framework for Darknet Transactions. .- Knowledge-Driven Superpixel Shortest Path Optimization for Image Stitching. .- Edge-Knowledge-Driven Smoke Removal Based on Infrared and Visible Image Fusion. .- HDRIU-B:Hierarchical Data Rights Confirmation and Incremental Update Mechanism Based on NFT and SBT in Blockchain. .- A Blockchain Transaction Tracking Methoad Based on Dynamic Graph Link Prediction. .- Online-Learning based Task Scheduling in Industrial Internet-of-Things: Tackling Resource Skew with Dynamic Optimization. .- A Federated Learning Approach for Malware Detection in Data Heterogeneous Environments.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826