語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Neural information processing = 31st...
~
ICONIP (Conference) (2024 :)
FindBook
Google Book
Amazon
博客來
Neural information processing = 31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.. Part XII /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Neural information processing/ edited by Mufti Mahmud ... [et al.].
其他題名:
31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.
其他題名:
ICONIP 2024
其他作者:
Mahmud, Mufti.
團體作者:
ICONIP (Conference)
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xxxiii, 468 p. :ill., digital ;24 cm.
內容註:
Fine-tuning Fine-tuned Models: Towards a Practical Methodology for Sentiment Analysis with Small In-domain Supervised Dataset -- End-to-end Knowledge Graph Construction System Powered by Large Language Models -- EPRVR: Efficient Partially Relevant Video Retrieval with Disentangled Video Representation Learning -- Graph-Based Data Augmentation and Label Noise Identification for Entity Resolution -- Patient Mortality prediction Using Clinical Notes -- ScaleDoc: A Two-Stage Approach for Scale-Aware Document Dewarping -- CCUH:CLIP-Based Clustering Method for Unsupervised Hashing Multi-Modal Retrieval -- A Privacy-Preserving Image Classification Framework with Transformer -- Reversible Data Hiding in Dual Encrypted Images with Dual Data Embedding -- A Dual-Layer Reversible Data Hiding Scheme Based on Optimal Neighbor Mean Interpolation (ONMI) and Histogram Shifting -- Threat Intelligence Entity Recognition Based On Large Language Model With Contrastive Learning -- GTSD: Generative Text Steganography Based on Diffusion Model -- Enhanced Autoencoder Model for Robust Anomaly Detection in Financial Fraud with Imbalanced Data -- Membership Inference Attacks in Text Classification Tasks -- PURVEY-CE: A Complex texture adaptive image steganography based on channel attention -- Air-Sniffing Analytics Enhancing Wi-Fi Device Identification with Robust and Accurate Techniques -- Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices -- Control ControlNet: Multidimensional Backdoor Attack based on ControlNet -- CPANet: Convolutional Parameter Adapter Network for Image Copy-Move Forgery Detection and Localization -- AO-UAP: An Adaptive Universal Adversarial Perturbation Generation for Speech Recognition Models -- A Hilbert-Curve based Encoding scheme for Privacy-preserving Nearest-Neighbor Classification -- ZKP-HGNN: A Study on Improving Zero- Knowledge Proof (ZKP) Based on Heterogeneous Graph Neural Networks for Anonymous Digital Identity Sharing in Blockchain -- Adversarial Knowledge Extraction via Steering Diffusion Models -- Solving the Thinnest Path Problem with Hypergraph Learning -- AISSGR: Attack Investigation Based on Self-Supervised Graph Representation Learning -- Two-stage optimized adversarial patch for attacking infrared vehicle detectors in the physical world -- Deep Learning-Based Detection of Code Execution Vulnerabilities in Binary Programs -- Towards Real-Time Audio Deepfake Detection in Resource-Limited Environments -- Detecting Audio Deepfakes through Emotional Fingerprinting -- Constructing Multi-Detector Decision Forest for Fake Speech Detection -- KDAE: Kernel Density Auto-Encoder for Semi-Supervised Anomaly Detection with Limited Labeled Data.
Contained By:
Springer Nature eBook
標題:
Neural networks (Computer science) - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-7005-5
ISBN:
9789819670055
Neural information processing = 31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.. Part XII /
Neural information processing
31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.Part XII /[electronic resource] :ICONIP 2024edited by Mufti Mahmud ... [et al.]. - Singapore :Springer Nature Singapore :2025. - xxxiii, 468 p. :ill., digital ;24 cm. - Communications in computer and information science,22931865-0937 ;. - Communications in computer and information science ;2293..
Fine-tuning Fine-tuned Models: Towards a Practical Methodology for Sentiment Analysis with Small In-domain Supervised Dataset -- End-to-end Knowledge Graph Construction System Powered by Large Language Models -- EPRVR: Efficient Partially Relevant Video Retrieval with Disentangled Video Representation Learning -- Graph-Based Data Augmentation and Label Noise Identification for Entity Resolution -- Patient Mortality prediction Using Clinical Notes -- ScaleDoc: A Two-Stage Approach for Scale-Aware Document Dewarping -- CCUH:CLIP-Based Clustering Method for Unsupervised Hashing Multi-Modal Retrieval -- A Privacy-Preserving Image Classification Framework with Transformer -- Reversible Data Hiding in Dual Encrypted Images with Dual Data Embedding -- A Dual-Layer Reversible Data Hiding Scheme Based on Optimal Neighbor Mean Interpolation (ONMI) and Histogram Shifting -- Threat Intelligence Entity Recognition Based On Large Language Model With Contrastive Learning -- GTSD: Generative Text Steganography Based on Diffusion Model -- Enhanced Autoencoder Model for Robust Anomaly Detection in Financial Fraud with Imbalanced Data -- Membership Inference Attacks in Text Classification Tasks -- PURVEY-CE: A Complex texture adaptive image steganography based on channel attention -- Air-Sniffing Analytics Enhancing Wi-Fi Device Identification with Robust and Accurate Techniques -- Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices -- Control ControlNet: Multidimensional Backdoor Attack based on ControlNet -- CPANet: Convolutional Parameter Adapter Network for Image Copy-Move Forgery Detection and Localization -- AO-UAP: An Adaptive Universal Adversarial Perturbation Generation for Speech Recognition Models -- A Hilbert-Curve based Encoding scheme for Privacy-preserving Nearest-Neighbor Classification -- ZKP-HGNN: A Study on Improving Zero- Knowledge Proof (ZKP) Based on Heterogeneous Graph Neural Networks for Anonymous Digital Identity Sharing in Blockchain -- Adversarial Knowledge Extraction via Steering Diffusion Models -- Solving the Thinnest Path Problem with Hypergraph Learning -- AISSGR: Attack Investigation Based on Self-Supervised Graph Representation Learning -- Two-stage optimized adversarial patch for attacking infrared vehicle detectors in the physical world -- Deep Learning-Based Detection of Code Execution Vulnerabilities in Binary Programs -- Towards Real-Time Audio Deepfake Detection in Resource-Limited Environments -- Detecting Audio Deepfakes through Emotional Fingerprinting -- Constructing Multi-Detector Decision Forest for Fake Speech Detection -- KDAE: Kernel Density Auto-Encoder for Semi-Supervised Anomaly Detection with Limited Labeled Data.
The sixteen-volume set, CCIS 2282-2297, constitutes the refereed proceedings of the 31st International Conference on Neural Information Processing, ICONIP 2024, held in Auckland, New Zealand, in December 2024. The 472 regular papers presented in this proceedings set were carefully reviewed and selected from 1301 submissions. These papers primarily focus on the following areas: Theory and algorithms; Cognitive neurosciences; Human-centered computing; and Applications.
ISBN: 9789819670055
Standard No.: 10.1007/978-981-96-7005-5doiSubjects--Topical Terms:
582186
Neural networks (Computer science)
--Congresses.
LC Class. No.: QA76.87
Dewey Class. No.: 006.32
Neural information processing = 31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.. Part XII /
LDR
:04459nmm a2200361 a 4500
001
2413280
003
DE-He213
005
20250624130250.0
006
m d
007
cr nn 008maaau
008
260205s2025 si s 0 eng d
020
$a
9789819670055
$q
(electronic bk.)
020
$a
9789819670048
$q
(paper)
024
7
$a
10.1007/978-981-96-7005-5
$2
doi
035
$a
978-981-96-7005-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.87
072
7
$a
UYQP
$2
bicssc
072
7
$a
COM016000
$2
bisacsh
072
7
$a
UYQP
$2
thema
082
0 4
$a
006.32
$2
23
090
$a
QA76.87
$b
.I17 2024
111
2
$a
ICONIP (Conference)
$n
(31st :
$d
2024 :
$c
Auckland, N.Z.)
$3
3789179
245
1 0
$a
Neural information processing
$h
[electronic resource] :
$b
31st International Conference, ICONIP 2024, Auckland, New Zealand, December 2-6, 2024 : proceedings.
$n
Part XII /
$c
edited by Mufti Mahmud ... [et al.].
246
3
$a
ICONIP 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xxxiii, 468 p. :
$b
ill., digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
2293
505
0
$a
Fine-tuning Fine-tuned Models: Towards a Practical Methodology for Sentiment Analysis with Small In-domain Supervised Dataset -- End-to-end Knowledge Graph Construction System Powered by Large Language Models -- EPRVR: Efficient Partially Relevant Video Retrieval with Disentangled Video Representation Learning -- Graph-Based Data Augmentation and Label Noise Identification for Entity Resolution -- Patient Mortality prediction Using Clinical Notes -- ScaleDoc: A Two-Stage Approach for Scale-Aware Document Dewarping -- CCUH:CLIP-Based Clustering Method for Unsupervised Hashing Multi-Modal Retrieval -- A Privacy-Preserving Image Classification Framework with Transformer -- Reversible Data Hiding in Dual Encrypted Images with Dual Data Embedding -- A Dual-Layer Reversible Data Hiding Scheme Based on Optimal Neighbor Mean Interpolation (ONMI) and Histogram Shifting -- Threat Intelligence Entity Recognition Based On Large Language Model With Contrastive Learning -- GTSD: Generative Text Steganography Based on Diffusion Model -- Enhanced Autoencoder Model for Robust Anomaly Detection in Financial Fraud with Imbalanced Data -- Membership Inference Attacks in Text Classification Tasks -- PURVEY-CE: A Complex texture adaptive image steganography based on channel attention -- Air-Sniffing Analytics Enhancing Wi-Fi Device Identification with Robust and Accurate Techniques -- Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices -- Control ControlNet: Multidimensional Backdoor Attack based on ControlNet -- CPANet: Convolutional Parameter Adapter Network for Image Copy-Move Forgery Detection and Localization -- AO-UAP: An Adaptive Universal Adversarial Perturbation Generation for Speech Recognition Models -- A Hilbert-Curve based Encoding scheme for Privacy-preserving Nearest-Neighbor Classification -- ZKP-HGNN: A Study on Improving Zero- Knowledge Proof (ZKP) Based on Heterogeneous Graph Neural Networks for Anonymous Digital Identity Sharing in Blockchain -- Adversarial Knowledge Extraction via Steering Diffusion Models -- Solving the Thinnest Path Problem with Hypergraph Learning -- AISSGR: Attack Investigation Based on Self-Supervised Graph Representation Learning -- Two-stage optimized adversarial patch for attacking infrared vehicle detectors in the physical world -- Deep Learning-Based Detection of Code Execution Vulnerabilities in Binary Programs -- Towards Real-Time Audio Deepfake Detection in Resource-Limited Environments -- Detecting Audio Deepfakes through Emotional Fingerprinting -- Constructing Multi-Detector Decision Forest for Fake Speech Detection -- KDAE: Kernel Density Auto-Encoder for Semi-Supervised Anomaly Detection with Limited Labeled Data.
520
$a
The sixteen-volume set, CCIS 2282-2297, constitutes the refereed proceedings of the 31st International Conference on Neural Information Processing, ICONIP 2024, held in Auckland, New Zealand, in December 2024. The 472 regular papers presented in this proceedings set were carefully reviewed and selected from 1301 submissions. These papers primarily focus on the following areas: Theory and algorithms; Cognitive neurosciences; Human-centered computing; and Applications.
650
0
$a
Neural networks (Computer science)
$x
Congresses.
$3
582186
650
1 4
$a
Automated Pattern Recognition.
$3
3538549
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer Application in Social and Behavioral Sciences.
$3
3538516
700
1
$a
Mahmud, Mufti.
$3
3500851
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
2293.
$3
3789215
856
4 0
$u
https://doi.org/10.1007/978-981-96-7005-5
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9518735
電子資源
11.線上閱覽_V
電子書
EB QA76.87
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入
(1)帳號:一般為「身分證號」;外籍生或交換生則為「學號」。 (2)密碼:預設為帳號末四碼。
帳號
.
密碼
.
請在此電腦上記得個人資料
取消
忘記密碼? (請注意!您必須已在系統登記E-mail信箱方能使用。)