- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book CCIS 2774 constitutes the refereed proceedings of the 40th CCF National Conference of Computer Applications, CCF NCCA 2025, held in Beijing, China, during August 7-9, 2025.
The 43 full papers and presented in this book were carefully selected and reviewed from 269 submissions. These papers have been organized in the following topical sections:
Artificial Intelligence and Applications
Cyberspace Security Technology
Data Science and Big Data Technology
Frontier Technology Applications
Contents
Artificial Intelligence and Applications.- A Fractional-Order Automatic Feature Matching Algorithm for Image Rotation and Scaling.- Multistrategy Improved Dung Beetle Optimization Algorithm and its Application in ALBP-1.- Aggregation of Dialogue History Information and Utterance-Slot Attention for Dialogue State Tracking.- Research on Children's ADHD Detection Algorithm Based on BASA-FMGNet.- NAD-KRQG: Neural Association-Based Cognitive Diagnosis with Knowledge Recommendation and Question Generation.- NOTEARS-cMLP: Learning Nonparametric DAGs with Domain Knowledge.- Humanoid Robots Gate-Passing Method Based on SAC Algorithm with Generative Adversarial Networks.- Link Prediction Method Based on Structural Hole Characterization under Multi-Order Paths.- Research on an Elevator Group Control Method Based on Interactive Artificial Bee Colonies.- STUAformer: Spatio-Temporal Unified Aggregate Transformer Model for Traffic Speed Prediction.- STAGAT: Spatio-Temporal Aggregation Graph Attention Network for Traffic Prediction.- Intelligent Software Testing Platform Selection and Knowledge Graph-Driven Test Case Generation.- A Method for Generating Class Integration Test Sequences Based on Simulated Annealing Particle Swarm Optimization.- Research on Multi-Scale Lesion Detection in Human Lung CT Images Based on Deep Learning.- Riding the Wave of LLMs: Navigating Opportunities and Challenges in Chinese Information Technology Application Innovation.- Air Quality Inference with Multi-Source Heterogeneous Data and FSMoE-LSC Model.- CHOLD: Offensive Language Detection Method for Chinese Texts.- STMFNet: A Spatial-Temporal Masking and Feature Fusion Model for Traffic Flow Prediction.- Dual-Grained Alignment with Dynamic Clip Modeling for Partially Relevant Video Retrieval.- Content-Function Coupling Based Recommendation Mechanism for Holographic Communication.- Intelligent Question and Answer System for Policies Based on Graph Database.- Research Progress and Frontier Applications of Graph Neural Networks.- Cross-Consistent Dual-ConvMixer Network with Feature Alignment for Salivary Gland Tumor Ultrasound Image Segmentation.- Domain-Constrained BVAE-Based Method for Intelligent Plastic Formulation Design.- HDRS: Transmission, Computing and Caching Resource Scheduling for Holographic-Type Communication Based on In-Network Computing.- Interleaved Spatial-Temporal Attention Aggregation Gated Transformer for Traffic Flow Prediction.- Color Image Steganography Based on a GAM-CBAM Dual Attention Mechanism.- TIP: A multidimensional Feature Extraction Method for Extreme Financial Risk by Fusing Information Value Evaluation.- MLAF-G: A Lightweight Multilevel Feature Fusion Classification Network for Plant Diseases Based on Ghostnet.- Unsupervised Cluster-Generation Graph Learning for Industrial Equipment Anomaly Detection.- Research on Precision Prediction of Geospatial Choices for Postgraduate Graduation Destinations Based on Machine Learning Algorithms.- A Deep Forgery Detection Method Based on Adaptive Features in Both Spatial Domain and Frequency Domain.- Dual-PhysNet: A Physics-Guided Dual-Path Lightweight Network for Underwater Image Superresolution Reconstruction.- Cyberspace Security Technology.- Load-Balancing Routing Optimization in SDN: A QoS-Aware Approach with Improved Shortest Path and Adaptive Resource Allocation.- Source Code Vulnerability Detection Method Based on Hybrid Retrieval-Augmented Generation Technology.- Intrinsic Security of Artificial Intelligence: System Vulnerabilities, Defense Mechanisms, and Theoretical Deepening.- Research on Efficient Cross-Domain Authentication Scheme Based on Blockchain and Edge Computing.- Data Science and Big Data Technology.- CHAKE: A Lightweight Chameleon Hash Based Authenticated Key Exchange for IoT.- An Online Time Series Decomposition Algorithm with a Multiplicative Trend-Seasonality Relationship in an Additive Model.- Frontier Technology Applications.- Research on Convolutional Neural Network Implementation Methods for Embedded Systems.- Research on the Social Attributes of Power Grid Residents with the 3 M-CNN-SC-SRU Customer Profiling the 3 M-CNN-SC-SRU Model for Customer Profiling from Electricity Consumption Data.- Identification of Parkinson's Disease Subtypes via a Multimodal Data Fusion Method.- Anomaly Prediction in Power Data Platforms Using a Transformer-BiLSTM Model.



