- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The eight volume set, LNCS 16381-16388 constitutes the refereed proceedings of the 25th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2025, held in Zhengzhou, China, during October 30 -November 2, 2025.
The 158 full papers, 104 research papers and 48 session papers included in these proceedings were carefully reviewed and selected from 543 submissions. They focus on the following topical sections:
Part I : Parallel and Distributed Architectures; Software Systems and Programming Models.
Part II : Parallel and Distributed Algorithms and Applications.
Part III : Parallel and Distributed Algorithms and Applications; Internet of Things and Cyber-Physical-Social Computing; Performance Modeling and Evaluation.
Part IV : Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms.
Part V: Network Architectures and Algorithms.
Part VI: Parallel and Distributed Architectures; Software Systems and Programming Models; Parallel and Distributed Algorithms and Applications; Big Data Management and Analysis; Performance Modeling and Evaluation.
Part VII: Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms; Internet of Things and Cyber-Physical-Social Computing.
Part VIII: Intelligent Distributed Computing; Resource Coordination and Joint Optimization in Cloud-Edge-End Systems; Symbiotic AI and Data Ecosystems; Smart Education Powered by Parallel and Distributed Processing; AI for Networks and Networking for AI; Emerging Network Technologies in Computing and Networking Convergence.
Contents
.- Service Dependability and Security in Distributed and Parallel Systems.
.- M2C: A Blockchain-Based Certificate Batching Architecture for Software-Defined Networks.
.- PacketMorph: Generation of Recoverable Adversarial Packets against Encrypted Traffic Classification via Class-wise Universal Perturbation.
.- DecFLLM: A Privacy-Preserving Fine-Tuning Framework for Federated Large Language Models via Adapter Decomposition.
.- Reinforcement Learning-Based Autonomous Collision Avoidance for Ships in Realistic Physical Environments.
.- IDSF: A Cross-Domain Data Trustworthy Sharing Framework for Large-Scale IIoT with Integrated DID and Enhanced PBFT Algorithm.
.- Are Relay Chains Practically Deployable? Trusted Behavior Dynamics via Evolutionary Games.
.- Multi-Task Learning for HDD Failure Prediction in Heterogeneous Storage Systems.
.- A Dual Personalized Clustering-Based Defense Against Composite Poisoning Attacks in Federated Learning.
.- Index-Free Searchable Symmetric Encryption for Full-Text Substring Search.
.- A Weakly Centralized Hierarchical Sensitive Data Sharing Scheme Based on Edge Computing.
.- A Lightweight E-Health Data Access Control Scheme in Fog Computing.
.- Hawk: Saturation Attack Detection Based on Structured Spatial Interactions and Temporal Dependencies-Guided Graph Learning in SDN.
.- RoboClarify: Clarifying Ambiguous Instructions Through Scenario-Guided Risk Assessment for Home Embodied Agents.
.- Pistis: Enabling Secure Interoperability Across Unobservable Permissioned Blockchains.
.- HBCA: Healthcare-Oriented Blockchain-Assisted Cross-Domain Authentication.
.- HeRF-AD: Robust Anomaly Detection for Software Systems via Heterogeneous Representation Fusion.
.- Defending Backdoor Attacks in Visual Pre-Trained Models with Group L1/2 Regularization and Knowledge Distillation.
.- LIME-Enhanced Insider Threat Detection for Distributed Security Systems.
.- Graph Representation Learning via Generative-Contrastive Fusion for Advanced Persistent Threat Detection.
.- zkGCN: Zero-Knowledge Based Verifiable Inference for Graph Convolutional Networks.
.- A GAN-Integrated Framework for Fileless Attack Provenance.
.- EPOMTA: Efficient and Privacy-preserving online Multi-Task Allocation in Mobile Crowdsourcing.
.- Multiscale Deep Neural Network Intrusion Detection Model Based on Denoising Feature Selection with EQLv2.
.- TriDA: Triangular Fuzzy Double Auction for Efficient and Accurate Task-Worker Matching in Blockchain-Based Crowdsourcing.
.- An Anonymous, Certificateless, and Multi-Receiver Aggregate Signcryption Scheme without Secure Channel in VANETs.
.- Network Architectures and Algorithms.
.- Ditto: A Flexible Transmission Control Mechanism for Diverse User Demands and Network Conditions.
.- Decentralized Multi-UAV Trajectory Optimization for Cooperation in Wireless Charging Networks.
.- Mitigating Hash Polarization with Flow-Level Load Balancing in Leaf-Spine Data Center Network.
.- QoS-Aware Hybrid Routing for LEO Satellite Networks: Dynamic Path Allocation and Partitioning-Based Optimization.
.- Hybrid Swarm Intelligence-Based Path Planning for Mobile Nodes in DTN over Complex Terrains.
.- 6RLD: A Seedless Region Active IPv6 Address Dynamic Detection Method Based on Large Language Model and RAG Technology.
.- DFNets: An Indoor Localization Model Based on Fresnel Clustering Fusion.



