Cloud and Network Computing: Second International Conference, ICCNC 2025, Fuzhou, China, June 20–22, 2025, Proceedings

Author:   Limei Lin ,  Chia-Wei Lee
Publisher:   Springer
Volume:   2539
ISBN:  

9789819501281


Pages:   430
Publication Date:   18 September 2025
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $263.97 Quantity:  
Pre-Order

Share |

Cloud and Network Computing: Second International Conference, ICCNC 2025, Fuzhou, China, June 20–22, 2025, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20–22, 2025. The 31 full papers presented in this volume were carefully reviewed and selected from 88 submissions.  They are grouped into the following topics: Cloud & Edge Computing; Network Computing; Big Data Analysis and Artificial Intelligence; Security & Privacy.

Full Product Details

Author:   Limei Lin ,  Chia-Wei Lee
Publisher:   Springer
Imprint:   Springer
Volume:   2539
ISBN:  

9789819501281


ISBN 10:   9819501288
Pages:   430
Publication Date:   18 September 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Cloud & Edge Computing. .- FPGA-Based Real-Time FIR Filter for Digital Audio Processing. .- SCDFL:A Secure and Byzantine-Resilient Decentralized Federated Learning Framework. .- Multicast Communication in All-Optical Fat-Tree Networks. .- A Multi-Omics Cancer Subtype Clustering Method Based on Convolutional Autoencoder and Prototype Alignment. .- Contract-Theory-Based Incentive Mechanism for Social Welfare Maximization in Streaming Content Caching Systems. .- Multimodal Data Fusion for Intelligent Assessment and Dynamic Forecasting in Agricultural Logistics Systems. .- The Optimization Problem of Delivery Platforms. .- Network Computing. .- Fault Tolerance Analysis of Half Hypercube Networks Under the 1-Extra R-Component Pattern. .- Efficient Cross-Layer Coordinated Buffer Management in Datacenter Networks. .- Reliability Analysis of Folded Hypercube-Like Networks. .- Hybrid Gravity-Based Centrality Scheme for High-Resolution Influencer Detection in Complex Networks. .- The Approximate Concept of Variable Precision Rough Set on Concept Lattice. .- LLM-RLFuzz: An intelligent Fuzzing Framework for IoT Protocol. .- Three-Round Adaptive Local Diagnosis for Digraph Under MM Model. .- PSO-Optimized Anchor Weighting for NLOS-Resilient UWB Localization in Multipath Indoor Environment. .- Big Data Analysis and Artificial Intelligence. .- Contrastive Learning for Fault Diagnosis Enhanced by System-Level Graph Representation. .- High-Dimensional Time Series Anomaly Detection Method Based on Multimodal Hypergraph Generative Adversarial Networks. .- Adaptive Genetic K-Means Clustering With Principal Component Analysis and Neural Network-Driven Elite Selection. .- Concept-Aware Deep Representation Learning for Co-Evolving Sequences. .- Normalized Cut and Subgraph-Aware Multi-Head Attention Based Node-Level Anomaly Detection. .- Graph Anomaly Detection Based on Dynamic Hypergraph Neural Network. .- AMSVGAE-Based Causal Inference for Interpretable Graph Neural Networks. .- Distributed Resource Management Mechanism Based on Deep Reinforcement Learning. .- Security & Privacy. .- An Adversarial Attack Method Based on Local Masking and Multi-Stage Momentum Optimization. .- Anomaly Detection Method of Source Code Vulnerability Detection Tools Based on Differential Testing. .- The Fractional Features of Separated Fuzzy Sets and Its Intelligent Acquisition. .- NLP-Based Detecting Privacy Policy and Behavior Inconsistencies in Android Apps. .- DOL: A Dual Ownership License for Deep Neural Networks. .- Android App Privacy Risk Assessment: Combining Policy Analysis and Behavioral Monitoring. .- Improvement of Provable Data Possession Scheme. .- Privacy-Preserving Scheme in Social Networks With Differential Privacy.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List