default search action
GAIIS 2025: Hangzhou, China
- Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information Security, GAIIS 2025, Hangzhou, China, February 21-23, 2025. ACM 2025, ISBN 979-8-4007-1345-3
Chapter 1 - Generative AI and Advanced Machine Learning Applications
- Siyuan Zhang, Wenjun Zhou
, Yifan Wang
, Quan Zhang, Bo Peng:
MIFNetwork: Multi-scale Information Fusion Network for Long Traffic Prediction. 1-6 - Hao Li
, Jiahui Zhao
, Daixuan Gu
:
HoloDiT: Exploring 3D Diffusion Transformer Models Using 2D Images. 7-11 - Kai Yang
, Huaifeng Shi
, Rui Wang
, Lei Zhou
, Jiahui Peng
, Chaofan Liu
:
Trend Decomposition Enhanced Large Language Model for Non-Stationary Network Traffic Prediction. 12-19 - Yawen Wang
, Yuanyuan Jin
:
Knowledge-Enhanced Event Prediction of Carrier-Based Aircraft Emergencies. 20-25 - Fukang Tang
, Changhua Liu
:
AES encryption scheme based on Cubic chaotic mapping optimization. 26-30 - Xuening Ma
, Xin Chen
, Chunhong Yuan
:
Crossroads of AI and Tourism: Enhancing Destination Management and Traveler Engagement. 31-36 - Penggang Guo
, Yunfan Liu
, Longfei Li
, Changyuan Liu
:
Improved Semantic Segmentation of Urban Road Scenes with Deep Dual-Resolution Network. 37-42 - Letian Wei
, Zhiman Zhang
, Junhua Zheng
:
Privacy distillation: Collaborative privacy protection for Transformer. 43-49 - Xiaoyu Wang
, Weidong Zhao
, Liqing Qiu
:
Building Specialized Adversarial Examples for Improved Spelling Error Correction. 50-57 - Tingting Liu
, Rongbin Li
, Jun Yin
:
Color image authentication and encryption algorithm based on dual random phase encoding and dual chaotic system. 58-65 - Heng Fang
:
ColKGC: Collaborative Enhancement using Large Language Model for Knowledge Graph Completion. 66-71 - Zhongxia Lei
, Caixia Zhang
, Junzhen Gui
:
Applications and Comprehensive Evaluation of Commodity Reconstruction based on NeRF. 72-79 - Xiaomeng Liu
, Jia Liu
, Jiayuan Li
, Yong Zhou
, Shengchang Xiang
:
Research on the Application of LLM in Institutional Compliance and Early Warning. 80-86 - Jingyuan Yi
, Zeqiu Xu
, Tianyi Huang
, Peiyang Yu
:
Challenges and Innovations in LLM-Powered Fake News Detection: A Synthesis of Approaches and Future Directions. 87-93 - Zijian Han
, Changbo Hou
:
Multimodal Knowledge Graph Inference Method Based on Cross-Attention Mechanism. 94-100 - Qianwen Shen
, Zeyu Ma
, Mingang Chen
:
From Chart to QA Pairs: A Context-Aware Generation Framework for Chart-Containing Documents. 101-107 - Xiaofeng Zhang
, Xianming Gao
, Peilin Tao
, Tao Feng
:
GraphSynth: Synthesis of Network Configuration Templates Using Large Language Models. 108-114 - Benchang Dong
, Zhili Chen
:
PPQformer: Privacy-Preserving Quantized Transformer for Efficient and Secure Inference. 115-119 - Hui-Wen Huang
, Dong-Meau Chang
, Andrew Sankey
:
Exploring EEG-based Attention Levels in Human-AI Interactions: A Case Study. 120-124 - Lin Fu
:
A Method for Discovering Ancient Chinese Neologisms Based on the Combination of Information Entropy - Mutual Information and BI-LSTM-CRF Model. 125-131 - Rui Yang
, Hongqian Chen
, Yu Gao
, Yuting Ge
:
EAM_DiffusionSeg: Research on Instance Segmentation Methods Based on Enhanced Aggregation Masks and Diffusion Models. 132-136 - Fengdi Li
:
MH-PEFT: Mitigating Hallucinations in Large Vision-Language Models through the PEFT Method. 137-142 - Qiaozhi Bao
, Yanlin Chen
, Xusheng Ji
:
Research on evolution and early warning model of network public opinion based on online Latent Dirichlet distribution model and BP neural network. 143-151 - Yujun Jin
, Tao Luo
:
DPRS: Distributional Perspective Modeling for LLM-Enhanced Recommendation Systems. 152-156 - Tonghui Yang
, Yamei Xu
:
Super-resolution Reconstruction of Remote Sensing Images with Improved SwinIR Transformer. 157-162 - Lei Feng
, Jiong Yu
, Shu Li
, Shicheng Jiu
:
VAE-SMOTE Augmented Diffusion for Anomaly Detection. 163-170 - Botao Xiong
:
Audio-driven Talking-face Synthesis based on 3D Gaussian. 171-177 - Yuanhao Li
, Huilin Zhao
, Jiayu Lin
, Zijun Zhou, Yuanchao Zhang
:
Research on Personalized Insurance Intelligent Customer Service Dialogue Generation Based on Large Language Models. 178-183 - Qinhui Sun
, Bin Gao
:
Emotion-enhanced Cross-modal Contrastive Learning for Fake News Detection. 184-189 - Minxi Rong
, Qi Sun
, Xiaoli Guo
, Guipeng Zhang
, Huijing Qi
, Fuyang Hu
:
Imbalanced Graph Classification based on Graph-of-Graph Neural Networks and Augmented Graph Generator. 190-195 - Keyu Wu
, Jingyi Fu
, Wenfang Zhang
:
Aspect-based Capsule Neural Networks for Sentiment Analysis of Sensitive Information. 196-201 - Weiyi Xia
, Yinggang Zhang
, Ben Zhao
, Wei Liu
, Linjie Han
, Qifu Ye
:
Intelligent PLC Code Generation in HCPS 2.0: A Multi-dimensional Taxonomy and Evolutionary Framework. 202-212 - Shuaicheng Li
:
EEG Emotion Recognition Based on TQWT-features and Multiscale Convolution Superimposed Transformer. 213-218 - Yuzhu Xiong
, Hongwei Du
, Daikun Zhang
:
A Guided-learning Network for Brain Tumor Segmentation with Missing Modalities. 219-225 - Bingchen Dong
, Gengshen Wu
:
A Swin Transformer-Based Cold Diffusion Model for Accelerated MRI Reconstruction. 226-230 - Yong Fang
:
Wasserstein GAN-Based Android Certificate Validation Vulnerability Detection Framework. 231-236 - Yuze Ding
, Shibin Zhang
:
Dynamic Semantic-Constrained Adversarial Training and Defensing: A Reinforcement Learning Framework for LLM-Generated Fake Information Detection. 237-241 - Bin Zhang
, Liangshun Wu
, Jiang Rong
, Shixin Huang
, Yuwen Li
, Meizhen Luo
:
Synergistic Optimization Mechanism of Brain-Inspired Intelligence and Generative Models in Small Target Detection. 242-246
Chapter 2 - Data Analysis, Privacy, and Security in AI
- Wei Zhao
, Shaolong Han
, Xiang Wang
:
Based on visual model and LSTM cyclic convolutional neural network Automatic recognition method for instrument readings. 247-250 - Weidong Zhao
, Xuan Jiang, Liqing Qiu
:
WWR-CS: Chinese Spelling Error Correction Based on Whole Words Replacement fusing Confusion Set. 251-257 - Sihan Liu
:
VideoDreamBooth: Subject-Driven Video Editing with Guided Multi-Path Fusion. 258-265 - Nan Jiang
, Chenyu Liu
, Shaofei Yu
:
Research on Deep Data Annotation Methods Based on Expertise in the Power Industry. 266-271 - Ze Yu
, Quanqiang Miao
:
Cybersecurity Survivability Testing Technology Based on ATT&CK and D3FEND. 272-277 - Hongjuan Wang
, Nan Wang
, Xinjun An
:
CAM-YOLO v8: A model for water meter word wheel region segmentation. 278-283 - Quan Liu
, Yunkui Song
:
Optimization of Price Strategy by Machine Learning in E-commerce. 284-288 - Anxin Zhang
:
DyLF: Introducing Longformer for More Efficient Dynamic Graph Learning. 289-294 - Rongfu Wang
, Peibin Huang
:
Application and Design of Wi-Fi Ad Hoc Network Technology in Intelligent Agricultural Ecosystem. 295-301 - Xiaoyan Hu
:
Application of Grey BP Neural Network in Predicting the Number of Employees in the Cultural and Sports Industry of Yunnan Province. 302-306 - Jianbing Ye
, Chaowen Lin
, Qi Li
:
Line Detection Based on Hough Transform and its Application. 307-311 - Jiamin Zheng
, Shijia Peng
, Yipeng Zhou
, Shaoyi Song
, Xuan Zhao
:
Secure Sharing and Protection of Agricultural Data Based on Federated Learning. 312-319 - Jiamin Zheng
, Qilin Zhang
, Shaoyi Song
, Xuan Zhao
, Yipeng Zhou
:
Research on Deep Prediction of Agricultural Product Quality Based on Multi Model Fusion: A Case Study of Eel. 320-325 - Jiamin Zheng
, Yunuo Song
, Shaoyi Song
, Xuan Zhao
, Yipeng Zhou
:
Prediction based on multi - model agricultural assistance recommendation algorithms. 326-331 - Minghai Sun
, Yufan Cheng
:
Research and application of K-means clustering based on the color characteristics of woodblock prints of Zhuxianzhen. 332-336 - Chengyu Liu
, Jing Liu
:
Research on Load Monitoring and Regulation of Human Movement Training Assisted by Intelligent Algorithms. 337-341 - Zhenyang Lin
:
Metal Level Measurement and Compensation Based on the MiDas Model. 342-346 - Chan Li
, Wenjing Guo
, Jikai Qin
:
Backward automatic screening feature selection algorithm based on multi-evaluation criterion fusion. 347-353 - Jingsi Wang
, Xiaobin Li
, Pengyu Zhu
, Zhuoyi Chen
:
Identification of personnel identity in unmanned aerial vehicle video gait recognition based on 3Dresidual network. 354-358 - Qiaoxin Wang
, Shouguo Zheng
, Mengqing Qiu
, Dan Hu
:
Detection of pesticide residues by sensor arrays fused from SERS spectra of various substrates combined with deep learning. 359-366 - Wang Li
:
Improvements to the Apriori Algorithm and Its Application in Educational Decision-Making Systems. 367-373 - Dan Hu
, Shouguo Zheng
:
Estimation of Soluble Solids Content for Dangshan Pear using Hyperspectral Image Reconstruction Based on Deep Learning. 374-381 - Jihao Tian
, Yan Wei
:
Sleep Spindle Auto Detection Based on U-Net with Label Optimization Module. 382-391 - Zhiyu Huang
, Zhen Wu
:
Malicious Traffic Identification Based on Composite Sampling. 392-398 - Liangjie Wang
, Zhongyong Wang
, Huipeng Zhai
, Po Hu
, Wei Wang
:
Spectrum anomaly detection and defense algorithm based on attention mechanism residual neural network. 399-404 - Feng Zhang
, Haonan Xu
, Shuai Yuan
:
Unsupervised Homography Estimation Method Based on Edge Detection and Feature Fusion. 405-410 - Jiahui Zhao
, Hao Li
, Suqin Tang
:
A Hybrid Framework for Predicting Citation Harm from Retracted Papers. 411-416 - Yu Cao
, Xuehui Du
, Lulu Zhang
, Shihao Wang
:
An Efficient Zero-Knowledge Range Proof Scheme Based on Multibit Split Square Decomposition. 417-426 - Hongxu Lan
:
Comparing the accuracy and efficiency of a single machine learning agent with multiple coordinating agents in a chat environment. 427-434 - Jian Chen
, Lei Wang
, Jun Jiang
, Ruitong Liu
, Heng Ji
, Yuntao Zhao
:
A Knowledge Reasoning Modeling for security vulnerability databases based on Gaussian-SVM hybrid clustering. 435-439 - Jian Chen
, Guangao Li
, Jun Wang
, Siluo Sun
, Shoudao Sun
, Yuntao Zhao
:
CBAM-EANet: Convolutional Block Attention Module Enhanced Efficient Network for Detection on Distributed Denial of Service Attacks. 440-446 - Chenglin Zhou
, Cheng Huang
, Xiangyu Luo
:
Synthesis of Real-time Linear Dynamic Logic over Finite Traces. 447-452 - Fuyue Sun
:
The Fan Anomaly Detection Method Based on an Improved CBAM Attention Mechanism with MobileNetV3. 453-458 - Mengxue Zuo
:
Infringement and Protection in Personal Information on Data Mining. 459-465 - Xin Wang
, Zhizhen Ma
, Lu Zhang
:
Research on Privacy Protection Evaluation System Based on the Internet Connectivity Characteristics of Intelligent Vehicles. 466-472 - Chengjiang Wen
, Yang Yue
, Zhixiang Wang
:
The Application of Membership Inference in Privacy Auditing of Large Language Models Based on Fine-Tuning Method. 473-479 - Yang Liu
, Guanghu Jin
, Jinji Zhang
, Xiyue Xue
:
Green quality perception of urban streets: a study combining semantic segmentation and multimodal noise enhancement techniques. 480-485 - Xing Wan
, Juliana Johari
, Fazlina Ahmat Ruslan
:
Transformed Variational Color Shift Algorithm for Interfering Text Image Recognition. 486-490 - Zheng Zhang
, Jiewen Xia
, Yang Yu
:
Fully distributed scaled consensus tracking of high-order unknown nonlinear multi-agent systems. 491-497 - Xiongfei Yao
:
Demand Forecasting for Cross-border Retail Commodities in the New Retail Era: A Hybrid Model Integrating Temporal Granularity and Categorical Dynamics. 498-504
Chapter 3 - Innovative AI Techniques and their Applications
- Zheng Wang
, Xuezeng Jia
, Liya Liu
:
Analysis of occupant escape from indoor building fire based on optimized cellular automaton model. 505-508 - Hongfu Chen
, Minghui Jin
, Feng Gao
, Yujia Zhai
:
Research and Implementation of Access Control Strategy Based on Apriori and Collaborative Filtering Techniques. 509-514 - Ze Han
, Yu Su
, Qi Mo
, Xinyu Nie
:
Neural Network Student Cognitive Diagnosis Model Based on Multi-Relational Graph. 515-521 - Guofeng Wan
:
Research and Application of Generalized Predictive Control Algorithm in ATO System. 522-525 - Siqi Chen
, Wenzhen Zhang
, Xinye Chen
, Yuchao Ji
, Xinyu Liu
, Fan Yu
, Huazhen Xu
:
Plant disease detection technology based on hybrid convolutional attention mechanism. 526-531 - Jie Wang
, Xinyu Tong
, Xiaoya Ma
, Mengying Kong
, Haifei Zhang
, Hailei Yuan
:
A recommendation algorithm model based on the fusion of group behavior and temporal feature. 532-537 - Wei Li
, Kangwei Zhang
, Penglin Li
, Keyang Yan
:
DAT-YOLO: Small Object Detection Model from the Perspective of Drones. 538-545 - Minghua Zhu
:
Solving Class Imbalance in Medical Image Classification Based on Federated Learning. 546-550 - Jiangchuan Gong
, Yang Wang
:
Research on Distributed Training Architecture for Large Scale Models for Natural Language Processing. 551-556 - Xinyu Cai
, Wenbo Dai
, Jingyu Lu
:
Loan Default Prediction Based on Machine Learning Approaches. 557-564 - Shani Liu
, Shan Wang
, He Zhao
:
Realization and Experimental Research on Immersive Visual Communication System Based on Real-Time Rendering. 565-569 - Yiqi Zhu
:
Multi-label classification of medical images based on feature fusion. 570-576 - Qifei Zhu
, Jiangang Tang
, Haoshun Cao
:
An Improved LSTM Crime Prediction Model Based on Environmental Factors. 577-584 - Haocheng Song
, Pengfei Yu
, Jiayi Ou
, Wei Li
, Jingjing Gu
:
A Convolutional Neural Network Reinforcement Framework Based on Neural Network Interpretability. 585-590 - Qifei Zhu
, Jiangang Tang
, Haoshun Cao
:
An Internet Public Opinion Monitoring Model Based on Stacked Ensemble Learning. 591-597 - Mingyang Li
, Pengpeng Li
, Rui Wang
, Weihua Mou
:
Residual Neural Network with Attention Mechanism for Direction-of-Arrival Estimation in Low SNR. 598-604 - Xunlin Chen
, Xiaoju Li
, Ziyong Chen
:
Research on Weed Identification Based on Deep Learning. 605-609 - Litao Cai
, Mingmei Liu
, Youbing Feng
, Feng Xiong
:
Research on fall detection algorithm based on improved YOLOv8. 610-615 - Shiqing Liu
:
MGF-GNN: A Multi-Granularity Graph Fusion-based Graph Neural Network Method for Network Intrusion Detection. 616-620 - Chunyang Wu
:
Pneumonia Detection and Classification Using Lightweight ShuffleNetV2 Based on Transfer Learning. 621-625 - Chenming Yang
:
Three-Dimensional Path Planning for Unmanned Aerial Vehicles Based on a Hybrid Strategy of Dung Beetle Optimization Algorithm and Grey Wolf Optimization Algorithm. 626-631 - Ziye Zhou
, Yanbin Guo
, Xin Tang
, Kehan Li
, Heng You
:
Dynamic Decision Correction Framework Integrating Path Optimization and Incomplete Information Handling. 632-642 - Shulei Li
, Bo Meng
, Dejun Wang
:
Event Extraction Methods for Government Hotline Domains. 643-647 - Qiuyang Wang
, Sixi Chen
, Yening Chen
, Hong Yan
, Jianwei Li
:
Research on Deep Learning Models for Dehazing Wildfire Images. 648-653 - Xintao Xu
:
Exploration of Multi-modal Translation Resource Processing Modes under Computer Graphics: A Case Study of Visionbank. 654-658 - Yang Li, Chi Chen, Yong Li:
Pos-PCFG: A Password Guessing Method Incorporating Character Positions. 659-666 - Lei Luo
, Hualin Zhan
, Weinan Jiang
, Ziqian Zhang
:
Enhanced Session-Based Recommendation with Global Context and Dynamic Memory. 667-672 - Chengxuan Li
, Wei Yang
, Chang Sun
:
UVD-ATrack: UAV-based Vehicle Detection and Adaptive Tracking. 673-679 - Wangfeng Yang
, Zhongyang Li
:
Research on the Development and Application of Digital Twin Technology in the Field of Aircraft Maintenance and Support. 680-684 - Yufeng Yuan
, Peng Han
, Jian Qiu
, Dongmei Liu
, Li Peng
, Miao Chen
, Kaiqing Luo
:
SLP-SLAM: A Multifeature Fusion Stereo SLAM Based on Structural Lines and Structural Planes. 685-690 - Hao Lv
:
Aircraft Detection Based on Improved DETR. 691-697
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.