default search action
11th CBD 2023: Danzhou, China
- Eleventh International Conference on Advanced Cloud and Big Data, CBD 2023, Danzhou, China, December 18-19, 2023. IEEE 2023, ISBN 979-8-3503-5337-2
- Yikai Xu, Mingkai Chen, Zhe Zhang:
Cloud-Edge Collaboration via Preference-based Reinforcement Learning in Semantic Communications. 1-6 - Mingyue Shao, Hanjiang Luo, Rukhsana Ruby, Pengyan Dong, Hang Tao:
Cooperative and Dynamic UAV-Based Mobile Sink Deployment using Deep Reinforcement Learning. 7-12 - Wei Li, Miao Li, Yuezhao Liu, Jiong Liu, Lanlan Cui:
Learning-Based Collaborative Service Placement for AI-oriented Mobile Edge Computing. 13-18 - Wenyan Zhang, Hongzhi Cui:
Offloading Dependency Mobile Tasks to Computing Power Network. 19-26 - Ao Sun, Feng Yang, Wenjun Wu, Tengda Wang, Yang Sun:
Deep Reinforcement Learning-Based Load Balancing Algorithm for Sliced Ultra-Dense Network. 27-32 - Xiaochang Liu, Bei Dong, Fei Hao:
Efficient Cloud Cluster Resource Scheduling with Deep Reinforcement Learning. 33-38 - Kai Guo, Hanjiang Luo, Hang Tao, Rukhsana Ruby, Zhizun Qin, Kui Liu:
Multi-UAVs Collaborative Search Scheme in Marine Environments using Deep Reinforcement Learning. 39-44 - Zhiyi Huang, Zebin Wu, Junlong Zhou, Jin Sun:
Power and Latency Collaborative Optimizations of Object Detection CNN on Edge Devices Under Limited Energy Budget. 45-50 - Ben Xu, Jiacheng Sun, Yunzhe Wang, Qiming Fu, You Lu:
An Intelligent Action Decision Algorithm for Exoskeleton in Edge Networks Environment based on Deep Reinforcement Learning. 51-56 - Xiaolin Yang, Hao Zhang, Kai Yang, Yifei Lu:
Network Anomaly Flow Detection Framework Based on Collaborative Cloud-edge in the Smart Grid Network. 57-62 - Xiaosha Qi, Zesheng Hu, Genlin Ji:
Retraining Generative Adversarial Autoencoder for Video Anomaly Detection. 63-68 - Yan Wang, Feng Shu, Xuemei Lei, Xuehui Wang, Rongen Dong, Qiankun Cheng:
A Lightweight RFID Security Authentication Protocol for Smart Medical Systems. 69-74 - Chang Guo, Xiujun Wang, Xiao Zheng, Xun Shao, Lei Mo, Gaoming Yang:
A Fast Recommendation Algorithm for Data Streams Based on Differential Privacy. 75-79 - Shusheng Ge, Shuming Xiong, Pengchao Chen, Qingqing Xie:
A Blockchain-Based Searchable Encryption Scheme for Efficient Data Sharing. 80-85 - Jianquan Cai, Fei Chen, Tao Xiang:
Cloud Storage Auditing: From One Cloud to Dual, and More. 86-91 - Shuming Xiong, Pengchao Chen, Shusheng Ge:
SEM-DT: A Secure and Efficient One-to-Many Data Trading Scheme Based on Blockchain. 92-97 - Bingfeng Xu, Bo Wang, Xinkai Chen, Jincheng Zhao, Gaofeng He:
A CGAN-based Few-shot Method for Zero-day Attack Detection in the Internet of Vehicles. 98-103 - Wei Liu, Chencheng Xie, Shijie Zong:
A rumor source identification method based on node embeddings and community detection in social networks. 104-109 - Rixin Xu, Qing Li, Wenqiang Cao, Jingbo Yan, Youqi Li:
An Adaptive Differential Private Federated Learning in Secure IoT. 110-115 - Jingang Wang, Tianyi He, Gaofeng He, Haiting Zhu, Bingfeng Xu, Lu Zhang:
Cooperative Detection of Camouflaged Malicious TLS Traffic. 116-121 - Weixin Han, Wenhao Ying, Wenjun Hu, Zhongqiang Sun:
Time series anomaly detection based on TimeGAN and LSTM neural network. 122-127 - Lin Shiming, Ma Feiyan, Zhao Lijuan, Changjun Song:
A study on a Multi-Model Fusion Framework for Automatic Website Classification and Recognition. 128-133 - Zhiyun Zheng, Qilong Yuan, Huaizhu Zhang, Yizhou Wang, Junfeng Wang:
Lightweight Multi-Scale Spatiotemporal Graph Convolutional Network for Skeleton-Based Action Recognition. 134-139 - Zhigeng Han, Ting Zhou, Geng Chen, Yuanzhe Fan:
A Multi-feature Fusion Based Rating Prediction Model by Considering Timeliness of Reviews and Influence of Trusted Neighbor Ratings. 140-145 - Na Song, Shundong Yang, Zhiling Cai, Jian Lin, Sujia Huang:
Multi-level Learning for Semi-supervised Multi-view Classification. 146-151 - Bingchan Li, Bo Mao:
Real Time Dust Detection with Image Pyramid and Improved ResNeSt. 152-155 - Di Wang, Kun Huang, Qiang Chen:
Progressive Neural Networks for Continuous Classification of Retinal Optical Coherence Tomography Images. 156-161 - Kangrui Ye, Yuan Gao, Xiaoxiao Ye, Ansheng Ye:
DC-YOLO: Improved YOLOv7 Based on Deformable Convolution and Attention Mechanism for Fabric Defect Detection. 162-167 - Pingyuan Ge, Weihao Guo, Yuqing Zhang:
From Homoglyphs to Enhancedhomoglyphs: Enhancing NLP Backdoor Strategies through Character Substitution. 168-173 - Feng Liu, Caiquan Xiong:
A Generative Text Summarization Method Based on mT5 and Large Language Models. 174-179 - Wenqiang Cao, Qing Li, Siying Zhang, Rixin Xu, Youqi Li:
STEP: Generating Semantic Text Embeddings with Prompt. 180-185 - Qinkai Yang, Chao Tan, Junzhao Hao, Genlin Ji:
Label Distribution-based Open-world Semi-supervised Learning. 186-191 - Yue Yao, Qian Gao, Guoqiang Zhang, Yi Yin, Lingling Shen, Xiaojun Qian:
Improving 360-degree Video Streaming with Adaptive Path Scheduling. 192-199 - Xinyang Shen, Zhen Wu, Jingya Zhou, Yujian Zhu, Weiqing Xu:
Rich Information Driven Popularity Prediction on Weibo. 200-205 - Cong Wang, Mingmin Zuo, Shuai Liu, Di Li:
Research on Persistent Advantage Learning Based Deep Q Network for Computational Offloading in Edge Computing. 206-210 - Shixuan Chen, Bin Zhao, Genlin Ji:
A Temporal Sequence Framework based on Self-Attention for Student Dropout Prediction in MOOCs. 211-216 - Yue Wang, Xingyu Yan, Bohan Li, Shuai Xu:
Measuring the Variation of Function Invocation for Cold Start Optimization in Serverless Environments. 217-222 - Zefan Yu, Runqun Xiong, Fang Dong, Zhiang Wu:
High-efficient Joinable Tables Discovery in Data Lakes: A Grey Relational Model-based Approach. 223-228 - Caishan Weng, Xinyang Li, Jinghui Zhang, Hang Yu:
HPopt: A Hybrid Parallel Optimization Scheduling Approach for Distributed DNN Training. 229-234 - Jian Cao, Jiuxin Cao:
A Novel Schema for Sensitivity Prediction of Unknown Nodes in the Knowledge Graph. 235-240 - Qiang Wu, Qing He:
Knowledge Graph Embedding Based Graph Convolutional Network for Link Prediction. 241-246 - Shen Liu, Zhiyong Yu, Fangwan Huang:
Uneven Hybrid Clickstream Generation Based on Multi-Layer Perceptron. 247-254 - Yang Sun, Yu Xiang, Ziyuan Wang, Zheng Liu:
Better Data Distillation by Condensing the Interpolated Graphs. 255-260 - Xiaoxin Bai, LuLi LuLi, Hanqian Wu:
A Constructive Method Based on Dynamic Solution Space for Travelling Salesman Problem. 261-266 - Biaokai Zhu, Yangyang Zhang, Lu Li, Yuhong He, Yiting Song, Xiafei Li, Ruiting Yin, Jie Song, Ping Li, Sanman Liu, Jumin Zhao:
A-FAR: Research on Anti-obscuring Face Recognition Based on Improved FaceNet Model. 267-272 - Yidan Xu, Ning Wang, Jiaqi Wu, Shuai Xu, Bohan Li:
Attribute Enhanced Graph Attention Networks for Session-based Recommendation. 273-278 - Zhiyuan Yu, Yuxiang Wang, Xiaoliang Xu, Xiaoxuan Gou:
End-to-End Community Search based on Graph Transformer: A Demonstration. 279-284 - YuChun Gou, XueTao Jiang, Zezheng Liu, Gongpo Gyamyang, Rui Zhou, Qingguo Zhou, Deke Guo:
Optimization on Architecture of Time-Sensitive Software-Defined Network. 285-290 - Yufeng Chen, Ping Jiang, Yida Qu, Mengqi Wu, Lu Luo, Ming Yang, Wenqian Lu:
Point-Multipoint Communication Scheduling in Industrial Internet: A Quick Survey. 291-296 - Guangtong Li, Mengyang Liu, Ye Wan, Fang Dong:
SpringNet: Enhancing Hardware-Dependent Model Adaptation through Efficient Cost Prediction. 297-302 - Shuren Li, Weinan Wang, Xiangqian Jiang, Jun Hua, Jiawei Mao, Yibin Lu, Xuan Jia, Di Wang, Zhen Wang, Yifei Lu:
DDAL: A Drift Detection Active Learning Mechanism. 303-308 - Moxuan Zeng, Yangzhong Wang, Yangming Zhang, Jun Niu, Yuqing Zhang:
GNMS: A novel method for model stealing based on GAN. 309-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.