default search action
27th CSCWD 2024: Tianjin, China
- Weiming Shen, Jean-Paul A. Barthès, Junzhou Luo, Tie Qiu, Xiaobo Zhou, Jinghui Zhang, Haibin Zhu, Kunkun Peng, Tianyi Xu, Ning Chen:
27th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2024, Tianjin, China, May 8-10, 2024. IEEE 2024, ISBN 979-8-3503-4918-4 - Yingchao Wang, Chen Yang, Shulin Lan, Weilun Fei, Lihui Wang, George Q. Huang, Liehuang Zhu:
Towards Industrial Foundation Models: Framework, Key Issues and Potential Applications. 1-6 - Ming Zhang, Yi Hu, Xiangchun Liu, Yanghao Zhang, Quan Yi, Wei Song:
UAV Swarm Path Planning Algorithm Based on Starling Flocking. 1-7 - Ziehen Song, Shuo Ma, Weijia Li:
Robustness Boost: MIR-Based Feature Enhancement in Deep Learning Models. 1-5 - Feihong Huang, Wei Jiang:
Towards an Acceptance Probability-Aware Order Bundle in Crowdsource Food Delivery Service. 6-11 - Ming Tao, Lingling Liao, Kaitu Li, Ji Xu, Weiming Huang:
Optimized-CNN enabled Facial Emotion Recognition within Collaborative Edge Computing. 12-17 - Guangbin Bao, Liangliang Sun, Rui Zhang, Bo Zhang, Zhiming Shen, Shuang Chen:
Research on Image-text Multimodal Emotions Analysis with Fused Emoji. 18-23 - Gaofeng Zhang, Yanhe Fu, Gang Xu, Xing Wang, Jia Hao, Ru Yi:
Opportunistic Network Routing Algorithm Based on Overlapping Communities and Communication Willingness. 24-29 - Gaofeng Zhang, Jia Hao, Gang Xu, Xing Wang, Yanhe Fu, Ru Yi:
Opportunistic Network Routing Based on Node Sociality and Location Information. 30-35 - Ling Ou, Gen Feng:
Parameter-Efficient Fine-Tuning Large Speech Model Based on LoRA. 36-41 - Guokun Xu, Weijie Wang, Degang Sun, Yanpeng Ma, Yan Wang, Weiqing Huang:
MLNT: A Multi-Level Network Traps Deployment Method. 42-47 - Zhijun Zhou, Qing Xie, Yuhan Wang, Lin Li, Yongjian Liu, Mengzi Tang:
Debiased Contrastive Learning For Graph Collaborative Filtering. 48-54 - Xiaoyu Zhang, Wen Wang, Shuangyin Ren, Xiaomin Gong, Yuxuan Yang, Jingchao Wang:
A Two-Phase Task Allocation Strategy With a Hybrid Architecture. 55-60 - Yutao Song, Nankai Lin, Lingbao Li, Shengyi Jiang:
A Vision Enhanced Framework for Indonesian Multimodal Abstractive Text-Image Summarization. 61-66 - Jijing Cai, Han Zhu, Hailin Feng, Long Wen, Wei Wang, Meilei Lv, Kai Fang:
Vehicle Trajectory Prediction Based on Dynamic Graph Neural Network. 67-72 - Yantao Shao, Tianxiang He, Yan Mao, Kai Fang, Wei Wang, Keji Mao:
Optimizing Future Predictions in Children's Health: Implementing OGPA-enhanced Deep Learning for Precise Child Height Forecasting in the Social Media Age. 73-78 - Zhiyuan Liu, Wei Liu, Xinyang Tong, Qi Shen, Qiang Zheng, Hengrui Hu, Hong Liu, Xiaojie Wang:
ABCF: An Adaptive Balanced Multimodal Website Classification Framework. 79-84 - Han Wang, Chunhua Gu:
DCCL: Distance-coefficient guided Clustering with Contrastive Learning for Few-shot Text Classification. 85-90 - Yunpeng Ma, Qing Yu:
CGTS: A Transformer framework for time series prediction based on feature extraction. 91-96 - Yuanxiang Xu, Yuan Feng, Shengyu Song, Jiahao Liu:
A Model for Sea Ice Segmentation based on Feature Pyramid Network and Multi-head Self-attention. 97-102 - Zhichao Li, Xianghui Yuan, Liwei Jin, Chencheng Zhao:
Stock Trend Prediction: an Effective Hybrid Deep Model Based on Lead and Lag Correlation Graphs. 103-108 - Shiming He, GenXin Li, Qinqing Guo, Kun Xie:
Multi-Graph Structure Learning-based Multivariate Time Series Anomaly Detection with Extended Prior Knowledge. 109-114 - Zehui Feng, Dongfu Zhu, Kejie Zhang, Yizhe Jia, Jiefan Qiu:
CrowdLab: Collaborative Dataset Labeling System Based on Image Segmentation. 115-120 - Wanjun Chen, Qiqi Chen, Jiexun Shen, Guosheng Kang, Jianxun Liu, Buqing Cao, Lihong Zhang:
Interactive Web API Recommendation via Exploring Mashup-API Interactions and Functional Description. 121-126 - Xin Cai, Xiaozhou Zhu, Wen Yao:
Distributed time-varying group formation tracking for multi-UAV systems subject to switching directed topologies. 127-132 - Xuean Huang, Jianmei Su:
Intermediate Tasks Enhanced End-to-End Autonomous Driving with Uncertainty Estimation. 133-138 - Caipeng Gu, Jijing Cai, Zhihao Wen, Jiefan Qiu, Wei Wang, Meilei Lv, Kai Fang:
Visible Light Secure Communication Method for Internet of Vehicles. 139-144 - Shuai Wang, Siye Wang, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang:
RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. 145-150 - Fanfan Hao, Zhu Wang, Yaobing Xu, Siyuan Leng, Liang Fang, Fenghua Li:
Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition. 151-156 - Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:
KSM: Killer of Spectre and Meltdown Attacks. 157-162 - Haofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang:
Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency. 163-168 - Baowei Wang, Zhengyu Hu, Yi Yuan, Bin Li, Yuxiao Zhang:
BlockArb: The Decentralized Arbitration Mechanism for Data Trading. 169-174 - Jingchen Sun, Ning Chen, Songwei Zhang, Zhaolong Ning, Tie Qiu:
A Probability-Based Scheme for Generating Robust Internet of Things. 175-180 - Yanjing Lei, Zehui Feng, Xiangqing Lin, Di Cao, Jiakai Zhang:
NILM-LANN: A Lightweight Attention-based Neural Network in Non-Intrusive Load Monitoring. 181-186 - Yuchen Liu, Shanshan Wang, Jin Au-Yeung, Zhenxiang Chen:
Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection. 187-192 - Hengwei Zhang, Yuejia Wu, Jian-Tao Zhou:
A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity Recognition. 193-198 - Dingyang Duan, Daren Zha, Zeyi Liu, Yu Chen:
Dynamic Graph Embedding via Self-Attention in the Lorentz Space. 199-204 - Zhuhua Bai, Weiqing Li, Guolin Yang, Fantong Meng, Renke Kang, Zhigang Dong:
A Coarse-to-Fine Framework for Point Voxel Transformer. 205-211 - Wei Shi, Yufeng Wang, Jianhua Ma, Qun Jin:
LFAS: An electricity load forecasting framework assisted by cooperative multi-task learning-based spike occurrence prediction. 212-217 - Bingxian Li, Lin Zhu, Long Tan:
A Distributed Deep Reinforcement Learning-based Optimization Scheme for Vehicle Edge Computing Task Offloading. 218-223 - Baowei Wang, Wenjue Huang, Bin Li, Yi Yuan, Fan Yang, Zhengyu Hu:
Blockchain-based Medical Image Data Trading Platform with Copyright and Privacy Protection. 224-229 - Chunqiao Jin, Shuangyuan Yang:
Named Entity Recognition Method Based on Multi-Teacher Collaborative Cyclical Knowledge Distillation. 230-235 - Bin Ren, Yongdong Wei, Chunhong He:
Dynamic Adaptive Graph Convolutional Networks for Traffic Flow Regulation. 236-241 - Bingshu Shi, Meiling Liu, Jiyun Zhou, Kaiqun Fu:
Sentiment Summarization Generation Based on Multi Instance Learning and Graph Convolution on Social Media. 242-247 - Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, Haojuan Zhang:
A Cloud-Edge Collaborative System for Object Detection Based on KubeEdge. 248-253 - Xiaoyang Ji, Yuchen Zhou, Haofu Yang, Shiyue Xu, Jiahao Li:
Self-Supervised Contrastive Graph Clustering Network via Structural Information Fusion. 254-259 - Yisheng Zhong, Li-Ping Wang:
PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks. 260-265 - Tao Fan, Wei Zhang, Chunying Kang, Hongcheng Yu, Yao Xiao:
Generating Adversarial Samples via a Combination of Feature Selection and Optimized Perturbation Methods. 266-271 - Fenghao Li, Ying Shen, Liming Wang, Huanbo Zhang, Ling Zhang:
SR-RDW : A Multi-user Redirected Walking Method Based on State Recovery for Alignment. 272-277 - Jianmeng Guo, Huan Zhou, Xuxun Liu, Liang Zhao, Victor C. M. Leung:
A Stackelberg Game-based Wireless Powered Federated Learning. 278-283 - Xunjia Yin, Xiaoming Wu, Xiangzhi Liu:
SOD-YOLO: A New Small Object Traffic Sign Recognition Network. 284-290 - Jiajun Wang, Yongqiang Gao:
QoE optimization based on Adaptive Bitrate Control for Multi-party Interactive Live Streaming. 291-296 - Huan Li, Xiangjie Kong, Guojiang Shen, Xiaoran Yan, Yao Yang, Mario Collotta:
Point-Correlate Adversarial Transformer for Unsupervised Multivariate Time Series Anomaly Detection. 297-302 - Peiguo Fu, Li Zhang, Ming Liu, Wen Jiang, Liyuan Sun:
Research on a Cross-platform Communication Situation Assessment Method Based on Specific Events. 303-309 - Zeyu Dong, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu:
Class-wise Image Mixture Guided Self-Knowledge Distillation for Image Classification. 310-315 - Jiahao Liu, Yuan Feng, Shengyu Song, Yuanxiang Xu:
A Study of Deep Learning Algorithms for Long-term Prediction and Correlation Identification of Arctic Ice. 316-322 - Tianye Gao, Wang Qi, Kehong Liu, Shengbao Li, Ruihai Ge, Tianning Zang:
MTS-IoT: A Robust Encrypted IoT Traffic Classification via Multi-dimensional Time Series. 323-328 - Min Wang, Yan Gao:
A Multi-Label Text Classification Model with Enhanced Label Information. 329-334 - Fei Chen, Hui Xue, Pengfei Fang:
TSDNet: An Efficient Light Footprint Keyword Spotting Deep Network Base on Tempera Segment Normalization. 335-340 - Chenbing Dong, Hui Xu, Fukui Li, Mengran Liu:
A Collaborative-Enhanced Sand Cat Swarm Optimization for Network Intrusion Detection. 341-346 - Mengran Liu, Hui Xu, Qinyue Wu, Chenbing Dong:
An Improved Beluga Whale Optimization Algorithm by Collaborative Strategies for Multi-Threshold Image Segmentation. 347-352 - Zhiyu Wu, Yisu Wang:
Qiao: DIY your routing protocol in Internet-of-Things. 353-358 - Lijuan Xu, Zhiang Yao, Dawei Zhao, Xin Li:
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System. 359-364 - Yihang Zhou, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu:
Online Relational Knowledge Distillation for Image Classification. 365-370 - Hanqing Gao, Junfeng Zhao, Wenhao Li, Zhengxin Li:
MicroMCM: Fine-grained Root Cause Localization for Microservice Systems Based on Multiple Causal Inference Methods. 371-376 - Mengchuan Shang, Xueying Han, Changzhi Zhao, Zelin Cui, Dan Du, Bo Jiang:
Multi-language Webshell Detection based on Abstract Syntax Tree and TreeLSTM. 377-382 - Ziyuan Cui, Zhongwen Guo, Jinxin Wang, Weigang Wang:
CombinE: A Fusion Method Enhanced Model for Knowledge Graph Completion. 383-388 - Rui Huang, Jingcheng Zeng, Xuyi Cheng, Jieda Wei:
Fine-grained classification for aero-engine borescope images based on the fusion of local and global features. 389-394 - Huixuan Zhao, Jinyong Cheng, Rundong Du:
A Multi-Scale Infrared and Visible Image Fusion Network Based on Context Perception. 395-400 - Qiuyuan Wang, Lanju Kong, Lizhen Cui:
A Complete Protection, Certification and Traceability System for Academic Degrees Based on Collaborative Storage on and Off the Chain. 401-406 - Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. 407-412 - Ahmed R. Elmahalawy, Lin Li, Xiaohua Wu, Xiaohui Tao, Jianming Yong:
Computational Personality Analysis with Interpretability Empowered Prediction. 413-418 - Guojian Xiao, Siyuan Qin, Kuan Li, Juan Chen, Jianping Yin:
EAtuner: Comparative Study of Evolutionary Algorithms for Compiler Auto-tuning. 419-426 - Hao Yue, Xiaoliang Wang, Yuzhen Liu, Zhou Tang, Jiasheng Yin, Yuanyuan Ai:
Enhancing Weak Feature Detection in Convolutional Analysis of Traditional Chinese Medicine Tongue Diagnosis. 427-432 - Tong Yin, Xin Chen, Libo Jiao, Jiaxuan Liao:
Joint Dynamic Pricing and Computing Offloading in Edge-to-Cloud Collaboration. 433-440 - Zhengqi Wu, Hui Li, He Bai, Xinyuan Pei:
A Scalable and Resilient Protocol for Synchronous Collaboration. 441-446 - Rui Huang, Zongyu Guo, Qingyi Zhao, Wei Fan:
PAPnet: A Plug-and-play Virus Network for Backdoor Attack. 447-452 - Haodi Zhang, Junyu Yang, Wenxi Huang, Min Cai, Jiahong Li, Chen Zhang, Kaishun Wu:
Recognizing Textual Entailment by Hierarchical Crowdsourcing with Diverse Labor Costs. 453-458 - Jinghong Yang, Qing Yu:
WDFormer: Acceptable Field Growth Transformer with Windows for Long Sequence Time-Series Forecasting. 459-464 - Zhengxin Guo, Shizhan Chen, Chao Wang, Hongyue Wu, Kai Ma, Zhiyong Feng:
Security-Oriented Architecture for Blockchain-Based Federated Learning in the Financial Industry. 465-470 - Jia Li, Hua Zhang:
SA-SVD: Mitigating Bias in Face Recognition by Fair Representation Learning. 471-476 - Haoyu Xiong, Chengfu Yang:
Test-Time Adaptation with Robust Dual-stream Perturbation for Stable Agent Deployment in Dynamic Scenarios. 477-482 - Wanchun Jiang, Hanyu Chen, Jialiang Chen, Kai Wang, Jiarui Yang, Xiao Han, Xingping Zhang:
Cooperative Simulation of RDMA-based Network and Storage. 483-488 - Yipei He, Yongqiang Gao, Yunfei Song:
Distributed Rendering for Cloud Gaming in Cloud-Edge-End Cooperation Networks. 489-494 - Zhizhuo Yang, Wei Zhang:
Topic Paraphrasing Model for Abstractive Dialogue Summarization. 495-500 - Xin Dai, Xin Chen, Libo Jiao, Shougang Du, Xueqi Ren, Zhe Dong:
Cost-Efficient Data Offloading and Resource Allocation in 6G Space-Air-Ground Integrated IoT Networks. 501-506 - Xinli Liu, Ming Yang:
The Research of Small Object Detection based on YOLOX in UAV. 507-512 - Yuyan Quan, Songtao Guo, Dewen Qiao:
RCFL-GAN: Resource-Constrained Federated Learning with Generative Adversarial Networks. 513-518 - Qianwen Mao, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu, Qingkai Wang:
RFRN: Cross-domain RFID Activity Recognition Using a Few Samples. 519-524 - Baojie Tian, Liangjun Zang, Haichao Fu, Jizhong Han, Songlin Hu:
Towards More Effective and Transferable Poisoning Attacks against Link Prediction on Graphs. 525-530 - Jiaxuan Liao, Xin Chen, Libo Jiao, Wang Li, Baichang Wang:
Deep Reinforcement Learning Based Cooperative Task Offloading and Resource Allocation in mmWave-Enabled Space-Air-Ground Integrated Networks. 531-537 - Jiaming Zhang, Songtao Guo, Pengzhan Zhou:
FedGDC-P: Communication-efficient Personalized Graph Federated Learning Based On Dataset Condensation. 538-543 - Lin Zhu, Long Tan, Bingxian Li:
Optimization Scheme of Vehicular Edge Computing Task Offloading Based on Digital Twin Assistance. 544-549 - Chenliang Zhu, Jie Yang, Peiwei Deng, Junzhe Lin, Lianfen Huang, Hezhi Lin:
STPointNet for Human Action Recognition in MmWave Point Clouds. 550-555 - Ronghao Liang, Qingtian Zeng, Wenyan Guo, Hua Duan, Weijian Ni:
Automatic Extraction of Petri Nets from RFC Protocol Texts. 556-561 - Songtao Ye, Saisai Zheng, Yizhang Xia:
Channel Attention-Based Method for Searching Task-Specific Multi-Task Network Structures. 562-569 - Xiao Zhao, Suzhen Cao, Zheng Wang, Dandan Xing, Dawei Zhou:
A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection. 570-575 - Song Wei, Limin Ma, Zeyu He, Wei Zhang:
Blockchain-based Private Set Intersection Protocol with Attribute-based Access Control. 576-581 - Ziang Li, Jie Xu, Zhenyu Cheng, Tianning Zang:
IMTCDF: A Multi-Module-Based Internet Malicious Traffic Classification and Detection Framework. 582-587 - Chenxu Han, Xuelei He, Xiaowei He, Zhixin Huang, Chuang Zhang, Yong Huang:
MLWF-Net: Multiple lung windows based fusion network for segmentation of small infected areas in COVID-19 CT slices. 588-593 - Cong Wu, Sicheng Lei, Huawei Xu, Tongzhen Xing:
Multi-scale Fusion Attention Network for Industrial Surface Defect Classification. 594-599 - Ping Gu, Yong Lu:
A Hybrid Active Sampling Algorithm for Imbalanced Learning. 600-605 - Guangyu Lin, Hongbin Zhang, Zhenyi Fan, Lianglun Cheng, Zhuowei Wang, Chong Chen:
Improving Distantly-Supervised Relation Extraction through Label Prompt. 606-611 - Han Liu, Yunxu Bai:
Security and Efficient Data Verification Protocol for Distributed Database based on Zero-knowledge Proof. 616-621 - Xingming Liao, Nankai Lin, Haowen Li, Lianglun Cheng, Zhuowei Wang, Chong Chen:
Composited-Nested-Learning with Data Augmentation for Nested Named Entity Recognition. 618-623 - Weigang Wang, Wei Jing, Ziyuan Cui:
ScoreReader: A handwritten score recognition toolkit for examination papers. 624-629 - Guangzong Si, Qing Ding:
Bi-Directional Safety Protection for Vulnerable Road Users: A Roadside Unit-Based Cooperative Perception Network. 630-636 - Sixian Chan, Aofeng Qiu, Wei Pan, Jiafa Mao:
Attention-Enhanced Multi-View Stereo with Probabilistic Depth Variance Refinement. 637-642 - Hua Ma, Zixu Jiang, Xiangru Fu, Mingfa Hong, Zhuoxuan Huang, Hongyu Zhang:
Route Planning of City Road Trips Meeting Subjective Preferences and Objective Constraints. 643-648 - Zhiyuan Cui, Luoyu Mei, Siyuan Pei, Borui Li, Xiaolei Zhou:
Privacy-preserving Human Activity Recognition via Video-based Range-Doppler Synthesis. 649-654 - Kun Han, Long Tan:
An Event-driven Clustering Routing Algorithm in mobile CRSNs. 655-660 - Xin-Wei Yao, Weiwei Xing, Chu-Feng Qi, Qiang Li, Wei-Qiang Wang, Xing Fu:
Simulated Annealing Deep Q-learning Incentive Mechanism for Mobile Crowd Sensing. 661-668 - Shang Wang, Meiju Yu, Mingzhu Zhao, Haotian Wang:
Blockchain-Based Cloud Data Auditing Scheme in Multi-Cloud Storage Service Environment. 669-674 - Xingyu Yan, Shuai Xu, Yusong Zhang, Bohan Li:
ELEvent: An Abnormal Event Detection System in Elevator Cars. 675-680 - Yuxiang Lin, Wentao Wang, Hui Peng, Guangrong Chen:
Tracking Control of Quadruped Robot Based on Visual Perception. 681-686 - Zhongyun Li, Yan Zhao, Yihong Wang, Zongyang Liu, Yushan Pan:
A novel model for product defect detection based on the automatic aspect term extraction. 687-692 - Weihua Liu, Xiaohui Han, Wenbo Zuo, Yu Sun:
HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network Traffic. 693-698 - Yu Tian, Haojun Xia, Chen Li, Bibo Tu:
An Efficient Caching Mechanism for End-host Network Functions. 699-704 - Xun Cai, Siwei Xue, Tianyou Wang, Yeqian Yang, Jianguo Lv, Kin-Tak Lau, Yanbo Gao:
A Bi-Directional Prediction based on Multi-Stage Deep Multilayer Perceptron for the Productive Process of Polyacrylonitrile Precursor. 705-710 - Haoran Liu, Yifeng Zhao, Xuanhui Liu, Bo Wang, Keyi Cheng:
Deep Learning Empowered IoV: ISAC RCG-Net Beam Tracking for Seamless Road Communication. 711-716 - Yichen Chen, Yuqi Pan, Ruyu Liu, Haoyu Zhang, Guodao Zhang, Bo Sun, Jianhua Zhang:
360ORB-SLAM: A Visual SLAM System for Panoramic Images with Depth Completion Network. 717-722 - Tinglong Tang, Sheng Hua, Shuifa Sun, Yirong Wu, Yuqi Zhu, Chonghao Yue:
Optical Flow Guided Pyramid Network for Video Salient Object Detection. 723-728 - Hao Zhao, Wenqi Zhang, Xiong Li, Shuai Shang, Ke Huang, Xiaosong Zhang:
Towards Efficient Delegated Private Set Intersection Cardinality Protocol. 729-734 - Fang Liu, Shiqun Yin, Guang Li, Yajun He:
Nested Named Entity Recognition based on Span and Efficient Global Pointer. 735-741 - Ke Zhang, Zhenwen Peng, Ruixing Zong, Qiong Wang, Xiong Xiao, Zhuo Tang:
Communication Optimization in Blockchain Peer-to-Peer Networks. 742-747 - Zhenyang Mao, Peng Li, Guangzhong Liao, Lei Nie, Haizhou Bao, Qin Liu:
Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensing. 748-753 - Zhenwen Peng, Yingjie Song, Qiong Wang, Xiong Xiao, Zhuo Tang:
FedBN: A Communication-Efficient Federated Learning Strategy Based on Blockchain. 754-759 - Wenying Peng, Yanming Chen, Haibin Zhu, Yiwen Zhang:
End-edge collaborative DNN inference acceleration via E-CARGO and RBC. 760-765 - Mengyan Liu, Gaopeng Gou, Gang Xiong, Junzheng Shi, Chang Liu, Chen Chen:
WebPromptM2: A Website Classification Method Leveraging Prompt-Based Learning with Multimodal Features. 766-771 - Yusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties. 772-777 - Bo Wang, Yang Yang, Yu Zhang, Cheng Zhan, Fei Wang:
DeepVNP: Virtual Network Placing with Deep Reinforcement Learning in Industrial IoT. 778-783 - Mingya Zhang, Na Zhao, Yuqian Zhuang, Liang Wang, Xianing Tao:
FaLdViT: A Simple Yet effective framework to detect Cephalometric landmarks. 784-789 - Gang Wu, Yanming Chen, Yiwen Zhang:
MicroENet: An Efficient Network for MCUs with Low Model Parameters and Peak Memory. 790-795 - Pengju Wang, Jing Liu:
ASL: Adversarial Attack by Stacking Layer-wise Relevance Propagation. 796-801 - Caidan Zhao, Xiang Li, Chenxing Gao, Zhiqiang Wu:
Video Anomaly Detection Framework Based on Motion Consistency. 802-807 - Gaoyu Luo, Zhibin Gao, Sheng Zhang, Lianfen Huang, Linran Chen:
FBM-FA: Frame-Level-Attention-Based Facial Behavior Mining for Face Anti-Spoofing. 808-813 - Sihan Mao, Jianguang Zhang, Xiaodong Hu, Xiaolin Zheng:
Byzantine-Robust Compressed and Momentum-based Variance Reduction in Federated Learning. 814-820 - Xin Li, Zhongjie Li, Feiyang Xu:
Eye-tracking based Detection of Developmental Dyslexia in Children Using Convolutional-Transformer Network. 821-826 - Jiarui Zhang, Zhenguo Du:
AcouController: Motion Based Acoustic Remote Control for Smart Devices. 827-832 - Ziyang Huang, Yanming Chen, Yiwen Zhang:
Lyapunov-guided Deep Reinforcement Learning for Vehicle task Stable offloading. 833-838 - Mingjie Gao, Wei Huang, Zhilei Xu, Sung-Kwun Oh:
Hybrid Ensemble Polynomial Neural Network Classifier: Analysis and Design. 839-844 - Fang Luo, Jie Liu, George To Sum Ho, Kun Yan:
Unsupervised Cross-domain Object Detection via Multiple Domain Randomization. 845-851 - Guangbin Bao, Zhiming Shen, Chen Liu, Liangliang Sun, Shuang Chen:
Multimodal sentiment analysis based on TCN and cross-modal interactive feedback network. 852-857 - Fuyu Gu, Yang Gu, Yiyan Xu, Haoran Sun, Yushan Pan, Shengchen Li, Haiyang Zhang:
Language-based Audio Retrieval with GPT-Augmented Captions and Self-Attended Audio Clips. 858-863 - Zirong Xu, Weimin Lai, Qiao Yan:
FedPGT: Prototype-based Federated Global Adversarial Training against Adversarial Attack. 864-869 - Shuhua Yuan, Yongqi Ge, Jiayuan Wei, Zhenbo Yuan, Rui Liu, Xian Mo:
Reinforcement Learning based Battery Energy Neutral Operation for EHWS. 870-876 - Kecheng Tang, Jiantao Zhou, Xu Guo:
An Uncovered Neurons Information-Based Fuzzing Method for DNN. 877-882 - Guanwei He, Beichen Ding, Qingqing Huang, Guodong Feng:
A Force-free Control Architecture Integrated with Digital Twin for Collaborative Manipulators. 883-888 - Lin Zhao, Ji Xiang, Xiaobo Guo, Yunzhi Liang, Zeyi Liu, Xin Wang:
CA-GCN: A Confidence-aware uncertain knowledge graph embedding model based on graph convolutional networks. 889-896 - Wenqiang Li, Aimin Li, Xiaotong Kong, Yuechen Zhang, Zhiyao Li:
MF-YOLO: Multimodal Fusion for Remote Sensing Object Detection Based on YOLOv5s. 897-903 - Rui Xia, Lisong Wang, Taili Li, Pingping Shi:
Social Influence Prediction using Neighborhood Information across Various Ranges. 903-908 - Weimin Lai, Zirong Xu, Qiao Yan:
Clustered Federated Learning Based on Client's Prototypes. 909-914 - Xiaoyan Zhao, Fengxian Hou, Yan Kuang, Peiyan Yuan:
Cache Strategy for Joint Content Recommendation and D2D Collaboration. 915-920 - Xianning Meng, Hongda Li, Yao Zan:
Sharding PoW-based Blockchains with Simple Cross-Shard Transaction Processing. 922-927 - Luting Zhang, Yubing Li, Wei Yang, Qingyun Liu, Rong Yang:
PFTB: A Prediction-Based Fair Token Bucket Algorithm based on CRDT. 928-934 - Yuliang Chen, Xi Lin, Gaolei Li, Lixing Chen, Jing Wang, Siyi Liao, Jianhua Li:
Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT. 935-940 - Yiduo Cheng, Xu Yuan, Dunhui Yu, Mingjun Zhao:
Multi-task online allocation based on path planning strategy in Spatial crowdsourcing environment. 941-949 - Juanru Zhang, Weichao Yang, Yinghui Zhang, Hao Zheng, Tiankui Zhang:
DPAdaMod_AGC: Adaptive Gradient Clipping-Based Differential Privacy. 950-955 - Zhiheng Zhang, Guowei Wu:
Decb: A Decentralized Broker for Sky Computing. 956-961 - Rui Li, Xin Zhang, Yanpeng Wu, Zongyi Shao:
Cell Detection Algorithm for Alveolar Lavage Fluid Based on YOLO-GAS Algorithm. 962-967 - Zhaohua Zheng, Zizheng Wang, Xinyu Tong, Keqiu Li, Qiquan Chen:
FedAHP: A Heterogeneous Client Selection Method for Federated Learning Based on the Analytic Hierarchy Process in Mobile Edge. 968-973 - Yu Zhang, Jianqiang Zhang, Gongpeng Song, Qin Lu:
A Novel Text Matching Model Based on Multilayer Coding and Feature Enhancement. 974-979 - Yunfei Song, Yongqiang Gao, Yipei He:
Joint Task Offloading and Resource Allocation for NOMA-Based Vehicular Networks. 980-985 - Chaoran Zhou, Jianhui Guo, Xin Zhang, Kaicheng Yang:
Dynamic scheduling method of public transportation resources based on Spatial Graph Convolution and Proximal Policy Optimization. 986-991 - Xinpeng Ouyang, Xiaodong Yan, Minghui Hao:
A Pre-Trained Language Model Based on LED for Tibetan Long Text Summarization. 992-997 - Binbin Li, Yuqing Li, Siyu Jia, Bingnan Ma, Yu Ding, Zisen Qi, Xingbang Tan, Menghan Guo, Shenghui Liu:
Triple GNNs: Introducing Syntactic and Semantic Information for Conversational Aspect-Based Quadruple Sentiment Analysis. 998-1003 - Yongqiang Gao, Chuangxin Li, Zhenkun Li:
Deep Reinforcement Learning-Driven Adaptive Task Offloading and Resource Allocation for UAV-Assisted Mobile Edge Computing. 1004-1009 - Kehong Liu, Qi Wang, Tianye Gao, Tianxing Ma, Tianning Zang:
A Machine Learning-based Method for Clustering the Traffic of Linux NATed Network Entities with TCP/IP Feature. 1010-1016 - Hao Xu, Zhangjun Lu, Wei Zhang, Jianhui Jiang:
Process-Oriented GCC Failure Analysis based on Fault Injection. 1017-1022 - Luyao Liu, Zhipeng Zhou, Mingwu Chen, Wei Gong:
CAT: Cross-Adversarial Training for WiFi-Based Human Activity Recognition. 1023-1028 - Changnan Jiang, Chunhe Xia, Mengyao Liu, Chen Chen, Huacheng Li, Tianbo Wang, Pengfei Li:
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution. 1029-1036 - Haitao Wang, Rui Wang, Peng Zou, Qingjian Ni, Xiao Sun:
MCAN: An Efficient Multi-Task Network for Facial Expression Analysis. 1037-1042 - Bo Cui, Li Dang:
Incentive Mechanism of Blockchain-Based Reverse Auction for Federated Learning. 1043-1048 - Bo Cui, Dou Hao:
ADGRL: A Deep Graph Reinforcement Learning Model with Attention for Online Judge Exercise Recommendation. 1049-1054 - Fengming Zhang, Pan Hu, Hongming Cai, Lihong Jiang:
Parallel Collaborative Reasoning Approaches Based on DatalogMTL in IoT Scenarios. 1055-1060 - Ningning Zhu, Fuqing Zhao, Jie Cao:
A Hyperheuristic and Reinforcement Learning Guided Meta-heuristic Algorithm Recommendation. 1061-1066 - Jia Yi, Xiaoming Wu, Yunfeng Dong, Bei Qi, Xiangzhi Liu:
Collaborative Computation Model Based on Dependency Types and Constituent Trees for Aspect-Based Sentiment Analysis. 1067-1072 - Lingjun Fan, Qinpei Zhao, Jiasheng Shi, Fu Lin, Weixiong Rao:
Learn to Simulate Finite Element Analysis via Mesh-based Graph Networks. 1073-1078 - Liang Jiao, Yujia Zhu, Wenxiu Zhang, Lei Zhao, Yi Zhou, Qingyun Liu:
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information. 1079-1085 - Heng Liu, Boyue Wang, Yanfeng Sun, Xiaoyan Li, Yongli Hu, Baocai Yin:
VIG: Visual Information-Guided Knowledge-Based Visual Question Answering. 1086-1091 - Shiwei Liu, Yong Xu:
Multi-behavior Enhanced Self-supervised Graph Learning for Social Recommendation. 1092-1097 - Mingjie Wang, Bicheng Fang, Jinfeng Jiang, Hongfei Fan:
A Novel Request-Invitation-Approval Scheme for Flexible Semantic Conflict Prevention in Real-Time Collaborative Programming. 1098-1103 - Gaotao Shi, Zejun Liu, Jinfeng Yang, Zenghua Zhao:
Orthogonal Rendezvous Multicast for Mobile Sinks in Wireless Sensor Networks. 1104-1109 - Jianzong Wang, Pengcheng Li, Xulong Zhang, Ning Cheng, Jing Xiao:
Medical Speech Symptoms Classification via Disentangled Representation. 1110-1115 - Zhen Wu, Li Zhang:
EPFA-Net: An Enhanced Partial Feature Aggregation Network for Remote Sensing Object Detection. 1116-1121 - Dongsheng Ji, Caidan Zhuoma, Juntong Du, Dandan Zou, Zheng Zhang:
Study on the Impact of Different Anchor Quantities in pneumonia X-ray Object Detection Based on the YOLO Series. 1122-1127 - Zhuozhen Xu, Sixian Chan, Bin Guo, Wenhui Zhuo, Xiaolong Zhou:
Multi-Target Multi-Camera Tracking based on lightweight detector. 1128-1133 - Ziqi Liang, Haoxiang Shi, Jiawei Wang, Keda Lu:
EM-TTS: Efficiently Trained Low-Resource Mongolian Lightweight Text-to-Speech. 1134-1139 - Lei Wang, Wenguang Zheng, Yingyuan Xiao:
Graph-based POI Recommendation through Self-Supervised Curriculum Learning. 1140-1145 - Pengsheng Li, Qingfeng Du, Shengjie Zhao:
KEWS: A KPIs-Based Evaluation Framework of Workload Simulation On Microservice System. 1146-1152 - Danni Chang, Renqiu Guo, Yuning Qian, Luyao Wang:
A stylized generation approach for poster background graphic design based on light elements. 1153-1158 - Feng Chen, Li Wang, Jiawei Zhang, Qi Sun, Pinyan Lai:
An Attention Model Based Heuristic Algorithm for Storage Selection and Order Picking Path Joint Optimization. 1159-1164 - Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:
A Module Level Security Evaluation Method Based on Model Checking. 1165-1170 - Dongyang Li, Chenhao Zhang, Hongwei Zhang, Jinsong Wang:
GLM-Rf: Malicious smart contract static detection scheme based on GLM and Random forest. 1171-1176 - Ronghuan Zhang, Jing Zhao, Ming Li, Qingzhi Zou:
FEST: Feature Enhancement Swin Transformer for Remote Sensing Image Semantic Segmentation. 1177-1182 - Wolong Xing, Zhenkui Shi, Hongyan Peng, Xiantao Hu, Yaozong Zheng, Xianxian Li:
Personalized federated learning based on feature fusion. 1183-1188 - Rongrong Yin, Kuan-Kuan Jia, Hao Qin, Mengfa Zhai, Shao-Ying Ma, Ming-Qi He:
Reinforcement Learning-based Multi-hop Intelligent Route Selection for Vehicle-to-Vehicle Visible Light Communication. 1189-1194 - Qichen Li, Sujie Shao, Chao Yang, Jiewei Chen, Feng Qi, Shaoyong Guo:
Communication-efficient Federated Learning Framework with Parameter-Ordered Dropout. 1195-1200 - Shiming He, Chenxi Guo:
Memory-efficient anomaly detection for online data streams. 1201-1206 - Rui Wang, Haitao Wang, Peng Zou, Xiao Sun:
WR-Former: Vision Transformer with Weight Reallocation Module for Robust Facial Expression Recognition. 1207-1212 - Zituo Li, Jianbin Sun, Xuemei Yao, Ruijing Cui, Bingfeng Ge, Kewei Yang:
An interpretable adversarial robustness evaluation method based on robust paths. 1213-1218 - Lihong Zhang, Jing He, Yamei Nie, Xiaokang Zhou, Qiqi Chen, Guosheng Kang:
JMF-SS: Joint Matrix Factorization for Web API Recommendation with Mashup-Mashup Similarities and API-API Similarities. 1219-1224 - Chen Chen, Guorong Ye, Lixin Lan, Pu Li, Hao Wang, Jianqiao Li, Hangguan Shan, Huixu Xiao:
Lightweight Dangerous Driving Action Recognition Using Graph Convolutional Broad Learning. 1225-1230 - Jianjun Zhao, Ru Tan, Yaqin Cao, Xutong Wang, Qixu Liu, Xiang Cui:
MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior Detection. 1231-1237 - Xiaozhao Deng, Dan Wang, Lin Yang:
The Impact of Perceived Risk on Online Medical Users' Privacy Protection Behavior. 1238-1243 - Yifan Zhou, Yue Ding, Dong Wang:
LDAG: Modeling Long-term interests by Directed Acyclic Graph Neural Network for Sequential Recommendation. 1244-1249 - Chaoxiong Yi, Songlei Jian, Yusong Tan, Yusen Zhang:
MACA: Memory-aware convolution accelerating for CNN inference on edge devices. 1250-1255 - Huanxiao Zhou, Yushui Geng, Jing Zhao, Xishan Ma:
Semantic-Enhanced Attention Network for Image-Text Matching. 1256-1261 - Jialin Liu, Xinyan Su, Zeyu He, Jun Li:
Adversarial Batch Inverse Reinforcement Learning: Learn to Reward from Imperfect Demonstration for Interactive Recommendation. 1262-1267 - Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:
Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems. 1268-1273 - Shuo Zhao, Yiyun Xing, Jianqiang Zhang, Gongpeng Song, Qin Lu:
SCTAR: A Multi-Layer BiLSTM-Based Chinese Short Text Similarity Computation Model with Attention Mechanism. 1274-1279 - Xueqi Li, Kejia Li, Jiayao Liu, Ruipeng Gao:
Smartphone-based Indoor Pedestrian Tracking via Transformer. 1280-1285 - Hanfeng Jiang, Xiao Xue, Juanjuan Li, Wanpeng Ma:
Improve Multi-agent Path Finding by Bridging the Gap between Abstract Algorithms and Specific Application Scenarios. 1286-1291 - Zixuan Chen, Shengjie Zhao, Jin Zeng, Shilong Dong, Geyunqian Zu:
CASTNet: Convolution Augmented Graph Sampling Transformer Network for Traffic Flow Forecasting. 1292-1297 - Lin Li, Jinghua Zhu:
Causal Inference for Eliminating Popularity Bias in Session-based Recommendation. 1298-1303 - Kai Chen, Junfeng Yao, Yuanhang Li, Han Zhang, Huabo Shen, Quan Qian, Xing Wu:
GTPCR: Graph-Enhanced Transformer for Point Cloud Registration. 1304-1309 - Xueqi Ren, Xin Chen, Libo Jiao, Xin Dai, Zhe Dong:
Joint optimization of UAV trajectory planning, video cache placement and transcoding in UAV-assisted 6G networks: a PPO-L based approach. 1310-1315 - Ting Chen, Jinghua Chen, Tao Gao, Shukang Zhu, Zongyang Guo, Zixiang Liu, Ziqi Li, Quanzhao Zhao:
A Novel Scene-aware Pedestrian Detection in Dense Scenes. 1316-1321 - Yuanhang Li, Junfeng Yao, Kai Chen, Han Zhang, Xiaodong Sun, Quan Qian, Xing Wu:
A Collaborative Anomaly Localization Method Based on Multi-Modal Images. 1322-1327 - Xin-Wei Yao, Yu-Chen Zhang, Yu-Yi Zhi, Kai-Jie Zhang, Zhi-Heng Yuan:
Decouple and Align Sparse R-CNN for End-to-End Object Detection. 1328-1333 - Zhuoqun Xia, Xiangyu Lei, Shiyu Wang, Zhenzhen Hu:
A Photovoltaic Power Theft Detection Method based on Data-driven Stacking Model. 1334-1339 - Xinlong Qiao, Kaiqi Zhang, Zhiying Tu, Hongwei Wang:
Active Recommendation Strategy Based on Multi-Collaborative Agent. 1340-1345 - Yue Shen, Wanshu Fan, Zhongbin Han, Dongsheng Zhou:
Multi-Level Feature-Guided Network for Few-shot Medical Image Segmentation. 1346-1351 - Chunyu Liu, Jianjun Yu, Qiang Lin:
LIDP: Contrastive Learning of Latent Individual Driving Pattern for Trajectory Prediction. 1352-1357 - Yupeng Zhang, Shunkang Hu, Zenghua Zhao:
A Unified Routing Framework for Resource-Constrained Mobile Ad Hoc Networks. 1358-1363 - Mengjie Xu, Chuanwang Sun:
HLSFNet: Hybrid Long and Short-term collaboration based on Feature extraction for power generation forecasting in China. 1364-1369 - Tie Hua Zhou, Tian Yu Jin, Xi Wei Wang, Ling Wang, Keun Ho Ryu:
Mining Latent Topical Key Phrase from Content to Context in Unrestricted Healthcare Data. 1370-1375 - Shijie Peng, Yanying Lin, Wenyan Chen, Yingfei Tang, Xu Duan, Kejiang Ye:
EINS: Edge-Cloud Deep Model Inference with Network-Efficiency Schedule in Serverless. 1376-1381 - Xiang Li, Congcong Chen, Minyu Teng, Yang Shi:
Blockchain-based Traceable Selective Disclosure Credentials for Self-Sovereign Identity. 1382-1387 - Li-e Wang, Hengtong Chang, Rongwen Wei, Xianxian Li, Zhigang Sun, Yongdong Li, Yi Wei, Linghui Meng:
Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential Recommendations. 1388-1393 - Pinyao He, Jingyue Huang, Ming Li:
Text Keyword Extraction Based on GPT. 1394-1398 - Bin Wen, Xiaofei Xing, Guojun Wang:
RTB-RM: A Blockchainenabled System for Reliable and Transparent CTI Sharing with Multidimensional Reputation Model. 1399-1404 - Xiaoqi Wang, Yifeng Zhao, Haoran Liu, Keyi Cheng, Bo Wang:
Dual-Objective Optimization for MmWave ISAC Systems via Collaborative Beamforming. 1405-1410 - Jin Wang, Liping Wang, Ruiqing Wang:
Multi-granularity Feature Fusion Detection for Encrypted Slow DDoS Attack in SDN. 1411-1416 - Marcos Antonio de Almeida, Jano Moreira de Souza, António Correia, Daniel Schneider:
Exploring Personal Knowledge Ecologies: Dealing with Digital Platform Asymmetries. 1417-1423 - Xiaohao Liu, Hualin Zeng, Wenli Zhang, Long Yang:
Collaborative Denoising Shilling Attack for Recommendation Systems. 1424-1429 - Li Xu, Zejin Yang, Huiting Guo, Xu Wan, Chunlong Fan:
Local Black-box Adversarial Attack based on Random Segmentation Channel. 1437-1442 - Tie Hua Zhou, Ling Wang, Huai Lin Zhao, Fu Tao Ma, Lei Kou:
Dynamic Multi-Indicator Fusion Model for Real-Time Prediction Analysis. 1443-1448 - Li Zhang, Yong-Ai Zheng, Xue-Rui Lv:
Position Attention Mechanism-based Ensemble Network for Trend Prediction of Limit Order Book. 1449-1454 - Tianyou Chang, Shizhan Chen, Guodong Fan, Zhiyong Feng:
A Vision-language Model Based on Prompt Learner for Few-shot Medical Images Diagnosis. 1455-1460 - Xiaofeng Liu, Haibin Zhu, Dongning Liu:
Solving the Energy Supply Strategic Planning Problem by Extended Group Multirole Assignment. 1461-1466 - Hongze Guo, Haibin Zhu, Dongning Liu:
Avoiding Information Leakage in the Formation of Crowdsourcing Teams via Extended Group Multirole Assignment Considering Fairness. 1467-1472 - Houjin Chen, Lvqing Yang, Mulan Yang, Xuehan Hou, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:
Spatio-temporal feature fusion model based on Attention mechanism for RFID indoor positioning. 1473-1478 - Zhixiang Cheng, Haibin Zhu, Dongning Liu:
Solving the External Auditor Assignment Problem via GMRACCF. 1479-1484 - Xuewei Lin, Haibin Zhu, Dongning Liu:
Bus Driver Rostering via Extending Group Multirole Assignment. 1485-1490 - Rui Xia, Lisong Wang, Taili Li, Pingping Shi:
Low Light Enhancement in Street Scenes Based on Diffusion Model. 1491-1496 - Wanchang Jiang, Yuxin Jiang:
ST-T: A Spatio-Temporal Transformer for Φ-OTDR Multi-Location Time Series Classification. 1497-1502 - Yongkang Ding, Rui Mao, Hanyue Zhu, Liyan Zhang:
Improvement of the Clothes-Changing Person Re-identification with Multiple Loss Functions. 1503-1508 - Xinhao Liu, Hao Yang, Qiao Yan:
Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm. 1509-1514 - Haimei Qin, Yaqi Jing, Yunqiang Duan, Lei Jiang:
Mafe: Multi-modal Alignment via Mutual Information Maximum Perspective in Multi-modal Fake News Detection. 1515-1521 - Minghui Hao, Xiaodong Yan, Xinpeng Ouyang:
A Tibetan Text Classification Method Based on Hybrid Model and Channel Attention Mechanism. 1522-1527 - Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Wanshui Song:
Curriculum Learning for Ethereum Phishing Scam Detection. 1528-1533 - Zhizhuo Zhao, Xueping Peng, Yong Li, Hao Wu, Weiyu Zhang, Wenpeng Lu:
Thinking the Importance of Patient's Chief Complaint in TCM Syndrome Differentiation. 1534-1539 - Tengjin Weng, Yang Shen, Zhidong Zhao, Zhiming Cheng, Shuai Wang:
Accurate Segmentation of Optic Disc and Cup from Multiple Pseudo-labels by Noise-aware Learning. 1540-1545 - Wenxuan Zhao, Wei Mi, Xiaodan Zhang:
The Security Paradox of Smart Contracts: Blind Spots and Prospects of Current Detection Strategies. 1546-1551 - Dennis Paulino, Joana Ferreira, António Correia, José Ribeiro, André Netto, João Barroso, Hugo Paredes:
Modelling Aspects of Cognitive Personalization in Microtask Design: Feasibility and Reproducibility Study with Neurodivergent People. 1552-1558 - Zhenyi Fan, Hongbin Zhang, Guangyu Lin, Lianglun Cheng, Zhuowei Wang, Chong Chen:
Hierarchical Multi-Frequency Transform for Sequential Recommendation. 1559-1564 - Yanzhi Zhang, Xiaoming Wu, Xiangzhi Liu, Huomin Dong:
Bidding Management Platform for Cloud-Chain Convergence. 1565-1571 - Yanan Zhang, Chaofan Wu, Rongkun Shi, Yiying Zhang:
A Simple Method to Improve the Performance of Small Pre-trained Language Models on Few-shot Tasks. 1572-1577 - Haitao Xiao, Dan Du, Junrong Liu, Song Liu, Yan Zhu, Yuling Liu, Zhigang Lu:
Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise. 1578-1584 - Haotian Wu, Xin Wang, Ruobing Wang, Ji Xiang, Liyue Ren:
Common Forgery Artifact Driven Deepfake Face Detection. 1585-1590 - Jinhang Chen, Rong Yan:
EMGCN: Enhancement Graph and Multi-head Attention Graph Convolutional Networks for Aspect-based Sentiment Analysis. 1591-1596 - Zeqing Yan, Guangxi Yu, Mengqi Zhan, Yan Zhang, Jiaxi Hu:
5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust. 1597-1602 - Kun Yan, Hao Hu, Gang Xu, Lijie Li, Yanhe Fu, Gaofeng Zhang:
Opportunistic Network Selfish Node Detection Algorithm Based on Credibility Combining Energy and Cache. 1603-1608 - Jialin Liu, Zeyu He, Peng Zhou, Xinyan Su, Jun Li:
A Counterfactual Neural Causal Model for Interactive Recommendation. 1609-1614 - Jingyu Zhang, Yongtao Sun, Zhennan Zhang, Weifeng Ren, Lailong Luo:
A Reputation-Aware Randomization Consensus Algorithm for Performance Optimization in Blockchain Systems. 1615-1620 - Jingyu Zhang, Jiejun Ou, Di Lan, Bojian Ma, Lailong Luo:
InfinityRand: Blockchain Non-Interactive Randomness Beacon Protocol Based on Trapdoor Verifiable Delay Function. 1621-1626 - Xiaobin Zhang, Liangjun Zang, Qianwen Liu, Shuchong Wei, Songlin Hu:
Triple-Based Data Augmentation for Event Temporal Extraction via Reinforcement Learning from Human Feedback. 1627-1632 - Yishuo Li, Zhufeng Shao, Weimin Chen, Shoujin Wang, Yuehan Du, Wenpeng Lu:
Significance-aware Medication Recommendation with Medication Representation Learning. 1633-1638 - Li Zhang, Yue-Feng Li, Yu Zhang:
SIDF: A Desensitization Framework for Sensitive Information in Chinese Medical Report Images. 1639-1644 - Lingfeng Yao, Anran Hou, Weina Niu, Qingjun Yuan, Junpeng He, Yanfeng Zhang:
Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data. 1645-1650 - Yunpeng Gao, Tinglong Tang, Shuifa Sun, Yirong Wu, Peng Wang:
Digital Twin-Based Office Equipment Management and Personnel Detection System. 1651-1656 - Shiqiao Huang, Weiwen Zhang, Nankai Lin, Mianshen Xu:
GPF: Generative Prediction Fusion for Multi-Label Emotion Classification. 1657-1662 - Tinglong Tang, Yongjie Wu, Shuifa Sun, Yirong Wu:
Campus intelligent decision system based on digital twin. 1663-1668 - Jianli Ding, Yanan Yan, Jing Wang:
Multi-fusion algorithm root cause location model based on causal failure dependency graph. 1669-1674 - Wenjun Zhou, Yao Liu, Nan Wang, Yifan Wang, Bo Peng:
CoSiNet: Dual-Branch Collaborative Siamese Network for Visual Object Tracking. 1675-1680 - Bin Dai, Yuan Qiu, Weikun Feng:
Scalable Computation Offloading for Industrial IoTs via Distributed Deep Reinforcement Learning. 1681-1686 - Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. 1687-1694 - Jiabin Pei, Xiaoming Wu, Xiangzhi Liu:
YOLO-RDD: A road defect detection algorithm based on YOLO. 1695-1703 - Wanchang Jiang, Congcong Yan:
High-accuracy classification method of vibration sensing events in φ-OTDR system based on Vision Transformer. 1704-1709 - Qingzhi Zou, Jing Zhao, Ming Li, Ling Chen, Lin Yuan, Ronghuan Zhang, Yushuai Hu:
Medical Image Segmentation Use Convolutional Attention Augmentation TransUNet with Skip Connection Enhancement. 1710-1715 - Zimu Wang, Wei Wang, Qi Chen, Qiufeng Wang, Anh Nguyen:
Generating Valid and Natural Adversarial Examples with Large Language Models. 1716-1721 - Lihao Wang, Junwei Zhou, Dongdong Zhao, Dongqing Liao, Mengjie Wang, Jianwen Xiang:
AEDD: Anomaly Edge Detection Defense for Visual Recognition in Autonomous Vehicle Systems. 1722-1727 - Yushuai Hu, Jing Zhao, Ming Li, Lin Yuan, Qingzhi Zou, Ronghuan Zhang:
Hybrid Deep Relation Matrix Bidirectional Approach for Relational Triple Extraction. 1728-1733 - Lingling Lv, Chunjiang Zhang, Weiming Shen:
A Deep Reinforcement Learning-based Rescheduling Method for Flexible Job Shops under Machine Breakdowns. 1734-1739 - Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng:
Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments. 1740-1745 - Junrong Du, Zimeng Fan, Lei Song, Xuanang Gui, Lili Guo, Xuzhi Li:
A fine-tuning framework for cross-domain RUL prediction based on relevant health indicators. 1746-1751 - Kun Yan, Hao Hu, Gang Xu, Yuqi Wang, Gaofeng Zhang, Lijie Li:
Selfish node filtering algorithm based on opportunity network. 1752-1757 - Shuwei Wang, Xiao Chen, Molan Long, Qiuyun Wang, Rongqi Jing, Zhengwei Jiang:
A Novel Detection System for Multi-Architecture IoT Malware. 1758-1763 - Shuo Yan, Jiaxi Wang, Ji Liang:
Big Data Storage and Analysis System for Space Application. 1764-1769 - Chen Ling, Bin Liu, Wei Xia, Shuangze He, Zhengwei Jiang, Qiuyun Wang:
Automated Anti-malware Detection Rules Converter Based on SIMIOC. 1770-1775 - Lei Wang, Qi Xu, Jingya Wen, Qiushi Zhang, Shiyuan Wang, Bin Li:
Distributed Trusted Authentication Method for Smart Grid Distribution Terminals. 1776-1781 - Chenyun Yu, Zihao Wang, Ye Zheng, Liankai Cai:
TinyCMR: A Lightweight Learning Framework for Efficient Cross-Modal Retrieval. 1782-1788 - Zuxu Pei, Tian Song, Chao Wu, Shuye Yue, Yan Li, Xiangtao Hu:
Cross-timestep Fault Prediction with Imbalanced Data for Optical Modules in Internet Data Centers. 1789-1794 - Haichao Fu, Liangjun Zang, Baojie Tian, Songlin Hu:
MT-MNA: Multiple Network Alignment with Absent Priori Annotation. 1794-1799 - Kun Liu, Linfeng Liu:
Cascaded Multi-level Features Fusion Network using Collaborative Training for Snow Removal. 1795-1800 - Bo Cui, Zhen Yang:
FAT: Tilted Federated Learning with Alternating Direction Method of Multipliers. 1801-1806 - Yunong Zhang, Jiaming Zhou:
Uniform-Distribution (UD) Based Time Intervals of GRC (Global Reserve Currency) Transition Year Predicted Narrowly as [2024, 2040] and Generally [2k00, 2k50]. 1807-1813 - Chenyi Liang, Zhibin Gao, Bo Wang, Keyi Cheng, Yifeng Zhao:
QECLO: A Novel QoS-Aware Joint Optimization of Energy and Latency for VFC Task Offloading. 1814-1819 - Lishuo Ye, Zhixue He:
Time Series Anomaly Detection Methods Incorporating Wavelet Decomposition and Temporal Decoupled Autoencoder. 1820-1825 - Sibo Wei, Xueping Peng, Hongjiao Guan, Lina Geng, Ping Jian, Hao Wu, Wenpeng Lu:
Multi-view Contrastive Learning for Medical Question Summarization. 1826-1831 - Zhaohua Zheng, Yiming Hong, Keqiu Li, Qiquan Chen:
An Incentive Mechanism Based on AoU, Data Quality, and Data Quantity for Federated Learning. 1832-1837 - Wantong Du, Wanli Min, Yushui Geng, Hu Liang, Hehu Zhou:
Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic Algorithm. 1838-1844 - Caijie Guo, Yan Tang, Xiaobing Li, Peihao Ding:
Automated Test Case Generation Based on Path Structure Matrix and Mainfold-Inspired Search. 1845-1851 - Bo Cui, Guoqing Wang:
Ponzi Scheme Detection Based on CNN and BiGRU combined with Attention Mechanism. 1852-1857 - Jizhe Yu, Yu Liu, Hongkui Wei, Kaiping Xu:
Towards More Accurate Tiny Object Tracking: Benchmark and Algorithm. 1858-1863 - Hui Zhang, Zhonghua Miao, Quanke Pan:
A Learning-Based Discrete Jaya Algorithm for Multiobjective Sustainable Distributed Blocking Flow Shop Scheduling Problem with Heterogeneous Factories. 1864-1869 - Bo Zhu, Li Jia, Jianfang Li:
A Hybrid Estimation of Distribution Algorithm with Monarch Butterfly Optimization. 1870-1875 - Xiaosong Xue, Wei Pan, Fang Yan, Na Li:
End-to-end intelligent MCS selection algorithm. 1876-1880 - Yujie Zhang, Peng Li, Weibei Fan, Ruchuan Wang:
QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor Networks. 1881-1886 - Jinhui Yu, Caidan Zhao, Xiangyu Huang, Yicheng Zheng:
RF Fingerprint Recognition for Different Receiving Devices Using Transfer Learning. 1887-1892 - Tianhong Wang, Yue Teng, Chunjiang Zhang, Yiping Gao, Xinyu Li:
A Hybrid Genetic Algorithm for Flexible Job Shop Scheduling Problem with Batch Processing Machines. 1893-1898 - Xinpeng Lu, Heng Song, Huailing Ma, Xueqing Li, Junwu Zhu:
Research on Bandwidth-Oriented Distributed Task Allocation Mechanism for Multi-UAV. 1899-1904 - Haiyang Zhang, Zhiwei Huo, Caixia Liu, Yingyan Wu, Xiran Zhang:
A Lightweight Model for Detecting Dangerous Driving Behaviors in Road Transportation. 1905-1910 - Yitong Li, Tianyang Xiong, Shangwei Huang, Zida Han, Qingfeng Wu:
Collaborating Smartwatches and HMDs to Enhance User Perception for Touch Manipulation in XR. 1911-1916 - Anbin Xie, Fuqing Zhu, Jizhong Han, Songlin Hu:
Integrating Open-domain Knowledge via Large Language Model for Multimodal Fake News Detection. 1917-1922 - Yong Wang, Wei Zhang, Daifeng Zhang, Yanqiang Li, Dongbing Zhang:
Research on key scene trajectory generation method based on BLA-VAE. 1923-1930 - Abdul Rasheed Mahesar, Xiaoping Li, Dileep Kumar Sajnani, Kamran Yaseen Rajput:
Efficient Workflow Scheduling and Cost Optimization for Deadline-Constrained Microservice Applications in Mobile Edge Computing. 1931-1936 - Yiwen Li, Zhenyu Yang, Zhijun Li, Xiaoyang Li:
HGTA: News Recommendation Based on Hierarchical Granular Semantic Embeddings and Threshold Attention. 1937-1943 - Zhijun Li, Zhenyu Yang, Yiwen Li, Xiaoyang Li:
Opinion-Tree-guided Contrastive Learning for Aspect Sentiment Quadruple Prediction. 1944-1951 - Yiwen Li, Zhenyu Yang, Xiaoyang Li, Zhijun Li:
CAFI: News Recommendation with Candidate Perception of Fine-Grained Interaction Information. 1952-1959 - Xiaoyang Li, Zhenyu Yang, Yiwen Li, Zhijun Li:
Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in Conversation. 1960-1967 - Li Xu, Huiting Guo, Zejin Yang, Xu Wan, Chunlong Fan:
Improving Adversarial Robustness by Reconstructing Interclass Relationships. 1968-1973 - Zhen Gao, Liyou Wang, Jingning Xu, Hongfei Fan, Rongjie Yu:
Robust Hazardous Driving Scenario Detection for Supporting Autonomous Vehicles in Edge-Cloud Collaborative Environments. 1980-1985 - Yuchen Guo, Xi Wang, Xiaomeng Fu, Jin Liu, Zhaoxing Li, Yesheng Chai, Jizhong Han:
Generative Transferable Universal Adversarial Perturbation for Combating Deepfakes. 1986-1991 - Jiajun Zhang, Geping Yang, Yiyang Yang, Juan Lu:
QFINCH: Quick hierarchical clustering using k-means and first neighbor relations. 1992-1997 - Yiqi Wu, Xuan Huang, Kelin Song, Fazhi He, Dejun Zhang:
3D Contour Generation based on Diffusion Probabilistic Models. 1998-2003 - Shizhao Tian, Zhen Wang, Kaiyu Xie, Fansong Chen, Hongsong Zhu:
Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT. 2004-2009 - Haotian Wu, Yu Chen, Xin Wang, Lin Wang, Ji Xiang, Liyue Ren:
DST-FRD: A Distillation Method of Swin Transformer for Facial Reenactment Detection. 2010-2015 - Zinuo Zhang, Ruoting Xiong, Xinyu Di, Wei Ren:
CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity. 2016-2021 - Mei Ni, Yin Sheng, Lipeng Chen, Mengmeng Zhang:
A Task Selection Approach for Multiple Unmanned Aerial Vehicles. 2022-2027 - Xuanyan Liu, Jinling He, Hu Song, Xinyun Cheng, Luyun Hu, Xiaolong Xu:
Anomaly detection and traceback scheme for cloud-edge networks. 2028-2033 - Yufei Gao, Zhe Chen, Lei Shi, QingXian Wang, Yameng Zhang:
MedMatch: Design of Semi-supervised learning Model with Curriculum Pseudo-Labels for Medical Image Classification. 2034-2039 - Chentong Zhao, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, Jiangang Ma:
EntityParser: A Log Analytics Parser for Identifying Entities from System Logs. 2040-2045 - Yufei Han, Haoyuan Chen, Linwei Yao, Kuan Li, Jianping Yin:
MAT-VIT: A Vision Transformer with MAE-Based Self-Supervised Auxiliary Task for Medical Image Classification. 2046-2052 - Yongxin Chen, Wenhan Hou, Xin Zhang, Ru Li:
Ethereum Phishing Scams Detection Based on Graph Contrastive Learning with Augmentations. 2053-2058 - Liutao Zhao, Lin Zhong, Yujue Wang, Jiawan Zhang:
A Batch Payment Scheme with Denomination Privacy. 2059-2065 - Shukai Liu, Danyi Chen, Fei Teng, Changqing Yin, Huijuan Zhang:
Few-Shot Learning for Hyperspectral Imaging via Spectral-Spatial Feature Reconstruction. 2066-2071 - Qianqian Lu, Shilong Li, Kun Li, Wei Zhou, Liangjun Zang:
Adaptive Mixture of Domain-aware Experts for Detecting Social Bots. 2072-2077 - Kangkang Liu, Ningjiang Chen:
PTQ-SO: A Scale Optimization-based Approach for Post-training Quantization of Edge Computing. 2078-2083 - Jinquan Zhang, Xiaoping Li, Kamran Yaseen Rajput, Long Chen:
Reinforcement Learning Based Memory Configuration for Linear Dynamic Function Chains. 2084-2089 - Huanqing Cui, Silin Lv:
TLGPA: Two-Level Graph Partitioning Algorithm under Multi-Machine Multi-Card System. 2090-2095 - Zhi Chen, Cuifeng Du, Yuyu Zhou, Haoxuan Guan, Xiujie Huang, Zhefu Li, Changjiang Liu, Xiaotian Zhuang, Xingyu Zhu, Quanlong Guan:
YTCNet: A Real-time Algorithm for Parcel Damage Detection with Rich Features and Attention. 2096-2101 - Yun Deng, Haihua Tang:
Blockchain-based Anonymous Authentication Key Management for Mobile Edge Computing. 2102-2109 - Hui Zhao, Xiaodong Zhang, Jinshan Shi, Ru Li:
Data Lineage Construction Method for Multi-Chain-Based Data Assets Marketplaces. 2110-2115 - Zixuan Chen, Chao Zheng, Zhao Li, Jinqiao Shi, Zeyu Li:
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion. 2116-2121 - Jiaqi Wang, Tao Sun, Wenjie Zhong, Ziyu Wang, Yefan Zhang:
Research on Java Automatic Simplified Modeling Based on Source Code Dependency Analysis. 2122-2127 - Lipan Chen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Huiyong Wang:
Blockchain-based UAV-assisted Forest Fire Detection and Monitoring System. 2128-2133 - Geng Zhang, Hong Lai:
QTN-MLP: Quantum Tensor Network-enhanced MLP for Medical Image Classification. 2134-2139 - Dongbing Zhang, Zihui Zhang, Yanqiang Li, Yong Wang, Wei Zhang, Yunhai Zhu:
An NSGA-II-based multi-objective trajectory planning method for autonomous driving. 2140-2146 - Menghua Jiang, Yin Chen:
RASLite: Enhancing (W)PMS Solvers Through Dynamic Initial Weight Approach. 2147-2152 - Xuanli Liu, Mengjie Lv, Weibei Fan, Xueli Sun, Zhenjiang Dong, Fu Xiao:
Reliability of Half Hypercube Networks under Cluster Faults. 2153-2158 - Jingman Pei, Mengjie Lv, Weibei Fan, Xueli Sun, Xin He, Fu Xiao:
A protection routing with secure mechanism in the data center network WaveCube. 2159-2164 - Xiong Zhang, Cheng Xie:
Distill Graph Structure Knowledge from Masked Graph Autoencoders into MLP. 2165-2172 - Ningtao Ma, Ru Yi, Mingyang Sun, Liangyu Ruan:
Single Image Haze Removal Using Haze Color Prior. 2173-2178 - Jiawei Huang, Hanyu Deng, Zhaoyi Li, Yijun Li, Jingling Liu, Xiaojun Zhu, Qichen Su:
A Conditional Diffusion-based Data Augmentation for Anomaly Detection in AIOps. 2179-2184 - Jinqing Li, Qi Qi, Ni Li, Yibo Han:
Robust modeling of the multi-depot vehicle routing problem under uncertain demands. 2185-2190 - Lin Shi, Yushi Li, Yu Han, Jia Wang, Fangyu Wu, Chenke Yin, Haichao Zhang:
Two-branch Network with Feature Fusion for Time Since Deposition Estimation of Bloodstains. 2191-2196 - Ruisheng Wang, Weiwen Zhang:
Taming the Low-Quality Path for Reinforcement Learning-Based Knowledge Graph Reasoning. 2197-2202 - Yifei Zeng, Kai Zhao, Fangchao Yu, Bo Zeng, Zhi Pang, Lina Wang:
FedGR: Genetic Algorithm and Relay Strategy Based Federated Learning. 2203-2208 - Xiaoyong Tang, Xiangyu Yang, Wenzheng Liu, Tan Deng, Ronghui Cao, Zeyuan Tu, XingJiang Hu:
RFR-ABROF: A Multi-Strategy Collaborative Classification Prediction Model Based on Rotation Forest for PM2.5. 2209-2214 - Mingyang Sun, Ru Yi, Xinxin Wang, Ningtao Ma:
Enhancing Low-Light Images: A Novel Approach Combining Anisotropic Diffusion and Retinex. 2215-2220 - Yutian Shi, Beilun Wang:
A Privacy-Preserving Method for Sequential Recommendation in Vertical Federated Learning. 2221-2226 - Yun Deng, Haihua Tang:
A Privacy Protection Task Offloading Algorithm in MEC. 2227-2233 - Xinxin Wang, Ru Yi, Mingyang Sun, Zhaozheng Zhang:
Low-light Image Enhancement Algorithm Based on Improved Multi-scale Retinex with Adaptive Brightness Compensation. 2234-2239 - Liang Li, Yuanhui He, Feiyang Huang, Ziming Zhao, Zhuoxue Song, Tong Zhou, Zhenyuan Li, Fan Zhang:
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events. 2240-2245 - Mengqi Du, Yue Zhang, Jianhua Zhang, Honghai Liu:
CRED: A Corneal Reflection and Environment Dataset. 2246-2251 - Yu Wan, Yue Jiang, Weiheng Zheng, Xiangwei Zhao:
Study of Biopharmaceutical Quality Supervision System Based on IoT and Big Data. 2252-2257 - Bing Liu, Weizheng Cheng, Shiqiang Hu, Lingkun Luo:
Application of Network Slicing in UAV Ground Communication Systems. 2258-2263 - Meng Lin, Qinghao Huang, Qianqian Lu, Xianjing Guo, Tao Guo:
Attribute-enhanced Selection of Proper Demonstrations for Harmful Meme Detection. 2264-2269 - Chunwen Liu, Hongchen Yu, Juxin Xiao, Feng Dai, Jie Yin:
STE-PFL: Spatial-Temporal Enhanced Personalized Federated Learning for IoT Cross-Domain Access Decision-Making. 2270-2275 - Huiting Li, Weiyu Zhang, Yong Shang, Wenpeng Lu:
Collaborative Prediction of Drug-target Interaction using Sequence-based CNN and Transformer. 2276-2281 - Jehad Ibrahim, Yanli Li, Huaming Chen, Dong Yuan:
Holistic Evaluation Metrics for Federated Learning. 2282-2287 - Lin Wei, Shihao Zhang, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He:
Workflow task offloading mechanism based on A3C under computing network integration. 2288-2294 - Lin Wei, Jinyang Li, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He:
Resource matching algorithm based on multidimensional computing resource measurement in computing power network. 2295-2300 - Zhuoqun Xia, Shiyu Wang, Jingjing Tan, Zhenzhen Hu:
Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy. 2301-2306 - Baoshou Li, Yu He, Ge Yu:
TacWgan-gp: Fabric Texture-Based Tactile Friction Coefficient Generation. 2307-2312 - Huachuan Qiu, Shuai Zhang, Hongliang He, Anqi Li, Zhenzhong Lan:
Facilitating Pornographic Text Detection for Open-Domain Dialogue Systems via Knowledge Distillation of Large Language Models. 2313-2318 - Jian Song, Xiang Li, Zhenqiang Zhang, Zhigang Zhao, Chunxiao Wang, Shunfang Wu, Suiping Qi, Jialiang Lv:
A Predictive Framework for Shipborne Wind Speed Measurement Correction Based on Self-Supervised Contrastive Learning. 2319-2324 - Hongyun Cai, Meiling Zhang, Shiyun Wang, Ao Zhao, Yu Zhang:
PLFa-FL: Personalized Local Differential Privacy for Fair Federated Learning. 2325-2332 - Peng Wu, Libo Feng, Junhong Liu, Zehui Yuan, Yaqi Zhou, Xian Deng, Zhixing Zhang, Jiale Xie, Fake Fang:
A Cross-Chain Privacy Protection and Key Sharing Scheme Based on Relay Chain. 2333-2338 - Chun Yang, Gang Shi, Yu Wen, Xinqiang Zhao:
ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models. 2339-2344 - Xian Deng, Junhong Liu, Peng Wu, Jiaying Zhang, Zehui Yuan, Fake Fang, Jiale Xie, Libo Feng:
A TDE-based Multi-node Data Categorized Transfer Storage Scheme in Consortium Blockchain. 2345-2350 - Junhong Liu, Libo Feng, Xian Deng, Xianchi Gao, Fake Fang, Zehui Yuan, Jiale Xie, Peng Wu, Zhixing Zhang:
CMSCEF: A Cross-chain Mechanism based on Smart Contract Execution Framework. 2351-2356 - Quanlong Guan, Jinneng He, Zhao-Rong Lai, Yuyu Zhou, Quming Jiang, Ziliang Chen:
Short-term Portfolio Optimization using Doubly Regularized Exponential Growth Rate. 2357-2362 - Yuqian Zhuang, Mingya Zhang, Yiyuan Yang, Liang Wang:
Analyzing Women's Contributions to Open-Source Software Projects based on Large Language Models. 2363-2368 - Hang Pu, Yongsheng Fan, Yunjia Han, Qian Su:
Enhancing Ensemble Attacks through Momentum Self-Maintenance. 2369-2374 - Shuai Ding, Yuepeng E, Jiye Zhang, Liangxiong Li, Lei Zhang, Jingguo Ge:
Trace Anomaly Detection for Microservice Systems via Graph-based Semi-supervised Learning. 2375-2380 - Yunkun Cheng, Xiankun Zhang, Fufeng Liu, Danyang Zhao, Xin Luo:
PromoterDiff: De Novo Design Approach for Escherichia coli Promoters Based on a Diffusion Model. 2381-2387 - Wangqing Wu, Jiale Gong:
Imporved on Qiu's shemes to resist long-term observation attacks with semantic attributes of location. 2388-2393 - Fake Fang, Libo Feng, Jiale Xie, Junhong Liu, Zehui Yuan, Xian Deng, Peng Wu, Peiyin Luo, Yifan Liu:
BCFL: A Trustworthy and Efficient Federated Learning Framework Based on Blockchain In IoT. 2394-2399 - Fengchun Zhang, Liheng Jiang, Juan Chen:
ETPAM: An Efficient Task Pre-Assignment and Migration Algorithm in Heterogeneous Edge-Cloud Computing Environments. 2400-2405 - Zhuoqun Xia, Kai Lin, Jingjing Tan, Zhenzhen Hu:
Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems. 2406-2411 - Shaojie Ma, Cairui She, Gang Shi:
Implementing Fuzz-Based Technology for Detecting Spectre-Style Vulnerabilities. 2412-2417 - Tianyang Li, Hongbin Yan, Yuxin Jiang:
Attention Mixture based Multi-scale Transformer for Multi-behavior Sequential Recommendation. 2418-2423 - Rui Zhu, Yidan Yan, Jiayao Li, Ruizhi Sun:
A Multimodal Fusion Generation Network for High-quality MR Image Synthesis. 2424-2429 - Tianyang Li, Hongbin Yan, Hanwen Xu:
Decision Transformer based Target-aware Feature Selection Network for Behavior-oriented Recommendation. 2430-2435 - Tianyue Chen, Xiaojin Chen, Yongqiang Qian, Lang Zheng, Haiyang Li, Jingbo Zhao, Yaojun Wang:
AgriPrompt: A Method to Enhance ChatGPT for Agricultural Question Answering. 2436-2441 - Jiale Xie, Libo Feng, Fake Fang, Zehui Yuan, Xian Deng, Junhong Liu, Peng Wu, Zhuo Li:
A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT. 2442-2447 - Li-e Wang, Rongwen Wei, Hengtong Chang, Xianxian Li, Zhigang Sun, Tianran Liu:
Multi-perspective Information and Multi-task Contrastive Learning for Sequential Recommendations. 2448-2453 - Changsong Yang, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, Ruwen Zhao:
A new SM2-based ring signature scheme with revocability and anonymity. 2454-2459 - Yao Pan, Weibei Fan, Mengjie Lv, Xin He, Fu Xiao:
Node-disjoint Paths Construction Algorithm in Data Center Network EHDC. 2460-2465 - Yefan Zhang, Tao Sun, Wenjie Zhong, Jiaqi Wang, Ziyu Wang:
A TCPN Automatically Modeling Method for Java Parallel Programs Oriented to Performance Analysis. 2466-2471 - Xiao Dong, Xiaojun Zheng, Yaning Song:
Knowledge Graph-based Optimization of Multi-AGV Cooperative Handling in Flexible Workshops. 2472-2477 - Kexian Tang, Shuyu Wang, Hao Yang, Huilin Lai, Jingyi Sun, Ye Luo:
Reliable Cosine Matching via Neighborhood Consensus for Fundus Image Registration. 2478-2483 - Tieming Chen, Xiaoyang Tian, Yinglong Li, Qingyan Jiang, Zechen Liu:
FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets. 2484-2490 - Qianru Shen, Hailun Lin, Huan Liu, Zheng Lin, Weiping Wang:
Watch and Read! A Visual Relation-Aware and Textual Evidence Enhanced Model for Multimodal Relation Extraction. 2491-2496 - Lingjie Pei, Li Pan, Shijun Liu:
An Improved Genetic Optimization Algorithm for Scheduling Serverless Application Jobs in Public Cloud Environments. 2497-2502 - Yiqing Liu, Li Pan, Shijun Liu:
Q-scheduler: Optimize Job Scheduling in Hadoop with Reinforcement Learning. 2503-2508 - Tie Hua Zhou, Wanlin Zhang, Wei Ding, Yuan Li, Ling Wang:
Deep Semantic Context Analysis Based on Adaptive Knowledge Graph Construction for Artificial Intelligence Domain. 2509-2514 - Chengbin Zheng, Zhicheng Yang, Yang Lu:
GMAE: Representation Learning on Graph via Masked Graph Autoencoders. 2515-2521 - Lingxiang Meng, Rongrong Xi, Ziang Li, Hongsong Zhu:
PG-AID: An Anomaly-based Intrusion Detection Method Using Provenance Graph. 2522-2527 - Xiaoyu Wang, Yu He, Meng Zhao:
Realistic Grasping Based on Soft Finger Force Interaction. 2528-2533 - Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang, Feng Liu:
CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction. 2534-2540 - Zhuo Wang, Hongtu Zhang, Jingdong Guo, Laile Xi, Sidy Tambadou, Fang Zuo, Hong Li, Yan Hu:
Precise and Efficient Third-party Java Libraries Identification Tool for Collaborative Software. 2541-2546 - Yuanshun Huang, Guihua Duan:
A Privacy-Preserving Decision Tree Evaluation Scheme for Multiple Wearable Devices. 2547-2552 - Baojie Tian, Liangjun Zang, Jizhong Han, Songlin Hu:
Capture Long-Range Dependency with Meta-Path Transformer for De-Anonymization of Q&A Sites. 2553-2558 - Ye Liu, Yan Pan, Jian Yin:
Deep Hashing with Triplet Loss of Hash Centers and Dissimilar Pairs for Image Retrieval. 2559-2564 - Yuechen Zhang, Aimin Li, Xiaotong Kong, Wenqiang Li, Zhiyao Li:
FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5. 2565-2570 - Shiyue Huang, Yuchen Su, Hongbo Liu, Huan Dai, Bo Liu:
Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables. 2571-2576 - Jifei Wen, Jingguo Ge, Zheyuan Zhang, Hui Li, Yuepeng E, Bingzhen Wu:
A time-sensitive cloud-native network based on eBPF. 2577-2582 - Felipe Ortúzar, Pedro O. Rossel, Francisco J. Gutierrez:
A Reference Architecture to Support the Collaborative Development of Virtual Reality Exposure Therapy Software. 2583-2588 - Haonan Yang, Shengsheng Yan, Bolei Chen, Ping Zhong, Yongzheng Cui, Yu Sheng:
Robot Autonomous Exploration System Base on Arm-Chassis Collaboration. 2589-2594 - Yufei Gao, Shuxi Li, Jing Xu, Zixing Ma, Mengyang He, Yameng Zhang:
MLPSeg: Incorporating Multi-Local Perception with Context Cross Attention Based Transformer for Nuclei Segmentation. 2595-2600 - Enze Zhao, Peng Li, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao, Qin Liu, Kai Zhang:
Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection. 2601-2606 - Jinli Zhang, Xutong Wang, Ningjun Zheng, Kezhen Huang, Yun Feng, Xiang Cui:
XShellGNN: Cross-file Web Shell Detection Based on Graph Neural Network. 2607-2613 - Xuwen Shang, Jue Zhang, Xingguo Jiang, Hong Luo:
Anomaly Detection for Multivariate Time Series Based on Contrastive Learning and Autoformer. 2614-2619 - Xin Qin, Pengshuai Yao, Mengna Liu, Xu Cheng, Fan Shi, Lili Guo:
Robust Classification of Incomplete Time Series with Noisy Labels. 2620-2625 - Cheng Li, Jiaqi Wu, Feng Yuan, Yuqing Sun:
Promoting Named Entity Recognition with External Discriminator. 2626-2631 - Zhixiong Liu, Fang Liu, Mohan Zhang:
Intelligent Graphic Layout Generation: Current Status and Future Perspectives. 2632-2637 - Bingzheng Huang, Chengxin Ni, Junjie Song, Yifan Yin, Ningjiang Chen:
Collaborative Multi-Teacher Distillation for Multi-Task Fault Detection in Power Distribution Grid. 2638-2643 - Chuang Li, Dongdong Huo, Sixiang Wang, Yaoyi Deng, Qihui Zhou, Yu Wang:
A deep learning based detection scheme towards DDos Attack in permissioned blockchains. 2644-2649 - Xiang Wang, Yuanyu Wang, Yu Dai, Chi Wei, Yuliang Tang:
UDTL: Anomaly Detection Based on Unsupervised Deep Transfer Learning. 2650-2655 - Xu Yang, Kun Zhang, Xia Hao Jun, Tu Bibo, Li Chen:
CloudFusion: Multi-Source Intrusion Detection in Cloud Environments. 2656-2661 - Ming Jiang, Shuo Zhang, Feng Zhang, Biao Guo, Yun Li:
A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis. 2662-2667 - Xuanhui Liu, Yifeng Zhao, Xiaoqi Wang, Bo Wang, Keyi Cheng:
Intelligent Convergence: Advancing 6G mmWave Networks with RIS-Enhanced ISAC for IoT Applications. 2668-2673 - Guangshun Li, Xueli Gao, Junhua Wu:
Blockchain-Based Device Reputation Assessment in the Industrial Internet of Things. 2674-2679 - Yang Xu, Chen Li, Kun Zhang, Haojun Xia, Bibo Tu:
EI-XIDS: An explainable intrusion detection system based on integration framework. 2680-2685 - Zhihong Wei, Jianshu Qin, Bangmao Li:
Fine-Grained Skeleton-Based Human Action Recognition for Figure Skating. 2686-2691 - Liutao Zhao, Haoran Xie, Lin Zhong, Yujue Wang:
Multi-Server Verifiable Aggregation for Federated Learning in Securing Industrial IoT. 2692-2697 - Yi Yu, Dongsheng Zou, Xinyi Song, Yuming Yang, Kang Xi:
MRC-FEE: Machine Reading Comprehension for Chinese Financial Event Extraction. 2698-2703 - Xuechen Chen, Jiaxuan Yi, Aixiang Wang, Xiaoheng Deng:
Wi-Fi fingerprint based indoor localization using few shot regression. 2704-2709 - Zixuan Wang, Ke Ma, Hongwei Wang:
Noise-Robust Neural Network For Wind Turbine Gearbox Fault Diagnosis. 2710-2715 - Zhengyu Hou, Ning Li, Wuyungerile Li, Ruihong Wang, Fei Gao, Bing Jia:
Research on the data stacking problem of energy-based packet prioritization in EH-WSN. 2716-2721 - Gongzhuang Peng, Ningyi Wang, Xuejun Zhang, Dong Xu:
Multimodal Knowledge Graph-Enabled Steel Product Development. 2722-2727 - Yang Liu, Xiaohui Han, Wenbo Zuo, Haiqing Lv, Jing Guo:
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence. 2728-2733 - Dexu Yao, Aimin Li, Deqi Liu, Mengfan Cheng:
DM-YOLOv5: An Improved Safety Helmet Detection Algorithm at Complex Construction Scenes. 2734-2739 - Chaofeng Yang, Zhiheng Zhao, Hankiz Yilahun, Askar Hamdulla:
Source Free Domain Adaptation via Adapting to the Enhanced Style. 2740-2745 - Zhijun Cheng, Zhuoting Wu, Zhuopan Yang, Zhenguo Yang, Xiaoping Li, Wenyin Liu:
Reinforced Perturbation Generation for Adversarial Text-based CAPTCHA. 2746-2751 - Kamran Yaseen Rajput, Xiaoping Li, Abdullah Lakhan, Jinquan Zhang, Abdul Rasheed Mahesar, Dileep Kumar Sajnani:
Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance Uncertainty. 2752-2757 - Shaohui Jin, Yayong Zhao, Hao Liu, Jiaqi Wu, Zhenjie Yu, Mingliang Xu:
Non-Line-of-Sight Long-Wave Infrared Imaging based on Nestformer. 2758-2763 - You Chen, Hua Dai, Mingfeng Jiang, Qu Lu, Pengyue Li, Bohan Li, Geng Yang:
KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects. 2764-2769 - Yuhan Liao, Fang Liu, Lin Lin, Mingbo Hou, Yingying She, Hang Wu, Bin Hu, Qingqiang Wu:
iCCBT, an Interactive Approach of CBT for Online Psychological Intervention. 2770-2775 - Junwei Tang, Sijie Zhou, Ping Zhu, Tao Peng, Ruhan He, Xinrong Hu, Changzheng Liu:
AT-I-FGSM: A novel adversarial CAPTCHA generation method based on gradient adaptive truncation. 2776-2781 - Qiumin Yang, Chaokun Zhang, Tao Tang, Jingshun Du:
Dual-Agent Based Collaborative Audio-Video Adaptive Bitrate Strategy under Commuting. 2782-2787 - Yitan Huang, Jian Qin, Zelin Cui, Ning Li, Bo Jiang, Zhigang Lu:
HBGraph: a Host Behavior Graph Model for C&C Traffic Detection. 2788-2793 - Jie Yan, Meng Zhao, Yong Ding, Hai Liang, Changsong Yang, Yujue Wang:
Verifiable and Privacy-Preserving Online Diagnosis Based on Multiclass SVM and CKKS Leveled Homomorphic Encryption. 2794-2799 - Ziyu Wang, Tao Sun, Wenjie Zhong, Yefan Zhang, Jiaqi Wang:
Simplification Method of CPN Model Based on Data Abstraction. 2800-2805 - Haojun Xia, Hongwei Liu, Da Zhang, Haohao Liu, Xiaotong Wang, Bibo Tu:
Continuous Authentication Technology Based on Device Driver Behavior. 2806-2811 - Wang Chen, Xiaocong Wang, Chengjia Yu, Yukun Liang:
The Fuzzy Analytic Hierarchy Process for Evaluating the Effectiveness of Manned and Unmanned Collaborative Combat. 2812-2815 - Donghao Wang, Tengjiang Wang, Hao Qi, Shijun Liu, Li Pan:
Research on Multi-Model Fusion for Multi-Indicator Collaborative Anomaly Prediction in IoT Devices. 2816-2821 - Weiliang Zeng, Yushi Li, Rong Chen, Rong Xiang, Yunzhe Wang, Jinghang Gu:
MGE-Net: Task-oriented Point Cloud Sampling based on Multi-scale Geometry Estimation. 2822-2827 - Wenxuan Lu, Zhuohang Lv, Lanqi Yang, Xiang Luo, Tianning Zang:
Efficiently Adapting Traffic Pre-trained Models for Encrypted Traffic Classification. 2828-2833 - Haizhou Du, Ming Li:
FlowSeer: A Novel Framework for Generalized Network Performance Estimation at Flow Level. 2834-2839 - Danyi Chen, Weinian Cao, Shengxiang Rao, Lijun Luo:
Eight-neighborhood sparse contour extraction in binary images. 2840-2845 - Wei Zheng, Yuqing Sun, Yexin Zhang, Bin Gong:
Integrating User Rules into Neural Text Inference. 2846-2851 - Zhenchao Chen, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu, Qingkai Wang:
RFID-Based Indoor Human Behavior Recognition Using SATCN: A Self-Attention Enhanced Temporal Convolutional Network. 2852-2857 - Qian Yang, Jiankai Wang, Kai Chen, Hongjia Li, Haihua Gao, Zhen Xu:
A Secure Blockchain-based Reputation Scheme for Data Offloading in Edge Computing. 2858-2863 - Qu Wang, Hao Wu:
Dynamically Weighted Directed Network Link Prediction Using Tensor Ring Decomposition. 2864-2869 - Kai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu:
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention. 2870-2875 - Muhammad Asim Ejaz, Guowei Wu, Abid Sultan, Tahir Iqbal:
Deep Reinforcement Learning Approach for Enhancing Profitability in Mobile Edge Computing. 2876-2881 - Jinxiao Yang, Xingang Wang, Qingao Wang:
TSFE: Research on Transformer and Feature Enhancement Methods for Image-Text Retrieval. 2882-2887 - Shuting Yang, Keyu Chen, Wei Feng, En Cheng:
A Fair and Energy Efficient Cooperative Routing Protocol Based on Link Quality for Underwater Acoustic Sensor Network. 2888-2893 - Shuang Liang, Haojun Xia, Chen Li, Bibo Tu:
Desktop Virtualization Optimization Methods Based on IDV Architecture. 2894-2899 - Yi Liu, Steven Goh, Tobias Low, Zach Quince, Shoryu Teragawa:
A Lightweight Deep Learning Model for EEG Classification Across Visual Stimuli. 2900-2905 - Xiaowei Liu, Wenhui Chen, Mengmeng Sun, Yali Si, Zhen Chen:
A Practical Cloud API Complementary Recommendation Service for Mashup Creation. 2906-2911 - Qingmeng Zhu, Tianxing Lan, Xiaoguang Xue, Zhipeng Yu, Hao He:
TraitsPrompt: Does Personality Traits Influence the Performance of a Large Language Model? 2912-2917 - Jiaxi Liu, Kezhen Huang, Yun Feng, Canhua Chen, Jinli Zhang, Yuqi Shu, Xing Tian, Qixu Liu:
MemAPIDet: A Novel Memory-resident Malware Detection Framework Combining API Sequence and Memory Features. 2918-2924 - Wei Ding, Luyao Wang, Wei Zhang, Myung Jin Lee, Ling Wang, Kwang Woo Nam:
Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos. 2925-2930 - Yu Wu, Niansheng Chen, Lei Rao, Guangyu Fan, Dingyu Yang, Songlin Cheng, Xiaoyong Song, Yiping Ma:
SemGO: Goal-Oriented Semantic Policy Based on MHSA for Object Goal Navigation. 2931-2936 - Xin Zhang, Xueping Peng, Weimin Chen, Weiyu Zhang, Xiaoqiang Ren, Wenpeng Lu:
Multi-Channel Hypergraph Network for Sequential Diagnosis Prediction in Healthcare. 2937-2942 - Youliang Huang, Jue Zhang, Xiaolin Chai, Yan Sun:
TopoRCA: A Lightweight Root Cause Analysis System Based on Application Topology. 2943-2948 - Yi Zhang, Fazhi He, Rubin Fan, Bo Fan:
View2CAD: Parsing Multi-view into CAD Command Sequences. 2949-2954 - Aoling Zeng, Hao Wu:
A Fast and Inherently Nonnegative Latent Factorization of Tensors Model for Dynamic Directed Network Representation. 2955-2960 - Qiushi Zhang, Lang Ao, Junfeng Liu, Yang Xi, Dandan Chen:
Alzheimer's Disease Risk Genes Mining Based on a Supervised Machine Learning Method and PPI Network Construction. 2961-2966 - Boyu Ding, Xiaofeng Xu, Xianglin Bao, Nan Yan, Ruiheng Zhang:
ALMA: Adjustable Location and Multi-Angle Attention for Fine-Grained Visual Classification. 2967-2972 - Weike Zhou, Xiaokang Zhou, Jing He, Yamei Nie, Qiqi Chen, Guosheng Kang:
Online Course Recommendation by Exploring User Interaction and Course Description. 2973-2978 - Huachuan Qiu, Anqi Li, Lizhi Ma, Zhenzhong Lan:
PsyChat: A Client-Centric Dialogue System for Mental Health Support. 2979-2984 - Haokai Gao, Xiangru Li, Ruizheng Shi:
A Novel Two-Stage Stacking Model for Breast Cancer Survival Prediction. 2985-2990 - Wenyue Li, Sapae Phyu, Qin Liu, Bowen Du, Junyan Zhang, Hongming Zhu:
RSTIE-KGC: A Relation Sensitive Textual Information Enhanced Knowledge Graph Completion Model. 2991-2998 - Jun Li, Shuqin Zhang, Hongsong Zhu, Yu Chen, Jizhao Liu:
An Efficient Vehicular Intrusion Detection Method Based on Edge Intelligence. 2999-3004 - Fu Jiang, Jie Chen, Jieqi Rong, Zini Wang, Yingze Yang, Heng Li:
Dynamic Energy Management for IoT-enabled Smart Microgrid using Deep Reinforcement Learning. 3005-3010 - Jiaji Ma, Xiangge Li, Hong Luo, Yan Sun:
NetKD: Towards Resource-Efficient Encrypted Traffic Classification Using Knowledge Distillation for Language Models. 3011-3016 - Peng Zhang, Meijuan Li, Hui Zhao, Yida Chen, Fuqiang Wang, Ye Li, Wei Zhao:
Lightweight Fusion Model with Time-Frequency Features for Speech Emotion Recognition. 3017-3022 - Xiaorong Ma, Jiahe Tian, Zhaoxing Li, Yesheng Chai, Liangjun Zang, Jizhong Han:
Explainable Deepfake Detection with Human Prompts. 3023-3029 - Hua Ma, Peiji Huang, Xi Luo, Qiong Huang, Xiangru Fu, Wensheng Tang:
Teaching Early Warning Approach for Teachers based on Cognitive Diagnosis and Long Short-term Memory. 3030-3035 - Jun Peng, Haowen Tang, Chenglong Wang, Xin Gu, Hui Peng:
Intelligent Vehicles Lane-changing Intention Identification Method with Driving Style Recognition. 3036-3041 - Ruizheng Shi, Xiangru Li, Haokai Gao:
A novel deep learning model CSAM-ResNet based on attention mechanism and residual learning for breast histopathology image classification. 3042-3047 - Hua Ma, Chao Xiong, Xiangru Fu, Zhixiang Huang, Yuqi Tang, Hongyu Zhang:
National Image Resources Recommendation for Targeted International Communication via E-CARGO Model. 3048-3053 - Weize Wang, Yi Kuang:
CipherFormer: Efficient Transformer Private Inference with Low Round Complexity. 3054-3059 - Xiaoyong Zhang, Zhongke Zhang, Wanwan Ren, Rui Zhang, Heng Li:
Extended Cell Similarity-based Cyber Attack Detection Method for DC Microgrids under Variable Load. 3060-3065 - Xin Chang, Wenhui Kong, Xingjun Wang:
Preserving Privacy in Collaborative Systems with Secure Multi-Party Summation. 3066-3071 - Chen Shen, Yulin Liu, Hua Li:
A Relationship Extraction Framework Based on Reinforcement Learning and Machine Reading Comprehension. 3072-3077 - Qingyu Xu, Jiguo Yu, Anming Dong, Zihao Shang:
An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information Supplementation. 3078-3085 - Hanwen Zhang, Qingyi Si, Peng Fu, Zheng Lin, Weiping Wang:
Are Large Language Models Table-based Fact-Checkers? 3086-3091 - Jialu Cui, Junxing Zhang:
D-PIFO: A Dynamic Priority Scheduling Algorithm for Performance-Critical Packets Based on the Programmable Data Plane. 3092-3097 - Haifeng Zhao, Quanshuang He, Deyin Liu:
Towards Efficient Sparse Transformer based Medical Image Registration. 3098-3103 - Ngoc Luyen Lê, Marie-Hélène Abel, Philippe Gouspillou:
Exploring Weighted Property Approaches for RDF Graph Similarity Measure. 3104-3109 - Dongyang Zhang, Jianhuan Zhuo, Yile Li, Yinliang Yue, Weiping Wang:
R2Mine: A Reduced Redundancy Computation Graph Pattern Matching System. 3110-3115 - Wenlong Ni, Wenshuang Yan:
Optimal Control Policy Based on Game Theory in Wireless Sensor Networks. 3116-3121 - Wenlong Ni, Zhixiang Mei:
An Optimal Admission Control Policy for Cloud Computing Services with Tandem Queues Based on Game Theory. 3122-3127 - Wenlong Ni, Yufeng Zhang:
Threshold Detection of Cloud Computing System with Impatient Users Based on Game Theory. 3128-3133 - Pengsheng Li, Qingfeng Du, Shengjie Zhao, Pei Fang:
Advancing Root Cause Analysis in Cloud-native System with Knowledge Graph Path Embedding Translation. 3134-3139 - Guohua Lv, Xiyan Wang, Zhonghe Wei, Jinyong Cheng, Guangxiao Ma, Hanju Bao:
IDFusion: An Infrared and Visible Image Fusion Network for Illuminating Darkness. 3140-3145 - Angxiao Zhao, Wenying Feng, Ning Hu, Dawei Zhao, Zhaoquan Gu:
Knowledge Embedding Enabled Cyber Security Defense for Networked System: A Novel Risk Detection Method based on Knowledge Graph. 3146-3151 - Wenjin Ji, Xianling Mao, Jinyu Liu, Rongcheng Tu, Heyan Huang:
Data-Focus Proxy Hashing. 3152-3157 - Kehong Liu, Qi Wang, Junnan Yin, Letian Du, Tianning Zang:
Revisiting Open DNS Resolver Vulnerabilities to Reflection-Based DDoS Threats. 3158-3163 - Jun Peng, Wei Yuan, Yongjie Liu, Zheng Liu, Heng Li:
Sparse Representation GRU-AutoEncoder for Battery Fault Detection of Electric Vehicles. 3164-3169 - Ziyin Gu, Qingmeng Zhu, Hao He, Zhipeng Yu, Tianxing Lan, Shuo Yuan:
Multi-Level Knowledge-Enhanced Prompting for Empathetic Dialogue Generation. 3170-3175 - Tong Zhang, Weiping Pan, Hao Li:
Collaborative Training for Compensation of Inference Errors in NOR Flash Computing in memory Chips. 3176-3181 - Ziyin Gu, Qingmeng Zhu, Hao He, Tianxing Lan, Zhipeng Yu:
Analysis of Emotional Cognitive Capacity of Artificial Intelligence. 3182-3187 - Lin Li, Yunqi Mai, Yu Chu, Xiaohui Tao, Jianming Yong:
An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors. 3188-3193 - Dejun Hou, Zefeng Zhang, Mankun Zhao, Wenbin Zhang, Yue Zhao, Jian Yu:
Sentence-level Distant Supervision Relation Extraction based on Dynamic Soft Labels. 3194-3199 - Aoxue Li, Xinhua Zeng, Yunlong Du, Chengxin Pang:
XRNeRF: View-guided Neural Radiance Fields for Occlusion Removal. 3200-3205 - Shoryu Teragawa, Lei Wang, Yi Liu:
Non-Codeing RNAs Family Prediction Based on RNA Representation and Deep Learning. 3206-3211 - Ruixuan Zhao, Chuyi Chen, Ruoyu Li, Shenghang Liu, Jie Liu, Hongan Wang:
Neural ODE-Guided Imputation Computing for Building IoT Time Series with High Missing Gaps. 3212-3217 - Jianrong Wang, Yi Tang, Dejun Hou, Jinchi Wang, Zechen Meng, Tianyi Xu:
Structure-Augment based Long-Tailed Knowledge Graph Completion Model. 3218-3223 - Zhenyu Hu, Jingya Zhou, Congcong Zhang, Yingdan Shi:
Explainable Cross-Domain Collaborator Recommendation. 3224-3229 - Ruiting Zhou, Ziyi Han, Yifan Zeng, Zhi Zhou, Libing Wu, Wei Wang:
SAFE: Intelligent Online Scheduling for Collaborative DNN Inference in Vehicular Network. 3230-3236 - Ciyuan Chen, Junzhou Luo, Dian Shen, Zhuqing Xu, Runqun Xiong:
Achieving Low Queueing Latency in Time-Slotted LoRa Networks. 3237-3242 - Jiameng Li, Xiaojie Wang, Jun Wu, Zhaolong Ning:
Intelligent Scheduling of UAVs and Sensors for Information Age Minimization at Wireless Powered Internet of Things. 3243-3248 - Ding Ding, Pascal Remeijsen, Zian Song, Mark A. Neerincx, Willem-Paul Brinkman:
Technology-supported social skills training systems: A systematic literature review. 3249-3256 - Zheyi Sha, Chunfeng Liu, Xiaobo Zhou, Chen Chen, Fengbiao Zan, Tie Qiu:
An Entropy-based Field Segmentation Method for Unknown Protocols in Industrial IoT. 3257-3262 - Boyu Zhu, Yuan Zhang, Tingting Chen, Sheng Zhong:
Differentially Private K-Means Publishing with Distributed Dimensions. 3263-3268 - Jin Su, Chunming Li, Yuanqing Xia:
Analysis and Evaluation of Manned/Unmanned Collaborative Emergency Rescue Equipment System. 3275-3281 - Wenqin Li, Xinrong Zheng, Ruihong Huang, Mingwei Lin, Jun Shen, Jiayin Lin:
Enhancing Privacy Protection for Online Learning Resource Recommendation with Machine Unlearning. 3282-3287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.