
default search action
CSAIDE 2024: Nanjing, China
- Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy, CSAIDE 2024, Nanjing, China, March 1-3, 2024. ACM 2024, ISBN 979-8-4007-1821-2
Chapter 1 - Internet Security and Intelligent Intrusion Detection
- Huiqi Zhao
, Shunfa Sun
, Rui Wang
, Fang Fan
, Lu Liu
:
CTCRNN: A Hybrid CNN-BiLSTM Based Classification Method for Industrial IoT Encrypted Traffic Based on Spatiotemporal Features. 1-6 - Xingyu Zhou
, Wenmin Li
, Huimin Zhang
:
A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on Blockchain. 7-10 - Yang Zhang
, Jian Wang
, Zhaorui Yang
:
A Board-level Hardware Trojan Detection Method. 11-15 - Yuhang Zhang
:
Intrusion Detection of IoT Traffic Payload Based on Parallel Neural Networks. 16-20 - Jun Ma
, Syazwina Alias
, Chunya Huang
:
Information security protection in hybrid office. 21-25 - Xiaoping Gao
, Yue Pan
, Jinjin Li
, Tao Ji
, Yin Yuan
, Zhengnan Liu
:
Design of network security protection network architecture for intelligent networked vehicles. 26-33 - Yanhong Wu
:
Supply Chain Financing Risk Identification and Control under the Internet of Things Financial Model. 34-38 - Yu Zhang
, Yi Zhuang
:
Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph. 39-43 - Chao Hong
, Jiaye Tao
, Yun Fu
, Yiwei Yang
, Lipeng Wei
, Zhihong Liang
, Junrong Liu
:
A single-class attack detection algorithm for smart grid AGC system based on improved support vector machines algorithm. 44-50 - Binghui Xu
:
Design and Application of Public Risk Perception Early Warning System Based on Machine Learning Algorithm. 51-54 - Jiajing Zhang
, Bangquan Xu
:
A model for evaluating the robustness of network covert channels based on entropy TOPSIS method. 55-60 - Hao Liu
:
Decoupled User Preference Enhanced Fake News Detection. 61-65 - Zhenwan Zou
, Jia Chen
, Wenshou Wu
, Bin Wang
, Yicheng Liu
:
Survey of cyberspace surveying and mapping. 66-71 - Jinzhong Xu
, Yujie Zhang
, Weiguang Liu
:
Research on fake news detection based on CLIP multimodal mechanism. 72-79 - Ahsan Nazir
, Jingsha He
, Nafei Zhu
, Xiangjun Ma
, Faheem Ullah
, Sirajuddin Qureshi
, Ahsan Wajahat
:
Ensemble Learning Techniques for the Detection of IoT Botnets. 80-85 - Jun Shen
, Kai Wang
, Zhong Lv
, Jie Yu
, Yue Cui
, Jianxue Zheng
:
A Certificateless Aggregate Signature Scheme without Bilinear Pairing. 86-90 - Chongfeng Qiu:
Multi-Domain Fake News Detection Based on Serial Attention Networks. 91-96 - Xuqiang Hu
, Chuanwen Lin
:
Identity Authentication Based on Network Topology. 97-101 - Kangjun Zhang
, Lingyun Yuan
, Xingwei Peng
:
Attribute-based keyword search encryption scheme for IoT edge environment. 102-107 - Bo Hu
, Sibao Chen
:
Edge-guided Contextual Attention Fusion Network for Camouflaged Object Detection. 108-112 - Chao Liu
, Junlong Song
:
Research on Cross-domain Fake News detection based on Multi-space Fusion and Knowledge Graph Embedding. 113-117
Chapter 2 - Hybrid System Design and Artificial Intelligence Modeling
- Yunlong Li
:
Robust Uncertainty Estimation for Active Sampling. 118-122 - Chongle Peng
, Qingbing Sang
:
GMC-YOLO: A Face Detection Algorithm Based on Enhanced YOLOv8. 123-126 - Lifeng Wang, Yongguang Niu
, Zhimin Shao
, Qiao Yuan
, Bo Liu, Shipeng Hou:
Research on automatic execution system of power emergency plan based on artificial intelligence. 127-130 - Hongzhi Chen
, Feng Pang
:
A decision-support agent framework and its application in industry. 131-137 - Qingxuan Wang
, Bin Zhao
, Yongle Gao
, Hewei Li
, Ze Wang
:
Adaptive normalization data enhancement algorithm based on DCGAN. 138-141 - Bin Liu
, Eric Busia Blancaflor
:
Research on federal learning privacy protection based on secure multi-party computing. 142-147 - Xingfeng Li
, Yue Dong
, Hua He
:
Layout Point cloud local parallel attention feature learning network with enhanced spatial features. 148-152 - Guanghong Zhou
, Juan Yang
, Ronggui Wang
, Lixia Xue
:
Text Classification Network Based on Token Dynamic Decay. 153-157 - Mengyao Yu
, Lijun Shi
, Changhua He
:
Use of Artificial Intelligence in the Personalisation of In-vehicle Interaction Interfaces. 158-163 - Chengyu Han
, Song Wang
, Haiming Sun
, Zhenming Zhang
, Weiyao Xu
:
Cross modal human action recognition based on kernel manifold alignment. 164-167 - Xiu Ye
, Fei Lei
, Huihui Dong
, Wenli Jiang
:
Improved Genetic Algorithm Based Design for Controlling Big Data Discrimination Paths. 168-172 - Huangyi Zhang
, Ximeng Liu
:
Generating Transferable Adversarial Examples From the Perspective of Ensemble and Distribution. 173-177 - Chenyi Wang
, Xiaotao Shao
, Yan Shen
:
Non-homogeneous Haze Removal Based on Attentional Feature Enhancement in Encoder-decoder Networks. 178-182 - Wenyan Yao
, Tianbao Zhang
:
Design of Human Resources Management Decision System Based on Multi-Agent System and Reinforcement Learning Algorithm. 183-187 - Chengguo Han
, Bin Wang
, Yufei Wu
, Xiangyu Shi
:
Research on the Construction of Cross-border E-commerce Guangdong-Hong Kong Full-Chain Intelligent Customs Clearance Information System. 188-196 - Mingyue Tang
, Hang Wu
:
Lightweight insulator defect detection algorithm based on improved YOLOv8. 197-201 - Jiannan Dan
, Shumin Liu
, Shiyu Chen
:
Research on lightweight small target detection algorithm from the perspective of UAV. 202-207 - Haoran Wei
, Yanyun Fu
, Deyong Wang
, Rui Guo
, Xueyi Zhao
, Jian Fang
:
Nighttime Air Tracking Based on Improved Unsupervised Siamese Network. 208-214 - Yadong Zhang
, Yujuan Zheng
, Meifang Liu
, Lixia Sun
:
Intelligent Interaction Design and User Experience of VR Platform Based on Intelligent Perception and Deep Learning. 215-219 - Zhiyong You
, Yuan Tao
:
Construction of a Layered Rule Base System Based on Cyber Security. 220-225 - Li Jiao
, Muhammad Irsyad Abdullah
:
DP-YOLO: Enhancing Pedestrian Detection in Crowd Scenes with Deformable Convolution and Varifocal Loss. 226-231 - Na Liu
:
C2F System Design Target Poverty Alleviation System Design Based on Blockchain. 232-236 - Wenhao Jia
, Ronggui Wang
, Juan Yang
, Lixia Xue
:
MGTANet: Multi-Scale Guided Token Attention Network for Image Captioning. 237-245 - Yan Zheng
:
Research on the Construction and Management Monitoring of Big Data Platform Based on Artificial Intelligence. 246-250 - Yadong Zhou
, Zhenfeng Zhu
:
DMAED: Dynamic Matte Aware Encoder-Decoder for Shadow Removal. 251-256 - Xiangqiong Tan
, Zhuoshuai Wang
:
Pedestrian-vehicle detection model in road scenes based on improved YOLOv5. 257-260 - Bo Li
:
A Study of DistilBERT-Based Answer Extraction Machine Reading Comprehension Algorithm. 261-268 - Qian Liu
, Xingda Wang
:
Designing an Efficient Framework for Large-Scale Data Processing and Analysis Based on Deep Learning Technology. 269-274 - Tengda Li
, Gang Wang
, Chong Du
, Qiang Fu
, Xiangyu Liu
:
Research on the Optimization Strategy of Command and Control System Based on Complex Network Theory. 275-280 - Peng Gao
, Feng Qiu
, Baojian Hua
:
ChemGen: Towards Understanding First-Principles Calculation Code Generation Based on Large Language Models. 281-287
Chapter 3 - Computer Semantic Recognition and Information Processing
- Futian Wang
, Weijie Lv
, Jin Tang
, Andong Lu
:
TSR-YOLO: Multi-Stage Self-Processing Method for Small Traffic-Signs Recognition. 288-294 - Jia Wang
, Zongting Li
, Chenyang Ma
:
Research on News Text Classification Based on BERT-BiLSTM-TextCNN-Attention. 295-298 - Yuanchang Zhang
, Yongming Huang
:
Seed Germination Detection Method Based on Lightweight YOLOv5. 299-304 - Kun Qiu
, Changkun Wang
:
Improved YOLOv5 Based on the Mobilevit Backbone for the Detection of Steel Surface Defects. 305-309 - Wei Gao
, Zhengqing Hu
, Yanqing Liu
, Fangbing Qiu
, Lin Han
:
A Single-Channel Sleep Staging Method Based on Self-Supervised Learning. 310-314 - Yunchao Yu
, Qingbing Sang
:
Self-Supervised Image Quality Assessment through Active Learning. 315-319 - Yangzhengyu Lu
, Qingbing Sang
:
Active learning based fire detection method for YOLOv7. 320-324 - Shuo Yang
, Shu Gao
:
Multi-Label Text Classification Based on Contrastive and Correlation Learning. 325-330 - Kai Yang
, Jianwu Long
:
Research on Interactive Image Segmentation Algorithm Based on Coarse to Fine. 331-334 - Qiusheng Tian
, Qiang Liu
, Li Wang
, Kunfeng Zhang
:
Detection of Appearance Defects in Cigarettes Based on AI Artificial Intelligence. 335-340 - Feifei Zou
, Su Hu
, Wei Yu
, Zejun Yan
, Sijun Chan
:
Research on Financial Fraud Text Classification Based on PET-BiLSTM. 341-345 - Yue Dong
, Xingfeng Li
, Hua He
:
Homogenous multimodal 3D object detection based on deformable Transformer and attribute dependencies. 346-351 - Zhedian Zheng
, Wei Sun
:
TAGTN: Traffic Prediction Model based on Adaptive Graph Transformer Network. 352-357 - Qiang Zhang
, Shanjie Li
, Ying Li
, Dongdong Feng
:
Research on defect detection method of overhead line insulator based on MACE-YOLO. 358-364 - Fuquan Sun
, Ximeng Xu
, Xinyi Dong
:
Research on medical text named entity recognition based on Two-stage approach. 365-369 - Mengqing Jin
, Xun Wang
, Changlin Xu
:
Aspect-level Sentiment Analysis Based on Heterogeneous Spatial-Temporal Graph Convolutional Networks. 370-374 - Danyang Cao
, Zeyi Zhang
:
Cross-lingual voice conversion based on F0 multi-scale modeling with VITS. 375-379 - Xiji Huang, Lingna Chen:
Unsupervised domain adaptation network for medical image segmentation with generative adversarial networks. 380-382 - Jiaxu Yang
, Lifen Jiang
, Shibo Fu
, Jialin Chen
, Xiu Zhang
, Haoyu Guo
:
Chinese Long Text Classification Based On Gate-Temporal Convolutional Neural Network. 383-387 - Yue Li
, Tao Zuo
:
An InterFormer-BERT Chinese named entity recognition model with enhanced boundary. 388-394 - Danyang Cao
, Fangfang Liu
:
Lightweight multi-attribute target detection for dogs and cats based on improved YOLOv7. 395-400 - Xiaolin Fan
, Binghao Fan
:
STUEFF-YOLOv5s: A Lightweight Method for Deep Identification of Students' Behavior in the Classroom. 401-405 - Chang Yang
, Xia Yu
, Jiayi Wu
, Dan Xue
, Yong Duan
:
RumorSAGE: Semantic Augmentation Graph for Early Rumor Detection. 406-412 - Yanfeng Hu
, Mohd Faiz Yahaya
, Saiful Hasley Ramli
:
Combining the Unified Model of Aesthetics (UMA) with Visual Information Processing to Investigate Computer Aesthetics. 413-419 - Naixiang Ao
, Fucheng Shi
:
Video summarization network based on Space-Time attention and genetic algorithm optimization. 420-425 - Xiuman Liang
, Shaopin Gao
:
Segmentation of Apple Diseased Leaves by Multiscale Feature Extraction UNet Modeling. 426-431 - Xianglin Hou
, Xiaoming Ju
:
SSDFuse: A Semantic Segmentation-Driven Infrared and Visible Image Fusion Method. 432-437 - Shuaiyang Lin
, Sibao Chen
:
Self-correlation prior-guidance and self-enhanced feature-fusion for few-shot segmentation. 438-443 - Ziwei Sun
, Zexi Hua
, Hengchao Li
:
A Training Strategy of Flying Bird Object Detection Model Based on Improved Self-Paced Learning Algorithm. 444-450 - Xudong Yu
, Yanhui Zhou
, Fei Pu
, Guilian Zhang
:
A Recommendation Method for Electronic Components Based on Knowledge Graph. 451-455 - Haojie Zhang
, Hong Li
, Ligang Zhao
:
Valve Part Inspection Algorithm Based on improved YOLOv8n. 456-461
Chapter 4 - Digital Economy and Business Development Management
- Fuzhe Zhao
, Han Xu
:
Research on Stock Forecasting Based on EWP-BiLSTM-AM Model. 462-468 - Zechen Li
:
TLACP: A Hybrid Deep Learning Model for Stock Market Prediction. 469-479 - Jipu Yu
, Xiaochen Lu
, Anqi Pan
, Jiaji Shi
:
Stock trading strategy based on reinforcement learning with GRU network. 480-485 - Bowen Liao
, Zhikun Lu
, Yingqi Guo
:
RCTE: Relation Candidate-guided few-shot relational Triple Extraction. 486-491 - Zihao Yin
, Quanli Wang
, Wei Zhou
, Huiyu Zhou
:
A Comparative Study of Multi-Factor Quantitative Investment Models Based on Investor Sentiment. 492-500 - Kefeng Guo
:
The Research on Blockchain Technology Promoting the Value of Agricultural Industry Chain. 501-505 - Yan Li
, Meijia Chi
:
Theoretical Mechanisms and Empirical Tests of Structural Upgrading of Service Industry Driven by Digital Economy. 506-510 - Zhen Liu
:
The Effect of Online Comment Language Style on Consumers45 willingness to pay: The Evidence from NLP and Experiment. 511-515 - Yuan Li
:
Study on the Relationship between E-commerce and Digital Economy at the Provincial Level in China Based on SPSS Analysis. 516-524 - Xingling Liu
:
Constructing Consumer Portraits of Environmentally Friendly Clothing under the "Dual Carbon": Based on the Cart Decision Tree Algorithm. 525-531 - Jincheng Wang
, Zeyu Dou
, Lei Huang
, Xudong Guo
, Tengteng Zhao
, Jingshi Yang
:
Research on enterprise data asset management and disaster recovery backup. 532-537 - Zhenrui Chen
:
Exploration of Strategies for Dual-Snake Competition for Food Based on Greedy Algorithm. 538-542 - Songqing Liu
:
Sailing ship listing price forecast analysis based on support vector machine. 543-547 - Dezhi An
, Yuda Zhang
:
Research on Interpretability Charge Prediction Method based on Legal Provisions Incorporated. 548-554 - Dazhi Yue
:
Study On The Relationship Between Manufacturing Carbon Emission And High-Quality Developmentof Green Finance: A Case Study Of Fujian Province. 555-560 - Yu Chao
, Wang Chao
:
Internet Financial Public Opinion Monitoring Based on Word2vec-BI-LSTM. 561-568 - Fengxia Sun
, Zhongya Han
, Duokui He, Dongyuan Zhao
:
Improving Bass model based on product value for forecasting new energy passenger vehicle sales. 569-574 - Zhiai Qin
, Jia Zhao
, Peng Ge
:
An Empirical Model Analysis of the Typical Cross-border Scenarios of Automotive Data. 575-581 - Zuchang Zhong
, Luole Zhou
, Shiyun Li
, Yuyan Zeng
:
Research on the effect of digital economy development level on regional innovation. 582-587 - Li Chen
, Yingli Zheng
, Pingxing Chen
:
Digital Inclusive Finance and Rural Industrial Prosperity in Western China: Effects, Heterogeneity and Mechanisms of Action. 588-594 - Junhui Wu
, Tao Liu
, Xialing Xu
, Dajun Xiao
, Wenjuan Yu
, Yuxin Zhang
, Xinyu Chen
:
Research on Simulation Models of Forward Market and Spot Market. 595-600 - Zhenjun Jin
, Jiaxing Li
, Haidong Wang
:
Research on Spea2 based on Chromosome Distance for Batch Flow Scheduling in Flexible Workshops. 601-605 - Song Sun
, Liang Zhang
, Chuanwei Yu
:
CTL: A Stock Price Index Prediction Network Based on a Hybrid Structure of CEEMDAN, Transformer and LSTM. 606-612 - Yifeng Dou
:
Application of Multiple Linear Regression Equation Models in Analyzing Factors Affecting Hospitalization Costs for Oncology Diseases. 613-617 - Tingting Yuan
, Sibao Chen
:
Diversified Transformer For Occluded Person Re Identification Based on Adaptive Constraints. 618-623 - Zhenyu Li
, Zexi Hua
, Yanjie Pang
:
A Multi-Strategy Improved Golden Jackal Optimization Algorithm Integrating the Golden Sine Mechanism. 624-628 - Zhenghao Lu
, Guifang Guo
:
Active Disturbance Rejection Control of Permanent Magnet Synchronous Motor Based on Improved Dung Beetle Algorithm. 629-633 - Minghui Han
, Haifeng Pang
:
The Impacts of Digitalization on Firms' High Quality Development. 634-638 - Zuhui Li
:
Research on Real-Time Endurance of Drone Swarms for Express Delivery Dispatch. 639-642 - Zonghao Zou
:
Powering the future: application of machine learning to analyze the global renewable energy consumption. 643-649 - Ting Li
, Jinjiang Yang
, Yin Zhou
, Shaojun Wei
:
Research on Performance Optimization of Encryption Algorithms for Network Security Framework. 650-653 - Yiyang Huang
, Xiaoyong Li
, Jie Yuan
, Kaiguo Yuan
:
A machine learning-based trust evaluation model for wireless sensor networks. 654-658 - Yuling Chen
, Zhenxiang He
, Jinwei Chen
, Bin Wu
:
ACBA: Object detection algorithm based on Adaptive Class Blurry Aware. 659-664
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.