default search action
CyberC 2024: Guangzhou, China
- International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2024, Guangzhou, China, October 24-26, 2024. IEEE 2024, ISBN 979-8-3315-0689-6
- Yukai Hou, Zhijun Liu, Fan Wang, Lingyun Zhou, Tao Shang, Rongqing Zhang:
Intelligent Spectrum Management for UAV Swarm with Multiple Combat Missions: A DQN-Based Solution. 1-4 - Teng Wan, Shaoyi Du, Qiang Zhang, Ying Qi, Ce Li:
Multispectral Registration Algorithm Based on Fusion of Infrared and Color Images. 5-11 - Minghao Wang, Shaoyi Du:
OCDE: Adaptive Differential Evolution Algorithm in Distributed Intelligent Systems. 12-21 - Fan Wang, Lin Su, Haiyan Huang, Li Zhu:
Secrecy Performance Analysis of Cooperative Cognitive Radio Networks with Non-colluding Eavesdroppers. 22-25 - Alina Basharat, Runhua Wang, Ping Xu:
TS-FedNBS: Federated Edge Computing with Enhanced Robustness. 26-29 - Jiahan Dong, Tong Jin, Bowen Li, Yinan Zhong, Guangxin Guo, Xiaohu Wang, Yanjiao Chen:
DIFORMER: An Attention-Based IoT Device Identification Method. 30-39 - Bin He, Ningmei Yu, Hongcheng Han:
Driver Intention Prediction Using Text Prompts with In-Cabin and Out-Cabin Cameras. 40-43 - Li Ping, Yang Zhenyu:
Few-shot Image Classification Method with Label Consistent and Inconsistent Self-supervised Learning. 44-51 - Wei Xu, Jianxun Zhang, Yujiang Pan:
Improved PointNet Classification Network Using Clustering Algorithms. 52-55 - Jiawen Li, Pascal Lefèvre, Anwar P. P. Abdul Majeed:
Randomness and Interpolation Improve Gradient Descent: A Simple Exploration in CIFAR Datasets. 56-59 - Yan Chen, Sunhang Zhao, Xinyuan Wang, Zhengxuan Jin, Zekai Lin, Bin Wang:
Towards robust data augmentation for sequence recommendation. 60-63 - Wenyun Dai, Muge Zhang:
A High Performance AI-Powered Cache Mechanism for IoT Devices. 64-72 - Yi Zhang, Xiang Yu:
A Study of the Effect of Different Parameter Assignment Strategies on the Performance of ACLPSO. 73-81 - Chia-Hsin Chiang, Yu-Chian Chiou, Ren-Shiou Liu:
DuoDistill: A Dual Knowledge Distillation Framework for Optimizing Top-K Recommender Systems. 82-89 - Mohammad Hajarian, Lize De Coster:
Gamification Effect on Brain Activity and User Behavior During Online Hostility Exposure in Social Media. 90-93 - Zhenyu He, Junjie Lin, Zhenfeng He, Yulin Sun:
Human Activity Recognition based on MEMS Sensors Using Convolutional Neural Network. 94-99 - Zixuan Yan, Xiaofeng Lu, Tiantian Pang, Jingbo Xu:
Robust Object Tracking with Gradient Activation Siamese Network. 100-107 - Xiaoyu Shan, Adnane Cabani, Houcine Chafouk:
Cooperative Localization Based on Interval Split Covariance Intersection Filter in MSMV System. 108-116 - Sanusi Mohammsd Bunu, Omar Alani, Mohammad Saraee:
Improvement of OLSRv2 massage format and message interval to reduce routing overhead in a D2D communication network. 117-120 - Sanya Max Fréjus Owolabi, Alonoumi Zola Cédric Bosco, Magnidet Fifamè Merci-Ange, Sotindjo Patrick, Dossou Michel, Aupetit-Berthelemot Christelle:
Performance Analysis of Improved Noise Cancellation Discrete Hartley Transform ACO-OFDM in a AWGN channel. 121-126 - Xinlong Wang, Wei Yang, Chengqi Hou, Hongtao Luo:
Routing Attack and Detection Methods in the RPL-based Internet of Things. 127-130 - Avinash Srinivasan, Gordon Morewood, Kellie Simmons-Massey, Yanhua Li:
SAFE-CARE: Reversible Privacy-preserving Physician Feedback Framework to Improve Patient Care Quality. 131-138 - Arun Sarma, Geethapriya Thamilarasu:
SCRAPE: Side-Channel Attack to Reveal Alphanumeric Passwords from EEG Signals. 139-145 - Qinghua Deng, Lanxiang Chen, Yizhao Zhu, Yi Mu:
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud. 142-188 - Tianle Xiao, Ronggui Zou:
Security-Reliability Tradeoff for Multiple Friendly Jammers Aided Relay Selection in Wireless Networks. 146-150 - Mohammed M. Ahmed, Satea H. Alnajjar:
Detect and Prevent URL Phishing through Li-Fi technology via FSO Channel. 151-154 - Chen Zhu, Jiale Ding, Xingrui Wei, Yang Lu, Yinxia Sun:
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack. 155-162 - Ruiguang Yang, Xiaodong Shen, Chang Xu, Liehuang Zhu, Kashif Sharif:
PR-PFL: A Privacy-Preserving and Robust Personalized Federated Learning Framework. 163-170 - Yuyang Wang, Wendi Feng:
SeisSec: Encrypting and Transmitting Seismic Data at Ultra-low Latency. 171-174 - Brit Riggs, Dina Ghanai Miandoab, Bertrand Cambou:
Ternary Two Wavelength Quantum Key Distribution Protocol With Physical Unclonable Function Error Models and Eavesdropper Detection. 175-181 - Yidi Bai, Xinhai Chen, Chunye Gong, Jie Liu:
ImPINN: Improved Physics-informed neural networks for solving inverse problems. 189-198 - Yanbei Zhang, Bintao Hu, Wenzhang Zhang, Md Maruf Hasan, Hengyan Liu:
Improved Detection of Forged and Generated Facial Images Based on ResNet-50. 199-205 - Li Jiang, Yuqi Sun, Lap-Man Hoi:
Defining the Indicator System for AWE for Portuguese Classes in Chinese Higher Education. 206-211 - Qing Qi:
Multi-scale Fusion for Dynamic Scenes Deblurring. 212-218 - Deyu Zhang, Thanaruk Theeramunkong, Nirattaya Khamsemanan:
Predicting China's Marriage Rate using Machine Learning Models and Cross-Validation Evaluation. 219-226 - Yingnuo Li, Zhiming Cheng, Shulei Ji, Xinyu Yang:
Q-MMT: Qinqiang Opera Generation Based on Multi-track Music Transformer. 227-230 - Jiang Liruiqi:
Research on human combination continuous motion recognition method. 231-236
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.