skip to main content
10.1145/3491396acmconferencesBook PagePublication PagesiceaConference Proceedingsconference-collections
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications Jinan China December 28 - 29, 2021
ISBN:
978-1-4503-9160-3
Published:
07 January 2022
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 15 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

The volume contains papers presented at International Conference on Intelligent Computing and its Emerging Applications (ICEA2021) which were held from December 28 to 29, 2021, in Jinan, Shandong Province, China. This conference is hosted by Qilu University of Technology (Shandong Academy of Sciences), Shandong Normal University, National & Local Joint Engineering Research Center of NSDP, Shandong Institute of Bigdata, China InfoCom Media Group, Chinese Journal of Network and Information Security, China, and BK21 Convergence Engineering for Intelligent Drone, Sejong University, Republic of Korea.

research-article
Security Use-Cases for Countering Threats of CLA and UAV in 6G

Recently1, 6G mobile communication technology has been actively researched and faces issues about security and privacy. The various technologies and applications to be used in 6G will bring new security issues. Among the technologies, CLA and UAV have a ...

research-article
Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang Transform

This paper presents novel insights to feature extraction and stylization of character motion in the instantaneous frequency domain by proposing a method using the Hilbert-Huang transform (HHT). HHT decomposes human motion capture data in the frequency ...

research-article
An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection

Compared to traditional power grid systems, smart grid is capable of precisely and instantly detecting the segments of power grid breakdown, isolating the affected parts and segments, and rerouting transmission paths to unaffected segments to further ...

research-article
Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light Control

Several recent studies pointed out that an effective traffic signal/light control strategy will be able to mitigate the traffic congestion problem, and therefore variants of solutions have been presented for solving this optimization problem. The multi-...

research-article
CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture

Growing 5G1 applications require a user plane that has a high forward throughput and low packets loss. To meet these requirements, 5G acceleration means emerge, and User Plane Function (UPF) even more. The state of the art UPF acceleration is divided to ...

research-article
An Effective Neural Architecture Optimization Algorithm for CNN based on Search Economics

Developing a good convolutional neural network (CNN) architecture manually by trial and error is typically extremely time-consuming and requires a lot of effort. That is why several recent studies have attempted to develop ways to automatically ...

research-article
Visible Watermark Removal Based on Dual-input Network

A visible watermark removal network that combines partial and standard convolution is proposed in this paper. Existing deep learning-based watermark removal methods use a standard convolutional network over the watermarked image, using convolutional ...

research-article
A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs

With the advance in the internet of things (IoT), wireless communication, and artificial intelligence, nowadays, people can enjoy the autonomous driving system. Meanwhile, security issues found in vehicular ad-hoc networks (VANETs) have attracted the ...

research-article
Search Economics for Multi-Objective Vehicle Routing Problem with Time Windows

Developing an effective search algorithm to find out a good solution for the vehicle routing problem is an importance issue, for a powerful search strategy can also be used to make a better decision for complex problems in the real life. The multi-...

research-article
A Training-free Genetic Neural Architecture Search

The so-called neural architecture search (NAS) provides an alternative way to construct a "good neural architecture," which would normally outperform hand-made architectures, for solving complex problems without domain knowledge. However, a critical ...

research-article
Open Access
Listening to the Crowd for the Change File Localization of Mobile Apps

In order to allow developers to implement operable code-level modification tasks based on user feedback directly, so as to achieve rapid and continuous app updates and releases. We propose an efficient automated approach named LCFCR, which leverages ...

research-article
A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT

At present, using a large number of unsafe IoT devices to form botnets and launching DDoS attacks have become one of the main threats to IoT security. However, most of the existing DDoS attack defense methods are limited to being implemented within a ...

research-article
Real-Time Prediction of Ocean Observation Data Based on Transformer Model

Ocean monitoring depends on the widely deployed oceanographic buoys and observation stations that integrate various types of ocean sensors. Those ocean sensors often work in harsh environments, so the data collected by the sensors are sometimes abnormal,...

research-article
A Scheme of Traceless File Deletion for Windows FAT32 File System

FAT32 file system is a common file system, especially in the USB devices, with good stability and compatibility. When the FAT file system, as an important carrier of data storage, is attacked, data in the file system can be easily stolen by an ...

research-article
Open Access
Darknet Public Hazard Entity Recognition Based on Deep Learning

Due to the strong protection of anonymity, Darknet has been exploited by criminals to distribute harmful content and banned items, such as drugs, weapons, and malware, which are regarded as public hazard entities. The task of public hazard entity ...

research-article
In-network Computing based Transmission Optimization Mechanism in SDN

With the emergence of massive smart terminal devices, the network carries an explosive growth of data traffic. At the same time, the emerging real-time services have a high demand for network transmission delay. The contradiction between the limited ...

research-article
An Abused Webpage Detection Method Based on Screenshots Text Recognition

With the rapid development of the Internet, webpages containing abused information such as pornography and gambling have emerged in an endless stream. These webpages are using various methods to evade traditional detection methods and which seriously ...

research-article
Research on pork price prediction based on multi-dimensional feature analysis and machine learning

According to the situation of pork price fluctuation in Shandong province in recent years, this paper collects relevant data for comprehensive analysis and research. In the analysis, the pork price fluctuation is taken as the breakthrough point, and the ...

research-article
Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater Treatment

Soft-sensors are usually used for difficult-to-measure variables prediction in wastewater treatment. Nowadays, neural networks, especially the dynamic neural networks, are widely used to predict and monitor these variables. However, traditional training ...

research-article
Heterogeneous multi-core optimization of MUMPS solver and its application

With the development of electromagnetic simulation technology and the increasing demand for simulation, simulation verification based on numerical simulation has received extensive attention from various research fields at home and abroad. Solving the ...

research-article
Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing

As a new computing paradigm, Cloud-Edge collaborative computing has injected new vitality into edge computing. To make full use of the resources of Cloud Computing Server and Edge Computing Servers in the Cloud-Edge environment, and solve the problem of ...

research-article
Deep Text Matching in Medical Question Answering System

The retrieval question-answering(Q&A) system based on Q&A library is a system that can retrieve the most similar question from Q&A library to get the correct answer. Classic approaches only use TF-IDF, BM25 and other algorithms to calculate the shallow ...

research-article
Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments

With the widespread development of cloud-native technologies, the security of cloud-native system has gradually attracted attention. Cloud-native uses PKI (Public Key Infrastructure) to provide an important guarantee for cloud-native network security, ...

research-article
swMETIS: A high performance graph partitioning library on Sunway manycore architecture

The graph structure and graph partitioning algorithms are widely used in many fields of scientific computing and artificial intelligence. With the development of big data, the magnitude of graph is increasing rapidly, which makes high performance graph ...

research-article
An automatic many-core code generation method and its implementation under Sunway environment

The parallel programming model of Sunway supercomputer based on accelerated thread library plays an important role on the acceleration performance of master-slave core parallelism. At present, two thread-based programming libraries, OpenACC and Athread, ...

research-article
Blockchain-Based Statistical Library for Telecom Security Fraud Cases

As Internet technology develops at a fast pace, telecom fraud cases happen more frequently, resulting in more and more people suffering great losses. This phenomenon should be kept under control, or it would bring bigger hazards to our society. However, ...

research-article
Intelligent Detection of Marine Organisms with Deep Learning based on Attention Mechanism

With the increasing intensity of marine fishing, the living space of marine organisms has become more and more serious. The establishment of marine pastures effectively solved the decrease in the number of fish caused by marine fishing. How to analyze ...

research-article
ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction

Despite been extensively explored, current techniques in sequential data modeling and prediction are generally designed for solving regression tasks in a batch learning setting, making them not only computationally inefficient but also poorly scalable ...

research-article
A Fast Light Baking System for Mobile VR Game Based on Edge Computing Framework

Metaverse development has often focused on bettering virtual reality technologies due to benefits in establishing immersion in virtual environment1. Its dependency on VR technology brings limitations including the lack of high-quality graphics and a ...

research-article
Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater Treatment

Biochemical oxygen demand (BOD) is one of the principal indicators to evaluate wastewater effluent qualities. Establishing an effective prediction model is one of important way to monitor sewage water quality properly. However, due to the nonlinearity, ...

Recommendations