Abstract is missing.
- Rogue Nodes Detection Using Idle Parking ResourcesJinao Wang, Jiwei Hua, Jinqi Zhu, Yanmin Wei, Luyao Wang. 1-5 [doi]
- Analysis of node importance of satellite network based on triangular motifZhongmin Pei, Boren Hu, Zhangkai Luo, Jie Ding. 6-12 [doi]
- Research on Web Configuration Software Interactivity Enhancement Technology Based on Vue and Component LibraryYing Wang, Zesan Liu, Yanjie Wang, Zhencong Cai, Yu Meng. 13-17 [doi]
- Design and implementation of power communication protocol plug-in based on hot loadingWeiming Qin, Wenjing Guo, Jingwen Lin, Jiahao Li, Xuerui Chen, Xinsu Mei, Wei Zhang. 18-22 [doi]
- Cross Polarization Interference Cancellation Algorithm Based on Maximum Likelihood for Satellite CommunicationShuaishuai Pan, Zhongchuan Sun. 23-27 [doi]
- Research on Machine Learning and State Grid Business Risk Prevention and Control Based on the InternetFan Jiang, Yangfeng Rong, Jinhe Yu, Mingyuan Liang, Wei Xing, Bo Zhang. 28-32 [doi]
- Efficient fuzzing testcases generation based on SAGANZeru Li, Zhongyuan Qin, Xin Sun, Wen Wang. 33-38 [doi]
- Design and Implementation of Intelligent Radar Anti-jamming Simulation SystemYuchen Yin, Yiping Yang. 39-43 [doi]
- Application of Artificial Bee Colony Algorithm in Power Communication Network Routing Optimization SimulationQianglong Meng, Li Liu, Dongqing Zhou, Hong Tang, Rongshu Zhang, Xiangjun Liu, Dan Yan. 44-48 [doi]
- Virtualized Network Function Scaling Strategy Based on Additional Momentum BP Neural NetworkJi Qi, Yuehui Tan, Qifan Zhao, Weiliang Li, Bao Sun, Yi Wu, Hui Tao, Xin Zhang. 49-55 [doi]
- Indoor location algorithm based on improved Kalman filterYuhao Xu, Xiaoyu Zhang, Yi Sun, Kai Zhou. 56-60 [doi]
- Insight into the effect and application of LEO satellite networkShikun Zhuo. 61-66 [doi]
- A Survey of Multi-Transmission Path OptimizationBingyu He, Hao Fu, Jinhua Li, Xiaomin Zhu. 67-72 [doi]
- Research on Intelligent Recommendation Model for Application SystemsShenjie Gao, Bowei Duan, Ping Zhou, Xijing Li, Xin Jing. 73-77 [doi]
- Research on PIM Characteristics of High-Power RF ConnectorsLijun Tong, Xiang Li, Zheng Kong, Qinghua Wang, Xiang Wang. 78-82 [doi]
- A Secure Power Data Sharing Scheme Based on Sensitive Data Automatic RecognitionTao Liu, Zhifan He, Sijian Li, Yue Ma. 83-87 [doi]
- Application Identification Based on Overlap Relationship of Concurrent Flows and Their DurationsJinhua Lu, Shunzheng Yu. 88-92 [doi]
- Research on throughput maximization of mass device access based on 5G big connectionGuoquan Zheng, Enguo Zhu, Hailong Zhang, Yan Liu, Chaoliang Wang. 93-96 [doi]
- Automatic testing of computerized interlocks based on recognition of the interlocking host computer interfaceJuanning Wang, Qiang Li. 97-100 [doi]
- A transform domain communication method based on combinatorial basis functionBeiming Li, Jiahao Xu. 101-105 [doi]
- Research on Network Architecture Based on Improved MPLS Protocol and SDN TechnologyZhongfa Zhang. 106-110 [doi]
- End-to-End Performance Verification of 5G-TSN Converged NetworkJinyu Zhu, He Li, Shihui Duan, Youyang Zhu, Chenglin Zhao, Haojiang Deng. 111-114 [doi]
- Application of Federated Learning in mobile communication Anti-telecom fraudHaiou Li, Zhiwen Kang, Guolin Song, Yajun Liu, Hong Mei, Xin Chen, Ming Gu, Jieli Wang, Geng Chen. 115-118 [doi]
- Analysis of CDMA capacity of multi-beam satellite under beam codingHaichao Wang, Zhonghua Wang, Yong Wang. 119-122 [doi]
- An Opportunistic LEO-based Doppler differential positioning method with baseline optimizationMing Ji, Ruidan Luo, Na Xu, Yaping Li, Xiao Chen. 123-128 [doi]
- Multi-antenna Signal Synthesis Technique Research Based on Feedforward Neural Network Algorithm in High Frequency CommunicationRuokun Wang, Xiaodong Wu, Qinghao Zhu. 129-133 [doi]
- Co-channel interference cancellation and equalization in aeronautical telemetry using multiple antennasNi Zeng, Zhe Jia, Zehua Ding, Lingna Hu, Lianghui Ding, Feng Yang. 134-139 [doi]
- Digital spread-spectrum watermarking identity authentication technology based on OFDM in satellite-ground communication systemYongjie Li, Huanpeng Hou, Jizhao Lu, Wenge Wang. 140-144 [doi]
- Construction of an Emotional Dictionary for Online Comment Text in Knowledge ServicesChaofeng Zeng. 145-150 [doi]
- Design of a comprehensive management and monitoring platform for the operation and security of power information systemsRui Chen, Shulin Wu, Shaojun Lin, Helin Zhang, Meiling Jiang. 151-155 [doi]
- A Physical Layer Key Generation Using a Hybrid Quantization SchemeRong Zhu, Enjian Bai. 156-160 [doi]
- Low retrieval consumption searchable encryption scheme based on random number pairingRongrui Chen, Hai Cheng. 161-164 [doi]
- Petri net-based illegal information flow detection method for node-chain access control modelBinyong Li, Jie Fang, Xianhui Deng, Yuhan Sheng. 165-169 [doi]
- Research on High-Quality Image Generation Based on the AdvDCGAN AlgorithmCi Xiao, Yajun Chen, Chaoyue Sun. 170-173 [doi]
- Blockchain-Based Data Secure and Traceable Scheme for Industrial Internet of ThingsFei Yin, Chengliangyi Xia. 174-178 [doi]
- Research on Docker Container Network Isolation and Security Management for Multi-Tenant EnvironmentsWeijie Zeng, Rui Fan, Zhi Wang, Yu Xiao, Rui Huang, Mouhai Liu. 179-185 [doi]
- A Channel State Information based Respiration Rate Monitoring MethodChangchen Wang, Hong Liu. 186-190 [doi]
- Application of artificial intelligence in the construction of computer big data security technology platformHui Li. 191-195 [doi]
- Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural NetworkYimeng Li, Xi Li, Yichao Zhang. 196-200 [doi]
- Vulnerability analysis of mission-based spatial information networksZhongwen Zhao, Di Lu. 201-206 [doi]
- FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation PredictionZihan Xiong, Yuxuan Li, Jun Chen, Dabei Chen. 207-210 [doi]
- Application of Deep Learning Based on Artificial Intelligence in Security Monitoring SystemXinbo Wang. 211-214 [doi]
- Overview of SQL Injection Attack Detection TechniquesJiayue Xu, Ming Ni, Danjiang Zhu, Xinsheng Yu. 215-225 [doi]
- Multimodal sentiment analysis based on multiple attention mechanismsZixuan Jin, Changbo Xu, Shaozhong Cao, Yi Liu. 226-230 [doi]
- A hybrid model for classifying malware based on ResNet and TransformerKewei Li, Fudong Liu. 231-237 [doi]
- A Method for Extracting Sensitive Information from Long Text Based on Natural Language Processing TechnologyRunlin Li, Zhizhi Zhang, Xuchao Gong, Qilu Zhao. 238-243 [doi]
- Design and application adaptation verification of time-sensitive network end system network card based on FPGAJianlu Wu, Qingwang Li. 244-247 [doi]
- Multi-source System Log Behavior Pattern Mining Method Based on FP-GrowthDaojuan Zhang, Tianqi Wu, Xiaoming Zhou, Bo Hu, Wenjie Zhang. 248-254 [doi]
- Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security SystemKai Jin, Xin Shan, Yuan Zhou, Jing Li, Haidi Dong. 255-258 [doi]
- Enhancing IoT Security-Exploring the Application of BlockchainRuihang Zhang. 259-263 [doi]
- Comparison of Complex Emotion Detection Based on the Basic Emotion Model and the Complex Emotion ModelChunlong Lin, Wei Jin, Xiaobo Ling, Hongfu Chen, Mengyu Ruan, Yeqing Zhang, Yukun Fang. 264-268 [doi]
- Image Encryption Algorithm Based on Henon Chaos TheoryLisha Yao. 269-273 [doi]
- Image Style Transfer Based on CycleGANLisha Yao, Qiaoqiao Feng. 274-278 [doi]
- Zero Packet Loss Protection Module Based on IEEE 802.1CB ProtocolZihan Wang, Caixiao Ouyang, Hongyan Li. 279-283 [doi]
- Classification model based on improved K-means clustering algorithmTengxiao Mu, Yaru Liang, Lingzhi Liu. 284-288 [doi]
- Construction of Online Teaching Effect Evaluation System Based on Complex Learning Behavior Data AnalysisRuihong Dang. 289-293 [doi]
- Research on SVM intrusion detection algorithm based on improvedZihao Liu, Yi Zhou. 294-297 [doi]
- Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification AlgorithmWeisong Chen, Kaixian Zheng, Jingyun Xu, Shengkai Lin, Liju Gan, Yican Wu. 298-302 [doi]
- NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and SimulationQigui Yao, Xiaojian Zhang, Jiaxuan Fei, Wen Ji, Caiwei Guo. 303-307 [doi]
- Edge-cloud Collaboration Based Service Deployment and Resource Allocation in Digital Twin 6G networkTong Liu, Haitao Jiang, Yu Liu. 308-311 [doi]
- Research and application of smart contract technology based on blockchainShenjin Chen, Junying Yuan, Jianxin Zhang. 312-319 [doi]
- Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel WearingQiao Shen, Hanming Huang, Pengfei Wang. 320-326 [doi]
- Mirror Detection in Frequency DomainTianxiang Liu, Zhengyi Liu. 327-331 [doi]
- A Multicast Scheduling Method Based on EVPN-VXLAN Extension in Data Center NetworksNan Wu, Guozhen Dong, Wenjuan Xing, Shizhong Nie, Yunpeng Xie. 332-336 [doi]
- Traffic anomaly detection method based on bidirectional autoencoder generative adversarial networkWeixi Wu. 337-340 [doi]
- Problem-guided Neural Math Problem SolversPanlong Yi, Gang Lu, Xiaojun Wu, Yumei Zhang. 341-345 [doi]
- Reversible Data Hiding Algorithm based on Paillier EncryptionYangquan Zhou, Liuping Feng, Lingyi Chi, Guokai Wang. 346-350 [doi]
- Deep Deterministic Policy Gradient based Dynamic Virtual Network Embedding AlgorithmYue Zong, Han Xu, Zhaoyang Zhang. 351-355 [doi]
- Recurrent Attentive Neural Networks for Sequential RecommendationLei Tan, Jinmao Xu, Daofu Gong, Fenlin Liu. 356-360 [doi]
- Efficient retrieval of power structured data with global data access viewJiwei Li, Bo Li, Shi Liu, Hongwei Lv, Fei Chen, Qing Liu. 361-365 [doi]
- Neural network reliability analysis based on fault injectionBaixin Guo, Jian Li, Haibin Wang. 366-370 [doi]
- A dueling DQN-based online resource allocation algorithm for cloud computingWenhao Zang, Shuangling Li, Xutao Yang. 371-376 [doi]
- A Variable Step LMS Algorithm Based on Particle Swarm OptimizationYanling Li, Jianwei Zhan, Hui Zhang, Dong Wang. 377-381 [doi]
- Research on Fast Time-Frequency Synchronization Algorithm for NR SystemQi Wang, Liming Wu, Wanyi Li. 382-391 [doi]
- An Online/Offline Power Data Sharing System Based on BlockchainHongtao Xie, Yang Wang, Xin Tian. 392-397 [doi]
- Bearing Fault Diagnosis Based on Parallel Convolutional Neural Network with Attention Mechanism and Bidirectional Gated Recurrent UnitYaqi Zhao, Wei Li, Huiqing Xu, Sihe Lu, Yongcan Zhao. 398-402 [doi]
- Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC SystemSi Li, Wei Li, Huaguang Shi, Wenhao Yan, Yi Zhou. 403-407 [doi]
- MADDPG: A task offloading algorithm based on multi-agent deep reinforcement learning in vehicle-edge computingXiaoer Wang, Shuang Ding, Guoqing Zhang. 408-413 [doi]
- LAL-JER: Label-Aware Learning for Adaptive Joint Entity and Relation Extraction with LLM data augmentationMeng He, Yunli Bai. 414-419 [doi]
- Sub-regional multi-AGV dynamic path planning method based on improved A* algorithmHao Zeng, Jun Lu. 420-424 [doi]
- Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization AlgorithmYanyu Zhang, Yang Wang, Zihao Guo, Feixiang Jiao, Yi Zhou. 425-431 [doi]
- DFCL: Domain-adaptive federated clustering learningTongtong Xu, Guanghui Wang, Yuanhao Xu. 432-436 [doi]