Abstract is missing.
- Creativity Support in AI Co-creative Tools: Current Research, Challenges and OpportunitiesBin Ning, Fang Liu 0002, Zhixiong Liu. 5-10 [doi]
- Evaluation of TCP Variants on Dynamic UAV NetworksJunkai Fei, Xiaojun Zhu, Ruyan Zhang. 11-16 [doi]
- Practical privacy-preserving mixing protocol for BitcoinQianqian Chang, Lin Xu, Lei Zhang 0009. 17-22 [doi]
- An Agent-based System Architecture for Automated Guided Vehicles in Cloud-Edge Computing EnvironmentsXianfeng Ye, Zhiyun Deng, Yanjun Shi, Weiming Shen 0001. 23-28 [doi]
- Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial StrategyChaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng. 29-34 [doi]
- Improving Adversarial Transferability with Heuristic Random TransformationBowen Guo, Qianmu Li, Xiao Liu. 35-40 [doi]
- Understanding Social Relations with Graph-Based and Global AttentionHanqing Li, Niannian Chen. 41-46 [doi]
- ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention NetworksLeiqi Wang, Zijun Cheng, Qiujian Lv, Yan Wang, Shixiang Zhang, Weiqing Huang. 47-52 [doi]
- Process Mining and Root Cause Analysis for Detecting Inefficiencies in Business Processes: an Applied Case in a Brazilian Telecommunications ProviderLuiz Fernando Puttow Southier, Esther Maria Rojas Krugger, Cleiton dos Santos Garcia, Edson Emílio Scalabrin. 53-58 [doi]
- TLAG: An Informative Trigger and Label-Aware Knowledge Guided Model for Dialogue-based Relation ExtractionHao An, Dongsheng Chen, Weiyuan Xu, Zhihong Zhu, Yuexian Zou. 59-64 [doi]
- Crowdsourcing Workers Recommendation Algorithm Based on Improved Deep Matrix FactorizationYuanmeng Tian, Shuying Wang, Shen Xu, Qing Zheng. 65-70 [doi]
- RS-TTS: A Novel Joint Entity and Relation Extraction ModelJialu Zhang, Xingguo Jiang, Yan Sun 0004, Hong Luo 0001. 71-76 [doi]
- Investigating Author Research Relatedness through Crowdsourcing: A Replication Study on MTurkAntónio Correia, Dennis Paulino, Hugo Paredes, Diogo Guimarães, Daniel Schneider 0008, Benjamim Fonseca. 77-82 [doi]
- Multi-Source Domain Transfer Learning on Epilepsy DiagnosisAimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv. 83-88 [doi]
- Dirty page prediction by machine learning methods based on temporal and spatial localityYahui Lu, Yu Jiang. 89-94 [doi]
- Complement Coupling Network for Multiple Activated Users Prediction in Social CascadeYuyang Liu, Junruo Gao, Zefang Zhao, Jun Li 0002. 95-100 [doi]
- A Cooperative Two-stage Migrating Birds Optimization Algorithm Based on Quasi-EntropyFuqing Zhao, Tao Jiang. 101-106 [doi]
- Momentum Contrastive Learning for Sequential RecommendationBing Shi, WenAn Tan, Pengfei Yu. 107-112 [doi]
- CHA-Sens: An End-to-End Comprehensive Residual Convolution Framework for CSI-based Human Activity SensingFujia Zhou, Wei Zhang, Guangxu Zhu, Hang Li, Qingjiang Shi. 113-118 [doi]
- MetaBERT: Collaborative Meta-Learning for Accelerating BERT InferenceYangyan Xu, Fangfang Yuan, Cong Cao 0001, Xiaoliang Zhang, Majing Su, Dakui Wang, Yanbing Liu. 119-124 [doi]
- DVFS-based Energy-saving Workflow Offloading Strategy in Mobile Edge Computing EnvironmentsBo Li 0025, Wuwen Chen, Shicheng Jin, Yuhao Shi. 125-130 [doi]
- An Automatic Configuration Memetic Algorithm with Reinforcement Learning Mechanism for Real-value Optimization ProblemsZhenyu Wang, Yanghui Li, Pengfei Fu. 131-136 [doi]
- An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTMRunhuan Chen, Hua Dai 0003, Hui Li, Geng Yang, Haozhe Wu, Weihong Yang. 137-142 [doi]
- An Answer Summarization Scheme Based on Multilayer Attention ModelXiaolong Xu 0002, Yihao Dong, Jian Song. 143-148 [doi]
- Crowdsourced Deals: the Crowd Using Itself to Find and Filter DealsHerbert Salazar Dos Santos, Carlos Eduardo Barbosa, Yuri Oliveira de Lima 0001, Alan De Oliveira Lyra, Matheus Margarido Argôlo, Jano Moreira de Souza. 149-154 [doi]
- An Intelligent Human-Agent Interaction Support System in MedicinePengfei Liu, Liang Xiao. 155-160 [doi]
- Dynamic Privacy-Enhanced Federated Learning Algorithm Based on Gradients PerturbationYuhao Zhao, Siguang Chen. 161-166 [doi]
- Mapping Tokenomics Arrangements to Expand the Digital Nomad EcosystemMarcos Antonio de Almeida, António Correia, Jano Moreira de Souza, Daniel Schneider 0008. 167-174 [doi]
- Intrusion Detection Based on Sampling and Improved OVA Technique on Imbalanced DataYongfei Liu, Hong Li, Wenyuan Zhang, Fei Lv, Shuaizong Si. 175-180 [doi]
- Logic Event Graph Enhanced Narrative GenerationCaiyan Li, LiZhen Cui, Yonghui Xu, Ning Liu 0014. 181-186 [doi]
- Information Diffusion Prediction via Exploiting Cascade Relationship DiversityXigang Sun, Jingya Zhou, Zhen Wu, Jie Wang. 187-192 [doi]
- Understanding the Support of IoT and Persuasive Technology for Smart Bin Design: A Scoping ReviewEmilly Marques Da Silva, António Correia, Claudio Miceli, Daniel Schneider 0008. 193-198 [doi]
- Multi-modal medical image classification method combining graph convolution neural networksXue Lin, Yushui Geng, Jing Zhao, Daquan Cheng, Xuefeng Zhang, Hu Liang. 199-206 [doi]
- An Edge Server Co-deployment Method via Joint Optimization of Communication Delay and Load Balancing in Edge Collaborative EnvironmentZilong Zeng, Buqing Cao, Hongfan Ye, Dong Zhou, Mingdong Tang, Feng Xiao. 207-212 [doi]
- SKRAG: Sampling on Knowledge Graph for Recommendation with Relational Path-aware Graph Neural NetworkYixuan Ge, Qing Yu, Zuohua Wang. 213-218 [doi]
- A Surface Defect Detection Method based on Information EntropyGuoqing Zhang, Hongbo Sun, Xin Liu, Lei Liu. 219-224 [doi]
- Optimization of Resource Allocation based on Swarm Intelligence for Multi-Objective Dynamic SEIV ModelsXiao-Min Hu, Jing-Hui Xu, Min Li, Ying Zeng, Yi Liu. 225-230 [doi]
- Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation ForestHanlin Liu, Jiantao Zhou, Hua Li. 231-236 [doi]
- A Multi-granularity Knowledge-enhanced Sequential RecommendationYingying Xue, Kun Huang, Hui Peng, Aibo Song, Kun Zhao, Jibin Sun. 237-242 [doi]
- IVRSandplay: An Immersive Virtual Reality Sandplay System Coupled with Hand Motion Capture and Eye TrackingHaibo Wang, Ding Ding, Yuhao Liu, Chi Wang. 243-248 [doi]
- Research on Coarse Granularity Data Sample Completion Method for District Heating SystemZheng Luo, Xiaojie Lin, Wei Zhong, Encheng Feng. 249-254 [doi]
- Two-stage Vehicle Pair Dispatch in Multi-hop RidesharingXiaobo Wei, Peng Li 0046, Weiyi Huang, Zhiyuan Liu, Qin Liu. 255-260 [doi]
- AKGIN: An API Knowledge Graph and Intent Network based Mashup-Oriented API Recommendation MethodChangyong Yu, Rong Hu, Bangjun Wang. 261-266 [doi]
- BERT-based Question Answering using Knowledge Graph Embeddings in Nuclear Power DomainZuyang Ma, Kaihong Yan, Hongwei Wang 0001. 267-272 [doi]
- A Self-Attention Based Task-Adaptive Integration of Pre-trained Global and Local Classifiers for Few-Shot ClassificationXiang Li, Renjie Huang, Guoqiang Xiao 0001. 273-278 [doi]
- Dynamic Link Prediction Using Graph Representation Learning with Enhanced Structure and Temporal InformationChaokai Wu, Yansong Wang, Tao Jia 0001. 279-284 [doi]
- Item Multi-Information Evolution Network for Click-Through Rate PredictionXiaojing Ji, Peilin Yang, Qingbo Hao, Wenguang Zheng, Yingyuan Xiao. 285-290 [doi]
- Crowdsourcing Tasks Allocation based on Incentives via Group Multirole AssignmentChenyang Zhang, Lu Liang. 291-296 [doi]
- A Multi-path Routing Protocol based on Node Multiple Performances in Mobile Ad Hoc NetworksZhengyu Hou, Wuyungerile Li, Qinan Li, Bing Jia. 297-302 [doi]
- FreezePipe: An Efficient Dynamic Pipeline Parallel Approach Based on Freezing Mechanism for Distributed DNN TrainingCaishan Weng, Zhiyang Shu, Zhengjia Xu, Jinghui Zhang, Junzhou Luo, Fang Dong 0001, Peng Wang, Zhengang Wang. 303-308 [doi]
- Improved Wild Horse Optimizer with Cooperative Multi-Strategies for Network Intrusion DetectionYang Jin, Hui Xu, Zhengbin Qin, Lang Huang. 309-314 [doi]
- Region Symmetry Mask for TCM-based Face Shape ClassificationXiaoling Zeng, Zhaoyang Yang, Chuanbiao Wen. 315-319 [doi]
- Scoring prediction model focusing on local feature interaction of textHaoqian Li, Jiayi Song, Wenguang Zheng, Yingyuan Xiao. 320-325 [doi]
- Intrusion Detection Method for SCADA System Based on Spatio-Temporal CharacteristicsMeimei Li, Yuhan Li, Nan Li, Zhongfeng Jin, Jiguo Liu, Chao Liu. 326-331 [doi]
- Ensemble Machine Learning Method for Photovoltaic Power ForecastingQingguo Zhou, Xiaorun Tang, Qingquan Lv, Ziyuan Li, Jun Shen, Jinqiang Wang, Binbin Yong. 332-337 [doi]
- Analysis of Students' Seats Distribution Based on Single-channel VideoYan Wang, Chongwen Wang. 338-334 [doi]
- Adaptive error-bounded simplification of Delaunay meshes with multi-objective optimizationCaiyun Wu, Fazhi He, Bo Fan, Yaqian Liang. 345-350 [doi]
- Risk Region-based Prediction Model for the Epidemic SpreadingFuwei Li, Dianjie Lu, Baoxu An, Guijuan Zhang. 351-356 [doi]
- An Improved MOEA Based on Adaptive Adjustment Strategy for Optimizing Deep Model of RFID Indoor PositioningJiahui Liu, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang. 357-362 [doi]
- A Safe-Domain Generative Adversarial Network with Transformer for Noisy Imbalanced Fault DiagnosisXiaohan Zhang, Han Wang, Chenze Wang, Qing Liu, Min Liu. 363-368 [doi]
- Detecting Clickbait in Chinese Social Media by Prompt LearningYin Wu, Mingpei Cao, Yueze Zhang, Yong Jiang. 369-374 [doi]
- Embedded Platform Based Intelligent Lecture Recording SystemJunhua Zhang, Junzhou Luo, Haozhe Zhang, Qingfeng Yuan, Xiaolin Fang. 375-380 [doi]
- Research on the short-term electric load forecasting model based on the graph learning layer and timeseries convolutional networkGuangbin Bao, Bo Zhang, Ling Tang, Jinyuan Yang, Xiaolian Wu. 381-386 [doi]
- Social Network Community Detection based on Inner-Community Information Diffusion Simulation AlgorithmWanying Liang, Yong Tang 0001, Jia Zhu 0003. 387-392 [doi]
- A Novel Bearing Fault Diagnosis Method based on Stacked Autoencoder and End-edge CollaborationChen Yang 0011, Zou Lai, Yingchao Wang, Shulin Lan, Lihui Wang, Liehuang Zhu. 393-398 [doi]
- An Anomaly Detection Method for Multivariate Time Series Based on Cross WindowXin Feng, Xingguo Jiang, Yan Sun 0004, Hong Luo 0001. 399-404 [doi]
- Using the Engagement by Design to Reflect on Recruiting and Selecting IT ProfessionalsJuliana Câmara, Leonardo Pio Vasconcelos, Monica da Silva, Anderson Zudio, Daniela Trevisan, José Viterbo. 405-410 [doi]
- A Fault-tolerant and Cost-efficient Workflow Scheduling Approach Based on Deep Reinforcement Learning for IT Operation and MaintenanceYunsong Xiang, Xuemei Yang, Yan Sun 0004, Hong Luo 0001. 411-416 [doi]
- Discriminative Feature Focus via Masked Autoencoder for Zero-Shot LearningJingqi Yang, Cheng Xie, Peng Tang. 417-422 [doi]
- Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 DatasetYuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak. 423-431 [doi]
- Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVsQun Ding, Xiaolong Xu, Wenming Gui. 432-437 [doi]
- SynCPFL: Synthetic Distribution Aware Clustered Framework for Personalized Federated LearningJunnan Yin, Yuyan Sun, Lei Cui, Zhengyang Ai, Hongsong Zhu. 438-443 [doi]
- A Dynamic Binding Method for Situation-aware IoT Services Targeting Proactive BPMXiuxian Li, Guiling Wang, Yongpeng Shi, Jian Yu. 444-449 [doi]
- Generalized Image Embedding for Multi-Domain Image RetrievalBoao Xiao, Siyuan Wu, Xin He, Wanchun Dou. 450-455 [doi]
- Multi-gate Mixture-of-Expert Combined with Synthetic Minority Over-sampling Technique for Multimode Imbalanced Fault DiagnosisWanqiu Huang, Hanrong Zhang, Peng Peng, Hongwei Wang 0001. 456-461 [doi]
- Tensions in design and participation processes: An ethnographic approach to the design, building and evaluation of a collective intelligence modelRamon Chaves, Claudia Motta, António Correia, Jano de Souza, Daniel Schneider 0008. 462-467 [doi]
- A Multi-level Approach to Learning Early Warning based on Cognitive Diagnosis and Learning Behaviors AnalysisHua Ma 0002, Wen Zhao, Zixu Jiang, Peiji Huang, Wensheng Tang, Hongyu Zhang 0001. 468-473 [doi]
- VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention MechanismJiaqi Chang, Zhujuan Ma, Binghao Cao, Erzhou Zhu. 474-479 [doi]
- Internet of Things in Smart Heating Systems: Critical Technologies Progress and ProspectJiaying Chen, Xiaojie Lin, Wei Zhong, Yihui Mao, Liwei Ding. 480-485 [doi]
- An Epidemic Model Based on Intra- and Inter-group InteractionsWencong Geng, Guijuan Zhang, Dianjie Lu. 486-491 [doi]
- A Multi-action Reinforcement Learning Algorithm for Energy-efficiency Blocking Flow-shop Scheduling ProblemHaizhu Bao, Quanke Pan, Miao Rong, Aolei Yang, Xiaohua Wang. 492-497 [doi]
- vHSFC: Generic and Agile Verification of Service Function Chain with parallel VNFsSheng Chen, Jinxi Li, Baochao Chen, Deke Guo, Keqiu Li. 498-503 [doi]
- Reinforcement Learning Driven Moth-flame Optimization Algorithm for Solving Numerical Optimization ProblemsFuqing Zhao, Qiaoyun Wang, Zesong Xu. 504-509 [doi]
- The malicious resource consumption detection in permissioned blockchain based on traffic analysisQihui Zhou, Qianyun Ruan, Dongdong Huo, Penghui Lv, Yu Wang 0134, Zhen Xu. 510-515 [doi]
- An Overview of Blockchain Scalability for StorageFanshu Gong, Lanju Kong, Yuxuan Lu, Jin Qian, Xinping Min. 516-521 [doi]
- A Machine Vision-based Deep Learning Method in Hemodialysis Filter Defects DetectionXin Liu, Hongbo Sun, Guoqing Zhang, Lei Liu. 522-527 [doi]
- Anomaly Detection of Rolling Element Bearings Based on Contrastive RepresentationXiaotong Lei, Zhe Yang, Yunwei Huang, Jianyu Long, Chuan Li 0003, Huiyu Huang. 528-532 [doi]
- Research on False Comment Recognition Algorithm Integrating crazy fan base Subculture PhenomenonYubo Shen, Wenduo Jiang, Yu Zheng, Ru Jia, Ru Li. 533-538 [doi]
- Optimizing The Access Control System for IOTA Tangle: A Game-Theoretic PerspectiveZhiheng Zhang, Guowei Wu, Kaiwen Ning. 539-544 [doi]
- A Defect Detection Method Based on Parallel Multiple AutoEncodersYirong Wu, Wenjing He, Shuifa Sun, Tinglong Tang. 545-551 [doi]
- MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic EncryptionHan Sun, Yan Zhang, Zhen Xu, Runmei Zhang, Mingxuan Li. 552-558 [doi]
- A Privacy-Preserving Online Deep Learning Algorithm Based on Differential PrivacyJun Li, Fengshi Zhang, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu. 559-564 [doi]
- Blockchain-Assisted UAV Data Free-Boundary Spatial Querying and Authenticated SharingYa Zhang, Xi Lin 0003, Jun Wu 0001, Bei Pei, Yunyun Han. 565-570 [doi]
- TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot LearningYi Liu, Weiqing Huang, Siye Wang. 571-576 [doi]
- Multi-Agent Collaborative Behavior Decision-Making based on Deep Reinforcement LearningXingze Guo, Feng Gao, Xiaojun Zheng, Shiduo Ning. 577-581 [doi]
- Simplified-Xception: A New Way to Speed Up Malicious Code ClassificationXinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu. 582-587 [doi]
- Indoor Navigation Mechanism based on 5G network for Large Parking GarageXiaolong Xu, Qun Ding, Licheng Lin. 588-593 [doi]
- Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based AttackXiaojiao Xie, Pengwei Zhan. 594-599 [doi]
- FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement LearningChengwu Tu, Shengjie Zhao, Hao Deng 0002. 600-605 [doi]
- RW-MMDCG: Muti-modal via Rolling-Window Directed Graph Network for Conversational Emotion RecognitionRuobing Wang, Daren Zha, Qingfei Zhao, Yuanye He, Xin Wang. 606-611 [doi]
- Multi-Information Filter Encoding Network for Multi-Label Text ClassificationLeping Li, Kun Ma, Benkuan Cui. 612-617 [doi]
- Spa-L Transformer: Sparse-self attention model of Long short-term memory positional encoding based on long text classificationShengzhe Zhang, Jiayu Ye, Qingxiang Wang. 618-623 [doi]
- SimulE: A novel convolution-based model for knowledge graph embeddingChaoyi Yan, Xinli Huang, Hongyan Gu, Siyuan Meng. 624-629 [doi]
- A Reputation System based on Blockchain and Deep Learning in Social NetworksHaikun Yu, Dacheng Jiang, Guipeng Zhang, Zhenguo Yang, Wenyin Liu. 630-635 [doi]
- Joint Optimization of Task Offloading and Resource Allocation for Edge Video AnalyticsZhenxuan Xu, Yunzhou Xie, Fang Dong 0001, Shucun Fu, Jiangshan Hao. 636-641 [doi]
- The trip to WiFi indoor localization across a decade - A systematic reviewShuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong 0001. 642-647 [doi]
- QAIC: Quality-assured image crowdsourcing via blockchain and deep learningBaowei Wang, Yi Yuan, Bin Li, Changyu Dai, Yufeng Wu, Weiqian Zheng. 648-653 [doi]
- Providing Patients with Actionable Medical Knowledge: mHealth Apps for LaypeopleYuri Oliveira de Lima 0001, Carlos Eduardo Barbosa, Alan De Oliveira Lyra, Herbert Salazar, Matheus Margarido Argôlo, Jano de Souza. 654-659 [doi]
- Reverse Engineering Workload Measure based on Function ClassificationYuan Liu, Chenyu Li, Zhiqiang Zheng, Qingli Guo, Xiaorui Gong. 660-665 [doi]
- A Trusted and Intelligent Service System for the Decoction of Traditional Chinese MedicineYuntao Ma, Lihe Wang, Junzhou Luo, Xiaolin Fang. 666-672 [doi]
- Deep reinforcement learning-based panic crowd evacuation simulationBaoxu An, Guijuan Zhang, Fuwei Li, Nianyun Song, Hong Liu 0013, Dianjie Lu. 673-678 [doi]
- HyperRTV: Neural-Enhanced Adaptive Real-Time Video Streaming Based on Terminal-Edge CollaborationBaijun Chen, Daheng Yin, Lifei Teng, Fang Dong 0001. 679-684 [doi]
- Spatial-temporal Consistency based Crowd Emotion RecognitionChuanmiao Zhao, Guijuan Zhang, Lei Lv, Hong Liu 0013, Dianjie Lu. 685-690 [doi]
- New Employee Training Scheduling Using the E-CARGO ModelTianshuo Yang, Haibin Zhu. 691-696 [doi]
- Multi-View Heterogeneous Graph Attention NetworkMingxia Zhao, Adele Lu Jia. 697-702 [doi]
- BMDP: Blockchain-Based Multi-Cloud Storage Data ProvenanceFeiyu Wang, Jian-Tao Zhou 0002, Xu Guo. 703-708 [doi]
- Advanced Fast Recovery OLSR Protocol for UAV Swarms in the Presence of Topological ChangeQingxin Liu, Xiaojun Zhu 0001, Chuanxin Zhou, Chao Dong. 709-714 [doi]
- A Population-based Iterated Greedy Algorithm for Distributed No-wait Flow-shop Scheduling ProblemFuqing Zhao, Zesong Xu, Qiaoyun Wang. 715-720 [doi]
- Coordination and Awareness Mechanisms to Support Collaboration in Project-based Software Engineering CoursesMaíra Marques, Roc Meseguer, Sergio F. Ochoa, Luis Silvestre. 721-726 [doi]
- Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learningYi Gao, Fangfang Yuan, Cong Cao 0001, Majing Su, Dakui Wang, Yanbing Liu. 727-732 [doi]
- A Robust Framework for Fixing The Vulnerability of Compressed Distributed LearningYueyao Chen, Beilun Wang, Yan Zhang, Jingyu Kuang. 733-738 [doi]
- Group Role Assignment with a Training Plan Considering the Duration in Adaptive CollaborationShiyu Wu, Meiqiao Pan, Yanyan Fan, Shenglin Li, Libo Zhang. 739-744 [doi]
- BAT: Mining Binary-API Topic for Multi-service Application DevelopmentPengfei He, Linlin Liu, Dianlong You, Limin Shen, Zhen Chen 0007. 745-750 [doi]
- Iterative Greedy Selection Hyper-heuristic with Linear Population Size ReductionFuqing Zhao, Yuebao Liu, Tianpeng Xu. 751-755 [doi]
- An Evolutionary Reinforcement Learning Scheme for IoT RobustnessXinwei Yang, Ning Chen 0008, Songwei Zhang, Xiaobo Zhou 0003, Lejun Zhang, Tie Qiu 0001. 756-761 [doi]
- Smart Energy Platform for Large-space Stadium Construction Based on Internet of ThingsNing Zhang, Tianyue Qiu, Liuliu Du-Ikonen, Xiaojie Lin, Qichao Ye, Jiaying Chen. 762-765 [doi]
- Bi-population Cooperative Moth-flame Optimization Algorithm for the Networking Mode OptimizationShaorong Cao, Yuanyuan Mao, Mingyang Li, Weidong Xie, Chaochao Gao. 766-771 [doi]
- A Fake Message and Malicious Node Detection Method Using Machine Learning in V-NDNZhen Liu, Meiju Yu, Ru Li. 772-777 [doi]
- Computation of Mobile Phone Collaborative Embedded Devices for Object Detection TaskYin Xie, Yigui Luo, Haihong She, Zhaohong Xiang. 778-783 [doi]
- ZoIE: A Zero-Shot Open Information Extraction Model Based on Language ModelYufeng Fu, Xiangge Li, Ce Shang, Hong Luo 0001, Yan Sun 0004. 784-789 [doi]
- A Novel of Proactive Caching Policy for Privacy-Preserving Using Federated Learning and Lottery Hypothesis in Edge ComputingXiaotong Wu, WenAn Tan. 790-795 [doi]
- Crowd Intelligent Grouping Collaboration Evacuation via Multi-agent Reinforcement LearningYuan Tang, Xu Zhang, Rui Wang, Jinfeng Xu, Long Hu, Yixue Hao. 796-801 [doi]
- LiDAR Point Cloud Classification with Coordinate Attention Blueprint Separation Involution Neural NetworkJian Zhou, Guodao Zhang, Liting Dai, Guangjie Zhou, Ruyu Liu. 802-807 [doi]
- UCWSC: A unified cross-modal weakly supervised classification ensemble frameworkHuiyang Chang, Binbin Li, Guangjun Wu, Haiping Wang, Yu Ding, Siyu Jia, Zisen Qi, Xiaohua Jiang. 808-813 [doi]
- Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning MethodBingxu Wang, Gang Xiong 0001, Gaopeng Gou, Jiaying Song, Zhen Li 0011, Qingya Yang. 814-819 [doi]
- VRNavigSS: A Two-dimensionality Virtual Reality System for Depression Level DetectionJi Zheng, Ding Ding, Yuang Zhang, Zidu Cheng, Zhuying Li. 820-824 [doi]
- A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access ControlBenyu Li, Jing Yang 0032, Yuxiang Wang, Xiao Huang, Junshuai Ren, Liming Wang. 825-830 [doi]
- AD-AC Opportunistic Routing Algorithm Based on Context Information of Nodes in Opportunistic NetworksYuqi Wang, Gaofeng Zhang, Yanhe Fu, Gang Xu, Fengqi Wei, Kun Yan. 831-836 [doi]
- On Privacy-Preserving Task Assignment for Heterogeneous Users in Mobile CrowdsensingJi Zhang, Peng Li, Weiyi Huang, Lei Nie, Haizhou Bao, Qin Liu. 837-842 [doi]
- Graph Convolutional Network with Long Time Memory for Skeleton-based Action RecognitionYanpeng Qi, Chen Pang, Yiliang Liu, Hong Liu 0013, Lei Lyu. 843-848 [doi]
- A Constraint-based Recommender System via RDF Knowledge GraphsNgoc Luyen Le, Marie-Hélène Abel, Philippe Gouspillou. 849-854 [doi]
- Smart Cities in Focus: A Bicycle Transport Applications AnalysisLarissa Silva, Marcos Calazans, Leonardo Pio Vasconcelos, Raissa Barcellos, Daniela Trevisan, José Viterbo. 855-860 [doi]
- A Particle Swarm Optimization Algorithm Based on Experience Pool for Multi-UAV Cooperative Reconnaissance Task AllocationGang Wang, Xiao Lv, Kerong Ben, LiangZhong Cui. 861-866 [doi]
- A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural NetworkZhao Li, Jiangchao Chen, Xiaoqing Ma, Meijie Du, Zhongyi Zhang, Qingyun Liu. 867-872 [doi]
- Cost-Optimized Microservice Deployment for IoT Application in Cloud-Edge Collaborative EnvironmentXiaoyuan Zhang, Bing Tang, Qing Yang, Wei Xu, Feiyan Guo. 873-878 [doi]
- Research on Medical Data Storage and Secure Sharing Scheme Based on BlockchainWenxu Han, Qi Li, Meiju Yu, Ru Li. 879-884 [doi]
- T-Sorokin: A General Mobility Model in Opportunistic NetworksJinbin Tu, Qing Li, Yun Wang. 885-890 [doi]
- Singular Value Decomposition Based Pedestrian Trajectory PredictionHeng Wang, Guijuan Zhang, Hong Liu 0013, Dianjie Lu. 891-896 [doi]
- Attention based Dual Stream Modality-aware model for Visible-Infrared Person Re-identificationHaopeng Wang, Wei Wu. 897-902 [doi]
- RZSR Randomly Initialized Zero-Shot Method for Blind Super-ResolutionTianshu Fu, Guanqun Liu 0002, Xin Wang 0086, Daren Zha, Jiahui Shen. 903-908 [doi]
- Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and DomainYue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang. 909-916 [doi]
- Evaluating the Distinguishability of Tor Traffic over Censorship Circumvention ToolsYafeng Song, Ming Yang 0001, Qi Chen, Xiaodan Gu, Yixuan Yao. 917-922 [doi]
- Dynamic Generation of Immersive CAVE Environments: Using Digital Game MechanismsMarina De Lara, Edson José Rodrigues Justino, Edson Emílio Scalabrin. 923-928 [doi]
- EMAR: Edge-Assisted Multi-User Mobile Augmented RealityAojia Lv, Chaokun Zhang, Shen He. 929-934 [doi]
- UAV Enabled Sustainable IoT Network with OTPDRLTiantian Wang, Lei Liu, Hongbo Sun, Jia Hu 0001. 935-940 [doi]
- Building Efficient Parallel Endorsement Node on Blockchain SystemsYaoyi Deng, Mingxuan Li, Hailong Zhang 0001, Dongdong Huo, Yanqiu Zhang, Shuai Yun, Yu Wang, Zhen Xu. 941-946 [doi]
- FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code LocalizationWeihao Huang, Chaoyang Lin, Qiucun Yan, Lu Xiang, Zhiyu Zhang, Guozhu Meng, Kai Chen 0012. 947-952 [doi]
- A Novel Encoder-Decoder Architecture for Table Border Segmentation of Scanned DocumentsKaihong Yan, Haoran Tang, Jian Zhang, Peng Peng, Hongwei Wang 0001. 953-958 [doi]
- Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-ThingsLifu Wang, Kai Dong, Xiaodan Gu, Zhen Ling, Ming Yang. 959-964 [doi]
- Multi-granularity Text Representation and Transformer-Based Fusion Method for Visual Question AnsweringXingang Wang, Xiaoyu Liu, Xiaomin Li, Jinan Cui. 965-971 [doi]
- Detecting and Mitigating Cache Side Channel Threats on Intel SGXWenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng. 972-977 [doi]
- An Aspect Level Sentiment Analysis Method for Graph Convolutional Networks based on Improved DependenciesDonglin Ma, QingQing Chen 0005, Feng-Lin Cao, BoChang He. 978-983 [doi]
- Bi-objective Optimization for UAV Swarm-enabled Relay Communications via Collaborative BeamformingChuang Zhang, Geng Sun 0001, Jiahui Li 0002, Xiaoya Zheng. 984-989 [doi]
- HSFV-based Action Recognition Using Recurrent Neural NetworksHaozhe Wu, Hua Dai 0003, Weihong Yang, Guineng Zheng, Meng Lu, Xiaofei Ji. 990-995 [doi]
- NFT Cross-Chain Transfer Method Under the Notary Group SchemeXiangyu Niu, Lanju Kong, Fuqi Jin, Xiaolin Song, Xinping Min, Qingzhong Li. 996-1001 [doi]
- Multimodal Sentiment Analysis Based on Multiple Stacked Attention MechanismsChao He, Yingshan Shen, Nan Zhong, Dongqing Song, Huijuan Hu, Dingju Zhu, Lihua Cai. 1002-1007 [doi]
- NewsCollab: Fostering Data-driven Journalism with CrowdsourcingYgor Rolim, Danielly Alves, Flávia Clemente, Daniel de Oliveira 0001. 1008-1013 [doi]
- GHunter: A Fast Subgraph Matching Method for Threat HuntingZijun Cheng, Rujie Dai, Leiqi Wang, Ziyang Yu, Qiujian Lv, Yan Wang, Degang Sun. 1014-1019 [doi]
- SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in NetworksLei Sun, Xiaolong Xu. 1025-1030 [doi]
- DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet TrafficYixiang Zhao, Zhou Zhou, Jiang Guo, Wei Yang, Shu Li, Qingyun Liu. 1031-1036 [doi]
- Tensor Nuclear Norm Based Matrix Regression Based Projections for Feature Extraction of Hyperspectral ImagesHong Qiu, Heng Jin, Renfang Wang, Xiufeng Liu, Guang Gao. 1037-1042 [doi]
- CAT: A Collaborative Annotation Tool for Chinese Genealogy Textual DocumentsHuan Jiang, Zihao Wang, Rongrong Li, Yuwei Peng, Zhiyong Peng, Bin Xu. 1043-1048 [doi]
- Industrial Chain Data Evaluation in Automobile Parts Procurement via Group Multirole AssignmentZiqi Xiong, Haibin Zhu, Dongning Liu, Jianhui Xian. 1049-1054 [doi]
- SPYRAPTOR: A Stream-based Smart Query System for Real-Time Threat Hunting within EnterpriseDali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Xianjin Huang. 1055-1062 [doi]
- Online Robust Bin Packing for Resource Allocation in Cloud ComputingBoyu Li, Bin Wu. 1063-1068 [doi]
- Computer Supported Cooperative Work (CSCW) for Business Intelligence Platform in Guangxi Sugar IndustryTing Zhang, Soung-Yue Liew, Xiaotong Li. 1069-1073 [doi]
- A Trust-Delivery Collaborative Recommendation Method Based on Local Differential PrivacyWanqing Wu, Xin Yang, Ruohe Lei. 1074-1079 [doi]
- ATIPM: A Blockchain-Based Anonymous and Traceable Intellectual Property Management SchemeHanghua Zhang, Lubin Lin, Guipeng Zhang, Zhenguo Yang, Wenyin Liu. 1080-1085 [doi]
- CLIP-HASH: A Lightweight Hashing Network for Cross-Modal RetrievalMengying Xu, Hanjiang Lai, Jian Yin 0001. 1086-1091 [doi]
- Node Importance Algorithm of Opportunistic Network Based on Social Properties of NodesGang Xu, Xinyu Hao, Zhihan Qi, Baoqi Huang. 1092-1097 [doi]
- SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery GraphXinyan Li, Yujia Zhu, Xiaoou Zhang, Zhen Jie, Qingyun Liu. 1098-1105 [doi]
- A Framework Using Absolute Compression Hard-Threshold for Improving The Robustness of Federated Learning ModelYuzhang Wu, Beilun Wang. 1106-1111 [doi]
- Multi-Feature Fusion Based Approach for Classifying Encrypted Mobile Application TrafficQingya Yang, Peipei Fu, Junzheng Shi, Bingxu Wang, Zhen Li 0011, Gang Xiong 0001. 1112-1117 [doi]
- A Collaborative Learning Method based on Cross-domain Representation Correlation Congruence DistillationLing Zhang, Rongnan Luo, XiaoJie Mei, Wenchao Jiang. 1118-1123 [doi]
- Pedestrian Identification and Tracking within Adaptive Collaboration Edge ComputingMing Tao, Xueqiang Li 0001, Renping Xie, Kai Ding. 1124-1129 [doi]
- Nodes Grouping Genetic Algorithm for Influence Maximization in Multiplex Social NetworksXiao-Min Hu, Yi-qian Zhao, Zhuo Yang. 1130-1135 [doi]
- Multi-feature content popularity prediction algorithm based on GRU-Attention in V-NDNMin Feng, Meiju Yu, Ru Li. 1136-1141 [doi]
- Jamming-aided Maritime Physical Layer Encrypted Dual-UAVs Communications Exploiting Collaborative BeamformingJiawei Huang, Aimin Wang, Geng Sun 0001, Jiahui Li 0002. 1142-1147 [doi]
- MIA-FedDL: A Membership Inference Attack against Federated Distillation LearningSiqi Liu, Fang Dong 0001. 1148-1153 [doi]
- Representation-Based Time Series Label Propagation for Active LearningDi Chen, Xin-Yi Li, Ang Li, Yu-Bin Yang. 1154-1159 [doi]
- Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive ParametersXijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuan Chen, Yong Cui. 1160-1165 [doi]
- Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks OptimizationTianrui Wang, Weina Niu, Kangyi Ding, Lingfeng Yao, Pengsen Cheng, Xiaosong Zhang 0001. 1166-1171 [doi]
- Multi-scale Convolutional Feature Approximation for Defocus Blur DetectionRui Huang 0006, Huan Lu, Yan Xing, Wei Fan. 1172-1177 [doi]
- A Copyright Authentication Method Balancing Watermark Robustness and Data DistortionChundong Wang 0002, Yue Li. 1178-1183 [doi]
- Spatial-Temporal Aware Business Event Forecasting for Proactive Services from IoT Sensory DataJiayu Zhang, Guiling Wang, Yongpeng Shi, Xin Zheng, Jian Yu. 1184-1189 [doi]
- Multi-Agent Collaborative Trajectory Prediction with Hierarchical Vectorized RepresentationZhang Zhu, Ping Sun. 1190-1195 [doi]
- A Recurrent Self-learning Labeler for Building Network Traffic Ground TruthQingya Yang, Chang Liu 0049, Peipei Fu, Bingxu Wang, Gaopeng Gou, Gang Xiong 0001. 1196-1201 [doi]
- A Process to Analyze Software Ecosystem Social Dimension Through a Collaboration PerspectiveHugo Guércio, Victor Ströele, José Maria N. David, Regina Braga 0001. 1202-1207 [doi]
- Temporal Weighted Heterogeneous Multigraph Embedding for Ethereum Phishing Scams DetectionJiahao Hu, Mingpei Cao, Xizhe Zhang, Xiong Zhang, Yuesheng Zhu. 1208-1213 [doi]
- Privacy Protection Based on Packet Filtering for Home Internet-of-ThingsBeibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong. 1214-1219 [doi]
- A Pure Hardware Design and Implementation on FPGA of WireGuard-based VPN GatewayJihong Liu, Neng Gao, Chenyang Tu, Yifei Zhang, Yongjuan Sun. 1220-1225 [doi]
- Curvature-Driven Knowledge Graph Embedding for Link PredictionDiandian Guo, Majing Su, Cong Cao 0001, Fangfang Yuan, Xiaoliang Zhang, Yanbing Liu, Jianhui Fu. 1226-1231 [doi]
- Similarity Calculation of 3D Building Model based on EMD of Graph FeaturesBingchan Li, Bo Mao. 1232-1237 [doi]
- HeteFed: Heterogeneous Federated Learning with Privacy-Preserving Binary Low-Rank Matrix Decomposition MethodJiaqi Liu, Kaiyu Huang, Lunchen Xie. 1238-1244 [doi]
- BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train DecompositionFanshuo Meng, Peng Li 0011, Weibei Fan, Hongjun Zhang, Zhuangzhuang Xue, Haitao Cheng. 1245-1250 [doi]
- Detection of COVID-19-related Malicious Domain Names Based on Feature FusionHong Zhao, Liyi Han, Weijie Wang. 1251-1256 [doi]
- Federated Opposite Learning Based Arithmetic Optimization Algorithm for Image Segmentation Using Multilevel ThresholdingQingxin Liu, Qi Qi, Ni Li. 1257-1262 [doi]
- An Adaptive Algorithm to Offload Task for User's QoE in Vehicular Edge SystemDonglin Liang, Longfei Ma, Hongna Lou, Liangjie Yu, Yanjun Shi. 1263-1268 [doi]
- A Computational Framework for Effective Representation and Extraction of Knowledge Graph for Power Plant Maintenance and OverhaulChenghan Li, Mingchen Li, Hanzhen Lu, Jiabao Pan, Bo Qin, Hongwei Wang. 1269-1274 [doi]
- Human Semantic Segmentation using Millimeter-Wave Radar Sparse Point CloudsPengfei Song, Luoyu Mei, Han Cheng. 1275-1280 [doi]
- Graph Contrastive Learning with Adaptive Augmentation for Knowledge Concept RecommendationMei Yu, Zhaoyuan Ding, Jian Yu, Wenbin Zhang, Ming Yang, Mankun Zhao. 1281-1286 [doi]
- A Recommender Algorithm Based on Knowledge Graph Convolutional Network and Knowledge Reasoning OptimizationTiyong Liu, Shiwei Cheng. 1287-1292 [doi]
- Stigmergy in Crowdsourcing and Task Fingerprinting: Study on Behavioral Traces of Weather Experts in Interaction LogsDennis Paulino, António Correia, Diogo Guimarães, Ramon Chaves, Glaucia Melo, Daniel Schneider 0008, João Barroso 0001, Hugo Paredes. 1293-1299 [doi]
- AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network AttacksFengyuan Shi, Zhou Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao. 1300-1305 [doi]
- Electrical Fault Diagnosis via Text Mining: A Weakly-Supervised Learning ModelXiao Jing, Zhiang Wu 0001, Dejun Mu. 1306-1311 [doi]
- The Avatar Facial Expression Reenactment Method in the Metaverse based on Overall-Local Optical-Flow Estimation and Illumination DifferenceShuangjiang He, Huijuan Zhao, Li Yu 0003. 1312-1317 [doi]
- ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage SystemsShicheng Xu, Xiaolong Xu. 1318-1323 [doi]
- Network Embedding with Enhanced Feature Representations for Link PredictionWeisheng Li, Wentao Chen, Zhihong Pan 0006, Yuanfei Deng, Yong Tang 0001, Chaobo He. 1324-1329 [doi]
- Collaborative Elaboration of Design Fiction Narratives with Participatory Design Fiction ExtendJosé Orete do Nascimento, Ana Cristina Bicharra Garcia, Sean Wolfgand Matsui Siqueira. 1330-1335 [doi]
- Research on patent recommendation method based on graph neural networkEnchao Zhang, Weidong Liu, Shi Liu, Yan Cao. 1336-1341 [doi]
- A Reinforcement Learning-driven Iterated Greedy Algorithm for Traveling Salesman ProblemXi Song, Mingyang Li, Weidong Xie, Yuanyuan Mao. 1342-1347 [doi]
- Energy-Efficient Data Consistency based Sampling Rate Optimization and Aggregation Method for IoTYazeed AlZahrani, Jun Shen 0001, Jun Yan 0005. 1348-1353 [doi]
- The Use of Design Thinking for Reflection in Recruitment and Selection of IT ProfessionalsFernanda Henriques, Melina Souza, Leonardo Pio Vasconcelos, Magaywer Moreira de Paiva, Elaine Seixas, Daniela Trevisan, José Viterbo. 1354-1359 [doi]
- Abnormal Crowd Behavior Detection Based on the Fusion of Macro and Micro FeaturesShourong Jiao, Dianjie Lu, Chuanhua Jia, Hong Liu 0013, Guijuan Zhang. 1360-1365 [doi]
- Optimal Datacenter Selection for Cloud Services Using Swarm IntelligenceShusmoy Chowdhury, Ajay Katangur. 1366-1371 [doi]
- A Signal Control Algorithm of Urban Intersections based on Traffic Flow PredictionXiao-Min Hu, Gang-Qi Wang, Min Li, Zi-Liang Chen. 1372-1377 [doi]
- Self-supervised community detection in multiplex networks with graph convolutional autoencoderXingyu Liu, Junwei Cheng, Hao Cheng, Chaobo He, Qimai Chen, Quanlong Guan. 1378-1383 [doi]
- DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix TransformationDongdong Zhao 0001, Ying Chen, Jianwen Xiang, Huanhuan Li. 1384-1389 [doi]
- Graph Pooling based Human Detection Method for Industrial ApplicationYinning Shao, Yukai Zhao, Hang Yu, Min Liu, Yunlong Ma. 1390-1395 [doi]
- TSFN: an Effective Time Series Anomaly Detection Approach via Transformer-based Self-feedback NetworkHongwei Wu, Rong Yang, Huang Qing, Kedong Liu, Zhuojun Jiang, Yangxi Li, Hong Zhang. 1396-1401 [doi]
- DeepCall: A Fast and Robust Malware Classification System with DGCNN and Function Call GraphYanhui Chen, Yun-feng, Chengchun Wang, Jianjun Zhao, Qixu Liu. 1402-1408 [doi]
- BIFLC: A Blockchain and IPFS-Based Multi-Consensus Federated Learning FrameworkJing Li, Jufeng Sun, Fengyong Li, Xingkai Yang, Yuwei Wang. 1409-1414 [doi]
- Matrix of Fused Features-based Approach for Tor Application ClassificationDong Liu, Can Wang, Weidong Zhang, Xuangou Wu. 1415-1420 [doi]
- Quality-Oriented Task Assignment for Heterogeneous Users in Mobile CrowdsensingKang Chenri, Peng Ijri, Weiyi Huang, Lei Nie, Haizhou Bao, Qin Liu 0003. 1421-1426 [doi]
- Internet of Things in Power Systems: A Bibliometric AnalysisYanhao Feng, Xiaojie Lin, Zitao Yu. 1427-1432 [doi]
- Blockchain-based Trust Management Mechanism in V-NDNZhen Liu, Meiju Yu, Ru Li. 1433-1438 [doi]
- Exploring Patent Transformation Event: Forecasting Patent Transfer TimeJinchen Huo, Weidong Liu, Yang Li, Yan Cao. 1439-1445 [doi]
- DevFinder: An approach to finding expert software developers considering desired technologies and industry domainsVitor Queiroz de Campos, José Maria N. David, Victor Ströele, Regina Braga 0001, Alessandreia M. Oliveira. 1446-1451 [doi]
- A Variable Neighborhood Search Algorithm for Heat Pipe-Constrained Component Layout OptimizationShichen Tian, Zhiyun Deng, Jiaxin Fan, Chunjiang Zhang, Weiming Shen 0001, Liang Gao 0001. 1452-1457 [doi]
- QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of VehiclesBo Li, Zisu Na, Rongrong Qian, Hongwei Ding. 1458-1463 [doi]
- TorDNS: A Novel Correlated Onion Address Generation Approach and ApplicationChunmian Wang, Junzhou Luo, Zhen Ling, Ming Yang 0001, Xiaodan Gu, Yu Yao. 1464-1469 [doi]
- A New Targeted Online Password Guessing Algorithm Based on Old PasswordXizhe Zhang, Xiong Zhang, Jiahao Hu, Yuesheng Zhu. 1470-1475 [doi]
- A Normalizing Flow-based Unsupervised Anomaly Detection ApproachLuyao Xu, Cheng Xie, Yuran Dong. 1476-1483 [doi]
- A Method of Hybrid Fabric and Inertial Sensor for Human Posture PerceptionXu Ru, Chenghao Zhang, Heng Zhang 0012. 1484-1489 [doi]
- ASKCC-DCNN-CTC: A Multi-Core Two Dimensional Causal Convolution Fusion Network with Attention Mechanism for End-to-End Speech RecognitionRongchuang Lv, Niansheng Chen, Songlin Cheng, Guangyu Fan, Lei Rao, Xiaoyong Song, Dingyu Yang. 1490-1495 [doi]
- Leveraging Knowledge-Aware Method for Charge PredictionWei Li, Shiyu Zhu, Li Li. 1496-1501 [doi]
- Privacy-Preserved Video Monitoring Method with 3D Human Pose EstimationJifan Shen, Yuling Sun. 1502-1507 [doi]
- Secure Data Sharing for Cross-domain Industrial IoT Based on Consortium BlockchainXinze Yu, Yunzhou Xie, Qiujie Xu, Zhuqing Xu, RunQun Xiong. 1508-1513 [doi]
- Zero-Shot Offline Handwritten Chinese Character Recognition with Graph EmbeddingXiong Zhang, Zhenyu Weng, Xizhe Zhang, Jiahao Hu, Yuesheng Zhu. 1514-1519 [doi]
- A Graph Sequence Generator and Multi-head Self-attention Mechanism based Knowledge Graph Reasoning ArchitectureYuejia Wu, Jian-Tao Zhou. 1520-1525 [doi]
- A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability EstimationDapeng Wang, Haobo Qiu, Liang Gao 0001. 1526-1531 [doi]
- A Multi-view Knowledge Graph Embedding Model Considering Structure and SemanticsJia Peng, Neng Gao, Yifei Zhang, Min Li. 1532-1537 [doi]
- Lightweight Image Dehazing Algorithm Based on Detail Feature EnhancementChenxing Gao, Lingjun Chen, Caidan Zhao, Xiangyu Huang, Zhiqiang Wu. 1538-1543 [doi]
- Who Are Querying For Me? Egress Measurement For Open DNS ResolversMeng Luo 0006, Liling Xin, Yepeng Yao, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi. 1544-1550 [doi]
- Decentralized Application Identification via Burst Feature AggregationChen Yang, Can Wang, Weidong Zhang, Huiyi Zhang, Xuangou Wu. 1551-1556 [doi]
- PTC: Prompt-based Continual Encrypted Traffic ClassificationWei Cai, Chengshang Hou, Chang Liu 0049, Gaopeng Gou, Gang Xiong, Zhen Li. 1557-1562 [doi]
- MDPFL: A Multiple Differential Privacy Protection Method based on Federated LearningXinyu Liu, Xiaolong Xu. 1563-1568 [doi]
- Do Explainable AI techniques effectively explain their rationale? A case study from the domain expert's perspectiveFábio Luiz D. Morais, Ana Cristina Bicharra Garcia, Paulo Sérgio Medeiros dos Santos, Luiz Alberto Pereira Afonso Ribeiro. 1569-1574 [doi]
- Weakly Supervised Object Detection with Pyramid Squeeze Attention and Candidate Box Screening AlgorithmWanchuan Jiang, Ling Ou. 1575-1580 [doi]
- Long-Short Terms Frequency: A Method for Encrypted Video Streaming IdentificationMeijie Du, Minchao Xu, Kedong Liu, Weitao Tang, Lijuan Zheng, Qingyun Liu. 1581-1588 [doi]
- Community Detection with Graph Convolutional Auto-Encoder and Deep ClusteringRu Wang, Peipei Wang, Lin Li 0001, Peiyu Liu 0001. 1589-1594 [doi]
- Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing ImagesRenfang Wang, Zijian Yang, Hong Qiu, Xiufeng Liu, Dun Wu. 1595-1600 [doi]
- An improved Priority-Based Level Algorithm for just-in-time schedulingYuxin Chen, Yue Hong, Caie Wang. 1601-1606 [doi]
- Adaptive Shapelet Selection for Time Series ClassificationYanxuan Wei, Yunxia Wang, Mingsen Du, Yupeng Hu, Cun Ji. 1607-1612 [doi]
- ZAlert: A Real Time Prediction Framework For Network AlertShuYang Zuo, Xiaolin Chai, Hong Luo 0001, Yan Sun 0004. 1613-1618 [doi]
- Systematic Mapping Review on Log Preparation for Process MiningLuiz Fernando Puttow Southier, Sheila Cristiana De Freitas, Adriano Pizzini, Eduardo Alves Portela Santos, Edson Emílio Scalabrin. 1619-1624 [doi]
- Accelerate Multi-view Inference with End-edge Collaborative ComputingWangbing Cheng, Minfeng Zhang, Fang Dong 0001, Shucun Fu. 1625-1631 [doi]
- Multi-Modal Deep Reinforcement Learning for Edge-Assisted Video AnalyticsShen He, Chaokun Zhang, Aojia Lv, Jingshun Du, Wenyu Qu. 1632-1637 [doi]
- A Multimodal Knowledge Graph for Medical Decision Making Centred Around Personal ValuesZhang Liu, Liang Xiao, Jianxia Chen, Lili Song, Peng Qi, Zefang Tong. 1638-1643 [doi]
- Defending Poisoning Attacks in Federated Learning via Loss Value Normal DistributionFei Han, Yao Zhang, Meng Zhao. 1644-1649 [doi]
- Intelligent Manufacturing Collaboration Platform for 3D Curved Plates Based on Graph MatchingYanjun Dong, Haoyuan Hu, Min Zhu, Pan Hu, Lihong Jiang, Hongming Cai. 1650-1655 [doi]
- Single Application Service Deployment in the Edge Environment Based on the E-CARGO ModelSenyue Zhang, Ling Xue, Weiliang Huang, Lu Zhao, Ke Li. 1656-1661 [doi]
- An Intelligent Anti-jamming Decision-making Method Based on Deep Reinforcement Learning for Cognitive RadarWen Jiang, Yanping Wang, Yang Li, Yun Lin, Wenjie Shen. 1662-1666 [doi]
- DSP-Based Industrial Defect Detection for Intelligent ManufacturingHan Yue, Rucen Wang, Yi Gao, Ailing Xia, Jianhua Zhang. 1667-1672 [doi]
- Continuous User Trust Assessment Based on Emphasized Contextual Differentiation Behavior AnalysisRi Wang, Chen Li, Ruibang You. 1673-1678 [doi]
- An Application-oriented Perspective of Domain Generalization for Cross-Domain Fault DiagnosisChao Zhao, Weiming Shen 0001. 1679-1684 [doi]
- TFSF: Topological and Feature Space Fusion with Spatio-Temporal Modeling for Crop Yield PredictionShifeng Xu, Yijing Zhou, Xiaoyang Yu, Cuiting Huang, Chao Wu. 1685-1690 [doi]
- An Improved LSTM based Method for User Behavior Classification in VR ScenesHao Zhou, Bingchan Li, Bo Mao. 1691-1696 [doi]
- MRIN: Fine-grained Feature Interaction based on Multiple Feature Relationships for CTR PredictionJianbang Ju, Yingyuan Xiao, Peilin Yang, Wenguang Zheng. 1697-1702 [doi]
- Group Signature Authentication Scheme with Credit Evaluation Mechanism in VANETYanfei Lu, Suzhen Cao, Qizhi He, Zixuan Fang, Junjian Yan, Yi Guo. 1703-1709 [doi]
- Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by FeintTianyang Cai, Yuqi Li, Tao Jia 0001, Leo Yu Zhang, Zheng Yang. 1710-1715 [doi]
- Towards Dynamic Evolutionary Analysis of ProgrammableWeb for API-Mashup EcosystemYang Wang, Jiayan Xiang, Hangyu Cheng, Wanjun Chen, Yong Xiao, Guosheng Kang. 1716-1721 [doi]
- An Architecture to Support the Development of Collaborative Systems in IoT ContextMateus Gonçalo do Nascimento, José Maria N. David, Mário Antônio Ribeiro Dantas, Regina Maria Maciel Braga Villela, Victor Ströele de Andrade Menezes, Fernando Antonio Basile Colugnati. 1722-1727 [doi]
- Robust Preference Learning for Recommender Systems under Purchase Behavior ShiftsJunruo Gao, Yuyang Liu, Zhaojuan Yue, Haibo Wu, Jun Li. 1728-1733 [doi]
- Neural Network Model Pruning without Additional Computation and Structure RequirementsYin Xie, Yigui Luo, Haihong She, Zhaohong Xiang. 1734-1740 [doi]
- Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNNXiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen. 1741-1747 [doi]
- Applying Robust Gradient Difference Compression to Federated LearningYueyao Chen, Beilun Wang, Tianyi Ma, Cheng Chen. 1748-1753 [doi]
- "Policies Look for the Elderly": A Knowledge Graph Based Care Information Recommendation SystemHe Xiao, Yuling Sun. 1754-1759 [doi]
- A Human Pose Similarity Calculation Method Based on Partition Weighted OKS ModelWeihong Yang, Hua Dai 0003, Haozhe Wu, Geng Yang, Meng Lu, Guineng Zheng. 1760-1765 [doi]
- Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model CompressionJing Tian, Juan Chen, Ningjiang Chen, Lin Bai, Suqun Huang. 1766-1771 [doi]
- A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement LearningXiang Cao, Ningjiang Chen, Xuemei Yuan, YiFei Liu. 1772-1777 [doi]
- Research on AGV Path Planning of Simultaneous Pickup and Delivery with Time WindowFeng Gao, Xingze Guo, Xiaojun Zheng, Shiduo Ning. 1778-1782 [doi]
- Implementation of a Cost-Effective Privacy Leakage Detection System for Hosted ProgramsTian Hu, Shangyuan Zhuang, Jiyan Sun, YinLong Liu, Wei Ma, Yu Chen, Weiyu Liu. 1783-1788 [doi]
- Information Dissemination Model Based on Blockchain Social NetworkQi Li, Wenxu Han, Lin Zhao, Meiju Yu, Ru Li, Ru Jia. 1789-1795 [doi]
- Time-Aware POI Recommendation Based on Multi-Grained Location GroupingHaoxiang Zhang, Wenchao Bai, Jingyi Ding, Jiahui Jin. 1796-1801 [doi]
- Covertness Analysis of Snowflake Proxy RequestYibo Xie, Gaopeng Gou, Gang Xiong 0001, Zhen Li 0011, Mingxin Cui. 1802-1807 [doi]
- Who Gets in the Way of Parallelism? Analysis and Optimization of the Parallel Processing Bottleneck of SDN Flow Rules in ONOSZixuan Ma, Yuqi Zhang, Ruibang You, Chen Li. 1808-1813 [doi]
- The Design of a Multi-Agent Protocol for Swarm Decision MakingXiaorui Guo, Liang Xiao. 1814-1819 [doi]
- An Industrial Internet of Things-oriented Malicious Traffic Detection Network with Neural Network Partial Architecture SearchYubo Wang, Xiaolong Xu. 1820-1825 [doi]
- Latency-aware Partial Task Offloading in Collaborative Edge ComputingYingmeng Gao, Jie Zhu 0002, Haiping Huang, Chen Chen. 1826-1831 [doi]
- Group Popularity Prediction in EBSN based on an Improved Self-Excited Hawkes ProcessXing'e Yan, Chang Liu, Hanyu Luo, Jiuxin Cao. 1832-1837 [doi]
- A Rule-based Ramp Merging Algorithm for Multilane Highway in CAV EnvironmentsHongna Lou, Chaoying Li, Donglin Liang, Meng Yang, Yanjun Shi. 1838-1842 [doi]
- A Hybrid Control Strategy based on Neural Network and PID for Underwater Robot HoveringYinghao Wu, Yaoguang Wei, Dong An, JinCun Liu. 1843-1848 [doi]
- Flower Image Identification and Feature Extracting Method Based on Transfer LearningXiaofei Xing, Zimeng Wang, Xiaoli Chen, Yunxuan Zeng, Siqi He. 1849-1854 [doi]
- LMQF: Hyperledger Fabric Concurrent Transaction Conflict Solution Based on Distributed Lock and Message QueueZhigang Xu, Duoyue Liao, Xinhua Dong, Hongmu Han, Zhongzhen Yan, Kangze Ye. 1855-1860 [doi]
- Cross-Modal Fusing Vision-Language Network for Referring Image SegmentationYu Zhao, Wei Wu, Yue Guo. 1861-1866 [doi]
- Privileged Label Enhancement with Adaptive GraphQin Qin, Chao Tan, Chong Li, Genlin Ji. 1867-1872 [doi]
- Adult Learners' Online Engagement and Perceived Outcomes with Educational Key Opinion Leaders: a Two-Phase StudyXiaochen Zhang, Jun Shen 0001, Jun Yan 0005. 1873-1877 [doi]
- Outsourced Products Task Allocation via Group Multirole Assignment with Considering VarianceZiqing Ye, Haibin Zhu, Dongning Liu, Jianhui Xian. 1878-1883 [doi]
- Efficient Federated Learning Aggregation Protocol Using Approximate Homomorphic EncryptionPan Yao, He Wang, Chao Zheng, Jing Yang, Liming Wang. 1884-1889 [doi]
- Unsupervised Graph Neural Network with Self-Expressive Attention for Community DetectionXu Sun, Weiyu Zhang, Xinchao Guo, Wenpeng Lu. 1890-1895 [doi]
- Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain AdaptationGewangzi Du, Liwei Chen, Tongshuai Wu, Xiong Zheng, Ningning Cui, Gang Shi. 1896-1901 [doi]
- Energy-Constrained Task Scheduling in Heterogeneous Distributed SystemsChen Chen, Jie Zhu 0002, Haiping Huang, Yingmeng Gao. 1902-1907 [doi]
- Code Property Graph based Vulnerability Type Identification with Fusion RepresentationChenguang Zhu, Tongshuai Wu, Ningning Cui, Xiong Zheng, Liwei Chen, Gang Shi. 1908-1913 [doi]
- SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labelingChaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng. 1914-1919 [doi]
- Understanding Military Collaboration in WargamesLeandro Ouriques, Carlos Eduardo Barbosa, Geraldo Xexéo. 1920-1925 [doi]
- Interactive Web API Recommendation for Mashup Development based on Light Neural Graph Collaborative FilteringJiayan Xiang, Wanjun Chen, Yang Wang, Bowen Liang, Zihao Liu, Guosheng Kang. 1926-1931 [doi]
- Measurement and Optimization of Repetition Scheme in NB-IoT UplinkKai Chen, Xiangmao Chang, Jun Zhan, Yanchao Zhao. 1932-1937 [doi]
- Production Evaluation of Citrus Fruits based on the YOLOv5 compressed by Knowledge DistillationYuqi Li, Zirui Gong, Yihang Zhou, Yuting He, Renjie Huang. 1938-1943 [doi]
- Agenda of Solutions to Mitigate the Challenge of Polarization of Extreme Positions in Social Media EnvironmentsAna Paula Pimentel, Claudia Motta, António Correia, Daniel Schneider 0008. 1944-1949 [doi]
- A Matheuristic-based Rescheduling Method for Flexible Job Shops with Lot-streaming and Machine ReconfigurationsJiaxin Fan, Chunjiang Zhang, Weiming Shen 0001. 1950-1955 [doi]