Abstract is missing.
- Modeling Smart Cyber Physical Systems Based on ModelicaMLLichen Zhang. 1-8 [doi]
- A Secure Connectivity Model for Internet of Things Analytics Service DeliveryHussain Al-Aqrabi, Richard Hill. 9-16 [doi]
- A Scalable Model for Secure Multiparty AuthenticationHussain Al-Aqrabi, Richard Hill. 17-22 [doi]
- Characteristics Analysis and Impact Cluster on Urban Rail Transit Perturbations: A Real Case in BeijingMingming Wang, Li Wang 0032, Xinyue Xu, Yong Qin. 23-28 [doi]
- Graph CNNs for Urban Traffic Passenger Flows PredictionJing Li, Hao Peng, Lin Liu, Guixi Xiong, Bowen Du, Hongyuan Ma, Lihong Wang, Md. Zakirul Alam Bhuiyan. 29-36 [doi]
- Individualized Smart Charging to Mitigate the Growing Electrical Peak Demand from EVs as Home AppliancesAshutosh Shivakumar, Miteshkumar Vasoya, Sean Morrison, Yong Pei. 37-44 [doi]
- Behavior Recognition of Moving Objects Using Deep Neural NetworksJiasong Zhu, Weidong Lin, Ke Sun 0006, Xianxu Hou, Bozhi Liu, Guoping Qiu. 45-52 [doi]
- Optimization of Bus Lines Based on Passenger Group Moving BehaviorsSyed Muhammad Asim Ali Rizvi, Weifeng Lv, Bowen Du, Zhipu Xie, Runhe Huang. 53-60 [doi]
- An Abnormal Behavior Detection Based on Deep LearningJunwei Zhang, Jiaxiang Ou, Chao Ding, Wenbin Shi. 61-65 [doi]
- Monitoring System to Strive against Fall Armyworm in Crops Case Study: Maize in RwandaDamien Hanyurwimfura, Eric Nizeyimana, Faustine Ndikumana, Didacienne Mukanyiligira, Abubakar Bakar Diwani, Florence Mukamanzi. 66-71 [doi]
- Designing Recommender System for Corporate Education WiP+32Monisha Bhattacharya, Dhruva Gupta, Shantanu Biswas, Gunjan Bansal. 72-76 [doi]
- Multicast Tree Generation Technique Using Reinforcement Learning in SDN EnvironmentsHo-Jin Heo, Namgi Kim, Byoung-Dai Lee. 77-81 [doi]
- Smart Vehicles: The Data Privacy SmogStephanie Haynes, Paul Wooderson. 82-87 [doi]
- Smart Office System with Face Detection at the EdgeChristopher Prentice, Georgios Karakonstantis. 88-93 [doi]
- An Ensemble Learning Framework for Credit Card Fraud Detection Based on Training Set Partitioning and ClusteringHongyu Wang, Ping Zhu, Xueqiang Zou, Sujuan Qin. 94-98 [doi]
- An Improved Iterated Hybrid Search for DNA Codes DesignZhenghui Liu, Bin Wang 0005, Changjun Zhou, Xiaopeng Wei, Qiang Zhang, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng. 99-105 [doi]
- An Item-Diversity-Based Collaborative Filtering Algorithm to Improve the Accuracy of Recommender SystemWenjun Yang, Shuzhen Fan, Huaibin Wang. 106-110 [doi]
- Wearable Ear Blood Oxygen Saturation and Pulse Measurement System Based on PPGGang Ma, Wenliang Zhu, Jun-zhong, Teng Tong, Jie Zhang, Lirong Wang. 111-116 [doi]
- Automated Segmentation of Esophagus Layers from OCT Images Using Fast Marching MethodMiao Zhang, Cong Wang, Meng Gan, Na Yang, Ting Yang, Lirong Wang. 117-122 [doi]
- A Wearable High-Precision Skin Resistance Acquisition SystemKongpeng Xing, Jun-zhong, Wenliang Zhu, Gang Ma, Teng Tong, Lirong Wang. 123-127 [doi]
- Design of a Portable Physiological Signal Data Storage SystemJie Zhang, Wenliang Zhu, Gang Ma, Teng Tong, Jun-zhong, Lirong Wang. 128-132 [doi]
- Wearable Arteriovenous Fistula Murmur Monitoring System Based on Embedded Wi-Fi TechnologyTeng Tong, Lishen Qiu, Jun-zhong, Chongsen Zang, Bin Chen, Lirong Wang. 133-138 [doi]
- Heartbeat Classification Using Convolution Neural Network and Wavelet Transform to Extract FeaturesLishen Qiu, Wanyue Li, Wenqiang Cai, Miao Zhang, Wenliang Zhu, Lirong Wang. 139-143 [doi]
- Design of Remote Database Service System for Wearable DevicesLongfei Niu, Wenliang Zhu, Lirong Wang. 144-149 [doi]
- Model-Based Active Impedance Controller Development of the Exoskeleton Rehabilitation Robot (ERRobot) for Lower-ExtremityLei Shi. 150-155 [doi]
- Maximum Frequent Itemsets Discovery Algorithm Based on Granular ComputingHaicheng Chi, Zhen Liu. 156-161 [doi]
- A Naïve Construction Model of Membership FunctionZhenzhen Wang. 162-167 [doi]
- Measuring Interestingness of Theorems in Automated Theorem Finding by Forward Reasoning: A Case Study in Tarski's GeometryHongbiao Gao, Jianbin Li, Jingde Cheng. 168-173 [doi]
- Improvement of Data Portability of ENQUETE-BAISE: A General-Purpose E-Questionnaire Server for Ubiquitous QuestionnaireYohei Kamata, Yuichi Goto. 174-179 [doi]
- FreeEnCal Web: A Web Service of Automated Forward Reasoning for General-PurposeTakumi Otsuka, Kentaro Fukushi, Yuichi Goto, Jingde Cheng. 180-185 [doi]
- An Implementation of Theory Grid with Linked Data TechnologiesTomoya Yamazaki, Atomu Sakuma, Yuichi Goto. 186-191 [doi]
- Primitive Constituent Elements of Cryptographic ProtocolsSho Ishibashi, Jingchen Yan, Yuichi Goto, Jingde Cheng. 192-197 [doi]
- Evaluation about the Descriptive Power of QSL: A Specification Language for E-Questionnaire, E-Testing, and E-Voting SystemsYuan Zhou, Daisuke Matsuura, Yuichi Goto, Jingde Cheng. 198-203 [doi]
- Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Da Bao, Wen Sun, Yuichi Goto, Jingde Cheng. 204-209 [doi]
- A Study on Fine-Grained Security Properties of Cryptographic Protocols for Formal Analysis Method with ReasoningJingchen Yan, Sho Ishibashi, Yuichi Goto, Jingde Cheng. 210-215 [doi]
- Deep Learning-Based Online Small Signal Stability Assessment of Power Systems with Renewable GenerationJun Cao, Zhong Fan. 216-221 [doi]
- An Epistemic Programming Approach for Automated Nonmonotonic Reasoning Based on Default LogicYuichi Goto, Takuya Ito. 222-227 [doi]
- Stability Analysis and Hopf Bifurcation Research for DNA Strand Displacement with Time DelayYanhong Liu, Hui Lv, Changjun Zhou, Zhixiang Yin, Xianwen Fang, Zhonglong Zheng, Qiang Zhang. 228-233 [doi]
- An Undergraduate Curriculum Model for Intelligence Science and TechnologyJingde Cheng, Runhe Huang, Qun Jin, Jianhua Ma, Yi Pan. 234-239 [doi]
- Type Conversion Sequence Recommendation Based on Semantic Web TechnologyHaibo Yu 0001, Xi Jia, Tsunenori Mine, Jianjun Zhao. 240-245 [doi]
- Managing Lifetime Healthcare Data on the BlockchainMark Hanley, Hitesh Tewari. 246-251 [doi]
- A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting ProtocolZijian Bao, Bin Wang, Wenbo Shi. 252-256 [doi]
- Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease BurdenAsoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai. 257-262 [doi]
- Generate Public Randomness Based on BlockchainYanxue Jia, Lei Fan. 263-270 [doi]
- Blockchain-Based Ubiquitous Code Ownership Management System without Hierarchical StructureHirotsugu Seike, Takeo Hamada, Takahiro Sumitomo, Noboru Koshizuka. 271-276 [doi]
- A Dynamic Multi-Objective Evolutionary Algorithm for Nontrivial Upper Bounds of Real-Time Tasks in Embedded System DesignHai-feng Xing, Jiantao Zhou, Xiaoyu Song, Rui-dong Qi. 277-286 [doi]
- A Leakage-Resilient FPGA-Based IP Identity Authentication ProtocolJing Long, Dafang Zhang, Wei Liang 0005, Kuan-Ching Li. 287-292 [doi]
- DopGest: Dual-Frequency Based Ultrasonic Gesture RecognitionQi Liu, Wei Yang, Yang Xu, Yahui Hu, Qijian He, Liusheng Huang. 293-300 [doi]
- A Novel Bidirectional RFID Identity Authentication ProtocolSongyou Xie, Wei Liang, Jianbo Xu, Mingdong Tang, Tien-hsiung Weng, Kuan-Ching Li. 301-307 [doi]
- Executable Micro-Architecture Modeling and Automatic Verification of EtherCATShun Wang, Xiaojuan Li, Yong Guan, Rui Wang, Jie Zhang. 308-315 [doi]
- Mining the Critical Conditions for New Hypotheses of Materials from Historical Reaction DataZhenchao Ouyang, Yu Liu, Jianwei Niu. 316-322 [doi]
- A Wikipedia Two-Way Link Vector Model for Measuring Semantic RelatednessXinhua Zhu, Qingsong Guo, Bo Zhang. 323-330 [doi]
- Dynamic Representation Learning for Video Action Recognition Using Temporal Residual NetworksYongqiang Kong, Jianhui Huang, Shanshan Huang, Zhengang Wei, Shengke Wang. 331-337 [doi]
- Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical ScenarioShao-yi Zhu, Siye Wang, Fangtao Zhang, Yanfang Zhang, Yue Feng, Weiqing Huang. 338-345 [doi]
- EmotionSense: Emotion Recognition Based on Wearable WristbandBobo Zhao, Zhu Wang, Zhiwen Yu 0001, Bin Guo. 346-355 [doi]
- Scheduling Algorithm for Area Coverage Problem in Directional Sensor NetworksZhimin Liu, Guihua Duan, Guojun Wang. 356-363 [doi]
- A Two-Stage Incremental Update Method for Fall Detection with Wearable DeviceJianfei Shen, Yiqiang Chen, Zhiqi Shen, Siyuan Liu. 364-371 [doi]
- Alexa, My Love: Analyzing Reviews of Amazon EchoYang Gao, Zhengyu Pan, Honghao Wang, Guanling Chen. 372-380 [doi]
- Resource-Aware Stream Processing in High Performance Cloud EnvironmentYingchao Cheng, Zhifeng Hao, Ruichu Cai, Wen Wen, Lijuan Wang, Zhongrun Zhou. 381-388 [doi]
- Secure and Effective Geo-Data Transmission Scheme for Vehicle-to-Vehicle CommunicationTrupil Limbasiya, Debasis Das. 389-396 [doi]
- Web Services Clustering Based on HDP and SOM Neural NetworkQiaoxiang Xiao, Buqing Cao, Xiangping Zhang, Jianxun Liu, Rong Hu, Bing Li. 397-404 [doi]
- An Implicit Information Based Movie Recommendation StrategyJie Chen, Junjie Peng, Yingtao Wang, Gan Chen. 405-410 [doi]
- Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large NumbersWei Ren 0002, Simin Li, Ruiyang Xiao, Wei Bi. 411-416 [doi]
- A Synchronous Gossip Algorithm with Exponential BackoffLei Zhang, Weiqing Cheng, Yinglin Hou. 417-424 [doi]
- APRNN: A New Active Propagation Training Algorithm for Distributed RNNDejiao Niu, Tianquan Liu, Zheng Xia, Tao Cai, Yawen Liu, Yongzhao Zhan. 425-431 [doi]
- Semantic Web-Based Approach to Support Rational Unified Process Software DevelopmentUdsanee Pakdeetrakulwong. 432-438 [doi]
- Embedding-Level Attention and Multi-Scale Convolutional Neural Networks for Behaviour ModellingAitor Almeida, Gorka Azkune, Aritz Bilbao. 439-445 [doi]
- A Smile Detection Method Based on Improved LeNet-5 and Support Vector MachineMiao Ma, Ziang Gao, Jie Wu, Yuli Chen, Xue Zheng. 446-451 [doi]
- Enabling Efficient Stroke Prediction by Exploring Sleep Related FeaturesJia Xie, Zhu Wang, Zhiwen Yu 0001, Bin Guo. 452-461 [doi]
- Real-Time Data Processing Architecture for Multi-Robots Based on Differential Federated LearningWei Zhou, Yiying Li, Shuhui Chen, Bo Ding. 462-471 [doi]
- A Synergistic Cloud Service Approach for Cold Start ProblemsRui-dong Qi, Jiantao Zhou, Xiaoyu Song. 472-479 [doi]
- A Domain-Specific Approach to Unifying the Many Dimensions of Context-Aware Home Service DevelopmentNic Volanschi, Adrien Carteron, Charles Consel. 480-489 [doi]
- A Cloud Workflow Model Based on Resources SelectionJiantao Zhou 0002, Xianyang Li, Yan Wang 0037, Xiaoyu Song. 490-495 [doi]
- Research on Human Motion Recognition Based on Wi-Fi and Inertial Sensor Signal FusionYao Shu, Chong Chen, Kuang-I Shu, Heng Zhang. 496-504 [doi]
- GPS Trajectories Based Personalized Safe Geofence for Elders with DementiaQiang Lin, Xinshuai Liu, Weilan Wang. 505-514 [doi]
- Improving Large Scale Real-Time Ridesharing with Heuristics for Road NetworksJunqi Ning, Rong Chen, Zhifeng Zhou. 515-521 [doi]
- CIGAN: A Novel GANs Model Based on Category InformationJianwei Niu, Zheng Li, Shasha Mo, Boyu Fan. 522-529 [doi]
- WiFit: Ubiquitous Bodyweight Exercise Monitoring with Commodity Wi-Fi DevicesShengjie Li, Xiang Li, Qin Lv, Guiyu Tian, Daqing Zhang 0001. 530-537 [doi]
- An Efficient Method for Optimizing PETSc on the Sunway TaihuLight SystemLetian Kang, Zhi-jie Wang, Zhe Quan, Weigang Wu, Song Guo 0001, Kenli Li, Keqin Li 0001. 538-545 [doi]
- Towards a Truthful Online Auction for Cooperative Mobile Task ExecutionJunyi He, Di Zhang, Yuezhi Zhou, Xiang Lan, Yaoxue Zhang. 546-553 [doi]
- Resource Demand Forecasting Approach Based on Generic Cloud Workload ModelChunyan An, Jiantao Zhou. 554-563 [doi]
- Optimizing the Performance-Cost Tradeoff in Cross-Edge AnalyticsLin Jia, Zhi Zhou, Hai Jin 0001. 564-571 [doi]
- Multi-Channel Lightweight Convolution Neural Network for Anterior Myocardial Infarction DetectionYufei Chen, Huihui Chen, Ziyang He, Cong Yang, Yangjie Cao. 572-578 [doi]
- Interrupt-Driven Fall Detection System Realized via a Kalman Filter and kNN AlgorithmJian He, Zihao Zhang, Weiguo Yu. 579-584 [doi]
- A Direction-Based Vehicular Network Model in Vehicular Fog ComputingYalan Wu, Jigang Wu, Gangqiang Zhou, Long Chen 0006. 585-589 [doi]
- Wi-Fi Based Gesture Recognition Using Deep Transfer LearningQirong Bu, Gang Yang, Jun Feng 0003, Xingxia Ming. 590-595 [doi]
- Constructing Hierarchical Spatiotemporal Information for Action RecognitionGuangle Yao, Jiandan Zhong, Tao Lei, Xianyuan Liu. 596-602 [doi]
- Weakly Secure Coded Distributed ComputingRuimin Zhao, Jin Wang, Kejie Lu, Jianping Wang, Xiumin Wang, Jingya Zhou, Chunming Cao. 603-610 [doi]
- Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service CompositionJingbin Zhang, Peikai Zheng, Meng Ma, Ping Wang. 611-618 [doi]
- A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed SensingGuorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang 0009, Pengfei Yin. 619-626 [doi]
- Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality EstimationJie Xu, Wei Ding, Xiaoyan Hu. 627-634 [doi]
- A Body Simulator with Delayed Health State TransitionYinglong Dai, Xiangyong Liu, Guojun Wang. 635-641 [doi]
- Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud ComputingJiaye Shao, Yanqin Zhu, Qijin Ji. 642-649 [doi]
- A QoE-Based Governor for Web Browsing on Heterogeneous Mobile SystemsJie Ren. 650-655 [doi]
- Stochastic Analysis on Fog Computing Empowered Mobile Crowdsensing with D2D CommunicationsHaixiang Hou, Hai Jin 0001, Xiaofei Liao, Deze Zeng. 656-663 [doi]
- Towards Wi-Fi Radar in Collapsed StructuresMuhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xiaofei Xing. 664-670 [doi]
- QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting DevicesHailliang Zhao, Wei Du, Wei Liu, Tao Lei, Qiwang Lei. 671-678 [doi]
- Accurately Counting Steps of the Pedestrian with Varying Walking SpeedsXiaomin Kang, Baoqi Huang, Runze Yang, Guodong Qi. 679-686 [doi]
- A Dynamic Role Assignment Formation Control Algorithm Based on Hungarian MethodHuiying Wang, Dianxi Shi, Bingnan Song. 687-696 [doi]
- Hierarchy Value Density - A Priority Algorithm for Task Scheduling on CloudLing Kuang, Lichen Zhang. 697-704 [doi]
- Clustering Large-Scale Origin-Destination Pairs: A Case Study for Public Transit in BeijingMiao Li, Beihong Jin, Hongyin Tang, Fusang Zhang. 705-712 [doi]
- Crime Rate Inference Using Tensor DecompositionLiang Ge, Junling Liu, Aoli Zhou, Hang Li. 713-717 [doi]
- Multi-Depth-Camera Sensing and Interaction In Smart SpaceXiaoyang Wu, Chun Yu, Yuanchun Shi. 718-725 [doi]
- A Novel and Distributed Approach for Activity Recognition Inside Smart HomesValère Plantevin, Abdenour Bouzouane, Bruno Bouchard 0001, Sébastien Gaboury. 726-733 [doi]
- CRNet: Corner Recognition from Trajectories Based on Convolutional and Recurrent Neural NetworksBang Wang. 734-740 [doi]
- Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat IntelligenceKe Li, Hui-Wen, Hong Li, Hongsong Zhu, Limin Sun. 741-747 [doi]
- SWATS: A Lightweight VANET Anonymous Traceback System Based on Random Superposition WatermarkingXiaoliang Wang, Jianming Jiang, Liang Bai, Baowei Wang. 748-755 [doi]
- Urban Road Traffic Congestion Detection Using RFID Data of VehiclesLinjiang Zheng, Li Chen, Yadong Liu, Jing Huang, Mujun He, Weining Liu. 756-763 [doi]
- What Wrist Temperature Tells Us When We Sleep Late: A New Perspective of Sleep HealthJing Wei, Jin Zhang 0009, Jennifer Boger. 764-771 [doi]
- Performance Evaluation of Hypervisors and the Effect of Virtual CPU on PerformanceHafiz ur Rahman, Guojun Wang, Jianer Chen, Hai Jiang. 772-779 [doi]
- Multi-Resident Activity Recognition with Unseen Classes in Smart HomesWei Wang, Chunyan Miao. 780-787 [doi]
- A Cache Placement Strategy for Energy Savings in CCNHongjia Wu, Gaocai Wang, Xiaotong Xu, Jintian Hu. 788-795 [doi]
- Semi-Supervised Learning with Ensemble Self-Training for Cancer ClassificationQing-Yong Wang, Liang-Yong Xia, Hua Chai, Yun Zhou. 796-803 [doi]
- RSU Controlled Named Data Networking for Traffic Information Dissemination in Vehicular NetworksSiyang Wang, Jian Deng, Weigang Wu, Jieying Zhou. 804-811 [doi]
- Traffic Flow Prediction for Road Intersection SafetyWalaa Alajali, Wanlei Zhou, Sheng Wen. 812-820 [doi]
- A Lightweight Anonymous Mobile User Authentication Scheme for Smart GridBin Yang, Guangquan Xu, Xianjiao Zeng, Jia Liu, Yao Zhang. 821-827 [doi]
- Continuous K Nearest Neighbor Query Scheme with Privacy and Security Guarantees in Road NetworksTian Wang 0001, Hui Tian, Wenxian Jiang. 828-833 [doi]
- Power Control in D2D-Based Vehicle Communication with Delayed CSI FeedbackXi Han, Yang Liu, Zhixin Liu, Yuanai Xie, Tian Wang 0001. 834-840 [doi]
- Mining and Analyzing User Feedback from App Reviews: An Econometric ApproachTong Guo, Bin Guo, Yi Ouyang, Zhiwen Yu 0001. 841-848 [doi]
- Affective Content Analysis of Online Video Clips with Live Comments in ChineseJianwei Niu, Shijie Li, Shasha Mo, Sen Yang, Boyu Fan. 849-856 [doi]
- An Offloading Approach in Fog Computing EnvironmentWenda Tang, Shu Li, Wajid Rafique, Wanchun Dou, Shui Yu. 857-864 [doi]
- Utility-Aware Trip PlanningFeng Gao, Kai Han, Ke Xu. 865-872 [doi]
- DeepAid: A Mobile Cognitive Aid System with Compacted Deep LearningShiwei Song, Yan Lei, Kang Yang, Tianzhang Xing, Jinping Niu, Feng Chen, Dingyi Fang. 873-880 [doi]
- An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart GridHui Cao, Shubo Liu, Zhitao Guan, Longfei Wu, Haonan Deng, Xiaojiang Du. 881-886 [doi]
- An Annulus Local Search Based Localization (ALSL) Algorithm in Indoor Wi-Fi EnvironmentsHao Zhang, Kai Liu, Feiyu Jin, Chao Chen, Chen Zhan, Jianjun Li, Liang Feng. 887-892 [doi]
- Attributed Community Search in Dynamic NetworksJiahao Zhang, Kai Han, Junxiao Han, Feiyang Li, Shasha Li. 893-900 [doi]
- Non-Intrusive Biometric Identification for Personalized Computing Using Wireless Big DataZhiwei Zhao, Zifei Zhao, Geyong Min, Chang Shu, Zhe Wang, Hancong Duan. 901-908 [doi]
- Deep Collaborative Filtering Incorporating Auxiliary Multi-Media InformationShuang Li, Yanghui Yan, Chao Wu 0002, Kaichuan Zhao, Yuezhi Zhou, Yaoxue Zhang. 909-916 [doi]
- Fast Online Map Matching for Recovering Travelling Routes from Low-Sampling GPS DataXiangting Hou, Linbo Luo, Wentong Cai, Masatoshi Hanai. 917-924 [doi]
- Exploiting Implicit Trust and Geo-Social Network for RecommendationFeiyang Li, Kai Han, Yue Li, Jiahao Zhang. 925-931 [doi]
- A Workflow Scheduling Method for Cloudlet Management in Mobile CloudJie Zhang, Lianyong Qi, Yuan Yuan 0003, Xiaolong Xu, Wanchun Dou. 932-937 [doi]
- Inspecting Influences on Likes and Comments of Photos in InstagramJianghua Huang, Changjian Wang, Majing Su, Qiong Dai, Md. Zakirul Alam Bhuiyan. 938-945 [doi]
- A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle RecognitionShaobo Zhang, Qing Peng, Xiong Li, Gengming Zhu, Jing Liao. 946-953 [doi]
- Generating Expert's Review from the Crowds': Integrating a Multi-Attention Mechanism with Encoder-Decoder FrameworkXiaofei Ding, Wenjun Jiang, Jiawei He. 954-961 [doi]
- Personalized Search with Secure Updates in Educational ResourcesQiang Zhang, Guihua Duan, Guojun Wang. 962-969 [doi]
- Low-Dimensional Vectors Learning for Influence MaximizationFeng Wang, Wenjun Jiang, Guojun Wang. 970-976 [doi]
- Fine-Grained Task-Dependency Offloading in Mobile Cloud ComputingShengli Pan 0003, Chun Liu, Deze Zeng, Hong Yao, Zhuzhong Qian. 977-982 [doi]
- Spatial-Aware Deep Recommender SystemSteven Mudda, Defu Lian, Silvia Giordano, Danyang Liu, Xing Xie 0001. 983-990 [doi]
- Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart ContractsSaqib Ali, Guojun Wang, Md. Zakirul Alam Bhuiyan, Hai Jiang. 991-998 [doi]
- Group-Based Competitive Influence MaximizationYajun Dai, Wenjun Jiang, Kenli Li. 999-1006 [doi]
- TNERec: Topic-Aware Network Embedding for Scientific Collaborator RecommendationXiangjie Kong, Mengyi Mao, Jiaying Liu 0006, Bo Xu, Ruihe Huang, Qun Jin. 1007-1014 [doi]
- Utilizing the Bidirectional Effect of Evolutive Trust-Rating for Recommendation in E-CommerceJie Yao, Wenjun Jiang. 1015-1022 [doi]
- Coupled Collective Matrix FactorizationLiying Zhang, Longbing Cao, Sheng Luo, Lei Gu, Yijin Chen, Yuanfeng Lian. 1023-1030 [doi]
- Request Answering in Vehicular Ad-Hoc Networks Based on Adaptive FiltersYongxuan Lai, Hailin Lin, Xing Gao, Fan Yang, Shaoyi Yin. 1031-1038 [doi]
- Sentiment Classification Based on Clause Polarity and Fusion via Convolutional Neural NetworkBin Jiang, Hefeng Zhang, Chao Lv, Chao Yang. 1039-1044 [doi]
- Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in CloudsMingfeng Su, Pin Liu, Guojun Wang. 1045-1051 [doi]
- A Comparison of Inertial Data Acquisition Methods for a Position-Independent Soil Types RecognitionFlorentin Thullier, Valère Plantevin, Abdenour Bouzouane, Sylvain Hallé, Sébastien Gaboury. 1052-1056 [doi]
- T-Suite: A RESTful Distributed Development and Runtime Environment on Things DevicesXiaohui Peng, Lu Chao, Yifan Wang, Zhiwei Xu. 1057-1062 [doi]
- An Adaptive Partition Method for Handling Skew in Spark ApplicationsWei Lv, Zhuo Tang, Kenli Li, Keqin Li. 1063-1070 [doi]
- Simulation Verifications of ZND Control for Dynamics-Included Robot Systems Extended from One Link to Multiple LinksMengling Xiao, Binbin Qiu, Deyang Zhang, Mingzhi Mao, Yunong Zhang. 1071-1076 [doi]
- Deep Optical Flow Feature Fusion Based on 3D Convolutional Networks for Video Action RecognitionTongwei Lu, Shihui Ai, Yongyuan Jiang, Yudian Xiong, Feng Min. 1077-1080 [doi]
- Vehicular Named Data Networking Based on Efficient Incremental Route UpdateJian Deng, Siyang Wang, Weigang Wu. 1081-1086 [doi]
- An Operation-Level Collaborative Filtering Approach Based on Logistic Function for Web Services RecommendationRong Hu, Jianxun Liu. 1087-1094 [doi]
- A Control System Architecture with Cloud Platform for Multi-UAV SurveillanceChen Hong, Dianxi Shi. 1095-1097 [doi]
- Detecting Transportation Modes with Low-Power-Consumption Sensors Using Recurrent Neural NetworkHao Wang, Haiyong Luo, Fang Zhao 0003, Yanjun Qin, Zhongliang Zhao, Yiqu Chen. 1098-1105 [doi]
- A Novel Text Classification Method for Emergency Event Detection on Social MediaYanfang Liu, Jianwei Niu 0002, Qingjuan Zhao, Jianghua Lv, Shilong Ma. 1106-1111 [doi]
- An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data PublishingYujia Zhu, Xuejin Yan, Shuqi Li, Yuyou Fan, Li Kuang. 1112-1117 [doi]
- Catalyze Sharing Economy: Optimized Multi-Task Allocation for Urban Transport CrowdsourcingPengfei Wang, Ruiyun Yu. 1118-1123 [doi]
- Compressed Sensing and Implicit Cooperativity Based Data Gathering Algorithm in Mobile Crowdsensing SystemsRuiyun Yu, Xingyou Xia, Yan Zhou. 1124-1129 [doi]
- A System Framework for Efficiently Recognizing Web CrawlersWeiping Zhu, Jiangbo Qin, Ruoshan Kong, Hai Lin, Zongjian He. 1130-1133 [doi]
- A Epilepsy Drug Recommendation System by Implicit Feedback and Crossing RecommendationChun Chen, Lu Zhang, Xiaopeng Fan, Yang Wang 0006, Chengzhong Xu, Renkai Liu. 1134-1139 [doi]
- SHAstor: A Scalable HDFS-Based Storage Framework for Small-Write Efficiency in Pervasive ComputingLingfang Zeng, Wei Shi, Fan Ni, Song Jiang, Xiaopeng Fan, Chengzhong Xu, Yang Wang. 1140-1145 [doi]
- GHHP: Genetic Hybrid Hierarchical Partitioning for Community Structure in Social Medias NetworksRadhia Toujani, Jalel Akaichi. 1146-1153 [doi]
- An Efficient Recognition Method for Incomplete Iris Image Based on CNN ModelRongrong Shi, Yiming Wang, Yifeng Chen, Cheng Wu. 1154-1159 [doi]
- Human Action Recognition: A Feature Point Trajectory and Space-Time Interest Point Based ApproachXinyi Chen. 1160-1164 [doi]
- Testbed for Wide-Area Environment ObservationXiaohan Liu. 1165-1168 [doi]
- K-Means Based Edge Server Deployment Algorithm for Edge Computing EnvironmentsBo Li 0025, Keyue Wang, Duan Xue, Yijian Pei. 1169-1174 [doi]
- Mining Learning Styles for Personalised eLearningKhawla Alhasan, Liming Chen 0001, Feng Chen. 1175-1180 [doi]
- Autonomous Resource Scheduling for Real-Time and Stream ProcessingYingchao Cheng, Zhongrun Zhou. 1181-1184 [doi]
- Bed-Exit Prediction Based on 3D Convolutional Neural NetworkTian-Xiang Chen, Rong-Shue Hsiao, Chun-Hao Kao, Ding-Bing Lin, Bo-Ru Yang. 1185-1188 [doi]
- POMon: From Simple Keyword Matching to Stream-Based Live Probabilistic Topic MatchingKun Ma, Xuewei Niu, Ziqiang Yu, Ke-ji. 1189-1192 [doi]
- Adaptive Optimization Design of Vector Error Diffusion Algorithm and IP Core for FPGAPengfei Yang, Quan Wang, Tao Guo, Wei Li, Zhiqiang Zhang. 1193-1198 [doi]
- Energy-Aware Automatic Tuning of Many-Core Platform via Gradient DescentSamer Akiki, Zhiliu Yang, Chen Liu 0001, Jie Tang 0003, Shaoshan Liu. 1199-1203 [doi]
- Women Safety Device Designed Using IoT and Machine LearningMuskan, Teena Khandelwal, Manisha Khandelwal, Purnendu Shekhar Pandey. 1204-1210 [doi]
- Study on Energy Minimization Data Transmission Strategy in Mobile Cloud ComputingFangsu Wang, Gaocai Wang. 1211-1218 [doi]
- Location-Semantic Aware Privacy Protection Algorithms for Location-Based ServicesHongyun Xu, Yaohui Zheng, Jian Zeng, Cheng Xu. 1219-1224 [doi]
- Theoretical Analyses and Results of Taylor-Zhang Discretization Formula and ZeaD4Ig2_Y Formula Generating Discrete-Time Solutions of ODE Dynamic SystemsHuan-Chang Huang, Min Yang, Binbin Qiu, Ziyu Yin, Yunong Zhang. 1225-1230 [doi]
- Research on Multi-Dimensional Opportunistic Communication Routing Protocol in Vehicular Ad-Hoc NetworksZongtao Duan, Yingjuan Lei, Yishui Zhu, Lei Tang 0002, Na Fan, Jinhui Tang. 1231-1236 [doi]
- A Lightweight Authentication Protocol for V2V Communication in VANETsHarsha Vasudev, Debasis Das. 1237-1242 [doi]
- A Human Flesh Search Algorithm Based on Information PuzzleFuzhong Nian, Yaqiong Zhang, Xinmeng Liu. 1243-1248 [doi]
- Credit Card Fraud Detection via Kernel-Based Supervised HashingZhenchuan Li, GuanJun Liu, Shuo Wang, Shiyang Xuan, Changjun Jiang. 1249-1254 [doi]
- A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party ComponentWanggen Xie, Jinchang Hu, Patrick Kwaku Kudjo, Lei Yu, Zhifeng Zeng. 1255-1259 [doi]
- A New Cryptosystem Based on Positive BraidsXiaoming Chen, Weiqing You, Meng Jiao, Kejun Zhang, Shuang Qing, Zhiqiang Wang. 1260-1264 [doi]
- Resource Transaction Framework Based on Block Chain in Social CommunityLinyu Wang, Bo Yin, Ke Gu. 1265-1270 [doi]
- Modeling Methods for Cloud Based Cyber Physical SystemsLichen Zhang. 1271-1276 [doi]
- A Privacy Preserving Outlier Detection Algorithm Based on Connected DomainZhaoyu Shou, Xiawei Cheng, Simin Li. 1277-1282 [doi]
- Load Aware Management of Cloudlets for a Wireless Area Metropolitan NetworkXiaolong Xu, Md. Zakirul Alam Bhuiyan, Lianyong Qi, Xuyun Zhang, Wanchun Dou. 1283-1288 [doi]
- The Performance Evaluation Model of Intel SGX-Based Data ProtectionWei Zheng, Shichao Cao, Zhiqian Gao, Xiaoxue Wu, Qian Ding. 1289-1292 [doi]
- Road Speed Fusion Model Based on Wavelet Neural Network Optimized by Genetic AlgorithmJiguo Liu, Rui Sun, Haitao Yu. 1293-1298 [doi]
- VJournaling: Improving the Write Performance of a Virtualized Journaling File SystemDingding Li, Wande Chen, Zhengyang Wu, Hai Liu, Yong Tang. 1299-1304 [doi]
- Deep Convolutional Mesh RNN for Urban Traffic Passenger Flows PredictionZou Zhene, Peng Hao, Liu Lin, Guixi Xiong, Bowen Du, Md. Zakirul Alam Bhuiyan, Yuntao Long, Da Li. 1305-1310 [doi]
- An Academic Social Network Friend Recommendation Algorithm Based on Decision TreeZuoxi Yang, Dingding Li, Ronghua Lin, Yong Tang, Weiling Li, Hai Liu. 1311-1316 [doi]
- Repurchase Prediction Based on Ensemble LearningDanqi Xu, Wenyin Yang, Li Ma. 1317-1322 [doi]
- Personalized App Recommendation Based on Hierarchical EmbeddingDong Liu, Wenjun Jiang. 1323-1328 [doi]
- Aspect-Based Personalized Review RankingChunli Huang, Wenjun Jiang. 1329-1334 [doi]
- Understanding the Evolution of Fine-Grained User Opinions in Product ReviewsPeike Xia, Wenjun Jiang. 1335-1340 [doi]
- Water Level Estimation Based on Image of Staff Gauge in Smart CityZhikang Xu, Jing Feng, Zhizheng Zhang, Chaofan Duan. 1341-1345 [doi]
- A Mokov Decision Process Approach to Optimizing Waiting for TaxisHuigui Rong, Xudong Zhang, Qin Liu, Qiaoyue Yang, Jiewei Gu. 1346-1351 [doi]
- Cost Efficient State-Aware Function Placement and Flow Scheduling for NFV NetworksDeze Zeng, Lin Gu, Yunsong Chen, Shengli Pan 0003, Zhuzhong Qian. 1352-1357 [doi]
- A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and CorrelationXiaoxue Wu, Dan Tang, Liu Tang, Jianping Man, Sijia Zhan, Qin Liu. 1358-1363 [doi]
- Power Curtailment in Cloud Environment Utilising Load Balancing Machine AllocationAmir Javadpour, Guojun Wang, Samira Rezaei, Shuhong Chen. 1364-1370 [doi]
- Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN NetworksAmir Javadpour, Niusha Adelpour, Guojun Wang, Tao Peng. 1371-1377 [doi]
- Speed Regulation of Overhead Catenary System Inspection Robot for High-Speed Railway through Reinforcement LearningSiqi Li, Cheng Xu, Lipei Chen, Zhenmin Liu. 1378-1383 [doi]
- Accelerating a Secure Programmable Edge Network System for Smart ClassroomWatipatsa W. Nsunza, A.-Q. Ransford Tetteh, Xiaojun Hei. 1384-1389 [doi]
- Ubiquitous Healthcare System Based on the Sensors Network and Android Internet of Things GatewayOana Geman, Iuliana Chiuchisan, Ioan Ungurean, Marius Hagan, Muhammad Arif. 1390-1395 [doi]
- Using Data Till 1996, 2008 and 2017 via Full-Traversal Addition-Subtraction Frequency (ASF) Method with Consistent Analysis to Predict Possible M6.6-or-Above Earthquakes in Sichuan-Yunnan Region of ChinaYunong Zhang, Ruifeng Wang, Mengling Xiao, Jinjin Guo, Chengxu Ye. 1396-1401 [doi]
- From Historical Data through ASF Method of Equal-Type Half Traversal to Predict USA Presidential Parties from 2021 to 2041Yunong Zhang, Jiatu Wu, Ruifeng Wang, Chengxu Ye, Yingbiao Ling. 1402-1407 [doi]
- Highway Traffic Volume Prediction via Stacking KNN, SVR, MLP, RNNZhilong Lu, Weifeng Lv, Zhipu Xie, Tongyu Zhu. 1408-1413 [doi]
- Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge GraphKarim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo, Mumbere Muyisa Forrest. 1414-1421 [doi]
- An Efficient Cooperative Co-Evolutionary Gene Expression ProgrammingTiantian Cheng, Jinghui Zhong. 1422-1427 [doi]
- Automated Optimization of Longitudinal Tensile Reinforcement in RC Beam Using Binary PSO AlgorithmZhou Wu, Nian Ao, Chengran Xu, Liang Feng, Jiepeng Liu. 1428-1431 [doi]
- Ant Colony Optimization Based Salient Object Detection for Weak Light ImagesNan Mu, Xin Xu 0007, Xiaolong Zhang 0002. 1432-1437 [doi]
- An Efficient Ant Colony Programming ApproachDongrui Li, Yongliang Chen. 1438-1443 [doi]
- A Kalman Filter Based Indoor Tracking System via Joint Wi-Fi/PDR LocalizationHao Zhang, Yusheng Xia, Kai Liu, Feiyu Jin, Chao Chen, Yong Liao. 1444-1449 [doi]
- A Multiobjective RNA Secondary Structure Prediction Algorithm Based on NSGAIIKai Zhang, Yulin Lv. 1450-1454 [doi]
- Task Scheduling for Cloud Based Cyber-Physical SystemsDandan Lai, Lichen Zhang, Bingqing Xu, Chunyao Liu. 1455-1460 [doi]
- An Optimization Strategy for Improving Security in SteganographyXiancheng Wu, Shunquan Tan. 1461-1466 [doi]
- Leaks or Not: A Framework for Evaluating Cache Timing Side Channel Attacks in SGXYing Wu, Wei Zheng, Baolei Mao, Xiaoxue Wu. 1467-1470 [doi]
- Calligraphy: A Mobile Device Based Annotation Tool Supporting Learner CrowdsourcingQingcheng Li, Heng Cao, Guangming Zheng, Ye Lu. 1471-1478 [doi]
- Data Offloading for Deadline-Varying Tasks in Mobile Edge ComputingZhipeng Gao, Jie Meng, Qian Wang 0015, Yang Yang 0006. 1479-1484 [doi]
- Generalized Nash Equilibrium Model of the Service Provisioning Problem in Multi-Cloud CompetitionsPeini Liu, XinJun Mao, Fu Hou, Shuai Zhang. 1485-1490 [doi]
- Toward an Efficient Cache Management FrameworkXuewei Niu, Kun Ma. 1491-1496 [doi]
- Distributed Data Collection in a Cyclic MobiSpaceYong-yan Cui, Sheng Zhang, Zhi Ma. 1497-1502 [doi]
- Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral PatternsVasileios Kouliaridis, Konstantia Barmpatsalou, Georgios Kambourakis, Guojun Wang. 1503-1508 [doi]
- A Centralized and Conflict-Free Routing Table Update Method through Triplets' Lists Vector in SDN ArchitecturesJean Frédéric Myoupo, Yannick Florian Yankam, Vianney Kengne Tchendji. 1509-1515 [doi]
- Verified Programs for Frequent Itemset MiningFrédéric Loulergue, Christopher D. Whitney. 1516-1523 [doi]
- A Kalman Filter Based Hill-Climbing Strategy for Application Server ConfigurationWeiyu Ye, Yanxiang Tong, Chun Cao. 1524-1531 [doi]
- MTF: Mitigating Link Flooding Attacks in Delay Tolerant NetworksZhaoxu Wang, Huachun Zhou, Bohao Feng, Wei Quan, Shui Yu. 1532-1539 [doi]
- A Hybrid MIP-Based Heuristic for the Optimal Design of DVB-T2 NetworksFabio D'Andreagiovanni, Hicham Lakhlef, Antonella Nardin. 1540-1546 [doi]
- Software Defect Prediction Model Sharing Under Differential PrivacyDun Zhang, Xiang Chen 0005, Zhanqi Cui, Xiaolin Ju. 1547-1554 [doi]
- Crowdsensing Based Barometer Sensor Calibration Using SmartphonesHaibo Ye, Xuansong Li, Kai Dong. 1555-1562 [doi]
- Monitoring and Predicating Accidents for Interlocking Systems Based on SHAYan Wang, Xiaohong Chen 0001. 1563-1570 [doi]
- Consideration on Propagation of Disaster Information Among Different Types of Terminals for Grass-Roots Information Distribution System Using MANETEiji Utsunomiya, Yuya Minami. 1571-1576 [doi]
- ALChecker: A Tool for Checking Mobile AmbientsXuansong Li, Wei Song, Haibo Ye. 1577-1581 [doi]
- A Prefetching Scheme for Multi-Tiered Storage SystemsChia-Yu Chen, Chien-Yi Liu, Hsung-Pin Chang. 1582-1586 [doi]
- Real-Time Push-Based Data Forwarding for Target Tracking in Vehicular Named Data NetworkingAnnadil Alinani, Karim Alinani. 1587-1592 [doi]
- Interactive Bulk Synchronous Parallel Functional Programming in a BrowserJulien Tesson, Frédéric Loulergue. 1593-1598 [doi]
- Development of Disaster Monitoring Techniques in the Grass-Root Information Distribution System for Detecting Landslide DangersMasahiro Nishi, Haruki Kozato, Yusuke Ota, Koichi Shin. 1599-1604 [doi]
- Adaptability Enhancement for Progressive Download Methods Based on Timer-Driven Requesting Schemes Using Multiple TCP Flows on Multiple PathsJunichi Funasaka. 1605-1610 [doi]
- Arbitration-Based Deadlock Mitigation Mechanism for Fast Connection Establishment in Autonomous Self-Organized Bluetooth MANETsYuya Minami, Nobuhiro Kajikawa, Ryohei Saka, Yuma Nakao, Eitaro Kohno, Yoshiaki Kakuda. 1611-1616 [doi]
- Structured Policy-Based Design Method for Cybersecurity of Automotive E/E SystemToru Sakon, Yukikazu Nakamoto. 1617-1622 [doi]
- A Proposal and Evaluation of Mobility Model Which Derives Various Node Mobility ScenariosHiroyuki Toyota, Shinji Inoue, Yoshiaki Kakuda. 1623-1627 [doi]
- Optimizing Network I/O Virtualization for Scale-Out ProcessorBaozi Chen. 1628-1635 [doi]
- Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic NetworksWeihua Huang, Zhong Ma, Xinfa Dai, Mingdi Xu. 1636-1642 [doi]
- MiKANT: A Mirrored K-Ary N-Tree for Reducing Hardware Cost and Packet Latency of Fat-Tree and Clos NetworksYamin Li, Wanming Chu. 1643-1650 [doi]
- A Distributed Data Allocation Scheme for Autonomous NodesKostas Kolomvatsos, Panagiotis Oikonomou, Maria G. Koziri, Thanasis Loukopoulos. 1651-1658 [doi]
- Optimal Placement for Smart Mobile Access PointsAmin Majd. 1659-1667 [doi]
- Performance Evaluation of In-Packet Membership Querying Algorithm for Large-Scale NetworksWen-Kang Jia, Yi Wu. 1668-1675 [doi]
- An Autonomous Model Construction Mechanism in Dynamic Sensor NetworksLiqiu Ma, Yuanyuan Bao, Wai Chen. 1676-1683 [doi]
- A Communication-Aware Energy-Efficient Graph-Coloring Algorithm for VM Placement in CloudsNikos Tziritas, Thanasis Loukopoulos, Samee Khan, Cheng-Zhong Xu 0001, Albert Y. Zomaya. 1684-1691 [doi]
- A Fast and Accurate Replica Selection Mechanism Using Explicit Multicast for CDNsWen-Kang Jia, Yi Wu. 1692-1696 [doi]
- Deploying Structured Media Server Cluster in Media Cloud Using Ant Colony OptimizationXiang Gao, Weizhan Zhang, Junquan Liu, Qinghua Zheng. 1697-1704 [doi]
- Hypergraph Partitioning for Big Data ApplicationsWenyin Yang, Li Ma, Ruchun Cui, Guojun Wang. 1705-1710 [doi]
- Mining Taxi Pick-Up Hotspots Based on Spatial ClusteringHong Qi, Panpan Liu. 1711-1717 [doi]
- Enhancing the Impression on Cities: Mining Relations of Attractions with Geo-Tagged PhotosZhiqiang Zou, Xu He, Xingyu Xie, Qunying Huang. 1718-1724 [doi]
- A Deep Convolutional Neural Network-Based Label Completion and Correction Strategy for Supervised Medical Image LearningRui Cao, Kehua Guo, Jianhua Ma, Jian Kang. 1725-1730 [doi]
- Large Scale Spectral Clustering Using Sparse Representation Based on HubnessXiucai Ye, Hongmin Li, Tetsuya Sakurai, Zhi Liu. 1731-1737 [doi]
- A Scalable and Efficient Multi-Label CNN-Based License Plate Recognition on SparkWeishan Zhang, Bing Xue, Jiehan Zhou, Xin Liu, Hao Lv. 1738-1744 [doi]
- Joint Computation Offloading and Routing Optimization for UAV-Edge-Cloud Computing EnvironmentsBaichuan Liu, Huawei Huang, Song Guo 0001, Wuhui Chen, Zibin Zheng. 1745-1752 [doi]
- Fast VM Startup by Cooperative Image Caching for Cloud Data CentersYifan Zhang 0003, Zhechao Li, Weigang Wu, Lei Yang. 1753-1760 [doi]
- Detection Mechanism of FDI Attack Feature Based on Deep LearningQiang Pu, Hao Qin, Hu Han, Yuanyi Xia, Zhihao Li, Kejun Xie, Wenqing Wang. 1761-1765 [doi]
- Backward Mining Technology Research on Continuous Attacks in Wide Time DomainLiang Guo, Weijian Li, Han Hu, Chunlin Chen, Junfeng Zhao, Zhenghai Cong. 1766-1770 [doi]
- A Routing Protocol Considering Turning Behavior of Vehicles in VANETsHiroya Matsumoto, Bo Gu, Xiaoyan Wang, Osamu Mizuno. 1771-1776 [doi]
- R-PCNN Method to Rapidly Detect Objects on THz Images in Human Body Security ChecksHong Xiao, Rongyue Zhang, Hao Wang, Feng Zhu, Cheng Zhang, Hongning Dai, Yubin Zhou. 1777-1782 [doi]
- A Video Segmentation Strategy for Video Processing Applications on Hadoop ClustersEihab SaatiAlsoruji, Shikharesh Majumdar. 1783-1790 [doi]
- Approximate Nearest Neighbor Search Based on Hierarchical Multi-Index HashingJianhui Miao, Zhiyang Li, Wenyu Qu, Zeyan Zhou, Zhaobin Liu, Weijiang Liu. 1791-1796 [doi]
- An Improved Bloom Filter in Distributed CrawlerWeipeng Zhou, Pan Wang, Xuejiao Chen, Feng Ye. 1797-1802 [doi]
- A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised LearningHanwen Wang, Biao Han, Jinshu Su, Xiaoyan Wang. 1803-1810 [doi]
- Machine Vision-Based Segmentation and Classification Method for Intelligent Roller Surface MonitoringDepeng Shi, Jiehan Zhou, Jirui Xu, Jun Yang, Xuekun Li, Zeming Zhao, Junchuang Chen, Yiming Rong. 1811-1817 [doi]
- DNN-Based Image Classification for Software GUI TestingHuijuan Lu, Li Wang, Minchao Ye, Ke Yan, Qun Jin. 1818-1823 [doi]
- INDICS: An Industrial Internet PlatformXudong Chai, Baocun Hou, Ping Zou, Jinle Zeng, Jiehan Zhou. 1824-1828 [doi]
- Data Mining from Haier Air-Conditioner Equipment Running Data for Fault PredictionXin Liu, Xiaomiao Zhang, Weishan Zhang, Wei Wei, Yongjun Zhao, Yongke Xi, Shuai Cao. 1829-1836 [doi]
- Individual Analysis Model and Related Research in Social NetworksYan Jia 0001, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu 0004, Lu Deng. 1837-1843 [doi]
- Banking Comprehensive Risk Management System Based on Big Data Architecture of Hybrid Processing Engines and DatabasesShenglan Ma, Hao Wang, Botong Xu, Hong Xiao, Fangkai Xie, Hong-Ning Dai, Ran Tao, Ruihua Yi, Tongsen Wang. 1844-1851 [doi]
- Landscapes and Emerging Trends of Virtual Reality in Recent 30 Years: A Bibliometric AnalysisLi Zeng, Zili Li 0005, Zhao Zhao, Meixin Mao. 1852-1858 [doi]
- Overdue Prediction of Bank Loans Based on LSTM-SVMXin Li, Xianzhong Long, Guozi Sun, Geng Yang, Huakang Li. 1859-1863 [doi]
- New Generation Artificial Intelligence-Driven Intelligent Manufacturing (NGAIIM)Bo Hu Li, Xudong Chai, Baocun Hou, Lin Zhang, Jiehan Zhou, Yang Liu. 1864-1869 [doi]
- SDN-Based Handover Approach in IEEE 802.11p and LTE Hybrid Vehicular NetworksRan Duo, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji. 1870-1875 [doi]
- A Prophet-Based DTN Protocol for VANETsZhaoyang Du, Celimuge Wu, Tsutomu Yoshinaga, Yusheng Ji. 1876-1879 [doi]
- Cyber-Enabled Human-Centric Smart Home ArchitectureSahraoui Dhelim, Huansheng Ning, Mohammed Amine Bouras, Jianhua Ma. 1880-1886 [doi]
- Users' Privacy Concerns in IoT Based ApplicationsIsmini Psychoula, Deepika Singh, Liming Chen 0001, Feng Chen, Andreas Holzinger, Huansheng Ning. 1887-1894 [doi]
- A Deep Learning Approach to Detecting Engagement of Online LearnersM. Ali Akber Dewan, Fuhua Lin, Dunwei Wen, Mahbub Murshed, Zia Uddin. 1895-1902 [doi]
- HMM of Telecommunication Big Data for Consumer Churn PredictionXingyou Xia, Lingbing Zeng, Ruiyun Yu. 1903-1910 [doi]
- Web Behavior Detection Based on Deep Neural NetworkBinbin Yong, Xin Liu, Yan Liu, Hang Yin, Liang Huang, Qingguo Zhou. 1911-1916 [doi]
- Automatic Detection of Optic Disc in Retina Image Using CNN and CRFWen-Bo Huang, Dunwei Wen, M. Ali Akber Dewan, Yang Yan, Ke Wang. 1917-1922 [doi]
- Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum EraSedat Akleylek, Bok-Min Goi, Wun-She Yap, Denis Chee-Keong Wong, Wai-Kong Lee. 1923-1928 [doi]
- Data-Driven Intelligent Maintenance Planning of Smart Meter Reparations for Large-Scale Smart Electric Power GridWeifeng Wang, Hao Chen, Bing Lou, Ning Jin, Xizhong Lou, Ke Yan. 1929-1935 [doi]
- Comparison of Measurements by the Betweenness Centrality and Subjective Experiment on the Word Priority of TweetsKosuke Takagi, Kiichi Tago, Kenichi Ito, Qun Jin. 1936-1941 [doi]
- Vote Parallel SVM: An Extension of Parallel Support Vector MachineYan Song, Qun Jin, Ke Yan, Huijuan Lu, Julong Pan. 1942-1947 [doi]
- Trust Model and Anti-Attack Analysis for Social ComputingJianguo Chen, Wai K. Yeap, Huijuan Lu, Hangxia Zhou, Yongxia Zhou. 1948-1955 [doi]
- Learning Combinatorial Global and Local Features on 3D Point CloudsLuqing Luo, Lulu Tang, Zhi-Xin Yang. 1956-1961 [doi]
- Robust GA Based Global Path Planning for IoP Oriented Mobil RobotRuidong Xi, Zhixin Yang, Lulu Tang, Zhigang Wang. 1962-1969 [doi]
- Socially-Inspired Peer Discovery for D2D CommunicationsHui Wu, Yufeng Wang. 1970-1975 [doi]
- Incentive Mechanism for User Collaboration on Trajectory Privacy PreservationMengqi Gao, Jianmin Han, Jianfeng Lu, Hao Peng, Zhao-Long Hu. 1976-1981 [doi]
- A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network ComputingYang Xu 0013, Quanrun Zeng, Guojun Wang, Hao Min, Ju Ren, Yaoxue Zhang. 1982-1987 [doi]
- Hiding RFID in the Image Matching Based Access Control to a Smart BuildingAhmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Haider Adeeb Kassem. 1988-1993 [doi]
- Wear-I: A Multi-Wearable Organic System for Smarter Individual ServicesJianhua Ma. 1994-1996 [doi]
- A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and Their Application in Head Mounted DisplaysIlesanmi Olade, Hai-Ning Liang, Charles Fleming. 1997-2004 [doi]
- Everyday Life Approach for Smart Health: A People-Centered Design Process for Co-Creating Self-Tracking SystemsXue Wu, Han-Teng Liao. 2005-2010 [doi]
- Towards Developing an Effective Algorithm Visualization Tool for Online LearningKatarzyna Romanowska, Gurpreet Singh, M. Ali Akber Dewan, Fuhua Lin. 2011-2016 [doi]
- Online Vocabulary QuizMASter Game for College English Test Band 4Lanlan Huang, Fuhua Lin, Zengxiang Wang. 2017-2021 [doi]
- Design of Automatic Identification Gateway System for Different IoT Devices and ServicesHyun-Seong Lee, Jae-Gwang Lee, Jae-Pil Lee, Jae Kwang Lee. 2022-2025 [doi]
- A Representation Method and Optimization of Network Flow Based on CoalgebraXinxin Liu, Xiaofeng Wang. 2026-2029 [doi]
- A Fusion Information Embedding Method for User Identity Matching Across Social NetworksYizhuo Yang, Hongtao Yu, Ruiyang Huang, Tuosiyu Ming. 2030-2035 [doi]
- A Dependability Modeling and Analysis Approach for an IoP-Based Service SystemZhibao Mian, Leonardo Bottaci, Jiulei Jiang, Jun He, Qiancheng Yu, Xiaofeng Wang. 2036-2041 [doi]
- Constructing the Community Assignment Matrix for Overlapping Community DetectionQiancheng Yu, Zhi-Wen Yu, Xiao Feng Wang. 2042-2047 [doi]
- A Dynamic Trust Model Based on Time Decay FactorHanxu Wang, Jiulei Jiang, Weimin Li. 2048-2051 [doi]
- Model Checking Instance Based on NuSMVNinglin Xu, Zhanyou Ma, Jiulei Jiang, Panqing Zhang. 2052-2056 [doi]
- An Online Data Deduplication Approach for Virtual Machine ClustersZhongwen Qian, Xudong Zhang, Xiaoming Ju, Bo Li. 2057-2062 [doi]
- An Efficient Graph Data Processing Framework for Power Grid SystemsFenghua Wang, Jia Shi, Xiaoming Ju, Bo Li. 2063-2067 [doi]
- A General Testing Framework Based on Veins for Securing VANET ApplicationsLiang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Jingzhe Zhang, Huayang Cao, Fei Xu. 2068-2073 [doi]
- Using Particle Swarm Optimization Method to Optimize the Carbon Sequestration Potential of Agricultural Afforestation in Beijing, ChinaJingtao Yao, Xiangbin Kong, Rattan Lal. 2074-2081 [doi]
- Towards a Standardized Identity Federation for Internet of Things in 5G NetworksBernardo Santos, Van Thuan Do, Boning Feng, Thanh Van Do. 2082-2088 [doi]
- Security-Enhanced Wireless Multicast via Adaptive Fountain Codes over Distributed Caching NetworkYing Xu 0004, Qinghe Du, Houbing Song. 2089-2096 [doi]
- A Quantitative Model of the Urban Rail Congestion Propagation under Oversaturated ConditionsZiling Zeng, Taixun Li. 2097-2102 [doi]
- Improving the Station-Level Demand Prediction by Using Feature Engineering in Bike Sharing SystemsMu Hu, Pengcheng Dai, Huiping Lin, Guanlan Kong. 2103-2108 [doi]
- Snap4City: A Scalable IOT/IOE Platform for Developing Smart City ApplicationsClaudio Badii, Elefelious G. Belay, Pierfrancesco Bellini, Daniele Cenni, Mino Marazzini, Marco Mesiti, Paolo Nesi, Gianni Pantaleo, Michela Paolucci, Stefano Valtolina, Mirco Soderi, Imad Zaza. 2109-2116 [doi]
- Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for PakistanSabeeh Safdar, Mujahid Mohsin, Liaqat Ali Khan, Waseem Iqbal. 2117-2124 [doi]
- Evaluation of Operation Status of Urban Rail Transit Stations Based on Historical DataJingchao Quan, Haiying Lu, Xinyue Xu. 2125-2129 [doi]
- A SVR-Based Passenger Route Choice Model in Urban Rail Transit NetworkLuyao Wang, Xi Jiang, Chunxiao Li. 2130-2135 [doi]