


default search action
ACM TUR-C 2021: Hefei, China
- ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021 - 1 August 2021. ACM 2021, ISBN 978-1-4503-8567-1

- Bin Xu, Qiaoqiao Zhang, Kening Gao, Ge Yu, Zhaowu Zhang, Yidi Du:

Recognition Of Learners' Personality Traits For Software Engineering Education. 1-7 - Yu Zhang

, Youwen Ouyang
:
Designing a Course of Programming Language Foundations that Closely Combines Practice. 8-14 - Zhenni Feng, Junchang Chen, Fanbo Xu:

Reliable and Secure Data Sharing in Decentralized Mobile Crowd Systems. 15-22 - Yuan Feng, Chen Li, Tianying Sun:

The Study Based On The Deep Learning For Indian Ocean Dipole (IOD) Index Predication. 23-27 - Yuan Feng, Tianying Sun, Chen Li:

Study On Long Term Sea Surface Temperature (SST) Prediction Based On Temporal Convolutional Network (TCN) Method. 28-32 - Xudong Zhu, Hui Li:

Privacy-preserving Decentralized Federated Deep Learning. 33-38 - Shunpeng Pang, Junhua Jia, Baoqi Guo, Xiangqian Ding, Shusong Yu:

Intelligent Control System for Cigarette Processing Based on Deep Learning. 39-43 - Keke Du, Shan Chang, Huixiang Wen

, Hao Zhang:
Fighting Adversarial Images With Interpretable Gradients. 44-48 - Xianzhe Wu:

Cross-chain Workflow Model Based on Trusted Relay. 49-53 - Qiang Liu, Wentao Zhao, Ruijin Wang, Jiangyong Shi:

A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application. 54-60 - Wenlong Yu, Huizhen Zhang, Jiawei Pan:

A Passenger Flow Transfer Prediction Model for Collinear Stations Based on Connection Model of New Station. 61-66 - Zhuang Liu, Ye Lu, Xueshuo Xie, Yaozheng Fang, Zhaolong Jian

, Tao Li:
Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural Networks. 67-71 - Pengting Du, Yingjian Liu, Yue Li, Haoyu Yin, Limin Zhang:

EtherH: A Hybrid Index to Support Blockchain Data Query. 72-76 - Limin Zhang, Yingjian Liu, Qingxiang Guo, Haoyu Yin, Yue Li, Pengting Du:

Ship Detection in Large-scale SAR Images Based on Dense Spatial Attention and Multi-level Feature Fusion. 77-81 - Chuanhao Dong, Jianbo Li, Zhiqiang Lv

, Wei Zhao:
Spatial and Dual-channel Temporal Convolution Networks: A Novel Method for Speed Forecasting. 82-86 - Yihong Yang

, Xiaolong Xu, Lina Wang, Weiyi Zhong, Chao Yan, Lianyong Qi:
Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System. 87-91 - Zhexuan Hu, Xiaolong Xu, Jinhui Chen:

An Edge Server Placement Algorithm based on Genetic Algorithm. 92-97 - Tong Li, Heyang Sun, Chao Yang, Shuai Ren, Gang Wang, Jinliang Song, Xue Jiang:

Information Security Risk Analysis of Intelligent Terminals in Electricity Information Collection System. 98-103 - Congcong Chen

, Lifei Wei, Lei Zhang, Jianting Ning:
MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks. 104-109 - Xiaoyu Kou, Ziling Zhang, Yuelei Zhang, Linlin Li:

Efficient and Privacy-preserving Distributed Face Recognition Scheme via FaceNet. 110-115 - Dong Li

, Miaoqing Tian, Ruobing Jiang, Ke Yang
:
Exploiting Temperature-Varied Voltage Fingerprints for In-vehicle CAN Intrusion Detection. 116-120 - Xin Zhou, Liming Zhang, Fanqi Meng:

Model Fusion of LightGBM and SAKT for Knowledge Tracking. 121-125 - Zhuoxu Zhang, Haoyun Li:

BSLKT: A Bagging Model with Self-Attention and LightGBM for Knowledge Tracing. 126-130 - Qing Zhao, Tingrui Li, Rui Luo, Rui Li, Tianyu Han, Dongsheng Han:

A Language Model for Intelligent Speech Recognition of Power Dispatching. 131-135 - Wenya Fan, Wenqian Zhang, Luyao Wang, Tangyou Liu, Guanglin Zhang:

Joint Offloading and Resource Allocation in Cooperative Blockchain-Enabled MEC System. 136-140 - Hanchen Xu, Zhenxiang Chen, Shanshan Wang, Xiaoqing Jiang:

Chinese NER Using ALBERT and Multi-word Information. 141-145 - Zhenhua Yan, Chang Liu, Xuwei Xia, Yongliang Li, Bo Gao:

Blockchain-based microgrid distributed power transaction model. 146-150 - Qinghai Ou, Jizhao Lu, Ningchi Zhang, Yanru Wang, Xinjian Shu, Chenbin Qiao, Wenjie Ma:

Trusted Data Interaction Technology Based on Alliance Chain. 151-158 - LongYing Ouyang, SongChao Yan, Jun Zhu:

Research on new energy trading system based on blockchain. 159-165 - Jing Tao, Zhengjia Lu, Yan Chen, Jiawei Wu, Peng Yu, Chenghao Lei:

Adaptive VNF Scaling Approach with Proactive Traffic Prediction in NFV-enabled Clouds. 166-172 - Huiping Meng, Shi Wang, Feng Gao, Jizhao Lu, Yue Liu, Yong Mei:

Edge Computing Task Offloading Method for Load Balancing and Delay Optimization. 173-178 - ZhongDong Zhu, Shilin Jia, JiShuai Li, Su-Juan Qin, Hui Guo:

SQL Injection Attack Detection Framework Based on HTTP Traffic. 179-185 - Mingdong Sun, ZhiXin Guo, Xiaolong Deng:

Intelligent BERT-BiLSTM-CRF Based Legal Case Entity Recognition Method. 186-191 - Kaiyuan Liu, Jingli Hao, Junjie Yang, Yuhuang Ye, Fuji Yang, Chao Guo:

Automatic Tracking System of LEO Satellite Based on SGP4. 192-199 - Chunyang Wang:

Research on outlier detection of data based on machine learning. 200-203 - Huifan Wan, Guanghui Pan, Yu Chen, Danni Ding, Maoyang Zou:

Spatial Graph Convolutional and Temporal Involution Network for Skeleton-based Action Recognition. 204-209 - Lujin Li, Hailiang Wang, Jinrong Hu, Yan Zhang:

Deformation Medical Image Registration Algorithm Based On Deep Prior Optical Flow Network. 210-215 - Song Yan, Shuli Zheng, Baohong Ling, Donghui Hu:

Lossless Database Watermarking Based on Order-preserving Encryption. 216-223 - Rui Bai, Zhou Fang, Chao Ma, Hai Huang, Wanjuan Xie:

Research on the Forecast of Workshop Production Abnormity under Cloud Manufacturing Environment. 224-232 - Jingbo Mao, Ma Zhu, Chunfang Yang, Huayuan Lu:

Video steganography algorithm based on the relative relationship between DWT coefficients. 233-240 - Wanli Lv, Hongnian Guo, Yang Du, Jinmin Hu, Zhaoxia Yin:

Multi-domain Reversible Data Hiding in JPEG Images. 241-247 - Baowei Wang, Weishen Wang, Peng Zhao:

Multiple color medical images zero-watermark scheme based on quaternion generalized Fourier descriptor and QR code. 248-253 - Yumin Wang, Jingyu Ye

, Hanzhou Wu
:
Generating Watermarked Speech Adversarial Examples. 254-260 - Lihua Zhu, Xuehang Wei, Qiwen Zheng, Yu Wang:

Research on Adaptive Target Tracking Method Based on Millimeter Wave Radar. 261-265 - Qiuru Fu, Du Xu, Wenlong Chen, Yuhang Zhang, Guanghui Su, Shuang Zhou:

MAFAWD: An Adaptive Weight Distribution Clustering Algorithm Based on Multi-layer Attribute Fusion. 266-272 - Zhilin Duo, Zewen Chen, Ye Liang, Mingtao Dai, Hui Guo:

Risk Rating Framework of Power Grid Business Entities Based on AHP. 273-277 - Lihui Dong, Haolin Wang, Wei Song, Jianxin Xia, Tongmu Liu:

Deep sea nodule mineral image segmentation algorithm based on Mask R-CNN. 278-284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














