


default search action
AISNS 2023: Mianyang, China
- Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security, AISNS 2023, Mianyang, China, December 22-24, 2023. ACM 2023

Chapter 1-Artificial Intelligence Algorithm and Intelligent Detection Model
- Boyu Xiao

, Shujun Chen
, Jiahao Wen
, Xudong Liu
, Yuchen Wang
, Kai Shi
, Shuangxi Li
:
A 3D CNN Model With 3d CBAM Layer For Micro-Expression Recognition. 1-5 - Ying Ji

, Jingyu Huang
, Pengcheng Jin
:
Classification of BGP Anomalies Using GRU with BGP Update Messages. 6-9 - Ji Qi

, Tengfei Bian
, Kaixuan Jiao
, Xinyu Yin
, Kechao Wang
:
Moisture prediction with influencing factors analysis of expanded cut tobacco before resurgence. 10-15 - Qiuyang Yan

, Ruiran Ding
, Ling Lu
:
RPnet: A Relation Perception based Entity-relation Extraction Method. 16-22 - Haoruo Zhang

, Chengyu Zhong
:
Research on Waterway Traffic Volume Prediction Based on Artificial Intelligence. 23-26 - Yuge Song

, Zerui He
:
Research on the Application of Graph Neural Networks in Financial Asset Valuation. 27-31 - Hanlin Feng

, Yao Rao
, Mingxiao Yang
, Ben Lin
:
Global climate mitigation prediction model based on BP neural network. 32-37 - Rongbang Wu

, Zhijie Ye
, Mo Ni
:
Prediction of Word Game Trends and Human Behavior Based on ARIMA and BP Neural Networks. 38-42 - Mengyao Yu

, Changhua He
, Lijun Shi
:
Interactive Genetic Algorithm for Human-Computer Interface Layout Design System. 43-48 - Lina Tao

:
Research on Campus Network Public Opinion Early Warning Based on Genetic Algorithm and BP Neural Network. 49-53 - Feng Tian

, Yuanyuan Jin
, Yuzhi Li
:
Traditional Martial Arts Assessmet Based on Graph Convolutional Network. 54-60 - Jinda Wu

, Qiang Li
:
SMFN: A small target detection method in nylon yarn package images based on neural network. 61-67 - Zhen Wang

, Lizhi Liu
:
PM2.5 concentration prediction model based on SA-LSTM. 68-71 - Yang Zhao

, Feng Chen
:
Improvement of Byzantine consensus algorithm based on election model. 72-76 - Zizhong Wei

, Dongsheng Guo
, Dengrong Huang
, Qilai Zhang
, Sijia Zhang
, Kai Jiang
, Rui Li
:
Detecting and Mitigating the Ungrounded Hallucinations in Text Generation by LLMs. 77-81 - Kai Jiang

, Qilai Zhang
, Dongsheng Guo
, Dengrong Huang
, Sijia Zhang
, Zizhong Wei
, Fanggang Ning
, Rui Li
:
AI-Generated News Articles Based on Large Language Models. 82-87 - Yufeng Ye

, Guanwu Jiang
, Shide Fu
:
Surface defect detection of propellant strips based on YOLOv8. 88-92 - Kai Jiang

, Tong Yang
, Xue Li
, Zizhong Wei
, Qibin Chen
, Qiang Duan
, Junzheng Ge
, Lei Zhang
, Guangxin Wang
, Jiahao Shao
, Rui Li
:
Method for Generalized Structured Information Extraction from Cards Based on Custom Template Matching. 93-98 - Shengnan Li

, Chi Zhou
, Kaili Wang
:
Image-Category Aware Loss for Super-Multiple Category Classification on Chu Bamboo and Silk ancient Chinese characters. 99-104 - Guokai Fu

, Xia Peng
:
NSCLC whole slide image survival analysis by end to end transformer. 105-109 - Weiwei Zou

:
Research and Design of Image White Balance Algorithm Based on FPGA. 110-114 - Zhen Zhen Li

, Chi Yan
, Shuang Wu
, Xin-Qi He
:
Research of Hybrid Encryption Algorithm with RSA and improved SM4. 115-118 - Jiying Tian

:
Prediction of Employee Turnover Trend in MSMEs Based on Whale Alogorithm Optimized Elman Neural Network. 119-123 - Xiaoyu Zhang

, Ligang Chen
, Meng Chen
, Luozhao Jia
:
Analysis of Identification of Seismic Event Properties Based On the permutation entropy of the Variational mode decomposition and support vector machine optimized by pelican optimization algorithm. 124-129 - Wenxin Chen

:
Fourier Ptychography Based on a u-net Convolutional Neural Network. 130-134
Chapter 2-Computer Architecture and System Design
- Yanchun Shen

, Ximing Qiao
, Zhiwang Zhong
, Hongyu Sheng
:
Study on the Characteristics of Liquid Crystal-based Terahertz Metadevices in Wireless Communication Circuits. 135-140 - Kaiyan Jin

, Yanbo Zhu
, Youchen Xu
, Yongyue Chen
:
Evaluation Method and Application of the Civil Aviation Surveillance System Horizontal Position Error for The Performance-Based Surveillance. 141-149 - Weiwei Zhang

:
Finite element statics analysis of a tower crane's balancing arm. 150-153 - Ji Qi

, Zhanwu Shi
, Mingxing Li
, Botao Zhang
, Yujie Lu
:
Radial Basis Function Neural Network-Based Modeling and Application of the Weight Prediction for Expanded Cut Tobacco Before Resurgence. 154-158 - Wei Liu

, Chao Yue
, Lei Yang
, Jirong Tian
:
Application practice of code mapping technology in hydropower project construction management system. 159-168 - Xiaohong Wu

, Hanrui Sun
, Mingming Zhao
:
Application Research of Geological Information Metadata System in Big Data Environment. 169-173 - Xiang Nan

, Rajamohan Parthasarathy
:
Exploration of Cloud Computing Based Data Mining Mobile Intelligent Tourism Guide System. 174-178 - Jia Wei

:
Design and Application of Hotel Room Management Information System in a B/S Architecture. 179-182 - Jian Liu

, Xianghong Kong
, Zhaoxi Wang
, Jin'E Zhao
:
Design and Implementation of Intelligent Analysis Middle Platform for the Mining Field. 183-188 - Yueming Ding

, Rongxi Cui
, Zhicai Xiang
, Jiayu Xu
, Zongfeng Zhang
, Wei Wang
, Xiaolin Li
, Xiaohua An
:
Optimization and Application of Multi-source Data-driven Sensing Terminal for Photovoltaic-Energy Storage System. 189-193 - Jiewei Li

, Xiaoyun Jian
, Jin Xie
, Wen Zhang
, Dongkai Wu
, Jinyao Sun
:
Massive Multi-source Heterogeneous Data Platform with EB-level Expansion. 194-200 - Liyun Jia

:
Development and Application of Smart Marketing Systems Based on Big Data Technology. 201-205 - Ping He

, Jiapeng Shuang
:
Technology Bias in the Intelligent Systems. 206-210 - Zhenquan Zhou

, Lanxin Wang
, Chenxin Tian
, Deprizon Syamsunur
:
The development of the smart factory during the Industry 4.0 period under the study of system thinking. 211-215 - Lian Chen

, Nanxi Zhao
, Xinzi Wang
:
Research on Emergency Support Mechanism for Coal Transportation Based on Complex Networks. 216-220 - Lei Cao, Qingbin Xu

, Chen Chen
, Qinggang Wu
, Jianping Zhang
:
The Architecture of a Comprehensive System for Civil Unmanned Aerial Vehicle Traffic Management in Urban Low-Altitude Airspace. 221-226 - Qingjuan Wang

, Ruoyun Hu
, Gang Sun
, Huan Liu
:
Intelligent Retrieval System for Power Policy Documents Based on Semantic Analysis. 227-232 - Xin Tang

:
Research on the Design of Financial Management System Based on Cloud Platform. 233-240 - Shuwei Wang

, Sigen Song
:
Design of an Integrated System for Government Invested Construction Projects. 241-245 - Zhaoyang Cui

, Jianwen Ling
, Xiongwei Zhang
:
Design of Efficient Device Communication Authentication Protocol in Large-scale Internet of Things Scenarios. 246-251 - Shihu Yu

, Liuqing Yan
:
Research on English Learning System Based on Collaborative Filtering Algorithm. 252-257 - Guotao Cong

, Dan Shan
, Li Wang
:
Design of Dynamic Target Tracking System Based on FPGADynamic Target Tracking System. 258-262 - Li Liu

, Zijin Liu
, Xuefei Qian
:
Construction and Application of Digital Twin Cloud Platform for Rebar Straight Thread Processing Line. 263-276 - Guotao Cong

, Sen Wang
, Henan Li
:
Implementation of Image Watermark Algorithm Based on FPGAImage watermark embedding circuit. 277-282 - Yichen Bao

, Lifei Wei
, Dezhi Han
:
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices. 283-290 - Xiaona Han

, Lei Yang
:
Research on business collaborative optimization of power grid en-terprises based on data mining algorithm. 291-294 - Huilin Cao, Linchun Tan:

Student education assessment model based on programming cognitive diagnosis. 295-300 - Qi Guo

, Jie Zhang
, Yuanhong Lu
, Liang Tu
, Haiping Guo
, Hui Luo
, Libin Huang
:
Construction and verification of a power simulation system middle platform based on domain driven design and microservices. 301-308 - Zhigang Sun

, Junmin Wu
:
MHInfer: A FPGA-accelerated Inference Library Based on Domestic Embedded Systems. 309-313 - Yufei Tan

:
Research on Community Service System based on OneNET Platform. 314-317
Chapter 3-Network Security and Intelligent Management Technology
- Wei Li

, Kuang Tian
, Wei Wang
:
Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry. 318-322 - Taiwei Wang

, Yuyang Cheng
:
Development and Application of Intelligent Management System for Personnel Safety in Port Area based on Positioning Technology. 323-330 - Yue Zhang

, Zifan Zhu
, Zhenbo Xu
:
"Study on Derived Risks and Its Governances of \"Social Embedding\" of Artificial Intelligence Algorithm". 331-336 - Xixuan Wang

, Heyu Zhao
, Huixian Deng
, Aili Hairula
, Xiao Wang
, Lijing Guo
:
Real-time detection method of edge iot proxy network intrusion based on PSO-ELM. 337-342 - Mingju Sun

, Linxu Han
, Liang Zhang
, Hao Yin
, Kai Liao
, Jinqiu Hu
, Xiaowen Fan
:
A study on risk propagation and traceability of gas storage based on complex network. 343-348 - Kaihao Hu

, Xiao Zhang
, Youfu Jiang
:
Wireless Sensor Networks Node Localization Approach Based on The Cuckoo Algorithm. 349-354 - Shuai Liu

, Yuanjun Zuo
, Zhuo Chen
, Wenjing Zhang
, Xiaoqing Li
:
Non-invasive event monitoring in digital twin system based on random matrix theory and independent sub-vectors. 355-359 - Shiyong Li

, Shasha Wu
, Xinglin Guo
:
Security Risk Assessment Method for Measurement Control Systems Based on Attack Tree Model and Common Vulnerability Scoring System. 360-369 - Quanjiang Shen

, Lei Zhang
, Chang Liu
:
Harmful Information Detection of Web pages with Attentional Deep Neural Networks and Multi-level Feature Fusion. 370-374 - Yaokuan Wen

, Yanan Li
, Jiewen Li
, Ke Xiao
, Xin Yang
, Ke Zheng
:
Research on The Application of Artificial Intelligence Technology in Emergency Repair and Power Restoration of Residential Areas Under Heavy Rain Disaster Weather. 375-379 - Jiwei Li

, Xuewei Ding
, Yuchen Jiang
, Yongqi Ai
, Zhen Jia
, Xinyi Zhang
:
A Database Security Access Control Method Based on Identity Authentication. 380-385 - Ying Lan

, Qibin Hu
:
Intrusion detection and response of network node attacks based on game theory. 386-390 - Yinlun Xu

:
YOLO-ARDD: An improved feature extraction and enhanced single-stage object detection network. 391-395 - Xinghua Li

, Xiaolong Li
, Feng Wang
, Zhenhua Yan
, Dongge Zhu
:
Security optimization method of key exchange protocol for massive Internet of things terminal equipment. 396-401 - Yadi Zhang

, Fuhai Duan
, Xinshuai Han
:
Reliability analysis of circulating water filtration system in nuclear power plants based on fuzzy GO methodology and Boolean algebra method. 402-408 - Xiaohui Wang

, Li Zhao
, Jinbao Du
, Jingang Liu
, Wei Zhang
, Baozhan Feng
, Hua Chen
:
Dynamic Evaluation of Information Security in Self-organizing Network Based on Knowledge Map Driving. 409-414 - Xiongwei Zhang

, Jianwen Ling
, Muyao Luo
:
Research on Authentication Method for Interface Access Security of Communication Equipment in High Coverage Internet of Things. 415-420 - Shuang Gao

, Jiawei Gao
, Jiashi Zhao
:
Feature Perturbations Extend the Space for Automatic Grading of Diabetic Retinopathy. 421-425 - Qian Zhou

, Husheng Wu
:
Research on Performance Evaluation of UAV Cluster Based on ADC-AHP. 426-430 - Yukun Li

, Songyang Wu
, Zhiguo Ding
, Jiahong Jiang
, Kezhu Song
:
Personalized Privacy Protection and Security Aggregation Technology for Smart Grid. 431-437 - Xiaoyi Cui

, Hequan Han
, Xingang Guo
:
Embedding Space Reconstruction to Enhance ANN for Industrial Process Fault Diagnosis. 438-442 - Feifei Xu

, Cheng Zhang
:
A Solution Space Reduction Approach based on Neural Network and Clustering for Large-scale Service Composition. 443-447 - Wenxuan Xu

, Zejun Yan
, Qijun Zhang
, Weifa Zheng
:
Research on FIDO Authentication Based on IPv6. 448-451 - Shouan Wei

, Zhiheng Zhang
:
Application Methods and Practices of Deep Learning in Network Intrusion Detection. 452-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














