


default search action
AISS 2022: Sanya, China
- Proceedings of the 4th International Conference on Advanced Information Science and System, AISS 2022, Sanya, China, November 25-27, 2022. ACM 2022, ISBN 978-1-4503-9793-3

- Zhenhao Jiang

:
An Attention GRU-XGBoost Model for Stock Market Prediction Strategies. 1:1-1:5 - Omar Challaf

, Sook-Ling Chua
, Lee Kien Foo
:
Trip Itinerary Generation with 2-Opt Algorithm. 2:1-2:5 - Jing Zhang

, Jinglei Tang
, Yingqiu Huo
:
Semantic segmentation of pulmonary nodules based on attention mechanism and improved 3D U-Net. 3:1-3:5 - Musashi Takanezawa

, Yoshifumi Manabe
:
Many-to-many perfect matching. 4:1-4:7 - Peng Duan

:
Privacy Protection Technology in IOT Data Storage Based on Blockchain. 5:1-5:4 - Lei Chen

, Jinghua Sun
, She Jia
:
Study on the Application of RTCA/DO-178C in IMA Architecture. 6:1-6:6 - Wennan Wang

, Hanxu Zhao
, Yu Li
, Junyu Su
, Jiadong Lu
, Baoping Wang
:
Research on cross-project software defect prediction based on feature transfer method. 7:1-7:5 - Lixu Lu

, Jian-Xun Zhang
:
Rearch on AI industry prediction based on Markov model. 8:1-8:5 - Wei Xu

, Xiaoyang Wang
, Haoyu Mao
, Yongkun Li
:
The Design and Practice of Linux Kernel Based Experiments for Operating System Course. 9:1-9:5 - Luxia Ai

, Xiang Sun
, Qianman Zhang
, Zhiqing Miao
, Guangjie Li
, Shaojing Song
:
Soil moisture prediction model based on LSTM and Elman neural network. 10:1-10:7 - Shuifa Sun

, Yongheng Tang
, Yunfei Shi
, Yuan Guo
, Tinglong Tang
, Yirong Wu
:
An Efficient Warp-Based Motion Magnification Method to Reveal Subtle Changes in Video. 11:1-11:7 - Lidan Li

, Zhe Jiang
, Xiaozheng Zhang
:
A Video information transmission architecture based on on-top system. 12:1-12:5 - Han Yun

, Xin Deng
, Yulu Du
:
News Recommendation with Multi-views Emotion Analysis. 13:1-13:5 - Lei Bo

, Zihang Zhang
, Yang Liu
, Zecheng Li
:
Research on IOT online monitoring system based on efficient utilization pathway of mine water. 14:1-14:6 - Zihang Zhang

, Lei Bo
, Yang Liu
, Zecheng Li
:
Mine drainage optimization scheduling based on genetic algorithm. 15:1-15:6 - Linna Zhang

, Yuehui Chen
, Yi Cao
, Yaou Zhao
:
BERT Model Compression With Decoupled Knowledge Distillation And Representation Learning. 16:1-16:4 - Hanqiang Deng

, Jian Huang
, Quan Liu
:
Research on Time Synchronization and Routing Maintenance for Narrowband Ad Hoc Networks. 17:1-17:5 - Yi Liu

, Honglei An
, Hongxu Ma
:
A Biped Robot Learning to Walk like Human by Reinforcement Learning. 18:1-18:5 - Zhiyuan Ge

, Fei Wang
, Rui Hua
:
Interdisciplinary Attribute Evaluation Of Postgraduate Supervisors In Beijing University of Technology. 19:1-19:5 - Yixuan Lin

:
RPSigmoid: A Randomized Parameterization for a Sigmoidal Activation Function. 20:1-20:5 - Fei He

, Wei Zhang
, Na Zhan
, Xi Wang
, Jing Li
:
Graph Neural Network Recommendation Method Based on User Behavior. 21:1-21:7 - Jing Zhang

:
Research on Construction and Operation of Rural E-commerce Supply chain. 22:1-22:7 - Ruogu Li

:
Overturning the Counting Cornerstone: Exploring Fine-Grained Adaptive Losses to Subvert the Conventional Density Estimation. 23:1-23:8 - Wei Liu

, Xin Du
:
LARW: Network Representation Learning Algorithm Based On Long Anonymous Random Walks. 24:1-24:4 - Ruijie Tian

, Weishi Zhang
, Fei Wang
:
BOD-tree: An One-Dimensional Balanced Indexing Algorithm. 25:1-25:4 - Rongfeng Li

, Xiaonan Xu
, Yanyan An
:
A Beamspace-Based Sparse Estimation Method for Array Signal. 26:1-26:5 - Yijun Huang

, Renwen Chen
, Yidi Chen
, Shanshan Ding
, Jiaqing Yao
:
A Fast bearing Fault diagnosis method based on lightweight Neural Network RepVGG. 27:1-27:6 - Lin Wang

, Dong Sun
, Zhu Yuan
, Qingwei Gao
, Yixiang Lu
:
Multi-view clustering study based on subspace. 28:1-28:5 - Margaret Gao

, Rachel Huang
, Arul Rhik Mazumder
, Fei Li
:
Comparisons of Classic and Quantum String Matching Algorithms✱. 29:1-29:6 - Songbai Zhu

, Guolai Yang
:
Research on LightGBM-based fault prediction for electrical equipment in artillery fire control system. 30:1-30:6 - Angesh Anupam

:
Nonlinear multivariate modelling of wetland dynamics. 31:1-31:4 - Liangjuan Zhou

, Wei Miao
:
An improved hybrid regularization approach for extreme learning machine. 32:1-32:7 - Weifeng Chen

, Hui Ding
, Bo Li
, Bin Liu
:
Phase-MLP for Generalizable Implicit Neural Representations. 33:1-33:6 - Jiawei Chen

, Hongjie Liu
, Kexian Gong
, Zhongyong Wang
, Wei Wang
:
Short-term air traffic flow forecasting based on model fusion. 34:1-34:6 - Yanli Li

, Congyi Wang
:
Improve GAN-based Neural Vocoder using Truncated Pointwise Relativistic Least Square GAN. 35:1-35:7 - Chenbing Zhao

:
Capsule Network with Inception Structure for Image Classification. 36:1-36:5 - Shuli Ma

, Liting Sun
, Yufei Niu
, Han Liu
, Huiqian Du
, Feihuang Chu
, Shengliang Fang
:
Electromagnetic data completion and prediction method based on tensor train. 37:1-37:6 - Haochen Qi

, Huiyan Ji
, Jiqiang Zhang
, Liu Cheng
, Xiangwei Kong
:
Defect Classification Method of X-ray Images Based on Improved U-Net. 38:1-38:7 - Hao Wu

, Chong Zhang
, Li Shui
, Yamiao Zhang
, Mengda Lei
, Xianlong Li
:
Research on Radar Signal Recognition Technology Based on Residual Convolutional Neural Network. 39:1-39:6 - Guozheng Feng

, Jianbo Xu
, Wei Jian
, Zhang Liu
:
Load prediction optimization based on machine learning in cloud computing environment. 40:1-40:5 - Chunyan Wu

, Li Li
, Zhigui Liu
, Xiaoqian Zhang
:
Machine Reading Comprehension Based on SpanBERT and Dynamic Convolutional Attention. 41:1-41:5 - Yanhui Xu

, Tong Zhang
, Dunzhao Yang
:
Application of Vision Technology in Automatic Tracking of Robot. 42:1-42:3 - Xiaofan Zhao

, Wenming Ma
:
Event Recommendation Based on Heterogeneous Social Network Information and Time Information. 43:1-43:7 - Letan Zhang

, Guiwen Lan
, Xiaoyong Shi
, Xing-Hui Duanmu
, Kan Chen
:
Point Cloud Classification Method for Transmission Towers based on CAA-PointNet. 44:1-44:4 - Yingchun Huan

, Xiaoyong Kang
, Zhenjie Zhang
, Qi Zhang
, Yuju Wang
, Yafen Wang
:
AIS-Based Vessel Traffic Flow Prediction Using Combined EMD-LSTM Method. 45:1-45:8 - Liang Guo

, Yunjun Lu
, Qian Liu
, Ke Zhu
, Lvjun Zhao
:
A method for task network partition with limited community number. 46:1-46:6 - Shengzhi Yuan

, Jiayu Zhang, Jianwei Lai, Haidi Dong:
Research on An Intelligent Fault Diagnosis Method for Rolling Bearing Based on Wavelet Packet and PSO-BP Network Algorithm. 47:1-47:5 - Chao Xia

:
Research on site laboratory data based on isolation forest and canonical correlation analysis. 48:1-48:6 - Yong Hu

, Zheng Guan
, Tianyu Zhou
:
Deep Reinforcement Learning for Dynamic OCW in UORA. 49:1-49:6 - Yaru Yang

, Zhi Liu
, Jiaxing Song
:
TRAPPER: Learning with Weak Supervision for Threat Intelligence Entity Recognition. 50:1-50:7 - Chen Yang

, Guo Zhen
, Chenya Bian
, Yuqiao Ning
, Shihao Xue
:
Intelligent Connected Vehicles Cybersecurity Vulnerability Rating Methodology Based on Multiple Factors. 51:1-51:6 - Lu Yu

, Lun Xin
, Manxue Guo
:
A Safe Architecture of 5G Network Intelligence Based on Federated Learning and NWDAF. 52:1-52:5 - Leigang Sun

, Jin Zhang
:
HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop. 53:1-53:4 - Chengxi Xu

, Yunyi Zhang
, Fan Shi
, Huimin Ma
, Wanmeng Ding
, Hong Shan
:
Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior. 54:1-54:6 - Huimin Wang

, Dong Liang
, Yuliang Xi
:
Urban Path Planning Based on Improved Model-based Reinforcement Learning Algorithm. 55:1-55:6 - Lars Kornahrens

, Sebastian Kritzler
, Dirk Werth
:
Extracting Process Instances from User Interaction Logs. 56:1-56:10 - Zhi-Yong Qiu

, Zhenhua Guo
, Li Wang
, Yaqian Zhao
, Rengang Li
:
Layer-wise based Adabelief Optimization Algorithm for Deep Learning. 57:1-57:6 - Yang Liu

:
Research of Network Hotspot Events Joint Extracting Based on BERT-CNN-CRF Model for Internet Public Opinion. 58:1-58:6 - Yuhan Li

, Bin Wen
, Haixiao Zheng
:
Generic O-LLVM Automatic Multi-architecture Deobfuscation Framework Based on Symbolic Execution. 59:1-59:6 - Ming Li

, Guikai Liu
:
A Network Traffic Classification Model Based On XGBOOST_RFECV Feature Extraction. 60:1-60:5 - Tao Zhou

:
Hierarchical Federated Learning with Gaussian Differential Privacy. 61:1-61:6 - Shiyang Song

, Jiadong Lu
, Hanxu Zhao
, Wennan Wang
, Chiyu Shi
, Ruijie Luo
:
Traceability of Product Supply Chain Based on Hyperledger Fabric. 62:1-62:6 - Jiaqing Yao

, Renwen Chen
, Yijun Huang
:
Automatic identification system of aircraft cockpit indicators based on machine vision. 63:1-63:9 - Jian Hu, Jin Hou, Yong Chen, Wen-Hong Li, de hao Shi, Jie Yi, xuan ling Huang:

Rapid face detection in complex environments based on the improved RetinaFace. 64:1-64:7 - Yipeng Li

, Wen Cao, Wenbing Chang, Shenghan Zhou, Runyu Zhang:
An XGBoost risk prediction model of cardiovascular and cerebrovascular diseases with plateau healthcare dataset. 65:1-65:6 - Chunyu Wen

, Tianer Li, Zhiyang Qiu:
Bitcoin Price Prediction Using Autoregressive Integrated Moving Average (ARIMA) Model. 66:1-66:5 - Chongxia Pan

:
Research on the Information Security Investment Strategies Considering Budget Constraints and the Attacker's Preferences. 67:1-67:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














