


default search action
ISPA/BDCloud/SocialCom/SustainCom 2023: Wuhan, China
- IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023. IEEE 2023, ISBN 979-8-3503-2922-3

- Xiao Zhang, Peirui Cao, Yongxi Lyu, Qizhou Zhang, Shizhen Zhao, Xinbing Wang, Chenghu Zhou:

FC+: Near-optimal Deadlock-free Expander Data Center Networks. 1-9 - Mengwei Xie, Lizhen Cui, Jianxiong Liu, Wei Guo, Feng Li:

Time Fairness-Based Application Offloading in Mobile Edge Computing with Individual QoS Guarantee. 10-17 - Jiejian Wu, Zhe Wang, Teng Ma

, Linghe Kong
, Yutong Liu, Zhuo Song, Jiadi Yu, Yong Yang, Tao Ma, Guihai Chen:
DySched: Relieving Large-Scale Incast for Cloud-Native RDMA Applications. 18-25 - Yifan Han, He Huang, Yang Du, Yu-E Sun, Jia Liu, Hongli Xu:

Hierarchical Sketch: An Efficient Solution for Threshold-t Flows Measurement in High-Speed Networks. 26-33 - Yidong Zhong, Yang Ao, Dingding Li, Jianguo Li, Deze Zeng:

ADSwitch: Adaptive CPU Scheduling for Distributed Systems. 34-41 - Kun Meng, Lijun Sun, Xiao Chen, Haiqin Wu, Shuaiyong Li:

A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services. 42-49 - Tao Xiong, Rui Hou, Lingyun Zhou, Guanglin Xing, Deze Zeng:

K-means ++ and Reinforcement Learning-Based Clustering Method to Achieve Energy Efficiency in Underwater Acoustic Sensor Networks. 50-55 - Zhiwei Ling, Zhihao Yue, Jun Xia, Ting Wang, Mingsong Chen, Xiang Lian:

FedEntropy: Efficient Federated Learning for Non-IID Scenarios Using Maximum Entropy Judgment-based Client Selection. 56-63 - Dan Li, Panpan Ding, Yuqian Zhou, Yuguang Yang, Chenting Li:

Secure, Efficient, and Privacy-Protecting One-to-Many Cross-Chain Shared Data Consistency Audit. 64-71 - Wei Liao, Lansheng Han, Peng Chen:

Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography. 72-79 - Wei Zheng, Jinglong Deng, Zihan Nan, Peixuan Lin, Yue Hong:

DRAS: A Scheduling Algorithm for Cloud-Based DAG with Deadline Constraints. 80-87 - Xin Zhai, Lijie Xu, Jialei Zhang, Kun Wang, Jia Xu, Bei Xu:

Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs. 88-95 - Pingping Dong, Xiaojuan Lu, Tairan Huang, Liying Chen, Yang Yang, Lianming Zhang:

Predictive Queue-based Low Latency Congestion Detection in Data Center Networks. 96-103 - Pingping Dong, Yuning Zuo, Liying Chen, Shangyu Li, Lianming Zhang:

VSNT: Adaptive Network Traffic Forecasting via VMD and Deep Learning with SCI-Block and Attention Mechanism. 104-109 - Xin Shi, Liang Zhao, Na Lin, Lexi Xu, Ammar Hawbani, Yuanguo Bi:

Constructing Future Vehicle Digital Twins with Insights from Cloud-Edge Collaboration. 110-117 - Zhehao Cheng, Jiaoyan Chen, Jin Liu, Mengyang Li:

Data Quality Assessment in Mobile Crowdsensing by Utilizing Psychology Effect. 118-124 - Qinghua Mao, Xi Lin, Gaolei Li, Lixing Chen, Yuchen Liu, Yuxin Qi, Jianhua Li:

Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification. 125-130 - Liangfu Zhang, Cuiping Li, Chuanwen Luo, Hong Chen:

All-Pairs SimRank Updates on Dynamic Graphs. 131-138 - Xiao Zhao, Feng Tian, Ziling Shao:

Localization and Tracking using ODE-LSTM Algorithm with Non-Line-of-Sight Channels. 139-144 - Kai Peng, Tong Lu, Song Mei, Nannan Xue, Yongchao Shen, Menglan Hu:

Fine-grained IoT device identification method based on self-supervised ViT. 145-152 - Hao Chen, Peng Liu, Lizhao You, Ziyang Guo, Jianjun Luo, Xinghua Sun, Taotao Wang, Liqun Fu:

Deep Reinforcement Learning based Dynamic Channel Bonding for Wi-Fi Networks. 153-160 - Tianyu Li

, Liang Zhao, Chaojin Mao, Na Lin, Qiang He, Xingwei Wang:
A Genetic Algorithm Based Adaptive Offloading Scheme for Domain Generalization in VEC. 161-168 - Zhuoqun Xia, Chao Su, Zisang Xu, Kejun Long:

Lightweight Security Authentication Scheme for Vehicle-Road Collaboration using Physical Unclonable Function. 169-174 - Pengbo Wang, Boyin Zhang, Shigeng Zhang, Xuan Liu:

An Edge-oriented Deep Learning Model Security Assessment Framework. 175-182 - Zhuoqun Xia, Ziyu Wang, Xiao Liu:

Partitioning-based Active Trust Mechanism in Cloud-Edge-Device Collaborative Data Collection. 183-190 - Jianrong Lu, Lulu Xue, Wei Wan

, Minghui Li, Leo Yu Zhang, Shengqing Hu:
Preserving Privacy of Input Features Across All Stages of Collaborative Learning. 191-198 - Kaifei Zhang, Yuxiang Ma, Yulei Wu, Tao Chen, Huijie Ma:

Adaptive Splitting Algorithm for Neural Network Modelling in AMP. 199-206 - Jing Long, Cuiting Luo, Ruxin Chen, Wei Liang

, Zheng Qin:
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things. 207-212 - Ziyu Zeng, Jiale Huang, Jiaxin Wu, Jigang Wu:

Joint Request Offloading and Resource Allocation for Energy Efficient D2D Enabled Multi-type Inference Services. 213-220 - Tianmeng Zhang

, Renhui Chen, Congming Gao, Youtao Zhang, Jun Yang, Jiwu Shu:
Libra: A Space-Efficient, High-Performance Inline Deduplication for Emerging Hybrid Storage System. 221-228 - Juan Luo, Ruoyu Xiao, Peng Sun, Ying Qiao:

VLEO Satellite Radio Access Network Slicing: A Hierarchical Deep Reinforcement Learning Approach. 229-236 - Chenyu Lin, Shutian Luo, Huanle Xu:

Exploring Imbalances among Microservice Containers in Large Cloud Platforms. 237-245 - Yuxuan Lin, Bin Tang, Siyuan Zhou, Zaipeng Xie, Baoliu Ye:

Efficient Node Selection for Coding-based Timely Computation over Heterogeneous Systems. 246-253 - Yi Li, Wenying Zheng, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, C. Thamilarasi:

Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing. 254-261 - Yi Tian, Guangping Xu, Hongzhang Yang, Yue Ni, Jiaxi Cao, Lei Yang:

Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems. 262-269 - Nan Hu, Chenglu Yan, Zhiguang Chen, Yutong Lu:

FinD: Fine-grained Dynamic Task Scheduling with Lightweight Threads on Many-core Processors. 270-278 - Zhan'gang Ma, Jiandong Yan, Feng Zou, Xixin Cao:

Software and Hardware Processing Method for Blockchain Light Node SPV Verification. 279-285 - Jiaxuan Wu, Wei-Yang Chiu

, Peichen Liu, Weizhi Meng
, Wenjuan Li:
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. 286-293 - Keyang Liu

, Maxim Jourenko
, Mario Larangeira:
Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO Model. 294-304 - Liuhuan Li, Ximin Yang, Xiao Zhang, Yumeng Yang, Xuefeng Chen, Wan Tang:

GANDPS: Ensuring Both Detection Precision and Stability in GAN-based Anomaly Detection for Network Traffic. 305-310 - Xiaohui Wei, Yumin Yan, Xiaonan Wang, Yi Hu, Hengshan Yue:

Defending T-BFA in DNNs Efficiently via Random Security-Sensitive Weights Switching. 311-318 - Zhaokang Wang, Jiahui Pan, Lu Zhou, Zhonghui Zhang, Caocong Ji:

Parallel Integrity Authentication Data Structure Construction for Encrypted Range Queries. 319-327 - Yue Ding, Chuanfu Xu, Haozhong Qiu, Qingsong Wang, Weixi Dai, Yongzhen Lin, Yonggang Che:

Evaluating Performance Portability of SYCL and Kokkos: A Case Study on LBM Simulations. 328-335 - Lin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, Fenghua Li, Liang Fang:

A Moving Target Defense Approach for the Distributed Dynamic Network. 336-343 - Yubo Peng, Xiong Li, Shuai Shang, Xiaofen Wang, Xiaosong Zhang:

Low-overhead Privacy-preserving Location-based Skyline Query. 344-351 - Jing Li, Peihao Yang, Linghe Kong

, Guihai Chen:
A BPF-Based Task Scheduling Scheme for Heterogeneous Multiprocessor Systems. 352-359 - Surafel Kifetew Woldeyes, Yongmin Zhang, Wei Wang

, Zhaohui Li:
Joint Resource Placement and Service Replica Placement Scheme in Mobile Edge Computing. 360-367 - Bin Li, Yufeng Tang

, Yupeng Zhang, Hengxing Liu, Di Li, Zheng Gong:
Cryptanalysis of Space-Hard Ciphers under Strong White-Box Security. 368-374 - Feng Zhang, Hao Wang, Ruixin Guo, Erkang Xue, Guangzhi Qu:

Efficient Differentially Private Tensor Factorization in the Parallel and Distributed Computing Paradigm. 375-380 - Chunming Liu, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Cheng Zeng, Yang Yang:

Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous Data. 381-387 - Zhen Wang, Daniyal M. Alghazzawi

, Li Cheng, Gaoyang Liu, Chen Wang, Zeng Cheng, Yang Yang:
FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data Heterogeneity. 388-393 - Changrui Chen, Xiaolin Chen, Deze Zeng:

ERODRL: Efficient ISP Routing Optimization via Deep Reinforcement Learning. 394-401 - Siyuan Leng, Fenghua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang:

ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain. 402-409 - Yuanbo Li, Hongchao Hu, Shuai Zhang, Guozhen Cheng, Wenyan Liu:

An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning. 410-415 - Yongtao Luo, Jie Liu, Tiaojie Xiao, Chunye Gong:

Parallel Implementation of SHA256 on Multizone Heterogeneous Systems. 416-422 - Yazhi Zhang, Chuanwen Luo, Guijuan Wang, Li Zhang, Mengjie Lv, Jiguo Yu:

The Adaptive Fault-tolerant Routing Based on an Improved Local Security Information Model of the Exchanged Hypercube. 423-430 - Cairui She, Liwei Chen, Gang Shi:

DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture. 431-438 - Qingsheng Lei, Yongjun Xia, Qitao Guo, Rui Hao, Xiaohai Dai, Weiqi Dai:

EBFT: Efficient BFT Consensus through Shortcut Replies. 439-446 - Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:

Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. 447-455 - Lin Zhong, Yujue Wang, Jun Du, Daji Liang, Ziyuan Zhong, Kevin He, Andrew Zhang:

Fast 2-out-of-n ECDSA Threshold Signature. 456-465 - Shuting Li, Qian Jiang, Xin Jin, Nanqing Liu, Shiyu Chen, Shin-Jye Lee:

Cascade Meta-RCNN for Few-shot Object Detection. 466-473 - Junwei Tang, Zilong Xu, Luyao Ye, Tao Peng, Ruhan He, Xinrong Hu, Wenlong Tian:

PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware Detection. 474-481 - Yuming Lu, Fenghua Li, Yitong Wen, Liang Fang, Shoukun Guo, Zifu Li:

Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis. 482-490 - Ke Shang, Weizhen He, Shuai Zhang, Zhen Zhang, Jichao Xie, Xin Shi:

Deep Reinforcement Learning-based Network Moving Target Defense in DPDK. 491-499 - Xun Zhang, Chengliang Wang, Xingquan Piao, Ao Ren, Zhetong Huang:

SCRA: Systolic-Friendly DNN Compression and Reconfigurable Accelerator Co-Design. 500-507 - Long Gao, Yiru Zhao, Qihan Wan, Lei Zhao:

Efficient Hybrid Fuzzing with Syntax-aware Input Trim Based on Lightweight Taint Analysis. 508-515 - Wangsheng Yan, Li Lin, Ruihong Huang, Jinbo Xiong, Tianqiang Huang, Mingwei Lin:

Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality. 516-523 - Qidong Wu, Xuemei Fu, Xiangli Yang, Ruonan Zhao, Chengqian Wu, Tinghua Zhang:

Semi-asynchronous Federated Learning Optimized for NON-IID Data Communication based on Tensor Decomposition. 524-530 - Sheng Yun, Md. Zakirul Alam Bhuiyan, Md. Taufiq Al Hasib Sadi, Shen Su:

Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models. 531-538 - Jingdong Li, Zhao Li, Xiaoling Wang, Xingjian Lu, Ji Zhang, Hongyang Chen:

GPU-Accelerated Maximal Bicliques Mining Framework for Large E-commerce Networks. 539-544 - Yong Luo, Zhi Lu

, Xiaofei Yin, Songfeng Lu, Yiting Weng:
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy. 545-552 - Haipeng Du, Huichuan Liu, Geli Lv, Xin Lv, Zhiwen Wang, Weizhan Zhang:

A Novel Multi-scale Spatial Tiling Based Adaptive Streaming Method for 360° Video. 553-560 - Zhixin Fan, Yaohui Zhang, Jiang Zhou, Bo Li, Yong Chen, Weiping Wang

:
DepotDB: Mitigate Write Amplification with Region Compaction on KV Stores for Periodic Write-Intensive Workloads. 561-566 - Yang Wang, Zhenzhen Yuan, Guosheng Kang, Buqing Cao, Jianxun Liu, Yong Xiao:

Graph-based Multi-view Clustering for Web services. 567-572 - Shaoheng Tan, Chang Liu, Dingding Li, Yong Tang, Deze Zeng:

A NUMA-aware Graph Database for Hybrid Memory System. 573-580 - Chuanjie Liu, Siyu Ren, Shuang Du, Cheng Dai, Bing Guo, Runzhi Fan:

Deep Reinforcement Learning to Enhance the Energy-efficient Performance of Unmanned Aerial Vehicles-enabled Fog Radio Access Networks. 581-586 - Li Zheng, Donghui Ding, Zhao Li, Jun Gao, Jie Xiao, Hongyang Chen, Schahram Dustdar, Ji Zhang:

Anomaly Detection in Battery Charging Systems: A Deep Sequence Model Approach. 587-594 - Jian Xu, Bing Guo, Fei Chen, Yan Shen, Shengxin Dai, Cheng Dai:

A Federated Learning Aggregation that Integrates Clustering and Momentum Correction Based on Historical High-Quality Gradients. 595-602 - Yiming Gao

, Zhen Wang, Weili Wu, Herman Lam:
EIF: A Mediated Pass-Through Framework for Inference as a Service. 603-611 - Zhihan Cao, Xi Zheng

, Jianxiong Guo, Weijia Jia, Yang Xu, Tian Wang:
Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge-Intelligence. 612-619 - Suhui Wangzhang, Ruizhang Yang, Rong Gu, Bo Li, Dingjin Liu, Zhaokang Wang:

Efficient Large Scale Reverse-time Migration Imaging Computation based on Distributed Spark Cluster with GPUs. 620-627 - Chuanyu Zong, Ziyi Cai, Wenju Li, Tao Qiu, Jiajia Li, Xiufeng Xia:

Continuous Complex Relational Community Detection on Multi-layer Networks. 628-633 - Jingyu Zhang, Xingxing Hou, Yilong Teng, Lailong Luo:

Transaction Data Management Optimization Based on Multi-Partitioning in Blockchain Systems. 634-639 - Jinke Cheng, Gaolei Li, Xi Lin, Hao Peng, Jianhua Li:

Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI. 640-647 - Yuying Li, Yang Yang, Chen Wang, Runqin Liu, Hongbo Jiang, Wenping Liu:

Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring. 648-655 - Jingyu Zhang, Pian Zhou, Yongtao Sun, Lailong Luo:

A High-Performance Data Verification Mechanism in Blockchain-Based IoT Systems. 656-661 - Jingyu Zhang, Jin Yang, Chenghao Wu, Lailong Luo:

A Space-Efficient Digital Wallet Service in Blockchain Systems. 662-669 - Wanying Lu, Liang Liu, Wenbin Zhai, Haoyuan Chen, Yulei Liu:

HBC: Combining Lossy and Lossless Hybrid Bilayer Compression Framework on Time-Series Data. 670-679 - Pengxu Chen

, Huazhong Liu, Hanning Zhang, Jihong Ding, Yunfan Zhang, Dehua Chen:
High-Order Faithful Interpretation Methods for Tensor-Based CNNs. 680-687 - Meng Lin, Qinghao Huang, Xingyi Yu, Xianjing Guo, Tao Guo:

Adaptive Fusion of Single-stream and Dual-stream Models based on Cross-modal Association Strength for Harmful Meme Detection. 688-693 - Peng Huang

, Zisang Xu, Wei Liang
, Jianbo Xu, Bin Zheng:
An Efficient Decentralized Mutual Authentication Scheme Between Avatars for Metaverse. 694-700 - Yushan Zhao, Tengke Wang, Shunxiang Zhang:

A Semantic-Driven Generative Information Extraction Framework Oriented to Patent Text. 701-708 - Songquan Li

, Rongbo Zhu, Jun Yuan, Shaohua Wan:
Cross-subject Drowsiness Recognition Model Based on the Multi-scale Parallel Convolution of EEG Channels. 709-714 - Hongyi Qiao, Cong Peng, Min Luo, Po Wu, Debiao He:

Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption. 715-723 - Baoming Chang, Fengxi Zhou, Zhaoyang Wang, Yu Wen, Boyang Zhang:

A Distributed Storage System for System Logs Based on Hybrid Compression Scheme. 724-735 - Ziqi Wang, Wei Wang:

Twin Branch Transformers-Based Re-Ranking for Image Retrieval. 736-743 - Baoshen Guo, Hai Wang, Hao Liu, Wei Gong, Wei Xi, Xiaolei Zhou, Shuai Wang:

TGT: Churn Prediction in O2O Logistics with Two-tower Gated Transformer. 744-751 - Jianzong Wang, Yimin Deng, Ziqi Liang, Xulong Zhang, Ning Cheng, Jing Xiao:

CP-EB: Talking Face Generation with Controllable Pose and Eye Blinking Embedding. 752-757 - Sihang Qin, Xianjun Gu, Xing Jun, Haitao Li, Mengqi Huang, Weiqi Dai:

An SGX and Blockchain-Based System for Federated Learning in Classifying COVID-19 Images. 758-765 - Junhui Li, Guangping Xu, Hongzhang Yang, Yulei Wu:

Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data. 766-771 - Zhanting Zhou

, Kejun Bi, Yuyanzhen Zhong, Chao Tang, Dongfen Li, Shi Ying, Ruijin Wang:
HKTGNN: Hierarchical Knowledge Transferable Graph Neural Network-based Supply Chain Risk Assessment. 772-782 - ZhiXin Huang, Jia-Xiang Lin, QianQian Chen, ZhenChang Zhang:

Hybrid Distribution Separation for Prediction of Heterogeneous Zero-Inflated Time Series. 783-788 - Xianyu He, Runyu Zhang, Pengpeng Tian, Lening Zhou, Min Lian, Chaoshu Yang:

A Write-Optimized PM-oriented B+-tree with Aligned Flush and Selective Migration. 789-794 - Chengdong Chen, Wensheng Gan, Jiahui Chen, Shicheng Wan:

FSKY-Miner: Fast Mining of Skyline Patterns. 795-802 - Jieqi Rong, Weirong Liu, Xiaoquan Yu, Wanwan Ren, Boyu Shu, Jun Peng:

A Few-shot Learning Approach for Anomaly Detection in Cooperative Tracking Control System. 803-808 - Kai Gao, Hao Huang, Linhong Liu, Ronghua Du, Jinlai Zhang:

A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle Networks. 809-816 - Kai Gao, Wenhao Jia, Yuxiang Zhou, Ronghua Du:

Multi-Head Self-Attention Enhanced Convolutional Neural Network for Driver Fatigue Detection using EEG Signals. 817-823 - Peng Liu, Shanghong He, Kai Gao, Geng Yang, Junhui Zou, Longsheng Ye:

Prediction of hydraulic pumps remaining useful life based on LSTM and Transform with dual self-attention. 824-831 - Bin Chen, Miaoben Wang, Feng Zhou, Haoyang Yan, Ronghua Du:

Energy Efficient Speed Planning of Electric Vehicles for Vehicle-Following Scenarios Using Data-driven Koopman Model. 832-839 - Feng Zhou, Hongkun Liang, Kewu Tao, Shuo Li:

Autonomous cruise control of intelligent high-speed train with online energy-saving optimization. 840-845 - Bin Chen, Guo He, Feng Zhou, Hao Huang, Wei Liu, Ronghua Du:

Hierarchical Data-driven Predictive Control Strategy for Energy Management of Electric Vehicles. 846-853 - Jin Guo, You Wu, Yi Lei, Guotan Liu, Ronghua Du:

Research on Multi-vehicle Formation Control with the Assistance of the Characteristic Model in the Networked Environment. 854-861 - Wanwan Ren, Jun Peng, Rui Zhang, Jieqi Rong, Boyu Shu, Yongting Liu, Yingze Yang:

An Autoencoder-Driven FDIA Detection Method for Virtual Coupling Systems of Heavy-Haul Trains. 862-867 - Yunsheng Fan, Zhiwu Huang, Kaifu Guan, Boyu Shu, Yongjie Liu, Zeyu Zhu, Peinan He, Shuo Li:

A Physics-Informed Integrated Modeling Method for Lithium-ion Batteries. 868-873 - Heng Li, Peinan He, Taozhen Chang, Shuo Li:

SOC Estimation of Supercapacitor Balancing Systems: A Switching Kalman Filter Approach. 874-880 - Huan Wang, Xiaoyang Lai:

Quantum Information Technology for Network Security: An Application-Focused Overview. 881-886 - Longmin Deng, Xuemin Zhang, Qianrong Zheng, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:

A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study. 887-892 - Haibo Wang, Mengyue Xu, Gen Li, Ting Pan, Haiqing Si, Haibo Liu, Yixuan Li, Yijin Zhu:

Research on Pilot's Workload Based on Multisource Data. 893-899 - Fahao Chen, Peng Li, Shui Yu:

Efficient Giant Graph Unlearning via Push-Pull Tuning. 900-907 - Zhenkun Jin, Shuai Huang, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou:

Contrastive Learning-Based Generic Audio-to-Lyrics Alignment. 908-914 - Yang Yi, Yuting Li

, Yun Xu, Pengcheng Wang, Yonghui Xu, Weiguang Wang:
BT-Duper: A Binomial-Tree Based Data Replication Offloading Method with Native RDMA Primitives. 915-922 - Jianzong Wang, Pengcheng Li, Xulong Zhang, Ning Cheng, Jing Xiao:

DQR-TTS: Semi-supervised Text-to-speech Synthesis with Dynamic Quantized Representation. 923-928 - Yuanchao Xu, Ruyi Qian, Yida Wang, Qirun Huo:

iNUMAlloc: Towards Intelligent Memory Allocation for AI Accelerators with NUMA. 929-936 - Hao Feng, Lin Chen, Jiong Wu:

BAFD: A Bidirectional Adaptive Fault Diagnosis Algorithm For Multiprocessor Systems. 937-944 - Peter Kubare, Xiaojun Hei, Yuan Tian:

Detect Human Falls in an End-Edge-Cloud Orchestrated Architecture. 945-952 - Yichen Wang, Qin Lv:

Jump off the Bandwagon? Characterizing Bandwagon Fans' Future Loyalty in Online NBA Fan Communities. 953-960 - Meng-Jie Wang

:
Tweeting from Left to Right: Tracing the Dynamics of Emotional Messaging and Public Engagement During the 2018 vs. 2022 US Campaigns. 961-971 - Ziqi Qin:

Style Transfer of Traditional Chinese Bamboo Flute Music Based on AI Model. 972-979 - Kunlun Guan, Yangsen Zhang:

Cross Domain Few Shot NER Via Data Enhancement Invariant Domain Feature Extraction Based on Diffusion Model. 980-988 - Zhenkun Jin, Xingshi Wan, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou:

Ranking on Heterogeneous Manifold for Multimodal Information Retrieval. 989-996 - Chengying Mao

, Haiquan Hu
:
Large-scale k Edge Server Placement Based on User Clustering and Intelligent Search. 997-1004 - Lijun Dong, Richard Li:

Routers' Energy Consumption Reduction With Load Saturation Awareness And Traffic Steering. 1005-1010 - Yejin Liao, Kun Zhu:

A Learning Auction Mechanism for Video Streaming Transmission with Decoupling Uplink-Downlink Association. 1011-1017 - Ziming Zeng, Chao Dong, Xiaojun Zhu, Lei Zhang:

Hierarchical Task Scheduling for Heterogeneous UAVs based on Hybrid Genetic Algorithm. 1018-1025 - Feifan Hao, Shan Jing, Chuan Zhao:

Link load balancing scheme for elephant flow in SDN data center. 1026-1033 - Na Lin, Zhijiang Wang, Liang Zhao:

MAS-DDPG: Multi-Sensor Self-Adaptive Scheduling for UAV Path Planning in Network-Unavailable Environments. 1034-1041 - Jintao Yang, Minghua Wang, Wenbo Chen, Shujing Xie:

Improved Virtual Force Algorithm-Based Fuzzy Clustering in Mobile Wireless Sensor Networks. 1042-1049 - Olufunsho I. Falowo, Jess Kropczynski, Chengcheng Li:

Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities. 1050-1061 - Hong Yu, Qinrang Liu, Chao Cui, Shuai Wei:

An Application Level Synchronization Method for Heterogeneous Redundant Structures. 1062-1068 - Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong:

A Firmware Vulnerability Detection Method Based on Feature Filtering. 1069-1076 - Qianjin Wang, Xiangdong Li, Yuchen He, Chong Yue:

A Gradient-guided Fuzzing Approach to Recover More Complete Control Flow Graph of Binary. 1077-1082 - Jialun Deng, Li Cheng, Haiwen Yuan, Kuanlei Zheng, Xuan Li, Quli Li:

An Online Detection System for LDoS attack Based on XGBoost. 1083-1088 - Meng Zhao, Zhu Di, Zhe Xia, Jing Tian, Jianwen Xiang, Jun Lin:

OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning. 1089-1096 - Zhan Xue, Magnus Karlsson, Tao Yu, Aleksander Lobakin, Maciej Fijalkowski, Jesse Brandeburg:

An In-Kernel Inline Crypto Solution for eXpress Data Path With QuickAssist Technology: Design, Prototyping and Performance Evaluation. 1097-1104 - Guo Yuan, Chao Heng, Zhai Ping, Liu Ziqi, Li Haibo, Li Wenpeng:

Reversible Data Hiding Scheme Based on Prediction Error Bit-plane Compression. 1105-1112 - Mohammed Rajhi, Niki Pissinou:

Resource-Limited Localized Adaptive Adversarial Training for Machine Learning Model. 1113-1120 - Kun Zhao, Wei Xi, Lingzhi Yi, Wei Gong, Shuai Wang, Yijing He:

Joining a Private Group with Friends Nearby without PIN-code. 1121-1128 - Hen-Geul Yeh

, Geoffrey Daniel Farthing:
GPS L1 C/A Spoof Detection Through the Application of Deep Neural Networks. 1129-1134 - Mingshun Ye, Mingdong Tang, Weili Chen:

BILAM: A BiLSTM-Based Model for Detecting Phishing Scams in Ethereum. 1135-1142 - Yimin Deng, Xulong Zhang, Jianzong Wang, Ning Cheng, Jing Xiao:

CLN-VC: Text-Free Voice Conversion Based on Fine-Grained Style Control and Contrastive Learning with Negative Samples Augmentation. 1143-1148 - Xiaoyu Yi, Gaolei Li, Ao Ding, Yan Zheng, Yuqing Li, Jianhua Li:

AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences. 1149-1156 - Chuanwen Luo, Ning Liu

, Ting Chen, Jia Cao, Yi Hong, Zhibo Chen, Deying Li:
Cooperative Completing Tasks of Charging WRSNs with Multiple MUVs and Laser-charged UAVs. 1157-1164 - Lihui Pang, Yilong Tang, Yulang Liu, Bin Yang, Wenwei Zhang, Qingyi Tan:

A signel-channel blind signal separation method based on signal type difference for time-frequency overlapped signal. 1165-1172

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














