default search action
CIAT 2020: Virtual Event / Guangzhou, China
- Zhihong Tian, Lihua Yin, Zhaoquan Gu:
CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 - Aihua Liu, Dehua Kong:
A Study on the College English Ecological Teaching Mode Based on Artificial Intelligence. 1-6 - Wei Zhang, Chifu Yang, Feng Jiang, Xianzhong Gao, Kai Yang:
A super-resolution method of combined color image with depth map based on deep learning. 7-11 - Yang Zhao:
Application of K-means clustering algorithm in human resource data informatization. 12-16 - Yingbo Wang, Jun Li, Hui Li:
GMCAST: A novel multicast algorithm of three-layer graphite structure in wireless data center network. 17-21 - Xiajiong Shen, Lijie Bao, Lei Zhang:
Research on Visualization Algorithm of Association Rules Based on Concept Lattice. 22-27 - Yan Sun, Weifeng Ji, Jiang Weng, Beiying Zhao, Yingqi Li, Xuan Wu:
Selection of Optimal Strategy for Moving Target Defense Based on Signal Game. 28-32 - Jiguang Lv, Liang Bing, Dapeng Man:
Indoor tracking algorithm based on simplified Sage-Husa adaptive filter. 33-38 - Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. 39-43 - Chao Xu, Zhongqing Yu, Jinhua Li, Xixin Yang:
Modeling and Optimization of HVAC System Based on GA-ANFIS Algorithm. 44-53 - Yinyin Li, Xiaoyu Du, Sufang Zhou:
A lightweight identity authentication scheme for UAV and road base stations. 54-58 - Xiajiong Shen, Peng Zhang, Jiyong Yang, Wan Chen, Lei Zhang:
Research on Object-oriented Exploration Algorithm. 59-64 - Xiaoyu Du, Zhiyu Zhao, Zhijie Han, Bo Wang:
Data center network acquisition symptom algorithm based on Hamiltonian Cycle. 65-69 - Su Jiang, Yunxin Huang, Fuhan Zhang:
Deep Learning Reconstruction Method of Meteorological Radar Echo Data based on Satellite Data. 70-74 - Huiran Zhao, Lei Shi:
Application of license plate image recognition technology in intelligent parking lot. 75-79 - Jingwei Li, Chong Zhang, Xiangzhan Yu:
Webpage visual feature extraction and similarity algorithm. 80-85 - Xuan Ma, Huiyong Liu:
Research on automatic parameter selection and parallelization of DBSCAN algorithm. 86-94 - Daojun Han, Hongzhen Xiang, Haolin Chen, Yi Xie:
Research on Penetration Strategy of UAV. 95-102 - Jian Yang, Hao Wang, Yueming Lu:
Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning. 103-108 - Haowen Chen, Jinyu Xu, Chao Wu:
Multi-UAV task assignment based on improved Wolf Pack Algorithm. 109-115 - Weiguo Wang, Zhaoquan Gu, Keke Tang:
An Improved Algorithm for Bert. 116-120 - Fuyang Fang, Daojuan Zhang, Chonghua Wang, De Zhang, Yuanfei Zhang, Chao Li, Xi Luo, Ye Fu:
Identification of important nodes on large-scale Internet based on unsupervised learning. 121-129 - Ruihui Hou, Hanhao Li, Honghai Feng, Yunpeng Li, Jun Li, Yatian Shen:
An entity relation extraction algorithm based on BERT(wwm-ext)-BiGRU-Attention. 130-135 - Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:
A defense scheme of voice control system against DolphinAttack. 136-142 - Yaju Wei, Hanhao Li, Honghai Feng, Pengcheng Zhou, Xuzhao Lu, Yatian Shen:
Simultaneous learning algorithm for multiple sets of synonyms with different semantics. 143-147 - Xiandong Xu:
Comparation of several mapping methods for humanoid robot. 148-152 - Xiaoye Lu, Junyan Chen, Liaochuo Lu, Xuefeng Huang, Xiantao Lu:
SDN routing optimization based on improved Reinforcement learning. 153-158 - Rui Liu, Xiangzhan Yu:
A Survey on Encrypted Traffic Identification. 159-163 - Suyu Huang, Bo Zhang:
Research and improvement of k-means parallel multi-association clustering algorithm. 164-168 - Fengbin Zheng, Li Ding, Lanxue Dang:
Location Rating Based on Graph Neural Network. 169-175 - Jie Li, Shuai Ding, Xiaoyu Du, Zhijie Han:
The Analysis of Hamiltonian based on HCN network topology. 176-180 - Shicong Chen, Shuhua Huang, Deyu Yuan, Xiaofan Zhao:
A Survey of Algorithms and Applications Related with Graph Embedding. 181-185 - Yinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang, Zhaoquan Gu:
Convolutional Neural Network based Timbre Classification. 186-191 - Tao Zhang, Yu Jiang, Runsheng Guo, Xiaoran Zheng, Hui Lu:
A Survey of Hybrid Fuzzing based on Symbolic Execution. 192-196 - Wenxin Wang, Bin Jiang, Xudong Tan, Chao Li:
UAV communication interference analysis and anti-interference methods. 197-201 - Dapeng Man, Liang Bing, Jiguang Lv:
Indoor Localization Algorithm based on Attribute-Independent Weighted Naive Bayesian. 202-207 - Chenhui Zhao, Bo Zhang:
Research on the ideology monitoring system of cyberspace legal security based on Neural Network. 208-212 - Dehua Kong, Hongyan Dong, Huyuan Li, Zhuowei Wang, Jiang Li:
Research on Situation Analysis Technology of Network Security Incidents. 213-218 - Bo Zhang, Dehua Kong:
Dynamic estimation model of insurance product recommendation based on Naive Bayesian model. 219-224 - Botao Lu, Bo Zhang:
Research on the current situation and development of intelligent campus construction in private universities. 225-229 - Xiao-Fan Wang, Tianyang Zhou, Junhu Zhu:
Network security assessment based on full host-based attack graph. 230-235 - Zheng Li, Zhikang Shi, Xueyuan Huang, Di Jin, Chun Liu:
An Approach for Constructing Service Developers Oriented Heterogeneous Information Network. 236-243 - Yunzu Song, Xiangzhan Yu, Jianning Huo, Haijie Wang:
Design and implementation of web page classification tool based on word vector. 244-249 - Hang Yang, Yi Zhang, Pingping Zhao, Xiaoman Cheng, Qian Huang:
A privacy protection secure communication protocols for the Industrial Internet of Things. 250-255 - Xueying Zhang, Jun Li, Daojuan Zhang, Jianlei Gao, Hao Jiang:
Research on feature selection for cyber attack detection in industrial Internet of Things. 256-262 - Xiaobing Zhu, Bo Zhang, Yi Han, Youxin Li, Yang Yang, Lilun Yang:
The Influence of Different Network Push Modes on Freshmen's Psychological Adaptation. 263-266 - Jianbo Xiao, Qiaobin Zhang, Wei Nie:
Research on Safety Control Strategy of Ship Monitoring System Based On Information Flow Control between Heterogeneous Networks. 267-270 - Xinda Cheng, Ning Hu, Chi Zhang, Yan Zhao:
Fading with the Time: A Traceless Access Scheme for Anonymous Communication Network. 271-276 - Xiaowen Wang, Jie Huang, Chunyang Qi:
FDI: A Fast IoT Device Identification Approach. 277-282 - Zhuobo Tan, Hui Lu:
A Systemic Review of Kernel Fuzzing. 283-289 - Tao Liu:
Informatization construction of human resource management in retail industry based on SaaS platform. 290-294 - Senlin Zhang, Zhentai Longyuan, Yueming Lu:
Blockchain-Based Power Metering Data Abnormal Monitoring Model Electric Energy Data Abnormal Monitoring Model. 295-302 - Jinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan:
SPA: Stealthy Poisoning Attack. 303-309 - Hao Wang, Jian Yang, Yueming Lu:
A Logical Combination Based Application Layer Intrusion Detection Model. 310-316 - Yuhao Han, Zhiting Xiong:
Fly-Manager: Enabling Efficient and Reliable Management of High-performance Network Chip. 317-323 - Yingyi Tong, Wenhan Dong, Chenfei Zhai:
Multi-UAV Collaborative Online Obstacle Avoidance Track Planning. 324-329 - Zhijie Han, Yinyun Fu, Xiaoyu Du:
Review of the embedding of hypercube and its variants. 330-334 - Shi Yin, Yu Teng, Ning Hu, Xu Dong Jia:
Decentralization of DNS: Old Problems and New Challenges. 335-341 - Jiayou Shang, Xiaofeng Wang, Yang Chen, Zhaohong Deng:
Mapping approach for multiscale emulation networks in heterogeneous environments. 342-347 - Xiaofan Zhang, Haibo Huang, Lina Zhu, Yibo Wei, Yangyang Li, Muyijie Zhu, Jiahui Zheng, Xi Luo:
Exploration and practice of industrial control system information security incident emergency exercise. 348-354 - Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. 355-359 - Yuzheng Liu, Chengbo Wang, Weiping Wang, Shanshan Wei, Chengfeng Xue:
An Online Computation Offloading Based on Auction Mechanism in Mobile Ad Hoc Networks. 361-367 - Luqin Lv, Yueming Lu:
Multi-source and multi-dimensional network security situational awareness model. 368-373 - Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. 374-378 - Hua Tong, Jie Huang, Chunyang Qi:
A Novel Lightweight Cryptography Scheme Based on Standardized IOT Data. 379-386 - Chi Zhang, Ning Hu, Xinda Cheng, Yan Zhao:
ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet Channels. 387-393 - Zijia Wang, Han-Teng Liao, Jiacheng Lou, Yu Liu:
Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital Transformation. 394-400 - Li Zhao, Bo Zhang, Jiang Li:
Research on Data Approximation Search Privacy Protection in Cloud Environment. 401-406 - Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu:
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding. 407-413 - Junping Wan, Hao Xun, Xianrong Zhang, Jiyuan Feng, Zhe Sun:
A privacy-preserving and correctness audit method in multi-party data sharing. 414-419 - Daojuan Zhang, Kexiang Qian, Wenhui Wang, Fuyang Fang, Chonghua Wang, Xi Luo:
Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data. 420-424 - Qubo Yang, Xiaobing Zhu:
Research on smart party building identity online based on blockchain. 425-430 - Yufeng Shi, Jinxin Zuo, Yihong Guo, Yueming Lu:
Distributed File System Multilevel Fault-Tolerant High Availability Mechanism. 431-438 - Qinan Li, Zhihao Xue:
A Privacy-Protecting Authorization System Based on Blockchain and zk-SNARK. 439-444 - Chao Zhang, Donggang Yang, Chu Chen, Pinghong Ren:
Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications. 445-450 - Qi Liu, Hongwei Ruan, Hua Li, Xiaodi Li, Xianrong Wang:
REAL-GUARD: A Machine Learning based Real-time Mechanism for Combining Packet and Flow Features to Mitigating Network Attacks in SDN. 451-458 - Xiajiong Shen, Kunying Meng, Zhongli Guo, Lei Zhang:
Convolutional Long-Short Term Memory Network for convective weather prediction based on 3D Doppler radar data. 459-464 - Yong Zhang:
Human resource data quality management based on multiple regression analysis. 465-470 - JiuJin Wang, Xu Gu, Xiangzhan Yu:
Early Analysis and Detection of Compressed Traffic. 471-476 - Tao Liu, Xiaohong Cao, Jin Li, Shaocheng Wu, Xiaowei Chen, Yueming Lu:
Blockchain-based privacy protection scheme for electric energy metering data. 477-483 - Ziyuan Li, Wangshu Guo, Quan Xu, Yingjie Xu, Huimei Wang, Ming Xian:
Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching Rules. 484-489 - Liang Yuan, Gang Shen:
A Training Scheme of Deep Neural Networks on Encrypted Data. 490-495 - Xiaodong Wang, Wenxu Jia, Hua Qin:
An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs. 496-503 - Haoren Ke, Hao Wu, Dongmei Yang:
Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques. 504-511 - Yanru Kong, Jiawu Yue:
Game Studies on Accounting Entity Behavior Based on Blockchain Technology. 512-518 - Guangchen Yu, Juan Ma, Ji Wang:
Proof of Retrievability for Image Data in Industrial Cloud Platform. 519-523 - Shen He, Jun Fu, Wen Jiang, Yexia Cheng, Jiake Chen, Zhihui Guo:
BloTISRT: Blockchain-based Threat Intelligence Sharing and Rating Technology. 524-534 - Tao Liu, Xiaohong Cao, HeFang Jiang, Jinwen Xi, Shaocheng Wu, Yueming Lu:
Research and Application of Blockchain Technology in Smart Grid. 535-542 - Kaiyu Shi, Xiangzhan Yu, Yue Zhao:
Fuzzing Improving Techniques Applied and Evaluated on a Network Traffic Analysis System. 543-548 - Jiaxi Liu, Lin Ye, Hongli Zhang, Xiaoding Guo:
Named entity recognition of legal judgment based on small-scale labeled data. 549-555 - Tao Liu, Shaocheng Wu, Jin Li, Yue Ma, Fenghui Duan, Yueming Lu:
Blockchain-based trusted sharing of electric energy privacy data. 556-564 - Xiaobing Zhu, Bo Zhang, Qubo Yang, Silan Zhu, Zhihua He, Luyun Chen:
The Integrated Model of Online and Offline Education and Training of Student Activists. 565-569 - Qiong Wu, Bo Zhang:
The Influence of Internet Finance on the Traditional Business of Commercial Banks. 570-575 - Zhijie Han, Panpan Meng, Xiaoyu Du:
DSnow: A Durer pentagon Snow structure for data center network. 576-581 - Xiandong Xu, Xiang Yu:
A network digital works protection method based on digital watermarking and intrusion detection. 582-586
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.