


default search action
27th CSCWD 2024: Tianjin, China
- Weiming Shen, Jean-Paul A. Barthès, Junzhou Luo, Tie Qiu, Xiaobo Zhou, Jinghui Zhang, Haibin Zhu, Kunkun Peng, Tianyi Xu, Ning Chen:

27th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2024, Tianjin, China, May 8-10, 2024. IEEE 2024, ISBN 979-8-3503-4918-4 - Yingchao Wang

, Chen Yang, Shulin Lan, Weilun Fei, Lihui Wang
, George Q. Huang, Liehuang Zhu:
Towards Industrial Foundation Models: Framework, Key Issues and Potential Applications. 1-6 - Ming Zhang, Yi Hu, Xiangchun Liu, Yanghao Zhang, Quan Yi, Wei Song:

UAV Swarm Path Planning Algorithm Based on Starling Flocking. 1-7 - Zichen Song

, Shuo Ma, Weijia Li:
Robustness Boost: MIR-Based Feature Enhancement in Deep Learning Models. 1-5 - Feihong Huang, Wei Jiang:

Towards an Acceptance Probability-Aware Order Bundle in Crowdsource Food Delivery Service. 6-11 - Ming Tao, Lingling Liao, Kaitu Li, Ji Xu, Weiming Huang:

Optimized-CNN enabled Facial Emotion Recognition within Collaborative Edge Computing. 12-17 - Guangbin Bao, Liangliang Sun, Rui Zhang, Bo Zhang, Zhiming Shen, Shuang Chen:

Research on Image-text Multimodal Emotions Analysis with Fused Emoji. 18-23 - Gaofeng Zhang, Yanhe Fu, Gang Xu, Xing Wang, Jia Hao, Ru Yi:

Opportunistic Network Routing Algorithm Based on Overlapping Communities and Communication Willingness. 24-29 - Gaofeng Zhang, Jia Hao, Gang Xu, Xing Wang, Yanhe Fu, Ru Yi:

Opportunistic Network Routing Based on Node Sociality and Location Information. 30-35 - Ling Ou, Gen Feng:

Parameter-Efficient Fine-Tuning Large Speech Model Based on LoRA. 36-41 - Guokun Xu, Weijie Wang

, Degang Sun, Yanpeng Ma, Yan Wang, Weiqing Huang:
MLNT: A Multi-Level Network Traps Deployment Method. 42-47 - Zhijun Zhou, Qing Xie, Yuhan Wang

, Lin Li, Yongjian Liu, Mengzi Tang
:
Debiased Contrastive Learning For Graph Collaborative Filtering. 48-54 - Xiaoyu Zhang, Wen Wang, Shuangyin Ren, Xiaomin Gong, Yuxuan Yang, Jingchao Wang:

A Two-Phase Task Allocation Strategy With a Hybrid Architecture. 55-60 - Yutao Song, Nankai Lin, Lingbao Li, Shengyi Jiang:

A Vision Enhanced Framework for Indonesian Multimodal Abstractive Text-Image Summarization. 61-66 - Jijing Cai, Han Zhu

, Hailin Feng, Long Wen, Wei Wang
, Meilei Lv, Kai Fang:
Vehicle Trajectory Prediction Based on Dynamic Graph Neural Network. 67-72 - Yantao Shao, Tianxiang He, Yan Mao, Kai Fang, Wei Wang

, Keji Mao:
Optimizing Future Predictions in Children's Health: Implementing OGPA-enhanced Deep Learning for Precise Child Height Forecasting in the Social Media Age. 73-78 - Zhiyuan Liu, Wei Liu, Xinyang Tong, Qi Shen, Qiang Zheng, Hengrui Hu, Hong Liu, Xiaojie Wang:

ABCF: An Adaptive Balanced Multimodal Website Classification Framework. 79-84 - Han Wang, Chunhua Gu:

DCCL: Distance-coefficient guided Clustering with Contrastive Learning for Few-shot Text Classification. 85-90 - Yunpeng Ma, Qing Yu:

CGTS: A Transformer framework for time series prediction based on feature extraction. 91-96 - Yuanxiang Xu, Yuan Feng, Shengyu Song, Jiahao Liu:

A Model for Sea Ice Segmentation based on Feature Pyramid Network and Multi-head Self-attention. 97-102 - Zhichao Li, Xianghui Yuan, Liwei Jin, Chencheng Zhao:

Stock Trend Prediction: an Effective Hybrid Deep Model Based on Lead and Lag Correlation Graphs. 103-108 - Shiming He, GenXin Li, Qinqing Guo, Kun Xie:

Multi-Graph Structure Learning-based Multivariate Time Series Anomaly Detection with Extended Prior Knowledge. 109-114 - Zehui Feng

, Dongfu Zhu
, Kejie Zhang, Yizhe Jia, Jiefan Qiu:
CrowdLab: Collaborative Dataset Labeling System Based on Image Segmentation. 115-120 - Wanjun Chen, Qiqi Chen, Jiexun Shen, Guosheng Kang, Jianxun Liu, Buqing Cao, Lihong Zhang:

Interactive Web API Recommendation via Exploring Mashup-API Interactions and Functional Description. 121-126 - Xin Cai, Xiaozhou Zhu, Wen Yao:

Distributed time-varying group formation tracking for multi-UAV systems subject to switching directed topologies. 127-132 - Xuean Huang, Jianmei Su:

Intermediate Tasks Enhanced End-to-End Autonomous Driving with Uncertainty Estimation. 133-138 - Caipeng Gu, Jijing Cai, Zhihao Wen, Jiefan Qiu, Wei Wang

, Meilei Lv, Kai Fang:
Visible Light Secure Communication Method for Internet of Vehicles. 139-144 - Shuai Wang, Siye Wang, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang:

RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. 145-150 - Fanfan Hao, Zhu Wang, Yaobing Xu, Siyuan Leng, Liang Fang, Fenghua Li:

Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition. 151-156 - Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng:

KSM: Killer of Spectre and Meltdown Attacks. 157-162 - Haofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang:

Two-Server Verifiable Federated Learning: Unconditional Security and Practical Efficiency. 163-168 - Baowei Wang, Zhengyu Hu, Yi Yuan, Bin Li, Yuxiao Zhang:

BlockArb: The Decentralized Arbitration Mechanism for Data Trading. 169-174 - Jingchen Sun, Ning Chen, Songwei Zhang, Zhaolong Ning, Tie Qiu:

A Probability-Based Scheme for Generating Robust Internet of Things. 175-180 - Yanjing Lei, Zehui Feng

, Xiangqing Lin, Di Cao, Jiakai Zhang:
NILM-LANN: A Lightweight Attention-based Neural Network in Non-Intrusive Load Monitoring. 181-186 - Yuchen Liu, Shanshan Wang, Jin Au-Yeung, Zhenxiang Chen:

Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection. 187-192 - Hengwei Zhang, Yuejia Wu, Jian-Tao Zhou:

A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity Recognition. 193-198 - Dingyang Duan, Daren Zha, Zeyi Liu, Yu Chen:

Dynamic Graph Embedding via Self-Attention in the Lorentz Space. 199-204 - Zhuhua Bai, Weiqing Li, Guolin Yang, Fantong Meng, Renke Kang, Zhigang Dong:

A Coarse-to-Fine Framework for Point Voxel Transformer. 205-211 - Wei Shi, Yufeng Wang, Jianhua Ma, Qun Jin:

LFAS: An electricity load forecasting framework assisted by cooperative multi-task learning-based spike occurrence prediction. 212-217 - Bingxian Li, Lin Zhu, Long Tan:

A Distributed Deep Reinforcement Learning-based Optimization Scheme for Vehicle Edge Computing Task Offloading. 218-223 - Baowei Wang, Wenjue Huang, Bin Li, Yi Yuan, Fan Yang, Zhengyu Hu:

Blockchain-based Medical Image Data Trading Platform with Copyright and Privacy Protection. 224-229 - Chunqiao Jin, Shuangyuan Yang:

Named Entity Recognition Method Based on Multi-Teacher Collaborative Cyclical Knowledge Distillation. 230-235 - Bin Ren, Yongdong Wei, Chunhong He:

Dynamic Adaptive Graph Convolutional Networks for Traffic Flow Regulation. 236-241 - Bingshu Shi, Meiling Liu

, Jiyun Zhou, Kaiqun Fu:
Sentiment Summarization Generation Based on Multi Instance Learning and Graph Convolution on Social Media. 242-247 - Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, Haojuan Zhang:

A Cloud-Edge Collaborative System for Object Detection Based on KubeEdge. 248-253 - Xiaoyang Ji, Yuchen Zhou, Haofu Yang, Shiyue Xu, Jiahao Li:

Self-Supervised Contrastive Graph Clustering Network via Structural Information Fusion. 254-259 - Yisheng Zhong, Li-Ping Wang:

PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks. 260-265 - Tao Fan, Wei Zhang, Chunying Kang, Hongcheng Yu, Yao Xiao:

Generating Adversarial Samples via a Combination of Feature Selection and Optimized Perturbation Methods. 266-271 - Fenghao Li, Ying Shen, Liming Wang, Huanbo Zhang, Ling Zhang:

SR-RDW : A Multi-user Redirected Walking Method Based on State Recovery for Alignment. 272-277 - Jianmeng Guo

, Huan Zhou, Xuxun Liu, Liang Zhao, Victor C. M. Leung:
A Stackelberg Game-based Wireless Powered Federated Learning. 278-283 - Xunjia Yin, Xiaoming Wu, Xiangzhi Liu:

SOD-YOLO: A New Small Object Traffic Sign Recognition Network. 284-290 - Jiajun Wang, Yongqiang Gao:

QoE optimization based on Adaptive Bitrate Control for Multi-party Interactive Live Streaming. 291-296 - Huan Li, Xiangjie Kong, Guojiang Shen, Xiaoran Yan, Yao Yang, Mario Collotta:

Point-Correlate Adversarial Transformer for Unsupervised Multivariate Time Series Anomaly Detection. 297-302 - Peiguo Fu, Li Zhang, Ming Liu, Wen Jiang, Liyuan Sun:

Research on a Cross-platform Communication Situation Assessment Method Based on Specific Events. 303-309 - Zeyu Dong, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu:

Class-wise Image Mixture Guided Self-Knowledge Distillation for Image Classification. 310-315 - Jiahao Liu, Yuan Feng, Shengyu Song, Yuanxiang Xu:

A Study of Deep Learning Algorithms for Long-term Prediction and Correlation Identification of Arctic Ice. 316-322 - Tianye Gao, Wang Qi, Kehong Liu, Shengbao Li, Ruihai Ge, Tianning Zang:

MTS-IoT: A Robust Encrypted IoT Traffic Classification via Multi-dimensional Time Series. 323-328 - Min Wang, Yan Gao:

A Multi-Label Text Classification Model with Enhanced Label Information. 329-334 - Fei Chen, Hui Xue, Pengfei Fang:

TSDNet: An Efficient Light Footprint Keyword Spotting Deep Network Base on Tempera Segment Normalization. 335-340 - Chenbing Dong, Hui Xu, Fukui Li, Mengran Liu:

A Collaborative-Enhanced Sand Cat Swarm Optimization for Network Intrusion Detection. 341-346 - Mengran Liu, Hui Xu, Qinyue Wu, Chenbing Dong:

An Improved Beluga Whale Optimization Algorithm by Collaborative Strategies for Multi-Threshold Image Segmentation. 347-352 - Zhiyu Wu, Yisu Wang:

Qiao: DIY your routing protocol in Internet-of-Things. 353-358 - Lijuan Xu, Zhiang Yao, Dawei Zhao, Xin Li:

GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System. 359-364 - Yihang Zhou, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu:

Online Relational Knowledge Distillation for Image Classification. 365-370 - Hanqing Gao, Junfeng Zhao, Wenhao Li, Zhengxin Li:

MicroMCM: Fine-grained Root Cause Localization for Microservice Systems Based on Multiple Causal Inference Methods. 371-376 - Mengchuan Shang, Xueying Han, Changzhi Zhao, Zelin Cui, Dan Du, Bo Jiang:

Multi-language Webshell Detection based on Abstract Syntax Tree and TreeLSTM. 377-382 - Ziyuan Cui, Zhongwen Guo, Jinxin Wang, Weigang Wang

:
CombinE: A Fusion Method Enhanced Model for Knowledge Graph Completion. 383-388 - Rui Huang, Jingcheng Zeng, Xuyi Cheng, Jieda Wei:

Fine-grained classification for aero-engine borescope images based on the fusion of local and global features. 389-394 - Huixuan Zhao, Jinyong Cheng, Rundong Du:

A Multi-Scale Infrared and Visible Image Fusion Network Based on Context Perception. 395-400 - Qiuyuan Wang, Lanju Kong, Lizhen Cui:

A Complete Protection, Certification and Traceability System for Academic Degrees Based on Collaborative Storage on and Off the Chain. 401-406 - Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:

MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. 407-412 - Ahmed R. Elmahalawy, Lin Li, Xiaohua Wu, Xiaohui Tao, Jianming Yong:

Computational Personality Analysis with Interpretability Empowered Prediction. 413-418 - Guojian Xiao, Siyuan Qin, Kuan Li, Juan Chen, Jianping Yin:

EAtuner: Comparative Study of Evolutionary Algorithms for Compiler Auto-tuning. 419-426 - Hao Yue, Xiaoliang Wang, Yuzhen Liu, Zhou Tang, Jiasheng Yin, Yuanyuan Ai:

Enhancing Weak Feature Detection in Convolutional Analysis of Traditional Chinese Medicine Tongue Diagnosis. 427-432 - Tong Yin, Xin Chen, Libo Jiao, Jiaxuan Liao:

Joint Dynamic Pricing and Computing Offloading in Edge-to-Cloud Collaboration. 433-440 - Zhengqi Wu, Hui Li

, He Bai, Xinyuan Pei:
A Scalable and Resilient Protocol for Synchronous Collaboration. 441-446 - Rui Huang, Zongyu Guo, Qingyi Zhao

, Wei Fan:
PAPnet: A Plug-and-play Virus Network for Backdoor Attack. 447-452 - Haodi Zhang, Junyu Yang, Wenxi Huang, Min Cai, Jiahong Li, Chen Zhang, Kaishun Wu:

Recognizing Textual Entailment by Hierarchical Crowdsourcing with Diverse Labor Costs. 453-458 - Jinghong Yang, Qing Yu:

WDFormer: Acceptable Field Growth Transformer with Windows for Long Sequence Time-Series Forecasting. 459-464 - Zhengxin Guo

, Shizhan Chen, Chao Wang, Hongyue Wu, Kai Ma, Zhiyong Feng:
Security-Oriented Architecture for Blockchain-Based Federated Learning in the Financial Industry. 465-470 - Jia Li, Hua Zhang:

SA-SVD: Mitigating Bias in Face Recognition by Fair Representation Learning. 471-476 - Haoyu Xiong, Chengfu Yang:

Test-Time Adaptation with Robust Dual-stream Perturbation for Stable Agent Deployment in Dynamic Scenarios. 477-482 - Wanchun Jiang, Hanyu Chen, Jialiang Chen, Kai Wang, Jiarui Yang, Xiao Han, Xingping Zhang:

Cooperative Simulation of RDMA-based Network and Storage. 483-488 - Yipei He, Yongqiang Gao, Yunfei Song:

Distributed Rendering for Cloud Gaming in Cloud-Edge-End Cooperation Networks. 489-494 - Zhizhuo Yang, Wei Zhang:

Topic Paraphrasing Model for Abstractive Dialogue Summarization. 495-500 - Xin Dai, Xin Chen, Libo Jiao, Shougang Du, Xueqi Ren, Zhe Dong:

Cost-Efficient Data Offloading and Resource Allocation in 6G Space-Air-Ground Integrated IoT Networks. 501-506 - Xinli Liu, Ming Yang:

The Research of Small Object Detection based on YOLOX in UAV. 507-512 - Yuyan Quan, Songtao Guo, Dewen Qiao:

RCFL-GAN: Resource-Constrained Federated Learning with Generative Adversarial Networks. 513-518 - Qianwen Mao, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu, Qingkai Wang:

RFRN: Cross-domain RFID Activity Recognition Using a Few Samples. 519-524 - Baojie Tian, Liangjun Zang, Haichao Fu, Jizhong Han

, Songlin Hu:
Towards More Effective and Transferable Poisoning Attacks against Link Prediction on Graphs. 525-530 - Jiaxuan Liao, Xin Chen, Libo Jiao, Wang Li, Baichang Wang:

Deep Reinforcement Learning Based Cooperative Task Offloading and Resource Allocation in mmWave-Enabled Space-Air-Ground Integrated Networks. 531-537 - Jiaming Zhang, Songtao Guo, Pengzhan Zhou:

FedGDC-P: Communication-efficient Personalized Graph Federated Learning Based On Dataset Condensation. 538-543 - Lin Zhu, Long Tan, Bingxian Li:

Optimization Scheme of Vehicular Edge Computing Task Offloading Based on Digital Twin Assistance. 544-549 - Chenliang Zhu, Jie Yang

, Peiwei Deng, Junzhe Lin
, Lianfen Huang, Hezhi Lin:
STPointNet for Human Action Recognition in MmWave Point Clouds. 550-555 - Ronghao Liang, Qingtian Zeng, Wenyan Guo, Hua Duan, Weijian Ni:

Automatic Extraction of Petri Nets from RFC Protocol Texts. 556-561 - Songtao Ye, Saisai Zheng, Yizhang Xia:

Channel Attention-Based Method for Searching Task-Specific Multi-Task Network Structures. 562-569 - Xiao Zhao, Suzhen Cao, Zheng Wang, Dandan Xing, Dawei Zhou:

A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy Protection. 570-575 - Song Wei, Limin Ma, Zeyu He, Wei Zhang:

Blockchain-based Private Set Intersection Protocol with Attribute-based Access Control. 576-581 - Ziang Li

, Jie Xu, Zhenyu Cheng, Tianning Zang:
IMTCDF: A Multi-Module-Based Internet Malicious Traffic Classification and Detection Framework. 582-587 - Chenxu Han

, Xuelei He, Xiaowei He, Zhixin Huang, Chuang Zhang, Yong Huang:
MLWF-Net: Multiple lung windows based fusion network for segmentation of small infected areas in COVID-19 CT slices. 588-593 - Cong Wu, Sicheng Lei, Huawei Xu, Tongzhen Xing:

Multi-scale Fusion Attention Network for Industrial Surface Defect Classification. 594-599 - Ping Gu, Yong Lu:

A Hybrid Active Sampling Algorithm for Imbalanced Learning. 600-605 - Guangyu Lin, Hongbin Zhang, Zhenyi Fan, Lianglun Cheng, Zhuowei Wang, Chong Chen:

Improving Distantly-Supervised Relation Extraction through Label Prompt. 606-611 - Han Liu, Yunxu Bai:

Security and Efficient Data Verification Protocol for Distributed Database based on Zero-knowledge Proof. 616-621 - Xingming Liao, Nankai Lin, Haowen Li, Lianglun Cheng, Zhuowei Wang, Chong Chen:

Composited-Nested-Learning with Data Augmentation for Nested Named Entity Recognition. 618-623 - Weigang Wang

, Wei Jing, Ziyuan Cui:
ScoreReader: A handwritten score recognition toolkit for examination papers. 624-629 - Guangzong Si, Qing Ding:

Bi-Directional Safety Protection for Vulnerable Road Users: A Roadside Unit-Based Cooperative Perception Network. 630-636 - Sixian Chan, Aofeng Qiu, Wei Pan, Jiafa Mao:

Attention-Enhanced Multi-View Stereo with Probabilistic Depth Variance Refinement. 637-642 - Hua Ma, Zixu Jiang, Xiangru Fu, Mingfa Hong, Zhuoxuan Huang, Hongyu Zhang:

Route Planning of City Road Trips Meeting Subjective Preferences and Objective Constraints. 643-648 - Zhiyuan Cui, Luoyu Mei

, Siyuan Pei, Borui Li, Xiaolei Zhou:
Privacy-preserving Human Activity Recognition via Video-based Range-Doppler Synthesis. 649-654 - Kun Han, Long Tan:

An Event-driven Clustering Routing Algorithm in mobile CRSNs. 655-660 - Xin-Wei Yao, Weiwei Xing, Chu-Feng Qi, Qiang Li, Weiqiang Wang, Xing Fu:

Simulated Annealing Deep Q-learning Incentive Mechanism for Mobile Crowd Sensing. 661-668 - Shang Wang, Meiju Yu, Mingzhu Zhao, Haotian Wang:

Blockchain-Based Cloud Data Auditing Scheme in Multi-Cloud Storage Service Environment. 669-674 - Xingyu Yan, Shuai Xu, Yusong Zhang, Bohan Li:

ELEvent: An Abnormal Event Detection System in Elevator Cars. 675-680 - Yuxiang Lin, Wentao Wang, Hui Peng, Guangrong Chen:

Tracking Control of Quadruped Robot Based on Visual Perception. 681-686 - Zhongyun Li, Yan Zhao, Yihong Wang, Zongyang Liu, Yushan Pan:

A novel model for product defect detection based on the automatic aspect term extraction. 687-692 - Weihua Liu, Xiaohui Han, Wenbo Zuo, Yu Sun:

HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network Traffic. 693-698 - Yu Tian, Haojun Xia, Chen Li, Bibo Tu:

An Efficient Caching Mechanism for End-host Network Functions. 699-704 - Xun Cai, Siwei Xue, Tianyou Wang, Yeqian Yang, Jianguo Lv, Kin-Tak Lau, Yanbo Gao:

A Bi-Directional Prediction based on Multi-Stage Deep Multilayer Perceptron for the Productive Process of Polyacrylonitrile Precursor. 705-710 - Haoran Liu, Yifeng Zhao, Xuanhui Liu, Bo Wang, Keyi Cheng:

Deep Learning Empowered IoV: ISAC RCG-Net Beam Tracking for Seamless Road Communication. 711-716 - Yichen Chen, Yuqi Pan, Ruyu Liu, Haoyu Zhang, Guodao Zhang, Bo Sun, Jianhua Zhang:

360ORB-SLAM: A Visual SLAM System for Panoramic Images with Depth Completion Network. 717-722 - Tinglong Tang, Sheng Hua, Shuifa Sun, Yirong Wu, Yuqi Zhu, Chonghao Yue:

Optical Flow Guided Pyramid Network for Video Salient Object Detection. 723-728 - Hao Zhao, Wenqi Zhang, Xiong Li, Shuai Shang, Ke Huang, Xiaosong Zhang:

Towards Efficient Delegated Private Set Intersection Cardinality Protocol. 729-734 - Fang Liu, Shiqun Yin, Guang Li, Yajun He:

Nested Named Entity Recognition based on Span and Efficient Global Pointer. 735-741 - Ke Zhang, Zhenwen Peng, Ruixing Zong, Qiong Wang, Xiong Xiao, Zhuo Tang:

Communication Optimization in Blockchain Peer-to-Peer Networks. 742-747 - Zhenyang Mao, Peng Li, Guangzhong Liao, Lei Nie, Haizhou Bao

, Qin Liu
:
Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensing. 748-753 - Zhenwen Peng, Yingjie Song, Qiong Wang, Xiong Xiao, Zhuo Tang:

FedBN: A Communication-Efficient Federated Learning Strategy Based on Blockchain. 754-759 - Wenying Peng, Yanming Chen, Haibin Zhu, Yiwen Zhang:

End-edge collaborative DNN inference acceleration via E-CARGO and RBC. 760-765 - Mengyan Liu, Gaopeng Gou, Gang Xiong, Junzheng Shi, Chang Liu, Chen Chen:

WebPromptM2: A Website Classification Method Leveraging Prompt-Based Learning with Multimodal Features. 766-771 - Yusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng:

A Formal Verification Methodology for Cache Architectures Based on Noninterference Hyperproperties. 772-777 - Bo Wang, Yang Yang, Yu Zhang, Cheng Zhan, Fei Wang:

DeepVNP: Virtual Network Placing with Deep Reinforcement Learning in Industrial IoT. 778-783 - Mingya Zhang, Na Zhao, Yuqian Zhuang, Liang Wang, Xianing Tao:

FaLdViT: A Simple Yet effective framework to detect Cephalometric landmarks. 784-789 - Gang Wu, Yanming Chen, Yiwen Zhang:

MicroENet: An Efficient Network for MCUs with Low Model Parameters and Peak Memory. 790-795 - Pengju Wang, Jing Liu:

ASL: Adversarial Attack by Stacking Layer-wise Relevance Propagation. 796-801 - Caidan Zhao, Xiang Li, Chenxing Gao, Zhiqiang Wu:

Video Anomaly Detection Framework Based on Motion Consistency. 802-807 - Gaoyu Luo

, Zhibin Gao, Sheng Zhang, Lianfen Huang, Linran Chen:
FBM-FA: Frame-Level-Attention-Based Facial Behavior Mining for Face Anti-Spoofing. 808-813 - Sihan Mao, Jianguang Zhang, Xiaodong Hu, Xiaolin Zheng:

Byzantine-Robust Compressed and Momentum-based Variance Reduction in Federated Learning. 814-820 - Xin Li, Zhongjie Li

, Feiyang Xu:
Eye-tracking based Detection of Developmental Dyslexia in Children Using Convolutional-Transformer Network. 821-826 - Jiarui Zhang, Zhenguo Du:

AcouController: Motion Based Acoustic Remote Control for Smart Devices. 827-832 - Ziyang Huang, Yanming Chen, Yiwen Zhang:

Lyapunov-guided Deep Reinforcement Learning for Vehicle task Stable offloading. 833-838 - Mingjie Gao, Wei Huang, Zhilei Xu, Sung-Kwun Oh:

Hybrid Ensemble Polynomial Neural Network Classifier: Analysis and Design. 839-844 - Fang Luo, Jie Liu, George To Sum Ho, Kun Yan:

Unsupervised Cross-domain Object Detection via Multiple Domain Randomization. 845-851 - Guangbin Bao, Zhiming Shen, Chen Liu, Liangliang Sun, Shuang Chen:

Multimodal sentiment analysis based on TCN and cross-modal interactive feedback network. 852-857 - Fuyu Gu, Yang Gu, Yiyan Xu, Haoran Sun, Yushan Pan, Shengchen Li, Haiyang Zhang:

Language-based Audio Retrieval with GPT-Augmented Captions and Self-Attended Audio Clips. 858-863 - Zirong Xu, Weimin Lai

, Qiao Yan:
FedPGT: Prototype-based Federated Global Adversarial Training against Adversarial Attack. 864-869 - Shuhua Yuan

, Yongqi Ge, Jiayuan Wei, Zhenbo Yuan, Rui Liu, Xian Mo:
Reinforcement Learning based Battery Energy Neutral Operation for EHWS. 870-876 - Kecheng Tang, Jiantao Zhou, Xu Guo:

An Uncovered Neurons Information-Based Fuzzing Method for DNN. 877-882 - Guanwei He, Beichen Ding, Qingqing Huang, Guodong Feng:

A Force-free Control Architecture Integrated with Digital Twin for Collaborative Manipulators. 883-888 - Lin Zhao, Ji Xiang, Xiaobo Guo, Yunzhi Liang, Zeyi Liu, Xin Wang:

CA-GCN: A Confidence-aware uncertain knowledge graph embedding model based on graph convolutional networks. 889-896 - Wenqiang Li, Aimin Li, Xiaotong Kong, Yuechen Zhang, Zhiyao Li:

MF-YOLO: Multimodal Fusion for Remote Sensing Object Detection Based on YOLOv5s. 897-903 - Rui Xia

, Lisong Wang, Taili Li, Pingping Shi:
Social Influence Prediction using Neighborhood Information across Various Ranges. 903-908 - Weimin Lai

, Zirong Xu, Qiao Yan:
Clustered Federated Learning Based on Client's Prototypes. 909-914 - Xiaoyan Zhao, Fengxian Hou, Yan Kuang, Peiyan Yuan:

Cache Strategy for Joint Content Recommendation and D2D Collaboration. 915-920 - Xianning Meng, Hongda Li, Yao Zan:

Sharding PoW-based Blockchains with Simple Cross-Shard Transaction Processing. 922-927 - Luting Zhang, Yubing Li, Wei Yang, Qingyun Liu, Rong Yang:

PFTB: A Prediction-Based Fair Token Bucket Algorithm based on CRDT. 928-934 - Yuliang Chen, Xi Lin, Gaolei Li, Lixing Chen, Jing Wang, Siyi Liao, Jianhua Li:

Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT. 935-940 - Yiduo Cheng, Xu Yuan, Dunhui Yu, Mingjun Zhao:

Multi-task online allocation based on path planning strategy in Spatial crowdsourcing environment. 941-949 - Juanru Zhang, Weichao Yang, Yinghui Zhang, Hao Zheng, Tiankui Zhang:

DPAdaMod_AGC: Adaptive Gradient Clipping-Based Differential Privacy. 950-955 - Zhiheng Zhang, Guowei Wu:

Decb: A Decentralized Broker for Sky Computing. 956-961 - Rui Li, Xin Zhang, Yanpeng Wu, Zongyi Shao:

Cell Detection Algorithm for Alveolar Lavage Fluid Based on YOLO-GAS Algorithm. 962-967 - Zhaohua Zheng, Zizheng Wang, Xinyu Tong, Keqiu Li, Qiquan Chen:

FedAHP: A Heterogeneous Client Selection Method for Federated Learning Based on the Analytic Hierarchy Process in Mobile Edge. 968-973 - Yu Zhang, Jianqiang Zhang, Gongpeng Song, Qin Lu:

A Novel Text Matching Model Based on Multilayer Coding and Feature Enhancement. 974-979 - Yunfei Song, Yongqiang Gao, Yipei He:

Joint Task Offloading and Resource Allocation for NOMA-Based Vehicular Networks. 980-985 - Chaoran Zhou, Jianhui Guo, Xin Zhang, Kaicheng Yang:

Dynamic scheduling method of public transportation resources based on Spatial Graph Convolution and Proximal Policy Optimization. 986-991 - Xinpeng Ouyang, Xiaodong Yan, Minghui Hao:

A Pre-Trained Language Model Based on LED for Tibetan Long Text Summarization. 992-997 - Binbin Li, Yuqing Li, Siyu Jia, Bingnan Ma, Yu Ding, Zisen Qi, Xingbang Tan, Menghan Guo, Shenghui Liu:

Triple GNNs: Introducing Syntactic and Semantic Information for Conversational Aspect-Based Quadruple Sentiment Analysis. 998-1003 - Yongqiang Gao, Chuangxin Li, Zhenkun Li:

Deep Reinforcement Learning-Driven Adaptive Task Offloading and Resource Allocation for UAV-Assisted Mobile Edge Computing. 1004-1009 - Kehong Liu, Qi Wang, Tianye Gao, Tianxing Ma

, Tianning Zang:
A Machine Learning-based Method for Clustering the Traffic of Linux NATed Network Entities with TCP/IP Feature. 1010-1016 - Hao Xu, Zhangjun Lu, Wei Zhang

, Jianhui Jiang:
Process-Oriented GCC Failure Analysis based on Fault Injection. 1017-1022 - Luyao Liu

, Zhipeng Zhou, Mingwu Chen, Wei Gong:
CAT: Cross-Adversarial Training for WiFi-Based Human Activity Recognition. 1023-1028 - Changnan Jiang, Chunhe Xia, Mengyao Liu, Chen Chen, Huacheng Li, Tianbo Wang, Pengfei Li:

FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution. 1029-1036 - Haitao Wang, Rui Wang, Peng Zou, Qingjian Ni, Xiao Sun:

MCAN: An Efficient Multi-Task Network for Facial Expression Analysis. 1037-1042 - Bo Cui, Li Dang:

Incentive Mechanism of Blockchain-Based Reverse Auction for Federated Learning. 1043-1048 - Bo Cui, Dou Hao:

ADGRL: A Deep Graph Reinforcement Learning Model with Attention for Online Judge Exercise Recommendation. 1049-1054 - Fengming Zhang, Pan Hu, Hongming Cai, Lihong Jiang:

Parallel Collaborative Reasoning Approaches Based on DatalogMTL in IoT Scenarios. 1055-1060 - Ningning Zhu

, Fuqing Zhao, Jie Cao:
A Hyperheuristic and Reinforcement Learning Guided Meta-heuristic Algorithm Recommendation. 1061-1066 - Jia Yi, Xiaoming Wu, Yunfeng Dong, Bei Qi, Xiangzhi Liu:

Collaborative Computation Model Based on Dependency Types and Constituent Trees for Aspect-Based Sentiment Analysis. 1067-1072 - Lingjun Fan, Qinpei Zhao, Jiasheng Shi, Fu Lin, Weixiong Rao:

Learn to Simulate Finite Element Analysis via Mesh-based Graph Networks. 1073-1078 - Liang Jiao, Yujia Zhu, Wenxiu Zhang, Lei Zhao, Yi Zhou, Qingyun Liu:

6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information. 1079-1085 - Heng Liu, Boyue Wang, Yanfeng Sun, Xiaoyan Li, Yongli Hu, Baocai Yin:

VIG: Visual Information-Guided Knowledge-Based Visual Question Answering. 1086-1091 - Shiwei Liu, Yong Xu:

Multi-behavior Enhanced Self-supervised Graph Learning for Social Recommendation. 1092-1097 - Mingjie Wang, Bicheng Fang, Jinfeng Jiang, Hongfei Fan:

A Novel Request-Invitation-Approval Scheme for Flexible Semantic Conflict Prevention in Real-Time Collaborative Programming. 1098-1103 - Gaotao Shi, Zejun Liu, Jinfeng Yang, Zenghua Zhao:

Orthogonal Rendezvous Multicast for Mobile Sinks in Wireless Sensor Networks. 1104-1109 - Jianzong Wang, Pengcheng Li, Xulong Zhang, Ning Cheng, Jing Xiao:

Medical Speech Symptoms Classification via Disentangled Representation. 1110-1115 - Zhen Wu, Li Zhang:

EPFA-Net: An Enhanced Partial Feature Aggregation Network for Remote Sensing Object Detection. 1116-1121 - Dongsheng Ji, Caidan Zhuoma, Juntong Du, Dandan Zou, Zheng Zhang:

Study on the Impact of Different Anchor Quantities in pneumonia X-ray Object Detection Based on the YOLO Series. 1122-1127 - Zhuozhen Xu, Sixian Chan, Bin Guo, Wenhui Zhou, Xiaolong Zhou:

Multi-Target Multi-Camera Tracking based on lightweight detector. 1128-1133 - Ziqi Liang, Haoxiang Shi, Jiawei Wang, Keda Lu:

EM-TTS: Efficiently Trained Low-Resource Mongolian Lightweight Text-to-Speech. 1134-1139 - Lei Wang, Wenguang Zheng, Yingyuan Xiao:

Graph-based POI Recommendation through Self-Supervised Curriculum Learning. 1140-1145 - Pengsheng Li, Qingfeng Du, Shengjie Zhao

:
KEWS: A KPIs-Based Evaluation Framework of Workload Simulation On Microservice System. 1146-1152 - Danni Chang, Renqiu Guo, Yuning Qian, Luyao Wang:

A stylized generation approach for poster background graphic design based on light elements. 1153-1158 - Feng Chen, Li Wang, Jiawei Zhang, Qi Sun, Pinyan Lai:

An Attention Model Based Heuristic Algorithm for Storage Selection and Order Picking Path Joint Optimization. 1159-1164 - Yuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng:

A Module Level Security Evaluation Method Based on Model Checking. 1165-1170 - Dongyang Li, Chenhao Zhang, Hongwei Zhang, Jinsong Wang:

GLM-Rf: Malicious smart contract static detection scheme based on GLM and Random forest. 1171-1176 - Ronghuan Zhang, Jing Zhao, Ming Li, Qingzhi Zou:

FEST: Feature Enhancement Swin Transformer for Remote Sensing Image Semantic Segmentation. 1177-1182 - Wolong Xing, Zhenkui Shi, Hongyan Peng, Xiantao Hu, Yaozong Zheng, Xianxian Li:

Personalized federated learning based on feature fusion. 1183-1188 - Rongrong Yin, Kuan-Kuan Jia, Hao Qin, Mengfa Zhai, Shao-Ying Ma, Ming-Qi He:

Reinforcement Learning-based Multi-hop Intelligent Route Selection for Vehicle-to-Vehicle Visible Light Communication. 1189-1194 - Qichen Li, Sujie Shao, Chao Yang, Jiewei Chen, Feng Qi, Shaoyong Guo:

Communication-efficient Federated Learning Framework with Parameter-Ordered Dropout. 1195-1200 - Shiming He, Chenxi Guo:

Memory-efficient anomaly detection for online data streams. 1201-1206 - Rui Wang, Haitao Wang, Peng Zou, Xiao Sun:

WR-Former: Vision Transformer with Weight Reallocation Module for Robust Facial Expression Recognition. 1207-1212 - Zituo Li, Jianbin Sun, Xuemei Yao, Ruijing Cui

, Bingfeng Ge, Kewei Yang:
An interpretable adversarial robustness evaluation method based on robust paths. 1213-1218 - Lihong Zhang, Jing He, Yamei Nie, Xiaokang Zhou, Qiqi Chen, Guosheng Kang:

JMF-SS: Joint Matrix Factorization for Web API Recommendation with Mashup-Mashup Similarities and API-API Similarities. 1219-1224 - Chen Chen, Guorong Ye, Lixin Lan, Pu Li, Hao Wang, Jianqiao Li, Hangguan Shan, Huixu Xiao:

Lightweight Dangerous Driving Action Recognition Using Graph Convolutional Broad Learning. 1225-1230 - Jianjun Zhao, Ru Tan, Yaqin Cao, Xutong Wang, Qixu Liu, Xiang Cui:

MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior Detection. 1231-1237 - Xiaozhao Deng, Dan Wang, Lin Yang:

The Impact of Perceived Risk on Online Medical Users' Privacy Protection Behavior. 1238-1243 - Yifan Zhou, Yue Ding, Dong Wang:

LDAG: Modeling Long-term interests by Directed Acyclic Graph Neural Network for Sequential Recommendation. 1244-1249 - Chaoxiong Yi, Songlei Jian, Yusong Tan, Yusen Zhang:

MACA: Memory-aware convolution accelerating for CNN inference on edge devices. 1250-1255 - Huanxiao Zhou, Yushui Geng, Jing Zhao, Xishan Ma:

Semantic-Enhanced Attention Network for Image-Text Matching. 1256-1261 - Jialin Liu, Xinyan Su, Zeyu He, Jun Li:

Adversarial Batch Inverse Reinforcement Learning: Learn to Reward from Imperfect Demonstration for Interactive Recommendation. 1262-1267 - Jian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He:

Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems. 1268-1273 - Shuo Zhao, Yiyun Xing, Jianqiang Zhang, Gongpeng Song, Qin Lu:

SCTAR: A Multi-Layer BiLSTM-Based Chinese Short Text Similarity Computation Model with Attention Mechanism. 1274-1279 - Xueqi Li, Kejia Li, Jiayao Liu, Ruipeng Gao:

Smartphone-based Indoor Pedestrian Tracking via Transformer. 1280-1285 - Hanfeng Jiang, Xiao Xue, Juanjuan Li, Wanpeng Ma:

Improve Multi-agent Path Finding by Bridging the Gap between Abstract Algorithms and Specific Application Scenarios. 1286-1291 - Zixuan Chen, Shengjie Zhao

, Jin Zeng, Shilong Dong, Geyunqian Zu:
CASTNet: Convolution Augmented Graph Sampling Transformer Network for Traffic Flow Forecasting. 1292-1297 - Lin Li, Jinghua Zhu:

Causal Inference for Eliminating Popularity Bias in Session-based Recommendation. 1298-1303 - Kai Chen, Junfeng Yao, Yuanhang Li, Han Zhang, Huabo Shen, Quan Qian, Xing Wu:

GTPCR: Graph-Enhanced Transformer for Point Cloud Registration. 1304-1309 - Xueqi Ren, Xin Chen, Libo Jiao, Xin Dai, Zhe Dong:

Joint optimization of UAV trajectory planning, video cache placement and transcoding in UAV-assisted 6G networks: a PPO-L based approach. 1310-1315 - Ting Chen, Jinghua Chen, Tao Gao, Shukang Zhu, Zongyang Guo, Zixiang Liu, Ziqi Li, Quanzhao Zhao:

A Novel Scene-aware Pedestrian Detection in Dense Scenes. 1316-1321 - Yuanhang Li, Junfeng Yao, Kai Chen, Han Zhang, Xiaodong Sun, Quan Qian, Xing Wu:

A Collaborative Anomaly Localization Method Based on Multi-Modal Images. 1322-1327 - Xin-Wei Yao, Yu-Chen Zhang, Yu-Yi Zhi, Kai-Jie Zhang, Zhi-Heng Yuan:

Decouple and Align Sparse R-CNN for End-to-End Object Detection. 1328-1333 - Zhuoqun Xia, Xiangyu Lei, Shiyu Wang, Zhenzhen Hu:

A Photovoltaic Power Theft Detection Method based on Data-driven Stacking Model. 1334-1339 - Xinlong Qiao, Kaiqi Zhang, Zhiying Tu, Hongwei Wang:

Active Recommendation Strategy Based on Multi-Collaborative Agent. 1340-1345 - Yue Shen

, Wanshu Fan, Zhongbin Han, Dongsheng Zhou:
Multi-Level Feature-Guided Network for Few-shot Medical Image Segmentation. 1346-1351 - Chunyu Liu

, Jianjun Yu, Qiang Lin:
LIDP: Contrastive Learning of Latent Individual Driving Pattern for Trajectory Prediction. 1352-1357 - Yupeng Zhang, Shunkang Hu, Zenghua Zhao:

A Unified Routing Framework for Resource-Constrained Mobile Ad Hoc Networks. 1358-1363 - Mengjie Xu

, Chuanwang Sun:
HLSFNet: Hybrid Long and Short-term collaboration based on Feature extraction for power generation forecasting in China. 1364-1369 - Tie Hua Zhou, Tian Yu Jin, Xi Wei Wang, Ling Wang, Keun Ho Ryu:

Mining Latent Topical Key Phrase from Content to Context in Unrestricted Healthcare Data. 1370-1375 - Shijie Peng

, Yanying Lin, Wenyan Chen, Yingfei Tang, Xu Duan, Kejiang Ye:
EINS: Edge-Cloud Deep Model Inference with Network-Efficiency Schedule in Serverless. 1376-1381 - Xiang Li, Congcong Chen, Minyu Teng, Yang Shi:

Blockchain-based Traceable Selective Disclosure Credentials for Self-Sovereign Identity. 1382-1387 - Li-e Wang, Hengtong Chang, Rongwen Wei, Xianxian Li, Zhigang Sun, Yongdong Li, Yi Wei, Linghui Meng:

Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential Recommendations. 1388-1393 - Pinyao He, Jingyue Huang, Ming Li:

Text Keyword Extraction Based on GPT. 1394-1398 - Bin Wen, Xiaofei Xing, Guojun Wang:

RTB-RM: A Blockchainenabled System for Reliable and Transparent CTI Sharing with Multidimensional Reputation Model. 1399-1404 - Xiaoqi Wang, Yifeng Zhao, Haoran Liu, Keyi Cheng, Bo Wang:

Dual-Objective Optimization for MmWave ISAC Systems via Collaborative Beamforming. 1405-1410 - Jin Wang, Liping Wang, Ruiqing Wang:

Multi-granularity Feature Fusion Detection for Encrypted Slow DDoS Attack in SDN. 1411-1416 - Marcos Antonio de Almeida

, Jano Moreira de Souza
, António Correia
, Daniel Schneider:
Exploring Personal Knowledge Ecologies: Dealing with Digital Platform Asymmetries. 1417-1423 - Xiaohao Liu, Hualin Zeng, Wenli Zhang, Long Yang:

Collaborative Denoising Shilling Attack for Recommendation Systems. 1424-1429 - Li Xu, Zejin Yang, Huiting Guo, Xu Wan, Chunlong Fan:

Local Black-box Adversarial Attack based on Random Segmentation Channel. 1437-1442 - Tie Hua Zhou, Ling Wang, Huai Lin Zhao, Fu Tao Ma, Lei Kou:

Dynamic Multi-Indicator Fusion Model for Real-Time Prediction Analysis. 1443-1448 - Li Zhang, Yong-Ai Zheng, Xue-Rui Lv:

Position Attention Mechanism-based Ensemble Network for Trend Prediction of Limit Order Book. 1449-1454 - Tianyou Chang, Shizhan Chen, Guodong Fan, Zhiyong Feng:

A Vision-language Model Based on Prompt Learner for Few-shot Medical Images Diagnosis. 1455-1460 - Xiaofeng Liu, Haibin Zhu, Dongning Liu:

Solving the Energy Supply Strategic Planning Problem by Extended Group Multirole Assignment. 1461-1466 - Hongze Guo, Haibin Zhu, Dongning Liu:

Avoiding Information Leakage in the Formation of Crowdsourcing Teams via Extended Group Multirole Assignment Considering Fairness. 1467-1472 - Houjin Chen, Lvqing Yang, Mulan Yang, Xuehan Hou, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:

Spatio-temporal feature fusion model based on Attention mechanism for RFID indoor positioning. 1473-1478 - Zhixiang Cheng, Haibin Zhu, Dongning Liu:

Solving the External Auditor Assignment Problem via GMRACCF. 1479-1484 - Xuewei Lin, Haibin Zhu, Dongning Liu:

Bus Driver Rostering via Extending Group Multirole Assignment. 1485-1490 - Rui Xia, Lisong Wang, Taili Li, Pingping Shi:

Low Light Enhancement in Street Scenes Based on Diffusion Model. 1491-1496 - Wanchang Jiang, Yuxin Jiang:

ST-T: A Spatio-Temporal Transformer for Φ-OTDR Multi-Location Time Series Classification. 1497-1502 - Yongkang Ding, Rui Mao, Hanyue Zhu, Liyan Zhang:

Improvement of the Clothes-Changing Person Re-identification with Multiple Loss Functions. 1503-1508 - Xinhao Liu, Hao Yang, Qiao Yan:

Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution Algorithm. 1509-1514 - Haimei Qin, Yaqi Jing, Yunqiang Duan, Lei Jiang:

Mafe: Multi-modal Alignment via Mutual Information Maximum Perspective in Multi-modal Fake News Detection. 1515-1521 - Minghui Hao, Xiaodong Yan, Xinpeng Ouyang:

A Tibetan Text Classification Method Based on Hybrid Model and Channel Attention Mechanism. 1522-1527 - Wenhan Hou, Bo Cui, Yongxin Chen, Ru Li, Wanshui Song:

Curriculum Learning for Ethereum Phishing Scam Detection. 1528-1533 - Zhizhuo Zhao, Xueping Peng

, Yong Li, Hao Wu, Weiyu Zhang
, Wenpeng Lu:
Thinking the Importance of Patient's Chief Complaint in TCM Syndrome Differentiation. 1534-1539 - Tengjin Weng

, Yang Shen, Zhidong Zhao, Zhiming Cheng, Shuai Wang:
Accurate Segmentation of Optic Disc and Cup from Multiple Pseudo-labels by Noise-aware Learning. 1540-1545 - Wenxuan Zhao, Wei Mi, Xiaodan Zhang:

The Security Paradox of Smart Contracts: Blind Spots and Prospects of Current Detection Strategies. 1546-1551 - Dennis Paulino, Joana Ferreira, António Correia

, José Ribeiro, André Netto
, João Barroso, Hugo Paredes:
Modelling Aspects of Cognitive Personalization in Microtask Design: Feasibility and Reproducibility Study with Neurodivergent People. 1552-1558 - Zhenyi Fan, Hongbin Zhang, Guangyu Lin, Lianglun Cheng, Zhuowei Wang, Chong Chen:

Hierarchical Multi-Frequency Transform for Sequential Recommendation. 1559-1564 - Yanzhi Zhang, Xiaoming Wu, Xiangzhi Liu, Huomin Dong:

Bidding Management Platform for Cloud-Chain Convergence. 1565-1571 - Yanan Zhang, Chaofan Wu, Rongkun Shi, Yiying Zhang:

A Simple Method to Improve the Performance of Small Pre-trained Language Models on Few-shot Tasks. 1572-1577 - Haitao Xiao, Dan Du, Junrong Liu, Song Liu, Yan Zhu, Yuling Liu, Zhigang Lu:

Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise. 1578-1584 - Haotian Wu, Xin Wang, Ruobing Wang, Ji Xiang, Liyue Ren:

Common Forgery Artifact Driven Deepfake Face Detection. 1585-1590 - Jinhang Chen, Rong Yan:

EMGCN: Enhancement Graph and Multi-head Attention Graph Convolutional Networks for Aspect-based Sentiment Analysis. 1591-1596 - Zeqing Yan, Guangxi Yu, Mengqi Zhan, Yan Zhang, Jiaxi Hu:

5GC-SDP: Security Enhancement of 5G Core Networks With Zero Trust. 1597-1602 - Kun Yan, Hao Hu, Gang Xu, Lijie Li, Yanhe Fu, Gaofeng Zhang:

Opportunistic Network Selfish Node Detection Algorithm Based on Credibility Combining Energy and Cache. 1603-1608 - Jialin Liu, Zeyu He, Peng Zhou

, Xinyan Su, Jun Li:
A Counterfactual Neural Causal Model for Interactive Recommendation. 1609-1614 - Jingyu Zhang, Yongtao Sun, Zhennan Zhang, Weifeng Ren, Lailong Luo:

A Reputation-Aware Randomization Consensus Algorithm for Performance Optimization in Blockchain Systems. 1615-1620 - Jingyu Zhang, Jiejun Ou, Di Lan, Bojian Ma, Lailong Luo:

InfinityRand: Blockchain Non-Interactive Randomness Beacon Protocol Based on Trapdoor Verifiable Delay Function. 1621-1626 - Xiaobin Zhang

, Liangjun Zang, Qianwen Liu, Shuchong Wei, Songlin Hu:
Triple-Based Data Augmentation for Event Temporal Extraction via Reinforcement Learning from Human Feedback. 1627-1632 - Yishuo Li

, Zhufeng Shao, Weimin Chen, Shoujin Wang
, Yuehan Du, Wenpeng Lu:
Significance-aware Medication Recommendation with Medication Representation Learning. 1633-1638 - Li Zhang, Yue-Feng Li, Yu Zhang:

SIDF: A Desensitization Framework for Sensitive Information in Chinese Medical Report Images. 1639-1644 - Lingfeng Yao, Anran Hou, Weina Niu, Qingjun Yuan

, Junpeng He, Yanfeng Zhang:
Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data. 1645-1650 - Yunpeng Gao, Tinglong Tang, Shuifa Sun, Yirong Wu, Peng Wang:

Digital Twin-Based Office Equipment Management and Personnel Detection System. 1651-1656 - Shiqiao Huang, Weiwen Zhang, Nankai Lin, Mianshen Xu:

GPF: Generative Prediction Fusion for Multi-Label Emotion Classification. 1657-1662 - Tinglong Tang, Yongjie Wu, Shuifa Sun, Yirong Wu:

Campus intelligent decision system based on digital twin. 1663-1668 - Jianli Ding, Yanan Yan, Jing Wang:

Multi-fusion algorithm root cause location model based on causal failure dependency graph. 1669-1674 - Wenjun Zhou, Yao Liu, Nan Wang, Yifan Wang, Bo Peng:

CoSiNet: Dual-Branch Collaborative Siamese Network for Visual Object Tracking. 1675-1680 - Bin Dai, Yuan Qiu, Weikun Feng:

Scalable Computation Offloading for Industrial IoTs via Distributed Deep Reinforcement Learning. 1681-1686 - Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang

, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. 1687-1694 - Jiabin Pei, Xiaoming Wu, Xiangzhi Liu:

YOLO-RDD: A road defect detection algorithm based on YOLO. 1695-1703 - Wanchang Jiang, Congcong Yan:

High-accuracy classification method of vibration sensing events in φ-OTDR system based on Vision Transformer. 1704-1709 - Qingzhi Zou, Jing Zhao, Ming Li, Ling Chen, Lin Yuan, Ronghuan Zhang, Yushuai Hu:

Medical Image Segmentation Use Convolutional Attention Augmentation TransUNet with Skip Connection Enhancement. 1710-1715 - Zimu Wang, Wei Wang

, Qi Chen, Qiufeng Wang, Anh Nguyen:
Generating Valid and Natural Adversarial Examples with Large Language Models. 1716-1721 - Lihao Wang, Junwei Zhou, Dongdong Zhao, Dongqing Liao, Mengjie Wang, Jianwen Xiang:

AEDD: Anomaly Edge Detection Defense for Visual Recognition in Autonomous Vehicle Systems. 1722-1727 - Yushuai Hu, Jing Zhao, Ming Li, Lin Yuan, Qingzhi Zou, Ronghuan Zhang:

Hybrid Deep Relation Matrix Bidirectional Approach for Relational Triple Extraction. 1728-1733 - Lingling Lv, Chunjiang Zhang, Weiming Shen:

A Deep Reinforcement Learning-based Rescheduling Method for Flexible Job Shops under Machine Breakdowns. 1734-1739 - Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng:

Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments. 1740-1745 - Junrong Du, Zimeng Fan, Lei Song, Xuanang Gui, Lili Guo, Xuzhi Li:

A fine-tuning framework for cross-domain RUL prediction based on relevant health indicators. 1746-1751 - Kun Yan, Hao Hu, Gang Xu, Yuqi Wang, Gaofeng Zhang, Lijie Li:

Selfish node filtering algorithm based on opportunity network. 1752-1757 - Shuwei Wang, Xiao Chen, Molan Long, Qiuyun Wang, Rongqi Jing, Zhengwei Jiang:

A Novel Detection System for Multi-Architecture IoT Malware. 1758-1763 - Shuo Yan, Jiaxi Wang, Ji Liang:

Big Data Storage and Analysis System for Space Application. 1764-1769 - Chen Ling, Bin Liu, Wei Xia, Shuangze He, Zhengwei Jiang, Qiuyun Wang:

Automated Anti-malware Detection Rules Converter Based on SIMIOC. 1770-1775 - Lei Wang, Qi Xu, Jingya Wen, Qiushi Zhang, Shiyuan Wang, Bin Li:

Distributed Trusted Authentication Method for Smart Grid Distribution Terminals. 1776-1781 - Chenyun Yu, Zihao Wang, Ye Zheng, Liankai Cai:

TinyCMR: A Lightweight Learning Framework for Efficient Cross-Modal Retrieval. 1782-1788 - Zuxu Pei, Tian Song, Chao Wu, Shuye Yue, Yan Li, Xiangtao Hu:

Cross-timestep Fault Prediction with Imbalanced Data for Optical Modules in Internet Data Centers. 1789-1794 - Haichao Fu, Liangjun Zang, Baojie Tian, Songlin Hu:

MT-MNA: Multiple Network Alignment with Absent Priori Annotation. 1794-1799 - Kun Liu, Linfeng Liu:

Cascaded Multi-level Features Fusion Network using Collaborative Training for Snow Removal. 1795-1800 - Bo Cui, Zhen Yang:

FAT: Tilted Federated Learning with Alternating Direction Method of Multipliers. 1801-1806 - Yunong Zhang

, Jiaming Zhou:
Uniform-Distribution (UD) Based Time Intervals of GRC (Global Reserve Currency) Transition Year Predicted Narrowly as [2024, 2040] and Generally [2k00, 2k50]. 1807-1813 - Chenyi Liang, Zhibin Gao, Bo Wang, Keyi Cheng, Yifeng Zhao:

QECLO: A Novel QoS-Aware Joint Optimization of Energy and Latency for VFC Task Offloading. 1814-1819 - Lishuo Ye, Zhixue He:

Time Series Anomaly Detection Methods Incorporating Wavelet Decomposition and Temporal Decoupled Autoencoder. 1820-1825 - Sibo Wei

, Xueping Peng
, Hongjiao Guan, Lina Geng, Ping Jian, Hao Wu, Wenpeng Lu:
Multi-view Contrastive Learning for Medical Question Summarization. 1826-1831 - Zhaohua Zheng, Yiming Hong, Keqiu Li, Qiquan Chen:

An Incentive Mechanism Based on AoU, Data Quality, and Data Quantity for Federated Learning. 1832-1837 - Wantong Du, Wanli Min, Yushui Geng, Hu Liang, Hehu Zhou:

Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic Algorithm. 1838-1844 - Caijie Guo, Yan Tang, Xiaobing Li, Peihao Ding:

Automated Test Case Generation Based on Path Structure Matrix and Mainfold-Inspired Search. 1845-1851 - Bo Cui, Guoqing Wang:

Ponzi Scheme Detection Based on CNN and BiGRU combined with Attention Mechanism. 1852-1857 - Jizhe Yu, Yu Liu, Hongkui Wei, Kaiping Xu:

Towards More Accurate Tiny Object Tracking: Benchmark and Algorithm. 1858-1863 - Hui Zhang, Zhonghua Miao, Quanke Pan:

A Learning-Based Discrete Jaya Algorithm for Multiobjective Sustainable Distributed Blocking Flow Shop Scheduling Problem with Heterogeneous Factories. 1864-1869 - Bo Zhu, Li Jia, Jianfang Li:

A Hybrid Estimation of Distribution Algorithm with Monarch Butterfly Optimization. 1870-1875 - Xiaosong Xue, Wei Pan, Fang Yan, Na Li:

End-to-end intelligent MCS selection algorithm. 1876-1880 - Yujie Zhang, Peng Li, Weibei Fan, Ruchuan Wang:

QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor Networks. 1881-1886 - Jinhui Yu, Caidan Zhao, Xiangyu Huang, Yicheng Zheng:

RF Fingerprint Recognition for Different Receiving Devices Using Transfer Learning. 1887-1892 - Tianhong Wang, Yue Teng, Chunjiang Zhang, Yiping Gao, Xinyu Li:

A Hybrid Genetic Algorithm for Flexible Job Shop Scheduling Problem with Batch Processing Machines. 1893-1898 - Xinpeng Lu, Heng Song, Huailing Ma, Xueqing Li, Junwu Zhu:

Research on Bandwidth-Oriented Distributed Task Allocation Mechanism for Multi-UAV. 1899-1904 - Haiyang Zhang, Zhiwei Huo, Caixia Liu, Yingyan Wu, Xiran Zhang:

A Lightweight Model for Detecting Dangerous Driving Behaviors in Road Transportation. 1905-1910 - Yitong Li, Tianyang Xiong, Shangwei Huang, Zida Han, Qingfeng Wu:

Collaborating Smartwatches and HMDs to Enhance User Perception for Touch Manipulation in XR. 1911-1916 - Anbin Xie, Fuqing Zhu, Jizhong Han

, Songlin Hu:
Integrating Open-domain Knowledge via Large Language Model for Multimodal Fake News Detection. 1917-1922 - Yong Wang, Wei Zhang, Daifeng Zhang, Yanqiang Li, Dongbing Zhang:

Research on key scene trajectory generation method based on BLA-VAE. 1923-1930 - Abdul Rasheed Mahesar, Xiaoping Li, Dileep Kumar Sajnani, Kamran Yaseen Rajput

:
Efficient Workflow Scheduling and Cost Optimization for Deadline-Constrained Microservice Applications in Mobile Edge Computing. 1931-1936 - Yiwen Li, Zhenyu Yang, Zhijun Li, Xiaoyang Li:

HGTA: News Recommendation Based on Hierarchical Granular Semantic Embeddings and Threshold Attention. 1937-1943 - Zhijun Li, Zhenyu Yang, Yiwen Li, Xiaoyang Li:

Opinion-Tree-guided Contrastive Learning for Aspect Sentiment Quadruple Prediction. 1944-1951 - Yiwen Li, Zhenyu Yang, Xiaoyang Li, Zhijun Li:

CAFI: News Recommendation with Candidate Perception of Fine-Grained Interaction Information. 1952-1959 - Xiaoyang Li, Zhenyu Yang, Yiwen Li, Zhijun Li:

Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in Conversation. 1960-1967 - Li Xu, Huiting Guo, Zejin Yang, Xu Wan, Chunlong Fan:

Improving Adversarial Robustness by Reconstructing Interclass Relationships. 1968-1973 - Zhen Gao, Liyou Wang, Jingning Xu, Hongfei Fan, Rongjie Yu:

Robust Hazardous Driving Scenario Detection for Supporting Autonomous Vehicles in Edge-Cloud Collaborative Environments. 1980-1985 - Yuchen Guo, Xi Wang, Xiaomeng Fu, Jin Liu, Zhaoxing Li, Yesheng Chai, Jizhong Han

:
Generative Transferable Universal Adversarial Perturbation for Combating Deepfakes. 1986-1991 - Jiajun Zhang, Geping Yang, Yiyang Yang, Juan Lu:

QFINCH: Quick hierarchical clustering using k-means and first neighbor relations. 1992-1997 - Yiqi Wu, Xuan Huang, Kelin Song, Fazhi He, Dejun Zhang:

3D Contour Generation based on Diffusion Probabilistic Models. 1998-2003 - Shizhao Tian

, Zhen Wang
, Kaiyu Xie, Fansong Chen, Hongsong Zhu:
Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT. 2004-2009 - Haotian Wu, Yu Chen, Xin Wang, Lin Wang, Ji Xiang, Liyue Ren:

DST-FRD: A Distillation Method of Swin Transformer for Facial Reenactment Detection. 2010-2015 - Zinuo Zhang, Ruoting Xiong, Xinyu Di, Wei Ren:

CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity. 2016-2021 - Mei Ni, Yin Sheng, Lipeng Chen, Mengmeng Zhang:

A Task Selection Approach for Multiple Unmanned Aerial Vehicles. 2022-2027 - Xuanyan Liu, Jinling He, Hu Song, Xinyun Cheng, Luyun Hu, Xiaolong Xu:

Anomaly detection and traceback scheme for cloud-edge networks. 2028-2033 - Yufei Gao, Zhe Chen, Lei Shi

, Qingxian Wang, Yameng Zhang:
MedMatch: Design of Semi-supervised learning Model with Curriculum Pseudo-Labels for Medical Image Classification. 2034-2039 - Chentong Zhao, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, Jiangang Ma:

EntityParser: A Log Analytics Parser for Identifying Entities from System Logs. 2040-2045 - Yufei Han, Haoyuan Chen, Linwei Yao, Kuan Li, Jianping Yin:

MAT-VIT: A Vision Transformer with MAE-Based Self-Supervised Auxiliary Task for Medical Image Classification. 2046-2052 - Yongxin Chen, Wenhan Hou, Xin Zhang, Ru Li:

Ethereum Phishing Scams Detection Based on Graph Contrastive Learning with Augmentations. 2053-2058 - Liutao Zhao

, Lin Zhong, Yujue Wang, Jiawan Zhang:
A Batch Payment Scheme with Denomination Privacy. 2059-2065 - Shukai Liu, Danyi Chen, Fei Teng, Changqing Yin, Huijuan Zhang:

Few-Shot Learning for Hyperspectral Imaging via Spectral-Spatial Feature Reconstruction. 2066-2071 - Qianqian Lu, Shilong Li, Kun Li, Wei Zhou, Liangjun Zang:

Adaptive Mixture of Domain-aware Experts for Detecting Social Bots. 2072-2077 - Kangkang Liu, Ningjiang Chen:

PTQ-SO: A Scale Optimization-based Approach for Post-training Quantization of Edge Computing. 2078-2083 - Jinquan Zhang, Xiaoping Li, Kamran Yaseen Rajput

, Long Chen:
Reinforcement Learning Based Memory Configuration for Linear Dynamic Function Chains. 2084-2089 - Huanqing Cui, Silin Lv:

TLGPA: Two-Level Graph Partitioning Algorithm under Multi-Machine Multi-Card System. 2090-2095 - Zhi Chen, Cuifeng Du, Yuyu Zhou, Haoxuan Guan, Xiujie Huang, Zhefu Li, Changjiang Liu, Xiaotian Zhuang, Xingyu Zhu, Quanlong Guan:

YTCNet: A Real-time Algorithm for Parcel Damage Detection with Rich Features and Attention. 2096-2101 - Yun Deng, Haihua Tang:

Blockchain-based Anonymous Authentication Key Management for Mobile Edge Computing. 2102-2109 - Hui Zhao, Xiaodong Zhang

, Jinshan Shi, Ru Li:
Data Lineage Construction Method for Multi-Chain-Based Data Assets Marketplaces. 2110-2115 - Zixuan Chen, Chao Zheng, Zhao Li, Jinqiao Shi, Zeyu Li:

Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion. 2116-2121 - Jiaqi Wang, Tao Sun, Wenjie Zhong, Ziyu Wang, Yefan Zhang:

Research on Java Automatic Simplified Modeling Based on Source Code Dependency Analysis. 2122-2127 - Lipan Chen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Huiyong Wang:

Blockchain-based UAV-assisted Forest Fire Detection and Monitoring System. 2128-2133 - Geng Zhang, Hong Lai:

QTN-MLP: Quantum Tensor Network-enhanced MLP for Medical Image Classification. 2134-2139 - Dongbing Zhang, Zihui Zhang, Yanqiang Li, Yong Wang, Wei Zhang, Yunhai Zhu:

An NSGA-II-based multi-objective trajectory planning method for autonomous driving. 2140-2146 - Menghua Jiang

, Yin Chen:
RASLite: Enhancing (W)PMS Solvers Through Dynamic Initial Weight Approach. 2147-2152 - Xuanli Liu, Mengjie Lv, Weibei Fan, Xueli Sun, Zhenjiang Dong, Fu Xiao:

Reliability of Half Hypercube Networks under Cluster Faults. 2153-2158 - Jingman Pei, Mengjie Lv, Weibei Fan, Xueli Sun, Xin He, Fu Xiao:

A protection routing with secure mechanism in the data center network WaveCube. 2159-2164 - Xiong Zhang, Cheng Xie:

Distill Graph Structure Knowledge from Masked Graph Autoencoders into MLP. 2165-2172 - Ningtao Ma, Ru Yi, Mingyang Sun, Liangyu Ruan:

Single Image Haze Removal Using Haze Color Prior. 2173-2178 - Jiawei Huang, Hanyu Deng, Zhaoyi Li

, Yijun Li, Jingling Liu, Xiaojun Zhu, Qichen Su
:
A Conditional Diffusion-based Data Augmentation for Anomaly Detection in AIOps. 2179-2184 - Jinqing Li, Qi Qi, Ni Li, Yibo Han:

Robust modeling of the multi-depot vehicle routing problem under uncertain demands. 2185-2190 - Lin Shi, Yushi Li, Yu Han, Jia Wang, Fangyu Wu, Chenke Yin, Haichao Zhang:

Two-branch Network with Feature Fusion for Time Since Deposition Estimation of Bloodstains. 2191-2196 - Ruisheng Wang, Weiwen Zhang:

Taming the Low-Quality Path for Reinforcement Learning-Based Knowledge Graph Reasoning. 2197-2202 - Yifei Zeng, Kai Zhao, Fangchao Yu, Bo Zeng, Zhi Pang, Lina Wang:

FedGR: Genetic Algorithm and Relay Strategy Based Federated Learning. 2203-2208 - Xiaoyong Tang, Xiangyu Yang, Wenzheng Liu, Tan Deng, Ronghui Cao, Zeyuan Tu, XingJiang Hu:

RFR-ABROF: A Multi-Strategy Collaborative Classification Prediction Model Based on Rotation Forest for PM2.5. 2209-2214 - Mingyang Sun, Ru Yi, Xinxin Wang, Ningtao Ma:

Enhancing Low-Light Images: A Novel Approach Combining Anisotropic Diffusion and Retinex. 2215-2220 - Yutian Shi, Beilun Wang:

A Privacy-Preserving Method for Sequential Recommendation in Vertical Federated Learning. 2221-2226 - Yun Deng, Haihua Tang:

A Privacy Protection Task Offloading Algorithm in MEC. 2227-2233 - Xinxin Wang, Ru Yi, Mingyang Sun, Zhaozheng Zhang:

Low-light Image Enhancement Algorithm Based on Improved Multi-scale Retinex with Adaptive Brightness Compensation. 2234-2239 - Liang Li, Yuanhui He, Feiyang Huang, Ziming Zhao, Zhuoxue Song, Tong Zhou, Zhenyuan Li, Fan Zhang:

An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events. 2240-2245 - Mengqi Du, Yue Zhang, Jianhua Zhang, Honghai Liu:

CRED: A Corneal Reflection and Environment Dataset. 2246-2251 - Yu Wan, Yue Jiang, Weiheng Zheng, Xiangwei Zhao:

Study of Biopharmaceutical Quality Supervision System Based on IoT and Big Data. 2252-2257 - Bing Liu, Weizheng Cheng, Shiqiang Hu, Lingkun Luo:

Application of Network Slicing in UAV Ground Communication Systems. 2258-2263 - Meng Lin, Qinghao Huang, Qianqian Lu, Xianjing Guo, Tao Guo:

Attribute-enhanced Selection of Proper Demonstrations for Harmful Meme Detection. 2264-2269 - Chunwen Liu, Hongchen Yu, Juxin Xiao, Feng Dai, Jie Yin:

STE-PFL: Spatial-Temporal Enhanced Personalized Federated Learning for IoT Cross-Domain Access Decision-Making. 2270-2275 - Huiting Li, Weiyu Zhang

, Yong Shang, Wenpeng Lu:
Collaborative Prediction of Drug-target Interaction using Sequence-based CNN and Transformer. 2276-2281 - Jehad Ibrahim, Yanli Li

, Huaming Chen, Dong Yuan:
Holistic Evaluation Metrics for Federated Learning. 2282-2287 - Lin Wei, Shihao Zhang, Yufei Gao, Lei Shi

, Huijuan Lian, Guozhen Cheng, Mengyang He:
Workflow task offloading mechanism based on A3C under computing network integration. 2288-2294 - Lin Wei, Jinyang Li, Yufei Gao, Lei Shi

, Huijuan Lian, Guozhen Cheng, Mengyang He:
Resource matching algorithm based on multidimensional computing resource measurement in computing power network. 2295-2300 - Zhuoqun Xia, Shiyu Wang, Jingjing Tan, Zhenzhen Hu:

Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy. 2301-2306 - Baoshou Li

, Yu He, Ge Yu:
TacWgan-gp: Fabric Texture-Based Tactile Friction Coefficient Generation. 2307-2312 - Huachuan Qiu, Shuai Zhang, Hongliang He, Anqi Li, Zhenzhong Lan:

Facilitating Pornographic Text Detection for Open-Domain Dialogue Systems via Knowledge Distillation of Large Language Models. 2313-2318 - Jian Song, Xiang Li

, Zhenqiang Zhang, Zhigang Zhao, Chunxiao Wang, Shunfang Wu, Suiping Qi, Jialiang Lv:
A Predictive Framework for Shipborne Wind Speed Measurement Correction Based on Self-Supervised Contrastive Learning. 2319-2324 - Hongyun Cai, Meiling Zhang, Shiyun Wang, Ao Zhao, Yu Zhang:

PLFa-FL: Personalized Local Differential Privacy for Fair Federated Learning. 2325-2332 - Peng Wu, Libo Feng, Junhong Liu, Zehui Yuan, Yaqi Zhou, Xian Deng, Zhixing Zhang, Jiale Xie, Fake Fang:

A Cross-Chain Privacy Protection and Key Sharing Scheme Based on Relay Chain. 2333-2338 - Chun Yang, Gang Shi, Yu Wen, Xinqiang Zhao:

ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models. 2339-2344 - Xian Deng, Junhong Liu, Peng Wu, Jiaying Zhang, Zehui Yuan, Fake Fang, Jiale Xie, Libo Feng:

A TDE-based Multi-node Data Categorized Transfer Storage Scheme in Consortium Blockchain. 2345-2350 - Junhong Liu, Libo Feng, Xian Deng, Xianchi Gao, Fake Fang, Zehui Yuan, Jiale Xie, Peng Wu, Zhixing Zhang:

CMSCEF: A Cross-chain Mechanism based on Smart Contract Execution Framework. 2351-2356 - Quanlong Guan, Jinneng He, Zhao-Rong Lai, Yuyu Zhou, Quming Jiang, Ziliang Chen:

Short-term Portfolio Optimization using Doubly Regularized Exponential Growth Rate. 2357-2362 - Yuqian Zhuang, Mingya Zhang, Yiyuan Yang, Liang Wang:

Analyzing Women's Contributions to Open-Source Software Projects based on Large Language Models. 2363-2368 - Hang Pu, Yongsheng Fan, Yunjia Han, Qian Su:

Enhancing Ensemble Attacks through Momentum Self-Maintenance. 2369-2374 - Shuai Ding, Yuepeng E, Jiye Zhang, Liangxiong Li, Lei Zhang, Jingguo Ge:

Trace Anomaly Detection for Microservice Systems via Graph-based Semi-supervised Learning. 2375-2380 - Yunkun Cheng, Xiankun Zhang, Fufeng Liu, Danyang Zhao, Xin Luo:

PromoterDiff: De Novo Design Approach for Escherichia coli Promoters Based on a Diffusion Model. 2381-2387 - Wangqing Wu, Jiale Gong:

Imporved on Qiu's shemes to resist long-term observation attacks with semantic attributes of location. 2388-2393 - Fake Fang, Libo Feng, Jiale Xie, Junhong Liu, Zehui Yuan, Xian Deng, Peng Wu, Peiyin Luo, Yifan Liu:

BCFL: A Trustworthy and Efficient Federated Learning Framework Based on Blockchain In IoT. 2394-2399 - Fengchun Zhang, Liheng Jiang

, Juan Chen:
ETPAM: An Efficient Task Pre-Assignment and Migration Algorithm in Heterogeneous Edge-Cloud Computing Environments. 2400-2405 - Zhuoqun Xia, Kai Lin, Jingjing Tan, Zhenzhen Hu:

Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems. 2406-2411 - Shaojie Ma, Cairui She, Gang Shi:

Implementing Fuzz-Based Technology for Detecting Spectre-Style Vulnerabilities. 2412-2417 - Tianyang Li, Hongbin Yan, Yuxin Jiang:

Attention Mixture based Multi-scale Transformer for Multi-behavior Sequential Recommendation. 2418-2423 - Rui Zhu, Yidan Yan, Jiayao Li, Ruizhi Sun:

A Multimodal Fusion Generation Network for High-quality MR Image Synthesis. 2424-2429 - Tianyang Li, Hongbin Yan, Hanwen Xu:

Decision Transformer based Target-aware Feature Selection Network for Behavior-oriented Recommendation. 2430-2435 - Tianyue Chen, Xiaojin Chen, Yongqiang Qian, Lang Zheng, Haiyang Li, Jingbo Zhao, Yaojun Wang:

AgriPrompt: A Method to Enhance ChatGPT for Agricultural Question Answering. 2436-2441 - Jiale Xie, Libo Feng, Fake Fang, Zehui Yuan, Xian Deng, Junhong Liu, Peng Wu, Zhuo Li:

A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOT. 2442-2447 - Li-e Wang, Rongwen Wei, Hengtong Chang, Xianxian Li, Zhigang Sun, Tianran Liu:

Multi-perspective Information and Multi-task Contrastive Learning for Sequential Recommendations. 2448-2453 - Changsong Yang

, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, Ruwen Zhao:
A new SM2-based ring signature scheme with revocability and anonymity. 2454-2459 - Yao Pan

, Weibei Fan, Mengjie Lv, Xin He, Fu Xiao:
Node-disjoint Paths Construction Algorithm in Data Center Network EHDC. 2460-2465 - Yefan Zhang, Tao Sun, Wenjie Zhong, Jiaqi Wang, Ziyu Wang:

A TCPN Automatically Modeling Method for Java Parallel Programs Oriented to Performance Analysis. 2466-2471 - Xiao Dong, Xiaojun Zheng, Yaning Song:

Knowledge Graph-based Optimization of Multi-AGV Cooperative Handling in Flexible Workshops. 2472-2477 - Kexian Tang, Shuyu Wang, Hao Yang, Huilin Lai, Jingyi Sun, Ye Luo:

Reliable Cosine Matching via Neighborhood Consensus for Fundus Image Registration. 2478-2483 - Tieming Chen

, Xiaoyang Tian, Yinglong Li
, Qingyan Jiang, Zechen Liu:
FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy Sets. 2484-2490 - Qianru Shen, Hailun Lin, Huan Liu, Zheng Lin, Weiping Wang

:
Watch and Read! A Visual Relation-Aware and Textual Evidence Enhanced Model for Multimodal Relation Extraction. 2491-2496 - Lingjie Pei, Li Pan, Shijun Liu:

An Improved Genetic Optimization Algorithm for Scheduling Serverless Application Jobs in Public Cloud Environments. 2497-2502 - Yiqing Liu, Li Pan, Shijun Liu:

Q-scheduler: Optimize Job Scheduling in Hadoop with Reinforcement Learning. 2503-2508 - Tie Hua Zhou, Wanlin Zhang, Wei Ding, Yuan Li, Ling Wang:

Deep Semantic Context Analysis Based on Adaptive Knowledge Graph Construction for Artificial Intelligence Domain. 2509-2514 - Chengbin Zheng, Zhicheng Yang, Yang Lu:

GMAE: Representation Learning on Graph via Masked Graph Autoencoders. 2515-2521 - Lingxiang Meng, Rongrong Xi, Ziang Li, Hongsong Zhu:

PG-AID: An Anomaly-based Intrusion Detection Method Using Provenance Graph. 2522-2527 - Xiaoyu Wang, Yu He, Meng Zhao:

Realistic Grasping Based on Soft Finger Force Interaction. 2528-2533 - Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang, Feng Liu:

CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction. 2534-2540 - Zhuo Wang, Hongtu Zhang, Jingdong Guo, Laile Xi, Sidy Tambadou, Fang Zuo, Hong Li, Yan Hu:

Precise and Efficient Third-party Java Libraries Identification Tool for Collaborative Software. 2541-2546 - Yuanshun Huang, Guihua Duan:

A Privacy-Preserving Decision Tree Evaluation Scheme for Multiple Wearable Devices. 2547-2552 - Baojie Tian, Liangjun Zang, Jizhong Han

, Songlin Hu:
Capture Long-Range Dependency with Meta-Path Transformer for De-Anonymization of Q&A Sites. 2553-2558 - Ye Liu, Yan Pan, Jian Yin:

Deep Hashing with Triplet Loss of Hash Centers and Dissimilar Pairs for Image Retrieval. 2559-2564 - Yuechen Zhang, Aimin Li, Xiaotong Kong, Wenqiang Li, Zhiyao Li:

FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5. 2565-2570 - Shiyue Huang, Yuchen Su, Hongbo Liu, Huan Dai, Bo Liu:

Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on Wearables. 2571-2576 - Jifei Wen, Jingguo Ge, Zheyuan Zhang, Hui Li, Yuepeng E, Bingzhen Wu:

A time-sensitive cloud-native network based on eBPF. 2577-2582 - Felipe Ortúzar, Pedro O. Rossel

, Francisco J. Gutierrez:
A Reference Architecture to Support the Collaborative Development of Virtual Reality Exposure Therapy Software. 2583-2588 - Haonan Yang

, Shengsheng Yan, Bolei Chen, Ping Zhong, Yongzheng Cui, Yu Sheng:
Robot Autonomous Exploration System Base on Arm-Chassis Collaboration. 2589-2594 - Yufei Gao, Shuxi Li, Jing Xu, Zixing Ma, Mengyang He, Yameng Zhang:

MLPSeg: Incorporating Multi-Local Perception with Context Cross Attention Based Transformer for Nuclei Segmentation. 2595-2600 - Enze Zhao, Peng Li, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao

, Qin Liu
, Kai Zhang:
Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection. 2601-2606 - Jinli Zhang, Xutong Wang, Ningjun Zheng, Kezhen Huang, Yun Feng, Xiang Cui:

XShellGNN: Cross-file Web Shell Detection Based on Graph Neural Network. 2607-2613 - Xuwen Shang, Jue Zhang, Xingguo Jiang, Hong Luo:

Anomaly Detection for Multivariate Time Series Based on Contrastive Learning and Autoformer. 2614-2619 - Xin Qin, Pengshuai Yao, Mengna Liu, Xu Cheng, Fan Shi, Lili Guo:

Robust Classification of Incomplete Time Series with Noisy Labels. 2620-2625 - Cheng Li, Jiaqi Wu, Feng Yuan, Yuqing Sun:

Promoting Named Entity Recognition with External Discriminator. 2626-2631 - Zhixiong Liu, Fang Liu, Mohan Zhang

:
Intelligent Graphic Layout Generation: Current Status and Future Perspectives. 2632-2637 - Bingzheng Huang, Chengxin Ni, Junjie Song, Yifan Yin, Ningjiang Chen:

Collaborative Multi-Teacher Distillation for Multi-Task Fault Detection in Power Distribution Grid. 2638-2643 - Chuang Li, Dongdong Huo, Sixiang Wang, Yaoyi Deng, Qihui Zhou, Yu Wang:

A deep learning based detection scheme towards DDos Attack in permissioned blockchains. 2644-2649 - Xiang Wang, Yuanyu Wang, Yu Dai, Chi Wei, Yuliang Tang:

UDTL: Anomaly Detection Based on Unsupervised Deep Transfer Learning. 2650-2655 - Yang Xu, Kun Zhang, Hao Jun Xia, Bibo Tu, Chen Li:

CloudFusion: Multi-Source Intrusion Detection in Cloud Environments. 2656-2661 - Ming Jiang, Shuo Zhang, Feng Zhang, Biao Guo, Yun Li:

A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis. 2662-2667 - Xuanhui Liu, Yifeng Zhao, Xiaoqi Wang, Bo Wang, Keyi Cheng:

Intelligent Convergence: Advancing 6G mmWave Networks with RIS-Enhanced ISAC for IoT Applications. 2668-2673 - Guangshun Li, Xueli Gao, Junhua Wu:

Blockchain-Based Device Reputation Assessment in the Industrial Internet of Things. 2674-2679 - Yang Xu, Chen Li, Kun Zhang, Haojun Xia, Bibo Tu:

EI-XIDS: An explainable intrusion detection system based on integration framework. 2680-2685 - Zhihong Wei, Jianshu Qin, Bangmao Li:

Fine-Grained Skeleton-Based Human Action Recognition for Figure Skating. 2686-2691 - Liutao Zhao

, Haoran Xie
, Lin Zhong, Yujue Wang:
Multi-Server Verifiable Aggregation for Federated Learning in Securing Industrial IoT. 2692-2697 - Yi Yu, Dongsheng Zou

, Xinyi Song, Yuming Yang, Kang Xi:
MRC-FEE: Machine Reading Comprehension for Chinese Financial Event Extraction. 2698-2703 - Xuechen Chen, Jiaxuan Yi, Aixiang Wang, Xiaoheng Deng:

Wi-Fi fingerprint based indoor localization using few shot regression. 2704-2709 - Zixuan Wang, Ke Ma, Hongwei Wang:

Noise-Robust Neural Network For Wind Turbine Gearbox Fault Diagnosis. 2710-2715 - Zhengyu Hou, Ning Li, Wuyungerile Li, Ruihong Wang, Fei Gao, Bing Jia:

Research on the data stacking problem of energy-based packet prioritization in EH-WSN. 2716-2721 - Gongzhuang Peng, Ningyi Wang, Xuejun Zhang, Dong Xu:

Multimodal Knowledge Graph-Enabled Steel Product Development. 2722-2727 - Yang Liu, Xiaohui Han, Wenbo Zuo, Haiqing Lv, Jing Guo:

CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence. 2728-2733 - Dexu Yao, Aimin Li, Deqi Liu, Mengfan Cheng:

DM-YOLOv5: An Improved Safety Helmet Detection Algorithm at Complex Construction Scenes. 2734-2739 - Chaofeng Yang, Zhiheng Zhao, Hankiz Yilahun, Askar Hamdulla:

Source Free Domain Adaptation via Adapting to the Enhanced Style. 2740-2745 - Zhijun Cheng, Zhuoting Wu, Zhuopan Yang

, Zhenguo Yang, Xiaoping Li, Wenyin Liu:
Reinforced Perturbation Generation for Adversarial Text-based CAPTCHA. 2746-2751 - Kamran Yaseen Rajput

, Xiaoping Li, Abdullah Lakhan, Jinquan Zhang, Abdul Rasheed Mahesar, Dileep Kumar Sajnani:
Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance Uncertainty. 2752-2757 - Shaohui Jin, Yayong Zhao, Hao Liu

, Jiaqi Wu, Zhenjie Yu, Mingliang Xu:
Non-Line-of-Sight Long-Wave Infrared Imaging based on Nestformer. 2758-2763 - You Chen, Hua Dai, Mingfeng Jiang, Qu Lu, Pengyue Li, Bohan Li, Geng Yang:

KCPMA: k-degree Contact Pattern Mining Algorithms for Moving Objects. 2764-2769 - Yuhan Liao, Fang Liu

, Lin Lin, Mingbo Hou, Yingying She, Hang Wu, Bin Hu, Qingqiang Wu:
iCCBT, an Interactive Approach of CBT for Online Psychological Intervention. 2770-2775 - Junwei Tang, Sijie Zhou

, Ping Zhu, Tao Peng, Ruhan He, Xinrong Hu, Changzheng Liu:
AT-I-FGSM: A novel adversarial CAPTCHA generation method based on gradient adaptive truncation. 2776-2781 - Qiumin Yang, Chaokun Zhang, Tao Tang

, Jingshun Du:
Dual-Agent Based Collaborative Audio-Video Adaptive Bitrate Strategy under Commuting. 2782-2787 - Yitan Huang, Jian Qin, Zelin Cui, Ning Li, Bo Jiang, Zhigang Lu:

HBGraph: a Host Behavior Graph Model for C&C Traffic Detection. 2788-2793 - Jie Yan, Meng Zhao, Yong Ding, Hai Liang, Changsong Yang

, Yujue Wang:
Verifiable and Privacy-Preserving Online Diagnosis Based on Multiclass SVM and CKKS Leveled Homomorphic Encryption. 2794-2799 - Ziyu Wang, Tao Sun, Wenjie Zhong, Yefan Zhang, Jiaqi Wang:

Simplification Method of CPN Model Based on Data Abstraction. 2800-2805 - Haojun Xia, Hongwei Liu, Da Zhang, Haohao Liu, Xiaotong Wang, Bibo Tu:

Continuous Authentication Technology Based on Device Driver Behavior. 2806-2811 - Wang Chen, Xiaocong Wang, Chengjia Yu, Yukun Liang:

The Fuzzy Analytic Hierarchy Process for Evaluating the Effectiveness of Manned and Unmanned Collaborative Combat. 2812-2815 - Donghao Wang, Tengjiang Wang, Hao Qi, Shijun Liu, Li Pan:

Research on Multi-Model Fusion for Multi-Indicator Collaborative Anomaly Prediction in IoT Devices. 2816-2821 - Weiliang Zeng, Yushi Li, Rong Chen, Rong Xiang, Yunzhe Wang, Jinghang Gu

:
MGE-Net: Task-oriented Point Cloud Sampling based on Multi-scale Geometry Estimation. 2822-2827 - Wenxuan Lu, Zhuohang Lv, Lanqi Yang

, Xiang Luo, Tianning Zang:
Efficiently Adapting Traffic Pre-trained Models for Encrypted Traffic Classification. 2828-2833 - Haizhou Du, Ming Li:

FlowSeer: A Novel Framework for Generalized Network Performance Estimation at Flow Level. 2834-2839 - Danyi Chen, Weinian Cao, Shengxiang Rao, Lijun Luo:

Eight-neighborhood sparse contour extraction in binary images. 2840-2845 - Wei Zheng

, Yuqing Sun, Yexin Zhang, Bin Gong:
Integrating User Rules into Neural Text Inference. 2846-2851 - Zhenchao Chen, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu, Qingkai Wang:

RFID-Based Indoor Human Behavior Recognition Using SATCN: A Self-Attention Enhanced Temporal Convolutional Network. 2852-2857 - Qian Yang, Jiankai Wang, Kai Chen, Hongjia Li, Haihua Gao, Zhen Xu:

A Secure Blockchain-based Reputation Scheme for Data Offloading in Edge Computing. 2858-2863 - Qu Wang

, Hao Wu:
Dynamically Weighted Directed Network Link Prediction Using Tensor Ring Decomposition. 2864-2869 - Kai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu:

What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention. 2870-2875 - Muhammad Asim Ejaz, Guowei Wu, Abid Sultan

, Tahir Iqbal
:
Deep Reinforcement Learning Approach for Enhancing Profitability in Mobile Edge Computing. 2876-2881 - Jinxiao Yang, Xingang Wang, Qingao Wang:

TSFE: Research on Transformer and Feature Enhancement Methods for Image-Text Retrieval. 2882-2887 - Shuting Yang, Keyu Chen, Wei Feng, En Cheng:

A Fair and Energy Efficient Cooperative Routing Protocol Based on Link Quality for Underwater Acoustic Sensor Network. 2888-2893 - Shuang Liang, Haojun Xia, Chen Li, Bibo Tu:

Desktop Virtualization Optimization Methods Based on IDV Architecture. 2894-2899 - Yi Liu

, Steven Goh, Tobias Low, Zach Quince
, Shoryu Teragawa:
A Lightweight Deep Learning Model for EEG Classification Across Visual Stimuli. 2900-2905 - Xiaowei Liu, Wenhui Chen, Mengmeng Sun, Yali Si, Zhen Chen

:
A Practical Cloud API Complementary Recommendation Service for Mashup Creation. 2906-2911 - Qingmeng Zhu, Tianxing Lan, Xiaoguang Xue, Zhipeng Yu, Hao He:

TraitsPrompt: Does Personality Traits Influence the Performance of a Large Language Model? 2912-2917 - Jiaxi Liu

, Kezhen Huang, Yun Feng, Canhua Chen, Jinli Zhang, Yuqi Shu, Xing Tian, Qixu Liu:
MemAPIDet: A Novel Memory-resident Malware Detection Framework Combining API Sequence and Memory Features. 2918-2924 - Wei Ding, Luyao Wang, Wei Zhang, Myung Jin Lee, Ling Wang, Kwang Woo Nam:

Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos. 2925-2930 - Yu Wu, Niansheng Chen, Lei Rao, Guangyu Fan, Dingyu Yang, Songlin Cheng, Xiaoyong Song, Yiping Ma:

SemGO: Goal-Oriented Semantic Policy Based on MHSA for Object Goal Navigation. 2931-2936 - Xin Zhang, Xueping Peng

, Weimin Chen, Weiyu Zhang, Xiaoqiang Ren, Wenpeng Lu:
Multi-Channel Hypergraph Network for Sequential Diagnosis Prediction in Healthcare. 2937-2942 - Youliang Huang, Jue Zhang, Xiaolin Chai, Yan Sun:

TopoRCA: A Lightweight Root Cause Analysis System Based on Application Topology. 2943-2948 - Yi Zhang, Fazhi He, Rubin Fan

, Bo Fan:
View2CAD: Parsing Multi-view into CAD Command Sequences. 2949-2954 - Aoling Zeng, Hao Wu:

A Fast and Inherently Nonnegative Latent Factorization of Tensors Model for Dynamic Directed Network Representation. 2955-2960 - Qiushi Zhang, Lang Ao, Junfeng Liu, Yang Xi, Dandan Chen:

Alzheimer's Disease Risk Genes Mining Based on a Supervised Machine Learning Method and PPI Network Construction. 2961-2966 - Boyu Ding, Xiaofeng Xu, Xianglin Bao, Nan Yan, Ruiheng Zhang

:
ALMA: Adjustable Location and Multi-Angle Attention for Fine-Grained Visual Classification. 2967-2972 - Weike Zhou, Xiaokang Zhou, Jing He, Yamei Nie, Qiqi Chen, Guosheng Kang:

Online Course Recommendation by Exploring User Interaction and Course Description. 2973-2978 - Huachuan Qiu, Anqi Li, Lizhi Ma, Zhenzhong Lan:

PsyChat: A Client-Centric Dialogue System for Mental Health Support. 2979-2984 - Haokai Gao, Xiangru Li, Ruizheng Shi:

A Novel Two-Stage Stacking Model for Breast Cancer Survival Prediction. 2985-2990 - Wenyue Li, Sapae Phyu, Qin Liu, Bowen Du, Junyan Zhang, Hongming Zhu:

RSTIE-KGC: A Relation Sensitive Textual Information Enhanced Knowledge Graph Completion Model. 2991-2998 - Jun Li, Shuqin Zhang, Hongsong Zhu, Yu Chen, Jizhao Liu:

An Efficient Vehicular Intrusion Detection Method Based on Edge Intelligence. 2999-3004 - Fu Jiang, Jie Chen, Jieqi Rong, Zini Wang, Yingze Yang, Heng Li:

Dynamic Energy Management for IoT-enabled Smart Microgrid using Deep Reinforcement Learning. 3005-3010 - Jiaji Ma, Xiangge Li, Hong Luo, Yan Sun:

NetKD: Towards Resource-Efficient Encrypted Traffic Classification Using Knowledge Distillation for Language Models. 3011-3016 - Peng Zhang, Meijuan Li, Hui Zhao, Yida Chen, Fuqiang Wang, Ye Li, Wei Zhao:

Lightweight Fusion Model with Time-Frequency Features for Speech Emotion Recognition. 3017-3022 - Xiaorong Ma, Jiahe Tian, Zhaoxing Li, Yesheng Chai, Liangjun Zang, Jizhong Han

:
Explainable Deepfake Detection with Human Prompts. 3023-3029 - Hua Ma, Peiji Huang, Xi Luo, Qiong Huang, Xiangru Fu, Wensheng Tang:

Teaching Early Warning Approach for Teachers based on Cognitive Diagnosis and Long Short-term Memory. 3030-3035 - Jun Peng, Haowen Tang, Chenglong Wang, Xin Gu, Hui Peng:

Intelligent Vehicles Lane-changing Intention Identification Method with Driving Style Recognition. 3036-3041 - Ruizheng Shi, Xiangru Li, Haokai Gao:

A novel deep learning model CSAM-ResNet based on attention mechanism and residual learning for breast histopathology image classification. 3042-3047 - Hua Ma, Chao Xiong, Xiangru Fu, Zhixiang Huang, Yuqi Tang, Hongyu Zhang:

National Image Resources Recommendation for Targeted International Communication via E-CARGO Model. 3048-3053 - Weize Wang, Yi Kuang:

CipherFormer: Efficient Transformer Private Inference with Low Round Complexity. 3054-3059 - Xiaoyong Zhang, Zhongke Zhang, Wanwan Ren, Rui Zhang, Heng Li:

Extended Cell Similarity-based Cyber Attack Detection Method for DC Microgrids under Variable Load. 3060-3065 - Xin Chang, Wenhui Kong, Xingjun Wang:

Preserving Privacy in Collaborative Systems with Secure Multi-Party Summation. 3066-3071 - Chen Shen, Yulin Liu, Hua Li:

A Relationship Extraction Framework Based on Reinforcement Learning and Machine Reading Comprehension. 3072-3077 - Qingyu Xu, Jiguo Yu, Anming Dong, Zihao Shang:

An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information Supplementation. 3078-3085 - Hanwen Zhang, Qingyi Si, Peng Fu, Zheng Lin, Weiping Wang

:
Are Large Language Models Table-based Fact-Checkers? 3086-3091 - Jialu Cui, Junxing Zhang:

D-PIFO: A Dynamic Priority Scheduling Algorithm for Performance-Critical Packets Based on the Programmable Data Plane. 3092-3097 - Haifeng Zhao, Quanshuang He, Deyin Liu:

Towards Efficient Sparse Transformer based Medical Image Registration. 3098-3103 - Ngoc Luyên Lê, Marie-Hélène Abel, Philippe Gouspillou:

Exploring Weighted Property Approaches for RDF Graph Similarity Measure. 3104-3109 - Dongyang Zhang, Jianhuan Zhuo, Yile Li, Yinliang Yue, Weiping Wang:

R2Mine: A Reduced Redundancy Computation Graph Pattern Matching System. 3110-3115 - Wenlong Ni, Wenshuang Yan:

Optimal Control Policy Based on Game Theory in Wireless Sensor Networks. 3116-3121 - Wenlong Ni, Zhixiang Mei:

An Optimal Admission Control Policy for Cloud Computing Services with Tandem Queues Based on Game Theory. 3122-3127 - Wenlong Ni, Yufeng Zhang:

Threshold Detection of Cloud Computing System with Impatient Users Based on Game Theory. 3128-3133 - Pengsheng Li, Qingfeng Du, Shengjie Zhao

, Pei Fang:
Advancing Root Cause Analysis in Cloud-native System with Knowledge Graph Path Embedding Translation. 3134-3139 - Guohua Lv, Xiyan Wang, Zhonghe Wei, Jinyong Cheng, Guangxiao Ma, Hanju Bao:

IDFusion: An Infrared and Visible Image Fusion Network for Illuminating Darkness. 3140-3145 - Angxiao Zhao, Wenying Feng, Ning Hu, Dawei Zhao, Zhaoquan Gu:

Knowledge Embedding Enabled Cyber Security Defense for Networked System: A Novel Risk Detection Method based on Knowledge Graph. 3146-3151 - Wenjin Ji, Xianling Mao, Jinyu Liu, Rongcheng Tu, Heyan Huang:

Data-Focus Proxy Hashing. 3152-3157 - Kehong Liu, Qi Wang, Junnan Yin, Letian Du, Tianning Zang:

Revisiting Open DNS Resolver Vulnerabilities to Reflection-Based DDoS Threats. 3158-3163 - Jun Peng, Wei Yuan, Yongjie Liu, Zheng Liu, Heng Li:

Sparse Representation GRU-AutoEncoder for Battery Fault Detection of Electric Vehicles. 3164-3169 - Ziyin Gu, Qingmeng Zhu, Hao He, Zhipeng Yu, Tianxing Lan, Shuo Yuan:

Multi-Level Knowledge-Enhanced Prompting for Empathetic Dialogue Generation. 3170-3175 - Tong Zhang, Weiping Pan, Hao Li:

Collaborative Training for Compensation of Inference Errors in NOR Flash Computing in memory Chips. 3176-3181 - Ziyin Gu, Qingmeng Zhu, Hao He, Tianxing Lan, Zhipeng Yu:

Analysis of Emotional Cognitive Capacity of Artificial Intelligence. 3182-3187 - Lin Li, Yunqi Mai, Yu Chu, Xiaohui Tao, Jianming Yong:

An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors. 3188-3193 - Dejun Hou, Zefeng Zhang, Mankun Zhao, Wenbin Zhang, Yue Zhao, Jian Yu:

Sentence-level Distant Supervision Relation Extraction based on Dynamic Soft Labels. 3194-3199 - Aoxue Li, Xinhua Zeng

, Yunlong Du, Chengxin Pang:
XRNeRF: View-guided Neural Radiance Fields for Occlusion Removal. 3200-3205 - Shoryu Teragawa, Lei Wang, Yi Liu

:
Non-Codeing RNAs Family Prediction Based on RNA Representation and Deep Learning. 3206-3211 - Ruixuan Zhao, Chuyi Chen, Ruoyu Li, Shenghang Liu, Jie Liu, Hongan Wang:

Neural ODE-Guided Imputation Computing for Building IoT Time Series with High Missing Gaps. 3212-3217 - Jianrong Wang, Yi Tang, Dejun Hou, Jinchi Wang, Zechen Meng, Tianyi Xu:

Structure-Augment based Long-Tailed Knowledge Graph Completion Model. 3218-3223 - Zhenyu Hu, Jingya Zhou, Congcong Zhang, Yingdan Shi:

Explainable Cross-Domain Collaborator Recommendation. 3224-3229 - Ruiting Zhou, Ziyi Han, Yifan Zeng, Zhi Zhou, Libing Wu, Wei Wang:

SAFE: Intelligent Online Scheduling for Collaborative DNN Inference in Vehicular Network. 3230-3236 - Ciyuan Chen

, Junzhou Luo, Dian Shen, Zhuqing Xu, Runqun Xiong:
Achieving Low Queueing Latency in Time-Slotted LoRa Networks. 3237-3242 - Jiameng Li

, Xiaojie Wang, Jun Wu, Zhaolong Ning:
Intelligent Scheduling of UAVs and Sensors for Information Age Minimization at Wireless Powered Internet of Things. 3243-3248 - Ding Ding, Pascal Remeijsen, Zian Song, Mark A. Neerincx, Willem-Paul Brinkman

:
Technology-supported social skills training systems: A systematic literature review. 3249-3256 - Zheyi Sha, Chunfeng Liu, Xiaobo Zhou, Chen Chen, Fengbiao Zan, Tie Qiu:

An Entropy-based Field Segmentation Method for Unknown Protocols in Industrial IoT. 3257-3262 - Boyu Zhu, Yuan Zhang, Tingting Chen, Sheng Zhong:

Differentially Private K-Means Publishing with Distributed Dimensions. 3263-3268 - Jin Su, Chunming Li, Yuanqing Xia:

Analysis and Evaluation of Manned/Unmanned Collaborative Emergency Rescue Equipment System. 3275-3281 - Wenqin Li, Xinrong Zheng, Ruihong Huang, Mingwei Lin, Jun Shen

, Jiayin Lin:
Enhancing Privacy Protection for Online Learning Resource Recommendation with Machine Unlearning. 3282-3287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














