default search action
GAIIS 2024: Kuala Lumpur, Malaysia
- 2024 International Conference on Generative Artificial Intelligence and Information Security, GAIIS 2024, Kuala Lumpur, Malaysia, May 10-12, 2024. ACM 2024
Chapter 1-Intelligent Models and Computer Language Application
- Jiayao Yang, Xuan Liu:
Research on Index Trend Prediction Based on Correlation of A-share Industry Sectors. - Yue Ma, Yunhuan Jia, Jichang Zhao:
A model of risk contagion for mutual funds considering fund redemptions and asset fire sales. - Xuekai Wang, Zhuocheng Yang, Hengbo Zhang, Yiming Li, Xinke Wang, Wei Cui:
Research on Traffic Congestion Active Control Technology for Expressway. - Shen Wang, Fei Cai, Mengxi Zhang:
Multilingual Event Causality Identification via Meta-learning with Knowledge. - Lianqiang Niu, Han Bao:
Fast Tactile Paving Segmentation Model Based on Reparameterized Structure. - Bo Jin:
Multilingual Neural Machine Translation with Integrated Language Adapters. - Yongju Tong, Jiawen Kang, Junlong Chen, Minrui Xu, Helin Yang, Minghui Xu, Renchao Xie, Zehui Xiong:
Deep Reinforcement Learning based Multi-attribute Auction Model for Resource Allocation in Vehicular AIGC Services. - Junying Wu, Yanyan Lu, Zixin Li, Jiao Peng, Xing Xu, Hui Song:
Word-Phrase Fusion Encoding Model for Natural Language Understanding in the Electric Power Field. - Jiale Qin, Qiufang Zou, Haoran Zhang, Yongzhi Zhang, Shi Wang:
Research on sentiment analysis of Bi-LSTM model combining cosine annealing and multi-head attention. - Mingjuan Li, Huimei Chen, Bingda Yan, Qingzhen Xu, Qiang Chen:
Research on Stock Volatility Prediction Using Attention Mechanism Enhanced GRU Ensemble Model. - Chenhe Wang:
NLG-ExtractClip: Natural Language Guided Building Extraction with Contrastive Language-Image Pre-training. - Xiao Du, Jing Zhou, Xu Gao:
Numerical Simulation of Receiving Transducer for Impulse Sound Source Depth Detection. - Limin Cao, Yuxia Hu, Fudong Nian:
Semi-supervised Crowd Counting in Dense Scenes via Self-training. - Han Wei, Dan Qu, Sisi Peng, Gang Chen, Liang Wei, Zhigang Guo:
Research on constructing technology of network public opinion propagation model based on Multiagent. - Jiangnan Li, Shuo Zhang, Jian Song, Manpo Li, Li Sun, Jiantao Wu:
Product Requirements Reliability Analysis Based on Review Data and Entropy Weight TOPSIS. - Yingqiang Wang, Elcid A. Serrano:
Research on personalized music recommendation model based on human physiological signals. - Huilin Fang, Zhiguo Zhou:
Research on acoustic Model of Putian Dialect Speech Recognition Based on Deep Learning.
Chapter 2-Intelligent Algorithms and Deep Learning Exploration
- Ningnan Guo:
Analyzing the Application and Key Factors of CycleGAN in Style Transfer between Chinese Ink Paintings and Van Gogh's Artworks. - Bo Jin:
Neural Machine Translation based on Semantic Word Replacement. - Lianyuan Jiang, Jinlong Chen:
A Meta Learning Few Shot Object Detection Algorithm Based on PRN-FPN. - Qianlong Lu, Maoting Gao:
A Research on Shilling Attacks Based on Variational graph auto-encoders for Improving the Robustness of Recommendation Systems. - Junbo Wang, Mei Li, Chengfeng Liu, Jianrui Chen:
Cluster information-driven graph convolutional networks for higher-order patterns prediction. - Chen Liu, Yizhuo Wang:
MDPo: Offline Reinforcement Learning Based on Mixture Density Policy Network. - Pengchun Tang, Zepei Wang, Siqi Wang, Gareth Zhu, Jiaxin Wang, Yuanhua Lang, Wenjuan Shao, Weiming Huang, Shuang Yan:
Research on Keyword Audio Mapping Library Based on Subjective Evaluation. - Zongnan Zhang, Meng Li, Xiaoxin An, Zhen Li, Zhe Ma:
Side-Channel Analysis of Curve-25519 Based on Deep Learning. - Zhihao Wang, Xiaoyue Guo, Hanzi Li, Yuting Xu, Meng Qin, Jianbo Liu, Haoliang Zhu, Tianjie Chen:
Optimizing E-commerce Logistics with ARIMA-BP Neural Networks and GA: A Multi-Objective Approach for Emergency Response and Network Efficiency. - Zhaopeng Yang, Huan Hao, Shangsong Liang:
ACTOR: Adapting CLIP for Fully Transformer-based Open-vocabulary Detection. - Qiang Fang:
On The Performance of EMA-Synchronized Speech and Stand-alone Speech in Speech Recognition and Acoustic-to-Articulatory Inversion. - Shutao Xiong, Jixing Qu, Wang Xue, Yanjun Li:
Deep learning based defect classification method for pressure gas cylinders. - Wei Wang, Wenbin Lin, Hang Lv:
Applying DMC of Segmentation Strategy of Reward in Military Chess Game. - Liuqing Yan, Shihu Yu:
Study on English expression polishing system based on deep learning. - Mengzhen Yuan, Lili Lu:
Multimodal transportation path optimization of consumer electronics products considering transportation time uncertainty. - Wenbo Li:
Multi-objective optimization of the route problem for hazardous goods transportation. - Tianyi Chen:
The Impact of AI-Pair Programmers on Code Quality and Developer Satisfaction: Evidence from TiMi studio.
Chapter 3-Network Security and Intelligent Analysis Technology
- Wenzhao Liu, Kuiwu Yang, Yue Chen, Huanyao Dai:
Exploring Robustness under New Adversarial Threats: A Comprehensive Analysis of Deep Neural Network Defenses. - Lang Yang:
A meta-learning based method for detecting malicious traffic with few-shot. - Haiyang Liu, Yuan Feng:
A log parsing method based on word attributes and parsing trees. - Bao Liu, Zhenxin Cai:
Based on channel and time attention convolutional network for motor imagery electroencephalogram decoding. - Runlian Zhang, Minghui Hou, Wentao Cheng, Xiaonian Wu:
Side Channel Attacks Based on Densely Connected Convolutional Networks with Attention Mechanism. - Jian Zhang, Shengquan Liu, Zhihua Liu:
Research on APT Malware Detection Based on BERT-Transformer-TextCNN Modeling. - Yifan Zheng, Bai Liu:
A secure multi-quantum voting protocol based on GHZ state. - Yuying Xia, Haijian Shao, Xing Deng:
VulCoBERT: A CodeBERT-Based System for Source Code Vulnerability Detection. - Zhipeng Sun, Guosun Zeng:
A Two-stage Coarsening Method for a Streaming Graph with Preserving Key Features. - Jiale Tang:
Dual-Decoder Importance-Aware Gated Network for RGB-T Salient Objection Detection. - Zhengle Li, Ying Pan, Tonglin Zhang, Yan Zhou, Xinying Huang, Xiaolong Chai:
Analysis of Infringement Determination Methods in Personal Information Protection Disputes Based on Machine Learning. - Siyuan Tian, Zhengxiao He, Renjie Dai, Junhao Wang, Hanlin Yang:
Commute with Community: Enhancing Shared Travel through Social Networks. - Songming Han, Jieke Lu, Shaofeng Ming:
Hardcoded Vulnerability Mining Method in a Simulated Environment Based on Router Backdoor Detection Technology. - Yue Chang, Xiaolin Zhao, Mingzhe Pei, Zhenyan Liu:
GUCN: A machine learning model combining time series features for malicious network behavior detection. - Wei Zhao, Junling You, Qinghui Chen:
SQL Injection Attack Detection Based on Text-CNN. - Mingjie Zhang, Longzhu Zhu, Maomao Ding, Lu Liu, Lihua Gong, Jian Gong:
95598 Customer Service Complaint Spillover Risk Prediction Method Based on Data Association Clustering. - Lin Yuan, Zhishang Feng:
A dynamic key update scheme for UAV clusters in denied environments.
Chapter 4-Artificial Intelligence Recognition and Detection Technology
- Yaqing Huang, Zhe Dong, Junpeng He:
Unsupervised Industrial Internet Time Series Anomaly Detection Based on Reinforcement Learning. - Kang Chen, Shanshan Chen, Bing Cao, Menglong Wang, Lang Pei:
Research on PCB Flying Needle Test Technology Based on Improved Ant Colony Algorithm. - Xun Yan, Qianqian Pan, Yunlu Zhao:
Soil Profile Ruler Detection in YOLOv5. - Peng Du, Xudong Song:
Lightweight Target Detection: An Improved YOLOv8 for Small Target Defect Detection on Printed Circuit Boards. - Xin Liang, Maoting Gao:
The road crack detection algorithm improved based on YOLOv7. - Guanghui Gao, Dapeng Deng, Gang Shi, Yining Guo, Zhaole Ning:
Research on Methodology of Intelligent Traffic Accident Detection based on Enhanced YOLOv8 Algorithm. - Hanran Zhang, Zonglin Yang, Nuo Lei:
Defect recognition of solar panel in EfficientNet-B3 network based on CBAM attention mechanism. - Bao Liu, Zhi Qi:
Extracting features for enhanced air quality prediction: a self-tuning spatio-temporal residual network approach fusing adaptive adjacency matrix and attention mechanism. - Bao Liu, Fengran Wang:
Enhanced Bearing Fault Diagnosis under Strong Noise: An improved Inception Inverted Residual Ghost ShuffleNet. - Hong Li:
Research and application of neural network algorithm based on Water supply and drainage pipeline network. - Hong Li:
Research and application of network analysis algorithms based on underground pipeline networks. - Yiyan Zhou, Xiaoyu Yu, Liang Shi:
3D Mask Detection Algorithm Based on Spatio-Temporal Information Fusion. - Xuyang Zhang, Li Ni, Hang Zhu, Jialu Shen, Lei Wang:
Research on intelligent operation and maintenance system of distributed photovoltaic power station based on Internet of Things technology. - Zhaokun Wang, Xiaolong Chai:
Soccer detection and data analysis based on Mask R-CNN and YOLOv3 algorithms. - Pengcheng Wan, Wei Hu:
Real-time recognition of piano keys based on mobile devices. - Lin Hu, Jiandong Zhang, Mingzhi Mao:
Analysis of Traffic Flow Prediction Based on Historical Highway Traffic Volume. - Ji Qi, Xiujun Li, Hang Zhang, Tianyu Meng:
Research on Multi-feature EEG Emotion Recognition Method Based on 1D-Inception. - Liyang Xu, Yiran Chen, Yinglong Wang, Ning Liao, Jiacheng He, Dezheng Wang:
Recognition of Skin Cancer from Dermoscopic Images via DNN. - Jiaren Guo, Zihao Huang, Yanyun Tao:
Multispectral pedestrian detection based on UNet and attention mechanism. - Yuxi Yang:
Quantization and Acceleration of YOLOv5 Vehicle Detection Based on GPU Chips.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.