


default search action
ISCAI 2023: Shanghai, China
- Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, ISCAI 2023, Shanghai, China, October 13-15, 2023. ACM 2023

 - Keqin Jiang

, Mingyan Jiang
:
A Hybrid Improved Lion Swarm Optimization Algorithm. 1-4 - Dong-Xu Li

, Hui Rong Cui
, Yi-Jing Wang
:
Optimization of Chinese Character Font Recognition Model Based on Incremental Learning. 5-14 - Chenggong Zhai

, Fei Xiang
, Yiwei Liu
, Hongsi Xu
, Liyong Zhou
, Xing Zhang
:
Research on the Application of Artificial Intelligence Technology in Material Support. 15-18 - Qiang Li

, Yuan Meng
, Rui Meng Shi
:
Processing Approaches for Functional Magnetic Resonance Imaging Data in a Limited Sample of Deaf Individuals. 19-22 - Mengrui Shi

, Qiang Li
, Yuan Meng
:
Classification of Brain Functional Connections for Tone Processing in Deaf Children Based on 1D-CNN. 23-27 - Zhou Yu Liu

, Xin Yan
, Youlong Luo
:
CLPLM-EE: Contrastive Learning Pre-training Model for Event Extraction In New Domain. 28-34 - Ronghui Wu

, Younghwan Pan
:
Navigating the Confluence: Advancements and Trends in Artificial Intelligence-Driven Design Education Based on CiteSpace's Visual Analytics. 35-39 - Ao Qiao

, Xia Zhou
, Jianing Wang
, Siyu Zeng
:
Effects of subsidy and cap-and-trade allocation rules on carbon management of multi-party supply chain. 40-44 - Weijian Liu

, Zhe Zhou
, Pengcheng Gong
, Yuntao Wu
:
Bayesian Detection for Colocated MIMO Radar with Limited Training Data. 45-49 - Shuo Chen

, Juan Zhang
:
CLIP-M-Cap: CLIP Mean Teacher for Image Captioning. 50-55 - Huiyao Dong

, Igor V. Kotenko
:
Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT. 56-59 - Xuanyu Huan

, Jianpeng Zhao
, Guolin Chen
, Xianchao Li
, Yunhe Cui
, Hongzhen Yang
:
Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method. 60-66 - Yong Long

, Qing Qian
, Yunhe Cui
:
VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning. 67-71 - Hui Ma

, Yucong Wei
, Xuejun Li
, Yuqing Zhang
:
Malicious Random-index PIR and its Application. 72-75 - Nazgul Zholmagambetova

, Aidyn Abirov
:
The Design of an Intelligent Security System with Face Recognition and Human Action Analysis. 76-81 - Zhiping Ouyang

, Liang Li
, Bo Wang
:
A Method for Task Offloading based on Multi-agent Deep Deterministic Policy Gradient(MADDPG) and Minimum Cost Maximum Flow(MCMF) in Internet of Vehicles(IoVs). 82-86 - Cuilan Liu

, Ziyi Yuan
, Jingxin Zhao
, Jingfeng Rong
, Yuqing Zhang
:
Research on Named Entity Recognition in the Steel Industry Based on MacBERT. 87-90 - Enqiang Zhu

, Yu Zhang
, Guanhua Jiang
, Jing Wang
:
An Anonymous Authentication and Key Agreement Scheme for Multi-Server Environments. 95-101 - Zhirong Luan

, Yujun Lai
, Rundong Huang
, Yan Yan
, Jingwei Wang
, Jizhou Lu
, Badong Chen
:
Hierarchical Large Language Models in Cloud-Edge-End Architecture for Heterogeneous Robot Cluster Control. 102-105 - Khalid Alemerien

, Ayyam Alkhawaldeh
, Aram Al-Ghareeb
:
Developing a Machine Learning Based Technology for Secure Internet of Vehicles. 106-111 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














