


default search action
Journal of Computer Science and Technology, Volume 40
Volume 40, Number 1, January 2025
- Ming Li:
Caging AI. 1-5 - Zhen-Xing Zhang, Yuanbo Wen, Han-Qi Lyu, Chang Liu, Rui Zhang, Xia-Qing Li, Chao Wang, Zidong Du, Qi Guo, Ling Li, Xue-Hai Zhou, Yun-Ji Chen:
AI Computing Systems for Large Language Models Training. 6-41 - Lingxing Kong, Yougang Chu, Zheng Ma, Jianbing Zhang, Jia-Jun Chen:
Mix-Lingual Relation Extraction: Dataset and a Training Approach. 42-59 - Huan Bai, Daling Wang, Shi Feng, Yi-Fei Zhang:
EKBSA: A Chinese Sentiment Analysis Model by Enhancing K-BERT. 60-72 - Jun-Fan Li, Shi-Zhong Liao:
Learnability in Online Kernel Selection with Memory Constraint via Data-Dependent Regret Analysis. 73-84 - Xiao-Rui Chen, Meng-Fei Yang, Gao Zhang, Wu Zhang, Jing Peng, Zheng Gu, Xiang-Jin Deng, Liu-Zhi Yang, Fei Yang, Yun Yang, Shou-Qian Sun, Ruofeng Tong, Min Tang:
3D Point Cloud Matching Based Selfie Generation for Chang'e-5. 85-98 - Chang-Ai Sun, Ming-Jun Xiao, Hepeng Dai, Huai Liu
:
A Reinforcement Learning Based Approach to Partition Testing. 99-118 - Sheng-Bin Xu, Siyu Chen, Yuan Yao, Feng Xu:
Detecting and Untangling Composite Commits via Attributed Graph Modeling. 119-137 - Yuwei Zhang, Zhi Jin, Ze-Jun Wang, Ying Xing, Ge Li:
SAGA: Summarization-Guided Assert Statement Generation. 138-157 - Feng Li, Guo-Qing Wang, Meng Wang, Dan Hao:
Coverage-Based Fault Localization in Haskell. 158-177 - Fanlong Zhang, Yu-Chen Chen, Siau-Cheng Khoo, Wenchao Jiang:
CHANN: A Hierarchical Neural Network for Clone Consistency Prediction. 178-195 - Mingtao Ji, Yibo Jin, Zhuzhong Qian, Tuo Cao, Bao-Liu Ye:
Orchestrating In-Network Aggregation for Distributed Machine Learning via In-Band Network Telemetry. 196-214 - Zhen Zhao
, Baocang Wang, Wen Gao:
Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing. 215-228 - Enze Yi, Kai Niu, Fusang Zhang, Ruiyang Gao, Jun Luo, Daqing Zhang:
Multi-Person Respiration Monitoring Leveraging Commodity Wi-Fi Devices. 229-251 - Lianbao Jin, Na Lei, Zhongxuan Luo, Jin Wu, Chao Ai, Xianfeng Gu:
Semi-Discrete Optimal Transport for Long-Tailed Classification. 252-266 - Xiao-Hong Liu, Xinyi Huang, Wei Wu, Jianting Ning:
Key-Policy Attribute-Based Encryption Based on SM9. 267-282
Volume 40, Number 2, March 2025
- Boshen Shi, Yongqing Wang, Fangda Guo, Bing-Bing Xu
, Hua-Wei Shen, Xueqi Cheng:
Domain Adaptation for Graph Representation Learning: Challenges, Progress, and Prospects. 283-300 - Qingying Yu, Gege Shi, Dongsheng Xu, Wenkai Wang, Chuanming Chen, Yonglong Luo:
Density Peak Clustering Algorithm Based on Data Field Theory and Grid Similarity. 301-321 - Tangwen Qian, Yuan Wang, Yong-Jun Xu, Zhao Zhang, Lin Wu, Qiang Qiu, Fei Wang:
A Model-Agnostic Hierarchical Framework Towards Trajectory Prediction. 322-339 - Li-e Wang, Dong-Cheng Li, Peng Liu, Xianxian Li:
BAM_CRS: Blockchain-Based Anonymous Model for Cross-Domain Recommendation Systems. 340-358 - Wenwen Fu, Wenjuan Gong, Chen-Yang Yu, Wei Wang, Jordi Gonzàlez
:
Facial Expression Generation from Text with FaceCLIP. 359-377 - Shiwei Gan, Yafeng Yin, Zhiwei Jiang, Lei Xie, Sanglu Lu:
Vision-Based Sign Language Translation via a Skeleton-Aware Neural Network. 378-396 - Jia-Wei Ge, Jiu-Xin Cao, Zhi-Xiang Zhao, Bo Liu:
FSD-GAN: Generative Adversarial Training for Face Swap Detection via the Latent Noise Fingerprint. 397-412 - Kangkang Wei, Weiqi Luo, Shunquan Tan, Ji-Wu Huang:
CTNet: A Convolutional Transformer Network for Color Image Steganalysis. 413-427 - Shan-Shan Wang, Chenglong Xiao:
Novel Algorithms for Efficient Mining of Connected Induced Subgraphs of a Given Cardinality. 428-443 - Lixian Ma, Leping Wang
, En Shao, Rongyu Cao, Guangming Tan:
VastPipe: A High-Throughput Inference System via Adaptive Space-Division Multiplexing for Diverse Accelerators. 444-463 - Wentai Li, Zi-Xuan Wang, Jinyu Gu, Yubin Xia, Binyu Zang:
Harmonizing Security and Performance in Microkernel File Servers. 464-481 - Yewen Li, Guangming Tan, Xueqi Li:
FuHsi: Shifting Base-Calling Closer to Sequencer via In-Cache Acceleration. 482-499 - Hui Xu, Pan Qi, Fuxin Tang, Huaguo Liang, Zhengfeng Huang:
SegNet-OPC: A Mask Optimization Framework in VLSI Design Flow Based on Semantic Segmentation Network. 500-512 - Haisheng Tan, Guopeng Li, Ziyu Shen, Zihe Wang, Zhenhua Han, Mingjun Xiao, Xiang-Yang Li, Guo-Liang Chen:
Edge-Centric Pricing Mechanisms with Selfish Heterogeneous Users. 513-530 - Jiqing Gu, Chao Song, Jie Wu, Li Lu, Ming Liu:
Unilateral Control for Social Welfare of Iterated Game in Mobile Crowdsensing. 531-551 - Jiao Ma, Tianzhang Xing, Wei Xi, Kun Zhao, Jun Tan, Xiaojiang Chen:
HeartIt: Low-Power Smoking Detection with a Smartwatch on Either Wrist. 552-571 - Yunzhe Xiao, Fu Li, Haotian Wang, Shaowu Yang:
GGF: Global Geometric Feature for Rotation-Invariant Point Cloud Understanding. 572-587 - Xiujuan Lei, Ya-Li Chen, Yi Pan:
Multi-Source Data with Laplacian Eigenmaps and Denoising Autoencoder for Predicting Microbe-Disease Associations via Convolutional Neural Network. 588-604
Volume 40, Number 3, May 2025
- Xiao-Wei Li, Xiaofei Liao:
Preface. 605-606 - Zhi-Wei Xu, Zi-Shu Yu, Feng-Zhi Li, Yao Zhang:
Hypertasking: From Information Web to Computing Utility. 607-620 - Feng Jiang, Huai-Min Wang, Peichang Shi, Xiang Fu, Liaoliao Feng, Rui Li, Moheng Lin:
An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing. 621-636 - Xiaohui Peng, Yi-Xuan Sun, Zhenghui Zhang, Yifan Wang:
DSparse: A Distributed Training Method for Edge Clusters Based on Sparse Update. 637-653 - Yiting Chen, Lailong Luo, Deke Guo, Qian He:
Carbon-Aware Energy Cost Optimization of Data Analytics Across Geo-Distributed Data Centers. 654-670 - Xiaohui Wei, Shiyu Tong, Zhongao Sun, Xiang Li, Hengshan Yue:
ResCheckpointer: Building Program Error Resilience-Aware Checkpointing Mechanism for HPC Systems. 671-685 - Wei-Ming Chang, Jing-Yi Li, Lin Chen, Xu Chen:
DiffTSN: Scheduling Mixed Flows in Time-Sensitive Networks with Diffusion-Based Method. 686-700 - Shuo Quan, Shen Gao, Jian-Song Zhang, Jie Wu:
Virtualization, Cloudification, and Service Orientation of Network: A Systematic Review. 701-730 - Dongyu Cao, Hao Yin, Bixin Li:
A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum. 731-747 - Xinyan Zhang, Dan Feng, Zhipeng Tan, Yanwen Xie, Shaofeng Zhao, Ya-Yuan Wei:
LWCM: A Lookahead-Window Constrained Model for Disk Failure Prediction in Large Data Centers. 748-765 - Jiangnan Cui, Yang Gao, Qiu Wang, Xuan Li, Ke-Ren Xu, Zhen-Yu Huang, Jingsong Zhang, Chunman Zuo:
Advanced Cross-Graph Cycle Attention Model for Dissecting Complex Structures in Mass Spectrometry Imaging. 766-779 - Shuyu Guo, Lan Huang, Yu-Hao Mu, Tian Bai:
Unsupervised Adversarial Domain Adaptation with Hierarchical Semantic Consistency for Cross-Modal Nuclei Detection. 780-791 - Yaoyu Wang, Xiaohua Wan, Cheng Chen, Fa Zhang, Xuefeng Cui:
Central Feature Network Enables Accurate Detection of Both Small and Large Particles in Cryo-Electron Tomography. 792-804 - Yuchu Fang, Wenzhong Li, Yao Zeng, Qingning Lu, Sanglu Lu:
Pushing to the Limit: An Attention-Based Dual-Prune Approach for Highly-Compacted CNN Filter Pruning. 805-820 - Nankai Lin, Hongyan Wu, Sihui Fu, Shengyi Jiang, Ai-Min Yang:
A Chinese Spelling Check Method Based on Reverse Contrastive Learning. 821-834 - Lin Zhu, Qiang-Sheng Hua, Hai Jin:
Joint-Communication Optimal Matrix Multiplication with Asymmetric Memories. 835-854 - Chong Zhang, Zitong Su, Min Li, Huiyuan Li, Wenjing Ma, Leisheng Li:
Optimization of Generalized Eigensolver for Dense Symmetric Matrices on AMD GPU. 855-869 - Gabriel H. Tolosa, Pablo Lavallén, Esteban A. Ríssola:
Caching Document Identifiers to Speedup Query Processing in Search Servers. 870-886 - Xiao Chen, Letian Sha, Fu Xiao, Jiaye Pan, Jiankuo Dong:
AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery. 887-903 - Shiyu Shen, Hong Zhang, Feng He, Zhichuang Liang, Jieyu Zheng, Hanyu Wei, Yang Wang, Zhenfeng Zhang, Yunlei Zhao:
OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice. 904-920 - Ming Wan, Geng Wang, Shi-Feng Sun, Dawu Gu, Gongyu Shi:
Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-Grained Data Sharing. 921-938

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.