1 | -- | 16 | Weiwei Wu, Su Hu, Di Lin, Gang Wu 0001. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks |
1 | -- | 13 | Zhong Ji, Kexin Chen, Yuqing He, Yanwei Pang, Xuelong Li 0001. Heterogeneous memory enhanced graph reasoning network for cross-modal retrieval |
1 | -- | 19 | Di Cui, Lingling Fan 0003, Sen Chen, Yuanfang Cai, Qinghua Zheng, Yang Liu 0003, Ting Liu 0002. Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects |
1 | -- | 16 | Bo Peng, Mingmin Chi, Chao Liu. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing |
1 | -- | 19 | Huanruo Li, Yunfei Guo, Shumin Huo, Hongchao Hu, Penghao Sun. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning |
1 | -- | 2 | Liyang Zhou, Zhifang Zhang. Explicit construction of minimum bandwidth rack-aware regenerating codes |
1 | -- | 3 | Weibei Fan, Jianxi Fan, Yujie Zhang, Zhijie Han 0001, Guoliang Chen 0008. Communication and performance evaluation of 3-ary n-cubes onto network-on-chips |
1 | -- | 2 | Xiaomao Cao, Jianxin Yi, Ziping Gong, Xianrong Wan. Automatic target recognition combining angular diversity and time diversity for multistatic passive radar |
1 | -- | 2 | Li Feng 0004, Shuiqing Xu, Ke Zhang 0006, Yi Chai, Darong Huang. Fault estimation based on high order iterative learning scheme for systems subject to nonlinear uncertainties |
1 | -- | 15 | Ya Shuang, Hanting Zhao, Meng-Lin Wei, Qiang Cheng, Shi Jin 0002, Tiejun Cui, Philipp del Hougne, LianLin Li. One-bit quantization is good for programmable coding metasurfaces |
1 | -- | 15 | Xingguo Zeng, Jianjun Liu, Xin Ren, Wei Yan, Qiang Fu, Xingye Gao, Wangli Chen, Wei Zuo, Chunlai Li. Pan-location mapping and localization for the in-situ science exploration of Zhurong Mars rover |
1 | -- | 2 | Gaofeng Cheng, Huan Chen, Pingzhi Fan, Li Li, Li Hao. A layered grouping random access scheme based on dynamic preamble selection for massive machine type communications |
1 | -- | 15 | Hanjie Liu, Jinde Cao, Wei Huang 0017, Xinli Shi, Xudong Wang. Complex network approach for the evaluation of asphalt pavement design and construction: a longitudinal study |
1 | -- | 18 | Xiaoyi Yin, Zhen Cui, Hong Chang, Bingpeng Ma, Shiguang Shan. Extending generalized unsupervised manifold alignment |
1 | -- | 3 | Nan Nan, Xiaohong Guan, Yixin Wang, Youtian Du. Common quantitative characteristics of music melodies - pursuing the constrained entropy maximization casually in composition |
1 | -- | 2 | Jiangong Chen, Xia Lei, Yue Xiao 0001, Hongyan Zhang 0006, Yuan Ding, Gang Wu 0001. Polarized spatial and directional modulation toward secure wireless transmission |
1 | -- | 13 | Chenchen Peng, Weihai Zhang. Multicriteria optimization problems of finite horizon stochastic cooperative linear-quadratic difference games |
1 | -- | 3 | Ying He 0004, Ellis Inglut, Cunjin Luo. Malware incident response (IR) informed by cyber threat intelligence (CTI) |
1 | -- | 2 | Jiaqi Zhao 0005, Hui Zhu 0001, Fengwei Wang, Rongxing Lu, Hui Li 0006, Zhongmin Zhou, Haitao Wan. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data |
1 | -- | 18 | Haoyu Chen, Deqing Zou, Hai Jin 0001, Shouhuai Xu, Bin Yuan. SAND: semi-automated adaptive network defense via programmable rule generation and deployment |
1 | -- | 2 | Shang Shi, Yonghui Sun, Yinlong Hu, Xin Yu. Robust fixed-time output-feedback control for linear systems without chattering: an exact uncertainty compensation method |
1 | -- | 2 | Yan Huang, Chuanchuan Yang, Zhangyuan Chen. 3DPF-FBN: video inpainting by jointly 3D-patch filling and neural network refinement |
1 | -- | 2 | Andrew Chi-Chih Yao, Xia Yin, Yinqun Liu, Guoliang Li. Perspectives from the second Global Forum on Development of Computer Science |
1 | -- | 11 | Yi Zhao 0011, Ke Xu, Qi Li, Haiyang Wang, Dan Wang 0002, Min Zhu. Intelligent networking in adversarial environment: challenges and opportunities |
1 | -- | 19 | Guangrui Liu, Weizhe Zhang, Xinjie Li, Kaisheng Fan, Shui Yu. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems |
1 | -- | 3 | Hui Wang, Dawu Gu, Yuanyuan Zhang, Yikun Hu. An empirical study of security issues in SSO server-side implementations |
1 | -- | 2 | Shuang Shi, Zhongyang Fei, Xudong Zhao 0001. Time-scheduled observer design for switched linear systems with unknown inputs |
1 | -- | 2 | Jinhui Liu, Yong Yu, Hongliang Bi, Yanqi Zhao, Shijia Wang, Huanguo Zhang. Post quantum secure fair data trading with deterability based on machine learning |
1 | -- | 12 | Xiao-Jie Li, Cong Li, Xiang Li 0010. The impact of information dissemination on vaccination in multiplex networks |
1 | -- | 2 | Zihan Li, Ping Wang 0011, Chaojie Zhu, Yunfeng Hu, Hong Chen 0003. MPC-based strategy for longitudinal and lateral stabilization of a vehicle under extreme conditions |
1 | -- | 3 | Jing Liang 0005, Boyang Qu, Baolei Li, Kunjie Yu, Caitong Yue. Locating multiple roots of nonlinear equation systems via multi-strategy optimization algorithm with sequence quadratic program |
1 | -- | 12 | Kui Zhang, Hang Zhou 0007, Huanyu Bian, Weiming Zhang 0001, Nenghai Yu. Certified defense against patch attacks via mask-guided randomized smoothing |