Abstract is missing.
- Transport complexity of data dissemination in large-scale online social networksCheng Wang, Hangyu Zhu, Chaodong Wang, Qin Zhao, Bo Zhang. [doi]
- A memory-compact and fast sketch for online tracking heavy hitters in a data streamZhiying Tang, Qingjun Xiao, Junzhou Luo. [doi]
- De-anonymizing bitcoin networks: an IP matching method via heuristic approach: posterJiaming Cui, Huaying Wu, Luoyi Fu, Xiaoying Gan. [doi]
- Hybrid recommendation algorithm based on multi-attribute rating from online reviewsJinhai Li, Zhunan Qian, Peng Zhang, Youshi He. [doi]
- Ratio fairness-based power allocation and user scheduling for downlink NOMA heterogeneous networksYangyu Liu, Yueyun Chen, Meijie Yang, Zushen Liu. [doi]
- Quantum secure direct communication based on orbital angular momentumHong Lai, Liling Zhang, Yanrong Zhu. [doi]
- Research and application of grade prediction model based on decision tree algorithmYaling Zhang, Bei Wu. [doi]
- A testbed for intelligent software defined security frameworkFan Yang, Shasha Zhang, Shuyu Song, Rongpeng Li, Zhifeng Zhao, Honggang Zhang. [doi]
- STARLIT: 3D indoor positioning with smartphones and reflection lightFan Yang, ShiNing Li, Jiangjiang Zhang, Shaoqing Xu, Li Cong, Yinghai An. [doi]
- A healthy node selection method based on particle swarm optimization under network intrusion environmentJun Zhang, Ping-ping Xia, Juan Zhang, Haiyun Peng. [doi]
- MSNdroid: the Android malware detector based on multi-class features and deep belief networkXiaoxia Qin, Fanping Zeng, Yu Zhang. [doi]
- Engineering cognition oriented cultivation method of innovative quality based on learning-by-doingYun Zhou, Weidong Bao, Xiaomin Zhu. [doi]
- A semi-supervised deep learning approach towards localization of crowdsourced dataYuan Shao, Lin Li, XianSheng Guo. [doi]
- Domain adaptation for retinal vessel segmentation using asymmetrical maximum classifier discrepancyJingyu Zhuang, Ziliang Chen, Junyi Zhang, Dongyu Zhang, Zhaoquan Cai. [doi]
- Abnormal traffic detection of IoT terminals based on Bloom filterFengjie Deng, Yubo Song, Aiqun Hu, Min Fan, Yu Jiang. [doi]
- CNDTSN: enhanced DTSN based on classified nodesYecheng Song, Pengrui Duan, Liang Liu, Huadong Ma. [doi]
- Secure and green SWIPT in energy harvesting cognitive radio network with robust AN-aided beamformingZhe Wang, Taoshen Li, Jin Ye, Zhihui Ge, Xudong Gao, Min Wu. [doi]
- Application of convolutional neural network in automatic classification of arrhythmiaJian Liu, Mingxuan Fu, Shasha Zhang. [doi]
- Processing private queries based on distributed storage in location-based servicesHan Wang, Yang Qin, Zechao Liu, Yibing Li. [doi]
- MOOBench: towards massive open online workbenchWei Wang, Libo Huang, Dong Guo, Yanjun Xu, Fenglin Bi, Jun Tang. [doi]
- An energy-efficient resource allocation strategy for vehicular networksZhuoheng Li, Jian Liu, Yueyun Chen. [doi]
- Energy audition based cyber-physical attack detection system in IoTYang Shi, Fangyu Li, Wen-Zhan Song, Xiangyang Li, Jin Ye. [doi]
- Graph attention propagation for few-shot learningXiaolu Hui, Riquan Chen, Tianshui Chen. [doi]
- A cognitive diagnosis framework based on peer assessmentYu He, Xinying Hu, Guangzhong Sun. [doi]
- Smart recommendation of personalized cloud music service based on mental modelDuo Xu, Yonghui Dai, Weihui Dai. [doi]
- Research on credit distribution of cooperative papers according to authors' rankJin Shi, Peng Jin, Siyu Gu. [doi]
- Anonymous cross-domain authentication scheme for medical PKI systemGuishan Dong, Yuxiang Chen, Jia-Fan, Jian Bai, Peng Zhang, Feng Li. [doi]
- Application of particle filter to concrete freeze-thaw prognosisWeibo Yang, Peiwei Gao, Hailong Peng, Xiangmin Zhao. [doi]
- More Chinese women needed to hold up half the computing skyMing Zhang, Yichun Yin. [doi]
- Enhanced branch obfuscation based on exception handling and encrypted mapping tableFei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu. [doi]
- A classroom concentration model based on computer visionBo Jiang, Wei Xu, Chunlin Guo, Wenqi Liu, Wenqing Cheng. [doi]
- Chameleon: towards adaptive honeypot for internet of thingsYe Zhou. [doi]
- A survey on traffic-behavioral profiling of network end-targetMingda Wang, Hangyu Hu, Guangmin Hu. [doi]
- Measuring code similarity using word mover's distance for programming courseBin Xu, Fan Gao, Kening Gao, Changkuan Zhao, Dan Yang. [doi]
- DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android appsYingjie Wang, Xing Liu, Weixuan Mao, Wei Wang 0012. [doi]
- Second-order multi-armed bandit learning for online optimization in communication and networksZhiyong Du, Bin Jiang, Kun Xu, Shengyun Wei, Shengqing Wang, Huatao Zhu. [doi]
- An emotion recognition system based on edge computing and cloud computing applied in the kindergartenRuizhi Zhang, Chujie Tian, Yang Ji. [doi]
- Adversarial attack against scene recognition system for unmanned vehiclesXuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen. [doi]
- A quantum handshake method based on quantum dialogue and wireless networkQianQian Hu, Ying Zhang, Ziyan Zhao, Wei Jia. [doi]
- Assisting with frustration in learning via machine learning and computer visionLynne Grewe, Chengzi Hu. [doi]
- Mining top-k distinguishing periodic patterns in temporal databasesJie Liu, Jie Zuo, Ruiqi Qin. [doi]
- A greedy-based approach of fast transaction broadcasting in bitcoin networksHaonan Zhang, Chen Feng, Xinbing Wang. [doi]
- Urban crowd flow forecasting based on cellular networkYi Zhao, Jianbo Li, Xin Miao, Xuan Ding. [doi]
- A competition-oriented student team building methodDapengqu Qu, Songlin Wu. [doi]
- Camouflage people detection via strong semantic dilation networkZheng Fang, Xiongwei Zhang, Xiaotong Deng, Tieyong Cao, Changyan Zheng. [doi]
- Pyramidal region context module for semantic segmentationTingting Liang, Qijie Zhao, Zhuoying Wang, Kaiyu Shan, Huan Zhang, Yongtao Wang, Zhi Tang. [doi]
- A multi-scale face detection algorithm based on improved SSD modelDi Fan, Shuai Fang, Xiaoxin Liu, Yongyi Li, Shang Gao. [doi]
- A wide-deep event model for complex event processing in edge and cloud computing environmentShuqing He, Haifeng Wang, Yunpeng Cao, Deyu Zhao. [doi]
- A novel data hiding algorithm for game texture based on Hamming+1Jianfeng Lu, Weiling Cheng, Shanqing Zhang, Li Li 0014. [doi]
- Muti-behavior features based knowledge tracking using decision tree improved DKVMNXia Sun, Xu Zhao, Yuan Ma, Xinrui Yuan, Feijuan He, Jun Feng. [doi]
- An effective feature representation of web log data by leveraging byte pair encoding and TF-IDFJunlang Zhan, Xuan Liao, Yukun Bao, Lu Gan, Zhiwen Tan, Mengxue Zhang, Ruan He, Jialiang Lu. [doi]
- UniSec: a unified security framework with SmartNIC acceleration in public cloudJinli Yan, Lu Tang, Junnan Li, Xiangrui Yang, Wei Quan, Hongyi Chen, ZhiGang Sun. [doi]
- Personalized exercise recommendation via implicit skillsWenying Kang, Lei Zhang, Bo Li, Jing Chen, Xia Sun, Jun Feng. [doi]
- traj2bits: indexing trajectory data for efficient queryRui Zhang, Jiming Guo, Yueqi Zhou, Hongbo Jiang, Chen Wang 0011. [doi]
- On data visualization for securities investment fund analysisGuang Sun, FengHua Li, Jiayi Ren, Hongzhang Lv, Yanfei Xiao, Yingchao Wang. [doi]
- DTR-GAN: dilated temporal relational adversarial network for video summarizationYujia Zhang, Michael Kampffmeyer, Xiaoguang Zhao, Min Tan. [doi]
- The prediction model of initial flowering based on accumulated temperature of different species peach in LongquanyiChen Chao, Tian Shan, Li-Mei Yan, Xiao Xiao. [doi]
- Exploring federated learning on battery-powered devicesZichen Xu, Li Li, Wenting Zou. [doi]
- Fully private auctions for the highest bidJie Ma, Bin Qi, Kewei Lv. [doi]
- Quantum key distribution protocol based on CSS error correcting codesWei Jia, Bao-Feng, Hao Yu, Yuxiang Bian. [doi]
- 3: low cost real-time spectrum sensing using SDRWei Liu, Shan Chang, Hongzi Zhu, Yiming Liu. [doi]
- A copy detection algorithm for game character concept design based on pose featuresMian Sun, Li Li 0014, Shanqing Zhang, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang 0001. [doi]
- A novel method based on entity relationship for online transaction fraud detectionYing Meng, Zhaohui Zhang, Wenqiang Liu, Ligong Chen, Qiuwen Liu, Lijun Yang, Pengwei Wang. [doi]
- Iterative first-order reverse image filteringLi Dong, Jiantao Zhou, Cuiming Zou, Yulong Wang. [doi]
- Parallel architecture design of genetic algorithms on HPC platformLiu Yan, Wenxin Hu, Longzhe Han. [doi]
- Cooperative offloading of tasks with deadlines in mobile cloud computingXiaotong Li, Ruiting Zhou, Zongpeng Li. [doi]
- Deep super-resolution based hashing for image retrievalXianbo Li, Naiguang Zhang, Qian Wang, Feng Dai, Ziyu Xue. [doi]
- 2: practical secure protocol for speech data publishingPing Zhao, Jiaxin Sun, Anqi Zhang, Sifan Ni, Guanglin Zhang. [doi]
- RI-SSGE: a framework with rule inference and sentence schema graph embedding for knowledge base query constructionXiaoyang Huo, Chuan Wen, Yuchen Yan, Ruijie Wang. [doi]
- Context-aware recommendations via a tree-based ensemble frameworkKe-ji, Yahan Yuan, Kun Ma, Runyuan Sun, Zhenxiang Chen, Jun Wu. [doi]
- Network embedding with class discriminabilityZi-Hua Li, Ling Huang, Kai Wang, Chang-Dong Wang, Wei Shi, Dong Huang. [doi]
- WiSafe: a real-time system for intrusion detection based on wifi signalsYu Bao, Liang Dong, Yue Zheng, Ying Liu. [doi]
- A survey on visible light positioning from the hardware perspectivePengpeng Chen, Di Che, Yuqing Yin. [doi]
- Congestion-aware deployment of electric vehicle charging stationsYao Feng, Xiong Wang, Wenkuan Dai, Shujuan Gao, Xiaoying Gan, Siyi Wang. [doi]
- NNMLInf: social influence prediction with neural network multi-label classificationXupeng Wang, Zhongwen Guo, Xi Wang 0003, Shiyong Liu, Wei Jing, Yuan Liu. [doi]
- A PBIL for delay constrained virtual network function placement with load balancingHuanlai Xing, Song Li, Penglin Dai, Shouxi Luo, Ke Li, Hui Yang. [doi]
- The improved protocol based on the Bennett 92 protocolYan Xiong, Hong Lai. [doi]
- Queec: QoE-aware edge computing for complex IoT event processing under dynamic workloadsGaoyang Guan, Wei Dong 0001, Jiadong Zhang, Yi Gao, Tao Gu, Jiajun Bu. [doi]
- Deep mutual learning for visual trackingKai Gao, Pingping Zhang, Yan Liu 0015, Ziqin Zhou, Gang Yang 0002, Huchuan Lu. [doi]
- A passive wireless temperature sensor tag compatible with EPC Gen2 UHF RFID protocolLiangbo Xie, Mu Zhou, Xiaolong Yang, Wei Nie, Yong Wang 0004. [doi]
- Truth discovery on multi-dimensional properties of data sourcesYan Zheng, Meijuan Yin, Junyong Luo, Gongzhen He. [doi]
- VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithmGuangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand, Shaoci Xie. [doi]
- Construction of a heterogeneous information network by fusing multi-source biomedical dataChengxin He, Yidan Zhang, Jie Zuo. [doi]
- Research on the cultivation of new engineering talents based on educational big dataJunmin Zhao, Dengao Li, Xiaoyu Wang, Xiaohong Bai, Shasha Zhuang. [doi]
- A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacyFan Peng, Shaohua Tang, Bowen Zhao, Yuxian Liu. [doi]
- The construction of movie marketing index based on factor analysisYan Wang, Xuteng Wang, Yugang Li, Yufan Zhou. [doi]
- An improved dv-hop localization algorithm based on centroid multilaterationJing Wang, Anqi Hou, Yuanfei Tu. [doi]
- Optimize SPL test cases with adaptive simulated annealing genetic algorithmLiu Yan, Wenxin Hu, Longzhe Han. [doi]
- End-to-end deep learning based trading platform and its evaluationTong Sun, Jia Wang, Jing Ni, Yu Cao, Benyuan Liu. [doi]
- Survey on streaming data computing systemGuang Sun, Yingjie Song, Ziqin Gong, Xiya Zhou, Xinyi Zhou, Yilin Bi. [doi]
- Scoring framework of soccer matches using possession trajectory dataGeng Deng, Licheng Liu, Jie Zuo. [doi]
- Implementation of Tibetan-Chinese translation platform based on LSTM algorithmXiaofeng Chen, Hao Wang, Wei Xiang. [doi]
- Detection of primary user emulation attack based on modified adaptive orthogonal matched pursuit for cognitive radio networks in HCRANLilly-Abau Yosia Odwa, Yueyun Chen, Zhiyuan Mai. [doi]
- Representation learning for heterogeneous network with multiple link attributesKaiwen Song, Xinao Wang, Yidan Zhang, Jie Zuo. [doi]
- Source smartphone identification for digital zoomed imagesHui Zeng, Anjie Peng, Xiaodan Lin, Shenghai Luo. [doi]
- Measuring similarity between sequential datasetsXiaohui Zhang, Jie Zuo. [doi]
- High efficiency wifi fingerprint localization based on distance costraintsYing Liu, Zhiyong Tao, Xiaobing Li. [doi]
- IoT device fingerprinting for relieving pressure in the access controlYubo Song, Qiang Huang, Junjie Yang, Ming Fan, Aiqun Hu, Yu Jiang. [doi]
- SeeIME: a Chinese mobile IME for Chinese learners based on hybrid Pinyin codeJian Yao, Xingfa Shen, Jianhui Qiu, Ting Wang. [doi]
- Source detection in the bitcoin network: a multi-reporting approachChong Zhang, Xiaoying Gan. [doi]
- A quantitative revision method to improve usability of self-and peer assessment in MOOCsJun Na, Yuan Liu. [doi]
- Instruction-guided object detectionLili Huang, Hefeng Wu, Guanbin Li, Qing Wang. [doi]
- A study on the characteristics of douyin short videos and implications for edge cachingZhuang Chen, Qian He, Zhifei Mao, Hwei-Ming Chung, Sabita Maharjan. [doi]
- Air quality forcasting based on gated recurrent long short-term memory modelBaowei Wang, Weiwen Kong, Hui Guan. [doi]
- Acoustic event detection with two-stage judgement in the noisy environmentRuixi Yang, Hongxia Wang, Wen Dou. [doi]
- A SDN-based testbed for underwater sensor networksHanjiang Luo, Chao Liu 0008, Yongquan Liang. [doi]
- Seeing eye drone: a deep learning, vision-based UAV for assisting the visually impaired with mobilityLynne Grewe, Garrett Stevenson. [doi]
- Video computing across trust domains based on blockchainYangyang Gao, Yangyang Li, Yue Jia 0002. [doi]
- A new stealth address scheme for blockchainJia-Fan, Zhen Wang, Yili Luo, Jian Bai, Yarong Li, Yao Hao. [doi]
- Popularity-prediction-driven hierarchical caching in fog-cloud based radio access networksXiuhua Li, Xiaofei Wang, Zhengguo Sheng, Chunqiang Hu, Victor C. M. Leung. [doi]
- Cow face detection and recognition based on automatic feature extraction algorithmLiyao Yao, Zexi Hu, Caixing Liu, Hanxing Liu, Yingjie Kuang, Yuefang Gao. [doi]
- Optimization of parallel program based on lattice BGK methodXudong Tang, Chen Xue, Tao Wu, Tiejun Wang. [doi]
- A quantum key distribution scheme based on quantum error-avoiding code in decoherence-free subspaceQianQian Hu, Tianzi Sun, Bao-Feng, Wei Jia. [doi]
- PRBL: a personalized recommendation system based on bipartite network projection and link community detectionXuemeng Zhai, Hangyu Hu, Guangmin Hu, Youyang Qu. [doi]
- A novel feature selection approach based on multiple filters and new separable degree index for credit scoringHongwei Feng, Shuang Li, Dianyuan He, Jun Feng 0003. [doi]
- A spatial clustering approach by combining the geo-social-comment relationships of POIsXiaoyan Zhang, Yue Mao, Xiangfu Meng. [doi]
- A conditional-probability zone transformation coding method for categorical featuresLiang He, Chao Shen, Yun Li. [doi]
- Multimodality white matter tract segmentation using CNNXiaofeng Dong, Zhipeng Yang, Jing Peng, Xi Wu 0004. [doi]
- WiPi: an extendable edge platform for building time-critical cyber-physical-human systemsM. D. Asif Hasan, Haiming Chen, Yimo Lin, Xiwen Liu. [doi]
- Deep reinforcement learning-driven intelligent panoramic video bitrate adaptationGongwei Xiao, Xu Chen, Muhong Wu, Zhi Zhou. [doi]
- DeepFuse neural networksXiu Li, Rujiao Long, Kun Jin. [doi]
- A quantum key distribution protocol based on LDPC error correcting codesWei Jia, Ying Zhang, Hao Yu, Yuxiang Bian. [doi]
- De-anonymize social network under partial overlapZhongzhao Hu, Luoyi Fu, Xiaoying Gan. [doi]
- Experience reports for teaching operating systems towards increasing-sized classesShu Yin, Yingdong Zhang, Xiaomin Zhu. [doi]
- Mining important nodes in complex software network based on ripple effects of probabilityJiadong Ren, Qian Wang 0009, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao. [doi]
- Identifying facts for chatbot's question answering via sequence labelling using recurrent neural networksMohammad Nuruzzaman, Omar Khadeer Hussain. [doi]
- Management system for secure mobile application developmentWei Guo. [doi]
- Learning to create multi-stylized Chinese character fonts by generative adversarial networksJiefu Chen, Xing Xu, Yanli Ji, Hua Chen. [doi]
- A unified framework for constrained linearization of 2D/3D sensor networks with arbitrary shapesYufu Jia, Wenping Liu 0001, Hongbo Jiang, Yamin Li, Guoyin Jiang, Zhicheng Lui, Yang Yang, Jing Xing. [doi]
- Automated grading of collaborative software engineering training with cloud distributing scriptsKun Ma, Bo Yang 0001, Kun Liu. [doi]
- OceanNet: a low-cost large-scale maritime communication architecture based on D2D communication technologyChao Liu, Yingbin Li, Ruobing Jiang, Feng Hong, Zhongwen Guo. [doi]
- Computation offloading for mobile edge computing with accuracy guaranteeYuben Qu, Jiajia Liu. [doi]
- Mining heterogeneous urban data for retail store placementJian Zeng, Bo Tang. [doi]
- UrbanEdge: deep learning empowered edge computing for urban IoT time series predictionXiaochen Fan, Chaocan Xiang, Liangyi Gong, Xiangjian He, Chao Chen, Xiang Huang. [doi]
- Three attacks of certificateless aggregate signature schemeShi Lin, Fu Pu, Li Cui. [doi]
- Crosstalk-aware GA-based wavelength allocation method for ring-based optical network-on-chipZiyi Chang, Hui Li 0006, Zhuqin Chu, Huaxi Gu, Xiaochun Ye. [doi]
- VRGym: a virtual testbed for physical and interactive AIXu Xie, Hangxin Liu, Zhenliang Zhang, Yuxing Qiu, Feng Gao, Siyuan Qi, Yixin Zhu, Song Chun Zhu. [doi]
- Progressive deep feature learning for manga character recognition via unlabeled training dataXiaoran Qin, Yafeng Zhou, Yonggang Li, Siwei Wang, Yongtao Wang, Zhi Tang. [doi]
- Predicting learning status in MOOCs using LSTMFeng Xiong, Kaifa Zou, Zhemin Liu, Hongzhi Wang. [doi]
- PWGAN: wasserstein GANs with perceptual loss for mode collapseXianyu Wu, Canghong Shi, Xiaojie Li, Jia He, Xi Wu, Jiancheng Lv, Jiliu Zhou. [doi]
- Abnormal telephone identification via an ensemble-based classification frameworkKe-ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma, Zhenxiang Chen. [doi]
- Research on impact evaluation of ISO standards on China's GB based on C4.5 modelYan Wang, Xiaoyu Chang, Jingjing Han, Yugang Li. [doi]
- Research on application recognition technology based on user's touch screen behaviorXurong Yan, Feng Hong, Zhaoran Huo. [doi]
- Channel estimation optimization algorithm based on OFDM systemJian Liu, Yanzhong Wang, Yalin Yuan, Yinghua Zhang. [doi]
- Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environmentWen Dou, Hongxia Wang, Ruixi Yang. [doi]
- RSWI: a rescue system with wifi sensing and image recognitionJikun Guo, Huihui Li. [doi]
- CLMS-Net: dropout prediction in MOOCs with deep learningNannan Wu, Lei Zhang, Yi Gao, Mingfei Zhang, Xia Sun, Jun Feng. [doi]
- Federated learning-based computation offloading optimization in edge computing-supported internet of thingsYiwen Han, Ding Li, Haotian Qi, Jianji Ren, Xiaofei Wang. [doi]
- When mobile crowd sensing meets smart agriculture: posterYuanhao Sun, Weimin Ding, Lei Shu, Kai Huang, Kailiang Li, Yu Zhang, Zhiqiang Huo. [doi]
- An efficient distributed storage strategy for blockchainQinshen Wang, Hongzhi Wang, Bo Zheng. [doi]
- Detecting review spammer groups in dynamic review networksMengxiao Hu, Guangxia Xu, Chuang Ma, Mahmoud Daneshmand. [doi]
- Wandering between close and apart: are scholarly domains crossable?Haiwen Wang, Lingkun Kong, Luoyi Fu, Xinbing Wang. [doi]
- Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterionYuanyuan Ma, Xiangyang Luo, Zhenyu Li 0004, Yi Zhang 0026, Adrian G. Bors. [doi]
- The analysis and early warning of student loss in MOOC courseShengjun Yin, Qingda Shang, Hongzhi Wang, Boxuan Che. [doi]
- CLS-PROG: an intelligent tool for classifying programs in online judge systemsYigong Pan, Guangzhong Sun. [doi]
- See-your-room: indoor localization with camera visionMin Sun, Li Zhang, Ying Liu, Xin Miao, Xuan Ding. [doi]
- How are students' programming skills developed: an empirical study in an object-oriented courseQing Sun, Ji Wu, Kaiqi Liu. [doi]
- Few-shot domain adaptation for semantic segmentationJunyi Zhang, Ziliang Chen, Junying Huang, Jingyu Zhuang, Dongyu Zhang. [doi]
- Cooperative communication based connectivity recovery for UAV networksWen Tian, Zhenzhen Jiao, Min Liu, Meng Zhang, Dong Li. [doi]
- An efficient access control scheme for smart lock based on asynchronous communicationZhaoyang Han, Liang Liu, Zhe Liu. [doi]
- Local ratio based distributed bike-dock pair allocation in public bike systemPengqian Lu, Jianhui Zhang, Siwen Zheng, Tianyu Zhang. [doi]
- Policy multi-region integration for video descriptionJunxian Ye, Le Dong, Wenpu Dong, Ning Feng, Ning Zhang. [doi]
- An attention-based ambient network with 3D convolutional network for incomplete traffic flow predictionFeng Lin, Haifeng Zheng, Xinxin Feng. [doi]
- An improved TextRank keywords extraction algorithmSuhan Pan, Zhiqiang Li, Juan Dai. [doi]
- A method for online transaction fraud detection based on individual behaviorLigong Chen, Zhaohui Zhang, Qiuwen Liu, Lijun Yang, Ying Meng, Pengwei Wang. [doi]