Abstract is missing.
- Web Security Education in A Multidisciplinary Learning ContextQiang Liu 0004, Wentao Zhao, Minghui Wu, Chengzhang Zhu. 1-7 [doi]
- Quality-Driven and Abstraction-Oriented Software Construction Course Design: To Fill the Gap between Programming and Software Engineering CoursesZhongjie Wang, Hanchuan Xu, Ming Liu, Xiaofei Xu. 9-14 [doi]
- Online Judge for FPGA-based Lab Projects in Computer Organization CourseYuxiang Zhang, Kang Chen, Weidong Liu. 15-20 [doi]
- Research on Copyright Protection Method of Big Data Based on Nash Equilibrium and Constraint OptimizationBin Shi, YabinXu. 21-25 [doi]
- Privacy Preserving on Updated Parameters in Federated LearningWenqiang Yang, Bin Liu 0016, Changlei Lu, Nenghai Yu. 27-31 [doi]
- Improving Multi-set Query Processing Via a Learned OracleJingwen Cai, Wenbin He, Yu Li, Xian Zhang, Lingli Li. 33-37 [doi]
- Privacy-preserving collaborative machine learning on genomic data using TensorFlowCheng Hong, Zhicong Huang, Wen-Jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso. 39-44 [doi]
- Information Exchange in Public-Culture Service Domain Bason on CIEMYashen Wang, Ge Shi, Xi Zhang. 45-49 [doi]
- Central-Eye: Gaze Tracking Research on Visual Rendering Method in Industrial Virtual Reality SceneMeiya Dong, JuMin Zhao, Dianqi Wang, Xin Ding, Zhaobin Liu, Biaokai Zhu, Jin Yuze. 51-57 [doi]
- WiTransfer: A Cross-scene Transfer Activity Recognition System Using WiFiYuanrun Fang, Biyun Sheng, Haiyan Wang, Fu Xiao. 59-63 [doi]
- How do early programmers benefit from SPOC blended teaching: a data-driven analysisQing Sun, You Song, Huobin Tan. 65-70 [doi]
- Multi-Domain Global Correlation Degree Branching Entropy Method for Microblog Text Word SegmentationJinlian Du, Xueyun Jin, Peng Wang. 71-75 [doi]
- Delay-sensitive Trajectory Designing for UAV-enabled Data Collection in Internet of ThingsPengfei Wu, Chao Sha, Haiping Huang, Haiyan Wang. 77-81 [doi]
- RF-Track: Real-Time Tracking of RFID Tags with Stationary AntennasQingyun Zhang, Leixian Shen, Jiewen Shao, Fu Xiao. 83-88 [doi]
- Temperature-sensitive Fingerprinting on ECU Clock Offset for CAN Intrusion Detection and Source IdentificationXiaoyun Zhou, Ruobing Jiang, Miaoqing Tian, Haipeng Qu, He Zhang. 89-94 [doi]
- Ada3D: Real-Time 3D Reconstruction with Compression Rate AdaptationMuhong Wu, Shuai Yu, Xu Chen 0004. 95-99 [doi]
- Developing (Almost) Free Distributed System Labs Using Container-based TechniqueZichen Xu, Jie Cheng, Yuhao Wang, Hong Rao. 101-106 [doi]
- An Adaptive and Robust Model for WiFi-based LocalizationYajie Song, XianSheng Guo. 107-111 [doi]
- WiFi Based Passive Action Recognition with Fully-connected NetworkBiyun Sheng, Fu Xiao, Yuanrun Fang, Haiyan Wang. 113-117 [doi]
- Extracting Chinese Domain-specific Open Entity and Relation by Using Learning PatternsHongying Wen, Zhiguang Wang, Qiang Lu. 119-125 [doi]
- X-YOLO: A deep learning based toolset with multiple optimization strategies for contraband detectionHaoyue Wang, Wei Wang, Yao Liu. 127-132 [doi]
- A MOOC Courses Recommendation System Based on Learning BehavioursShengjun Yin, Kailai Yang, Hongzhi Wang. 133-137 [doi]
- Using Pupil Light Reflex for Fast Biometric AuthenticationShilin Yan, Shan Chang, Jiacheng Wang, Shanila Azhar. 139-143 [doi]
- Conscious Knowledge Based Question AnsweringShirong Liu, Zixian Guo, Hongzhi Wang. 145-149 [doi]
- Adaptive Multi-stage Multi-strategy Word Representation Learning in HowNetHao Teng, Yingjian Liu, Haoyu Yin, Yue Li. 151-155 [doi]
- A Novel Smartphone Identity Authentication MechanismShuo Zhao, Zhongwen Guo, Chuansheng Zhong, Lintao Xian, Yuan Liu. 157-161 [doi]
- Pricing Adjustment System for Spatial-Temporal Load of Charging StationYunhao Wang, Peng Xu, Wei Zheng, Hengchang Liu. 163-167 [doi]
- Context-aware Location Search on MapsYufan Sheng, Yu Hao. 169-173 [doi]
- KT-XL: A Knowledge Tracing Model for Predicting Learning Performance Based on Transformer-XLYu He, Xinying Hu, Zhongtian Xu, Guangzhong Sun. 175-179 [doi]
- SDMA: A SDN-based Architecture of Multi-modal AUVs NetworkHanjiang Luo, Chao Liu, Yu Luo, Xu Wang, Ziyang Xu, Yongquan Liang. 181-184 [doi]
- Fast and Precise Energy Consumption Prediction Based on Fully Convolutional Attention Res2NetChao Yang 0024, Zhongwen Guo, Yuan Liu. 185-189 [doi]
- Person Re-identification Based on Pose-guided Generative Adversarial NetworkGuang Han, Chao Yang, Jixin Liu, Ning Sun, Xiaofei Li. 191-195 [doi]
- Research on the Influencing Factors of User Trust Based on Artificial Intelligence Self Diagnosis SystemWeiheng Li, Xiangmin Fan, He Zhu, JingZheng Wu, Dongxing Teng. 197-202 [doi]
- A prediction model of cloud service concurrency based on interval and fluctuation factorsChen Liu, Shiyong Liu, Yinhua Lin. 203-209 [doi]
- A multi-objective optimal scheduling strategy for cloud service based on fluctuation costChen Liu, Shiyong Liu, Yinhua Lin. 211-217 [doi]
- A New Steganography Without Embedding Based on Adversarial TrainingWenjie Jiang, Donghui Hu, Cong Yu 0014, Meng Li 0006, Zhongqiu Zhao. 219-223 [doi]
- Stackelberg Game Based Edge Computing Resource Management for Mobile BlockchainYuqi Fan, Guangming Shen, Zhifeng Jin, Donghui Hu, Lei Shi 0011, Xiaohui Yuan 0001. 225-229 [doi]
- Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition SystemsCan He, Mingfu Xue, Jian Wang, Weiqiang Liu. 231-235 [doi]
- Network Congestion Awareness in Cloud Data Center with Virtual Machine MigrationJiankang Dong. 237-241 [doi]
- Application of Kinect-based Multimedia Interactive Imaging in Small TheaterYingfang Zhang, Junren Zhou. 243-246 [doi]