Abstract is missing.
- Recognition Of Learners' Personality Traits For Software Engineering EducationBin Xu, Qiaoqiao Zhang, Kening Gao, Ge Yu 0001, Zhaowu Zhang, Yidi Du. 1-7 [doi]
- Designing a Course of Programming Language Foundations that Closely Combines PracticeYu Zhang, Youwen Ouyang. 8-14 [doi]
- Reliable and Secure Data Sharing in Decentralized Mobile Crowd SystemsZhenni Feng, Junchang Chen, Fanbo Xu. 15-22 [doi]
- The Study Based On The Deep Learning For Indian Ocean Dipole (IOD) Index PredicationYuan Feng, Chen Li, Tianying Sun. 23-27 [doi]
- Study On Long Term Sea Surface Temperature (SST) Prediction Based On Temporal Convolutional Network (TCN) MethodYuan Feng, Tianying Sun, Chen Li. 28-32 [doi]
- Privacy-preserving Decentralized Federated Deep LearningXudong Zhu, Hui Li. 33-38 [doi]
- Intelligent Control System for Cigarette Processing Based on Deep LearningShunpeng Pang, Junhua Jia, Baoqi Guo, Xiangqian Ding, Shusong Yu. 39-43 [doi]
- Fighting Adversarial Images With Interpretable GradientsKeke Du, Shan Chang, Huixiang Wen, Hao Zhang. 44-48 [doi]
- Cross-chain Workflow Model Based on Trusted RelayXianzhe Wu. 49-53 [doi]
- A Competence-Based Three-Layer Cybersecurity Education Framework and Its ApplicationQiang Liu 0004, Wentao Zhao, Ruijin Wang, Jiangyong Shi. 54-60 [doi]
- A Passenger Flow Transfer Prediction Model for Collinear Stations Based on Connection Model of New StationWenlong Yu, Huizhen Zhang, Jiawei Pan. 61-66 [doi]
- Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural NetworksZhuang Liu, Ye Lu, Xueshuo Xie, Yaozheng Fang, Zhaolong Jian, Tao Li 0022. 67-71 [doi]
- EtherH: A Hybrid Index to Support Blockchain Data QueryPengting Du, Yingjian Liu, Yue Li, Haoyu Yin, Limin Zhang. 72-76 [doi]
- Ship Detection in Large-scale SAR Images Based on Dense Spatial Attention and Multi-level Feature FusionLimin Zhang, Yingjian Liu, Qingxiang Guo, Haoyu Yin, Yue Li, Pengting Du. 77-81 [doi]
- Spatial and Dual-channel Temporal Convolution Networks: A Novel Method for Speed ForecastingChuanhao Dong, Jianbo Li, Zhiqiang Lv, Wei Zhao. 82-86 [doi]
- Fast Anomaly Detection based on Data Stream in Network Intrusion Detection SystemYihong Yang, Xiaolong Xu 0001, Lina Wang, Weiyi Zhong, Chao Yan, Lianyong Qi. 87-91 [doi]
- An Edge Server Placement Algorithm based on Genetic AlgorithmZhexuan Hu, Xiaolong Xu, Jinhui Chen. 92-97 [doi]
- Information Security Risk Analysis of Intelligent Terminals in Electricity Information Collection SystemTong Li, Heyang Sun, Chao Yang, Shuai Ren, Gang Wang, Jinliang Song, Xue Jiang. 98-103 [doi]
- MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural NetworksCongcong Chen, Lifei Wei, Lei Zhang, Jianting Ning. 104-109 [doi]
- Efficient and Privacy-preserving Distributed Face Recognition Scheme via FaceNetXiaoyu Kou, Ziling Zhang, Yuelei Zhang, Linlin Li. 110-115 [doi]
- Exploiting Temperature-Varied Voltage Fingerprints for In-vehicle CAN Intrusion DetectionDong Li, Miaoqing Tian, Ruobing Jiang, Ke Yang. 116-120 [doi]
- Model Fusion of LightGBM and SAKT for Knowledge TrackingXin Zhou, LiMing Zhang, Fanqi Meng. 121-125 [doi]
- BSLKT: A Bagging Model with Self-Attention and LightGBM for Knowledge TracingZhuoxu Zhang, Haoyun Li. 126-130 [doi]
- A Language Model for Intelligent Speech Recognition of Power DispatchingQing Zhao, Tingrui Li, Rui Luo, Rui Li, Tianyu Han, Dongsheng Han. 131-135 [doi]
- Joint Offloading and Resource Allocation in Cooperative Blockchain-Enabled MEC SystemWenya Fan, Wenqian Zhang, Luyao Wang, Tangyou Liu, Guanglin Zhang. 136-140 [doi]
- Chinese NER Using ALBERT and Multi-word InformationHanchen Xu, Zhenxiang Chen, Shanshan Wang 0003, Xiaoqing Jiang. 141-145 [doi]
- Blockchain-based microgrid distributed power transaction modelZhenhua Yan, Chang Liu, Xuwei Xia, Yongliang Li, Bo Gao. 146-150 [doi]
- Trusted Data Interaction Technology Based on Alliance ChainQinghai Ou, Jizhao Lu, Ningchi Zhang, Yanru Wang, Xinjian Shu, Chenbin Qiao, Wenjie Ma. 151-158 [doi]
- Research on new energy trading system based on blockchainLongYing Ouyang, SongChao Yan, Jun Zhu. 159-165 [doi]
- Adaptive VNF Scaling Approach with Proactive Traffic Prediction in NFV-enabled CloudsJing Tao, Zhengjia Lu, Yan Chen, Jiawei Wu, Peng Yu, ChengHao Lei. 166-172 [doi]
- Edge Computing Task Offloading Method for Load Balancing and Delay OptimizationHuiping Meng, Shi Wang, Feng Gao, Jizhao Lu, Yue Liu, Yong Mei. 173-178 [doi]
- SQL Injection Attack Detection Framework Based on HTTP TrafficZhongDong Zhu, Shilin Jia, JiShuai Li, Su-Juan Qin, Hui Guo. 179-185 [doi]
- Intelligent BERT-BiLSTM-CRF Based Legal Case Entity Recognition MethodMingdong Sun, Zhixin Guo, Xiaolong Deng. 186-191 [doi]
- Automatic Tracking System of LEO Satellite Based on SGP4Kaiyuan Liu, Jingli Hao, Junjie Yang, Yuhuang Ye, Fuji Yang, Chao Guo. 192-199 [doi]
- Research on outlier detection of data based on machine learningChunyang Wang. 200-203 [doi]
- Spatial Graph Convolutional and Temporal Involution Network for Skeleton-based Action RecognitionHuifan Wan, Guanghui Pan, Yu Chen, Danni Ding, Maoyang Zou. 204-209 [doi]
- Deformation Medical Image Registration Algorithm Based On Deep Prior Optical Flow NetworkLujin Li, Hailiang Wang, Jinrong Hu, Yan Zhang. 210-215 [doi]
- Lossless Database Watermarking Based on Order-preserving EncryptionSong Yan, Shuli Zheng, Baohong Ling, Donghui Hu. 216-223 [doi]
- Research on the Forecast of Workshop Production Abnormity under Cloud Manufacturing EnvironmentRui Bai, Zhou Fang, Chao Ma 0017, Hai Huang, Wanjuan Xie. 224-232 [doi]
- Video steganography algorithm based on the relative relationship between DWT coefficientsJingbo Mao, Ma Zhu, Chunfang Yang, Huayuan Lu. 233-240 [doi]
- Multi-domain Reversible Data Hiding in JPEG ImagesWanli Lv, Hongnian Guo, Yang Du, Jinmin Hu, Zhaoxia Yin. 241-247 [doi]
- Multiple color medical images zero-watermark scheme based on quaternion generalized Fourier descriptor and QR codeBaowei Wang, Weishen Wang, Peng Zhao. 248-253 [doi]
- Generating Watermarked Speech Adversarial ExamplesYuMin Wang, Jingyu Ye, Hanzhou Wu. 254-260 [doi]
- Research on Adaptive Target Tracking Method Based on Millimeter Wave RadarLihua Zhu, Xuehang Wei, Qiwen Zheng, Yu Wang. 261-265 [doi]
- MAFAWD: An Adaptive Weight Distribution Clustering Algorithm Based on Multi-layer Attribute FusionQiuru Fu, Du Xu, Wenlong Chen, Yuhang Zhang, Guanghui Su, Shuang Zhou. 266-272 [doi]
- Risk Rating Framework of Power Grid Business Entities Based on AHPZhiLin Duo, Zewen Chen, Ye Liang, Mingtao Dai, Hui Guo. 273-277 [doi]
- Deep sea nodule mineral image segmentation algorithm based on Mask R-CNNLihui Dong, Haolin Wang, Wei Song, Jianxin Xia, Tongmu Liu. 278-284 [doi]