Abstract is missing.
- Keynote SpeechWilly Susilo. [doi]
- GreenGame: Solving the climate crisis in a Game to actually take action in real lifeAna Carolina Costa César, Gabriela da Gama Pivetta, Fabiana Freitas Mendes. 1-8 [doi]
- Detection of A Novel Dual Attack in Named Data NetworkingLiang Liu 0012, Silin Peng. 1-8 [doi]
- EPGraph: An Efficient Graph Computing Model in Persistent Memory SystemBaoke Li, Cong Cao 0001, Fangfang Yuan, Yanbing Liu, Baohui Li, Binxing Fang. 9-17 [doi]
- CopGAT: Co-propagation Self-supervised Graph Attention NetworkBaoming Zhang, Ming Xu 0014, Mingcai Chen, Mingyuan Chen, Chongjun Wang. 18-25 [doi]
- Fair DMA Scheduler for Low-Latency Accelerator OffloadingIkuo Otani, Kei Fujimoto, Akinori Shiraga. 26-32 [doi]
- Multi-attribute decision-making method based on interval intuitionistic trapezoidal fuzzy number to determine the expert weight: * Note: Sub-titles are not captured in Xplore and should not be usedGuangzheng Liu, Xingang Wang. 33-39 [doi]
- A Comprehensive Study on Personalized Federated Learning with Non-IID DataMenghang Yu, Zhenzhe Zheng, Qinya Li, Fan Wu 0006, Jiaqi Zheng. 40-49 [doi]
- Binary-level Directed Symbolic Execution Through Pattern LearningZhijie Zhang, Liwei Chen, Haolai Wei, Guochao Dong, Yuantong Zhang, Xiaofan Nie, Gang Shi. 50-57 [doi]
- An Efficient Metric-Based Approach for Static Use-After-Free DetectionHaolai Wei, Liwei Chen, Xiaofan Nie, Zhijie Zhang, Yuantong Zhang, Gang Shi. 58-65 [doi]
- A Graph Convolution Neural Network Based Method for Insider Threat DetectionKexiong Fei, Jiang Zhou, Lin Su, Weiping Wang, Yong Chen 0001, Fan Zhang. 66-73 [doi]
- IceBerg: Deep Generative Modeling for Constraint Discovery and Anomaly DetectionWentao Hu, Dawei Jiang, Sai Wu, Ke Chen 0005, Gang Chen 0001. 74-81 [doi]
- Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL ApproachWen Wang, Junchao Fan, Xiaofeng Peng, Ye Yang, Chun-Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Hongyue Kang, Xiaolin Chang. 82-89 [doi]
- GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link PredictionYueiia Wu, Jian-Tao Zhou. 90-97 [doi]
- Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social NetworksChuan Zhang 0003, Mingyang Zhao, Tong Wu, Weiting Zhang, Qing Fan, Liehuang Zhu. 98-105 [doi]
- SCGraph: Accelerating Sample-based GNN Training by Staged Caching of Features on GPUsYuqi He, Zhiquan Lai, Zhejiang Ran, LiZhi Zhang, Dongsheng Li 0001. 106-113 [doi]
- Structure-Noise-Aware Anchor Link Prediction Across Social NetworksDongwei Zhu, Peng Zhang, Wenhao Zhu, Minghao Tang, Wenyu Zang, Hongbo Xu. 114-120 [doi]
- Service Caching and Task Offloading of Internet of Things Devices Guided by Lyapunov OptimizationNianxin Li, Xiumin Zhu, Yumei Li 0008, Lingling Wang, Linbo Zhai. 121-128 [doi]
- Accelerating cryo-EM Reconstruction of RELION on the New Sunway SupercomputerJingle Xu, Jiayu Fu, Lin Gan, Yaojian Chen, Zhenchun Huang, Guangwen Yang. 129-138 [doi]
- NFT-basedAccess Control in Named Data NetworksHui Zhao, Xiaodong Zhang, Ru Li. 139-146 [doi]
- Mapping Declarative Queries to Heterogeneous Biological Databases using Schema Graphs for Intelligent ResponsesHasan M. Jamil, Kallol Naha. 147-154 [doi]
- File system to support secure cloud-based sharingKensho Yamamoto, Toshio Hirotsu. 155-162 [doi]
- Discovering Agent Models using Process Mining: Initial Approach and a Case StudyRob H. Bemthuis, Sanja Lazarova-Molnar. 163-172 [doi]
- Towards Agent-based Simulation of the Parallel Trading Market of PharmaceuticalsRuhollah Jamali, Sanja Lazarova-Molnar. 173-181 [doi]
- Context-aware Community Evolution Prediction in Online Social NetworksAlexander Lercher, Nishant Saurabh, Radu Prodan. 182-189 [doi]
- Intrusion Detection for Marine Meteorological Sensor NetworkXin Su, Guifu Zhang, Minxue Zhang, Baoliu Ye, Hongyan Xing. 190-196 [doi]
- A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion Detection in Marine Meteorological Sensor NetworksXin Su, Tian Tian, Lei Cai, Baoliu Ye, Hongyan Xing. 197-203 [doi]
- FAWS: Fault-Aware Weight Scheduler for DNN Computations in Heterogeneous and Faulty HardwareShaswot Shresthamali, Yuan He 0002, Masaaki Kondo. 204-212 [doi]
- A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIMQing Wang, Lizhe Zhang, Xin Lu, Kenian Wang. 213-219 [doi]
- DIPool: Degree-Induced Pooling for Hierarchical Graph Representation LearningHualei Yu, Yirong Yao, Jinliang Yuan, Chongjun Wang. 220-227 [doi]
- A Secure and Efficient USB-based In-band Communication Interface between Host and BMCHongwei Liu, Haojun Xia, Bibo Tu, Da Zhang, Xiaotong Wang. 228-237 [doi]
- BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability DetectionNingning Cui, Liwei Chen, Gewangzi Du, Tongshuai Wu, Chenguang Zhu, Gang Shi. 238-245 [doi]
- LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU VirtualizationChen Lv, Fuxin Zhang, Xiang Gao, Chen Zhu. 246-253 [doi]
- Curse of Feature Selection: a Comparison Experiment of DDoS Detection Using Classification TechniquesWenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe. 262-269 [doi]
- Parallel Processing Techniques for Analyzing Large Video Files: a Deep Learning Based ApproachAzhar Talha Syed, Shikharesh Majumdar. 270-279 [doi]
- A Distributed Cache Mechanism of HDFS to Improve Learning Performance for Deep Reinforcement LearningYongqiang Gao, Shunyi Feng, Zhenkun Li. 280-285 [doi]
- Short-Time Traffic Flow Prediction Based on K-means++ and LSTMJia Li, Gang Xu, Yuan Cheng, Baoqi Huang. 286-293 [doi]
- Knowledge-aware Graph Attention Network with Distributed & Cross Learning for Collaborative RecommendationYang Dai, Shunmei Meng, Qiyan Liu, Xiao Liu. 294-301 [doi]
- Attribute encryption based access control methods under airborne networksZhijun Wu, Zhenghang You, Peng Wang. 302-306 [doi]
- Discrete Event Simulation in Cloud-Edge Manufacturing Environments: Performance, Energy and Cost Trade-offsMoustafa Faheem, Adrian Murphy, Vishal Sharma, Carlos Reaño. 307-314 [doi]
- A Dual-stage Attention Based SDN Traffic Prediction MethodChenjing Gao, Junli Wang, ChunGang Yan. 315-322 [doi]
- A Large Scale Document-Term Matching Method Based on Information RetrievalJinchao Feng, Runbo Zhao, Jianguo Jiang. 323-330 [doi]
- System-level Implications of Serverless: Workload Characterizing and Performance UnderstandingDeshi Deng, Yanying Lin, Kejiang Ye. 331-338 [doi]
- A Hybrid Model for QoS Prediction based on Improved Conditional Variational AutoencoderMengwei Wu, Qin Lu, Yingxue Wang, Yichao Wang, Huanyu Chen, Weixiao Li. 339-346 [doi]
- Dynamic QoS Prediction Based on Attention Mechanism and Recurrent Neural NetworkYingxue Wang, Qin Lu, Yichao Wang, Mengwei Wu, Weixiao Li. 347-354 [doi]
- CNNBooster: Accelerating CNN Inference with Latency-aware Channel Pruning for GPUYuting Zhu, Hongxu Jiang, Runhua Zhang, Yonghua Zhang, Dong Dong. 355-362 [doi]
- Towards Efficient Elastic Parallelism for Deep Learning ProcessorJinyu Cheng, Ruyi Qian, Qinwen Shi, Gaomei Hu, Mengjuan Gao, Qirun Huo, Yuanchao Xu 0002. 363-370 [doi]
- A Blockchain-Based Multi-Cloud Storage Data Consistency Verification SchemeFeiyu Wang, Jian-Tao Zhou 0002, Hao Wang, Xu Guo. 371-377 [doi]
- A Novel Adaptive Computation Offloading Strategy for Collaborative DNN Inference over Edge DevicesYansong Zhang, Xiao Liu 0004, Jia Xu 0010, Dong Yuan, Xuejun Li. 378-385 [doi]
- MVDetecter: Vulnerability Primitive-based General Memory Vulnerability DetectionXiaofan Nie, Haolai Wei, Liwei Chen, Zhijie Zhang, Yuantong Zhang, Gang Shi. 386-393 [doi]
- Improving Write Performance for LSM-tree-based Key-Value Stores with NV-CacheXuzhen Jiang, Miao Cai, Baoliu Ye. 394-401 [doi]
- Optimizing All-to-All Collective Communication on Tianhe SupercomputerJintao Peng, Jie Liu, Yi Dai, Min Xie, Chunye Gong. 402-409 [doi]
- Task Migration Based on Deep Reinforcement Learning in Mobile CrowdsourcingYongqiang Gao, Zhigang Wang, Zemin Li, Zhenkun Li. 410-417 [doi]
- Performance comparison of distributed in memory databases in dynamic fog environmentsGeorge Vlahavas, Anna-Valentini Michailidou, Theodoros Toliopoulos, Vasileios G. Psomiadis, Anastasios Gounaris, Athena Vakali. 418-425 [doi]
- Automated Fact-Checking of Articles Related to Neurodevelopmental DisordersAbhishek Dhankar, An Bui, Jeremy Costello, Manpreet Kaur, Osmar R. Zaïane, François Bolduc. 426-434 [doi]
- Risk Perception and Misinformation in Brazilian Twitter during COVID-19 InfodemicRafael S. Medina Ferreira, Ana Paula Couto da Silva, Fabricio Murai. 435-442 [doi]
- Learning to Process Topic Aware Queries on Geo-Textual Streaming DataMayur Patil. 443-450 [doi]
- Analysis of Behavioral Facilitation Tweets Considering the Emotion of Disaster VictimsFuto Yamamoto, Tadahiko Kumamoto, Akiyo Nadamoto. 451-457 [doi]
- Reuse-Aware Partitioning of Dataflow Graphs on a Tightly-Coupled CGRANikhil Sambhus, Tarek S. Abdelrahman. 458-467 [doi]
- Threat Modeling and Reasoning for Industrial Control System AssetsShuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han, Peng Chen. 468-475 [doi]
- Collar Data Synthesis and Its Application for Generating Virtual Collar 3D Novel View from a Single-ViewNa Guo, Pei-wei Tsai, Hongwang Xiao, Chang Wu, Wenjuan Duan. 476-481 [doi]
- Zero-shot Topic Classification via Automatic Tagging on Chinese Text DatasetsXinyi Cai, Jiao Tian, Ke Yu, Hongwang Xiao, Kai Zhang, Pei-wei Tsai. 482-488 [doi]
- GreenBFS: Space-Efficient BFS Engine for Power-aware Graph ProcessingXinbiao Gan, Peilin Guo, Guang Wu, Tiejun Li. 489-496 [doi]
- Establishing a Generalizable Framework for Generating Cost-Aware Training Data and Building Unique Context-Aware Walltime Prediction Regression ModelsManikya Swathi Vallabhajosyula, Rajiv Ramnath. 497-506 [doi]
- Multi-Antenna Based Fast Routing Recovery Protocol for Dynamic UAV NetworksChuanxin Zhou, Chao Dong, Xiaojun Zhu, Lei Zhang. 507-514 [doi]
- Sliding Focal Loss for Class Imbalance Classification in Federated XGBoostJiao Tian, Xinyi Cai, Kai Zhang, Hongwang Xiao, Ke Yu, Pei-wei Tsai. 515-522 [doi]
- Routing Strategy for SDN Large Flow Based on Deep Reinforcement LearningYu Ke, Junli Wang, ChunGang Yan, Jiamin Yao. 523-530 [doi]
- VRFormer: 360-Degree Video Streaming with FoV Combined Prediction and Super resolutionZhihao Zhang, Haipeng Du, Shouqin Huang, Weizhan Zhang, Qinghua Zheng. 531-538 [doi]
- Optimal Node Selection in Communication and Computation Converged IoT NetworkRolden Fereira, Chathurika Ranaweera, Jean-Guy Schneider, Kevin Lee. 539-547 [doi]
- BPMN++: Comprehensive Business Process Modeling for Industrial Internet ApplicationHangyu Cheng, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Zhen Wang. 548-555 [doi]
- PPSS: A Privacy-Preserving Supervision Scheme Based on BlockchainMing Chen, Peichang Shi, Xiang Fu, Feng Jiang, Fei Gao, Penghui Ma, Jinzhu Kong. 556-561 [doi]
- Energy Aware Adaptive Scheduling of WorkflowsMehul Warade, Kevin Lee, Chathurika Ranaweera, Jean-Guy Schneider. 562-570 [doi]
- OpenLog: Incremental Anomaly Classification with Changing, Unbalanced and Unknown LogsZhibin Xu, Jiang Zhaoxue, Tong Li 0012, Junling You, Bingzhen Wu, Liangxiong Li. 571-580 [doi]
- AIS Data-Based Efficient Ship Trajectory ClusteringRuli Xu, Ryan Wen Liu, Jiangtian Nie, Xianjun Deng, Zehui Xiong, Wenchao Jiang, Han Yu 0001, Dusit Niyato. 581-588 [doi]
- Blockchain-based Distributed Storage System for Task Offloading in Vehicular Edge ComputingYutian Zhang, Bing Tang, Qing Yang, Xiaoyuan Zhang, Jincheng Luo. 589-596 [doi]
- Robust and Unsupervised KPI Anomaly Detection Based on Highly Sensitive Conditional Variational Auto-EncodersShili Yan, Bing Tang, Qing Yang, Yijia He, Xiaoyuan Zhang. 597-604 [doi]
- Non-Cooperative Game for Edge Server Placement in Wireless Body Area NetworkXiaolong Xu 0001, Yiming Fei, Xiaokang Zhou, Xiaoyong Li, Yong Cheng, Lianyong Qi, Wanchun Dou. 605-612 [doi]
- Protection of Location Private Privacy with Recommendation from a Decision Tree AlgorithmZhenyu Zhang, Hongjun Dai. 613-620 [doi]
- Learning Dynamic Behavior Patterns for Fraud DetectionZijun Huang, Junhang Wu, Lingfei Ren, Ruimin Hu, Dengshi Li. 621-627 [doi]
- Parallel Deployment of VNFs in Service Function Chain: Benefit or Not?Kaiwen Ning, Hao Wang, Zhiheng Zhang, Zhou Xu, Xiaowei Shu. 628-635 [doi]
- An Optimized Scheduling Algorithm for the Multi-channel Hyperledger FabricOu Wu, Shanshan Li 0002, He Zhang 0001, Liwen Liu, Yanze Wang, Haoming Li. 636-643 [doi]
- Per-Flow Size Measurement by Combining Sketch and Flow Table in Software-Defined NetworksZhaorong Qian, Guoju Gao, Yang Du 0006. 644-651 [doi]
- Integrity Audit Method for Cloud Data Based on BlockchainHui Qi, Hang Li, Shuwen Huang, Peipei Li, Weiyi Dai, Chunbo Wang. 652-659 [doi]
- Location-aware Task Offloading in Mobile Edge ComputingYongqiang Gao, Jixiao Li. 660-667 [doi]
- Design and Implementation of SFC Monitoring and Alerting Based on YANG Data ModelYaru Ding, Yintan Ai, Xiaomin Zhang, Hua Li, Xianrong Wang, Hongwei Ruan. 668-675 [doi]
- Efficient Face Recognition via Multi-UAV-Edge Collaboration in UAV Delivery ServiceYi Xu, Ruyi Guo, Xiao Liu 0004, Haoyu Luo, Chengzu Dong, Aiting Yao, Xuejun Li. 676-683 [doi]
- An Effective Buffer Overflow Detection With Super Data-Flow GraphsYuantong Zhang, Liwei Chen, Xiaofan Nie, Gang Shi. 684-691 [doi]
- Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition SystemsJianbin Ye, Fuqiang Lin, Xiaoyuan Liu, Bo Liu 0014. 692-699 [doi]
- An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge GraphXiaohan Ma, Chen Li, Bibo Tu. 700-707 [doi]
- Whether Cache Advertisement is Necessary for Content Providers in CDNs? Model and AnalysisXiaodong Dong, Binlei Cai. 708-714 [doi]
- An Automatic Modeling Method for Web Service Business Processes towards CPN Model CheckingTao Sun 0002, Kangshuai Zuo, Wenjie Zhong. 715-721 [doi]
- Distributed ADMM Based on Sparse Computation and Allreduce CommunicationZeyu Zhang, Yongmei Lei, Dongxia Wang, Guozheng Wang. 722-729 [doi]
- WGeod: A General and Efficient FPGA Accelerator for Object DetectionZihan Wang, Mengying Zhao, Lei Gong, Chao Wang. 730-738 [doi]
- Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFSCan Jiang, Duanyang Liu, Xiaoli Zhang, Kun Zhou, Hongbing Cheng. 739-746 [doi]
- Distributional Knowledge Transfer for Heterogeneous Federated LearningHuan Wang, Lijuan Wang, Jun Shen 0001. 747-754 [doi]
- Container Shipping Route Recommendation System by Modeling Logistics System with the Ambient CalculusToru Kato 0002, Masahiro Higuchi, Hiroshi Ohyama, Yoshiaki Kawamura, Ryotaro Ohno. 755-763 [doi]
- Best Community Discovery on Dynamic Social NetworksChuanyu Zong, Wenlu Wu, Tao Qiu, Anzhen Zhang, Xiufeng Xia. 764-773 [doi]
- SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoTWenyue Wang, Shanshan Wang 0003, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen. 774-781 [doi]
- Logit Calibration for Non-IID and Long-Tailed Data in Federated LearningHuan Wang, Lijuan Wang, Jun Shen. 782-789 [doi]
- Knowledge Graph-based Intent Network-Enhanced Web Services RecommendationLisheng Chen, Buqing Cao, Xiang Xie, Yueying Qing, Guosheng Kang, Jianxun Liu. 790-797 [doi]
- A New NVM Storage System with High Throughput Device DriverTai Cai, Jianfei Da, Deiiao Niu, Lei Li, Jianchong Shi, Ranzhuo Li. 798-805 [doi]
- MultiAddIntent: Efficient RDF Data-Oriented Incremental Construction Concept Lattice AlgorithmLiu Yang, Guohui Li, Meihong Xiao, Shuai Luo, Yangying Tan, Ziqiang Tang, Shuai Mu. 806-814 [doi]
- Access control method for air ticket distribution system based on blockchainLizhe Zhang, Tong Wang, Zhijun Wu. 815-821 [doi]
- ASPGen-D: Automatically Generating Fine-grained Apparmor Policies for DockerChenlin Huang, Keming Wang, Yun Li, Jiajian Li, Qing Liao. 822-829 [doi]
- An Automatic Coarse-Fine-Granularity Modeling Method for IoT System toward THCPN model checkingTao Sun 0002, Xiaoyu Qi, Wenjie Zhong. 830-837 [doi]
- Secure deduplication method based on tag clusteringFengkun Gao, Chunbo Wang, Xiaoqiang Di, Jinhui Cao, Xu Liu 0010, Hui Qi. 838-844 [doi]
- Checking Composition-Aware Service SubstitutabilityHanen Ochi, Kais Klai. 845-853 [doi]
- Optimal Supervisory Control of Opacity for Modular SystemsNour Elhouda Souid, Kais Klai, Chiheb Ameur Abid, Samir Ben Ahmed. 854-861 [doi]
- Indoor Intelligent IoT Datasets for Behavioral Learning and Autonomous Decision MakingHuaisheng Ye, Haibo Luo. 862-869 [doi]
- Efficient Stencil Computation with Temporal Blocking by Halide DSLHiroki Aikawa, Toshio Endo, Tomoya Yuki, Takahiro Hirofuchi, Tsutomu Ikegami. 870-877 [doi]
- An acceleration method of optical flow calculation for automotive ADASWenjie Chen, Ruixin Sun, ZhiLei Chai. 878-887 [doi]
- TailCmp - A Tail Latency Evaluation Solution of Public Cloud and Labeled von Neumann Architecture based Cloud PrototypeXiangyu Kong, Xuesong Gao, Shibao Pan, Yizhi Zhou, Yanan Yang, Laiping Zhao, Heng Qi. 888-895 [doi]
- Spatio-Temporal Aware Knowledge Graph Embedding for Recommender SystemsLiu Yang, Xin Yin, Jun Long, Tingxuan Chen, Jie Zhao, Wenti Huang. 896-902 [doi]
- Hawkeye: Efficient In-band Network Telemetry with Hybrid Proactive-Passive MechanismKai Zhang, Wei Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao. 903-912 [doi]
- Profile-Guided Parallel Task Extraction and Execution for Domain Specific Heterogeneous SoCLiangliang Chang, Joshua Mack, Benjamin Willis, Xing Chen 0004, John Brunhaver, Ali Akoglu, Chaitali Chakrabarti. 913-920 [doi]
- An adaptive traffic sign recognition scheme based on deep learning in complex environmentJunguo Liao, Yixun Zhou, Qiangqiang Qin. 921-928 [doi]
- A Blockchain- Based Copyright Protection System for Short VideosWenhao Zhao, Xin Lin, Yuxin Chen, Yue Hong, Wei Zheng. 929-936 [doi]
- Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS BlockchainMinghao Fu, Haoran Zhu, Jelena V. Misic, Vojislav B. Misic, Jing Bai 0009, Xiaolin Chang. 937-944 [doi]
- A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering AlgorithmGuanghui Feng, Guojun Wang 0001, Tao Peng 0011, Xiaofei Xing, Shuhong Chen, Peiqiang Li. 945-952 [doi]
- Personalized Privacy-Preserving Information Fusion in Mobile CrowdsensingZheqi Feng, Tao Peng 0011, Guo-Jun Wang 0001, Kejian Guan. 953-960 [doi]