Abstract is missing.
- FC+: Near-optimal Deadlock-free Expander Data Center NetworksXiao Zhang, Peirui Cao, Yongxi Lyu, Qizhou Zhang, Shizhen Zhao, Xinbing Wang, Chenghu Zhou. 1-9 [doi]
- Time Fairness-Based Application Offloading in Mobile Edge Computing with Individual QoS GuaranteeMengwei Xie, LiZhen Cui, Jianxiong Liu, Wei Guo, Feng Li. 10-17 [doi]
- DySched: Relieving Large-Scale Incast for Cloud-Native RDMA ApplicationsJiejian Wu, Zhe Wang 0015, Teng Ma, Linghe Kong, Yutong Liu, Zhuo Song, Jiadi Yu, Yong Yang, Tao Ma, Guihai Chen. 18-25 [doi]
- Hierarchical Sketch: An Efficient Solution for Threshold-t Flows Measurement in High-Speed NetworksYifan Han, He Huang 0001, Yang Du 0006, Yu-e Sun, Jia Liu, Hongli Xu. 26-33 [doi]
- ADSwitch: Adaptive CPU Scheduling for Distributed SystemsYidong Zhong, Yang Ao, Dingding Li, Jianguo Li, Deze Zeng. 34-41 [doi]
- A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding ServicesKun Meng, Lijun Sun, Xiao Chen, Haiqin Wu, Shuaiyong Li. 42-49 [doi]
- K-means ++ and Reinforcement Learning-Based Clustering Method to Achieve Energy Efficiency in Underwater Acoustic Sensor NetworksTao Xiong, Rui Hou 0003, Lingyun Zhou, Guanglin Xing, Deze Zeng. 50-55 [doi]
- FedEntropy: Efficient Federated Learning for Non-IID Scenarios Using Maximum Entropy Judgment-based Client SelectionZhiwei Ling, Zhihao Yue, Jun Xia, Ting Wang 0001, Mingsong Chen, Xiang Lian. 56-63 [doi]
- Secure, Efficient, and Privacy-Protecting One-to-Many Cross-Chain Shared Data Consistency AuditDan Li 0018, Panpan Ding, YuQian Zhou, Yuguang Yang 0001, Chenting Li. 64-71 [doi]
- Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice CryptographyWei Liao, Lansheng Han, Peng Chen. 72-79 [doi]
- DRAS: A Scheduling Algorithm for Cloud-Based DAG with Deadline ConstraintsWei Zheng, Jinglong Deng, Zihan Nan, Peixuan Lin, Yue Hong. 80-87 [doi]
- Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNsXin Zhai, Lijie Xu, Jialei Zhang, Kun Wang, Jia Xu, Bei Xu. 88-95 [doi]
- Predictive Queue-based Low Latency Congestion Detection in Data Center NetworksPingping Dong, Xiaojuan Lu, Tairan Huang, Liying Chen, Yang Yang, Lianming Zhang. 96-103 [doi]
- VSNT: Adaptive Network Traffic Forecasting via VMD and Deep Learning with SCI-Block and Attention MechanismPingping Dong, Yuning Zuo, Liying Chen, Shangyu Li, Lianming Zhang. 104-109 [doi]
- Constructing Future Vehicle Digital Twins with Insights from Cloud-Edge CollaborationXin Shi, Liang Zhao 0004, Na Lin 0001, Lexi Xu, Ammar Hawbani, Yuanguo Bi. 110-117 [doi]
- Data Quality Assessment in Mobile Crowdsensing by Utilizing Psychology EffectZhehao Cheng, Jiaoyan Chen, Jin Liu, Mengyang Li. 118-124 [doi]
- Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node ClassificationQinghua Mao, Xi Lin, Gaolei Li, Lixing Chen, Yuchen Liu, Yuxin Qi, Jianhua Li. 125-130 [doi]
- All-Pairs SimRank Updates on Dynamic GraphsLiangfu Zhang, Cuiping Li 0001, Chuanwen Luo, Hong Chen 0001. 131-138 [doi]
- Localization and Tracking using ODE-LSTM Algorithm with Non-Line-of-Sight ChannelsXiao Zhao, Feng Tian, Ziling Shao. 139-144 [doi]
- Fine-grained IoT device identification method based on self-supervised ViTKai Peng 0001, Tong Lu, Song Mei, Nannan Xue, Yongchao Shen, Menglan Hu. 145-152 [doi]
- Deep Reinforcement Learning based Dynamic Channel Bonding for Wi-Fi NetworksHao Chen, Peng Liu 0047, Lizhao You, Ziyang Guo, Jiajun Luo, Xinghua Sun, Taotao Wang, Liqun Fu 0001. 153-160 [doi]
- A Genetic Algorithm Based Adaptive Offloading Scheme for Domain Generalization in VECTianyu Li, Liang Zhao 0004, Chaojin Mao, Na Lin, Qiang He 0002, Xingwei Wang 0001. 161-168 [doi]
- Lightweight Security Authentication Scheme for Vehicle-Road Collaboration using Physical Unclonable FunctionZhuoqun Xia, Chao Su, Zisang Xu, Kejun Long. 169-174 [doi]
- An Edge-oriented Deep Learning Model Security Assessment FrameworkPengbo Wang, Boyin Zhang, Shigeng Zhang, Xuan Liu. 175-182 [doi]
- Partitioning-based Active Trust Mechanism in Cloud-Edge-Device Collaborative Data CollectionZhuoqun Xia, Ziyu Wang, Xiao Liu. 183-190 [doi]
- Preserving Privacy of Input Features Across All Stages of Collaborative LearningJianrong Lu, Lulu Xue, Wei Wan, Minghui Li, Leo Yu Zhang, Shengqing Hu. 191-198 [doi]
- Adaptive Splitting Algorithm for Neural Network Modelling in AMPKaifei Zhang, Yuxiang Ma, Yulei Wu, Tao Chen, Huijie Ma. 199-206 [doi]
- Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-ThingsJing Long, Cuiting Luo, Ruxin Chen, Wei Liang 0005, Zheng Qin 0001. 207-212 [doi]
- Joint Request Offloading and Resource Allocation for Energy Efficient D2D Enabled Multi-type Inference ServicesZiyu Zeng, Jiale Huang, Jiaxin Wu, Jigang Wu. 213-220 [doi]
- Libra: A Space-Efficient, High-Performance Inline Deduplication for Emerging Hybrid Storage SystemTianmeng Zhang, Renhui Chen, Congming Gao, Youtao Zhang, Jun Yang, Jiwu Shu. 221-228 [doi]
- VLEO Satellite Radio Access Network Slicing: A Hierarchical Deep Reinforcement Learning ApproachJuan Luo, Ruoyu Xiao, Peng Sun, Ying Qiao. 229-236 [doi]
- Exploring Imbalances among Microservice Containers in Large Cloud PlatformsChenyu Lin, Shutian Luo, Huanle Xu. 237-245 [doi]
- Efficient Node Selection for Coding-based Timely Computation over Heterogeneous SystemsYuxuan Lin, Bin Tang, Siyuan Zhou, Zaipeng Xie, Baoliu Ye. 246-253 [doi]
- Parallel and Batch Multiple Replica Auditing Protocol for Edge ComputingYi Li, Wenying Zheng, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, C. Thamilarasi. 254-261 [doi]
- Discrete Geometric Coded Data Layout for Large-scale Object Storage SystemsYi Tian, Guangping Xu, Hongzhang Yang, Yue Ni, Jiaxi Cao, Lei Yang. 262-269 [doi]
- FinD: Fine-grained Dynamic Task Scheduling with Lightweight Threads on Many-core ProcessorsNan Hu, Chenglu Yan, Zhiguang Chen, Yutong Lu. 270-278 [doi]
- Software and Hardware Processing Method for Blockchain Light Node SPV VerificationZhan'gang Ma, Jiandong Yan, Feng Zou, Xixin Cao. 279-285 [doi]
- The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-FlyJiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng 0001, Wenjuan Li 0001. 286-293 [doi]
- Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO ModelKeyang Liu, Maxim Jourenko, Mario Larangeira. 294-304 [doi]
- GANDPS: Ensuring Both Detection Precision and Stability in GAN-based Anomaly Detection for Network TrafficLiuhuan Li, Ximin Yang, Xiao Zhang, Yumeng Yang, XueFeng Chen, Wan Tang. 305-310 [doi]
- Defending T-BFA in DNNs Efficiently via Random Security-Sensitive Weights SwitchingXiaohui Wei, Yumin Yan, Xiaonan Wang, Yi Hu, Hengshan Yue. 311-318 [doi]
- Parallel Integrity Authentication Data Structure Construction for Encrypted Range QueriesZhaokang Wang, Jiahui Pan, Lu Zhou, Zhonghui Zhang, Caocong Ji. 319-327 [doi]
- Evaluating Performance Portability of SYCL and Kokkos: A Case Study on LBM SimulationsYue Ding 0001, Chuanfu Xu, Haozhong Qiu, Qingsong Wang, Weixi Dai, Yongzhen Lin, Yonggang Che. 328-335 [doi]
- A Moving Target Defense Approach for the Distributed Dynamic NetworkLin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, FengHua Li, Liang Fang. 336-343 [doi]
- Low-overhead Privacy-preserving Location-based Skyline QueryYubo Peng, Xiong Li 0002, Shuai Shang, Xiaofen Wang, Xiaosong Zhang. 344-351 [doi]
- A BPF-Based Task Scheduling Scheme for Heterogeneous Multiprocessor SystemsJing Li, Peihao Yang, Linghe Kong, Guihai Chen. 352-359 [doi]
- Joint Resource Placement and Service Replica Placement Scheme in Mobile Edge ComputingSurafel Kifetew Woldeyes, Yongmin Zhang, Wei Wang, Zhaohui Li. 360-367 [doi]
- Cryptanalysis of Space-Hard Ciphers under Strong White-Box SecurityBin Li, Yufeng Tang, Yupeng Zhang, Hengxing Liu, Di Li, Zheng Gong. 368-374 [doi]
- Efficient Differentially Private Tensor Factorization in the Parallel and Distributed Computing ParadigmFeng Zhang 0012, Hao Wang, Ruixin Guo, Erkang Xue, Guangzhi Qu. 375-380 [doi]
- Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous DataChunming Liu, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang 0011, Cheng Zeng, Yang Yang. 381-387 [doi]
- FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data HeterogeneityZhen Wang, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Zeng Cheng, Yang Yang. 388-393 [doi]
- ERODRL: Efficient ISP Routing Optimization via Deep Reinforcement LearningChangrui Chen, Xiaolin Chen, Deze Zeng. 394-401 [doi]
- ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-DomainSiyuan Leng, FengHua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang. 402-409 [doi]
- An Active Security Defense Strategy for Microservices based on Deep Reinforcement LearningYuanbo Li, Hongchao Hu, Shuai Zhang, Guozhen Cheng, Wenyan Liu. 410-415 [doi]
- Parallel Implementation of SHA256 on Multizone Heterogeneous SystemsYongtao Luo, Jie Liu 0002, Tiaojie Xiao, Chunye Gong. 416-422 [doi]
- The Adaptive Fault-tolerant Routing Based on an Improved Local Security Information Model of the Exchanged HypercubeYazhi Zhang, Chuanwen Luo, Guijuan Wang, Li Zhang, Mengjie Lv, Jiguo Yu. 423-430 [doi]
- DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and MicroarchitectureCairui She, Liwei Chen, Gang Shi. 431-438 [doi]
- EBFT: Efficient BFT Consensus through Shortcut RepliesQingsheng Lei, Yongjun Xia, Qitao Guo, Rui Hao, Xiaohai Dai, Weiqi Dai. 439-446 [doi]
- Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEEShujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang. 447-455 [doi]
- Fast 2-out-of-n ECDSA Threshold SignatureLin Zhong, Yujue Wang, Jun Du, Daji Liang, Ziyuan Zhong, Kevin He, Andrew Zhang. 456-465 [doi]
- Cascade Meta-RCNN for Few-shot Object DetectionShuting Li, Qian Jiang, Xin Jin 0005, Nanqing Liu, Shiyu Chen, Shin-Jye Lee. 466-473 [doi]
- PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware DetectionJunwei Tang, Zilong Xu, Luyao Ye, Tao Peng 0006, Ruhan He, Xinrong Hu, Wenlong Tian. 474-481 [doi]
- Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical AnalysisYuming Lu, FengHua Li, Yitong Wen, Liang Fang, Shoukun Guo, Zifu Li. 482-490 [doi]
- Deep Reinforcement Learning-based Network Moving Target Defense in DPDKKe Shang, Weizhen He, Shuai Zhang, Zhen Zhang, Jichao Xie, Xin Shi. 491-499 [doi]
- SCRA: Systolic-Friendly DNN Compression and Reconfigurable Accelerator Co-DesignXun Zhang, Chengliang Wang, Xingquan Piao, Ao Ren, Zhetong Huang. 500-507 [doi]
- Efficient Hybrid Fuzzing with Syntax-aware Input Trim Based on Lightweight Taint AnalysisLong Gao, Yiru Zhao, Qihan Wan, Lei Zhao. 508-515 [doi]
- Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual RealityWangsheng Yan, Li Lin, Ruihong Huang, Jinbo Xiong, Tianqiang Huang, Mingwei Lin. 516-523 [doi]
- Semi-asynchronous Federated Learning Optimized for NON-IID Data Communication based on Tensor DecompositionQidong Wu, Xuemei Fu, Xiangli Yang, Ruonan Zhao, Chengqian Wu, Tinghua Zhang. 524-530 [doi]
- Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language ModelsSheng Yun, Md. Zakirul Alam Bhuiyan, Md. Taufiq Al Hasib Sadi, Shen Su. 531-538 [doi]
- GPU-Accelerated Maximal Bicliques Mining Framework for Large E-commerce NetworksJingdong Li, Zhao Li, Xiaoling Wang, Xingjian Lu, Ji Zhang, Hongyang Chen. 539-544 [doi]
- Application Research of Vertical Federated Learning Technology in Banking Risk Control Model StrategyYong Luo, Zhi Lu, Xiaofei Yin, Songfeng Lu, Yiting Weng. 545-552 [doi]
- A Novel Multi-scale Spatial Tiling Based Adaptive Streaming Method for 360° VideoHaipeng Du, Huichuan Liu, Geli Lv, Xin Lv, Zhiwen Wang, Weizhan Zhang. 553-560 [doi]
- DepotDB: Mitigate Write Amplification with Region Compaction on KV Stores for Periodic Write-Intensive WorkloadsZhixin Fan, Yaohui Zhang, Jiang Zhou, Bo Li, Yong Chen, Weiping Wang. 561-566 [doi]
- Graph-based Multi-view Clustering for Web servicesYang Wang, Zhenzhen Yuan, Guosheng Kang, Buqing Cao, Jianxun Liu 0001, Yong Xiao. 567-572 [doi]
- A NUMA-aware Graph Database for Hybrid Memory SystemShaoheng Tan, Chang Liu, Dingding Li, Yong Tang 0001, Deze Zeng. 573-580 [doi]
- Deep Reinforcement Learning to Enhance the Energy-efficient Performance of Unmanned Aerial Vehicles-enabled Fog Radio Access NetworksChuanjie Liu, Siyu Ren, Shuang Du, Cheng Dai, Bing Guo, Runzhi Fan. 581-586 [doi]
- Anomaly Detection in Battery Charging Systems: A Deep Sequence Model ApproachLi Zheng, Donghui Ding, Zhao Li, Jun Gao 0003, Jie Xiao, Hongyang Chen, Schahram Dustdar, Ji Zhang. 587-594 [doi]
- A Federated Learning Aggregation that Integrates Clustering and Momentum Correction Based on Historical High-Quality GradientsJian Xu, Bing Guo, Fei Chen, Yan Shen, Shengxin Dai, Cheng Dai. 595-602 [doi]
- EIF: A Mediated Pass-Through Framework for Inference as a ServiceYiming Gao, Zhen Wang, Weili Wu, Herman Lam. 603-611 [doi]
- Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge-IntelligenceZhihan Cao, Xi Zheng 0001, Jianxiong Guo, Weijia Jia 0001, Yang Xu, Tian Wang 0001. 612-619 [doi]
- Efficient Large Scale Reverse-time Migration Imaging Computation based on Distributed Spark Cluster with GPUsSuhui Wangzhang, Ruizhang Yang, Rong Gu, Bo Li, Dingjin Liu, Zhaokang Wang. 620-627 [doi]
- Continuous Complex Relational Community Detection on Multi-layer NetworksChuanyu Zong, Ziyi Cai, Wenju Li, Tao Qiu, Jiajia Li, Xiufeng Xia. 628-633 [doi]
- Transaction Data Management Optimization Based on Multi-Partitioning in Blockchain SystemsJingyu Zhang, Xingxing Hou, Yilong Teng, Lailong Luo. 634-639 [doi]
- Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AIJinke Cheng, Gaolei Li, Xi Lin 0003, Hao Peng 0001, Jianhua Li. 640-647 [doi]
- Partial Deep Domain Adaptation for Non-Intrusive Load MonitoringYuying Li, Yang Yang 0060, Chen Wang 0011, Runqin Liu, Hongbo Jiang, Wenping Liu 0001. 648-655 [doi]
- A High-Performance Data Verification Mechanism in Blockchain-Based IoT SystemsJingyu Zhang, Pian Zhou, Yongtao Sun, Lailong Luo. 656-661 [doi]
- A Space-Efficient Digital Wallet Service in Blockchain SystemsJingyu Zhang, Jin Yang, Chenghao Wu, Lailong Luo. 662-669 [doi]
- HBC: Combining Lossy and Lossless Hybrid Bilayer Compression Framework on Time-Series DataWanying Lu, Liang Liu 0006, Wenbin Zhai, Haoyuan Chen, Yulei Liu. 670-679 [doi]
- High-Order Faithful Interpretation Methods for Tensor-Based CNNsPengxu Chen, Huazhong Liu, Hanning Zhang, Jihong Ding, Yunfan Zhang, Dehua Chen. 680-687 [doi]
- Adaptive Fusion of Single-stream and Dual-stream Models based on Cross-modal Association Strength for Harmful Meme DetectionMeng Lin, Qinghao Huang, Xingyi Yu, Xianjing Guo, Tao Guo. 688-693 [doi]
- An Efficient Decentralized Mutual Authentication Scheme Between Avatars for MetaversePeng Huang, Zisang Xu, Wei Liang 0005, Jianbo Xu, Bin Zheng. 694-700 [doi]
- A Semantic-Driven Generative Information Extraction Framework Oriented to Patent TextYushan Zhao, Tengke Wang, Shunxiang Zhang. 701-708 [doi]
- Cross-subject Drowsiness Recognition Model Based on the Multi-scale Parallel Convolution of EEG ChannelsSongquan Li, Rongbo Zhu, Jun Yuan, Shaohua Wan 0001. 709-714 [doi]
- Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing EncryptionHongyi Qiao, Cong Peng 0005, Min Luo 0002, Po Wu, Debiao He. 715-723 [doi]
- A Distributed Storage System for System Logs Based on Hybrid Compression SchemeBaoming Chang, Fengxi Zhou, Zhaoyang Wang, Yu Wen, Boyang Zhang. 724-735 [doi]
- Twin Branch Transformers-Based Re-Ranking for Image RetrievalZiqi Wang, Wei Wang. 736-743 [doi]
- TGT: Churn Prediction in O2O Logistics with Two-tower Gated TransformerBaoshen Guo, Hai Wang, Hao Liu, Wei Gong 0001, Wei Xi, Xiaolei Zhou 0001, Shuai Wang 0008. 744-751 [doi]
- CP-EB: Talking Face Generation with Controllable Pose and Eye Blinking EmbeddingJianzong Wang, Yimin Deng, Ziqi Liang, Xulong Zhang 0001, Ning Cheng 0001, Jing Xiao 0006. 752-757 [doi]
- An SGX and Blockchain-Based System for Federated Learning in Classifying COVID-19 ImagesSihang Qin, Xianjun Gu, Xing Jun, Haitao Li, Mengqi Huang, Weiqi Dai. 758-765 [doi]
- Ant: An Efficient Lossless Compression Algorithm for IoT Time Series DataJunhui Li, Guangping Xu, Hongzhang Yang, Yulei Wu. 766-771 [doi]
- HKTGNN: Hierarchical Knowledge Transferable Graph Neural Network-based Supply Chain Risk AssessmentZhanting Zhou, Kejun Bi, Yuyanzhen Zhong, Chao Tang, Dongfen Li, Shi Ying, Ruijin Wang. 772-782 [doi]
- Hybrid Distribution Separation for Prediction of Heterogeneous Zero-Inflated Time SeriesZhixin Huang, Jia-Xiang Lin, Qianqian Chen, Zhenchang Zhang. 783-788 [doi]
- +-tree with Aligned Flush and Selective MigrationXianyu He, Runyu Zhang, Pengpeng Tian, Lening Zhou, Min Lian, Chaoshu Yang. 789-794 [doi]
- FSKY-Miner: Fast Mining of Skyline PatternsChengdong Chen, Wensheng Gan, Jiahui Chen, Shicheng Wan. 795-802 [doi]
- A Few-shot Learning Approach for Anomaly Detection in Cooperative Tracking Control SystemJieqi Rong, Weirong Liu 0001, Xiaoquan Yu, Wanwan Ren, Boyu Shu, Jun Peng 0001. 803-808 [doi]
- A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle NetworksKai Gao, Hao Huang, Linhong Liu, RongHua Du, Jinlai Zhang. 809-816 [doi]
- Multi-Head Self-Attention Enhanced Convolutional Neural Network for Driver Fatigue Detection using EEG SignalsKai Gao, Wenhao Jia, Yuxiang Zhou, RongHua Du. 817-823 [doi]
- Prediction of hydraulic pumps remaining useful life based on LSTM and Transform with dual self-attentionPeng Liu, Shanghong He, Kai Gao, Geng Yang, Junhui Zou, Longsheng Ye. 824-831 [doi]
- Energy Efficient Speed Planning of Electric Vehicles for Vehicle-Following Scenarios Using Data-driven Koopman ModelBin Chen, Miaoben Wang, Feng Zhou, Haoyang Yan, RongHua Du. 832-839 [doi]
- Autonomous cruise control of intelligent high-speed train with online energy-saving optimizationFeng Zhou, Hongkun Liang, Kewu Tao, Shuo Li 0006. 840-845 [doi]
- Hierarchical Data-driven Predictive Control Strategy for Energy Management of Electric VehiclesBin Chen, Guo He, Feng Zhou 0002, Hao Huang, Wei Liu, RongHua Du. 846-853 [doi]
- Research on Multi-vehicle Formation Control with the Assistance of the Characteristic Model in the Networked EnvironmentJin Guo, You Wu, Yi Lei, Guotan Liu, RongHua Du. 854-861 [doi]
- An Autoencoder-Driven FDIA Detection Method for Virtual Coupling Systems of Heavy-Haul TrainsWanwan Ren, Jun Peng 0001, Rui Zhang 0041, Jieqi Rong, Boyu Shu, Yongting Liu, Yingze Yang. 862-867 [doi]
- A Physics-Informed Integrated Modeling Method for Lithium-ion BatteriesYunsheng Fan, Zhiwu Huang, Kaifu Guan, Boyu Shu, Yongjie Liu, Zeyu Zhu, Peinan He, Shuo Li 0006. 868-873 [doi]
- SOC Estimation of Supercapacitor Balancing Systems: A Switching Kalman Filter ApproachHeng Li 0005, Peinan He, Taozhen Chang, Shuo Li. 874-880 [doi]
- Quantum Information Technology for Network Security: An Application-Focused OverviewHuan Wang, Xiaoyang Lai. 881-886 [doi]
- A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed StudyLongmin Deng, Xuemin Zhang, Qianrong Zheng, Dongdong Zhao 0001, Junwei Zhou, Jianwen Xiang. 887-892 [doi]
- Research on Pilot's Workload Based on Multisource DataHaibo Wang, Mengyue Xu, Gen Li, Ting Pan, Haiqing Si, Haibo Liu, Yixuan Li, Yijin Zhu. 893-899 [doi]
- Efficient Giant Graph Unlearning via Push-Pull TuningFahao Chen, Peng Li 0017, Shui Yu. 900-907 [doi]
- Contrastive Learning-Based Generic Audio-to-Lyrics AlignmentZhenkun Jin, Shuai Huang, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou. 908-914 [doi]
- BT-Duper: A Binomial-Tree Based Data Replication Offloading Method with Native RDMA PrimitivesYang Yi, Yuting Li, Yun Xu, Pengcheng Wang, Yonghui Xu, Weiguang Wang. 915-922 [doi]
- DQR-TTS: Semi-supervised Text-to-speech Synthesis with Dynamic Quantized RepresentationJianzong Wang, Pengcheng Li, Xulong Zhang 0001, Ning Cheng 0001, Jing Xiao 0006. 923-928 [doi]
- iNUMAlloc: Towards Intelligent Memory Allocation for AI Accelerators with NUMAYuanchao Xu 0002, Ruyi Qian, Yida Wang, Qirun Huo. 929-936 [doi]
- BAFD: A Bidirectional Adaptive Fault Diagnosis Algorithm For Multiprocessor SystemsHao Feng, Lin Chen, Jiong Wu. 937-944 [doi]
- Detect Human Falls in an End-Edge-Cloud Orchestrated ArchitecturePeter Kubare, Xiaojun Hei, Yuan Tian. 945-952 [doi]
- Jump off the Bandwagon? Characterizing Bandwagon Fans' Future Loyalty in Online NBA Fan CommunitiesYichen Wang, Qin Lv. 953-960 [doi]
- Tweeting from Left to Right: Tracing the Dynamics of Emotional Messaging and Public Engagement During the 2018 vs. 2022 US CampaignsMeng-Jie Wang. 961-971 [doi]
- Style Transfer of Traditional Chinese Bamboo Flute Music Based on AI ModelZiqi Qin. 972-979 [doi]
- Cross Domain Few Shot NER Via Data Enhancement Invariant Domain Feature Extraction Based on Diffusion ModelKunlun Guan, Yangsen Zhang. 980-988 [doi]
- Ranking on Heterogeneous Manifold for Multimodal Information RetrievalZhenkun Jin, Xingshi Wan, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou. 989-996 [doi]
- Large-scale k Edge Server Placement Based on User Clustering and Intelligent SearchChengying Mao, Haiquan Hu. 997-1004 [doi]
- Routers' Energy Consumption Reduction With Load Saturation Awareness And Traffic SteeringLijun Dong, Richard Li. 1005-1010 [doi]
- A Learning Auction Mechanism for Video Streaming Transmission with Decoupling Uplink-Downlink AssociationYejin Liao, Kun Zhu 0001. 1011-1017 [doi]
- Hierarchical Task Scheduling for Heterogeneous UAVs based on Hybrid Genetic AlgorithmZiming Zeng, Chao Dong 0001, Xiaojun Zhu 0001, Lei Zhang. 1018-1025 [doi]
- Link load balancing scheme for elephant flow in SDN data centerFeifan Hao, Shan Jing, Chuan Zhao. 1026-1033 [doi]
- MAS-DDPG: Multi-Sensor Self-Adaptive Scheduling for UAV Path Planning in Network-Unavailable EnvironmentsNa Lin, Zhijiang Wang, Liang Zhao. 1034-1041 [doi]
- Improved Virtual Force Algorithm-Based Fuzzy Clustering in Mobile Wireless Sensor NetworksJintao Yang, Minghua Wang, Wenbo Chen, Shujing Xie. 1042-1049 [doi]
- Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion FacilitiesOlufunsho I. Falowo, Jess Kropczynski, Chengcheng Li. 1050-1061 [doi]
- An Application Level Synchronization Method for Heterogeneous Redundant StructuresHong Yu, Qinrang Liu, Chao Cui, Shuai Wei. 1062-1068 [doi]
- A Firmware Vulnerability Detection Method Based on Feature FilteringBing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong. 1069-1076 [doi]
- A Gradient-guided Fuzzing Approach to Recover More Complete Control Flow Graph of BinaryQianjin Wang, Xiangdong Li, Yuchen He, Chong Yue. 1077-1082 [doi]
- An Online Detection System for LDoS attack Based on XGBoostJialun Deng, Li Cheng, Haiwen Yuan, Kuanlei Zheng, Xuan Li, Quli Li. 1083-1088 [doi]
- OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learningMeng Zhao, Zhu Di, Zhe Xia, Jing Tian, Jianwen Xiang, Lin Jun. 1089-1096 [doi]
- An In-Kernel Inline Crypto Solution for eXpress Data Path With QuickAssist Technology: Design, Prototyping and Performance EvaluationZhan Xue, Magnus Karlsson, Tao Yu, Aleksander Lobakin, Maciej Fijalkowski, Jesse Brandeburg. 1097-1104 [doi]
- Reversible Data Hiding Scheme Based on Prediction Error Bit-plane CompressionGuo Yuan, Chao Heng, Zhai Ping, Liu Ziqi, Li Haibo, Li Wenpeng. 1105-1112 [doi]
- Resource-Limited Localized Adaptive Adversarial Training for Machine Learning ModelMohammed Rajhi, Niki Pissinou. 1113-1120 [doi]
- Joining a Private Group with Friends Nearby without PIN-codeKun Zhao, Wei Xi, Lingzhi Yi, Wei Gong 0001, Shuai Wang 0008, Yijing He. 1121-1128 [doi]
- GPS L1 C/A Spoof Detection Through the Application of Deep Neural NetworksHen-Geul Yeh, Geoffrey Daniel Farthing. 1129-1134 [doi]
- BILAM: A BiLSTM-Based Model for Detecting Phishing Scams in EthereumMingshun Ye, Mingdong Tang, Weili Chen. 1135-1142 [doi]
- CLN-VC: Text-Free Voice Conversion Based on Fine-Grained Style Control and Contrastive Learning with Negative Samples AugmentationYimin Deng, Xulong Zhang 0001, Jianzong Wang, Ning Cheng 0001, Jing Xiao 0006. 1143-1148 [doi]
- AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction SequencesXiaoyu Yi, Gaolei Li, Ao Ding, Yan Zheng, Yuqing Li, Jianhua Li 0001. 1149-1156 [doi]
- Cooperative Completing Tasks of Charging WRSNs with Multiple MUVs and Laser-charged UAVsChuanwen Luo, Ning Liu, Ting Chen, Jia Cao, Yi Hong 0003, Zhibo Chen 0004, Deying Li 0001. 1157-1164 [doi]
- A signel-channel blind signal separation method based on signal type difference for time-frequency overlapped signalLihui Pang, Yilong Tang, Yulang Liu, Bin Yang 0030, Wenwei Zhang, Qingyi Tan. 1165-1172 [doi]