Abstract is missing.
- Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash AlgorithmHaiting Zhu, Junmei Wan, Nan Li, Yingying Deng, Gaofeng He, Jing Guo, Lu Zhang. 1-6 [doi]
- A Novel Container Workload Prediction Method Based on Automatic Classification and Attention-based LSTMSenfan Wu, Xuemei Yang, Kedong Liu, Hong Luo. 7-12 [doi]
- A Spark-based Parallel NPTSR Algorithm for Hyperspectral Image fusionXinrong Liu, Yaoqin Zhu, QiLiang Zhu, Jin Sun 0001. 13-18 [doi]
- Solving Virtual Network Mapping Fast by Combining Neural Network and MCTSCong Wang 0009, Xiaoyang Chen, Yixin Luo, Guoqi Zhang. 19-24 [doi]
- Efficient Mining of Regional Semantic Patterns from Semantic Trajectories on Cloud ComputingYushi Liu, Jingjing Han, Bin Zhao. 25-30 [doi]
- A Distributed and Parallel Tensor Hierarchical Tucker Decomposition on CloudsWeikai Ning, Zebin Wu 0001, Jin Sun 0001, Jiandong Yang, Yi Zhang 0025, Yaoqin Zhu, Zhihui Wei, Lei Xia. 31-36 [doi]
- Flow Characteristics Estimation Based On Multilayer Virtual Active Counter Sharing in Data Center NetworkShiqi Wang, Fang Dong, Dian Shen, Wei Zhao. 37-44 [doi]
- Tailor : Datacenter Load Balancing For Accelerating Distributed Deep LearningZhengzhi Xu, Yifei Lu, Jingqi Li, Xu Ma, Lei Qian. 45-50 [doi]
- FedKG: Model-Optimized Federated Learning for Local Client Training with Non-IID Private DataHuan Wang, Lijuan Wang. 51-57 [doi]
- DWUPP: Dynamic Weight Update through Pipelined Parallel for Distributed Training ModelYingchi Mao, Zijian Tu, Hua Nie, Ping Ping, Jianxin Huang, Jun Wu. 58-63 [doi]
- KSTA: a strategy for scheduling data-intensive workflows onto cloud computing resourcesWei Zheng, Peixuan Lin, Tongzhou Yang. 64-69 [doi]
- Traffic simulation and impact analysis for alternative mobility services in the city of ShenzhenXueying Zhu, Ye Li, Aledia Bilali, Biyun Zhou, Jun Zhang, Hao Dai, Fan Zhang, Rui Zhang, Leong Hou U. 70-76 [doi]
- A Spatial-Temporal Information based Traffic-Flow Detection Method for video SurveillanceJiajia Yu, Shuyu Gu. 77-82 [doi]
- Continuous K-Selection Capacity Constrained Assignment in Road-NetworksChenghua Gong, Xiaoyu Sun, Bin Zhao 0002. 83-88 [doi]
- Finding Collusive Spam in Community Question Answering Platforms: A Pattern and Burstiness Based MethodMingming Xu, Lu Zhang 0030, Haiting Zhu. 89-94 [doi]
- Label Enhancement with Sample Correlations via Low-dimensional Feature RepresentationXiaoqian Zeng, Zhen Xu, Chao Tan, Genlin Ji. 95-100 [doi]
- Vulnerability knowledge extraction method based on joint extraction modelZhen Liu, Xiaoqiang Di, Wei Song, Weiwu Ren. 101-106 [doi]
- Self Attention based Bi-directional Long Short-Term Memory Auto Encoder for Video Anomaly DetectionJie Zhang, Xiaosha Qi, Genlin Ji. 107-112 [doi]
- An Execution Cost Model for Aggregate Queries over Knowledge GraphsTao Fu, Xiaoliang Xu, Yuxiang Wang 0001. 113-120 [doi]
- YOLO-Cigarette: An effective YOLO Network for outdoor smoking Real-time Object DetectionYankai Ma, Jun Yang, Zhendong Li, ZiQiang Ma. 121-126 [doi]
- C-BERTT: A BERT-based Model For Extractive Summarization Of Chinese Online Judge QuestionsSong Tian, Peng Qi, Hongjia Xue, Yan Sun 0004. 127-132 [doi]
- Evaluation of pavement surface roughness performance under multi-features conditions based on optimized random forestYuanjiao Hu, Zhaoyun Sun, Lili Pei, Wei Li 0120, Yingying Li. 133-138 [doi]
- Joint Deep Dictionary LearningShiyi Liu, Bo Yang, Feng Wu, Chri Liu. 139-144 [doi]
- Embedding Chinese Face Painting Into the StyleGAN Latent SpacePengsen Ma, Tao Xue. 145-150 [doi]
- SDP-CycleGAN: CycleGAN Based on Siamese Data Pairs for Unraveling Data Imbalance Problems in Anomaly DetectionXuQian Yang, Lijuan Wang. 151-157 [doi]
- An Optimization Method for Weight Computation in Hypergraph Transductive Learning ModelZhe Yang, Liangkui Xu, Ziyu Bu, Yipeng Chen. 158-163 [doi]
- An Automatic Question Classification Model Based on Solving Programs for Online Judge PlatformsQi Li, Peng Qi, JiangSong Min, Yan Sun. 164-169 [doi]
- A Fast Speech Emotion Conversion Point Detection Algorithm Based on Distance MeasurementRuimeng Tian, Xuemei Yang, Wanqi Dong, Hong Luo. 170-175 [doi]
- Pool-Based Sequential Active Learning For Regression Based on Incremental Cluster Center SelectionBinwei Lin, Zhiyong Yu 0001, Fangwan Huang, Longkun Guo. 176-182 [doi]
- Handling Imbalanced ECG Heartbeat Classification with Adaptive Sample Masking UpdateRenjie Tang, Jiahui Jin, Junbo Qian, Junzhou Luo. 183-188 [doi]
- Action Recognition Based on Parallel Multi-Granularity Feature Refinement NetworksShuaiyu Jia, Ling Gao, Hongbo Guo, Qinyu Sun, Hai Wang 0010, Jie Zheng 0005. 189-194 [doi]
- Action recognition based on parallel convolutional recurrent neural networksQinyu Sun, Ling Gao, Hongbo Guo, Shuaiyu Jia, Hai Wang 0010, Jie Zheng 0005. 195-200 [doi]
- Multi-branch Prediction Network for Multi-label Social Image ClassificationJunting Lei, Wanqing Zhao, Shaobo Zhang, Jinye Peng. 201-206 [doi]
- Deep Neural Network Based Chinese Dialect ClassificationMiao Wan, Jie Ren, Miao Ma, Zhiqiang Li, Rui Cao, Quanli Gao. 207-212 [doi]
- Compressed LSTM using balanced sparsityTao Xiao, Jingfei Jiang, Jinwei Xu, Dong Wen, Junhua Wang, Xuehui Chen. 213-217 [doi]
- Applying Graph Neural Network in Deep Reinforcement Learning to Optimize Wireless Network RoutingXiao Xu, You Lu 0004, Qiming Fu 0001. 218-223 [doi]
- SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger FabricJiahui Peng, Chunpei Li, Bo Yuan, Hongwei Meng, Feng Yu 0006, Xianxian Li. 224-229 [doi]
- Non-Interactive Correlation Differential Privacy for Healthcare DataLei Yang, Xiao Zheng. 230-235 [doi]
- DDoS Attack Detection Based on CNN and Federated LearningDingyang Lv, Xinyu Cheng, Jinghui Zhang, Wei Zhang, Wei Zhao, He Xu. 236-241 [doi]
- Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection SystemShuren Li, Yifei Lu, Jingqi Li. 242-247 [doi]
- An Efficient Intrusion Detection Model Based on Convolutional Neural Network and TransformerZheying Zhang, Lijuan Wang. 248-254 [doi]
- Wi-SL: A Secure Lightweight WiFi Transmission Mechanism for IoT DevicesChangzhi Teng, Mingxuan Zhang, Zeng Zeng, Zhen Zhang, Yusen Zhou, Wenjia Wu. 255-260 [doi]
- A Security Situation Assessment Method based on Support Vector Regression for Power Monitoring SystemXuesong Huo, Ming Zhang, Hongqin Zhu, Wei Li. 261-266 [doi]
- A proof-of-work based on MH-PBKDF2 algorithmHaiying Chen, Dongzhan Zhang, ZhiYu Chen, Xiangjin Zhan, Zehai Su, Wei Zheng 0002. 267-272 [doi]
- ESOD: Edge-based Task Scheduling for Object DetectionYihao Wang, Ling Gao, Jie Ren 0007, Rui Cao, Hai Wang 0010, Jie Zheng 0005, Quanli Gao. 273-278 [doi]
- Accelerating Multi-Object Tracking in Edge Computing Environment with Time-Spatial OptimizationMengyang Liu, Anran Tang, Huitian Wang, Lin Shen, Yun-Han Chang, Guangxing Cai, Daheng Yin, Fang Dong, Wei Zhao. 279-284 [doi]
- Surveillance video analysis and compression based on edge computingYue Li, Xiaofang Mu, Hui Qi, Hong Shi, Jiaji Liu. 285-292 [doi]
- Vehicle-mounted Early Warning System Based on Edge IntelligenceYifeng Gu, Zhenghua Zhang, Qingqing Hong. 293-301 [doi]
- Task Offloading and Power Assignment Optimization for Energy-Constrained Mobile Edge ComputingXiaoting Wang, Zhimeng Zhou, Hanjing Chen, Yi Zhang. 302-307 [doi]
- Approximate Matching Based Cache Selection Strategy in Mobile Edge ComputingRuixiang Li, Yingchi Mao, Tao Wu, Jun Wu. 308-314 [doi]
- A Hybrid framework for mobile augmented realityShaobo Zhang, Wanqing Zhao, Yan Zhao, Xianlin Peng, Jinye Peng. 315-320 [doi]
- Adaptive Bitrate Encoding Strategy for ROI-based Mobile Augmented RealityJie Ren 0007, Ling Gao, Quanli Gao, Yumeng Hao, Jiale Hou, Hai Wang 0010, Jie Zheng 0005. 321-326 [doi]
- A IoT Terminal Position Recognition Method Based on RSSI and Magnetic Field in A Low Trust EnvironmentRui Zhang, Weiwei Miao, Jin Huang, Zeng Zeng, Changzhi Teng, Shihao Li, Zhen Zhang, Mingxuan Zhang. 327-332 [doi]