Abstract is missing.
- ColorByte: A real time MOT method using fast appearance feature based on ByteTrackLin Shen, Mengyang Liu, Caishan Weng, Jinghui Zhang, Fang Dong, Fa Zheng. 1-6 [doi]
- Collective Spatial Keyword Query on Time Dependent Road NetworksJingtao Xue, Chunyu Wu, Bin Zhao, Ying Hu. 7-12 [doi]
- TCN-based Lightweight Log Anomaly Detection in Cloud-edge Collaborative EnvironmentJining Chen, Weitu Chong, Siyu Yu, Zhun Xu, Chaohong Tan, Ningjiang Chen. 13-18 [doi]
- PEACE: Towards Optimizing Monitoring Utility of Unmanned Aerial Vehicles with Adverse Effect ConstraintsJingwu Wang, Weijun Wang, Haipeng Dai, Lanlan Li, Guihai Chen. 13-18 [doi]
- Research on Cloud Computing load forecasting based on LSTM-ARIMA combined modelXiaomin Liu, Xiaolan Xie, Qiang Guo. 19-23 [doi]
- Reservoir: Enhance the Burst-flow Tolerance in Datacenter NetworksJiaren Yu, Shan Huang, Guoyuan Yuan, Dezun Dong. 24-29 [doi]
- Multi-Layer Efficient Data Classification Methods for Enterprise Business ApplicationsYazeed AlZahrani, Jun Shen 0001, Jun Yan 0005. 30-35 [doi]
- DNN Training Optimization with Pipelined Parallel Based on Feature Maps EncodingLijuan Shen, Yingchi Mao, Zibo Wang, Hua Nie, Jianxin Huang. 36-41 [doi]
- Long-Term Workload Forecasting in Grid Cloud using Deep Ensemble ModelJiaang Bao, Chao Yang, Nu Xia, Dian Shen. 42-47 [doi]
- Virtual Network Embedding with Virtual Nodes Ranking and Multi Points SamplingYing Yuan, Yichen Yang 0016, Cong Wang. 48-53 [doi]
- A Spark-Based Parallel Implementation of Compressed Hyperspectral Image Reconstruction and Anomaly DetectionQiLiang Zhu, Yaoqin Zhu, Jin Sun 0001, Zebin Wu 0001. 54-59 [doi]
- Policy-Based Access Control System for Delta LakeZhe Chen, Hangyu Shao, Yuping Li, Hongru Lu, Jiahui Jin. 60-65 [doi]
- DASH+: Download Multiple Video Segments with Stream Multiplexing of QUICChangjiang Cui, Yifei Lu, Shuren Li, Jingqi Li, Zeqi Ruan. 66-72 [doi]
- A Knowledge Graph-based Interactive Recommender System Using Reinforcement LearningRuoxi Sun, Jun Yan, Fenghui Ren. 73-78 [doi]
- Wb-MSF: A Large-scale Multi-source Information Diffusion Dataset for Social Information Diffusion PredictionZhen Wu, Jingya Zhou, Jie Wang, Xigang Sun. 79-84 [doi]
- Efficient Online and Privacy-preserving Medical Pre-diagnosis Based on Growing Learning Vector QuantizationXiao Zheng, Qiuyue Zhang, Xuan Tang, Xiujun Wang, Chunlai Du. 85-90 [doi]
- Efficient and Effective Expert Finding based on Community Search: A DemonstrationChengyu Du, Xiaoxuan Gou, Yuxiang Wang, Xiaoliang Xu. 91-97 [doi]
- A Semantic Segmentation Method for High-resolution Remote Sensing Images Based on Encoder-DecoderJingyu Yang, Liang Zhao, Jianwu Dang, Yangping Wang, Biao Yue, Zongliang Gu. 98-103 [doi]
- Unsupervised Semantic Segmentation with Feature Enhancement for Few-shot Image ClassificationXiang Li, Zhuoming Xu, Qi Xu, Yan Tang. 104-109 [doi]
- Weighted Fuzzy Clustering Algorithm Based on Max-Min Distance Criterion and Jeffrey DivergenceHailan Wang, Xiaolan Xie, Jili Chen, Yarong Liu. 110-115 [doi]
- Label Enhancement with Sample Correlation via Sparse RepresentationXiaoqian Zeng, Qin Qin, Chao Tan, Genlin Ji. 116-121 [doi]
- A Multivariate Time Series Anomaly Detection Model Based on Graph Attention Mechanism in Energy Consumption of Intelligent BuildingsZhe Zhang, Yuhao Chen, Huixue Wang, Yunzhe Wang, Qiming Fu, You Lu. 122-127 [doi]
- A Personalized Scenic Spot Recommendation Algorithm Based on Improved TrustSVD ModelYuqun Wu, Yongzhong Li, Bo Xu. 128-132 [doi]
- DC3D: A Video Action Recognition Network Based on Dense ConnectionXiaofang Mu, Zhenyu Liu, Jiaji Liu, Hao Li, Yue Li, Yikun Li. 133-138 [doi]
- Learning Inter-Frame Information for Space-Time Video Super-ResolutionZhuo Zhang, Haifu Guo, Sheng Ren, Kehua Guo. 139-144 [doi]
- Text classification based on machine learning for Tibetan social networkHui Lv, Fenfang Li, Yatao Liang, La Duo, Jun Shen 0001, Yan Li, Qingguo Zhou. 145-150 [doi]
- OEIS: Knowledge Graph based Intelligent Search System in Ocean EngineeringRui Zhu, Xiaojun Wu 0001, Yanna Hu, Yize Chen, Bo Liu. 151-156 [doi]
- Autoencoder-based OFDM for Agricultural Image TransmissionDongbo Li, Xiangyu Liu, Yuxuan Shao, YuChen Sun, Siyao Cheng, Jie Liu. 157-162 [doi]
- Personalized tourism recommendation algorithm integrating tag and emotional polarity analysisPeng Yuan, Qiuxia Chen, Zhifeng Wang, Jinfeng Yang. 163-168 [doi]
- A Customized Protocol Cluster Analysis Method based on Reinforcement LearningPeiying Wu, Xiaohui Li, Junfeng Wang. 169-177 [doi]
- A Batching Method For Complex Emitters Based On Frequency Agility Pattern MiningTian Tian, Jianchao Jia, Ran Jia, Shenggang Yan. 178-183 [doi]
- A Staging Prediction Model for COVID-19 Pandemic Under Strong Public Health InterventionsQian Huang, Jie Ma, Zhou Xu, Xiaodan Gu, Ming Yang 0001. 184-189 [doi]
- A Novel RNN Model with Enhanced Behavior Semantic for Network User ProfileMing Li, Xingwang Han, Hua-Sheng, Lin Ma, Hanzhang Kong, Weite Liu, Bo Mao. 190-193 [doi]
- TeCNTS: A Robust Collaborative Filtering Recommendation Scheme Based on Time-effective Close Neighbor Trusted Selection StrategyZhigeng Han, Yuanzhe Fan, Geng Chen, Ting Zhou. 194-199 [doi]
- Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept RecommendationWeiwei Wang, Liting Wei, Yun Li, Yi Zhu 0006, Bin Li, Lejun Zhang. 200-205 [doi]
- CUDA Acceleration of Worst-Case Execution Time Analysis Based On Model CheckingShang WanXin, Wu Tao, Yang Fei, Chen Xi, Jingjue Chen, Zhenxia Yu. 206-211 [doi]
- Realizing Power-efficient Encryption Communication for Computational RFID TagsYihang Song, Li Lu, Jiqing Gu, Chong Zhang. 212-218 [doi]
- A Fuzzy Multi-Identity Based SignatureYaqiong Guo, Peng Zhou, Xin Lu, Wangshu Sun, Jiasai Sun. 219-223 [doi]
- Semantic Integration based User Behavior Monitoring Framework in Zero Trust NetworkYansheng Qu, Hua Huang, Lin Chen, Lina Zhao, Yuxiang Zhao, Jie Zhang, Bo Mao. 224-227 [doi]
- A Novel Firewalls ConFigure Fault and Its Repair MethodPenghui Su, Yan Gao, Ming Chen. 228-233 [doi]
- Decentralized Blockchain NetworkTamara Abdulmunim Abduljabbar, Xiaohui Tao, Ji Zhang 0001, Jianming Yong, Xujuan Zhou. 234-239 [doi]
- The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G NetworksDanish Khan, Xujuan Zhou, Jianming Yong. 240-245 [doi]
- Detecting Key Offenders from Crime Incidents via Attributed Heterogeneous Network LearningZhe Li, Xiao Jing, Shanshan Cao, Tianfan Zhang, Zhiang Wu 0001. 246-251 [doi]
- Space-efficient logging for Supply Chain Traceability based on blockchainShuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong 0001. 252-257 [doi]
- A Hybrid Attack Graph Analysis Method based on Model CheckingYaogang Ge, Xiaomeng Shen, Bingfeng Xu, Gaofeng He. 258-263 [doi]
- Scheme of Peer-to-Peer Trade in Multi-Microgrid Based on BlockchainGuanjun Zhao, Lizhong Jia, Jie Xu, Chang Liu, Weijun Hu, Chunpei Li. 264-269 [doi]
- Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysMLJunJie Zhao, Bingfeng Xu, Xinkai Chen, Bo Wang, Gaofeng He. 270-275 [doi]
- The Application of RNN-based API Data Security Detection in Government Cloud ServiceJing Wen, Chaohong Tan, Jining Chen, Qin Zhao, Sen Li, Fei Zhou. 276-281 [doi]
- IoTPass: IoT Data Management System for Processing Time-series DataZehua Nie, Can Su, Yichen Mao, Kaigui Bian. 288-293 [doi]
- Request-Aware Task Offloading in Mobile Edge Computing via Deep Reinforcement LearningZiwen Sheng, Yingchi Mao, Jiajun Wang, Hua Nie, Jianxin Huang. 294-299 [doi]
- A Kubernetes-Oriented Edge Network Orchestrator for Heterogeneous EnvironmentChenyu Lu, Zhaowu Huang, Caishan Weng, Feng Jiao, Xiaolin Guo, Fang Dong 0001. 300-305 [doi]
- Device-free Crowd Density Estimation with Off-the-shelf WiFi TrafficJianwei Liu, Guozheng Yang, Cheng Zang, Jiajun Chen, Xianming Hu, Jingzhi Zhang, Yinghui He, Jinsong Han, Kui Ren 0001. 306-311 [doi]
- Deep Reinforcement Learning for Task Scheduling in Intelligent Building Edge NetworkYuhao Chen, Yunzhe Wang, Zhe Zhang, Qiming Fu, Huixue Wang, You Lu 0004. 312-317 [doi]
- WMLink: Wearable Smart Devices and Mobile Phones Linking through Passive Sniffing BLE and WiFi SignalsNaixuan Guo, Zhaofeng Chen, Heyang Xu, Zhechun Zhao, Yu Liu, Sen Xu. 318-323 [doi]