Abstract is missing.
- Cloud-Edge Collaboration via Preference-based Reinforcement Learning in Semantic CommunicationsYikai Xu, Mingkai Chen, Zhe Zhang. 1-6 [doi]
- Cooperative and Dynamic UAV-Based Mobile Sink Deployment using Deep Reinforcement LearningMingyue Shao, Hanjiang Luo, Rukhsana Ruby, Pengyan Dong, Hang Tao. 7-12 [doi]
- Learning-Based Collaborative Service Placement for AI-oriented Mobile Edge ComputingWei Li, Miao Li, Yuezhao Liu, Jiong Liu, Lanlan Cui. 13-18 [doi]
- Offloading Dependency Mobile Tasks to Computing Power NetworkWenyan Zhang, Hongzhi Cui. 19-26 [doi]
- Deep Reinforcement Learning-Based Load Balancing Algorithm for Sliced Ultra-Dense NetworkAo Sun, Feng Yang, Wenjun Wu, Tengda Wang, Yang Sun. 27-32 [doi]
- Efficient Cloud Cluster Resource Scheduling with Deep Reinforcement LearningXiaochang Liu, Bei Dong, Fei Hao. 33-38 [doi]
- Multi-UAVs Collaborative Search Scheme in Marine Environments using Deep Reinforcement LearningKai Guo, Hanjiang Luo, Hang Tao, Rukhsana Ruby, Zhizun Qin, Kui Liu. 39-44 [doi]
- Power and Latency Collaborative Optimizations of Object Detection CNN on Edge Devices Under Limited Energy BudgetZhiyi Huang, Zebin Wu 0001, Junlong Zhou, Jin Sun 0001. 45-50 [doi]
- An Intelligent Action Decision Algorithm for Exoskeleton in Edge Networks Environment based on Deep Reinforcement LearningBen Xu, Jiacheng Sun, Yunzhe Wang, Qiming Fu 0001, You Lu 0004. 51-56 [doi]
- Network Anomaly Flow Detection Framework Based on Collaborative Cloud-edge in the Smart Grid NetworkXiaolin Yang, Hao Zhang, Kai Yang, Yifei Lu. 57-62 [doi]
- Retraining Generative Adversarial Autoencoder for Video Anomaly DetectionXiaosha Qi, Zesheng Hu, Genlin Ji. 63-68 [doi]
- A Lightweight RFID Security Authentication Protocol for Smart Medical SystemsYan Wang, Feng Shu 0002, XueMei Lei, Xuehui Wang, Rongen Dong, Qiankun Cheng. 69-74 [doi]
- A Fast Recommendation Algorithm for Data Streams Based on Differential PrivacyChang Guo, Xiujun Wang, Xiao Zheng, Xun Shao, Lei Mo, Gaoming Yang. 75-79 [doi]
- A Blockchain-Based Searchable Encryption Scheme for Efficient Data SharingShusheng Ge, Shuming Xiong, Pengchao Chen, Qingqing Xie. 80-85 [doi]
- Cloud Storage Auditing: From One Cloud to Dual, and MoreJianquan Cai, Fei Chen, Tao Xiang 0001. 86-91 [doi]
- SEM-DT: A Secure and Efficient One-to-Many Data Trading Scheme Based on BlockchainShuming Xiong, Pengchao Chen, Shusheng Ge. 92-97 [doi]
- A CGAN-based Few-shot Method for Zero-day Attack Detection in the Internet of VehiclesBingfeng Xu, Bo Wang, Xinkai Chen, Jincheng Zhao, Gaofeng He. 98-103 [doi]
- A rumor source identification method based on node embeddings and community detection in social networksWei Liu, Chencheng Xie, Shijie Zong. 104-109 [doi]
- An Adaptive Differential Private Federated Learning in Secure IoTRixin Xu, Qing Li, Wenqiang Cao, Jingbo Yan, Youqi Li. 110-115 [doi]
- Cooperative Detection of Camouflaged Malicious TLS TrafficJingang Wang, Tianyi He, Gaofeng He, Haiting Zhu, Bingfeng Xu, Lu Zhang 0030. 116-121 [doi]
- Time series anomaly detection based on TimeGAN and LSTM neural networkWeixin Han, Wenhao Ying, Wenjun Hu, Zhongqiang Sun. 122-127 [doi]
- A study on a Multi-Model Fusion Framework for Automatic Website Classification and RecognitionLin Shiming, Ma Feiyan, Zhao Lijuan, Changjun Song. 128-133 [doi]
- Lightweight Multi-Scale Spatiotemporal Graph Convolutional Network for Skeleton-Based Action RecognitionZhiyun Zheng, Qilong Yuan, Huaizhu Zhang, Yizhou Wang, Junfeng Wang. 134-139 [doi]
- A Multi-feature Fusion Based Rating Prediction Model by Considering Timeliness of Reviews and Influence of Trusted Neighbor RatingsZhigeng Han, Ting Zhou, Geng Chen, Yuanzhe Fan. 140-145 [doi]
- Multi-level Learning for Semi-supervised Multi-view ClassificationNa Song, Shundong Yang, Zhiling Cai, Jian Lin, Sujia Huang. 146-151 [doi]
- Real Time Dust Detection with Image Pyramid and Improved ResNeStBingchan Li, Bo Mao. 152-155 [doi]
- Progressive Neural Networks for Continuous Classification of Retinal Optical Coherence Tomography ImagesDi Wang, Kun Huang, Qiang Chen. 156-161 [doi]
- DC-YOLO: Improved YOLOv7 Based on Deformable Convolution and Attention Mechanism for Fabric Defect DetectionKangrui Ye, Yuan Gao, Xiaoxiao Ye, Ansheng Ye. 162-167 [doi]
- From Homoglyphs to Enhancedhomoglyphs: Enhancing NLP Backdoor Strategies through Character SubstitutionPingyuan Ge, Weihao Guo, Yuqing Zhang. 168-173 [doi]
- A Generative Text Summarization Method Based on mT5 and Large Language ModelsFeng Liu, Caiquan Xiong. 174-179 [doi]
- STEP: Generating Semantic Text Embeddings with PromptWenqiang Cao, Qing Li, Siying Zhang, Rixin Xu, Youqi Li. 180-185 [doi]
- Label Distribution-based Open-world Semi-supervised LearningQinkai Yang, Chao Tan, Junzhao Hao, Genlin Ji. 186-191 [doi]
- Improving 360-degree Video Streaming with Adaptive Path SchedulingYue Yao, Qian Gao, Guoqiang Zhang, Yi Yin, Lingling Shen, Xiaojun Qian. 192-199 [doi]
- Rich Information Driven Popularity Prediction on WeiboXinyang Shen, Zhen Wu, Jingya Zhou, Yujian Zhu, Weiqing Xu. 200-205 [doi]
- Research on Persistent Advantage Learning Based Deep Q Network for Computational Offloading in Edge ComputingCong Wang, Mingmin Zuo, Shuai Liu, Di Li. 206-210 [doi]
- A Temporal Sequence Framework based on Self-Attention for Student Dropout Prediction in MOOCsShixuan Chen, Bin Zhao 0002, Genlin Ji. 211-216 [doi]
- Measuring the Variation of Function Invocation for Cold Start Optimization in Serverless EnvironmentsYue Wang, Xingyu Yan, Bohan Li, Shuai Xu. 217-222 [doi]
- High-efficient Joinable Tables Discovery in Data Lakes: A Grey Relational Model-based ApproachZefan Yu, RunQun Xiong, Fang Dong 0001, Zhiang Wu 0001. 223-228 [doi]
- HPopt: A Hybrid Parallel Optimization Scheduling Approach for Distributed DNN TrainingCaishan Weng, Xinyang Li, Jinghui Zhang, Hang Yu. 229-234 [doi]
- A Novel Schema for Sensitivity Prediction of Unknown Nodes in the Knowledge GraphJian Cao, Jiuxin Cao. 235-240 [doi]
- Knowledge Graph Embedding Based Graph Convolutional Network for Link PredictionQiang Wu, Qing He. 241-246 [doi]
- Uneven Hybrid Clickstream Generation Based on Multi-Layer PerceptronShen Liu, Zhiyong Yu, Fangwan Huang. 247-254 [doi]
- Better Data Distillation by Condensing the Interpolated GraphsYang Sun, Yu Xiang, Ziyuan Wang, Zheng Liu. 255-260 [doi]
- A Constructive Method Based on Dynamic Solution Space for Travelling Salesman ProblemXiaoxin Bai, LuLi LuLi, Hanqian Wu. 261-266 [doi]
- A-FAR: Research on Anti-obscuring Face Recognition Based on Improved FaceNet ModelBiaokai Zhu, Yangyang Zhang, Lu Li, Yuhong He, Yiting Song, Xiafei Li, Ruiting Yin, Jie Song, Ping Li 0020, Sanman Liu, JuMin Zhao. 267-272 [doi]
- Attribute Enhanced Graph Attention Networks for Session-based RecommendationYidan Xu, Ning Wang, JiaQi Wu, Shuai Xu, Bohan Li 0001. 273-278 [doi]
- End-to-End Community Search based on Graph Transformer: A DemonstrationZhiyuan Yu, Yuxiang Wang, Xiaoliang Xu, Xiaoxuan Gou. 279-284 [doi]
- Optimization on Architecture of Time-Sensitive Software-Defined NetworkYuChun Gou, XueTao Jiang, Zezheng Liu, Gongpo Gyamyang, Rui Zhou 0005, Qingguo Zhou, Deke Guo. 285-290 [doi]
- Point-Multipoint Communication Scheduling in Industrial Internet: A Quick SurveyYufeng Chen, Ping Jiang, Yida Qu, Mengqi Wu, Lu Luo, Ming Yang, Wenqian Lu. 291-296 [doi]
- SpringNet: Enhancing Hardware-Dependent Model Adaptation through Efficient Cost PredictionGuangtong Li, Mengyang Liu, Ye Wan, Fang Dong 0001. 297-302 [doi]
- DDAL: A Drift Detection Active Learning MechanismShuren Li, Weinan Wang, Xiangqian Jiang, Jun-Hua, Jiawei Mao, Yibin Lu, Xuan Jia, Di Wang, Zhen Wang, Yifei Lu. 303-308 [doi]
- GNMS: A novel method for model stealing based on GANMoxuan Zeng, Yangzhong Wang, Yangming Zhang, Jun Niu, Yuqing Zhang. 309-314 [doi]