Abstract is missing.
- Future Blink Prediction in Virtual Reality Using Time-Series Eye Movement DataWenjie Zhang, Ding Ding 0002, Jinghui Zhang, RunQun Xiong, Jiahui Jin, Fang Dong 0001, Xiangyu Xu 0001, Kai Dong. 1-6 [doi]
- A Multi-Drone Task Allocation Algorithm for Large-Scale 3D ReconstructionYu Xia, Anmin Li, Xueyong Xu, Yuhang Xu, Jinchen Wang, Vincent Chau, Chenchen Fu, Weiwei Wu 0001. 7-12 [doi]
- Predicting Mechanical Properties of Steel Based on Ensemble Learning and Bayesian OptimizationSuyang Wang, Qingqi Zhu, Jiangshan Haol, Fang Wang, Fucun Li, Guizhou Zhao, Fang Dong 0001. 13-18 [doi]
- Prediction of Environment Temperature for Grain Warehouses Based on LightGBM and TransformerKun Wang, Bingchan Li, Bo Mao. 19-24 [doi]
- Attention-Driven Topology Adaptive Graph Convolutional Networks for Bitcoin Abnormal Transaction DetectionChenhao Yao, Zhangjie Fu, Tianyi Liu, Qin Jiang, Fuyuan Song. 25-30 [doi]
- Enhancing GNN-based CQA Spam Detection: Question-Answer-Pair Perspective with Supervised Neighbor SelectionChenyang Wei, Xi Luo, Lu Zhang, Gaofeng He, Haiting Zhu. 31-36 [doi]
- Grain Price Prediction Model Based on TimeF-iForest-TransformerBo Mao, Yujie Cao, Bingchan Li. 37-41 [doi]
- Energy-Efficient UAV Deployment and Link Routing in UAV-Assisted MEC Network for Disaster ResponseWeidu Ye, Jiachen Yuan, Ximing Zhou, Dehe Hu, Jian Zhou 0009. 42-47 [doi]
- Cloud Based AIVR Training System for Emergency RescueMeiya Dong, Biaokai Zhu, JuMin Zhao, Jie Song. 48-53 [doi]
- Achieving Secure and Efficient Emergency Data Sharing based on Searchable Proxy Re- EncryptionFeng Yu 0006, Jing Xi, Linghui Meng, Daicen Jiang, Qianhui Lu, Xianxian Li. 54-59 [doi]
- Computation Offloading with Bus-Mounted Edge Servers Based on Dung Beetle Optimization in Internet of VehiclesXia Deng, Yubin Bao, Shuhong Chen, Le Chang. 60-65 [doi]
- A Deep Learning Framework for Traffic Flow Prediction Based on Weighted Graph Convolutional Long Short Term Memory NetworkKunpeng Li, Gui Gui, Quanjun Chen, Jiaqi Yi, Yuqian Zhao, Weihua Gui 0001. 66-71 [doi]
- Full Learning Path Recommendation Based on Temporal and Co-Occurrence RelationsJingtao Xue, Yangfan Lu, Bin Zhao, Genlin Ji. 72-77 [doi]
- Analysis of Classroom Teaching Interaction Patterns Based on Behavior RecognitionLiangwei Li, Qing Zhang, Bin Zhao, Genlin Ji. 78-83 [doi]
- An Efficient Online Learning Approach for Super-Resolution in Dynamic EnvironmentsRongqing Liu, Zhiqiang Li, Feng Tian 0005, Jie Zheng, Rui Cao, Chuanyuan Zhao, Jie Ren. 84-89 [doi]
- A Ray-based Asynchronous Distributed Parallel K-SVD MethodYongkang Li, Xiaodong Chen, Xiaohui Wan, Jin Sun 0001, Peng Zheng, Yunchang Wang, Zebin Wu 0001. 90-95 [doi]
- Join Order Selection with Transfer Reinforcement LearningYongpan Zhang, Zhe Ding, Ping Shen, Zheng Zhang, Chao Qian, Cheng Ding, Su Pan. 96-101 [doi]
- Real Time Switch Object Detection Model Based on Knowledge Distillation for Edge ComputingBingchan Li, Chunguo Li. 102-105 [doi]
- Upright and Inverted Motion-enhanced Network for Video Action RecognitionLe Li, Genlin Ji, Zesheng Hu. 106-111 [doi]
- SeLaNet: A Noninvasive Distilled Neural Network to Predict the Dense SEC/LAAT Based on Multi-layer PerceptronZiheng Zhang 0003, Fei Gu 0001, Zeyang Zhang 0003, Xinyu Wang, Shikun Sun, Jingya Zhou. 112-117 [doi]
- Protective Perturbations Against Unauthorized Data Usage in Diffusion-Based Image GenerationSen Peng, JiJia Yang, Mingyue Wang, Jianfei He, Xiaohua Jia. 118-123 [doi]
- OSAM: Outdoor 3D Point Cloud Semantic Segmentation using Attention and Multi-Scale FeaturesPeng Zhi, Hong Wang, Longhao Jiang, Hao Zhang, Yan Li, Rui Zhou 0005, Qingguo Zhou. 124-129 [doi]
- Prior Knowledge Enhanced Topic Model For Research Topic Evolution AnalysisZhongyuan Kang, Lu Zhang, Zheng Chen, Haiting Zhu, Gaofeng He, Mingwei Tang. 130-135 [doi]
- A3Framework: A Cloud Framework with Autonomous Driving Path PlanningYinan Yang, Zhiye Wang, Dapeng Zhang, Hao Zhang, Peng Zhi, Rui Zhao, Xuan Kong, Rui Zhou 0005, Qingguo Zhou. 136-141 [doi]
- Orchestrating Public Opinion Risks in Dynamic Social Networks with Dissipative TheoryYouke Wu, Yuting Li. 147-152 [doi]
- A Denial of Service Attack Defense Method for Roadside UnitsHuanbin Wang, Gaofeng He, Haiting Zhu, Bingfeng Xu, Lu Zhang, Naixuan Guo. 153-158 [doi]
- An Adaptive Online Few-shot Network Intrusion Detection System Based on Meta-LearningShiru Ding, Zhen Wang, Yifei Lu. 159-164 [doi]
- Server-Assisted Certificateless Searchable Encryption Scheme for Industrial Internet of Things Against Keyword Guessing AttacksHong Zhong 0001, Shunming Wang, Jie Cui 0004, Qingyang Zhang, Bei Li, Debiao He. 165-171 [doi]
- One-Class Classifiers Ensembles for Detecting Fund Misuse Problems within Financial AuditingChaoxian Feng, Haotian Wu, Zhe Li, Hongru Lu, Changjian Fang, Zhiang Wu 0001. 172-177 [doi]
- A Policy-Controlled Signature Scheme for end-to-end Secure CommunicationFeng Yu 0006, Linghui Meng, Jing Xi, Xianxian Li, Qianhui Lu, Weidong Zhu. 178-183 [doi]
- A Blockchain-Based Auditing Scheme for Educational Data Supporting Trusted DetectionFeng Yu, Qianhui Lu, Linghui Meng, Jiahui Peng, Jing Xi, Xianxian Li. 184-189 [doi]
- A Lightweight and Key Escrow-Free Access Control Scheme on Encrypted Data in Edge ComputingHeng He, Yuejia Chen, Jianfeng Lu, Jiacheng Zheng. 190-195 [doi]
- Protection of User Sensitive Information Based on SIR ModelHai Wang, Shuo Ji, Mingyuan Hao, Guodong Xu. 196-203 [doi]
- FedTSB: Tackling Sample Bias in Federated Services SelectionChunhong Li, Ruihui Huang, Zhaoyan Zeng, Lei Guo. 204-209 [doi]
- Clustering-Based Custom Global Modules for Personalized Federated LearningZining Chen, Can Wang, Baisong Zhang, Weiye Wang, Wen-Sheng Li, Wei-Dong Zhang. 210-215 [doi]
- Meta Analysis of Traffic Safety PredictionHongyu Yan, Jianbo Li, Zhihao Xu, Zhiqiang Lv. 216-221 [doi]
- An Energy-Aware UAVs Path Coverage for Critical Infrastructure InspectionsYifan Wang, Wei Zeng, Guanyu Li, Chenglong Xiong, ZiCheng Wang, Yingchi Mao. 222-227 [doi]
- A Deep Spatial-Temporal Model Based on Discrete Wavelet Transform for Traffic Flow ForecastingHao Qu, Zhiqiang Lv, Jianbo Li. 228-233 [doi]
- Elastic Task Offloading Through the Cooperation of Multiple Road-Side Unit (RSU)-Based Edge ServersXuyang Chen, Zhihai Tang, Yiqi Fan, Aiwen Huang, Mali Xing, Hanzhen Xiao, Le Chang. 234-239 [doi]
- STDFN: A Taxi Flow Prediction Model Based on Spatial-Temporal Data FusionHao Qu, Zhiqiang Lv, Jianbo Li. 240-245 [doi]
- Tree Decomposition based Top-k Shortest Distance Query on Large-scale Road NetworksYe Li, Jun Zhang, Zongze Li, Jing Sun 0010, Fan Zhang, Kejiang Ye. 246-253 [doi]
- Guided Intelligent Collection of Elements of Doctor-Patient Dispute CasesHan Xiao, Kejie Wen, Baili Zhang. 254-259 [doi]
- A Fair Flow Congestion Control for Content Centric NetworkingQian Gao, Quan Qiu, Yi Yin, Guoqiang Zhang 0004. 260-265 [doi]
- Deep Reinforcement Learning-Based Distributed Collaborative Service Caching in Edge ComputingWei Yang, Yi Chu, Chao Chen, Shengming Jiao, Xiaolong Xu 0001, Shengjun Xue. 266-271 [doi]
- Debiased Contrastive Learning for Label EnhancementJiaxi Zhang 0007, Chao Tan, Anning Song, Zilong Xu, Genlin Ji. 272-277 [doi]
- A Two-Stream Word-level Information Fusion BERT Model for Event Element Entity RecognitionYan Zhang, Kaiwen Li, Jinghui Zhang, Jingya Zhou. 278-283 [doi]
- Toward Design Perspectives of AI ChatbotsSasha Mahdavi Hezavehi, Jianming Yong, Jun Shen 0001, Dongming Xu, Brian Yecies. 284-289 [doi]
- Two- Echelon Vehicle Routing Problem with Trucks and DronesXiaoteng Han, Quan Spring Zhou, Bo (Bobby) Du, Jun Shen. 290-295 [doi]
- An Adaptive Social Relationship Incorporated Model for Enhancing Diversity in Sequential RecommendationsRuoxi Sun 0003, Jun Yan 0005, Fenghui Ren. 296-301 [doi]
- Prefabricated Buildings for Smart Cities: A Literature SurveyXingchen Hu, Jun Shen, Zhenjun Ma. 302-307 [doi]
- Improving Carbon Price Prediction by Decomposing Single Influencing Factor with XGBoostHanlin Xu, Qingwen Zeng, Huaming Chen. 308-313 [doi]
- Dynamic Resource Management for Enhanced QoS in Collaborative Edge-Edge Industrial EnvironmentsFengyi Huang, Wenhua Wang 0003, Tian Wang 0001. 314-320 [doi]
- Fair Recommendation Method Based on Meta-Learning and Feature EnhancementXiaoyang Huang, Xuejun Liu, Tao He, Zhouying Xu. 321-326 [doi]
- *Tao He, Xuejun Liu, Zhuoya Xing, Yitian Wang. 327-332 [doi]
- Big Data in Healthcare has Improved the Care Quality! A Reality or Myth?Kireet Joshi, Jianming Yong, Xiaohui Tao 0001, Yahua Zhang. 333-338 [doi]
- Integrating Surface Electromyography with Assistive Robots for Elderly Care: A Novel Human-Robot Interface for Grasping TasksQingyun Zhu, Raviteja Tirumalapudi, Junpei Zhong, Yonghua Liu, Mingjun Dai. 339-344 [doi]
- Research on Varicose Vein Bleeding Risk Prediction Based on Multimodal Machine LearningJianing Liu, Shanshan Wang, Zhenyu Zhao, Shuhang Wei, Zhenxiang Chen, Shuai Liu. 345-350 [doi]
- DM-Net for Colorectal Polyp Detection Using Dual Feature and Multi-Layer AggregationJingjing Wan, Ling Wang, Wenjie Zhu, Bolun Chen. 351-356 [doi]
- YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 AlgorithmYi Ding, Naixuan Guo, Haitao Meng. 357-362 [doi]
- Machine Learning-Driven Daily Demand Forecasting for Fresh Produce: A Case Study with BananasAsmaa Seyam, May El Barachi, Sujith Samuel Mathew, Bo Du, Jun Shen. 363-368 [doi]
- Privacy Issues in Access Network for 5G Mobile TelecomDanish Khan, Xujuan Zhou, Jianming Yong, Xiaohui Tao 0001. 369-374 [doi]
- Cyber Threat Detection on Twitter Using Deep Learning Techniques: IDCNN and BiLSTM IntegrationOmar Alsodi, Xujuan Zhou, Raj Gururajan, Anup Shrestha, Eyad Btoush. 375-379 [doi]
- Optimising Security: A Hybrid CNN-BiLSTM Model for Credit Card Cyber Fraud DetectionEyad Btoush, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Omar Alsodi. 380-385 [doi]
- CTS Sketch: A Sketch Scheme for Precise Identification of Top-k Flows Combined with SDNXiaolin Yang, Kai Yang, Hao Zhang, Gaoming Jin, Yifei Lu. 386-391 [doi]
- Attention-Based Graph Clustering with Enhanced Delivery OperatorXuanqi Liu, Sen Xu, Xiufang Xu, Naixuan Guo, Xuesheng Bian, Chaofeng Chen. 392-397 [doi]
- Efficient and Scalable: Physical Layer Design to Taming Interference in Large-Scale Concurrent Backscatter CommunicationsXin He, Aohua Zhang, Weiwei Jiang 0001, Panlong Yang. 398-403 [doi]
- CECTO: Cloud-Edge Collaborated Task Offloading Based on Dual Time-Scale A2CLina Ni, Jiehan Zhou, Shiping Chen 0001, Chen Yu 0003. 404-409 [doi]
- Enhancing Wide-Area Network Efficiency for Intelligent Computing Through SRv6-Based Path Optimization and Dynamic Load BalancingHaiyan Sheng, Xiaoguang Zhou, Jingjing Zhao. 410-415 [doi]
- FM-SLAM:Enhancing the Performance of Visual SLAM in Dynamic Environments with Fast-SAM and Motion Consistency CheckQiao Yang, Zhang Yongchuan, Sun Jing, Wang Ruibing, Zhang Fan. 411-415 [doi]