Abstract is missing.
- Legal and Regulation Retrieval System Based on Hierarchical RetrievalYue Chen, Yu Guo 0001, Yuanyan Xie, Zhenqiang Mi. 1-5 [doi]
- Physical Layer Security of RIS-assisted NOMA Networks Over Fisher-Snedecor ℱ Composite Fading ChannelChunli Song, Xin Zhang Beijing. 1-6 [doi]
- Catching Unusual Traffic Behavior using TF-IDF-based Port Access Statistics AnalysisKeiichi Shima. 1-5 [doi]
- Optimization Method of Pneumonia Image Classification Model Based on Deep Transfer LearningShanyin Peng, Ning Wang. 1-5 [doi]
- Classification of Soil Images using Convolution Neural NetworksKajal Chatterjee, Mohammad S. Obaidat, Debabrata Samanta, Balqies Sadoun, SK Hafizul Islam, Rajdeep Chatterjee. 1-5 [doi]
- tCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory NetworkXinyi Hu, Chunxiang Gu, Yihang Chen, Fushan Wei. 1-5 [doi]
- *Yabin Xu, Shengjie Sun, Zhuang Wu. 1-5 [doi]
- System Level simulation for 5G Ultra-Reliable Low-Latency CommunicationLianfen Huang, Tao Chen, Zhibin Gao, Manman Luo, Zhang Liu. 1-5 [doi]
- Real-Time Instance Segmentation for Low-Cost Mobile Robot Systems Based on Computation OffloadingYuanyan Xie, Yu Guo 0001, Yue Chen, Zhenqiang Mi. 1-5 [doi]
- Cross-modal Retrieval of Archives based on Principal Affinity RepresentationXiaoqing Yang, Yuelong Zhu, Jun Feng 0001, Jiamin Lu. 1-5 [doi]
- Code-based Computation Offloading in Vehicular Fog NetworksFangzhe Chen, Zhibin Gao, Zhang Liu, Lianfen Huang, Yuliang Tang. 1-5 [doi]
- *Yanmiao Li, Hao Guo, Jiangang Hou, Zhen Zhang, Tongqing Jiang, Zhi Liu. 1-7 [doi]
- Towards Safer Roads: An Efficient VANET-based Pedestrian Protection SchemeKhaled Rabieh, Ahmet Furkan Aydogan, Marianne A. Azer. 1-6 [doi]
- An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking TrusteeChandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Akshaykumar Meshram. 1-5 [doi]
- Detection of Coastal Green Macroalgae based on SLIC, CNN and SVMJinghu Li, Lili Wang, Qianguo Xing. 1-5 [doi]
- Energy Management Systems and Smart Phones: A Systematic Literature SurveyYoussef Mansour, Hamdan Hammad, Omnia Abu Waraga, Manar Abu Talib. 1-7 [doi]
- Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management SystemsDheerendra Mishra, Mohammad S. Obaidat, Ankita Mishra. 1-5 [doi]
- Fault-Tolerant Orchestration of Bags-of-Tasks with Application-Directed Checkpointing in a Distributed EnvironmentGeorgios L. Stavrinides, Helen D. Karatza. 1-6 [doi]
- Capsule: All you need to know about Tactile Internet in a NutshellRajesh Gupta 0007, Sudeep Tanwar, Mohammad S. Obaidat, Sudhanshu Tyagi, Neeraj Kumar 0001. 1-5 [doi]
- Building Safer Autonomous Agents by Leveraging Risky Driving Behavior KnowledgeAshish Rana, Avleen Malhi. 1-6 [doi]
- Discover Community Structure in Network by Optimization Algorithm Based on Modular FunctionXiaoling Guo, Yaqun Yang, Xinyu Song, Hongmiao Yao, Fudong Zhang. 1-4 [doi]
- DPSGD Strategies for Cross-Silo Federated LearningMatthieu Moreau, Tarek Benkhelif. 1-5 [doi]
- Solid-liquid dual channel data-driven method for Lagrangian fluid simulationFeilong Du, Xiaojuan Ban, Yalan Zhang, Zirui Dong, Haojian Duan. 1-5 [doi]
- A Traffic Prediction assisted Routing Algorithm for Elastic Optical NetworksAnastasios Valkanis, Georgios Papadimitriou 0001, Petros Nicopolitidis, Georgia A. Beletsioti, Emmanouel A. Varvarigos. 1-6 [doi]
- Comparison and analysis of secret image sharing principlesJiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan. 1-5 [doi]
- A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management SystemMuhammad Ayaz Khan, Anwar Ghani, Mohammad S. Obaidat, Pandi Vijayakumar, Khwaja Mansoor, Shehzad Ashraf Chaudhry. 1-5 [doi]
- XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous VehiclesHarsh Mankodiya, Mohammad S. Obaidat, Rajesh Gupta 0007, Sudeep Tanwar. 1-5 [doi]
- Android malicious application detection based on Support Filtering and Lasso LR AlgorithmLe Weng, Hengyu Liu, Lianfen Huang, Yingmin Zhang, Chao Feng. 1-5 [doi]
- Intrusion Detection System Based on RF-SVM Model Optimized with Feature SelectionDongliang Xuan, Huaping Hu, Bidong Wang, Bo Liu 0014. 1-5 [doi]
- Simulation and visualization of solid-liquid phase transition and interactive using particle-based methodZihao Liu, Yanrui Xu, Xiaokun Wang, Xiaojuan Ban, Zhiyu Zheng. 1-5 [doi]
- Reference-based Image Super-Resolution by Dual-Variational AutoEncoderMengyao Yang, Junpeng Qi. 1-5 [doi]