Abstract is missing.
- A Study on the College English Ecological Teaching Mode Based on Artificial IntelligenceAihua Liu, Dehua Kong. 1-6 [doi]
- A super-resolution method of combined color image with depth map based on deep learningWei Zhang, Chifu Yang, Feng Jiang, Xianzhong Gao, Kai Yang. 7-11 [doi]
- Application of K-means clustering algorithm in human resource data informatizationYang Zhao. 12-16 [doi]
- GMCAST: A novel multicast algorithm of three-layer graphite structure in wireless data center networkYingbo Wang, Jun Li, Hui Li. 17-21 [doi]
- Research on Visualization Algorithm of Association Rules Based on Concept LatticeXiajiong Shen, Lijie Bao, Lei Zhang. 22-27 [doi]
- Selection of Optimal Strategy for Moving Target Defense Based on Signal GameYan Sun, Weifeng Ji, Jiang Weng, Beiying Zhao, Yingqi Li, Xuan Wu. 28-32 [doi]
- Indoor tracking algorithm based on simplified Sage-Husa adaptive filterJiguang Lv, Liang Bing, Dapeng Man. 33-38 [doi]
- A Novel Malware Detection Framework Based on Weighted HeterographMeihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian. 39-43 [doi]
- Modeling and Optimization of HVAC System Based on GA-ANFIS AlgorithmChao Xu, Zhongqing Yu, Jinhua Li, Xixin Yang. 44-53 [doi]
- A lightweight identity authentication scheme for UAV and road base stationsYinyin Li, Xiaoyu Du, Sufang Zhou. 54-58 [doi]
- Research on Object-oriented Exploration AlgorithmXiajiong Shen, Peng Zhang, Jiyong Yang, Wan Chen, Lei Zhang. 59-64 [doi]
- Data center network acquisition symptom algorithm based on Hamiltonian CycleXiaoyu Du, Zhiyu Zhao, Zhijie Han 0001, Bo Wang. 65-69 [doi]
- Deep Learning Reconstruction Method of Meteorological Radar Echo Data based on Satellite DataSu Jiang, Yunxin Huang, Fuhan Zhang. 70-74 [doi]
- Application of license plate image recognition technology in intelligent parking lotHuiran Zhao, Lei Shi. 75-79 [doi]
- Webpage visual feature extraction and similarity algorithmJingwei Li, Chong Zhang, Xiangzhan Yu. 80-85 [doi]
- Research on automatic parameter selection and parallelization of DBSCAN algorithmXuan Ma, Huiyong Liu. 86-94 [doi]
- Research on Penetration Strategy of UAVDaojun Han, Hongzhen Xiang, Haolin Chen, Yi Xie. 95-102 [doi]
- Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine LearningJian Yang, Hao Wang, Yueming Lu. 103-108 [doi]
- Multi-UAV task assignment based on improved Wolf Pack AlgorithmHaowen Chen, Jinyu Xu, Chao Wu. 109-115 [doi]
- An Improved Algorithm for BertWeiguo Wang, Zhaoquan Gu, Keke Tang. 116-120 [doi]
- Identification of important nodes on large-scale Internet based on unsupervised learningFuyang Fang, Daojuan Zhang, Chonghua Wang, De Zhang, Yuanfei Zhang, Chao Li, Xi Luo, Ye Fu. 121-129 [doi]
- An entity relation extraction algorithm based on BERT(wwm-ext)-BiGRU-AttentionRuihui Hou, Hanhao Li, Honghai Feng, Yunpeng Li, Jun Li, Yatian Shen. 130-135 [doi]
- A defense scheme of voice control system against DolphinAttackDongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang. 136-142 [doi]
- Simultaneous learning algorithm for multiple sets of synonyms with different semanticsYaju Wei, Hanhao Li, Honghai Feng, Pengcheng Zhou, Xuzhao Lu, Yatian Shen. 143-147 [doi]
- Comparation of several mapping methods for humanoid robotXiandong Xu. 148-152 [doi]
- SDN routing optimization based on improved Reinforcement learningXiaoye Lu, Junyan Chen, Liaochuo Lu, Xuefeng Huang, Xiantao Lu. 153-158 [doi]
- A Survey on Encrypted Traffic IdentificationRui Liu, Xiangzhan Yu. 159-163 [doi]
- Research and improvement of k-means parallel multi-association clustering algorithmSu-yu Huang, Bo Zhang. 164-168 [doi]
- Location Rating Based on Graph Neural NetworkFengbin Zheng, Li Ding, Lanxue Dang. 169-175 [doi]
- The Analysis of Hamiltonian based on HCN network topologyJie Li, Shuai Ding, Xiaoyu Du, Zhijie Han 0001. 176-180 [doi]
- A Survey of Algorithms and Applications Related with Graph EmbeddingShicong Chen, Shuhua Huang, Deyu Yuan, Xiaofan Zhao. 181-185 [doi]
- Convolutional Neural Network based Timbre ClassificationYinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang, Zhaoquan Gu. 186-191 [doi]
- A Survey of Hybrid Fuzzing based on Symbolic ExecutionTao Zhang, Yu Jiang, Runsheng Guo, Xiaoran Zheng, Hui Lu. 192-196 [doi]
- UAV communication interference analysis and anti-interference methodsWenxin Wang, Bin Jiang, Xudong Tan, Chao Li. 197-201 [doi]
- Indoor Localization Algorithm based on Attribute-Independent Weighted Naive BayesianDapeng Man, Liang Bing, Jiguang Lv. 202-207 [doi]
- Research on the ideology monitoring system of cyberspace legal security based on Neural NetworkChenhui Zhao, Bo Zhang. 208-212 [doi]
- Research on Situation Analysis Technology of Network Security IncidentsDehua Kong, Hongyan Dong, Huyuan Li, Zhuowei Wang, Jiang Li. 213-218 [doi]
- Dynamic estimation model of insurance product recommendation based on Naive Bayesian modelBo Zhang, Dehua Kong. 219-224 [doi]
- Research on the current situation and development of intelligent campus construction in private universitiesBotao Lu, Bo Zhang. 225-229 [doi]
- Network security assessment based on full host-based attack graphXiao Fan Wang, Tian-yang Zhou, Jun-hu Zhu. 230-235 [doi]
- An Approach for Constructing Service Developers Oriented Heterogeneous Information NetworkZheng Li, Zhikang Shi, Xueyuan Huang, Di Jin, Chun Liu. 236-243 [doi]
- Design and implementation of web page classification tool based on word vectorYunzu Song, Xiangzhan Yu, Jianning Huo, Haijie Wang. 244-249 [doi]
- A privacy protection secure communication protocols for the Industrial Internet of ThingsHang Yang, Yi Zhang, Pingping Zhao, Xiaoman Cheng, Qian Huang. 250-255 [doi]
- Research on feature selection for cyber attack detection in industrial Internet of ThingsXueying Zhang, Jun Li, Daojuan Zhang, Jianlei Gao, Hao Jiang. 256-262 [doi]
- The Influence of Different Network Push Modes on Freshmen's Psychological AdaptationXiaobing Zhu, Bo Zhang, Yi Han, Youxin Li, Yang Yang, Lilun Yang. 263-266 [doi]
- Research on Safety Control Strategy of Ship Monitoring System Based On Information Flow Control between Heterogeneous NetworksJianbo Xiao, Qiaobin Zhang, Wei Nie. 267-270 [doi]
- Fading with the Time: A Traceless Access Scheme for Anonymous Communication NetworkXinda Cheng, Ning Hu, Chi Zhang, Yan Zhao. 271-276 [doi]
- FDI: A Fast IoT Device Identification ApproachXiaowen Wang, Jie Huang, Chunyang Qi. 277-282 [doi]
- A Systemic Review of Kernel FuzzingZhuobo Tan, Hui Lu. 283-289 [doi]
- Informatization construction of human resource management in retail industry based on SaaS platformTao Liu. 290-294 [doi]
- Blockchain-Based Power Metering Data Abnormal Monitoring Model Electric Energy Data Abnormal Monitoring ModelSenlin Zhang, Zhentai Longyuan, Yueming Lu. 295-302 [doi]
- SPA: Stealthy Poisoning AttackJinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan. 303-309 [doi]
- A Logical Combination Based Application Layer Intrusion Detection ModelHao Wang, Jian Yang, Yueming Lu. 310-316 [doi]
- Fly-Manager: Enabling Efficient and Reliable Management of High-performance Network ChipYuhao Han, Zhiting Xiong. 317-323 [doi]
- Multi-UAV Collaborative Online Obstacle Avoidance Track PlanningYingyi Tong, Wenhan Dong, Chenfei Zhai. 324-329 [doi]
- Review of the embedding of hypercube and its variantsZhijie Han 0001, Yinyun Fu, Xiaoyu Du. 330-334 [doi]
- Decentralization of DNS: Old Problems and New ChallengesShi Yin, Yu Teng, Ning Hu, Xu Dong Jia. 335-341 [doi]
- Mapping approach for multiscale emulation networks in heterogeneous environmentsJiayou Shang, Xiaofeng Wang, Yang Chen, Zhaohong Deng. 342-347 [doi]
- Exploration and practice of industrial control system information security incident emergency exerciseXiaofan Zhang, Haibo Huang, Zhu Lina, Yibo Wei, Yangyang Li, Muyijie Zhu, Jiahui Zheng, Xi Luo. 348-354 [doi]
- Resume Extraction and Validation from Public InformationXiangyi Kong, Zhaoquan Gu, Le Wang 0008, Lihua Yin, Shudong Li, Weihong Han. 355-359 [doi]
- An Online Computation Offloading Based on Auction Mechanism in Mobile Ad Hoc NetworksYuzheng Liu, Chengbo Wang, Weiping Wang, Shanshan Wei, Chengfeng Xue. 361-367 [doi]
- Multi-source and multi-dimensional network security situational awareness modelLuqin Lv, Yueming Lu. 368-373 [doi]
- An APT Group Knowledge Model based on MDATAYinyin Cai, Zhaoquan Gu, Le Wang 0008, Shudong Li, Weihong Han. 374-378 [doi]
- A Novel Lightweight Cryptography Scheme Based on Standardized IOT DataHua Tong, Jie Huang, Chunyang Qi. 379-386 [doi]
- ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet ChannelsChi Zhang, Ning Hu, Xinda Cheng, Yan Zhao. 387-393 [doi]
- Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital TransformationZijia Wang, Han-Teng Liao, Jiacheng Lou, Yu Liu. 394-400 [doi]
- Research on Data Approximation Search Privacy Protection in Cloud EnvironmentLi Zhao, Bo Zhang, Jiang Li. 401-406 [doi]
- From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records EmbeddingXiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu. 407-413 [doi]
- A privacy-preserving and correctness audit method in multi-party data sharingJunping Wan, Hao Xun, Xianrong Zhang, Jiyuan Feng, Zhe Sun. 414-419 [doi]
- Network Security Situation Awareness Technology Based on Multi-source Heterogeneous DataDaojuan Zhang, Kexiang Qian, Wenhui Wang, Fuyang Fang, Chonghua Wang, Xi Luo. 420-424 [doi]
- Research on smart party building identity online based on blockchainQubo Yang, Xiaobing Zhu. 425-430 [doi]
- Distributed File System Multilevel Fault-Tolerant High Availability MechanismYufeng Shi, Jinxin Zuo, Yihong Guo, Yueming Lu. 431-438 [doi]
- A Privacy-Protecting Authorization System Based on Blockchain and zk-SNARKQinan Li, Zhihao Xue. 439-444 [doi]
- Checking Compliance of X.509 Digital Certificates over IPv6 with SpecificationsChao Zhang, Donggang Yang, Chu Chen, Pinghong Ren. 445-450 [doi]
- REAL-GUARD: A Machine Learning based Real-time Mechanism for Combining Packet and Flow Features to Mitigating Network Attacks in SDNQi Liu, Hongwei Ruan, Hua Li, Xiaodi Li, Xianrong Wang. 451-458 [doi]
- Convolutional Long-Short Term Memory Network for convective weather prediction based on 3D Doppler radar dataXiajiong Shen, Kunying Meng, Zhongli Guo, Lei Zhang. 459-464 [doi]
- Human resource data quality management based on multiple regression analysisYong Zhang. 465-470 [doi]
- Early Analysis and Detection of Compressed TrafficJiuJin Wang, Xu Gu, Xiangzhan Yu. 471-476 [doi]
- Blockchain-based privacy protection scheme for electric energy metering dataTao Liu, Xiaohong Cao, Jin Li, Shaocheng Wu, Xiaowei Chen, Yueming Lu. 477-483 [doi]
- Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching RulesZiyuan Li, Wangshu Guo, Quan Xu, Yingjie Xu, Huimei Wang, Ming-xian. 484-489 [doi]
- A Training Scheme of Deep Neural Networks on Encrypted DataLiang Yuan, Gang Shen. 490-495 [doi]
- An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETsXiaodong Wang, Wenxu Jia, Hua Qin. 496-503 [doi]
- Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer TechniquesHaoren Ke, Hao Wu, Dongmei Yang. 504-511 [doi]
- Game Studies on Accounting Entity Behavior Based on Blockchain TechnologyYanru Kong, Jiawu Yue. 512-518 [doi]
- Proof of Retrievability for Image Data in Industrial Cloud PlatformGuangchen Yu, Juan Ma, Ji Wang. 519-523 [doi]
- BloTISRT: Blockchain-based Threat Intelligence Sharing and Rating TechnologyShen He, Jun Fu, Wen Jiang, Yexia Cheng, Jiake Chen, Zhihui Guo. 524-534 [doi]
- Research and Application of Blockchain Technology in Smart GridTao Liu, Xiaohong Cao, HeFang Jiang, Jinwen Xi, Shaocheng Wu, Yueming Lu. 535-542 [doi]
- Fuzzing Improving Techniques Applied and Evaluated on a Network Traffic Analysis SystemKaiyu Shi, Xiangzhan Yu, Yue Zhao. 543-548 [doi]
- Named entity recognition of legal judgment based on small-scale labeled dataJiaxi Liu, Lin Ye, Hongli Zhang 0001, Xiaoding Guo. 549-555 [doi]
- Blockchain-based trusted sharing of electric energy privacy dataTao Liu, Shaocheng Wu, Jin Li, Yue Ma, Fenghui Duan, Yueming Lu. 556-564 [doi]
- The Integrated Model of Online and Offline Education and Training of Student ActivistsXiaobing Zhu, Bo Zhang, Qubo Yang, Silan Zhu, Zhihua He, Luyun Chen. 565-569 [doi]
- The Influence of Internet Finance on the Traditional Business of Commercial BanksQiong Wu, Bo Zhang. 570-575 [doi]
- DSnow: A Durer pentagon Snow structure for data center networkZhijie Han 0001, Panpan Meng, Xiaoyu Du. 576-581 [doi]
- A network digital works protection method based on digital watermarking and intrusion detectionXiandong Xu, Xiang Yu. 582-586 [doi]