Abstract is missing.
- Research on Amplitude and Travel Time Image Decentralization Correction in Ultrasonic Imaging LoggingJie Liu, Mingjie Song. 1-5 [doi]
- A vulnerability detection method based on sparse value flow graphsHao Yang, Shuning Wei, Zhi Wang, Jing Wang. 6-10 [doi]
- Target detection for MIMO Radar based on reduced-dimension data without training dataPing Li, Bang Huang, Wen-Qin Wang. 11-16 [doi]
- Low signal-to-noise ratio RDSS signal frequency offset estimation algorithm based on GWO-CNNYouhui Wang. 17-23 [doi]
- Application of large language model in intelligent Q&A of digital governmentShangsheng Gao, Li Gao, Qi Li, Jianjun Xu. 24-27 [doi]
- Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoderMai Ye, Shiming Men, Lei Xie, Bing Chen. 28-34 [doi]
- A comprehensive survey of vulnerability detection method towards Linux-based IoT devicesXixing Li, Qiang Wei, Zehui Wu, Wei Guo. 35-41 [doi]
- The Optimization of Multi-physics Application Simulated by Lattice Boltzmann Method Based on Domestic ProcessorsYi Liu, Lin Peng, Peng Zhang, Yanlong Qiu, Sen Zhang, Xiaowei Guo, Canqun Yang. 42-47 [doi]
- Robust Adaptive Beamforming Based on Steering Vector Estimation and Combined with Sample Covariance MatrixYue Yang, Xu Xu, Hongye Liu. 48-52 [doi]
- Wisdom Tourism System Design in Shaanxi Province of China on Network TechnologyWeiru Qi. 53-58 [doi]
- A Survey of SDN Data Plane Attacks and Defense StrategiesWenxiu Zhang, Shan Jing, Chuan Zhao. 59-65 [doi]
- Anti-intermittent Sampling Jamming Method Based on Random PRI and Intra-pulse Frequency Diversity Radar WaveformTai Guo, Haihong Zhan, Xingde Su, Tao Wang. 66-72 [doi]
- A review of irrigation monitoring based on Internet of Things, remote sensing and artificial intelligenceJinyao Liu, Xiangyu Bai, Zhaoran Wang. 73-77 [doi]
- A controllable IPv6 address generation based on conditional variational autoencoderJia Wang, Ziyuan Lu. 78-81 [doi]
- The Optimization of IPSec VPN in 5G Mobile Communication NetworkQianran Wang, Jinhua Wang, Chengbin Huang. 82-86 [doi]
- Dynamic Offloading Task for Internet of Things Based on Meta Supervised LearningMingChu Li, Dexin Xia, Wenteng Zhang. 87-92 [doi]
- Solving the Performance Issues of Epsilon Estimation Method in Differentially Private ERM: Analysis, Solution and EvaluationYuzhe Li, Bo Li. 93-99 [doi]
- DORM: Distance-based opportunistic routing and medium access protocol for multi-AUV monitoring systemTianyou Qiu, Yiping Li, Xisheng Feng. 100-104 [doi]
- Computation Offloading in E-RAN via Deep Reinforcement LearningKun Lu, Quan Zhou, MingChu Li. 105-109 [doi]
- Fast Lane Detection Based on Row Anchor ClassificationYi Xie. 110-115 [doi]
- LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation LearningXiaoda Xie, Songlei Jian, Chenlin Huang. 116-121 [doi]
- Challenges and Developments of Routing Techniques for Dense LEO ConstellationsYuanzhi He, Huajin Chen, Changxu Wang, Yuan Li, Zhenyu Niu. 122-126 [doi]
- Context-Aware Edge Caching Strategy Based On Mobility PredictionXiaowei Zhao, Lian Zhang, MingChu Li. 127-132 [doi]
- Task Migration Optimization Algorithm in Mobile Edge ComputingXiaowei Zhao, Yuanyuan Zhang, MingChu Li. 133-137 [doi]
- Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter WaveZixiang Zhou, MingChu Li. 138-142 [doi]
- Location Excitation Network for Multi-modal 3D Object DetectionJiawei Liu. 143-149 [doi]
- Reputation-based consensus mechanism for digital order transaction alliance chainMing Zhu 0004, Yiyang Zhou, Xiangyang Feng. 150-154 [doi]
- Joint Message Passing: Solving Heterogeneous Graphs Challenges in Few-Shot Object DetectionYikun Sun. 155-160 [doi]
- Semantic Queries with Transformer for Referring Image SegmentationYukun Zhai. 161-167 [doi]
- Multi-Label Classification for Postoperative Complication PredictionXiaohui Luo. 168-171 [doi]
- A study on the application of graph neural network in code clone detection: Improving the performance of code clone detection through graph neural networks and attention mechanismsLinfeng Dai. 172-176 [doi]
- Intelligent Operation and Maintenance Schedule System Based on Knowledge Graph: Construction and ApplicationsJiang Liu, Hongbo Lu, Yiyou Yuan, Haomin Gu, Kejun Xie, Dong Li, Chencheng Luo, Gang Wu, Yueming Song. 177-181 [doi]
- Study on the effect of dynamic self-protection on epidemic spreadingXue-Song Wang, Mao-Bin Hu. 182-185 [doi]
- RRDD: An ATT&CK-based ICS Network Security Risk Assessment MethodYuman Wang, Wenhui Wang, Xiaoxue Bai, Bo Hu, Guangkai Ge, Kexiang Qian. 186-192 [doi]
- The effect of simplicial awareness dissemination on epidemic reaction-diffusionMeng-Yu Li, Yuan-Hao Xu, Shuai Huang, Mao-Bin Hu. 193-195 [doi]
- A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-timeShaofeng Li, Tingyu Wang, Bo Wan. 196-200 [doi]
- A Blockchain-based Performance Monitoring Scheme for Cloud ApplicationsJingyu Hao. 201-207 [doi]
- LSTM-GATs: Wind field prediction based on graph attention deep neural networkShengjie Zhou. 208-212 [doi]
- OSU-based power communication network service bearer and slice control mechanismMengxi Zhang, Guangxiang Jin, Jiangsheng Li, Min Liu, Xiao Zhang, Yufei Shi, Qi Wei. 213-218 [doi]
- Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention MechanismZiheng Huang, Bolin Chen, Yiting Zhao. 219-225 [doi]
- Acoustic Propagation Research And Simulation Based On BellhopSong Wei Ge. 226-234 [doi]
- ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary RewritingTai Yue, Pengfei Wang, Lei Zhou, Xu Zhou, Gen Zhang, Kai Lu, Huijun Wu. 235-240 [doi]
- Analysis on Technique for Code ObfuscationNi Zhang, Wei Dong, Zehong Xia, Zhi-feng, Zhicheng Li. 241-245 [doi]