Abstract is missing.
- A Novel highly sensitive Method of Frequency domain Detection and Recognition for OAM State based on CNN with ReLUJinpeng Wang, Haoqi Wang, Haotian Liu, Xin Zhao. 1-6 [doi]
- A Load Balancing Model for Parallel Simulation of Fluid-Structure Interaction in Cavitating FlowQiao Liu, Chao Li, Jie Liu, Xiaowei Guo, Sen Zhang, Huajian Zhang, Hanwen Xu. 7-13 [doi]
- Research on Three-stage Hybrid Algorithm in Improving Photoelectric Conversion EfficiencyTeng Zhang, Jinpeng Wang, Bo Zhang, Qingxue Yao, Yufang Kang, Yuncui Zhang. 14-18 [doi]
- Research on Fabry-Perot Fiber Optic Speech Sensor and Speech EnhancementQingxue Yao, Jinpeng Wang, Yufang Kang, Bo Zhang, Xufen Xie. 19-23 [doi]
- Research on visible light indoor positioning system based on improved sparrow search algorithmBo Zhang, Jinpeng Wang, Qingxue Yao, Teng Zhang, Junqiao Liu. 24-29 [doi]
- Research on layout optimization and positioning of LED light source based on visible light communicationYufang Kang, Jinpeng Wang, Qingxue Yao, Bo Zhang, Li Liu. 30-34 [doi]
- A Survey of Short-Term Traffic Volume Prediction Methods Based on Composite ModelsWenjing Zhang, Dehong Kong, Xingmin Zou, Fengya Xu, Qingqing Yang, Chao-Hsien Hsieh. 35-41 [doi]
- Research on smart wearable clothing for the senior citizenHaoqi Wang, Jinpeng Wang, Teng Zhang, Yufang Kang, Bo Li. 42-46 [doi]
- Research on Deepfake Technology and Its ApplicationJiang Bu, Ri-Lie Jiang, Bin Zheng. 47-51 [doi]
- Multiuser Polar Coding based Multiple Access Interference Suppression Method for UWB Indoor Communication SystemsMingyang Wu, Zhendong Yin, Zhilu Wu. 52-56 [doi]
- A Survey on Mechanisms for Fast Network Packet ProcessingYimin Du, Keyang Chang, Jinglin Shi, Yiqing Zhou, Min Liu 0001. 57-66 [doi]
- A Case Study of an Automatic Package Layering Algorithm for Linux DistributionsJialin Tan, Lei Zhang, Jie Meng, Haolin Xue, Zheng Liu, Zhihao Ding, Qi Jing. 67-74 [doi]
- Information entropy-based adaptive parameter assignment method for dual control neural networksQianyun Zhang, Shuo Sun, Yongming Han. 75-80 [doi]
- Application for Integration of Haar Cascade and Local Binary Pattern HistogramTherese Marie M. Mactal, Charmaine C. Paglinawan, John Allan Kurt M. Bantegui. 81-86 [doi]
- Text Sentiment Analysis Method Based on Support Vector Machine And Long Short-term Memory NetworkLepeng Wang. 87-91 [doi]
- Information extraction method of topic webpage based on multi-angle feature learningLijuan Liu. 92-96 [doi]
- Research on Prediction of Pan-Cancer Immune Checkpoint Blockade Based on Multi-Head Self-Attention Classification ModelHuazheng Pan, Wenxin Hu, Wei Zheng, Taojun Jin. 97-105 [doi]
- Improved wavelet packet threshold denoising method for complex electromechanical hydraulic systemZizhou He, Suicheng Li, Wenwen Shen, Tianyou Yuan, Xiaowei Zhou. 106-112 [doi]
- Base Station Traffic Prediction based on Feature Selection and Stacking Ensemble LearningLong Zhao, Youzhi Huang, Yanyan Wang, Yin Xu, Qiangzhong Feng, Enhong Chen. 113-117 [doi]
- Iterated Sub-window Weighted Guided FilterHui Yin, Wenming Tang. 118-125 [doi]
- Research on Social Stability based on AHP-FCE and CART Decision TreeQianwei Qu, Wenxue Wu. 126-130 [doi]
- 3D Associative Embedding: Multi-View 3D Human Pose Estimation in Crowded ScenesZhiyi Zhu, Sheng Liu, Jianghai Shuai, Sidan Du, Yang Li. 131-139 [doi]
- Join active and passive beamforming optimization for double-RIS aided CR networksYuhui Luo, Wen Chen. 140-144 [doi]
- QuickStorage: A Write-optimized Efficient Storage System for Trusted Execution EnvironmentsXinyuan Luo, Yiming Zhang 0003. 145-150 [doi]
- Multi-scale 2.5D Integrated Model for False Positive Reduction in Abdominal Lymph Node DetectionChangquan Lu, Kun Yu, Xukun Zhang, Wenxin Hu. 151-156 [doi]
- DrivCapsNet: A Driving Style Detection Algorithm Based on Capsule NetworkYueyue Wang, Chenxing Wang 0001, Haiyong Luo, Fang Zhao 0003. 157-163 [doi]
- Multi-feature Fusion Network of ECG and VCG for coronary artery disease detectionXiaomeng Wang, Jie Li, Xingjun Wang. 164-169 [doi]
- Decoupling Transformer with Convolutional Fusion for Mechanical Composite Fault DiagnosisXia Liu, Kun Feng. 170-179 [doi]
- Research and implementation of network impairment simulation systemDongyan Zhang, Yuanjun Xu. 180-184 [doi]
- Few-shot Question Answering with Entity-Aware PromptYi Chen, Xingshen Song, Jinsheng Deng, Jihao Cao. 185-190 [doi]
- A Remote Fatigue Driving Detection System for Ship Supervision based on Physiological Response FeaturesJinming Tong, Wei Cheng, Chen Li, Xuming Wang, Guanglin Chen. 191-196 [doi]
- Research on Ship Target Recognition based on Infrared Image MethodYibo Cao, Wei Cheng, Xuming Wang, Yuxin Huang. 197-202 [doi]
- A Server-side Dynamic Bitrate Generation for Live StreamingDongyan Zhang, Chongwei Sun, Weihua Li, Yuanjun Xu. 203-209 [doi]
- Intelligent Precision Recommendation Model of Digital Marketing Based On K-Means AlgorithmRuo-Qian Yang. 210-214 [doi]
- Research on Quantitative Trading Model - - Taking Bitcoin and gold as examplesXiangyang Xu, Xinglei Xu. 215-220 [doi]
- Research on behavior recognition algorithms in classroom scenariosHaowei Liu, Duo Wang, Chongwen Wang. 221-228 [doi]
- A low end-to-end delay routing discovery mechanism with directional antennasQinglin Zhang, Yingshuai Xu, Jinlin Peng, Han Han. 229-234 [doi]
- Simulation Of Urban Carbon Emission Model Based On Big Data Fusion Machine Learning AlgorithmZhuo Li, Guo-Qun Deng. 235-239 [doi]
- CADCN: A click-through rate prediction model based on feature importanceQi Wang, Yicheng Di, Yuan Liu 0021. 240-246 [doi]
- Multi-Scale Contrastive Learning Based Heterogeneous Graph EmbeddingYu Zhang, Jia Wang, Zeqian Li. 247-252 [doi]
- Energy-Saving Small-Cell Wake Up Strategy for Ultra-Dense Networks Based on User Behavior PredictionPeng Long, Jin Li, Nan Liu 0001, Zhiwen Pan, Xiaohu You 0001. 253-258 [doi]
- An AAE-based Proactive Content Chunked Caching Scheme with Mobility Prediction in VANETsLimei Jin, Chenchen Zhu, Lei Yu 0015, Benhong Zhang. 259-264 [doi]
- LanYUAN, a GPT large model using Curriculum Learning and Sparse AttentionGonghai Zhou, Yuhong Zhang, Rizhen Hu, Yang Zhang. 265-272 [doi]
- Attentive Implicit Relation Embedding for Event Recommendation in Event-based Social NetworkYuan Liang. 273-277 [doi]
- On-board Monocular Vision-based Ground Target Recognition and Localization System for a Flapping-wing Aerial VehicleYuxuan Jin, Yixiang Ren, Tiantian Song, Zhiling Jiang, Guanghua Song. 278-285 [doi]
- Review on Advances of Spaceborne DatabaseHuifang Ji, Jian Xu, Bo Liu, Chaowei Liu. 286-290 [doi]
- Distributed Operator-Splitting Algorithm for Seeking GNE Aggregative GameLvming Fan, Huaqing Li 0001, Songyang Li, Zhe Li, Lifeng Zheng, Jun Li. 291-296 [doi]
- Security risk assessment method for delivery robot based on two-dimensional cloud modelWencai Huang, Xinjie Wu, Xuyang Zhang, Yuansheng Zhong, Xiaopeng Zhu. 297-303 [doi]
- LRFAN: a multi-scale large receptive field attention neural networkCi Song, Zhaogong Zhang. 304-311 [doi]
- A Re-ranking Approach for Two-sided Fairness on Recommendation SystemsYaowei Peng, Xuezhong Qian, Wei Song. 312-316 [doi]
- Attention-Based BiLSTM For Malware Family ClassificationYonglin Liao, Nurbol Luktarhan, Yue Wang, Qinlin Chen. 317-323 [doi]
- A review of computing offloading and caching in edge computing based on reinforcement learningMengke Guo, Wushuang Wang. 324-329 [doi]
- Modified Hexagonal Shaped Ultra-Wideband THz AntennaJaiverdhan Choudhary, Bhawna Kalra, Sandeep Vyas, Anand Nayyar, M. M. Sharma, Ghanshyam Singh. 330-334 [doi]
- Interpretable Image/Video Compression by Extracting the Least Context MapHuan Huang, Wei Yang 0011. 335-342 [doi]
- Passenger Flow Prediction of Tianjin Metro Line 3 under Time Series ClusteringZhao Wang. 343-348 [doi]
- Research on lightweight core network solutions for 5G private networksZhichao Zeng, Hong Zhang. 349-355 [doi]
- Extended application of Small-Sample Information DiffusionShanshan Yuan. 356-360 [doi]
- Glucose Sensing Utilizing Complex-Valued Neural NetworksYiqi Lv, Xiang Meng, Yong Luo, Yan Pei. 361-365 [doi]
- Statistical Power Grid Observability under QoS Constraints with Fixed-Rate Wireless TransmissionsYixuan Zhang, Nan Liu, Zhiwen Pan. 366-374 [doi]
- RepVGGFuse: an approach for infrared and visible image fusion network based on RepVGG architectureZhang Xiong 0002, Xiaohui Zhang, Qingping Hu, Hongwei Han. 375-379 [doi]
- Object detection of inland waterway ships based on improved YOLOv7Wei Guo, Zhiyong Lv, Jin Li, Ruishu Chen. 380-387 [doi]
- Multi-Resolution Diffeomorphic Image Registration with Convolutional Vision Transformer NetworkTao Xu, Ting Jiang, Haoyang Xing, Xiaoning Li. 388-397 [doi]
- Mask Multi-Head Attention with Partition Network for Vehicle Re-IdentificationYang Liu, Chengyu Kong, Yue Li, Peng Zhang, Hangyou Yu. 398-402 [doi]
- Towards Effective Crowd-Assisted Similarity Retrieval of Large Cursive Chinese Calligraphic Character ImagesHaohong Li, Yi Zhuang 0001, Yujia Ge, Tao Lou. 403-409 [doi]
- Open Set Domain Adaptation with Zero-shot Learning on GraphXinyue Zhang, Xu Yang, Zhiyong Liu 0001. 410-414 [doi]
- STFormer3D: Spatio-Temporal Transformer Based 3D Object Detection for Intelligent DrivingWei Liu, Yue Zhang, Haoxiang Jie, Jun Hu. 415-420 [doi]
- Application of Vision-Series Transformer in screening for coronary heart diseases using coronary CT angiographyKunlun Wang 0005, Hanyang Meng, Xingjun Wang. 421-425 [doi]
- SE-UF-PVNet: A Structure Enhanced Pixel-wise Union vector Fields Voting Network for 6DoF Pose EstimationYuqing Huang, Kefeng Wu, Fujun Sun, Chao Cai. 426-439 [doi]
- Reidentifying soccer players in broadcast videos using Body Feature Alignment Based on PoseSara Akan, Songül Varli. 440-444 [doi]
- Ghost-Depth: A Lightweight Encoder-Decoder Network for Monocular Depth EstimationWei Quan, Jingjing Liu, Chao Xu, Cheng Han, Jia Song, ShanShan Qi. 445-450 [doi]
- YOLO-WS: A Novel Method for Webpage SegmentationLi Dai, Zunwang Ke, Wushour Silamu. 451-456 [doi]
- Real-Time Face Recognition with Mask using Deep Convolutional Neural NetworkMd. Ashif Mahmud Joy, Md. Fuad Hasan Khan Chowdhury, Sinha Afroz, Md. Nurul Islam, Ruaida Muhsinat, Mukta Akanda Moly, Dewan Farid. 457-461 [doi]
- YOLOv4-based semantic information extraction for indoor scene targets fetching algorithm researchJin Wang, Xiaobo Sun, Mingze Wang, Changwu Li, Xiaoman Tang. 462-469 [doi]
- Few-shot Object Counting and Detection with Query-Guided AttentionYuhao Lin. 470-474 [doi]
- Complementary Disentangling and Dynamic Graph Convolution for Skeleton Based Action RecognitionKemin Shi, Lin Xu. 475-487 [doi]
- Video Reconstruction Method Based on Spatio-Temporal CorrelationPing Han, Xueting Bian, Cheng Fang, Jingchun Gao, Mingrui Chen. 488-493 [doi]
- Collaborative filtering hybrid recommendation algorithm incorporating knowledge graphQi Guo, Yong Shao, Changshun Yan, Yuliang Shi. 494-499 [doi]
- A Novel Scholar Embedding Model for Interdisciplinary CollaborationYitong Hu, Zixuan Zhu, Yizhe Wang, Junxiang Wang, Zehao Xing. 500-505 [doi]
- An Enhanced Visual SLAM Algorithm for Indoor Scenes based on ORB FeaturesJin Wang, Xiaobo Sun, Mingze Wang, Yufei Xie, Ze Wang. 506-514 [doi]
- A Study of Sentence-BERT Based Essay Off-topic DetectionPengcheng Huang, Li Li 0088, Chunyan Wu, Xiaoqian Zhang, Zhigui Liu. 515-519 [doi]
- A Point Cloud Optimization Algorithm Based on Spatial Geometry Relationship and Siamese NetworkNan Yang, Yaping Zhang. 520-524 [doi]
- Knowledge Graph Construction from Tables in Chinese Electric Power PDF DocumentsRong Zhang, Changlong Wang, Siyun Bi, Qibin Fu, Xingyu Li, Tingting Gan. 525-530 [doi]
- A Novel Elasticsearch Encryption Scheme for Intelligent Transportation System ApplicationsTao Wang, Haitao Huang, Ting Tian, Zhengda Zhou. 531-535 [doi]
- CryptMTD: Cryptography Based Moving Target Defense System for Mobile ApplicationYuehua Lv, Ting Tian, Huanyao Hu, Wei Kui, Dongchuan Lu, Zhengda Zhou. 536-540 [doi]
- GPU Cluster RDMA communication technology and congestion controlGuicai Liang, Siti Norbaya Daud, Nor Alina Binti Ismail. 541-547 [doi]
- Evaluation of The Spatial Quality of Sunken Plazas Based on Multi-source Time-spatial DataTian Wang, Xiaoqi Kang, Xiaojuan Li. 548-553 [doi]
- Research and design of distributed testing framework for 5G networkYugang He, Fengli Wang, Qian Sun, Lin Tian, Yuanyuan Wang. 554-561 [doi]
- The development status, risks and countermeasures of digital works NFT in the metaverseLijuan Liu, Yang Chen, Chengyu Guo, Zixuan Chen. 562-566 [doi]
- Demand Analytics in E-Commerce Leveraging Computer Vision AlgorithmsJing Wang, Anning Li, Jiaxin Zhang, Yancong Deng. 567-575 [doi]
- Research on Abnormal Traffic Detection of Internet of Things Based on Feature SelectionYongrui Liu, Zhimei Lv, Zhongjin Liu. 576-582 [doi]
- An Efficient and Reliable I/O Mapping Protocol for Industrial Cyber-Physical SystemsSong Liu, Liang Shi, Zhiwei Liu. 583-588 [doi]
- Application Research on Mining the Value of EMR Data Based on Word Frequency AnalysisSuxiang Weng, Qinyin Chen, Wei Li. 589-594 [doi]
- Human detection algorithm based on I-UnetXuanyue Li, Xiao Yu, Aijia Wang. 595-599 [doi]
- Probing the influence maximization-cost minimization problem in social networks by using a multi-objective discrete differential evolution optimizationJianxin Tang, Li Zhang, Pengli Lu, Jimao Lan. 600-606 [doi]
- A Hybrid Deep Learning Model Considering External Factors for Accurate Short-Term Traffic Flow PredictionJun Xiang, Jianwen Xiang, Guanjie Li, Yongsheng Wang, Liping Lu. 607-613 [doi]
- ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a NetworkZhiqiang Li, Yonghong Chen, Zhan Teng, Xuwen Huang. 614-620 [doi]
- Convolutional neural network-based breast image diagnosis and analysis systemJianing Cao, Pei Zhu. 621-625 [doi]
- Design of a Solution Concentration Measurement System Based on Light Intensity MethodYu Chen, Jingjing Gao, Yuhui Ni. 626-630 [doi]
- Genetic algorithm and dynamic planning based airline shipment optimization systemZiyu Li, Siyuan Cheng 0016, Shirui Tang. 631-635 [doi]
- Analysis and identification of glass components based on regression models and improved K-means++ clustering algorithmsRifen Lin, Xuanye Tian, Gang Chen, Xuanran Wang. 636-641 [doi]
- Research on the optimal path planning technology of waste transfer vehicle based on Dijkstra's algorithmYushan Zhou. 642-647 [doi]
- A Reliable Blockchain Computation Offloading Scheme for Internet of ThingsChuanjian Yao, Youquan Xian, Chunpei Li, Dongcheng Li, Boyi Wang, Ying Zhao. 648-652 [doi]
- A Timed Calculus with Mobility for Wireless NetworksWanling Xie, Huibiao Zhu, Xi Wu 0005. 653-657 [doi]
- Deep Reinforcement Learning Based UAV Mission Planning with Charging ModuleYanfan Zhang, Hongyuan Zheng, Xiangping Zhai. 658-662 [doi]
- Image Diagnosis of Breast Masses Based on Deep LearningJianing Cao, Junbao yang, Chuxin Cao. 663-667 [doi]
- Ring Oscillator based on Integer Dynamic ProgrammingSiyuan Cheng 0016, Xiafei Yang, Congrui Bai, Honglei Zhou, Junshuo Ai. 668-672 [doi]
- Graph Quaternion-Valued Attention Networks for Node ClassificationJingchao Wang, Tongxu Lin, Guoheng Huang. 673-677 [doi]
- Concurrent Multipath Transmission for ultra-Reliable and Low Latency with Deep Reinforcement LearningTan Chen, Jiahao Ai, Xin Xiong, Fuxing Tan. 678-683 [doi]
- Research on Optimization Technology for Sequential Diagnostic Strategy based on Improved Quasi-Depth First Search AlgorithmXiaofeng Lv, Deyun Zhou, FuQiang Li. 684-692 [doi]
- Dynamic Topology Identification of Wireless Communication Networks Based on Hawkes ProcessLiang Chang, Ying Zhang, Qi Zhang. 693-700 [doi]
- Detection of Network Time Covert Channels Based on Image ProcessingXuwen Huang, Yonghong Chen, Zhiqiang Li, Teng Zhan. 701-707 [doi]
- Transportation Flow Prediction Based on Graph Attention Echo State NetworkTian Gan, Beining Xu, Jin Li. 708-713 [doi]
- Acoustic Pre-training with Contrastive Learning for Gunshot RecognitionXianjie Shen, Saimin Ma, Linlin Yang, Yubo Jiang, Zhifeng Xiao, Shu Xu. 714-719 [doi]
- An entity relation extraction method based on the fusion of contextual informationXiangyang Nie, Zunwang Ke, Wushur Slam. 720-725 [doi]
- Prediction based on traditional network prediction model and LSTM deep neural network modelHuiling Li, Daijun Wei. 726-730 [doi]
- A Dark Transformation-Equivariant Algorithm for Dark Object DetectionTongxu Lin, Junyu Lin, Jingchao Wang, Zhengnan Deng, Guoheng Huang. 731-735 [doi]
- A Conformer-Based Hashing Method for Large-Scale Image RetrievalJianyu Wu, Yong Wu. 736-742 [doi]
- Malware Detection in Internet of Things Devices Based on Association ModelsNgo Quoc-Dung. 743-748 [doi]
- Flood hazard assessment model based on ST-UNetHaoran Ran. 749-753 [doi]
- Human Activity Classification Based on Data Analysis and Feature ExtractionQiao Liang, Cheng Hu, Haiyan Huang. 754-758 [doi]
- A joint improved DETR network face recognition algorithm based on TSM module and DANNZiheng Ye. 759-764 [doi]
- Optimization of single and double supply and distribution networks based on ant colony algorithm and genetic algorithmCongrui Bai, Wanqi Hu, Siyuan Cheng 0016, Tong Wei. 765-769 [doi]
- Cross-layer Bandwidth and Antenna Configuration for Smart Grid under MIMO TransmissionYixuan Zhang, Nan Liu 0001, Zhiwen Pan. 770-775 [doi]
- Speech emotion recognition algorithm based on bimodality and attention mechanismHuangshui Hu, Hongyu Sun, Peisong Xie, Nanhao Shen, Mei Han. 776-781 [doi]
- Long Text Relationship Extraction Method for Complex ProductseHuaijun Wang, Hangbo Quan, Junhuai Li, Miaomiao Chen, Jiang Xu. 782-787 [doi]
- STM32-based Integrated UAV Air Monitoring SystemQihan Zhao, Pengbo Zhang, Yong Chen. 788-792 [doi]
- Research on Predictive Model Technology for Student Academic Development Based on Machine LearningYaJuan Zhang, Nan Hu, Ru Jing, Letao Ren. 793-797 [doi]
- Visual system design of tower crane based on improved YOLOJunping He, Zongfeng He, Wei Wang, Shenghui Wang, Zhibin Li. 798-802 [doi]
- Distributed Reinforcement Learning for Optimizing Age of Information and Energy Consumption in Wireless Powered IoT SystemsXianzhe Xu, Nan Liu, Zhiwen Pan. 803-810 [doi]
- A Convolutional Neural Network Acceleration Method Based on 1-D Fast Fourier TransformYitong Hu. 811-815 [doi]
- Proposed 5G broadband telecom network solution over TVWS and software defined radioYvan Paillard Kalia-Sya Dodoagnen, Eugene Baba Sire Zabolo, Edgard Ndassimba, Samuel Ouya, Gervais Mendy. 816-820 [doi]
- Research on the Effect of Asymmetric Dispersion on Signal TransmissionChaosheng Lu, Jianwu Wang, Xingzhong Xiong. 821-827 [doi]
- A Novel Carrier Tracking Loop Based on Three-Stage Bandwidth KFJun Jing, Jinquan Chen, Zhipeng Shi, Peisheng Pan. 828-832 [doi]
- Blockchain-based Privacy-Preserving Reputation Management for CrowdsensingLei Xu, Yuewei Zhang, Shaorui Song, Liehuang Zhu. 833-841 [doi]
- Fuzzy Adaptive Fixed-Time Qantized Consensus Tracking Control of Power-Chained Nonlinear Multi-Agent Systems with UncertaintiesChuhan Zhou, Ying Wang, Zuntian Chu, Ruichao Zhu, Gang Hu, Wenfei Wang. 842-850 [doi]
- A novel approach to minimize the Black Hole attacks in Vehicular IoT NetworksAbdur Rashid Sangi, Lokeshwari Anamalamudi, Satish Anamalamudi, Anil Carie, Murali Krishna Enduri. 851-857 [doi]
- Deep Multifaceted Highlight Network for Multi-objective Ranking in Trigger-Induced RecommendationJian Liu, Huanshu Gou. 858-865 [doi]
- A GAN combined with Graph Contrastive Learning for Traffic ForecastingBaowen Xu, Xuelei Wang, Zhenjie Liu, Liwen Kang. 866-873 [doi]
- Design Stock Market Trading Strategy with Deep Learning: A Bi-LSTM Based ApproachYanjun Long, Xiaopeng Wang, ShiMan Zhang, Sicun Han, Yancong Deng. 874-879 [doi]
- Key Node Recognition Based on Community DiscoveryXianwei Zhu, Wei Liu, Zeyu Gu, Zihao Liu. 880-886 [doi]
- Real time pulse compression processing technology based on FPGAMengrui Liu, Yunkai Deng, Wenliang Nie. 887-893 [doi]
- Building extraction from remote sensing images using edge preserving mechanismYi Gao, Bo Wu, Yuxiang Xia, Xiangning Liao. 894-899 [doi]
- A robust video steganography algorithm for H.264/AVC based on secret sharingXuanlei Liu, Bing Zhao, Wenjia Wang. 900-905 [doi]
- Inverse Synthetic Aperture Radar Space Target Recognition Algorithm Based on Few-Shot Class-Incremental LearningChenxuan Li, Weigang Zhu, Hengde Qiu. 906-912 [doi]
- Multi-scale Feature Fusion Convolutional Neural Network for Multi-Modal Medical Image FusionJingjing Liu, Li Zhang, Aiying Guo, Yuan Gao, Yumei Zheng. 913-917 [doi]
- Unsupervised Person Re-identification with Multi-Level Feature Contrastive LearningMengyao Li, Xueshuai Lv, Ling Gao, Rumeng Zhang. 918-923 [doi]
- RISC-V ISA Extension Toolchain Supports: A SurveyYue Gao, Wei Qian, Enfang Cui. 924-929 [doi]
- Research on small target Detection Algorithm of UAV based on Mask R-CNNCaiwen Jiang, Tianliang Zhang, Ruige Wei, Zihao Ren, Wanpeng Hou. 930-935 [doi]
- Generation of Adversarial Malware Based on Genetic Algorithm and Instruction ReplacementSiyi Pan, Aoxiang Sun, Yingmei Xu, Zhuoqian Liang, Yuxia Sun. 936-942 [doi]
- Design and Research of Intelligent Weld Defect Detection SystemJiacheng Zhou, Zhixin Qiu, Jianwei Niu, Jiamin Huang, Xiaoping Pan, Zhi Tao. 943-947 [doi]
- Secure Transaction Mechanism of Blockchain Digital Assets Based on Distributed IdentityNaijia Liu, Yuwen Zhang, Haihua Li, Qizheng Sun. 948-956 [doi]
- Higher Order Frame Interpolation in Composite Long-Term Referencing for Versatile Video CodingOlukunle Mobolaji Akinola, Bintao Hu, Karim Moussa. 957-962 [doi]
- Noise and Edge Based Dual Branch Image Manipulation DetectionZhongyuan Zhang, Yi Qian, Yanxiang Zhao, Xiaowei Zhang, Lin Zhu, Jinjin Wang, Juan Zhao. 963-968 [doi]
- Anomaly Detection in Internet of Things Based on Logs Using Machine Learning and Deep Learning TechniquesNguyen Huy-Trung, Nguyen Viet Quoc. 969-974 [doi]
- Capacity Results of Coded Caching: The Pareto Optimal Frontier of the Two-User CaseZhiqiang Luo, Nan Liu, Wei Kang. 975-982 [doi]
- A Few-shot Learning Method for the Defect Inspection of Lithium Battery Sealing NailsChuan Xu, Yuping Ye, Jiankai Zhang, Zhan Song, Juan Zhao, Feifei Gu. 983-989 [doi]
- Accelerating Hierarchical Federated Learning with Adaptive Aggregation Frequency in Edge ComputingSuo Chen, Zhenguo Ma, Zhiyuan Wang. 990-995 [doi]
- Transaction-aware heterogeneous graph embedding for recommendationJie Zhou. 996-1001 [doi]