Abstract is missing.
- VFLA: A Verifiable Federated Learning Scheme for Multi-Round Aggregation in VANETsKaiyue Li, Ziyan Zhang, Ruomeng Lin, Wei Ma. 1-7 [doi]
- Incorporating related stock and text for stock price movement prediction based on information fusionZonghui Li. 1-6 [doi]
- Fault Tolerance Identification of Application Layer Protocols Based on Protocol Natural Redundancy DecodingGuoxian Yu, Xiaomin Ran, Hongyi Yu, Yongbin Li, RenPeng Zha, Yueran Ma. 1-9 [doi]
- A Feasible Method for Computing the Greatest Common Divisor and Least Common Multiple Under Ciphertext Based on Fully Homomorphic EncryptionRuoyun Zhao, Xiaodong Li, Li Guan, Bofei Li, Shuoning Liang, Yimeng Dou, Lan Ma, Yuan Cui. 1-7 [doi]
- RFF Identification with CGAN-based Channel Estimation in Time-Varying ChannelsQinchu Cai, Nan Liu 0001, Zhiwen Pan. 1-6 [doi]
- SFedSV: Optimized Secure Federated Learning for Balancing Training Efficiency and Model AccuracyYiqin Lu, Guangchao Li, Jiarui Chen, Weiqiang Pan, Jiancheng Qin. 1-5 [doi]
- Automated Segmentation of the Timed-Up-And-Go Test Using Millimetre-Wave Radar Sensors for Mobility AssessmentKailu Guo, Elif Dogu, Khalid Z. Rajab. 1-6 [doi]
- SFFNet: Towards Universal Detection of Generated Images via Spatial-Frequency Domain FusionXiao Wang. 1-6 [doi]
- Data-Driven Neural Estimation of Capacity-Distortion Tradeoffs for Memoryless ISACShuhao Zhang, Nan Liu 0001, Wei Kang 0002. 1-7 [doi]
- Analyzing 1-Day Vulnerabilities in Embedded Devices: A Threat Modeling and Patching Pattern Study for Router SecurityShutong Lv, Zhuoran Chen, Yuzhu Hou. 1-5 [doi]
- Mapping the Knowledge Structure and Evolutionary Trends in Fire Detection Technologies: A CiteSpace-Based Visual AnalysisYunfei Xia, Lei Lei, Da Li, Wei Cai, Jinqiang He, Bo Gong, Zhiren Tian. 1-11 [doi]
- A Low-Latency Strategy for Asymmetric Hierarchical Coded CachingZeru Chen, Nan Liu, Wei Kang. 1-12 [doi]
- Enhance the machine learning algorithm performance in phishing detection with keyword featuresZijiang Yang. 1-6 [doi]
- A Verifiable CP-ABE Scheme with Policy Hiding and Dynamic Attribute Revocation for Secure Medical IoT SystemXiaodong Yang, Chengeng Wang, Ruiting Li, Chen Chen. 1-5 [doi]
- Research on the characteristics of Bluetooth low-power positioning chip platformJiang Zhong. 1-5 [doi]
- Enhanced Fire Detection Using Knowledge Distillation and Multi-scale Attention in YOLOv8Jiancheng Li, Wei Lin. 1-5 [doi]
- The e-derivative Boolean differential equation and logic circuit detectionJinglian Huang, Xiujuan Yuan. 1-5 [doi]
- UTCMKG: A Lightweight Universal Model for Constructing Traditional Chinese Medicine Case Knowledge GraphsTian-Yu Gu, Hua-yuan Yang. 1-6 [doi]
- Multi-Dimensional Analysis of CST Industry Development via Text MiningJie Dong, Yunshu Gao, Xiyang Liu 0001. 1-5 [doi]
- An applied study of multimodal financial data for financial early warning of listed companiesRonghui Pang. 1-5 [doi]
- Resilience Optimization of Transportation Network via Deep Reinforcement Learning: An Emergency Resource Allocation FrameworkZhangye Xu, Shan Liu, Ya Zhang. 1-8 [doi]
- Spacecraft Attitude Estimation Network Based on Deception Training and Space Channel Attention CollaborationChunyu Hou, Yang Gao, Qingwei Chen. 1-5 [doi]
- Attribute-Based Proxy Re-Encryption with Constant Size in Cloud ComputingXiaodong Yang, Shuqian Lian, Yaqi Wang, Chen Chen. 1-5 [doi]
- Vision-Language Pretraining for Pathology Report and Whole Slide Image Joint Analysis: Development and ValidationChao-Ya Wang, Chun Pan, Chao Meng, Na-Na Fang. 1-11 [doi]
- PyroGuardian: An IoT-Enabled System for Health and Location Monitoring in High-Risk Firefighting EnvironmentsBerkay Kaplan, Buhe Li. 1-11 [doi]
- Radio Frequency Signal Identification for Unmanned Aerial Vehicles Using Deep Learning TechniquesShuo Yang, Huaming Shen, Xiaobei Zhang, Zhenbin Lv, Anping Wang, Wenbin Lu. 1-6 [doi]
- Balancing Adaptivity and Efficiency: Revisiting Sparsity in Memory-Augmented Transformers for Time Series ForecastingPolycarp Shizawaliyi Yakoi, Xiangfu Meng, Chunli Yu, Xiaoyan Zhang 0005. 1-5 [doi]
- A Federated Learning Approach for Predicting Heart Disease RiskJunjie Jia, Shilong Liu, Fen Wang. 1-8 [doi]
- Research on Human-Computer Interaction Technology with Artificial Intelligence-based Gesture RecognitionFan Li, Wu Zeng, Jianxin Yang, Shuangshou Li. 1-5 [doi]
- Capacity and Imperceptibility Enhancement in Audio Steganography via a Novel Tone Insertion ModelSuhaib Ali, Nabeil Eltayieb, Rashad Elhabob, Talaat M. Wahbi. 1-5 [doi]
- LTSMiTransformer: Learnable Temporal Sparsity and Memory for Efficient Long-Term Time Series ForecastingPolycarp Shizawaliyi Yakoi, Xiangfu Meng, Chunli Yu, Victor Adeyi Odeh, Yongqin Zhang, Zheng Zhao, Danladi Suleman, Yuzhuo Yang. 1-7 [doi]
- Design and Implementation of a Modern Chinese History QA System Based on Knowledge GraphsLiyun Zhou. 1-5 [doi]
- PreSTAEFormer: A Hybrid GNN-Transformer Model with Pre-Attention Mechanism for Enhanced Urban Traffic PredictionYuntian Hou, Di Zhang, Md Maruf Hasan, Qiang Niu. 1-5 [doi]
- Enterprise on-site management system based on the microservice architectureZuyi Hao, Jingtao Shang, Mingming Dong, Lihua Gao, Bo Li, Jiaqi Hu, Mingyuan Ma. 1-5 [doi]
- RF Fingerprinting Based on DAFFM in Low SNRYali Zhang, Nan Liu 0001, Zhiwen Pan. 1-8 [doi]
- Research on Agile Software Upgrade Method for Spacecraft Onboard EquipmentMutian Hu, Yong Xi, Xu Ji, Jian Yang, Wei Wang. 1-5 [doi]
- A Multidimensional Study and Analysis of Satisfaction with Intangible Cultural Heritage IP Co-Branded Products Based on Multi-Source DataJie Dong, Xinru Li, Rui Men. 1-5 [doi]
- Abnormal Vehicle Event Detection Based on Deep LearningKun Song, Xing-Wei Huang, Ji-Ning Liu, Qiao Lin, Jin-Xuan Chen. 1-7 [doi]
- RF Fingerprint Identification Based on Multi-Channel Time-Frequency AttentionZihan Wu, Nan Liu 0001, Zhiwen Pan. 1-6 [doi]
- Demodulation Performance and Spectral Efficiency Analysis of LoRa Modulation with Different Spreading FactorsMenglei Xiu, Gaoqi Dou, Chunkai Liu, Hao Wang. 1-5 [doi]
- Retrieval-Augmented Generation for Smart Classroom ApplicationsZhengyuan Feng, Yanli Liu, Heng Zhang. 1-5 [doi]
- A Lightweight Transformer for Non-Invasive Ivory Texture RecognitionAikun Lin, Xu Liang, Tingyuan Zhou, Zhiyuan Zou, Linyuan Hao. 1-5 [doi]
- Photometric Measurement Performance Evaluation of Star Sensors Based on Finite Element Computational ModelFei Feng, Fei Xing, Huisheng Yao, Youxing Liang. 1-7 [doi]
- High-Accuracy 3D Reconstruction and Measurement of Flexible Surface ArraysYuchen Zhou, Yang Gao, Qingwei Chen. 1-5 [doi]
- Resilient Optimization of Sensor Networks Deployment Based on Graph Similarity Learning and Node Resilience PredictionChongrong Li, Rongfang Du, Jiaxin Wu, Wei Wang. 1-5 [doi]
- Multi-Hop and Multi-Path Computation Offloading for Integrated Access and Backhaul Networks Assisted by Multi-relay UAVZichao Gong, Ronggui Zou, Xiaoyang Zhou, Rongrong Xu, Qinqin Zhu, Yan Bao. 1-6 [doi]
- Digital Notification Solution for Prohibited Articles of Civil Aviation Checked BaggageShan Li, Yingzhi Zou, Zhe Wang, Peng Zong. 1-5 [doi]
- Study on UAV-borne SAR Image Mosaic Method in Electronic CountermeasureJun Meng, Dongtao Li, Yao Yu, Zhiyuan Lu, Junfeng Chen. 1-5 [doi]
- Enhanced Cross-Modal Point Cloud Completion FrameworkZihan Lin, Chen Qian, Yang Gao, Qingwei Chen. 1-5 [doi]
- IMU-Based Transportation Mode Recognition using Ensemble Learning and Multisensor FusionEzekiel B. Ouedraogo, Xingfu Wang, Ping Liu 0008, Ammar Hawbani. 1-5 [doi]
- A Keyword-Spotting(KWS) Chip Featuring a Bio-Inspired Neuron Model in 65-nm CMOSYantong Liu, Fei Tan, Ka-Fai Un, Wei-Han Yu, Rui Paulo Martins, Pui-In Mak. 1-6 [doi]
- Research on Boot Performance Optimization Strategies for the Kylin V10 Operating System on the Loongson 3A5000 PlatformRu Lu. 1-5 [doi]
- Enhancing EV Charging Load Forecasting with Change-Point Aware Attention MechanismQing Zhang. 1-5 [doi]
- The Efficacy of Large Language Models (LLM) in Predicting the Outcomes of Commercial Legal Cases based on The Saudi Law : A Preliminary StudyMuna Altherwi. 1-5 [doi]
- A Three-Dimensional Cardiomyocytes Communication Framework for Internet of Bio-Nano ThingFuqiang Hu, Pengfei Lu, Ping Xu, Hang Zhang, Ziwei Wang, Yongqiang Zhao. 1-5 [doi]
- A Quantum Steganography Method Based on Directional Transformation of a Perfect Code Generator MatrixChaolong Hao, Quangong Ma, Buyu Liu, Qi Chen, Xukui Yang, Dan Qu. 1-12 [doi]
- BP Bit-Flipping Decoding Algorithm for Polar Codes in Satellite Internet of Things Communication Based on Information GeometryChuanji Zhu, Yuanzhi He, Zheng Dou. 1-8 [doi]
- Multi-Scale Feature Fusion-Based Shilling Attack Detection AlgorithmJunjie Jia, Tianle Li, Wei Zhao, Zhiru Liu, Jiabin Feng. 1-6 [doi]