Abstract is missing.
- CTCRNN: A Hybrid CNN-BiLSTM Based Classification Method for Industrial IoT Encrypted Traffic Based on Spatiotemporal FeaturesHuiqi Zhao, Shunfa Sun, Rui Wang, Fang Fan, Lu Liu. 1-6 [doi]
- A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on BlockchainXingyu Zhou, Wenmin Li, Huimin Zhang. 7-10 [doi]
- A Board-level Hardware Trojan Detection MethodYang Zhang, Jian Wang, Zhaorui Yang. 11-15 [doi]
- Intrusion Detection of IoT Traffic Payload Based on Parallel Neural NetworksYuhang Zhang. 16-20 [doi]
- Information security protection in hybrid officeJun Ma, Syazwina Alias, Chunya Huang. 21-25 [doi]
- Design of network security protection network architecture for intelligent networked vehiclesXiaoping Gao, Yue Pan, Jinjin Li, Tao Ji, Yin Yuan, Zhengnan Liu. 26-33 [doi]
- Supply Chain Financing Risk Identification and Control under the Internet of Things Financial ModelYanhong Wu. 34-38 [doi]
- Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge GraphYu Zhang, Yi Zhuang. 39-43 [doi]
- A single-class attack detection algorithm for smart grid AGC system based on improved support vector machines algorithmChao Hong, Jiaye Tao, Yun Fu, Yiwei Yang, Lipeng Wei, Zhihong Liang, Junrong Liu. 44-50 [doi]
- Design and Application of Public Risk Perception Early Warning System Based on Machine Learning AlgorithmBinghui Xu. 51-54 [doi]
- A model for evaluating the robustness of network covert channels based on entropy TOPSIS methodJiajing Zhang, Bangquan Xu. 55-60 [doi]
- Decoupled User Preference Enhanced Fake News DetectionHao Liu. 61-65 [doi]
- Survey of cyberspace surveying and mappingZhenwan Zou, Jia Chen, Wenshou Wu, Bin Wang, Yicheng Liu. 66-71 [doi]
- Research on fake news detection based on CLIP multimodal mechanismJinzhong Xu, Yujie Zhang, Weiguang Liu. 72-79 [doi]
- Ensemble Learning Techniques for the Detection of IoT BotnetsAhsan Nazir, Jingsha He, Nafei Zhu, Xiangjun Ma, Faheem Ullah, Sirajuddin Qureshi, Ahsan Wajahat. 80-85 [doi]
- A Certificateless Aggregate Signature Scheme without Bilinear PairingJun Shen, Kai Wang, Zhong Lv, Jie Yu, Yue Cui, Jianxue Zheng. 86-90 [doi]
- Multi-Domain Fake News Detection Based on Serial Attention NetworksChongfeng Qiu. 91-96 [doi]
- Identity Authentication Based on Network TopologyXuqiang Hu, Chuanwen Lin. 97-101 [doi]
- Attribute-based keyword search encryption scheme for IoT edge environmentKangjun Zhang, Lingyun Yuan, Xingwei Peng. 102-107 [doi]
- Edge-guided Contextual Attention Fusion Network for Camouflaged Object DetectionBo Hu, Sibao Chen. 108-112 [doi]
- Research on Cross-domain Fake News detection based on Multi-space Fusion and Knowledge Graph EmbeddingChao Liu, Junlong Song. 113-117 [doi]
- Robust Uncertainty Estimation for Active SamplingYunlong Li. 118-122 [doi]
- GMC-YOLO: A Face Detection Algorithm Based on Enhanced YOLOv8Chongle Peng, Qingbing Sang. 123-126 [doi]
- Research on automatic execution system of power emergency plan based on artificial intelligenceLifeng Wang, Yongguang Niu, Zhimin Shao, Qiao Yuan, Bo Liu, Shipeng Hou. 127-130 [doi]
- A decision-support agent framework and its application in industryHongzhi Chen, Feng Pang. 131-137 [doi]
- Adaptive normalization data enhancement algorithm based on DCGANQingxuan Wang, Bin Zhao, Yongle Gao, Hewei Li, Ze Wang. 138-141 [doi]
- Research on federal learning privacy protection based on secure multi-party computingBin Liu, Eric B. Blancaflor. 142-147 [doi]
- Layout Point cloud local parallel attention feature learning network with enhanced spatial featuresXingfeng Li 0007, Yue Dong, Hua He. 148-152 [doi]
- Text Classification Network Based on Token Dynamic DecayGuanghong Zhou, Juan Yang, Ronggui Wang, Lixia Xue. 153-157 [doi]
- Use of Artificial Intelligence in the Personalisation of In-vehicle Interaction InterfacesMengyao Yu, Lijun Shi, Changhua He. 158-163 [doi]
- Cross modal human action recognition based on kernel manifold alignmentChengyu Han, Song Wang, Haiming Sun, Zhenming Zhang, Weiyao Xu. 164-167 [doi]
- Improved Genetic Algorithm Based Design for Controlling Big Data Discrimination PathsXiu Ye, Fei Lei, Huihui Dong, Wenli Jiang. 168-172 [doi]
- Generating Transferable Adversarial Examples From the Perspective of Ensemble and DistributionHuangyi Zhang, Ximeng Liu. 173-177 [doi]
- Non-homogeneous Haze Removal Based on Attentional Feature Enhancement in Encoder-decoder NetworksChenyi Wang, Xiaotao Shao, Yan Shen. 178-182 [doi]
- Design of Human Resources Management Decision System Based on Multi-Agent System and Reinforcement Learning AlgorithmWenyan Yao, Tianbao Zhang. 183-187 [doi]
- Research on the Construction of Cross-border E-commerce Guangdong-Hong Kong Full-Chain Intelligent Customs Clearance Information SystemChengguo Han, Bin Wang, Yufei Wu, Xiangyu Shi. 188-196 [doi]
- Lightweight insulator defect detection algorithm based on improved YOLOv8Mingyue Tang, Hang Wu. 197-201 [doi]
- Research on lightweight small target detection algorithm from the perspective of UAVJiannan Dan, ShuMin Liu, Shiyu Chen. 202-207 [doi]
- Nighttime Air Tracking Based on Improved Unsupervised Siamese NetworkHaoran Wei, Yanyun Fu, Deyong Wang, Rui Guo 0004, Xueyi Zhao, Jian Fang. 208-214 [doi]
- Intelligent Interaction Design and User Experience of VR Platform Based on Intelligent Perception and Deep LearningYadong Zhang, Yujuan Zheng, Meifang Liu, Lixia Sun. 215-219 [doi]
- Construction of a Layered Rule Base System Based on Cyber SecurityZhiyong You, Yuan Tao. 220-225 [doi]
- DP-YOLO: Enhancing Pedestrian Detection in Crowd Scenes with Deformable Convolution and Varifocal LossLi Jiao, Muhammad Irsyad Abdullah. 226-231 [doi]
- C2F System Design Target Poverty Alleviation System Design Based on BlockchainNa Liu. 232-236 [doi]
- MGTANet: Multi-Scale Guided Token Attention Network for Image CaptioningWenhao Jia, Ronggui Wang, Juan Yang, Lixia Xue. 237-245 [doi]
- Research on the Construction and Management Monitoring of Big Data Platform Based on Artificial IntelligenceYan Zheng. 246-250 [doi]
- DMAED: Dynamic Matte Aware Encoder-Decoder for Shadow RemovalYadong Zhou, Zhenfeng Zhu. 251-256 [doi]
- Pedestrian-vehicle detection model in road scenes based on improved YOLOv5Xiangqiong Tan, Zhuoshuai Wang. 257-260 [doi]
- A Study of DistilBERT-Based Answer Extraction Machine Reading Comprehension AlgorithmBo Li. 261-268 [doi]
- Designing an Efficient Framework for Large-Scale Data Processing and Analysis Based on Deep Learning TechnologyQian Liu, Xingda Wang. 269-274 [doi]
- Research on the Optimization Strategy of Command and Control System Based on Complex Network TheoryTengda Li, Gang Wang 0030, Chong Du, Qiang Fu, Xiangyu Liu. 275-280 [doi]
- ChemGen: Towards Understanding First-Principles Calculation Code Generation Based on Large Language ModelsPeng Gao, Feng Qiu, Baojian Hua. 281-287 [doi]
- TSR-YOLO: Multi-Stage Self-Processing Method for Small Traffic-Signs RecognitionFutian Wang, Weijie Lv, Jin Tang 0001, Andong Lu. 288-294 [doi]
- Research on News Text Classification Based on BERT-BiLSTM-TextCNN-AttentionJia Wang, Zongting Li, Chenyang Ma. 295-298 [doi]
- Seed Germination Detection Method Based on Lightweight YOLOv5Yuanchang Zhang, Yongming Huang. 299-304 [doi]
- Improved YOLOv5 Based on the Mobilevit Backbone for the Detection of Steel Surface DefectsKun Qiu, Changkun Wang. 305-309 [doi]
- A Single-Channel Sleep Staging Method Based on Self-Supervised LearningWei Gao, Zhengqing Hu, Yanqing Liu, Fangbing Qiu, Lin Han. 310-314 [doi]
- Self-Supervised Image Quality Assessment through Active LearningYunchao Yu, Qingbing Sang. 315-319 [doi]
- Active learning based fire detection method for YOLOv7Yangzhengyu Lu, Qingbing Sang. 320-324 [doi]
- Multi-Label Text Classification Based on Contrastive and Correlation LearningShuo Yang, Shu Gao. 325-330 [doi]
- Research on Interactive Image Segmentation Algorithm Based on Coarse to FineKai Yang, Jianwu Long. 331-334 [doi]
- Detection of Appearance Defects in Cigarettes Based on AI Artificial IntelligenceQiusheng Tian, Qiang Liu, Li Wang, Kunfeng Zhang. 335-340 [doi]
- Research on Financial Fraud Text Classification Based on PET-BiLSTMFeifei Zou, Su Hu, Wei Yu, Zejun Yan, Sijun Chan. 341-345 [doi]
- Homogenous multimodal 3D object detection based on deformable Transformer and attribute dependenciesYue Dong, Xingfeng Li 0007, Hua He. 346-351 [doi]
- TAGTN: Traffic Prediction Model based on Adaptive Graph Transformer NetworkZhedian Zheng, Wei Sun. 352-357 [doi]
- Research on defect detection method of overhead line insulator based on MACE-YOLOQiang Zhang, Shanjie Li, Ying Li, Dongdong Feng. 358-364 [doi]
- Research on medical text named entity recognition based on Two-stage approachFuquan Sun, Ximeng Xu, Xinyi Dong. 365-369 [doi]
- Aspect-level Sentiment Analysis Based on Heterogeneous Spatial-Temporal Graph Convolutional NetworksMengqing Jin, Xun Wang, Changlin Xu. 370-374 [doi]
- Cross-lingual voice conversion based on F0 multi-scale modeling with VITSDanyang Cao, Zeyi Zhang. 375-379 [doi]
- Unsupervised domain adaptation network for medical image segmentation with generative adversarial networksXiji Huang, Lingna Chen. 380-382 [doi]
- Chinese Long Text Classification Based On Gate-Temporal Convolutional Neural NetworkJiaxu Yang, Lifen Jiang, Shibo Fu, Jialin Chen, Xiu Zhang, Haoyu Guo. 383-387 [doi]
- An InterFormer-BERT Chinese named entity recognition model with enhanced boundaryYue Li, Tao Zuo. 388-394 [doi]
- Lightweight multi-attribute target detection for dogs and cats based on improved YOLOv7Danyang Cao, Fangfang Liu. 395-400 [doi]
- STUEFF-YOLOv5s: A Lightweight Method for Deep Identification of Students' Behavior in the ClassroomXiaolin Fan, Binghao Fan. 401-405 [doi]
- RumorSAGE: Semantic Augmentation Graph for Early Rumor DetectionChang Yang, Xia Yu, Jiayi Wu, Dan Xue, Yong Duan. 406-412 [doi]
- Combining the Unified Model of Aesthetics (UMA) with Visual Information Processing to Investigate Computer AestheticsYanfeng Hu, Mohd Faiz Yahaya, Saiful Hasley Ramli. 413-419 [doi]
- Video summarization network based on Space-Time attention and genetic algorithm optimizationNaixiang Ao, Fucheng Shi. 420-425 [doi]
- Segmentation of Apple Diseased Leaves by Multiscale Feature Extraction UNet ModelingXiuman Liang, Shaopin Gao. 426-431 [doi]
- SSDFuse: A Semantic Segmentation-Driven Infrared and Visible Image Fusion MethodXianglin Hou, Xiaoming Ju. 432-437 [doi]
- Self-correlation prior-guidance and self-enhanced feature-fusion for few-shot segmentationShuaiyang Lin, Sibao Chen. 438-443 [doi]
- A Training Strategy of Flying Bird Object Detection Model Based on Improved Self-Paced Learning AlgorithmZiwei Sun, Zexi Hua, Hengchao Li. 444-450 [doi]
- A Recommendation Method for Electronic Components Based on Knowledge GraphXudong Yu, Yanhui Zhou, Fei Pu, Guilian Zhang. 451-455 [doi]
- Valve Part Inspection Algorithm Based on improved YOLOv8nHaojie Zhang, Hong Li, Ligang Zhao. 456-461 [doi]
- Research on Stock Forecasting Based on EWP-BiLSTM-AM ModelFuzhe Zhao, Han Xu. 462-468 [doi]
- TLACP: A Hybrid Deep Learning Model for Stock Market PredictionZechen Li. 469-479 [doi]
- Stock trading strategy based on reinforcement learning with GRU networkJipu Yu, Xiaochen Lu, Anqi Pan, Jiaji Shi. 480-485 [doi]
- RCTE: Relation Candidate-guided few-shot relational Triple ExtractionBowen Liao, Zhikun Lu, Yingqi Guo. 486-491 [doi]
- A Comparative Study of Multi-Factor Quantitative Investment Models Based on Investor SentimentZihao Yin, Quanli Wang, Wei Zhou, Huiyu Zhou 0002. 492-500 [doi]
- The Research on Blockchain Technology Promoting the Value of Agricultural Industry ChainKefeng Guo. 501-505 [doi]
- Theoretical Mechanisms and Empirical Tests of Structural Upgrading of Service Industry Driven by Digital EconomyYan Li, Meijia Chi. 506-510 [doi]
- The Effect of Online Comment Language Style on Consumers45 willingness to pay: The Evidence from NLP and ExperimentZhen Liu. 511-515 [doi]
- Study on the Relationship between E-commerce and Digital Economy at the Provincial Level in China Based on SPSS AnalysisYuan Li 0030. 516-524 [doi]
- Constructing Consumer Portraits of Environmentally Friendly Clothing under the "Dual Carbon": Based on the Cart Decision Tree AlgorithmXingling Liu. 525-531 [doi]
- Research on enterprise data asset management and disaster recovery backupJincheng Wang, Zeyu Dou, Lei Huang, Xudong Guo, Tengteng Zhao, Jingshi Yang. 532-537 [doi]
- Exploration of Strategies for Dual-Snake Competition for Food Based on Greedy AlgorithmZhenrui Chen. 538-542 [doi]
- Sailing ship listing price forecast analysis based on support vector machineSongqing Liu. 543-547 [doi]
- Research on Interpretability Charge Prediction Method based on Legal Provisions IncorporatedDezhi An, Yuda Zhang. 548-554 [doi]
- Study On The Relationship Between Manufacturing Carbon Emission And High-Quality Developmentof Green Finance: A Case Study Of Fujian ProvinceDazhi Yue. 555-560 [doi]
- Internet Financial Public Opinion Monitoring Based on Word2vec-BI-LSTMYu Chao, Wang Chao. 561-568 [doi]
- Improving Bass model based on product value for forecasting new energy passenger vehicle salesFengxia Sun, Zhongya Han, Duokui He, Dongyuan Zhao. 569-574 [doi]
- An Empirical Model Analysis of the Typical Cross-border Scenarios of Automotive DataZhiai Qin, Jia Zhao, Peng Ge. 575-581 [doi]
- Research on the effect of digital economy development level on regional innovationZuchang Zhong, Luole Zhou, Shiyun Li, Yuyan Zeng. 582-587 [doi]
- Digital Inclusive Finance and Rural Industrial Prosperity in Western China: Effects, Heterogeneity and Mechanisms of ActionLi Chen, Yingli Zheng, Pingxing Chen. 588-594 [doi]
- Research on Simulation Models of Forward Market and Spot MarketJunhui Wu, Tao Liu, Xialing Xu, Dajun Xiao, Wenjuan Yu 0005, Yuxin Zhang, Xinyu Chen. 595-600 [doi]
- Research on Spea2 based on Chromosome Distance for Batch Flow Scheduling in Flexible WorkshopsZhenjun Jin, Jiaxing Li, Haidong Wang. 601-605 [doi]
- CTL: A Stock Price Index Prediction Network Based on a Hybrid Structure of CEEMDAN, Transformer and LSTMSong Sun, Liang Zhang, Chuanwei Yu. 606-612 [doi]
- Application of Multiple Linear Regression Equation Models in Analyzing Factors Affecting Hospitalization Costs for Oncology DiseasesYifeng Dou. 613-617 [doi]
- Diversified Transformer For Occluded Person Re Identification Based on Adaptive ConstraintsTingting Yuan, Sibao Chen. 618-623 [doi]
- A Multi-Strategy Improved Golden Jackal Optimization Algorithm Integrating the Golden Sine MechanismZhenyu Li, Zexi Hua, Yanjie Pang. 624-628 [doi]
- Active Disturbance Rejection Control of Permanent Magnet Synchronous Motor Based on Improved Dung Beetle AlgorithmZhenghao Lu, Guifang Guo. 629-633 [doi]
- The Impacts of Digitalization on Firms' High Quality DevelopmentMinghui Han, Haifeng Pang. 634-638 [doi]
- Research on Real-Time Endurance of Drone Swarms for Express Delivery DispatchZuhui Li. 639-642 [doi]
- Powering the future: application of machine learning to analyze the global renewable energy consumptionZonghao Zou. 643-649 [doi]
- Research on Performance Optimization of Encryption Algorithms for Network Security FrameworkTing Li, Jinjiang Yang, Yin Zhou, Shaojun Wei. 650-653 [doi]
- A machine learning-based trust evaluation model for wireless sensor networksYiyang Huang, Xiaoyong Li, Jie Yuan, Kaiguo Yuan. 654-658 [doi]
- ACBA: Object detection algorithm based on Adaptive Class Blurry AwareYuling Chen, Zhenxiang He, Jinwei Chen, Bin Wu. 659-664 [doi]