Abstract is missing.
- Multimodal Data Trajectory Prediction: A ReviewXiaoliang Wang, Hao Yue, Qing Yang. 1-5 [doi]
- A Systematic Review on Detection of Manipulated Satellite ImagesYuchen Nie, Xiangling Ding, Wenyi Zhu, Yulin Zhao. 6-11 [doi]
- Simulation for urban computing scenarios: An overview and research challengesLin Wu, Guogui Yang, Jintao Yan, Shuguang Ran, BaoKang Zhao, Huan Zhou. 12-17 [doi]
- A Short Review of Truck and Drone Collaborative Delivery ProblemYena Zhu, Min Liu, Dongyao Jin. 18-23 [doi]
- An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles EnvironmentZisang Xu, Ruirui Zhang, Peng Huang, Jianbo Xu. 24-29 [doi]
- Anomaly Detection Based on Deep Learning: Insights and OpportunitiesHuan Zhang, Rui Xie, Kuan-Ching Li, Weihong Huang, Chaoyi Yang, Jingnian Liu. 30-36 [doi]
- Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand SystemSihui Jia, Saiqin Long, Zhirun Zheng, Qingyong Deng, Ping Wang, Shujuan Tian. 37-45 [doi]
- Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHEMarc Titus Trifan, Alexandru Nicolau, Alexander V. Veidenbaum. 46-52 [doi]
- An Efficient and Privacy preserving Computation Framework for Tibetan medicineRuoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu. 53-58 [doi]
- Near-Source Attack for Isolated Networks with Covert Channel TransmissionZhiqiang Ruan, Yuchen Yang, Lejia Chen. 59-64 [doi]
- A Traceable Location Privacy Preserving Scheme for Data Collection in Vehicular Fog ComputingQinyang Chen, Keming Wang, Tao Xie. 65-71 [doi]
- Optimized Random Forest for DDoS Attack Detection in SDN EnvironmentZhaohui Ma, Jie Zhang, Mingdong Tang. 72-77 [doi]
- Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd SensingZhixue Li, Shiwen Zhang, Naixue Xiong, Wei Liang 0005. 78-84 [doi]
- Federated Learning Privacy-preserving Method Based on Bregman OptimizationGengming Zhu, Jiyong Zhang, Shaobo Zhang, Yijie Yin. 85-90 [doi]
- Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention NetworkYan Li, Xin Su, Xin Liu, He Yi Mu, Yi Zheng, Shuping Wang. 91-95 [doi]
- A Housing Price Prediction Method Based on Stacking Ensemble Learning Optimization MethodZhenyu Yang, Xinghui Zhu, Yangcong Zhang, Peng Nie, XinBo Liu. 96-101 [doi]
- An Efficient Virtual Channel Scheme Based on Multi-hop Payment ChannelFeng Li, Yaqin Liu, Wei Liang 0005, Songyou Xie, Yang Yang, Yuhui Li. 102-107 [doi]
- Revolutionizing Network Performance: The Active and Passive Service Path Performance Monitoring Analysis MethodJigang Wen, Yuxiang Chen, Kai Jin, Chuda Liu. 108-113 [doi]
- Predictable Track-based Routing in Flying Ad hoc NetworksZhu Kai, Zhao Baokang, Qin Xin 0001. 114-119 [doi]
- An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting SystemXiangwei Meng, Qingchun Yu, Wei Lang, Yufeng Liang, Zisang Xu, Kuanching Li. 120-125 [doi]
- NAS-YOLOX: ship detection based on improved YOLOX for SAR imageryHao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou. 126-131 [doi]
- A missing physical fitness test data classification method based on MLPPeng Che, Zhenlian Peng, Buqing Cao, Jianxun Liu, Tieping Chen, Runqing Fan. 132-137 [doi]
- A Weighted k-Medoids Clustering Algorithm Based on Granular ComputingShao-Jie Sun, Lin-Shu Chen, Ben-Xia Mei, Tao Li, Xue-Qi Ye, Min Shi. 138-143 [doi]
- MobileNetV3-YOLOv5-based Network Model for Pedestrian DetectionXiai Yan, Shengkai Ding, Weiqi Shi. 144-149 [doi]
- Social engineering in metaverse environmentMiaolei Deng, Haonan Zhai, Kai Yang. 150-154 [doi]
- 5G Spectrum ResearchPeiyuan Zhu, Lijun Xiao, Shu Tan, Jiahong Cai, Yingzi Huo, Ronglin Zhang. 155-160 [doi]
- Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based ModelJing Long, Cuiting Luo, Ruxin Chen. 161-166 [doi]
- BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural NetworksBing Xia, Yunxiang Ge, Ruinan Yang, JiaBin Yin, Jianmin Pang, Chongjun Tang. 167-172 [doi]
- A Secret and Traceable Approach for Cloud Data SharingChenying Xu, Yanfei Yin, Yingwen Chen. 173-180 [doi]
- A Sentiment-Support Graph Convolutional Network for Aspect-Level Sentiment AnalysisRui-Ding Gao, Lei Jiang 0007, Zi-Wei Zou, Yuan Li, Yu-Rong Hu. 181-185 [doi]
- Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial TrainingLantao Zheng, Wenxin Kuang, Qizhuang Liang, Wei Liang 0005, Qiao Hu, Wei Fu, Xiashu Ding, Bijiang Xu, Yupeng Hu. 186-191 [doi]
- An Improved Apriori Algorithm Based on Transaction Sequence CountingZuoting Ning, Zihua Ouyang, Xiangcheng Deng. 192-196 [doi]
- Temporal-aware QoS Prediction based on Tensor Factorization and Self-Attention for Cloud ServicesWenyu Tang, Mingdong Tang, Fenfang Xie. 197-202 [doi]
- Federated Learning-Based Intrusion Detection System for IoT Environments with Locally Adapted ModelSouradip Roy, Juan Li 0004, Yan Bai. 203-209 [doi]
- Data Augmentation for Tensor Completion via Embedding Gradient TrackingHan Deng, Yuhui Li, Songyou Xie, Yang Yang, Yaqin Liu. 210-216 [doi]
- Data Placement Strategy of Data-Intensive Workflows in Collaborative Cloud-Edge EnvironmentYang Liang, Changsong Ding, Zhigang Hu. 217-222 [doi]
- A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation MethodRunqing Fan, Zhenlian Peng, Buqing Cao, Jianxun Liu, Peng Che, Tieping Chen. 223-228 [doi]
- Using User-Item Sub-Block to Improve Recommendation SystemsShuping Wang, Chongze Lin, Yi Zheng. 229-234 [doi]
- A New Multi-Feature Recommendation Model Based on Recurrent Neural NetworkBen-Xia Mei, Lin-Shu Chen, Shao-Jie Sun, Pan-Yu Chen, Wei Liang Huang. 235-240 [doi]
- A Review of Blockchain-based Privacy Computing ResearchYang Yang, Kai Jin, Wei Liang 0005, Yaqin Liu, Yuhui Li, Osama Hosam. 241-246 [doi]
- EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge ComputingYihan Kong, Qinyang Chen, Jing Li, Ting Xiong, Tao Xie 0001. 247-253 [doi]
- Security sharing of smart city communication data based on blockchain technologyJun Guo, Liming Zhong, Yuxia Dong, Junjie Wu. 254-258 [doi]
- Exploring Heterogeneous Decentralized Markets in DeFi and NFT on Ethereum BlockchainPeilin Zheng, Bowei Su, Zigui Jiang, Changlin Yang, Jiachi Chen, Jiajing Wu. 259-267 [doi]
- Quarks: A Secure and Decentralized Blockchain-Based Messaging NetworkMirza Kamrul Bashar Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal H. Bappy, Kamrul Hasan, Carlos Caicedo. 268-274 [doi]
- Speech Emotion Recognition based on Semi-Supervised Adversarial Variational AutoencoderYufeng Xiao, Yuqin Bo, Zhiling Zheng. 275-280 [doi]
- MSA-Fed: Model Similarity Aware Federated Learning for Data Heterogeneous QoS PredictionYuelong Liu, Zhuo Xu, Jian Lin, Jianlong Xu, Lingru Cai. 281-286 [doi]
- Research on Application of Generative Adversarial Neural Network in Image RestorationYinE Zhang, Xiaowen Ye, Qi Zhou. 287-291 [doi]
- An improved U-Net network for medical image segmentationZhenzhen Wang, Jia Zhang, Zhihuan Liu, ShaoMiao Chen, Danqing Lu. 292-297 [doi]
- Algorithm-based Study on Transformation Combination for Carry-free Modified Signed Digit(MSD) AdditionBaofeng Qi, Shaojiang Sun, Yihui Tong, Jie Zhang, Zhehe Wang, Xianchao Wang. 298-304 [doi]
- scIAMC:Single-Cell Imputation via adaptive matrix completionShuai Zhang, Xiang Chen, Li Peng. 305-310 [doi]
- Incremental Multivariate State Estimation Technique-Based Fault Estimation Method for Motor-driven High-Voltage Circuit BreakersWei Li, Yongwei Fan, Xi Xiao, Fang Xie, Ping Zeng, Zhigang Liu, Yanwei Fu, Jing Long, Xiao Wang. 311-317 [doi]
- Joint Task Offloading and Scheduling Algorithm in Vehicular Edge Computing NetworksChongjing Huang, Qi Fu, Chaoliang Wang, Zhaohui Li. 318-323 [doi]
- Research on Fast Adaptive Transmission Models for International Inland Port Based on Edge IntelligenceYiwen Liu, Zhirong Zhu, Tangyan, Wenkan Wen, Xiaoning Peng, Yuanquan Shi. 324-329 [doi]
- A Prediction Based Resource Reservation Algorithm for Service Handover in Edge ComputingPeiyuan Guan, Yushuai Li, Amir Taherkordi. 330-335 [doi]
- A Survey on Task Partitioning and Scheduling for Vehicular Edge ComputingJing Huang, Wenyu Wu, Weihong Huang, Yufeng Xiao, Li Lisi, Jinxi Sun. 336-342 [doi]
- NLP Research Based on Transformer ModelJunjie Wu, Xueting Huang, Jingnian Liu, Yingzi Huo, Gaojing Yuan, Ronglin Zhang. 343-348 [doi]
- A Secure Semantics-enhanced Decentralized Open IoT Service PlatformVikram Pandey, Juan Li 0004, Yan Bai. 349-356 [doi]
- Deep Learning Emotion Recognition MethodWeidong Xiao, Wenjin Tan, Naixue Xiong, Ce Yang, Lin Chen, Rui Xie. 357-362 [doi]
- DPCNN-based Models for Text ClassificationMeijiao Zhang, Jiacheng Pang, Jiahong Cai, Yingzi Huo, Ce Yang, Huixuan Xiong. 363-368 [doi]
- Research and design of a machine vision-based silk cocoon quality inspection systemChengjun Yang, Jansheng Peng, Jiahong Cai, Yuna Tang, Ling Zhou, YaoSheng Yang. 369-374 [doi]
- A Simple Completely Adjacency List Oriented Relational Extraction ModelJing Liao, Xiande Su, Cheng Peng. 375-380 [doi]
- Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key TechnologiesGejing Xu, Wei Liang 0005, Jiahong Cai, Jiahong Xiao, Xingyu Chen, Yinyan Gong. 381-386 [doi]
- 3D Reconstruction From Traditional Methods to Deep LearningLan Yang, Chaoyi Yang, Rui Xie, Jingnian Liu, Huan Zhang, Wenjin Tan. 387-392 [doi]
- A Digital Copyright Protection System Based on Blockchain and with Sharding NetworkQinyang Chen, Yihan Kong, Lianglun Cheng. 393-398 [doi]
- A Blockchain-empowered Federated Learning Framework Supprting GDPR-complianceLijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, SiQi Xie. 399-404 [doi]
- Privacy Protection Technology for Internet of VehiclesMo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang. 405-410 [doi]
- A Terminal Device Authentication Scheme Based on Blockchain Technology in WBANYing Wang, Lei Cheng, Jianbo Xu, Shaobo Zhang. 411-416 [doi]
- Enhanced Feature Extraction Method for EEG Based on Empirical Mode DecompositionYihua Ma, Jing Liao, Jianliang Gao. 417-422 [doi]
- Machine Learning-based EEG Signal Classification of Parkinson's DiseaseHaoyu Wu, Jun Qi 0001, Yong Yue 0001. 423-428 [doi]
- ESR: Optimizing Gene Feature Selection for scRNA-seq DataTao Huang, Xiang Chen, Li Peng. 429-433 [doi]
- BFT Consensus AlgorithmsXiaojun Zhang, Weiyu Zhong, Ce Yang, Lin Chen, Jing Liao, Naixue Xiong. 434-439 [doi]
- A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN NetworksHonglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao. 440-445 [doi]
- Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market DemandsOsama Hosam, Rasha Abou Samra, Ahmed Ghonim, Khaled Shaalan. 446-451 [doi]
- Energy-saving Processors Two-phases Frequency Reduction Algorithm on Heterogeneous Embedded SystemsWeihong Huang, Kuan Jiang, Jing Huang, Li Lisi, Yufeng Xiao, Zihao Deng. 452-457 [doi]
- Incentive Aware Computation Resource Sharing and Partition in Pervasive Mobile CloudJigang Wen, Yuxiang Chen, Chuda Liu. 458-463 [doi]
- Advancing Matrix Decomposition Efficiency: A Study on FT-Matrix DSP Based SVD OptimizationAnxing Xie, Yonghua Hu, Aobo Cheng, Zhuoyou Tang, Peng Liu, Xin Zhang. 464-469 [doi]
- IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViTWenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou. 470-475 [doi]