Abstract is missing.
- UAV Swarm Path Planning Algorithm Based on Starling FlockingMing Zhang, Yi Hu, Xiangchun Liu, Yanghao Zhang, Quan Yi, Wei Song. 1-7 [doi]
- Towards Industrial Foundation Models: Framework, Key Issues and Potential ApplicationsYingchao Wang, Chen Yang, Shulin Lan, Weilun Fei, Lihui Wang 0001, George Q. Huang, Liehuang Zhu. 1-6 [doi]
- Robustness Boost: MIR-Based Feature Enhancement in Deep Learning ModelsZiehen Song, Shuo Ma, Weijia Li. 1-5 [doi]
- Towards an Acceptance Probability-Aware Order Bundle in Crowdsource Food Delivery ServiceFeihong Huang, Wei Jiang. 6-11 [doi]
- Optimized-CNN enabled Facial Emotion Recognition within Collaborative Edge ComputingMing Tao, Lingling Liao, Kaitu Li, Ji Xu, Weiming Huang. 12-17 [doi]
- Research on Image-text Multimodal Emotions Analysis with Fused EmojiGuangbin Bao, Liangliang Sun, Rui Zhang, Bo Zhang, Zhiming Shen, Shuang Chen. 18-23 [doi]
- Opportunistic Network Routing Algorithm Based on Overlapping Communities and Communication WillingnessGaofeng Zhang, Yanhe Fu, Gang Xu, Xing Wang, Jia Hao, Ru Yi. 24-29 [doi]
- Opportunistic Network Routing Based on Node Sociality and Location InformationGaofeng Zhang, Jia Hao, Gang Xu, Xing Wang, Yanhe Fu, Ru Yi. 30-35 [doi]
- Parameter-Efficient Fine-Tuning Large Speech Model Based on LoRALing Ou, Gen Feng. 36-41 [doi]
- MLNT: A Multi-Level Network Traps Deployment MethodGuokun Xu, Weijie Wang, Degang Sun, Yanpeng Ma, Yan Wang 0081, Weiqing Huang. 42-47 [doi]
- Debiased Contrastive Learning For Graph Collaborative FilteringZhijun Zhou, Qing Xie 0002, Yuhan Wang, Lin Li, Yongjian Liu, Mengzi Tang. 48-54 [doi]
- A Two-Phase Task Allocation Strategy With a Hybrid ArchitectureXiaoyu Zhang, Wen Wang, Shuangyin Ren, Xiaomin Gong, Yuxuan Yang, Jingchao Wang. 55-60 [doi]
- A Vision Enhanced Framework for Indonesian Multimodal Abstractive Text-Image SummarizationYutao Song, Nankai Lin, Lingbao Li, Shengyi Jiang. 61-66 [doi]
- Vehicle Trajectory Prediction Based on Dynamic Graph Neural NetworkJijing Cai, Han Zhu 0005, Hailin Feng, Long Wen, Wei Wang 0077, Meilei Lv, Kai Fang. 67-72 [doi]
- Optimizing Future Predictions in Children's Health: Implementing OGPA-enhanced Deep Learning for Precise Child Height Forecasting in the Social Media AgeYantao Shao, Tianxiang He, Yan Mao, Kai Fang, Wei Wang 0077, Keji Mao. 73-78 [doi]
- ABCF: An Adaptive Balanced Multimodal Website Classification FrameworkZhiyuan Liu 0001, Wei Liu, Xinyang Tong, Qi Shen, Qiang Zheng, Hengrui Hu, Hong Liu, Xiaojie Wang. 79-84 [doi]
- DCCL: Distance-coefficient guided Clustering with Contrastive Learning for Few-shot Text ClassificationHan Wang, Chunhua Gu. 85-90 [doi]
- CGTS: A Transformer framework for time series prediction based on feature extractionYunpeng Ma, Qing Yu. 91-96 [doi]
- A Model for Sea Ice Segmentation based on Feature Pyramid Network and Multi-head Self-attentionYuanxiang Xu, Yuan Feng, Shengyu Song, Jiahao Liu. 97-102 [doi]
- Stock Trend Prediction: an Effective Hybrid Deep Model Based on Lead and Lag Correlation GraphsZhichao Li, Xianghui Yuan, Liwei Jin, Chencheng Zhao. 103-108 [doi]
- Multi-Graph Structure Learning-based Multivariate Time Series Anomaly Detection with Extended Prior KnowledgeShiming He, GenXin Li, Qinqing Guo, Kun Xie 0001. 109-114 [doi]
- CrowdLab: Collaborative Dataset Labeling System Based on Image SegmentationZehui Feng, Dongfu Zhu, Kejie Zhang, Yizhe Jia, Jiefan Qiu. 115-120 [doi]
- Interactive Web API Recommendation via Exploring Mashup-API Interactions and Functional DescriptionWanjun Chen, Qiqi Chen, Jiexun Shen, Guosheng Kang, Jianxun Liu, Buqing Cao, Lihong Zhang. 121-126 [doi]
- Distributed time-varying group formation tracking for multi-UAV systems subject to switching directed topologiesXin Cai, Xiaozhou Zhu, Wen Yao. 127-132 [doi]
- Intermediate Tasks Enhanced End-to-End Autonomous Driving with Uncertainty EstimationXuean Huang, Jianmei Su. 133-138 [doi]
- Visible Light Secure Communication Method for Internet of VehiclesCaipeng Gu, Jijing Cai, Zhihao Wen, Jiefan Qiu, Wei Wang 0077, Meilei Lv, Kai Fang. 139-144 [doi]
- RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase FingerprintShuai Wang, Siye Wang, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang. 145-150 [doi]
- Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring DecompositionFanfan Hao, Zhu Wang 0005, Yaobing Xu, Siyuan Leng, Liang Fang, FengHua Li. 151-156 [doi]
- KSM: Killer of Spectre and Meltdown AttacksZhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng. 157-162 [doi]
- Two-Server Verifiable Federated Learning: Unconditional Security and Practical EfficiencyHaofei Wang, Li-Ping Wang, Liang Feng Zhang, Huaxiong Wang. 163-168 [doi]
- BlockArb: The Decentralized Arbitration Mechanism for Data TradingBaowei Wang, Zhengyu Hu, Yi Yuan, Bin Li, Yuxiao Zhang. 169-174 [doi]
- A Probability-Based Scheme for Generating Robust Internet of ThingsJingchen Sun, Ning Chen 0008, Songwei Zhang, Zhaolong Ning, Tie Qiu 0001. 175-180 [doi]
- NILM-LANN: A Lightweight Attention-based Neural Network in Non-Intrusive Load MonitoringYanjing Lei, Zehui Feng, Xiangqing Lin, Di Cao, Jiakai Zhang. 181-186 [doi]
- Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal DissectionYuchen Liu, Shanshan Wang 0003, Jin Au-Yeung, Zhenxiang Chen. 187-192 [doi]
- A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity RecognitionHengwei Zhang, Yuejia Wu, Jian-Tao Zhou. 193-198 [doi]
- Dynamic Graph Embedding via Self-Attention in the Lorentz SpaceDingyang Duan, Daren Zha, Zeyi Liu, Yu Chen. 199-204 [doi]
- A Coarse-to-Fine Framework for Point Voxel TransformerZhuhua Bai, Weiqing Li, Guolin Yang, Fantong Meng, Renke Kang, Zhigang Dong. 205-211 [doi]
- LFAS: An electricity load forecasting framework assisted by cooperative multi-task learning-based spike occurrence predictionWei Shi, Yufeng Wang, Jianhua Ma 0002, Qun Jin. 212-217 [doi]
- A Distributed Deep Reinforcement Learning-based Optimization Scheme for Vehicle Edge Computing Task OffloadingBingxian Li, Lin Zhu, Long Tan. 218-223 [doi]
- Blockchain-based Medical Image Data Trading Platform with Copyright and Privacy ProtectionBaowei Wang, Wenjue Huang, Bin Li, Yi Yuan, Fan Yang, Zhengyu Hu. 224-229 [doi]
- Named Entity Recognition Method Based on Multi-Teacher Collaborative Cyclical Knowledge DistillationChunqiao Jin, Shuangyuan Yang. 230-235 [doi]
- Dynamic Adaptive Graph Convolutional Networks for Traffic Flow RegulationBin Ren, Yongdong Wei, Chunhong He. 236-241 [doi]
- Sentiment Summarization Generation Based on Multi Instance Learning and Graph Convolution on Social MediaBingshu Shi, Meiling Liu, Jiyun Zhou, Kaiqun Fu. 242-247 [doi]
- A Cloud-Edge Collaborative System for Object Detection Based on KubeEdgeYifan Pei, Peiyan Yuan, Xiaoyan Zhao 0001, Haojuan Zhang. 248-253 [doi]
- Self-Supervised Contrastive Graph Clustering Network via Structural Information FusionXiaoyang Ji, Yuchen Zhou, Haofu Yang, Shiyue Xu, Jiahao Li. 254-259 [doi]
- PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning AttacksYisheng Zhong, Li-Ping Wang. 260-265 [doi]
- Generating Adversarial Samples via a Combination of Feature Selection and Optimized Perturbation MethodsTao Fan, Wei Zhang, Chunying Kang, Hongcheng Yu, Yao Xiao. 266-271 [doi]
- SR-RDW : A Multi-user Redirected Walking Method Based on State Recovery for AlignmentFenghao Li, Ying Shen, Liming Wang, Huanbo Zhang, Ling Zhang. 272-277 [doi]
- A Stackelberg Game-based Wireless Powered Federated LearningJianmeng Guo, Huan Zhou 0002, Xuxun Liu 0001, Liang Zhao 0014, Victor C. M. Leung. 278-283 [doi]
- SOD-YOLO: A New Small Object Traffic Sign Recognition NetworkXunjia Yin, Xiaoming Wu, Xiangzhi Liu. 284-290 [doi]
- QoE optimization based on Adaptive Bitrate Control for Multi-party Interactive Live StreamingJiajun Wang, Yongqiang Gao. 291-296 [doi]
- Point-Correlate Adversarial Transformer for Unsupervised Multivariate Time Series Anomaly DetectionHuan Li, Xiangjie Kong 0001, Guojiang Shen, Xiaoran Yan, Yao Yang, Mario Collotta. 297-302 [doi]
- Research on a Cross-platform Communication Situation Assessment Method Based on Specific EventsPeiguo Fu, Li Zhang, Ming Liu, Wen Jiang, Liyuan Sun. 303-309 [doi]
- Class-wise Image Mixture Guided Self-Knowledge Distillation for Image ClassificationZeyu Dong, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu. 310-315 [doi]
- A Study of Deep Learning Algorithms for Long-term Prediction and Correlation Identification of Arctic IceJiahao Liu, Yuan Feng, Shengyu Song, Yuanxiang Xu. 316-322 [doi]
- MTS-IoT: A Robust Encrypted IoT Traffic Classification via Multi-dimensional Time SeriesTianye Gao, Wang Qi, Kehong Liu, Shengbao Li, Ruihai Ge, Tianning Zang. 323-328 [doi]
- A Multi-Label Text Classification Model with Enhanced Label InformationMin Wang, Yan Gao. 329-334 [doi]
- TSDNet: An Efficient Light Footprint Keyword Spotting Deep Network Base on Tempera Segment NormalizationFei Chen, Hui Xue 0002, Pengfei Fang. 335-340 [doi]
- A Collaborative-Enhanced Sand Cat Swarm Optimization for Network Intrusion DetectionChenbing Dong, Hui Xu, Fukui Li, Mengran Liu. 341-346 [doi]
- An Improved Beluga Whale Optimization Algorithm by Collaborative Strategies for Multi-Threshold Image SegmentationMengran Liu, Hui Xu, Qinyue Wu, Chenbing Dong. 347-352 [doi]
- Qiao: DIY your routing protocol in Internet-of-ThingsZhiyu Wu, Yisu Wang. 353-358 [doi]
- GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control SystemLijuan Xu, Zhiang Yao, Dawei Zhao, Xin Li. 359-364 [doi]
- Online Relational Knowledge Distillation for Image ClassificationYihang Zhou, Chuanguang Yang, Yuqi Li, Libo Huang, Zhulin An, Yongjun Xu. 365-370 [doi]
- MicroMCM: Fine-grained Root Cause Localization for Microservice Systems Based on Multiple Causal Inference MethodsHanqing Gao, Junfeng Zhao 0005, Wenhao Li, Zhengxin Li. 371-376 [doi]
- Multi-language Webshell Detection based on Abstract Syntax Tree and TreeLSTMMengchuan Shang, Xueying Han, Changzhi Zhao, Zelin Cui, Dan Du, Bo Jiang. 377-382 [doi]
- CombinE: A Fusion Method Enhanced Model for Knowledge Graph CompletionZiyuan Cui, Zhongwen Guo, Jinxin Wang, Weigang Wang. 383-388 [doi]
- Fine-grained classification for aero-engine borescope images based on the fusion of local and global featuresRui Huang 0006, Jingcheng Zeng, Xuyi Cheng, Jieda Wei. 389-394 [doi]
- A Multi-Scale Infrared and Visible Image Fusion Network Based on Context PerceptionHuixuan Zhao, Jinyong Cheng, Rundong Du. 395-400 [doi]
- A Complete Protection, Certification and Traceability System for Academic Degrees Based on Collaborative Storage on and Off the ChainQiuyuan Wang, Lanju Kong, LiZhen Cui. 401-406 [doi]
- MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider ThreatsLifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng. 407-412 [doi]
- Computational Personality Analysis with Interpretability Empowered PredictionAhmed R. Elmahalawy, Lin Li 0001, Xiaohua Wu, Xiaohui Tao 0001, Jianming Yong. 413-418 [doi]
- EAtuner: Comparative Study of Evolutionary Algorithms for Compiler Auto-tuningGuojian Xiao, Siyuan Qin, Kuan Li, Juan Chen 0001, Jianping Yin. 419-426 [doi]
- Enhancing Weak Feature Detection in Convolutional Analysis of Traditional Chinese Medicine Tongue DiagnosisHao Yue, Xiaoliang Wang, Yuzhen Liu, Zhou Tang, Jiasheng Yin, Yuanyuan Ai. 427-432 [doi]
- Joint Dynamic Pricing and Computing Offloading in Edge-to-Cloud CollaborationTong Yin, Xin Chen, Libo Jiao, Jiaxuan Liao. 433-440 [doi]
- A Scalable and Resilient Protocol for Synchronous CollaborationZhengqi Wu, Hui Li, He Bai, Xinyuan Pei. 441-446 [doi]
- PAPnet: A Plug-and-play Virus Network for Backdoor AttackRui Huang, Zongyu Guo, Qingyi Zhao, Wei Fan. 447-452 [doi]
- Recognizing Textual Entailment by Hierarchical Crowdsourcing with Diverse Labor CostsHaodi Zhang, Junyu Yang, Wenxi Huang, Min Cai, Jiahong Li, Chen Zhang, Kaishun Wu. 453-458 [doi]
- WDFormer: Acceptable Field Growth Transformer with Windows for Long Sequence Time-Series ForecastingJinghong Yang, Qing Yu. 459-464 [doi]
- Security-Oriented Architecture for Blockchain-Based Federated Learning in the Financial IndustryZhengxin Guo, Shizhan Chen, Chao Wang, Hongyue Wu, Kai Ma, Zhiyong Feng 0002. 465-470 [doi]
- SA-SVD: Mitigating Bias in Face Recognition by Fair Representation LearningJia Li 0053, Hua Zhang. 471-476 [doi]
- Test-Time Adaptation with Robust Dual-stream Perturbation for Stable Agent Deployment in Dynamic ScenariosHaoyu Xiong, Chengfu Yang. 477-482 [doi]
- Cooperative Simulation of RDMA-based Network and StorageWanchun Jiang, Hanyu Chen, Jialiang Chen, Kai Wang, Jiarui Yang, Xiao Han, Xingping Zhang. 483-488 [doi]
- Distributed Rendering for Cloud Gaming in Cloud-Edge-End Cooperation NetworksYipei He, Yongqiang Gao, Yunfei Song. 489-494 [doi]
- Topic Paraphrasing Model for Abstractive Dialogue SummarizationZhizhuo Yang, Wei Zhang. 495-500 [doi]
- Cost-Efficient Data Offloading and Resource Allocation in 6G Space-Air-Ground Integrated IoT NetworksXin Dai, Xin Chen, Libo Jiao, Shougang Du, Xueqi Ren, Zhe Dong. 501-506 [doi]
- The Research of Small Object Detection based on YOLOX in UAVXinli Liu, Ming Yang. 507-512 [doi]
- RCFL-GAN: Resource-Constrained Federated Learning with Generative Adversarial NetworksYuyan Quan, Songtao Guo, Dewen Qiao. 513-518 [doi]
- RFRN: Cross-domain RFID Activity Recognition Using a Few SamplesQianwen Mao, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu 0024, Qingkai Wang. 519-524 [doi]
- Towards More Effective and Transferable Poisoning Attacks against Link Prediction on GraphsBaojie Tian, Liangjun Zang, Haichao Fu, Jizhong Han, Songlin Hu. 525-530 [doi]
- Deep Reinforcement Learning Based Cooperative Task Offloading and Resource Allocation in mmWave-Enabled Space-Air-Ground Integrated NetworksJiaxuan Liao, Xin Chen, Libo Jiao, Wang Li, Baichang Wang. 531-537 [doi]
- FedGDC-P: Communication-efficient Personalized Graph Federated Learning Based On Dataset CondensationJiaming Zhang, Songtao Guo, Pengzhan Zhou. 538-543 [doi]
- Optimization Scheme of Vehicular Edge Computing Task Offloading Based on Digital Twin AssistanceLin Zhu, Long Tan, Bingxian Li. 544-549 [doi]
- STPointNet for Human Action Recognition in MmWave Point CloudsChenliang Zhu, Jie Yang, Peiwei Deng, Junzhe Lin, Lianfen Huang, Hezhi Lin. 550-555 [doi]
- Automatic Extraction of Petri Nets from RFC Protocol TextsRonghao Liang, Qingtian Zeng, Wenyan Guo, Hua Duan, Weijian Ni. 556-561 [doi]
- Channel Attention-Based Method for Searching Task-Specific Multi-Task Network StructuresSongtao Ye, Saisai Zheng, Yizhang Xia. 562-569 [doi]
- A Traceable and Anonymous Authentication Ring Signature Scheme with Privacy ProtectionXiao Zhao, Suzhen Cao, Zheng Wang, Dandan Xing, Dawei Zhou. 570-575 [doi]
- Blockchain-based Private Set Intersection Protocol with Attribute-based Access ControlSong Wei, Limin Ma, Zeyu He, Wei Zhang. 576-581 [doi]
- IMTCDF: A Multi-Module-Based Internet Malicious Traffic Classification and Detection FrameworkZiang Li, Jie Xu, Zhenyu Cheng 0001, Tianning Zang. 582-587 [doi]
- MLWF-Net: Multiple lung windows based fusion network for segmentation of small infected areas in COVID-19 CT slicesChenxu Han, Xuelei He, Xiaowei He, Zhixin Huang, Chuang Zhang, Yong Huang. 588-593 [doi]
- Multi-scale Fusion Attention Network for Industrial Surface Defect ClassificationCong Wu, Sicheng Lei, Huawei Xu, Tongzhen Xing. 594-599 [doi]
- A Hybrid Active Sampling Algorithm for Imbalanced LearningPing Gu, Yong Lu. 600-605 [doi]
- Improving Distantly-Supervised Relation Extraction through Label PromptGuangyu Lin, Hongbin Zhang 0008, Zhenyi Fan, Lianglun Cheng, Zhuowei Wang 0001, Chong Chen 0010. 606-611 [doi]
- Security and Efficient Data Verification Protocol for Distributed Database based on Zero-knowledge ProofHan Liu, Yunxu Bai. 616-621 [doi]
- Composited-Nested-Learning with Data Augmentation for Nested Named Entity RecognitionXingming Liao, Nankai Lin, Haowen Li, Lianglun Cheng, Zhuowei Wang 0001, Chong Chen 0010. 618-623 [doi]
- ScoreReader: A handwritten score recognition toolkit for examination papersWeigang Wang, Wei Jing, Ziyuan Cui. 624-629 [doi]
- Bi-Directional Safety Protection for Vulnerable Road Users: A Roadside Unit-Based Cooperative Perception NetworkGuangzong Si, Qing Ding. 630-636 [doi]
- Attention-Enhanced Multi-View Stereo with Probabilistic Depth Variance RefinementSixian Chan, Aofeng Qiu, Wei Pan, Jiafa Mao. 637-642 [doi]
- Route Planning of City Road Trips Meeting Subjective Preferences and Objective ConstraintsHua Ma 0002, Zixu Jiang, Xiangru Fu, Mingfa Hong, Zhuoxuan Huang, Hongyu Zhang 0001. 643-648 [doi]
- Privacy-preserving Human Activity Recognition via Video-based Range-Doppler SynthesisZhiyuan Cui, Luoyu Mei, Siyuan Pei, Borui Li, Xiaolei Zhou 0001. 649-654 [doi]
- An Event-driven Clustering Routing Algorithm in mobile CRSNsKun Han, Long Tan. 655-660 [doi]
- Simulated Annealing Deep Q-learning Incentive Mechanism for Mobile Crowd SensingXin-Wei Yao 0001, Weiwei Xing, Chu-Feng Qi, Qiang Li, Wei-Qiang Wang, Xing Fu. 661-668 [doi]
- Blockchain-Based Cloud Data Auditing Scheme in Multi-Cloud Storage Service EnvironmentShang Wang, Meiju Yu, Mingzhu Zhao, Haotian Wang. 669-674 [doi]
- ELEvent: An Abnormal Event Detection System in Elevator CarsXingyu Yan, Shuai Xu, Yusong Zhang, Bohan Li 0001. 675-680 [doi]
- Tracking Control of Quadruped Robot Based on Visual PerceptionYuxiang Lin, Wentao Wang, Hui Peng, Guangrong Chen. 681-686 [doi]
- A novel model for product defect detection based on the automatic aspect term extractionZhongyun Li, Yan Zhao, Yihong Wang, Zongyang Liu, Yushan Pan. 687-692 [doi]
- HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted Network TrafficWeihua Liu, Xiaohui Han, Wenbo Zuo, Yu Sun. 693-698 [doi]
- An Efficient Caching Mechanism for End-host Network FunctionsYu Tian, Haojun Xia, Chen Li, Bibo Tu. 699-704 [doi]
- A Bi-Directional Prediction based on Multi-Stage Deep Multilayer Perceptron for the Productive Process of Polyacrylonitrile PrecursorXun Cai, Siwei Xue, Tianyou Wang, Yeqian Yang, Jianguo Lv, Kin-Tak Lau, Yanbo Gao. 705-710 [doi]
- Deep Learning Empowered IoV: ISAC RCG-Net Beam Tracking for Seamless Road CommunicationHaoran Liu, Yifeng Zhao, Xuanhui Liu, Bo Wang, Keyi Cheng. 711-716 [doi]
- 360ORB-SLAM: A Visual SLAM System for Panoramic Images with Depth Completion NetworkYichen Chen, Yuqi Pan, Ruyu Liu, Haoyu Zhang, Guodao Zhang, Bo Sun, Jianhua Zhang. 717-722 [doi]
- Optical Flow Guided Pyramid Network for Video Salient Object DetectionTinglong Tang, Sheng Hua, Shuifa Sun, Yirong Wu, Yuqi Zhu, Chonghao Yue. 723-728 [doi]
- Towards Efficient Delegated Private Set Intersection Cardinality ProtocolHao Zhao, Wenqi Zhang, Xiong Li, Shuai Shang, Ke Huang 0002, Xiaosong Zhang 0001. 729-734 [doi]
- Nested Named Entity Recognition based on Span and Efficient Global PointerFang Liu, Shiqun Yin, Guang Li, Yajun He. 735-741 [doi]
- Communication Optimization in Blockchain Peer-to-Peer NetworksKe Zhang, Zhenwen Peng, Ruixing Zong, Qiong Wang, Xiong Xiao, Zhuo Tang. 742-747 [doi]
- Two-Sided Online Task Assignment Based on Worker Portraits in Mobile CrowdSensingZhenyang Mao, Peng Li 0046, Guangzhong Liao, Lei Nie, Haizhou Bao, Qin Liu. 748-753 [doi]
- FedBN: A Communication-Efficient Federated Learning Strategy Based on BlockchainZhenwen Peng, Yingjie Song, Qiong Wang, Xiong Xiao, Zhuo Tang. 754-759 [doi]
- End-edge collaborative DNN inference acceleration via E-CARGO and RBCWenying Peng, Yanming Chen 0002, Haibin Zhu, Yiwen Zhang 0001. 760-765 [doi]
- WebPromptM2: A Website Classification Method Leveraging Prompt-Based Learning with Multimodal FeaturesMengyan Liu, Gaopeng Gou, Gang Xiong 0001, Junzheng Shi, Chang Liu 0049, Chen Chen. 766-771 [doi]
- A Formal Verification Methodology for Cache Architectures Based on Noninterference HyperpropertiesYusha Zhang, Ziyuan Zhu, Yuxin Liu, Zhongkai Tong, Wenjing Cai, Dan Meng. 772-777 [doi]
- DeepVNP: Virtual Network Placing with Deep Reinforcement Learning in Industrial IoTBo Wang, Yang Yang, Yu Zhang, Cheng Zhan, Fei Wang 0024. 778-783 [doi]
- FaLdViT: A Simple Yet effective framework to detect Cephalometric landmarksMingya Zhang, Na Zhao, Yuqian Zhuang, Liang Wang, Xianing Tao. 784-789 [doi]
- MicroENet: An Efficient Network for MCUs with Low Model Parameters and Peak MemoryGang Wu, Yanming Chen 0002, Yiwen Zhang 0001. 790-795 [doi]
- ASL: Adversarial Attack by Stacking Layer-wise Relevance PropagationPengju Wang, Jing Liu. 796-801 [doi]
- Video Anomaly Detection Framework Based on Motion ConsistencyCaidan Zhao, Xiang Li, Chenxing Gao, Zhiqiang Wu. 802-807 [doi]
- FBM-FA: Frame-Level-Attention-Based Facial Behavior Mining for Face Anti-SpoofingGaoyu Luo, Zhibin Gao, Sheng Zhang, Lianfen Huang, Linran Chen. 808-813 [doi]
- Byzantine-Robust Compressed and Momentum-based Variance Reduction in Federated LearningSihan Mao, Jianguang Zhang, Xiaodong Hu, Xiaolin Zheng. 814-820 [doi]
- Eye-tracking based Detection of Developmental Dyslexia in Children Using Convolutional-Transformer NetworkXin Li, Zhongjie Li, Feiyang Xu. 821-826 [doi]
- AcouController: Motion Based Acoustic Remote Control for Smart DevicesJiarui Zhang, Zhenguo Du. 827-832 [doi]
- Lyapunov-guided Deep Reinforcement Learning for Vehicle task Stable offloadingZiyang Huang, Yanming Chen 0002, Yiwen Zhang 0001. 833-838 [doi]
- Hybrid Ensemble Polynomial Neural Network Classifier: Analysis and DesignMingjie Gao, Wei Huang 0008, Zhilei Xu, Sung-Kwun Oh. 839-844 [doi]
- Unsupervised Cross-domain Object Detection via Multiple Domain RandomizationFang Luo, Jie Liu, George To Sum Ho, Kun Yan. 845-851 [doi]
- Multimodal sentiment analysis based on TCN and cross-modal interactive feedback networkGuangbin Bao, Zhiming Shen, Chen Liu, Liangliang Sun, Shuang Chen. 852-857 [doi]
- Language-based Audio Retrieval with GPT-Augmented Captions and Self-Attended Audio ClipsFuyu Gu, Yang Gu, Yiyan Xu, Haoran Sun, Yushan Pan, Shengchen Li, Haiyang Zhang. 858-863 [doi]
- FedPGT: Prototype-based Federated Global Adversarial Training against Adversarial AttackZirong Xu, Weimin Lai, Qiao Yan. 864-869 [doi]
- Reinforcement Learning based Battery Energy Neutral Operation for EHWSShuhua Yuan, Yongqi Ge, Jiayuan Wei, Zhenbo Yuan, Rui Liu 0023, Xian Mo. 870-876 [doi]
- An Uncovered Neurons Information-Based Fuzzing Method for DNNKecheng Tang, Jiantao Zhou 0002, Xu Guo. 877-882 [doi]
- A Force-free Control Architecture Integrated with Digital Twin for Collaborative ManipulatorsGuanwei He, Beichen Ding, Qingqing Huang, Guodong Feng. 883-888 [doi]
- CA-GCN: A Confidence-aware uncertain knowledge graph embedding model based on graph convolutional networksLin Zhao, Ji Xiang, Xiaobo Guo, Yunzhi Liang, Zeyi Liu, Xin Wang. 889-896 [doi]
- MF-YOLO: Multimodal Fusion for Remote Sensing Object Detection Based on YOLOv5sWenqiang Li, Aimin Li, Xiaotong Kong, Yuechen Zhang, Zhiyao Li. 897-903 [doi]
- Social Influence Prediction using Neighborhood Information across Various RangesRui Xia, Lisong Wang, Taili Li, Pingping Shi. 903-908 [doi]
- Clustered Federated Learning Based on Client's PrototypesWeimin Lai, Zirong Xu, Qiao Yan. 909-914 [doi]
- Cache Strategy for Joint Content Recommendation and D2D CollaborationXiaoyan Zhao, Fengxian Hou, Yan Kuang, Peiyan Yuan. 915-920 [doi]
- Sharding PoW-based Blockchains with Simple Cross-Shard Transaction ProcessingXianning Meng, Hongda Li 0001, Yao Zan. 922-927 [doi]
- PFTB: A Prediction-Based Fair Token Bucket Algorithm based on CRDTLuting Zhang, Yubing Li, Wei Yang, Qingyun Liu, Rong Yang. 928-934 [doi]
- Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoTYuliang Chen, Xi Lin, Gaolei Li, Lixing Chen, Jing Wang, Siyi Liao, Jianhua Li. 935-940 [doi]
- Multi-task online allocation based on path planning strategy in Spatial crowdsourcing environmentYiduo Cheng, Xu Yuan, Dunhui Yu, Mingjun Zhao. 941-949 [doi]
- DPAdaMod_AGC: Adaptive Gradient Clipping-Based Differential PrivacyJuanru Zhang, WeiChao Yang, Yinghui Zhang, Hao Zheng, Tiankui Zhang. 950-955 [doi]
- Decb: A Decentralized Broker for Sky ComputingZhiheng Zhang, Guowei Wu. 956-961 [doi]
- Cell Detection Algorithm for Alveolar Lavage Fluid Based on YOLO-GAS AlgorithmRui Li, Xin Zhang, Yanpeng Wu, Zongyi Shao. 962-967 [doi]
- FedAHP: A Heterogeneous Client Selection Method for Federated Learning Based on the Analytic Hierarchy Process in Mobile EdgeZhaohua Zheng, Zizheng Wang, Xinyu Tong, Keqiu Li, Qiquan Chen. 968-973 [doi]
- A Novel Text Matching Model Based on Multilayer Coding and Feature EnhancementYu Zhang, Jianqiang Zhang, Gongpeng Song, Qin Lu. 974-979 [doi]
- Joint Task Offloading and Resource Allocation for NOMA-Based Vehicular NetworksYunfei Song, Yongqiang Gao, Yipei He. 980-985 [doi]
- Dynamic scheduling method of public transportation resources based on Spatial Graph Convolution and Proximal Policy OptimizationChaoran Zhou, Jianhui Guo, Xin Zhang, Kaicheng Yang. 986-991 [doi]
- A Pre-Trained Language Model Based on LED for Tibetan Long Text SummarizationXinpeng Ouyang, Xiaodong Yan, Minghui Hao. 992-997 [doi]
- Triple GNNs: Introducing Syntactic and Semantic Information for Conversational Aspect-Based Quadruple Sentiment AnalysisBinbin Li, Yuqing Li, Siyu Jia, Bingnan Ma, Yu Ding, Zisen Qi, Xingbang Tan, Menghan Guo, Shenghui Liu. 998-1003 [doi]
- Deep Reinforcement Learning-Driven Adaptive Task Offloading and Resource Allocation for UAV-Assisted Mobile Edge ComputingYongqiang Gao, Chuangxin Li, Zhenkun Li. 1004-1009 [doi]
- A Machine Learning-based Method for Clustering the Traffic of Linux NATed Network Entities with TCP/IP FeatureKehong Liu, Qi Wang, Tianye Gao, Tianxing Ma, Tianning Zang. 1010-1016 [doi]
- Process-Oriented GCC Failure Analysis based on Fault InjectionHao Xu, Zhangjun Lu, Wei Zhang, Jianhui Jiang. 1017-1022 [doi]
- CAT: Cross-Adversarial Training for WiFi-Based Human Activity RecognitionLuyao Liu, Zhipeng Zhou, Mingwu Chen, Wei Gong 0001. 1023-1028 [doi]
- FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous DistributionChangnan Jiang, Chunhe Xia, Mengyao Liu, Chen Chen, Huacheng Li, Tianbo Wang, Pengfei Li. 1029-1036 [doi]
- MCAN: An Efficient Multi-Task Network for Facial Expression AnalysisHaitao Wang, Rui Wang, Peng Zou, Qingjian Ni, Xiao Sun. 1037-1042 [doi]
- Incentive Mechanism of Blockchain-Based Reverse Auction for Federated LearningBo Cui, Li Dang. 1043-1048 [doi]
- ADGRL: A Deep Graph Reinforcement Learning Model with Attention for Online Judge Exercise RecommendationBo Cui, Dou Hao. 1049-1054 [doi]
- Parallel Collaborative Reasoning Approaches Based on DatalogMTL in IoT ScenariosFengming Zhang, Pan Hu 0001, Hongming Cai, Lihong Jiang. 1055-1060 [doi]
- A Hyperheuristic and Reinforcement Learning Guided Meta-heuristic Algorithm RecommendationNingning Zhu, Fuqing Zhao, Jie Cao 0014. 1061-1066 [doi]
- Collaborative Computation Model Based on Dependency Types and Constituent Trees for Aspect-Based Sentiment AnalysisJia-yi, Xiaoming Wu, Yunfeng Dong, Bei Qi, Xiangzhi Liu. 1067-1072 [doi]
- Learn to Simulate Finite Element Analysis via Mesh-based Graph NetworksLingjun Fan, Qinpei Zhao, Jiasheng Shi, Fu Lin, Weixiong Rao. 1073-1078 [doi]
- 6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked InformationLiang Jiao, Yujia Zhu, Wenxiu Zhang, Lei Zhao, Yi Zhou, Qingyun Liu. 1079-1085 [doi]
- VIG: Visual Information-Guided Knowledge-Based Visual Question AnsweringHeng Liu, Boyue Wang, Yanfeng Sun, Xiaoyan Li, Yongli Hu, Baocai Yin. 1086-1091 [doi]
- Multi-behavior Enhanced Self-supervised Graph Learning for Social RecommendationShiwei Liu, Yong Xu. 1092-1097 [doi]
- A Novel Request-Invitation-Approval Scheme for Flexible Semantic Conflict Prevention in Real-Time Collaborative ProgrammingMingjie Wang, Bicheng Fang, Jinfeng Jiang, Hongfei Fan. 1098-1103 [doi]
- Orthogonal Rendezvous Multicast for Mobile Sinks in Wireless Sensor NetworksGaotao Shi, Zejun Liu, Jinfeng Yang, Zenghua Zhao. 1104-1109 [doi]
- Medical Speech Symptoms Classification via Disentangled RepresentationJianzong Wang, Pengcheng Li, Xulong Zhang 0001, Ning Cheng 0001, Jing Xiao 0006. 1110-1115 [doi]
- EPFA-Net: An Enhanced Partial Feature Aggregation Network for Remote Sensing Object DetectionZhen Wu, Li Zhang. 1116-1121 [doi]
- Study on the Impact of Different Anchor Quantities in pneumonia X-ray Object Detection Based on the YOLO SeriesDongsheng Ji, Caidan Zhuoma, Juntong Du, Dandan Zou, Zheng Zhang. 1122-1127 [doi]
- Multi-Target Multi-Camera Tracking based on lightweight detectorZhuozhen Xu, Sixian Chan, Bin Guo, Wenhui Zhuo, Xiaolong Zhou. 1128-1133 [doi]
- EM-TTS: Efficiently Trained Low-Resource Mongolian Lightweight Text-to-SpeechZiqi Liang, Haoxiang Shi, Jiawei Wang, Keda Lu. 1134-1139 [doi]
- Graph-based POI Recommendation through Self-Supervised Curriculum LearningLei Wang, Wenguang Zheng, Yingyuan Xiao. 1140-1145 [doi]
- KEWS: A KPIs-Based Evaluation Framework of Workload Simulation On Microservice SystemPengsheng Li, Qingfeng Du, Shengjie Zhao. 1146-1152 [doi]
- A stylized generation approach for poster background graphic design based on light elementsDanni Chang, Renqiu Guo, Yuning Qian, Luyao Wang. 1153-1158 [doi]
- An Attention Model Based Heuristic Algorithm for Storage Selection and Order Picking Path Joint OptimizationFeng Chen, Li Wang, Jiawei Zhang, Qi Sun, Pinyan Lai. 1159-1164 [doi]
- A Module Level Security Evaluation Method Based on Model CheckingYuxin Liu, Ziyuan Zhu, Yusha Zhang, Zhongkai Tong, Wenjing Cai, Dan Meng. 1165-1170 [doi]
- GLM-Rf: Malicious smart contract static detection scheme based on GLM and Random forestDongyang Li, Chenhao Zhang, Hongwei Zhang, Jinsong Wang. 1171-1176 [doi]
- FEST: Feature Enhancement Swin Transformer for Remote Sensing Image Semantic SegmentationRonghuan Zhang, Jing Zhao, Ming Li, Qingzhi Zou. 1177-1182 [doi]
- Personalized federated learning based on feature fusionWolong Xing, Zhenkui Shi, Hongyan Peng, Xiantao Hu, Yaozong Zheng, Xianxian Li. 1183-1188 [doi]
- Reinforcement Learning-based Multi-hop Intelligent Route Selection for Vehicle-to-Vehicle Visible Light CommunicationRong-rong Yin, Kuan-Kuan Jia, Hao Qin, Meng-Fa Zhai, Shao-Ying Ma, Ming-Qi He. 1189-1194 [doi]
- Communication-efficient Federated Learning Framework with Parameter-Ordered DropoutQichen Li, Sujie Shao, Chao Yang, Jiewei Chen, Feng Qi 0004, Shaoyong Guo. 1195-1200 [doi]
- Memory-efficient anomaly detection for online data streamsShiming He, Chenxi Guo. 1201-1206 [doi]
- WR-Former: Vision Transformer with Weight Reallocation Module for Robust Facial Expression RecognitionRui Wang, Haitao Wang, Peng Zou, Xiao Sun. 1207-1212 [doi]
- An interpretable adversarial robustness evaluation method based on robust pathsZituo Li, Jianbin Sun, Xuemei Yao, Ruijing Cui, Bingfeng Ge, Kewei Yang 0001. 1213-1218 [doi]
- JMF-SS: Joint Matrix Factorization for Web API Recommendation with Mashup-Mashup Similarities and API-API SimilaritiesLihong Zhang, Jing He, Yamei Nie, Xiaokang Zhou, Qiqi Chen, Guosheng Kang. 1219-1224 [doi]
- Lightweight Dangerous Driving Action Recognition Using Graph Convolutional Broad LearningChen Chen 0006, Guorong Ye, Lixin Lan, Pu Li, Hao Wang, Jianqiao Li, Hangguan Shan, Huixu Xiao. 1225-1230 [doi]
- MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior DetectionJianjun Zhao, Ru Tan, Yaqin Cao, Xutong Wang, Qixu Liu, Xiang Cui. 1231-1237 [doi]
- The Impact of Perceived Risk on Online Medical Users' Privacy Protection BehaviorXiaozhao Deng, Dan Wang, Lin Yang. 1238-1243 [doi]
- LDAG: Modeling Long-term interests by Directed Acyclic Graph Neural Network for Sequential RecommendationYifan Zhou, Yue Ding, Dong Wang. 1244-1249 [doi]
- MACA: Memory-aware convolution accelerating for CNN inference on edge devicesChaoxiong Yi, Songlei Jian, Yusong Tan, Yusen Zhang. 1250-1255 [doi]
- Semantic-Enhanced Attention Network for Image-Text MatchingHuanxiao Zhou, Yushui Geng, Jing Zhao, Xishan Ma. 1256-1261 [doi]
- Adversarial Batch Inverse Reinforcement Learning: Learn to Reward from Imperfect Demonstration for Interactive RecommendationJialin Liu, Xinyan Su, Zeyu He, Jun Li. 1262-1267 [doi]
- Contextual Insight: Detecting Abnormal Device Behaviors in IoT SystemsJian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He. 1268-1273 [doi]
- SCTAR: A Multi-Layer BiLSTM-Based Chinese Short Text Similarity Computation Model with Attention MechanismShuo Zhao, Yiyun Xing, Jianqiang Zhang, Gongpeng Song, Qin Lu. 1274-1279 [doi]
- Smartphone-based Indoor Pedestrian Tracking via TransformerXueqi Li 0006, Kejia Li, Jiayao Liu, Ruipeng Gao. 1280-1285 [doi]
- Improve Multi-agent Path Finding by Bridging the Gap between Abstract Algorithms and Specific Application ScenariosHanfeng Jiang, Xiao Xue 0001, Juanjuan Li, Wanpeng Ma. 1286-1291 [doi]
- CASTNet: Convolution Augmented Graph Sampling Transformer Network for Traffic Flow ForecastingZixuan Chen, Shengjie Zhao, Jin Zeng, Shilong Dong, Geyunqian Zu. 1292-1297 [doi]
- Causal Inference for Eliminating Popularity Bias in Session-based RecommendationLin Li, Jinghua Zhu. 1298-1303 [doi]
- GTPCR: Graph-Enhanced Transformer for Point Cloud RegistrationKai Chen, Junfeng Yao, Yuanhang Li, Han Zhang, Huabo Shen, Quan Qian, Xing Wu. 1304-1309 [doi]
- Joint optimization of UAV trajectory planning, video cache placement and transcoding in UAV-assisted 6G networks: a PPO-L based approachXueqi Ren, Xin Chen, Libo Jiao, Xin Dai, Zhe Dong. 1310-1315 [doi]
- A Novel Scene-aware Pedestrian Detection in Dense ScenesTing Chen 0003, Jinghua Chen, Tao Gao 0001, Shukang Zhu, Zongyang Guo, Zixiang Liu, Ziqi Li, Quanzhao Zhao. 1316-1321 [doi]
- A Collaborative Anomaly Localization Method Based on Multi-Modal ImagesYuanhang Li, Junfeng Yao, Kai Chen, Han Zhang, Xiaodong Sun, Quan Qian, Xing Wu. 1322-1327 [doi]
- Decouple and Align Sparse R-CNN for End-to-End Object DetectionXin-Wei Yao 0001, Yu-Chen Zhang, Yu-Yi Zhi, Kai-Jie Zhang, Zhi-Heng Yuan. 1328-1333 [doi]
- A Photovoltaic Power Theft Detection Method based on Data-driven Stacking ModelZhuoqun Xia, Xiangyu Lei, Shiyu Wang, Zhenzhen Hu. 1334-1339 [doi]
- Active Recommendation Strategy Based on Multi-Collaborative AgentXinlong Qiao, Kaiqi Zhang 0008, Zhiying Tu, Hongwei Wang. 1340-1345 [doi]
- Multi-Level Feature-Guided Network for Few-shot Medical Image SegmentationYue Shen, Wanshu Fan, Zhongbin Han, Dongsheng Zhou. 1346-1351 [doi]
- LIDP: Contrastive Learning of Latent Individual Driving Pattern for Trajectory PredictionChunyu Liu, Jianjun Yu, Qiang Lin. 1352-1357 [doi]
- A Unified Routing Framework for Resource-Constrained Mobile Ad Hoc NetworksYupeng Zhang, Shunkang Hu, Zenghua Zhao. 1358-1363 [doi]
- HLSFNet: Hybrid Long and Short-term collaboration based on Feature extraction for power generation forecasting in ChinaMengjie Xu, Chuanwang Sun. 1364-1369 [doi]
- Mining Latent Topical Key Phrase from Content to Context in Unrestricted Healthcare DataTie Hua Zhou, Tian Yu Jin, Xi Wei Wang, Ling Wang, Keun Ho Ryu. 1370-1375 [doi]
- EINS: Edge-Cloud Deep Model Inference with Network-Efficiency Schedule in ServerlessShijie Peng, Yanying Lin, Wenyan Chen 0001, Yingfei Tang, Xu Duan, Kejiang Ye. 1376-1381 [doi]
- Blockchain-based Traceable Selective Disclosure Credentials for Self-Sovereign IdentityXiang Li, Congcong Chen, Minyu Teng, Yang Shi. 1382-1387 [doi]
- Dual Contrastive Learning and Dual Bi-directional Transformer Encoders for Sequential RecommendationsLi-e Wang 0001, Hengtong Chang, Rongwen Wei, Xianxian Li, ZhiGang Sun, Yongdong Li, Yi Wei, Linghui Meng. 1388-1393 [doi]
- Text Keyword Extraction Based on GPTPinyao He, Jingyue Huang, Ming Li. 1394-1398 [doi]
- RTB-RM: A Blockchainenabled System for Reliable and Transparent CTI Sharing with Multidimensional Reputation ModelBin Wen, Xiaofei Xing, Guojun Wang. 1399-1404 [doi]
- Dual-Objective Optimization for MmWave ISAC Systems via Collaborative BeamformingXiaoqi Wang, Yifeng Zhao, Haoran Liu, Keyi Cheng, Bo Wang. 1405-1410 [doi]
- Multi-granularity Feature Fusion Detection for Encrypted Slow DDoS Attack in SDNJin Wang, Liping Wang, Ruiqing Wang. 1411-1416 [doi]
- Exploring Personal Knowledge Ecologies: Dealing with Digital Platform AsymmetriesMarcos Antonio de Almeida, Jano Moreira de Souza, António Correia, Daniel Schneider 0008. 1417-1423 [doi]
- Collaborative Denoising Shilling Attack for Recommendation SystemsXiaohao Liu, Hualin Zeng, Wenli Zhang, Long Yang. 1424-1429 [doi]
- Local Black-box Adversarial Attack based on Random Segmentation ChannelLi Xu, Zejin Yang, Huiting Guo, Xu Wan, Chunlong Fan. 1437-1442 [doi]
- Dynamic Multi-Indicator Fusion Model for Real-Time Prediction AnalysisTie Hua Zhou, Ling Wang 0011, Huai Lin Zhao, Fu Tao Ma, Lei Kou. 1443-1448 [doi]
- Position Attention Mechanism-based Ensemble Network for Trend Prediction of Limit Order BookLi Zhang, Yong-Ai Zheng, Xue-Rui Lv. 1449-1454 [doi]
- A Vision-language Model Based on Prompt Learner for Few-shot Medical Images DiagnosisTianyou Chang, Shizhan Chen, Guodong Fan, Zhiyong Feng 0002. 1455-1460 [doi]
- Solving the Energy Supply Strategic Planning Problem by Extended Group Multirole AssignmentXiaofeng Liu, Haibin Zhu, Dongning Liu. 1461-1466 [doi]
- Avoiding Information Leakage in the Formation of Crowdsourcing Teams via Extended Group Multirole Assignment Considering FairnessHongze Guo, Haibin Zhu, Dongning Liu. 1467-1472 [doi]
- Spatio-temporal feature fusion model based on Attention mechanism for RFID indoor positioningHoujin Chen, Lvqing Yang, Mulan Yang, Xuehan Hou, Sien Chen, Wensheng Dong, Bo Yu 0024, Qingkai Wang. 1473-1478 [doi]
- Solving the External Auditor Assignment Problem via GMRACCFZhixiang Cheng, Haibin Zhu, Dongning Liu. 1479-1484 [doi]
- Bus Driver Rostering via Extending Group Multirole AssignmentXuewei Lin, Haibin Zhu, Dongning Liu. 1485-1490 [doi]
- Low Light Enhancement in Street Scenes Based on Diffusion ModelRui Xia, Lisong Wang, Taili Li, Pingping Shi. 1491-1496 [doi]
- ST-T: A Spatio-Temporal Transformer for Φ-OTDR Multi-Location Time Series ClassificationWanchang Jiang, Yuxin Jiang. 1497-1502 [doi]
- Improvement of the Clothes-Changing Person Re-identification with Multiple Loss FunctionsYongkang Ding, Rui Mao 0014, Hanyue Zhu, Liyan Zhang 0001. 1503-1508 [doi]
- Generating Black-box Audio Adversarial CAPTCHAs based on Differential Evolution AlgorithmXinhao Liu 0008, Hao Yang, Qiao Yan. 1509-1514 [doi]
- Mafe: Multi-modal Alignment via Mutual Information Maximum Perspective in Multi-modal Fake News DetectionHaimei Qin, Yaqi Jing, Yunqiang Duan, Lei Jiang. 1515-1521 [doi]
- A Tibetan Text Classification Method Based on Hybrid Model and Channel Attention MechanismMinghui Hao, Xiaodong Yan, Xinpeng Ouyang. 1522-1527 [doi]
- Curriculum Learning for Ethereum Phishing Scam DetectionWenhan Hou, Bo Cui, Yongxin Chen, Ru Li 0004, Wanshui Song. 1528-1533 [doi]
- Thinking the Importance of Patient's Chief Complaint in TCM Syndrome DifferentiationZhizhuo Zhao, Xueping Peng, Yong Li, Hao Wu, Weiyu Zhang, Wenpeng Lu. 1534-1539 [doi]
- Accurate Segmentation of Optic Disc and Cup from Multiple Pseudo-labels by Noise-aware LearningTengjin Weng, Yang Shen, Zhidong Zhao, Zhiming Cheng, Shuai Wang. 1540-1545 [doi]
- The Security Paradox of Smart Contracts: Blind Spots and Prospects of Current Detection StrategiesWenxuan Zhao, Wei Mi, Xiaodan Zhang. 1546-1551 [doi]
- Modelling Aspects of Cognitive Personalization in Microtask Design: Feasibility and Reproducibility Study with Neurodivergent PeopleDennis Paulino, Joana Ferreira, António Correia, José Ribeiro 0001, André Netto, João Barroso 0001, Hugo Paredes. 1552-1558 [doi]
- Hierarchical Multi-Frequency Transform for Sequential RecommendationZhenyi Fan, Hongbin Zhang 0008, Guangyu Lin, Lianglun Cheng, Zhuowei Wang 0001, Chong Chen 0010. 1559-1564 [doi]
- Bidding Management Platform for Cloud-Chain ConvergenceYanzhi Zhang, Xiaoming Wu, Xiangzhi Liu, Huomin Dong. 1565-1571 [doi]
- A Simple Method to Improve the Performance of Small Pre-trained Language Models on Few-shot TasksYanan Zhang, Chaofan Wu, Rongkun Shi, Yiying Zhang. 1572-1577 [doi]
- Deep Dive into Insider Threats: Malicious Activity Detection within EnterpriseHaitao Xiao, Dan Du, Junrong Liu, Song Liu, Yan Zhu, Yuling Liu, Zhigang Lu 0002. 1578-1584 [doi]
- Common Forgery Artifact Driven Deepfake Face DetectionHaotian Wu 0007, Xin Wang 0086, Ruobing Wang, Ji Xiang, Liyue Ren. 1585-1590 [doi]
- EMGCN: Enhancement Graph and Multi-head Attention Graph Convolutional Networks for Aspect-based Sentiment AnalysisJinhang Chen, Rong Yan. 1591-1596 [doi]
- 5GC-SDP: Security Enhancement of 5G Core Networks With Zero TrustZeqing Yan, Guangxi Yu, Mengqi Zhan, Yan Zhang 0014, Jiaxi Hu. 1597-1602 [doi]
- Opportunistic Network Selfish Node Detection Algorithm Based on Credibility Combining Energy and CacheKun Yan, Hao Hu, Gang Xu, Lijie Li, Yanhe Fu, Gaofeng Zhang. 1603-1608 [doi]
- A Counterfactual Neural Causal Model for Interactive RecommendationJialin Liu, Zeyu He, Peng Zhou, Xinyan Su, Jun Li. 1609-1614 [doi]
- A Reputation-Aware Randomization Consensus Algorithm for Performance Optimization in Blockchain SystemsJingyu Zhang, Yongtao Sun, Zhennan Zhang, Weifeng Ren, Lailong Luo. 1615-1620 [doi]
- InfinityRand: Blockchain Non-Interactive Randomness Beacon Protocol Based on Trapdoor Verifiable Delay FunctionJingyu Zhang, Jiejun Ou, Di Lan, Bojian Ma, Lailong Luo. 1621-1626 [doi]
- Triple-Based Data Augmentation for Event Temporal Extraction via Reinforcement Learning from Human FeedbackXiaobin Zhang, Liangjun Zang, Qianwen Liu, Shuchong Wei, Songlin Hu. 1627-1632 [doi]
- Significance-aware Medication Recommendation with Medication Representation LearningYishuo Li, Zhufeng Shao, Weimin Chen, Shoujin Wang, Yuehan Du, Wenpeng Lu. 1633-1638 [doi]
- SIDF: A Desensitization Framework for Sensitive Information in Chinese Medical Report ImagesLi Zhang, Yue-Feng Li, Yu Zhang. 1639-1644 [doi]
- Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy DataLingfeng Yao, Anran Hou, Weina Niu, Qingjun Yuan, Junpeng He, Yanfeng Zhang. 1645-1650 [doi]
- Digital Twin-Based Office Equipment Management and Personnel Detection SystemYunpeng Gao, Tinglong Tang, Shuifa Sun, Yirong Wu, Peng Wang. 1651-1656 [doi]
- GPF: Generative Prediction Fusion for Multi-Label Emotion ClassificationShiqiao Huang, Weiwen Zhang, Nankai Lin, Mianshen Xu. 1657-1662 [doi]
- Campus intelligent decision system based on digital twinTinglong Tang, Yongjie Wu, Shuifa Sun, Yirong Wu. 1663-1668 [doi]
- Multi-fusion algorithm root cause location model based on causal failure dependency graphJianli Ding, Yanan Yan, Jing Wang. 1669-1674 [doi]
- CoSiNet: Dual-Branch Collaborative Siamese Network for Visual Object TrackingWenjun Zhou, Yao Liu, Nan Wang, Yifan Wang, Bo Peng. 1675-1680 [doi]
- Scalable Computation Offloading for Industrial IoTs via Distributed Deep Reinforcement LearningBin Dai, Yuan Qiu, Weikun Feng. 1681-1686 [doi]
- TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligenceYizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang, Peian Yang. 1687-1694 [doi]
- YOLO-RDD: A road defect detection algorithm based on YOLOJiabin Pei, Xiaoming Wu, Xiangzhi Liu. 1695-1703 [doi]
- High-accuracy classification method of vibration sensing events in φ-OTDR system based on Vision TransformerWanchang Jiang, Congcong Yan. 1704-1709 [doi]
- Medical Image Segmentation Use Convolutional Attention Augmentation TransUNet with Skip Connection EnhancementQingzhi Zou, Jing Zhao, Ming Li, Ling Chen, Lin Yuan, Ronghuan Zhang, Yushuai Hu. 1710-1715 [doi]
- Generating Valid and Natural Adversarial Examples with Large Language ModelsZimu Wang, Wei Wang 0015, Qi Chen, Qiufeng Wang, Anh Nguyen 0003. 1716-1721 [doi]
- AEDD: Anomaly Edge Detection Defense for Visual Recognition in Autonomous Vehicle SystemsLihao Wang, Junwei Zhou, Dongdong Zhao 0001, Dongqing Liao, Mengjie Wang, Jianwen Xiang. 1722-1727 [doi]
- Hybrid Deep Relation Matrix Bidirectional Approach for Relational Triple ExtractionYushuai Hu, Jing Zhao, Ming Li, Lin Yuan, Qingzhi Zou, Ronghuan Zhang. 1728-1733 [doi]
- A Deep Reinforcement Learning-based Rescheduling Method for Flexible Job Shops under Machine BreakdownsLingling Lv, Chunjiang Zhang, Weiming Shen 0001. 1734-1739 [doi]
- Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution EnvironmentsWenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng 0001. 1740-1745 [doi]
- A fine-tuning framework for cross-domain RUL prediction based on relevant health indicatorsJunrong Du, Zimeng Fan 0003, Lei Song, Xuanang Gui, Lili Guo, XuZhi Li. 1746-1751 [doi]
- Selfish node filtering algorithm based on opportunity networkKun Yan, Hao Hu, Gang Xu, Yuqi Wang, Gaofeng Zhang, Lijie Li. 1752-1757 [doi]
- A Novel Detection System for Multi-Architecture IoT MalwareShuwei Wang, Xiao Chen, Molan Long, Qiuyun Wang, Rongqi Jing, Zhengwei Jiang. 1758-1763 [doi]
- Big Data Storage and Analysis System for Space ApplicationShuo Yan, Jiaxi Wang, Ji Liang. 1764-1769 [doi]
- Automated Anti-malware Detection Rules Converter Based on SIMIOCChen Ling, Bin Liu, Wei Xia, Shuangze He, Zhengwei Jiang, Qiuyun Wang. 1770-1775 [doi]
- Distributed Trusted Authentication Method for Smart Grid Distribution TerminalsLei Wang, Qi Xu, Jingya Wen, Qiushi Zhang, Shiyuan Wang, Bin Li. 1776-1781 [doi]
- TinyCMR: A Lightweight Learning Framework for Efficient Cross-Modal RetrievalChenyun Yu, Zihao Wang, Ye Zheng, Liankai Cai. 1782-1788 [doi]
- Cross-timestep Fault Prediction with Imbalanced Data for Optical Modules in Internet Data CentersZuxu Pei, Tian Song, Chao Wu, Shuye Yue, Yan Li, Xiangtao Hu. 1789-1794 [doi]
- MT-MNA: Multiple Network Alignment with Absent Priori AnnotationHaichao Fu, Liangjun Zang, Baojie Tian, Songlin Hu. 1794-1799 [doi]
- Cascaded Multi-level Features Fusion Network using Collaborative Training for Snow RemovalKun Liu, Linfeng Liu 0001. 1795-1800 [doi]
- FAT: Tilted Federated Learning with Alternating Direction Method of MultipliersBo Cui, Zhen Yang. 1801-1806 [doi]
- Uniform-Distribution (UD) Based Time Intervals of GRC (Global Reserve Currency) Transition Year Predicted Narrowly as [2024, 2040] and Generally [2k00, 2k50]Yunong Zhang, Jiaming Zhou. 1807-1813 [doi]
- QECLO: A Novel QoS-Aware Joint Optimization of Energy and Latency for VFC Task OffloadingChenyi Liang, Zhibin Gao, Bo Wang, Keyi Cheng, Yifeng Zhao. 1814-1819 [doi]
- Time Series Anomaly Detection Methods Incorporating Wavelet Decomposition and Temporal Decoupled AutoencoderLishuo Ye, Zhixue He. 1820-1825 [doi]
- Multi-view Contrastive Learning for Medical Question SummarizationSibo Wei, Xueping Peng, Hongjiao Guan, Lina Geng, Ping Jian, Hao Wu, Wenpeng Lu. 1826-1831 [doi]
- An Incentive Mechanism Based on AoU, Data Quality, and Data Quantity for Federated LearningZhaohua Zheng, Yiming Hong, Keqiu Li, Qiquan Chen. 1832-1837 [doi]
- Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic AlgorithmWantong Du, Wanli Min, Yushui Geng, Hu Liang, Hehu Zhou. 1838-1844 [doi]
- Automated Test Case Generation Based on Path Structure Matrix and Mainfold-Inspired SearchCaijie Guo, Yan Tang, Xiaobing Li, Peihao Ding. 1845-1851 [doi]
- Ponzi Scheme Detection Based on CNN and BiGRU combined with Attention MechanismBo Cui, Guoqing Wang 0002. 1852-1857 [doi]
- Towards More Accurate Tiny Object Tracking: Benchmark and AlgorithmJizhe Yu, Yu Liu 0035, Hongkui Wei, Kaiping Xu. 1858-1863 [doi]
- A Learning-Based Discrete Jaya Algorithm for Multiobjective Sustainable Distributed Blocking Flow Shop Scheduling Problem with Heterogeneous FactoriesHui Zhang, Zhonghua Miao, Quanke Pan. 1864-1869 [doi]
- A Hybrid Estimation of Distribution Algorithm with Monarch Butterfly OptimizationBo Zhu, Li Jia, Jianfang Li. 1870-1875 [doi]
- End-to-end intelligent MCS selection algorithmXiaosong Xue, Wei Pan, Fang Yan, Na Li. 1876-1880 [doi]
- QTSRA: A Q-learning-based Trusted Routing Algorithm in SDN Wireless Sensor NetworksYujie Zhang, Peng Li, Weibei Fan, Ruchuan Wang. 1881-1886 [doi]
- RF Fingerprint Recognition for Different Receiving Devices Using Transfer LearningJinhui Yu, Caidan Zhao, Xiangyu Huang, Yicheng Zheng. 1887-1892 [doi]
- A Hybrid Genetic Algorithm for Flexible Job Shop Scheduling Problem with Batch Processing MachinesTianhong Wang, Yue Teng, Chunjiang Zhang, Yiping Gao, Xinyu Li 0001. 1893-1898 [doi]
- Research on Bandwidth-Oriented Distributed Task Allocation Mechanism for Multi-UAVXinpeng Lu, Heng Song, Huailing Ma, Xueqing Li, Junwu Zhu. 1899-1904 [doi]
- A Lightweight Model for Detecting Dangerous Driving Behaviors in Road TransportationHaiyang Zhang, Zhiwei Huo, Caixia Liu, Yingyan Wu, Xiran Zhang. 1905-1910 [doi]
- Collaborating Smartwatches and HMDs to Enhance User Perception for Touch Manipulation in XRYitong Li, Tianyang Xiong, Shangwei Huang, Zida Han, Qingfeng Wu. 1911-1916 [doi]
- Integrating Open-domain Knowledge via Large Language Model for Multimodal Fake News DetectionAnbin Xie, Fuqing Zhu, Jizhong Han, Songlin Hu. 1917-1922 [doi]
- Research on key scene trajectory generation method based on BLA-VAEYong Wang, Wei Zhang, Daifeng Zhang, Yanqiang Li, Dongbing Zhang. 1923-1930 [doi]
- Efficient Workflow Scheduling and Cost Optimization for Deadline-Constrained Microservice Applications in Mobile Edge ComputingAbdul Rasheed Mahesar, Xiaoping Li, Dileep Kumar Sajnani, Kamran Yaseen Rajput. 1931-1936 [doi]
- HGTA: News Recommendation Based on Hierarchical Granular Semantic Embeddings and Threshold AttentionYiwen Li, Zhenyu Yang 0002, Zhijun Li, Xiaoyang Li. 1937-1943 [doi]
- Opinion-Tree-guided Contrastive Learning for Aspect Sentiment Quadruple PredictionZhijun Li, Zhenyu Yang, Yiwen Li, Xiaoyang Li. 1944-1951 [doi]
- CAFI: News Recommendation with Candidate Perception of Fine-Grained Interaction InformationYiwen Li, Zhenyu Yang, Xiaoyang Li, Zhijun Li. 1952-1959 [doi]
- Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in ConversationXiaoyang Li, Zhenyu Yang, Yiwen Li, Zhijun Li. 1960-1967 [doi]
- Improving Adversarial Robustness by Reconstructing Interclass RelationshipsLi Xu, Huiting Guo, Zejin Yang, Xu Wan, Chunlong Fan. 1968-1973 [doi]
- Robust Hazardous Driving Scenario Detection for Supporting Autonomous Vehicles in Edge-Cloud Collaborative EnvironmentsZhen Gao, Liyou Wang, Jingning Xu, Hongfei Fan, Rongjie Yu. 1980-1985 [doi]
- Generative Transferable Universal Adversarial Perturbation for Combating DeepfakesYuchen Guo, Xi Wang, Xiaomeng Fu, Jin Liu, Zhaoxing Li, Yesheng Chai, Jizhong Han. 1986-1991 [doi]
- QFINCH: Quick hierarchical clustering using k-means and first neighbor relationsJiajun Zhang, Geping Yang, Yiyang Yang, Juan Lu. 1992-1997 [doi]
- 3D Contour Generation based on Diffusion Probabilistic ModelsYiqi Wu, Xuan Huang, Kelin Song, Fazhi He, Dejun Zhang. 1998-2003 [doi]
- Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoTShizhao Tian, Zhen Wang, Kaiyu Xie, Fansong Chen, Hongsong Zhu. 2004-2009 [doi]
- DST-FRD: A Distillation Method of Swin Transformer for Facial Reenactment DetectionHaotian Wu, Yu Chen, Xin Wang, Lin Wang, Ji Xiang, Liyue Ren. 2010-2015 [doi]
- CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized IdentityZinuo Zhang, Ruoting Xiong, Xinyu Di, Wei Ren 0002. 2016-2021 [doi]
- A Task Selection Approach for Multiple Unmanned Aerial VehiclesMei Ni, Yin Sheng, Lipeng Chen, Mengmeng Zhang. 2022-2027 [doi]
- Anomaly detection and traceback scheme for cloud-edge networksXuanyan Liu, Jinling He, Hu Song, Xinyun Cheng, Luyun Hu, Xiaolong Xu. 2028-2033 [doi]
- MedMatch: Design of Semi-supervised learning Model with Curriculum Pseudo-Labels for Medical Image ClassificationYufei Gao, Zhe Chen, Lei Shi, QingXian Wang, Yameng Zhang. 2034-2039 [doi]
- EntityParser: A Log Analytics Parser for Identifying Entities from System LogsChentong Zhao, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, Jiangang Ma. 2040-2045 [doi]
- MAT-VIT: A Vision Transformer with MAE-Based Self-Supervised Auxiliary Task for Medical Image ClassificationYufei Han, Haoyuan Chen, Linwei Yao, Kuan Li, Jianping Yin. 2046-2052 [doi]
- Ethereum Phishing Scams Detection Based on Graph Contrastive Learning with AugmentationsYongxin Chen, Wenhan Hou, Xin Zhang, Ru Li. 2053-2058 [doi]
- A Batch Payment Scheme with Denomination PrivacyLiutao Zhao, Lin Zhong, Yujue Wang, Jiawan Zhang. 2059-2065 [doi]
- Few-Shot Learning for Hyperspectral Imaging via Spectral-Spatial Feature ReconstructionShukai Liu, DanYi Chen, Fei Teng, Changqing Yin, Huijuan Zhang. 2066-2071 [doi]
- Adaptive Mixture of Domain-aware Experts for Detecting Social BotsQianqian Lu, Shilong Li, Kun Li, Wei Zhou, Liangjun Zang. 2072-2077 [doi]
- PTQ-SO: A Scale Optimization-based Approach for Post-training Quantization of Edge ComputingKangkang Liu, Ningjiang Chen. 2078-2083 [doi]
- Reinforcement Learning Based Memory Configuration for Linear Dynamic Function ChainsJinquan Zhang, Xiaoping Li 0001, Kamran Yaseen Rajput, Long Chen. 2084-2089 [doi]
- TLGPA: Two-Level Graph Partitioning Algorithm under Multi-Machine Multi-Card SystemHuanqing Cui, Silin Lv. 2090-2095 [doi]
- YTCNet: A Real-time Algorithm for Parcel Damage Detection with Rich Features and AttentionZhi Chen, Cuifeng Du, Yuyu Zhou, Haoxuan Guan, Xiujie Huang, Zhefu Li, Changjiang Liu, Xiaotian Zhuang, Xingyu Zhu 0011, Quanlong Guan. 2096-2101 [doi]
- Blockchain-based Anonymous Authentication Key Management for Mobile Edge ComputingYun Deng, Haihua Tang. 2102-2109 [doi]
- Data Lineage Construction Method for Multi-Chain-Based Data Assets MarketplacesHui Zhao, Xiaodong Zhang 0031, Jinshan Shi, Ru Li 0004. 2110-2115 [doi]
- Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone IntrusionZixuan Chen, Chao Zheng, Zhao Li, Jinqiao Shi, ZeYu Li. 2116-2121 [doi]
- Research on Java Automatic Simplified Modeling Based on Source Code Dependency AnalysisJiaqi Wang, Tao Sun 0002, Wenjie Zhong, Ziyu Wang, Yefan Zhang. 2122-2127 [doi]
- Blockchain-based UAV-assisted Forest Fire Detection and Monitoring SystemLipan Chen, Yujue Wang, Yong Ding 0005, Hai Liang, Changsong Yang, Huiyong Wang. 2128-2133 [doi]
- QTN-MLP: Quantum Tensor Network-enhanced MLP for Medical Image ClassificationGeng Zhang, Hong Lai. 2134-2139 [doi]
- An NSGA-II-based multi-objective trajectory planning method for autonomous drivingDongbing Zhang, Zihui Zhang, Yanqiang Li, Yong Wang, Wei Zhang, Yunhai Zhu. 2140-2146 [doi]
- RASLite: Enhancing (W)PMS Solvers Through Dynamic Initial Weight ApproachMenghua Jiang, Yin Chen. 2147-2152 [doi]
- Reliability of Half Hypercube Networks under Cluster FaultsXuanli Liu, Mengjie Lv, Weibei Fan, Xueli Sun, Zhenjiang Dong, Fu Xiao 0001. 2153-2158 [doi]
- A protection routing with secure mechanism in the data center network WaveCubeJingman Pei, Mengjie Lv, Weibei Fan, Xueli Sun, Xin He, Fu Xiao. 2159-2164 [doi]
- Distill Graph Structure Knowledge from Masked Graph Autoencoders into MLPXiong Zhang, Cheng Xie. 2165-2172 [doi]
- Single Image Haze Removal Using Haze Color PriorNingtao Ma, Ru Yi, Mingyang Sun, Liangyu Ruan. 2173-2178 [doi]
- A Conditional Diffusion-based Data Augmentation for Anomaly Detection in AIOpsJiawei Huang 0001, Hanyu Deng, Zhaoyi Li, Yijun Li, Jingling Liu, Xiaojun Zhu, Qichen Su. 2179-2184 [doi]
- Robust modeling of the multi-depot vehicle routing problem under uncertain demandsJinqing Li, Qi Qi 0004, Ni Li, Yibo Han. 2185-2190 [doi]
- Two-branch Network with Feature Fusion for Time Since Deposition Estimation of BloodstainsLin Shi, Yushi Li, Yu Han, Jia Wang, Fangyu Wu, Chenke Yin, Haichao Zhang. 2191-2196 [doi]
- Taming the Low-Quality Path for Reinforcement Learning-Based Knowledge Graph ReasoningRuisheng Wang, Weiwen Zhang. 2197-2202 [doi]
- FedGR: Genetic Algorithm and Relay Strategy Based Federated LearningYifei Zeng, Kai Zhao, Fangchao Yu, Bo Zeng 0006, Zhi Pang, Lina Wang 0001. 2203-2208 [doi]
- RFR-ABROF: A Multi-Strategy Collaborative Classification Prediction Model Based on Rotation Forest for PM2.5Xiaoyong Tang, Xiangyu Yang, Wenzheng Liu, Tan Deng, Ronghui Cao, Zeyuan Tu, XingJiang Hu. 2209-2214 [doi]
- Enhancing Low-Light Images: A Novel Approach Combining Anisotropic Diffusion and RetinexMingyang Sun, Ru Yi, Xinxin Wang, Ningtao Ma. 2215-2220 [doi]
- A Privacy-Preserving Method for Sequential Recommendation in Vertical Federated LearningYutian Shi, Beilun Wang. 2221-2226 [doi]
- A Privacy Protection Task Offloading Algorithm in MECYun Deng, Haihua Tang. 2227-2233 [doi]
- Low-light Image Enhancement Algorithm Based on Improved Multi-scale Retinex with Adaptive Brightness CompensationXinxin Wang, Ru Yi, Mingyang Sun, Zhaozheng Zhang. 2234-2239 [doi]
- An Automated Alert Cross-Verification System with Graph Neural Networks for IDS EventsLiang Li, Yuanhui He, Feiyang Huang, Ziming Zhao 0008, Zhuoxue Song, Tong Zhou, Zhenyuan Li, Fan Zhang. 2240-2245 [doi]
- CRED: A Corneal Reflection and Environment DatasetMengqi Du, Yue Zhang, Jianhua Zhang, Honghai Liu 0001. 2246-2251 [doi]
- Study of Biopharmaceutical Quality Supervision System Based on IoT and Big DataYu Wan, Yue Jiang, Weiheng Zheng, Xiangwei Zhao. 2252-2257 [doi]
- Application of Network Slicing in UAV Ground Communication SystemsBing Liu, Weizheng Cheng, Shiqiang Hu, Lingkun Luo. 2258-2263 [doi]
- Attribute-enhanced Selection of Proper Demonstrations for Harmful Meme DetectionMeng Lin, Qinghao Huang, Qianqian Lu, Xianjing Guo, Tao Guo. 2264-2269 [doi]
- STE-PFL: Spatial-Temporal Enhanced Personalized Federated Learning for IoT Cross-Domain Access Decision-MakingChunwen Liu, Hongchen Yu, Juxin Xiao, Feng Dai, Jie Yin. 2270-2275 [doi]
- Collaborative Prediction of Drug-target Interaction using Sequence-based CNN and TransformerHuiting Li, Weiyu Zhang, Yong Shang, Wenpeng Lu. 2276-2281 [doi]
- Holistic Evaluation Metrics for Federated LearningJehad Ibrahim, Yanli Li, Huaming Chen, Dong Yuan. 2282-2287 [doi]
- Workflow task offloading mechanism based on A3C under computing network integrationLin Wei, Shihao Zhang, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He. 2288-2294 [doi]
- Resource matching algorithm based on multidimensional computing resource measurement in computing power networkLin Wei, Jinyang Li, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He. 2295-2300 [doi]
- Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water ConservancyZhuoqun Xia, Shiyu Wang, Jingjing Tan, Zhenzhen Hu. 2301-2306 [doi]
- TacWgan-gp: Fabric Texture-Based Tactile Friction Coefficient GenerationBaoshou Li, Yu He, Ge Yu. 2307-2312 [doi]
- Facilitating Pornographic Text Detection for Open-Domain Dialogue Systems via Knowledge Distillation of Large Language ModelsHuachuan Qiu, Shuai Zhang, Hongliang He, Anqi Li, Zhenzhong Lan. 2313-2318 [doi]
- A Predictive Framework for Shipborne Wind Speed Measurement Correction Based on Self-Supervised Contrastive LearningJian Song, Xiang Li 0064, Zhenqiang Zhang, Zhigang Zhao, Chunxiao Wang, Shunfang Wu, Suiping Qi, Jialiang Lv. 2319-2324 [doi]
- PLFa-FL: Personalized Local Differential Privacy for Fair Federated LearningHongyun Cai 0002, Meiling Zhang, Shiyun Wang, Ao Zhao, Yu Zhang 0170. 2325-2332 [doi]
- A Cross-Chain Privacy Protection and Key Sharing Scheme Based on Relay ChainPeng Wu, Libo Feng, Junhong Liu, Zehui Yuan, Yaqi Zhou, Xian Deng, Zhixing Zhang, Jiale Xie, Fake Fang. 2333-2338 [doi]
- ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection ModelsChun Yang, Gang Shi, Yu Wen, Xinqiang Zhao. 2339-2344 [doi]
- A TDE-based Multi-node Data Categorized Transfer Storage Scheme in Consortium BlockchainXian Deng, Junhong Liu, Peng Wu, Jiaying Zhang, Zehui Yuan, Fake Fang, Jiale Xie, Libo Feng. 2345-2350 [doi]
- CMSCEF: A Cross-chain Mechanism based on Smart Contract Execution FrameworkJunhong Liu, Libo Feng, Xian Deng, Xianchi Gao, Fake Fang, Zehui Yuan, Jiale Xie, Peng Wu, Zhixing Zhang. 2351-2356 [doi]
- Short-term Portfolio Optimization using Doubly Regularized Exponential Growth RateQuanlong Guan, Jinneng He, Zhao-Rong Lai, Yuyu Zhou, Quming Jiang, Ziliang Chen. 2357-2362 [doi]
- Analyzing Women's Contributions to Open-Source Software Projects based on Large Language ModelsYuqian Zhuang, Mingya Zhang, Yiyuan Yang, Liang Wang. 2363-2368 [doi]
- Enhancing Ensemble Attacks through Momentum Self-MaintenanceHang Pu, Yongsheng Fan, Yunjia Han, Qian Su. 2369-2374 [doi]
- Trace Anomaly Detection for Microservice Systems via Graph-based Semi-supervised LearningShuai Ding, Yuepeng E, Jiye Zhang, Liangxiong Li, Lei Zhang, Jingguo Ge. 2375-2380 [doi]
- PromoterDiff: De Novo Design Approach for Escherichia coli Promoters Based on a Diffusion ModelYunkun Cheng, Xiankun Zhang, Fufeng Liu, Danyang Zhao, Xin Luo. 2381-2387 [doi]
- Imporved on Qiu's shemes to resist long-term observation attacks with semantic attributes of locationWangqing Wu, Jiale Gong. 2388-2393 [doi]
- BCFL: A Trustworthy and Efficient Federated Learning Framework Based on Blockchain In IoTFake Fang, Libo Feng, Jiale Xie, Junhong Liu, Zehui Yuan, Xian Deng, Peng Wu, Peiyin Luo, Yifan Liu. 2394-2399 [doi]
- ETPAM: An Efficient Task Pre-Assignment and Migration Algorithm in Heterogeneous Edge-Cloud Computing EnvironmentsFengchun Zhang, Liheng Jiang, Juan Chen. 2400-2405 [doi]
- Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical SystemsZhuoqun Xia, Kai Lin, Jingjing Tan, Zhenzhen Hu. 2406-2411 [doi]
- Implementing Fuzz-Based Technology for Detecting Spectre-Style VulnerabilitiesShaojie Ma, Cairui She, Gang Shi. 2412-2417 [doi]
- Attention Mixture based Multi-scale Transformer for Multi-behavior Sequential RecommendationTianyang Li, Hongbin Yan, Yuxin Jiang. 2418-2423 [doi]
- A Multimodal Fusion Generation Network for High-quality MR Image SynthesisRui Zhu, Yidan Yan, Jiayao Li, Ruizhi Sun. 2424-2429 [doi]
- Decision Transformer based Target-aware Feature Selection Network for Behavior-oriented RecommendationTianyang Li, Hongbin Yan, Hanwen Xu. 2430-2435 [doi]
- AgriPrompt: A Method to Enhance ChatGPT for Agricultural Question AnsweringTianyue Chen, Xiaojin Chen, Yongqiang Qian, Lang Zheng, Haiyang Li, Jingbo Zhao, Yaojun Wang. 2436-2441 [doi]
- A Blockchain-based Federated Learning Framework for Defending Against Poisoning Attacks in IIOTJiale Xie, Libo Feng, Fake Fang, Zehui Yuan, Xian Deng, Junhong Liu, Peng Wu, Zhuo Li. 2442-2447 [doi]
- Multi-perspective Information and Multi-task Contrastive Learning for Sequential RecommendationsLi e Wang, Rongwen Wei, Hengtong Chang, Xianxian Li, ZhiGang Sun, Tianran Liu. 2448-2453 [doi]
- A new SM2-based ring signature scheme with revocability and anonymityChangsong Yang, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, Ruwen Zhao. 2454-2459 [doi]
- Node-disjoint Paths Construction Algorithm in Data Center Network EHDCYao Pan, Weibei Fan, Mengjie Lv, Xin He, Fu Xiao. 2460-2465 [doi]
- A TCPN Automatically Modeling Method for Java Parallel Programs Oriented to Performance AnalysisYefan Zhang, Tao Sun, Wenjie Zhong, Jiaqi Wang, Ziyu Wang. 2466-2471 [doi]
- Knowledge Graph-based Optimization of Multi-AGV Cooperative Handling in Flexible WorkshopsXiao Dong, Xiaojun Zheng, Yaning Song. 2472-2477 [doi]
- Reliable Cosine Matching via Neighborhood Consensus for Fundus Image RegistrationKexian Tang, Shuyu Wang, Hao Yang, Huilin Lai, Jingyi Sun, Ye Luo. 2478-2483 [doi]
- FuzzyFollow: A Novel Privacy-Aware Intelligent Vehicle-Following Scheme for Safe Driving on Risky Roads Using Fuzzy SetsTieming Chen, Xiaoyang Tian, Yinglong Li, Qingyan Jiang, Zechen Liu. 2484-2490 [doi]
- Watch and Read! A Visual Relation-Aware and Textual Evidence Enhanced Model for Multimodal Relation ExtractionQianru Shen, Hailun Lin, Huan Liu, Zheng Lin, Weiping Wang. 2491-2496 [doi]
- An Improved Genetic Optimization Algorithm for Scheduling Serverless Application Jobs in Public Cloud EnvironmentsLingjie Pei, Li Pan, Shijun Liu. 2497-2502 [doi]
- Q-scheduler: Optimize Job Scheduling in Hadoop with Reinforcement LearningYiqing Liu, Li Pan, Shijun Liu. 2503-2508 [doi]
- Deep Semantic Context Analysis Based on Adaptive Knowledge Graph Construction for Artificial Intelligence DomainTie Hua Zhou, Wanlin Zhang, Wei Ding, Yuan Li, Ling Wang 0011. 2509-2514 [doi]
- GMAE: Representation Learning on Graph via Masked Graph AutoencodersChengbin Zheng, Zhicheng Yang, Yang Lu. 2515-2521 [doi]
- PG-AID: An Anomaly-based Intrusion Detection Method Using Provenance GraphLingxiang Meng, Rongrong Xi, Ziang Li, Hongsong Zhu. 2522-2527 [doi]
- Realistic Grasping Based on Soft Finger Force InteractionXiaoyu Wang, Yu He, Meng Zhao. 2528-2533 [doi]
- CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature ExtractionHuaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang 0008, Feng Liu 0001. 2534-2540 [doi]
- Precise and Efficient Third-party Java Libraries Identification Tool for Collaborative SoftwareZhuo Wang, Hongtu Zhang, Jingdong Guo, Laile Xi, Sidy Tambadou, Fang Zuo, Hong Li, Yan Hu. 2541-2546 [doi]
- A Privacy-Preserving Decision Tree Evaluation Scheme for Multiple Wearable DevicesYuanshun Huang, Guihua Duan. 2547-2552 [doi]
- Capture Long-Range Dependency with Meta-Path Transformer for De-Anonymization of Q&A SitesBaojie Tian, Liangjun Zang, Jizhong Han, Songlin Hu. 2553-2558 [doi]
- Deep Hashing with Triplet Loss of Hash Centers and Dissimilar Pairs for Image RetrievalYe Liu, Yan Pan, Jian Yin 0001. 2559-2564 [doi]
- FSD-YOLO: An Improved Method for Steel Surface Defect Detection Based on YOLOv5Yuechen Zhang, Aimin Li, Xiaotong Kong, Wenqiang Li, Zhiyao Li. 2565-2570 [doi]
- Heart of Betrayal: A PIN Inference Attack Leveraging Photoplethysmography on WearablesShiyue Huang, Yuchen Su, Hongbo Liu 0002, Huan Dai, Bo Liu 0058. 2571-2576 [doi]
- A time-sensitive cloud-native network based on eBPFJifei Wen, Jingguo Ge, Zheyuan Zhang, Hui Li, Yuepeng E, Bingzhen Wu. 2577-2582 [doi]
- A Reference Architecture to Support the Collaborative Development of Virtual Reality Exposure Therapy SoftwareFelipe Ortúzar, Pedro O. Rossel, Francisco J. Gutierrez. 2583-2588 [doi]
- Robot Autonomous Exploration System Base on Arm-Chassis CollaborationHaonan Yang, Shengsheng Yan, Bolei Chen, Ping Zhong 0002, Yongzheng Cui, Yu Sheng. 2589-2594 [doi]
- MLPSeg: Incorporating Multi-Local Perception with Context Cross Attention Based Transformer for Nuclei SegmentationYufei Gao, Shuxi Li, Jing Xu, Zixing Ma, Mengyang He, Yameng Zhang. 2595-2600 [doi]
- Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly DetectionEnze Zhao, Peng Li, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao, Qin Liu, Kai Zhang. 2601-2606 [doi]
- XShellGNN: Cross-file Web Shell Detection Based on Graph Neural NetworkJinli Zhang, Xutong Wang, Ningjun Zheng, Kezhen Huang, Yun-feng, Xiang Cui. 2607-2613 [doi]
- Anomaly Detection for Multivariate Time Series Based on Contrastive Learning and AutoformerXuwen Shang, Jue Zhang, Xingguo Jiang, Hong Luo 0001. 2614-2619 [doi]
- Robust Classification of Incomplete Time Series with Noisy LabelsXin Qin, Pengshuai Yao, Mengna Liu, Xu Cheng, Fan Shi, Lili Guo. 2620-2625 [doi]
- Promoting Named Entity Recognition with External DiscriminatorCheng Li, JiaQi Wu, Feng Yuan, Yuqing Sun 0001. 2626-2631 [doi]
- Intelligent Graphic Layout Generation: Current Status and Future PerspectivesZhixiong Liu, Fang Liu, Mohan Zhang. 2632-2637 [doi]
- Collaborative Multi-Teacher Distillation for Multi-Task Fault Detection in Power Distribution GridBingzheng Huang, Chengxin Ni, Junjie Song, Yifan Yin, Ningjiang Chen. 2638-2643 [doi]
- A deep learning based detection scheme towards DDos Attack in permissioned blockchainsChuang Li, Dongdong Huo, Sixiang Wang, Yaoyi Deng, Qihui Zhou, Yu Wang 0134. 2644-2649 [doi]
- UDTL: Anomaly Detection Based on Unsupervised Deep Transfer LearningXiang Wang, Yuanyu Wang, Yu Dai, Chi Wei, Yuliang Tang. 2650-2655 [doi]
- CloudFusion: Multi-Source Intrusion Detection in Cloud EnvironmentsXu Yang, Zhang Kun, Xia Hao Jun, Tu Bibo, Li Chen. 2656-2661 [doi]
- A Multi-Feature Fusion Method with Inception Architecture for Image SteganalysisMing Jiang, Shuo Zhang, Feng Zhang, Biao Guo, Yun Li. 2662-2667 [doi]
- Intelligent Convergence: Advancing 6G mmWave Networks with RIS-Enhanced ISAC for IoT ApplicationsXuanhui Liu, Yifeng Zhao, Xiaoqi Wang, Bo Wang, Keyi Cheng. 2668-2673 [doi]
- Blockchain-Based Device Reputation Assessment in the Industrial Internet of ThingsGuangshun Li, Xueli Gao, Junhua Wu. 2674-2679 [doi]
- EI-XIDS: An explainable intrusion detection system based on integration frameworkYang Xu, Chen Li, Kun Zhang, Haojun Xia, Bibo Tu. 2680-2685 [doi]
- Fine-Grained Skeleton-Based Human Action Recognition for Figure SkatingZhihong Wei, Jianshu Qin, Bangmao Li. 2686-2691 [doi]
- Multi-Server Verifiable Aggregation for Federated Learning in Securing Industrial IoTLiutao Zhao, Haoran Xie 0006, Lin Zhong, Yujue Wang. 2692-2697 [doi]
- MRC-FEE: Machine Reading Comprehension for Chinese Financial Event ExtractionYi Yu, Dongsheng Zou, Xinyi Song, Yuming Yang, Kang Xi. 2698-2703 [doi]
- Wi-Fi fingerprint based indoor localization using few shot regressionXuechen Chen, Jiaxuan Yi, Aixiang Wang, Xiaoheng Deng. 2704-2709 [doi]
- Noise-Robust Neural Network For Wind Turbine Gearbox Fault DiagnosisZixuan Wang, Ke Ma, Hongwei Wang. 2710-2715 [doi]
- Research on the data stacking problem of energy-based packet prioritization in EH-WSNZhengyu Hou, Ning Li, Wuyungerile Li, Ruihong Wang, Fei Gao, Bing Jia. 2716-2721 [doi]
- Multimodal Knowledge Graph-Enabled Steel Product DevelopmentGongzhuang Peng, Ningyi Wang, Xuejun Zhang, Dong Xu 0013. 2722-2727 [doi]
- CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat IntelligenceYang Liu, Xiaohui Han, Wenbo Zuo, Haiqing Lv, Jing Guo. 2728-2733 [doi]
- DM-YOLOv5: An Improved Safety Helmet Detection Algorithm at Complex Construction ScenesDexu Yao, Aimin Li, Deqi Liu, Mengfan Cheng. 2734-2739 [doi]
- Source Free Domain Adaptation via Adapting to the Enhanced StyleChaofeng Yang, Zhiheng Zhao, Hankiz Yilahun, Askar Hamdulla. 2740-2745 [doi]
- Reinforced Perturbation Generation for Adversarial Text-based CAPTCHAZhijun Cheng, Zhuoting Wu, Zhuopan Yang, Zhenguo Yang, Xiaoping Li, Wenyin Liu. 2746-2751 [doi]
- Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance UncertaintyKamran Yaseen Rajput, Xiaoping Li, Abdullah Lakhan, Jinquan Zhang, Abdul Rasheed Mahesar, Dileep Kumar Sajnani. 2752-2757 [doi]
- Non-Line-of-Sight Long-Wave Infrared Imaging based on NestformerShaohui Jin, Yayong Zhao, Hao Liu, JiaQi Wu, Zhenjie Yu, Mingliang Xu. 2758-2763 [doi]
- KCPMA: k-degree Contact Pattern Mining Algorithms for Moving ObjectsYou Chen, Hua Dai 0003, Mingfeng Jiang, Qu Lu, PengYue Li, Bohan Li, Geng Yang. 2764-2769 [doi]
- iCCBT, an Interactive Approach of CBT for Online Psychological InterventionYuhan Liao, Fang Liu, Lin Lin, Mingbo Hou, Yingying She, Hang Wu, Bin Hu, Qingqiang Wu 0001. 2770-2775 [doi]
- AT-I-FGSM: A novel adversarial CAPTCHA generation method based on gradient adaptive truncationJunwei Tang, Sijie Zhou, Ping Zhu, Tao Peng 0006, Ruhan He, Xinrong Hu, Changzheng Liu. 2776-2781 [doi]
- Dual-Agent Based Collaborative Audio-Video Adaptive Bitrate Strategy under CommutingQiumin Yang, Chaokun Zhang, Tao Tang, Jingshun Du. 2782-2787 [doi]
- HBGraph: a Host Behavior Graph Model for C&C Traffic DetectionYitan Huang, Jian Qin, Zelin Cui, Ning Li, Bo Jiang, Zhigang Lu 0002. 2788-2793 [doi]
- Verifiable and Privacy-Preserving Online Diagnosis Based on Multiclass SVM and CKKS Leveled Homomorphic EncryptionJie Yan, Meng Zhao, Yong Ding 0005, Hai Liang, Changsong Yang, Yujue Wang. 2794-2799 [doi]
- Simplification Method of CPN Model Based on Data AbstractionZiyu Wang, Tao Sun, Wenjie Zhong, Yefan Zhang, Jiaqi Wang. 2800-2805 [doi]
- Continuous Authentication Technology Based on Device Driver BehaviorHaojun Xia, Hongwei Liu, Da Zhang, Haohao Liu, Xiaotong Wang, Bibo Tu. 2806-2811 [doi]
- The Fuzzy Analytic Hierarchy Process for Evaluating the Effectiveness of Manned and Unmanned Collaborative CombatWang Chen, Xiaocong Wang, Chengjia Yu, Yukun Liang. 2812-2815 [doi]
- Research on Multi-Model Fusion for Multi-Indicator Collaborative Anomaly Prediction in IoT DevicesDonghao Wang, Tengjiang Wang, Hao Qi, Shijun Liu, Li Pan. 2816-2821 [doi]
- MGE-Net: Task-oriented Point Cloud Sampling based on Multi-scale Geometry EstimationWeiliang Zeng, Yushi Li, Rong Chen, Rong Xiang, Yunzhe Wang, Jinghang Gu. 2822-2827 [doi]
- Efficiently Adapting Traffic Pre-trained Models for Encrypted Traffic ClassificationWenxuan Lu, Zhuohang Lv, Lanqi Yang, Xiang Luo, Tianning Zang. 2828-2833 [doi]
- FlowSeer: A Novel Framework for Generalized Network Performance Estimation at Flow LevelHaizhou Du, Ming Li. 2834-2839 [doi]
- Eight-neighborhood sparse contour extraction in binary imagesDanYi Chen, Weinian Cao, Shengxiang Rao, Lijun Luo. 2840-2845 [doi]
- Integrating User Rules into Neural Text InferenceWei Zheng, Yuqing Sun 0002, Yexin Zhang, Bin Gong. 2846-2851 [doi]
- RFID-Based Indoor Human Behavior Recognition Using SATCN: A Self-Attention Enhanced Temporal Convolutional NetworkZhenchao Chen, Mulan Yang, Xuehan Hou, Lvqing Yang, Wensheng Dong, Bo Yu 0024, Qingkai Wang. 2852-2857 [doi]
- A Secure Blockchain-based Reputation Scheme for Data Offloading in Edge ComputingQian Yang, Jiankai Wang, Kai Chen, Hongjia Li, Haihua Gao, Zhen Xu 0009. 2858-2863 [doi]
- Dynamically Weighted Directed Network Link Prediction Using Tensor Ring DecompositionQu Wang, Hao Wu. 2864-2869 [doi]
- What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage PreventionKai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu. 2870-2875 [doi]
- Deep Reinforcement Learning Approach for Enhancing Profitability in Mobile Edge ComputingMuhammad Asim Ejaz, Guowei Wu, Abid Sultan, Tahir Iqbal. 2876-2881 [doi]
- TSFE: Research on Transformer and Feature Enhancement Methods for Image-Text RetrievalJinxiao Yang, Xingang Wang, Qingao Wang. 2882-2887 [doi]
- A Fair and Energy Efficient Cooperative Routing Protocol Based on Link Quality for Underwater Acoustic Sensor NetworkShuting Yang, Keyu Chen, Wei Feng 0008, En Cheng. 2888-2893 [doi]
- Desktop Virtualization Optimization Methods Based on IDV ArchitectureShuang Liang, Haojun Xia, Chen Li, Bibo Tu. 2894-2899 [doi]
- A Lightweight Deep Learning Model for EEG Classification Across Visual StimuliYi Liu, Steven Goh, Tobias Low, Zach Quince, Shoryu Teragawa. 2900-2905 [doi]
- A Practical Cloud API Complementary Recommendation Service for Mashup CreationXiaowei Liu, Wenhui Chen, Mengmeng Sun, Yali Si, Zhen Chen 0007. 2906-2911 [doi]
- TraitsPrompt: Does Personality Traits Influence the Performance of a Large Language Model?Qingmeng Zhu, Tianxing Lan, Xiaoguang Xue, ZhiPeng Yu, Hao He 0003. 2912-2917 [doi]
- MemAPIDet: A Novel Memory-resident Malware Detection Framework Combining API Sequence and Memory FeaturesJiaxi Liu, Kezhen Huang, Yun-feng, Canhua Chen, Jinli Zhang, Yuqi Shu, Xing Tian, Qixu Liu. 2918-2924 [doi]
- Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV VideosWei Ding, Luyao Wang, Wei Zhang, Myung-Jin Lee, Ling Wang, Kwang Woo Nam. 2925-2930 [doi]
- SemGO: Goal-Oriented Semantic Policy Based on MHSA for Object Goal NavigationYu Wu, Niansheng Chen, Lei Rao, Guangyu Fan, Dingyu Yang, Songlin Cheng, Xiaoyong Song, Yiping Ma 0008. 2931-2936 [doi]
- Multi-Channel Hypergraph Network for Sequential Diagnosis Prediction in HealthcareXin Zhang, Xueping Peng, Weimin Chen, Weiyu Zhang, Xiaoqiang Ren, Wenpeng Lu. 2937-2942 [doi]
- TopoRCA: A Lightweight Root Cause Analysis System Based on Application TopologyYouliang Huang, Jue Zhang, Xiaolin Chai, Yan Sun 0004. 2943-2948 [doi]
- View2CAD: Parsing Multi-view into CAD Command SequencesYi Zhang, Fazhi He, Rubin Fan, Bo Fan. 2949-2954 [doi]
- A Fast and Inherently Nonnegative Latent Factorization of Tensors Model for Dynamic Directed Network RepresentationAoling Zeng, Hao Wu. 2955-2960 [doi]
- Alzheimer's Disease Risk Genes Mining Based on a Supervised Machine Learning Method and PPI Network ConstructionQiushi Zhang, Lang Ao, Junfeng Liu, Yang Xi, Dandan Chen. 2961-2966 [doi]
- ALMA: Adjustable Location and Multi-Angle Attention for Fine-Grained Visual ClassificationBoyu Ding, Xiaofeng Xu, Xianglin Bao, Nan Yan, Ruiheng Zhang. 2967-2972 [doi]
- Online Course Recommendation by Exploring User Interaction and Course DescriptionWeike Zhou, Xiaokang Zhou, Jing He, Yamei Nie, Qiqi Chen, Guosheng Kang. 2973-2978 [doi]
- PsyChat: A Client-Centric Dialogue System for Mental Health SupportHuachuan Qiu, Anqi Li, Lizhi Ma, Zhenzhong Lan. 2979-2984 [doi]
- A Novel Two-Stage Stacking Model for Breast Cancer Survival PredictionHaokai Gao, Xiangru Li, Ruizheng Shi. 2985-2990 [doi]
- RSTIE-KGC: A Relation Sensitive Textual Information Enhanced Knowledge Graph Completion ModelWenyue Li, Sapae Phyu, Qin Liu, Bowen Du 0002, Junyan Zhang, Hongming Zhu. 2991-2998 [doi]
- An Efficient Vehicular Intrusion Detection Method Based on Edge IntelligenceJun Li 0085, Shuqin Zhang, Hongsong Zhu, Yu Chen, Jizhao Liu. 2999-3004 [doi]
- Dynamic Energy Management for IoT-enabled Smart Microgrid using Deep Reinforcement LearningFu Jiang, Jie Chen, Jieqi Rong, Zini Wang, Yingze Yang, Heng Li. 3005-3010 [doi]
- NetKD: Towards Resource-Efficient Encrypted Traffic Classification Using Knowledge Distillation for Language ModelsJiaji Ma, Xiangge Li, Hong Luo, Yan Sun. 3011-3016 [doi]
- Lightweight Fusion Model with Time-Frequency Features for Speech Emotion RecognitionPeng Zhang, Meijuan Li, Hui Zhao, Yida Chen, Fuqiang Wang, Ye Li, Wei Zhao. 3017-3022 [doi]
- Explainable Deepfake Detection with Human PromptsXiaorong Ma, Jiahe Tian, Zhaoxing Li, Yesheng Chai, Liangjun Zang, Jizhong Han. 3023-3029 [doi]
- Teaching Early Warning Approach for Teachers based on Cognitive Diagnosis and Long Short-term MemoryHua Ma 0002, Peiji Huang, Xi Luo, Qiong Huang, Xiangru Fu, Wensheng Tang. 3030-3035 [doi]
- Intelligent Vehicles Lane-changing Intention Identification Method with Driving Style RecognitionJun Peng 0001, Haowen Tang, Chenglong Wang, Xin Gu, Hui Peng. 3036-3041 [doi]
- A novel deep learning model CSAM-ResNet based on attention mechanism and residual learning for breast histopathology image classificationRuizheng Shi, Xiangru Li, Haokai Gao. 3042-3047 [doi]
- National Image Resources Recommendation for Targeted International Communication via E-CARGO ModelHua Ma 0002, Chao Xiong, Xiangru Fu, Zhixiang Huang, Yuqi Tang, Hongyu Zhang. 3048-3053 [doi]
- CipherFormer: Efficient Transformer Private Inference with Low Round ComplexityWeize Wang, Yi Kuang. 3054-3059 [doi]
- Extended Cell Similarity-based Cyber Attack Detection Method for DC Microgrids under Variable LoadXiaoyong Zhang 0001, Zhongke Zhang, Wanwan Ren, Rui Zhang 0041, Heng Li. 3060-3065 [doi]
- Preserving Privacy in Collaborative Systems with Secure Multi-Party SummationXin Chang, Wenhui Kong, Xingjun Wang. 3066-3071 [doi]
- A Relationship Extraction Framework Based on Reinforcement Learning and Machine Reading ComprehensionChen Shen, Yulin Liu, Hua Li. 3072-3077 [doi]
- An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature Information SupplementationQingyu Xu, Jiguo Yu, Anming Dong, Zihao Shang. 3078-3085 [doi]
- Are Large Language Models Table-based Fact-Checkers?Hanwen Zhang, Qingyi Si, Peng Fu 0008, Zheng Lin 0001, Weiping Wang 0005. 3086-3091 [doi]
- D-PIFO: A Dynamic Priority Scheduling Algorithm for Performance-Critical Packets Based on the Programmable Data PlaneJialu Cui, Junxing Zhang. 3092-3097 [doi]
- Towards Efficient Sparse Transformer based Medical Image RegistrationHaifeng Zhao, Quanshuang He, Deyin Liu. 3098-3103 [doi]
- Exploring Weighted Property Approaches for RDF Graph Similarity MeasureNgoc Luyen Lê, Marie-Hélène Abel, Philippe Gouspillou. 3104-3109 [doi]
- 2Mine: A Reduced Redundancy Computation Graph Pattern Matching SystemDongyang Zhang, Jianhuan Zhuo, Yile Li, Yinliang Yue, Weiping Wang. 3110-3115 [doi]
- Optimal Control Policy Based on Game Theory in Wireless Sensor NetworksWenlong Ni, Wenshuang Yan. 3116-3121 [doi]
- An Optimal Admission Control Policy for Cloud Computing Services with Tandem Queues Based on Game TheoryWenlong Ni, Zhixiang Mei. 3122-3127 [doi]
- Threshold Detection of Cloud Computing System with Impatient Users Based on Game TheoryWenlong Ni, Yufeng Zhang. 3128-3133 [doi]
- Advancing Root Cause Analysis in Cloud-native System with Knowledge Graph Path Embedding TranslationPengsheng Li, Qingfeng Du, Shengjie Zhao, Pei Fang. 3134-3139 [doi]
- IDFusion: An Infrared and Visible Image Fusion Network for Illuminating DarknessGuohua Lv, Xiyan Wang, Zhonghe Wei, Jinyong Cheng, Guangxiao Ma, Hanju Bao. 3140-3145 [doi]
- Knowledge Embedding Enabled Cyber Security Defense for Networked System: A Novel Risk Detection Method based on Knowledge GraphAngxiao Zhao, Wenying Feng 0003, Ning Hu, Dawei Zhao, Zhaoquan Gu. 3146-3151 [doi]
- Data-Focus Proxy HashingWenjin Ji, Xianling Mao, Jinyu Liu, Rongcheng Tu, Heyan Huang. 3152-3157 [doi]
- Revisiting Open DNS Resolver Vulnerabilities to Reflection-Based DDoS ThreatsKehong Liu, Qi Wang, Junnan Yin, Letian Du, Tianning Zang. 3158-3163 [doi]
- Sparse Representation GRU-AutoEncoder for Battery Fault Detection of Electric VehiclesJun Peng, Wei Yuan, Yongjie Liu, Zheng Liu, Heng Li. 3164-3169 [doi]
- Multi-Level Knowledge-Enhanced Prompting for Empathetic Dialogue GenerationZiyin Gu, Qingmeng Zhu, Hao He, ZhiPeng Yu, Tianxing Lan, Shuo Yuan. 3170-3175 [doi]
- Collaborative Training for Compensation of Inference Errors in NOR Flash Computing in memory ChipsTong Zhang, Weiping Pan, Hao Li. 3176-3181 [doi]
- Analysis of Emotional Cognitive Capacity of Artificial IntelligenceZiyin Gu, Qingmeng Zhu, Hao He, Tianxing Lan, ZhiPeng Yu. 3182-3187 [doi]
- An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing FactorsLin Li 0001, Yunqi Mai, Yu Chu, Xiaohui Tao 0001, Jianming Yong. 3188-3193 [doi]
- Sentence-level Distant Supervision Relation Extraction based on Dynamic Soft LabelsDejun Hou, Zefeng Zhang, Mankun Zhao, Wenbin Zhang 0010, Yue Zhao, Jian Yu. 3194-3199 [doi]
- XRNeRF: View-guided Neural Radiance Fields for Occlusion RemovalAoxue Li, Xinhua Zeng, Yunlong Du, Chengxin Pang. 3200-3205 [doi]
- Non-Codeing RNAs Family Prediction Based on RNA Representation and Deep LearningShoryu Teragawa, Lei Wang, Yi Liu. 3206-3211 [doi]
- Neural ODE-Guided Imputation Computing for Building IoT Time Series with High Missing GapsRuixuan Zhao, Chuyi Chen, Ruoyu Li, Shenghang Liu, Jie Liu, Hongan Wang. 3212-3217 [doi]
- Structure-Augment based Long-Tailed Knowledge Graph Completion ModelJianrong Wang, Yi Tang, Dejun Hou, Jinchi Wang, Zechen Meng, Tianyi Xu. 3218-3223 [doi]
- Explainable Cross-Domain Collaborator RecommendationZhenYu Hu, Jingya Zhou, Congcong Zhang, Yingdan Shi. 3224-3229 [doi]
- SAFE: Intelligent Online Scheduling for Collaborative DNN Inference in Vehicular NetworkRuiting Zhou, Ziyi Han, Yifan Zeng, Zhi Zhou 0006, Libing Wu, Wei Wang. 3230-3236 [doi]
- Achieving Low Queueing Latency in Time-Slotted LoRa NetworksCiyuan Chen, Junzhou Luo, Dian Shen, Zhuqing Xu, RunQun Xiong. 3237-3242 [doi]
- Intelligent Scheduling of UAVs and Sensors for Information Age Minimization at Wireless Powered Internet of ThingsJiameng Li, Xiaojie Wang 0001, Jun Wu, Zhaolong Ning. 3243-3248 [doi]
- Technology-supported social skills training systems: A systematic literature reviewDing Ding, Pascal Remeijsen, Zian Song, Mark A. Neerincx, Willem-Paul Brinkman. 3249-3256 [doi]
- An Entropy-based Field Segmentation Method for Unknown Protocols in Industrial IoTZheyi Sha, Chunfeng Liu 0001, Xiaobo Zhou 0003, Chen Chen 0006, Fengbiao Zan, Tie Qiu 0001. 3257-3262 [doi]
- Differentially Private K-Means Publishing with Distributed DimensionsBoyu Zhu, Yuan Zhang, Tingting Chen, Sheng Zhong. 3263-3268 [doi]
- Analysis and Evaluation of Manned/Unmanned Collaborative Emergency Rescue Equipment SystemJin Su, Chunming Li, Yuanqing Xia. 3275-3281 [doi]
- Enhancing Privacy Protection for Online Learning Resource Recommendation with Machine UnlearningWenqin Li, Xinrong Zheng, Ruihong Huang, Mingwei Lin, Jun Shen 0001, Jiayin Lin. 3282-3287 [doi]