Abstract is missing.
- A Method of Surface Defect Detection of Bluetooth Headset Based on Machine VisionXin Lu, Junying Jia, Zhiwei Pei, Daolin Wang, Jialin Wang, Bo Sun. 1-6 [doi]
- Human Brain Hippocampus Segmentation Based on Improved U-net ModelChuLan Ren, Ning Wang, Yang Zhang. 7-11 [doi]
- CFP- A New Approach to Predicting Fantasy Points of NFL QuarterbacksDienul Paramarta, Juan Li. 12-19 [doi]
- Fault Diagnosis Method Based on CWGAN-GP-1DCNNHang Yin, Yacui Gao, Chuanyun Liu, Shuangyin Liu. 20-26 [doi]
- A new image encryption scheme based on 3D Sine-adjusted-Logistic map and DNA codingZhenzhou Guo, Ding Feng 0007, Changqing Gong, Han Qi, Na Lin, Xintong Li. 27-34 [doi]
- Multi-Robot Coverage Path Planning based on Deep Reinforcement LearningXiaolin Zhou, XiaoJie Liu, Xingwei Wang 0001, Shiguang Wu, Mingyang Sun. 35-42 [doi]
- Multimodal Aesthetic Analysis Assisted by Styles through a Multimodal co-Transformer ModelHaotian Miao, Yifei Zhang 0003, Daling Wang, Shi Feng. 43-50 [doi]
- A novel sentiment classification based on "word-phrase" attention mechanismGuangyao Pang, Guobei Peng, Zizhen Peng, Jie He, Yan Yang, Zhiyi Mo. 51-56 [doi]
- Energy-Efficient D2D Communications Based on Centralised Reinforcement Learning TechniquesSami Alenezi, Chunbo Luo, Geyong Min. 57-63 [doi]
- Analytical Modelling of Content Transfer in Information Centric NetworksHan Xu, Haozhe Wang, Jia Hu 0001, Geyong Min. 64-71 [doi]
- UAV-empowered Vehicular Networking Scheme for Federated Learning in Delay Tolerant EnvironmentsZhaoyang Du, Ganggui Wang, Narisu Cha, Celimuge Wu, Tsutomu Yoshinaga, Rui Yin. 72-79 [doi]
- Near-duplicate Video Retrieval Based on Deep Unsupervised Key Frame HashingWenhao Zhao, Shijiao Yang, Mengqun Jin. 80-86 [doi]
- MineDetector: JavaScript Browser-side Cryptomining Detection using Static MethodsPeiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long. 87-93 [doi]
- An Improvement for Value-Based Reinforcement Learning Method Through Increasing Discount Factor SubstitutionLinjian Hou, ZhengMing Wang, Han Long. 94-100 [doi]
- A K-nearest neighbor classifier based on homomorphic encryption schemeZhenzhou Guo, Weifeng Jin, Xintong Li, Han Qi, Changqing Gong. 101-107 [doi]
- Blockchain-based Crowdsourcing Task Management and Solution Verification MethodShasha Li, Xiaodong Bai, Songjie Wei. 108-115 [doi]
- A Large-scale Detection Algorithm and Application Based on YOLOv4Xiangbin Shi, Jinwen Peng. 116-122 [doi]
- Loop Closure Detection for Visual SLAM Systems Based on Convolutional Netural NetworkXiangbin Shi, Lin Li. 123-129 [doi]
- A Semantic-based Replacement for Event Image PrivacyZhenfei Chen, Tianqing Zhu, Bing Tian, Yu Wang, Wei Ren 0002. 130-137 [doi]
- A real-time intrusion detection system based on OC-SVM for containerized applicationsLu Zhang 0046, Reginald Cushing, Cees de Laat, Paola Grosso. 138-145 [doi]
- Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based ApproachTianyi Wang, Shengzhi Qin, Kam-Pui Chow. 146-153 [doi]
- Effect of Environmental Conditions on PRNUPucha Rohan, Priyanka Singh, Manoranjan Mohanty. 154-161 [doi]
- Extracting Discriminative Features for Cross-View Gait Recognition Based on the Attention MechanismRuicheng Sun, Shuo Han, Weihang Peng, Hanxiang Zhuang, Xin Zeng, Xingang Liu. 162-167 [doi]
- FlowGAN - Synthetic Network Flow Generation using Generative Adversarial NetworksLiam Daly Manocchio, Siamak Layeghy, Marius Portmann. 168-176 [doi]
- Exploring investment strategies for federated learning infrastructure in medical careJu Xing, Xu Zhang, Zexun Jiang, Ruilin Zhang, Cong Zha, Hao Yin. 177-184 [doi]