Abstract is missing.
- Physical Activity Recognition using Deep Transfer Learning with Convolutional Neural NetworksBerke Ataseven, Alireza Madani, Beren Semiz, Mehmet Emre Gursoy. 1-6 [doi]
- Towards a Digital Twin Modelling NotationFlavio Corradini, Arianna Fedeli, Andrea Polini, Barbara Re 0001. 1-6 [doi]
- A Multi-domain Sentiment Classification model based on Adversarial Multi-task learning and attention mechanismsXinyu Li, Ning Jin, Ke Yan. 1-8 [doi]
- Research on fire rescue path optimization of unmanned equipment based on improved Slime mould AlgorithmHaotian Yang, Enliang Wang, Yue Cai, Zhixin Sun. 1-6 [doi]
- A Fast Distributed Accelerated Gradient Algorithm for Big Data ClassificationChangsheng Wu, Huihui Wang. 1-8 [doi]
- A cross-cultural survey to identify Seniors' preferences towards the Empathic Virtual CoachMarialucia Cuciniello, Terry Amorese, Claudia Greco, Gennaro Raimo, Gennaro Cordasco, Maria Stylianou Kornes, Anna Torp Johansen, Kristin Beck Gjellesvik, Anais Fernandez, Daria Kyslitska, Eduardo González-Fraile, Begoña Fernández-Ruanova, Jofre Tenorio-Laranga, María Inés Torres, Anna Esposito. 1-6 [doi]
- Fragmentation Phenomena of Online Community Described by the Fundamental Equation of Online User DynamicsNaoki Matsuhashi, Chisa Takano, Masaki Aida. 1-6 [doi]
- A District Energy Management Approach Based on Internet of Things and BlockchainGiuseppe Olivieri, Gaetano Volpe, Agostino Marcello Mangini, Maria Pia Fanti. 1-6 [doi]
- An improved attention mechanism based YOLOv4 structure for lung nodule detectionDanHui Wu, Tong Lu, Xia Li. 1-6 [doi]
- Mining of High-Utility Sequence Patterns in Large-Scale Uncertain DatabasesJimmy Ming-Tai Wu, Shuo Liu, Jerry Chun-Wei Lin. 1-7 [doi]
- A hybrid music recommendation method based on music genes and collaborative filteringRuowei Zhang, Shengxia Tu, Zhongzheng Sun. 1-6 [doi]
- Design-Space Exploration of Quantized Transposed Convolutional Neural Networks for FPGA-based Systems-on-ChipCristian Sestito, Stefania Perri, Robert Stewart. 1-6 [doi]
- Facilitating Safety and Security Co-design and Formal Analysis in Multi-layered System ModelingMegha Quamara, Gabriel Pedroza, Brahim Hamid. 1-8 [doi]
- An Approach to Support Digital Process TwinFlavio Corradini, Sara Pettinari, Barbara Re 0001, Lorenzo Rossi 0001, Francesco Tiezzi 0001. 1-4 [doi]
- Using a Ubiquitous Personal Online Datastore for Aggregating and Sharing IoT Data to Smart CityHong Chen. 1-4 [doi]
- Introducing k4.0s: a Model for Mixed-Criticality Container Orchestration in Industry 4.0Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte. 1-6 [doi]
- Infrared Distance Sensor-based Parking Space Reservation System for People with DisabilitiesRuichen Cong, Shun Kanega, Nozomi Fujikawa. 1-5 [doi]
- An AIoT Framework for Precision AgricultureMouad Rahmouni, Majdoulayne Hanifi, Claudio Savaglio, Giancarlo Fortino, Mounir Ghogho. 1-6 [doi]
- Binary Function Similarity Detection Based on Graph Neural Network with Self-Attention MechanismDingjie Wu, Xuanzhang He, Yao Zhang, JunJie Zhu, Xinyuan Zhang, Minchao Ye, Zhigang Gao. 1-5 [doi]
- Multi-axis Gating MLP with Bidirectional Feature Extraction for Sequence RecommendationShaowei Huang, Wu Xiangping, Wang Ke, Qingqing Gao, Xiaopeng Liu. 1-7 [doi]
- Adaptive Retinex image defogging algorithm based on the depth of field informationGao Qingqing, Wu Xiangping, Wang Ke, Shuang Wang, Shaowei Huang. 1-7 [doi]
- Analysing Finnish Cybersecurity Thesis Topics Using Taxonomic FrameworksJoonatan Ovaska, Karo Saharinen, Tuomo Sipola. 1-8 [doi]
- Improved Carnivorous Plant Algorithm based on Hybrid Strategy and its applicationYipeng Ji, Haotian Yang, Zhixin Sun. 1-6 [doi]
- A Modified Generative Adversarial Network for Reconstruction of Compressed Sesning MRIHui Zhang, Tong Lu, Tieqiang Li, Xia Li. 1-6 [doi]
- Machine Learning Methods for Microwave Imaging in Cancer DetectionSandra Costanzo, Alexandra Macarena Flores, Giovanni Buonanno. 1-5 [doi]
- Western Hockey League (WHL) Regularized Adjusted Plus-MinusBailey Janeczko, Doug Pickering, Gautam Srivastava. 1-4 [doi]
- Fault Detection and Diagnosis of HVAC System Based on Federated LearningXiansheng Wang, Ke Yan. 1-8 [doi]
- Machine Learning techniques in soft robotic suits for whole body assistanceNicola Lotti, Enrica Tricomi, Francesco Missiroli, Xiaohui Zhang, Lorenzo Masia. 1-6 [doi]
- An exploratory study of tertiary English course performance in Taiwan from the perspectives of ACE accreditation for e-learning coursesI-Chin Nonie Chiang, Tony C. T. Kuo. 1-8 [doi]
- SELECT: Secure and Lightweight Context-Aware Mechanism for Smart Vehicular NetworksTrupil Limbasiya, Arijit Karati, Debasis Das 0001. 1-8 [doi]
- Event Detection in Financial MarketsMohammad Shirdel, Michele Segata, Giuseppe Di Fatta, Antonio Liotta. 1-8 [doi]
- Edge-Cloud Collaborative Computation Offloading for Federated Learning in Smart CityKai Peng 0002, Haoqi Zhang, Bohai Zhao, Peichen Liu. 1-7 [doi]
- HEND-FL: Accurate Federated Learning Using Homomorphic Encryption and a New Distributed ProtocolDehua Zhou, Zexiao Chen, Di Wu, Yingwei Yu, Qingqing Gan, Botong Xu. 1-9 [doi]
- A blockchain based approach for Fog infrastructure management leveraging on Non-Fungible TokensAgostino Forestiero, Antonio Francesco Gentile, Davide Macrì. 1-7 [doi]
- Federated and Generative Data Sharing for Data-Driven Security: Challenges and ApproachRoberto Natella, Andrea Ceccarelli, Massimo Ficco. 1-6 [doi]
- PUNet: Convolutional Networks based on Parallel Feature FusionYang Li, Hui Lu, Qi Liu, ZhiYun Yang, Zihao Wu, Xiaodong Liu. 1-4 [doi]
- Speech-based Evaluation of Emotions-Depression CorrelationLaura Verde, Lelio Campanile, Fiammetta Marulli, Stefano Marrone 0001. 1-6 [doi]
- Occupancy Prediction in Buildings: An approach leveraging LSTM and Federated LearningIrfanullah Khan, Antonio Guerrieri, Giandomenico Spezzano, Andrea Vinci. 1-7 [doi]
- Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication StrategiesPratibha Singh, Hamman Samuel, Fehmi Jaafar, Darine Ameyed. 1-7 [doi]
- A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection SystemsMichael Zipperle, Florian Gottwalt, Yu Zhang, Omar Hussain 0002, Elizabeth Chang 0001, Tharam S. Dillon. 1-4 [doi]
- SecureAstraea: A Self-balancing Privacy-preserving Federated Learning FrameworkDehua Zhou, Yingwei Yu, Di Wu, Qingqing Gan, Zexiao Chen, Botong Xu. 1-8 [doi]
- High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch NetworkZiwen Zhang, Yang Li, Qi Liu 0001, Xiaodong Liu. 1-6 [doi]
- Emotion Recognition from Facial Expression using Explainable Deep LearningMario Cesarelli, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 1-6 [doi]
- TaskRec: Using Causal Graph to Debias in Task Recommendation SystemSifeng Wang, Anran Li, Zhaoan Dong, Shengxiang Li. 1-5 [doi]
- PSBCNN: Fine-grained image classification based on pyramid convolution networks and SimAMShengxiang Li, Sifeng Wang, Zhaoan Dong, Anran Li, Lianyong Qi, Chao Yan. 1-4 [doi]
- Local Alignment with Global Semantic Consistence Network for Image-Text MatchingPengwei Li, Shihua Wu, Zhichao Lian. 1-6 [doi]
- MTFed-NILM: Multi-Task Federated Learning for Non-Intrusive Load MonitoringXiyue Wang, Wei Li. 1-8 [doi]
- MeLSeC: A Method for Lightweight and Secure Communication in Internet of VehiclesAlessandro Brighente, Mauro Conti, Harsha Vasudev. 1-8 [doi]
- Predicting the soil organic carbon by recent machine learning algorithmsMuhammad Uzair, Stefania Tomasiello, Evelin Loit, Jerry Chun-Wei Lin. 1-7 [doi]
- Effectively and Efficiently Supporting Predictive Big Data Analytics over Open Big Data in the Transportation Sector: A Bayesian Network FrameworkAlfredo Cuzzocrea, Carson K. Leung, Mojtaba Hajian, Marshall D. Jackson. 1-8 [doi]
- SSD Failure Prediction Based on Classification Models and Data EngineeringZiyao Wang, Jie Xu. 1-8 [doi]
- OLAP over Big COVID-19 Data: A Real-Life Case StudyAlfredo Cuzzocrea, Carson K. Leung, Selim Soufargi, Carmine Gallo, Siyuan Shang, Yubo Chen 0003. 1-6 [doi]
- Contrastive Representation based Active Learning for Time SeriesLujia Pan, Marcus Kalander, Yuchao Zhang, Pinghui Wang. 1-6 [doi]
- Underwater Path Planning of UUV Based on UDWAZheng Liu, Yongxin Liu, Sihong Wu, Taile Chen. 1-4 [doi]
- SPOC Project Teaching Research based on STEAM Education Concept : - - Takes the secondary vocational school "Data Structure" course as an exampleYang Yan, Hui Wang, Guangjie Liu, Wen-Bo Huang. 1-5 [doi]
- Named Entity Recognition Method for Power Equipment Based on BERT-BiLSTM-CRFJiangyi Hu, Wenqing Yang, Huafei Yang, Shanming Wei, Zhen Sun. 1-6 [doi]
- A Solar Module Power Production Model Predictor for Automated Solar Module ManufacturingCorrado Santoro, Federico Fausto Santoro, Eleonora Arena, Andrea Canino. 1-8 [doi]
- Towards Automated Engineering for Collective Adaptive Systems: Vision and Research DirectionsRoberto Casadei, Danilo Pianini, Gianluca Aguzzi, Giorgio Audrito, Gianluca Torta, Marco Ottina, Ferruccio Damiani, Mirko Viroli. 1-6 [doi]
- Importance Node Evaluation of Temporal Networks Based on the W-SAM ModelYebin Yang, Jiulei Jiang, Peng Zou. 1-6 [doi]
- Exploiting mobility data to forecast Covid-19 spreadMaria Pia Canino, Eugenio Cesario, Andrea Vinci, Shabnam Zarin. 1-4 [doi]
- Accuracy Assessment and Improvement of FMCW Radar-based Vital Signs Monitoring under Practical ScenariosBrahim Walid, Jianhua Ma. 1-6 [doi]
- DataXc: Flexible and efficient communication in microservices-based stream analytics pipelinesGiuseppe Coviello, Kunal Rao, Ciro Giuseppe De Vita, Gennaro Mellone, Srimat Chakradhar. 1-9 [doi]
- Classification of Ceramics Based on Improved AlexNet Convolutional Neural NetworkJiapeng Li, Hua Huang, Fengtao Hu, Yangding Ou. 1-8 [doi]
- Quantum Computing Approach for Energy Optimization in a Prosumer CommunityCarlo Mastroianni, Luigi Scarcello, Jacopo Settino. 1-7 [doi]
- GCN-LSTM Combined Model for Urban Link Mean Speed Prediction in the Regional Traffic NetworkXinyu Ren, Shaoxin Yuan. 1-7 [doi]
- FBPB-SE: A Forward and Backward Private Blockchain-based Searchable Encryption with Fuzzy Multi-keywordChengjin Yang, Dongdong Xie, Linxi Cai, Pinghui Wang. 1-6 [doi]
- A Pose Detection based Continuous Authentication System Design via Gait Feature AnalysisXuan Huang, Shoji Nishimura, Bo Wu 0007. 1-5 [doi]
- Lightweight Model by Iterative Momentum Pruning Scheme for Channel ReductionOscal Tzyh-Chiang Chen, Yen-Cheng Lu, Yu-Xuan Chang. 1-4 [doi]
- S-index: Significance of Academic Authors to Individual Publication VenuesYu Zhang, Min Wang, Michael Zipperle, Alireza Abbasi, Morteza Saberi. 1-6 [doi]
- A Graph-based Approach for Adaptive Serious GamesRyan Hare, Nidhi Patel, Ying Tang, Pankti Patel. 1-6 [doi]
- A Joint Loss based Deep Learning Model for Enhanced Image InpaintingHaowen Yu, Liming Chen. 1-6 [doi]
- Aggregate Drone Monitoring of WildfiresGiorgio Audrito, Marco Ottina. 1-6 [doi]
- On Temporal Isolation Assessment in Virtualized Railway Signaling as a Service SystemsDomenico Cotroneo, Luigi De Simone, Roberto Natella. 1-5 [doi]
- A Precipitation Prediction Method Based on UNet and Attention MechanismJianhao Ma, Jiawei Sun, Qi Liu, Xiaodong Liu 0002. 1-4 [doi]
- DuRBIN: A Comprehensive Approach to Analysis and Detection of Emerging Threats due to Network IntrusionKumar Priyansh, Ritu Dimri, Fahim Islam Anik, Mst. Shapna Akter, Nazmus Sakib, Hossain Shahriar, Md. Zakirul Alam Bhuiyan. 1-8 [doi]
- Modeling Interactions among Cyber-Physical ServicesBin Chen, Huan Xu, Qiuyong Yang, Guangqian Lu, Hui Li. 1-6 [doi]
- Detection and Mitigation of Targeted Data Poisoning Attacks in Federated LearningPinar Erbil, Mehmet Emre Gursoy. 1-8 [doi]
- Towards Accurate Latency Prediction of DNN Layers Inference on Diverse Computing PlatformsGuozhi Liu, Fei Dai 0002, Bi Huang, LeCheng Li, Shuai Wang, Zhenping Qiang. 1-7 [doi]
- Emerging Simulation Frameworks for Analyzing Smart Grid Cyberattack: A Literature ReviewOscar Famous Darteh, Qi Liu 0001, Xiaodong Liu 0002, Ibrahima Bah, Francis Mawuli Nakoty, Amevi Acakpovi. 1-7 [doi]
- Discriminative Correlation Filter for Visual Tracking based on Asymmetric Relative EntropyTaiyu Yan, Yu-Feng Yu. 1-7 [doi]
- A GAN-Based Framework For High-Fidelity Face SwappingZheming Zuo, Zhichao Lian, Zhihui Wei. 1-6 [doi]
- AI-Driven Digital Process Twin via Networked Digital Process ChainZiqi Huang, Tiandong Xi, Marcel Fey, Christian Brecher. 1-6 [doi]
- Dense-FCN: A Deep Learning Approach for Weather Radar Beam Blockage CorrectionJiawei Sun, Hao Wu, Qi Liu 0001, Xiaodong Liu 0002, Jianhao Ma. 1-6 [doi]
- Financial Fraud Detection Based on Ensemble Machine LearningJinyue Wang, Chao Yang. 1-6 [doi]
- Traffic Light Detection and Recognition in Autonomous Vehicles (AVs)Edward Swarlat Dawam, X. Feng. 1-6 [doi]
- Towards a Patient-Centered Virtual Hospital Ecosystem: A Fine Grained VHealth-AC Model for Hospitals' Legacy Information SystemsSara A. Alsalamah, Shada AlSalamah, Hessah A. Alsalamah, Chang-Tien Lu. 1-8 [doi]
- Design of a Vision Blind Spot Detection System Based on Depth CameraZijun Wang, Qun Jin, Bo Wu 0007. 1-5 [doi]
- A Deep Reinforcement Learning Based Approach for Intelligent Reconfigurable Surface Elements SelectionShiming Zan, Yu Pang, Raffaele Gravina, Enling Cao, Ye Li, Weilin Zang. 1-7 [doi]
- Quantitative and Qualitative Analysis of Internet of Things (IoT) in Smart Cities and its ApplicationsSina Shaffiee Haghshenas, Giuseppe Guido, Alessandro Vitale, Saeid Jafarzadeh Ghoushchi. 1-6 [doi]
- Autonomous Vehicles in Smart Cities: a Deep Reinforcement Learning SolutionFrancesco Giannini, Giuseppe Franzè, Francesco Pupo, Giancarlo Fortino. 1-6 [doi]
- Cloud-IoT Based 'Multi-Disease Health Care System' for Multiple-Users Using Prediction Approach on Edge DevicesSumedha Arora, Brigu Garg, Abhishek Sharma. 1-6 [doi]
- A Recent Review of NILM Framework: Development and ChallengesMaheesha Dhashantha Silva, Qi Liu, Oscar Famous Darteh. 1-7 [doi]
- A Load Forecasting Approach Based on Graph Convolution Neural NetworkJixiang Gan, Li Pan, Yuanyuan Jin, Qi Liu 0001, Xiaodong Liu 0002. 1-3 [doi]
- Time series forecasting for predictive maintenance of refrigeration systemsTullio Facchinetti, Marco Arazzi, Antonino Nocera. 1-6 [doi]
- Analysis on cascading failure of directed-undirected interdependent networks with different coupling modesXiaojie Xu, Xiuwen Fu. 1-6 [doi]
- Edge Computing Solutions for Distributed Machine LearningFabrizio Marozzo, Alessio Orsino, Domenico Talia, Paolo Trunfio. 1-8 [doi]
- Towards privacy-aware software design in small and medium enterprisesLelio Campanile, Mauro Iacono, Michele Mastroianni. 1-8 [doi]
- Energy-aware Optimization of Data Centers and Cybersecurity IssuesMichele Mastroianni, Francesco Palmieri 0002. 1-7 [doi]
- A Privacy-Preserving Deep Learning Scheme for Edge-enhanced Smart HomesYueyu Dong, Fei Dai 0002, Mingming Qin. 1-6 [doi]
- Impact of Dimensionality of User Interaction Subspace on Multi-dimensional Opinion FormationNaoki Hirakura, Masaki Aida. 1-6 [doi]
- An application of conversational systems to promote healthy lifestyle habitsDavid Griol, Zoraida Callejas, Fernando Fernández-Martínez, Anna Esposito. 1-6 [doi]
- Towards an Intelligence system to support Diseases' Diagnoses and improve Health treatmentsBeniamino Di Martino, Antonio Esposito 0001, Gennaro Junior Pezzullo. 1-6 [doi]
- A Crowdsourcing Truth Inference Algorithm Based on Hypergraph Neural NetworksZhaoan Dong, Yueyang Li, Lijun Gao, Zili Zhou. 1-7 [doi]
- Research on Energy Digital Twin Quality Model Based on Data DrivenYing Shen, Kangyang Li, Zihui Xu, ZhenZhou Wang, Jianxin Ge. 1-7 [doi]
- A Framework for Fault Tolerance in RISC-VAlexander Dörflinger, Benedikt Kleinbeck, Mark Albers, Harald Michalik, Martin Moya. 1-8 [doi]
- A Semantic Segmentation Algorithm Based on Contrastive Learning Using Aligned Feature SamplesXibei Jia, Zhichao Lian. 1-6 [doi]
- Retinal Vessel Segmentation Algorithm Based on Attention MechanismWen-Bo Huang, Feng Guo, Yang Yan. 1-5 [doi]
- Infrared and visible image fusion method based on dual domain enhancement in low illumination environmentYingchun Ye, Junxuan Zhang, Zeyi Li. 1-7 [doi]
- Change Point Detection with Machine Learning for Rapid Ransomware DetectionAnthony Melaragno, William Casey. 1-9 [doi]
- Research on the method of active acoustic self guided torpedo parallel heading firing based on favorable advance angleYongxin Liu, Zheng Liu, Sihong Wu, Taile Chen. 1-4 [doi]
- A Blockchain Based Federated Ecosystem for Tracking and Validating the Authenticity of GoodsValeria Lukaj, Francesco Martella, Maria Fazio, Armando Ruggeri, Antonio Celesti, Massimo Villari. 1-7 [doi]
- A Situation-aware Wearable Computing System for Human Activity RecognitionGiulia Apicella, Giuseppe D'Aniello, Giancarlo Fortino, Matteo Gaeta, Raffaele Gravina, Luca Giuseppe Tramuto. 1-7 [doi]
- Privacy Preservation using Federated Learning and Homomorphic Encryption: A StudyAjay D. M.. 1-8 [doi]
- Wearable IMU Based Gait Quality Quantitative Evaluation MethodJiahui Tang, Yu Pang, Hao Wang, Ye Li, Fangmin Sun. 1-7 [doi]
- WT-BiLSTM Based Transfer Learning Method for Solar Irradiance PredictionHao Zhang, Ke Yan. 1-8 [doi]
- A Trusted Classification Method of Encrypted Traffic Based on Attention MechanismCheng Miao, Pan Wang, Zixuan Wang, Ze Yi Li. 1-8 [doi]
- A fast and accurate method for identifying the equipment fingerprint of distribution secondary systemQigui Yao, Xiaojian Zhang, Qi Wang. 1-6 [doi]
- OpenWolf: A Serverless Workflow Engine for Native Cloud-Edge ContinuumChristian Sicari, Lorenzo Carnevale, Antonino Galletta, Massimo Villari. 1-8 [doi]
- Deep Reinforcement Learning Based Multi-UUV Cooperative Control for Target CapturingZhong Wang, Zhiwen Wen, Qianxin Xia, Weijun Cai. 1-6 [doi]
- Fuzuli: Automatic Test Data Generation for Software Structural Testing using Grey Wolf Optimization Algorithm and Genetic AlgorithmBahman Arasteh, Mohammad Reza Sattari, Reza Shokri Kalan. 1-6 [doi]
- An XAI-based adversarial training approach for cyber-threat detectionMalik Al-Essa, Giuseppina Andresini, Annalisa Appice, Donato Malerba. 1-8 [doi]
- Seamless Sensor Data Acquisition for the Edge-to-Cloud ContinuumGabriele Penzotti, Davide Tarasconi, Stefano Caselli, Michele Amoretti. 1-8 [doi]
- Edge Computing-Enabled Multi-Sensor Data Fusion for Intelligent Surveillance in Maritime Transportation SystemsJingxiang Qu, Ryan Wen Liu, Jiangtian Nie, Xianjun Deng, Zehui Xiong, Yang Zhang 0025, Han Yu 0001, Dusit Niyato. 1-8 [doi]
- Explore the Relationships Between Students' Academic Performance, Use of Twitter, and Academic Majors using Hierarchical Linear ModelingStefanie Amiruzzaman, Md. Amiruzzaman. 1-6 [doi]
- The Role of Language in Building Automatic Models for Depression DetectionGennaro Raimo, Massimiliano Conson, Terry Amorese, Marialucia Cuciniello, Claudia Greco, Gennaro Cordasco, Zoraida Callejas Carrión, Cornelius Glackin, Anna Esposito. 1-6 [doi]
- mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research CollaborationsToyotaro Suzumura, Akiyoshi Sugiki, Hiroyuki Takizawa, Akira Imakura, Hiroshi Nakamura, Kenjiro Taura, Tomohiro Kudoh, Toshihiro Hanawa, Yuji Sekiya, Hill Hiroki Kobayashi, Yohei Kuga, Ryo Nakamura, Renhe Jiang, Junya Kawase, Masatoshi Hanai, Hiroshi Miyazaki, Tsutomu Ishizaki, Daisuké Shimotoku, Daisuke Miyamoto, Kento Aida, Atsuko Takefusa, Takashi Kurimoto, Koji Sasayama, Naoya Kitagawa, Ikki Fujiwara, Yusuke Tanimura, Takayuki Aoki, Toshio Endo, Satoshi Ohshima, Keiichiro Fukazawa, Susumu Date, Toshihiro Uchibayashi. 1-7 [doi]
- A Roberts cross operator combined with mathematical morphology algorithm for fabric defect detectionJielin Jiang, Chao Cui, Boheng Wang, Yan Cui, Li Ma. 1-8 [doi]
- CmpQTS: Comparative Visual Analysis of Quantitative Timing StrategiesMengqin He, Chaojian Zhang, Jingwei Lin, Jin Xu, Wenmin Lin, Zhigeng Pan. 1-7 [doi]
- Analyzing Jo-Ha-Kyu Mechanism in Japanese Traditional Performing Art Ningyo JoruriRan Dong, Shaowen Ni, Bo Wu, Shingo Hayano, DongSheng Cai, Soichiro Ikuno. 1-5 [doi]
- A Walk-through Type Authentication System Design via Gaze Detection and Color RecognitionBo Wu, Koshiro Tosa, Kiminori Sato. 1-5 [doi]
- i-Comments: On-screen Individualized Comments for Online Learning SupportJiaqi Wang, Jian Chen, Qun Jin. 1-5 [doi]
- A Spatio-Temporal Graph Transformer Network for Multi-Pedestrain Trajectory PredictionJingfei Zhu, Zhichao Lian, Zhukai Jiang. 1-5 [doi]
- Supervised Regression Learning for Maintenance-related DataPaola Pierleoni, Lorenzo Palma, Alberto Belli, Sara Raggiunto, Luisiana Sabbatini. 1-6 [doi]
- A Cybertwin-Driven Intelligent Offloading Method for IoV Applications Using DRL in Smart CitiesPeichen Liu, Kai Peng 0002, Bohai Zhao. 1-7 [doi]
- Enabling Faster Security Assessment of Re-hosted FirmwareGiancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni. 1-6 [doi]
- An Input Sampling Scheme to Radar Echo Extrapolation For RNN-Based ModelsYouning Wang, ZhiYun Yang, Qi Liu 0001, Xiaodong Liu 0002. 1-5 [doi]
- Quo Vadis Computer Science? The topics of the influential papers during the period 2014-2021Nicolas Tsapatsoulis, Harris Partaourides, Christos Christodoulou, Constantinos Djouvas. 1-8 [doi]
- A Team Crowdsourcing Method Combining Competition and CollaborationZhaoan Dong, Lijun Gao, Yueyang Li, Zili Zhou, Sifeng Wang, Lianyong Qi. 1-6 [doi]
- The Visualization of Ransomware InfectionChloe VonderLinden, Joseph Walton, Anthony Melaragno, William Casey. 1-7 [doi]
- The BIOCHIP project: A Deep Learning approach for multiwell segmentationMartina Savoia, Diletta Chiaro, Fabio Giampaolo, Salvatore Cuomo, Francesco Piccialli. 1-8 [doi]
- Removing Target Defense for Internet-Controlled SystemsVahid Heydari. 1-8 [doi]
- Implementation of an IoT Wearable Prototype on a Standard AI ArchitectureAndrea Basso, Daniele Bortoluzzi, Gianluca Torta. 1-5 [doi]
- MAVLink Protocol for Unmanned Aerial Vehicle: Vulnerabilities AnalysisMassimo Ficco, Raffaele Palmiero, Massimiliano Rak, Daniele Granata. 1-6 [doi]
- An IoT-based Wireless Sensor Network for Lighting Control SystemsPaola Pierleoni, Alberto Belli, Lorenzo Palma, Luisiana Sabbatini, Sara Raggiunto. 1-6 [doi]
- Design and Implementation of a Data-Auditing Mechanism for Container MigrationToshihiro Uchibayashi, Bernady O. Apduhan, Takuo Suganuma, Masahiro Hiji. 1-4 [doi]
- Multi-label Abdominal Image Segmentation with Partially Labeled Data: A Prototypical Consistent Learning PerspectiveGuoxia Xu, Hao Wang 0003, Marius Pedersen, Hu Zhu, Meng Zhao. 1-7 [doi]
- A quantitative assessment of team members physiological traits and interactions for the development of Collective Intelligence in a clinical scenarioDaniela Lo Presti, Francesca De Tommasi, Chiara Romano, Martina Pulcinelli, Mariangela Pinnelli, Carlo Massaroni, Blandina Lanni, Massimiliano Carassiti, Giancarlo Fortino, Emiliano Schena. 1-5 [doi]
- From Cloud-Edge to Edge-Edge Continuum: the Swarm-Based Edge Computing SystemsLorenzo Carnevale, Alessandro Ortis, Giancarlo Fortino, Sebastiano Battiato, Massimo Villari. 1-6 [doi]
- Agri-food supply-chain traceability: a multi-layered solutionMaria Teresa Gaudio, Sudip Chakraborty, Stefano Curcio. 1-5 [doi]
- An Improved LSTM-based Method Capturing Temporal Correlations and Using Attention Mechanism for Radar Echo ExtrapolationZhiYun Yang, Ru Ji, Qi Liu 0001, Fei Dai 0002, Yiwen Zhang, Quanwang Wu, Xiaodong Liu 0002. 1-7 [doi]
- A Novel Efficient Discriminative Projection Learning for Big DataYan Cui, Jielin Jiang, Xiaoyan Jiang, Yue Dai. 1-8 [doi]
- A BiLSTM-CRF Based Approach to Word Segmentation in ChineseYuanyuan Jin, Shiyu Tao, Qi Liu, Xiaodong Liu. 1-4 [doi]
- A Joint Knowledge Graph Reasoning MethodWenqing Yang, Xiaochao Li, Peng Wang, Jun Hou 0002, Qianmu Li, Nan Zhang. 1-6 [doi]
- Supply Chain Financial System Based on Blockchain TechnologyYuXuan Zuo, Zhenping Qiang, Fei Dai 0002, Xiaofeng Shao, Shiqi Su, Zhihong Liang. 1-6 [doi]
- Towards a verifiable and secure data sharing platform for livestock supply chainAbdul Ghafoor Abbasi, Anna Rydberg, Peter Altmann. 1-6 [doi]
- Comparing data-driven meta-heuristics for the bi-objective Component Repairing ProblemClaudia Diamantini, Alex Mircoli, Ornella Pisacane, Domenico Potena. 1-6 [doi]
- Implementation and Evaluation of Leader Election in the Population Protocol Model Using an Emulation EnvironmentKeitaro Watanabe, Hideharu Kojima, Yuichi Sudo, Naoto Yanai, Tatsuhiro Tsuchiya. 1-6 [doi]
- A Locality-Sensitive Hashing-based Automatic Group Identification Approach in Group RecommendationYuqing Wang, Yuwen Liu, Yihong Yang, Lingzhen Kong, Ying Miao. 1-6 [doi]
- Correlation Filtering Tracking Method Based on Unsupervised Domain AdaptiveZhongyang Wang, Yu-Feng Yu, Benchang Zheng, Feng Liu. 1-8 [doi]
- Adaptive Destruction Learning for Fine-grained Visual ClassificationRiheng Zhang, Min Tan 0005, Xiaoyang Mao, Zhigang Gao, Xiaoling Gu. 1-5 [doi]
- Sensor and Feature Selection for Lightweight Emotion Recognition on Resource-Constrained SmartwatchesDavide Andreoletti, Omran Ayoub, Achille Peternier, Tiziano Leidi, Silvia Giordano. 1-6 [doi]
- Pattern Matching Algorithm in Event GraphsValerio Bellandi, Paolo Ceravolo, Samira Maghool, Margherita Pindaro, Stefano Siccardi. 1-7 [doi]
- Multi-dimensional Cybersecurity Education Design: A Case StudyRuta Pirta-Dreimane, Agne Brilingaite, Evita Roponena, Karen Parish. 1-8 [doi]
- Research on Information Coordination Mechanism of Multi-participants in Community-based Elderly Care by BlockchainMo Hu, Yunchao Zhang, Ximeng Liu. 1-4 [doi]
- Speaker Recognition using Multiple X-Vector Speaker Representations with Two-Stage Clustering and Outlier Detection RefinementRoman Shrestha, Cornelius Glackin, Julie A. Wall, Nigel Cannings, Marvin Rajwadi, Satya Kada, James Laird, Thea Laird, Chris Woodruff. 1-6 [doi]
- An Emergency Rescue System Architecture Based on MetaverseYeshan Wu, Yishui Zhu, Luyang Wang, Bo Wu. 1-6 [doi]
- Raising citizens and institutions awareness of environmental problems using smart sensing technologiesAndrés Calandín Vega, José Giner Pérez de Lucia, Jose-Luis Poza-Luján, José M. Cecilia, Carlos T. Calafate, Pietro Manzoni. 1-8 [doi]
- SanitAIs: Unsupervised Data Augmentation to Sanitize Trojaned Neural NetworksKiran Karra, Chace Ashcraft, Cash Costello. 1-6 [doi]
- A Framework for Digital Crop Growing Modeling based on Agricultural Internet of ThingsLin Yang 0008, Can Deng, Zhilong Bie, Yu Chen, Xiuwen Fu, Giancarlo Fortino. 1-6 [doi]
- An Autonomous Vehicle Group Formation Method based on Risk Assessment ScoringJiujun Cheng, Mengnan Hou, MengChu Zhou, Guiyuan Yuan, Qichao Mao. 1-6 [doi]
- Analyzing Realizability of BPMN ChoreographiesMei Zhang, Hui Li, Zuyuan Huang, Yudou Huang, Fu Bao. 1-6 [doi]
- Blockchain Based Secure Communication for IoT Devices in Smart CitiesWajeeha Iqbal, Abdul Rehman Javed, Muhammad Rizwan 0005, Gautam Srivastava, Thippa Reddy Gadekallu. 1-7 [doi]
- Design and Implementation of UFRJ Nautilus' AUV Lua - A TinyML ApproachLara F. de Amorim, Vitor Pavani, Lucas B. Alexandre, Pedro H. Teixeira, Samuel Valentim, Henrique Serdeira, Victor Prado, Claudio M. de Farias, Flávia Coimbra Delicato. 1-6 [doi]
- A New Dynamically Changing Attack on Review Fraud Systems and a Dynamically Changing Ensemble DefenseYouzhi Zhang 0001, Sayak Chakrabarty, Rui Liu 0014, Andrea Pugliese 0001, V. S. Subrahmanian. 1-7 [doi]
- Cyber Resilience Modelling for the Operations of Hybrid NetworkAttiq Ur Rehman, Joarder Kamruzzuman, Iqbal Gondal, Alireza Jolfaei. 1-7 [doi]
- Preliminary design of a magnetic-locking system for specific exoskeleton-assisted holding tasksJhon Freddy Rodriguez Leon, Francesco Lago, Eduardo Castillo Castañeda, Giuseppe Carbone. 1-6 [doi]
- BLE-based Indoor Positioning Platform Utilizing Edge Tiny Machine LearningDiego Avellenada, Diego Mendez 0001, Giancarlo Fortino. 1-8 [doi]
- Development approach for value-creating service process twins based on service design methodsLukas Schweiger, Rodolfo Benedech, Jürg Meierhofer. 1-6 [doi]
- LegoNet: Memory Footprint Reduction Through Block Weight ClusteringJoseph Bingham, Noah Green, Saman A. Zonouz. 1-6 [doi]
- Prediction model of fuel consumption of heavy truck based on improved BP neural networkYi Zhou, Yishui Zhu, Luyang Wang, Yu Guo. 1-6 [doi]
- How to Support the Decision-Making Process of Community Regeneration proposed by Evolutionary Game and Reinforcement Learning? A case study in ShanghaiYoumei Zhou, Jingjing Chen, Xiyu Zhang, Xiao Liu, Hao Lei. 1-7 [doi]
- UAV-based 5G Air-to-Ground Integrated Wireless Network CoverageYu Su. 1-4 [doi]
- Robust Indoor Positioning Method using BLE and Wireless Mesh NetworkKazuaki Tanaka, Hiroyuki Maeda. 1-4 [doi]
- A Survey of Quantitative Comparative Research on Intrusion Detection Algorithms in Wireless Sensor NetworksYahong Yang, Pan Wang, Zixuan Wang, Zeyi Li. 1-6 [doi]
- Paralellism-Based Techniques for Slowing Down Soft Error PropagationZuhal Ozturk, Haluk Rahmi Topcuoglu, Mahmut Taylan Kandemir. 1-6 [doi]