Abstract is missing.
- BSMRL: Bribery Selfish Mining with Reinforcement LearningZhaojie Wang, Jianan Guo, Yiting Zhang, Ming Liu, Liang Yan, Yilei Wang, Hailun Liu, Yunhe Li. 1-10 [doi]
- The Theoretical Analysis of Multi-dividing Ontology Learning by Rademacher VectorLinli Zhu, Wei Gao 0012. 11-22 [doi]
- A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart GridXiao Li, Xueqing Sun, Fengyin Li. 23-34 [doi]
- MB Based Multi-dividing Ontology Learning TrickMeihui Lan, Wei Gao 0012. 35-45 [doi]
- Application of LSTM Model Optimized Based on Adaptive Genetic Algorithm in Stock ForecastingYong He, Huan Li, Wenhong Wei. 46-58 [doi]
- A Network Based Quantitative Method for the Mining and Visualization of Music InfluenceJiachen Zheng, Xinning Chi, Siyang Weng. 59-72 [doi]
- Research on Off-Path Exploits of Network ProtocolsFalin Hou, Xiao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li. 73-80 [doi]
- Building a Covert Timing Channel over VoIP via Packet LengthZhibin Zhang, Xiaosong Zhang, Yuan Xue, Yuanzhang Li. 81-88 [doi]
- Bone Marrow Cell Segmentation Based on Improved U-NetLingmin Jin, Zhaochai Yu, Haoyi Fan, Shenghua Teng, Zuoyong Li. 89-99 [doi]
- An Improved Unsupervised White Blood Cell Classification via Contrastive LearningYuning Zhong, Maoye Huang, Haoyi Fan, Rong Hu, Zuoyong Li. 100-109 [doi]
- High-Altitude Pedestrian Detection Based on Improved YOLOv3Qing Tian, Pengfei Cao, Haoyi Fan, Rong Hu, Zuoyong Li. 110-121 [doi]
- Automatic Identification for Projector Brand and Model NumberZuoyong Li, Weice Wang, Fuquan Zhang, Haoyi Fan. 122-137 [doi]
- SC-VDM: A Lightweight Smart Contract Vulnerability Detection ModelKe Zhou, Jieren Cheng, Hui Li, Yuming Yuan, Le Liu, Xiulai Li. 138-149 [doi]
- Intrusion Detection Based on GA-XGB AlgorithmRuizhe Zhao, Yingxue Mu, Xiumei Wen. 150-157 [doi]
- A Video Axle Counting and Type Recognition Method Based on Improved YOLOv5SLiubin Li, Jiawei Wu, Haibo Luo, Rongteng Wu, Zuoyong Li. 158-168 [doi]
- An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data EnvironmentsPei Ren, Bo Liu, Fengyin Li. 169-182 [doi]
- A Novel Complex Pignistic Belief Transform for Conflict Measure in Complex Evidence TheoryYangyang Zhao, Fuyuan Xiao. 183-191 [doi]
- A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big DataYing Wang, Bo Liu, Fengyin Li. 192-204 [doi]
- Enity Relation Extraction of Industrial Robot PHM Based on BiLSTM-CRF and Multi-head SelectionSonghai Lin, Hong Xiao, Shaofeng Liu, Wenchao Jiang, Meng Xiong, Zhongtang He. 205-217 [doi]
- An Agricultural Traceability Permissioned Blockchain with Privacy-AwareXueqing Sun, Xiao Li, Fengyin Li. 218-229 [doi]
- Trust Evaluation Mechanism of Service Nodes Based on BlockchainWen Feng, Jieren Cheng, Yuming Yuan, Xinbin Xu, Yuqing Kou, Yuanshen Li, Xiulai Li. 230-239 [doi]
- Irregular Flight Timetable Recovery Under COVID-19: An Approach Based on Genetic AlgorithmTianwei Zhou, Junrui Lu, Wenwen Zhang, Pengcheng He, Ben Niu 0002. 240-249 [doi]
- A Transfer Learning Method Based on ResNet ModelLe Liu, Jieren Cheng, Luyi Xie, Jinyang Song, Ke Zhou, Jingxin Liu. 250-260 [doi]
- Performance Prediction and Fine-Grained Resource Provision of Virtual Machines via LightGBMJia Hao, Jun Wang, Zhaoxiang Ouyang. 261-272 [doi]
- A Semantic Retrieval Method Based on the Knowledge Graph of Ethnic Clothing CultureLin Cui, Shu Zhang, Jun Wang, Ken Chen. 273-286 [doi]
- Fine-Grained Semantic Segmentation of National Costume Grayscale Image Based on Human ParsingDi Wu, Jianhou Gan, Wei Zou. 287-299 [doi]
- Named Entity Recognition of Wa Cultural Information Resources Based on Attention MechanismXiangxu Deng, Shu Zhang, Jun Wang, Ken Chen. 300-311 [doi]
- Semantic Similarity Retrieval System Based on the Chinese Minority Dictionary Wa VolumeXiangdong Meng, Jun Wang, Yiping LiuFu, Zhaoxiang Ouyang. 312-326 [doi]
- Short-Term Traffic Condition Prediction Based on Multi-source Data FusionXiaoru Deng, Hui Zhou, Xiaoran Yang, Chunyang Ye. 327-335 [doi]
- Chinese Named Entity Recognition Incorporating Multi-scale FeaturesJingxin Liu, Jieren Cheng, Bo Wu, Dongwan Xia, Dengfang Feng, Xiulai Li. 336-347 [doi]
- Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English TeachingYu Yan. 348-355 [doi]
- A Data Model Construction Method Based on the Questionnaire SurveyChaosheng Tang, Heng Zhang. 356-366 [doi]
- Automatic Coloring Method for Ethnic Costume Sketch Based on Pix2Pix NetworkHuifeng Wang, Juxiang Zhou, Jianhou Gan, Wei Zou. 367-381 [doi]
- Multi-Model Fusion Based NOx Emission Prediction for Power Plant BoilersKangwei Lin, Guangsi Xiong, Wenchao Jiang, Hong Xiao, Jia Tang, Cong Zhao. 382-396 [doi]
- Multi-axis Industrial Robot Fault Diagnosis Model Based on Improved One-Dimensional Convolutional Neural NetworkZongxin Ma, Hong Xiao, Yihao Pan, Wenchao Jiang, Meng Xiong, Zhongtang He. 397-410 [doi]
- Prediction of Oil Temperature for Transformers Using Gated Recurrent UnitYuwen Liu, Yihong Yang, Yuqing Wang. 411-421 [doi]
- Towards Making More Reliable Cardiotocogram Data Prediction with Limited Expert Knowledge: Exploiting Unlabeled Data with Semi-supervised Boosting MethodJiaming Hong, Chen Qin, Yun Huang, Yin Zhou. 422-435 [doi]
- A Label Propagation Algorithm Combining Eigenvector Centrality and Label EntropyShucan Pan, Wenchao Jiang, Sui Lin, Dongjun Ning. 436-451 [doi]
- MI-HGRU: A Combine Method of Mutual Information and HGRU Neural Network for Boiler NOx Emission PredictionKangwei Lin, Hong Xiao, Wenchao Jiang, Jianren Yang, Cong Zhao, Jiarong Lu. 452-467 [doi]
- An MOEA/D-ACO Algorithm with Finite Pheromone Weights for Bi-objective TTPLei Yang, Xiaotian Jia, Rui Xu, Jiale Cao. 468-482 [doi]
- Lightweight Object Tracking Algorithm Based on Siamese Network with Efficient AttentionHanhua Yu, Qingling Liu. 483-497 [doi]