Abstract is missing.
- Complementary Convolutional Restricted Boltzmann Machine and Its Applications in Image RecognitionJian Zhang. 3-17 [doi]
- Text-Independent Speaker Identification Using a Single-Scale SincNet-DCGAN ModelYanna Zhang, Guangcun Wei, Hang Min, Yunfei Xu. 18-28 [doi]
- Genome-Wide Feature Selection of Robust mRNA Biomarkers for Body Fluid IdentificationGuangyi He, Liming Xiao, Yingnan Bian, Ence Yang. 29-42 [doi]
- HOS-YOLOv5: An Improved High-Precision Remote Sensing Image Target Detection Algorithm Based on YOLOv5Hongren Wang. 43-56 [doi]
- A Multi-module 3D U-Net Learning Architecture for Brain Tumor SegmentationSaqib Ali, JianQiang Li, Yan Pei, Khalil ur Rehman. 57-69 [doi]
- A Better Linear Model Than Regression-Line for Data-Mining ApplicationsSukhamay Kundu. 70-79 [doi]
- Research on Hot Spot Mining Technology for Network Public OpinionChengxin Xie, Yuxuan Han, Yingxue Mu, Xiumei Wen. 80-90 [doi]
- Research Hotspots, Emerging Trend and Front of Fraud Detection Research: A Scientometric Analysis (1984-2021)Li Zeng, Yang Li, Zili Li 0011. 91-102 [doi]
- An Algorithm of Set-Based Differential Evolution for Discrete Optimization ProblemMichiharu Maeda, Yuta Chikuba. 105-117 [doi]
- Multi-objective Optimization Technique for RSU DeploymentZecheng Kang, Dongyang Li, Weian Guo, Zhenyao Hua, Guangcao Liu, Yanfen Mao. 118-132 [doi]
- Knowledge Learning-Based Brain Storm Optimization Algorithm for Multimodal OptimizationXueping Wang, Yue Liu, Shi Cheng. 133-143 [doi]
- Non-local Graph Aggregation for Diversified Stock RecommendationZhihan Yue, Ying Tan. 147-159 [doi]
- Novel Sentiment Analysis from Twitter for Stock Change PredictionYang Cui, Yucen Jiang, Haisong Gu. 160-172 [doi]
- A Novel Investment Strategy for Mixed Asset Allocation Based on Entropy-Based Time Series PredictionXuemei Yao, Jiahui Long, Longyun Wang, Binglin Wang, Maidi Liu, Kewei Yang 0001. 173-190 [doi]
- The Framework of Hammer Credit Rating System for Enterprises in Capital Markets of China with International StandardsGeorge Xianzhi Yuan, Hua He, Haiyang Liu, Chengxing Yan, Yunpeng Zhou, Eric Chen. 191-211 [doi]
- A Self-adaptive Two-Stage Local Expansion Algorithm for Community Detection on Complex NetworksHui Shan, Bin Li, Haipeng Yang, Lei Zhang 0060. 215-230 [doi]
- Supervised Prototypical Variational Autoencoder for Shilling Attack Detection in Recommender SystemsXinhao Wang, Huiju Zhao, Youquan Wang, Haicheng Tao, Jie Cao. 231-245 [doi]
- Knowledge Graph Based Chicken Disease Diagnosis Question Answering SystemShushu Gu, Jing Wang, Shaoqiu Zheng, Yanling Pan, Guoxin Jiang, Wenwen Dai, Ziqi Cheng, Delong Chen. 246-259 [doi]
- Therapeutic Effects of Corticosteroids for Critical and Severe COVID-19 PatientsYuHan Gao, Yaoqi Sun, Jinlan Bi, Shengying Wang, Jiyong Zhang, Mang Xiao. 260-287 [doi]
- Secure Cross-User Fuzzy Deduplication for Images in Cloud StorageXiaomei Liu, Xin Tang, Luchao Jin, Xiong Chen, Ziji Zhou, Shuai Zhang. 291-302 [doi]
- Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud StorageYuhua Wang, Xin Tang, Yiteng Zhou, Xiguang Chen, Yudan Zhu. 303-318 [doi]
- Name Disambiguation Based on Entity Relationship Graph in Big DataGengsong Li, Hongmei Li, Yu Pan, Xiang Li, Yi Liu, Qibin Zheng, Xingchun Diao. 319-329 [doi]
- Ontology-Based Metadata Model Design of Data Governance SystemHong Yan, Jing Wang, Yu Zhou. 330-342 [doi]
- Ontology-Based Combat Force Modeling and Its Intelligent Planning Using Genetic AlgorithmZhenya Li, Shaoqiu Zheng, Cunyang Song, Wei Wang, Xiaojun Yang. 343-351 [doi]
- Research on Multi-channel Retrieve Mechanism Based on HeuristicShiqi Ning, Kun Liu, Chengjun Wang, Shan Jiang, Qiang Wang. 352-366 [doi]
- PoetryBERT: Pre-training with Sememe Knowledge for Classical Chinese PoetryJiaqi Zhao, Ting Bai, Yuting Wei, Bin Wu. 369-384 [doi]
- Image Hide with Invertible Network and Swin TransformerYuhuan Feng, Yunjie Liu, Hongjuan Wang, Jin Dong, Rujia Wang, Chunpeng Tian. 385-394 [doi]
- Modeling and Analysis of Combat System Confrontation Based on Large-Scale Knowledge Graph NetworkRupeng Liang, Lizhi Ying, KeBo Deng, Huawei Zhu, Wei Ma, Shaoqiu Zheng. 395-406 [doi]
- Generating Adversarial Malware Examples for Black-Box Attacks Based on GANWeiwei Hu, Ying Tan 0002. 409-423 [doi]
- Defending Adversarial Examples by Negative Correlation EnsembleWenjian Luo, Hongwei Zhang, Linghao Kong, Zhijian Chen, Ke Tang. 424-438 [doi]
- Accurate Decision-Making Method for Air Combat Pilots Based on Data-DrivenYiming Mao, Zhijie Xia, Qingwei Li, Jiafan He, Aiguo Fei. 439-448 [doi]
- Establishment of Empirical Expression of Atmospheric Scattering Coefficient for Line-of-Sight Ultraviolet Propagation in Coastal AreaBifeng Li, Bing Xue, Jiafang Kang, Chuntao Cai, Yue Liu. 449-461 [doi]