Abstract is missing.
- Test Case Classification via Few-Shot LearningYuan Zhao, Haojie Tang, Quanjun Zhang, Sining Liu, Jin Wang, Jia Liu. 1-11 [doi]
- RGChaser: A RL-guided Fuzz and Mutation Testing Framework for Deep Learning SystemsYuteng Lu, Kaicheng Shao, Weidi Sun, Meng Sun 0002. 12-23 [doi]
- Reinforcement Learning Application Testing Method based on Multi-attribute FusionLizhi Cai, Jin Wang, Mingang Chen, Jilong Wang 0009. 24-33 [doi]
- Automated Quality Assessment for Crowdsourced Test Reports Based on Dependency ParsingHuan Zhang, Yuan Zhao, Shengcheng Yu, Zhenyu Chen 0001. 34-41 [doi]
- Interactive Patch Filtering via Test GenerationQuanjun Zhang, Xu Zhai, Shicheng Xu, Wanmin Huang, Jingui Zhang, Yaoming Fan. 42-53 [doi]
- A Quantitative Study of Impact of Incentive to Quality of Software ReviewsMingwei Tang, Zhiwei Xu, Yuhao Qin, Cui Su, Yi Zhu, Feifei Tao, Junhua Ding. 54-63 [doi]
- Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity AnalysisHaochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng. 64-72 [doi]
- Construction Method of Equipment Software Defect Knowledge BaseWeihua Zhang, Lijin Wu, Zhaowei Xu, Yang Jian. 73-80 [doi]
- Software Reliability Evaluation System of Ship Information Management SystemXueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu. 81-85 [doi]
- Modeling and Solution of Spatio-temporal Collaborative Planning in Joint Operations based on Temporal Constraint NetworkJunfeng Nie, Xingiun Chen. 82-87 [doi]
- A Novel Method to Estimate Mean Lifetime with Censoring in the Context of Reliability Improvement with Design of ExperimentsRenyan Jiang, Xiaowei Zhu, Wei Xue, Rangda Wu, Yu Cao. 86-93 [doi]
- EFSM Model Construction Method for RTL Digital CircuitXiaochen Li, Ruilian Zhao, Ying Shang. 94-105 [doi]
- Automating App Review Classification based on Extended SemanticWan Zhou, Yong Wang, Yang Qu, Li Li. 106-115 [doi]
- Formal Synthesis of Neural Craig Interpolant via Counterexample Guided Deep LearningWang Lin, Mi Ding, Kaipeng Lin, Guoquan Mei, Zuohua Ding. 116-125 [doi]
- Modulation Recognition based on Complex Binarized Neural NetworkJing-Yan Wang, Lin Qi, Yu Han. 126-132 [doi]
- Design of a Convolutional Neural Network Accelerator based on PYNQHaonan Zhang, Jinbo Wang, Lu Kong, Panpan Xue, Zhaohui Yao. 133-138 [doi]
- Employee Portrait Construction based on Deep Neural NetworksWei Zhu, Rongling Zhou. 139-142 [doi]
- Driver Violation Prediction based on Neural NetworkXingguang Zhu, Jiajun Chang, Weikang Li, Bin Yu, Liang Zhao, Xiaobing Wang. 143-152 [doi]
- A Reuse-oriented Clustering Method for Test CasesYaqing Shi, Song Huang, Jinyong Wan. 153-162 [doi]
- Testing Photometric Stereo ApplicationsLedio Jahaj, Franz Wotawa. 163-171 [doi]
- A Metamorphic Relation Identification Method based on GEPJie Hong, Jie Zhang, Qi Qiu, Angang Ma, Meng Li, ShiYu Yan, Helin Gong. 172-177 [doi]
- Metamorphic Testing of Classification Program for the COVID-19 Intelligent DiagnosisYue Ma, Ya Pan, Yong Fan. 178-183 [doi]
- Construction of Inductive Property Predicates for Mutable Data StructuresXue-Jian Li, Jun-Yi Wang. 185-191 [doi]
- Intelligent Urban Street Lighting System based on IoT Cloud PlatformYujie Wang, Zhi Deng, Kai Tao, Tao Liu, Xianglin Bao, Bin Cheng. 192-197 [doi]
- A General Dataset Generator for Industrial Internet of Things Using Multi-sensor Information FusionMian Wang, Jinlong Sun, Zhiyi Lu, Yu Wang, Yifan Zhang, Jie Zhang, Zhe Zhang, Guan Gui. 198-202 [doi]
- Blockchain-based Smart Supply Chain ManagementEmil Lobachev, Mahmoud Nabil Mahmoud, Ahmad Patooghy. 203-208 [doi]
- Energy Efficiency Optimization for Massive MIMO Enabled UAV CommunicationsXiaohan Ma, Zhenyu Na. 209-214 [doi]
- Feature Envy Detection with Deep Learning and Snapshot EnsembleMinnan Zhang, Jingdong Jia. 215-223 [doi]
- A Novel Unsupervised Malware Detection Method based on Adversarial Auto-encoder and Deep ClusteringLanping Zhang, Jie Yin, Jinhui Ning, Yu Wang 0078, Bamidele Adebisi, Jie Yang 0027. 224-229 [doi]
- Efficient Malicious Traffic Classification Methods based on Semi-supervised LearningXiaoyi Hu, Jinhui Ning, Jie Yin, Jie Yang 0027, Bamidele Adebisi, Haris Gacanin. 230-235 [doi]
- Network Intrusion Detection based on RBF Neural Networks and Fuzzy ClusterZhiyu Liu, Meishu Luo, Baoying Ma. 236-240 [doi]
- Weld Image Recognition based on Deep LearningYaling Zhao, Hongbo Du, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang. 241-248 [doi]
- Creativity Evaluation Method for Procedural Content Generated Game Items via Machine LearningZisen Zhou, Zhongxi Lu, Matthew Guzdial, Fabricio Goes. 249-253 [doi]
- An Ontology-based Knowledge Base System for Military Software TestingChiyang Gao, Wenbing Luo, Fei Xie. 254-261 [doi]
- An Approach for Automatically Generating Traces for Python ProgramsXiaoting Zhong, Nan Zhang 0001, Zhenhua Duan. 262-268 [doi]
- A Tool for Model Checking Eventual Model Checking in a Stratified WayMoe Nandi Aung, Yati Phyo, Canh Minh Do, Kazuhiro Ogata 0001. 270-279 [doi]
- Formal Modeling and Verification of Convolutional Neural Networks based on MSVLLiang Zhao, Leping Wu, Yu Gao, Xiaobing Wang, Bin Yu. 280-289 [doi]
- Improving Search-based Test Case Generation with Local Search using Adaptive Simulated Annealing and Dynamic Symbolic ExecutionDongcheng Li, W. Eric Wong, Shenglong Li, Matthew Chau. 290-301 [doi]
- Software Failure Prediction based on Thermal ImagesYiang Gong, Minyan Lu, Shiyi Kong, Liang Yan. 302-309 [doi]
- Software Defect Prediction via GCN based on Structural and Context InformationLijin Tang, Chuanqi Tao, Hongjing Guo, Jingxuan Zhang. 310-319 [doi]
- Automatic Localization of Potential Faults for Java Runtime ExceptionsHongning Miao, Shaoying Liu. 320-329 [doi]
- Automatic Bug Inference via Deep Image UnderstandingShengcheng Yu, Wanmin Huang, Jingui Zhang, Haitao Zheng. 330-334 [doi]
- Blocking Bugs Identification via Binary Relevance and Logistic Regression AnalysisZhihua Chen, Xiaolin Ju, Guilong Lu, Xiang Chen 0005. 335-345 [doi]
- Cooperative Area Coverage Path Planning for Multiple UAVs Over Large AreasFurong Zhang, Xiaopan Zhang. 346-352 [doi]
- Modeling Technology of Naval Formation Area Antiaircraft Kill Web based on Event GraphHongquan Shi, Bin He, Jia Liang, Yihua Zang. 353-359 [doi]
- Kernel Subspace Clustering based on Block Diagonal Representation and Sparse ConstraintsLili Fan, Gui-Fu Lu, Ganyi Tang, Yong Wang 0008. 360-367 [doi]
- An Improved Dijkstra-based Algorithm for Resource Constrained Shortest PathPan Liu, Yihao Li, Shili Ai, Cong Luo, Chengjian Yang. 368-373 [doi]
- Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic RelationsShiYu Yan, Xiaohua Yang, Zhongjian Lu, Meng Li, Helin Gong, Jie Liu. 374-382 [doi]
- Software Quality Evaluation Model based on Multiple Linear Regression and Fuzzy Comprehensive Evaluation MethodChiyang Gao, Wenbing Luo, Jian Wang, Yingying Zhang. 383-389 [doi]
- Security Pattern Detection Through Diagonally Distributed Matrix MatchingAleem Khalid Alvi, Mohammad Zulkernine. 390-402 [doi]
- Software Trustworthiness Evaluation Method based on Relationships Between CriteriaHongwei Tao. 403-408 [doi]
- Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future DirectionsJinglu Xu, Giovanni Russello. 409-420 [doi]
- Guan-fuzz: Argument Selection With Mean Shift Clustering for Multi-argument FuzzingHan-Lin Lu, Guan-Ming Lin, Shih-Kun Huang. 421-430 [doi]
- Quantitative Analysis of Information Leakage Hardware Trojans in IP CoresSenjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao. 431-436 [doi]
- Revisiting Hazard Analysis RequirementsLin Liu, Zheng Zeng, Yufeng Long, Hongji Yang. 437-445 [doi]
- FastTransLog: A Log-based Anomaly Detection Method based on FastformerYidan Wang, Xuge Li. 446-453 [doi]
- Self-evolving Malware Detection for Cyber Security using Network Traffic and Incremental LearningXiaohu Xu, Yifei Liang, Xixi Zhang, Yu Wang 0078, Yun Lin 0005, Bamidele Adebisi, Haris Gacanin, Guan Gui. 454-463 [doi]
- A Survey on Malware Detection based on API CallsKaixin Chang, Nailiang Zhao, Liang Kou. 464-471 [doi]
- Bearing Fault Diagnosis based on Fixed Threshold Wavelet Transform and ELMZhen Zhao, Jingchao Li, Bo Deng, YuLong Ying. 472-479 [doi]
- A Bearing Fault Diagnosis Method based on Improved LSTM-cascade CatBoostWeicong Jin, Weizhi Liu, Wenxuan Zhang, Xia Fang. 480-485 [doi]
- Time-varying Graph Model for LEO Satellite Network RoutingJiahui Tao, Zhenyu Na, Ningtao Zhang. 486-491 [doi]
- Application of Software Cost Measurement in the Construction of Ship Information Management SystemHanting Zhao, Jing Zhang, Xueqing Li, Zhen An, Lanmin Chen, Xiqiao Pang. 492-497 [doi]
- RJMM: Real-time Enhancement for Jailhouse Hypervisor on Multi-Core Platforms via Memory IsolationHubin Yang, Jiaming Zhang, Ruochen Shao, Yucong Chen, Rui Zhou 0005, Qingguo Zhou. 498-502 [doi]
- An Energy-efficient Scheduling based on Q-learning for Energy Harvesting Embedded SystemJiayuan Wei, Xingyu Miao, Kehong Xu, Rui Liu 0023, Yongqi Ge. 503-509 [doi]
- Distributed Sleep Monitoring System with Mobile TerminalSiyuan Gao, Chang Liu, Anze Cheng, Xu Jiao. 510-517 [doi]
- A Probability Parameter Estimation Tool in C++Xiaopeng Xu, Xiaochun Zhang, Hongji Yang. 518-523 [doi]
- Trustworthy Protection Technology for Industrial InternetLijin Wu, Yaming Zhang, Zehua Shen, Yang Jian, Longli Tang. 524-530 [doi]
- The Correlation between Training Set Perturbations and Robustness for CNN ModelsZili Wu, Jun Ai, Minyan Lu, Jie Wang, Liang Yan. 531-539 [doi]
- Autonomous Evaluation Method of Unmanned Equipment based on OODA-I FrameworkJunshan Xue, Yu Jiang. 540-545 [doi]
- Speech Instruction Recognition Method based on Stacking Ensemble LearningJun Zhao, Qingguo Yan, Qinwei Dong, Xianguang Zha, Jun Wu, Zejia He, Xindong Zhao, Xiaowen Zhang. 546-553 [doi]
- Prioritization Method of Test Data for Intelligent Software based on Multi-objective OptimizationChunyan Xia, Yifan Huang, Song Huang, Changyou Zheng, Yutong Wang, Yu Wang. 554-561 [doi]
- Student Expression Recognition in Smart Education Environment based on Convolutional Neural NetworkHao Yang, Cheng Peng, Ruirui Sun, Yujun Zhou, Xiaobo Cui. 562-568 [doi]
- Towards Exploring the Engineering Education Certification on Data Science and Big data Technology Specialty: A Case Study of Suzhou University in ChinaZhiwei Zhang, Haifeng Xu, Aidong Fang, Lin Cui 0002, Xiaoyin Wu, Yang Bai. 569-575 [doi]
- Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head AttentionHongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen. 576-580 [doi]
- Chinese Electronic Medical Record Named Entity Recognition based on BERT-WWM-IDCNN-CRFYingjie Cao, Azragul Yusup. 582-589 [doi]
- Dual-branch Attention Detection Network for Scene Text DetectionRonghua Jiang, Zhandong Liu, Ke Li, Lu Liang. 590-596 [doi]
- Fault Diagnosis and Location of Quadrotor UAV Actuator based on ESO-DFWeize Shang, Jia Song, Shaojie Ai, Kai Zhao. 597-604 [doi]
- Simulink Model Static Analysis Results based on Abstract InterpretationYuting Yang, Rui Wang, Youchen Wang, Xu Miao, Bing Liu, Shan Jiang. 605-614 [doi]
- Adaptive Random Testing based on the Modified Metric-memory Tree and Information EntropyJinfu Chen 0001, Haibo Chen 0005, Yiming Wu, Chengying Mao, Saihua Cai. 615-623 [doi]
- Test Case Prioritization for Deep Neural NetworksZhonghao Pan, Shan Zhou, Jianmin Wang, Jinbo Wang, Jiao Jia, Yang Feng. 624-628 [doi]
- Software Operation Simulation Method based On Complex Network GameXiaoying Huang, Rui Yin, Wu Liu, Hong Zhang. 629-635 [doi]
- A UAV Cooperative Formation Capability Evaluation MethodPengQi Wang, Yuan Shi, Lingzhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu. 636-643 [doi]
- Evaluating the Robustness of Object Detection in Autonomous Driving SystemXiang Bi, Hui Gao, He Chen, PengQi Wang, Chenghao Ma. 645-649 [doi]
- Generating Autonomous Driving Test Scenarios based on OpenSCENARIOHe Chen, Hongpinng Ren, Rui Li, Guang Yang, Shanshan Ma. 650-658 [doi]
- A Quantitative Measurement Method of Code Quality Evaluation Indicators based on Data MiningYikang Shao, Wu Liu, Jun Ai, Chunhui Yang. 659-669 [doi]
- Intelligent Mineral Identification and Classification based on Vision TransformerXiaobo Cui, Cheng Peng, Hao Yang. 670-676 [doi]
- A Dual-channel Text Classification Model based on an Interactive Attention MechanismWei Han, Cheng Peng. 677-684 [doi]
- Constrained Multilinear Multi-view Subspace Representation Learning for Clustering based on Tensor Nuclear NormRong Tang, Gui-Fu Lu. 685-691 [doi]
- Face Image Recognition Algorithm based on Singular Value DecompositionJiakang Tang, Lin Cui, Zhenggao Pan, Chengfang Tan, Shanshan Li, Weijie Wang. 693-697 [doi]
- Speech Separation based on As3-2mix Hybrid Strategy Combined Training Convolutional Time Domain Neural NetworkPengxu Wang, Haijun Zhang. 698-704 [doi]
- Local Matrix Stack Graph Convolutional Networks for ClassificationJian Kong, Xuehan Zhong, Mingli Ding. 705-709 [doi]
- Multi-Agents Interaction Approach based on Graph Network and Reinforcement LearningLian Liu, Zimeng Wang. 710-715 [doi]
- Multi-scale Graph Aggregation based Ship Target RecognitionWei Cui 0003, Ziwei Wang 0006, Huilin Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen. 716-722 [doi]
- Comparison of Image Feature Detection AlgorithmsFan Xu, Xia Liu, Yanli Cui, Mingdie Yan, Zhongyuan Lai. 723-731 [doi]
- Task Scheduling for Warship Formation Air DefenseZheng Tang, Xiaopan Zhang. 732-737 [doi]
- A High Precision Annotation Method for Vision Simulation Data of Autonomous VehicleGuang Yang, PengQi Wang, Yuan Shi, Qian Dong, Weiyu Liu. 738-745 [doi]
- Autonomous Evaluation of Unmanned Vehicles: A SurveyRui Li, Feifan Dai, Lingzhong Meng, Qian Dong. 746-753 [doi]
- A Survey of Autonomous Driving Scenarios and Scenario DatabasesHongping Ren, Hui Gao, He Chen, Guangzhen Liu. 754-762 [doi]
- Automatic Driving Scene Sampling Method Based On Key Parameter IdentificationYunxiu Chen, Qian Dong, Guangzhen Liu, Hongping Ren, Yunzhi Xue. 763-771 [doi]
- Intelligent Software Testing based on Visual FeedbackXinyue Wu, Hong Zhang, Tao Shi, Congran Zhang, Liang Yan. 772-779 [doi]
- Improved Deep Bi-directional Transformer Keyword Extraction based on Semantic Understanding of NewsRui Cheng, Haijun Zhang. 780-785 [doi]
- Chinese Psychological QA Database and its Research ProblemsYouren Chen, Yang Li, Ming Wen. 786-792 [doi]
- Space-time Constraint Resources Modeling and Safety Verification Method for Automated VehiclesYi Zhu, Xiaoying Chen, Yu Zhao. 793-802 [doi]
- Analysis and Verification of Bisimulation Relationship for Learning Time-Behavior SequenceShu Feng, Yi Zhu, Mei Song, Yuxiang Gao. 803-812 [doi]
- A Software Failure Mode Analysis Method Based on Test Knowledge GraphWansheng Yang, Chi Hu, Siyou Ma. 813-819 [doi]
- WebGIS-based Catering Industry Entrepreneurial Decision-making SystemLiang Zhou, Dongwei Yu, Hua Li. 820-826 [doi]
- Improvement of Path Planning Algorithm based on Small Step Artificial Potential Field MethodMingwei Shi, Junfeng Nie. 827-831 [doi]
- Multi-UAV Path Planning Model with Multiple Battery Recharge PointsMengjie Shan, Xiaopan Zhang. 832-837 [doi]
- The Tessi Clergy Algorithm Inspired by Potential Gaming Behavior in the Hunt for Geo-dataZiyang Weng, Shuhao Wang, Weixin Yan, Guangwei Zhang. 844-852 [doi]
- A Software Multi-fault Locating Technique based on Space ShrinkageMingxing Zhang, Shihai Wang, Weiguo Qiu. 853-858 [doi]
- Task-driven Dialogue System based on Dynamic Intention CaptureJun Wu 0006, Qingguo Yan, Qinwei Dong, Xianguang Zha, Lin Cui, Xindong Zhao, Wei Dai, Chong Luo. 859-864 [doi]
- Keyless Entry Security System based on Gait ContextGuoda Wang, Miao Zhang, Yaozong Hu, Zhaofeng Ma. 865-869 [doi]
- Nautical Chart Algorithms: A Feedback Strategy to Consider Knowledge Data Production BehaviorZiyang Weng, Shuhao Wang. 870-875 [doi]
- A Software Defect Location Method based on Static Analysis ResultsHaoxiang Shi, Wu Liu, Jingyu Liu, Jun Ai, Chunhui Yang. 876-886 [doi]
- Analysis of Regional Talent Demand based on Recruitment Website Text MiningLongmao Hu, BingWu Fang. 887-892 [doi]
- Understanding Security Issues based on App Comment AnalysisMengyao Chen, Chuanqi Tao, Hongjing Guo. 893-902 [doi]
- Campus Indoor and Outdoor Positioning System based on GPS and Wi-FiZhao Shi, Zhi Deng, Wei Zheng 0006, Ning Li. 903-908 [doi]
- Research on Key Technologies of Human Upper Limb Bone Diagnosis based on Convolutional Neural NetworkHongbo Du, Yaling Zhao, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang. 909-917 [doi]
- Adaptive Weight Structure Representation for Multi-view Subspace ClusteringShouhang Wang, Yong Wang, Wenge Le. 918-925 [doi]
- UGDA: Data Augmentation Methods for Uyghur Language Named Entity RecognitionYifei Ge, Azragul Yusup, Degang Chen, Hongliang Mao, Yingjie Cao. 926-932 [doi]
- Understanding Rembrandt: Directed Knowledge Improves Robustness and Evolution of Facial Phenotype ModelingZiyang Weng, Shuhao Wang, Weixin Yan. 933-940 [doi]
- Relation Extraction on the Wargame based on Pre-trained ModelsDongpu Sun, Su Qi. 941-944 [doi]
- Research and Analysis of Physical Health Test for Students Based on C4.5 Algorithm in Universities with Industry CharacteristicsYutao Sun, Yuan Fu, Tianyi Xu. 945-953 [doi]
- Forest Fire Spread Prediction Method based on BP Neural NetworkBinhao Li, Jingwen Zhong, Guoliang Shi, Jie Fang. 954-959 [doi]
- The Intelligent Pelagic Communication System Architecture of the Fleet based on UAV Swarm RelayYuxuan Van, Xingjun Chen, Rui Li, Yujian Jiang. 960-964 [doi]
- LSTM Network-based SNR Estimator for DS-UWB Wireless Sensor NetworkQingzhi Liu, Zhendong Yin, Mingyang Wu, Zhilu Wu, Zhijiang Xu. 965-973 [doi]
- A Privacy-preserving Approach to Distributed Set-membership Estimation over Wireless Sensor NetworksXuefeng Yang, Li Liu 0001, Yinggang Zhang, Yihao Li, Pan Liu, Shili Ai. 974-979 [doi]
- Prototypical Network for Few-Shot Signal RecognitionHanhong Wang, Lin Qi, Yu Han, Yun Lin. 980-985 [doi]
- Spectrum Completion Based on HaLRTCLu Sun, Yun Lin. 986-992 [doi]
- A Framework for Formal Transformation and Analysis of Smart Contract CodeHanjie Dong, Yaqiong He, Hongwei Tao, Qianheng Duan. 993-994 [doi]
- Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code AnalysisBojiang Liu, Lijin Wu, Xiaomei Shen, Wei He, Xinyu Han. 995-996 [doi]
- Evaluation Method of Intelligent Manufacturing Capability MaturityRuizhi Qiu, Chuan Lv, Yuxue Jin. 997-999 [doi]
- Spectrum Allocation Algorithm based on Improved Wolf Swarm AlgorithmChenggang Cao, Kuixian Li. 1000-1001 [doi]
- Cognitive Radio Spectrum Sensing TechnologyYandie Yang. 1002-1003 [doi]
- Online Learning based Self-updating Incremental Malware Detection ModelDonghui Zhao, Liang Kou, Jilin Zhang. 1004-1005 [doi]
- A High Safety Spherical Flying Robot based on Gimbal MechanismItsuki Miura, Bin Zhang 0036, Hun-ok Lim. 1006-1007 [doi]
- Development of an Octocopter Drone for Accompanying and Carrying ObjectsShunsuke Wakamatsu, Bin Zhang 0036, Hun-ok Lim. 1008-1009 [doi]
- Improved Convolutional Neural Network based Feature Extraction MethodYuanyuan Han, Jingchao Li, Jialan Shen, Bin Zhang 0036. 1010-1011 [doi]
- Software Defect Prediction based on Bayesian Optimization Random ForestYingyan Shen, Shaojie Hu, Siqi Cai, Mincheng Chen. 1012-1013 [doi]
- Unsupervised Domain Adaptation based Modulation Classification for Overlapped SignalsRui Zhang, Zhendong Yin, Zhutian Yang, Zhilu Wu, Yanlong Zhao. 1014-1015 [doi]
- Mars Exploration Aided by Intelligent Reflecting SurfaceHongjun Zhang, Zhendong Yin, Yanlong Zhao, Zhilu Wu. 1016-1017 [doi]
- An Improved Visual Recognition Model of Interference Noise ImageTse-Chuan Hsu, William Cheng-Chung Chu, Dong-Meau Chang. 1018-1022 [doi]
- An Improved Dissimilarity based Approach to Semantic Similarity CalculationHui Guan, Tianyu Ma, Guangwei Wang. 1023-1028 [doi]
- Chaos Driven Development for Software Robustness EnhancementNing Luo, Linlin Zhang. 1029-1034 [doi]
- Personalized Learning Task AssignmentWei Zhu, Rongling Zhou. 1035-1039 [doi]
- Precise Epidemic Control based on GeoHashYouwei Huang, Feng Lu, Xiaolong Sang, Bin Hu, Jiachun Tao. 1040-1048 [doi]
- A Model for Malware Detection Method based on API call Sequence ClusteringZhijie Wu, Jilin Zhang, Liang Kou. 1049-1050 [doi]
- Parasitic Covert Adversarial Attack on Deep Learning based Modulation RecognitionMingqian Liu, Hongyi Zhang. 1051-1052 [doi]
- Adversarial Attacks on Deep Neural Network based Modulation RecognitionMingqian Liu, Zhenju Zhang. 1053-1054 [doi]
- Four Rules for Converting Complex Loops to Regular ExpressionsPan Liu, Yihao Li, Shili Ai, Wenjie Zhang. 1055-1056 [doi]
- Transform Domain End-to-end Learning Communication SystemCheng Chang, Hui Zhou, Chao He, Zilong Zhao, Wulong Li. 1057-1058 [doi]
- Malware API Sequence Detection Model based on Pre-trained BERT in Professional domainRongheng Xu, Jilin Zhang, Li Zhou. 1059-1060 [doi]
- Adversarial Attacks in DNN-based Modulation Recognition: A Preliminary StudyYi Zhao, Wenjing Yuan, Yinghua Huang, Zhenyu Chen. 1061-1062 [doi]
- Machine Learning Algorithms for New Energy Vehicles: A Brief SurveyYinghua Huang, Wenjing Yuan, Yi Zhao, Huan Huang. 1063-1064 [doi]
- A LDPC Decoding Algorithm based on Convolutional Neural NetworkJiamei Gao, Bo Zhang, Bin Wang, Yang Liu. 1065-1066 [doi]
- Vehicular High-definition Maps Cache based on Dew ComputingHongxuan Li, Jiaxin Zhang, Liang Zhao. 1067-1068 [doi]
- Multi Feature Modulation Signal Recognition based on Deep LearningZhuo Zheng. 1069-1070 [doi]
- A Categorical Modelling Framework for Multi-robot Systems in ManufacturingHuihui Zhou, Wang Lin, Zuohua Ding. 1071-1072 [doi]