Abstract is missing.
- Design of High Performance Convolutional Neural Network for Lightweight PlatformDaihui Li, Zeng Shangyou, Zhou Yue, Bing Pan, Yang Lei. 1-8 [doi]
- Research on Data Caching Method of Gradient Consistent HashXujian Li, Kai Xu. 9-15 [doi]
- RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal CasesXiaoding Guo, Hongli Zhang 0001, Lin Ye, Shang Li 0003. 16-22 [doi]
- The Improved Model for Anomaly Detection Based on Clustering and Dividing of FlowAo Liu, Bin Sun. 23-30 [doi]
- Research of Trojan Attack Effect Evaluation Based on FAHPHaocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia 0001, Rong Jiang, Yulu Qi, Weihong Han. 31-37 [doi]
- Cryptanalysis and Improvement of a Remote Anonymous Authentication Protocol for Mobile Multi-server EnvironmentsHailong Yao, Xingbing Fu, Caifen Wang, Congcong Meng, Bo Hai, Shiqiang Zhu. 38-45 [doi]
- AutoDE: Automated Vulnerability Discovery and ExploitationYuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang. 46-53 [doi]
- Attentive Context-Aware Music RecommendationYu Tao, Yuanxing Zhang, Kaigui Bian. 54-61 [doi]
- Rebalancing the Car-Sharing System: A Reinforcement Learning MethodLixingjian An, Changwei Ren, Zhaoquan Gu, Yuexuan Wang, Yunjun Gao. 62-69 [doi]
- FS-Net: Medical Image Denoising via Local Receptive Field Smoothing NetworkXiaowei Wang, Jiaxin Xiong, Rui Wang, Worku J. Sori, Jingtian Wang, Shaohui Liu, Feng Jiang 0001. 70-76 [doi]
- Multi-node Mode Decomposition Based Deep Learning Model for Road Section Traffic PredictionKhouanetheva Pholsena, Li Pan, Zhenpeng Zheng. 77-83 [doi]
- Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced EnvironmentHuijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang. 84-91 [doi]
- A Multi-objective Examples Generation Approach to Fool the Deep Neural Networks in the Black-Box ScenarioYepeng Deng, Chunkai Zhang, Xuan Wang 0002. 92-99 [doi]
- Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information SecurityYanwei Sun, Li Chen, Lihua Yin, Yunchuan Guo, Xiangjie Meng, Peng Zhang. 100-105 [doi]
- Joint Extraction of Entities and Relations Based on Multi-label ClassificationYunxuan Liu, Aiping Li, Jiuming Huang, Xinping Zheng, Hao Wang, Weihong Han, Zhichao Wang. 106-111 [doi]
- Knowledge Fusion: Introduction of Concepts and TechniquesYichen Song, Aiping Li, Yan Jia 0001, Jiuming Huang, Xiao-juan Zhao. 112-118 [doi]
- Multi-source Knowledge Fusion: A SurveyXiao-juan Zhao, Yan Jia 0001, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han. 119-127 [doi]
- Learning Non-Stationary Dynamic Bayesian Network Structure from Data StreamQing Meng, Yongheng Wang, Jingbin An, Zhongru Wang, Baoxing Zhang, Lijie Liu. 128-134 [doi]
- HDGS: A Hybrid Dialogue Generation System using Adversarial LearningHan Yu, Aiping Li, Rong Jiang, Yan Jia 0001, Xiao-juan Zhao, Weihong Han. 135-141 [doi]
- A Fast Network Embedding Approach with Preserving Hierarchical ProximitiesJie Zhang, Yan Wang, Jie Tang 0001. 142-149 [doi]
- Logic-Based Online Complex Event Rule Learning with Weight OptimizationYongheng Wang, Rong Zhu, Zengwang Wang, Xiaozan Zhang, Baoxing Zhang. 150-155 [doi]
- Text Sentiment Analysis Based on Parallel Recursive Constituency Tree-LSTMYongheng Wang, Xiaozan Zhang, Xiangge Wang, Rong Zhu, Zengwang Wang, Lijie Liu. 156-161 [doi]
- Negotiation Game Model for Big Data TransactionsJiajia Zhang, Shuqiang Yang, Weizhe Zhang, Bin Zhang, Zhenhuan Luo, Ying Zhou, Jia Xie. 162-167 [doi]
- Joint Embedding of Emoticons and Labels Based on CNN for Microblog Sentiment AnalysisYongcai Tao, Xinqian Zhang, Lei Shi, Lin Wei, Zhaoyang Hai, Junaid Abdul Wahid. 168-175 [doi]
- Influence Maximization on Large-Scale Networks with a Group-Based Method via Network EmbeddingYaoxuan Ji, Li Pan, Peng Wu. 176-182 [doi]
- An Improved Feature Fusion for Speaker RecognitionMeixiang Dai, Guojun Dai, Yifan Wu, Yixing Xia, Fangyao Shen, Hua Zhang. 183-187 [doi]
- Visualization of the Non-Dominated Solutions in Many-Objective OptimizationMing-hui Xiong, Wei Xiong, Ping Jian. 188-195 [doi]
- Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RANTianpeng Ye, Xiang Lin, Jun Wu 0001, Gaolei Li, Jianhua Li. 196-201 [doi]
- Yun: A High-Performance Container Management Service Based on OpenStackSijie Yang, Xiaofeng Wang, Lun An, Guizhu Zhang. 202-209 [doi]
- Tracing Android Kernel Codes at Early Stage without Extra Hardware ComponentsBoyu Zhang, Kai Yang, Lianfang Wang, Yu-an Tan, Sikang Hu. 210-216 [doi]
- Cross-Domain User Profile Construction by Log AnalysisYe Tao, Yanzhe Wang, Cao Shi, Xiaodong Wang, Canhui Xu 0002, Zhifang Xu. 217-221 [doi]
- The Nearest Neighbor Classifiers for Time Series with Complex Shape FeaturesQianhong Lin, Hua-Rui Wu 0001, Jidong Yuan, Jingqiu Gu. 222-227 [doi]
- Semi-Random Forest Based on Representative Patterns for Noisy and Non-Stationary Data StreamBencai Zhang, Hua-Rui Wu 0001, Yange Sun, RongHua Gao. 228-234 [doi]
- A Standardized Aerosol Repository System for Knowledge Services and CrowdsourcingXiaoyi Huang, Jun Zheng, Kejun Zhang, Dong Liu, Jie Chen, Lei Bi. 235-241 [doi]
- SMAM: Detecting Rumors from Microblogs with Stance Mining Assisting TaskZeng Lingyu, Song Chenguang, Wu Bin, Wang Bai. 242-249 [doi]
- Topic Model-Based Recommender System for Longtailed Products Against Popularity BiasChunhua Sun, Yinjie Xu. 250-256 [doi]
- An Unsupervised Approach of Truth Discovery from Multi-sourced Text DataChen Chang, Jianjun Cao, Guojun Lv, Nianfeng Weng. 257-263 [doi]
- Identifying Influential Nodes with a Community Structure MeasureLiangLiang Zhang, Xiao Sun, Peng Wang, Jinxin Hou, Guidong Sun. 264-269 [doi]
- Research on the Relationship between APP Size and Installation Time in Intelligent Mobile DevicesChan Jiang Jiang, Shaoyong Li, Guangcheng Huo, Lei Luo. 270-277 [doi]
- Attention-Based Text Recognition in ImageYiwei Zhu, Shilin Wang, Zheng Huang, Kai Chen 0006, Xiang Lin, Quanhai Zhang. 278-283 [doi]
- Chinese Text Classification Based on Neural Networks and Word2vecWeixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang. 284-291 [doi]
- Weighted-Ring Similarity Measurement for Community Detection in Social NetworkZheng Shen, Zhaoquan Gu, Yuexuan Wang, Xiaoling Zheng, Mingli Song. 292-299 [doi]
- Association Analysis of Abnormal Behavior of Electronic Invoice Based on K-Means and Skip-GramPeng Tang, Weidong Qiu, Min Yan, Zheng Huang, Shuang Chen, Huijuan Lian. 300-305 [doi]
- Research on Abnormal Behavior of Electronic Invoice Based on Artificial Neural NetworkShuang Chen, Weidong Qiu, Peng Tang, Guorui Duan, Min Yan, Zheng Huang. 306-311 [doi]
- A Spatio-Temporal Flow Model of Dockless Shared BikesJian Dong, Bin Chen 0003, Chuan Ai, Fang Zhang. 312-317 [doi]
- Sentiment Analysis of Home Appliance Comment Based on Generative Probabilistic ModelCao Shi, Ye Tao, Can Xu, Xiaodong Wang, Yanzhe Wang, Zihao Wang. 318-321 [doi]
- Competency Analysis in Human Resources Using Text Classification Based on Deep Neural NetworkGuohao Qiao, Bin Wu 0001, Bai Wang 0001, Baoli Zhang. 322-329 [doi]
- Finding Water Quality Trend Patterns Using Time Series Clustering: A Case StudyLeijun Huang, Hailin Feng, Ying Le. 330-337 [doi]
- Overview of IoT Security ArchitectureJian Zhang, Huanran Jin, Liangyi Gong, Jing Cao, Zhaojun Gu. 338-345 [doi]
- The Current Research of IoT SecurityJian Zhang, Huaijian Chen, Liangyi Gong, Jing Cao, Zhaojun Gu. 346-353 [doi]
- Conflicts Resolving for Fusion of Multi-source DataYuanqi Yang, Lize Gu, Xiaoning Zhu. 354-360 [doi]
- Adathm: Adaptive Gradient Method Based on Estimates of Third-Order MomentsHuikang Sun, Lize Gu, Bin Sun. 361-366 [doi]
- Efficient Parallel Algorithm for Mining High Utility Patterns Based on SparkJunqiang Liu, Rong Zhao, Xiangcai Yang, Yong Zhang, Xiaoning Jiang. 367-372 [doi]
- Knowledge Graph-Based Clinical Decision Support System Reasoning: A SurveyXiayu Xiang, Zhongru Wang, Yan Jia 0001, Binxing Fang. 373-380 [doi]
- KSC: A Fast and Simple Spectral Clustering AlgorithmLongcheng Zhai, Bin Wu, Qiuyue Li. 381-387 [doi]
- STNS-CSG: Syntax Tree Networks with Self-Attention for Complex SQL GenerationMiaomiao Hong, Bin Wu, Bai Wang, Pengpeng Zhou. 388-395 [doi]
- Multiscale Emulation Technology Based on the Integration of Virtualization, Physical and Simulation NetworksYang Chen, Guangjie Zhang, Dongliang Hu, Qingguang Tao. 396-402 [doi]
- Short-Term Traffic Flow Prediction using Attention-Based Long Short-Term Memory NetworkPeng Peng, Dongwei Xu, He Gao, Qi Xuan, Yi Liu, Haifeng Guo, Defeng He. 403-409 [doi]
- Hot Event Detection for Social Media Based on Keyword Semantic InformationZexuan Yu, Xu Wu, Xiaqing Xie, Jin Xu 0009. 410-415 [doi]
- A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation TaskYan Liu, Dongwen Zhang, Lei Du, Zhaoquan Gu, Jing Qiu, Qingji Tan. 416-421 [doi]
- A Weakness Relevance Evaluation Method Based on PageRankYanan Du, Yueming Lu. 422-427 [doi]
- Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior SimulationJingjing Li, Yang Liu, Hongri Liu, BaiLing Wang, Wei Wang, Lianhai Wang. 428-431 [doi]
- BICON: Connecting the Same Users of Different Social Networks using BiLSTMHao Wang, Bin Zhou 0004, Jiuming Huang, Yunxuan Liu, Xinping Zheng, Weihong Han. 432-438 [doi]
- A Topic Mining Method for Multi-source Network Public Opinion Based on Improved Hierarchical ClusteringYue Cai, Xu Wu, Xiaqing Xie, Jin Xu 0009. 439-444 [doi]
- Hybrid Text Topic Discovery Method for Multi-source InformationXinzhe Wang, Xu Wu, Xiaqing Xie, Jin Xu 0009. 445-452 [doi]
- Machine Learning Assisted Content Delivery at Edge of Mobile Social NetworksYu Tao, Kaigui Bian, Chengliang Gao, Yuanxing Zhang, Lingyang Song, Shaoling Dong. 453-458 [doi]
- Community Preserving Node Embedding Based on Seed-Expansion SamplingYilin Yang, Nianwen Ning, Yunlei Zhang, Bin Wu. 459-465 [doi]
- A Method of Conflict Detection for Security Policy Based on B+ TreeXueting Luo, Yueming Lu. 466-472 [doi]
- A Black-Box Approach to Generate Adversarial Examples Against Deep Neural Networks for High Dimensional InputChengru Song, Changqiao Xu, Shujie Yang, Zan Zhou, Changhui Gong. 473-479 [doi]
- A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor MatchJunbin Fang, Aiping Li, Qianyue Jiang, Shudong Li, Weihong Han. 480-486 [doi]
- Botnet Detection Method Based on Artificial IntelligenceZhihui Guo, Jin Peng, Jun Fu, Yexia Cheng, Cancan Chen. 487-494 [doi]
- Construction of Cyber Range Network Security Indication System Based on Deep LearningHaitian Liu, Weihong Han, Yan Jia 0001. 495-502 [doi]
- Formal Verification of 5G-EAP-TLS Authentication ProtocolJingjing Zhang, Qiang Wang, Lin Yang, Tao Feng. 503-509 [doi]
- FSM-Based Cyber Security Status Analysis MethodYulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia 0001, Aiping Li, Li Huang, Weihong Han. 510-515 [doi]
- Intrusion Detection Results Analysis Based on Variational Auto-EncoderHaocheng Xie, Aiping Li, Rong Jiang, Yan Jia 0001, Li Huang, Weihong Han. 516-521 [doi]
- Research on Evaluation Index System for Software Vulnerability Analysis MethodsJin Li, Minhuan Huang, Shuaibing Lu, Hu Li, Jinfu Chen. 522-527 [doi]
- VMRe: A Reverse Framework of Virtual Machine Protection Packed BinariesJie Lin, Chuanyi Liu, Xinyi Zhang, Rongfei Zhuang, Binxing Fang. 528-535 [doi]
- A Novel Text Classification Approach Based on Word2vec and TextRank Keyword ExtractionShouyou Song, Zhongru Wang, Shuai Xu, Shi-Ce Ni, Jia Xiao. 536-543 [doi]
- A Detection Method Based on K-Cores Algorithm for Abnormal Processes in the ServerJing Du, Fujiang Ao, Yaxin Zhao, Yinglong Liu. 544-548 [doi]
- Kernel Vulnerability Analysis: A SurveyShuaibing Lu, Zhechao Lin, Ming Zhang. 549-554 [doi]
- An Empirical Study on Expectation of Relationship Between Human and Smart Devices - With Smart Speaker as an ExampleShilong Wu, Sinan He, Yu Peng, Weiying Li, Moli Zhou, Daisong Guan. 555-560 [doi]
- Facial Movements Recognition Using Multichannel EMG SignalsLin Shao. 561-566 [doi]
- Narratology-Based Interaction Design of 3D Reconstructed Cultural RelicsXiaomei Nie, Shunru Li, Chun Yuan, Qifang Cao, Mingchun Wang, Wenlong Liu, Maomao Li. 567-574 [doi]
- Research on the Application of Chinese Traditional Patterns Innovation and Development Based on Interactive MediaJianzhi Xie, Xumeng Liu, Jing Li, Ling Zou. 575-580 [doi]
- Study on Digital Chromatography of Fahai Temple Frescoes in Ming Dynasty Based on VisualizationYali Zhang, Yingqing Xu, Shufan Li, Fangya Deng. 581-586 [doi]
- A Hybrid Packet Classification Algorithm Based on Hash Table and Geometric Space PartitionJiamin Huang, Yueming Lu, Kun Guo. 587-592 [doi]
- Efficient Randomized Hierarchy Construction for Interactive Visualization of Large Scale Point CloudsLai Kang, Jie Jiang, Yingmei Wei, Yuxiang Xie. 593-597 [doi]
- Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and PrivacyShuang Sun, Shudong Chen, Rong Du, Weiwei Li, Donglin Qi. 598-603 [doi]
- UAV-Based Motion Target Detection and Tracking Method in Dynamic ScenesGuodong Yang, Jianhai Zhang, Li Zhu, Weitao Huan, Guang Lin, Zheng Ma. 604-609 [doi]
- Accurate Object Recognition for Unmanned Aerial Vehicle Electric Power Inspection using an Improved YOLOv2 AlgorithmQiang Chen, Yunyuan Gao, Yun Peng, Jianhai Zhang, Ke Sun. 610-617 [doi]
- A Survey: Cloud Data Security Based on Blockchain TechnologyHang Xu, Jing Cao, Jian Zhang, Liangyi Gong, Zhaojun Gu. 618-624 [doi]
- Uncertain Complex Event Processing Based on Markov Logical NetworksYongheng Wang, Zengwang Wang, Lijie Liu, Xiaozan Zhang. 625-629 [doi]
- Analyzing the Cross-Sector Sharing of Government Data Based on the Niche TheoryMin Sun, Yu Zhang, Xiao Sun. 630-634 [doi]
- Improvement and Application of Apriori Algorithm Based on EqualizationLibo Xu, Lin Qiao, Feng Zhao, Bo Yang, Qiong Wang, Ping Ding, Lei Li. 635-641 [doi]
- Differentially Private Convolutional Neural Networks with Adaptive Gradient DescentXixi Huang, Jian Guan, Bin Zhang, Shuhan Qi, Xuan Wang 0002, Qing Liao 0001. 642-648 [doi]
- Meta-Path based Text Feature Enrichment Using Knowledge GraphJiayu Ding, Xiaohuan Cao, Linmei Hu, Chuan Shi. 649-655 [doi]
- Grey Island: Immersive tangible interaction through augmented realityZiyi Gong, Geping Wang, Qiong Wu. 656-661 [doi]
- Understanding Acdamic Impact Development by Predicting the G-index In Collaboration NetworksJiajie Du, Li Pan, Huijuan Li, Lihong Yao. 662-667 [doi]
- Feature selection and visualization based on interaction dominanceZilin Zeng, Xiangan Heng. 668-673 [doi]
- A Localization Approach for Non-localizable Wireless Sensor Network with Stationary PassiveXiaolei Zhou, Hao Yan, Xiaoxiong Zhang, Hui Zhang. 674-679 [doi]
- The Impact of Personality on User-Generated Content in Online Social NetworksJianshan Sun, Yajue Liu, Chunhua Sun, Chunli Liu. 680-685 [doi]
- Deep Learning Based Scene Text Reading for Cloud Audit Information ExtractionHezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang. 686-693 [doi]