Abstract is missing.
- Message from Data Science and Systems 2022 Program ChairsBin Cui, Chuan Li, Anwer Al-Dulaimi. [doi]
- Message from Data Science and Systems 2022 Steering ChairsLaurence T. Yang, Jinjun Chen. [doi]
- Message from Data Science and Systems 2022 General ChairsGautam Srivastava, Guoliang Li, Jirong Wen. [doi]
- Message from SmartCity 2022 Program ChairsJaeSeung Song, Yong Zhou, Shuai Wang. [doi]
- Message from Dependability in Sensor, Cloud and Big Data System and Applications 2022 General ChairsLimin Xiao, Nobuyoshi Asai, Valtteri Niemi. [doi]
- Message from Dependability in Sensor, Cloud and Big Data System and Applications 2022 Program ChairsNasrulloh R. B. S. Loka, Xueqin Liang, Shengxin Dai. [doi]
- Message from the High Performance Computing and Communications 2022 General ChairsJack J. Dongarra, Kenli Li 0001, Hai Jin 0001. [doi]
- Message from the High Performance Computing and Communications 2022 Program ChairsYunquan Zhang, Jidong Zhai, Rajiv Ranjan. [doi]
- Message from ICESS 2022 Program ChairsHarini Ramaprasad, Zonghua Gu 0001, Wei Jiang. [doi]
- Message from SmartCity 2022 General ChairsNirwan Ansari, Liangyin Chen, Xiaokang Zhou. [doi]
- Message from High Performance Computing and Communications 2022Laurence T. Yang, Beniamino Di Martino. [doi]
- Message from ICESS 2022 General ChairsQingxu Deng, Song Han 0002, Chun Jason Xue. [doi]
- Message from DIKW 2022 Program ChairsHua Ming, Jing Yang, Yuan Gao. [doi]
- Message from DIKW 2022 Steering ChairsLaurence T. Yang, Yucong Duan. [doi]
- Efficiently Executing Sparse Matrix-Matrix Multiplication on General Purpose Digital Single ProcessorHaibo Xu, Xiaoxiong Zhu, Qinglin Wang, Jie Liu. 1-8 [doi]
- Matching Using Sufficient Dimension Reduction for Heterogeneity Causal Effect EstimationHaoran Zhao, Yinghao Zhang, Debo Cheng, Chen Li 0027, Zaiwen Feng. 9-16 [doi]
- SWin: A Set-Window Division Mechanism to Alleviate I/O Jitters of NVMe SSD DrivesYuting Liu, Liang Wang, Jinbin Zhu, Runnan Shen, Shixuan Jiang, Limin Xiao. 17-24 [doi]
- Machine Learning-enabled Performance Model for DNN Applications and AI AcceleratorRuohan Wu, Mingfan Li, Hanxi Li, Tianxiang Chen, Xinghui Tian, Xiaoxin Xu, Bin Zhou, Junshi Chen, Hong An. 25-34 [doi]
- DTSpMV: An Adaptive SpMV Framework for Graph Analysis on GPUsGuoqing Xiao 0001, Tao Zhou, Yuedan Chen, Yikun Hu, Kenli Li 0001. 35-42 [doi]
- RTA: an Efficient SIMD Architecture for Ray TracingRun Yan, Libo Huang, Hui Guo 0004, Yashuai Lü, Ling Yang, Nong Xiao, Li Shen 0007, Yongwen Wang. 43-50 [doi]
- MISA-MD: A New Design of Molecular Dynamics Software for GPU ArchitectureGenshen Chu, Tianyi Chen, Dandan Chen, He Bai, Guannan Li, Shuai Ren, Yang Li. 51-58 [doi]
- LBBGEMM: A Load-balanced Batch GEMM Framework on ARM CPU sCunyang Wei, Haipeng Jia, Yunquan Zhang, Kun Li, Luhan Wang. 59-66 [doi]
- GPU Parallelization and Optimization of a Combustion Simulation ApplicationZhixiang Liao, Yongzhou Liu, Yonggang Che. 67-73 [doi]
- Dynamic Semantic Modeling of Structural Data SourcesHailong Chu, Weiming Wu, Wolfgang Mayer, Debo Cheng, Hong-Yu Zhang, Zaiwen Feng. 74-81 [doi]
- Optimized Computation for Determinant of Multivariate Polynomial Matrices on GPGPULiangyu Chen 0001, Jianjun Wei, Zhenbing Zeng, Min Zhang. 82-91 [doi]
- PaddlePaddle: A Production-Oriented Deep Learning Platform Facilitating the Competency of EnterprisesRan Bi, Tongtong Xu, Mingxue Xu, Enhong Chen. 92-99 [doi]
- ME-BERT: Multi-exit BERT by use of AdapterPan Ma, Dasha Hu, Xuefeng Ding, Bing Guo, Yuming Jiang 0004. 100-109 [doi]
- Dual Memory Network for Medical Dialogue GenerationZongli Jiang, Jia Xu, Jinli Zhang, Fenglong Ma, JianQiang Li. 110-117 [doi]
- Contrastive Self-Supervised Learning for Predicting Disease-RNA AssociationsXiaoyu Wu, Jinli Zhang, Zongli Jiang, JianQiang Li. 118-125 [doi]
- MZ Core: An Enhanced Matrix Acceleration Engine for HPC/ AI ApplicationsYasong Cao, Mei Wen, Junzhong Shen, Sheng Liu 0001, Zhi Wang, Minjin Tang, Yahao Fang, Jianchao Yang, Renyu Yang, Yuhan Kang, Jiawei Fei. 126-134 [doi]
- Evaluating BERT on cloud-edge time series forecasting and sentiment analysis via prompt learningQizhi Li, Xianyong Li, Yujia Song, Maolin Zhang, Longqi Chen, Gang Wang, Yajun Du. 135-142 [doi]
- A practical adversarial attack on Graph Neural Networks by attacking single node structureYang Chen, Zhonglin Ye, Haixing Zhao, Lei Meng, Zhaoyang Wang, Yanlin Yang. 143-152 [doi]
- Three-Channel Graph Convolutional NetworkLei Meng, Zhonglin Ye, Haixing Zhao, Yanlin Yang, Yang Chen, Zhaoyang Wang. 153-162 [doi]
- Image Anomaly Detection With Semantic- Enhanced Augmentation and Distributional KernelMingxi Wang, Ye Zhu 0002, Gang Li, Gang Liu, Bo Yang. 163-170 [doi]
- ReSLB: Load Balanced Workflow for Distributed Deep Learning Mass Spectrometry DatabaseMocheng Li, Yang Liu, Yang Ou, Zhiguang Chen, Nong Xiao, Tao Chen 0013. 171-177 [doi]
- Efficient Electronic Transaction Query Model for Light Nodes Based On Optimized Blockchain StructureMingjie Zhao, Cheng Dai, Yuting Zhao, Bing Guo. 178-185 [doi]
- IIoT Mobile Business Data Placement Strategy Based on Bayesian Optimization AlgorithmZhijie Shen, Bowen Liu, Xiaolong Xu 0001, Lianyong Qi, Fei Dai 0002, Wanchun Dou. 186-193 [doi]
- Medical Dialogue Generation via Extracting Heterogenous InformationBocheng Zhao, Zongli Jiang, Jinli Zhang, Fenglong Ma, JianQiang Li. 194-201 [doi]
- A Loop Optimization Method for Dataflow ArchitectureZhihua Fan, Wenming Li, Tianyu Liu, Shengzhong Tang, Zhen Wang, Xuejun An, Xiaochun Ye, Dongrui Fan. 202-211 [doi]
- Design and Evaluation of a Rack-Scale Disaggregated Memory Architecture For Data CentersAmit Puri, John Jose, Tamarapalli Venkatesh. 212-217 [doi]
- A Method for Mobile-Aware Multi-Vehicular Offloading in Hybrid Cloud-Edge EnvironmentYu Wang, Feng Zeng, Yin Li, Yunni Xia, Linchengxi Zeng. 218-226 [doi]
- Hybrid Decision Based Multi-Agent Deep Reinforcement learning for Task Offloading in Collaborative Edge-Cloud ComputingJuan Chen, Zongling Wu, Lei Wu, Yunni Xia, Yang Wang, Ling Xiong, Canghong Shi. 228-235 [doi]
- Hybrid Parameter Update: Alleviating Imbalance Impacts for Distributed Deep LearningHongliang Li, Dong Xu, Zhewen Xu, Xiang Li. 236-243 [doi]
- PRKP: A Parallel Randomized Iterative Algorithm for Solving Linear SystemsJunjie Wang, Min Tian, Yinglong Wang, Guoping He, Tao Liu. 244-249 [doi]
- A Secure and Reliable Construction Scheme for Enterprise Value Chain NetworksChaoxia Qin, Bing Guo, Yuting Zhao, Yan Shen. 250-258 [doi]
- Batched LU Factorization With Fast Row Interchanges for Small Matrices on GPUsRongfeng Huang, Yonghua Zhao, Tianyu Yu, Shifang Liu, Xinyin Zhang. 259-266 [doi]
- ESBench: Understanding Deep Learning Inference Overheads for Edge ServerlessYanying Lin, Junhong Chen, Yang Wang, Kejiang Ye. 267-274 [doi]
- Fine-Grained Scheduling for Containerized HPC Workloads in Kubernetes ClustersPeini Liu, Jordi Guitart. 275-284 [doi]
- A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network EmulationHaiqiang Fei, Wei Wang, Yu Chen, Zhenquan Ding, Hongsong Zhu, Yongji Liu, Zhiyu Hao, Chengli Yu. 285-294 [doi]
- SCIF-ARF: Container Anomaly Prediction for Container Cloud PlatformsJing Li, Chang Liu, Xiaofei Wang, Chunlei Liu 0001. 295-302 [doi]
- FedTADBench: Federated Time-series Anomaly Detection BenchmarkFanxing Liu, Cheng Zeng, Le Zhang, Yingjie Zhou, Qing Mu, Yanru Zhang, Ling Zhang, Ce Zhu. 303-310 [doi]
- TBFL: A Trusted Blockchain-based Federated Learning SystemYufang Wu, Guorong Chen, Yuhao Liu, Chao Li, Mingqing Hu, Wei Wang. 311-318 [doi]
- A cache sharing mechanism based on RD MAXiao Zhang, Jinbo Yv, Yun Liu, Song Xiao, Nannan Zhao, Xiaonan Zhao. 319-326 [doi]
- FNotify: A Low-Latency and Scalable Publish/Subscribe System using RDMAYusen Xu, Sijie Shen, Mingcong Han, Rong Chen 0001. 327-336 [doi]
- Efficient. Scalable and Robust Data Shuffle Service for Distributed MapReduce Computing on CloudRong Gu, Xu Huang, Haipeng Dai, Xiaoyu Geng, Xiaofei Chen, Yihua Huang 0001, Fu Xiao 0001, Guihai Chen. 337-346 [doi]
- Delay and Loss Rate Analysis of the Log Commitment Process in RaftYuqiang Wen, K. L. Eddie Law. 347-356 [doi]
- A Robust and Accurate Multivariate Time Series Anomaly Detection in Fluctuating Cloud-Edge Computing SystemsYujia Song, Ruyue Xin, Rui Zhang, Juan Chen, Zhiming Zhao. 357-365 [doi]
- Online 8-Form Tai Chi Chuan Training and Evaluation System Based on Pose EstimationChunchen Wei, Jingxin Wen, Ran Bi, Huabin Yang, Yanqing Tao, Yuhang Fan, Yulong He, Didi Cheng, Yanru Zhang. 366-371 [doi]
- Weak Network Oriented Mobile Distributed Storage: A Hybrid Fault-Tolerance Scheme Based on Potential ReplicasXinlei Wei, Yujuan Tan, Duo Liu, Daitao Wu, Yu Wu, Xianzhang Chen, Jian Li. 372-379 [doi]
- GSpTC: High-Performance Sparse Tensor Contraction on CPU-GPU Heterogeneous SystemsGuoqing Xiao 0001, Chuanghui Yin, Yuedan Chen, Mingxing Duan, Kenli Li 0001. 380-387 [doi]
- Interactive and Reliable Graph Processing via the Edge-Cloud Collaboration FrameworkJun Zhou, Masaaki Kondo. 388-395 [doi]
- Dual chain authentication and key agreement protocol based on blockchain Technology in Edge ComputingWei Jian, Jianbo Xu, Wei Liang 0005, Kuan-Ching Li. 396-401 [doi]
- Aprus: An Airborne Altitude-Adaptive Purpose-Related UAV System for Object DetectionWeiqiang Wang, Haiyang Chen, Xingzhou Zhang, Wei Zhou, Weisong Shi. 402-411 [doi]
- 2F: Research on Robustness of Deep Learning Models Using Approximate Activation FunctionYuqi Bian, Jing Wang, Weigong Zhang, Lan Gao. 412-419 [doi]
- Distance-aware Multi-Agent Reinforcement Learning for Task Offloading in MEC NetworkLili Jiang, Lifeng Sun, Wenwu Zhu 0001. 420-427 [doi]
- Multi-Scenario Bimetric-balanced IoT Resource Allocation: An Evolutionary ApproachJiashu Wu, Hao Dai, Yang Wang 0006, Zhiying Tu. 428-437 [doi]
- In-Band Management Framework and Performance Evaluation for Interconnect Network in the TianHe Exascale Prototype SystemJijun Cao, Mingche Lai, Lu Liu, Jiaqing Xu, Xiaoyue Hu. 438-445 [doi]
- GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive MultimediaWei Yang, Yubing Li, Ping Jiang, Zhou Zhou, Qingyun Liu. 446-455 [doi]
- Heterogeneous Propagation Graph Representation Learning for Fake News DetectionZhi Zeng, Xiang Li, Ying Sha. 456-463 [doi]
- Fairness-Aware Algorithms for Seed Allocation in Social AdvertisingPengzi Wang, Yiming Zhu, Kai Han 0003, Zhizhuo Yin, Qing Xiu, Pan Hui. 464-473 [doi]
- MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors DecisionBingxu Wang, Yangyang Guan, Gaopeng Gou, Peipei Fu, Zhen Li 0011, Qingya Yang, Chang Liu 0049. 474-481 [doi]
- Spreading Factor Allocation and Rate Adaption for Minimizing Age of Information in LoRaWANZhuoyao Wang, Xiaokang Xu, Jin Zhao. 482-489 [doi]
- DeepPath: Multi-path Traffic Scheduling Algorithm for 5G High Dynamic NetworkLong Zhang, Bo He 0003, Jingyu Wang 0001, Qi Qi 0001, Haifeng Sun 0001, Cong Liu, Jianxin Liao. 490-498 [doi]
- SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction InformationZeyi Deng, Wei Yang, Minchao Xu, Meijie Du, Yuzhen Li, Zhou Zhou, Qingyun Liu. 499-507 [doi]
- Nuwa-RL: A Reinforcement Learning based Receiver-side Congestion Control Algorithm to Meet Applications Demands over Dynamic Wireless NetworksGuanghui Gong, Xianliang Jiang, Guang Jin, Yi Xie, Haiming Chen. 508-515 [doi]
- A Lightweight Authentication Protocol for NFC-enabled Drug Anti-Counterfeiting SystemXiangwei Meng, Wei Liang 0005, Zisang Xu, Kuan-Ching Li. 516-522 [doi]
- Compressed Sensing by Using Measurement Completion for Robust Image CodingBo Zhang 0030, Di Xiao 0001, Sen Bai, Min Li 0021. 523-529 [doi]
- Coding-Aware Routing for Maximum Throughput and Coding Opportunities by Deep Reinforcement Learning in FANETXiulin Qiu, Bo Song, Yaqi Ke, Lei Xu 0015, Yuwang Yang. 530-537 [doi]
- Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path SelectionGuoqiang Zhang, Jiahao Cao, Mingwei Xu, Qi Li 0002. 538-545 [doi]
- ONLAD-IDS: ONLAD-Based Intrusion Detection System Using SmartNICMan Wu, Hiroki Matsutani, Masaaki Kondo. 546-553 [doi]
- A Shapley-based Lightweight Global Explainer for Network Intrusion Detection SystemHangsheng Zhang, Yu Chen, Weiyu Liu, Shangyuan Zhuang, Jiyan Sun, YinLong Liu, Liru Geng. 554-561 [doi]
- Ordinal Data Stream Collection with Condensed Local Differential PrivacyYuanyuan He, Fayao Wang, Xianjun Deng, Jianbing Ni, Jun Feng, Shenghao Liu. 562-569 [doi]
- Lightweight Many-to-Many Anonymous Authenticated Key Agreement Scheme for Intelligent Vehicular Ad-hoc NetworksWen-Chen Wang, Xiao Jun Zhang, Hao Wang, Li-Ming Mu, Hao-Yu Tang. 570-577 [doi]
- An Efficient and Privacy-concerned Multi-user Access Mechanism for EMRsYihan Li, Shengke Zeng, Yawen Feng, Zhiliang Zhao. 578-585 [doi]
- CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource CompetitionYanfei Hu, Shuangshuang Liang, Min Li, Tao Xue, Boyang Zhang, Yu Wen. 586-594 [doi]
- STEAM: SVDD-based Anomaly Detection on Attributed Networks via Multi-AutoencodersJunjie Zhang, Xinye Wang, Zhenyang Yu, Menglin Huang, Lei Duan, Jie Zuo. 595-602 [doi]
- Forward and Backward Private Searchable Symmetric Encryption with Efficient UpdatesZhiming Yin, Xiong Li 0002, Kim-Kwang Raymond Choo, Yuzhen Liu, Wei Liang 0005. 603-610 [doi]
- Manipulated Client Initial Attack and Defense of QUICBo Cui, Zixuan Li, Fei Yu. 611-618 [doi]
- Dynamic Behavior Pattern: Mining the Fraudsters in Telecom NetworkDengshi Li, Lu Zeng, Ruimin Hu, Zijun Huang, Xiaocong Liang, Yilong Zang. 619-626 [doi]
- Hybrid Service Function Chains Dynamic Deployment in Multi-Domain Edge Cloud NetworksShiyan Zhang, Beijia Wang, Qingxiao Huang, Yinhai Wu, Ruohan Xu, Kun Wang, Xinyu Zhang. 627-634 [doi]
- A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network TrafficWenhao Li, Xiao-Yu Zhang, Huaifeng Bao, Qiang Wang, Haichao Shi, Zhaoxuan Li. 635-644 [doi]
- BYEE: Batch Fully Private Scheme for Coded Distributed Matrix MultiplicationGuojing Li, Jin Wang 0009, Xiaotian Zou, Lingzhi Li 0001, Fei Gu 0001. 645-652 [doi]
- Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic AlgorithmShaohua Wang, Yong Fang, Yijia Xu, Yaxian Wang. 653-662 [doi]
- QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor NetworkMingjie Nie, Futai Zou, Yi Qin, Tianming Zheng, Yue Wu 0010. 663-671 [doi]
- A Data-free Black-box Attack for Generating Transferable Adversarial ExamplesChenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang, Han Zhang, Xuhong Zhang. 672-678 [doi]
- An Illicit Bitcoin Address Analysis Scheme Based on Subgraph EvolutionQingqing Yang, Yuexin Xiang, Wenmao Liu, Wei Ren 0002. 679-686 [doi]
- AIC-Bench: Workload Selection Methodology for Benchmarking AI ChipsZhenyu Quan, Xiaoming Chen, Yinhe Han. 687-694 [doi]
- Age of Aggregated Information- Minimizing Scheduling in Wireless Relay NetworkJieqiong Kang, Long Qu. 695-702 [doi]
- An Approach of Bayesian Network Learning Based on Optimizing Fringe SearchXiaolei Yu, Kuan Xie, Junli Deng, Jianxiao Liu. 703-710 [doi]
- Time-frequency Analysis and Convolutional Neural Network based Radio Frequency Fingerprinting IdentificationSonglin Chen, Weifeng Xia, Hao Wu. 711-716 [doi]
- Multi-View Attention Networks with Contrastive Predictive Coding for Sequential RecommendationHongjun An, Jinghua Zhu, Heran Xi, Shiyang Zhou. 717-724 [doi]
- Feature Quantization Convolutional Neural Networks for CSI Feedback in Massive MIMO SystemsHaohui Jia, Na Chen 0004, Hui Gao, Minoru Okada. 725-732 [doi]
- Learning Local Representation by Gradient-Isolated Memorizing of Spiking Neural NetworkMan Wu, Zheng Chen, Yunpeng Yao. 733-740 [doi]
- A Clustering Resampling Stacked Ensemble Method for Imbalance Classification ProblemJian Li, Jinlian Du, Xiao Zhang. 741-748 [doi]
- Automatic Individual Tooth Segmentation in Cone-Beam Computed Tomography Based on Multi-Task CNN and Watershed TransformLipeng Xie, Baoxiang Liu, Yangjie Cao, Cong Yang. 749-754 [doi]
- A Fine-grained Multi-label Privacy Detection Model for Unstructured Data Based on BERT Pre-trainingYuchuan Hu, Bin Guo, Cheng Dai, Qin Zheng, Fangpeng Weng, Zhongwei Li. 755-760 [doi]
- Novel-domain Object Segmentation via Reliability-aware Teacher EnsembleJing Miao, Wei Luo 0001, Nayyar Abbas Zaidi, JinLong Wang. 761-768 [doi]
- LogTrans: Providing Efficient Local-Global Fusion with Transformer and CNN Parallel Network for Biomedical Image SegmentationXingqing Nie, Xiaogen Zhou, Zhiqiang Li, Luoyan Wang, Xingtao Lin, Tong Tong 0001. 769-776 [doi]
- Self-Paced Pseudo Label Refinement for Multi-view Subspace ClusteringXin Song, Zhikui Chen, Jing Gao 0007, Jianning Zhang, Peng Li 0027. 777-784 [doi]
- Key Factor Selection Transformer for Multivariate Time Series ForecastingJun Hu, Zehao Liu. 785-792 [doi]
- LightSCA: Lightweight Side-Channel Attack via Discrete Cosine Transform and Residual NetworksNengfu Cai, Du Wang, Md. Zakirul Alam Bhuiyan, Lihua Han, Gang Li. 793-800 [doi]
- MateGraph: Toward Mobile Malware Detection Through Traffic Behavior GraphRuihai Ge, Yongzheng Zhang 0002, Chengxiang Si, Guoqiao Zhou, Wenchang Zhou. 801-809 [doi]
- TB-Transformer: Integrating Mouse Trace with Object Bounding-box for Image CaptionNan Lin, Shuo Guo, Lipeng Xie. 810-814 [doi]
- FaGAN: Frequency-aware Generative Adversarial Network for Infrared and Visible Image FusionYi Li, Hui Li, Xiaoyu Lei, Yang Li, Jiabao Wang, Zhuang Miao. 815-822 [doi]
- Optimal strategy selection for attack graph games using deep reinforcement learningYuantian Zhang, Feng Liu, Huashan Chen. 823-830 [doi]
- Exploring the Feasibility of Transformer Based Models on Question RelatednessHonglin Shu, Pei Gao, Ziwei Yang 0002, Chen Li 0027, Man Wu. 831-838 [doi]
- An Efficient Transformer Encoder-Based Classification of Malware Using API CallsChen Li 0027, Zheng Chen, Junjun Zheng. 839-846 [doi]
- Fine-grained Spatiotemporal Features-Based for Anomaly Detection in Microservice SystemsXikang Yang, Juan Wang, Biyu Zhou, Wang Wang, Wantao Liu, Yangchen Dong. 847-856 [doi]
- AreaHash: A Balanced and fully scalable consistency hashing algorithmYan Zeng, Jinbo Zhang, Meiting Xue, Jian Wan 0001, Jilin Zhang, Li Zhou. 857-862 [doi]
- A Validation Approach for the Lipschitz Constant for Neural NetworksZhiwei Zuo, Qianqian Cai, Jungang Ji, Zhongan Tang. 863-869 [doi]
- Design and Implementation of Compensated Gram-Schmidt AlgorithmJiexi Jin, Hehu Xie, Peibing Du, Zhe Quan, Hao Jiang 0001. 870-875 [doi]
- ConeSSD: A Novel Policy to Optimize the Performance of HDFS Heterogeneous StorageXiao Zhang, Liang Wang, Zhijie Huang, Huiru Xie, Yuchen Zhang, Michael Ngulube. 876-881 [doi]
- Accelerating small matrix multiplications by adaptive batching strategy on GPUYaqing Zhang, Yaobin Wang, Zhangbin Mo, Yong Zhou, Tao Sun, Guang Xu, Chaojun Xing, Liang Yang. 882-887 [doi]
- All-to-All Routing Algorithm for Galaxyfly NetworksQinying Lin, Hongbin Zhuang, Xiao-yan Li, Lichao Su. 888-893 [doi]
- High-Performance Matrix Multiplication on the New Generation Shenwei ProcessorLe Xu, Hong An, Junshi Chen, Pengfei Zhang. 894-903 [doi]
- Voxelization of Moving Geometries on GPURishabh Shukla, Nipun Arora, Dip Sankar Banerjee. 904-913 [doi]
- EgpuIP: An Embedded GPU Accelerated Library for Image ProcessingLuhan Wang, Haipeng Jia, Yunquan Zhang, Kun Li, Cunyang Wei. 914-921 [doi]
- ASMAMC: A Specific Microprocessor Architecture for Monte Carlo MethodJianmin Zhang, Ziming Chen, Li Zhang. 922-927 [doi]
- DCD: A New Framework for Distillation Learning With Dynamic CurriculumJiachen Li, Yuchao Zhang, Yiping Li, Xiangyang Gong, Wendong Wang. 928-935 [doi]
- A Secure and Trusted Data Sharing Scheme Based on Blockchain for Government DataQin Zheng, Bin Guo, Yuchuan Hu, Zhongwei Li. 936-942 [doi]
- Quantifying Throughput of Basic Blocks on ARM Microarchitectures by Static Code Analyzers: A Case Study on Kunpeng 920Qingcai Jiang, Shaojie Tan, Zhenwei Cao, Xiaoyu Hao, Junshi Chen, Hong An. 943-950 [doi]
- Burger-tree: A Three-Layer Cache-Conscious Tree Index for Persistent MemoryPenghao Fan, Peiquan Jin, Yongping Luo, Xiaoliang Wang. 951-956 [doi]
- Localization of mobile nodes in graphs using the True-range multilateration with node sorting (TriSort) approach in an indoor environmentMichal Gorawski, Konrad Polys. 957-964 [doi]
- Temporal Staggering of Applications Based on Job Classification and I/O Burst PredictionWenxiang Yang, Cheng Chen, Jie Yu. 965-970 [doi]
- Research on Elastic Extension of Multi Type Resources for OpenMP ProgramJunfeng Zhao, Xuesong Gao, Yuancong Li. 971-978 [doi]
- Energy Efficient Dynamic Load Balancing using Self-Organized Criticality in Grid ComputingVivek Kumar, Chinmaya Kumar Swain, Aryabartta Sahu. 979-986 [doi]
- Mining Alarm Association Rules in Optical Transmission Networks Using a Statistical ApproachMiao Deng, Peng Li, Yu Liu, Rongjing Zhu, Yujie Zhang. 987-992 [doi]
- Performance Optimization and Analysis of the Unstructured Discontinuous Galerkin Solver on Multi-Core and Many-Core ArchitecturesZhe Dai, Liang Deng, Yueqing Wang, Fang Wang, Ming Li, Jian Zhang. 993-999 [doi]
- BTDFS: B+ Tree-Based Distributed File Storing Mechanism for Improving Small File StorageJingyu Zhang, Jiachen Tian, Lailong Luo. 1000-1005 [doi]
- EDCNet: A Lightweight Object Detection Method Based on Encoding Feature Sharing for Drug Driving DetectionJunfei Wei, Yuan Li, Bo Zhang. 1006-1013 [doi]
- CORF: Bridging the Gap of Complex Operator Fusion for Faster DNN InferenceJianan Wang, Yang Shi, Zhaoyun Chen, Mei Wen. 1014-1021 [doi]
- Optimizing Fast Trigonometric Functions on Modern CPUsJie Shen, Biao Long, Chun Huang. 1022-1029 [doi]
- Time Series Data Association Mining With High-Frequency Data InterferenceRongjing Zhu, Peng Li, Yu Liu, Miao Deng. 1030-1035 [doi]
- Deep Spatio-Temporal Residual Shrinkage Networks for Traffic PredictionKe Sun, Qianqian Ren, Hu Jin, Xingfeng Lv. 1036-1041 [doi]
- Robust and Lossless Fingerprinting of Deep Neural Networks via Pooled Membership InferenceHanzhou Wu. 1042-1049 [doi]
- Semi-supervised Graph Convolutional Neural Network Based Classification for Auto Parts Inventory ManagementFangpeng Weng, Bing Guo, Xinhua Suo, Xin Wu, Yuchuan Hu, Qin Zheng. 1050-1054 [doi]
- Rapid Defect Detection in Cigarette Capsules Based on 1D Residual Network with Multi-Feature FusionXudong Yang, Hao Dong, Mingna Wu, Dong Feng, Shu Wang, Long Zhang. 1055-1062 [doi]
- Using BERT and Word Definitions for Implicit Sentiment AnalysisXianyong Li, Qizhi Li. 1063-1068 [doi]
- PC-BNA: Parallel Convolution Binary Neural Network AcceleratorHaihui Liu, Yuang Zhang, Xiangwei Zheng, Mengxin Yu, Baoxu An, XiaoJie Liu. 1069-1074 [doi]
- Castingformer: A deep neural network for precipitation nowcastingGe Yang, Lijia Lin, Dian Huang. 1075-1080 [doi]
- A High-performance SpMV Accelerator on HBM-equipped FPGAsTao Li, Li Shen 0007, Shangshang Yao. 1081-1087 [doi]
- Adaptive Model Selection for Video Super ResolutionChenge Jia, Jie Ren 0007, Ling Gao, Zhiqiang Li, Jie Zheng 0005, Zheng Wang 0001. 1088-1094 [doi]
- Topology-Aware Node Allocation on Supercomputers with Hierarchical NetworkWenxiang Yang, Cheng Chen, Jie Yu 0006. 1095-1100 [doi]
- A Multi-Layer PBFT Consensus Algorithm with Inter-group SupervisionYuting Zhao, Bing Guo, Chaoxia Qin, Mingjie Zhao. 1101-1108 [doi]
- Automated Inconsistency Analysis of Real-Time Requirements: A Domain Expert Friendly ApproachShaobin Liu, Xiaohong Chen, Zhi Jin, Min Zhang. 1109-1114 [doi]
- Parallel-Friendly and Work-Efficient Single Source Shortest Path Algorithm on Single-Node SystemJie Zhang, Yuan Zhang, Yiming Sun, Huawei Cao, Xuejun An, Xiaochun Ye. 1115-1122 [doi]
- Towards Optimized Streaming Tensor Completion on multiple GPUsJiwei Hao, Hailong Yang, Qingxiao Sun, Huaitao Zhang, Zhongzhi Luan, Depei Qian. 1123-1128 [doi]
- Joint Optimization of Service Placing and Task Scheduling Based on Full Cooperation of Edge NodesJinfeng Dou, Xuejia Meng, Nuanyu Cao, Fangzheng Yuan, Tao Yang, Xiaoxiao Sun, Xuanning Wei. 1129-1134 [doi]
- G-Update: A Group-based Update Scheme for Heterogenous Erasure-coded Storage SystemsXuyu Zhao, Bing Zhu 0003, Zhiwei Zeng, Weiping Wang 0003, Kenneth W. Shum. 1135-1140 [doi]
- Efficient Erasure-Coded Data Update and Recovery Based on Machine Learning and I/O MitigationXiaosong Su, Bing Wei, Yalan Wu, Jigang Wu. 1141-1146 [doi]
- Energy-Efficient Thermal-Aware Data Placement Strategy for Storage ClustersJie Li, Yuhui Deng, Zhifeng Fan, Zijie Zhong. 1147-1152 [doi]
- TianheQueries: Ultra-Fast and Scalable Graph Queries on Tianhe SupercomputerXinbiao Gan, Guang Wu, Cong Liu, Jiaqi Si, Xuguang Chen, Bo Yang 0023, Tiejun Li. 1153-1158 [doi]
- VM Performance Optimization Virtual Machine Migration Method Based on Ant Colony Optimization in CloudHui Zhao 0003, Shangshu Li, Jing Wang 0028, Jianhua Li. 1159-1164 [doi]
- Predicting Cloud Performance Using Real-time VM-level MetricsJihua Tian, Abdessalam Elhabbash, Yehia Elkhatib. 1165-1172 [doi]
- A Deep Reinforcement Learning based VM Scheduling Strategy Decreasing Data Center Communication costsZhijiao Xiao, Xiao Liu, Zhong Ming 0001. 1173-1179 [doi]
- Joint Latency and Energy Optimization of Online Task Offloading Algorithms for Vehicular Edge ComputingPingping Dong, Cheng Nie, Yajing Li, Yuning Zuo, Xiaojuan Lu, Lianming Zhang. 1180-1187 [doi]
- A Privacy-Enhanced Federated Learning Scheme with Identity ProtectionXueqin Zhao, Lingling Wang, Lin Wang, Zhongkai Lu. 1188-1195 [doi]
- Optimized Client-side Detection of Model Poisoning Attacks in Federated learningGuoxi Zhang, Jiangang Shu, Xiaohua Jia. 1196-1201 [doi]
- An Optimized Transaction Processing Scheme for Highly Contented E-commerce Workloads Optimized Scheme for Contended WorkloadsChunxi Zhang, Shuyan Zhang, Ting Chen, Rong Zhang 0002, Kai Liu. 1202-1207 [doi]
- FedACL: Federated Multi-Distillation with Auxiliary Classification Layers in IoTZhipeng Gao, Futeng Feng, Zijia Mo, Zijian Xiong, Yang Yang 0006. 1208-1215 [doi]
- Privacy-Preserving Multi-party Neural Network Learning Over Incomplete DataFengxiao Liu, Gang Shen, Mingwu Zhang. 1216-1221 [doi]
- FedCo: Self-Supervised Learning in Federated Learning with Momentum ContrastShuai Wei, Guitao Cao, Cheng Dai, Shengxin Dai, Bing Guo. 1222-1227 [doi]
- Fabric Image Layering Based on Parallel K-meansLei Wang, Wei Zhao, Tong Sang, Zeng Zeng, Yangfan Li. 1228-1233 [doi]
- The Influence-Maximizing Node Selection Algorithm Based on Local Isolated Centrality in Large-scale networks Implemented by Distributed Graph ComputingPiaoyang Chen, Rong Lei, Mingsen Deng. 1234-1240 [doi]
- HCER: A High Cost-Effectiveness Multi-Bit Fault-Tolerant NoC RouterWencai Gao, Xiaowen Chen, Chen Li, Jianzhuang Lu, Hanyan Liu. 1241-1248 [doi]
- Delaying Large Write Requests to Trade off I/O Performance and Long-tail Latency in SSDsGuodong Peng, Jun Li 0062, Mingwang Zhao, Minjun Li, Zhibing Sha, Min Huang, Zhigang Cai. 1249-1254 [doi]
- WRLqueue: A Lock-Free Queue For Embedded Real-Time SystemQidi Yang, Lei Tang, Yanrong Guo, Nailiang Kuang, Sheng Zhong, Hangzai Luo. 1255-1260 [doi]
- Holistic Scheduling Algorithm for Tasks and Messages of Automotive Embedded SystemHongxing Xing, Yehua Wei, Can Cheng, Lianming Zhang. 1261-1268 [doi]
- An Energy-Efficient Task Scheduling Method for CPU-GPU Heterogeneous CloudHui Zhao 0003, Jianhua Li, Guobin Zhang, Shangshu Li, Jing Wang 0028. 1269-1274 [doi]
- A Precision Mechanism for Simulations of Real- Time Multicore Energy-Aware SchedulingJiangyue Zhan, Bing Guo. 1275-1282 [doi]
- 3DS: An Efficient DPDK-based Data Distribution Service for Distributed Real-time ApplicationsTianyu Xu, Xianzhang Chen, Changze Wu, Jiapin Wang, Rongwei Zheng, Duo Liu, Yujuan Tan, Ao Ren, Jian Li. 1283-1290 [doi]
- RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of ThingsJiaze Shang, Tianbo Lu, Yingjie Cai, Shuang Luo, Zhaoxin Jin. 1291-1298 [doi]
- Aware: Adaptive Distributed Training with Computation, Communication and Position Awareness for Deep Learning ModelYan Zeng, Guangzheng Yi, Yuyu Yin, Jiyang Wu, Meiting Xue, Jilin Zhang, Jian Wan, Yunquan Zhang. 1299-1306 [doi]
- Unsupervised Anomaly Detection Based on CNN-VAE with Spectral Residual for KPIsGongliang Li, Zepeng Wen, Xin Xie. 1307-1313 [doi]
- A dynamic computational memory address architecture for systolic array CNN acceleratorsMin Tang, Sheng Liu. 1314-1319 [doi]
- Optimizing GNN on ARM Multi-Core ProcessorsChaorun Liu, Huayou Su, Yong Dou, Kangkang Chen, Yanjie Sun. 1320-1327 [doi]
- Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data CentersHongwei Liu, Haojun Xia, Bibo Tu. 1328-1335 [doi]
- An Unsupervised Convolutional Adversarial Anomaly Detection Model for IoT Data InfrastructurePeian Wen, Zhenyu Yang, Lei Wu, Sibo Qi, Juan Chen. 1336-1341 [doi]
- A Layer-Based Sparsification Method For Distributed DNN TrainingYanqing Hu, Qing Ye, Zhongyu Zhang, Jiancheng Lv 0001. 1342-1349 [doi]
- An Efficient Parallel CNN Inference Framework for Multi-zone ProcessorJie Chen, Zhong Liu. 1350-1357 [doi]
- Intelligent System for Distributed Deep Learning Training Traffic OptimizationWeipeng Lu, Shuang Wu, Junhui Ou, Bing Niu, Jin He, Kevin Song, Xinwei Zheng. 1358-1365 [doi]
- HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT DevicesZhenyu Wang, Ding Deng, Yang Guo 0003, Shaoqing Li. 1366-1373 [doi]
- Interference elimination in IRS-enabled indoor mmw-D2D communicationBingjie Han, Xin Chen 0018, Libo Jiao, Dongchao Guo. 1374-1381 [doi]
- AoI Aware VNF Scheduling with Parallel Transmission for Delay-Sensitive ApplicationsLingjie Yu, Long Qu. 1382-1387 [doi]
- NBMon: NB-IoT-based UAV Network Routing Monitoring SystemJi'ao Tang, Xiaojun Zhu, Chao Dong, Lei Zhang. 1388-1393 [doi]
- TCRing: A Novel Single-Channel Deadlock-Free Concentrated on-Chip NetworkZhenjiang Guo, Huandong Wang, Longbing Zhang, Junhua Xiao. 1394-1399 [doi]
- Optimal Trajectory Planning and Task Assignment for UAV-assisted Fog ComputingShuaijun Liu, Jiaying Yin, Zishu Zeng, Jingjin Wu. 1400-1407 [doi]
- Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage ResilienceAcheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri. 1408-1415 [doi]
- CC-Guard: An IPv6 Covert Channel Detection Method Based on Field MatchingJichang Wang, Liancheng Zhang, Zehua Li, Yi Guo, Lanxin Cheng, Wenwen Du. 1416-1421 [doi]
- METC-MVAE: Mobile Encrypted Traffic Classification With Masked Variational AutoencodersWei Cai, Zhen Li 0011, Peipei Fu, Chengshang Hou, Gang Xiong 0001, Gaopeng Gou. 1422-1429 [doi]
- A Mobility Adaptive Service Placement Scheme in Satellite Edge Computing NetworkPeng Deng, Xiangyang Gong, Xirong Que. 1430-1435 [doi]
- Multi-Modal Feature Collaborative Fusion for Court Verdicts RecommendationXu Yuan, Yungang Wang, Shan Jin, Ying Yang, Zhikui Chen. 1436-1441 [doi]
- FACA: An effective method for detecting the survivability of large-scale IPv6 addressesYi Guo, Mengfan Liu, Liancheng Zhang, Lanxin Cheng, Wenwen Du, Quan Zhang. 1442-1448 [doi]
- Cascading failure analysis of uniform double-layer hyper-networks based on the Couple Map Lattice modelShujie Gao, Xiujuan Ma, Fuxiang Ma, Bin Zhou. 1449-1456 [doi]
- Graph clustering under weight-differential privacyLang Chen, Kai Han, Qing Xiu, Dazheng Gao. 1457-1464 [doi]
- Firewall Management: Rapid Anomaly DetectionClaas Lorenz, Bettina Schnor. 1465-1472 [doi]
- Secure SVM Services with Multiple Service Providers and Subscribers in the CloudRuiheng Lu, Xiaofen Wang, Mengyu Ge, Jiasheng Li, Haomiao Yang. 1473-1479 [doi]
- A Predictive Model of COVID-19 mRNA Vaccine Reactivity based on Dual Attention for Federated Learning ScenariosMengyu Ge, Haomiao Yang, Xian Ming, Kunlan Xiang. 1480-1486 [doi]
- A One-Class Anomaly Detection Method for Drives based on Adversarial Auto-EncoderYufei Wang, Xiaoshe Dong, Longxiang Wang, Weiduo Chen, Bowen Li. 1487-1494 [doi]
- Detecting Phishing Scams on Ethereum Using Graph Convolutional Networks with Conditional Random FieldWenhan Hou, Bo Cui, Ru Li. 1495-1500 [doi]
- PME: Processing-in-memory Masking and Encoding for Secure NVMZhiwen Xie, Yinhe Han, Xiaoming Chen. 1501-1508 [doi]
- Towards a Privacy Preserving Data Flow Control via Packet Header MarkingSomnath Mazumdar, Thomas Dreibholz. 1509-1516 [doi]
- A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous CredentialsLinsheng Yu, Mingxing He, Ling Xiong, Qian Luo, Xianhua Niu. 1517-1524 [doi]
- Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in CloudShuai Cheng, Shengke Zeng, Yawen Feng, Jixiang Xiao, Haoyu Zheng. 1525-1530 [doi]
- A Detecting Method Against Cross-Container Spectre AttacksXinfeng He, Yuanpu Li. 1531-1538 [doi]
- Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing and Compressed SensingDi Xiao 0001, Pengcen Jiang, Min Li 0021. 1539-1546 [doi]
- DcDID: Highly privacy-secure decentralized identity system based on dynamic committeeXiaohua Wu, Xueqi Feng, Fengheng Wu, Jing Wang. 1547-1553 [doi]
- THperf: Enabling Accurate Network Latency Measurement for Tianhe-2 SystemYunyang Xu, Ke Wu, Dezun Dong, Cunlu Li, Liquan Xiao. 1554-1561 [doi]
- Balancing Revenue and Cache Partition Fairness for CDN ProvidersXiaodong Dong, Binlei Cai. 1562-1569 [doi]
- Entity Alignment Based on Latent Structural Information Mining Graph Convolutional NetworksJayi Du, Yulu Liu, Wei Ai, Hongen Shao, Tao Meng. 1570-1576 [doi]
- Subspace Clustering based on Latent Low Rank Representation with Weighted Nuclear Norm MinimizationCuiying Huang, Zhi Wang, Wu Chen. 1577-1585 [doi]
- Efficient PCA-based image compression via secure outsourcing edge cloudYuling Luo, ShiQi Zhang, Shunsheng Zhang, Junxiu Liu, Ce Liang, Su Yang. 1586-1592 [doi]
- Stable Causal Feature Selection based on Direct Causal Effect EstimationXiaojing Du, Qingfeng Chen, Debo Cheng, Qian Huang, Junyue Cao, Zhenyun Deng, Shichao Zhang. 1593-1600 [doi]
- FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural NetworksGe Han, Zheng Li, Peng Tang, Chengyu Hu, Shanqing Guo. 1601-1608 [doi]
- Image Enhancement Algorithm based on Local Contrast for Convolutional Neural Network-Based Infrared Target Recognition: *Note: Subtitles are not captured in Xplore and should not be usedBingkun Nian, Liyuan Ma, Yan Zhang, Yi Zhang, Huajun Shi. 1609-1617 [doi]
- BERT-Based Chinese NER with Lexicon and Position Enhanced Information AdapterZhongwei Li, Bing Guo, Yuchuan Hu, Qin Zheng, Xinhua Suo. 1618-1624 [doi]
- A Disease Progression Prediction Model Based on EHR dataFangcao Zhao, Xiaomei Yu, Jinsong Zhang, Xue Li, Rui Li. 1625-1632 [doi]
- BBR-FIT: An Intelligent BBR based on the Reinforcement Learning to Boost the Network Efficiency over Time-Varying NetworksYi Xie, Xianliang Jiang, Guang Jin, Haiming Chen. 1633-1640 [doi]
- Cooperative Computation Offloading and Resource Management for Vehicle Platoon: A Deep Reinforcement Learning ApproachLingyun Lu, Xiang Li, Jingxin Sun, Zhihe Yang. 1641-1648 [doi]
- VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery AlgorithmQing Qian, Shuyun Zhou, Meixin Song, Yunhe Cui, Huan Wang 0010. 1649-1654 [doi]
- BPCN: A simple and efficient model for visual question answeringFeng Yan, Wushour Silamu, Yanbing Li, Yachang Chai. 1655-1660 [doi]
- BS2Vec: A Spatial Representation Learning Model for Large Scale Base StationsLi Li, Junjun Si, Jin Yang, Shuaifu Dai, Jianyu Zhang, Bo Tu. 1661-1667 [doi]
- Construct A Unique Agent Network For Cooperative Multi -agent Reinforcement LearningLong Liang, Haolin Wu, Hui Li. 1668-1674 [doi]
- Generating Natural Language Adversarial Examples Based on the Approximating Top-K Combination Token SubstitutionPanfeng Qiu, Xi Wu 0005, Yongxin Zhao. 1675-1681 [doi]
- A Block Gray Adversarial Attack Method for Image Classification Neural NetworkCailong Li, Chunlong Fan, Jici Zhang, Chenyang Li, Yiping Teng. 1682-1689 [doi]
- Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile HealthAcheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri. 1690-1696 [doi]
- RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network EnvironmentsMinchao Xu, Meijie Du, Zhao Li, Zeyi Deng, Wei Yang, Qingyun Liu. 1697-1704 [doi]
- A Few-Shot Image Classification Method Based on Information Entropy for First-Order Gradient Meta-LearningChengzhi Xie, Fengjing An, Mingsen Deng. 1705-1712 [doi]
- An Effective Approach for Multi-label Classification with Missing LabelsXin Zhang, Rabab Abdelfattah, Yuqi Song, Xiaofeng Wang. 1713-1720 [doi]
- Deep Residual Neural Networks with Attention Mechanism for Spatial Image SteganalysisYue Shu, Renchao Qin, Yaying He, Ya Li, Ruilin Jiang, Zhiyuan Wu. 1721-1727 [doi]
- A reinforcement learning framework based on regret minimization for approximating best response in fictitious self-playYanran Xu, Kangxin He, Shu Hu, Hui Li. 1728-1735 [doi]
- Supervised Contrastive Meta-learning for Few-Shot ClassificationChuanyao Zhang, Jianzong Wang, Zhangcheng Huang, Lingwei Kong, Xiaoyang Qu, Ning Cheng, Jing Xiao 0006. 1736-1742 [doi]
- Efficiently Conditional Community Search in Dynamic GraphsChuanyu Zong, Dong Ma, Tao Qiu, Jiajia Li, Yunzhe An, Xiufeng Xia. 1743-1750 [doi]
- Influence Maximization With Graph Neural Network in Multi-Feature Social NetworkYuhao Wang, Peng Li, Weiyi Huang. 1751-1756 [doi]
- HybridRTS: A Hybrid Congestion Control Framework with Rule and Reinforcement Learning for Low-Latency WebRTC Live Video StreamingKaizhe Zhang, Zhiwen Wang, Hansen Ma, Haipeng Du, Weizhan Zhang. 1757-1764 [doi]
- Cosine Similarity-based Mixup Data Preprocessing under Point Augmentation for Point Cloud ClassificationGuangping Li, Yicheng Huang, Dingkai Liang, PingAn Hu. 1765-1769 [doi]
- SG-Net: A Super-resolution Guided Network for Improving Thyroid Nodule SegmentationXingtao Lin, Xiaogen Zhou, Tong Tong 0001, Xingqing Nie, Zhiqiang Li. 1770-1775 [doi]
- Aspect-Level Sentiment Analysis Based on Graph Attention Fusion NetworksWenting Yu, Xiaoye Wang, Peng Yang, Yingyuan Xiao, Jinsong Wang. 1776-1781 [doi]
- Staggered Repetition Frequency Pulse Solution and Evaluation for Ultra-Wideband Range Ambiguity in Long-Distance MultipathLicheng Zhang, Ziyan Yang, Xiaozhang Zhu, Zhiqin Zhao. 1782-1788 [doi]
- An Adaptive RPC Mechanism for Performance and Node Fault Tolerance Optimization in HDFSJingyu Zhang, Zhengwen Shu, Lailong Luo. 1789-1794 [doi]
- Depth Monocular Estimation with Attention-based Encoder-Decoder Network from Single ImageXin Zhang, Rabab Abdelfattah, Yuqi Song, Samuel A. Dauchert, Xiaofeng Wang. 1795-1800 [doi]
- Ellipsoid Pricing Based Budget-Constraint Incentives for Noisy CrowdsensingJiajun Sun. 1801-1808 [doi]
- Capacity Bounds and Achievable rates of Visible Light Communications for Future Smart CityXin Hu, Xiong Deng, Wenxiang Fan, Ziqiang Gao, Yixian Dong, Yanbing Yang. 1809-1813 [doi]
- Transfer Route Recommendation for Metro Systems Based on Multi-source Data FusionTailan Yuan, Wen Xiong, Lijun Yun. 1814-1821 [doi]
- Binary Gaussian Mask Weighted Joint Dynamic and Static Guided Discriminative Correlation Filter for Visual TrackingZhiwen Xiao, Xiaodan Hu, Hu Zhu. 1822-1828 [doi]
- JADD-GAN: A Joint Attention Generative Adversarial Data Fusion Network for Object Detection and TrackingGuoxia Xu, Hao Wang 0003, Meng Zhao, Hu Zhu. 1829-1836 [doi]
- Cost-effective Elderly Fall Detection with Symmetry Transformer NetworksBing Li 0002, Wei Cui 0002, Yanru Chen, Joey Tianyi Zhou, Zhenghua Chen, Yuli Li, Min Wu 0008. 1837-1845 [doi]
- Efficient Checkpoint under Unstable Power Supplies on NVM based DevicesJialin Liu, Edwin H.-M. Sha, Qingfeng Zhuge, Rui Xu, Yuhong Song. 1846-1853 [doi]
- Multi-source privacy protection EEG emotion recognition based on self-supervised learning: Anonymous submissionYingdong Wang, Qingfeng Wu. 1854-1862 [doi]
- Optimization of Public Bus Scheduling using Real-Time Online InformationTeng Hei Ho, Ke Wang, Man Xu, Chan-Tong Lam, Benjamin K. Ng. 1863-1868 [doi]
- Study on temperature and humidity coupling control of plant factory based on ANFISJiayao Liu, Xiaokun Gu, Yong Liu, Wenwen Hu, Shipu Xu, Yunsheng Wang. 1869-1874 [doi]
- An Empirical Evaluation of Deep Neural Networks in Federated LearningXiaotong Wu, Zilong Xue, Lingling Shen. 1875-1880 [doi]
- Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier AlgorithmLingqin Ran, Changgen Peng, Dequan Xu, Weijie Tan, Zhongming Lin. 1881-1887 [doi]
- Towards Planning Package Delivery Paths by Exploiting the Crowd of Private CarsHejing Nie, Yiping Wen, TianCai Li, Sipeng OuYang, Muyang Tian. 1888-1895 [doi]
- Task oriented adaptive HUD human reliability analysisSichen Liu, Lei Zhou, Liwen Liu, Majian. 1896-1903 [doi]
- A Thermal-Aware Approach for DVFS-enabled Multi-core ArchitecturesJavier Pérez-Rodríguez, Patrick Meumeu Yomsi, Pavel Zaykov. 1904-1911 [doi]
- User Satisfaction Oriented Elastic Charging Strategy for Electric VehiclesLei Sun, Yanru Liu, Kangwei Lin, Changqing Xia, Qingxu Deng. 1912-1921 [doi]
- Energy- and Temperature-aware Scheduling: From Theory to an Implementation on Intel ProcessorQaisar Bashir, Mohammad Pivezhandi, Abusayeed Saifullah. 1922-1930 [doi]
- Real-Time Schedulability Analysis for Overloaded Primary-to-Secondary Processor SystemsMitchell Duncan, Fatima Raadia, Syeda Tanjila Atik, Marco Brocanelli, Nathan Fisher. 1931-1940 [doi]
- A Lightweight Trusted Architecture and Service Mechanisms based on SylixOSQidi Zhao, Hongjun You, Tianyang Wang, Changyi Du, Bohao Pei, Kailong Zhang. 1941-1947 [doi]
- Enabling Massive Scalability in Low-Power Wide-Area NetworksMahbubur Rahman, Pushpen Bikash Goala. 1948-1955 [doi]
- Performance Evaluation of Intelligent Computing Platform for Air-Combat Decision AlgorithmKangfa Xu, Linting Bai, Pengcheng Wen, Wensheng Niu. 1956-1962 [doi]
- Optimized Scheduling for Guard Bands Reduction in Time-Sensitive NetworkingZexian Pan, Qingxu Deng, Zhiwei Feng, Yuhan Lin, Changqing Xia. 1963-1970 [doi]
- PPG-based Heart Rate Estimation with Efficient Sensor Sampling and Learning ModelsYuntong Zhang, Jingye Xu, Mimi Xie, Wei Wang, Keying Ye, Jing Wang, Dakai Zhu 0001. 1971-1978 [doi]
- A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for SmartphonesZhiwei Wang, Kevin Liu, Jeffrey Wang, Jingye Xu, Jingjing Chen, Yufang Jin, Rocky Slavin. 1979-1986 [doi]
- VoiceBit: GPU-Accelerated Real-Time Human Voice Separation for Mobile PhonesGang Chen 0023, Zhaoheng Zhou, Shengyu He, Yi Zheng, Wang Yi 0001. 1987-1994 [doi]
- Difference-Adaptive Knowledge Distillation for Resource-Constrained Embedded DevicesYi Xiong, Wenjie Zhai, Zongwei Zhu. 1995-2002 [doi]
- End-Edge Coordinated Multiview Deep Learning for Time-Efficient Atrial Fibrillation DetectionTianren Zhou, Hanwen Li, Zhaoyan Shen, Zhiping Jia. 2003-2010 [doi]
- Exploring TensorRT to Improve Real-Time Inference for Deep LearningYuxiao Zhou, Kecheng Yang. 2011-2018 [doi]
- An Optimization Approach of Container Startup Times for Time-Sensitive Embedded SystemsLukas Stahlbock, Jan Weber, Frank Köster. 2019-2026 [doi]
- Pseudo-Log: Restore Global Data Facing Power Failures with Minimum NVM WriteEdwin H.-M. Sha, Yeteng Liao, Qingfeng Zhuge, Rui Xu, Yuhong Song, Jialin Liu. 2027-2030 [doi]
- Scheduling Performance Evaluation Framework for ROS 2 ApplicationsBo Peng, Atsushi Hasegawa, Takuya Azumi. 2031-2038 [doi]
- The Design of a Novel Modbus TCP/RTU Gateway for High Reliable CommunicationHonglin Zhou, Junlin Song, Xiaomin Pu. 2039-2042 [doi]
- Design and Realization of Intelligent Airborne Information Processing Concept Simulation SystemJianchun Xie, Linting Bai, Qing Luo. 2043-2047 [doi]
- Research on Gale Forecast Method of Yangpu Port Based on Random Forest ModelWanting Wang, Liang Chen, Yucong Duan. 2048-2055 [doi]
- Multi-Dimensional Intention Recognition for User-Generated Short TextsYing Zhang, Fan Zhang, Xiao-yan Zhang. 2056-2061 [doi]
- Personalized Review Recommendation without User Interactive DataShufan He, Hua Zhang, Zhiying Tu, Dianhui Chu. 2062-2070 [doi]
- Joint Extraction of Entity Relations Based on Dependency Syntax and BERT in Medical DomainBoyang Zhang, Wenbo Xu 0004, Haitao Jia, Jiahao Li, Jingzhe Sun. 2071-2077 [doi]
- Enhancing Cross-lingual Medical Concept Alignment by Leveraging Synonyms and Translations of the Unified Medical Language SystemLuming Chen, Yifan Qi, Aiping Wu, Lizong Deng, Taijiao Jiang. 2078-2083 [doi]
- Analysis of Semantic-based Knowledge Graph Embedding Models in Uncertainty Knowledge GraphsJianjing Li, Guanfeng Li. 2084-2092 [doi]
- OASIS: An Ontology-Driven Autonomic Management System for Intelligent SubstationsXiaodong Xie, Jianxu Yang, Xiong Hua, Qianru Zhou. 2093-2099 [doi]
- Compressive Sensing Solution Optimization Method in Sensing-Transmission-Calculation Integrated SystemLi Ma 0007, Zelin Zhang, Yang Li, Yingxun Fu, Dongchao Ma. 2101-2109 [doi]
- Multivariate Time Series Imputation Based on Masked Autoencoding with TransformerYongsheng Wang, Hao Xu, Zhiwei Xu, Jing Gao 0006, Yuhao Wu, Zhe Zhang. 2110-2117 [doi]
- Purpose Driven Disputation Modeling, Analysis and Resolution Based on DIKWP GraphsYingtian Mei, Yucong Duan, Liang Chen, Zaiwen Feng, Lei Yu, Zhendong Guo. 2118-2125 [doi]
- Purpose Driven DIKW Modeling and Analysis of Meteorology and DepressionZhendong Guo, Yucong Duan, Liang Chen, Chunyu Zhuang, Yingtian Mei. 2126-2133 [doi]
- Purpose Driven Modelling and Analysis for Smart Table Fill and Design based on DIKWYue Huang, Yucong Duan, Lei Yu, Yingtian Mei, Zhendong Guo, Ting Hu. 2134-2141 [doi]
- Automatic Semantic Modeling by Cross-Modal RetrievalRuiqing Xu, Wolfgang Mayer, Yulong Wang, Hong-Yu Zhang, Da Ning, Yucong Duan, Keqing He, Zaiwen Feng. 2142-2150 [doi]
- Data Model Study for Advancement of Japanese PSI Management Introducing the Concepts of S&OPXiaomei Qin, Zhen Liu. 2151-2158 [doi]
- Factors influencing out of pocket ratio to CPS among NPC patients in Guangxi: 2014-2020Li-Fang Zhou, Ping-Ping Zeng, Li-hua Zhou, Kang-min, Bo Wei, Yu-Sheng Wang. 2159-2163 [doi]
- A Fault Diagnosis Method Based on Capsule Convolutional NetworkHuachen Tian, Juntao Liu. 2164-2168 [doi]
- A Real-time Deformation Measurement System Platform of Historic Building based on 3DGIS, BIM and IoTChunxia Shi, Feng Pan, Qiang He, Yue Wu, Xinkui Li. 2169-2174 [doi]
- CTMSN-EHI: A Context-Aware Time-Decay Multi-Head Self-Attention Network with Enhanced History Information for Multi- Turn Spoken Language UnderstandingXiang Jin, Chuan Li, Dong Tao. 2175-2181 [doi]
- A Hybrid BiLSTM-ATT Model for Improved Accuracy Sentiment AnalysisLanxue Dang, Chunyu Wang, Hongyu Han, Yan-E. Hou. 2182-2188 [doi]
- Research on the intelligent countermeasure based on the multi-aircraft cooperative combat behavior treeChengping Tian, Hao Zhang, Yan Li, Xiao Sun, Bin Cheng. 2189-2197 [doi]
- CH-Go: Online Go System Based on Chunk Data StorageHui Lu, Chuan Li, Yiming Yang, Cheng Li, Ashraful Islam. 2198-2205 [doi]
- CFCT: The cell function classification method for complex tablesSainan Tong, Derong Shen, Yue Kou, Tiezheng Nie. 2206-2213 [doi]
- Interpretable Sentencing Element-based Prison Term PredictionYifang Zhang, Duanyu Feng, Wei Tian, Hao Wang. 2214-2220 [doi]
- Research on Intrusion Detection Method for Industrial Control Systems based on Improved APSO-MKBoost-C AlgorithmXiao Li, Kewen Li. 2221-2226 [doi]
- F3FAD: Fast 3D Facial Avatar Digitization With XR Cloud ServiceQing Yang, Hua Zhang. 2227-2234 [doi]
- Evaluation of data poisoning attacks on federated learning-based network intrusion detection systemYuemeng Zhang, Yong Zhang 0025, Zhao Zhang, Haonan Bai, Tianyi Zhong, Mei Song. 2235-2242 [doi]
- *Xin Wu, Chuan Li. 2243-2250 [doi]
- An Enhanced BERTopic Framework and Algorithm for Improving Topic Coherence and DiversitySahil Sawant, Jinhong Yu, Kirtikumar Pandya, Chun-Kit Ngan, Rolf Bardeli. 2251-2257 [doi]
- Dual-Guided Collective Entity Alignment for Knowledge GraphsGang Bai, Yue Kou, Derong Shen, Tiezheng Nie, Dong Li 0023. 2258-2263 [doi]
- DP-Denclue: An outlier detection algorithm with differential privacy preservationHuang-Zhi Xia, Li Min Chen, Fu Qi, Xue-Di Mao, Lin-Qi Sun, Feng-Yu Xue. 2264-2269 [doi]
- Acoustic Howling Suppression with Neural Networks using Real-world DataLiang Wan, Baosheng Lv, Hongqing Liu, Lu Gan 0005, Yi Zhou 0014. 2270-2274 [doi]
- Time-frequency Complex Mask Network for Echo Cancellation and Noise SuppressionNing Sun, Hongqing Liu, Lu Gan 0005, Yu Zhao, Zhen Luo, Yi Zhou 0014. 2275-2279 [doi]
- Alzheimer's Disease Detection Using Acoustic And Linguistic FeaturesHongshun Deng, Hongqing Liu, Yi Zhou 0014, Gan Lu 0005. 2280-2284 [doi]
- MBTI BERT: A Transformer-Based Machine Learning Approach Using MBTI Model For Textual InputsRaad Bin Tareaf. 2285-2292 [doi]
- Predicting User Engagements using Graph Neural Networks on Online Social NetworksSeyed Ali Alhosseini, Christoph Meinel. 2293-2297 [doi]
- A Systematic Integrated Literature Review of Clinical Data Management Platforms of HL7 FHIRFranz Frederik Walter Viktor Walter-Tscharf. 2298-2307 [doi]
- Construction of Social Community Knowledge Graph from WikipediaShimei Li, Tongge Xu, Yueqi Liu, Liqun Yang. 2308-2315 [doi]
- Index system construction and weight distribution method based on improved credibilityLiang Chen, Wang Sule, Lulu Zhao. 2316-2323 [doi]
- Unsupervised Anomaly Detection for IoT Data based on Robust Adversarial LearningYan Qiao, Benchu Zhang, Zeyu Zhang. 2324-2330 [doi]
- Analyzing the Spatial-temporal Characteristics and Influencing Factors of Public Attention to 5G Based on Baidu IndexPan Liu, Guanyu Wang, Kai Liu, Yanlin Chen. 2331-2337 [doi]
- Target Recognition of HRRP Based on CNN with Multi-Axis Attention and Residual ConnectionsYuxuan Zhang, Yingying Kong. 2338-2344 [doi]
- Inference-Based Deep Reinforcement Learning for Physics-Based Character ControlYuxi Chen, Chenghao Huang, WeiMin Yuan, Yutong Wu 0011, Ziyi Zhang, Hao Tang, Yanru Zhang. 2345-2352 [doi]
- A hybrid model based on deep convolutional neural network for medical named entity recognitionDeguang Li, Yongxin Zhang, Yifan Zhang, Hao Lu, Bo Yu, Shoubo Peng, Youzhong Ma. 2353-2357 [doi]
- Analysis of the Research Status of Information Technology Education Literature in China and AbroadYulin Zhao, Kai Liu 0001, Junke Li. 2358-2361 [doi]
- A Deep Learning Network for Detecting COVID-19 From Chest X-Ray ImagesBo Wang, Yongxin Zhang, Shihui Ji, Binbin Zhang, Xiangyu Wang, Jiyong Zhang. 2362-2367 [doi]
- An Improved Deep Network of Pulmonary Tuberculosis Lesions Detection based on YOLOLe An, Kexin Peng, Xing Yang. 2368-2372 [doi]
- timeTree: How to Represent Time Sequence in a Threat TreeZhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren 0002. 2373-2378 [doi]