Abstract is missing.
- A Critical Server Security Protection Strategy Based on Traffic Log AnalysisHaiyong Zhu, Chengyu Wang 0008, Bingnan Hou, Yonghao Tang, Zhiping Cai. 1-18 [doi]
- Knowledge Graph Reasoning with Bidirectional Relation-Guided Graph Attention NetworkRui Wang, Yongli Wang. 1-15 [doi]
- Machine Printed Page Number Anomaly Detection Method Based on Multi-scale Self Attention Encoding DecodingXiangchao Shao, Xueli Xiao, Yingxiong Leng. 1-15 [doi]
- A Novel MEC Framework for Extractive Summarization Using Semantic Role Graph and Semantic MatchingTiantian Li, Bingchuan He, Huangfei Cheng, Bin Cao 0004. 16-31 [doi]
- Research on PCB Defect Detection Using 2D and 3D SegmentationLin Hua, Kuiyu Li, Lunxin Cheng, Yifan Chen, Dongfu Yin, Fei Richard Yu. 16-28 [doi]
- Stable Monocular Visual Odometry Based on Optical Flow MatchingYujia Liu, Chaoxia Shi, Yanqing Wang. 19-29 [doi]
- A Secure Circulation Mechanism of Personal Data Based on BlockchainsTianqi Cai, Yuhan Dong, Zitao Xuan, Lei Wang, Kun Huang, Zhide Li, Hengjin Cai. 29-44 [doi]
- End-to-End Motion Planning Based on Visual Conditional Imitation Learning and Trajectory-GuideYiming Gao 0011, Chaoxia Shi, Yanqing Wang. 30-43 [doi]
- A Paper Citation Link Prediction Method Using Graph Attention NetworkZhixuan Zou, Yiwen Sun, Weiguo Li, Yiqi Li, Yintong Wang. 32-41 [doi]
- Research on Emotional Analysis of Tibetan Short Text Based on Fusion Sentiment LexiconWan Ma Dao Ji, An Jian Cai Rang, Jan Yang Cuo, Gong Bao Jia, De Ji Cuo, Zan La Gong, Yang Qin. 42-57 [doi]
- Trust Management as a Service for RFID Based Applications in Edge Enabled CloudWenjie Sun, Guodong Peng, Wenchao Pan, Junlei Deng, Xuemei Cui, Feng Lin. 44-55 [doi]
- Road Traffic Waterlogging Detection Based on YOLOv5Jianqiang Liu, Yujie Shang, Xingyao Li, Huizhen Hao, Peng Geng. 45-58 [doi]
- Distributed Intelligent Collaborative Scheduling Mechanism for Cloud-Edge-End Resources in IoTLiqiang Wang, Wenchen He, Ruilin Liu, Faqiang Liu. 56-68 [doi]
- A Review of Solving Non-IID Data in Federated Learning: Current Status and Future DirectionsWenhai Lu, Jieren Cheng, Xiulai Li, Ji He. 58-72 [doi]
- O&M Portrait Tag Generation and Management of Grid Business Application System Under Microservice ArchitectureDequan Gao, Bing Zhang, Meng Yang, Bao-Feng, Lei Xie, Yue Shao. 59-69 [doi]
- Large-Scale Network Adaptive Situation Awareness Method in Spatio-Temporal DimensionHongbin Zhang, Ying Xu, Bin Liu, Dongmei Zhao, Yikang Bai. 69-83 [doi]
- An Erase Code Based Collaborative Storage Method in RFID SystemsFeng Lin, Yu Liu, Yunke Yang, Bin Peng, Xuemei Cui, Chengjiang Qiu, Heng Zhang, Ling Li, Shaochen Su. 70-79 [doi]
- A Review of Relationship Extraction Based on Deep LearningGuolong Liao, Xiangyan Tang, Tian Li, Li Zhong, Pengfan Zeng. 73-84 [doi]
- Authentication that Combines rPPG Information with Face Detection on the BlockchainMaoying Wu, Wu Zeng, Ruochen Tan, Yin Ni, Lan Yang. 80-94 [doi]
- Real-Time Detection of Human Heart Rate and Blood Pressure During ExerciseLitao Guang, Jiancheng Zou, Zibo Wen. 84-97 [doi]
- BERT and LLM-Based Multivariate Hate Speech Detection on Twitter: Comparative Analysis and Superior PerformanceXiaoHou Shi, Jiahao Liu, Yaqi Song. 85-97 [doi]
- A Memoryless Information Sharing RFID Tag Anti-Collision ProtocolYan Liu, Qi Tang, Gang Li, Zhong Huang, Zihan Huang, Xiaochuan Fang, Guangjun Wen. 95-109 [doi]
- Basketball Shooting and Goaling Detection Based on DWC-YOLOv8Zibo Wen, Jiancheng Zou, Litao Guang. 98-107 [doi]
- Deep Learning for Protein-Protein Contact Prediction Using Evolutionary Scale Modeling (ESM) FeatureLan Xu. 98-111 [doi]
- Design of High-Power Power Amplifiers for BDS-3 Terminal Based on InGaP/GaAs HBT MMIC and LGA TechnologyZhenbing Li, Shilin Jia, Jinrong Zhang, Jialong Fu, Junjie Huang, Xiaochuan Fang, Gang Li, Guangjun Wen. 108-118 [doi]
- Prudent Promotion, Steady Development: Capability and Safety Considerations for Applying Large Language Models in MedicineSheng Xu, Shuwen Chen, Mike Chen. 110-123 [doi]
- FedTag: Towards Automated Attack Investigation Using Federated LearningMu Chen, Zaojian Dai, Yong Li, Ziang Lu. 112-126 [doi]
- Design of High-Performance Broadband Power Amplifier Based on Normal Distribution Real Frequency Matching MethodZhenbing Li, Xiangrui Wu, Junjie Huang, Shilin Jia, Jinrong Zhang, Xiaochuan Fang, Chu Chu, Gang Li. 119-132 [doi]
- Blockchain-Enhanced Device to Device Network Identity Verification Based on Zero Knowledge ProofXingyu Shang, Meiling Dai, Xiaoou Liu. 124-134 [doi]
- Deep Learning Based SQL Injection Attack DetectionZhang Pan, Qianli Huang, Ziqing Tian, Ying Liu, Jiapeng Lou, Yongguang Gong, Zhiqiang Wang. 127-141 [doi]
- Dynamic Deployment of DNN Inference Tasks Based on Distributed Proximal Policy OptimizationWenchen He, Yitao Li, Liqiang Wang. 133-143 [doi]
- A Privacy-Preserving Searchable Encryption Scheme for Data Protection in Smart GridXun Zhang, Hong Zhao, Lei Di, Zeng-Hui Yang. 135-148 [doi]
- RSCC: Robust Semi-supervised Learning with Contrastive Learning and Augmentation Consistency RegularizationXinran Jing, Yongli Wang. 142-155 [doi]
- Graph-Cut Based DNN Inference Task Partitioning and Deployment MethodXiaoHou Shi, Yaqi Song, Meiling Dai. 144-154 [doi]
- Data-Driven Distributed Autonomous Architecture for 6G NetworksPengyu Li, Xinyu Chen, Zhenqiang Sun, Yanxia Xing, Jianfeng Zhou, Wanpeng Fan. 149-163 [doi]
- Task Offloading with Dual-Mode Switching in Multi-access Edge ComputingXiaoliang Zhang, Jiaqi Duan, Mei Yan, Shunming Lyu. 155-168 [doi]
- Enhanced Prototypical Network for Few-Shot Named Entity RecognitionTianwen Huang, Mingming Zhang, Kai Liu, Xianhui Li, Yongli Wang. 156-170 [doi]
- Decoupled Knowledge Distillation in Data-Free Federated LearningXueqi Sha, Yongli Wang, Ting Fang. 164-177 [doi]
- Channel Allocation Scheme Based on NSGA-II for Frequency-Division-Multiplexing UHF RFID SystemJie Meng, Yuan Li, Yulu Zhang, Shuai Ma, Gui Li, Jian Li, Guangjun Wen. 169-183 [doi]
- Regularized DNN Based Adaptive Compensation Algorithm for Gateway Power Meter in Ultra-High Voltage SubstationsYonggui Wang, Xiao Feng, Wenjing Li, Tengfei Dong. 171-181 [doi]
- An Improved SSD Seal Detection Algorithm Based on Channel-Spatial AttentionXiangchao Shao, Yin Deng, Yanji Zhou. 178-193 [doi]
- Dynamic Occlusion Expression Recognition Based on Improved GANMinchao Liang, Mingming Zhang, Kai Liu, Xianhui Li, Yongli Wang. 182-197 [doi]
- Research on Physical Layer of Passive IoT Communication Protocol Based on Cellular FusionYi He, Yulu Zhang, Yuan Li, Shuai Ma, Gui Li, Junyang Liu, Haiwen Yi, Yue Liu, Guangjun Wen, Xu Zhang, Jian Li. 184-197 [doi]
- A Multiple Fire Zones Detection Method for UAVs Based on Improved Ant Colony AlgorithmFanglin Xue, Peng Geng, Huizhen Hao, Yujie He, Haihua Liang. 194-208 [doi]
- Hybrid Control Strategy for Rumor Spread in Social NetworksHaiyan Zi, Shixing Wu, Kaixin Wu. 198-210 [doi]
- Contrastive Learning Based on AMR Graph for Logic ReasoningYan He, Yongli Wang. 198-211 [doi]
- Research on the Regulation and Network Security of Smart Tourism Public Information Service PlatformKun-Shan Zhang, Chiu-Mei Chen, Wen-Yu Chang. 209-218 [doi]
- Data Stream Aggregation Mechanism Under Local Differential PrivacyJingjing Wang, Yongli Wang. 211-225 [doi]
- Automated Detection and Recognition of Wild Dolphin Behaviors Using Deep LearningJiahua Lin, Duan Gui, Quan Xie, Xundao Zhou, Yunxiao Shan. 212-219 [doi]
- A Study Based on Logistic Regression Algorithm to Teaching IndicatorsYufang He, Kaiyue Shen, Haiyang Zhang, Wenjing Duan, Zhen Gong, Ruoyao Jia, He Wang. 219-227 [doi]
- M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCCDongyu Wang, Canghong Shi, Junrong Li, Jiaxin Gan, Xianhua Niu, Ling Xiong. 220-234 [doi]
- BP Neural Network-Based Drug Sale Forecasting Model DesignYufang He, Zhen Gong, Dong Han, Wenjing Duan, Kaiyue Shen, Ruoyao Jia, Zheng Xie. 226-233 [doi]
- A Spellcheck Technique for Tibetan Syllables Based on Grammatical Vector MultiplicationAnJian-CaiRang, LaMaoCuo. 228-241 [doi]
- Data and Privacy Crisis on Internet Application of Artificial IntelligenceSen Xu, Fei Yan, Yu Fu, Jincan Xin, Hua Xu. 234-241 [doi]
- A Survey of Homogeneous and Heterogeneous Multi-source Information Fusion Based on Rough Set TheoryHaojun Liu, Xiangyan Tang, Taixing Xu, Ji He. 235-246 [doi]
- Flexible Sensor Array and Newton Interpolation Algorithm for Molded Dichromatic Sole by Operating RobotLizhi Gu, Shanping Gao, Dong Wang, Jinling Song. 242-262 [doi]
- Fine-Grained Image Classification Network Based on Complementary LearningXiaoHou Shi, Jiahao Liu, Yaqi Song. 242-255 [doi]
- Formula Maintenance of Single Material Tobacco Compatibility Based on Co-formulation Analysis MethodYuxuan Dong, Kaihu Hou, Yaqin Liu, Xiantao Ma, Ming Chen, Yunfa Gao, Jiming Dai, Jie Long. 247-261 [doi]
- An Overview of Graph Data Missing Value ImputationJiahua Wu, Xiangyan Tang, Guangxing Liu, Bofan Wu. 256-270 [doi]
- Multi-physical Field Collaborative Simulation Optimization Technology and Reliability Analysis of Power AmplifiersZhenbing Li, Junjie Huang, Shilin Jia, Jinrong Zhang, Jialong Fu, Xiaochuan Fang, Gang Li, Guangjun Wen. 262-276 [doi]
- Element Extraction from Computer Science Academic Papers for AI Survey WritingFan Luo, Xinguo Yu. 263-274 [doi]
- Speech Emotion Recognition Method Based on Cross-Layer Intersectant FusionKaiqiao Wang, Peng Liu, Songbin Li, Jingang Wang, Cheng Zhang. 271-285 [doi]
- An Emotion Recognition Method in Conversations Based on Knowledge Selection and Fuzzy FingerprintsYuanzheng You, Yongli Wang. 275-286 [doi]
- Research and Design of Hydrological Data Visualization Based on Digital TwinYuDan Zhao, Wu Zeng, Ying Ni, Peng Xia, Ruochen Tan. 277-289 [doi]
- Clothed Human Model Estimation from Unseen Partial Point Clouds with Meta-learningChenghao Fang, Kangkan Wang, Shihao Yin, Shaoyuan Li. 286-299 [doi]
- The Security and Privacy Concerns on MetaverseKejiang Liu, Tengfei Zheng, Tongqing Zhou, Chang Liu, Fang Liu, Zhiping Cai. 287-305 [doi]
- Design of Constraint FH-LFM DFRC WaveformRui Xu, Ruiming Wen, Gang Li, Guangjun Wen. 290-303 [doi]
- LCA-BERT: A Local and Context Fusion Sentiment Analysis Model Based on BERTXiaoyan Zhang, Zhuang Yan. 300-311 [doi]
- A Construction of IoT Malicious Traffic Dataset and Its ApplicationsYiping Zhang, Yiyang Zhou, Jie Yin, Yichen Yang 0018, Wenwei Xie, Guangjun Liang, Lanping Zhang. 304-318 [doi]
- Impact of Smartphones on Self-Rated Health of Rural Older Adults Using the PSM MethodYue Li, Chengmeng Zhang, Chengye Huang, Haoyu Suo, Na Liu, Xinyue Hu, Yang Li, Gong Chen. 306-319 [doi]
- Meta-learning Based on Multi-objective OptimizationXin Zhong, Jiahao Wang, Zutong Sun, Yuheng Ren, Kuihua Li. 319-332 [doi]
- DBSCAN Clustering and Kleinberg Algorithm-Based Research on Autism Hotspots and Frontier Trends in ChinaZixu Hao, Siyu Sun, Rongwei Leng, Xu Xu. 320-328 [doi]
- FSANet: A Lightweight Network for Tobacco Grouping Using Multi-scale Convolution and Attention MechanismYongzhou Su, Kaihu Hou, Jie Long, Xiaolei Gai, Yiwu Zhang, Xiaowei Zhang. 329-343 [doi]
- Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security EventsJia Du, Junqiang Yang, Wanli Kou, Huaizhe Zhou. 333-339 [doi]
- Application of T-S Fuzzy Neural Network in Water Quality Classification and EvaluationLingyu Song, Yifu Sheng, Hao Li, Jianjun Zhang 0005, Ziwen Yu, Enling Zhou, HaiJun Lin, Ziqiu Zhang. 340-352 [doi]
- Grid-Level Data Oriented Real-Time Automatic Calculation and Storage MethodYuanhe Tang, Shiming Sun, Xin Shan, Tong Tai. 353-362 [doi]
- FedMLP4SR: Federated MLP-Based Sequential Recommendation SystemZhi Yuan, Yongli Wang. 363-375 [doi]
- Attribute Encryption Information Sharing Scheme Based on Blockchain TechnologyKe Zhang, Yongli Wang. 376-388 [doi]
- An Epidemiological Control Strategy Model of SVEIMQRJingmeng Zhang, Yulong An, Shixing Wu. 389-403 [doi]
- Reducing Overfitting Risk in Small-Sample Learning with ANN: A Case of Predicting Graduate Admission ProbabilityMengjie Han, Daomeng Cai, Zhilin Huo, Zhao Shen, Lianghu Tang, Shan Yang, Cong Wang. 404-419 [doi]
- Comparisonof Chinese College Students'Anxiety During and BeforeCOVID19 Pandemic Based on Clustering AlgorithmHongjuan Wen, Menglu Xu, Yang Gong, Haiyang Zhang, Xiaoting Zhu. 420-430 [doi]
- Risk Perception Visualization of Public Health Emergencies Based on Clustering AlgorithmsZhe Zhao, Yiguo Cai, Zhen Gong, Hao Ni, Zhiyong Xu, Li Sun. 431-441 [doi]
- Visualization of Tumor Treatment Methods Based on Clustering AlgorithmsYiguo Cai, Fang Xia, Ziying Xu, Menglu Xu, Siqi Li, Jingshuo Liu. 442-453 [doi]
- Research on the Operational Efficiency of Listed Pharmaceutical Logistics Companies in China Based on DEA-BCC Model and Malmquist IndexShiyu Gao, Yiguo Cai, Shan Huo, Xin Liu, He Wang. 454-463 [doi]
- A Study on the Export Trend Forecast of Chinese Pharmaceutical Industry Based on GM (1, 1) ModelXin Liu, Fang Xia, Lingzhi Kong, Shuo Zhang. 464-470 [doi]
- YOLO-TUF: An Improved YOLOv5 Model for Small Object DetectionHua Chen, Wenqian Yang, Wei Wang, Zhicai Liu. 471-484 [doi]