Abstract is missing.
- CRFST-GCN: A Deeplearning Spatial-Temporal Frame to Predict Traffic FlowChunyan Diao, Dafang Zhang, Wei Liang 0005, Kuan-Ching Li, Man Jiang. 3-17 [doi]
- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial ImagesJ. I. N. Zhang, Meng Luo, Cheng Sun, Peiqi Qu. 18-32 [doi]
- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link PredictionMeihong Wang, Han Li, Linling Qiu. 33-49 [doi]
- GlowImp: Combining GLOW and GAN for Multivariate Time Series ImputationCaizheng Liu, Houquan Zhou, Zhi Sun, Guangfan Cui. 50-64 [doi]
- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep LearningXuedong Ding, Minghua Zhu, Bo Xiao 0004. 65-84 [doi]
- Wasserstein Graph Auto-EncoderYan Chu 0001, Haozhuang Li, Hui Ning, Qingchao Zhao. 85-99 [doi]
- Fine-Grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad LearningShi Chen, Sheng Wu, Licai Zhu, Hao Yang 0002. 100-114 [doi]
- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based on Bionic Neural NetworkYan Wang, Gang Cui, Junqiang Zhou, Zhiheng Han. 115-128 [doi]
- Online Multiple Object Tracking Algorithm Based on Heat Map PropagationWei Ding, Haokai Hong, Dejun Xu, Min Jiang 0005. 129-143 [doi]
- Spatio-Temporal Topology Routing Algorithm for Opportunistic Network Based on Self-attention MechanismXiaorui Wu, Gang Xu, Xinyu Hao, Baoqi Huang, Xiangyu Bai. 147-161 [doi]
- TSAEns: Ensemble Learning for KPI Anomaly DetectionChengyu Wang 0008, Tao Yang, Jinhua Cui, Yu Li, Tongqing Zhou, Zhiping Cai. 162-177 [doi]
- Towards Transferable Adversarial Examples Using Meta LearningMingyuan Fan, Jia-Li Yin, Ximeng Liu, Wenzhong Guo. 178-192 [doi]
- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine BladesJianwen Ding, Fan Lin, Shengbo Lv. 193-209 [doi]
- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETCXiang Li, Yawei Zhao, Donghui Li, Wei Guan. 210-221 [doi]
- Parallel Cache Prefetching for LSM-Tree Based Store: From Algorithm to EvaluationShuo Zhang, Guangping Xu, Yulei Jia, Yanbing Xue, Wenguang Zheng. 222-236 [doi]
- A Hybrid TLBO-TS Algorithm Based Mobile Service Selection for Composite ServicesRunbin Xie, Jianxun Liu, Guosheng Kang, Buqing Cao, Yiping Wen, Jiayan Xiang. 237-256 [doi]
- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSDsJinbin Zhu, Limin Xiao, Liang Wang, Guangjun Qin, Rui Zhang, Yuting Liu, Zhonglin Liu. 257-270 [doi]
- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling ProblemJiaxin Ye, Dejun Xu, Haokai Hong, Yongxuan Lai, Min Jiang 0005. 271-287 [doi]
- Trace-Navi: A High-Accuracy Indoor Navigation System Based on Real-Time Activity Recognition and Discrete Trajectory CalibrationYu Wang, ZhiPeng Yu, Licai Zhu, Hao Yang 0002. 288-303 [doi]
- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-Scale SceneYonghao Zhao, Yanhui Ji, Licai Zhu, Hao Yang 0002. 304-318 [doi]
- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision ProcessSuiming Guo, Pengcheng Zhang, Qianrong Shen. 319-335 [doi]
- A Multi-precision Quantized Super-Resolution Model FrameworkJingyu Liu, Dunbo Zhang, Qiong Wang, Li Shen 0007. 336-353 [doi]
- An Optimized GPU Implementation of Weakly-Compressible SPH Using CUDA-Based StrategiesYuejin Cai, Jianguo Wei, Qingzhi Hou, Ruixue Gao. 354-369 [doi]
- A Heterogeneous Multi-core Network-on-Chip Mapping Optimization AlgorithmJuan Fang, Haoyan Zhao, Jiayue Zhang, Jiamei Shi. 370-384 [doi]
- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained ClassificationBaoKang Zhao, Murao Lin, Ziling Wei, Qin Xin 0001, Jinshu Su. 385-401 [doi]
- Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior PerspectiveZhongyu Liang, Xiaoqiang Di, Zhen Liu, Xu Liu 0010, Xingxu Zhang, Zhi Yu. 402-421 [doi]
- Motion-Sequence Authentication System: Guard for Smart PhonesYuzheng Dong, Yanfeng Zhao, Ziyue Wang, Juan He, Liubin Zhu. 422-441 [doi]
- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge ComputingChenxi Li, Guanghui Li 0001, Shihong Hu, Chenglong Dai, Dong Li. 445-459 [doi]
- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-Assisted MECQian Wei, Tao Ouyang, Zhi Zhou 0006, Xu Chen 0004. 460-475 [doi]
- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge ComputingYongqiang Gao, Yanping Wang. 476-493 [doi]
- An Optimized Greedy-Based Task Offloading Method for Mobile Edge ComputingWei Zhou, Chuangwei Lin, Jirun Duan, Ke Ren, Xuyun Zhang, Wanchun Dou. 494-508 [doi]
- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge ComputingYongqiang Gao, Xiaolei Liu. 509-528 [doi]
- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion AttackZhaobo Lu, Jin Wang, Jingya Zhou, Jianping Wang 0001, Kejie Lu. 529-548 [doi]
- MGFL: Multi-granularity Federated Learning in Edge Computing SystemsShangxuan Cai, Yunfeng Zhao, Zhicheng Liu, Chao Qiu, Xiaofei Wang 0001, Qinghua Hu. 549-563 [doi]
- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog ComputingJiaying Yin, Jing Fu, Jingjin Wu, Shiming Zheng. 564-577 [doi]
- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous ExplorationPing Zhong, Bolei Chen, Yongzheng Cui, Hanchen Song, Yu Sheng. 578-594 [doi]
- Edge DDoS Attack Detection Method Based on Software Defined NetworksGangsheng Ren, Yang Zhang, Shukui Zhang, Hao Long 0001. 597-611 [doi]
- GradMFL: Gradient Memory-Based Federated Learning for Hierarchical Knowledge Transferring Over Non-IID DataGuanghui Tong, Gaolei Li, Jun Wu 0001, Jianhua Li 0001. 612-626 [doi]
- Linear Coded Federated LearningYingyao Yang, Jin Wang, Kejie Lu, Jianping Wang, Zhaobo Lu. 627-644 [doi]
- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare SystemsHaitang Lu, Jie Chen, Kai Zhang. 645-659 [doi]
- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement LearningZhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang 0071. 660-675 [doi]
- A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal DevicesMande Xie, Qiting Zhao, Haibo Hong. 676-692 [doi]
- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public BlockchainsYepeng Ding, Hiroyuki Sato. 693-709 [doi]
- A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random FieldLinghe Zhu, Haibo Hong, Mande Xie. 710-725 [doi]
- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in MicrogridYingming Zeng, Liyu Deng, Haibin Zhang. 726-740 [doi]
- Multi-layer Adaptive Sampling for Per-Flow Spread MeasurementBoyu Zhang, Yang Du 0006, He Huang 0001, Yu-e Sun, Guoju Gao, Xiaoyu Wang, Shiping Chen. 743-758 [doi]
- Transformer-Based Rating-Aware Sequential RecommendationYang Li, Qianmu Li, Shunmei Meng, Jun Hou 0002. 759-774 [doi]
- An Effective Single-Pass Approach for Estimating the Φ-quantile in Data StreamsZhengyuan Xue. 775-789 [doi]
- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-iid in Federated LearningWenjie Xiao, Xuehai Tang, Biyu Zhou, Wang Wang, Yangchen Dong, Liangjun Zang, Jizhong Han, Songlin Hu. 790-803 [doi]