Abstract is missing.
- Green Crop Image Segmentation Based on Superpixel Blocks and Decision TreeBo Wang, Zhibin Zhang. 3-17 [doi]
- User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy ProcessChen Yang, GuoGen Wan, Peilin He, Yuanyuan Huang, Shibin Zhang. 18-29 [doi]
- Research on Chain of Evidence Based on Knowledge GraphYizhuo Liu, Jin Shi, Jin Han, MingXin Lu. 30-41 [doi]
- Research on the Construction of Intelligent Catalog System for New Media Information ResourcesYiting Li, Jin Shi, Jin Han, MingXin Lu, Yan Zhang. 42-52 [doi]
- Construction of a Class of Four-Weight Linear CodesEe Duan, Xiaoni Du, Tianxin Wang, Ji-Xiang Du. 55-64 [doi]
- 3, 1)Fujun Zhang, Xiaoni Du, Jinxia Hu. 65-73 [doi]
- A Survey on Side-Channel Attacks of Strong PUFYan Li, Jianjing Shen, Wei Liu, Wei Zou. 74-85 [doi]
- A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR CodeFei Hu, Yuanzhi Yao, Weihai Li, Nenghai Yu. 86-97 [doi]
- Hiding Traces of Camera Anonymization by Poisson BlendingHui Zeng, Anjie Peng, Xiangui Kang. 98-108 [doi]
- A Deep Learning Approach to Detection of Warping Forgery in ImagesTongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu. 109-118 [doi]
- The Course Design of Applied Talent Statistics Based on Fuzzy Control and Grey Measure ModelLi Wu, Jun Yang. 119-130 [doi]
- Reinforcement Learning-Based Resource Allocation in Edge ComputingQianyu Xie, Xutao Yang, Laixin Chi, Xuejie Zhang 0002, Jixian Zhang. 131-142 [doi]
- Fuzzy Multi-objective Requirements for NRP Based on Particle Swarm OptimizationYachuan Zhang, Hao Li, Rongjing Bu, Chenming Song, Tao Li, Yan Kang, Tie Chen. 143-155 [doi]
- A Clustering Algorithm for Wireless Sensor Networks Using Geographic Distribution Information and Genetic AlgorithmsYu Song, Zhigui Liu, He Xiao. 156-165 [doi]
- Dual Residual Global Context Attention Network for Super-ResolutionJingjun Zhou, JingBing Li, Hui Li, Jing Liu, Qianning Dai, Saqib Ali Nawaz, Jian Shen. 166-178 [doi]
- A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random SequencesFengming Qin, JingBing Li, Hui Li, Jing Liu, Saqib Ali Nawaz, Yanlin Liu. 179-190 [doi]
- Encryption Algorithm for TCP Session HijackingMinghan Chen, Fangyan Dai, Bingjie Yan, Jieren Cheng. 191-202 [doi]
- A Covert Information Transmission Scheme Based on High Frequency Acoustic Wave ChannelHuiling Li, Yayi Zou, Wenjia Yi, Ziyi Ye, Yi Ma. 203-214 [doi]
- Privacy Preserving Mining System of Association Rules in OpenStack-Based CloudZhijun Zhang, Zeng Shou, Zhiyan Ning, Dan Wang, Yingjian Gao, Kai Lu, Qi Zhang. 215-224 [doi]
- Unsupervised Data Transmission Scheduling in Cloud Computing EnvironmentGui Liu, Wei Zhou, Yongyong Dai, Haijiang Xu, Li Wang. 225-235 [doi]
- DUMPLING: Cross-Domain Data Security Sharing Based on BlockchainMingda Liu, Yijuan Shi. 236-245 [doi]
- A Semi-quantum Group Signature Scheme Based on Bell StatesJinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng. 246-257 [doi]
- An Improved Quantum Identity Authentication Protocol for Multi-party Secure CommunicationPeilin He, Yuanyuan Huang, Jialing Dai, Shibin Zhang. 258-266 [doi]
- A Mixed Mutual Authentication Scheme Supporting Fault-Detection in Industrial Internet of ThingsGongxin Shen. 267-279 [doi]
- Multi-party Semi-quantum Secret Sharing Scheme Based on Bell StatesXue-Yang Li, Yan Chang, Shibin Zhang. 280-288 [doi]
- A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ StatesZheng-Tao, Shibin Zhang, Yan Chang, Lili Yan. 289-297 [doi]
- Quantum Key Distribution Protocol Based on GHZ Like State and Bell StateJi-Zhong Wu, Lili Yan. 298-306 [doi]
- Design and Implementation of Heterogeneous Identity Alliance Risk Assessment SystemJianChao Gan, Zhiwei Sheng, Shibin Zhang, Yang Zhao. 307-317 [doi]
- A Blockchain Based Distributed Storage System for Knowledge Graph SecurityYichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei 0001. 318-327 [doi]
- A Fragile Watermarking Algorithm Based on Audio Content and Its Moving AverageXizi Peng, Jinquan Zhang, Shibin Zhang. 328-340 [doi]
- An AHP/DEA Methodology for the Public Safety EvaluationLi Mao, Naqin Zhou, Tong Zhang, Wei Du, Han Peng, Lina Zhu. 341-352 [doi]
- Detection and Information Extraction of Similar Basic Blocks Used for Directed Greybox FuzzingChunlai Du, Shenghui Liu, Yanhui Guo 0001, Lei Si, Tong Jin. 353-364 [doi]
- Summary of Research on Information Security Protection of Smart GridLi Xu, Yanbin Sun. 365-379 [doi]
- Framework Design of Environment Monitoring System Based on Machine LearningLingxiao Meng, Shudong Li, Xiaobo Wu, Weihong Han. 380-392 [doi]
- Compression Detection of Audio Waveforms Based on Stacked AutoencodersDa Luo, Wenqing Cheng, Huaqiang Yuan, Weiqi Luo, Zhenghui Liu. 393-404 [doi]
- A Deep Reinforcement Learning Framework for Vehicle Detection and Pose Estimation in 3D Point CloudsWeipeng Wang, Huan Luo, Quan Zheng, Cheng Wang 0003, Wenzhong Guo. 405-416 [doi]
- A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOARan Zhang, Min Liu, Qikun Zhang, Zengyu Cai. 417-427 [doi]
- Research on User Preference Film Recommendation Based on Attention MechanismLei Zhu, Yufeng Liu, Wei Zhang, Kehua Yang. 428-439 [doi]
- Traffic Anomaly Detection for Data Communication NetworksXiaoxiao Tang, Wencui Li, Jing Shen, Feng Qi, Shaoyong Guo. 440-450 [doi]
- Video Action Recognition Based on Hybrid Convolutional NetworkYanyan Song, Li Tan, Lina Zhou, Xinyue Lv, Zihao Ma. 451-462 [doi]
- Identification of Botany Terminology Based on Bert-BLSTM-CRFAziguli Wulamu, Ning Chen, Lijia Yang, Li Wang, Jiaxing Shi. 463-474 [doi]
- Correlation Analysis of Chinese Pork Concept Stocks Based on Big DataYujiao Liu, Lin He, Duohui Li, Xiaozhao Luo, Guo Peng, Xiaoping Fan, Guang Sun. 475-486 [doi]
- Visual SLAM Location Methods Based on Complex Scenes: A ReviewHanxiao Zhang, Jiansheng Peng. 487-498 [doi]
- Improvement of Co-training Based Recommender System with Machine LearningWenpan Tan, Yong He, Bing Zhu. 499-509 [doi]
- Privacy Security Classification (PSC) Model for the Attributes of Social Network UsersYao Xiao, Junguo Liao. 510-522 [doi]
- Clustering Analysis of Extreme Temperature Based on K-means AlgorithmWu Zeng, Yingxian Jiang, ZhanXiong Huo, Kun Hu. 523-533 [doi]
- Network Topology Boundary Routing IP Identification for IP GeolocationFuxiang Yuan, Fenlin Liu, Rui Xu, Yan Liu, Xiangyang Luo. 534-544 [doi]
- Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical PackageBin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, Yun Qing Shi 0001. 545-556 [doi]
- A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted EnvironmentWei She, Jian-Sen Chen, Feng Xian He, Xiaoyu Yang, Xuhong Lu, Zhihao Gu, Wei Liu 0043, Zhao Tian. 557-569 [doi]
- Multilayer Perceptron Based on Joint Training for Predicting PopularityWei She, Li Xu, Huibo Xu, Xiao-Qing Zhang, Yue Hu, Zhao Tian. 570-580 [doi]
- A Medical Blockchain Privacy Protection Model Based on Mimicry DefenseWei Liu 0043, Yufei Peng, Zhao Tian, Yang Li, Wei She. 581-592 [doi]
- Securing Data Communication of Internet of Things in 5G Using Network SteganographyYixiang Fang, Kai Tu, Kai Wu, Yi Peng, Junxiang Wang, Changlong Lu. 593-603 [doi]
- The Use of the Multi-objective Ant Colony Optimization Algorithm in Land Consolidation Project Site SelectionHua Wang, Weiwei Li, Jiqiang Niu, Dianfeng Liu. 604-616 [doi]
- Image Content Location Privacy Preserving in Social Network Travel Image SharingXiang Wang 0009, Canji Yang, Lingling Jiao, Qingqi Pei. 617-628 [doi]
- A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier TransformRenjie Liang, Peijia Zheng, Yanmei Fang, Tingting Song. 629-641 [doi]
- A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care SystemJinrun Guo, Xiehua Li, Jie Jiang. 642-652 [doi]
- Point-to-Point Offline Authentication Consensus Algorithm in the Internet of ThingsXiaofeng Du, Yueming Lu, Daoqi Han. 655-663 [doi]
- Classification of Tourism English Talents Based on Relevant Features Mining and Information FusionQin Miao, Li Wu, Jun Yang. 664-673 [doi]
- Research on Application of Big Data Combined with Probability Statistics in Training Applied TalentsLi Wu, Jun Yang. 674-685 [doi]
- Region Proposal for Line Insulator Based on the Improved Selective Search AlgorithmShuqiang Guo, Baohai Yue, Qianlong Bai, Huanqiang Lin, Xinxin Zhou. 686-696 [doi]
- A Collaborative Filtering Algorithm Based on the User Characteristics and Time WindowsDun Li, Cui Wang, Lun Li, Zhiyun Zheng. 697-709 [doi]
- MS-SAE: A General Model of Sentiment Analysis Based on Multimode Semantic Extraction and Sentiment Attention Enhancement MechanismKai Yang, Zhaowei Qu, Xiaoru Wang, Fu Li, Yueli Li, Dongbai Jia. 710-721 [doi]
- Research on Psychological Counseling and Personality Analysis Algorithm Based on Speech EmotionZhaojin Hong, Chenyang Wei, Yuan Zhuang, Ying Wang, Yiting Wang, Li Zhao. 725-737 [doi]
- Underwater Image Enhancement Based on Color Balance and Edge SharpeningYan Zhou 0004, Yibin Tang, Guanying Huo, Dabing Yu. 738-747 [doi]
- Stereo Matching Using Discriminative Feature-Oriented and Gradient-Constrained Dictionary LearningJiale Zhang, Yan Zhou 0004, Qingwu Li, Huixing Sheng, Dabing Yu, Xinyue Chang. 748-759 [doi]
- Acoustic Emission Recognition Based on Spectrogram and Acoustic FeaturesWei Wang, Weidong Liu, Jinming Liu. 760-768 [doi]
- Polyhedron Target Structure Information Extraction Method in Single Pixel Imaging SystemJin Zhang, Mengqiong Ge, Xiaoyu Shi, Zhuohao Weng, Jian Zhang. 769-775 [doi]
- Design and Implementation of Four-Meter Reading Sharing System Based on BlockchainBaoyu Xiang, Zhuo Yu, Ke Xie 0005, Shaoyong Guo, Meiling Dai, Sujie Shao. 776-785 [doi]
- Edge-Feedback ICN Cooperative Caching Strategy Based on Relative PopularityHuansong Li, Zhuo Yu, Ke Xie 0005, Xuesong Qiu, Shaoyong Guo. 786-797 [doi]
- Reliability Improvement Algorithm of Power Communication Network Based on Network Fault CharacteristicsRuide Li, Feng Wang, Xinxin Zhang, Jiajun Chen, Jie Tong. 798-804 [doi]
- Link Prediction Based on Modified Preferential Attachment for Weighted and Temporal NetworksXuehan Zhang, Xiaojuan Wang, Lianping Zhang. 805-814 [doi]