Abstract is missing.
- Security Use-Cases for Countering Threats of CLA and UAV in 6GKijung Bong, Jonghyun Kim. 10-15 [doi]
- Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang TransformRan Dong, Yangfei Lin, Qiong Chang, Junpei Zhong, DongSheng Cai, Soichiro Ikuno. 16-21 [doi]
- An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft DetectionChi-Tse Lu, Chun-Wei Tsai. 22-27 [doi]
- Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light ControlYu-Chen Luo, Chun-Wei Tsai. 28-33 [doi]
- CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence ArchitectureCong Zhou, BaoKang Zhao, Baosheng Wang, Yulei Yuan. 34-39 [doi]
- An Effective Neural Architecture Optimization Algorithm for CNN based on Search EconomicsYi-Ping Chen, Chun-Wei Tsai. 40-45 [doi]
- Visible Watermark Removal Based on Dual-input NetworkTong Li, Bingwen Feng, Guofeng Li, Xinzhen Li, Mingjin He, Peiya Li. 46-52 [doi]
- A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETsHsiao-Yuan Hsu, Nai-Hsin Cheng, Chun-Wei Tsai. 53-58 [doi]
- Search Economics for Multi-Objective Vehicle Routing Problem with Time WindowsWei-Lun Chuang, Chun-Wei Tsai, Ming-Chao Chiang. 59-64 [doi]
- A Training-free Genetic Neural Architecture SearchMeng-Ting Wu, Hung-I Lin, Chun-Wei Tsai. 65-70 [doi]
- Listening to the Crowd for the Change File Localization of Mobile AppsJianmao Xiao, Jia Zeng, Su Yao, Yuanlong Cao, Yiwen Jiang, Wenle Wang. 71-76 [doi]
- A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoTHuifen Feng, Xincheng Yan, Na Zhou, Zhihong Jiang, Ying Liu. 77-82 [doi]
- Real-Time Prediction of Ocean Observation Data Based on Transformer ModelWenqing Chang, Xiang Li, Huomin Dong, Chunxiao Wang, Zhigang Zhao, Yinglong Wang. 83-88 [doi]
- A Scheme of Traceless File Deletion for Windows FAT32 File SystemShujiang Xu, Fengkai Liu, Lingyun Meng, Lianhai Wang, Xu Chang, Weijun Yang. 89-93 [doi]
- Darknet Public Hazard Entity Recognition Based on Deep LearningPanpan Zhang, Xuebin Wang, Jing Ya, Jiapeng Zhao, Tingwen Liu, Jinqiao Shi. 94-100 [doi]
- In-network Computing based Transmission Optimization Mechanism in SDNZeyu Liu, Kexian Liu, Jing Zhang, Jianfeng Guan. 101-105 [doi]
- An Abused Webpage Detection Method Based on Screenshots Text RecognitionYan-Ming Huang, Dongjie Liu, Zhiwei Yan, Yan-Ming Zhang, Guang-Gang Geng. 106-110 [doi]
- Research on pork price prediction based on multi-dimensional feature analysis and machine learningXiaomin Zhu, Wenqian Du, Guanggang Geng, Bing Xue. 111-116 [doi]
- Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater TreatmentYiqi Liu, Longhua Yuan, Daoping Huang. 117-121 [doi]
- Heterogeneous multi-core optimization of MUMPS solver and its applicationJingshan Pan, Lei Xiao, Min Tian, Tao Liu, Li Wang. 122-127 [doi]
- Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative ComputingMaoli Wang, Kunlun Yang, Yining Zhao, Yalin Wang 0015, Jinan Guo, Xu Ma. 128-133 [doi]
- Deep Text Matching in Medical Question Answering SystemXiuhao Zhao, Zhao Li, Shiwei Wu, Yiming Zhan, Chao Zhang. 134-138 [doi]
- Blockchain-based Certificateless Identity Management Mechanism in Cloud-native EnvironmentsXuetao Li, Jingjian Zhang, Xiaotong Niu, Jianfeng Guan. 139-145 [doi]
- swMETIS: A high performance graph partitioning library on Sunway manycore architectureJunjie Wang, Min Tian, Shan Qiao. 146-151 [doi]
- An automatic many-core code generation method and its implementation under Sunway environmentJiawei Liu, Qiang Guo, Yuan Zhuang, Haihong Zhang, Yunhui Zeng. 152-157 [doi]
- Blockchain-Based Statistical Library for Telecom Security Fraud CasesHao Liu, Lejun Ji, Ting Xiong, Weijun Li, Lili Wang, Yuanlong Cao. 158-163 [doi]
- Intelligent Detection of Marine Organisms with Deep Learning based on Attention MechanismChuantao Li, Jidong Huo, Zhigang Zhao, Lu Wu. 164-169 [doi]
- ECNN: One Online Deep Learning Model for Streaming Ocean Data PredictionXiang Li 0064, Zhaoqian Zhang, Zhigang Zhao, Lu Wu, Jidong Huo, Jian Zhang, Yinglong Wang. 170-175 [doi]
- A Fast Light Baking System for Mobile VR Game Based on Edge Computing FrameworkMa Cheng, Wang Lu. 176-181 [doi]
- Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater TreatmentYiqi Liu, Kaqi Li, Daoping Huang. 182-187 [doi]
- Simulating QSAR Model of ERa Bioactivity by Statistics and Machine LearningDan Wang, Junjie Wang, Chaochao Yang, Yongqiang Ren. 188-193 [doi]
- Prediction effect of ADMET properties based on machine learningChaochao Yang, Junjie Wang, Anjun Liu, Dan Wang, Jie Hou, Meng Guo. 194-199 [doi]
- A Lightware Attribute Based Access Control Mechanism in Software Defined Internet of ThingsXu Han, Xincheng Yan, Na Zhou, Zhihong Jiang, Ranshuang Li, Ying Liu. 200-204 [doi]
- Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 ScenarioXuebin Wang, ZeYu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang. 205-210 [doi]
- ITGNN: Item Transition Attentive Graph Neural Network for Session-Based RecommendationChao Zhang, Zhao Li, Tong Chen, Yiming Zhan, Xiuhao Zhao. 211-216 [doi]
- A Delay-guaranteed Routing Mechanism Based on Active Network Telemetry in Deterministic NetworkShanghan Xie, Xincheng Yan, Na Zhou, Zhihong Jiang, Ying Liu. 217-222 [doi]
- Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group SignatureKunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu. 223-228 [doi]
- In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling AttackRunhu Wang, Zhuohao Wang, Dong Wang, Ying Liu. 229-233 [doi]
- Research of Big Data Storage System Based on Underground Space InformationChunxiao Wang, Zhigang Zhao, Jian Zhang, Jidong Huo. 234-239 [doi]