Abstract is missing.
- Weather Data and Agro-climate Indices - Comparative StudyYunan Li, Syeda Sana e Zainab, Sahraoui Dhelim, Mohand Tahar Kechadi. 1-7 [doi]
- A Multi-source Data Modelling Method for Reliability Evaluation based on conversion factor and improved Particle Swarm OptimizationLei Peng, Xiang Jia. 8-15 [doi]
- Granular-ball-based Fast Spectral Embedding Clustering Algorithm for Large-Scale DataShushu Liu, Dongdong Cheng, Jiang Xie 0002. 16-20 [doi]
- Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABETian Tong, Xinxin Wang, Qiong Gao, Limei Yu, Lijie Du, Yuan Sun. 21-28 [doi]
- Past Data-Driven Adaptation in Hierarchical Reinforcement LearningSijie Zhang, Aiguo Chen, Xincen Zhou, Tianzi Wang. 29-35 [doi]
- Research on Efficient Stream Cipher Design in Big Data EnvironmentShilin Liu, Zhexue Jin, YongZhen Li. 36-43 [doi]
- Towards a More Generic and Elastic Metadata Management Model in a Data Lake EnvironmentSoré Safiatou, Frédéric Tounwendyam Ouédraogo, Moustapha Bikienga, Yaya Traoré. 44-51 [doi]
- Application of a Remote-Sensing Ship Dataset Based on the Yolov5 ModelZhiyu Zhang, Ruilong Ouyang, Jingu Xie. 52-56 [doi]
- Flower pollination Algorithm based on triple differential evolution and its application in Research on the classification and leveling of power cloud dataJiamao Han, Yaxing Wei, Yingchao Zhen, Ji Shi, Lei Wang, Yu Zhang, Wenbo Sun, Rong Wu. 57-64 [doi]
- Break Two PSI-CA Protocols in Polynomial TimeYang Tan, Bo Lv. 65-72 [doi]
- An Anonymous Authentication Protocol Based on Blind Signature for Internet of ThingsYue Zhao, Bin Yang, Yarang Yang. 73-79 [doi]
- FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client TrackingQianyi Chen, Peijia Zheng, Yusong Du, Weiqi Luo 0001, Hongmei Liu 0001. 80-86 [doi]
- A heterogeneous graph-based approach for cyber threat attribution using threat intelligenceJunting Duan, Yujie Luo, Zhicheng Zhang, Jianjian Peng. 87-93 [doi]
- Study on The Effect of Encoding Method in Quantum Machine LearningQingqing Xiong, Jinzhe Jiang, Chen Li, Xin Zhang, Yaqian Zhao. 94-99 [doi]
- Applying XAI in Fashion-MNIST: Evaluating Hybrid Deep Neural Networks and Capsule NetworksRaad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken, Mais Rawwash. 100-107 [doi]
- Global Feature-guided Knowledge TracingYanyou Wei, Zheng Guan, Xue Wang, Yu Yan, Zhijun Yang. 108-114 [doi]
- FedRL: Federated Learning with Non-IID Data via Review LearningJinbo Wang, Ruijin Wang, Xikai Pei. 115-120 [doi]
- Combining Sentence-based Relational Features with Biaffine Mechanism for Triple ExtractionShaomu Lu, Weiwen Zhang, Lianglun Cheng. 121-127 [doi]
- Fine-Tuning LLMs for Multi-Turn Dialogues: Optimizing Cross-Entropy Loss with KL Divergence for All Rounds of ResponsesZeyu Teng, Yong Song, Xiaozhou Ye, Ye Ouyang. 128-133 [doi]
- An Evolutionary Approach to Forecasting Models HybridizationCamila Ascendina, Paulo Salgado Gomes de Mattos Neto, João Fausto Lorenzato de Oliveira, Péricles B. C. de Miranda. 134-139 [doi]
- Research on Movie Box Office Prediction Method Based on Blending Model FusionDequan Zheng, Yunjie Sun, Feng Yu 0021. 140-146 [doi]
- Prediction of gene regulatory networks based on graph attention mechanismsShi Huang Fei, Yuan Zhu. 147-152 [doi]
- Predicting Winter Wheat Emergence and Stem Elongation Time using CNNYunan Li, Sahraoui Dhelim, Mohand Tahar Kechadi. 153-160 [doi]
- Cost-Sensitive Ensemble Learning for Venture Capital Exit PredictionHeng Fang, Ding Ma. 161-167 [doi]
- Predicting wildfire events with calibrated probabilitiesNicolas Caron, Christophe Guyeux, Benjamin Aynes. 168-175 [doi]
- Multi-Scale Convolution Multi-Graph Attention Neural Networks for Traffic Flow ForecastingZihao Zhao, Yuxiang Jia, Zhihong Zhang. 176-184 [doi]
- Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware ClassificationRoberto Bruzzese. 185-193 [doi]
- A New Chinese Event Detection Method based on PMTNetXiaohua Ke, Zexian Ou, Xiaobo Wu, Binglong Li. 194-199 [doi]
- A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning TechniquesSrinivas Akkepalli, Sagar K. 200-205 [doi]
- Enhancing Network Intrusion Detection Through Dynamic IP BlacklistingZhiyan Lu, Hao Yang, Hao Wu, Yanli Niu. 206-210 [doi]
- Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection InsightsMike Jones, Masrufa Bayesh, Sharmin Jahan. 211-217 [doi]
- Temporal Convolution-based Hybrid Model Approach with Representation Learning for Real-Time Acoustic Anomaly DetectionSahan Dissanayaka, Manjusri Wickramasinghe, Pasindu Marasinghe. 218-227 [doi]
- Application case study, security challenges and countermeasures of AIGC in the context of metaverseLijuan Liu, Li Shi. 228-232 [doi]
- Parameter Automatic Generation Method For Extended Belief Rule BaseYunxia Zhang, Bingtao Wu, Tian Luo, Jing Bai. 233-237 [doi]
- FilterNet: A Convolutional Neural Network for Radar-Based Fall Detection by Filtering Out Non-fall Feature in the SpectrogramQi Yun Guan, Zuo Zhang, Yu Zi Liu, Wen Bin Ye 0001. 238-243 [doi]
- Forgery Detection in Aadhaar-based KYC using Deep LearningDamini Babbar, Aditya Jain, Ankit Sharma, Dipyaman Banerjee. 244-250 [doi]
- Light-Trans YOLO: A Lightweight Network Based on Transformer for Defect Detection of Industrial Lace SurfaceYa-Fei Wang, Jun-Feng Jing, Si Yu Sheng, Xin Tian Jiao. 251-256 [doi]
- Context-Aware Gridding Non-local Block for Improving Object Detection in UAV ImagesRuilin Yao, Shengwu Xiong, Yi Rong. 257-263 [doi]
- Defect detection for CCGA solder column based on machine visionQili Hou, Yang Wang, Banghua Chen, Song Xu, Lihong Yang. 264-270 [doi]
- Visual-Based Detection Method for Oil Leakage in Antarctic Power-Generation CabinXiao Ge, Tao Wang, Kanjian Zhang. 271-279 [doi]
- An intelligent detection method for assembly based on multi-model cascadeHanzhong Xu, Dianliang Wu, Kai Zou, Qihang Yu, Haiwen Yu. 280-286 [doi]
- Lightweight Object Detection-Tracking using Deep Feature DistillationBin Xue, Qinghua Zheng, Zhinan Li, Weihu Zhao, Heling Wang, Xue Feng. 287-291 [doi]
- Ash Content Detection in Coal Slime Flotation Tailings Based on MobileViTWenbo Zhu, Neng Liu, Zhengjun Zhu, Haibing Li, Zhongbo Zhang, Xinghao Zhang. 292-297 [doi]
- Dual Part Siamese Attention Convolution Network for Change detection in Bi-temporal High Resolution Remote Sensing ImagesZongpu Li, Tengfei Bao, Zhiyun Xiao. 298-303 [doi]
- Backbone Feature Hierarchy Selection Strategy and Verification in Small Object DetectionBin Zhang, Meizhen Luo, Shankai Yan, Juan Hu, Ling Peng, Liangshun Wu, Yujuan Wang. 304-310 [doi]
- Bad Weather Condition Shadow detection of Docking Aircraft AlgorithmYan-Ying Guo, Zhi-gang Liu, Jun Yan Lu. 311-315 [doi]
- A method for calculating target data coverage based on 3D modelXiangzhen Li, Ping Huang, Kan Zhou, Peng Zhang, Qiujie Zhang, Xiaohang Wang. 316-320 [doi]
- SCC-Conv: A Novel Convolution with Spatial-Channel Cheap Operation for Single Image Super-ResolutionYin Huang, Ziyang Zhang, Kailing Guo, Xiangmin Xu. 321-326 [doi]
- Automatic Machine Learning based Real Time Multi-Tasking Image FusionShahid Karim, Geng Tong, Jinyang Li, Xiaochang Yu, Jia Hao, Yiting Yu. 327-333 [doi]
- Toward Photo-Realistic Facial Animation Generation Based on Keypoint FeaturesZikai Shu, Takashi Nose, Akinori Ito. 334-339 [doi]
- Reference-based Video Colorization with AB Chrominance Point and Temporal PropagationYizhang Yang, Jianxiu Jin, Ying Huang, Kailing Guo, Xiangmin Xu. 340-346 [doi]
- 3VFP: Three-View Feature Propagation Entity AlignmentChaoqun Jiang, Chengxiang Tan, Zhishuo Zhang. 347-354 [doi]
- Generative-AI- and Optical-Flow-Based Aspect Ratio Enhancement of VideosTomasz Jan Palczewski, Anirudh Rao, Yingnan Zhu. 355-362 [doi]
- A Study on Semantic Segmentation for Small Objects in High-resolution Aerial Images based on Mask R-CNN and HRNetSicong Wang, Yujie Yin, Longrui Yang, Xiyuan Wang, Xijun Zhang. 363-368 [doi]
- Efficient 3D Reconstruction of Multiple Plants from UAV Images with Deep LearningHong Huang, Zhuowei Wang 0001, Genping Zhao. 369-375 [doi]
- Research on clustering of non-uniformly distributed point clouds in road scenesLin Li, Haili Zhao, Zhen-hui, Rongxin Mi, Weikuang Li, Zixuan Chen. 376-381 [doi]
- An infrared target identification method based on complementary fusion featuresJunchang Zhang, JiaMing Xie. 382-388 [doi]
- Image Generation of Egyptian HieroglyphsSong Gao, Bo Hui, Wanwan Li. 389-397 [doi]
- UAV Farmland Object Tracking Based on Improved QDTrackZhuolin Li, Xiaoting Yu, Dashuai Wang, Xiaoguang Liu 0002. 398-403 [doi]
- Mpox-PyramidTransferNet: A Hierarchical Transfer Learning Framework for Monkeypox and Dermatological Disease ClassificationJuanxi Tian, Kaixin Zhu, Wentao Fan. 404-410 [doi]
- Visual-Semantic Alignment for Few-shot Remote Sensing Scene ClassificationHaojun Li, Linjia Li, Wei Luo. 411-417 [doi]
- Preferred Feature Representation for Remote Sensing Scene ClassificationMeng Yang, Yaxiong Chen, Xiongbo Lu, Shengwu Xiong. 418-423 [doi]
- SRCPT: Spatial Reconstruction Contrastive Pretext Task for Improving Few-Shot Image ClassificationZhenbang Wang, Pengfei Duan, Yi Rong. 424-432 [doi]
- Classification and Segmentation of Apple Diseases Based on Deep LearningHuanzhou Huang, Zhuowei Wang 0001, Genping Zhao. 433-440 [doi]
- AdaBoost-Based 3D Object Classification from Surface and Depth Map DescriptorsWentao Dou, Jiaqi Sun, Dongmei Niu, Jingliang Peng. 441-446 [doi]
- Convolutionally Enhanced Feature Fusion Visual Transformer for Fine-Grained Visual ClassificationMin Huang, Saixing Zhu, Zehua Wang, Shuanghong Qu. 447-452 [doi]
- Direct vs. Cross-Validated Stacking in Ensemble Learning: Evaluating the Trade-Off between Inference Time and Generalizability on Fashion-MNISTRaad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken. 453-461 [doi]
- Hierarchy Generation and Exploitation via Extended Local Classification SchemesCelal Alagoz. 462-469 [doi]
- Better Generalization in Fast Training: Flat Trainable Weight in SubspaceZehao Lei, Yingwen Wu, Tao Li. 470-477 [doi]
- Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous GraphAbhishek Periwal, Adhish Prasoon. 478-484 [doi]
- Learning Task-Specific Embeddings for Few-Shot Classification via Local Weight AdaptationNianru Gong, Pengfei Duan, Yi Rong. 485-491 [doi]
- Continual Few-Shot Relation Learning Via Dynamic Margin Loss and Space RecallYongbing Li, Pengfei Duan, Yi Rong, Yiwen Yang, Aoxing Wang. 492-497 [doi]
- Soft Adversarial Offline Reinforcement Learning via Reducing the Attack Strength for GeneralizationWandi Qiao, Rui Yang. 498-505 [doi]
- Research on the Application of Word2Vec-Based Job-Person Matching Methods in Corporate RecruitmentRonghui Pang. 506-510 [doi]
- Research on the Market Structure Visualization of Chinese High-Liquidity Equity ETFs Based on the Affinity Propagation AlgorithmYakun Wang, Lili Xu, Liangze Mo. 511-516 [doi]
- Multi-modal Contextual Prompt Learning for Multi-label Classification with Partial LabelsRui Wang, Zhengxin Pan, Fangyu Wu 0001, Yifan Lv, Bailing Zhang. 517-524 [doi]
- Character Expressions in Meta-Learning for Extremely Low Resource Language Speech RecognitionRui Zhou, Akinori Ito, Takashi Nose. 525-529 [doi]
- Distilling Multi-Step Reasoning Capabilities into Smaller Language ModelYauwai Yim, Zirui Wang. 530-535 [doi]
- BERT-Based Models with Attention Mechanism and Lambda Layer for Biomedical Named Entity RecognitionYuning Shi, Masaomi Kimura. 536-544 [doi]
- BP-TEG: Topic-to-Essay Generation for Official DocumentsHaiying Zhang, Yunmei Shi, Teng Yang. 545-556 [doi]
- Chinese NER Based on Adversarial Training and Interactive AttentionSihao Wu, Xiaoling Wu, Rui Xie, Wentao Zhan. 557-561 [doi]
- Chinese Named Entity Recognition in the Ship News Field Based on Adversarial Transfer LearningZhihong Zhu, Weiwen Zhang, Hongbin Zhang 0008, Lianglun Cheng. 562-567 [doi]
- An Effective Model for Aspect Category Sentiment Analysis on a Chinese Tobacco DatasetYixiang Huang, Juan Yang, Ding Xiao. 568-573 [doi]
- SETE: Syntax-Enhanced Triplet Extraction with Semantic ConsistencyYuchen Shi, Deqing Yang. 574-581 [doi]
- Bridging Language and Culture: Applying NLP Methods for Topic Classification of Couplets using BERTShayan Shariff, Ali Adnan, Muhammad Qasim Pasta. 582-586 [doi]
- An Aspect Sentiment Triplet Extraction Method based on Syntax-Guided Muti-Turn Machine Reading ComprehensionZhou Yong Mei, Huang Wei Feng, Wang Ji Gang, Wang Ze Peng, Zhou Dong, Yang Ai Min. 587-593 [doi]
- Mining Minds: Predicting IQ Scores Using Social Media Textual AnalyticsRaad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken. 594-601 [doi]
- Fine-grained sentiment Feature Extraction Method for Cross-modal Sentiment AnalysisYe Sun, Guozhe Jin, Yahui Zhao, Rongyi Cui. 602-608 [doi]
- QuDial: A Quadruple-driven Dialogue System for Real Estate Consulting ServicesShuling Yang, Hanzhu Chen, Binbin Fang 0002. 609-615 [doi]
- An Intelligent Risk Mining Method by Whole Process-Oriented Risk Analysis ModelLijuan Liu, Li Shi. 616-620 [doi]
- Multi-Objective Deep Reinforcement Learning for Variable Speed Limit ControlAsmae Rhanizar, Zineb El Akkaoui. 621-627 [doi]
- Multi-level Disentangled Contrastive Learning on Heterogeneous GraphsTong Lin, Cangqi Zhou, Qianmu Li, Dianming Hu. 628-634 [doi]
- Learning Presolver Selection for Mixed-Integer Linear ProgrammingWentao Song, Naijie Gu. 635-641 [doi]
- A lightweight single object tracking algorithm for low-power embedded devicesYuxin Zhang, Jun Wu, Honglin Chen, Jiajing Xu, Zhen Huang. 642-648 [doi]
- MESCM: A Multi-stage Explainable Similar Case Matching FrameworkHonglin Shi, Xin Zhang, Bin Ge, Sheng Zhang, Dongxu Zhao. 649-657 [doi]
- Copula-based Cox Regression to Modelling Bivariate Time-to-Event DataDuhania Oktasya Mahara, Santi Wulan Purnami, Shofi Andari. 658-664 [doi]
- Evaluation of Environmental Sound Classification using Vision TransformerChanglong Wang, Akinori Ito, Takashi Nose, Chia-Ping Chen. 665-669 [doi]
- PDE-Net: Pyramid Depth Estimation Network for Light FieldsQiong Wang, Yan Li. 670-676 [doi]
- Integrated Artificial Intelligence for Making Digital Human IIYoshiyuki Usami, Shota Moro. 677-683 [doi]
- Optimizing Chiller Defrosting Control through Spiking Neural Networks-Based MethodJingyu Chen, Xiaojie Zhou. 684-692 [doi]
- Structural Subspace Learning for Few-shot Fine-grained RecognitionLinjia Li, Jin Deng, Ying Huang, Yanyan Chen, Wei Luo. 693-699 [doi]
- Task-aware Local Representation Mining Network for Few-shot Fine-grained RecognitionLihan Lin, Jin Deng, Ying Huang, Yanyan Chen, Wei Luo. 700-706 [doi]
- Music style classification by jointly using CNN and TransformerRui Tang, Miao Qi, Nanqing Wang. 707-712 [doi]
- Analyzing Role of Artificial Intelligence in Project Management and Investment Risk: A CiteSpace InsightShuang Lai, Shaoqian Zhang, Abual Hassan, Ray Tahir Mushtaq. 713-719 [doi]
- An Efficient Energy Efficiency Maximization Algorithm for Backscatter-Assisted WP-MEC Network with RelayTongyu Wu, Huaiwen He. 720-727 [doi]
- Comprehensive Evaluation Method for Wireless Network Optimization Scheme Based on Improved TOPSISYe Peng, Zhuang Jun Bo, Zhou Qiang, Wang Xi, Chen Wen Bin, Zhou Xing. 728-733 [doi]
- Modeling and Analysis Method of Dependency Network Based on Kill Chain and FDNAYushuai Wang, Guangya Si. 734-740 [doi]
- Multi-task Learning Model for Location Estimation Using RSSI of Wireless LAN in NLoS EnvironmentZehui Wei, Jianbing Ding, Zening Wang, Xidong Wang, Xiaozhou Ye, Ye Ouyang. 741-744 [doi]