Abstract is missing.
- Improved Label Fusion Method Based on D-S Evidence Theory Using Subjective and Objective WeightsYujie Shi, Yongli Wang. 1-7 [doi]
- Near-Linear Scaling Data Parallel Training with Overlapping-Aware Gradient CompressionLin Meng, Yuzhong Sun, Weimin Li. 8-15 [doi]
- Performance Evaluation of Distributed k-WTA on Dynamic Undirected Connected Graphs and Its Application to Task AllocationKexin Liu, Yinyan Zhang. 16-23 [doi]
- Accelerating zk-SNARK with Group and Zone Optimization on GPURunnan Shen, Liang Wang, Haotian Luo, Rui Yang, Jinqian Yang, Jinquan Wang, Qiancheng Sun, Limin Xiao, Jin Dong. 24-31 [doi]
- Realistic Sketch Face Generation via Sketch-Guided Incomplete RestorationZijie Liu, Chunhua Gu, Ying Xie, Huichen Zhang, Songwen Pei. 32-37 [doi]
- Identifying Performance Bottleneck in Shared In-Network Aggregation during Distributed TrainingChang Liu, Jiaqi Zheng, Wenfei Wu, Bohan Zhao, Wei Nie, Xiaoyu Yi, Guihai Chen. 38-45 [doi]
- AFL-CS: Asynchronous Federated Learning with Cosine Similarity-based Penalty Term and AggregationBingjie Yan, Xinlong Jiang, Yiqiang Chen, Chenlong Gao, Xuequn Liu. 46-53 [doi]
- An Improved Affine Projection Sign Algorithm Based on Individual-Weighting FactorsXia Ni, Ji Zhao 0005, Qiang Li 0034, Lingli Tang, Hongbin Zhang 0002. 54-59 [doi]
- SR2C: A Structurally Redundant Short Reads Collapser for Optimizing DNA Data CompressionHui Sun, Huidong Ma, Yingfeng Zheng, Haonan Xie, Xiaofei Wang, Xiaoguang Liu, Gang Wang. 60-67 [doi]
- A Cooperative Co-evolutionary Salp Swarm Feature Selection Algorithm with Reverse Escape Strategy for ClassificationZikang Yu, Hongbin Dong, Jing Sun, Bingxu Zhao. 68-75 [doi]
- An Efficient Network Flow Rules Compression Method Based On In-Network Computation On Cloud ComputingPenghao Zhang, Xinyi Zhang. 76-83 [doi]
- Information Entropy Composition Algorithms for Multipath Trust Relationships in Trust PropagationXuefei Li, Lei Xu, Ru Li. 84-91 [doi]
- ISADL: An Instruction Set Architecture Description Language for VLIWXin Xiao, Zhong Liu. 92-99 [doi]
- FGCache: Accelerating Aggregation Queries for OLAP Applications via CachingCan Wang, Peiquan Jin, Yongping Luo, Xiaoliang Wang, Shouhong Wan. 100-105 [doi]
- Deep Learning-based Digital Twin for Human Activity RecognitionJian Su, Zhenlong Liao, Qiankun Mao, Zhengguo Sheng, Alex X. Liu. 106-111 [doi]
- Object-based Appearance-Motion Heterogeneous Network for Video Question AnsweringFeifei Xu, Zheng Zhong, Yitao Zhu, Guangzhen Li, Yingchen Zhou, Wang Zhou. 112-119 [doi]
- Delay and Battery Degradation Optimization based on PPO for Task Offloading in RSU-assisted IoVWei Zhao 0023, Runhu Zhong, Cheng Wu, Xinwei Xu. 120-125 [doi]
- A Frequency-aware Grouping Strategy for Stateful Operators in Distributed Stream Processing SystemsDawei Sun 0001, Zhe Chen, Weilong Lv, Shang Gao 0003, Jia Rong. 126-131 [doi]
- A Bit Level Acceleration of Mixed Precision Neural NetworkDehui Qiu, Jing Wang, Yi Hou, Weigong Zhang, Lan Gao. 132-137 [doi]
- Forward Difference Properties of the (n, k)-Star Graph and Some Other Interconnection NetworksEddie Cheng 0001, Ethan Gibbons, Ke Qiu 0001, Zhizhang Shen. 138-145 [doi]
- ReQ-tank: Fine-grained Distributed Machine Learning Flow Scheduling ApproachQuanyi Xu, Kedong Yan, Dan Yin, Chanying Huang, Shan Xiao, Yuxin Yang. 146-152 [doi]
- CDCP: A Framework for Accelerating Dynamic Channel Pruning MethodsZhaohong Xiang, Yigui Luo, Yin Xie, Haihong She, Weiming Liang, Laigang Zhao. 153-160 [doi]
- PCU-Net: An enhanced U-network by combining PPM and CBAM for Medical Image SegmentationHejian Chen, Zhongming Fu, Li Liu, Mengsi He, Jiayi Deng, Zhuo Tang. 161-166 [doi]
- NREE: Nested Relation Extraction in the Economic FieldYifang Zhang, Pengfei Duan, Aoni Wu, Wenyan Hu, Shengwu Xiong. 167-173 [doi]
- A Caching Placement Strategy Based on Dynamic Router Hierarchy for Named Data NetworkingHaotian Wang, Mingzhu Zhao, Meiju Yu. 174-179 [doi]
- PFN: A Target Item-enhanced Click-Through Rate Prediction via Parallel Fusion NetworkLin Zhang, Fang'ai Liu, Yinghua Li, Xuqiang Zhuang, Xiaohui Zhao 0002. 180-185 [doi]
- Three Preemption Approaches towards EDF Scheduling for Homogeneous MultiprocessorsPeng Wu, Zhi Li, Zhicai Zhang, Tao Yan, Lu Chen. 186-193 [doi]
- ISAA: Boost Repair Process by Constructing the Degree Constrained Optimal Repair Tree for Erasure-coded SystemsXianzhi Du, Bing Zhu 0003, Zhihang Deng, Kenneth W. Shum, Weiping Wang 0003. 194-199 [doi]
- Accelerating the LZ-complexity algorithmJoel Ratsaby, Alexander Timashkov. 200-207 [doi]
- Parallel Truss Maintenance of Dynamic GraphsLongzhi Li, Yuncheng Jiang. 208-215 [doi]
- A Bilateral Stable Matching Dispatching Method in Crowdsource Food Delivery ServiceFeihong Huang, Wei Jiang. 216-222 [doi]
- EagerReuse: An Efficient Memory Reuse Approach for Complex Computational GraphRuyi Qian, Bojun Cao, Mengjuan Gao, Qinwen Shi, Yida Wang, Yuanchao Xu 0002, Qirun Huo, Keni Qiu. 223-229 [doi]
- An Auto-Parallel Method for Deep Learning Models Based on Genetic AlgorithmYan Zeng, Chengchuang Huang, Yijie Ni, Chunbao Zhou, Jilin Zhang, Jue Wang, Mingyao Zhou, Meiting Xue, Yunquan Zhang. 230-235 [doi]
- META: Motion Excitation With Temporal Attention for Compressed Video Action RecognitionShaojie Li, Jiaqi Li, Jinxin Guo, Ming Ma 0006. 236-241 [doi]
- Robust optimization for minimizing total tardiness on unrelated parallel machine schedulingYibo Han, Qi Qi, Ni Li, Jinqing Li. 242-247 [doi]
- Ensemble Distillation for Out-of-distribution DetectionDongdong Wang, Jingyao Xu, Siyang Lu, Xiang Wei 0007, Liqiang Wang. 248-253 [doi]
- Radio Environment Map Based Routing Protocol for UAV NetworksSiyue Zheng, Xiaojun Zhu 0001, Zhenrui Qin, Chao Dong 0001. 254-259 [doi]
- Demystifying Decentralized Matrix Communication Network: Ecosystem and SecurityHao Li, Yanbo Wu, Ronghong Huang, Xianghang Mi, Chengyu Hu, Shanqing Guo. 260-267 [doi]
- BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7Zhiyao Li, Aimin Li, Yuechen Zhang, Xiaotong Kong, Wenqiang Li. 268-274 [doi]
- A Self-Iteration Code Generation Method Based on Large Language ModelsTianyou Chang, Shizhan Chen, Guodong Fan, Zhiyong Feng 0002. 275-281 [doi]
- LIFM: A Persistent Learned Index for Flash MemoryShuhao Song, Peiquan Jin, Zhaole Chu, Yongping Luo, Shouhong Wan. 282-287 [doi]
- Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly DetectionFan Xu, Nan Wang, Xuezhi Wen, Meiqi Gao, Chaoqun Guo, Xibin Zhao. 288-295 [doi]
- AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway SupercomputerMin Tian, Qi Liu, Yanlong Li, Wei Du, Zenghui Ren, Yue Liu. 296-301 [doi]
- Personalized Federated Learning with Local Optimization ModelsShenhai Zheng, Haihan Xu, Peng Han, Yuanyuan Li, Yufei Chen, Qing Chen. 302-307 [doi]
- DTtree: A Novel Read/Write-Optimized Learned Index for Database SystemsZhuohan Yu, Peiquan Jin, Zhaole Chu, Yongping Luo, Xiaoliang Wang, Shouhong Wan. 308-313 [doi]
- Anomaly Detection with Graph Attention Network for Multimodal IoT Data MonitoringHaoyu Li, Yi Gao 0001, Wei Dong 0001. 314-319 [doi]
- Clustering Information-guided Multi-view Contrastive Graph ClusteringYaliang Zhao, Tianchi Zhang, Jinke Wang. 320-326 [doi]
- D-CoA: Probability Density-based Confidence Assignment Semi-Supervised Clustering EnsembleYaqi Li, Lizhi Peng, Yihang Hao, Hui Li, Xiang Chen, Bo Yang 0001. 327-332 [doi]
- Accelerating Look-Up Table based Matrix Multiplication on GPUsYuchen Zhao, Lan Gao, Weigong Zhang, Jing Wang 0055, Dehui Qiu. 333-339 [doi]
- ProDE: Interpretable APT Detection Method Based on Encoder-decoder ArchitectureFengxi Zhou, Baoming Chang, Yu Wen, Dan Meng. 340-347 [doi]
- Recognizing Semantics-Consistent Subsequences for Sequential RecommendationWenhui Zhu, Yanmin Zhu, Zhaobo Wang, Mengyuan Jing, Qinghua Chen. 348-354 [doi]
- An Optimized Lossless Graph Summarization for Large-Scale GraphsMeiquan Lai, Yaqi Huang, Zhidan Liu 0001, Kaishun Wu. 355-362 [doi]
- Self-supervised Multi-task Distillation for Few-shot ClassificationEnze Ji, Shi Chen, Tiandong Ji, Jing Li, Zhikui Chen. 363-369 [doi]
- Secure CNN Training and Inference based on Multi-key Fully Homomorphic EncryptionHong Qin, Debiao He, Qi Feng, Min Luo 0002. 370-377 [doi]
- ISUAM: Intelligent and Safe UAM with Deep Reinforcement LearningCristiano P. Garcia, Weigang Li 0001, Nina S. T. Hirata, Clovis Neumann. 378-383 [doi]
- An Effective Index for Truss-based Community Search on Large Directed GraphsWei Ai 0001, CanHao Xie, Tao Meng, Yinghao Wu, Keqin Li 0001. 384-389 [doi]
- Fast Butterfly-Core Community Search For Large Labeled GraphsJiayi Du, Yinghao Wu, Wei Ai 0001, Tao Meng, CanHao Xie, Keqin Li 0001. 390-396 [doi]
- A Two-Stage Multimodal Emotion Recognition Model Based on Graph Contrastive LearningWei Ai 0001, Fuchen Zhang, Tao Meng, Yuntao Shou, Hongen Shao, Keqin Li 0001. 397-404 [doi]
- OL-CBBA: An Online Task Allocation Algorithm under Weak Communication ConditionsJun Li, Wanrong Huang, Honglin Wu, Zhongxuan Cai, Yongjun Zhang. 405-411 [doi]
- Dynamic Priority Job Scheduling on a Hadoop YARN PlatformNana Du, Yudong Ji, Aiqin Hou, Chase Q. Wu, Weike Nie. 412-419 [doi]
- SDAN-YOLO:Self-attention domain adaptive network for YOLOv7Jian Zhang, Youcao Xiong, Haowei Li, Jianbiao He. 420-427 [doi]
- RTCoder: An Approach based on Retrieve-template for Automatic Code GenerationTianyou Chang, Shizhan Chen, Guodong Fan, Zhiyong Feng 0002. 428-434 [doi]
- Pipelined Training and Transmission for Federated LearningYihui Shen, Hong Zhang, Juncheng Jia, Tao Deng, Zhenhua Wang, Zhiwei Teng, Mianxiong Dong. 435-442 [doi]
- Weighted Sampled Split Learning (WSSL): Balancing Privacy, Robustness, and Fairness in Distributed Learning EnvironmentsManish Osti, Aashray Thakuri, Basheer Qolomany, Aos Mulahuwaish. 443-450 [doi]
- An Incentive Mechanism for Consortium Blockchain-based Cross-Silo Federated LearningKai Li, Zhicai Zhang, Fang Fu. 451-458 [doi]
- Research on long and short-term social recommendation based on convolutional and gated recurrent unitsZihe Jia, Peng Xue, Zhiqiang Dai, Qian Gao 0003, Xiaomeng Zhang. 459-466 [doi]
- SGRU: A High-Performance Structured Gated Recurrent Unit for Traffic Flow PredictionWenfeng Zhang, Xin Li, Anqi Li, Xiaoting Huang, Ti Wang, HongLei Gao. 467-473 [doi]
- PPCE: Privacy-Preserving Contribution Evaluation for Fairness-Aware Federated LearningKe Geng, Lingling Wang, Zhengyin Zhang, Zhongkai Lu, Mei Huang. 474-480 [doi]
- 3D Single Target Tracking Algorithm Based on Dynamic Search CenterYanping Zhu, Qi Chen, Aimin Jiang, Chenyang Zhu 0001, Chang Liu, Wenlong Chen. 481-488 [doi]
- AL-Annotator: An Active Learning-based Cervical Cell Annotation SystemYangbo Jiang, Shuting Zhang, Jinggen Wu, Xumei Zhu, Xiao Liu, Nenggan Zheng. 489-495 [doi]
- Variational Graph Autoencoder Based on High-Order Attention MechanismLiang Ge, Yiping Lin, Haifeng Li, Junwei Xie. 496-502 [doi]
- Fast RFM Analysis in Sequence DataYanxin Zheng, Wensheng Gan, Zefeng Chen, Pinlyu Zhou, Xiangxiao Diao. 503-510 [doi]
- PM2.5 Pollution Prediction Service based on Mogrifier LSTM ModelJing Liu, Ming Lian. 511-516 [doi]
- A PPO-Based Dynamic Asynchronous Semi-Decentralized Federated Edge LearningYaqin Li, Zhicai Zhang, Fang Fu, Yan Wang. 517-524 [doi]
- Mitigating Distribution Shifts in Pollen Classification from Microscopic Images Using Geometric Data AugmentationsNam Cao, Olga Saukh. 525-533 [doi]
- STDA-Meta: A Meta-Learning Framework for Few-Shot Traffic PredictionMaoxiang Sun, Weilong Ding, Tianpu Zhang, Zijian Liu, Mengda Xing, Jihai Huang. 534-541 [doi]
- Differentially Private Federated Learning via Alternating Direction Method of MultipliersLuyan Yang. 542-548 [doi]
- Hybrid Parallel Inference for Large Model on Heterogeneous Clusters for High ThroughputChaonong Xu, Weiming Kong, Min Liu, Mingming Zhang, Chao Li, Luqi Gong. 549-554 [doi]
- ESIREOS: Efficient, Scalable, Internal, Relative Evaluation of Outliers SolutionsWilliam A. Alves, Henrique O. Marques, Murilo Coelho Naldi, Jörg Sander 0001. 555-562 [doi]
- Automatic Program Repair via Learning Edits on Sequence Code Property GraphXiaoyu Li, JingZheng Wu, Xiang Ling 0001, Tianyue Luo, Yanjun Wu. 563-570 [doi]
- CP-Decomposition Based Federated Learning with Shapley Value AggregationChengqian Wu, Xuemei Fu, Xiangli Yang, Ruonan Zhao, Qidong Wu, Tinghua Zhang. 571-577 [doi]
- Prospect Theory-Based Federated Learning Incentive Mechanism for Industrial IoTFang Fu, Yan Wang, Zhicai Zhang, Yaqin Li. 578-585 [doi]
- Tensor-Train-based Lightweight Encryption in Federated Cloud EnvironmentsJiangtao Ma, Yunfan Zhang, Huazhong Liu, Peng Tan, Jihong Ding, Qiao Pan. 586-593 [doi]
- Range-Aware Hand Gesture Recognition Using FMCW Radar and Deep LearningYosuke Iida, Mingyang Fan, Walid Brahim, Jianhua Ma 0001, Muxin Ma, Alex Qi. 602-609 [doi]
- Performance Modeling of Blockchains of BFT-type ConsensusBo Li, Chenhao Jiang, Hanwen Zhang, Zhongcheng Li, Yi Sun 0004. 610-616 [doi]
- Secure and Trusted Copyright Protection for Educational Data on Redactable BlockchainsLi-e. Wang, Yi Wei, Peng Liu, Xianxian Li. 617-622 [doi]
- SecDFS: A Secure and Decentralized File SystemShenglong Zhao, Zhichao Hua 0001, Yubin Xia. 623-630 [doi]
- Blockchain-based Pricing Mechanism Research on IoT Data TransactionsShiqi Ding, Shaoyong Guo, Chang Liu, Zhili Wang. 631-638 [doi]
- DTSAC: Smart Contract-based Access Control with Delegation and Trust ManagementJunguo Liao, Qiong Wu. 639-644 [doi]
- Game-Theoretic Analysis of (Non-)Refundable Fees in the Lightning NetworkSatwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos. 645-652 [doi]
- A High-Performance Smart Contract Vulnerability Detection Scheme Based on BERTShengqiang Zeng, Ruhuang Chen, Hongwei Zhang, Jinsong Wang. 653-658 [doi]
- A Comprehensive Robustness Analysis of Storj DCS Under Coordinated DDoS AttackRohon Kundu, Christian Gehrmann, Maria Kihl. 659-666 [doi]
- S-chain: A Shard-based Blockchain Scheme for Cross-chain SupervisionYuwei Xu, Yuxing Song, Junyu Zeng, Ran He 0003, Jingdong Xu. 667-674 [doi]
- DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong ConcealmentYuwei Xu, Zehui Wu, Jie Cao 0009, Jingdong Xu, Guang Cheng 0001. 675-682 [doi]
- SvaVoting: A Novel Secret Sharing-Based Verifiable and Anonymous E-Voting Scheme in Blockchain SystemsJingyu Zhang, Chenghao Wu, Jin Yang, Lailong Luo. 683-690 [doi]
- MoryFabric : Reducing Transaction Abort by Actual Validity Verification and ReorderingJinlong He, Yang Liu 0168, Jingwen Chen, Song Peng, Yaoqi Wang, Miaomiao Zhang. 691-698 [doi]
- Reputation-Based Streamlet: An Enhanced BFT Consensus Algorithm for Improved Performance and ScalabilityBo Fang, Dancheng Zhao, Taotao Wang, Hao Wang, Shengli Zhang, Qing Yang 0006. 699-706 [doi]
- SOID: Towards an Efficient Incremental Deployment Scheme for Source Address ValidationShu Yang 0002, Bingqian Song, Laizhong Cui. 707-714 [doi]
- Distributed Key Derivation for Multi-Party Management of Blockchain Digital AssetsLin Zhong, Yujue Wang, Yong Ding 0005, Jun Du, Kevin He, Andrew Zhang. 715-720 [doi]
- DFAR: Dynamic-threshold Fault-tolerant Adaptive Routing for Fat Tree NetworksBinyan Lan, Fei Lei, Dezun Dong, Ke Wu, Xiaoyun Zhang. 721-728 [doi]
- A Reverse Auction-Based Incentive Mechanism for Cost-Effective Data Collection in Mobile CrowdsensingMinghe Zhang, Botao Wang, Gang Liu, Jing Huang. 729-736 [doi]
- Characterization of Large-scale HPC Workloads with non-naïve I/O Roofline Modeling and ScoringZhaobin Zhu, Sarah Neuwirth. 737-744 [doi]
- Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job Power Consumption Prediction FrameworkJie Zhang, Jian Song, Xiang Li 0064, Xuesen Tian, Zhigang Zhao, Lu Wu, Chunxiao Wang. 745-750 [doi]
- Accelerating Big Data Application by Eliminating Redundancy on Hadoop ClusterKelun Lei, Shaokang Du, Xin You, Zhibo Xuan, Haoran Kong, Hailong Yang, Jing Shang, Zhiwen Xiao, Zhihui Wu, Zhongzhi Luan, Depei Qian. 751-756 [doi]
- Intermittent fault diagnosability of a class of hypercube-family networks under the PMC modelHao Feng, Jiong Wu, Lin Chen. 757-764 [doi]
- SA_TRSM: A Shape-Aware Auto-Tuning Framework for Small-Scale Irregular-Shaped TRSMRongyuan Guo, Haipeng Jia, Yunquan Zhang, Mingsen Deng, Cunyang Wei, Wenbin Chang, Xiang Zhao. 765-774 [doi]
- GraphPar: Efficient Workload-Aware Subgraph Matching System on Multiple GPUsKewei Zhang, Junmin Xiao, Zhiheng Lin, Ke Meng, Chaoyang Shui, Mingyi Li, Guangming Tan. 775-782 [doi]
- CustTest: An Effective Testbed for Testing Customized Routing in Integrated Heterogeneous NetworksJialei Zhang, Xiaoxuan Xie, Zheng Yan 0002, Haiguang Wang, Tieyan Li. 783-790 [doi]
- A Fine-Grained Packet Loss Management System Based on Programmable NetworkYaru Shen, Anbang Wan, Yuhui Chen. 791-798 [doi]
- Characterizing Performance Impacts of Subnormal Numbers on Vector Instructions and Transcendental FunctionsXudong Wang, James Lin, Qiucheng Liao. 799-806 [doi]
- Formation Control Optimization via Virtual Leader Exploration with Deep Reinforcement Learning for Unmanned Aerial VehiclesKangwei Zhao, Xiangping Bryce Zhai, Jing Zhu, Chee-Wei Tan 0001. 807-812 [doi]
- Formalization and Verification of RocketMQ Using CSPYiwen Liu, Hongyan Mao, Ning Qin, Kai Chen. 813-819 [doi]
- DEDF: An Enhanced Differential Evolution Algorithm with Dynamic-selection Framework in IIOTZhou Zhou 0001, Fangmin Li, Huazhong Liu. 820-825 [doi]
- Spatial and Temporal Dual-Scale Adaptive Pruning for Point Cloud VideosSongyu Xie, Jing Liu 0032, Cen Chen, Zhongyao Cheng. 826-831 [doi]
- Fast Approximate LUT-based Vector Multiplication in DRAMZiming Chen, Quan Deng, Yongwen Wang. 832-839 [doi]
- Distributed Training of Large Language ModelsFanlong Zeng, Wensheng Gan, Yongheng Wang, Philip S. Yu. 840-847 [doi]
- Dynamic management of processes and communicators in malleable MPI applicationsJavier Fernández Muñoz, Alberto Cascajo García, Jesús Carretero Pérez. 848-855 [doi]
- UAV-based Reliable Optical Wireless Communication via Cooperative Multi-agent Reinforcement Learning ApproachJiangang Liu, Hanjiang Luo, Rukhsana Ruby, Haoran Wang, Hang Tao, Kaishun Wu. 856-863 [doi]
- Full-coverage Invisible Camouflage For Adversarial Targeted AttackHongtuo Zhou, Zhichao Lian. 864-871 [doi]
- Interpretable attribution based on concept vectorsLu Liu, Zhichao Lian. 872-877 [doi]
- FedFC: An Efficient Personalized Federated Learning Method on Non-iid DataYuxin Yang, Yifei Wang, Chanying Huang, Qianmu Li, Shan Xiao. 878-883 [doi]
- FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoTMinsheng Le, Zhen Li 0011, Chang Liu 0049, Gaopeng Gou, Gang Xiong 0001, Wei Xia. 884-891 [doi]
- Generating Routes Less Fragile to Improve Disruption-Resilient Transport Protocol for Phasor Data in Optical IoT Networks of Power Transmission GridsBoyang Zhou, Tong Ye, Yinghui Nie, Wenjie Yu, Chunming Wu 0001. 892-899 [doi]
- Effective Severity Assessment of Parkinson's Disease using Wearable Sensors in Free-living IoT EnvironmentZiheng Li, Yuting Zhao, Jun Qi 0001, Xulong Wang, Yun Yang 0003, Po Yang 0001. 900-906 [doi]
- FingerBLE: A Device Fingerprint Identification Scheme for BLE devicesXikai Sun, Fan Dang 0001. 907-912 [doi]
- STGAT: Spatial-Temporal Graph Attention Networks for Traffic Flow PredictionChang Ruan, Xianchao Tan, Zhuofan Liao, Lidan Kuang, Ping Li. 913-919 [doi]
- FirmCVI: Taint Analysis-Based Component Version Identification Method for Large-Scale IoT FirmwareYing Zhang, Bo Yu. 920-927 [doi]
- Enhancing Cybersecurity in Industrial Control System with Autonomous Defense Using Normalized Proximal Policy Optimization ModelShoukun Xu, Zihao Xie, Chenyang Zhu, Xueyuan Wang, Lin Shi. 928-935 [doi]
- Modeling Parkinson's Disease Aided Diagnosis with Multi-Instance Learning: An Effective Approach to Mitigate Label NoiseZheyuan Xu, Fengtao Nan, Jun Qi 0001, Yun Yang 0003, Xulong Wang, Po Yang 0001. 936-943 [doi]
- Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of ThingsXiyang Liu, Xiong Li, Baojin Wang, Xiaosong Zhang. 944-949 [doi]
- FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequenceYongpan Wang, Chaopeng Dong, Siyuan Li, Fucai Luo, Renjie Su, Zhanwei Song, Hong Li 0004. 950-957 [doi]
- A Lightweight CNN-based Mechanism to Efficiently Identify Electric Meters under Stealthy False Data Injection Attacks in Smart Power GridTong Ye, Boyang Zhou, Yinghui Nie, Zhen Zhu. 958-963 [doi]
- FedCD: A Hybrid Centralized-Decentralized Architecture for Efficient Federated LearningPengcheng Qu, JianChun Liu, Zhiyuan Wang, Qianpiao Ma, Jinyang Huang. 964-971 [doi]
- Multivariate Workload Aware Correlation Model for Container Workload PredictionMan Zhang, Chunyan An, Conghao Yang. 972-979 [doi]
- Throughput Optimization VNF Placement in Cloud Datacenter Considering Time-Varying Workload and Multi-TenancyYi Yue, Shiding Sun, Zhiyan Zhang, Xiongyan Tang, Wencong Yang, Xuebei Zhang. 980-987 [doi]
- Prefetching-based Adaptive Video Streaming Strategy on Edge ComputingXuanyu Yi, Jipeng Zhou. 988-994 [doi]
- Parallel-Driven Edge Computing Task Offloading for Profit Maximization Based on DDPGLequn Fu, Houming Qiu, Kun Zhu 0001. 995-1000 [doi]
- OSMO: Enhanced Offloading for Data Stream Perception with Smoothness and OrderlinessChaokun Zhang, Quan Fan, Jinlong E, Shen He. 1001-1008 [doi]
- ExpoNAS: Using Exposure-based Candidate Exclusion to Reduce NAS Space for Heterogeneous Pipeline of CNNsHuijuan Duan, Danghui Wang, Xingting Zhao, Kuizhi Mei, Jihe Wang. 1009-1014 [doi]
- HSMS-ADP: Adaptive DNNs Partitioning for End-Edge Collaborative Inference in High-Speed Mobile ScenariosXiang He, Zhen Liu, Ze Kou, Ninghua Dong, Yiran Li, Zeshuai Liu. 1015-1022 [doi]
- FaaSCom: Mitigate Cold Start Problem in FaaS via Function CommunityHairui Guo, Jialun Li, Yang Xu, Yujie Long, Jieying Zhou, Weigang Wu. 1023-1030 [doi]
- Joint Optimization of CPU Scaling and Core Sharing in Container CloudsYepeng Zhang, Haitao Zhang, Yue Wu, Huadong Ma. 1031-1038 [doi]
- Efficient Dynamic Multi-key FHE Scheme from LWE for Untrusted Cloud EnvironmentsShuchang Zeng, Chingfang Hsu, Jianqun Cui, Wei Xie, Qihang Hou. 1039-1044 [doi]
- On-Board Federated Learning in Orbital Edge ComputingMohammad Reza Jabbarpour, Bahman Javadi, Philip H. W. Leong, Rodrigo N. Calheiros, David Boland, Chris Butler. 1045-1052 [doi]
- MACC: A Heterogeneous Multi-Agent Mobile Edge Coding Caching Strategy for Reducing Traffic LoadXuemei Yuan, Ningjiang Chen. 1053-1060 [doi]
- Multi-Step Edge Cloud Load Prediction by Analyzing Behavior of Workload GroupsXiaojun Wu, Wenxing Huang, Sheng Yuan, Jiahao Mi. 1061-1066 [doi]
- Leveraging Edge Computing and Privacy-Enhanced Prediction Sharing for Urban Traffic ForecastingYiping Wang, Chunyang Ye, Hui Zhou. 1067-1074 [doi]
- Research on Edge-Cloud Collaborative Data Sharing Method Based on Federated Learning in Internet of VehiclesXiaohui Ren, Yan Wang, Jun Zhang, Zhiheng Han. 1075-1080 [doi]
- An Edge Resource Allocation Method based on Bundled Two-way AuctionYan Wang, Hongze Yao, Jianwei Gao, Minghui Liu. 1081-1086 [doi]
- Research on the deployment scheme of edge servers for vehicle task offloadingLu Yao, Liguo Ren, Yan Wang. 1087-1092 [doi]
- Latency-Optimized Multi-User Task Offloading Scheme Using Dynamic Priority and Duplication in Edge ComputingBo Peng, Cheng Chen, Qiang Li, Shi-lin Peng, Xiang Lei. 1093-1098 [doi]
- Industry-Oriented Lightweight Simulation SystemChangwei Liu, Hao Ren 0005, Nan Zhou, Guoqiang Li, Xiaojun Liang, Weihua Gui 0001, Chunhua Yang 0001. 1099-1106 [doi]
- Privacy-Preserving Direction-Aware Why-Not Spatial Keyword Top-k Queries on Cloud PlatformYiping Teng, Huan Wang, Jiawei Qi, Miao Li, Chunlong Fan, Li Xu. 1107-1114 [doi]
- TPTO: A Transformer-PPO based Task Offloading Solution for Edge Computing EnvironmentsNiloofar Gholipour, Marcos Dias de Assunção, Pranav Agarwal, Julien Gascon-Samson, Rajkumar Buyya. 1115-1122 [doi]
- Communication-aware Quantization for Deep Learning Inference Parallelization on Chiplet-based AcceleratorsKaiwei Zou, Songyun Qu, Wen Li, Ying Wang 0001, Huawei Li 0001, Yongpan Liu. 1123-1130 [doi]
- GenBoost: Generative Modeling and Boosted Learning for Multi-hop Question Answering over Incomplete Knowledge GraphsZhen Cheng, Jianwei Niu 0002, Shasha Mo, Jia Chen. 1131-1138 [doi]
- Slim-MY: A Lightweight Network for Power Line Defect Detection with FPGA AccelerationXiaoyang Zhang, Wenjie Chen, Zihao Zhou, Zhuowen Duan. 1139-1146 [doi]
- Binary Malware Detection via Heterogeneous Information Deep Ensemble LearningRunhan Song, Lun Li, Lei Cui 0003, Qiqi Liu, Jin Gao. 1147-1156 [doi]
- ER3D: An Efficient Real-time 3D Object Detection Framework for Autonomous DrivingHaitao Meng, Changcai Li, Gang Chen 0023, Zonghua Gu 0001, Alois Knoll. 1157-1164 [doi]
- Robust Listwise Learning-to-Rank Approach for Database Query OptimizerXue Chen, Rui Xi, Yiheng Tang, Mengshu Hou. 1165-1172 [doi]
- Distributed Smart Multihome Energy Management Based on Federated Deep Reinforcement LearningLiwei Peng, Fan He, Go Hasegawa, Yanfen Cheng, Xun Shao. 1173-1180 [doi]
- TOSA: Tolerating Stuck-At-Faults in Edge-based RRAM Inference AcceleratorsShaofeng Zhao, Bo Liu 0057, Fang Wang 0001, Dan Feng 0001, Xiang Chen. 1181-1190 [doi]
- A Parallelizable Counterfactual Generation Method Based on Gradient OptimizationHaorun Ding, Xuesong Jiang. 1191-1198 [doi]
- SemLog: A Semantics-based Approach for Anomaly Detection in Big Data System LogsXiaoman Tan, Ningning Han, Siyang Lu, Wu Chen, Dongdong Wang. 1199-1206 [doi]
- Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble InferenceXiaojing Liu, Xuesong Jiang, Fengge Yi. 1207-1213 [doi]
- MM-ABR: an Enhanced ABR Algorithm with Multi-Metric Information for QUIC-based Video StreamingChangjiang Cui, Yifei Lu, Zhen Wang, Zeqi Ruan, Hongxiang Wang. 1214-1221 [doi]
- A Study on Semi-Supervised Semantic Segmentation of Ship Flame ImagesJunwei Wan, YaoJie Chen, Xuecong Zheng. 1222-1229 [doi]
- LWSDP: Locality-Aware Warp Scheduling and Dynamic Data Prefetching Co-design in the Per-SM Private Cache of GPGPUsWangguang Wang, Mingyu Wang, Yicong Zhang, Yukun Wei, Zhiyi Yu. 1230-1237 [doi]
- Asynchronous and Adaptive Checkpoint for WAL-based Data Storage SystemsLi Zhu, Yanpeng Hu, Chundong Wang 0001. 1238-1245 [doi]
- FedTAM: Decentralized Federated Learning with a Feature Attention Based Multi-teacher Knowledge Distillation for HealthcareTingting Mou, Xinlong Jiang, Jie Li, Bingjie Yan, Qian Chen, Teng Zhang, Wuliang Huang, Chenlong Gao, Yiqiang Chen. 1246-1253 [doi]
- Class-Adaptive Threshold for Class Imbalanced Semi-Supervised LearningXiaoyu Liu, Wei Xiang 0007, Jingjie Wang, Siyang Lu, Weiwei Xing. 1254-1261 [doi]
- Probing Handwritten Manchu Word Recognition Foundation ModelHaoran Li, Siyang Lu, Xiang Wei, Yingjun Qi. 1262-1269 [doi]
- The Art of Deception: Black-box Attack Against Text-to-Image Diffusion ModelYuetong Lu, Jingyao Xu, Yandong Li, Siyang Lu, Wei Xiang 0007, Wei Lu 0010. 1270-1277 [doi]
- Robust Traffic Light Recognition Pipeline Based on YOLOv8 for Autonomous Driving SystemsYuwei Zhang, Yan Wu 0011, Junqiao Zhao, Yinghao Hu, Yufei He, Jijun Wang. 1278-1285 [doi]
- A Decision-making Subgraph Mining Algorithm for Structural Equation ModelingShuling Yang, Ming Tao, Xueqiang Li 0001. 1286-1293 [doi]
- TSFCloNet: Clothing Classification Algorithm Based on Two-Stream Network StructureMinghua Jiang, Xiaoxiao Liu, Yaxin Zhao, Li Liu, Feng Yu 0017. 1294-1302 [doi]
- A coarse-to-fine parallelizable surface defect detection approach for railway trackside equipmentGuanjia Zhang, Weiwei Xing, Shuzhong Yang, Weibin Liu, Xiang Wei 0007, Jian Zhang, Shunli Zhang. 1303-1310 [doi]
- FastOmniMVS: Real-time Omnidirectional Depth Estimation from Multiview Fisheye ImagesYushen Wang, Yang Yang, Jiaxi Deng, Haitao Meng, Gang Chen 0023. 1311-1318 [doi]
- DTC: Addressing the long-tailed problem in intrusion detection through the divide-then-conquer paradigmChaoqun Guo, Nan Wang, Yuanlin Sun, Dalin Zhang 0003. 1319-1326 [doi]
- Fairness with adaptive weight in network attack detectionXuezhi Wen, Nan Wang, Yuanlin Sun, Fan Xu, Dalin Zhang 0003, Xibin Zhao. 1327-1333 [doi]
- Low-Dimensional Feature Representation with Hybrid Attention for Few-Shot Image ClassificationXin-Wei Yao 0001, Zhi-Heng Yuan, Yu-Li Fang, Chuan He, Yu-Chen Zhang, Qiang Li. 1334-1341 [doi]
- What Appears Suboptimal May Surprise You: A Fixed-Rate Scheduling Policy for Geo-Distributed CoFlowsHaoyu Liu, Feiyan Ding, Yao Wang, Qiao Xiang, Jiwu Shu, Haizhou Du, Linghe Kong, Xue Liu 0001. 1342-1349 [doi]
- A Scalable Deadlock-Free Static Routing Algorithm for Chiplet-Based SystemsXiaoran Zhang, Mingyu Wang, Yicong Zhang, Tao Lu, Zhiyi Yu. 1350-1357 [doi]
- Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph EmbeddingsDong Zhu, Yao Lin, Haonan Tan, Le Wang 0008, Zhaoquan Gu. 1358-1364 [doi]
- Sequence-to-Sequence Knowledge Graph Completion Based On Gated Attention UnitFengge Yi, Xiumei Wei, Xiaojing Liu, Xuesong Jiang. 1365-1370 [doi]
- TransFlowLog: Log Anomaly Detection Based on Transformer Encoder and Interflow DecoderZaichao Lin, Siyang Lu, Ningning Han, Dongdong Wang, Xiang Wei, Mingquan Wang. 1371-1378 [doi]
- Vehicle Motion Prediction Based on Selective Perception and Weak Lane GuidanceXiaoliang Wang, Shiqi Zheng, Junkang Zou, Yuzhen Liu. 1379-1387 [doi]
- Graph-Attention-Network-Based Cost Estimation Model in Materialized View EnvironmentDaobing Zhu, Shu Huan Fan, Xiaoyang Zeng, Rui Xi, Mengshu Hou. 1388-1396 [doi]
- Injecting Revenue-awareness into Cold-start Recommendation: The Case of Online InsuranceYu Li, Yi Zhang, Helen He Chang, Qiang Li. 1397-1404 [doi]
- Learning Dynamic Spatial Graphs and Spatial Patterns for Accurate Traffic PredictionWenying Duan, Chen Lin, Jiayi Zhu, Xiaoxi He, Wei Huang, Hong Rao. 1405-1412 [doi]
- APRG:A Fair Information Granule Model Based on Adaptive Probability Replacement ResamplingJianghe Cai, Yuhui Deng, Jiande Huang, Ke Wang. 1413-1420 [doi]
- Multi-Scale Sampling Based MLP Networks for Anomaly Detection in Multivariate Time SeriesHaojie Li, Hongzuo Xu, Wei Peng, Chiran Shen, Xianwen Qiu. 1421-1428 [doi]
- Multimodal Rumor Detection with Causal Graph Attention NetworkJiawen Huang, Donglin Cao, Dazhen Lin. 1429-1436 [doi]
- Generative Enhancement-based Similarity Prediction Hashing for Image RetrievalYuan Cao, Fanlei Meng, Xiangyu Wu, Zijie Wang. 1437-1444 [doi]
- An Improvement Paillier Algorithm Applied to Federated LearningChao Xu, Yun Wang, Jing Wang. 1445-1451 [doi]
- A Correlation And Order-Aware Rule Learning Method For Knowledge Graph ReasoningYuefeng He, Yang He, Xu Zheng, Bei Hui, Bin Tian. 1452-1459 [doi]
- A Federated Learning Scheme Based on Reputation Evaluation and BlockchainSiyu Tang, Jian An, Xiangyan Sun, Xiancheng Hu, Feifei Wang. 1460-1467 [doi]
- PsyLink: User Identity Linkage via Psychological Characteristic ModelingXingkong Ma, Houjie Qiu, Shaoyong Li, Shujia Yao, Bo Liu 0014, Wangqun Lin. 1468-1475 [doi]
- A Cooperative Multi-AUV Mobile Scheme with Optical Communication via DDPG ApproachMengzhen Li, Hanjiang Luo, Xiang Li, Rukhsana Ruby, Hang Tao, Kaishun Wu. 1476-1483 [doi]
- Data-Quality-Driven Federated Learning for Optimizing Communication CostsXuehong Fan, Nanzhong Wu, Shukan Liu, Xianzhang Chen, Duo Liu, Yujuan Tan, Ao Ren. 1484-1491 [doi]
- Multi-scale Spin Convolutional Neural Network for Typhoon Intensity PredictionLongjie Li, Yanmin Zhu, Han Zhang, Mengyuan Jing, Haoyu Zhang, Zhaobo Wang, Tianzi Zang. 1492-1499 [doi]
- A Novel Gold Futures Price Prediction Model based on PCA-AGRUJingyang Wang, Tong Lu, Jindian Liu, Qiuhong Sun, Lianyong Qi, Xiaokang Zhou. 1500-1507 [doi]
- RPFL: Robust and Privacy Federated Learning against Backdoor and Sample Inference AttacksDi Xiao, Zhuyang Yu, Lvjun Chen. 1508-1515 [doi]
- A Time Series Clustering Method for Network Big DataYujia Zhu, Geyong Min, Yulei Wu, Haozhe Wang. 1516-1521 [doi]
- Rating-Review Graph Contrastive Learning for Review-based RecommendationJiacheng Shi, Yanmin Zhu, Ke Wang, Mengyuan Jing, Tianzi Zang, Jiadi Yu, Feilong Tang. 1522-1529 [doi]
- Cross-view Self-Supervised Learning with Graph Convolutional Networks for Group RecommendationDan Liu, Nan Wang, Jinbao Li. 1530-1537 [doi]
- Dual Contrastive Learning for Multi-Behavior RecommendationJiahui Wang, Yanmin Zhu, Mengyuan Jing, Tianzi Zang, Qinghua Chen. 1538-1545 [doi]
- Cost Guarantee for Individual Fairness on Spectral ClusteringZhijing Yang, Hui Zhang, Chunming Yang, Yi Yang, Bo Li. 1546-1553 [doi]
- Decentralized Subgraph Learning for Spatial-Temporal Data ModelingHaiquan Wang, Wei Yan, Jiejie Zhao, Bowen Du 0001, Chenzhi He, Yanbo Ma, Runhe Huang. 1554-1561 [doi]
- What Determines the Price of NFTs?Vivian Ziemke, Benjamin Estermann, Roger Wattenhofer, Ye Wang. 1562-1568 [doi]
- SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised LearningYingrui Tong, Jun Feng, Gaolei Li, Xi Lin 0003, Chengcheng Zhao, Xiaoyu Yi, Jianhua Li 0001. 1569-1576 [doi]
- RCSR: Robust Client Selection and Replacement in Federated LearningXuerui Li, Yangming Zhao, Chunming Qiao. 1577-1584 [doi]
- Knowledge Graph Recommendation based on Structural Semantics and Collaborative SemanticsBingnan Liu, Baoliang Wang, Mankun Zhao, Jian Yu, Mei Yu, Xuewei Li 0001. 1585-1594 [doi]
- IMA: Implicit Matching and Alignment for Multimodal Named Entity RecognitionTianyu An, Fei Peng, Qingdong Meng, Shi Chen, Shan Jin. 1595-1602 [doi]
- Enhancing Path Information with Reinforcement Learning for Few-shot Knowledge Graph CompletionRuixin Ma, Mengfei Yu, Buyun Gao, Jiaqi Guo, Zhikui Chen, Liang Zhao 0005. 1603-1611 [doi]
- MCoT: Multi-Modal Vehicle-to-Vehicle Cooperative Perception with TransformersShanwei Shi, Chaokun Zhang, Aojia Lv, Shen He. 1612-1619 [doi]
- Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis PredictionXin Zhang, Xueping Peng, Hongjiao Guan, Long Zhao, Xinxiao Qiao, Wenpeng Lu. 1620-1627 [doi]
- FedSKG: Self-supervised Federated Learning with Structural Knowledge of Global ModelJun Li 0004, Dan Luo, Kang Wei, Zhen Mei, Yumeng Shao. 1628-1636 [doi]
- A Risk-aware Multi-objective Patrolling Route Optimization Method using Reinforcement LearningHaowen Chen, Yifan Wu, Weikun Wang, Zengwei Zheng, Jianhua Ma 0002, Binbin Zhou. 1637-1644 [doi]
- Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane TrafficMin Wang, Peng Li 0046, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao, Qin Liu 0003, Kai Zhang. 1645-1652 [doi]
- PGUD: Personalized Graph Universal DefenseZeming Gan, Linlin Su, Xianxian Li, Jinyan Wang. 1653-1660 [doi]
- Relaxed Graph Semi-Supervised Contrastive Learning for Node ClassificationQiyu Li, Xianxian Li, Haodong Qian, De-li, Jinyan Wang. 1661-1670 [doi]
- STHGN: Citywide Crowd Flow Prediction in Irregular Regions using Hypergraph Convolutional NetworkJintao Xing, Weiwei Xing, Xiang Wei 0007, Jian Zhang, Wei Lu 0010. 1671-1675 [doi]
- OOCL-DDQN: Online Evaluation and Offline Training-Based Clipped Double DQN for Automated Anesthesia ControlHuijie Li, Wei Lin, Jian Huo, Wuman Luo. 1676-1683 [doi]
- Efficient ConvNet Optimization through Width Modification Guided with Gaussian ProcessesBilal Siddiqui, Adel Alaeddini, Dakai Zhu 0001. 1684-1691 [doi]
- Parallel Algorithm Design and Optimization for Numerical Simulation Application of Ion Implantation in SiliconRuixuan Qi, Wangdong Yang, Xiuwen Yan, Honglu Li, Yifei Zhang, Kenli Li 0001. 1692-1700 [doi]
- Analysis of Performance and Optimization in MindSpore on Ascend NPUsBangchuan Wang, Chuying Yang, Rui Zhu, Xiao Liu, Mingyao Zhou, Nenggan Zheng. 1701-1708 [doi]
- Towards a Lightweight Stress Prediction Model: a Study on Dimension Reduction and Individual Models in HRV AnalysisZeyang Cui, Yanbo Ma, Muxin Ma, Runhe Huang, Bowen Du 0001. 1709-1716 [doi]
- Question Classification Method based on Self-Attention Mechanism and BiLSTM-AlexNet ModelYumeng Wang, Yinshan Jia. 1717-1724 [doi]
- Accelerating Point Clouds Classification in Dynamic Graph CNN with GPU Tensor CoreHaocheng Huang, Yangfan Li, Xinlian Zhou. 1725-1732 [doi]
- Knowledge Enhancement and Feature Purification for Single-stage Joint Entity and Relation ExtractionGuohao Zhai, Songwen Pei. 1733-1740 [doi]
- SLCSA: Scalable Layered Cooperative Service Attestation Scheme in Cloud-Edge-End Cooperation EnvironmentsJie Cui, Qipeng Chen, Li Han, Yang Li, Qingyang Zhang, Lu Liu 0001, Hong Zhong 0001. 1741-1750 [doi]
- VI-Store: Towards Optimizing Blockchain-Oriented Verifiable Ledger DatabaseChenlu Wang, Liang Cai, Fanglei Huang, Weiwei Qiu, Chaolin Li. 1751-1758 [doi]
- Money Laundering Detection on Ethereum: Applying Traditional Approaches to New SceneYunmei Yu, Jiajing Wu, Dan Lin 0007, Qishuang Fu. 1759-1766 [doi]
- GNIDP: Gaussian-Noise-based Information Diffusion Prediction ModelYiran Wang, Yin Zhang 0002, Ranran Wang, Zhaokang Zhang, Wenchao Wan. 1767-1776 [doi]
- Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in CloudsShangru Yang, Yong Ding 0005, Yujue Wang, Hai Liang, Changsong Yang, Huiyong Wang. 1777-1784 [doi]
- Data Rights Verification in the Industrial Internet: A Securing Progressive Scheme with Locked-NFTs and Adaptive Federated LearningChenhao Zhang, Jiameng Cheng, Hongwei Zhang, Jinsong Wang, Kai Shi 0002. 1785-1792 [doi]
- DW-LRC: A Dynamic Wide-stripe LRC Codes for Blockchain Data Under Malicious Node ScenariosMizhipeng Zhang, Chentao Wu, Jie Li 0002, Minyi Guo. 1793-1800 [doi]
- Swarm: A High-Performance Asynchronous BFT Protocol Adapted to High Network DelayJianyu Han, Xiulong Liu, Keqiu Li. 1801-1808 [doi]
- CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual AnalysisHuiran Yang, Yan Zhang 0014, Yueyue Dai, Jiyan Sun, Huajun Cui, Can Ma, Weiping Wang 0005. 1809-1816 [doi]
- BrokerFi: A DeFi dApp Built upon Broker-based BlockchainJian Zheng, Qinde Chen, Chunhua Su, Huawei Huang. 1817-1825 [doi]
- Performance Evaluation of MindSpore and PyTorch Based on Ascend NPUZeling Zhu, Bangchuan Wang, Chuying Yang, Rui Zhu, Mingyao Zhou, Nenggan Zheng. 1826-1832 [doi]
- Characterize and Optimize Dense Linear Solver on Multi-core CPUsXiao Fu, Xing Su, Dezun Dong, Weiling Yang. 1833-1842 [doi]
- Randomized Testing Framework for Dissecting NVIDIA GPGPU Thread Block-To-SM Scheduling MechanismsChongxi Wang, Penghao Song, Haoyu Zhao, Fuxin Zhang, Jian Wang, Longbing Zhang. 1843-1852 [doi]
- dBFC: Destination-based Backpressure Flow Control for IncastZewei Guan, Wenxin Li 0001, Xin He, Song Zhang, Keqiu Li. 1853-1860 [doi]
- WAN-INT: Cost-Effective In-Band Network Telemetry in WAN With A Performance-aware Path PlannerSimian Chen, Dongbiao He, Xiaopeng Ma, Zhongxing Ming, Laizhong Cui. 1861-1868 [doi]
- Efficient Deep Molecular Dynamic Model Training on Heterogeneous SystemShaokang Du, Xin You, Hailong Yang, Jing Shang, Zhiwen Xiao, Zhihui Wu, Zhongzhi Luan, Depei Qian. 1869-1876 [doi]
- Improving Disaster Communication with MP-NMSA: Message-Prioritized DTN Routing Based on Node Mobility and Social AttributesLong Tan, Zhihao Sun. 1877-1884 [doi]
- SmartPipe: Intelligently Freezing Layers in Pipeline Parallelism for Distributed DNN TrainingNadia Niknami, Abdalaziz Sawwan, Jie Wu 0001. 1885-1894 [doi]
- LeanKV: Efficient Garbage Collection for LSM-Based Key-Value Stores on ZNS SSDs through Lifetime-Based SSTable ClusteringYishun Xu, Peiquan Jin, Mingchen Lu, Xiaoliang Wang. 1895-1902 [doi]
- TH-Allreduce: Optimizing Small Data Allreduce Operation on Tianhe SystemPeng Liu, Jintao Peng, Jie Liu, Lihua Chi. 1903-1911 [doi]
- Efficiently Running SpMV on Multi-Core DSPs for Block Sparse MatrixDeshun Bi, Xiaowen Tian, Shengguo Li, Dezun Dong. 1912-1919 [doi]
- Joint Optimization of Trajectory and Image Transmission in Multi-UAV Semantic Communication NetworksXiancai Yao, Jianchao Zheng, Xin Zheng, Huadong Dai, Xiaolong Yang. 1920-1926 [doi]
- DPBC-VCP: A Network-On-Chip Prioritization Mechanism Combined with VCP for CPU-GPU Heterogeneous SystemsJuan Fang, Haoyu Cheng, Zhichao Wei, Huijing Yang. 1927-1934 [doi]
- In-Network Key-Value Cache with LinearizabilityYuxuan Qin, Weize Gao, ChonLam Lao, Wenfei Wu, Kai Chen. 1935-1942 [doi]
- Automatic Deep Learning Operator Fusion on Sunway SW26010 Many-Core ProcessorWei Gao, Wenxiang Zhang, Wenzhao Wu, Yanjie Zhen, Wenlai Zhao, Guangwen Yang. 1943-1950 [doi]
- MUSE: A Programmable Metadata Load Estimation Interface for Ceph File SystemXinyang Shao, Cheng Li 0001, Yinlong Xu. 1951-1958 [doi]
- Toward Reproducible Benchmarking of PGAS and MPI Communication SchemesNiklas Bartelheimer, Sarah Neuwirth. 1959-1967 [doi]
- A Hybrid Approach for Detecting Bugs in HPC WorkloadsSonam Sherpa, Xinghui Zhao. 1968-1974 [doi]
- BB-ML: Basic Block Performance Prediction using Machine Learning TechniquesHamdy Abdelkhalik, Shamminuj Aktar, Yehia Arafa, Atanu Barai, Gopinath Chennupati, Nandakishore Santhi, Nishant Panda, Nirmal Prajapati, Nazmul Haque Turja, Stephan J. Eidenbenz, Abdel-Hameed A. Badawy. 1975-1982 [doi]
- Accelerating SAT Solving Using Switching ASICsZhenpei Huang, Xiwen Fan, Jinghui Jiang, Mingyuan Song, Lu Tang 0004, Qiao Xiang, Jiwu Shu. 1983-1990 [doi]
- VideoBack: High Quality Video Backscatter with Ambient WiFiYuxing Ding, Shanyue Wang, Yachen Mao, Yubo Yan, Panlong Yang. 1991-1998 [doi]
- Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing EnvironmentZhipeng Bao, Zhili Zhou, Xutong Cui, Weixuan Tang, Chengsheng Yuan. 1999-2006 [doi]
- A Framework for Industrial Identifier Addressing Considering Compatibility and EfficiencyYifan Xu, Fan Dang 0001, Jingao Xu, Xu Wang 0018, Yunhao Liu 0001. 2007-2014 [doi]
- Cyber-Physical Systems Design in An Uncertain Environment with Time Uncertainty ConcernSi Chen, Lida Huang, Xiongren Xiao, Yan Liu 0032, Guoqi Xie, Renfa Li. 2015-2024 [doi]
- Transparent File Deduplication with Reduced Update Cost on Encryption Enabled Mobile DevicesJunbin Ren, Cheng Ji, Weiwei Jin, Chao Yu, Weichao Guo, Yajuan Du, Zongwei Zhu. 2025-2032 [doi]
- VibCamera: mmWave and Camera Fusion for Multi-point Vibration MonitoringXiulong Liu, Zhihua Yang, Hankai Liu, Xin Xie 0001, Xinyu Tong. 2033-2040 [doi]
- Towards Adaptive Adjusting and Efficient Scheduling Coflows Based on Deep Reinforcement LearningZichao Wang, Kedong Yan, Guanxin Chang, Chanying Huang, Shan Xiao, Yuxin Yang. 2041-2048 [doi]
- Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level InformationYiwen Li, Shanshan Wang 0003, Zhenxiang Chen, Xueyang Cao, Yadi Han. 2049-2056 [doi]
- Dynamic Uploading Scheduling in mmWave-Based Sensor Networks via Mobile Blocker DetectionYifei Sun, Bojie Lv, Rui Wang 0007, Haisheng Tan, Francis C. M. Lau 0001. 2057-2066 [doi]
- Minimizing Cost and Delay for Video Datacenters Using Efficient Fuzzy Dominance-Based Particle Swarm OptimizationZi Yang, Jin Wang, Jingwen Zhang, Yi Zhang, Jin Sun. 2067-2074 [doi]
- LWSA: A Learning-Based Workflow Scheduling Algorithm for Energy-Efficient UAV Delivery SystemJiali Wang, Yutong Ye, Ting Wang 0001, Mingsong Chen. 2075-2082 [doi]
- ATL: A Link Failure Recovery Method with Fast Recovery Speed, Low Interruption Rate, and Small TCAM Consumption in SDNXinyu Zhang, Jue Chen. 2083-2090 [doi]
- FedLRS: A Communication-Efficient Federated Learning Framework With Low-Rank and Sparse DecompositionMingkai Luo, Dan Meng, Jun Wang, Yu Fang, Jiangyong Ying. 2091-2099 [doi]
- Want Predictable GPU Execution? Beware SMIs!Rohan Wagle, Zelin Tong, Richard L. Sites, James H. Anderson. 2100-2109 [doi]
- Gradient and self-attention enabled convolutional neural network for crack detection in smart citiesRenping Xie, Mengyao Chen, Ming Tao, Kai Ding 0005, Haohan Chen. 2110-2117 [doi]
- RAMMM: A Rapid Attention-Based Multimodal Modification Model for Massive Image GenerationZhenyuan Xu, Xuewen Chen, Taotao Wang, Wei Quan, Yi Zhu. 2118-2125 [doi]
- Encrypted Image Retrieval Scheme Based on Neural Network and LBP MappingLan Wang, Tian Wang, Zheng Wang. 2126-2134 [doi]
- Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel ProtectionJiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng 0001, Brooke Lampe. 2135-2142 [doi]
- Anomalous Behavior Identification with Visual Federated Learning in Multi-UAVs SystemsPengfei Wang, Xinrui Yu, Yefei Ye, Heng Qi, Shuo Yu, Leyou Yang, Qiang Zhang 0008. 2143-2150 [doi]
- Deep Frame-Point Sequence Consistent Network for Handwriting Trajectory RecoveryYu-Jie Xiong, Yu-Fan Dai, Dan Meng. 2151-2158 [doi]
- AoI-Sensitive Relay-Assisted Data Collection via Multi-UAV in the Large-Scale Disaster AreaZezhi Zeng, Yang Gao. 2159-2168 [doi]
- Edge Computing Scheduling Method for Related Tasks of Industrial Internet of ThingsAiping Tan, Chang Wang, Chenglong Dong, Yan Wang. 2169-2176 [doi]
- Exploiting Spatial and Temporal Features for Deep Learning Based Human Activity RecognitionWenying Cao, Gaotao Shi, Tieguan Zhang. 2177-2185 [doi]
- Joint Optimization of Model Partitioning and Resource Allocation for Edge Computing with Intermittently Operating DevicesQi Wu, Yi Zhang, Chenxi Yang, Jin Sun. 2186-2193 [doi]
- Secure and dynamic public audit scheme based on blockchain and red-black treeLongxia Huang, Xi Peng, Mengmeng Yang. 2194-2201 [doi]
- SigFeaDet: Signal Features-based UAV GPS Spoofing Detection using Machine LearningXiaomin Wei, Luyao Wang. 2202-2209 [doi]
- Detection of Covert Tunnel over Internet Control Message Protocol Based on Baseline FeaturesHaiying Duan, Baohui Wang. 2210-2218 [doi]
- Practical Earphone Eavesdropping with Built-in Motion SensorsMengzhen Gao, Helei Cui, Yanze Xie, Yaxing Chen, Zhiwen Yu 0001, Bin Guo 0001, Xingliang Yuan. 2219-2226 [doi]
- Sketch-based Real-time Intrusion Detection Framework for Industrial Internet of ThingsMengda Lyu, Lizhi Peng, Hui Li, Bo Yang 0001, Xiang Chen. 2227-2234 [doi]
- A Discrete Grey Wolf Optimizer Metaheuristic for Task Offloading in Multi-Server MEC with Batteryless DevicesYinyin Tang, Guichang Yin, Peijin Cong, Jin Sun 0001, Junlong Zhou. 2235-2242 [doi]
- Video Streaming Caching and Transcoding for Heterogeneous Mobile UsersJinbo Cai, Mingjun Xiao, He Sun, Junjie Shao, Yu Zhao, Tongxiao Zhang. 2243-2250 [doi]
- EAVA: Adaptive and Fast Edge-assisted Video Analytics On Mobile DeviceYingying Su, Chenhong Cao, Jiangtao Li, Yufeng Li. 2251-2260 [doi]
- When CPN Meets AI: Resource Provisioning for Inference Query upon Computing Power NetworkMingtao Ji, Zhuzhong Qian, Baoliu Ye. 2261-2268 [doi]
- CARE: A Cost-AwaRe Eviction Strategy for Improving Throughput in Cloud EnvironmentsXiyuan Liang, Lulu Yao, Si Wu 0003, Yongkun Li 0001, Yinlong Xu. 2269-2276 [doi]
- Efficient Storage and Retrieval of Similar Data in Edge Computing SystemsYuanfeng Liu, Junjie Xie, Hanlong Liao, Sheng Chen, Xiulong Liu, Deke Guo. 2277-2285 [doi]
- Joint Service Placement and Container Retention for Serverless-Based Vehicular Edge ComputingShihong Hu, Zhihao Qu, Bin Tang, Baoliu Ye. 2286-2294 [doi]
- Online Function Caching in Serverless Edge ComputingXuan Zhang, HongJun Gu, Guopeng Li, Xin He, Haisheng Tan. 2295-2302 [doi]
- Microless: Cost-Efficient Hybrid Deployment of Microservices on IaaS VMs and ServerlessJiagan Cheng, Yilong Zhao, Zijun Li, Quan Chen 0002, Weihao Cui, Minyi Guo. 2303-2310 [doi]
- EdgeAnchor: A Rapid and Balanced File Storage Strategy at the Network EdgeHan Liu, Xingrui Xie, Zhuopu Zhang, Geyao Cheng, Lailong Luo, Deke Guo. 2311-2319 [doi]
- TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted DataYinfu Deng, Hua Dai 0003, Yuanlong Liu, Zhangchen Li, Geng Yang, Xun Yi. 2320-2327 [doi]
- DSUTO: Differential Rate SAC-Based UAV-Assisted Task Offloading Algorithm in Collaborative Edge ComputingLongxin Zhang, Runti Tan, Minghui Ai, Huazheng Xiang, Cheng Peng, ZhiHao Zeng. 2328-2335 [doi]
- A Reliability and Robustness-driven Approach for Optimizing VM Placement in CloudsYuheng Zhu, Jiawei Liu, Gongming Zhao, Hongli Xu, Huaqing Tu. 2336-2343 [doi]
- N-MlpE: Optimizing Multilayer Perceptron Network-based Knowledge Graph Embedding Model with Neighborhood InformationQing Xu, Xiaoli Ren, Kaijun Ren, Jiarun Lin, Xiaoyong Li 0002. 2344-2352 [doi]
- A Improved Consistent Hash Algorithm in Heterogeneous Edge ComputingRuonan Chai, Shuai Gao, Zhenghao Hu. 2353-2360 [doi]
- SIC-TFRF: Sea Ice Classification with Textural Features and Random ForestRuixin Cao, Xiang Zhu, Hui Zhang, Kefeng Deng, Xiaoli Ren, Xiaoyong Li 0002. 2361-2370 [doi]
- Optimizing Space-Borne Computation: A Reliability Enhancement Framework for LEO ConstellationLipei Yang, Ao Zhou 0001, Xiao Ma 0009, Yiran Zhang, Shangguang Wang. 2371-2378 [doi]
- An Adaptive Teacher-Student Framework for Real-time Video Inference in Multi-User Heterogeneous MEC NetworksYuan Lu, Shuxin Ge, Weixu Wang, Xiaobo Zhou 0003, Tie Qiu 0001. 2379-2386 [doi]
- A Hash-based Multidimensional Graph Neural Network Approach for Zero Trust Oriented Access Control SecurityFengfan Shi, Sheng Cao, Xiaosong Zhang. 2387-2394 [doi]
- Brownfield Measurement: A Practical Grey Failure Identification and Localization Method in Incremental Deployment NetworkJiaqi Liu, Peng Xun, Baosheng Wang. 2395-2402 [doi]
- Digital Twin Empowered Task Offloading for Vehicular Edge ComputingChaogang Tang, Huaming Wu, Chunsheng Zhu, Shuo Xiao. 2403-2409 [doi]
- ODRL: Reinforcement Learning in Priority Scheduling for Running Cost OptimizationCheng Kuang, Meng Duan, Tao Lv, Yingjun Wu, Li Li, LuPing Wang. 2410-2419 [doi]
- Profit-driven Optimization of Server Deployment and Service Placement in Multi-User Mobile Edge ComputingJuan Fang, Shen Wu, Shuaibing Lu. 2420-2427 [doi]
- MiddleCache: Accelerating TCP based In-memory Key-value Stores using eBPFYiren Pang, Sheng Chen, Wenxin Li 0001, Hao Liu, Yulong Li, Xin He, Song Zhang, Zewei Guan, Lide Suo, Yuan Liu. 2428-2435 [doi]
- Efficient Microservice Deployment with Dependencies in Multi-Access Edge ComputingShuaibing Lu, Ran Yan, Jie Wu 0001. 2436-2443 [doi]
- Adaptive Overlap Padding and Resolution Selection for Frame Split-based Edge Video AnalyticsHaopeng Zhu, Zhaowu Huang, Xiaolin Guo, Mengyang Liu, Baijun Chen, Fang Dong 0001. 2444-2451 [doi]
- PMR: Priority Memory Reclaim to Improve the Performance of Latency-Critical ServicesBo Liu, Kaihao Bai, Pu Pang, Quan Chen 0002, Yaoxuan Li, Zhuo Song, Baolin Wang, Minyi Guo. 2452-2459 [doi]
- An Intrusion Detection Method Based on Hash Function for Industrial Cloud DataYinchu Wang, Yan Ren, Heng Zhang 0001, Hongran Li, Jian Zhang. 2460-2466 [doi]
- Fine-grained Task Scheduling Based on Graph Neural Network and Federated Learning in Vehicle Edge ComputingGaowei Zhang, Junping Song, Yahui Hu, Pengfei Fan, Chong Li, Xu Zhou. 2467-2474 [doi]
- PORTEND: A Joint Performance Model for Partitioned Early-Exiting DNNsMaryam Ebrahimi, Alexandre Da Silva Veith, Moshe Gabel, Eyal de Lara. 2475-2482 [doi]
- Knowledge-aware Multi-view Cross Learning for Edge-based Collaborative RecommendationYang Dai, Shunmei Meng, Huanhuan Gu, Nan Liu, Longchuan Tu. 2483-2490 [doi]
- A Novel Robust Reinforcement Learning-based Dependent Task Offloading Algorithm for Mobile Edge IntelligenceXu Deng, Peng Sun 0007, Kun Yang, Gaoyun Fang, Azzedine Boukerche, Liang Song. 2491-2498 [doi]
- WebInf: Accelerating WebGPU-based In-browser DNN Inference via Adaptive Model PartitioningBing Dong, Tianen Liu, Borui Li, Xiaolei Zhou, Shuai Wang, Zhao-Dong Xu. 2499-2506 [doi]
- CoCV: Heterogeneous Processors Collaboration Mechanism for End-to-End Execution of Intelligent Computer Vision Tasks on Mobile DevicesYe Wan, Mengyang Liu, Guangtong Li, Fang Dong 0001. 2507-2514 [doi]
- Cost-Efficient Cloud-Edge Video Analytics with Hybird IaaS and FaaS ResourcesJing Peng, Zhi Zhou 0006, Kongyange Zhao, Huirong Ma, Xu Chen 0004. 2515-2522 [doi]
- A Fog-based Smart Agriculture System to Detect Animal IntrusionJinpeng Miao, Dasari Rajasekhar, Shivakant Mishra, Sanjeet Kumar Nayak, Ramanarayan Yadav. 2523-2530 [doi]
- Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud ServersYinlong Wang, Yunting Tao, Fanyu Kong, Zhaoquan Gu, Jia Yu, Hanlin Zhang. 2531-2538 [doi]
- Neighborhood Attention-based Transformer Line Segment Detector with Edge ComputingHaoran Guo, Mingyue Shi. 2539-2545 [doi]
- Intelligent Recognition of Antigen Detection Reagent for Corona virus based on Improved Text RecognitionJin Han, Tianhao Wang, Zhanman Deng, Bingbing Huang, Linbo Shao, Xia Zhou. 2546-2553 [doi]
- A feature-matching algorithm for web data based on word vector space indexingJin Han, Linbo Shao, Zhanman Deng, Bingbing Huang, Tianhao Wang. 2554-2562 [doi]
- Deep Learning Cognitive Diagnostic Model Based on State Machines and Knowledge GraphsJin Han, Bingbing Huang, Yao Tang, Tianhao Wang, Linbo Shao. 2563-2570 [doi]
- Game Theoretic Resource Allocation for Information Freshness in Mobile Edge ComputingJingjing Gu, Di Zhang 0010, Hongcheng Bao, Weiwei Xing, Xindong Zheng, Xun Shao. 2571-2578 [doi]
- A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy AutomationHonglei Zhu, Anming Dong, Jiguo Yu. 2579-2587 [doi]
- Accelerating Federated Learning with Adaptive Extra Local Updates upon Edge NetworksYitao Fan, Mingtao Ji, Zhuzhong Qian. 2588-2595 [doi]
- A Blockchain-enabled Secure Access Management Method in Edge ComputingXutong Jiang, Guoming Zhang, Hao Tian, Haolong Xiang, Xuyun Zhang, Wanchun Dou. 2596-2603 [doi]
- A Budget-constrained Service Deployment Strategy based on Cost Allocation in Cloud-Edge EnvironmentZhilian Zhang, Pengwei Wang, Zhaohui Zhang. 2604-2611 [doi]
- CAC: Content-aware Adaptive Configuration for Edge Video AnalyticsZhihan Cao. 2612-2621 [doi]
- Federated Anomaly Detection with Isolation Forest for IoT Network TrafficsJunyan Li, Xuyun Zhang, Haolong Xiang, Amin Beheshti. 2622-2629 [doi]
- Latency, Energy and Carbon Aware Collaborative Resource Allocation with Consolidation and QoS Degradation Strategies in Edge ComputingWedan Emmanuel Gnibga, Anne Blavette, Anne-Cécile Orgerie. 2630-2639 [doi]
- FLASH: Low-Latency Serverless Model Inference with Multi-Core Parallelism in EdgeYanbo Li, Yanying Lin, Shijie Peng, Yingfei Tang, Tian Xiang, Wei Song, Kejiang Ye. 2640-2646 [doi]
- Hierarchical Collaborative Resource Scheduling in Industrial Internet of Things based on Graph Neural Networks and Deep Reinforcement LearningQifeng Meng, Zihui Luo, Xiaolong Zheng 0002, Liang Liu 0001, Huadong Ma. 2647-2654 [doi]
- Resource Configuration for Cross-Server Deployment of Application-Oriented Microservices in Cloud-Edge Continuum with SLO ConstraintsDong Wang, Hong Shen 0001, Hui Tian. 2655-2662 [doi]
- Edge Intelligence-Driven Meteorological Knowledge Graph for Real-Time Decision-MakingZheng Yu, Jielin Jiang, Bingkun He, Muhammad Bilal 0003, Dongqing Liu. 2663-2672 [doi]
- LDVNet: Lightweight and Detail-Aware Vision Network for Image Recognition Tasks in Resource-Constrained EnvironmentsYuchen Liu, Hu Liang, Ran Qiu, Shengrong Zhao. 2673-2681 [doi]
- GAF-GAN: Gated Attention Feature Fusion Image Inpainting Network Based on Generative Adversarial NetworkRan Qiu, Hu Liang, Yuchen Liu, Shengrong Zhao. 2682-2689 [doi]
- Multi-View Super Resolution for Underwater Images Utilizing Atmospheric Light Scattering ModelJin Hao, Wenli Duan, Guangfei Li, Shiyan Chen, Wenhui Wu, Hua Li. 2690-2697 [doi]
- A Signal Contour Extraction Algorithm based on Canny Operator and its Application in Bionic CommunicationXiangdang Huang, Jiangyi Zhang, Pengcheng Li, Shihao Chan, Kaiwei Lian, Yanxia Chen. 2698-2705 [doi]
- A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial IntelligenceChuanhao Zang, Anming Dong, Jiguo Yu. 2706-2713 [doi]
- PIOD: An Efficient Parallel Iterative Algorithm for Solving Over-determined EquationsMin Tian, Zhenguo Wei, Yanlong Li, Wei Du, Lei Xiao, Chaoshuai Xu. 2714-2719 [doi]
- Privacy-enhanced Lossless Federated Recommendation with client-selectionFang Ting, Wang Yong Li, Sha Xue Qi. 2720-2723 [doi]
- Function Clustering to Optimize Resource Utilization on Container PlatformChao-Yu Lee, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu. 2724-2725 [doi]
- Accelerate Dense Matrix Multiplication on Heterogeneous-GPUsJianan Sun, Mingxue Liao, Yongyue Chao, Pin Lv. 2726-2729 [doi]
- A Latency Guaranteed Scheduling Strategy under Performance Constraints in Big Data Stream Computing EnvironmentsDawei Sun 0001, Chengjun Guan, Yinuo Fan, Jia Rung, Shang Gao 0003. 2730-2733 [doi]
- GraphUnet: Graph Make Strong Encoders for Remote Sensing SegmentationYuntao Shou, Wei Ai 0001, Tao Meng, Fuchen Zhang, Keqin Li 0001. 2734-2737 [doi]
- Meta-inspired Homomorphic Capability Selection AlgorithmAnyi Zhang, Peng Xu, Yunxuan Wang. 2738-2739 [doi]
- Constraint-Forcing Recursive Generalized Maximum Correntropy Algorithm with Forgetting Factor for Adaptive FilteringWenyue Li, Ji Zhao 0005, Qiang Li 0034, Lingli Tang, Hongbin Zhang 0002. 2740-2741 [doi]
- Network Contention-Aware Cluster Scheduling with Reinforcement LearningJunyeol Ryu, Jeongyoon Eo. 2742-2745 [doi]
- Balanced Offloading of Multiple Task Types in Mobile Edge ComputingYe Zhang, Xingyun He, Jin Xing, Wuyungerile Li, Winston K. G. Seah. 2746-2747 [doi]
- Detecting Ethereum Phishing Scams via Multi-transaction-view Graph Attention NetworkShaoxuan Zhuo, Guang Li, Weigang Wu, Jing Bian. 2748-2749 [doi]
- Combined Coding Technique for Bionic Covert Underwater Acoustic Communication Based on the Cetacean Click GroupQiuling Yang, Tian Li, Pengcheng Li, Jiaqi Shen, Yanxia Chen. 2750-2751 [doi]
- Ancient Chinese Character Image Retrieval Based on Fusing Deep Features and Skeleton FeaturesXinhui Wang, Xuedong Tian. 2752-2755 [doi]
- Multi-layer Authentication Scheme Based on Blockchain for Cloud-Edge-EndJian Wu, Lei Zhang. 2756-2758 [doi]
- Rately: Accurate Data Center CC based on One-Way DelayGuannan Zhang, Dinghuang Hu, Dezun Dong. 2759-2760 [doi]
- A Truth Inference Algorithm Using Bidirectional Convolution Autoencoder for Crowdsourcing Image SegmentationYueyang Li, Zhaoan Dong, Guangshun Li, Sifeng Wang, Xiaofan Wang, Zhibin Liu, Zhenqiang Li, Boyong Wang. 2761-2762 [doi]
- Subscription-Based State Access for Cross-Chain Smart ContractsZhihao Hou, Jinji Yang, Ruilin Lai, Yale He, Zefeng Mo, Gansen Zhao. 2763-2766 [doi]
- PI-Parking: A Physics Informed Neural Network Approach for Parking Availability PredictionYijun Dong, Haoxuan Kuang, Jun Li 0105. 2767-2770 [doi]
- Optimal Factored LT codes for Distributed Matrix MultiplicationLei Zhang, Jie Liu. 2771-2774 [doi]
- A Two-stage Abdominal Lymph Node Detection Algorithm Based on Multi-scale 2.5D InputJunyi Le, Wenxin Hu, Kun Yu. 2775-2778 [doi]
- To Broadcast or Not to Broadcast: Decision-Making Strategies for Mining Empty BlocksChon Kit Lao, Rui Jiang, Luyao Zhang 0001, Fan Zhang, Ye Wang. 2779-2780 [doi]
- Optimizing Transformer Training Based on Computation and Accessing Memory Features with Deep Learning ProcessorZhou Lei, Qin Fang, Jingfeng Qian, Shengbo Chen, Qingguo Xu, Ninghua Yang. 2781-2784 [doi]
- ABi-BFS: A High-performance Parallel Breadth-First Search on Shared-memory SystemsJifan Shi, Yun Xu. 2785-2788 [doi]
- UPR-AECS: An Active Edge Caching Strategy Integrating User Preference RepresentationHao Wen, Lei Zhang. 2789-2792 [doi]
- Efficient NTTRU Implementation on ARMv8Zhuo Zhang, Jieyu Zheng, Yunlei Zhao. 2793-2794 [doi]
- OSIS: Obstacle-Sensitive and Initial-Solution-first path planningKaibin Zhang, Liang Liu, Wenbin Zhai, Youwei Ding, Jun Hu. 2795-2797 [doi]
- Improving Iteration-based Non-Autoregressive Language Model With Time Step AwarenessHang Jiang, Guoyong Cai, Xiaolu Tang. 2798-2801 [doi]
- Realtime Intrusion Detection In Unmanned Aerial Vehicles Using Active Learning and Generative Adversarial NetworksQingli Zeng, Kailynn Barnt, Luke Ragan, Farid Naït-Abdesselam. 2802-2803 [doi]
- Addressing Client Heterogeneity in Synchronous Federated Learning: The CHAFL ApproachMiri Yu, Oh-Kyoung Kwon, Sangyoon Oh 0001. 2804-2805 [doi]
- GLEX_Allreduce: Optimization for medium and small message of Allreduce on Tianhe systemPeng Liu, Jintao Peng, Jie Liu 0002, Min Xie, Liuhua Chi. 2806-2809 [doi]
- Hierarchical Scheduling of Hybrid DNN Tasks in Embedded Real-Time SystemsJiaxin Feng, Kun Zhu 0001, Tong Zhang 0018. 2810-2811 [doi]
- GA-Net: Gated Attention Mechanism Based Global Refinement Network for Image InpaintingRan Qiu, Shengrong Zhao, Hu Liang. 2812-2813 [doi]
- Optimal Station Placement and Assignment for Electric Vehicle Battery SwappingYichao Gao, Tao Wu 0001, Xiaochen Fan, Xianrui Pan, Panlong Yang. 2814-2815 [doi]
- Vertical Heterogeneous Channelling Consensual SystemsYuqiang Wen, K. L. Eddie Law. 2816-2819 [doi]
- pFedTD: Personalized federated learning using global and local knowledge distillationHaitao Zhou, Zhiqin Zhu, Long Zhang, Yuanyuan Li. 2820-2822 [doi]
- A Highly Accurate Statistical Attack against Searchable Symmetric EncryptionRuizhong Du, Yuchi Tai, Mingyue Li. 2823-2826 [doi]
- FedMPM: A Personalized Federated Learning With Mixed Multi-Stage Private ModelsYuqi Gan, Peng Han, Yuanyuan Li, Xin Huang. 2827-2830 [doi]
- A Multi-source Time-Series Data Storage Strategy for Open-Channel SSDsBo Peng, Xiangcen Yu, Qiang Li 0034, Jiankui Weng. 2831-2832 [doi]
- CD-Net: Cross-Domain Description and Detection for 2D-3D Learning Local FeaturesJunhua Wu, Zhenqiang Li, Haoyang Wu, Guangshun Li. 2833-2834 [doi]
- Exploiting Fine-Grained Structured Pruning for Efficient Inference on CNN ModelCheng-Hung Wu, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu. 2835-2836 [doi]
- A Global Task Scheduling Method Based on Network Measurement and Prediction in Computing Power NetworksChuanfu Zhang, Wen Li, Jing Chen 0030, Jing Ge, Di Wang, Na Li, Hao Sun, YuDong Geng. 2837-2839 [doi]
- Research on Fine-grained Security Sharing Model of Medical Information Based on BlockchainBo Cui, Zeyu Chen. 2840-2841 [doi]
- Optimizing CNNs Throughput on Bandwidth-Constrained Distributed Multi-FPGA ArchitecturesYuzhu Zhou, Bo Peng, Qiang Li, Maosong Lin, Xiang Lei, Qiao Wang. 2842-2843 [doi]
- Reinforcement Learning Based Transmission Optimization for V2V Unicast CommunicationLong Tan, Yu Wang. 2844-2845 [doi]
- AOP: Towards Adaptive Offloading Point Approach in a Federated Learning Framework for Edge AI ApplicationsTran Anh Khoa, Do Van Nguyen, Minh-Son Dao, Koji Zettsu. 2846-2847 [doi]
- Cloud-Edge-End Collaboration Personalized Semi-supervised Federated Learning for Visual LocalizationQixiang Ma, Zhe Zhang, Zhenhan Zhu, Yanchao Zhao. 2848-2849 [doi]
- GPR-Net:Geometric Dynamic Graph Convolutional Neural Network for Low Overlap Point Cloud RegistrationSiwen Li, Shihao Xing, Lin Feng, Ziqiang Li, Fancheng Yang, Bowen Deng. 2850-2852 [doi]
- Developing a proxy application for an industrial unstructured CFD software: preliminary resultsQingsong Wang, Chuanfu Xu, Jian Zhang, Liang Deng, Zhe Dai, Haozhong Qiu, Weixi Dai, Yongzhen Lin, Yue Ding 0001, Yonggang Che. 2853-2854 [doi]
- GreDedup: A Greedy-Based Application-Aware Data Routing Strategy for Distributed DeduplicationJun Su, Yinjin Fu, Nong Xiao, Yingjin Qian. 2855-2858 [doi]
- Understanding Power Consumption Metric on Heterogeneous Memory SystemsAndrès Rubio Proaño, Kento Sato. 2859-2862 [doi]
- SPM-GCN: An adaptive reordering algorithm for sparse LU factorization via GCNMin Tian, Huazeng Liu, Junjie Wang, Qi Liu, Wei Du, Zanjun Zhang. 2863-2864 [doi]
- Hay: Enhancing GPU Sharing Performance With Two-Level Scheduling for RayLianghong Huang, Zejia Lin, Wei Liu, XianWei Zhang. 2865-2868 [doi]
- Fake Review Detection Using Deep Neural Networks with Multimodal Feature Fusion MethodXin Li, Lirong Chen. 2869-2872 [doi]
- hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architectureMin Tian, Yue Liu, Li Wang, Yanyan Chen, Qi Liu, Jingshan Pan. 2873-2874 [doi]
- A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud StorageJiaoli Shi, Chao Hu, Shimao Yao, Zhuolin Mei, Bin Wu 0021, Hui Li 0022. 2875-2878 [doi]
- A Research on Emotion Recognition in Conversations Based on Hierarchical Networks and Commonsense KnowledgeJiawei Zheng, Lianqiang Niu, Ye Yuan. 2879-2884 [doi]
- Accelerating Distributed Training through In-network Aggregation with Idle Resources in Data CentersGe Wang, Huaqing Tu, Gongming Zhao, Hongli Xu. 2885-2888 [doi]