Abstract is missing.
- Natural Language Inference Using Evidence from Knowledge GraphsBoxuan Jia, Hui Xu, Maosheng Guo. 3-15 [doi]
- Construction of Multimodal Chinese Tourism Knowledge GraphJiawang Xie, Zhenhao Dong, Qinghua Wen, Hongyin Zhu, Hailong Jin, Lei Hou 0001, Juanzi Li. 16-29 [doi]
- Study on Binary Code Evolution with Concrete Semantic AnalysisBing Xia, Jianmin Pang, Jun Wang, Fudong Liu, Feng Yue. 30-43 [doi]
- Research on COVID-19 Internet Derived Public Opinions Prediction Based on the Event Evolution GraphXu Chen, Feng Pan, Yiliang Han, Riming Wu. 44-54 [doi]
- A Text Correlation Algorithm for Stock Market News Event ExtractionJiachen Wu, Yue Wang. 55-68 [doi]
- Citation Recommendation Based on Community Merging and Time EffectLiang Xing, Lina Jin, Yinshan Jia, Chunxu Wu. 69-77 [doi]
- Sentiment Analysis for MOOC Course ReviewsTianyi Liu, Wei Hu, Fang Liu, Yining Li. 78-87 [doi]
- Analyzing Interpretability Semantically via CNN VisualizationChunqi Qi, Yuechen Zhao, Yue Wang, Yapu Zhao, Qian Hong, Xiuli Wang, Weiyu Guo. 88-102 [doi]
- Probing Filters to Interpret CNN Semantic Configurations by OcclusionQian Hong, Yue Wang, Huan Li, Yuechen Zhao, Weiyu Guo, Xiuli Wang. 103-115 [doi]
- Targeted BERT Pre-training and Fine-Tuning Approach for Entity Relation ExtractionChao Li, Zhao Qiu. 116-125 [doi]
- Security-as-a-Service with Cyberspace Mimic Defense Technologies in CloudJunchao Wang, Jianmin Pang, Jin Wei. 129-138 [doi]
- Searchable Encryption System for Big Data StorageYuxiang Chen, Yao Hao, Zhongqiang Yi, Kaijun Wu, Qi Zhao, Xue Wang. 139-150 [doi]
- Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial NetworkXiaowei Duan, Yiliang Han, Chao Wang, Xinliang Bi. 151-165 [doi]
- An Improved LeNet-5 Model Based on Encrypted DataHuanhuan Ni, Yiliang Han, Xiaowei Duan, Guohui Yang. 166-178 [doi]
- Design and Implementation of Intrusion Detection System Based on Neural NetworkZengyu Cai, Jingchao Wang, Jianwei Zhang, Xi Chen. 179-189 [doi]
- IoT Security Situational Awareness Based on Q-Learning and Bayesian GameYang Li, Tianying Liu, Jianming Zhu, Xiuli Wang. 190-203 [doi]
- Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based CryptosystemsJinchao Ni, Ziyan Liu, Ning Li, Cheng Zhang, Bo Cui, Hanzhang Kong. 204-216 [doi]
- IoT Honeypot Scanning and Detection System Based on Authorization MechanismNing Li, Bo Cui, Ziyan Liu, Jinchao Ni, Cheng Zhang, Hanzhang Kong. 217-228 [doi]
- Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARKYang Li, Guangzong Zhang, Jianming Zhu, Xiuli Wang. 229-239 [doi]
- Hierarchical Identity-Based Conditional Proxy Re-encryption Scheme Based RLWE and NTRU VariantChao Wang, Yiliang Han, Xiaowei Duan, Kaiyang Guo. 240-259 [doi]
- Intelligent Service Robot for High-Speed Railway PassengersRuyu Sheng, Yanqing Wang, Longfei Huang. 263-271 [doi]
- An M-ALO-SVR Model to Predict Output of Industry-University-Research Collaboration Network in ChinaRuiqiong Zhong, Ben Wang, Gege Feng. 272-282 [doi]
- Prediction of Enzyme Species by Graph Neural NetworkTingyang Zhao, Lina Jin, Yinshan Jia. 283-292 [doi]
- Construction of the Integration System of Cultural Resources and Products in Li Miao Region TourismLiping Chen, Xu Wang, Xiaomei Yang. 293-302 [doi]
- Research on Non Intrusive Intelligent Monitoring System for Elevator StateYao Ma, Yu Yang, Qianshan Wang, Xuepeng Li, Zeng Xu, Haifang Li. 303-318 [doi]
- Research on Application of Frontier Technologies at Smart AirportKang Liu, Lei Chen, Xia Liu. 319-330 [doi]
- Design and Evaluation of an Exergame System of Knee with the Azure KinectGuangjun Wang, Ming Cheng, Xueshu Wang, Yi Fan, Xin Chen, Liangliang Yao, Hanyuan Zhang, Zuchang Ma. 331-342 [doi]
- Study on the Influencing Factors and Countermeasures of Tourism Development in Sanya City Based on Grey Relational AnalysisYuanhui Li, Dan Luo, Lei Chen, Dan Ren, Xia Liu. 343-356 [doi]
- Blockchain-Based Power-Out Insurance Design and Practical ExplorationChao Deng, Yong Yan, Keyuan Wang, Hongtao Xia, Yang Yang, Yi Sun. 357-372 [doi]
- "Golden Course" Construction of Software Engineering Basic Course Based on Blended LearningZufeng Wu, Tian Lan, Ruijin Wang, Xiaohua Wu, Qiao Liu 0003. 375-384 [doi]
- Learning Behavior-Aware Cognitive Diagnosis for Online Education SystemsYiming Mao, Bin Xu, Jifan Yu, Yifan Fang, Jie Yuan, Juanzi Li, Lei Hou 0001. 385-398 [doi]
- Implementation of Online Teaching Behavior Analysis SystemXu Zhao, Changwei Chen, Yongquan Li. 399-409 [doi]
- Teaching Reform and Research of Data Structure Course Based on BOPPPS Model and Rain ClassroomYongfen Wu, Zhigang Li, Yong Li, Yin Liu. 410-418 [doi]
- An Empirical Study on Teachers' Informationized Teaching Ability in Higher Vocational CollegesLiya Liu, Yuanyuan Zhang, Min Li. 419-433 [doi]
- Research on Teaching Evaluation of Courses Based on Computer System Ability TrainingWenyu Zhang, Run Wang, Yanqin Tang, En Yuan, Yongfen Wu, Zhen Wang. 434-442 [doi]
- Study on Vocational College Students' Communicative Competence of Intercultural CommunicationDan Ren, Dan Xian. 443-455 [doi]
- Exploration and Practice for the Cultivation Mode of College Students' Innovation AbilityYinglun Xi, Xiang Chen, Yang Li. 456-464 [doi]
- An Analysis and Validation Toolkit to Support the Undergraduate Course of Computer Organization and ArchitectureYanjun Shu, Zhuangyu Ma, Hongwei Liu, Zhan Zhang, Dongxin Wen, Bing Xu, Danyan Luo, Decheng Zuo. 465-474 [doi]
- Evaluation and Prognostics of the Higher Education Based on Neural Network and AHP-PLS Structural EquationsFanyueyang Zhang, Xunbo Zhang, Zirui Tang, Xianhua Song. 475-490 [doi]
- Construction of Multiple Linear Regression Prediction Model of PRETCO-A Scores and Its Positive Backwash Effect on TeachingHai-yun Han, Yuan-hui Li. 491-502 [doi]
- Demos of Passing Turing Test SuccessfullyShengyuan Wu. 505-514 [doi]