Abstract is missing.
- MiniMCTAD: Minimalist Monte Carlo Transport Architecture DesignSiqing Fu, Tiejun Li, Jianmin Zhang, Sheng Ma, Sheng Liu. 1-10 [doi]
- CE-Dedup: Cost-Effective Convolutional Neural Nets Training based on Image DeduplicationXuan Li, Liqiong Chang, Xue Liu. 11-18 [doi]
- SLAMVis: An Interactive Visualization Approach for Smart Labeling on Multidimensional DataAijuan Qian, Chenlu Li, Xiaoju Dong, Shengtao Chen, Yanling Zhang, Guoqiang Li. 19-26 [doi]
- HFBT: An Efficient Hierarchical Fault-tolerant Method for Cloud Storage SystemLing Xiao, Beiji Zou, Chengzhang Zhu, Meng Zeng, Zhi Chen. 27-36 [doi]
- ATMCC: Design of the Integration Architecture of Cloud Computing and Blockchain for Air Traffic ManagementXin Lu, Zhijun Wu. 37-43 [doi]
- TATA: Throughput-Aware TAsk Placement in Heterogeneous Stream Processing with Deep Reinforcement LearningXiao Huang, Yu Jiang, Hao Fan, Huayun Tang, Yiping Wang, Jin Jin, Hai Wan, Xibin Zhao. 44-54 [doi]
- HTtext: A TextCNN-based pre-silicon detection for hardware TrojansYi Xu, Zhenyi Chen, Binhong Huang, Ximeng Liu, Chen Dong 0002. 55-62 [doi]
- PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DAppChun Liu, Lin Yang, Linru Ma, Liucheng Shi, Xuexian Hu, Weipeng Cao, Jingjing Zhang. 63-72 [doi]
- PIPArch: Programmable Image Processing Architecture Using Sliding ArrayFeiyang Wu, Zhuoran Song, Jing Ke, Li Jiang, Naifeng Jing, Xiaoyao Liang. 73-80 [doi]
- KubeHICE: Performance-aware Container Orchestration on Heterogeneous-ISA Architectures in Cloud-Edge PlatformsSaqing Yang, Yi Ren, Jianfeng Zhang, Jianbo Guan, Bao Li. 81-91 [doi]
- RLConfig: Run-time Configuration of Cluster Schedulers via Deep Reinforcement LearningXiaohui Wei, Changbao Zhou, Yong Sheng, Yan Wu, Lina Li, Shang Gao 0005. 92-99 [doi]
- DRL-Deploy: Adaptive Service Function Chains Deployment with Deep Reinforcement LearningXiaohui Wei, Yong Sheng, Lina Li, Changbao Zhou. 100-107 [doi]
- Vapor: A GPU Sharing Scheduler with Communication and Computation Pipeline for Distributed Deep LearningXiaorui Zhu, Lei Gong, Zongwei Zhu, Xuehai Zhou. 108-116 [doi]
- AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-levelKunli Lin, Haojun Xia, Kun Zhang 0016, Bibo Tu. 117-124 [doi]
- HyperKV: A High Performance Concurrent Key-Value Store for Persistent MemoryPenghao Sun, Dongliang Xue, Litong You, Yan Yan, Linpeng Huang. 125-134 [doi]
- DRAM: Dragonfly Routing Algorithm on Multi-objects by Optimal ThresholdsYihuan Qian, Songwen Pei, Jihong Yuan, Dianle Zhou, Tong Liu, Linghe Kong. 135-142 [doi]
- EPINE: Enhanced Proximity Information Network EmbeddingMing Xu, Luoyi Zhang, Baoming Zhang, Meng Cao, Jinliang Yuan, Chongjun Wang. 143-150 [doi]
- Accuracy vs. Efficiency: Achieving both Through Hardware-Aware Quantization and Reconfigurable Architecture with Mixed PrecisionLibo Chang, Shengbing Zhang, Huimin Du, Shiyu Wang, Meikang Qiu, Jihe Wang. 151-158 [doi]
- AutoTSMM: An Auto-tuning Framework for Building High-Performance Tall-and-Skinny Matrix-Matrix Multiplication on CPUsChendi Li, Haipeng Jia, Hang Cao, Jianyu Yao, Boqian Shi, Chunyang Xiang, Jinbo Sun, Pengqi Lu, Yunquan Zhang. 159-166 [doi]
- KBP: Mining Block Access Pattern for I/O Prediction with K-TrussJia Ma, Xianqi Zheng, Yubo Liu, Zhiguang Chen. 167-176 [doi]
- ECCH: Erasure Coded Consistent Hashing for Distributed Storage SystemsYinglong Xiong, Jiang Zhou, Lin Su, Weiping Wang 0005, Yong Chen 0001. 177-184 [doi]
- CMSS: Collaborative Modeling of Safety and Security Requirements for Network ProtocolsZhihao Liu, Qiang Wang, Yongjian Li, Yongxin Zhao. 185-192 [doi]
- 2Graph: An Efficient and Unified Out-of-Core Graph Computing ModelBaoke Li, Cong Cao, Yuhai Lu, Yanbing Liu, Baohui Li, Binxing Fang, Jianhui Fu. 193-201 [doi]
- E-VM: An Elastic Virtual Machine Scheduling Algorithm to Minimize the Total Cost of Ownership in a Hybrid CloudMilan M. Shetti, Bingzhe Li, David H. C. Du. 202-211 [doi]
- SM9-based Anonymous Search over Encrypted DataKe Ren, Peng Jiang, Liehuang Zhu, Keke Gai. 212-219 [doi]
- GR-ADMM: A Communication Efficient Algorithm Based on ADMMXin Huang, Guozheng Wang, Yongmei Lei. 220-227 [doi]
- FedGroup: Efficient Federated Learning via Decomposed Similarity-Based ClusteringMoming Duan, Duo Liu, Xinyuan Ji, Renping Liu, Liang Liang 0002, Xianzhang Chen, Yujuan Tan. 228-237 [doi]
- FastTune: Timely and Precise Congestion Control in Data Center NetworkRenjie Zhou, Dezun Dong, Shan Huang, Yang Bai. 238-245 [doi]
- FGPA: Fine-Grained Pipelined Acceleration for Depthwise Separable CNN in Resource Constraint ScenariosChunhua Xiao, Dandan Xu, Shi Qiu, Chen Shi, Kun Ning. 246-254 [doi]
- PAARD: Proximity-Aware All-Reduce Communication for Dragonfly NetworksJunchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan Xiao. 255-262 [doi]
- WST+iMPT: A High-performance Incremental Verification World State Model for Massive AccountsLanju Kong, Yaming Dou, Qingqing Yin, Xinping Min, Qingzhong Li. 263-270 [doi]
- NetANNS: A High-Performance Distributed Search Framework Based On In-Network ComputingPenghao Zhang, Heng Pan, Zhenyu Li 0001, Gaogang Xie, Penglai Cui. 271-278 [doi]
- PCGraph: Accelerating GNN Inference on Large Graphs via Partition CachingLiZhi Zhang, Zhiquan Lai, Yu Tang, Dongsheng Li, Feng Liu, Xiaochun Luo. 279-287 [doi]
- QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask BitsZhen Xu, Wenbo Zhang. 288-299 [doi]
- BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural NetworkXinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao. 300-307 [doi]
- Alter: Towards Optimizing Persistent Indexes in Hybrid Memory SystemsZiyue Xu, Lixiao Cui, Gang Wang, Xiaoguang Liu. 308-315 [doi]
- MADC: Multi-scale Attention-based Deep Clustering for Workload PredictionJiaming Huang, Chuming Xiao, Weigang Wu, Ye Yin, Hongli Chang. 316-323 [doi]
- Treator: a Fast Centralized Cluster Scheduling at Scale Based on B+ Tree and BSPYuzhao Wang, Junqing Yu, Zhibin Yu 0001. 324-335 [doi]
- Dyacon: JointCloud Dynamic Access Control Model of Data Security Based on Verifiable CredentialsTao Zhong, Junsheng Chang, Peichang Shi, Linhui Li, Fei Gao. 336-343 [doi]
- BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS EnvironmentsLi Lin, Shuang Li, Xuhui Lv, Bo Li. 344-351 [doi]
- Encrypt DNS Traffic: Automated Feature Learning Method for Detecting DNS TunnelsShuai Ding, Daoqing Zhang, Jingguo Ge, Xiaowei Yuan, Xinhui Du. 352-359 [doi]
- IMOPSOQ: Offloading Dependent Tasks in Multi-access Edge ComputingShuyue Ma, Shudian Song, Lingyu Yang, Jingmei Zhao, Feng Yang, Linbo Zhai. 360-367 [doi]
- BEADS: Blockchain-Empowered Auction in Decentralized StorageXinxuan Huang, Jigang Wu, Jiaxing Li, Chengpeng Xia. 368-373 [doi]
- Finding Runtime Usable Gadgets: On the Security of Return Address AuthenticationQizhen Xu, Zhijie Zhang, Lin Zhang, Liwei Chen, Gang Shi. 374-381 [doi]
- ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution FiltersXiaobo Guo, Fali Wang, Neng Gao, Zeyi Liu, Kai Liu. 382-389 [doi]
- Understanding the Runtime Overheads of Deep Learning Inference on Edge DevicesXiu Ma, Guangli Li, Lei Liu 0040, Huaxiao Liu, Lei Liu, Xiaobing Feng. 390-397 [doi]
- Parameter Servers Placement for Distributed Deep Learning in Edge computingJiaquan Yan, Yalan Wu, Jigang Wu, Long Chen. 398-404 [doi]
- Alleviating Imbalance in Synchronous Distributed Training of Deep Neural NetworksHaiyang Lin, Mingyu Yan, Duo Wang, Wenming Li, Xiaochun Ye, Zhimin Tang, Dongrui Fan. 405-412 [doi]
- A Distributed Computation Offloading Scheduling Framework based on Deep Reinforcement LearningBin Dai, Tao Ren, Jianwei Niu 0002, Zheyuan Hu, Shucheng Hu, Meikang Qiu. 413-420 [doi]
- Exploration of the Influence on Training Deep Learning Models by Watermarked Image DatasetShiqin Liu, Shiyuan Feng, Jinxia Wu, Wei Ren 0002, Weiqi Wang, Wenwen Zheng. 421-428 [doi]
- Grouping Synchronous to Eliminate Stragglers with Edge Computing in Distributed Deep LearningZhiyi Gui, Xiang Yang, Hao Yang, Wei Li, Lei Zhang, Qi Qi, Jingyu Wang 0001, Haifeng Sun, Jianxin Liao. 429-436 [doi]
- Novel Resource Allocation Algorithm of Edge Computing Based on Deep Reinforcement Learning MechanismDegan Zhang 0001, Hong-rui Fan, Jie Zhang. 437-444 [doi]
- Intrusion Detection Method based on Deep LearningZhijun Wu 0001, Cheng Liang, Yuqi Li. 445-452 [doi]
- A Two-stage Replica Management Mechanism for Latency-Aware Applications in Multi-Access Edge ComputingYang Liang, Zhigang Hu, Liu Yang. 453-459 [doi]
- Joint Optimization of Data Caching and Task Scheduling based on Information Entropy for Mobile Edge ComputingPengwei Wang, Yajun Zhao, Zhaohui Zhang. 460-467 [doi]
- Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated LearningTian Dong, Han Qiu 0001, Jialiang Lu, Meikang Qiu, Chun Fan. 468-475 [doi]
- Unsupervised Anomaly Detection with Variational Auto-Encoder and Local Outliers Factor for KPIsShili Yan, Bing Tang, Jincheng Luo, Xing Fu, Xiaoyuan Zhang. 476-483 [doi]
- An application-level failure detection algorithm based on a robust and efficient torus-tree for HPCYingjun Ye, Yongdong Zhang 0002, Weicai Ye. 484-492 [doi]
- Diagnosing Performance Issues in Microservices with Heterogeneous Data SourceChuanjia Hou, Tong Jia, Yifan Wu, Ying Li, Jing Han. 493-500 [doi]
- Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic DataZhongyang Wang, Yijie Wang, Zhenyu Huang, Yongjun Wang. 501-508 [doi]
- Domain Adaptive Semantic Segmentation via Image Translation and Representation AlignmentJingxuan Kang, Bin Zang, Weipeng Cao. 509-516 [doi]
- Image Distillation Based Screening for X-ray Crystallography Diffraction ImagesLingyao Chen, Kang Xu, Xiaoying Zheng, Yongxin Zhu 0001, Yi Jing. 517-521 [doi]
- Synthesis and Segmentation Method of Cross-Staining Style Nuclei Pathology Image Based on Adversarial LearningZiheng Zhou, Hong Guo, Yuwen Guo, Huanhuan Sheng. 522-532 [doi]
- Real-Time Ship detection from Infrared Images Through Multi-feature FusionRui Miao, Hongxu Jiang, Fangzheng Tian, Xiaobin Li, Yonghua Zhang, Dong Dong. 533-538 [doi]
- Movie Big Data Intelligent Recommendation System Based on Knowledge GraphGang Qiu, Yanli Guo. 539-546 [doi]
- A Heterogeneous Stochastic Computing Multiplier for Universally Accurate and Energy-Efficient DNNsJihe Wang, Hao Chen, Danghui Wang, Kuizhi Mei, Shengbing Zhang, Xiaoya Fan. 547-554 [doi]
- Energy-Efficient Scheduling Algorithms with Reliability Goal on Heterogeneous Embedded SystemsYu Han, Wei Hu, Jing Liu, Yu Gan. 555-562 [doi]
- An efficient hybrid MPI/OpenMP parallelization of the asynchronous ADMM algorithmQinnan Qiu, Yongmei Lei, Dongxia Wang 0003, Guozheng Wang. 563-570 [doi]
- Task Tree Partition and Subtree Allocation for Heterogeneous MultiprocessorsSuna He, Jigang Wu, Bing Wei, Jiaxin Wu. 571-577 [doi]
- An Efficient Scheduling Algorithm for Distributed Heterogeneous Systems with Task Duplication AllowedHao Shi, Yixiang Chen, Jinyi Xu. 578-587 [doi]
- An Effective Outlier Detection Method for EAF Based on an Iterative Heterogeneous EnsembleJiong Zhang, Biao Wang, Hongjun Dai. 588-593 [doi]
- A Genetic Algorithm for Scheduling in Heterogeneous Multicore System Integrated with FPGAQingyuan Jiang, Jinyi Xu, Yixiang Chen. 594-602 [doi]
- Learning Heterogeneous DAG Tasks Scheduling Policies With Efficient Neural Network EvolutionWeiyu Tan, Tian Ling, Zhenyu Zeng, Ying Tao, Yuxia Cheng. 603-610 [doi]
- An Edge Computing Architecture and Application Oriented to Distributed MicrogridGuo-Hong, Cui Hanjing. 611-617 [doi]
- Application Virtualization: An Agent Encapsulation of Software in Virtual Machines to Archive the Execution Performance in HostsYifan Liang, Hongjun Dai. 618-625 [doi]
- Analysis of BBR's Non-queuing Optimal ModelZhijun Wu, Junjun Guo, Weihang Cui. 626-631 [doi]
- Fault Tolerant XY-YX Routing Algorithm Supporting Backtracking Strategy for NoCJianfeng An, Hongjun You, Jinhua Sun, Jiawei Cao. 632-635 [doi]
- Research and Application of a Multidimensional Association Rules Mining Algorithm Based on HadoopGuo-Hong, Guo Nan. 636-643 [doi]
- A Lightweight, Privacy-Preserving Tensor Completion Framework for Internet of ThingsShuyu Wu, Linghe Kong, Qiao Xiang, Zhenzhe Zheng, Luoyi Fu, Guihai Chen. 644-651 [doi]
- Hashing Based Data Distribution in Heterogeneous StorageJiang Zhou, Lin Su, Weiping Wang, Yong Chen. 652-659 [doi]
- A Novel Shape-based Robotic Sorting Approach based on Computer VisionTanhong Chen, Tao Ren, Jianwei Niu, Qingfeng Li. 660-667 [doi]
- Trajectory Privacy Protection Method based on Shadow vehiclesYaqiong Ma, Xiangyu Bai, Zhaoran Wang. 668-673 [doi]
- CPU-GPU Collaborative Acceleration of Bulletproofs - A Zero-Knowledge Proof AlgorithmYing Huang, Xiaoying Zheng, Yongxin Zhu 0001, Xiangcong Kong, Xinru Jing. 674-680 [doi]
- Mixed-precision Methods to Reconstruct Numerical Ocean SimulationsJiayi Lai, Lin Gan, Lanning Wang. 681-688 [doi]
- Polarmask-Tracker: Lightweight Multi-Object Tracking and Segmentation Model for Edge DeviceXiaoyun Dong, Zhenchao Ouyang, Zeling Guo, Jianwei Niu 0002. 689-696 [doi]
- Hexagonal Tiling based Multiple FPGAs Stencil Computation Acceleration and Optimization MethodologyJinyu Wang, Yifei Kang, Yiwen Li, Weiguo Wu, Song Liu 0007, Longxiang Wang. 697-705 [doi]
- Accelerating Message Passing Operation of GDL-Based Constraint Optimization Algorithms Using MultiprocessingSyeed Abrar Zaoad, Tauhid Tanjim, Mir Hasan, Md. Mamun-Or-Rashid, Ibrahem Abdullah Almansour, Md. Mosaddek Khan. 706-714 [doi]
- Vectorized Winograd's algorithm for Convolution Neural networksYuekai Zhao, Jianzhuang Lu, Xiaowen Chen. 715-722 [doi]
- Multi-path Routing Deployment Method Based on SRv6Lihua Song, Yuzhu Jin, Pengyu Wang, Dongchao Ma, Wenlong Chen, Laizhong Cui. 723-730 [doi]
- Multi-Path Forwarding Strategy for Named Data Networking Based on Pending Interests and Available BandwidthShanshan Shi, Jun Li, Bin Han 0004, Haibo Wu, Yuxiang Ma, Qian Dong, Hans D. Schotten. 731-737 [doi]
- Cooperative Charging Algorithm Based on K-mean++ Clustering for WRSNYing Zeng, Minghua Wang, Bo Fan. 738-744 [doi]
- Deep Reinforcement Learning-based Adaptive Clustering Approach in Short Video Sharing through D2D CommunicationWentao Dong, Zhuo Li, Xin Chen. 745-752 [doi]
- Optimization for Node Cooperation in Hierarchical Federated LearningXin Shen, Zhuo Li 0003, Xin Chen 0018. 753-760 [doi]
- Satellite Network Traffic Scheduling Algorithm Based on Multi-Agent Reinforcement LearningTingting Zhang, Mingqi Zhang, Lintao Yang, Tao Dong 0002, Jie Yin, Zhihui Liu, Jing Wu, Hao Jiang. 761-768 [doi]
- Analysis of the use of Machine Learning in the detection and prediction of hypertension in COVID 19 patients. A review of the scientific literatureLuis Herrera-Huisa, Nicole Arias-Meza, Michael Cabanillas-Carbonell. 769-775 [doi]
- A Game Theoretic Approach to Task Offloading for Multi-Data-Source Tasks in Mobile Edge ComputingShuyu Chen, Shiyong Sun, Haopeng Chen, Jinteng Ruan, Ziming Wang. 776-784 [doi]
- Content Security over ICN based Smart Grid: A Cryptographic SolutionYanrong Lu, Meng Yue, Zhijun Wu 0001. 785-791 [doi]
- Unified Authentication Scheme for IoT Blockchain Based on PUFDawei Li, Yingxian Song, Lixin Zhang, Di Liu, Baoquan Ma, Zhenyu Guan. 792-798 [doi]
- A Blockchain-based Verified Locating Scheme for IoT DevicesZhenyu Guan, Xiaoqing Wen, Dawei Li, Mai Xu, Haihua Li. 799-805 [doi]
- SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoTYongqing Zhu, Zhenyu Guan, Ziyi Wang, Dawei Li, Yawei Wang, Mai Xu. 806-813 [doi]
- Robust Social Event Detection via Deep ClusteringJiaofu Zhang, Lianzhong Liu, Zihang Huang, Lihua Han, Shuhai Wang, Tongge Xu, Jingyi Zhang, Yangyang Li, Yifeng Liu, Md Zakirul Alam Bhuiyan. 814-819 [doi]
- An Energy-balanced Routing by Considering Neighbor Node's Energy Based on Small World WSNLinlin Liu, Minghua Wang, Yan Wang. 820-825 [doi]
- Capture Uncertainties in Deep Neural Networks for Safe Operation of Autonomous Driving VehiclesLiuhui Ding, Dachuan Li, Bowen Liu, Wenxing Lan, Bing Bai, Qi Hao, Weipeng Cao, Ke Pei. 826-835 [doi]
- A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving SystemsXingshuo Han, Kangjie Chen, Yuan Zhou, Meikang Qiu, Chun Fan, Yang Liu, Tianwei Zhang 0004. 836-844 [doi]
- Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSPChen Zhao, Jiaqi Yin, Huibiao Zhu, Ran Li. 845-852 [doi]
- The Random Content Poisoning Attack in NDNPengfei Yue, Ru Li, Bin Pang. 853-860 [doi]
- Distributed V2V Computing Offloading Method Based on Delay and Fairness AwarenessGuoliang Yang, Mengqi Xiong, Guangsheng Feng, Yuzheng Liu, Yun Huang. 861-867 [doi]
- Secure Vehicle Platooning Protocol for 5G C-V2XFeifei Liu, Di Liu, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan, Jianwei Liu. 868-875 [doi]
- A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart GridYa-Nan Cao, Yujue Wang, Yong Ding 0005, Haibin Zheng, Zhenyu Guan, Huiyong Wang. 876-883 [doi]
- An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster NetworkLemei Da, Yujue Wang, Yong Ding 0005, Wanjun Xiong, Huiyong Wang, Hai Liang. 884-891 [doi]
- Self-Attention based Automated Vulnerability Detection with Effective Data RepresentationTongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Gang Shi. 892-899 [doi]
- A Framework for Deep Q-Learning Based Hybrid DVFS Algorithms for Real-Time SystemsKe Yu, Hongwang Xiao, Ying Zhao, Jiao Tian, Jinjun Chen. 900-907 [doi]
- Global-view based Task Migration for Deep Learning ProcessorJinyu Cheng, Kai Zhao, Yuanchao Xu 0002. 908-915 [doi]
- Heuristic-based Blockchain Assignment: An Empirical StudyJianyu Chen, Keke Gai, Peng Jiang, Liehuang Zhu. 916-923 [doi]
- Kubeflow-based Automatic Data Processing Service for Data Center of State Grid ScenarioChongyou Xu, Guangxian Lv, Jian Du, Lei Chen, Yu Huang, Wang Zhou. 924-930 [doi]
- Target-oriented Self Training for Heterogeneous Domain AdaptationAn Da, Rui Zhang, Shuang Li, Weipeng Cao. 931-938 [doi]
- An Endurance-aware RAID-6 Code with Low Computational Complexity and Write OverheadNingjing Liang, Xingjun Zhang, Xurui Wu, Heng Chen 0002, Changjiang Zhang. 939-946 [doi]
- A new meta-heuristic task scheduling algorithm for optimizing energy efficiency in data centersShikui Zhang, Ce Chi, Kaixuan Ji, Zhiyong Liu 0002, Fa Zhang 0001, Penglei Song, Huimei Yuan, Dehui Qiu, Xiaohua Wan. 947-954 [doi]
- Edge-Based Sampling for Complex Network with Self-Similar StructureWenting Wang, Xianghua Fu, Xinze Lin. 955-962 [doi]
- Extend PBFT Protocol with L-DAGAnping Song, Yi Dai, Ruyi Ji, Ziheng Song. 963-970 [doi]
- Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding ProblemShintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto. 971-977 [doi]
- Optimal FPGA-oriented lightweight network architecture search under multi-objective constraintsXiaobin Li, Hongxu Jiang, Fangzheng Tian, Yonghua Zhang, Rui Miao, Donghuan Xu. 978-983 [doi]
- Machine Learning-assisted Computational Steering of Large-scale Scientific SimulationsWuji Liu, Qianwen Ye, Chase Q. Wu, Yangang Liu, Xin Zhou, Yunpeng Shan. 984-992 [doi]
- +-Trees on Coupled CPU-GPU ArchitecturesHan Huang, Hua Luan. 993-1001 [doi]
- Influence of optimization techniques on software performance for subsequent generations of CUDA architectureJacek Gambrych. 1002-1009 [doi]
- Co-designing the Topology/Algorithm to Accelerate Distributed TrainingXiang Hou, Rui Xu, Sheng Ma, Qiong Wang, Wei Jiang, Hongyi Lu. 1010-1018 [doi]
- NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUsXiandong Huang, Qinglin Wang, Shuyu Lu, Ruochen Hao, Songzhu Mei, Jie Liu. 1019-1026 [doi]
- Deep reinforcement learning for partial offloading with reliability guaranteesJi Li, Zewei Chen, Xin Liu. 1027-1034 [doi]
- Parallel analysis of TACLeBench kernel benchmark's loop and procedure level speculationHuiling Meng, Yaobin Wang, Ling Li, Manasah Musariri, Xinyi Wang. 1035-1040 [doi]
- Cost-Aware Virtual Cluster Placement in Software-Defined Cloudlet NetworksKangkang Li, Yitao Qiu, Kaiqiang Zhang, Congfeng Jiang, Jian Wan. 1041-1052 [doi]
- Enhancing Matrix Factorization-based Recommender Systems via Graph Neural NetworksZhiwei Guo, Dian Meng, Huiyan Zhang, Heng Wang, Keping Yu. 1053-1059 [doi]
- A Similarity-Based Method for Base Station Selection in 5G NetworksLei Zhang, Xuefei Chen, Yuxiang Ma. 1060-1066 [doi]
- Dynamic Fine-Grained Workload Partitioning for Irregular Applications on Discrete CPU-GPU SystemsChunhua Xiao, Wei Ran, Fangzhu Lin, Lin Zhang. 1067-1074 [doi]
- Quantization improvements for LU Decomposition to Solve Linear EquationsLin Chen, Kang He, Hao Jiang, Roberto Barrio, Jie Liu, Tiejun Li. 1075-1082 [doi]
- Agile Approach on the Performance Prediction of ARM TrustZone-based Mandatory Access Control Security EnhancementZhipeng Li, Yan Ding, Xiaofan Chen, Pan Dong, Chenlin Huang, Liantao Song, Peng Wang. 1083-1090 [doi]
- Failure Diagnosis for Cluster Systems using Partial CorrelationsEdward Chuah, Arshad Jhumka, Samantha Alt, R. Todd Evans, Neeraj Suri. 1091-1101 [doi]
- A Sleep Stage Classification Method via Combination of Time and Frequency Domain Features based on Single-Channel EEGCaihong Zhao, Wenpeng Neng. 1102-1109 [doi]
- QMIMC: Q-Learning Model Based on Imperfect-information under Multi-agent CrowdtestingJie Zhang, Kefan Li, Baoming Zhang, Ming Xu, Chongjun Wang. 1110-1117 [doi]
- An Obstacle Avoidance Method Based on Advanced Rapidly-exploring Random Tree for Autonomous NavigationChengzhen Meng, Hongjun Dai. 1118-1125 [doi]
- Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application TrafficLuMing Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu. 1126-1134 [doi]
- Mining Configuration Items From System Logs through Distant SupervisionQixun Zhang, Tong Jia, Wensheng Xia, Ying Li, Zhonghai Wu, Jing Han. 1135-1142 [doi]
- Hardware architecture design of HEVC entropy decodingShiyu Wang, Shengbing Zhang, Jihe Wang, Libo Chang, Liangyou Feng, Xiaoya Fan. 1143-1150 [doi]
- Modeling Cache and Application Performance on Modern Shared Memory MultiprocessorsJunsung Yook, Bernhard Egger. 1151-1158 [doi]
- Research on An Approach of ARP Flooding Suppression in Multi-Controller SDN NetworksJinhua Du, Xianming Gao, Jingchao Wang, Shaohua Liu, Weipeng Cao, Yanbo Song, Shanqing Jiang. 1159-1166 [doi]
- FFDNet-Based Channel Estimation for Beamspace mmWave Massive MIMO SystemsWei Gao, Meihong Yang, Wei Zhang, Yuhan Zhao, Yan Zhou, Kai Zhang. 1167-1170 [doi]
- A hybrid CPU/GPU Scheme for Optimizing ChaCha20 Stream CipherZiheng Wang, Heng Chen, Weiling Cai. 1171-1178 [doi]
- A High Performance Computing Method for Noise Cross-Correlation Functions of Seismic DataJunwei Zhou, Qian Wei, Chao Wu, Guangzhong Sun. 1179-1182 [doi]
- A Two-level Concurrent Address Translation Cache of High Performance Interconnect NetworkJianmin Zhang, Tiejun Li, Yan Sun. 1183-1188 [doi]
- A Decentrlized Trading Model Based on Public Blockchain with Regulatable Bi-Tierred IdentitiesHongbo Li, Tao Xie, Jin Xie. 1189-1198 [doi]
- A Fine-grained Optimization to Winograd Convolution Based on Micro-architectural Features of CPUXiaofeng Chen, Zhiguang Chen, Yutong Lu, Dan Huang. 1199-1208 [doi]
- Energy-Efficient CNNs Accelerator Implementation on FPGA with Optimized Storage and DataflowYonghua Zhang, Hongxu Jiang, Xiaobin Li, Rui Miao, Jinyan Nie, Yu Du. 1209-1214 [doi]
- A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHAWenwen Zheng, Weiqi Wang, Wei Ren, Shiyuan Feng, Shiqin Liu, Yi Ren. 1215-1221 [doi]
- Coalitional Double Auction for Ride-Sharing with Buyout Ask PriceXingyi Yuan, Long Chen 0006, Jiale Huang, Jigang Wu. 1222-1229 [doi]
- A Memory Saving Mechanism Based on Data Transferring for Pipeline ParallelismWei Jiang, Rui Xu, Sheng Ma, Qiong Wang, Xiang Hou, Hongyi Lu. 1230-1235 [doi]
- Siamese Generative Adversarial Predicting Network for Extremely Sparse Data in Recommendation SystemQingXian Wang, Renjian Zhang, Kangkang Ma, Bo Chen, Jiufang Chen, Xiaoyu Shi. 1236-1241 [doi]
- Semantic Social Event Evolution DiscoveringZihang Huang, Lianzhong Liu, Jiaofu Zhang, Lihua Han, Shuhai Wang, Tongge Xu, Yangyang Li, Yifeng Liu, Md Zakirul Alam Bhuiyan. 1242-1247 [doi]
- Decrease Iteration Time Deterministic Cyclic Scheduling for Real-time Periodic TasksMingqi Li, Hong Guo, Jing Liu, Yu Gan, Wei Hu. 1248-1254 [doi]
- Blind Zone Performance Enhancement with THz CommunicationRuixue Li, Jing Wu, Ning Li, Ruiliang Song. 1255-1260 [doi]
- Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on BlockchainSiYuan Zheng, Changqing Yin, Bin Wu. 1269-1278 [doi]
- Software-Hardware Co-Optimization for CNNs Based on Reconfigurable DevicesFang Liu, Zimeng Fan, Yanxiang He, Min Peng. 1279-1286 [doi]
- Joint User Association and Resource Allocation for MmWave and THz Coexistence NetworksWeiran Wang, Jing Wu, Ning Li, Ruiliang Song. 1287-1294 [doi]
- Object Pose Estimation for Robotic Grasping based on Multi-view Keypoint DetectionZheyuan Hu, Renluan Hou, Jianwei Niu, Xiaolong Yu, Tao Ren, Qingfeng Li. 1295-1302 [doi]
- Efficient Spatio-Temporal-Data-Oriented Range Query Processing for Air Traffic Flow StatisticsHuayan Yu, Xin Li, Ligang Yuan, Xiaolin Qin. 1303-1310 [doi]
- Profiling HPC Applications with Low Overhead and High AccuracyJingyuan Zhao, Xin Liu, Yao Liu, Penglong Jiao, Jinshuo Liu, Wei Xue. 1311-1319 [doi]
- Fault-Tolerant Routing of Generalized Hypercubes under 3-Component ConnectivityChang Shu, Yan Wang, Jianxi Fan, Huanwen Zhang. 1320-1327 [doi]
- Big Data Analysis with Momentum Strategy on Data-driven TradingXiangyu Gao, Meikang Qiu, Zhen He. 1328-1335 [doi]
- Optimization of the parallel semi-Lagrangian scheme in the YHGSM based on the adaptive maximum wind speedDasheng Liu, Jianping Wu, Tao Jiang, Yingjie Wang, Xiaotian Pan, Penglun Li. 1336-1344 [doi]
- Accelerating Data-Flow Analysis with Full-PartitioningYuantong Zhang, Liwei Chen, Xiaofan Nie, Zhijie Zhang, Haolai Wei, Gang Shi. 1345-1352 [doi]
- Adaptive attention encoder for attribute graph embeddingZiqiang Weng, Weiyu Zhang, Zhongxiu Xia. 1353-1359 [doi]
- An Adaptive Time Stepping Algorithm and Its Application to Platelet Aggregation SimulationWeicai Ye, Hao Wu, Zhijun Tan, Qingsong Zou. 1360-1369 [doi]
- PANDA: Population Automatic Neural Distributed Algorithm for Deep LeaningJia Wei, Xingjun Zhang, Zeyu Ji, Jingbo Li, Zheng Wei. 1370-1377 [doi]
- Modeling and Solution Algorithm of Virtual Machines Optimization Provision Problem for Application Deployment in Public CloudFanchao Meng, Qingran Ji, Dianhui Chu, Xuequan Zhou. 1378-1385 [doi]
- Multi-network Embedding for Missing Point-of-Interest IdentificationJunhang Wu, Ruimin Hu, Dengshi Li, Yilin Xiao, Lingfei Ren, Wenyi Hu. 1386-1393 [doi]
- Coupled Self-Exciting Process for Information Diffusion PredictionYuyang Liu, Yuxiang Ma, Junruo Gao, Zefang Zhao, Jun Li. 1394-1401 [doi]
- Practical Deanonymization Attack in Ethereum Based on P2P Network AnalysisYue Gao 0003, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Zelin Yin, Yanyan Yang. 1402-1409 [doi]
- Lossless Compression of Bitstream Configuration Files: Towards FPGA CloudJinyu Wang, Yifei Kang, Yaqi Feng, Yiwen Li, Weiguo Wu, Guoliang Xing. 1410-1421 [doi]
- ORIC: A Self-Adjusting Blockchain Protocol with High ThroughputTing Xiong, Tao Xie 0001, Jin Xie, Xiaochun Luo. 1422-1434 [doi]
- Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWEJianguo Sun, Yuqing Qiao, Zechao Liu, Yitao Chen, Yang Yang 0106. 1435-1443 [doi]
- Parallel Counterfactual Regret Minimization in Crowdsourcing Imperfect-information Expanded GameJie Zhang, Kefan Li, Baoming Zhang, Ming Xu, Chongjun Wang. 1444-1451 [doi]
- Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly DetectionShang Wu, Yijie Wang. 1452-1459 [doi]
- Fast Settlement Scheme of Aviation Business Privacy Preservation Based on Consortium BlockchainXingguang Zhou, Ziyu Meng, Yi Liu. 1460-1468 [doi]
- Off-chain Anonymous Payment Channel Scheme based on MimblewimbleZhenyu Guan, Lixin Zhang, YingPeng Zhang, Dawei Li, Yu Sun, Jian Cui. 1469-1475 [doi]
- Base Station handover Based on User Trajectory Prediction in 5G NetworksYuxiang Ma, Xuefei Chen, Lei Zhang. 1476-1482 [doi]
- Efficient Wireless Static Chargers Deployment for UAV NetworksMengqi Li, Liang Liu 0006, Yanlin Wang, Jianfei Peng, Jie Xi, Lisong Wang. 1483-1490 [doi]
- The Effect of Text Ambiguity on creating Policy Knowledge GraphsAnantaa Kotal, Anupam Joshi, Karuna Pande Joshi. 1491-1500 [doi]
- An Optimum Decision Making Framework for Allocating Spot Instances to Execute Batch Workload in CloudNaghmeh Dezhabad, Sudhakar Ganti, Gholamali C. Shoja. 1501-1508 [doi]
- An Analysis of Multi-Modal Deep Learning for Art Price AppraisalBin Li, Teng Liu. 1509-1513 [doi]
- A Survey on Privacy Approaches for Social NetworksRegina Marin, Luciano Gallegos. 1514-1521 [doi]
- Using Content Analysis and Machine Learning to Identify COVID-19 Information Relevant to Low-income Households on Social MediaSarthak Khanal, Rus Refati, Kyle Glandt, Doina Caragea, Sifan Xu, Chien-fei Chen. 1522-1531 [doi]
- Semi-Supervised Self Training to Assess the Credibility of TweetsLeyu Gao, Sandeep Shah, Nasser Assery, Xiaohong Yuan, Xiuli Qu, Kaushik Roy 0003. 1532-1537 [doi]
- Sarcasm Detection in Politically Motivated Social Media ContentHieu Nguyen, Jihye Moon, Nijhum Paul, Swapna S. Gokhale. 1538-1545 [doi]
- MediNER: Understanding Diabetes Management Strategies Based on Social Media DiscourseOladapo Oyebode, Rita Orji. 1546-1553 [doi]
- A Survey of Stochastic Computing in Energy-Efficient DNNs On-EdgeDanghui Wang, Zhaoqing Wang, Linfan Yu, Ying Wu, Jiaqi Yang, Kuizhi Mei, Jihe Wang. 1554-1561 [doi]
- Modelling a Communication Channel under Jamming: Experimental Model and ApplicationsPietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro. 1562-1573 [doi]
- Synthetic Differential Privacy Data Generation for Revealing Bias Modelling RisksMatthew Wilchek, Yingjie Wang. 1574-1580 [doi]
- Designing a User Interface for Improving the Usability of a Statistical Disclosure Control ToolAnshika Rawat, Marijn Janssen 0001, Mortaza S. Bargh, Sunil Choenni. 1581-1591 [doi]
- Machine Learning with Reconfigurable Privacy on Resource-Limited Computing DevicesSana Imtiaz, Zannatun N. Tania, Hassan Nazeer Chaudhry, Muhammad Arsalan, Ramin Sadre, Vladimir Vlassov. 1592-1602 [doi]
- SP*: An Information Flow Secure LinuxParjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen. 1603-1612 [doi]
- A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability ScanningAnjie Chen, Zhibing Zhang. 1613-1616 [doi]
- Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert SystemsAhmed AlEroud, Faten Masalha, Ahmad A. Saifan. 1617-1624 [doi]
- Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement AttacksSiYuan Zheng, Changqing Yin, Bin Wu. 1625-1630 [doi]
- Artificial Accurate Time-stamp in Network AdaptersWojciech Wasko, Dotan David Levi, Teferet Geula, Amit Mandelbaum. 1631-1638 [doi]
- Centralized Graph based TSCH Scheduling for IoT Network ApplicationsNikumani Choudhury, Moustafa M. Nasralla, Prakhar Gupta, Ikram Ur Rehman. 1639-1644 [doi]
- A Study of Classifying Advanced Persistent Threats With Multi-Layered Deep Learning ApproachesYen-Hung Frank Hu, Chung-Chu George Hsieh. 1645-1650 [doi]
- Perturbation of Image-based Malware Detection with Smali level morphing techniquesFederico Gerardi, Giacomo Iadarola, Fabio Martinelli, Antonella Santone, Francesco Mercaldo. 1651-1656 [doi]
- Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of WebpagesAlexander O'Mara, Izzat Alsmadi, Ahmed AlEroud. 1657-1662 [doi]
- Workload Prediction in Edge Computing based on Graph Neural NetworkWeiwei Miao, Zeng Zeng, Mingxuan Zhang, Siping Quan, Zhen Zhang, Shihao Li, Li Zhang, Qi Sun. 1663-1666 [doi]
- Estimation of Ransomware Payments in Bitcoin EcosystemAli Hussein Raheem, Rand Raheem, Thomas M. Chen, Ahmed Alkhayyat. 1667-1674 [doi]
- Provisioning with Fine-grained Affinity for Container-enabled Cloud-edge SystemDingkun Yang, Nan Zhao, Hongshuang Ma, Jiasheng Yang. 1675-1681 [doi]
- Adaptive Task Scheduling in Cloud-Edge System for Edge Intelligence ApplicationZeng Zeng, Weiwei Miao, Shihao Li, Xiaoyun Liao, Mingxuan Zhang, Rui Zhang, Changzhi Teng. 1682-1689 [doi]
- The Design of Network Query System for Automobile Inspection DataBo Ma, Kuncheng Zhuo, Zanyou Su, Donghai Huang, Yonglong Zou. 1690-1696 [doi]
- Optimization of key and value storage in vector map renderingFeng Jing, Ying Jiang, Shengbin Chen, Xirong Lv, Jiayi He. 1697-1704 [doi]
- Intelligent Movement Method for Trajectory Map MatchingBo Zhang, Kuncheng Zhuo, Yifan Lan, Dayuan Chen. 1705-1709 [doi]
- Research and Development of Enterprise Data Security Transmission Management SystemBo Ma, Zanyou Su, Kuncheng Zhuo, Meng Li, Donghai Huang, Chuyi Yu, Ying Ma. 1710-1716 [doi]
- Remote Sensing Data Backup and Recovery System for Power IndustryFeng Jing, Donghai Huang, Yifei Wang, Xirong Lv, Qi Du. 1717-1723 [doi]
- A software defect detection algorithm based on asymmetric classification evaluationYanqi Xie, Xirong Lv, Ying Jiang, Zanyou Su, Nan Luo, Ying Ma. 1724-1728 [doi]
- Multi-Agent Reinforcement Learning for Edge Resource Management with Reconstructed EnvironmentWeiwei Miao, Zeng Zeng, Mingxuan Zhang, Siping Quan, Zhen Zhang, Shihao Li, Li Zhang, Qi Sun. 1729-1736 [doi]
- Microservice Replacement Algorithm in Cloud-Edge System for Edge IntelligenceWeiwei Miao, Zeng Zeng, Shihao Li, Lei Wei, Chengling Jiang, Siping Quan, Yong Li. 1737-1744 [doi]
- Revisiting IoT Fingerprinting behind a NATChristelle Nader, Elias Bou-Harb. 1745-1752 [doi]
- Private Drivers Identification based on users' routineGianpiero Costantino, Ilaria Matteucci, Davide Micale, Giuseppe Patanè 0002. 1753-1762 [doi]
- Reverse-Engineering the Physical Configuration of Smart HomesMartin Vivian, Ramin Sadre. 1763-1770 [doi]
- A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel AttacksMohd Khan, Yu Chen. 1771-1776 [doi]