Abstract is missing.
- A Hybrid Feature Selection Method Based on Imbalanced Learning for Wave PredictionQinjie Lin, Xiaoli Ren, Hao Sun, Jiaming Tan, Xiaoyong Li 0002, Jingze Lu. 1-9 [doi]
- Low-Latency State Management for Real-Time Tasks in Edge ServerlessYanyan Wen, Guangping Xu, Jianshe Wang, Wei Hao. 10-17 [doi]
- Adaptive Cost Weight-enabled Federated Distillation for Network Intrusion DetectionZidong Chen, Yan Wang, Sheng Cao, Xiaosong Zhang 0001. 18-25 [doi]
- HEGD-FL: A Privacy-Preserving Decentralized Federated Learning Framework Based on Homomorphic EncryptionPengyu Yao, Di Zhang 0010, Min Guo, Xun Shao. 26-33 [doi]
- Think Before Acting: The Necessity of Endowing Robot Terminals With the Ability to Fine-Tune Reinforcement Learning PoliciesDawei Feng, Xudong Gong, Xunhui Zhang, Jun Fu. 34-41 [doi]
- Parallel Assembly Sequence Planning Based on Sparrow Search AlgorithmsHaichen He, Weibin Liu, Yinan Zhang, Shasha Song, Yue Cheng, Ziheng Liu, Weiwei Xing. 42-49 [doi]
- A Contrastive Collaborative Filtering Method for Personalized Recommendation with Self-AttentionCheng Chen, Hao Tian, Hang Zhang, Wanchun Dou. 50-57 [doi]
- A Blockchain-Assisted Federated Learning Method for Recommendation SystemsHang Zhang, Hao Tian, Cheng Chen, Chen Tian 0001, Wanchun Dou. 58-65 [doi]
- Multi-Class Task Offloading Optimization in Mobile Edge ComputingSongkang Ma, Zhenli He, Libo Feng, Xiaolong Zhai, Yiyan Tong. 66-73 [doi]
- Advanced Virtualization in Automotive Operating System: Technology Overview and Scheme DesignYi Liu, Mengyun Yao, Xinglong Yang, Min Qin, Liang Ma, Haolong Xiang. 74-81 [doi]
- A Crowdsensing Service Pricing Method in Vehicular Edge ComputingZheng Li 0026, Sizhe Tang, Hao Tian, Haolong Xiang, Xiaolong Xu 0001, Wanchun Dou. 82-89 [doi]
- Mining Relational Similarity in Social Networks for Enhanced RecommendationsPengcheng Guo, Qingyang Wang, Jielin Jiang, Siyu Wu, Haolong Xiang, Xinyue Ji, Shengjun Xue. 90-97 [doi]
- AQMFL: An Adaptive Quantization Framework for Multi-modal Federated Learning in Heterogeneous Edge DevicesHaoyong Tang, Kaixuan Zhang, Jiuwu Zhang, Xin Xie 0001, Xinyu Tong, Xiulong Liu. 98-105 [doi]
- DeRAG: Decentralized Multi-Source RAG System with Optimized Pyth NetworkJunwei Yu, Hiroyuki Sato. 106-115 [doi]
- HSDP: Accelerating Large-scale Model Training via Efficient Sharded Data ParallelismYanqi Hao, Zhiquan Lai, Wei Wang, Shengwei Li, Weijie Liu, Keshi Ge, Dongsheng Li 0001. 116-125 [doi]
- Enhanced Log Anomaly Detection with Contrastive Learning and BERT EmbeddingsMengmeng Cui, Tong Gao, Haolong Xiang, Xiaolong Xu 0001, Changyan Lu, Junqun Xiong, Shengjun Xue. 126-132 [doi]
- A Knowledge Graph Based Technology of Operating System Software Repository Evolution AnalysisJun Ma 0015, Chuang Zhang, Jing Wang, Xiaoling Li 0002, Xueyan Zhang, Xinran Hong, Jie Yu 0008, Shasha Li 0001. 133-142 [doi]
- MPLNet: Industrial Anomaly Detection with Memory Bank and Prompt LearningHao Zhou, Xuanru Guo, Mingcheng Ji, Jielin Jiang, Haolong Xiang, Shengjun Xue. 143-150 [doi]
- Multimodal Interaction Fusion Network for Cloth-Changing Person Re-IdentificationCaihong Yuan, Yuanchen Xu, Zhijie Guan, Xiaopan Chen, Xiaoke Zhu, WenJuan Liang. 151-158 [doi]
- DAR: Deadline-Aware Rerouting for Mix-flows in Datacenter NetworksJinbin Hu, Rui Zhi, Shuying Rao, Ying Liu, Jin Wang 0001. 159-164 [doi]
- Enhanced Multi-Intent Recognition with BERT Embeddings and Graph-based DecodingMengmeng Cui, Rui Zhang, Haolong Xiang, Shengjun Xue. 165-172 [doi]
- Leveraging SmartNIC for Ring AllReduce OffloadingLihuan Hui, Wang Yang, Yanbo Wang. 173-180 [doi]
- SE-LeNet: A Data Reconstruction Method for Dissolved Oxygen in Tropical Pacific with Deep LearningRuixin Cao, Shuchang Wang, Senliang Bao, Xiaoyong Li 0002, Jiaming Tan, Chengcheng Shao. 181-189 [doi]
- Pose Convolutional Routing Towards Lightweight Capsule NetworksChengxin Lv, Guangqi Jiang, Shoukun Xu, Yi Liu. 190-195 [doi]
- ProtoFedLA: Prototype Guided Personalized Federated Learning Based on Localized Aggregation across Heterogeneous ClientsPeiyan Jia, Delong Zhang, Lei Zhang, Daojun Han, Juntao Zhang, Yulong Sang. 196-203 [doi]
- Coverage Probability of Distributed CoMP UAV-Assisted Cellular NetworksYan Li, Qingmin Long, Qiang Tang 0006, Shiming He, Bing Xiong. 204-210 [doi]
- A Hybrid Memory Data Placement Strategy for Edge ComputingBinghui Lin, Jianxun Zhang, Xinyu Qiao. 211-218 [doi]
- SparkTH: NUMA-Aware and I/O-Efficient Spark for ARM-Based Many-Core Supercomputing SystemNan Hu, Minguang Xiao, Zhiguang Chen 0001, Yutong Lu. 219-226 [doi]
- Revisiting the Underlying Causes of RDMA Scalability IssuesJunye Zhang, Hui Yuan, Zhe Wang, Peng Yu 0001, Hexiang Song, Di Qu, Siyu Yan, Xiaolong Zheng. 227-235 [doi]
- DCF: A Dynamic Caching Framework for Compute Nodes on Disaggregated MemoryQinzhen Cao, Jibo Liu, Xiaowen Nie, Rui Xi. 236-245 [doi]
- Learning-based Variable Neighborhood Search Algorithm for Cloud Service Deployment Problem with Time WindowsFanchao Meng, Yang Lu, Weigong Lv, Dianhui Chu. 246-253 [doi]
- DualLight: Intelligent Traffic Signal Control Method Based on Deep Reinforcement LearningHuanqiang Tang, Fan He, Yanfen Cheng, Xun Shao. 254-261 [doi]
- Learning-Based Hierarchical Adaptive Congestion Control with Low Training OverheadJinbin Hu, Zikai Zhou, Shuying Rao, Yujie Peng, Bowen Bao, Chang Ruan. 262-267 [doi]
- Hybrid Deadlock Recovery Algorithm for Irregular NoC in Multi-Chiplet SystemsZhiqiang Chen, Yongwen Wang, Hongwei Zhou. 268-277 [doi]
- DcKE: A Dual Encoder-decoder Knowledge Embedding Model for Link PredictionJiarun Lin, Xiaoli Ren, Xiaoyong Li, Qing Xu, Xiang Zhu, Xinyu Chen. 278-286 [doi]
- Implementation and Evaluation of Octuple-Precision Fast Fourier Transform on GPUShota Kawakami, Daisuke Takahashi. 287-294 [doi]
- A DDoS Detection Model Based on Feature Construction and Deep ForestShuangquan Zhang, Yunpeng Sun, Jiahui Fei, Rui Zhang, Peng Gao, Zhichao Lian. 295-301 [doi]
- Budget-aware Scheduling Algorithm Using Negative Offset Mechanism for Snake Optimization in Heterogeneous CloudLongxin Zhang, Yanfen Zhang, Xiaotong Lu, Runti Tan, Xianming Huang, Jianguo Chen 0001. 302-309 [doi]
- Hybrid Scheduling Executor and Chain-Aware Thread Mapping Strategy for ROS 2Zhengda Wu, Haining Hu, Sining Yang, Bo Zhang. 310-318 [doi]
- OpenCML: An Open Customizable Modeling Language for Directed Acyclic GraphsZhenjie Wei, Weiwei Xing, Weibin Liu, Zhiyuan Zou, Genxiang Chen. 319-326 [doi]
- DDBO: Discrete Dung Beetle Optimizer for Optical Communication Simulation Task AllocationZheng Wang, Weiwei Xing, Yue Cheng, Weibin Liu, Zhiyuan Zou, Zhi Wang, Genxiang Chen, Wei Lu. 327-335 [doi]
- Improved Bat Algorithms for Solving Flowtime Minimization Task Scheduling Problems in D2D-Enabled MECLinhua Ma, Qingran Yan, Yi Zhang 0025. 336-342 [doi]
- Dynamic Checkpointing for Heterogeneous IoT Devices Through Self-ReferencingNan Wang, Ziyi Wang, Lijun Lu, Zhiyuan Ma, Qun Chao. 343-350 [doi]
- Cost-Effective Reliability-Constrained Multi-Domain Service Function Chain Orchestration: A Metaheuristic ApproachQian Zhang, Jin Sun, Yi Zhang. 351-358 [doi]
- QGIP: A Framework Bridging Quantum Grayscale Image Processing and ApplicationsXilong Che, Jiale Zhang, Shuo Chen, Shun Peng, Juncheng Hu. 359-367 [doi]
- FCTNet: A CNN-Transformer Hybrid for Single Remote Sensing Image Super-ResolutionNing Shi, Hui Zhou, Chunyang Ye, Biyuan Yao, Yilin Wu, Bo Li. 368-377 [doi]
- TollHelper: A Safe and Efficient Traffic Control Approach on Toll Plaza via Constrained Load BalancingMengbing Zhou, Bocong Zhao, Minxian Xu, Hao Dai, Yang Wang 0006. 378-385 [doi]
- A Composite Method for Joint Optimization of Computation Offloading, Power Assignment, and Resource Allocation in Mobile Edge ComputingHuayu Qin, Yi Zhang, Jin Sun. 386-393 [doi]
- Low-bit CUTLASS GEMM Template Auto-tuning using Neural NetworkHong Guo, Nianhui Guo, Christoph Meinel, Haojin Yang. 394-401 [doi]
- ViTa: Optimizing Vision Transformer Operators on Domain-Specific AcceleratorsPengyu Mu, Yi Liu 0013, Yue Zhou, Rui Wang 0014. 402-409 [doi]
- FedGAC: Graph Federated Learning with Gradients Aggregation Calibration for Non-IID and Long-Tailed DataJie Li, Jinyan Wang, Rongbin Deng, Dongqi Yan, Qiyu Li. 410-417 [doi]
- SSG-FLIM: Federated Learning Incentive Mechanism for Privacy Protection and Data Trading in IoTSiqin Zeng, Xiaohong Wu, Yonggen Gu, Jie Tao 0001. 418-425 [doi]
- Optimizing Batched Small Matrix Multiplication on Multi-core DSP ArchitectureXiaohan Zuo, Chunhua Xiao, Qinglin Wang, Chen Shi. 426-435 [doi]
- ESNet: An Efficient Real-time Semantic Segmentation NetworkRenping Xie, Cong He, Ming Tao, Kai Ding 0005. 436-443 [doi]
- A semi-supervised GCN-based community detection algorithmShu-Han Shi, Lei Lei Shi, Lu Liu, Zixuan Han, Liang Jiang, Fuxiang Chen. 444-451 [doi]
- Energy-Efficient and Load-Balanced Digital Twin Deployment In DITEN-Empowered IIoTLingfeng Su, Ming Tao, Shuyue Chen, Renping Xie, Xueqiang Li 0001, Kai Ding 0005. 452-459 [doi]
- GALA-GNN: Optimization for Training GNNs of Large-scale Graphs on Heterogeneous PlatformsJunfeng Hu, Yi Zou, Xianfeng Song, Yiqiu Liu. 460-467 [doi]
- An Efficient Sampling-Based SpMM Kernel for Balancing Accuracy and Speed in GNN InferenceYingchen Song, Yaobin Wang, Chaoyu Xiong, Tianhai Wang, Pingping Tang. 468-475 [doi]
- Efficient Federated Learning Mechanism Based on Layer-wise Model PruningZhijie Jiang, Zhe Zhang, Yanchao Zhao. 476-483 [doi]
- On-the-Fly Data Layout Conversion for GEMM on AI AcceleratorsFang Gao, Xingyu Yue, Chenchen Tang, Hongyi Chen, Kai-Ting Amy Wang, Tarek S. Abdelrahman. 484-493 [doi]
- Research on Incentive Mechanisms and Resource Allocation of Edge Intelligence Networks for Multiple Federated Learning ServicesXin Jin, Fang Fu, Zhicai Zhang. 494-501 [doi]
- STRec: Social-Augmented Time-Aware Cross-Domain Sequential RecommendationXiangyun Gao, Dan Meng, Xianlan Sun, Wei Wang 0296, Haibei Zhu, Chao Kong. 502-509 [doi]
- An Online Mechanism for Market-Oriented Service Provisioning in Cloud EnvironmentsBingbing Zheng, Li Pan 0001, Shijun Liu, Kexian Sun, Xiao Zhou. 510-517 [doi]
- Large-scale multi-load AGVs conflict-free scheduling based on intelligent e-commerce warehouseFanchao Meng, Fanhao Meng, Weigong Lv, Dianhui Chu. 518-525 [doi]
- LCOC: A Low-cost Optimizing Compiler for Large Scale Quantum Programs Towards Realistic HardwareYu Zhu, Jinchen Xu, Qing Mu, Hongru Yang, Xiaodong Ding, Qiming Du, Zheng Shan. 526-533 [doi]
- CTIFuser: Cyber Threat Intelligence Fusion via Unsupervised Learning ModelChunyan Ma, Zhengwei Jiang, Jun Jiang, Peian Yang, Mengjiao Cui, Fangming Dong, Huamin Feng. 534-543 [doi]
- A Novel Maize Futures Price Prediction Model based on EEMD-CNN-IGRUJingyang Wang, Jingyu Han, Wei Liu, Ying Li, Qiuhong Sun, Xiaokang Zhou. 544-550 [doi]
- Dual-view Traffic Identification for Open Source Proxy Software through Early FlowsYuwei Xu 0001, Yunpeng Bai, Yuquan Zhang, Yige Song, Qiao Xiang, Guang Cheng 0001. 551-558 [doi]
- Turbo Table: A Semantic-Aware Cache Acceleration SystemHao Yuan, Chentao Wu, Jie Li 0002, Minyi Guo. 559-566 [doi]
- Multi-domain Resources Scheduling in Edge Computing Power Network for IIoTJiarun Zhuang, Ming Tao, Shuyue Chen, Xueqiang Li 0001. 567-572 [doi]
- Dynamic VNF Deployment and Resource Allocation in Mobile Edge ComputingXiaolong Zhai, Zhenli He, Yuanfei Xiao, Junjie Wu, Xuejie Yu. 573-581 [doi]
- Structural Embedding Contrastive Graph ClusteringLinlin Zhang, Yaliang Zhao, Jinke Wang. 582-589 [doi]
- MSARS: A Meta-Learning and Reinforcement Learning Framework for SLO Resource Allocation and Adaptive Scaling for MicroservicesKan Hu, Linfeng Wen 0001, Minxian Xu, Kejiang Ye. 590-599 [doi]
- RTSRT: Accelerating Monte Carlo Particle Transport with Ray Tracing Shared Cache ArchitectureCunhao Cui, Tiejun Li, Jianmin Zhang, Hanqing Li, Changsong Jin, Ruixuan Ren. 600-606 [doi]
- Adaptive Task Offloading in High-Speed Vehicular Networks Using Enhanced D3QN AlgorithmPanyang Zhou, Xiaofei Xing, Xiao Wang, Tian Wang 0001, Guojun Wang 0001. 607-614 [doi]
- ST-GAIN: Generative Dynamic Style Transfer Structure for Missing Traffic Speed Data ImputationXin-Wei Yao 0001, Jiacheng Wu, Qiang Li 0054, Zhong-Hua Yao, Zhenzhu Wang. 615-622 [doi]
- Container-Aware Service Function Chains Placement and Optimization in Vehicular Edge ComputingKaixin Zhang, Shihong Hu, Zhihao Qu, Baoliu Ye. 623-630 [doi]
- Data-Driven Smoke Segmentation and Removal for Visible ImageRenping Xie, Hengye Xu, Ming Tao, Cong He, Mengyao Chen. 631-636 [doi]
- Multi-view Hypergraph-based Self-supervised Learning Model for Web API RecommendationJiexun Shen, Dongfan Li, Wanjun Chen, Yong Xiao, Guosheng Kang, Jianxun Liu 0001, Zhenlian Peng. 637-644 [doi]
- Community Hiding Algorithm Based on Likelihood Analysis Method in Link PredictionYa-si Wang, Lei Lei Shi, Zixuan Han, Lu Liu, Siyang Song, Liming Chen. 645-652 [doi]
- A-MADDPG Based Partial Offloading in Digital Twin Edge Network (DITEN) Empowered IIoTLingling Liao, Ming Tao, Renping Xie, Chengxian Zhuang. 653-660 [doi]
- A Latency-Predictable Cloud-Native Network Architecture based on XDPJifei Wen, Jingguo Ge, Zheyuan Zhang, Yuepeng E, Bingzhen Wu. 661-668 [doi]
- Contract-based Service Fairness Guarantee in Vehicular Fog NetworksWeinan Liu, Long Chen 0006, Jigang Wu, Ming Tao. 669-676 [doi]
- A Multimodal Fusion Framework for Fake News Detection via Multi-Attention MechanismYongxin Yu, Yanqiang Li, Ke-ji, Zhenxiang Chen, Kun Ma 0001, Xiaofan Zhao. 677-684 [doi]
- Efficient 2-Segment Routing Based on Local Search With Failure RecoveryJingjing Chen, Xueyun Ling, Ying Wang 0002, Xuesong Qiu 0001. 685-692 [doi]
- TS-EoH: An Edge Server Task Scheduling Algorithm Based on Evolution of HeuristicYatong Wang, Yuchen Pei, Yuqi Zhao. 693-700 [doi]
- Hand Gesture Classification Using Nearest Centroid with Soft-DTW Loss on sEMG SignalsLingfeng Zhang 0002, Zunian Wan, Yepeng Ding, Junwei Yu, Takefumi Ogawa, Hiroyuki Sato. 701-709 [doi]
- Graph Anomaly Detection via Cross-Layer IntegrationZheyuan Zhang, Song Wang, Jingguo Ge, Yiming Xu, Yulei Wu, Jifei Wen. 710-717 [doi]
- Tipcc: TEE-based Integrity Protection of Consortium Blockchain ContractsZihao Guan, Yan Ding, Wei Wang 0250, Chuang Wang, Yufeng Guo, Yongpeng Liu, Liaoliao Feng. 718-726 [doi]
- Heterogeneous Performs Better: High Throughput Implementations of Falcon in Multi-Client ScenariosQuan Yang, Yiwen Gao 0001, Yuejun Liu, Jiabei Wang, Yongbin Zhou. 727-735 [doi]
- AcVerifier: Cross-Domain Access Control Verification via Hybrid Static and Dynamic AnalysisJie Zhang, Yuanyuan He 0002, Miao Hu, Xinwei Yu, Tingting Guo, Xiangyu Gao, Jiaqi Ma. 736-742 [doi]
- Ethereum Phishing Detection Using Hyperbolic Neural Networks and Temporal InformationRong Xu, Jun Zhang, Xiaoyue Zhu, Zhaoxiong Song, Zhi Yu. 743-750 [doi]
- FFGDetector: Vulnerability Detection in Cross-Contract Feature Flow Graph Using GCNZhifei Liu, Jian Jiao 0005. 751-757 [doi]
- Secure Range Queries on Semantic Trajectories in Fog-based Cloud ComputingYiping Teng, Shiqing Wang, Miao Li, Yuyao Tang, Bingfeng Yu, Chunlong Fan. 758-765 [doi]
- Collecting Clustering Coefficient of Distributed Graph Data with Shuffled Differential PrivacyHongfa Ding, Peiwang Fu, Yingxuan Luo, Heling Jiang, Hai Liu 0007. 766-773 [doi]
- MoonCross: Efficient and Secure Blockchain Sharding Scheme for Satellite-based IoTRuizhong Du, Tianyang Chen, Jin Tian, Yan Gao. 774-781 [doi]
- GPSSE: A GPU-Accelerated Dynamic SSE Scheme with Efficient Batch UpdatingJiancong Zhou, Xiaojie Zhu, Yong Li, Shuguang Yuan, Chi Chen. 782-791 [doi]
- QDL: Quantitative Dynamic Latency Model in Permissioned Blockchain SystemJiacheng Wei, Qingmei Wang, Zheng Wang. 792-799 [doi]
- C-Fuzz: Fuzzing with Forced Program Control Flow JumpsZhe Pan, Xu Chen, Liwei Chen, Gang Shi. 800-807 [doi]
- Customized adversarial training enhances the performance of knowledge tracing tasksHuitao Zhang, Xiankun Zhang, Yuhu Shang, Xin Luo, Yiying Zhang 0004. 808-815 [doi]
- Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal PerturbationsMingqiang Bai, Puzhuo Liu, Fei Lv 0010, Dongliang Fang, Shichao Lv, Weidong Zhang, Limin Sun 0001. 816-825 [doi]
- Dependency-aware Task Offloading and Resource Pricing in Vehicular Edge Computing: A Stackelberg Game ApproachLiang Zhao 0014, Shuai Huang, Yuxiang Cao, Huan Zhou 0002, Victor C. M. Leung. 826-831 [doi]
- Implementation and Optimization of 8×8 Block Discrete Cosine Transform on MGPUSimShuang Yang, Yaobin Wang, Ling Li, Jiawei Qin, Guotang Bi. 832-839 [doi]
- Energy Balanced Cooperative Edge-AI Services for Service Quality GuaranteeKongyang Li, Long Chen 0006, Tianwen Peng, Jigang Wu. 840-847 [doi]
- Collaborative Recommendation with Knowledge Graph Enhancement and Contrastive LearningHuiyi Zhong, Pinghua Chen, Yunhua Chen, Honghong Zhou. 848-855 [doi]
- Having Energy Depletion in Mind to Make Service Fairness PracticalTianwen Peng, Long Chen 0006, Jiale Huang, Jigang Wu. 856-863 [doi]
- A Continuous Verification Mechanism for Clients in Federated Unlearning to Defend the Right to be ForgottenShanshan Chen, Jun Liu, Yuying Li, Yamin Li, Yang Yang, Gaoyang Liu, Chen Wang. 864-871 [doi]
- A Contribution Assessment Method Based on Model Performance Gains in Federated LearningZixuan Zhao, Jun Liu, Yuyin Li, Gaoyang Liu, Yamin Li, Yang Yang. 872-879 [doi]
- CNN-LSTM based Multimodal Models for Music GenerationMan Zhang, Dongning Liu. 880-886 [doi]
- Reinforcement Learning-Based Adaptive Search Strategy Combination AlgorithmXiaotong Liu, Zhiqiang Zeng, Sicheng Wan, Jiajie Tian, Tianlei Wang, Zhiyong Hong. 887-894 [doi]
- Deep Reinforcement Learning Helps: Making Loading Cost-aware Joint Cooperative Edge-AI Service Deployment and Request Routing PracticalYulin Huang, Long Chen 0006, Jiale Huang, Jigang Wu. 895-902 [doi]
- Envision: Application Level Fairness for Cooperative Edge-AI Services with Deep Reinforcement LearningJiale Huang, Long Chen 0006, Shaojie Zheng, Jigang Wu. 903-910 [doi]
- Heterogeneity Modeling with Flexibility-based Graph Neural NetworksJisheng Qin, Tao Tao, Zijie Liu, Haibo Chen, Shenghui Zhao. 911-916 [doi]
- ProgressiveGlassNet: Glass Detection with Progressive DecoderQingling Chang, Xiaofei Meng, Zhiyong Hong, Yan Cui. 917-925 [doi]
- Ensemble Graph and Device Clustering Method based on Attention Mechanism for Decomposing Monolithic to MicroservicesQingyong Deng, Qiuming Li, Qinghua Zuo, Shujuan Tian, Saiqin Long. 926-933 [doi]
- Solving the Short Video Assignment Problem via Federated Learning and Group Multi-Role AssignmentKaizhe Zeng, Weijian Liu, Dongning Liu. 934-939 [doi]
- Dynamic Task Scheduling for Coordinated Truck-Drone Parcel Delivery: A Hybrid Genetic Tabu Algorithm ApproachRuitai Li, Quan Yuan, Tongxin Liao, Lijun Luo, Menglan Hu, Pan Lai, Xiao Zhang. 940-947 [doi]
- Online Dynamic Scaling of Microservices with Fair Probabilistic RoutingYang Chen, Shisheng Lin, Yi Hu, Liangyuan Wang, Menglan Hu, Pan Lai, Yuanai Xie. 948-955 [doi]
- InviINS: Invisible Instruction Backdoor Attacks on Peer-to-Peer Semantic NetworksXiao Yang, Gaolei Li, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li. 956-964 [doi]
- ActIPP: Active Intellectual Property Protection of Edge-Level Graph Learning for Distributed Vehicular NetworksXiao Yang, Gaolei Li, Mianxiong Dong, Kaoru Ota, Chaofeng Zhang, Xiting Peng, Jianhua Li. 965-973 [doi]
- On Non-Invasive Fall Detection Based on Multimodal FusionHuabei Nie, Dan He, Jianqiao Shen, Songchun Wang, Ani Dong. 974-980 [doi]
- Diverse Recommendations With Maximum Entropy Neighbor Selection and Graph Contrast LearningJinhao Zhou, Pinghua Chen, Yunhua Chen, Honghong Zhou. 981-989 [doi]
- Predicting Inference Time and Energy Consumption in Deep Learning Using MLPsChengjin Lyu, Mohsen Nourazar, Bart Goossens. 990-996 [doi]
- Improved Motor Imagery Classification Using Elastic Net-based Feature Optimization and a Heterogeneous Ensemble ClassifierShimiao Chen, Xiangzeng Kong, JunFeng Han, Cailin Wu, Tingting Zhang. 997-1006 [doi]
- ST-GCN: A Spatiotemporal Graph Convolution Neural Network for EEG Motor Imagery Signal DecodingJingzhou Xu, Jun Qi 0001, Junqing Zhang, Yong Yue 0001, Tingting Zhang, Jianjun Chen. 1007-1013 [doi]
- GANs-based Signal Quality Assessment for Heart Rate Estimation with BallistocardiographRuilin Cai, Jun Qi, Jiayi Li, Jianjun Chen, Wei Wang, Haiyang Zhang. 1014-1020 [doi]
- A Multi-Agent Framework for Penetration Testing: Modelling and Analysing Using Abstract State MachinesFarah Al-Shareefi, Ge Chu, Alexei Lisitsa 0001. 1021-1028 [doi]
- Depression Detection with EEG Based on Mutual Information RegularizationHaoyu Lin, Tianyuan Ma, Chen Zhao, Jun Qi, Tingting Zhang, Xiangzeng Kong. 1029-1035 [doi]
- LB-UNet: Multi-Scale Fusion Lightweight Network with Boundary Enhancement for Water SegmentationNing Li, Libo Wang, Gaochao Yang, Baohua Yuan, Bo Li. 1036-1043 [doi]
- LF-DETR: Lightweight Detection Network for Floating Surface Garbage Based on Adaptive Channel ShufflingShoukun Xu, Yan Gong, Gaochao Yang, Ning Li. 1044-1049 [doi]
- Leveraging Packet Cloning to Achieve Fast Flow-Transmission for Data Center Load BalancingYuchen Wang, Zhenbo Li, Haotian Jing, Tao Zhang 0019, Shaojun Zou, Xidao Luan, Hui Yin 0001, Fangmin Li. 1050-1057 [doi]
- Elastic and Energy-Efficient Virtual Machine Allocation on Edge Servers for Internet of VehiclesXianger Li, Aiwen Huang, Yiqi Fan, Zhihai Tang, Le Chang, Tian Wang. 1058-1064 [doi]
- RL-MR: Multipath Routing Based on Multi-Agent Reinforcement Learning for SDN-Based Data Center NetworksPeixin Liu, Xiangyu Bai, Haoran Cheng, Xiaochen Gao, Jingwen Su. 1065-1072 [doi]
- Edge Caching Node Selection in Short Video Social NetworkQiansheng Yang, Zhuo Li. 1073-1079 [doi]
- Automatic Implementation of Large-Scale CNNs on FPGA Cluster Based on HLS4MLYihang Lu, Xingyun Qi, Yuan Li, Mingche Lai, Yankang Zhao, Zhenqi Li, Hanyuan Li, Qiang Wang. 1080-1087 [doi]
- Privacy-Enhanced Federated Learning Through Homomorphic Encryption With Cloud FederationQiqi Xie, Hong Zhang 0047, Miao Wang, Wanqing Wu, Zhibo Sun. 1088-1095 [doi]
- DiffSenseNet: Integrating Hierarchical Features and Angular Diffusion for Remote Sensing Object DetectionSongwen Pei, Hongli Ma, Xinyun Qiu, Libo Huang. 1096-1101 [doi]
- Modeling and Analyzing the Shared Receive Queue of RDMAZhuang Tian, Kai Wang, Wanchun Jiang. 1102-1107 [doi]
- CMAE-MTC: A Contextual Masked AutoEncoder Based Multi-Level Traffic ClassifierZecheng Yuan, Min Luo, Cong Peng, Qin Liu. 1108-1115 [doi]
- Approximation Algorithms and Simulated Annealing Heuristics for Row-and-Column Pruning of Deep Neural NetworksPing-Han Tu, Yu-Che Cheng, Ding-Yong Hong, Pangfeng Liu, Jan-Jan Wu. 1116-1122 [doi]
- Improving Availability and Scalability for RDMA Load Balancing with In-network ReorderingJinbin Hu, Ruiqian Li, Shuying Rao, Jin Wang. 1123-1128 [doi]
- Using KVM Events to Detect VM Memory-Sharing Lateral Movement Attacks in a Virtualized EnvironmentKun Zhang, Junchao Ma, Chen Li. 1129-1136 [doi]
- Federated Multi-Agent Reinforcement Learning for AoI Minimization in UAV-Enabled IoV-MEC SystemsShoukun Xu, Yu Zhang, Xueyuan Wang, Mustafa Cenk Gursoy. 1137-1144 [doi]
- Efficient erasure-coded multi-data block update methods for heterogeneous storage environmentsHengyu Wang, Bing Wei, Ning Luo, Qian Chen, Yi Wu, Shudong Zhang, Lijuan Zhou. 1145-1150 [doi]
- Efficient Erasure-Coded Data Recovery Based on Machine Learning With a Low Level of Storage OverheadXiaobo Zhao, Bing Wei, Ning Luo, Qian Chen, Yi Wu, Shudong Zhang, Lijuan Zhou. 1151-1156 [doi]
- GeoNDN: Naming the localized data with the Geohash-based Scheme for NDN optimizationYingwen Chen 0001, Xiaolong Liang, Huan Zhou 0006, Xiangrui Yang, Lin Wu, Gaofeng Lv. 1157-1162 [doi]
- Integrity Audit Scheme Based on Collaborative Cache in Industrial Internet of Things EnvironmentRuizhong Du, Ziyuan Wang, Yiwei Wang, Jiawei Shen. 1163-1168 [doi]
- FedHPM: Online Federated Learning via Heterogeneous Prediction ModelZhi Zhang, Shiwen Zhang, Shuang Chen, Wei Liang 0005. 1169-1176 [doi]
- Deterministic Data Center Network CalculusHao Wang, Yizhao Zhang. 1177-1182 [doi]
- A LLM Checkpointing System of the Hybrid Memory ArchitectureGengbin Chen, Yuan Zhu, Dingding Li, Yong Tang 0001. 1183-1188 [doi]
- Joint Location Deployment, Offloading and Resource Allocation in Multi-UAV Collaborative Edge Computing NetworksMingyang Xu, Xin Chen, Libo Jiao, Long Zhao, Xiaoya Fan. 1189-1196 [doi]
- Hybrid Explainable Network Intrusion Detection Framework Based on Shapley Additive ExplanationsSijin Chen, Jing Liu, Cen Chen, Songyu Xie, Zhongyao Cheng. 1197-1202 [doi]
- Robot Vision-Based Autonomous Navigation Method Using Sim2Real Domain AdaptationMengjiao Zhang, Shihong Duan, Cheng Xu 0003. 1203-1209 [doi]
- A Sorted and Dynamic Graph Storage System of the Hybrid Memory ArchitectureYang Ao, Yutong Deng, Dingding Li, Yong Tang 0001. 1210-1215 [doi]
- DAUSK: A Transactional Graph Structure for Skewed Dynamic Graph StorageAnna Ding, Yujun Li, Yuening Feng, Sicong Hu, Mengshu Hou, Yueyang Zhan. 1216-1223 [doi]
- Optimizing Response Time of Multi-factor Authentication Service in EV Charging System: A DRL-based AlgorithmBing Xiang, Tianlin Yang, Qingwen Han, Yao Li, Ting Yu, Yongsheng Zhao, Shuai Zhang, Xueming Zhao. 1224-1229 [doi]
- Dynamic Priority-based Ordered Transmission for Mixed Flows in Data Center NetworksShaojun Zou, Yi Jiang, Laurence T. Yang, Jiacheng Qu. 1230-1236 [doi]
- A Lightweight Privacy-Preserving Asynchronous Federated Learning Scheme in Internet of VehiclesXin Liu, Xiaodong Shen, Chang Xu 0004, Liehuang Zhu, Kashif Sharif. 1237-1244 [doi]
- LBCB: One-sided RDMA-based Distributed B+ tree Index with Low Bandwidth ConsumptionJibo Liu, Rui Xi, Qinzhen Cao, Xiaowen Nie, Zhuohan Hou. 1245-1251 [doi]
- Research on Trust Management Mechanism in Vehicular Named Data NetworkingRula Sa, Haotian Wang, Zhen Liu, Meiju Yu, Jin Zhang. 1252-1257 [doi]
- Spatial-Frequency Integration Network with Dual Prompt Learning for Few-shot Image ClassificationYi Liu, Jie He, Shoukun Xu, Guangqi Jiang. 1258-1264 [doi]
- RSCache: A Tail Latency Friendly Cache Based on NVMe SSDsJincheng Lu, Miao Cai, Baoliu Ye. 1265-1272 [doi]
- MonkeyGPT: Generative AI in Network Anomaly Detection of Video Conference ApplicationsJunhao Xu, Dongbiao He, Chen Zhang, Xu Zhou, Zhongxing Ming, Laizhong Cui. 1273-1280 [doi]
- High-Precision Encrypted Image Retrieval Scheme Using Dual-Stream Convolution Feature Fusion in Cloud ComputingMingyue Li, Liudong Zheng, Jiahui Liu, Ruizhong Du, Chunfu Jia. 1281-1286 [doi]
- SORA: Rapid Software Pipelining Optimization after Register Allocation for Vector-DSPsAnxing Xie, Yonghua Hu, Zhe Li, Yaohua Wang. 1287-1294 [doi]
- Collective Communication Acceleration Architecture for Reduce Operation with Long Operands Based on Efficient Data Access and Reconfigurable On-Chip BufferJinbo Xu, Zhengbin Pang, Yi Dai. 1295-1302 [doi]
- Morph: A Dynamically Optimized Scheduler for Large Model TrainingWenna Ruan, Futian Wang, Bing Niu, Jin He, Xinwei Zheng. 1303-1310 [doi]
- Funnel: An Efficient Sparse Attention Accelerator with Multi-Dataflow FusionShenghong Ma, Jinwei Xu, Jingfei Jiang, Yaohua Wang, Dongsheng Li 0001. 1311-1318 [doi]
- RLPS: Reinforcement Learning based Periodic Strategy for 40/100Gbps Energy Efficient EthernetWanchun Jiang, Zhuang Tian, Renfu Yao, Xunyong Tan, Kai Wang, Jiawei Huang 0001, Jianxin Wang 0001. 1319-1324 [doi]
- Optimizing In-network Caching for Key-Value Stores under Write-intensive WorkloadsYuanhang Gao, Yingwen Chen 0001, Xiangrui Yang, Huan Zhou 0006, Shihua Tang, Yuanfeng Chen, Ming Xu. 1325-1332 [doi]
- MLP-LightGBM Hard Drive Failure Prediction with Transfer Learning PerformanceJianli Ding, Hongjie Li, Jing Li. 1333-1340 [doi]
- k FFT in Large Size ProcessingFangyu Zhao, Chunhua Xiao, Zhiguo Wang, Xiaohua Du, Bo Dong. 1341-1348 [doi]
- Multi-Hop D2D Cluster Formation and Resource Allocation for Scalable Video MulticastHao Nie, Wei Wang 0088, Rui Dai 0002, Chenyan Liu, Zhixing Wang, Peng Xu 0003. 1349-1354 [doi]
- Improving INT Inference Resilience of CNNs by Vulnerability-Aware Mixed-Precision QuantizationXiaohui Wei 0002, Pei Liu, Chenyang Wang, Zeyu Guan, Qi Wu, Hengshan Yue. 1355-1362 [doi]
- A Fault Tolerance Mechanism for UAV-Assisted Vehicular Network in Disaster RescueKaiqi Zhang, Jing Zhao, Rui Chen. 1363-1370 [doi]
- A High-performance Hardware Accelerator for Genome AlignmentHaoyu Liao, Yuan Li, Qiang Wang, Mingche Lai, Hui Su, Ziwen Li, Xingyun Qi. 1371-1378 [doi]
- Optimize Metadata Operations of Key-Value Store via A Flat Indexing LSM-TreeYuchen Liu, Chen Chen 0124, Shu Yin 0001. 1379-1384 [doi]
- Enhanced YOLOv7 Model for Aerial Drone Detection in Complex EnvironmentsChanglong Fu, Yasu Wu, Xin Jin 0005, Puming Wang, Qian Jiang. 1385-1392 [doi]
- vLFS: Learning-based Scheduling for AI Chip VirtualizationMengjuan Gao, Yida Wang, Qinwen Shi, Bojun Cao, Yuanchao Xu 0002. 1393-1399 [doi]
- A Task Dependency-based Deduplicated Task Offloading Mechanism in Vehicular Edge ComputingZhenyi Shao, Zhuofan Liao, Xiaoyong Tang. 1400-1405 [doi]
- An Efficient Cooperative Active Caching Strategy in Vehicular Edge Network Based on Asynchronous Federated LearningPang Liu, Zhuofan Liao, Xiaoyong Tang. 1406-1411 [doi]
- A Task Admission Scheduling Strategy Based on Adaptive Time Slicing in Mobile Edge ComputingYanpu Tang, Zhuofan Liao, Xiaoyong Tang. 1412-1417 [doi]
- GLA-ViT: A Global Contextual Attention Based for Remote Sensing Image Scene ClassificationHao Yuan, Kun Liu, Qinghao Peng, Benli Zou, Can Wang, Meishu Li. 1418-1425 [doi]
- Performance Analysis and Optimization of Nvidia H100 Confidential Computing for AI WorkloadsYifan Tan, Zeyu Mi. 1426-1432 [doi]
- Achieving Ultra-low Latency for Timeout-less Congestion Control in Data Center NetworksShaojun Zou, Yi Jiang, Jiacheng Qu, Tao Zhang, Yuanzhen Hu, Yujie Peng. 1439-1444 [doi]
- Distributed Energy Management for Carbon Neutral Data CentersChuyi Liu, Jianxiong Wan, Leixiao Li, Guanyu Ren, Xiaolei Wang. 1443-1438 [doi]
- SAT-GAV: A Electricity-Costs Aware Resources Placement Strategy for Data CentersHao Feng, Xinren Xu, Lin Chen, Jie Li. 1445-1452 [doi]
- DNZ-LSM-Tree for Hybrid Storage SystemsTao Cai, Zeyu Huang, Dejiao Niu, Qiangqiang Ni, Zihao Yinyi, Danping Zou. 1453-1458 [doi]
- A Communication-efficient Collaborative Task Offloading Method Based on Distributed Computing CloudKe Zhang, Ruixing Zong, Yingjie Song, Yong Zhou, Xiong Xiao. 1459-1464 [doi]
- MICVIF: an automatic unsupervised feature selection method for software defect predictionWenzhi Zhu, Zhiqiang Li, Haiyang Liu. 1465-1471 [doi]
- HTKT: Knowledge Tracing Based on Hypergraph TransformerXiaojin Guo, Xilong Chang, Xiankun Zhang, Kun Liang, Yuhu Shang, Yiying Zhang. 1472-1477 [doi]
- Unveiling the Dynamics of Video Out-of-Focus Blur: A Paradigm of Realistic Simulation and Novel EvaluationJing Chen, Zhao Qiu, Zhiwei Zheng. 1478-1483 [doi]
- Competitive Swarm Optimizer with Momentum for Numerical OptimizationShuxian Zheng, Yuhui Zhang, Wenhong Wei. 1484-1491 [doi]
- PG-YOLO: A Lightweight Vehicle Detection Method for DronesYang Liu, Tengyu Fan, Kun Mei, Liming Zhou. 1492-1497 [doi]
- NFAERCOM: A Near-Far Area Experience Replay-based Computation Offloading MethodWenxuan Wang, Yi Huang, Yunhe Cui, Chun Guo 0004, Yi Chen 0008, Guowei Shen. 1498-1505 [doi]
- Genetic Algorithm Using Deep Learning Model for Priority Scheduling in Cloud-Fog EnvironmentZhan Zeng, Xin Li, Yue Hong, Wei Zheng. 1506-1511 [doi]
- GPTLTS: Utilizing Multi-scale Convolution To Enhance The Long-term Time Series Forecasting With Pre-trained ModelDehua Chen, Zijian Shen, Mei Wang. 1512-1518 [doi]
- *Zhengxiong Hou, Yubing Liu, Hong Shen 0001, Jiyuan Liu, Jianhua Gu. 1519-1526 [doi]
- SSFuzz: State Sensitive Fuzzing for Network Protocol ImplementationsChengnuo Cai, Lei Zhou, Bo Yu. 1527-1534 [doi]
- Conflict-Free Navigation Optimization at Unsignalized Intersections Using Mixed-Integer Linear Programming for Connected and Autonomous VehiclesShuanglong Chu, Jinfeng Guo, Chen Mu. 1535-1540 [doi]
- AIO: Automating I/O Optimization Pipeline for Data-Intensive Applications in HPCWanxin Wang, Huijun Wu, Lihua Yang, Zhangyu Liu, Bin Zheng. 1541-1548 [doi]
- SymbTQL: A Symbolic Temporal Logic Framework for Enhancing LLM-based TKGQAShuaiChen Zhu, Yang Yuan, Lin Shi, Shoukun Xu. 1549-1556 [doi]
- AFTP: An Adaptive High Cost-Effectiveness Fault-Tolerant NoC Design Based on PredictionXiaowen Chen, Ta Tan, Chen Li 0015, Jianzhuang Lu, Qijin Zhu. 1557-1562 [doi]
- AMQGaussian: Efficient 3D Gaussian Representation with Asymmetric Mixed-precision QuantizationYong Kou, Qing Ye, Yanci Zhang, Xia Yuan, Jinlong He. 1563-1570 [doi]
- Knowledge Tracing Based on Semantic Enhancement of Exercise RelevanceYueyang Huang, Kun Liang, Huitao Zhang, Xilong Chang, Chao Wang, Xiankun Zhang. 1571-1577 [doi]
- A Workflow Scheduling Algorithm Based on Linear Evaluation for Dynamic Distributed Computing EnvironmentsXin Li, Zhan Zeng, Yuxin Chen, Jinglong Deng, Yue Hong, Wei Zheng. 1578-1583 [doi]
- Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph EnhancementHaiqing Lv, Xiaohui Han, Peipei Wang, Wenbo Zuo, Jing Guo, Lijuan Xu 0001. 1584-1590 [doi]
- PFedSKD: Personalized Federated Learning via Self-Knowledge DistillationMeiguang Zheng, Zhengjie Liu, Bo Chen, ZiJie Hu. 1591-1598 [doi]
- AutoMP: A Tool to Automate Performance Testing for Model Placement on GPUsZhe Yang, Wei He 0020, Fenglong Cai, Yonghui Xu, Wei Guo, LiZhen Cui. 1599-1606 [doi]
- Maximizing Influence of Nodes with Rapid Global Spread in Social Media Data StreaZe-Peng Tian, Lei Lei Shi, Lu Liu 0001, Zixuan Han, Zhou Daniel Hao, Nick Antonopoulos. 1607-1614 [doi]
- FHNTT: a flexible Number Theoretic Transform design based on hybrid-radix butterflyLi Li, RenGang Li, Yaqian Zhao, Ruyang Li, Zhiyuan Su, Xuelei Li. 1615-1622 [doi]
- Towards Generalizable Forgery Detection Model via Alignment and Fine-tuningXuekang Peng, Yisheng Li, Zhichao Lian. 1623-1628 [doi]
- Deepfake Video Detection Based on the Decomposition of Spatial-Temporal Attention Mechanism in ViViTGuoqing Sun, Zhichao Lian. 1629-1634 [doi]
- Reinforcement Learning based Edge-Assisted Inference for Maritime UAV NetworksChuxuan Wang, Jieling Li, Liqing Ye, Yu Liu, Liang Xiao 0003. 1635-1642 [doi]
- Privacy-Preserving and Robust Federated Learning Based on Secret SharingJiajia Mei, Xiaodong Shen, Chang Xu 0004, Liehuang Zhu, Guoxie Jin, Kashif Sharif. 1643-1650 [doi]
- Education From Short Video: A Novel Educational Pattern Inspired by Entertainment VideosJiale Yu, Jing Chen, Zhao Qiu, Zhiwei Zheng. 1651-1656 [doi]
- Multimodal Identity Recognition of Spiking Neural Network Based on Brain-Inspired Reward PropagationYang Liu, Hongxia Zhang, YaHui Li, Quanqiang Wang, Cheng Liu. 1657-1662 [doi]
- SF-SNF: A Small-file Sniffer System for Hadoop ClustersMiao Wang, YanMing Zhang, Hualei Wang. 1663-1669 [doi]
- A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading TransactionsYe Yuan, Mingxing Yang, Ruoting Xiong, Yani Sun, Xianchao Zhang, Wei Ren. 1670-1676 [doi]
- MTRP: A High-Performance Cost-Efficient Buffering Scheme for Multi-Tenant Cloud ServicesZekai Zhu, Peiquan Jin, Guorui Huang, Xiaoliang Wang, Yigui Yuan. 1677-1682 [doi]
- A General Parallel Framework for Material Point Method Based on the p4est LibraryShaobo Tian, Jiaheng Wang, Jialin Li, Huang Ye, Jian Zhang. 1683-1690 [doi]
- A Rotating Target Detection Algorithm for Ships in SAR Images Based on LAOBB-YOLOv8nMin Huang, Shuaihui Wang, Shuaili Luo, Qiuhong Sun, Xiaokang Zhou. 1691-1696 [doi]
- AdaptTrack: Multi-Object Tracking by Adaptive CorrelationKunpeng Li, Lei Wang, Hongjun Ren, Yangjie Cao. 1697-1703 [doi]
- Data-Driven Vehicle Positioning with Smartphone Raw GNSS Data in Urban AreasMengling Ou, Zenghua Zhao, Jianyu Yang, Jiankun Wang 0003, Jiafan Lu. 1704-1709 [doi]
- Online public opinion time series prediction based on improved N-Beat and multimodal hybrid fusionYuling Tian, Shengfa Miao, Shaowen Yao 0001, Puming Wang, Xin Jin 0005, Shichao Ma. 1710-1717 [doi]
- QoS-aware Dynamic Service Caching and Updating in Cost-efficient Multi-Access Edge ComputingShuaibing Lu, Xin Jin, Jie Wu 0001, Shuyang Zhou, Shen Wu, Jackson Yang, Ran Yan. 1718-1725 [doi]
- HLIHP: An Efficient Hierarchical Learned Index with High-Precision CorrectionKunting Huang, Xujian Zhao, Peiquan Jin, Bo Li 0065, Yin Long, Tao Liu. 1726-1731 [doi]
- INToSR: Building A Novel In-band Network Telemetry over SRv6Yi Xie 0004, Yeyu Zhu, Jiahao Feng, Xiaochou Chen, Xinxin Xiong, Shaojie Zheng. 1732-1739 [doi]
- Data-driven Multi-stage Vehicle Trajectory Prediction for Complex ScenariosJian Zhang, Mengyuan Wang, Zikun Feng, Shunli Zhang. 1740-1745 [doi]
- STIFormer: Enhancing Multivariate Time Series Classification Through Multi-Process Spatial-Temporal InteractionZhiyuan Zhang, Yuankun Li. 1746-1753 [doi]
- Explaining Graph-based Decision Learning for Autonomous Exploration in Unknown EnvironmentsLiping Chen, Shihong Duan, Cheng Xu, Heng Zhang, Ran Wang. 1754-1761 [doi]
- Towards Reliability Enhancement of Multi-factor Authentication Service in EV Charging System under Budget ConstraintYao Li, Tianlin Yang, Qingwen Han, Sha Li, Yongsheng Zhao, Hongyue Ma, Gang Si. 1762-1767 [doi]
- Power Microservices Troubleshooting by Pretrained Language Model with Multi-source DataShuai Ding, Yifei Xu, Zhuang Lu, Fan Tang, Tong Li 0012, Jingguo Ge. 1768-1775 [doi]
- Protein Function Prediction Based on the Pretrained Language Model ESM2 and Graph Convolutional NetworksLijuan Hou, Hanyan Qin, Xiankun Zhang, Yiying Zhang. 1776-1781 [doi]
- A Mixed Augmentations Method for Multivariate Time Series Contrastive LearningWeigang Huo, YuTing Wang, Lishou Ye. 1782-1789 [doi]
- PSC Sketch: Finding Periodic Spread Changers in High-Speed Data StreamsAng Hu, Guoju Gao, Yu-e Sun, He Huang 0001, Yihuai Wang, Yang Du 0006, Xiaoyu Wang 0004. 1790-1797 [doi]
- CK-index: A Distribution-Aware Learned Index for Composite KeysZhengyang Wei, Baoliu Ye, Miao Cai. 1798-1804 [doi]
- Breast Cancer Classification Using DDPM and Holographic Guidance Diffusion FrameworkYuxin You, Hong-Seng Gan, Akinobu Shimizu, Muhammad Hanif Ramlee, Hafiz Basarudin, Viet-Vu Vu. 1805-1810 [doi]
- An Approach to Dynamic Satellite Service Substitution in Satellite ConstellationsYucheng Tao, Haopeng Chen, Zihong Lin, Chang Liu, Shengyang Liu, Fei Han. 1811-1818 [doi]
- SimV: A Self-extension Similarity Viterbi Algorithm for Service Function Chain Deployment for Multi-access Edge ComputingWenqiang Deng. 1819-1826 [doi]
- A SFC Placement Strategy in Low-Visibility Multi-Domains Networks for Low Resource Usage CostQingli Xiong, Zhuofan Liao, Xiaoyong Tang. 1827-1832 [doi]
- A Task Transmission Path Selection Algorithm Based Object Identification and Intent-Driven in Uncertain EnvironmentsLei Hu, Yang Zhang, Shukui Zhang, Wubing Pan, Yingying Wang. 1833-1840 [doi]
- ATM: Area-based Partition and Topology-aware Mapping for Large-scale SNN SimulationYangle Zeng, Guangnan Feng, Zhiguang Chen 0001, Yutong Lu, Nong Xiao. 1841-1848 [doi]
- NFVDC: A flexible and efficient NFV platform for dynamic service chainingQiuwen Lu, Qingyun Liu 0001, Binxing Fang. 1849-1855 [doi]
- A Knowledge Graph Automatic Construction Approach for Intelligent Operation of Cloud-Network EnvironmentZhengchen Gai, Liwei Kuang, Lingfeng Tian, Keke Zhou. 1856-1862 [doi]
- CODC-pyParaQC: A design and implementation of parallel quality control for ocean observation big dataHuifeng Yuan, Tianyan Li, Zhong Jin, Lijing Cheng, Zhetao Tan, Bin Zhang, Yanjun Wang. 1863-1870 [doi]
- Task Scheduling and Computation Offloading in Space Edge ComputingZihong Lin, Haopeng Chen, Yucheng Tao, Chang Liu, Shengyang Liu, Fei Han. 1871-1878 [doi]
- RLGNN: Robust Graph Neural Networks with Noisy Label LearningHaodong Qian, De-li, Qiyu Li, Jinyan Wang. 1879-1886 [doi]
- Reconciling the Accuracy-Speed in Traffic Field's Time Series ForecastingPeinan Zhao, Jin Yan, Yumeng A, Yichen Yang, Yidong Li, Hongwei Zhao. 1887-1894 [doi]
- An Efficient Flow Rule Conflict Comprehensive Detection Scheme for SDN NetworksBo Han, Yuan Liu, Yongbin Zhou, Yiwen Gao 0001. 1895-1902 [doi]
- DPSFC: A Distributed Delay-Aware Approach for Improving Parallelized Service Function Chains PlacementMingxin Zhang, Yintan Ai, Hua Li. 1903-1910 [doi]
- Pricing-Based Task Offloading Considering User Energy Consumption in MEC SystemXiyu Han, Zhuofan Liao, Xiaoyong Tang. 1911-1916 [doi]
- LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly DetectionZhengping Ni, Xiaoqiang Di, Xu Liu 0010, Lianjie Chang, Jinqing Li, Qiyue Tang. 1917-1924 [doi]
- Fast detection method for pedestrian video abnormal behavior based on keyframe extraction and multi-task mixed modelHuiyu Mu, Jiangwei Li, Jiashuai Su, Luhui Wang, Junfeng Tian, Lanxue Dang. 1925-1930 [doi]
- Multilevel Load Balancing Algorithm for Domestic Heterogeneous Manycore ArchitectureYi Ma, Xin Chen, Heng Guo, Fang Li, Xin Liu. 1931-1936 [doi]
- Fast Adapting Few-Shot Federated Learning System for Human Activity RecognitionZiyan Zhang, Yanchao Zhao. 1937-1945 [doi]
- CATC: A task scheduling based on computing-aware and task classification in Pervasive Edge ComputingJiahui Yang, Yang Zhang, Shukui Zhang, Mingyu Zhu, Yingying Wang. 1946-1953 [doi]
- MLF: Multi-level forwarding based on EdgeMesh in edge computing environmentXin Wei, Xin Li. 1954-1959 [doi]
- Dif-GAN: A Generative Adversarial Network with Multi-Scale Attention and Diffusion Models for Infrared-Visible Image FusionChengyi Pan, Xiuliang Xi, Xin Jin 0005, Huangqimei Zheng, Puming Wang, Qiang Jiang. 1960-1967 [doi]
- Correlation and Workload-Based Transaction Allocation Algorithm for Blockchain ShardingGuixia Xiao, Normalia Binti Samian, Winston K. G. Seah, Mohd Izuan Hafez Bin Ninggal, Masnida Binti Hussin, Jyoti Sahni. 1968-1973 [doi]
- Reinforcement Learning-powered Effectiveness and Efficiency Few-shot Jailbreaking Attack LLMsXuehai Tang, Zhongjiang Yao, Jie Wen 0007, Yangchen Dong, Jizhong Han, Songlin Hu. 1974-1981 [doi]
- Detecting Smart Contract Vulnerabilities based on Fusing Semantic and Syntax Structure InformationXiguo Gu, Xinhong Duan, Senlin Ren, Jiale Zhang, Zhanqi Cui. 1982-1987 [doi]
- P-AES: Advanced Encryption Standard Parallel Optimization on MGPUSimJiawei Qin, Yaobin Wang, Ling Li, Shuang Yang, Xiaorong Zhang. 1988-1993 [doi]
- KR-PBFT: A Secure and Efficient Consensus Mechanism for Web 3.0Yi Zhao, Qi An, Meiju Yu, Rula Sa, Jin Zhang. 1994-1999 [doi]
- RBBC: Reputation-based Blockchain for IoT Identity Resolution SystemJie Ji, Pengfei Yue, Leixiao Li, Haoyu Gao, Jinze Du, Hao Lin, Xiaodong Zhang, Qing Li. 2000-2007 [doi]
- Hierarchical Access Control for Bilateral Security in Medical Privacy Data RetrievalJianshe Wang, Guangping Xu, Yanyan Wen, Wei Hao. 2008-2013 [doi]
- A Distributed Stealth Address Generation Protocol for Threshold SignaturesYujue Wang, Lin Zhong, Jun Du, Yudi Zou, Kevin He, Andrew Zhang. 2014-2021 [doi]
- SSIDB: Secure Sharing of IoT Data on Blockchain with CP-ABE and Trusted Environment AssistanceSixiang Wang, Dongdong Huo, Hailong Zhang 0001, Yu Wang 0134, Chuang Li, Yu Wang 0114, Fei Shao. 2022-2029 [doi]
- TabSec: A Collaborative Framework for Novel Insider Threat DetectionZilin Huang, Xiangyan Tang, HongYu Li, Xinyi Cao, Jieren Cheng, Wenxuan Tu, Logan Bo-Yee Liu. 2030-2037 [doi]
- Robust Malicious Domain Detection Based on Spatio-Temporal Hypergraph NetworksLiangyi Gong, Kunxian Lv, Chun Long, Hao Fu, Huanran Wang, Wei Wan, Wu Yang. 2038-2045 [doi]
- MAD-LLM: A Novel Approach for Alert-Based Multi-stage Attack Detection via LLMDan Du, Xingmao Guan, Yuling Liu, Bo Jiang 0013, Song Liu, Huamin Feng, Junrong Liu. 2046-2053 [doi]
- Model-Based Throughput Optimization for Blockchain Sharding SystemYifan Li, Jianxiong Wan, Chuyi Liu, Leixiao Li. 2054-2059 [doi]
- Enhancing Few-Shot Malware Classification Through Joint Learning of Malware Images and Opcode SequencesHanjun Li 0005, Shuhong Chen, Guojun Wang 0001, Liu Cheng, Haojie Yin, Zhenkun Luo. 2060-2068 [doi]
- A Model for Vulnerability Classification based on Res-CNN-BiTLSTMJiazheng Li, Jiadong Ren, Shuailin Yang, Chenghao Zhi, Chunjiao Bao. 2069-2075 [doi]
- Blockchain-assisted secure multi-party computation with verification and auditingLei Zhang, Yixin Jiang, Hongjian Yin, Yakun Niu, Lei Tan, Yinfeng Hao. 2076-2081 [doi]
- DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature FusionWei You, Chunlei Zhao, Chao Shan, Guozhong Dong, Jie Yu, Yong Guan. 2082-2088 [doi]
- A Reputation Layered Coding Based Storage Strategy for Consortium BlockchainZiqian Li, Maolin Pan, Yang Yu 0027. 2089-2096 [doi]
- DeepARR: Alert risk rating based on deep learningQiyue Tang, Xiaoqiang Di, Xu Liu 0010, Ligang Cong, Weiwu Ren, Zhengping Ni. 2097-2104 [doi]
- DMSA: Decentralized and Multi-keyword Selective Data Sharing and AcquisitionMoheng Lin, Peichang Shi, Xiang Fu, Feng Jiang, Guodong Yi. 2105-2112 [doi]
- Efficient and Verifiable Skyline Computation on Blockchain System with Merkle B+ Tree IndexHao Ding, Xuefeng Piao, Huihui Song, Jiasi Li, Zhenzhou Ji, Meng Liu, Jie Liu, Wenjie Dong. 2113-2120 [doi]
- An Improved PBFT Consensus Algorithm Based on Reputation Grading and Voting in IoT EnvironmentYanlin Ji, Yang Zou, Gang Wang, Wanning Li, Ruiji Xu. 2121-2128 [doi]
- PSR-Tree: A Novel Method for Personalized Trajectory Data ProtectionChundong Wang 0002, Yixuan Song, Yongxin Zhao, Yuhan Tian, Shunyao Fang. 2129-2136 [doi]
- From n to n+x: A Novel Open World Traffic Classification Framework Based on Multiple Classifiers EnsembleKaixing Liu, Fei Wang, Shuhui Chen. 2137-2144 [doi]
- PhantomPatch: Easy-ignoring Attacks on Object Detectors Using Ghosting ArtifactsXiaolong Guo, Qingsong Yao, Jingwei Li 0001, Xuewen Dong, Jianfeng Ma 0001. 2145-2150 [doi]
- Enhancing Feature Selection in IoT Intrusion Detection Using the Ensemble StackingZhijian Zheng, Weilin Gai, Peng Zhang, Ming Zhou. 2151-2156 [doi]
- Smart Building Management System based on Digital Twin: A Case Study on Real-Time Environmental Monitoring and Thermal Comfort PredictionQizhong Gao, Yijie Chu, Zitian Peng, Yuhao Jin, Xiang Ji, Shuchen Ji, Songming Ping, Xiang Xie, Xiaohui Zhu, Yong Yue 0001. 2157-2163 [doi]
- Sound-based Bee Colony State Analysis Using Compact MFCC PatternsWeihai Huang, Weize Yang, Zhicong Luo, Jun Qi 0001, Tingting Zhang, Xiangzeng Kong. 2164-2169 [doi]
- Toward Multi-Agent Coordination in IoT via Prompt Pool-based Continual Reinforcement LearningChenhang Xu, Jia Wang, Xiaohui Zhu, Yong Yue 0001, Jun Qi 0001, Jieming Ma. 2170-2177 [doi]
- A Diffusion-Mamba Approach with Boundary Sampling for Imbalanced ClassificationQuan Yuan, Sheng Chang, Fan Zhang. 2178-2183 [doi]
- NASFLY: On-Device Split Federated Learning with Neural Architecture SearchChao Huo, Juncheng Jia, Tao Deng 0003, Mianxiong Dong, Zhanwei Yu, Di Yuan 0001. 2184-2190 [doi]
- Coverage Holes Recovery in Hybrid Sensor Networks Based on Key Perceptual IntersectionHe Li, Shixian Sun, Chuang Dong, Zhufeng Fu, Cong Zhao, Qinglei Qi. 2191-2196 [doi]
- Nonlinear Control of Crane Systems Based on Intelligence Computing of Disturbance Observer Under Mismatched DisturbanceTianlei Wang, Yiyan Wang, Meng Xu, Jiajie Tian, Jingling Zhang, Zhiyong Hong. 2197-2202 [doi]
- NetDS: Distributed Search Framework with Hybrid Acceleration MethodsPenghao Zhang, Zhiguo Hu. 2203-2210 [doi]
- Enhancing Edge Caching with User Preferences and Access Patterns in Wireless NetworksHao Wen, Lei Zhang. 2211-2214 [doi]
- AFCNNM: Accelerating Fully Connected Neural Network on Mesh-based Optical Network-on-ChipWen Yang, Yunting Liao. 2215-2216 [doi]
- Optimizing MEC System Performance Through M/M/m Queueing Model AnalysisJiale Liang, Xiaowei Ma, Houjian Ding, Zhenli He. 2217-2218 [doi]
- Design of VLC-Enabled Hybrid Data Center Network and Routing AlgorithmLinyu Yang, Xiaoyu Du, Yujing Wang, Shuaiqi Liu. 2219-2221 [doi]
- An Energy Prediction Algorithm for Energy Harvesting Wireless Sensors based on Energy Fluctuation ThresholdYalin Wang, Zhenbo Yuan, Yongqi Ge, Shuhua Yuan, Xin Chen, Rui Liu 0023, Jintao Gao. 2222-2223 [doi]
- An Improved Moth Flame Search for WSN Coverage OptimizationJiaqi Li, Minghua Wang. 2224-2227 [doi]
- OSN Rumor Control Model Based on Community ImmunizationMing Dong, Zhiqiang Sun, Zhenhua Tan, Bin Zhang 0001. 2228-2231 [doi]
- Image stitching tampering detection in social networksJin Zhang, Rula Sa, Qi An, Qiaomei Gao, Xiliang Pang, Meiju Yu. 2232-2233 [doi]
- Adaptive Hierarchical Protection Scheme for Social Relationships Based on Differential PrivacyJiawei Shen, Junfeng Tian, Ziyuan Wang. 2234-2235 [doi]
- An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks Using Compressive SensingZheyan Shi, Chenjun He, Junjie Tong, Sheng Pan, Hui Wang. 2236-2239 [doi]
- PIK-Convolution: Step Convolution Acceleration based on Multi-GPU ArchitectureYutao Peng, Yaobin Wang, Tianhai Wang, Mei Han, Yunxin Xu, Pingping Tang. 2240-2243 [doi]
- A Cross-Modal Breast Cancer Prognostic Prediction Model Based on Graph Neural NetworksSheng Chang, Quan Yuan, Fan Zhang. 2244-2245 [doi]
- Enhancing Code Generation for Dataflow Programming: Fine-Tuning Large Language Models with the DFCPP DatasetQiuming Luo, Xi Ma, Xuan Wei. 2246-2247 [doi]
- A Multipath Satellite Routing to Enhance Networking Performance for LEO ConstellationsChenqiang Tong, Chen Chen, Wei Han, Zhiyi Wang, Lixin Lan, Chengbin Huang, Fan Jin, Quan Gan, Shaohua Wan 0001. 2248-2249 [doi]
- STA-VAD: Video Anomaly Detection Utilizing Spatio-Temporal Memory and Adaptive DeformationHuiyu Mu, Jiashuai Su, Luhui Wang, Jiangwei Li, Yadi Wang, Xianyu Zuo. 2250-2251 [doi]
- Adaptive Neighbor Guided View Reconstruction for Incomplete Multiview ClusteringSiyuan Chen, Zhuojie Huang, Shuping Zhao, Qintai Hu. 2252-2253 [doi]
- A Privacy-Preserving and Efficient Data Sharing Scheme Based on Blockchain in IIoTHongyan Peng, Yipeng Yang, Dongcheng Li, Peng Wang, Peng Liu. 2254-2257 [doi]
- Research on Machine Learning Based False Information Hybrid Detection Model in Blockchain Social NetworksDan Qin, Qi Li, Jin Zhang, Pantong Wang, Guiquan Zheng, Meiju Yu. 2258-2259 [doi]
- Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain SystemsHongjian Zhao, Yunting Tao, Fanyu Kong, Guoyan Zhang, Hanlin Zhang, Jia Yu 0003. 2260-2263 [doi]
- Privacy-preserving scheme of cotton supply chain based on blockchainLinlin Zhang, Wenwen Li, Jing Huo, Xuehua Bi, Kai Zhao. 2264-2267 [doi]
- Smart Contract Vulnerability Detection via Feature Fusion of Local Data Flow and Global FeaturesLong Wang, Zhihua Chen, Hua Pang, Xiaoguang Li. 2268-2271 [doi]
- A Two-phase Encrypted Traffic Classification Scheme in Programmable Data PlaneHao Wang, Xiaobin Tan, Shenzhi Yuan, Mengxiang Li, Jiansong Wu, Quan Zheng 0002. 2272-2273 [doi]
- Carbon-Aware Distributed Energy Management for Data Center Microgrids Based on BlockchainXiaowei Si, Jianxiong Wan, Chuyi Liu, Leixiao Li, Xiaolei Wang, Xinyu Lu. 2274-2275 [doi]
- ROSE-BOX: An Approach for Intrusion Detection in Industrial Internet of ThingsSilin Peng, Yu Han, Xiaojun Liang, Chunhua Yang 0001, Weihua Gui 0001, Nan Zhou 0004. 2276-2277 [doi]