Abstract is missing.
- Study on Chinese Named Entity Recognition Based on Dynamic Fusion and Adversarial TrainingFei Fan, Linnan Yang, Xingyu Wu, Shengken Lin, Huijie Dong, Changshan Yin. 3-14 [doi]
- Spatial Semantic Learning for Travel Time EstimationYi Xu, Leilei Sun, Bowen Du 0001, Liangzhe Han. 15-26 [doi]
- A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability SignaturesXiaoxiao Zhou, Weina Niu, Xiaosong Zhang, Ruidong Chen, Yan Wang. 27-38 [doi]
- PPBR-FL: A Privacy-Preserving and Byzantine-Robust Federated Learning SystemYing Lin, Shengfu Ning, Jianpeng Hu, Jiansong Liu, Yifan Cao, Junyuan Zhang, Huan Pi. 39-50 [doi]
- GAN-Based Fusion Adversarial TrainingYifan Cao, Ying Lin, Shengfu Ning, Huan Pi, Junyuan Zhang, Jianpeng Hu. 51-64 [doi]
- MAST-NER: A Low-Resource Named Entity Recognition Method Based on Trigger PoolJuxiong Xu, Minbo Li. 65-76 [doi]
- Fuzzy Information Measures Feature Selection Using Descriptive Statistics DataOmar A. M. Salem, Haowen Liu, Feng Liu, Yi-Ping Phoebe Chen, Xi Chen. 77-90 [doi]
- Prompt-Based Self-training Framework for Few-Shot Named Entity RecognitionGanghong Huang, Jiang Zhong, Chen Wang, Qizhu Dai, Rongzhen Li. 91-103 [doi]
- Learning Advisor-Advisee Relationship from Multiplex Network StructureXiangchong Cui, Ting Bai, Bin Wu 0001, Xinkai Meng. 104-115 [doi]
- CorefDRE: Coref-Aware Document-Level Relation ExtractionZhongxuan Xue, Jiang Zhong, Qizhu Dai, Rongzhen Li. 116-128 [doi]
- Single Pollutant Prediction Approach by Fusing MLSTM and CNNMing Lian, Jing Liu. 129-140 [doi]
- A Multi-objective Evolutionary Algorithm Based on Multi-layer Network Reduction for Community DetectionXin Qi, Langzhou He, Jiaxin Wang, Zhanwei Du, Zheng Luo, Xianghua Li. 141-152 [doi]
- Detection DDoS of Attacks Based on Federated Learning with Digital Twin NetworkDingling Su, Zehui Qu. 153-164 [doi]
- A Privacy-Preserving Subgraph-Level Federated Graph Neural Network via Differential PrivacyYeqing Qiu, Chenyu Huang, Jianzong Wang, Zhangcheng Huang, Jing Xiao 0006. 165-177 [doi]
- ε -MC Nets: A Compact Representation Scheme for Large Cooperative Game SettingsErrikos Streviniotis, Athina Georgara, Georgios Chalkiadakis. 178-190 [doi]
- An Incentive-Compatible and Efficient Mechanism for Matching and Pricing in Ride-SharingBing Shi, Xizi Huang, Zhi Cao. 191-204 [doi]
- MEOD: A Robust Multi-stage Ensemble Model Based on Rank Aggregation and Stacking for Outlier DetectionZhengchao Jiang, Fan Zhang, Hao Xu, Li Tao, Zili Zhang. 205-218 [doi]
- MTN-Net: A Multi-Task Network for Detection and Segmentation of Thyroid Nodules in Ultrasound ImagesLeyao Chen, Wei Zheng, Wenxin Hu. 219-232 [doi]
- Dual Adversarial Federated Learning on Non-IID DataTao Zhang, Shaojing Yang, Anxiao Song, Guangxia Li, Xuewen Dong. 233-246 [doi]
- Low-Quality itDanMu Detection via Eye-Tracking PatternsXiangyang Liu, Weidong He, Tong Xu 0001, Enhong Chen. 247-259 [doi]
- TSC-GCN: A Face Clustering Method Based on GCNJinmin Xue, Shengdong Qu, Jingxian Li, Yan Chu 0001, Zhengkui Wang. 260-271 [doi]
- Spotlight on Video Piracy Websites: Familial Analysis Based on Multidimensional FeaturesChenlin Wang, Yonghao Yu, Ao Pu, Fan Shi, Cheng Huang. 272-288 [doi]
- A Vehicle Value Based Ride-Hailing Order Matching and Dispatching AlgorithmShuai Xu, Zeheng Zhong, Yikai Luo, Bing Shi. 289-301 [doi]
- Privacy-Preserving Deep Learning in Internet of Healthcare Things with Blockchain-Based IncentiveWenyuan Zhang, Peng Li, Guangjun Wu, Jun Li. 302-315 [doi]
- A Novel Spectral Ensemble Clustering Algorithm Based on Social Group Migratory Behavior and Emotional PreferenceMingzhi Dai, Xiang Feng, Huiqun Yu, Weibin Guo. 316-328 [doi]
- An Improved Semantic Link Based Cyber Community Discovery Model on Social NetworkWeiran Liu, Qiyu Ruan, Liang Zhang, Wei Ren. 329-338 [doi]
- NNDF: A New Neural Detection Network for Aspect-Category Sentiment AnalysisLijian Li, Yuanpeng He, Li Li. 339-355 [doi]
- Fourier Enhanced MLP with Adaptive Model Pruning for Efficient Federated RecommendationZhengyang Ai, Guangjun Wu, Binbin Li, Yong Wang, Chuantong Chen. 356-368 [doi]
- Empowering Graduate Students' Service Delivery by Using an Agile Chatbot: A Conceptual FrameworkSonglak Sakulwichitsintu. 369-377 [doi]
- Event Detection Based on Multilingual Information Enhanced Syntactic Dependency GCNZechen Wang, Binbin Li, Yong Wang. 378-390 [doi]
- Semantic Annotation of Videos Based on Mask RCNN for a Study of Animal BehaviorNourelhouda Hammouda, Mariem Mahfoudh, Mohamed Cherif. 391-402 [doi]
- Modeling Empathy Episodes with ARD and DMNWeronika T. Adrian, Julia Ignacyk, Krzysztof Kluza, Miroslawa M. Dlugosz, Antoni Ligeza. 403-413 [doi]
- A Novel RVFL-Based Algorithm Selection Approach for Software Model CheckingWeipeng Cao, Yuhao Wu, Qiang Wang, Jiyong Zhang, Xingjian Zhang, Meikang Qiu. 414-425 [doi]
- Named Entity Recognition in Biology Literature Based on Unsupervised Domain Adaptation MethodXingjian Xu, Fang Liu, Fanjun Meng. 426-437 [doi]
- A Lightweight Target Detection Algorithm Based on Improved MobileNetv3-YOLOv3Tong Fang, Baoshuai Du, Yunjia Xue, Guang Yang, Jingbo Zhao. 438-448 [doi]
- Hypergraph-Based Academic Paper RecommendationJie Yu 0009, Junchen He, Lingyu Xu. 449-462 [doi]
- Automated Reliability Analysis of Redundancy Architectures Using Statistical Model CheckingHongbin He, Hongyu Kuang, Lin Yang, Feng Yang, Qiang Wang, Weipeng Cao. 463-476 [doi]
- Research on Fabric Defect Detection Technology Based on EDSR and Improved Faster RCNNLi Yao, Naigang Zhang, Ao Gao, Yan Wan. 477-488 [doi]
- GM-Attack: Improving the Transferability of Adversarial AttacksJinbang Hong, Keke Tang, Chao Gao, Songxin Wang, Sensen Guo, Peican Zhu. 489-500 [doi]
- Adversarial Cycle-Consistent Autoencoder for Category-Aware Out-of-Town RecommendationLijiao Qin, Defu Lian. 501-515 [doi]
- Prompt as a Knowledge Probe for Chinese Spelling CheckKun Peng, Nannan Sun, Jiahao Cao, Rui Liu, Jiaqian Ren, Lei Jiang. 516-527 [doi]
- W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text AnalysisYaofeng Chen, Chunyang Zhang, Long Ye, Xiaogang Peng, Meikang Qiu, Weipeng Cao. 528-539 [doi]
- HLB-ConvMLP- Rapid Identification of Citrus Leaf DiseasesShuang Peng 0013, Xianshu Peng, Zhuochen Dai, Li Tao. 540-549 [doi]
- Natural Image Matting with Low-Level Feature Attention GuidanceHang Jiang, Song Wu, Dehong He, Guoqiang Xiao. 550-561 [doi]
- Identifying Taxi Commuting Traffic Analysis Zones Using Massive GPS DataYang Qin, Linjiang Zheng, Li Chen, Weining Liu. 562-578 [doi]
- Chinese Relation Extraction of Apple Diseases and Pests Based on BERT and Entity InformationMei Guo, Jiayu Zhang, Nan Geng, Yaojun Geng, Yongliang Zhang, Mei Li. 579-592 [doi]
- Recommendation via Collaborative Diffusion Generative ModelJoojo Walker, Ting Zhong, Fengli Zhang, Qiang Gao, Fan Zhou 0002. 593-605 [doi]
- Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical StudyZiyuan Zhang, Meiqi Wang, Wencheng Chen, Han Qiu 0008, Meikang Qiu. 606-618 [doi]
- System Level Recommender System for Academic Venue Personalization: Multi vs. Linked DomainAbir Zawali, Imen Boukhris. 619-630 [doi]
- Energy Consumption Prediction Using Bands-Based Data AnalyticsKieran Greer, Yaxin Bi. 631-643 [doi]
- Software and Hardware Fusion Multi-Head AttentionWei Hu, Dian Xu, Fang Liu, Zimeng Fan. 644-655 [doi]
- Hardware and Software Co-optimization for Windows AttentionWei Hu, Kejie Hu, Fang Liu, Jie Fan. 656-668 [doi]
- SSA: A Content-Based Sparse Attention MechanismYang Sun, Wei Hu, Fang Liu, Feihu Huang, Yonghao Wang. 669-680 [doi]
- Classification of Heads in Multi-head Attention MechanismsFeihu Huang, Min Jiang, Fang Liu, Dian Xu, Zimeng Fan, Yonghao Wang. 681-692 [doi]
- Hardware and Software Co-design for Soft Switch in ViT Variants Processing UnitWei Hu, Jie Fan, Fang Liu, Kejie Hu. 693-705 [doi]
- Energy-Based Learning for Preventing Backdoor AttackXiangyu Gao, Meikang Qiu. 706-721 [doi]
- PUF-Based Intellectual Property Protection for CNN ModelDawei Li, Yangkun Ren, Di Liu, Zhenyu Guan, Qianyun Zhang, Yanzhao Wang, Jianwei Liu. 722-733 [doi]
- Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial TrainingShudong Zhang, Haichang Gao, Yunyi Zhou, Zihui Wu, Yiwen Tang. 734-746 [doi]