Abstract is missing.
- Vulnerability Variants and Path Factors in NetworksLinli Zhu, Haci Mehmet Baskonus, Wei Gao 0012. 1-11 [doi]
- A Variant of Sun Toughness and the Existence of Path Factors in NetworksLinli Zhu, Haci Mehmet Baskonus, Wei Gao 0012. 12-19 [doi]
- Network Adjacency Condition for Fractional (g, f, n', m)-Critical Covered GraphsYu Pan, Haci Mehmet Baskonus, Wei Gao 0012. 20-30 [doi]
- An Effective Remote Data Disaster Recovery Plan for the Space TT&C SystemWeijie Han, Jingfeng Xue, Fuquan Zhang, Zhonghui Sun. 31-41 [doi]
- Research on Progress and Inspiration of Entity Relation Extraction in English Open DomainJian Xu, Xianming Yao, Jianhou Gan, Yu Sun. 42-55 [doi]
- A SEU Immune Flip-Flop with Low OverheadZhengfeng Huang, Xiandong Li, Shangjie Pan, Min Wang, Tianming Ni. 56-65 [doi]
- An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor NetworksZhi Li, Jifeng Feng, Jian Li, Xu Gou. 66-78 [doi]
- Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast ErrorMeng Wang, Guanxiang Yin, Fei Du, Juan Wang, Yuejin Zhang. 79-86 [doi]
- Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based ModelJiachi Zhang, Liu Liu 0001, Kai Wang, Botao Han, Zheyan Piao, Dong Wang. 87-97 [doi]
- Finite-Time Consensus of Second-Order Multi-agent Systems with External Disturbances and Without Velocity MeasurementsYuling Li, Hongyong Yang, Yize Yang, Yuanshan Liu. 98-111 [doi]
- A Comparative Study on Key Technologies of Ultra-Reliable Low Latency CommunicationMingju Yuan, Dongxiang Song, Bing Li. 112-124 [doi]
- Research on the Construction of College Campus Sports Culture and the Participation of College Students in Sports ActivitiesGuan Li, Xin Xin Huang. 125-136 [doi]
- Group Movement of Multi-agent Systems with Diverse DelaysYize Yang, Hongyong Yang, Fei Liu, Li Liu 0023. 137-146 [doi]
- Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability ControlJiaang Duan, Shasha Yang, Jianfeng Lu 0002, Wenchao Jiang, Haibo Liu, Shuo Zhang. 147-163 [doi]
- Max-Min Fairness Multi-task Allocation in Mobile CrowdsensingShasha Yang, Wenchao Jiang, Jiaang Duan, Zhengjie Huang, Jianfeng Lu 0002. 164-179 [doi]
- Research on High Reliable Wireless Channel Data Cleaning MethodLingfan Zhuang, Liu Liu 0001, Shuoshuo Dong, Yuanyuan Fan, Jiachi Zhang. 180-189 [doi]
- A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation ConditionsSheng Hong, Yining Zeng. 190-200 [doi]
- Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter AlgorithmSheng Hong, Tianyu Yue. 201-213 [doi]
- Location Planning of UAVs for WSNs Data Collection Based on Adaptive Search AlgorithmXueqiang Li, Ming Tao. 214-223 [doi]
- Covid-19 Public Opinion Analysis Based on LDA Topic Modeling and Data VisualizationLi Chen, Xin Huang, Hao Zhang, Ben Niu 0002. 224-234 [doi]
- A Capacitated Vehicle Routing Problem with Order Release Time Based on a Hybrid Harmony SearchLing Liu, Sen Liu, Ben Niu 0002, Hui Tan. 235-249 [doi]
- An Adaptive Data Protection Scheme for Optimizing Storage SpaceMeng Ming, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang. 250-260 [doi]
- The Thinned Rectangular Array Based on Modified Interger Genetic AlgorithmQingling Liu, Ding Yuan, Shubin Wang. 261-269 [doi]
- A Novel Method to Classify Videos Based VBR TraceXiaojie Yu, Min Qiu, Lizhi Peng. 270-282 [doi]
- Research on Friendvertising-Counter Technology in Big DataPei Ren, Hui Liu, Fengyin Li. 283-289 [doi]
- A Survey of Researches on Personalized Bundle Recommendation TechniquesMiao Li, Xuguang Bao, Liang Chang 0003, Zhoubo Xu, Long Li 0005. 290-304 [doi]
- Estimation of Motor Imagination Based on Consumer-Grade EEG DeviceZhenzhen Luo, ZhongYi Hu, Zuoyong Li. 305-314 [doi]
- An Overview of Key Technologies and Challenges of 6GQingling Liu, Shahid Sarfraz, Shubin Wang. 315-326 [doi]
- Q-Learning-Based Adaptive Bacterial Foraging OptimizationBen Niu 0002, Bowen Xue. 327-337 [doi]
- Counterfactual Retrieval for Augmentation and DecisionsNwaike Kelechi, Shuang Geng. 338-346 [doi]
- Firefly Algorithm Based on Dynamic Step Change StrategyJing Wang, Fuqi Song, Aihua Yin, Hui Chen. 347-355 [doi]
- Earthquakes Detection Scheme by Dynamic Time Warping on SmartphonesYuqin Zhu, Jiaxin Yang, Bingjie Shao, Liang Wang, Zhaohui Yuan. 356-369 [doi]
- Towards Accurate Seismic Events Detection Using Motion Sensors on SmartphonesQingping Cao, Yuqin Zhu, Mei He, Zhaohui Yuan. 370-383 [doi]
- A SEIR Model Optimization Using the Differential EvolutionDejiang Wang, Yafeng Sun, Ji Song, Ying Huang. 384-392 [doi]
- Multi-term Multi-task Allocation for Mobile Crowdsensing with Weighted Max-Min FairnessHaibo Liu, Wenchao Jiang, Shasha Yang, Jianfeng Lu 0002, Dongjun Ning. 393-404 [doi]
- An Improved Sensor Pattern Noise Estimation Method Based on Edge Guided Weighted AveragingWen-Na Zhang, Yun-Xia Liu, Jin Zhou, Yang Yang 0023, Ngai-Fong Law. 405-415 [doi]
- Analysis of the Influence of Stylized-CIFAR10 Dataset on ResNetDexin Wu, Jian Xu, Heng Liu. 416-426 [doi]
- A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance StrategyYing Wu, Zibo Qi, Ling Jiang, Changsheng Zhang, Jian Xu. 427-435 [doi]
- Education for Bilingual Children in the Age of Artificial IntelligenceWeiwei Zhou. 436-442 [doi]
- Application of Fuzzy Comprehensive Evaluation in Environmental Adaptability of Poultry HouseFenghang Zhang, Linze Li, Yuxuan Jiang 0004, Zhunan Zhou, Xiuli Wang. 443-451 [doi]
- Performance Evaluation of Multirotor UAV by Considering the Balanced PatternMin Lv, Cong Lin, Tianran Ma, Sheng Hong. 452-462 [doi]
- AdvJND: Generating Adversarial Examples with Just Noticeable DifferenceZifei Zhang, Kai Qiao, Lingyun Jiang, Linyuan Wang 0001, Jian Chen 0025, Bin Yan. 463-478 [doi]
- Squeeze Criterion GANs: Double Adversarial Learning MethodYan Gan, Tao Xiang, Mao Ye 0001. 479-493 [doi]
- A Feature-Based Detection System of Adversarial Sample AttackFangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang. 494-500 [doi]
- GF-Attack: A Strategy to Improve the Performance of Adversarial ExampleJintao Zhang, Zhenghao Liu, Liren Wu, Liwen Wu, Qing Duan, Junhui Liu. 501-513 [doi]
- War: An Efficient Pre-processing Method for Defending Adversarial AttacksZhaoxia Yin, Hua Wang, Jie Wang. 514-524 [doi]
- A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed AssumptionLulu Wang, Xiaoyu Zhang, Yi Xie, Xu Ma, Meixia Miao. 525-539 [doi]
- Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer LearningYong Ding 0005, Wenyao Liu, Yi Qin, Yujue Wang. 540-549 [doi]
- A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation MethodYunhao Yang, Long Li 0005, Liang Chang 0003, Tianlong Gu. 550-561 [doi]
- Adversarial Text Generation via Probability Determined Word SaliencyGang Ma, Lingyun Shi, Zhitao Guan. 562-571 [doi]
- Adversarial Example Attacks in the Physical WorldHuali Ren, Teng Huang. 572-582 [doi]
- Querying Little Is Enough: Model Inversion Attack via Latent InformationKanghua Mo, Teng Huang, Xiaoyu Xiang. 583-591 [doi]
- Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning SystemNa Pang, Sheng Hong, Yang Pan, Yuqi Ji. 592-602 [doi]