Abstract is missing.
- Traditional Chinese Medicine Health Status Identification with Graph Attention NetworkAmin Fu, Jishun Ma, Chuansheng Wang, Changen Zhou, Zuoyong Li, Shenghua Teng. 1-14 [doi]
- Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm IntelligenceBowen Xue, Huifen Zhong, Junrui Lu, Tianwei Zhou, Ben Niu 0002. 15-26 [doi]
- Privacy Preserving CSI Fingerprint Device-Free LocalizationTianxin Huang, Lingjun Zhao, Zeyang Dai, Liang Lin, Huakun Huang. 27-39 [doi]
- A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing ModelHaichao Wu, Xiaoming Liu, Wei Ou. 40-56 [doi]
- Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate InferencePeng Lin, Changsheng Dou, Nannan Gu, Zhiyuan Shi 0001, Lili Ma. 57-71 [doi]
- VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart ContractsFan Jiang, Yuanlong Cao, Jianmao Xiao, Hui Yi, Gang Lei, Min Liu, ShuiGuang Deng, Hao Wang 0080. 72-86 [doi]
- Robust Remote Sensing Scene Classification with Multi-view Voting and Entropy RankingJinyang Wang, Tao Wang, Min Gan, George Hadjichristofi. 87-98 [doi]
- Visualized Analysis of the Emerging Trends of Automated Audio Description TechnologyLingqian Zheng, Xinrong Cao. 99-108 [doi]
- Anomaly Detection for Multi-time Series with Normalizing FlowWeiye Ning, Xin Xie 0002, Yuhui Huang, Si Yu, Zhao Li, Hao Yang 0013. 109-117 [doi]
- Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data AnalysisYanning Zhang. 118-132 [doi]
- A Lightweight NFT Auction Protocol for Cross-chain EnvironmentHongyu Guo, Mao Chen 0006, Wei Ou. 133-146 [doi]
- A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic ImagesZhongzheng Huang, Tao Wang, Yuanzheng Cai, Lingyu Liang. 147-159 [doi]
- Swarm Intelligence for Multi-objective Portfolio OptimizationLi Chen, Yongjin Wang, Jia Liu, Lijing Tan. 160-169 [doi]
- Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain TechnologyHuiling Liu. 170-184 [doi]
- Data Leakage with Label Reconstruction in Distributed Learning EnvironmentsXiaoxue Zhang, Xiuhua Zhou, Kongyang Chen. 185-197 [doi]
- Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural NetworkHaiying Chen, Jiahui Zou. 198-212 [doi]
- Spatio-Temporal Context Modeling for Road Obstacle DetectionXiuen Wu, Tao Wang, Lingyu Liang, Zuoyong Li, Fum Yew Ching. 213-227 [doi]
- A Survey of Android Malware Detection Based on Deep LearningDianxin Wang, Tian Chen, Zheng Zhang, Nan Zhang. 228-242 [doi]
- Information Encryption Transmission Method of Automobile Communication Network Based on Neural NetworkChunhua Kong, Kai Ma, Jiatong Wei. 243-256 [doi]
- Explanation-Guided Minimum Adversarial AttackMingting Liu, Xiaozhang Liu, Anli Yan, Yuan Qi, Wei Li. 257-270 [doi]
- CIFD: A Distance for Complex Intuitionistic Fuzzy SetYangyang Zhao, Fuyuan Xiao 0001. 271-280 [doi]
- Security Evaluation Method of Distance Education Network Nodes Based on Machine LearningJiajuan Fang. 281-295 [doi]
- MUEBA: A Multi-model System for Insider Threat DetectionJing Liu, Jingci Zhang, Changcun Du, Dianxin Wang. 296-310 [doi]
- Bayesian Based Security Detection Method for Vehicle CAN Bus NetworkShen Jiang, Hailan Zhang. 311-325 [doi]
- Discrete Wavelet Transform-Based CNN for Breast Cancer Classification from Histopathology ImagesYuan Qi, Xiaozhang Liu, Hua Li, Mingting Liu, Wei Li. 326-340 [doi]
- Machine Learning Based Security Situation Awareness Method for Network Data Transmission ProcessHui Du. 341-355 [doi]
- Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling ProblemBen Niu, Yuda Wang, Jia Liu, Qianying Liu. 356-365 [doi]
- High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC AlgorithmZhengjian Duan. 366-379 [doi]
- Large Scale Network Intrusion Detection Model Based on FS Feature SelectionMei Hong, Yingyong Zou, Chun Ai. 380-393 [doi]
- Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN GatewayJiatong Wei, Kai Ma, Chunhua Kong. 394-408 [doi]
- Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and PerspectiveHuoyuan Dong, Jialiang Dong, Shuai Yuan, Zhitao Guan. 409-424 [doi]
- A Novel Security Scheme for Mobile Healthcare in Digital TwinNansen Wang, Wenbao Han, Wei Ou. 425-441 [doi]
- Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining DataGuoqiang Zhao, Meitao Zhang, Yingying Wu. 442-456 [doi]
- Spiking Neural Networks Subject to Adversarial Attacks in Spiking DomainXuanwei Lin, Chen Dong 0002, Ximeng Liu, Dong Cheng. 457-471 [doi]
- Diverse Web APIs Recommendation with Privacy-preservation for Mashup DevelopmentShengqi Wu, Lianyong Qi, Yuwen Liu, Yihong Yang, Ying Miao 0004, Fei Dai 0002. 472-485 [doi]
- Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine LearningShuilan Song, Xinjiu Liang. 486-500 [doi]
- FedTD: Efficiently Share Telemedicine Data with Federated Distillation LearningNing Li, Nansen Wang, Wei Ou, Wenbao Han. 501-515 [doi]
- Increase Channel Attention Based on Unet++ Architecture for Medical ImagesFei Wu, Sikai Liu, Bo Li, Jinghong Tang. 516-520 [doi]
- Distributed Power Load Missing Value Forecasting with Privacy ProtectionYing Miao 0004, Lianyong Qi, Haoyang Wu, Yuxin Tian, Shengqi Wu, Yuqing Wang, Fei Dai 0002, Shaoqi Ding. 521-534 [doi]
- Differentially Private Generative Model with Ratio-Based Gradient ClippingJianchen Lin, Yanqing Yao. 535-549 [doi]
- Differential Privacy Protection Algorithm for Data Clustering CenterMingyang Ma, Hongyong Yang, Fei Liu. 550-559 [doi]
- Improved Kmeans Algorithm Based on Privacy ProtectionCaixin Wang, Lili Wang, Hongyong Yang. 560-567 [doi]
- Symmetry Structured Analysis Sparse Coding for Key Frame ExtractionYujie Li 0002, Benying Tan, Shuxue Ding, Christian Desrosiers, Ahmad Chaddad. 568-585 [doi]
- Data Reconstruction from Gradient Updates in Federated LearningXiaoxue Zhang, Junhao Li, Jianjie Zhang, Jijie Yan, Enmin Zhu, Kongyang Chen. 586-596 [doi]
- Natural Backdoor Attacks on Speech Recognition ModelsJinwen Xin, Xixiang Lyu, Jing Ma. 597-610 [doi]
- Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation CorrectionJiahui Wu, Zuoyong Li, Pantea Keikhosrokiani, Yuanzheng Cai. 611-623 [doi]
- AP-GCL: Adversarial Perturbation on Graph Contrastive LearningZiyu Zheng, Haoran Chen, Ke Peng. 624-633 [doi]
- An Overview of Opponent Modeling for Multi-agent CompetitionLu Liu, Jie Yang 0002, Yaoyuan Zhang, Jingci Zhang, Yuxi Ma. 634-648 [doi]
- Research on Potential Threat Identification Algorithm for Electric UAV Network CommunicationGebiao Hu, Zhichi Lin, Zheng Guo, Ruiqing Xu, Xiao Zhang. 649-663 [doi]