Abstract is missing.
- A Two-Way Identity Authentication Scheme Based on Dynamic PasswordBaohua Zhao, Ningyu An, Xiao Liang, Chunhui Ren, ZhiHao Wang. 1-7 [doi]
- Adaptive Quality Control Scheme to Improve QoE of Video Streaming in Wireless NetworksMinsu Kim, Kwangsue Chung. 8-17 [doi]
- Travel Review Analysis System with Big Data (TRAS)Chakkrit Snae Namahoot, Sopon Pinijkitcharoenkul, Michael Brückner. 18-28 [doi]
- Vulnerability Assessment for PMU Communication NetworksXiangyu Niu, Yue Tong, Jinyuan Sun. 29-38 [doi]
- Proposal of Parallel Processing Area Extraction and Data Transfer Number Reduction for Automatic GPU Offloading of IoT ApplicationsYoji Yamato, Hirofumi Noguchi, Misao Kataoka, Takuma Isoda, Tatsuya Demizu. 39-54 [doi]
- Performance Evaluation of Industrial OPC UA Gateway with Energy Cost-SavingHanjun Cho, Jongpil Jeong. 55-66 [doi]
- Travel-Time Prediction Methods: A ReviewMengting Bai, Yangxin Lin, Meng Ma, Ping Wang. 67-77 [doi]
- The Influence of Sleep on Opportunistic Relay in Linear Wireless Sensor NetworksHaibo Luo, Zhiqiang Ruan, Fanyong Chen. 78-86 [doi]
- Reconfigurable Hardware Generation for Tensor Flow Models of CNN Algorithms on a Heterogeneous Acceleration PlatformJiajun Gao, Yongxin Zhu 0001, Meikang Qiu, Kuen Hung Tsoi, Xinyu Niu, Wayne Luk, Ruizhe Zhao, Zhiqiang Que, Wei Mao, Can Feng, Xiaowen Zha, Guobao Deng, Jiayi Chen, Tao Liu. 87-96 [doi]
- Image Segmentation Algorithm Based on Spatial Pyramid and Visual SalienceJingxiu Ni, Xu Qian, Guoying Zhang, Aihua Liang, Huimin Ju. 97-103 [doi]
- Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice TechnologyJingbin Zhang, Meng Ma, Ping Wang. 104-113 [doi]
- Static Analysis of Android Apps Interaction with Automotive CANFederica Panarotto, Agostino Cortesi, Pietro Ferrara, Amit Kr Mandal, Fausto Spoto. 114-123 [doi]
- Opportunistic Content Offloading for Mobile Edge ComputingHao Jiang 0010, Bingqing Liu, Yuanyuan Zeng, Qian Li, Qimei Chen. 124-133 [doi]
- Image Annotation Algorithm Based on Semantic Similarity and Multi-featuresJingxiu Ni, Dongxing Wang, Guoying Zhang, Yanchao Sun, Xinkai Xu. 134-142 [doi]
- One Secure IoT Scheme for Protection of True NodesYongkai Fan, Guanqun Zhao, Xiaodong Lin, Xiaofeng Sun, Dandan Zhu, Jing Lei. 143-152 [doi]
- Predicted Mobile Data Offloading for Mobile Edge Computing SystemsHao Jiang 0010, Duo Peng, Kexin Yang, Yuanyuan Zeng, Qimei Chen. 153-162 [doi]
- A Monte Carlo Based Computation Offloading Algorithm for Feeding Robot IoT SystemCheng Zhang, Takumi Ohashi, Miki Saijo, Jorge Solis, Yukio Takeda, Ann-Louise Lindborg, Ryuta Takeda, Yoshiaki Tanaka. 163-171 [doi]
- Collective Behavior Aware Collaborative Caching for Mobile Edge ComputingHao Jiang 0010, Hehe Huang, Ying Jiang, Yuan Wang, Yuanyuan Zeng, Chen Zhou. 172-181 [doi]
- Implementation of Distributed Multi-Agent Scheduling Algorithm Based on Pi-calculusBairun Li, Hui Kang, Fang Mei. 182-195 [doi]
- SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble LearningZijian Zhang, Meng Li 0006, Liehuang Zhu, Xinyi Li. 196-205 [doi]
- An Optimized MBE Algorithm on Sparse Bipartite GraphsYu He, Rong-Hua Li, Rui Mao. 206-216 [doi]
- IoT Framework for Interworking and Autonomous Interaction Between Heterogeneous IoT PlatformsSeongju Kang, Kwangsue Chung. 217-225 [doi]
- Improvement of TextRank Based on Co-occurrence Word Pairs and Context InformationYang Wang, Hua Yin, Minwei He. 226-235 [doi]
- Augmenting Embedding with Domain Knowledge for Oral Disease Diagnosis PredictionGuangkai Li, Songmao Zhang, Jie Liang, Zhanqiang Cao, Chuanbin Guo. 236-250 [doi]
- Regional Estimation Prior Network for Crowd AnalyzingPing He, Meng Ma, Ping Wang. 251-260 [doi]
- RBD: A Reference Railway Big Data System ModelWeilan Lin, Fanhua Xu, Meng Ma, Ping Wang. 261-270 [doi]
- Artificial Intelligence Platform for Heterogeneous ComputingHaikuo Zhang, Zhonghua Lu, Ke Xu, Yuchen Pang, Fang Liu, Liandong Chen, Jue Wang. 271-280 [doi]
- Review on Application of Artificial Intelligence in Photovoltaic Output PredictionDianling Huang, Xiaoguang Wang, Boyao Zhang. 281-290 [doi]
- Abnormal Flow Detection Technology in GPU Network Based on Statistical Classification MethodHuiFeng Yang, Liandong Chen, Boyao Zhang, Haikuo Zhang, Peng Zuo, Ningming Nie. 291-299 [doi]
- Research on Data Forwarding Algorithm Based on Link Quality in Vehicular Ad Hoc NetworksXiumei Fan, Hanyu Cai, Tian Tian. 300-310 [doi]
- The Knowledge Map Analysis of User Profile Research Based on CiteSpaceDanbei Pan, Hua Yin, Yang Wang, Zhijian Wang, Zhensheng Hu. 311-320 [doi]
- The Accuracy of Fuzzy C-Means in Lower-Dimensional Space for Topic DetectionHendri Murfi. 321-334 [doi]
- Information-Centric Fog Computing for Disaster ReliefJianwen Xu, Kaoru Ota, Mianxiong Dong. 335-344 [doi]
- Smartly Deploying WeChat Mobile Application on Cloud Foundry PaaSZhihui Lu 0002, Xiaoli Wan, Meikang Qiu, Lijun Zu, Shih-Chia Huang, Jie Wu, Meiqin Liu. 345-355 [doi]
- Research on Arm Motion Capture of Virtual Reality Based on KinematicsShubin Cai, Dihui Deng, Jinchun Wen, Chaoqin Chen, Zhong Ming, Zhiguang Shan. 356-365 [doi]
- Financial News Quantization and Stock Market Forecast Research Based on CNN and LSTMShubin Cai, Xiaogang Feng, Ziwei Deng, Zhong Ming, Zhiguang Shan. 366-375 [doi]
- Correlation Coefficient Based Cluster Data Preprocessing and LSTM Prediction Model for Time Series Data in Large Aircraft Test FlightsHanlin Zhu, Yongxin Zhu, Di Wu, Hui Wang, Li Tian, Wei Mao, Can Feng, Xiaowen Zha, Guobao Deng, Jiayi Chen, Tao Liu, Xinyu Niu, Kuen Hung Tsoi, Wayne Luk. 376-385 [doi]
- PSPChord - A Novel Fault Tolerance Approach for P2P Overlay NetworkDan Nguyen, Nhat Hoang, Binh Minh Nguyen, Viet D. Tran. 386-396 [doi]
- Studying Weariness Prediction Using SMOTE and Random ForestsYu Weng, Fengming Deng, GuoSheng Yang, Liandong Chen, Jie Yuan, Xinkai Gui, Jue Wang. 397-406 [doi]
- Design of Heterogeneous Evaluation Method for Redundant CircuitsHuicong Wu, Jie Yu, Yangang Wang, Xiaoguang Wang. 407-416 [doi]
- Senior2Local: A Machine Learning Based Intrusion Detection Method for VANETsYi Zeng, Meikang Qiu, Zhong Ming, Meiqin Liu. 417-426 [doi]
- Depth Prediction from Monocular Images with CGANWei Zhang, Guoying Zhang, Qiran Zou. 427-436 [doi]
- Anomaly Detection for Power Grid Based on Network FlowLizong Zhang, Xiang Shen, Fengming Zhang, Minghui Ren, Bo Li. 437-445 [doi]
- A K-Anonymous Full Domain Generalization Algorithm Based on Heap SortXuyang Zhou, Meikang Qiu. 446-459 [doi]