Abstract is missing.
- A Survey of Deep Learning Applied to Story GenerationChenglong Hou, Chensong Zhou, Kun Zhou, Jinan Sun, Sisi Xuanyuanj. 1-10 [doi]
- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel PlatesKui Zhang, Xiaohu Zhou, Heng He, Yonghao Wang, Weihao Wang, Huajian Li. 11-21 [doi]
- An Improved Prediction Model for the Network Security SituationJingjing Hu, Dongyan Ma, Chen Liu, Huaizhi Yan, Changzhen Hu. 22-33 [doi]
- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater VehiclesXiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li. 34-41 [doi]
- An Improved Assessment Method for the Network Security RiskJingjing Hu, Shuangshuang Guo, Fankun Meng, Dongsheng Hu, Zhiyu Shi. 42-52 [doi]
- A High-Performance Storage System Based with Dual RAID EngineJingyu Liu, Jinrong Zhang, Juan Li, Lu Liu. 53-62 [doi]
- An Universal Perturbation Generator for Black-Box Attacks Against Object DetectorsYuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang. 63-72 [doi]
- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected VehicleZhao Wang, Yanqi Wang, Yanan Zhang, Yangyang Liu, Chao Ma, Haijun Wang. 73-82 [doi]
- Hierarchically Channel-Wise Attention Model for Clean and Polluted Water Images ClassificationYirui Wu, Yao Xiao, Jun Feng. 83-92 [doi]
- Energy-Efficient Approximate Data Collection and BP-Based Reconstruction in UWSNsYuanyuan Liu, Xiaohui Wei, Lina Li, Xingwang Wang. 93-104 [doi]
- I2P Anonymous Communication Network Measurement and AnalysisLikun Liu, Hongli Zhang 0001, Jiantao Shi, Xiangzhan Yu, Haixiao Xu. 105-115 [doi]
- Plot Digitizing over Big Data Using Beam SearchZhanyang Xu, Haoyang Shi, Xihua Liu. 116-125 [doi]
- Trust-Aware Resource Provisioning for Meteorological Workflow in CloudRuichao Mo, Lianyong Qi, Zhanyang Xu, Xiaolong Xu. 126-135 [doi]
- Do Top Social Apps Effect Voice Call? Evidence from Propensity Score Matching MethodsHao Jiang 0010, Min Lin, Bingqing Liu, Huifang Liu, Yuanyuan Zeng, He Nai, Xiaoli Zhang, Xianlong Zhao, Wen Du, Haining Ye. 136-149 [doi]
- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBBKexin Yang, Yuanyuan Zeng, Hao Jiang 0010, Qimei Chen. 150-160 [doi]
- Smart Custom Package Decision for Mobile Internet ServicesZhian Yang, Cong Zheng, Hao Jiang 0010, Yuanyuan Zeng, Zhiyi Hu, Wen Du. 161-170 [doi]
- A Space Dynamic Discovery Scheme for Crowd Flow of Urban CityZhaojun Wang, Hao Jiang 0010, Xiaoyue Zhao, Yuanyuan Zeng, Yi Zhang, Wen Du. 171-179 [doi]
- Automated Classification of Attacker Privileges Based on Deep Neural NetworkHailong Liu, Bo Li. 180-189 [doi]
- NnD: Shallow Neural Network Based Collision Decoding in IoT CommunicationsZhe Wang 0015, Linghe Kong, Guihai Chen, Ming Ni. 190-199 [doi]
- Subordinate Relationship Discovery Method Based on Directed Link PredictionHe Nai, Min Lin, Hao Jiang 0010, Huifang Liu, Haining Ye. 200-211 [doi]
- An Elephant Flow Detection Method Based on Machine LearningKaihao Lou, Yongjian Yang, Chuncai Wang. 212-220 [doi]
- AI Enhanced Automatic Response System for Resisting Network ThreatsSong Xia, Meikang Qiu, Meiqin Liu, Ming Zhong 0003, Hui Zhao 0002. 221-230 [doi]
- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-Defined NetworkingYongyi Cao, Jing Wu, Bo Zhu, Hao Jiang 0010, Yuchuan Deng, Wei Luo. 231-243 [doi]
- A Hardware Trojan Detection Method Design Based on TensorFlowWenzhi Wu, Ying Wei, Ruizhe Ye. 244-252 [doi]
- Resolving the Loop in High-Level SDN Program for Multi-table Pipeline CompilationXin Wang, Linghe Kong, Changjun Jiang. 253-265 [doi]
- DC Coefficients Recovery from AC Coefficients in the JPEG Compression ScenarioHan Qiu, Qinkai Zheng, Meikang Qiu, Gérard Memmi. 266-276 [doi]
- A Performance Evaluation Method of Coal-Fired Boiler Based on Neural NetworkYingyue Chen, Lijun Xiao, Osama Hosam. 277-285 [doi]
- Analysis and Prediction of Commercial Big Data Based on WIFI ProbeXiao Zeng, Hong Guo, Zhe Liu. 286-295 [doi]
- Design and Optimization of Camera HAL Layer Based on AndroidYu Gan, Wei Hu 0001, Yonghao Wang. 296-303 [doi]
- Music Rhythm Customized Mobile Application Based on Information ExtractionYining Li, Wei Hu 0001, Yonghao Wang. 304-309 [doi]
- Computational Challenges and Opportunities in Financial ServicesArt Sedighi, Doug Jacobson. 310-319 [doi]
- A Shamir Threshold Model Based Recoverable IP Watermarking SchemeWeidong Xiao, Weihong Huang, Wei Liang 0005, Xia Lei, Jiahong Cai, Yuanming Wang, Yanting Li. 320-329 [doi]
- Applications of Machine Learning Tools in Genomics: A ReviewJoseph L. Fracasso, Md Liakat Ali. 330-340 [doi]
- Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session ContextXiang Shen, Caiming Yang, Zhengwei Jiang, Dong Xie, Yingtao Sun, Shuibiao Chen, Bo Li. 341-348 [doi]
- Coattention-Based Recurrent Neural Networks for Sentiment Analysis of Chinese TextsLifeng Liu, Lizong Zhang, Fengming Zhang, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li. 349-356 [doi]
- Design and Implementation of Small-scale Sensor Network Based on Raspberry PiHonglei Zheng, Hong Guo, Shimin Wu. 357-365 [doi]
- Research on Template-Based Factual Automatic Question Answering TechnologyWenhui Hu, Xueyang Liu, Chengli Xing, Minghui Zhang, Sen Ma. 366-375 [doi]
- A Novel Scheme for Recruitment Text Categorization Based on KNN AlgorithmWenshuai Qin, Wenjie Guo, Xin Liu, Hui Zhao 0002. 376-386 [doi]
- Machine Learning for Cancer Subtype Prediction with FSA MethodYan Liu, Xu-Dong Wang, Meikang Qiu, Hui Zhao 0002. 387-397 [doi]
- Autonomous Vehicle Communication in V2X Network with LoRa ProtocolYauKa Cheung, Meikang Qiu, Meiqin Liu. 398-410 [doi]