Abstract is missing.
- Efficient Online Service Based on Go-Tensorflow in the Middle-Station Scenario of Grid ServicePeng Liu, Yiming Lu, Guoqing Wang, Wang Zhou. 3-13 [doi]
- Resource Modeling of Power Communication Packet Optical Transport NetworkZhixin Lu, Lianyu Fu, Yizhao Liu, Xiyang Yin. 14-25 [doi]
- Energy-Efficient Federated Learning in IoT NetworksDeyi Kong, Zehua You, Qimei Chen, Juanjuan Wang, Jiwei Hu, Yunfei Xiong, Jing Wu. 26-36 [doi]
- Chinese Fine-Grained Sentiment Classification Based on Pre-trained Language Model and Attention MechanismFaguo Zhou, Jing Zhang, Yanan Song. 37-47 [doi]
- Link-Efficiency Multi-channel Transmission Protocol for Data Collection in UASNsXiaohui Wei, Xiaonan Wang, Haixiao Xu, Xingwang Wang, Hao Guo. 48-63 [doi]
- A Multi-attribute Decision Handover Strategy for Giant LEO Mobile Satellite NetworksTingting Zhang, Lintao Yang, Tao Dong 0002, Jie Yin, Zhihui Liu, Zhanwei Wang. 64-73 [doi]
- ML-ECN: Multilayer Emergency Communication Network Based on the Combination of Space and EarthLiang Zhou, Hao Li, Jianguo Zhou, Changjia Zhou, Tianzhu Shi. 74-89 [doi]
- Multi-attribute Authentication Method Based on Continuous Trust EvaluationJing Guo, Bingsen Li, Ping Du, Ziyi Xin, Jianjun Zhang, Jiawei Chen. 90-100 [doi]
- Defects Detection System of Medical Gloves Based on Deep LearningJing Wang, Meng Wan, Jue Wang, Xiaoguang Wang, Yangang Wang, Fang Liu, Weixiao Min, He Lei, Lihua Wang. 101-111 [doi]
- Mobile Terminal Identity Authentication Method Based on IBCXuqiu Chen, Wei Wang, Wei Gan, Yi Yang, Su Yuan, Meng Li. 112-122 [doi]
- Secure Shell Remote Access for Virtualized Computing EnvironmentHe Li, Rongqiang Cao, Hanwen Xiu, Meng Wan, Kai Li, Xiaoguang Wang, Yangang Wang, Jue Wang. 123-132 [doi]
- A Survey of Machine Learning and Deep Learning Based DGA Detection TechniquesAmr M. H. Saeed, Danghui Wang, Hamas A. M. Alnedhari, Kuizhi Mei, Jihe Wang. 133-143 [doi]
- Sci-Base: A Resource Aggregation and Sharing Ecology for Software on Discovery ScienceMeng Wan, Jiaheng Wang, Jue Wang, Rongqiang Cao, Yangang Wang, He Li. 144-153 [doi]
- Joint Accuracy and Resource Allocation for Green Federated Learning NetworksXu Chu, Xiaoyang Liu, Qimei Chen, Yunfei Xiong, Juanjuan Wang, Han Yu, Xiang Hu. 154-163 [doi]
- Trust Evaluation Method Based on the Degree of Code ObfuscationLu Chen, Zaojian Dai, Nige Li, Yong Li. 164-174 [doi]
- An SG-CIM Model Table Classification Method Based on Multi Feature Semantic Recognition TechnologyPengyu Zhang, Chunmei Wang, Baocong Hao, Wenhui Hu, Xueyang Liu, Lizhuang Sun. 175-185 [doi]
- BBCT: A Smart Blockchain-Based Bulk Commodity Trade SystemJian Yang, Yawen Lu, Zhihui Lu 0002, Jie Wu 0001, Hui Zhao. 186-197 [doi]
- Research on Data Fault-Tolerance Method Based on Disk Bad Track IsolationXu Zhang, Li Zheng, Sujuan Zhang. 198-207 [doi]
- Charge Prediction for Criminal Law with Semantic AttributesCong Zhou, Weipeng Cao, Zhiwu Xu 0001. 208-217 [doi]
- Research on Enterprise Financial Accounting Based on Modern Information TechnologyJie Wan. 218-227 [doi]
- Financial Information Management Under the Background of Big DataDansheng Rao, Jie Wan. 228-237 [doi]
- AreaTransfer: A Cross-City Crowd Flow Prediction Framework Based on Transfer LearningXiaohui Wei, Tao Guo, Hongmei Yu, Zijian Li 0007, Hao Guo, Xiang Li. 238-253 [doi]
- Parallel Improved Quantum Evolutionary Algorithm for Complex Optimization ProblemsYapeng Sun. 254-264 [doi]
- A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium BlockchainYunwei Guo, Haokun Tang, Aidi Tan, Lei Xu 0016, Keke Gai, Xiongwei Jia. 265-275 [doi]
- A Hop-Parity-Involved Task Schedule for Lightweight Racetrack-Buffer in Energy-Efficient NoCsWanhao Cao, Jihe Wang, Danghui Wang, Kuizhi Mei. 276-285 [doi]
- Analysis and Discussion on Standard Cost Allocation Model in State GridShaojun Jin, Jun Pan, Qian Chen, Bo Li. 286-296 [doi]
- A Novel Deception Defense-Based Honeypot System for Power Grid NetworkMingjun Feng, Buqiong Xiao, Bo Yu, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li. 297-307 [doi]
- Seamless Group Pre-handover Authentication Scheme for 5G High-Speed Rail NetworkZongxiao Li, Di Liu, Peiran Li, Dawei Li, Yu Sun, Zhenyu Guan, Jianwei Liu 0001, Jie Gao. 308-317 [doi]
- Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series PredictionXiangtian Tan, Chen Zhang, Bo Li 0005, Binbin Ge, Chen Liu. 318-328 [doi]
- High-Performance and Customizable Vector Retrieval Service Based on Faiss in Power Grid ScenariosPengyu Zhang. 329-339 [doi]
- APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlowBo Dai, Zhenhai Zhang, Ling Wang, Yuan Liu. 340-351 [doi]
- An Automatic Design Method of Similarity Fusion Neural Network Based on SG-CIM ModelXiaoqi Liao, Xinliang Ge, Yufei Li, Wenhui Hu, Xin He, Shijie Gao, Xiaoming Chen, Xueyang Liu. 352-363 [doi]
- A Detection Method for I-CIFA Attack in NDN NetworkMeng Yue, Han Zheng, Wenzhi Feng, Zhijun Wu 0001. 364-373 [doi]
- InterGridSim: A Broker-Overlay Based Inter-Grid SimulatorAbdulrahman Azab. 374-383 [doi]
- Vertical Handover of Satellite-Ground Fusion Network Based on Time and Location Under Early Access StrategyYun Liu, Shenghao Ding, Jiaxin Huang, Hao Jiang, Jing Wu 0016, Ruiliang Song, Ningning Lu, Zhiqun Song. 384-393 [doi]
- Research on Graph Structure Data Adversarial Examples Based on Graph Theory MetricsWenyong He, Mingming Lu, Yiji Zheng, Neal N. Xiong. 394-403 [doi]
- Computation Offloading and Resource Allocation Based on Multi-agent Federated LearningYiming Yao, Tao Ren, Yuan Qiu 0006, Zheyuan Hu, Yanqi Li. 404-415 [doi]
- Multi-agent Computation Offloading in UAV Assisted MEC via Deep Reinforcement LearningHang He, Tao Ren, Yuan Qiu 0006, Zheyuan Hu, Yanqi Li. 416-426 [doi]
- OPN-DTSP: Optimized Pointer Networks for Approximate Solution of Dynamic Traveling Salesman ProblemZhixiang Xiao, Mingming Lu, Wenyong He, Jiawen Cai, Neal N. Xiong. 427-437 [doi]
- A Novel Client Sampling Scheme for Unbalanced Data Distribution Under Federated LearningBo Chen, Xiaoying Zheng, Yongxin Zhu 0001, Meikang Qiu. 438-449 [doi]
- A Novel Secure Speech Biometric Protection MethodLan Yang, Zongbo Wu, Jun Guo. 450-459 [doi]
- Thunderstorm Recognition Based on Neural Network PRDsNET ModelsShengchun Wang, Danyi Hu, Changqing Zhou, Jingyu Xu. 460-469 [doi]
- The Development and Trend of Vehicle Functional SafetyJun Guo, Gejing Xu, Junjie Wu, Lan Yang, Han Deng. 470-480 [doi]
- Design and Development of Simulation Software Based on AR-Based Torricelli ExperimentYan-hui, Jie Zhan, Libin Jiao, Xiu Liang. 481-490 [doi]
- Study on the Organization and Governance of Bigdata for Lifelong EducationLi Ma, Zexian Yang, Wenyin Yang, Huihong Yang, Qidi Lao. 493-500 [doi]
- Fault Location Technique of Distribution Power Network Based on Traveling Wave MeasurementChunyi Lu, Kaili Yan, Mi Zhou. 501-507 [doi]
- Unikernel and Advanced Container Support in the Socker ToolAbdulrahman Azab. 508-512 [doi]