Abstract is missing.
- Design and Implementation of Deep Learning Real-Time Streaming Video Data Processing SystemQiming Zhao, Jing Wu, Xiang Wu, Jie Fan, Linhao Wang, Fengling Wu. 1-10 [doi]
- GenGLAD: A Generated Graph Based Log Anomaly Detection FrameworkHaolei Wang, Yong Chen, Chao Zhang, Jian Li, Chun Gan, Yinxian Zhang, Xiao Chen. 11-22 [doi]
- A New Digital-Currency Model Based on CertificatesWei-Tek Tsai, Weijing Xiang, Shuai Wang, Enyan Deng. 23-34 [doi]
- Meter Location System Base on Jetson NXChengjun Yang, Ling Zhou, Ce Yang. 35-44 [doi]
- Research on Cross-Domain Heterogeneous Information Interaction System in Complex Environment Based on Blockchain TechnologyBaoquan Ma, YeJian Cheng, Ni Zhang, Peng Wang, XuHua Lei, Xiaoyong Huai, Jiaxin Li, ShuJuan Jia, Chunxia Wang. 45-54 [doi]
- A New Blockchain Design Decoupling Consensus Mechanisms from Transaction ManagementWei-Tek Tsai, Zimu Hu, Rong Wang, Enyan Deng, Dong Yang. 55-65 [doi]
- Adaptive Byzantine Fault-Tolerant ConsensusProtocolRong Wang, Wei-Tek Tsai, Feng Zhang, Le Yu, Hongyang Zhang, YaoWei Zhang. 66-75 [doi]
- A Multi-level Corporate Wallet with GovernanceWei-Tek Tsai, Dong Yang, Zizheng Fan, Feng Zhang, Le Yu, Hongyang Zhang, YaoWei Zhang. 76-84 [doi]
- Blockchains with Five Merkle Trees to Support Financial TransactionsWei-Tek Tsai, Dong Yang, Feng Zhang, Le Yu, Hongyang Zhang, YaoWei Zhang. 85-94 [doi]
- A Survey of Recommender Systems Based on Hypergraph Neural NetworksCanwei Liu, Tingqin He, Hangyu Zhu, Yanlu Li, Songyou Xie, Osama Hosam. 95-106 [doi]
- Equipment Health Assessment Based on Node EmbeddingJian Li, Xiao Chen, Chao Zhang, Hao Wu, Xin Yu, Shiqi Liu, Haolei Wang. 107-119 [doi]
- Improvement of ERP Cost Accounting System with Big DataJie Wan, Yiren Qi. 120-130 [doi]
- OpenVenus: An Open Service Interface for HPC Environment Based on SLURMMeng Wan, Rongqiang Cao, Yangang Wang, Jue Wang, Kai Li, Xiaoguang Wang, Qinmeng Yang. 131-141 [doi]
- Design and Analysis of Two Efficient Socialist Millionaires' Protocols for Privacy ProtectionXin Liu 0013, Xiaomeng Liu, Xiaofen Tu, Neil N. Xiong. 142-151 [doi]
- ABODE-Net: An Attention-based Deep Learning Model for Non-intrusive Building Occupancy Detection Using Smart Meter DataZhirui Luo, Ruobin Qi, Qingqing Li, Jun Zheng 0003, Sihua Shao. 152-164 [doi]
- Confidentially Computing DNA Matching Against Malicious AdversariesXiaofen Tu, Xin Liu 0013, Xiangyu Hu, Baoshan Li, Neal N. Xiong. 165-174 [doi]
- Research on Action Recognition Based on Zero-shot LearningHui Zhao 0002, JiaCheng Tan, Jiajia Duan. 175-187 [doi]
- DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal CorrelationsTaisho Sasada, Yuzo Taenaka, Youki Kadobayashi. 188-202 [doi]
- Scheduling Algorithm for Low Energy Consumable Parallel Task Application Based on DVFSXun Liu, Hui Zhao. 203-212 [doi]
- Research of Duplicate Requirement Detection MethodDansheng Rao, Lingfeng Bian, Hui Zhao. 213-225 [doi]
- Bayesian Causal Mediation Analysis with Longitudinal DataYu Zhang, Lintao Yang, Fuhao Liu, Lei Zhang, Jingjing Zheng, Chongxi Zhao. 226-235 [doi]
- Track Obstacle Real-Time Detection of Underground Electric Locomotive Based on Improved YOLOXCaiwu Lu, Fan Ji, Naixue Xiong, Song Jiang 0003, Di Liu, Sai Zhang. 236-246 [doi]
- Research on Sharding Strategy of Blockchain Based on TOPSISJun Liu, Xu Shen, Mingyue Xie, Qi Zhang. 247-257 [doi]
- Parallel Pileup Correction for Nuclear Spectrometric Data on Many-Core AcceleratorsZikang Chen, Xiangcong Kong, Xiaoying Zheng, Yongxin Zhu 0001, Tom Trigano. 258-267 [doi]
- Component Extraction for Deep Learning Through Progressive MethodXiangyu Gao, Meikang Qiu, Hui Zhao 0002. 268-279 [doi]
- LowFreqAttack: An Frequency Attack Method in Time Series PredictionNeal N. Xiong, Wenyong He, Mingming Lu. 280-289 [doi]
- A Novel Machine Learning-Based Model for Reentrant Vulnerabilities DetectionHui Zhao 0002, Peng Su, Meikang Qiu. 290-299 [doi]
- Deep Learning Object DetectionJingnian Liu, Weihong Huang, Lijun Xiao, Yingzi Huo, Huixuan Xiong, Xiong Li, Weidong Xiao. 300-309 [doi]
- A Decision-Making Method for Blockchain Platforms Using Axiomatic DesignJun Liu 0044, Qi Zhang, Mingyue Xie, Ming-Peng Chen. 310-318 [doi]
- An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial NetworkYue Zhang, Keke Gai, Liehuang Zhu, Meikang Qiu. 319-328 [doi]
- Blockchain-Based Fairness-Enhanced Federated Learning Scheme Against Data Poisoning AttackShan Jin, Yong Li 0002, Xi Chen 0063, Ruxian Li, Zhibin Shen. 329-339 [doi]
- Cryptography of BlockchainYing Long, Yinyan Gong, Weihong Huang, Jiahong Cai, Nengxiang Xu, Kuan-Ching Li. 340-349 [doi]
- An Efficient Detection Model for Smart Contract Reentrancy VulnerabilitiesYuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu 0002, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen. 350-359 [doi]
- Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on CryptosystemAn Wang 0001, Shulin He, Congming Wei, Shaofei Sun, Yaoling Ding, Jiayao Wang. 360-370 [doi]
- Secure File Outsourcing Method Based on Consortium BlockchainXuan You, Changsong Zhou, Zeng Chen, Yu Gu, Rui Han, Guozi Sun. 371-380 [doi]
- Fabric Smart Contract Read-After-Write Risk Detection Method Based on Key Methods and Call ChainsFeixiang Ren, Sujuan Qin. 381-392 [doi]
- A Critical-Path-Based Vulnerability Detection Method for tx.origin Dependency of Smart ContractHui Zhao, JiaCheng Tan. 393-402 [doi]
- A Dynamic Taint Analysis-Based Smart Contract Testing ApproachHui Zhao, Xing Li, Keke Gai. 403-413 [doi]
- Construction Practice of Cloud Billing Message Based on Stream NativeXiaoli Huang, Andi Liu, Yizhong Liu, Li Li, Zhenglin Lv, Fan Wang. 414-427 [doi]
- A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain TechnologyJiasheng Cui, Li Duan, Mengchen Li, Wei Wang. 428-438 [doi]
- Research on Diabetes Disease Development Prediction Algorithm Based on Model FusionWenyu Shao, Xueyang Liu, Wenhui Hu, Xiankui Zhang, Xiaodong Zeng. 439-449 [doi]
- Smart-Contract Vulnerability Detection Method Based on Deep LearningZimu Hu, Wei-Tek Tsai, Li Zhang. 450-460 [doi]
- Automatic Smart Contract Generation with Knowledge Extraction and Unified Modeling LanguagePeiyun Ran, Mingsheng Liu, Jianwu Zheng, Md. Zakirul Alam Bhuiyan, Jianhua Li, Gang Li, Shiyuan Yu, Lifeng Wang, Song Tang, Peng Zhao. 461-474 [doi]
- Blockchain Scalability TechnologiesNengxiang Xu, Jiahong Cai, Yinyan Gong, Huan Zhang, Weihong Huang, Kuan-Ching Li. 475-484 [doi]
- Blockchain Applications in Smart City: A SurveyShuo Wang, Zhiqi Lei, Zijun Wang, Dongjue Wang, Mohan Wang, Gangqiang Yang, Keke Gai. 485-494 [doi]
- Topic-Aware Model for Early Cascade Population PredictionChunyan Tong, Zhanwei Xuan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Hao Sun. 495-504 [doi]
- GeoNet: Artificial Neural Network Based on Geometric NetworkXiangyang Cui, Zhou Yan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Qi Nie. 505-514 [doi]
- Research on Blockchain-Based Smart Contract TechnologyHongze Wang, Qinying Zhang. 515-524 [doi]
- Cross-Chain-Based Distributed Digital Identity: A SurveyTianxiu Xie, Hong Zhang, Yiwei Feng, Jing Qi, Chennan Guo, Gangqiang Yang, Keke Gai. 525-534 [doi]
- Research on Power Border Firewall Policy Import and Optimization ToolChen Zhang, Dong Mao, Lin Cui, Jiasai Sun, Fan Yang, Cong Cao. 535-545 [doi]
- Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability DetectionTao Li 0022, Haolong Wang, Yaozheng Fang, Zhaolong Jian, Zichun Wang, Xueshuo Xie. 546-557 [doi]
- Enhanced 4A Identity Authentication Center Based on Super SIM TechnologyRenjie Niu, Zixiao Jia, Yizhong Liu, Jianhong Lin, Xiaoli Huang, Min Sun. 558-569 [doi]
- Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUFJiayi Li, Xinsheng Lei, Jieyu Su, Hui Zhao, Zhenyu Guan, Dawei Li. 570-580 [doi]
- Architecture Search for Deep Neural NetworkXiangyu Gao, Meikang Qiu, Hui Zhao 0002. 581-596 [doi]
- Blockchain DevelopmentSiQi Xie, Jiahong Cai, Hangyu Zhu, Ce Yang, Lin Chen, Weidong Xiao. 597-606 [doi]
- Research on Blockchain-Based Food Safety Traceability TechnologyQinying Zhang, Hongze Wang. 607-616 [doi]
- Few-Shot Learning for Medical Numerical Understanding Based on Machine Reading ComprehensionXiaodong Zeng, Wenhui Hu, Xueyang Liu, Yuhang Chen, Wenyu Shao, Lizhuang Sun. 617-628 [doi]
- A Feature Extraction Algorithm Based on Blockchain Storage that Combines ORB Feature Points and Quadtree DivisionYawei Li, Yanli Liu, Heng Zhang, Neal Naixue Xiong. 629-638 [doi]
- Smart Contract Vulnerability Detection Model Based on Siamese NetworkWeijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu 0002, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen 0001. 639-648 [doi]
- Context-User Dependent Model for Cascade Retweeter PredictionChunyan Tong, Kai Zhang, Yang Song, Zhang Zheng, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Liu Yerui. 649-658 [doi]
- Heterogeneous System Data Storage and Retrieval Scheme Based on BlockchainNi Zhang, Baoquan Ma, Peng Wang, XuHua Lei, YeJian Cheng, Jiaxin Li, Xiaoyong Huai, Zhiwei Shen, Ningning Song, Long Wang. 659-668 [doi]
- Fbereum: A Novel Distributed Ledger Technology SystemDylan Yu, Ethan Yang, Alissa Shen, Dan E. Tamir, Naphtali Rishe. 669-684 [doi]
- Indistinguishable Obfuscated Encryption and Decryption Based on Transformer ModelPengyong Ding, Zian Jin, Yizhong Liu, Min Sun, Hong Liu, Li Li, Xin Zhang. 685-694 [doi]
- An Investigation of Blockchain-Based ShardingJiahong Xiao, Wei Liang 0005, Jiahong Cai, Hangyu Zhu, Xiong Li 0002, Songyou Xie. 695-704 [doi]