Abstract is missing.
- Efficient Online Path Selection and Workload Allocation for In-Network Computing in MECSheng Ouyang, Fanlong Zhang, Junyu Mai, Yuan Chai, Quan Chen, Yongchao Tao. 1-13 [doi]
- CO-LEACH: Cooperative Data Collection Protocol for Data-Heterogeneous WSNsXinyu Zhang, Gaojie Wu, Luwei Fu, Wenliang Mao, Zhiwei Zhao. 14-26 [doi]
- Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive DeclineYong Wang 0020, Yi Xiong, Tianyu Yang, Yiran Shen 0001. 27-38 [doi]
- Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge CloudsDongkuo Wu, Xueyi Wang, Xingwei Wang, Min Huang 0001, Zhitong Wang. 39-51 [doi]
- V2ICooper: Toward Vehicle-to-Infrastructure Cooperative Perception with Spatiotemporal Asynchronous FusionSheng Yi, Hao Zhang, Feiyu Jin, Yiyang Hu, Rongzhen Li, Kai Liu 0001. 52-64 [doi]
- Recommendation-Aware Collaborative Edge Caching Strategy in the Internet of VehiclesPingjie Ou, Ningjiang Chen, Zizhan Huang. 65-77 [doi]
- Towards Robust Internet of Vehicles Security: An Edge Node-Based Machine Learning Framework for Attack ClassificationLiehuang Zhu, Awais Bilal, Kashif Sharif, Fan Li 0001. 78-89 [doi]
- Device-Edge-Cloud Collaborative Video Stream Processing and Scheduling Strategy Based on Deep Reinforcement LearningNuanlai Wang, Shanchen Pang, Xiaofeng Ji, Haiyuan Gui, Xiao He 0012. 90-99 [doi]
- Consistent Low-Latency Scheduling for Microsecond-Scale Tasks in Data CentersQiuyu Yu, Tong Zhang, Changyan Yi. 100-113 [doi]
- Multi-scale Data Reconstruction Based Policy Optimization Algorithm for Skill LearningHaoke Zhang, Yiyong Huang, Wei Han, Dan Xiong, Chuanfu Zhang, Yanjie Yang. 114-125 [doi]
- Joint Optimization Design of Intelligence Reflecting Surface Assisted MU-MISO System Based on Deep Reinforcement LearningXiaoyu Wu, Anming Dong, Jiguo Yu, Sufang Li, Guijuan Wang, You Zhou 0006. 126-138 [doi]
- Secure Motion Verification for High Altitude Platforms with a Hybrid AOA-TDOA-FDOA SchemeYuanyuan Wang, Chi Zhang, Miao Pan. 139-150 [doi]
- Variational Autoencoder Based Automatic Clustering for Multivariate Time Series Anomaly DetectionLi Yan, Hailin Hu, Kun Yang, Gaozhou Wang, Ti Guan, Yanwei Zheng. 151-162 [doi]
- Deep Reinforcement Learning Based Economic Dispatch with Cost Constraint in Cyber Physical Energy SystemXue Chen, Chen Cui, Ning Wang, Zhaogong Zhang, Jinghong He, Xin Guan 0003. 163-175 [doi]
- InceptionNeXt Network with Relative Position Information for Microexpression RecognitionZhilong Cao, Anming Dong, Jiguo Yu, Sufang Li, Xiang Tian, Li Zhang. 176-185 [doi]
- AdMarks: Image Steganography Based on Adversarial PerturbationYe Ding, Mingyu Shao, Jie Wang, Qi Wan. 186-198 [doi]
- A Review on Binary Code Analysis DatasetsZhijian Huang, Shuguang Song, Han Liu, Hongyu Kuang, Jingjing Zhang, Pengfei Hu. 199-214 [doi]
- Low-Cost Robot Path Planning Mechanism for Escaping from Dead EndsNuanyu Cao. 215-227 [doi]
- Towards Communication-Efficient Collaborative Perception: Harnessing Channel-Spatial Attention and Knowledge DistillationFei Wang, Penglin Dai, Chuzhao Li, Zhangjie Meng, Kai Liu 0001. 228-240 [doi]
- Improving Anomaly Scene Recognition with Large Vision-Language ModelsCheng Liu, Xianlei Long, Yan Li, Chao Chen, Fuqiang Gu, Songyu Yuan, Chunlong Zhang. 241-252 [doi]
- ReSU-Net: State Space Model for 3D Abdominal Multi-organ SegmentationTianle Wang, Shan Chang. 253-265 [doi]
- Autocue : Targeted Textual Adversarial Attacks with Adversarial PromptsHe Zhu, Ce Li, Haitian Yang, Yan Wang 0081, Weiqing Huang. 266-278 [doi]
- Universal Sign Language Recognition System Using Gesture Description Generation and Large Language ModelKanchon Kanti Podder, Jian Zhang 0028, LingYan Wang. 279-289 [doi]
- A High-Precision Generality Method for Chinese Nested Named Entity RecognitionXiayan Ji, Lina Chen, Hong Gao 0001, Fangyao Shen, Hongjie Guo. 290-301 [doi]
- Tree of Thought Prompt in Robotic Arm ControlFan Liang, Lingqiang Ge. 302-313 [doi]