Stop the war!
Остановите войну!
for scientists:
default search action
CNCIT 2023: Qinghai, China
- Proceedings of the 2nd International Conference on Networks, Communications and Information Technology, CNCIT 2023, Qinghai, China, June 16-18, 2023. ACM 2023
- Jie Liu, Mingjie Song:
Research on Amplitude and Travel Time Image Decentralization Correction in Ultrasonic Imaging Logging. 1-5 - Hao Yang, Shuning Wei, Zhi Wang, Jing Wang:
A vulnerability detection method based on sparse value flow graphs. 6-10 - Ping Li, Bang Huang, Wen-Qin Wang:
Target detection for MIMO Radar based on reduced-dimension data without training data. 11-16 - Youhui Wang:
Low signal-to-noise ratio RDSS signal frequency offset estimation algorithm based on GWO-CNN. 17-23 - Shangsheng Gao, Li Gao, Qi Li, Jianjun Xu:
Application of large language model in intelligent Q&A of digital government. 24-27 - Mai Ye, Shiming Men, Lei Xie, Bing Chen:
Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoder. 28-34 - Xixing Li, Qiang Wei, Zehui Wu, Wei Guo:
A comprehensive survey of vulnerability detection method towards Linux-based IoT devices. 35-41 - Yi Liu, Lin Peng, Peng Zhang, Yanlong Qiu, Sen Zhang, Xiaowei Guo, Canqun Yang:
The Optimization of Multi-physics Application Simulated by Lattice Boltzmann Method Based on Domestic Processors. 42-47 - Yue Yang, Xu Xu, Hongye Liu:
Robust Adaptive Beamforming Based on Steering Vector Estimation and Combined with Sample Covariance Matrix. 48-52 - Weiru Qi:
Wisdom Tourism System Design in Shaanxi Province of China on Network Technology. 53-58 - Wenxiu Zhang, Shan Jing, Chuan Zhao:
A Survey of SDN Data Plane Attacks and Defense Strategies. 59-65 - Tai Guo, Haihong Zhan, Xingde Su, Tao Wang:
Anti-intermittent Sampling Jamming Method Based on Random PRI and Intra-pulse Frequency Diversity Radar Waveform. 66-72 - Jinyao Liu, Xiangyu Bai, Zhaoran Wang:
A review of irrigation monitoring based on Internet of Things, remote sensing and artificial intelligence. 73-77 - Jia Wang, Ziyuan Lu:
A controllable IPv6 address generation based on conditional variational autoencoder. 78-81 - Qianran Wang, Jinhua Wang, Chengbin Huang:
The Optimization of IPSec VPN in 5G Mobile Communication Network. 82-86 - Mingchu Li, Dexin Xia, Wenteng Zhang:
Dynamic Offloading Task for Internet of Things Based on Meta Supervised Learning. 87-92 - Yuzhe Li, Bo Li:
Solving the Performance Issues of Epsilon Estimation Method in Differentially Private ERM: Analysis, Solution and Evaluation. 93-99 - Tianyou Qiu, Yiping Li, Xisheng Feng:
DORM: Distance-based opportunistic routing and medium access protocol for multi-AUV monitoring system. 100-104 - Kun Lu, Quan Zhou, Mingchu Li:
Computation Offloading in E-RAN via Deep Reinforcement Learning. 105-109 - Yi Xie:
Fast Lane Detection Based on Row Anchor Classification. 110-115 - Xiaoda Xie, Songlei Jian, Chenlin Huang:
LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning. 116-121 - Yuanzhi He, Huajin Chen, Changxu Wang, Yuan Li, Zhenyu Niu:
Challenges and Developments of Routing Techniques for Dense LEO Constellations. 122-126 - Xiaowei Zhao, Lian Zhang, Mingchu Li:
Context-Aware Edge Caching Strategy Based On Mobility Prediction. 127-132 - Xiaowei Zhao, Yuanyuan Zhang, Mingchu Li:
Task Migration Optimization Algorithm in Mobile Edge Computing. 133-137 - Zixiang Zhou, Mingchu Li:
Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave. 138-142 - Jiawei Liu:
Location Excitation Network for Multi-modal 3D Object Detection. 143-149 - Ming Zhu, Yiyang Zhou, Xiangyang Feng:
Reputation-based consensus mechanism for digital order transaction alliance chain. 150-154 - Yikun Sun:
Joint Message Passing: Solving Heterogeneous Graphs Challenges in Few-Shot Object Detection. 155-160 - Yukun Zhai:
Semantic Queries with Transformer for Referring Image Segmentation. 161-167 - Xiaohui Luo:
Multi-Label Classification for Postoperative Complication Prediction. 168-171 - Linfeng Dai:
A study on the application of graph neural network in code clone detection: Improving the performance of code clone detection through graph neural networks and attention mechanisms. 172-176 - Jiang Liu, Hongbo Lu, Yiyou Yuan, Haomin Gu, Kejun Xie, Dong Li, Chencheng Luo, Gang Wu, Yueming Song:
Intelligent Operation and Maintenance Schedule System Based on Knowledge Graph: Construction and Applications. 177-181 - Xue-Song Wang, Mao-Bin Hu:
Study on the effect of dynamic self-protection on epidemic spreading. 182-185 - Yuman Wang, Wenhui Wang, Xiaoxue Bai, Bo Hu, Guangkai Ge, Kexiang Qian:
RRDD: An ATT&CK-based ICS Network Security Risk Assessment Method. 186-192 - Meng-Yu Li, Yuan-Hao Xu, Shuai Huang, Mao-Bin Hu:
The effect of simplicial awareness dissemination on epidemic reaction-diffusion. 193-195 - Shaofeng Li, Tingyu Wang, Bo Wan:
A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-time. 196-200 - Jingyu Hao:
A Blockchain-based Performance Monitoring Scheme for Cloud Applications. 201-207 - Shengjie Zhou:
LSTM-GATs: Wind field prediction based on graph attention deep neural network. 208-212 - Mengxi Zhang, Guangxiang Jin, Jiangsheng Li, Min Liu, Xiao Zhang, Yufei Shi, Qi Wei:
OSU-based power communication network service bearer and slice control mechanism. 213-218 - Ziheng Huang, Bolin Chen, Yiting Zhao:
Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention Mechanism. 219-225 - Song Wei Ge:
Acoustic Propagation Research And Simulation Based On Bellhop. 226-234 - Tai Yue, Pengfei Wang, Lei Zhou, Xu Zhou, Gen Zhang, Kai Lu, Huijun Wu:
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting. 235-240 - Ni Zhang, Wei Dong, Zehong Xia, Zhi Feng, Zhicheng Li:
Analysis on Technique for Code Obfuscation. 241-245
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.