


default search action
26th CSCWD 2023: Rio de Janeiro, Brazil
- Weiming Shen, Jean-Paul A. Barthès, Junzhou Luo, Adriana S. Vivacqua, Daniel Schneider, Cheng Xie, Jinghui Zhang, Haibin Zhu, Kunkun Peng, Cláudia Lage Rebello da Motta:

26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023, Rio de Janeiro, Brazil, May 24-26, 2023. IEEE 2023, ISBN 979-8-3503-3168-4 - Bin Ning, Fang Liu, Zhixiong Liu:

Creativity Support in AI Co-creative Tools: Current Research, Challenges and Opportunities. 5-10 - Junkai Fei, Xiaojun Zhu, Ruyan Zhang:

Evaluation of TCP Variants on Dynamic UAV Networks. 11-16 - Qianqian Chang, Lin Xu, Lei Zhang:

Practical privacy-preserving mixing protocol for Bitcoin. 17-22 - Xianfeng Ye, Zhiyun Deng, Yanjun Shi, Weiming Shen:

An Agent-based System Architecture for Automated Guided Vehicles in Cloud-Edge Computing Environments. 23-28 - Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:

Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy. 29-34 - Bowen Guo, Qianmu Li, Xiao Liu:

Improving Adversarial Transferability with Heuristic Random Transformation. 35-40 - Hanqing Li, Niannian Chen:

Understanding Social Relations with Graph-Based and Global Attention. 41-46 - Leiqi Wang, Zijun Cheng, Qiujian Lv, Yan Wang, Shixiang Zhang, Weiqing Huang:

ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks. 47-52 - Luiz Fernando Puttow Southier

, Esther Maria Rojas Krugger, Cleiton dos Santos Garcia, Edson Emílio Scalabrin:
Process Mining and Root Cause Analysis for Detecting Inefficiencies in Business Processes: an Applied Case in a Brazilian Telecommunications Provider. 53-58 - Hao An, Dongsheng Chen, Weiyuan Xu, Zhihong Zhu, Yuexian Zou:

TLAG: An Informative Trigger and Label-Aware Knowledge Guided Model for Dialogue-based Relation Extraction. 59-64 - Yuanmeng Tian, Shuying Wang, Shen Xu, Qing Zheng:

Crowdsourcing Workers Recommendation Algorithm Based on Improved Deep Matrix Factorization. 65-70 - Jialu Zhang, Xingguo Jiang, Yan Sun, Hong Luo:

RS-TTS: A Novel Joint Entity and Relation Extraction Model. 71-76 - António Correia

, Dennis Paulino
, Hugo Paredes
, Diogo Guimarães
, Daniel Schneider, Benjamim Fonseca:
Investigating Author Research Relatedness through Crowdsourcing: A Replication Study on MTurk. 77-82 - Aimei Dong, Zhiyun Qi, Yi Zhai, Guohua Lv:

Multi-Source Domain Transfer Learning on Epilepsy Diagnosis. 83-88 - Yahui Lu, Yu Jiang:

Dirty page prediction by machine learning methods based on temporal and spatial locality. 89-94 - Yuyang Liu

, Junruo Gao, Zefang Zhao, Jun Li:
Complement Coupling Network for Multiple Activated Users Prediction in Social Cascade. 95-100 - Fuqing Zhao, Tao Jiang:

A Cooperative Two-stage Migrating Birds Optimization Algorithm Based on Quasi-Entropy. 101-106 - Bing Shi, Wenan Tan, Pengfei Yu:

Momentum Contrastive Learning for Sequential Recommendation. 107-112 - Fujia Zhou, Wei Zhang, Guangxu Zhu, Hang Li

, Qingjiang Shi:
CHA-Sens: An End-to-End Comprehensive Residual Convolution Framework for CSI-based Human Activity Sensing. 113-118 - Yangyan Xu, Fangfang Yuan

, Cong Cao
, Xiaoliang Zhang, Majing Su, Dakui Wang, Yanbing Liu
:
MetaBERT: Collaborative Meta-Learning for Accelerating BERT Inference. 119-124 - Bo Li, Wuwen Chen, Shicheng Jin, Yuhao Shi:

DVFS-based Energy-saving Workflow Offloading Strategy in Mobile Edge Computing Environments. 125-130 - Zhenyu Wang, Yanghui Li, Pengfei Fu:

An Automatic Configuration Memetic Algorithm with Reinforcement Learning Mechanism for Real-value Optimization Problems. 131-136 - Runhuan Chen, Hua Dai, Hui Li, Geng Yang, Haozhe Wu, Weihong Yang:

An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTM. 137-142 - Xiaolong Xu, Yihao Dong, Jian Song:

An Answer Summarization Scheme Based on Multilayer Attention Model. 143-148 - Herbert Salazar Dos Santos, Carlos Eduardo Barbosa, Yuri Oliveira de Lima, Alan De Oliveira Lyra, Matheus Margarido Argôlo, Jano Moreira de Souza

:
Crowdsourced Deals: the Crowd Using Itself to Find and Filter Deals. 149-154 - Pengfei Liu, Liang Xiao:

An Intelligent Human-Agent Interaction Support System in Medicine. 155-160 - Yuhao Zhao, Siguang Chen:

Dynamic Privacy-Enhanced Federated Learning Algorithm Based on Gradients Perturbation. 161-166 - Marcos Antonio de Almeida

, António Correia
, Jano Moreira de Souza
, Daniel Schneider:
Mapping Tokenomics Arrangements to Expand the Digital Nomad Ecosystem. 167-174 - Yongfei Liu, Hong Li, Wenyuan Zhang

, Fei Lv, Shuaizong Si:
Intrusion Detection Based on Sampling and Improved OVA Technique on Imbalanced Data. 175-180 - Caiyan Li, Lizhen Cui, Yonghui Xu, Ning Liu:

Logic Event Graph Enhanced Narrative Generation. 181-186 - Xigang Sun, Jingya Zhou, Zhen Wu

, Jie Wang:
Information Diffusion Prediction via Exploiting Cascade Relationship Diversity. 187-192 - Emilly Marques Da Silva, António Correia

, Claudio Miceli, Daniel Schneider:
Understanding the Support of IoT and Persuasive Technology for Smart Bin Design: A Scoping Review. 193-198 - Xue Lin, Yushui Geng, Jing Zhao, Daquan Cheng, Xuefeng Zhang, Hu Liang:

Multi-modal medical image classification method combining graph convolution neural networks. 199-206 - Zilong Zeng, Buqing Cao, Hongfan Ye, Dong Zhou, Mingdong Tang, Feng Xiao:

An Edge Server Co-deployment Method via Joint Optimization of Communication Delay and Load Balancing in Edge Collaborative Environment. 207-212 - Yixuan Ge, Qing Yu, Zuohua Wang:

SKRAG: Sampling on Knowledge Graph for Recommendation with Relational Path-aware Graph Neural Network. 213-218 - Guoqing Zhang, Hongbo Sun, Xin Liu, Lei Liu:

A Surface Defect Detection Method based on Information Entropy. 219-224 - Xiao-Min Hu, Jing-Hui Xu, Min Li, Ying Zeng, Yi Liu:

Optimization of Resource Allocation based on Swarm Intelligence for Multi-Objective Dynamic SEIV Models. 225-230 - Hanlin Liu

, Jiantao Zhou, Hua Li:
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest. 231-236 - Yingying Xue, Kun Huang, Hui Peng, Aibo Song, Kun Zhao, Jibin Sun:

A Multi-granularity Knowledge-enhanced Sequential Recommendation. 237-242 - Haibo Wang, Ding Ding, Yuhao Liu, Chi Wang:

IVRSandplay: An Immersive Virtual Reality Sandplay System Coupled with Hand Motion Capture and Eye Tracking. 243-248 - Zheng Luo, Xiaojie Lin, Wei Zhong, Encheng Feng:

Research on Coarse Granularity Data Sample Completion Method for District Heating System. 249-254 - Xiaobo Wei, Peng Li, Weiyi Huang

, Zhiyuan Liu, Qin Liu
:
Two-stage Vehicle Pair Dispatch in Multi-hop Ridesharing. 255-260 - Changyong Yu, Rong Hu, Bangjun Wang:

AKGIN: An API Knowledge Graph and Intent Network based Mashup-Oriented API Recommendation Method. 261-266 - Zuyang Ma, Kaihong Yan, Hongwei Wang:

BERT-based Question Answering using Knowledge Graph Embeddings in Nuclear Power Domain. 267-272 - Xiang Li, Renjie Huang, Guoqiang Xiao:

A Self-Attention Based Task-Adaptive Integration of Pre-trained Global and Local Classifiers for Few-Shot Classification. 273-278 - Chaokai Wu, Yansong Wang, Tao Jia:

Dynamic Link Prediction Using Graph Representation Learning with Enhanced Structure and Temporal Information. 279-284 - Xiaojing Ji, Peilin Yang, Qingbo Hao, Wenguang Zheng, Yingyuan Xiao:

Item Multi-Information Evolution Network for Click-Through Rate Prediction. 285-290 - Chenyang Zhang, Lu Liang:

Crowdsourcing Tasks Allocation based on Incentives via Group Multirole Assignment. 291-296 - Zhengyu Hou, Wuyungerile Li, Qinan Li, Bing Jia:

A Multi-path Routing Protocol based on Node Multiple Performances in Mobile Ad Hoc Networks. 297-302 - Caishan Weng, Zhiyang Shu, Zhengjia Xu, Jinghui Zhang, Junzhou Luo, Fang Dong, Peng Wang, Zhengang Wang:

FreezePipe: An Efficient Dynamic Pipeline Parallel Approach Based on Freezing Mechanism for Distributed DNN Training. 303-308 - Yang Jin, Hui Xu, Zhengbin Qin, Lang Huang:

Improved Wild Horse Optimizer with Cooperative Multi-Strategies for Network Intrusion Detection. 309-314 - Xiaoling Zeng, Zhaoyang Yang, Chuanbiao Wen:

Region Symmetry Mask for TCM-based Face Shape Classification. 315-319 - Haoqian Li, Jiayi Song, Wenguang Zheng, Yingyuan Xiao:

Scoring prediction model focusing on local feature interaction of text. 320-325 - Meimei Li, Yuhan Li, Nan Li, Zhongfeng Jin, Jiguo Liu

, Chao Liu:
Intrusion Detection Method for SCADA System Based on Spatio-Temporal Characteristics. 326-331 - Qingguo Zhou, Xiaorun Tang, Qingquan Lv, Ziyuan Li, Jun Shen

, Jinqiang Wang, Binbin Yong:
Ensemble Machine Learning Method for Photovoltaic Power Forecasting. 332-337 - Yan Wang, Chongwen Wang:

Analysis of Students' Seats Distribution Based on Single-channel Video. 338-334 - Caiyun Wu, Fazhi He, Bo Fan, Yaqian Liang:

Adaptive error-bounded simplification of Delaunay meshes with multi-objective optimization. 345-350 - Fuwei Li, Dianjie Lu, Baoxu An, Guijuan Zhang:

Risk Region-based Prediction Model for the Epidemic Spreading. 351-356 - Jiahui Liu, Lvqing Yang, Sien Chen, Wensheng Dong, Bo Yu, Qingkai Wang:

An Improved MOEA Based on Adaptive Adjustment Strategy for Optimizing Deep Model of RFID Indoor Positioning. 357-362 - Xiaohan Zhang

, Han Wang, Chenze Wang
, Qing Liu, Min Liu:
A Safe-Domain Generative Adversarial Network with Transformer for Noisy Imbalanced Fault Diagnosis. 363-368 - Yin Wu, Mingpei Cao, Yueze Zhang

, Yong Jiang:
Detecting Clickbait in Chinese Social Media by Prompt Learning. 369-374 - Junhua Zhang, Junzhou Luo, Haozhe Zhang, Qingfeng Yuan, Xiaolin Fang:

Embedded Platform Based Intelligent Lecture Recording System. 375-380 - Guangbin Bao, Bo Zhang, Ling Tang, Jinyuan Yang, Xiaolian Wu:

Research on the short-term electric load forecasting model based on the graph learning layer and timeseries convolutional network. 381-386 - Wanying Liang, Yong Tang, Jia Zhu:

Social Network Community Detection based on Inner-Community Information Diffusion Simulation Algorithm. 387-392 - Chen Yang

, Zou Lai, Yingchao Wang
, Shulin Lan, Lihui Wang
, Liehuang Zhu:
A Novel Bearing Fault Diagnosis Method based on Stacked Autoencoder and End-edge Collaboration. 393-398 - Xin Feng, Xingguo Jiang, Yan Sun, Hong Luo:

An Anomaly Detection Method for Multivariate Time Series Based on Cross Window. 399-404 - Juliana Câmara, Leonardo Pio Vasconcelos, Monica da Silva, Anderson Zudio, Daniela Trevisan, José Viterbo:

Using the Engagement by Design to Reflect on Recruiting and Selecting IT Professionals. 405-410 - Yunsong Xiang, Xuemei Yang, Yan Sun, Hong Luo:

A Fault-tolerant and Cost-efficient Workflow Scheduling Approach Based on Deep Reinforcement Learning for IT Operation and Maintenance. 411-416 - Jingqi Yang, Cheng Xie

, Peng Tang:
Discriminative Feature Focus via Masked Autoencoder for Zero-Shot Learning. 417-422 - Yuhua Yin

, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. 423-431 - Qun Ding, Xiaolong Xu, Wenming Gui:

Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs. 432-437 - Junnan Yin, Yuyan Sun, Lei Cui, Zhengyang Ai, Hongsong Zhu:

SynCPFL: Synthetic Distribution Aware Clustered Framework for Personalized Federated Learning. 438-443 - Xiuxian Li, Guiling Wang, Yongpeng Shi, Jian Yu

:
A Dynamic Binding Method for Situation-aware IoT Services Targeting Proactive BPM. 444-449 - Boao Xiao, Siyuan Wu

, Xin He, Wanchun Dou:
Generalized Image Embedding for Multi-Domain Image Retrieval. 450-455 - Wanqiu Huang, Hanrong Zhang, Peng Peng, Hongwei Wang:

Multi-gate Mixture-of-Expert Combined with Synthetic Minority Over-sampling Technique for Multimode Imbalanced Fault Diagnosis. 456-461 - Ramon Chaves

, Cláudia L. R. Motta, António Correia
, Jano de Souza
, Daniel Schneider:
Tensions in design and participation processes: An ethnographic approach to the design, building and evaluation of a collective intelligence model. 462-467 - Hua Ma, Wen Zhao, Zixu Jiang, Peiji Huang, Wensheng Tang, Hongyu Zhang:

A Multi-level Approach to Learning Early Warning based on Cognitive Diagnosis and Learning Behaviors Analysis. 468-473 - Jiaqi Chang, Zhujuan Ma, Binghao Cao, Erzhou Zhu:

VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism. 474-479 - Jiaying Chen, Xiaojie Lin, Wei Zhong, Yihui Mao, Liwei Ding:

Internet of Things in Smart Heating Systems: Critical Technologies Progress and Prospect. 480-485 - Wencong Geng, Guijuan Zhang, Dianjie Lu:

An Epidemic Model Based on Intra- and Inter-group Interactions. 486-491 - Haizhu Bao, Quanke Pan, Miao Rong, Aolei Yang, Xiaohua Wang:

A Multi-action Reinforcement Learning Algorithm for Energy-efficiency Blocking Flow-shop Scheduling Problem. 492-497 - Sheng Chen, Jinxi Li, Baochao Chen, Deke Guo, Keqiu Li:

vHSFC: Generic and Agile Verification of Service Function Chain with parallel VNFs. 498-503 - Fuqing Zhao, Qiaoyun Wang, Zesong Xu

:
Reinforcement Learning Driven Moth-flame Optimization Algorithm for Solving Numerical Optimization Problems. 504-509 - Qihui Zhou, Qianyun Ruan, Dongdong Huo, Penghui Lv, Yu Wang, Zhen Xu:

The malicious resource consumption detection in permissioned blockchain based on traffic analysis. 510-515 - Fanshu Gong, Lanju Kong, Yuxuan Lu, Jin Qian, Xinping Min:

An Overview of Blockchain Scalability for Storage. 516-521 - Xin Liu, Hongbo Sun, Guoqing Zhang, Lei Liu:

A Machine Vision-based Deep Learning Method in Hemodialysis Filter Defects Detection. 522-527 - Xiaotong Lei, Zhe Yang, Yunwei Huang, Jianyu Long, Chuan Li, Huiyu Huang:

Anomaly Detection of Rolling Element Bearings Based on Contrastive Representation. 528-532 - Yubo Shen, Wenduo Jiang, Yu Zheng, Ru Jia, Ru Li:

Research on False Comment Recognition Algorithm Integrating crazy fan base Subculture Phenomenon. 533-538 - Zhiheng Zhang, Guowei Wu, Kaiwen Ning:

Optimizing The Access Control System for IOTA Tangle: A Game-Theoretic Perspective. 539-544 - Yirong Wu, Wenjing He, Shuifa Sun, Tinglong Tang:

A Defect Detection Method Based on Parallel Multiple AutoEncoders. 545-551 - Han Sun, Yan Zhang, Zhen Xu, Runmei Zhang, Mingxuan Li:

MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption. 552-558 - Jun Li, Fengshi Zhang

, Yonghe Guo, Siyuan Li, Guanjun Wu, Dahui Li, Hongsong Zhu:
A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy. 559-564 - Ya Zhang, Xi Lin, Jun Wu, Bei Pei, Yunyun Han:

Blockchain-Assisted UAV Data Free-Boundary Spatial Querying and Authenticated Sharing. 565-570 - Yi Liu, Weiqing Huang, Siye Wang:

TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning. 571-576 - Xingze Guo, Feng Gao, Xiaojun Zheng, Shiduo Ning:

Multi-Agent Collaborative Behavior Decision-Making based on Deep Reinforcement Learning. 577-581 - Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu:

Simplified-Xception: A New Way to Speed Up Malicious Code Classification. 582-587 - Xiaolong Xu, Qun Ding, Licheng Lin:

Indoor Navigation Mechanism based on 5G network for Large Parking Garage. 588-593 - Xiaojiao Xie, Pengwei Zhan:

Improving the Quality of Textual Adversarial Examples with Dynamic N-gram Based Attack. 594-599 - Chengwu Tu, Shengjie Zhao, Hao Deng:

FedWNS: Data Distribution-Wise Node Selection in Federated Learning via Reinforcement Learning. 600-605 - Ruobing Wang, Daren Zha, Qingfei Zhao, Yuanye He, Xin Wang:

RW-MMDCG: Muti-modal via Rolling-Window Directed Graph Network for Conversational Emotion Recognition. 606-611 - Leping Li, Kun Ma, Benkuan Cui:

Multi-Information Filter Encoding Network for Multi-Label Text Classification. 612-617 - Shengzhe Zhang, Jiayu Ye, Qingxiang Wang

:
Spa-L Transformer: Sparse-self attention model of Long short-term memory positional encoding based on long text classification. 618-623 - Chaoyi Yan, Xinli Huang, Hongyan Gu, Siyuan Meng:

SimulE: A novel convolution-based model for knowledge graph embedding. 624-629 - Haikun Yu, Dacheng Jiang, Guipeng Zhang, Zhenguo Yang, Wenyin Liu:

A Reputation System based on Blockchain and Deep Learning in Social Networks. 630-635 - Zhenxuan Xu, Yunzhou Xie, Fang Dong, Shucun Fu, Jiangshan Hao:

Joint Optimization of Task Offloading and Resource Allocation for Edge Video Analytics. 636-641 - Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong:

The trip to WiFi indoor localization across a decade - A systematic review. 642-647 - Baowei Wang, Yi Yuan, Bin Li, Changyu Dai, Yufeng Wu, Weiqian Zheng:

QAIC: Quality-assured image crowdsourcing via blockchain and deep learning. 648-653 - Yuri Oliveira de Lima, Carlos Eduardo Barbosa, Alan De Oliveira Lyra, Herbert Salazar, Matheus Margarido Argôlo, Jano de Souza

:
Providing Patients with Actionable Medical Knowledge: mHealth Apps for Laypeople. 654-659 - Yuan Liu, Chenyu Li, Zhiqiang Zheng, Qingli Guo, Xiaorui Gong:

Reverse Engineering Workload Measure based on Function Classification. 660-665 - Yuntao Ma, Lihe Wang, Junzhou Luo, Xiaolin Fang:

A Trusted and Intelligent Service System for the Decoction of Traditional Chinese Medicine. 666-672 - Baoxu An, Guijuan Zhang, Fuwei Li, Nianyun Song

, Hong Liu, Dianjie Lu:
Deep reinforcement learning-based panic crowd evacuation simulation. 673-678 - Baijun Chen, Daheng Yin, Lifei Teng, Fang Dong:

HyperRTV: Neural-Enhanced Adaptive Real-Time Video Streaming Based on Terminal-Edge Collaboration. 679-684 - Chuanmiao Zhao, Guijuan Zhang, Lei Lv, Hong Liu, Dianjie Lu:

Spatial-temporal Consistency based Crowd Emotion Recognition. 685-690 - Tianshuo Yang, Haibin Zhu

:
New Employee Training Scheduling Using the E-CARGO Model. 691-696 - Mingxia Zhao, Adele Lu Jia:

Multi-View Heterogeneous Graph Attention Network. 697-702 - Feiyu Wang, Jian-Tao Zhou, Xu Guo:

BMDP: Blockchain-Based Multi-Cloud Storage Data Provenance. 703-708 - Qingxin Liu, Xiaojun Zhu, Chuanxin Zhou, Chao Dong:

Advanced Fast Recovery OLSR Protocol for UAV Swarms in the Presence of Topological Change. 709-714 - Fuqing Zhao, Zesong Xu

, Qiaoyun Wang:
A Population-based Iterated Greedy Algorithm for Distributed No-wait Flow-shop Scheduling Problem. 715-720 - Maíra Marques, Roc Meseguer, Sergio F. Ochoa, Luis Silvestre

:
Coordination and Awareness Mechanisms to Support Collaboration in Project-based Software Engineering Courses. 721-726 - Yi Gao, Fangfang Yuan

, Cong Cao
, Majing Su, Dakui Wang, Yanbing Liu
:
Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning. 727-732 - Yueyao Chen, Beilun Wang, Yan Zhang, Jingyu Kuang:

A Robust Framework for Fixing The Vulnerability of Compressed Distributed Learning. 733-738 - Shiyu Wu, Meiqiao Pan, Yanyan Fan, Shenglin Li, Libo Zhang:

Group Role Assignment with a Training Plan Considering the Duration in Adaptive Collaboration. 739-744 - Pengfei He, Linlin Liu, Dianlong You, Limin Shen, Zhen Chen

:
BAT: Mining Binary-API Topic for Multi-service Application Development. 745-750 - Fuqing Zhao, Yuebao Liu, Tianpeng Xu

:
Iterative Greedy Selection Hyper-heuristic with Linear Population Size Reduction. 751-755 - Xinwei Yang, Ning Chen, Songwei Zhang, Xiaobo Zhou, Lejun Zhang, Tie Qiu:

An Evolutionary Reinforcement Learning Scheme for IoT Robustness. 756-761 - Ning Zhang, Tianyue Qiu, Liuliu Du-Ikonen

, Xiaojie Lin, Qichao Ye, Jiaying Chen:
Smart Energy Platform for Large-space Stadium Construction Based on Internet of Things. 762-765 - Shaorong Cao, Yuanyuan Mao, Mingyang Li, Weidong Xie, Chaochao Gao:

Bi-population Cooperative Moth-flame Optimization Algorithm for the Networking Mode Optimization. 766-771 - Zhen Liu, Meiju Yu, Ru Li:

A Fake Message and Malicious Node Detection Method Using Machine Learning in V-NDN. 772-777 - Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang:

Computation of Mobile Phone Collaborative Embedded Devices for Object Detection Task. 778-783 - Yufeng Fu, Xiangge Li, Ce Shang, Hong Luo, Yan Sun:

ZoIE: A Zero-Shot Open Information Extraction Model Based on Language Model. 784-789 - Xiaotong Wu, Wenan Tan:

A Novel of Proactive Caching Policy for Privacy-Preserving Using Federated Learning and Lottery Hypothesis in Edge Computing. 790-795 - Yuan Tang, Xu Zhang, Rui Wang, Jinfeng Xu, Long Hu, Yixue Hao:

Crowd Intelligent Grouping Collaboration Evacuation via Multi-agent Reinforcement Learning. 796-801 - Jian Zhou, Guodao Zhang, Liting Dai, Guangjie Zhou, Ruyu Liu

:
LiDAR Point Cloud Classification with Coordinate Attention Blueprint Separation Involution Neural Network. 802-807 - Huiyang Chang, Binbin Li, Guangjun Wu, Haiping Wang, Yu Ding, Siyu Jia, Zisen Qi, Xiaohua Jiang:

UCWSC: A unified cross-modal weakly supervised classification ensemble framework. 808-813 - Bingxu Wang, Gang Xiong, Gaopeng Gou, Jiaying Song, Zhen Li, Qingya Yang:

Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning Method. 814-819 - Ji Zheng, Ding Ding, Yuang Zhang, Zidu Cheng, Zhuying Li:

VRNavigSS: A Two-dimensionality Virtual Reality System for Depression Level Detection. 820-824 - Benyu Li, Jing Yang, Yuxiang Wang, Xiao Huang, Junshuai Ren, Liming Wang:

A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control. 825-830 - Yuqi Wang, Gaofeng Zhang, Yanhe Fu, Gang Xu, Fengqi Wei, Kun Yan:

AD-AC Opportunistic Routing Algorithm Based on Context Information of Nodes in Opportunistic Networks. 831-836 - Ji Zhang, Peng Li, Weiyi Huang, Lei Nie, Haizhou Bao

, Qin Liu
:
On Privacy-Preserving Task Assignment for Heterogeneous Users in Mobile Crowdsensing. 837-842 - Yanpeng Qi, Chen Pang, Yiliang Liu, Hong Liu, Lei Lyu:

Graph Convolutional Network with Long Time Memory for Skeleton-based Action Recognition. 843-848 - Ngoc Luyên Lê, Marie-Hélène Abel, Philippe Gouspillou:

A Constraint-based Recommender System via RDF Knowledge Graphs. 849-854 - Larissa Silva, Marcos Calazans, Leonardo Pio Vasconcelos, Raissa Barcellos, Daniela Trevisan, José Viterbo:

Smart Cities in Focus: A Bicycle Transport Applications Analysis. 855-860 - Gang Wang, Xiao Lv, Kerong Ben, Liangzhong Cui:

A Particle Swarm Optimization Algorithm Based on Experience Pool for Multi-UAV Cooperative Reconnaissance Task Allocation. 861-866 - Zhao Li, Jiangchao Chen, Xiaoqing Ma, Meijie Du, Zhongyi Zhang, Qingyun Liu:

A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network. 867-872 - Xiaoyuan Zhang, Bing Tang, Qing Yang, Wei Xu, Feiyan Guo:

Cost-Optimized Microservice Deployment for IoT Application in Cloud-Edge Collaborative Environment. 873-878 - Wenxu Han, Qi Li, Meiju Yu, Ru Li:

Research on Medical Data Storage and Secure Sharing Scheme Based on Blockchain. 879-884 - Jinbin Tu, Qing Li, Yun Wang:

T-Sorokin: A General Mobility Model in Opportunistic Networks. 885-890 - Heng Wang, Guijuan Zhang, Hong Liu, Dianjie Lu:

Singular Value Decomposition Based Pedestrian Trajectory Prediction. 891-896 - Haopeng Wang, Wei Wu:

Attention based Dual Stream Modality-aware model for Visible-Infrared Person Re-identification. 897-902 - Tianshu Fu, Guanqun Liu, Xin Wang, Daren Zha, Jiahui Shen:

RZSR Randomly Initialized Zero-Shot Method for Blind Super-Resolution. 903-908 - Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang:

Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain. 909-916 - Yafeng Song, Ming Yang, Qi Chen, Xiaodan Gu, Yixuan Yao:

Evaluating the Distinguishability of Tor Traffic over Censorship Circumvention Tools. 917-922 - Marina De Lara

, Edson José Rodrigues Justino, Edson Emílio Scalabrin:
Dynamic Generation of Immersive CAVE Environments: Using Digital Game Mechanisms. 923-928 - Aojia Lv, Chaokun Zhang, Shen He:

EMAR: Edge-Assisted Multi-User Mobile Augmented Reality. 929-934 - Tiantian Wang, Lei Liu, Hongbo Sun, Jia Hu:

UAV Enabled Sustainable IoT Network with OTPDRL. 935-940 - Yaoyi Deng, Mingxuan Li, Hailong Zhang, Dongdong Huo, Yanqiu Zhang, Shuai Yun, Yu Wang, Zhen Xu:

Building Efficient Parallel Endorsement Node on Blockchain Systems. 941-946 - Weihao Huang, Chaoyang Lin, Qiucun Yan, Lu Xiang, Zhiyu Zhang, Guozhu Meng, Kai Chen:

FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization. 947-952 - Kaihong Yan, Haoran Tang, Jian Zhang, Peng Peng, Hongwei Wang:

A Novel Encoder-Decoder Architecture for Table Border Segmentation of Scanned Documents. 953-958 - Lifu Wang, Kai Dong, Xiaodan Gu, Zhen Ling, Ming Yang:

Lightweight Gesture Based Trigger-Action Programming for Home Internet-of-Things. 959-964 - Xingang Wang, Xiaoyu Liu, Xiaomin Li, Jinan Cui:

Multi-granularity Text Representation and Transformer-Based Fusion Method for Visual Question Answering. 965-971 - Wenjing Cai, Ziyuan Zhu, Yuxin Liu, Yusha Zhang, Xu Cheng:

Detecting and Mitigating Cache Side Channel Threats on Intel SGX. 972-977 - Donglin Ma, QingQing Chen, Feng-Lin Cao, BoChang He:

An Aspect Level Sentiment Analysis Method for Graph Convolutional Networks based on Improved Dependencies. 978-983 - Chuang Zhang

, Geng Sun, Jiahui Li, Xiaoya Zheng:
Bi-objective Optimization for UAV Swarm-enabled Relay Communications via Collaborative Beamforming. 984-989 - Haozhe Wu, Hua Dai, Weihong Yang, Guineng Zheng, Meng Lu, Xiaofei Ji:

HSFV-based Action Recognition Using Recurrent Neural Networks. 990-995 - Xiangyu Niu, Lanju Kong, Fuqi Jin, Xiaolin Song, Xinping Min, Qingzhong Li:

NFT Cross-Chain Transfer Method Under the Notary Group Scheme. 996-1001 - Chao He, Yingshan Shen, Nan Zhong, Dongqing Song, Huijuan Hu, Dingju Zhu, Lihua Cai:

Multimodal Sentiment Analysis Based on Multiple Stacked Attention Mechanisms. 1002-1007 - Ygor Rolim, Danielly Alves, Flávia Clemente, Daniel de Oliveira:

NewsCollab: Fostering Data-driven Journalism with Crowdsourcing. 1008-1013 - Zijun Cheng, Rujie Dai, Leiqi Wang, Ziyang Yu, Qiujian Lv, Yan Wang, Degang Sun:

GHunter: A Fast Subgraph Matching Method for Threat Hunting. 1014-1019 - Lei Sun, Xiaolong Xu:

SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks. 1025-1030 - Yixiang Zhao, Zhou Zhou, Jiang Guo, Wei Yang, Shu Li, Qingyun Liu:

DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet Traffic. 1031-1036 - Hong Qiu, Heng Jin, Renfang Wang, Xiufeng Liu

, Guang Gao:
Tensor Nuclear Norm Based Matrix Regression Based Projections for Feature Extraction of Hyperspectral Images. 1037-1042 - Huan Jiang, Zihao Wang, Rongrong Li, Yuwei Peng, Zhiyong Peng, Bin Xu:

CAT: A Collaborative Annotation Tool for Chinese Genealogy Textual Documents. 1043-1048 - Ziqi Xiong, Haibin Zhu

, Dongning Liu, Jianhui Xian:
Industrial Chain Data Evaluation in Automobile Parts Procurement via Group Multirole Assignment. 1049-1054 - Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Xianjin Huang:

SPYRAPTOR: A Stream-based Smart Query System for Real-Time Threat Hunting within Enterprise. 1055-1062 - Boyu Li, Bin Wu:

Online Robust Bin Packing for Resource Allocation in Cloud Computing. 1063-1068 - Ting Zhang

, Soung-Yue Liew, Xiaotong Li:
Computer Supported Cooperative Work (CSCW) for Business Intelligence Platform in Guangxi Sugar Industry. 1069-1073 - Wanqing Wu, Xin Yang, Ruohe Lei:

A Trust-Delivery Collaborative Recommendation Method Based on Local Differential Privacy. 1074-1079 - Hanghua Zhang, Lubin Lin, Guipeng Zhang, Zhenguo Yang, Wenyin Liu:

ATIPM: A Blockchain-Based Anonymous and Traceable Intellectual Property Management Scheme. 1080-1085 - Mengying Xu, Hanjiang Lai

, Jian Yin:
CLIP-HASH: A Lightweight Hashing Network for Cross-Modal Retrieval. 1086-1091 - Gang Xu, Xinyu Hao, Zhihan Qi, Baoqi Huang:

Node Importance Algorithm of Opportunistic Network Based on Social Properties of Nodes. 1092-1097 - Xinyan Li, Yujia Zhu, Xiaoou Zhang, Zhen Jie, Qingyun Liu:

SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph. 1098-1105 - Yuzhang Wu, Beilun Wang:

A Framework Using Absolute Compression Hard-Threshold for Improving The Robustness of Federated Learning Model. 1106-1111 - Qingya Yang, Peipei Fu, Junzheng Shi, Bingxu Wang, Zhen Li, Gang Xiong:

Multi-Feature Fusion Based Approach for Classifying Encrypted Mobile Application Traffic. 1112-1117 - Ling Zhang, Rongnan Luo, XiaoJie Mei, Wenchao Jiang:

A Collaborative Learning Method based on Cross-domain Representation Correlation Congruence Distillation. 1118-1123 - Ming Tao, Xueqiang Li, Renping Xie, Kai Ding:

Pedestrian Identification and Tracking within Adaptive Collaboration Edge Computing. 1124-1129 - Xiao-Min Hu, Yi-Qian Zhao, Zhuo Yang:

Nodes Grouping Genetic Algorithm for Influence Maximization in Multiplex Social Networks. 1130-1135 - Min Feng, Meiju Yu, Ru Li:

Multi-feature content popularity prediction algorithm based on GRU-Attention in V-NDN. 1136-1141 - Jiawei Huang, Aimin Wang, Geng Sun, Jiahui Li:

Jamming-aided Maritime Physical Layer Encrypted Dual-UAVs Communications Exploiting Collaborative Beamforming. 1142-1147 - Siqi Liu, Fang Dong:

MIA-FedDL: A Membership Inference Attack against Federated Distillation Learning. 1148-1153 - Di Chen, Xin-Yi Li, Ang Li, Yu-Bin Yang:

Representation-Based Time Series Label Propagation for Active Learning. 1154-1159 - Xijun Zhang, Jin Su, Hong Zhang, Xianli Zhang, Xuan Chen, Yong Cui:

Traffic accident location study based on AD-DBSCAN Algorithm with Adaptive Parameters. 1160-1165 - Tianrui Wang, Weina Niu, Kangyi Ding, Lingfeng Yao, Pengsen Cheng, Xiaosong Zhang:

Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization. 1166-1171 - Rui Huang, Huan Lu, Yan Xing, Wei Fan:

Multi-scale Convolutional Feature Approximation for Defocus Blur Detection. 1172-1177 - Chundong Wang, Yue Li:

A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion. 1178-1183 - Jiayu Zhang, Guiling Wang, Yongpeng Shi, Xin Zheng

, Jian Yu
:
Spatial-Temporal Aware Business Event Forecasting for Proactive Services from IoT Sensory Data. 1184-1189 - Zhang Zhu, Ping Sun:

Multi-Agent Collaborative Trajectory Prediction with Hierarchical Vectorized Representation. 1190-1195 - Qingya Yang, Chang Liu, Peipei Fu, Bingxu Wang, Gaopeng Gou, Gang Xiong:

A Recurrent Self-learning Labeler for Building Network Traffic Ground Truth. 1196-1201 - Hugo Guércio, Victor Ströele

, José Maria N. David, Regina Braga:
A Process to Analyze Software Ecosystem Social Dimension Through a Collaboration Perspective. 1202-1207 - Jiahao Hu, Mingpei Cao, Xizhe Zhang, Xiong Zhang, Yuesheng Zhu:

Temporal Weighted Heterogeneous Multigraph Embedding for Ethereum Phishing Scams Detection. 1208-1213 - Beibei Cheng, Yiming Zhu, Yuxuan Chen, Xiaodan Gu, Kai Dong:

Privacy Protection Based on Packet Filtering for Home Internet-of-Things. 1214-1219 - Jihong Liu, Neng Gao, Chenyang Tu, Yifei Zhang, Yongjuan Sun:

A Pure Hardware Design and Implementation on FPGA of WireGuard-based VPN Gateway. 1220-1225 - Diandian Guo

, Majing Su, Cong Cao
, Fangfang Yuan
, Xiaoliang Zhang, Yanbing Liu
, Jianhui Fu:
Curvature-Driven Knowledge Graph Embedding for Link Prediction. 1226-1231 - Bingchan Li, Bo Mao:

Similarity Calculation of 3D Building Model based on EMD of Graph Features. 1232-1237 - Jiaqi Liu, Kaiyu Huang, Lunchen Xie

:
HeteFed: Heterogeneous Federated Learning with Privacy-Preserving Binary Low-Rank Matrix Decomposition Method. 1238-1244 - Fanshuo Meng, Peng Li, Weibei Fan, Hongjun Zhang, Zhuangzhuang Xue, Haitao Cheng:

BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition. 1245-1250 - Hong Zhao, Liyi Han, Weijie Wang:

Detection of COVID-19-related Malicious Domain Names Based on Feature Fusion. 1251-1256 - Qingxin Liu, Qi Qi

, Ni Li:
Federated Opposite Learning Based Arithmetic Optimization Algorithm for Image Segmentation Using Multilevel Thresholding. 1257-1262 - Donglin Liang, Longfei Ma, Hongna Lou, Liangjie Yu, Yanjun Shi:

An Adaptive Algorithm to Offload Task for User's QoE in Vehicular Edge System. 1263-1268 - Chenghan Li, Mingchen Li, Hanzhen Lu, Jiabao Pan, Bo Qin, Hongwei Wang:

A Computational Framework for Effective Representation and Extraction of Knowledge Graph for Power Plant Maintenance and Overhaul. 1269-1274 - Pengfei Song, Luoyu Mei

, Han Cheng:
Human Semantic Segmentation using Millimeter-Wave Radar Sparse Point Clouds. 1275-1280 - Mei Yu, Zhaoyuan Ding, Jian Yu, Wenbin Zhang, Ming Yang, Mankun Zhao:

Graph Contrastive Learning with Adaptive Augmentation for Knowledge Concept Recommendation. 1281-1286 - Tiyong Liu, Shiwei Cheng

:
A Recommender Algorithm Based on Knowledge Graph Convolutional Network and Knowledge Reasoning Optimization. 1287-1292 - Dennis Paulino

, António Correia
, Diogo Guimarães
, Ramon Chaves
, Glaucia Melo, Daniel Schneider, João Barroso, Hugo Paredes
:
Stigmergy in Crowdsourcing and Task Fingerprinting: Study on Behavioral Traces of Weather Experts in Interaction Logs. 1293-1299 - Fengyuan Shi, Zhou Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao:

AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks. 1300-1305 - Xiao Jing

, Zhiang Wu, Dejun Mu:
Electrical Fault Diagnosis via Text Mining: A Weakly-Supervised Learning Model. 1306-1311 - Shuangjiang He

, Huijuan Zhao, Li Yu:
The Avatar Facial Expression Reenactment Method in the Metaverse based on Overall-Local Optical-Flow Estimation and Illumination Difference. 1312-1317 - Shicheng Xu, Xiaolong Xu:

ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems. 1318-1323 - Weisheng Li, Wentao Chen, Zhihong Pan

, Yuanfei Deng, Yong Tang, Chaobo He:
Network Embedding with Enhanced Feature Representations for Link Prediction. 1324-1329 - José Orete do Nascimento, Ana Cristina Bicharra Garcia

, Sean Wolfgand Matsui Siqueira:
Collaborative Elaboration of Design Fiction Narratives with Participatory Design Fiction Extend. 1330-1335 - Enchao Zhang, Weidong Liu, Shi Liu, Yan Cao:

Research on patent recommendation method based on graph neural network. 1336-1341 - Xi Song, Mingyang Li, Weidong Xie, Yuanyuan Mao:

A Reinforcement Learning-driven Iterated Greedy Algorithm for Traveling Salesman Problem. 1342-1347 - Yazeed AlZahrani

, Jun Shen
, Jun Yan
:
Energy-Efficient Data Consistency based Sampling Rate Optimization and Aggregation Method for IoT. 1348-1353 - Fernanda Henriques, Melina Souza, Leonardo Pio Vasconcelos, Magaywer Moreira de Paiva, Elaine Seixas, Daniela Trevisan, José Viterbo:

The Use of Design Thinking for Reflection in Recruitment and Selection of IT Professionals. 1354-1359 - Shourong Jiao, Dianjie Lu, Chuanhua Jia, Hong Liu, Guijuan Zhang:

Abnormal Crowd Behavior Detection Based on the Fusion of Macro and Micro Features. 1360-1365 - Shusmoy Chowdhury, Ajay Katangur

:
Optimal Datacenter Selection for Cloud Services Using Swarm Intelligence. 1366-1371 - Xiao-Min Hu, Gang-Qi Wang, Min Li, Zi-Liang Chen:

A Signal Control Algorithm of Urban Intersections based on Traffic Flow Prediction. 1372-1377 - Xingyu Liu, Junwei Cheng, Hao Cheng, Chaobo He, Qimai Chen, Quanlong Guan:

Self-supervised community detection in multiplex networks with graph convolutional autoencoder. 1378-1383 - Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li:

DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation. 1384-1389 - Yinning Shao

, Yukai Zhao, Hang Yu, Min Liu, Yunlong Ma:
Graph Pooling based Human Detection Method for Industrial Application. 1390-1395 - Hongwei Wu, Rong Yang, Huang Qing, Kedong Liu, Zhuojun Jiang, Yangxi Li, Hong Zhang:

TSFN: an Effective Time Series Anomaly Detection Approach via Transformer-based Self-feedback Network. 1396-1401 - Yanhui Chen, Yun Feng, Chengchun Wang, Jianjun Zhao, Qixu Liu:

DeepCall: A Fast and Robust Malware Classification System with DGCNN and Function Call Graph. 1402-1408 - Jing Li, Jufeng Sun, Fengyong Li, Xingkai Yang, Yuwei Wang:

BIFLC: A Blockchain and IPFS-Based Multi-Consensus Federated Learning Framework. 1409-1414 - Dong Liu, Can Wang, Weidong Zhang, Xuangou Wu:

Matrix of Fused Features-based Approach for Tor Application Classification. 1415-1420 - Kang Chenri, Peng Li, Weiyi Huang, Lei Nie, Haizhou Bao

, Qin Liu
:
Quality-Oriented Task Assignment for Heterogeneous Users in Mobile Crowdsensing. 1421-1426 - Yanhao Feng, Xiaojie Lin

, Zitao Yu:
Internet of Things in Power Systems: A Bibliometric Analysis. 1427-1432 - Zhen Liu, Meiju Yu, Ru Li:

Blockchain-based Trust Management Mechanism in V-NDN. 1433-1438 - Jinchen Huo, Weidong Liu, Yang Li, Yan Cao:

Exploring Patent Transformation Event: Forecasting Patent Transfer Time. 1439-1445 - Vitor Queiroz de Campos, José Maria N. David, Victor Ströele

, Regina Braga, Alessandreia M. Oliveira:
DevFinder: An approach to finding expert software developers considering desired technologies and industry domains. 1446-1451 - Shichen Tian, Zhiyun Deng, Jiaxin Fan, Chunjiang Zhang, Weiming Shen, Liang Gao:

A Variable Neighborhood Search Algorithm for Heat Pipe-Constrained Component Layout Optimization. 1452-1457 - Bo Li, Zisu Na, Rongrong Qian, Hongwei Ding:

QoS and Fuzzy Logic Based Communication Handover Strategy in 5G Cellular Internet of Vehicles. 1458-1463 - Chunmian Wang, Junzhou Luo, Zhen Ling, Ming Yang, Xiaodan Gu, Yu Yao:

TorDNS: A Novel Correlated Onion Address Generation Approach and Application. 1464-1469 - Xizhe Zhang, Xiong Zhang, Jiahao Hu, Yuesheng Zhu:

A New Targeted Online Password Guessing Algorithm Based on Old Password. 1470-1475 - Luyao Xu, Cheng Xie

, Yuran Dong:
A Normalizing Flow-based Unsupervised Anomaly Detection Approach. 1476-1483 - Xu Ru, Chenghao Zhang, Heng Zhang:

A Method of Hybrid Fabric and Inertial Sensor for Human Posture Perception. 1484-1489 - Rongchuang Lv, Niansheng Chen, Songlin Cheng

, Guangyu Fan, Lei Rao, Xiaoyong Song, Dingyu Yang:
ASKCC-DCNN-CTC: A Multi-Core Two Dimensional Causal Convolution Fusion Network with Attention Mechanism for End-to-End Speech Recognition. 1490-1495 - Wei Li, Shiyu Zhu, Li Li:

Leveraging Knowledge-Aware Method for Charge Prediction. 1496-1501 - Jifan Shen, Yuling Sun:

Privacy-Preserved Video Monitoring Method with 3D Human Pose Estimation. 1502-1507 - Xinze Yu, Yunzhou Xie, Qiujie Xu, Zhuqing Xu, Runqun Xiong:

Secure Data Sharing for Cross-domain Industrial IoT Based on Consortium Blockchain. 1508-1513 - Xiong Zhang, Zhenyu Weng, Xizhe Zhang, Jiahao Hu, Yuesheng Zhu:

Zero-Shot Offline Handwritten Chinese Character Recognition with Graph Embedding. 1514-1519 - Yuejia Wu, Jiantao Zhou:

A Graph Sequence Generator and Multi-head Self-attention Mechanism based Knowledge Graph Reasoning Architecture. 1520-1525 - Dapeng Wang, Haobo Qiu, Liang Gao:

A Subdomain Uncertainty-Guided Kriging Method with Subset Simulation for Reliability Estimation. 1526-1531 - Jia Peng, Neng Gao, Yifei Zhang, Min Li:

A Multi-view Knowledge Graph Embedding Model Considering Structure and Semantics. 1532-1537 - Chenxing Gao, Lingjun Chen, Caidan Zhao, Xiangyu Huang, Zhiqiang Wu:

Lightweight Image Dehazing Algorithm Based on Detail Feature Enhancement. 1538-1543 - Meng Luo, Liling Xin, Yepeng Yao, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi:

Who Are Querying For Me? Egress Measurement For Open DNS Resolvers. 1544-1550 - Chen Yang, Can Wang, Weidong Zhang, Huiyi Zhang, Xuangou Wu:

Decentralized Application Identification via Burst Feature Aggregation. 1551-1556 - Wei Cai, Chengshang Hou, Chang Liu, Gaopeng Gou, Gang Xiong

, Zhen Li:
PTC: Prompt-based Continual Encrypted Traffic Classification. 1557-1562 - Xinyu Liu, Xiaolong Xu:

MDPFL: A Multiple Differential Privacy Protection Method based on Federated Learning. 1563-1568 - Fábio Luiz D. Morais, Ana Cristina Bicharra Garcia

, Paulo Sérgio Medeiros dos Santos, Luiz Alberto Pereira Afonso Ribeiro:
Do Explainable AI techniques effectively explain their rationale? A case study from the domain expert's perspective. 1569-1574 - Wanchuan Jiang, Ling Ou:

Weakly Supervised Object Detection with Pyramid Squeeze Attention and Candidate Box Screening Algorithm. 1575-1580 - Meijie Du, Minchao Xu, Kedong Liu, Weitao Tang

, Lijuan Zheng, Qingyun Liu:
Long-Short Terms Frequency: A Method for Encrypted Video Streaming Identification. 1581-1588 - Ru Wang, Peipei Wang, Lin Li, Peiyu Liu:

Community Detection with Graph Convolutional Auto-Encoder and Deep Clustering. 1589-1594 - Renfang Wang, Zijian Yang, Hong Qiu, Xiufeng Liu

, Dun Wu:
Spatial and Channel Exchange based on EfficientNet for Detecting Changes of Remote Sensing Images. 1595-1600 - Yuxin Chen, Yue Hong, Caie Wang:

An improved Priority-Based Level Algorithm for just-in-time scheduling. 1601-1606 - Yanxuan Wei, Yunxia Wang, Mingsen Du, Yupeng Hu, Cun Ji

:
Adaptive Shapelet Selection for Time Series Classification. 1607-1612 - ShuYang Zuo, Xiaolin Chai, Hong Luo, Yan Sun:

ZAlert: A Real Time Prediction Framework For Network Alert. 1613-1618 - Luiz Fernando Puttow Southier

, Sheila Cristiana De Freitas, Adriano Pizzini
, Eduardo Alves Portela Santos
, Edson Emílio Scalabrin:
Systematic Mapping Review on Log Preparation for Process Mining. 1619-1624 - Wangbing Cheng, MinFeng Zhang, Fang Dong, Shucun Fu:

Accelerate Multi-view Inference with End-edge Collaborative Computing. 1625-1631 - Shen He, Chaokun Zhang, Aojia Lv, Jingshun Du, Wenyu Qu:

Multi-Modal Deep Reinforcement Learning for Edge-Assisted Video Analytics. 1632-1637 - Zhang Liu, Liang Xiao, Jianxia Chen, Lili Song, Peng Qi, Zefang Tong:

A Multimodal Knowledge Graph for Medical Decision Making Centred Around Personal Values. 1638-1643 - Fei Han, Yao Zhang, Meng Zhao:

Defending Poisoning Attacks in Federated Learning via Loss Value Normal Distribution. 1644-1649 - Yanjun Dong, Haoyuan Hu, Min Zhu, Pan Hu, Lihong Jiang, Hongming Cai:

Intelligent Manufacturing Collaboration Platform for 3D Curved Plates Based on Graph Matching. 1650-1655 - Senyue Zhang, Ling Xue, Weiliang Huang, Lu Zhao, Ke Li:

Single Application Service Deployment in the Edge Environment Based on the E-CARGO Model. 1656-1661 - Wen Jiang, Yanping Wang, Yang Li, Yun Lin, Wenjie Shen:

An Intelligent Anti-jamming Decision-making Method Based on Deep Reinforcement Learning for Cognitive Radar. 1662-1666 - Han Yue, Rucen Wang, Yi Gao, Ailing Xia, Jianhua Zhang:

DSP-Based Industrial Defect Detection for Intelligent Manufacturing. 1667-1672 - Ri Wang, Chen Li, Ruibang You:

Continuous User Trust Assessment Based on Emphasized Contextual Differentiation Behavior Analysis. 1673-1678 - Chao Zhao

, Weiming Shen:
An Application-oriented Perspective of Domain Generalization for Cross-Domain Fault Diagnosis. 1679-1684 - Shifeng Xu, Yijing Zhou, Xiaoyang Yu, Cuiting Huang, Chao Wu:

TFSF: Topological and Feature Space Fusion with Spatio-Temporal Modeling for Crop Yield Prediction. 1685-1690 - Hao Zhou, Bingchan Li, Bo Mao:

An Improved LSTM based Method for User Behavior Classification in VR Scenes. 1691-1696 - Jianbang Ju, Yingyuan Xiao, Peilin Yang, Wenguang Zheng:

MRIN: Fine-grained Feature Interaction based on Multiple Feature Relationships for CTR Prediction. 1697-1702 - Yanfei Lu, Suzhen Cao, Qizhi He, Zixuan Fang, Junjian Yan, Yi Guo:

Group Signature Authentication Scheme with Credit Evaluation Mechanism in VANET. 1703-1709 - Tianyang Cai

, Yuqi Li, Tao Jia, Leo Yu Zhang, Zheng Yang:
Catch Me If You Can: A New Low-Rate DDoS Attack Strategy Disguised by Feint. 1710-1715 - Yang Wang, Jiayan Xiang, Hangyu Cheng, Wanjun Chen, Yong Xiao, Guosheng Kang:

Towards Dynamic Evolutionary Analysis of ProgrammableWeb for API-Mashup Ecosystem. 1716-1721 - Mateus Gonçalo do Nascimento, José Maria N. David, Mário Antônio Ribeiro Dantas, Regina Maria Maciel Braga Villela, Victor Ströele de Andrade Menezes

, Fernando Antonio Basile Colugnati:
An Architecture to Support the Development of Collaborative Systems in IoT Context. 1722-1727 - Junruo Gao, Yuyang Liu

, Zhaojuan Yue, Haibo Wu, Jun Li:
Robust Preference Learning for Recommender Systems under Purchase Behavior Shifts. 1728-1733 - Yin Xie, Yigui Luo, Haihong She, Zhaohong Xiang:

Neural Network Model Pruning without Additional Computation and Structure Requirements. 1734-1740 - Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:

Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN. 1741-1747 - Yueyao Chen, Beilun Wang, Tianyi Ma

, Cheng Chen:
Applying Robust Gradient Difference Compression to Federated Learning. 1748-1753 - He Xiao, Yuling Sun:

"Policies Look for the Elderly": A Knowledge Graph Based Care Information Recommendation System. 1754-1759 - Weihong Yang, Hua Dai, Haozhe Wu, Geng Yang, Meng Lu, Guineng Zheng:

A Human Pose Similarity Calculation Method Based on Partition Weighted OKS Model. 1760-1765 - Jing Tian, Juan Chen, Ningjiang Chen, Lin Bai, Suqun Huang:

Knowledge Distillation with Source-free Unsupervised Domain Adaptation for BERT Model Compression. 1766-1771 - Xiang Cao, Ningjiang Chen, Xuemei Yuan, Yifei Liu:

A Cooperative Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning. 1772-1777 - Feng Gao, Xingze Guo, Xiaojun Zheng, Shiduo Ning:

Research on AGV Path Planning of Simultaneous Pickup and Delivery with Time Window. 1778-1782 - Tian Hu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Wei Ma, Yu Chen, Weiyu Liu:

Implementation of a Cost-Effective Privacy Leakage Detection System for Hosted Programs. 1783-1788 - Qi Li, Wenxu Han, Lin Zhao, Meiju Yu, Ru Li, Ru Jia:

Information Dissemination Model Based on Blockchain Social Network. 1789-1795 - Haoxiang Zhang, Wenchao Bai, Jingyi Ding, Jiahui Jin:

Time-Aware POI Recommendation Based on Multi-Grained Location Grouping. 1796-1801 - Yibo Xie

, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui:
Covertness Analysis of Snowflake Proxy Request. 1802-1807 - Zixuan Ma, Yuqi Zhang, Ruibang You, Chen Li:

Who Gets in the Way of Parallelism? Analysis and Optimization of the Parallel Processing Bottleneck of SDN Flow Rules in ONOS. 1808-1813 - Xiaorui Guo, Liang Xiao:

The Design of a Multi-Agent Protocol for Swarm Decision Making. 1814-1819 - Yubo Wang

, Xiaolong Xu:
An Industrial Internet of Things-oriented Malicious Traffic Detection Network with Neural Network Partial Architecture Search. 1820-1825 - Yingmeng Gao, Jie Zhu, Haiping Huang, Chen Chen:

Latency-aware Partial Task Offloading in Collaborative Edge Computing. 1826-1831 - Xing'e Yan, Chang Liu, Hanyu Luo, Jiuxin Cao:

Group Popularity Prediction in EBSN based on an Improved Self-Excited Hawkes Process. 1832-1837 - Hongna Lou, Chaoying Li, Donglin Liang, Meng Yang, Yanjun Shi:

A Rule-based Ramp Merging Algorithm for Multilane Highway in CAV Environments. 1838-1842 - Yinghao Wu, Yaoguang Wei, Dong An, Jincun Liu:

A Hybrid Control Strategy based on Neural Network and PID for Underwater Robot Hovering. 1843-1848 - Xiaofei Xing, Zimeng Wang, Xiaoli Chen, Yunxuan Zeng, Siqi He:

Flower Image Identification and Feature Extracting Method Based on Transfer Learning. 1849-1854 - Zhigang Xu, Duoyue Liao, Xinhua Dong, Hongmu Han, Zhongzhen Yan, Kangze Ye:

LMQF: Hyperledger Fabric Concurrent Transaction Conflict Solution Based on Distributed Lock and Message Queue. 1855-1860 - Yu Zhao, Wei Wu, Yue Guo:

Cross-Modal Fusing Vision-Language Network for Referring Image Segmentation. 1861-1866 - Qin Qin, Chao Tan, Chong Li, Genlin Ji:

Privileged Label Enhancement with Adaptive Graph. 1867-1872 - Xiaochen Zhang

, Jun Shen
, Jun Yan
:
Adult Learners' Online Engagement and Perceived Outcomes with Educational Key Opinion Leaders: a Two-Phase Study. 1873-1877 - Ziqing Ye, Haibin Zhu

, Dongning Liu, Jianhui Xian:
Outsourced Products Task Allocation via Group Multirole Assignment with Considering Variance. 1878-1883 - Pan Yao, He Wang, Chao Zheng, Jing Yang, Liming Wang:

Efficient Federated Learning Aggregation Protocol Using Approximate Homomorphic Encryption. 1884-1889 - Xu Sun, Weiyu Zhang

, Xinchao Guo, Wenpeng Lu:
Unsupervised Graph Neural Network with Self-Expressive Attention for Community Detection. 1890-1895 - Gewangzi Du, Liwei Chen, Tongshuai Wu, Xiong Zheng, Ningning Cui, Gang Shi:

Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation. 1896-1901 - Chen Chen, Jie Zhu, Haiping Huang, Yingmeng Gao:

Energy-Constrained Task Scheduling in Heterogeneous Distributed Systems. 1902-1907 - Chenguang Zhu, Tongshuai Wu, Ningning Cui, Xiong Zheng, Liwei Chen, Gang Shi:

Code Property Graph based Vulnerability Type Identification with Fusion Representation. 1908-1913 - Chaofei Li, Ziyuan Zhu, Ruicheng Niu, Tao Leng, Dan Meng:

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling. 1914-1919 - Leandro Ouriques

, Carlos Eduardo Barbosa, Geraldo Xexéo:
Understanding Military Collaboration in Wargames. 1920-1925 - Jiayan Xiang, Wanjun Chen, Yang Wang, Bowen Liang, Zihao Liu, Guosheng Kang:

Interactive Web API Recommendation for Mashup Development based on Light Neural Graph Collaborative Filtering. 1926-1931 - Kai Chen, Xiangmao Chang, Jun Zhan, Yanchao Zhao:

Measurement and Optimization of Repetition Scheme in NB-IoT Uplink. 1932-1937 - Yuqi Li, Zirui Gong, Yihang Zhou, Yuting He, Renjie Huang:

Production Evaluation of Citrus Fruits based on the YOLOv5 compressed by Knowledge Distillation. 1938-1943 - Ana Paula Pimentel, Cláudia L. R. Motta, António Correia

, Daniel Schneider:
Agenda of Solutions to Mitigate the Challenge of Polarization of Extreme Positions in Social Media Environments. 1944-1949 - Jiaxin Fan, Chunjiang Zhang, Weiming Shen:

A Matheuristic-based Rescheduling Method for Flexible Job Shops with Lot-streaming and Machine Reconfigurations. 1950-1955

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














