


default search action
DSA 2022: Wulumuqi, China
- 9th International Conference on Dependable Systems and Their Applications, DSA 2022, Wulumuqi, China, August 4-5, 2022. IEEE 2022, ISBN 978-1-6654-8877-8

- Yuan Zhao, Haojie Tang, Quanjun Zhang, Sining Liu, Jin Wang, Jia Liu:

Test Case Classification via Few-Shot Learning. 1-11 - Yuteng Lu, Kaicheng Shao, Weidi Sun, Meng Sun:

RGChaser: A RL-guided Fuzz and Mutation Testing Framework for Deep Learning Systems. 12-23 - Lizhi Cai, Jin Wang, Mingang Chen, Jilong Wang:

Reinforcement Learning Application Testing Method based on Multi-attribute Fusion. 24-33 - Huan Zhang, Yuan Zhao, Shengcheng Yu, Zhenyu Chen:

Automated Quality Assessment for Crowdsourced Test Reports Based on Dependency Parsing. 34-41 - Quanjun Zhang, Xu Zhai, Shicheng Xu, Wanmin Huang, Jingui Zhang, Yaoming Fan:

Interactive Patch Filtering via Test Generation. 42-53 - Mingwei Tang, Zhiwei Xu, Yuhao Qin, Cui Su, Yi Zhu, Feifei Tao, Junhua Ding:

A Quantitative Study of Impact of Incentive to Quality of Software Reviews. 54-63 - Haochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng:

Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity Analysis. 64-72 - Weihua Zhang, Lijin Wu, Zhaowei Xu, Yang Jian:

Construction Method of Equipment Software Defect Knowledge Base. 73-80 - Xueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu:

Software Reliability Evaluation System of Ship Information Management System. 81-85 - Junfeng Nie, Xingiun Chen:

Modeling and Solution of Spatio-temporal Collaborative Planning in Joint Operations based on Temporal Constraint Network. 82-87 - Renyan Jiang, Xiaowei Zhu, Wei Xue, Rangda Wu, Yu Cao:

A Novel Method to Estimate Mean Lifetime with Censoring in the Context of Reliability Improvement with Design of Experiments. 86-93 - Xiaochen Li, Ruilian Zhao, Ying Shang:

EFSM Model Construction Method for RTL Digital Circuit. 94-105 - Wan Zhou, Yong Wang, Yang Qu, Li Li:

Automating App Review Classification based on Extended Semantic. 106-115 - Wang Lin, Mi Ding, Kaipeng Lin, Guoquan Mei, Zuohua Ding:

Formal Synthesis of Neural Craig Interpolant via Counterexample Guided Deep Learning. 116-125 - Jing Yan Wang, Lin Qi, Yu Han:

Modulation Recognition based on Complex Binarized Neural Network. 126-132 - Haonan Zhang, Jinbo Wang, Lu Kong, Panpan Xue, Zhaohui Yao

:
Design of a Convolutional Neural Network Accelerator based on PYNQ. 133-138 - Wei Zhu, Rongling Zhou:

Employee Portrait Construction based on Deep Neural Networks. 139-142 - Xingguang Zhu, Jiajun Chang, Weikang Li, Bin Yu, Liang Zhao, Xiaobing Wang:

Driver Violation Prediction based on Neural Network. 143-152 - Yaqing Shi, Song Huang, Jinyong Wan:

A Reuse-oriented Clustering Method for Test Cases. 153-162 - Ledio Jahaj

, Franz Wotawa
:
Testing Photometric Stereo Applications. 163-171 - Jie Hong, Jie Zhang, Qi Qiu, Angang Ma, Meng Li, Shiyu Yan, Helin Gong

:
A Metamorphic Relation Identification Method based on GEP. 172-177 - Yue Ma, Ya Pan, Yong Fan:

Metamorphic Testing of Classification Program for the COVID-19 Intelligent Diagnosis. 178-183 - Xuejian Li, Jun-Yi Wang:

Construction of Inductive Property Predicates for Mutable Data Structures. 185-191 - Yujie Wang, Zhi Deng, Kai Tao, Tao Liu, Xianglin Bao, Bin Cheng:

Intelligent Urban Street Lighting System based on IoT Cloud Platform. 192-197 - Mian Wang, Jinlong Sun, Zhiyi Lu, Yu Wang

, Yifan Zhang, Jie Zhang, Zhe Zhang, Guan Gui:
A General Dataset Generator for Industrial Internet of Things Using Multi-sensor Information Fusion. 198-202 - Emil Lobachev, Mahmoud Nabil Mahmoud

, Ahmad Patooghy:
Blockchain-based Smart Supply Chain Management. 203-208 - Xiaohan Ma, Zhenyu Na:

Energy Efficiency Optimization for Massive MIMO Enabled UAV Communications. 209-214 - Minnan Zhang, Jingdong Jia:

Feature Envy Detection with Deep Learning and Snapshot Ensemble. 215-223 - Lanping Zhang, Jie Yin, Jinhui Ning, Yu Wang

, Bamidele Adebisi
, Jie Yang:
A Novel Unsupervised Malware Detection Method based on Adversarial Auto-encoder and Deep Clustering. 224-229 - Xiaoyi Hu, Jinhui Ning, Jie Yin, Jie Yang, Bamidele Adebisi

, Haris Gacanin:
Efficient Malicious Traffic Classification Methods based on Semi-supervised Learning. 230-235 - Zhiyu Liu, Meishu Luo, Baoying Ma:

Network Intrusion Detection based on RBF Neural Networks and Fuzzy Cluster. 236-240 - Yaling Zhao, Hongbo Du, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang:

Weld Image Recognition based on Deep Learning. 241-248 - Zisen Zhou, Zhongxi Lu, Matthew Guzdial, Fabrício Góes:

Creativity Evaluation Method for Procedural Content Generated Game Items via Machine Learning. 249-253 - Chiyang Gao, Wenbing Luo, Fei Xie:

An Ontology-based Knowledge Base System for Military Software Testing. 254-261 - Xiaoting Zhong, Nan Zhang, Zhenhua Duan:

An Approach for Automatically Generating Traces for Python Programs. 262-268 - Moe Nandi Aung, Yati Phyo

, Canh Minh Do, Kazuhiro Ogata:
A Tool for Model Checking Eventual Model Checking in a Stratified Way. 270-279 - Liang Zhao, Leping Wu, Yu Gao, Xiaobing Wang, Bin Yu:

Formal Modeling and Verification of Convolutional Neural Networks based on MSVL. 280-289 - Dongcheng Li, W. Eric Wong, Shenglong Li, Matthew Chau:

Improving Search-based Test Case Generation with Local Search using Adaptive Simulated Annealing and Dynamic Symbolic Execution. 290-301 - Yiang Gong, Minyan Lu, Shiyi Kong, Liang Yan:

Software Failure Prediction based on Thermal Images. 302-309 - Lijin Tang, Chuanqi Tao, Hongjing Guo, Jingxuan Zhang:

Software Defect Prediction via GCN based on Structural and Context Information. 310-319 - Hongning Miao, Shaoying Liu:

Automatic Localization of Potential Faults for Java Runtime Exceptions. 320-329 - Shengcheng Yu, Wanmin Huang, Jingui Zhang, Haitao Zheng:

Automatic Bug Inference via Deep Image Understanding. 330-334 - Zhihua Chen, Xiaolin Ju, Guilong Lu, Xiang Chen:

Blocking Bugs Identification via Binary Relevance and Logistic Regression Analysis. 335-345 - Furong Zhang, Xiaopan Zhang

:
Cooperative Area Coverage Path Planning for Multiple UAVs Over Large Areas. 346-352 - Hongquan Shi, Bin He, Jia Liang, Yihua Zang:

Modeling Technology of Naval Formation Area Antiaircraft Kill Web based on Event Graph. 353-359 - Lili Fan, Gui-Fu Lu, Ganyi Tang, Yong Wang:

Kernel Subspace Clustering based on Block Diagonal Representation and Sparse Constraints. 360-367 - Pan Liu, Yihao Li, Shili Ai, Cong Luo, Chengjian Yang:

An Improved Dijkstra-based Algorithm for Resource Constrained Shortest Path. 368-373 - Shiyu Yan, Xiaohua Yang, Zhongjian Lu, Meng Li, Helin Gong

, Jie Liu:
Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic Relations. 374-382 - Chiyang Gao, Wenbing Luo, Jian Wang, Yingying Zhang:

Software Quality Evaluation Model based on Multiple Linear Regression and Fuzzy Comprehensive Evaluation Method. 383-389 - Aleem Khalid Alvi, Mohammad Zulkernine:

Security Pattern Detection Through Diagonally Distributed Matrix Matching. 390-402 - Hongwei Tao:

Software Trustworthiness Evaluation Method based on Relationships Between Criteria. 403-408 - Jinglu Xu, Giovanni Russello:

Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future Directions. 409-420 - Han-Lin Lu, Guan Ming Lin, Shih-Kun Huang:

Guan-fuzz: Argument Selection With Mean Shift Clustering for Multi-argument Fuzzing. 421-430 - Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao

:
Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores. 431-436 - Lin Liu, Zheng Zeng, Yufeng Long, Hongji Yang:

Revisiting Hazard Analysis Requirements. 437-445 - Yidan Wang

, Xuge Li:
FastTransLog: A Log-based Anomaly Detection Method based on Fastformer. 446-453 - Xiaohu Xu, Yifei Liang, Xixi Zhang, Yu Wang

, Yun Lin, Bamidele Adebisi
, Haris Gacanin, Guan Gui:
Self-evolving Malware Detection for Cyber Security using Network Traffic and Incremental Learning. 454-463 - Kaixin Chang, Nailiang Zhao, Liang Kou:

A Survey on Malware Detection based on API Calls. 464-471 - Zhen Zhao, Jingchao Li, Bo Deng, Yulong Ying:

Bearing Fault Diagnosis based on Fixed Threshold Wavelet Transform and ELM. 472-479 - Weicong Jin, Weizhi Liu, Wenxuan Zhang, Xia Fang:

A Bearing Fault Diagnosis Method based on Improved LSTM-cascade CatBoost. 480-485 - Jiahui Tao, Zhenyu Na, Ningtao Zhang:

Time-varying Graph Model for LEO Satellite Network Routing. 486-491 - Hanting Zhao, Jing Zhang, Xueqing Li, Zhen An, Lanmin Chen, Xiqiao Pang:

Application of Software Cost Measurement in the Construction of Ship Information Management System. 492-497 - Hubin Yang, Jiaming Zhang, Ruochen Shao, Yucong Chen, Rui Zhou, Qingguo Zhou:

RJMM: Real-time Enhancement for Jailhouse Hypervisor on Multi-Core Platforms via Memory Isolation. 498-502 - Jiayuan Wei, Xingyu Miao, Kehong Xu, Rui Liu, Yongqi Ge:

An Energy-efficient Scheduling based on Q-learning for Energy Harvesting Embedded System. 503-509 - Siyuan Gao, Chang Liu, Anze Cheng, Xu Jiao:

Distributed Sleep Monitoring System with Mobile Terminal. 510-517 - Xiaopeng Xu, Xiaochun Zhang, Hongji Yang:

A Probability Parameter Estimation Tool in C++. 518-523 - Lijin Wu, Yaming Zhang, Zehua Shen, Yang Jian, Longli Tang:

Trustworthy Protection Technology for Industrial Internet. 524-530 - Zili Wu, Jun Ai, Minyan Lu, Jie Wang, Liang Yan:

The Correlation between Training Set Perturbations and Robustness for CNN Models. 531-539 - Junshan Xue, Yu Jiang:

Autonomous Evaluation Method of Unmanned Equipment based on OODA-I Framework. 540-545 - Jun Zhao, QingGuo Yan, Qinwei Dong, Xianguang Zha, Jun Wu, ZeJia He, Xindong Zhao, Xiaowen Zhang:

Speech Instruction Recognition Method based on Stacking Ensemble Learning. 546-553 - Chunyan Xia, Yifan Huang, Song Huang, Changyou Zheng, Yutong Wang, Yu Wang:

Prioritization Method of Test Data for Intelligent Software based on Multi-objective Optimization. 554-561 - Hao Yang, Cheng Peng, Ruirui Sun, Yujun Zhou, Xiaobo Cui:

Student Expression Recognition in Smart Education Environment based on Convolutional Neural Network. 562-568 - Zhiwei Zhang, Haifeng Xu, Aidong Fang, Lin Cui, Xiaoyin Wu, Yang Bai:

Towards Exploring the Engineering Education Certification on Data Science and Big data Technology Specialty: A Case Study of Suzhou University in China. 569-575 - Hongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen:

Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention. 576-580 - Yingjie Cao, Azragul Yusup:

Chinese Electronic Medical Record Named Entity Recognition based on BERT-WWM-IDCNN-CRF. 582-589 - Ronghua Jiang, Zhandong Liu, Ke Li, Lu Liang:

Dual-branch Attention Detection Network for Scene Text Detection. 590-596 - Weize Shang, Jia Song, Shaojie Ai, Kai Zhao:

Fault Diagnosis and Location of Quadrotor UAV Actuator based on ESO-DF. 597-604 - Yuting Yang, Rui Wang, Youchen Wang, Xu Miao, Bing Liu, Shan Jiang:

Simulink Model Static Analysis Results based on Abstract Interpretation. 605-614 - Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao

, Saihua Cai:
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy. 615-623 - Zhonghao Pan, Shan Zhou, Jianmin Wang, Jinbo Wang, Jiao Jia, Yang Feng:

Test Case Prioritization for Deep Neural Networks. 624-628 - Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang:

Software Operation Simulation Method based On Complex Network Game. 629-635 - PengQi Wang, Yuan Shi, Lingzhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu:

A UAV Cooperative Formation Capability Evaluation Method. 636-643 - Xiang Bi, Hui Gao, He Chen, PengQi Wang, Chenghao Ma:

Evaluating the Robustness of Object Detection in Autonomous Driving System. 645-649 - He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma:

Generating Autonomous Driving Test Scenarios based on OpenSCENARIO. 650-658 - Yikang Shao, Wu Liu, Jun Ai, Chunhui Yang:

A Quantitative Measurement Method of Code Quality Evaluation Indicators based on Data Mining. 659-669 - Xiaobo Cui, Cheng Peng, Hao Yang:

Intelligent Mineral Identification and Classification based on Vision Transformer. 670-676 - Wei Han, Cheng Peng:

A Dual-channel Text Classification Model based on an Interactive Attention Mechanism. 677-684 - Rong Tang, Gui-Fu Lu:

Constrained Multilinear Multi-view Subspace Representation Learning for Clustering based on Tensor Nuclear Norm. 685-691 - Jiakang Tang, Lin Cui, Zhenggao Pan, Chengfang Tan, Shanshan Li, Weijie Wang:

Face Image Recognition Algorithm based on Singular Value Decomposition. 693-697 - Pengxu Wang, Haijun Zhang:

Speech Separation based on As3-2mix Hybrid Strategy Combined Training Convolutional Time Domain Neural Network. 698-704 - Jian Kong, Xuehan Zhong, Mingli Ding:

Local Matrix Stack Graph Convolutional Networks for Classification. 705-709 - Lian Liu, Zimeng Wang:

Multi-Agents Interaction Approach based on Graph Network and Reinforcement Learning. 710-715 - Wei Cui, Ziwei Wang, Huilin Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen:

Multi-scale Graph Aggregation based Ship Target Recognition. 716-722 - Fan Xu, Xia Liu, Yanli Cui, Mingdie Yan, Zhongyuan Lai:

Comparison of Image Feature Detection Algorithms. 723-731 - Zheng Tang, Xiaopan Zhang

:
Task Scheduling for Warship Formation Air Defense. 732-737 - Guang Yang, PengQi Wang, Yuan Shi, Qian Dong, Weiyu Liu:

A High Precision Annotation Method for Vision Simulation Data of Autonomous Vehicle. 738-745 - Rui Li, Feifan Dai, Lingzhong Meng, Qian Dong:

Autonomous Evaluation of Unmanned Vehicles: A Survey. 746-753 - Hongping Ren, Hui Gao, He Chen, Guangzhen Liu:

A Survey of Autonomous Driving Scenarios and Scenario Databases. 754-762 - Yunxiu Chen, Qian Dong, Guangzhen Liu, Hongping Ren, Yunzhi Xue:

Automatic Driving Scene Sampling Method Based On Key Parameter Identification. 763-771 - Xinyue Wu, Hong Zhang, Tao Shi, Congran Zhang, Liang Yan:

Intelligent Software Testing based on Visual Feedback. 772-779 - Rui Cheng, Haijun Zhang:

Improved Deep Bi-directional Transformer Keyword Extraction based on Semantic Understanding of News. 780-785 - Youren Chen

, Yang Li, Ming Wen:
Chinese Psychological QA Database and its Research Problems. 786-792 - Yi Zhu, Xiaoying Chen, Yu Zhao:

Space-time Constraint Resources Modeling and Safety Verification Method for Automated Vehicles. 793-802 - Shu Feng, Yi Zhu, Mei Song, Yuxiang Gao:

Analysis and Verification of Bisimulation Relationship for Learning Time-Behavior Sequence. 803-812 - Wansheng Yang, Chi Hu, Siyou Ma:

A Software Failure Mode Analysis Method Based on Test Knowledge Graph. 813-819 - Liang Zhou, Dongwei Yu, Hua Li:

WebGIS-based Catering Industry Entrepreneurial Decision-making System. 820-826 - Mingwei Shi, Junfeng Nie:

Improvement of Path Planning Algorithm based on Small Step Artificial Potential Field Method. 827-831 - Mengjie Shan, Xiaopan Zhang

:
Multi-UAV Path Planning Model with Multiple Battery Recharge Points. 832-837 - Ziyang Weng, Shuhao Wang, Weixin Yan, Guangwei Zhang:

The Tessi Clergy Algorithm Inspired by Potential Gaming Behavior in the Hunt for Geo-data. 844-852 - Mingxing Zhang, Shihai Wang, Weiguo Qiu:

A Software Multi-fault Locating Technique based on Space Shrinkage. 853-858 - Jun Wu, QingGuo Yan, Qinwei Dong, Xianguang Zha, Lin Cui, Xindong Zhao, Wei Dai, Chong Luo:

Task-driven Dialogue System based on Dynamic Intention Capture. 859-864 - Guoda Wang, Miao Zhang, Yaozong Hu, Zhaofeng Ma:

Keyless Entry Security System based on Gait Context. 865-869 - Ziyang Weng, Shuhao Wang:

Nautical Chart Algorithms: A Feedback Strategy to Consider Knowledge Data Production Behavior. 870-875 - Haoxiang Shi, Wu Liu, Jingyu Liu

, Jun Ai, Chunhui Yang:
A Software Defect Location Method based on Static Analysis Results. 876-886 - Longmao Hu, Bingwu Fang:

Analysis of Regional Talent Demand based on Recruitment Website Text Mining. 887-892 - Mengyao Chen, Chuanqi Tao, Hongjing Guo:

Understanding Security Issues based on App Comment Analysis. 893-902 - Zhao Shi, Zhi Deng, Wei Zheng, Ning Li:

Campus Indoor and Outdoor Positioning System based on GPS and Wi-Fi. 903-908 - Hongbo Du, Yaling Zhao, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang:

Research on Key Technologies of Human Upper Limb Bone Diagnosis based on Convolutional Neural Network. 909-917 - Shouhang Wang, Yong Wang, Wenge Le:

Adaptive Weight Structure Representation for Multi-view Subspace Clustering. 918-925 - Yifei Ge, Azragul Yusup, Degang Chen, Hongliang Mao, Yingjie Cao:

UGDA: Data Augmentation Methods for Uyghur Language Named Entity Recognition. 926-932 - Ziyang Weng, Shuhao Wang, Weixin Yan:

Understanding Rembrandt: Directed Knowledge Improves Robustness and Evolution of Facial Phenotype Modeling. 933-940 - Dongpu Sun, Su Qi:

Relation Extraction on the Wargame based on Pre-trained Models. 941-944 - Yutao Sun, Yuan Fu, Tianyi Xu:

Research and Analysis of Physical Health Test for Students Based on C4.5 Algorithm in Universities with Industry Characteristics. 945-953 - Binhao Li, Jingwen Zhong, Guoliang Shi, Jie Fang:

Forest Fire Spread Prediction Method based on BP Neural Network. 954-959 - Yuxuan Van, Xingjun Chen, Rui Li, Yujian Jiang:

The Intelligent Pelagic Communication System Architecture of the Fleet based on UAV Swarm Relay. 960-964 - Qingzhi Liu, Zhendong Yin, Mingyang Wu, Zhilu Wu, Zhijiang Xu:

LSTM Network-based SNR Estimator for DS-UWB Wireless Sensor Network. 965-973 - Xuefeng Yang, Li Liu, Yinggang Zhang, Yihao Li, Pan Liu, Shili Ai:

A Privacy-preserving Approach to Distributed Set-membership Estimation over Wireless Sensor Networks. 974-979 - Hanhong Wang, Lin Qi, Yu Han, Yun Lin:

Prototypical Network for Few-Shot Signal Recognition. 980-985 - Lu Sun, Yun Lin:

Spectrum Completion Based on HaLRTC. 986-992 - Hanjie Dong

, Yaqiong He, Hongwei Tao, Qianheng Duan:
A Framework for Formal Transformation and Analysis of Smart Contract Code. 993-994 - Bojiang Liu, Lijin Wu, Xiaomei Shen, Wei He, Xinyu Han:

Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code Analysis. 995-996 - Ruizhi Qiu, Chuan Lv, Yuxue Jin:

Evaluation Method of Intelligent Manufacturing Capability Maturity. 997-999 - Chenggang Cao, Kuixian Li:

Spectrum Allocation Algorithm based on Improved Wolf Swarm Algorithm. 1000-1001 - Yandie Yang:

Cognitive Radio Spectrum Sensing Technology. 1002-1003 - Donghui Zhao, Liang Kou, Jilin Zhang:

Online Learning based Self-updating Incremental Malware Detection Model. 1004-1005 - Itsuki Miura, Bin Zhang, Hun-ok Lim:

A High Safety Spherical Flying Robot based on Gimbal Mechanism. 1006-1007 - Shunsuke Wakamatsu, Bin Zhang, Hun-ok Lim:

Development of an Octocopter Drone for Accompanying and Carrying Objects. 1008-1009 - Yuanyuan Han, Jingchao Li, Jialan Shen, Bin Zhang:

Improved Convolutional Neural Network based Feature Extraction Method. 1010-1011 - Yingyan Shen, Shaojie Hu, Siqi Cai, Mincheng Chen:

Software Defect Prediction based on Bayesian Optimization Random Forest. 1012-1013 - Rui Zhang, Zhendong Yin, Zhutian Yang, Zhilu Wu, Yanlong Zhao:

Unsupervised Domain Adaptation based Modulation Classification for Overlapped Signals. 1014-1015 - Hongjun Zhang, Zhendong Yin, Yanlong Zhao, Zhilu Wu:

Mars Exploration Aided by Intelligent Reflecting Surface. 1016-1017 - Tse-Chuan Hsu, William Cheng-Chung Chu, Dong-Meau Chang

:
An Improved Visual Recognition Model of Interference Noise Image. 1018-1022 - Hui Guan, Tianyu Ma, Guangwei Wang:

An Improved Dissimilarity based Approach to Semantic Similarity Calculation. 1023-1028 - Ning Luo, Linlin Zhang:

Chaos Driven Development for Software Robustness Enhancement. 1029-1034 - Wei Zhu, Rongling Zhou:

Personalized Learning Task Assignment. 1035-1039 - Youwei Huang, Feng Lu, Xiaolong Sang, Bin Hu, Jiachun Tao:

Precise Epidemic Control based on GeoHash. 1040-1048 - Zhijie Wu, Jilin Zhang, Liang Kou:

A Model for Malware Detection Method based on API call Sequence Clustering. 1049-1050 - Mingqian Liu, Hongyi Zhang:

Parasitic Covert Adversarial Attack on Deep Learning based Modulation Recognition. 1051-1052 - Mingqian Liu, Zhenju Zhang:

Adversarial Attacks on Deep Neural Network based Modulation Recognition. 1053-1054 - Pan Liu, Yihao Li, Shili Ai, Wenjie Zhang:

Four Rules for Converting Complex Loops to Regular Expressions. 1055-1056 - Cheng Chang, Hui Zhou, Chao He, Zilong Zhao, Wulong Li:

Transform Domain End-to-end Learning Communication System. 1057-1058 - Rongheng Xu, Jilin Zhang, Li Zhou:

Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain. 1059-1060 - Yi Zhao, Wenjing Yuan, Yinghua Huang, Zhenyu Chen:

Adversarial Attacks in DNN-based Modulation Recognition: A Preliminary Study. 1061-1062 - Yinghua Huang, Wenjing Yuan, Yi Zhao, Huan Huang:

Machine Learning Algorithms for New Energy Vehicles: A Brief Survey. 1063-1064 - Jiamei Gao, Bo Zhang, Bin Wang, Yang Liu:

A LDPC Decoding Algorithm based on Convolutional Neural Network. 1065-1066 - Hongxuan Li, Jiaxin Zhang, Liang Zhao:

Vehicular High-definition Maps Cache based on Dew Computing. 1067-1068 - Zhuo Zheng:

Multi Feature Modulation Signal Recognition based on Deep Learning. 1069-1070 - Huihui Zhou, Wang Lin, Zuohua Ding:

A Categorical Modelling Framework for Multi-robot Systems in Manufacturing. 1071-1072

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














