default search action
ISPA/BDCloud/SocialCom/SustainCom 2023: Wuhan, China
- IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023. IEEE 2023, ISBN 979-8-3503-2922-3
- Xiao Zhang, Peirui Cao, Yongxi Lyu, Qizhou Zhang, Shizhen Zhao, Xinbing Wang, Chenghu Zhou:
FC+: Near-optimal Deadlock-free Expander Data Center Networks. 1-9 - Mengwei Xie, Lizhen Cui, Jianxiong Liu, Wei Guo, Feng Li:
Time Fairness-Based Application Offloading in Mobile Edge Computing with Individual QoS Guarantee. 10-17 - Jiejian Wu, Zhe Wang, Teng Ma, Linghe Kong, Yutong Liu, Zhuo Song, Jiadi Yu, Yong Yang, Tao Ma, Guihai Chen:
DySched: Relieving Large-Scale Incast for Cloud-Native RDMA Applications. 18-25 - Yifan Han, He Huang, Yang Du, Yu-E Sun, Jia Liu, Hongli Xu:
Hierarchical Sketch: An Efficient Solution for Threshold-t Flows Measurement in High-Speed Networks. 26-33 - Yidong Zhong, Yang Ao, Dingding Li, Jianguo Li, Deze Zeng:
ADSwitch: Adaptive CPU Scheduling for Distributed Systems. 34-41 - Kun Meng, Lijun Sun, Xiao Chen, Haiqin Wu, Shuaiyong Li:
A Decentralized Vehicle-to-Vehicle Energy Trading System Based on Efficient Sharding Services. 42-49 - Tao Xiong, Rui Hou, Lingyun Zhou, Guanglin Xing, Deze Zeng:
K-means ++ and Reinforcement Learning-Based Clustering Method to Achieve Energy Efficiency in Underwater Acoustic Sensor Networks. 50-55 - Zhiwei Ling, Zhihao Yue, Jun Xia, Ting Wang, Mingsong Chen, Xiang Lian:
FedEntropy: Efficient Federated Learning for Non-IID Scenarios Using Maximum Entropy Judgment-based Client Selection. 56-63 - Dan Li, Panpan Ding, Yuqian Zhou, Yuguang Yang, Chenting Li:
Secure, Efficient, and Privacy-Protecting One-to-Many Cross-Chain Shared Data Consistency Audit. 64-71 - Wei Liao, Lansheng Han, Peng Chen:
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography. 72-79 - Wei Zheng, Jinglong Deng, Zihan Nan, Peixuan Lin, Yue Hong:
DRAS: A Scheduling Algorithm for Cloud-Based DAG with Deadline Constraints. 80-87 - Xin Zhai, Lijie Xu, Jialei Zhang, Kun Wang, Jia Xu, Bei Xu:
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs. 88-95 - Pingping Dong, Xiaojuan Lu, Tairan Huang, Liying Chen, Yang Yang, Lianming Zhang:
Predictive Queue-based Low Latency Congestion Detection in Data Center Networks. 96-103 - Pingping Dong, Yuning Zuo, Liying Chen, Shangyu Li, Lianming Zhang:
VSNT: Adaptive Network Traffic Forecasting via VMD and Deep Learning with SCI-Block and Attention Mechanism. 104-109 - Xin Shi, Liang Zhao, Na Lin, Lexi Xu, Ammar Hawbani, Yuanguo Bi:
Constructing Future Vehicle Digital Twins with Insights from Cloud-Edge Collaboration. 110-117 - Zhehao Cheng, Jiaoyan Chen, Jin Liu, Mengyang Li:
Data Quality Assessment in Mobile Crowdsensing by Utilizing Psychology Effect. 118-124 - Qinghua Mao, Xi Lin, Gaolei Li, Lixing Chen, Yuchen Liu, Yuxin Qi, Jianhua Li:
Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification. 125-130 - Liangfu Zhang, Cuiping Li, Chuanwen Luo, Hong Chen:
All-Pairs SimRank Updates on Dynamic Graphs. 131-138 - Xiao Zhao, Feng Tian, Ziling Shao:
Localization and Tracking using ODE-LSTM Algorithm with Non-Line-of-Sight Channels. 139-144 - Kai Peng, Tong Lu, Song Mei, Nannan Xue, Yongchao Shen, Menglan Hu:
Fine-grained IoT device identification method based on self-supervised ViT. 145-152 - Hao Chen, Peng Liu, Lizhao You, Ziyang Guo, Jianjun Luo, Xinghua Sun, Taotao Wang, Liqun Fu:
Deep Reinforcement Learning based Dynamic Channel Bonding for Wi-Fi Networks. 153-160 - Tianyu Li, Liang Zhao, Chaojin Mao, Na Lin, Qiang He, Xingwei Wang:
A Genetic Algorithm Based Adaptive Offloading Scheme for Domain Generalization in VEC. 161-168 - Zhuoqun Xia, Chao Su, Zisang Xu, Kejun Long:
Lightweight Security Authentication Scheme for Vehicle-Road Collaboration using Physical Unclonable Function. 169-174 - Pengbo Wang, Boyin Zhang, Shigeng Zhang, Xuan Liu:
An Edge-oriented Deep Learning Model Security Assessment Framework. 175-182 - Zhuoqun Xia, Ziyu Wang, Xiao Liu:
Partitioning-based Active Trust Mechanism in Cloud-Edge-Device Collaborative Data Collection. 183-190 - Jianrong Lu, Lulu Xue, Wei Wan, Minghui Li, Leo Yu Zhang, Shengqing Hu:
Preserving Privacy of Input Features Across All Stages of Collaborative Learning. 191-198 - Kaifei Zhang, Yuxiang Ma, Yulei Wu, Tao Chen, Huijie Ma:
Adaptive Splitting Algorithm for Neural Network Modelling in AMP. 199-206 - Jing Long, Cuiting Luo, Ruxin Chen, Wei Liang, Zheng Qin:
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things. 207-212 - Ziyu Zeng, Jiale Huang, Jiaxin Wu, Jigang Wu:
Joint Request Offloading and Resource Allocation for Energy Efficient D2D Enabled Multi-type Inference Services. 213-220 - Tianmeng Zhang, Renhui Chen, Congming Gao, Youtao Zhang, Jun Yang, Jiwu Shu:
Libra: A Space-Efficient, High-Performance Inline Deduplication for Emerging Hybrid Storage System. 221-228 - Juan Luo, Ruoyu Xiao, Peng Sun, Ying Qiao:
VLEO Satellite Radio Access Network Slicing: A Hierarchical Deep Reinforcement Learning Approach. 229-236 - Chenyu Lin, Shutian Luo, Huanle Xu:
Exploring Imbalances among Microservice Containers in Large Cloud Platforms. 237-245 - Yuxuan Lin, Bin Tang, Siyuan Zhou, Zaipeng Xie, Baoliu Ye:
Efficient Node Selection for Coding-based Timely Computation over Heterogeneous Systems. 246-253 - Yi Li, Wenying Zheng, Pandi Vijayakumar, Md. Zakirul Alam Bhuiyan, C. Thamilarasi:
Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing. 254-261 - Yi Tian, Guangping Xu, Hongzhang Yang, Yue Ni, Jiaxi Cao, Lei Yang:
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems. 262-269 - Nan Hu, Chenglu Yan, Zhiguang Chen, Yutong Lu:
FinD: Fine-grained Dynamic Task Scheduling with Lightweight Threads on Many-core Processors. 270-278 - Zhan'gang Ma, Jiandong Yan, Feng Zou, Xixin Cao:
Software and Hardware Processing Method for Blockchain Light Node SPV Verification. 279-285 - Jiaxuan Wu, Wei-Yang Chiu, Peichen Liu, Weizhi Meng, Wenjuan Li:
The Instruction Separation Framework against Man-At-The-End Attacks: Protect What is Mattered On-the-Fly. 286-293 - Keyang Liu, Maxim Jourenko, Mario Larangeira:
Reducing Latency of DAG-based Consensus in the Asynchronous Setting via the UTXO Model. 294-304 - Liuhuan Li, Ximin Yang, Xiao Zhang, Yumeng Yang, Xuefeng Chen, Wan Tang:
GANDPS: Ensuring Both Detection Precision and Stability in GAN-based Anomaly Detection for Network Traffic. 305-310 - Xiaohui Wei, Yumin Yan, Xiaonan Wang, Yi Hu, Hengshan Yue:
Defending T-BFA in DNNs Efficiently via Random Security-Sensitive Weights Switching. 311-318 - Zhaokang Wang, Jiahui Pan, Lu Zhou, Zhonghui Zhang, Caocong Ji:
Parallel Integrity Authentication Data Structure Construction for Encrypted Range Queries. 319-327 - Yue Ding, Chuanfu Xu, Haozhong Qiu, Qingsong Wang, Weixi Dai, Yongzhen Lin, Yonggang Che:
Evaluating Performance Portability of SYCL and Kokkos: A Case Study on LBM Simulations. 328-335 - Lin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, Fenghua Li, Liang Fang:
A Moving Target Defense Approach for the Distributed Dynamic Network. 336-343 - Yubo Peng, Xiong Li, Shuai Shang, Xiaofen Wang, Xiaosong Zhang:
Low-overhead Privacy-preserving Location-based Skyline Query. 344-351 - Jing Li, Peihao Yang, Linghe Kong, Guihai Chen:
A BPF-Based Task Scheduling Scheme for Heterogeneous Multiprocessor Systems. 352-359 - Surafel Kifetew Woldeyes, Yongmin Zhang, Wei Wang, Zhaohui Li:
Joint Resource Placement and Service Replica Placement Scheme in Mobile Edge Computing. 360-367 - Bin Li, Yufeng Tang, Yupeng Zhang, Hengxing Liu, Di Li, Zheng Gong:
Cryptanalysis of Space-Hard Ciphers under Strong White-Box Security. 368-374 - Feng Zhang, Hao Wang, Ruixin Guo, Erkang Xue, Guangzhi Qu:
Efficient Differentially Private Tensor Factorization in the Parallel and Distributed Computing Paradigm. 375-380 - Chunming Liu, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Cheng Zeng, Yang Yang:
Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous Data. 381-387 - Zhen Wang, Daniyal M. Alghazzawi, Li Cheng, Gaoyang Liu, Chen Wang, Zeng Cheng, Yang Yang:
FedCSA: Boosting the Convergence Speed of Federated Unlearning under Data Heterogeneity. 388-393 - Changrui Chen, Xiaolin Chen, Deze Zeng:
ERODRL: Efficient ISP Routing Optimization via Deep Reinforcement Learning. 394-401 - Siyuan Leng, Fenghua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang:
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain. 402-409 - Yuanbo Li, Hongchao Hu, Shuai Zhang, Guozhen Cheng, Wenyan Liu:
An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning. 410-415 - Yongtao Luo, Jie Liu, Tiaojie Xiao, Chunye Gong:
Parallel Implementation of SHA256 on Multizone Heterogeneous Systems. 416-422 - Yazhi Zhang, Chuanwen Luo, Guijuan Wang, Li Zhang, Mengjie Lv, Jiguo Yu:
The Adaptive Fault-tolerant Routing Based on an Improved Local Security Information Model of the Exchanged Hypercube. 423-430 - Cairui She, Liwei Chen, Gang Shi:
DPFCFI: A Hardware-Based Forward Control-Flow Integrity for Architecture and Microarchitecture. 431-438 - Qingsheng Lei, Yongjun Xia, Qitao Guo, Rui Hao, Xiaohai Dai, Weiqi Dai:
EBFT: Efficient BFT Consensus through Shortcut Replies. 439-446 - Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. 447-455 - Lin Zhong, Yujue Wang, Jun Du, Daji Liang, Ziyuan Zhong, Kevin He, Andrew Zhang:
Fast 2-out-of-n ECDSA Threshold Signature. 456-465 - Shuting Li, Qian Jiang, Xin Jin, Nanqing Liu, Shiyu Chen, Shin-Jye Lee:
Cascade Meta-RCNN for Few-shot Object Detection. 466-473 - Junwei Tang, Zilong Xu, Luyao Ye, Tao Peng, Ruhan He, Xinrong Hu, Wenlong Tian:
PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware Detection. 474-481 - Yuming Lu, Fenghua Li, Yitong Wen, Liang Fang, Shoukun Guo, Zifu Li:
Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis. 482-490 - Ke Shang, Weizhen He, Shuai Zhang, Zhen Zhang, Jichao Xie, Xin Shi:
Deep Reinforcement Learning-based Network Moving Target Defense in DPDK. 491-499 - Xun Zhang, Chengliang Wang, Xingquan Piao, Ao Ren, Zhetong Huang:
SCRA: Systolic-Friendly DNN Compression and Reconfigurable Accelerator Co-Design. 500-507 - Long Gao, Yiru Zhao, Qihan Wan, Lei Zhao:
Efficient Hybrid Fuzzing with Syntax-aware Input Trim Based on Lightweight Taint Analysis. 508-515 - Wangsheng Yan, Li Lin, Ruihong Huang, Jinbo Xiong, Tianqiang Huang, Mingwei Lin:
Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality. 516-523 - Qidong Wu, Xuemei Fu, Xiangli Yang, Ruonan Zhao, Chengqian Wu, Tinghua Zhang:
Semi-asynchronous Federated Learning Optimized for NON-IID Data Communication based on Tensor Decomposition. 524-530 - Sheng Yun, Md. Zakirul Alam Bhuiyan, Md. Taufiq Al Hasib Sadi, Shen Su:
Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models. 531-538 - Jingdong Li, Zhao Li, Xiaoling Wang, Xingjian Lu, Ji Zhang, Hongyang Chen:
GPU-Accelerated Maximal Bicliques Mining Framework for Large E-commerce Networks. 539-544 - Yong Luo, Zhi Lu, Xiaofei Yin, Songfeng Lu, Yiting Weng:
Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy. 545-552 - Haipeng Du, Huichuan Liu, Geli Lv, Xin Lv, Zhiwen Wang, Weizhan Zhang:
A Novel Multi-scale Spatial Tiling Based Adaptive Streaming Method for 360° Video. 553-560 - Zhixin Fan, Yaohui Zhang, Jiang Zhou, Bo Li, Yong Chen, Weiping Wang:
DepotDB: Mitigate Write Amplification with Region Compaction on KV Stores for Periodic Write-Intensive Workloads. 561-566 - Yang Wang, Zhenzhen Yuan, Guosheng Kang, Buqing Cao, Jianxun Liu, Yong Xiao:
Graph-based Multi-view Clustering for Web services. 567-572 - Shaoheng Tan, Chang Liu, Dingding Li, Yong Tang, Deze Zeng:
A NUMA-aware Graph Database for Hybrid Memory System. 573-580 - Chuanjie Liu, Siyu Ren, Shuang Du, Cheng Dai, Bing Guo, Runzhi Fan:
Deep Reinforcement Learning to Enhance the Energy-efficient Performance of Unmanned Aerial Vehicles-enabled Fog Radio Access Networks. 581-586 - Li Zheng, Donghui Ding, Zhao Li, Jun Gao, Jie Xiao, Hongyang Chen, Schahram Dustdar, Ji Zhang:
Anomaly Detection in Battery Charging Systems: A Deep Sequence Model Approach. 587-594 - Jian Xu, Bing Guo, Fei Chen, Yan Shen, Shengxin Dai, Cheng Dai:
A Federated Learning Aggregation that Integrates Clustering and Momentum Correction Based on Historical High-Quality Gradients. 595-602 - Yiming Gao, Zhen Wang, Weili Wu, Herman Lam:
EIF: A Mediated Pass-Through Framework for Inference as a Service. 603-611 - Zhihan Cao, Xi Zheng, Jianxiong Guo, Weijia Jia, Yang Xu, Tian Wang:
Cost-Effective Dynamic Alliance Pricing Mechanism Based on Distributed Edge-Intelligence. 612-619 - Suhui Wangzhang, Ruizhang Yang, Rong Gu, Bo Li, Dingjin Liu, Zhaokang Wang:
Efficient Large Scale Reverse-time Migration Imaging Computation based on Distributed Spark Cluster with GPUs. 620-627 - Chuanyu Zong, Ziyi Cai, Wenju Li, Tao Qiu, Jiajia Li, Xiufeng Xia:
Continuous Complex Relational Community Detection on Multi-layer Networks. 628-633 - Jingyu Zhang, Xingxing Hou, Yilong Teng, Lailong Luo:
Transaction Data Management Optimization Based on Multi-Partitioning in Blockchain Systems. 634-639 - Jinke Cheng, Gaolei Li, Xi Lin, Hao Peng, Jianhua Li:
Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI. 640-647 - Yuying Li, Yang Yang, Chen Wang, Runqin Liu, Hongbo Jiang, Wenping Liu:
Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring. 648-655 - Jingyu Zhang, Pian Zhou, Yongtao Sun, Lailong Luo:
A High-Performance Data Verification Mechanism in Blockchain-Based IoT Systems. 656-661 - Jingyu Zhang, Jin Yang, Chenghao Wu, Lailong Luo:
A Space-Efficient Digital Wallet Service in Blockchain Systems. 662-669 - Wanying Lu, Liang Liu, Wenbin Zhai, Haoyuan Chen, Yulei Liu:
HBC: Combining Lossy and Lossless Hybrid Bilayer Compression Framework on Time-Series Data. 670-679 - Pengxu Chen, Huazhong Liu, Hanning Zhang, Jihong Ding, Yunfan Zhang, Dehua Chen:
High-Order Faithful Interpretation Methods for Tensor-Based CNNs. 680-687 - Meng Lin, Qinghao Huang, Xingyi Yu, Xianjing Guo, Tao Guo:
Adaptive Fusion of Single-stream and Dual-stream Models based on Cross-modal Association Strength for Harmful Meme Detection. 688-693 - Peng Huang, Zisang Xu, Wei Liang, Jianbo Xu, Bin Zheng:
An Efficient Decentralized Mutual Authentication Scheme Between Avatars for Metaverse. 694-700 - Yushan Zhao, Tengke Wang, Shunxiang Zhang:
A Semantic-Driven Generative Information Extraction Framework Oriented to Patent Text. 701-708 - Songquan Li, Rongbo Zhu, Jun Yuan, Shaohua Wan:
Cross-subject Drowsiness Recognition Model Based on the Multi-scale Parallel Convolution of EEG Channels. 709-714 - Hongyi Qiao, Cong Peng, Min Luo, Po Wu, Debiao He:
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption. 715-723 - Baoming Chang, Fengxi Zhou, Zhaoyang Wang, Yu Wen, Boyang Zhang:
A Distributed Storage System for System Logs Based on Hybrid Compression Scheme. 724-735 - Ziqi Wang, Wei Wang:
Twin Branch Transformers-Based Re-Ranking for Image Retrieval. 736-743 - Baoshen Guo, Hai Wang, Hao Liu, Wei Gong, Wei Xi, Xiaolei Zhou, Shuai Wang:
TGT: Churn Prediction in O2O Logistics with Two-tower Gated Transformer. 744-751 - Jianzong Wang, Yimin Deng, Ziqi Liang, Xulong Zhang, Ning Cheng, Jing Xiao:
CP-EB: Talking Face Generation with Controllable Pose and Eye Blinking Embedding. 752-757 - Sihang Qin, Xianjun Gu, Xing Jun, Haitao Li, Mengqi Huang, Weiqi Dai:
An SGX and Blockchain-Based System for Federated Learning in Classifying COVID-19 Images. 758-765 - Junhui Li, Guangping Xu, Hongzhang Yang, Yulei Wu:
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data. 766-771 - Zhanting Zhou, Kejun Bi, Yuyanzhen Zhong, Chao Tang, Dongfen Li, Shi Ying, Ruijin Wang:
HKTGNN: Hierarchical Knowledge Transferable Graph Neural Network-based Supply Chain Risk Assessment. 772-782 - ZhiXin Huang, Jia-Xiang Lin, QianQian Chen, ZhenChang Zhang:
Hybrid Distribution Separation for Prediction of Heterogeneous Zero-Inflated Time Series. 783-788 - Xianyu He, Runyu Zhang, Pengpeng Tian, Lening Zhou, Min Lian, Chaoshu Yang:
A Write-Optimized PM-oriented B+-tree with Aligned Flush and Selective Migration. 789-794 - Chengdong Chen, Wensheng Gan, Jiahui Chen, Shicheng Wan:
FSKY-Miner: Fast Mining of Skyline Patterns. 795-802 - Jieqi Rong, Weirong Liu, Xiaoquan Yu, Wanwan Ren, Boyu Shu, Jun Peng:
A Few-shot Learning Approach for Anomaly Detection in Cooperative Tracking Control System. 803-808 - Kai Gao, Hao Huang, Linhong Liu, Ronghua Du, Jinlai Zhang:
A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle Networks. 809-816 - Kai Gao, Wenhao Jia, Yuxiang Zhou, Ronghua Du:
Multi-Head Self-Attention Enhanced Convolutional Neural Network for Driver Fatigue Detection using EEG Signals. 817-823 - Peng Liu, Shanghong He, Kai Gao, Geng Yang, Junhui Zou, Longsheng Ye:
Prediction of hydraulic pumps remaining useful life based on LSTM and Transform with dual self-attention. 824-831 - Bin Chen, Miaoben Wang, Feng Zhou, Haoyang Yan, Ronghua Du:
Energy Efficient Speed Planning of Electric Vehicles for Vehicle-Following Scenarios Using Data-driven Koopman Model. 832-839 - Feng Zhou, Hongkun Liang, Kewu Tao, Shuo Li:
Autonomous cruise control of intelligent high-speed train with online energy-saving optimization. 840-845 - Bin Chen, Guo He, Feng Zhou, Hao Huang, Wei Liu, Ronghua Du:
Hierarchical Data-driven Predictive Control Strategy for Energy Management of Electric Vehicles. 846-853 - Jin Guo, You Wu, Yi Lei, Guotan Liu, Ronghua Du:
Research on Multi-vehicle Formation Control with the Assistance of the Characteristic Model in the Networked Environment. 854-861 - Wanwan Ren, Jun Peng, Rui Zhang, Jieqi Rong, Boyu Shu, Yongting Liu, Yingze Yang:
An Autoencoder-Driven FDIA Detection Method for Virtual Coupling Systems of Heavy-Haul Trains. 862-867 - Yunsheng Fan, Zhiwu Huang, Kaifu Guan, Boyu Shu, Yongjie Liu, Zeyu Zhu, Peinan He, Shuo Li:
A Physics-Informed Integrated Modeling Method for Lithium-ion Batteries. 868-873 - Heng Li, Peinan He, Taozhen Chang, Shuo Li:
SOC Estimation of Supercapacitor Balancing Systems: A Switching Kalman Filter Approach. 874-880 - Huan Wang, Xiaoyang Lai:
Quantum Information Technology for Network Security: An Application-Focused Overview. 881-886 - Longmin Deng, Xuemin Zhang, Qianrong Zheng, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study. 887-892 - Haibo Wang, Mengyue Xu, Gen Li, Ting Pan, Haiqing Si, Haibo Liu, Yixuan Li, Yijin Zhu:
Research on Pilot's Workload Based on Multisource Data. 893-899 - Fahao Chen, Peng Li, Shui Yu:
Efficient Giant Graph Unlearning via Push-Pull Tuning. 900-907 - Zhenkun Jin, Shuai Huang, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou:
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment. 908-914 - Yang Yi, Yuting Li, Yun Xu, Pengcheng Wang, Yonghui Xu, Weiguang Wang:
BT-Duper: A Binomial-Tree Based Data Replication Offloading Method with Native RDMA Primitives. 915-922 - Jianzong Wang, Pengcheng Li, Xulong Zhang, Ning Cheng, Jing Xiao:
DQR-TTS: Semi-supervised Text-to-speech Synthesis with Dynamic Quantized Representation. 923-928 - Yuanchao Xu, Ruyi Qian, Yida Wang, Qirun Huo:
iNUMAlloc: Towards Intelligent Memory Allocation for AI Accelerators with NUMA. 929-936 - Hao Feng, Lin Chen, Jiong Wu:
BAFD: A Bidirectional Adaptive Fault Diagnosis Algorithm For Multiprocessor Systems. 937-944 - Peter Kubare, Xiaojun Hei, Yuan Tian:
Detect Human Falls in an End-Edge-Cloud Orchestrated Architecture. 945-952 - Yichen Wang, Qin Lv:
Jump off the Bandwagon? Characterizing Bandwagon Fans' Future Loyalty in Online NBA Fan Communities. 953-960 - Meng-Jie Wang:
Tweeting from Left to Right: Tracing the Dynamics of Emotional Messaging and Public Engagement During the 2018 vs. 2022 US Campaigns. 961-971 - Ziqi Qin:
Style Transfer of Traditional Chinese Bamboo Flute Music Based on AI Model. 972-979 - Kunlun Guan, Yangsen Zhang:
Cross Domain Few Shot NER Via Data Enhancement Invariant Domain Feature Extraction Based on Diffusion Model. 980-988 - Zhenkun Jin, Xingshi Wan, Xin Nie, Xinlei Zhou, Yuanyuan Yi, Gefei Zhou:
Ranking on Heterogeneous Manifold for Multimodal Information Retrieval. 989-996 - Chengying Mao, Haiquan Hu:
Large-scale k Edge Server Placement Based on User Clustering and Intelligent Search. 997-1004 - Lijun Dong, Richard Li:
Routers' Energy Consumption Reduction With Load Saturation Awareness And Traffic Steering. 1005-1010 - Yejin Liao, Kun Zhu:
A Learning Auction Mechanism for Video Streaming Transmission with Decoupling Uplink-Downlink Association. 1011-1017 - Ziming Zeng, Chao Dong, Xiaojun Zhu, Lei Zhang:
Hierarchical Task Scheduling for Heterogeneous UAVs based on Hybrid Genetic Algorithm. 1018-1025 - Feifan Hao, Shan Jing, Chuan Zhao:
Link load balancing scheme for elephant flow in SDN data center. 1026-1033 - Na Lin, Zhijiang Wang, Liang Zhao:
MAS-DDPG: Multi-Sensor Self-Adaptive Scheduling for UAV Path Planning in Network-Unavailable Environments. 1034-1041 - Jintao Yang, Minghua Wang, Wenbo Chen, Shujing Xie:
Improved Virtual Force Algorithm-Based Fuzzy Clustering in Mobile Wireless Sensor Networks. 1042-1049 - Olufunsho I. Falowo, Jess Kropczynski, Chengcheng Li:
Protecting Critical Infrastructure: Strategies for Managing Cybersecurity Risks in Nuclear Fusion Facilities. 1050-1061 - Hong Yu, Qinrang Liu, Chao Cui, Shuai Wei:
An Application Level Synchronization Method for Heterogeneous Redundant Structures. 1062-1068 - Bing Xia, Chongjun Tang, Wenbo Liu, Shihao Chu, Yu Dong:
A Firmware Vulnerability Detection Method Based on Feature Filtering. 1069-1076 - Qianjin Wang, Xiangdong Li, Yuchen He, Chong Yue:
A Gradient-guided Fuzzing Approach to Recover More Complete Control Flow Graph of Binary. 1077-1082 - Jialun Deng, Li Cheng, Haiwen Yuan, Kuanlei Zheng, Xuan Li, Quli Li:
An Online Detection System for LDoS attack Based on XGBoost. 1083-1088 - Meng Zhao, Zhu Di, Zhe Xia, Jing Tian, Jianwen Xiang, Lin Jun:
OWETC: Open world encrypted traffic classification based on semi-supervised class incremental learning. 1089-1096 - Zhan Xue, Magnus Karlsson, Tao Yu, Aleksander Lobakin, Maciej Fijalkowski, Jesse Brandeburg:
An In-Kernel Inline Crypto Solution for eXpress Data Path With QuickAssist Technology: Design, Prototyping and Performance Evaluation. 1097-1104 - Guo Yuan, Chao Heng, Zhai Ping, Liu Ziqi, Li Haibo, Li Wenpeng:
Reversible Data Hiding Scheme Based on Prediction Error Bit-plane Compression. 1105-1112 - Mohammed Rajhi, Niki Pissinou:
Resource-Limited Localized Adaptive Adversarial Training for Machine Learning Model. 1113-1120 - Kun Zhao, Wei Xi, Lingzhi Yi, Wei Gong, Shuai Wang, Yijing He:
Joining a Private Group with Friends Nearby without PIN-code. 1121-1128 - Hen-Geul Yeh, Geoffrey Daniel Farthing:
GPS L1 C/A Spoof Detection Through the Application of Deep Neural Networks. 1129-1134 - Mingshun Ye, Mingdong Tang, Weili Chen:
BILAM: A BiLSTM-Based Model for Detecting Phishing Scams in Ethereum. 1135-1142 - Yimin Deng, Xulong Zhang, Jianzong Wang, Ning Cheng, Jing Xiao:
CLN-VC: Text-Free Voice Conversion Based on Fine-Grained Style Control and Contrastive Learning with Negative Samples Augmentation. 1143-1148 - Xiaoyu Yi, Gaolei Li, Ao Ding, Yan Zheng, Yuqing Li, Jianhua Li:
AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences. 1149-1156 - Chuanwen Luo, Ning Liu, Ting Chen, Jia Cao, Yi Hong, Zhibo Chen, Deying Li:
Cooperative Completing Tasks of Charging WRSNs with Multiple MUVs and Laser-charged UAVs. 1157-1164 - Lihui Pang, Yilong Tang, Yulang Liu, Bin Yang, Wenwei Zhang, Qingyi Tan:
A signel-channel blind signal separation method based on signal type difference for time-frequency overlapped signal. 1165-1172
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.