


default search action
ACM TUR-C 2019: Chengdu, China
- Proceedings of the ACM Turing Celebration Conference - China, ACM TUR-C 2019, Chengdu, China, May 17-19, 2019. ACM 2019, ISBN 978-1-4503-7158-2

ACM SIGCOMM China
- Zhe Wang, Taoshen Li, Jin Ye, Zhihui Ge, Xudong Gao, Min Wu:

Secure and green SWIPT in energy harvesting cognitive radio network with robust AN-aided beamforming. 1:1-1:7 - Han Wang, Yang Qin, Zechao Liu, Yibing Li:

Processing private queries based on distributed storage in location-based services. 2:1-2:6 - Zhiyong Du, Bin Jiang, Kun Xu, Shengyun Wei, Shengqing Wang, Huatao Zhu:

Second-order multi-armed bandit learning for online optimization in communication and networks. 3:1-3:6 - Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand, Shaoci Xie:

VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm. 4:1-4:7 - Xiaotong Li, Ruiting Zhou, Zongpeng Li:

Cooperative offloading of tasks with deadlines in mobile cloud computing. 5:1-5:6 - Zichen Xu, Li Li, Wenting Zou:

Exploring federated learning on battery-powered devices. 6:1-6:6 - Huanlai Xing

, Song Li, Penglin Dai, Shouxi Luo, Ke Li, Hui Yang:
A PBIL for delay constrained virtual network function placement with load balancing. 7:1-7:6 - Xiuhua Li, Xiaofei Wang, Zhengguo Sheng, Chunqiang Hu, Victor C. M. Leung:

Popularity-prediction-driven hierarchical caching in fog-cloud based radio access networks. 8:1-8:6 - Jinli Yan, Lu Tang, Junnan Li, Xiangrui Yang, Wei Quan, Hongyi Chen, Zhigang Sun:

UniSec: a unified security framework with SmartNIC acceleration in public cloud. 9:1-9:6 - Zhiying Tang, Qingjun Xiao, Junzhou Luo:

A memory-compact and fast sketch for online tracking heavy hitters in a data stream. 10:1-10:6 - Mengxiao Hu, Guangxia Xu, Chuang Ma, Mahmoud Daneshmand:

Detecting review spammer groups in dynamic review networks. 11:1-11:6 - Xiaochen Fan, Chaocan Xiang, Liangyi Gong, Xiangjian He

, Chao Chen, Xiang Huang
:
UrbanEdge: deep learning empowered edge computing for urban IoT time series prediction. 12:1-12:6 - Zhuang Chen, Qian He, Zhifei Mao, Hwei-Ming Chung, Sabita Maharjan:

A study on the characteristics of douyin short videos and implications for edge caching. 13:1-13:6
ACM SIGMOBILE China
- Wei Liu, Shan Chang, Hongzi Zhu, Yiming Liu:

S3: low cost real-time spectrum sensing using SDR. 14:1-14:5 - Haiwen Wang, Lingkun Kong, Luoyi Fu, Xinbing Wang:

Wandering between close and apart: are scholarly domains crossable? 15:1-15:6 - Zhongzhao Hu, Luoyi Fu, Xiaoying Gan:

De-anonymize social network under partial overlap. 16:1-16:5 - Rui Zhang, Jiming Guo, Yueqi Zhou, Hongbo Jiang, Chen Wang

:
traj2bits: indexing trajectory data for efficient query. 17:1-17:5 - Yi Zhao, Jianbo Li, Xin Miao, Xuan Ding:

Urban crowd flow forecasting based on cellular network. 18:1-18:5 - Fan Yang

, Shining Li, Jiangjiang Zhang, Shaoqing Xu, Li Cong, Yinghai An:
STARLIT: 3D indoor positioning with smartphones and reflection light. 19:1-19:5 - Min Sun, Li Zhang, Ying Liu, Xin Miao, Xuan Ding:

See-your-room: indoor localization with camera vision. 20:1-20:5 - Yuben Qu, Jiajia Liu:

Computation offloading for mobile edge computing with accuracy guarantee. 21:1-21:5 - Wen Tian, Zhenzhen Jiao, Min Liu, Meng Zhang, Dong Li:

Cooperative communication based connectivity recovery for UAV networks. 22:1-22:5 - Yuan Shao, Lin Li, Xiansheng Guo:

A semi-supervised deep learning approach towards localization of crowdsourced data. 23:1-23:5 - Pengqian Lu, Jianhui Zhang, Siwen Zheng, Tianyu Zhang:

Local ratio based distributed bike-dock pair allocation in public bike system. 24:1-24:5 - Yiwen Han, Ding Li, Haotian Qi, Jianji Ren, Xiaofei Wang:

Federated learning-based computation offloading optimization in edge computing-supported internet of things. 25:1-25:5 - Yu Bao, Liang Dong, Yue Zheng, Ying Liu:

WiSafe: a real-time system for intrusion detection based on wifi signals. 26:1-26:5 - Yang Shi

, Fangyu Li, Wen-Zhan Song
, Xiangyang Li, Jin Ye:
Energy audition based cyber-physical attack detection system in IoT. 27:1-27:5 - Ye Zhou:

Chameleon: towards adaptive honeypot for internet of things. 28:1-28:5 - Haonan Zhang, Chen Feng

, Xinbing Wang:
A greedy-based approach of fast transaction broadcasting in bitcoin networks. 29:1-29:5 - Gaoyang Guan, Wei Dong, Jiadong Zhang, Yi Gao, Tao Gu, Jiajun Bu:

Queec: QoE-aware edge computing for complex IoT event processing under dynamic workloads. 30:1-30:5 - Yufu Jia, Wenping Liu, Hongbo Jiang, Yamin Li, Guoyin Jiang, Zhicheng Lui, Yang Yang, Jing Xing:

A unified framework for constrained linearization of 2D/3D sensor networks with arbitrary shapes. 31:1-31:5 - Jian Yao, Xingfa Shen, Jianhui Qiu, Ting Wang:

SeeIME: a Chinese mobile IME for Chinese learners based on hybrid Pinyin code. 32:1-32:5 - Ping Zhao, Jiaxin Sun, Anqi Zhang, Sifan Ni, Guanglin Zhang:

P3S2: practical secure protocol for speech data publishing. 33:1-33:5 - Ruizhi Zhang, Chujie Tian, Yang Ji:

An emotion recognition system based on edge computing and cloud computing applied in the kindergarten. 34:1-34:5 - Ziyi Chang, Hui Li

, Zhuqin Chu, Huaxi Gu, Xiaochun Ye:
Crosstalk-aware GA-based wavelength allocation method for ring-based optical network-on-chip. 35:1-35:5 - Yecheng Song, Pengrui Duan, Liang Liu, Huadong Ma:

CNDTSN: enhanced DTSN based on classified nodes. 36:1-36:5 - Ying Liu, Zhiyong Tao, Xiaobing Li:

High efficiency wifi fingerprint localization based on distance costraints. 37:1-37:5 - Feng Lin, Haifeng Zheng, Xinxin Feng:

An attention-based ambient network with 3D convolutional network for incomplete traffic flow prediction. 38:1-38:5 - Cheng Wang, Hangyu Zhu

, Chaodong Wang, Qin Zhao, Bo Zhang:
Transport complexity of data dissemination in large-scale online social networks. 39:1-39:5 - Fan Peng, Shaohua Tang, Bowen Zhao, Yuxian Liu:

A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy. 40:1-40:5 - Gongwei Xiao, Xu Chen, Muhong Wu, Zhi Zhou:

Deep reinforcement learning-driven intelligent panoramic video bitrate adaptation. 41:1-41:5 - Xiaoyang Huo, Chuan Wen, Yuchen Yan, Ruijie Wang:

RI-SSGE: a framework with rule inference and sentence schema graph embedding for knowledge base query construction. 42:1-42:5 - Yao Feng, Xiong Wang, Wenkuan Dai, Shujuan Gao, Xiaoying Gan, Siyi Wang:

Congestion-aware deployment of electric vehicle charging stations. 43:1-43:5 - Xiaoxia Qin, Fanping Zeng, Yu Zhang:

MSNdroid: the Android malware detector based on multi-class features and deep belief network. 44:1-44:5 - Jiaming Cui, Huaying Wu, Luoyi Fu, Xiaoying Gan:

De-anonymizing bitcoin networks: an IP matching method via heuristic approach: poster. 45:1-45:2 - Shuqing He, Haifeng Wang, Yunpeng Cao, Deyu Zhao:

A wide-deep event model for complex event processing in edge and cloud computing environment. 46:1-46:2 - Chong Zhang, Xiaoying Gan:

Source detection in the bitcoin network: a multi-reporting approach. 47:1-47:2 - Fan Yang, Shasha Zhang, Shuyu Song, Rongpeng Li, Zhifeng Zhao, Honggang Zhang

:
A testbed for intelligent software defined security framework. 48:1-48:2 - Yuanhao Sun, Weimin Ding, Lei Shu, Kai Huang, Kailiang Li

, Yu Zhang, Zhiqiang Huo:
When mobile crowd sensing meets smart agriculture: poster. 49:1-49:2
ACM SIGMOD China
- Ke Ji, Yahan Yuan, Kun Ma

, Runyuan Sun, Zhenxiang Chen, Jun Wu:
Context-aware recommendations via a tree-based ensemble framework. 50:1-50:5 - Jiadong Ren, Qian Wang, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao:

Mining important nodes in complex software network based on ripple effects of probability. 51:1-51:8 - Zi-Hua Li, Ling Huang, Kai Wang, Chang-Dong Wang, Wei Shi, Dong Huang

:
Network embedding with class discriminability. 52:1-52:5 - Jian Zeng, Bo Tang:

Mining heterogeneous urban data for retail store placement. 53:1-53:5 - Qinshen Wang, Hongzhi Wang, Bo Zheng:

An efficient distributed storage strategy for blockchain. 54:1-54:5 - Xiaoyan Zhang, Yue Mao, Xiangfu Meng:

A spatial clustering approach by combining the geo-social-comment relationships of POIs. 55:1-55:5 - Kaiwen Song, Xinao Wang, Yidan Zhang

, Jie Zuo:
Representation learning for heterogeneous network with multiple link attributes. 56:1-56:5 - Jie Liu, Jie Zuo, Ruiqi Qin:

Mining top-k distinguishing periodic patterns in temporal databases. 57:1-57:5 - Xiaohui Zhang, Jie Zuo:

Measuring similarity between sequential datasets. 58:1-58:5 - Geng Deng, Licheng Liu, Jie Zuo:

Scoring framework of soccer matches using possession trajectory data. 59:1-59:2 - Chengxin He, Yidan Zhang

, Jie Zuo:
Construction of a heterogeneous information network by fusing multi-source biomedical data. 60:1-60:2
ACM SIGSAC China
- Zhaoyang Han

, Liang Liu, Zhe Liu:
An efficient access control scheme for smart lock based on asynchronous communication. 61:1-61:5 - Junlang Zhan, Xuan Liao, Yukun Bao, Lu Gan, Zhiwen Tan, Mengxue Zhang, Ruan He, Jialiang Lu:

An effective feature representation of web log data by leveraging byte pair encoding and TF-IDF. 62:1-62:6 - Ke Ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma

, Zhenxiang Chen:
Abnormal telephone identification via an ensemble-based classification framework. 63:1-63:6 - Jie Ma

, Bin Qi, Kewei Lv:
Fully private auctions for the highest bid. 64:1-64:6 - Xuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen:

Adversarial attack against scene recognition system for unmanned vehicles. 65:1-65:6 - Yuanyuan Ma, Xiangyang Luo, Zhenyu Li, Yi Zhang, Adrian G. Bors

:
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion. 66:1-66:5 - Jia Fan, Zhen Wang, Yili Luo, Jian Bai, Yarong Li, Yao Hao:

A new stealth address scheme for blockchain. 67:1-67:7 - Guishan Dong, Yuxiang Chen, Jia Fan, Jian Bai, Peng Zhang, Feng Li:

Anonymous cross-domain authentication scheme for medical PKI system. 68:1-68:7
ACM SIGCSE China
- Ming Zhang

, Yichun Yin:
More Chinese women needed to hold up half the computing sky. 69:1-69:4 - Wei Wang, Libo Huang, Dong Guo, Yanjun Xu, Fenglin Bi, Jun Tang:

MOOBench: towards massive open online workbench. 70:1-70:6 - Yigong Pan, Guangzhong Sun:

CLS-PROG: an intelligent tool for classifying programs in online judge systems. 71:1-71:6 - Xia Sun, Xu Zhao, Yuan Ma, Xinrui Yuan, Feijuan He, Jun Feng:

Muti-behavior features based knowledge tracking using decision tree improved DKVMN. 72:1-72:6 - Shengjun Yin, Qingda Shang, Hongzhi Wang, Boxuan Che:

The analysis and early warning of student loss in MOOC course. 73:1-73:6 - Feng Xiong, Kaifa Zou, Zhemin Liu, Hongzhi Wang:

Predicting learning status in MOOCs using LSTM. 74:1-74:5 - Nannan Wu, Lei Zhang, Yi Gao, Mingfei Zhang, Xia Sun, Jun Feng:

CLMS-Net: dropout prediction in MOOCs with deep learning. 75:1-75:6 - Jun Na, Yuan Liu:

A quantitative revision method to improve usability of self-and peer assessment in MOOCs. 76:1-76:6 - Wenying Kang, Lei Zhang, Bo Li, Jing Chen, Xia Sun, Jun Feng:

Personalized exercise recommendation via implicit skills. 77:1-77:6 - Yu He, Xinying Hu, Guangzhong Sun:

A cognitive diagnosis framework based on peer assessment. 78:1-78:6 - Bo Jiang, Wei Xu, Chunlin Guo, Wenqi Liu, Wenqing Cheng:

A classroom concentration model based on computer vision. 79:1-79:6 - Yaling Zhang, Bei Wu:

Research and application of grade prediction model based on decision tree algorithm. 80:1-80:6 - Qing Sun, Ji Wu, Kaiqi Liu:

How are students' programming skills developed: an empirical study in an object-oriented course. 81:1-81:6 - Dapeng Qu, Songlin Wu:

A competition-oriented student team building method. 82:1-82:2 - Shu Yin, Yingdong Zhang, Xiaomin Zhu:

Experience reports for teaching operating systems towards increasing-sized classes. 83:1-83:2 - Kun Ma

, Bo Yang, Kun Liu:
Automated grading of collaborative software engineering training with cloud distributing scripts. 84:1-84:2 - Bin Xu, Fan Gao, Kening Gao, Changkuan Zhao, Dan Yang:

Measuring code similarity using word mover's distance for programming course. 85:1-85:2 - Yun Zhou, Weidong Bao, Xiaomin Zhu:

Engineering cognition oriented cultivation method of innovative quality based on learning-by-doing. 86:1-86:2 - Lynne L. Grewe, Chengzi Hu:

Assisting with frustration in learning via machine learning and computer vision. 87:1-87:2 - Junmin Zhao, Dengao Li, Xiaoyu Wang, Xiaohong Bai, Shasha Zhuang:

Research on the cultivation of new engineering talents based on educational big data. 88:1-88:2
ACM SIGAI China
- Yujia Zhang, Michael Kampffmeyer, Xiaoguang Zhao, Min Tan:

DTR-GAN: dilated temporal relational adversarial network for video summarization. 89:1-89:6 - Junxian Ye, Le Dong, Wenpu Dong, Ning Feng, Ning Zhang:

Policy multi-region integration for video description. 90:1-90:5 - Xiaoran Qin, Yafeng Zhou, Yonggang Li, Siwei Wang, Yongtao Wang, Zhi Tang:

Progressive deep feature learning for manga character recognition via unlabeled training data. 91:1-91:6 - Tong Sun, Jia Wang, Jing Ni, Yu Cao, Benyuan Liu:

End-to-end deep learning based trading platform and its evaluation. 92:1-92:5 - Mohammad Nuruzzaman, Omar Khadeer Hussain

:
Identifying facts for chatbot's question answering via sequence labelling using recurrent neural networks. 93:1-93:7 - Jingyu Zhuang

, Ziliang Chen, Junyi Zhang, Dongyu Zhang, Zhaoquan Cai:
Domain adaptation for retinal vessel segmentation using asymmetrical maximum classifier discrepancy. 94:1-94:6 - Liyao Yao, Zexi Hu

, Caixing Liu, Hanxing Liu, Yingjie Kuang, Yuefang Gao:
Cow face detection and recognition based on automatic feature extraction algorithm. 95:1-95:5 - Junyi Zhang, Ziliang Chen, Junying Huang, Jingyu Zhuang, Dongyu Zhang:

Few-shot domain adaptation for semantic segmentation. 96:1-96:6 - Hongwei Feng, Shuang Li, Dianyuan He, Jun Feng:

A novel feature selection approach based on multiple filters and new separable degree index for credit scoring. 97:1-97:5 - Jiefu Chen, Xing Xu, Yanli Ji, Hua Chen:

Learning to create multi-stylized Chinese character fonts by generative adversarial networks. 98:1-98:6 - Lili Huang, Hefeng Wu, Guanbin Li, Qing Wang:

Instruction-guided object detection. 99:1-99:6 - Xu Xie, Hangxin Liu, Zhenliang Zhang, Yuxing Qiu

, Feng Gao, Siyuan Qi, Yixin Zhu, Song-Chun Zhu:
VRGym: a virtual testbed for physical and interactive AI. 100:1-100:6 - Xiu Li, Rujiao Long, Kun Jin:

DeepFuse neural networks. 101:1-101:5 - Tingting Liang, Qijie Zhao, Zhuoying Wang, Kaiyu Shan, Huan Zhang, Yongtao Wang, Zhi Tang:

Pyramidal region context module for semantic segmentation. 102:1-102:6 - Xiaolu Hui, Riquan Chen, Tianshui Chen:

Graph attention propagation for few-shot learning. 103:1-103:4 - Duo Xu, Yonghui Dai, Weihui Dai

:
Smart recommendation of personalized cloud music service based on mental model. 104:1-104:6 - Kai Gao, Pingping Zhang, Yan Liu, Ziqin Zhou, Gang Yang, Huchuan Lu:

Deep mutual learning for visual tracking. 105:1-105:5
ACM SIGAPP China
- Xupeng Wang, Zhongwen Guo, Xi Wang, Shiyong Liu, Wei Jing, Yuan Liu:

NNMLInf: social influence prediction with neural network multi-label classification. 106:1-106:5 - Hanjiang Luo, Chao Liu, Yongquan Liang:

A SDN-based testbed for underwater sensor networks. 107:1-107:4 - Chao Liu, Yingbin Li, Ruobing Jiang, Feng Hong, Zhongwen Guo:

OceanNet: a low-cost large-scale maritime communication architecture based on D2D communication technology. 108:1-108:6 - Md. Asif Hasan, Haiming Chen, Yimo Lin, Xiwen Liu:

WiPi: an extendable edge platform for building time-critical cyber-physical-human systems. 109:1-109:5 - Lynne L. Grewe, Garrett Stevenson

:
Seeing eye drone: a deep learning, vision-based UAV for assisting the visually impaired with mobility. 110:1-110:5 - Xurong Yan, Feng Hong, Zhaoran Huo:

Research on application recognition technology based on user's touch screen behavior. 111:1-111:4 - Pengpeng Chen, Di Che, Yuqing Yin:

A survey on visible light positioning from the hardware perspective. 112:1-112:5 - Jikun Guo, Huihui Li:

RSWI: a rescue system with wifi sensing and image recognition. 113:1-113:4 - Wei Guo:

Management system for secure mobile application development. 114:1-114:4 - Di Fan, Shuai Fang, Xiaoxin Liu, Yongyi Li, Shang Gao:

A multi-scale face detection algorithm based on improved SSD model. 115:1-115:9
ACM TURC-AIS
- Liang He, Chao Shen, Yun Li:

A conditional-probability zone transformation coding method for categorical features. 116:1-116:6 - Mian Sun, Li Li, Shanqing Zhang, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:

A copy detection algorithm for game character concept design based on pose features. 117:1-117:8 - Jun Zhang, Ping-ping Xia, Juan Zhang, Haiyun Peng:

A healthy node selection method based on particle swarm optimization under network intrusion environment. 118:1-118:7 - Ligong Chen, Zhaohui Zhang, Qiuwen Liu, Lijun Yang, Ying Meng, Pengwei Wang:

A method for online transaction fraud detection based on individual behavior. 119:1-119:8 - Jianfeng Lu, Weiling Cheng, Shanqing Zhang, Li Li:

A novel data hiding algorithm for game texture based on Hamming+1. 120:1-120:8 - Ying Meng, Zhaohui Zhang, Wenqiang Liu, Ligong Chen, Qiuwen Liu, Lijun Yang, Pengwei Wang:

A novel method based on entity relationship for online transaction fraud detection. 121:1-121:10 - Liangbo Xie, Mu Zhou, Xiaolong Yang, Wei Nie, Yong Wang:

A passive wireless temperature sensor tag compatible with EPC Gen2 UHF RFID protocol. 122:1-122:10 - Qianqian Hu, Ying Zhang, Ziyan Zhao, Wei Jia:

A quantum handshake method based on quantum dialogue and wireless network. 123:1-123:7 - Wei Jia, Ying Zhang, Hao Yu, Yuxiang Bian:

A quantum key distribution protocol based on LDPC error correcting codes. 124:1-124:7 - Mingda Wang, Hangyu Hu, Guangmin Hu:

A survey on traffic-behavioral profiling of network end-target. 125:1-125:7 - Fengjie Deng, Yubo Song

, Aiqun Hu, Min Fan, Yu Jiang:
Abnormal traffic detection of IoT terminals based on Bloom filter. 126:1-126:7 - Ruixi Yang, Hongxia Wang, Wen Dou:

Acoustic event detection with two-stage judgement in the noisy environment. 127:1-127:7 - Baowei Wang, Weiwen Kong, Hui Guan:

Air quality forcasting based on gated recurrent long short-term memory model. 128:1-128:9 - Zhuoheng Li, Jian Liu, Yueyun Chen:

An energy-efficient resource allocation strategy for vehicular networks. 129:1-129:8 - Jing Wang, Anqi Hou, Yuanfei Tu:

An improved dv-hop localization algorithm based on centroid multilateration. 130:1-130:6 - Suhan Pan, Zhiqiang Li, Juan Dai:

An improved TextRank keywords extraction algorithm. 131:1-131:7 - Jian Liu, Mingxuan Fu, Shasha Zhang:

Application of convolutional neural network in automatic classification of arrhythmia. 132:1-132:8 - Weibo Yang, Peiwei Gao, Hailong Peng, Xiangmin Zhao:

Application of particle filter to concrete freeze-thaw prognosis. 133:1-133:7 - Zheng Fang, Xiongwei Zhang, Xiaotong Deng, Tieyong Cao, Changyan Zheng:

Camouflage people detection via strong semantic dilation network. 134:1-134:7 - Jian Liu, Yanzhong Wang, Yalin Yuan, Yinghua Zhang:

Channel estimation optimization algorithm based on OFDM system. 135:1-135:7 - Wen Dou, Hongxia Wang, Ruixi Yang:

Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environment. 136:1-136:8 - Yingjie Wang, Xing Liu, Weixuan Mao, Wei Wang:

DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. 137:1-137:9 - Xianbo Li, Naiguang Zhang, Qian Wang, Feng Dai, Ziyu Xue:

Deep super-resolution based hashing for image retrieval. 138:1-138:7 - Lilly-Abau Yosia Odwa, Yueyun Chen, Zhiyuan Mai:

Detection of primary user emulation attack based on modified adaptive orthogonal matched pursuit for cognitive radio networks in HCRAN. 139:1-139:7 - Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu:

Enhanced branch obfuscation based on exception handling and encrypted mapping table. 140:1-140:9 - Jinhai Li, Zhunan Qian, Peng Zhang, Youshi He:

Hybrid recommendation algorithm based on multi-attribute rating from online reviews. 141:1-141:7 - XiaoFeng Chen, Hao Wang, Wei Xiang:

Implementation of Tibetan-Chinese translation platform based on LSTM algorithm. 142:1-142:5 - Yubo Song

, Qiang Huang, Junjie Yang, Ming Fan, Aiqun Hu, Yu Jiang:
IoT device fingerprinting for relieving pressure in the access control. 143:1-143:8 - Li Dong, Jiantao Zhou, Cuiming Zou, Yulong Wang:

Iterative first-order reverse image filtering. 144:1-144:5 - Xiaofeng Dong, Zhipeng Yang, Jing Peng, Xi Wu:

Multimodality white matter tract segmentation using CNN. 145:1-145:8 - Guang Sun, Fenghua Li, Jiayi Ren, Hongzhang Lv, Yanfei Xiao, Yingchao Wang:

On data visualization for securities investment fund analysis. 146:1-146:11 - Xudong Tang, Chen Xue, Tao Wu, Tiejun Wang:

Optimization of parallel program based on lattice BGK method. 147:1-147:7 - Liu Yan, Wenxin Hu, Longzhe Han:

Optimize SPL test cases with adaptive simulated annealing genetic algorithm. 148:1-148:7 - Liu Yan, Wenxin Hu, Longzhe Han:

Parallel architecture design of genetic algorithms on HPC platform. 149:1-149:7 - Xuemeng Zhai, Hangyu Hu, Guangmin Hu, Youyang Qu:

PRBL: a personalized recommendation system based on bipartite network projection and link community detection. 150:1-150:7 - Xianyu Wu, Canghong Shi

, Xiaojie Li, Jia He, Xi Wu, Jiancheng Lv, Jiliu Zhou:
PWGAN: wasserstein GANs with perceptual loss for mode collapse. 151:1-151:7 - Wei Jia, Bao Feng, Hao Yu, Yuxiang Bian:

Quantum key distribution protocol based on CSS error correcting codes. 152:1-152:8 - Qianqian Hu, Tianzi Sun, Bao Feng, Wei Jia:

A quantum key distribution scheme based on quantum error-avoiding code in decoherence-free subspace. 153:1-153:7 - Hong Lai, Liling Zhang, Yanrong Zhu:

Quantum secure direct communication based on orbital angular momentum. 154:1-154:10 - Yangyu Liu, Yueyun Chen, Meijie Yang, Zushen Liu:

Ratio fairness-based power allocation and user scheduling for downlink NOMA heterogeneous networks. 155:1-155:7 - Jin Shi, Peng Jin, Siyu Gu:

Research on credit distribution of cooperative papers according to authors' rank. 156:1-156:7 - Yan Wang, Xiaoyu Chang, Jingjing Han, Yugang Li:

Research on impact evaluation of ISO standards on China's GB based on C4.5 model. 157:1-157:7 - Hui Zeng

, Anjie Peng, Xiaodan Lin, Shenghai Luo:
Source smartphone identification for digital zoomed images. 158:1-158:6 - Guang Sun, Yingjie Song, Ziqin Gong, Xiya Zhou, Xinyi Zhou, Yilin Bi:

Survey on streaming data computing system. 159:1-159:8 - Yan Wang, Xuteng Wang, Yugang Li, Yufan Zhou:

The construction of movie marketing index based on factor analysis. 160:1-160:7 - Yan Xiong, Hong Lai:

The improved protocol based on the Bennett 92 protocol. 161:1-161:9 - Chen Chao, Tian Shan, Li Mei-Yan, Xiao Xiao:

The prediction model of initial flowering based on accumulated temperature of different species peach in Longquanyi. 162:1-162:7 - Shi Lin, Fu Pu, Li Cui:

Three attacks of certificateless aggregate signature scheme. 163:1-163:6 - Yan Zheng, Meijuan Yin, Junyong Luo, Gongzhen He:

Truth discovery on multi-dimensional properties of data sources. 164:1-164:8 - Yangyang Gao, Yangyang Li, Yue Jia:

Video computing across trust domains based on blockchain. 165:1-165:9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














