


default search action
CIAT 2020: Virtual Event / Guangzhou, China
- Zhihong Tian, Lihua Yin, Zhaoquan Gu:

CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 - Aihua Liu, Dehua Kong:

A Study on the College English Ecological Teaching Mode Based on Artificial Intelligence. 1-6 - Wei Zhang, Chifu Yang, Feng Jiang, Xianzhong Gao, Kai Yang:

A super-resolution method of combined color image with depth map based on deep learning. 7-11 - Yang Zhao:

Application of K-means clustering algorithm in human resource data informatization. 12-16 - Yingbo Wang, Jun Li, Hui Li:

GMCAST: A novel multicast algorithm of three-layer graphite structure in wireless data center network. 17-21 - Xiajiong Shen, Lijie Bao, Lei Zhang:

Research on Visualization Algorithm of Association Rules Based on Concept Lattice. 22-27 - Yan Sun, Weifeng Ji, Jiang Weng, Beiying Zhao, Yingqi Li, Xuan Wu:

Selection of Optimal Strategy for Moving Target Defense Based on Signal Game. 28-32 - Jiguang Lv, Liang Bing, Dapeng Man:

Indoor tracking algorithm based on simplified Sage-Husa adaptive filter. 33-38 - Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:

A Novel Malware Detection Framework Based on Weighted Heterograph. 39-43 - Chao Xu, Zhongqing Yu, Jinhua Li, Xixin Yang:

Modeling and Optimization of HVAC System Based on GA-ANFIS Algorithm. 44-53 - Yinyin Li, Xiaoyu Du, Sufang Zhou:

A lightweight identity authentication scheme for UAV and road base stations. 54-58 - Xiajiong Shen, Peng Zhang, Jiyong Yang, Wan Chen, Lei Zhang:

Research on Object-oriented Exploration Algorithm. 59-64 - Xiaoyu Du, Zhiyu Zhao, Zhijie Han, Bo Wang:

Data center network acquisition symptom algorithm based on Hamiltonian Cycle. 65-69 - Su Jiang, Yunxin Huang, Fuhan Zhang:

Deep Learning Reconstruction Method of Meteorological Radar Echo Data based on Satellite Data. 70-74 - Huiran Zhao, Lei Shi:

Application of license plate image recognition technology in intelligent parking lot. 75-79 - Jingwei Li, Chong Zhang, Xiangzhan Yu:

Webpage visual feature extraction and similarity algorithm. 80-85 - Xuan Ma, Huiyong Liu:

Research on automatic parameter selection and parallelization of DBSCAN algorithm. 86-94 - Daojun Han, Hongzhen Xiang, Haolin Chen, Yi Xie:

Research on Penetration Strategy of UAV. 95-102 - Jian Yang, Hao Wang, Yueming Lu:

Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning. 103-108 - Haowen Chen, Jinyu Xu, Chao Wu:

Multi-UAV task assignment based on improved Wolf Pack Algorithm. 109-115 - Weiguo Wang, Zhaoquan Gu, Keke Tang

:
An Improved Algorithm for Bert. 116-120 - Fuyang Fang, Daojuan Zhang, Chonghua Wang, De Zhang, Yuanfei Zhang, Chao Li

, Xi Luo, Ye Fu:
Identification of important nodes on large-scale Internet based on unsupervised learning. 121-129 - Ruihui Hou, Hanhao Li, Honghai Feng, Yunpeng Li, Jun Li, Yatian Shen:

An entity relation extraction algorithm based on BERT(wwm-ext)-BiGRU-Attention. 130-135 - Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:

A defense scheme of voice control system against DolphinAttack. 136-142 - Yaju Wei, Hanhao Li, Honghai Feng, Pengcheng Zhou, Xuzhao Lu, Yatian Shen:

Simultaneous learning algorithm for multiple sets of synonyms with different semantics. 143-147 - Xiandong Xu:

Comparation of several mapping methods for humanoid robot. 148-152 - Xiaoye Lu, Junyan Chen, Liaochuo Lu, Xuefeng Huang, Xiantao Lu:

SDN routing optimization based on improved Reinforcement learning. 153-158 - Rui Liu, Xiangzhan Yu:

A Survey on Encrypted Traffic Identification. 159-163 - Suyu Huang, Bo Zhang:

Research and improvement of k-means parallel multi-association clustering algorithm. 164-168 - Fengbin Zheng, Li Ding, Lanxue Dang

:
Location Rating Based on Graph Neural Network. 169-175 - Jie Li, Shuai Ding, Xiaoyu Du, Zhijie Han:

The Analysis of Hamiltonian based on HCN network topology. 176-180 - Shicong Chen, Shuhua Huang, Deyu Yuan, Xiaofan Zhao:

A Survey of Algorithms and Applications Related with Graph Embedding. 181-185 - Yinyu Lyu, Chenwei Liu, Hao Tan, Rui Xie, Keke Tang

, Zhaoquan Gu:
Convolutional Neural Network based Timbre Classification. 186-191 - Tao Zhang, Yu Jiang, Runsheng Guo, Xiaoran Zheng, Hui Lu:

A Survey of Hybrid Fuzzing based on Symbolic Execution. 192-196 - Wenxin Wang, Bin Jiang, Xudong Tan, Chao Li:

UAV communication interference analysis and anti-interference methods. 197-201 - Dapeng Man, Liang Bing, Jiguang Lv:

Indoor Localization Algorithm based on Attribute-Independent Weighted Naive Bayesian. 202-207 - Chenhui Zhao, Bo Zhang:

Research on the ideology monitoring system of cyberspace legal security based on Neural Network. 208-212 - Dehua Kong, Hongyan Dong, Huyuan Li, Zhuowei Wang, Jiang Li:

Research on Situation Analysis Technology of Network Security Incidents. 213-218 - Bo Zhang, Dehua Kong:

Dynamic estimation model of insurance product recommendation based on Naive Bayesian model. 219-224 - Botao Lu, Bo Zhang:

Research on the current situation and development of intelligent campus construction in private universities. 225-229 - Xiao-Fan Wang, Tianyang Zhou, Junhu Zhu:

Network security assessment based on full host-based attack graph. 230-235 - Zheng Li, Zhikang Shi, Xueyuan Huang, Di Jin, Chun Liu:

An Approach for Constructing Service Developers Oriented Heterogeneous Information Network. 236-243 - Yunzu Song, Xiangzhan Yu, Jianning Huo, Haijie Wang:

Design and implementation of web page classification tool based on word vector. 244-249 - Hang Yang, Yi Zhang, Pingping Zhao, Xiaoman Cheng, Qian Huang:

A privacy protection secure communication protocols for the Industrial Internet of Things. 250-255 - Xueying Zhang, Jun Li, Daojuan Zhang, Jianlei Gao, Hao Jiang:

Research on feature selection for cyber attack detection in industrial Internet of Things. 256-262 - Xiaobing Zhu, Bo Zhang, Yi Han, Youxin Li, Yang Yang, Lilun Yang:

The Influence of Different Network Push Modes on Freshmen's Psychological Adaptation. 263-266 - Jianbo Xiao, Qiaobin Zhang, Wei Nie:

Research on Safety Control Strategy of Ship Monitoring System Based On Information Flow Control between Heterogeneous Networks. 267-270 - Xinda Cheng, Ning Hu, Chi Zhang, Yan Zhao:

Fading with the Time: A Traceless Access Scheme for Anonymous Communication Network. 271-276 - Xiaowen Wang, Jie Huang, Chunyang Qi:

FDI: A Fast IoT Device Identification Approach. 277-282 - Zhuobo Tan, Hui Lu:

A Systemic Review of Kernel Fuzzing. 283-289 - Tao Liu:

Informatization construction of human resource management in retail industry based on SaaS platform. 290-294 - Senlin Zhang, Zhentai Longyuan, Yueming Lu:

Blockchain-Based Power Metering Data Abnormal Monitoring Model Electric Energy Data Abnormal Monitoring Model. 295-302 - Jinyin Chen, Longyuan Zhang, Haibin Zheng, Qi Xuan:

SPA: Stealthy Poisoning Attack. 303-309 - Hao Wang, Jian Yang, Yueming Lu:

A Logical Combination Based Application Layer Intrusion Detection Model. 310-316 - Yuhao Han, Zhiting Xiong:

Fly-Manager: Enabling Efficient and Reliable Management of High-performance Network Chip. 317-323 - Yingyi Tong, Wenhan Dong, Chenfei Zhai:

Multi-UAV Collaborative Online Obstacle Avoidance Track Planning. 324-329 - Zhijie Han, Yinyun Fu, Xiaoyu Du:

Review of the embedding of hypercube and its variants. 330-334 - Shi Yin, Yu Teng, Ning Hu, Xu Dong Jia

:
Decentralization of DNS: Old Problems and New Challenges. 335-341 - Jiayou Shang, Xiaofeng Wang, Yang Chen, Zhaohong Deng:

Mapping approach for multiscale emulation networks in heterogeneous environments. 342-347 - Xiaofan Zhang, Haibo Huang, Lina Zhu, Yibo Wei, Yangyang Li, Muyijie Zhu, Jiahui Zheng, Xi Luo:

Exploration and practice of industrial control system information security incident emergency exercise. 348-354 - Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:

Resume Extraction and Validation from Public Information. 355-359 - Yuzheng Liu, Chengbo Wang, Weiping Wang, Shanshan Wei, Chengfeng Xue:

An Online Computation Offloading Based on Auction Mechanism in Mobile Ad Hoc Networks. 361-367 - Luqin Lv, Yueming Lu:

Multi-source and multi-dimensional network security situational awareness model. 368-373 - Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:

An APT Group Knowledge Model based on MDATA. 374-378 - Hua Tong, Jie Huang, Chunyang Qi:

A Novel Lightweight Cryptography Scheme Based on Standardized IOT Data. 379-386 - Chi Zhang, Ning Hu, Xinda Cheng, Yan Zhao:

ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet Channels. 387-393 - Zijia Wang, Han-Teng Liao

, Jiacheng Lou, Yu Liu:
Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital Transformation. 394-400 - Li Zhao, Bo Zhang, Jiang Li:

Research on Data Approximation Search Privacy Protection in Cloud Environment. 401-406 - Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu:

From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding. 407-413 - Junping Wan, Hao Xun, Xianrong Zhang

, Jiyuan Feng, Zhe Sun:
A privacy-preserving and correctness audit method in multi-party data sharing. 414-419 - Daojuan Zhang, Kexiang Qian, Wenhui Wang, Fuyang Fang, Chonghua Wang, Xi Luo:

Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data. 420-424 - Qubo Yang, Xiaobing Zhu:

Research on smart party building identity online based on blockchain. 425-430 - Yufeng Shi, Jinxin Zuo, Yihong Guo, Yueming Lu:

Distributed File System Multilevel Fault-Tolerant High Availability Mechanism. 431-438 - Qinan Li, Zhihao Xue:

A Privacy-Protecting Authorization System Based on Blockchain and zk-SNARK. 439-444 - Chao Zhang, Donggang Yang, Chu Chen, Pinghong Ren:

Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications. 445-450 - Qi Liu, Hongwei Ruan, Hua Li, Xiaodi Li, Xianrong Wang:

REAL-GUARD: A Machine Learning based Real-time Mechanism for Combining Packet and Flow Features to Mitigating Network Attacks in SDN. 451-458 - Xiajiong Shen, Kunying Meng, Zhongli Guo, Lei Zhang:

Convolutional Long-Short Term Memory Network for convective weather prediction based on 3D Doppler radar data. 459-464 - Yong Zhang:

Human resource data quality management based on multiple regression analysis. 465-470 - JiuJin Wang, Xu Gu, Xiangzhan Yu:

Early Analysis and Detection of Compressed Traffic. 471-476 - Tao Liu, Xiaohong Cao, Jin Li, Shaocheng Wu, Xiaowei Chen, Yueming Lu:

Blockchain-based privacy protection scheme for electric energy metering data. 477-483 - Ziyuan Li, Wangshu Guo, Quan Xu, Yingjie Xu, Huimei Wang, Ming Xian:

Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching Rules. 484-489 - Liang Yuan, Gang Shen:

A Training Scheme of Deep Neural Networks on Encrypted Data. 490-495 - Xiaodong Wang, Wenxu Jia, Hua Qin:

An improved secure and efficient certificateless conditional privacy-preserving authentication scheme in VANETs. 496-503 - Haoren Ke, Hao Wu, Dongmei Yang:

Towards Evolving Security Requirements of Industrial Internet: A Layered Security Architecture Solution based on Data transfer Techniques. 504-511 - Yanru Kong, Jiawu Yue:

Game Studies on Accounting Entity Behavior Based on Blockchain Technology. 512-518 - Guangchen Yu, Juan Ma, Ji Wang:

Proof of Retrievability for Image Data in Industrial Cloud Platform. 519-523 - Shen He, Jun Fu, Wen Jiang, Yexia Cheng, Jiake Chen, Zhihui Guo:

BloTISRT: Blockchain-based Threat Intelligence Sharing and Rating Technology. 524-534 - Tao Liu, Xiaohong Cao, HeFang Jiang, Jinwen Xi, Shaocheng Wu, Yueming Lu:

Research and Application of Blockchain Technology in Smart Grid. 535-542 - Kaiyu Shi, Xiangzhan Yu, Yue Zhao:

Fuzzing Improving Techniques Applied and Evaluated on a Network Traffic Analysis System. 543-548 - Jiaxi Liu, Lin Ye, Hongli Zhang, Xiaoding Guo:

Named entity recognition of legal judgment based on small-scale labeled data. 549-555 - Tao Liu, Shaocheng Wu, Jin Li, Yue Ma, Fenghui Duan, Yueming Lu:

Blockchain-based trusted sharing of electric energy privacy data. 556-564 - Xiaobing Zhu, Bo Zhang, Qubo Yang, Silan Zhu, Zhihua He, Luyun Chen:

The Integrated Model of Online and Offline Education and Training of Student Activists. 565-569 - Qiong Wu, Bo Zhang:

The Influence of Internet Finance on the Traditional Business of Commercial Banks. 570-575 - Zhijie Han, Panpan Meng, Xiaoyu Du:

DSnow: A Durer pentagon Snow structure for data center network. 576-581 - Xiandong Xu, Xiang Yu:

A network digital works protection method based on digital watermarking and intrusion detection. 582-586

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














