


default search action
CNCIT 2023: Qinghai, China
- Proceedings of the 2nd International Conference on Networks, Communications and Information Technology, CNCIT 2023, Qinghai, China, June 16-18, 2023. ACM 2023

- Jie Liu

, Mingjie Song
:
Research on Amplitude and Travel Time Image Decentralization Correction in Ultrasonic Imaging Logging. 1-5 - Hao Yang

, Shuning Wei
, Zhi Wang
, Jing Wang
:
A vulnerability detection method based on sparse value flow graphs. 6-10 - Ping Li

, Bang Huang
, Wen-Qin Wang
:
Target detection for MIMO Radar based on reduced-dimension data without training data. 11-16 - Youhui Wang

:
Low signal-to-noise ratio RDSS signal frequency offset estimation algorithm based on GWO-CNN. 17-23 - Shangsheng Gao

, Li Gao
, Qi Li
, Jianjun Xu
:
Application of large language model in intelligent Q&A of digital government. 24-27 - Mai Ye

, Shiming Men
, Lei Xie
, Bing Chen
:
Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoder. 28-34 - Xixing Li

, Qiang Wei
, Zehui Wu
, Wei Guo
:
A comprehensive survey of vulnerability detection method towards Linux-based IoT devices. 35-41 - Yi Liu

, Lin Peng
, Peng Zhang
, Yanlong Qiu
, Sen Zhang
, Xiaowei Guo
, Canqun Yang
:
The Optimization of Multi-physics Application Simulated by Lattice Boltzmann Method Based on Domestic Processors. 42-47 - Yue Yang

, Xu Xu
, Hongye Liu
:
Robust Adaptive Beamforming Based on Steering Vector Estimation and Combined with Sample Covariance Matrix. 48-52 - Weiru Qi

:
Wisdom Tourism System Design in Shaanxi Province of China on Network Technology. 53-58 - Wenxiu Zhang

, Shan Jing
, Chuan Zhao
:
A Survey of SDN Data Plane Attacks and Defense Strategies. 59-65 - Tai Guo

, Haihong Zhan
, Xingde Su
, Tao Wang
:
Anti-intermittent Sampling Jamming Method Based on Random PRI and Intra-pulse Frequency Diversity Radar Waveform. 66-72 - Jinyao Liu

, Xiangyu Bai
, Zhaoran Wang
:
A review of irrigation monitoring based on Internet of Things, remote sensing and artificial intelligence. 73-77 - Jia Wang

, Ziyuan Lu
:
A controllable IPv6 address generation based on conditional variational autoencoder. 78-81 - Qianran Wang

, Jinhua Wang
, Chengbin Huang
:
The Optimization of IPSec VPN in 5G Mobile Communication Network. 82-86 - Mingchu Li

, Dexin Xia
, Wenteng Zhang
:
Dynamic Offloading Task for Internet of Things Based on Meta Supervised Learning. 87-92 - Yuzhe Li

, Bo Li
:
Solving the Performance Issues of Epsilon Estimation Method in Differentially Private ERM: Analysis, Solution and Evaluation. 93-99 - Tianyou Qiu

, Yiping Li
, Xisheng Feng
:
DORM: Distance-based opportunistic routing and medium access protocol for multi-AUV monitoring system. 100-104 - Kun Lu

, Quan Zhou
, Mingchu Li
:
Computation Offloading in E-RAN via Deep Reinforcement Learning. 105-109 - Yi Xie

:
Fast Lane Detection Based on Row Anchor Classification. 110-115 - Xiaoda Xie

, Songlei Jian
, Chenlin Huang
:
LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning. 116-121 - Yuanzhi He

, Huajin Chen
, Changxu Wang
, Yuan Li
, Zhenyu Niu
:
Challenges and Developments of Routing Techniques for Dense LEO Constellations. 122-126 - Xiaowei Zhao

, Lian Zhang
, Mingchu Li
:
Context-Aware Edge Caching Strategy Based On Mobility Prediction. 127-132 - Xiaowei Zhao

, Yuanyuan Zhang
, Mingchu Li
:
Task Migration Optimization Algorithm in Mobile Edge Computing. 133-137 - Zixiang Zhou

, Mingchu Li
:
Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave. 138-142 - Jiawei Liu

:
Location Excitation Network for Multi-modal 3D Object Detection. 143-149 - Ming Zhu

, Yiyang Zhou
, Xiangyang Feng
:
Reputation-based consensus mechanism for digital order transaction alliance chain. 150-154 - Yikun Sun

:
Joint Message Passing: Solving Heterogeneous Graphs Challenges in Few-Shot Object Detection. 155-160 - Yukun Zhai

:
Semantic Queries with Transformer for Referring Image Segmentation. 161-167 - Xiaohui Luo

:
Multi-Label Classification for Postoperative Complication Prediction. 168-171 - Linfeng Dai

:
A study on the application of graph neural network in code clone detection: Improving the performance of code clone detection through graph neural networks and attention mechanisms. 172-176 - Jiang Liu

, Hongbo Lu
, Yiyou Yuan
, Haomin Gu
, Kejun Xie
, Dong Li
, Chencheng Luo
, Gang Wu
, Yueming Song
:
Intelligent Operation and Maintenance Schedule System Based on Knowledge Graph: Construction and Applications. 177-181 - Xue-Song Wang

, Mao-Bin Hu
:
Study on the effect of dynamic self-protection on epidemic spreading. 182-185 - Yuman Wang

, Wenhui Wang
, Xiaoxue Bai
, Bo Hu
, Guangkai Ge
, Kexiang Qian
:
RRDD: An ATT&CK-based ICS Network Security Risk Assessment Method. 186-192 - Meng-Yu Li

, Yuan-Hao Xu
, Shuai Huang
, Mao-Bin Hu
:
The effect of simplicial awareness dissemination on epidemic reaction-diffusion. 193-195 - Shaofeng Li

, Tingyu Wang
, Bo Wan
:
A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-time. 196-200 - Jingyu Hao

:
A Blockchain-based Performance Monitoring Scheme for Cloud Applications. 201-207 - Shengjie Zhou

:
LSTM-GATs: Wind field prediction based on graph attention deep neural network. 208-212 - Mengxi Zhang

, Guangxiang Jin
, Jiangsheng Li
, Min Liu
, Xiao Zhang
, Yufei Shi
, Qi Wei
:
OSU-based power communication network service bearer and slice control mechanism. 213-218 - Ziheng Huang

, Bolin Chen
, Yiting Zhao
:
Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention Mechanism. 219-225 - Song Wei Ge

:
Acoustic Propagation Research And Simulation Based On Bellhop. 226-234 - Tai Yue

, Pengfei Wang
, Lei Zhou
, Xu Zhou
, Gen Zhang
, Kai Lu
, Huijun Wu
:
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting. 235-240 - Ni Zhang

, Wei Dong
, Zehong Xia
, Zhi Feng
, Zhicheng Li
:
Analysis on Technique for Code Obfuscation. 241-245

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














