


default search action
19th CollaborateCom 2023: Corfu Island, Greece - Part II
- Honghao Gao, Xinheng Wang, Nikolaos S. Voros:

Collaborative Computing: Networking, Applications and Worksharing - 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 562, Springer 2024, ISBN 978-3-031-54527-6
Deep Learning and Applications
- Mingchu Li, Wanying Qi, Shuai Li:

Task Offloading in UAV-to-Cell MEC Networks: Cell Clustering and Path Planning. 3-19 - Shuwei Qian

, Ming Guo
, Zhicheng Fan
, Mingcai Chen
, Chongjun Wang
:
LAMB: Label-Induced Mixed-Level Blending for Multimodal Multi-label Emotion Detection. 20-38 - Fan Wang, Bin Wang, Fuyong Xu, Jiaxin Li, Peiyu Liu:

MSAM: Deep Semantic Interaction Network for Visual Question Answering. 39-56 - Qian Yao

, Xinli Xiong, Peng Wang, Yongjie Wang:
Defeating the Non-stationary Opponent Using Deep Reinforcement Learning and Opponent Modeling. 57-78 - Han Zhao

, Shiyun Shao
, Yong Ma
, Yunni Xia
, Jiajun Su
, Lingmeng Liu
, Kaiwei Chen
, Qinglan Peng
:
A Multi-Agent Deep Reinforcement Learning-Based Approach to Mobility-Aware Caching. 79-95 - Gongju Wang, Yulun Song, Yang Li, Mingjian Ni, Long Yan, Bowen Hu, Quanda Wang, Yixuan Li, Xingru Huang:

D-AE: A Discriminant Encode-Decode Nets for Data Generation. 96-114 - Hui Chen, Bo Wang, Ke Yang, Yi Song:

ECCRG: A Emotion- and Content-Controllable Response Generation Model. 115-130 - Jiayu Chang, Tian Liang

, Wanzhi Xiao, Li Kuang:
Origin-Destination Convolution Recurrent Network: A Novel OD Matrix Prediction Framework. 131-150 - Jie Xu, Jian Wan, Xin Zhang:

MD-TransUNet: TransUNet with Multi-attention and Dilated Convolution for Brain Stroke Lesion Segmentation. 151-170
Graph Computing
- Hongxia He, Xi Li, Peng Chen

, Juan Chen, Weijian Song, Qinghui Xi:
DGFormer: An Effective Dynamic Graph Transformer Based Anomaly Detection Model for IoT Time Series. 173-188 - Jun Zhang, Chunyu Wang, Shunli Wang, Lihua Zhang

:
STAPointGNN: Spatial-Temporal Attention Graph Neural Network for Gesture Recognition Using Millimeter-Wave Radar. 189-204 - Baoke Li, Cong Cao

, Fangfang Yuan
, Yuling Yang, Majing Su, Yanbing Liu
, Jianhui Fu:
NPGraph: An Efficient Graph Computing Model in NUMA-Based Persistent Memory Systems. 205-222 - Yijing Zhao, Yumeng Liu, Zihang Wan, Hongan Wang:

tHR-Net: A Hybrid Reasoning Framework for Temporal Knowledge Graph. 223-241 - Ruoting Wu

, Yuxin Zhang
, Liang Chen
:
Improving Code Representation Learning via Multi-view Contrastive Graph Pooling for Abstract Syntax Tree. 242-261
Security and Privacy Protection
- Xincai Peng, Shancang Li, Shuai Zhang, Muddesar Iqbal:

Protect Applications and Data in Use in IoT Environment Using Collaborative Computing. 265-280 - Min Li, Shizhan Chen, Guodong Fan, Lu Zhang, Hongyue Wu, Xiao Xue, Zhiyong Feng:

Robustness-Enhanced Assertion Generation Method Based on Code Mutation and Attack Defense. 281-300 - Yilin Liu, Yujue Wang, Chen Yi, Yong Ding, Changsong Yang, Huiyong Wang:

Secure Traffic Data Sharing in UAV-Assisted VANETs. 301-320 - Ya-Nan Cao, Yujue Wang, Yong Ding, Zhenwei Guo, Changsong Yang, Hai Liang:

A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid. 321-340 - Jingrun Ma, Xiaolin Xu, Tianning Zang, Xi Wang, Beibei Feng, Xiang Li:

A Semi-supervised Learning Method for Malware Traffic Classification with Raw Bitmaps. 341-356 - Houming Qiu

, Kun Zhu:
Secure and Private Approximated Coded Distributed Computing Using Elliptic Curve Cryptography. 357-374 - Weijian Song, Peng Chen

, Juan Chen, Yunni Xia, Xi Li, Qinghui Xi, Hongxia He:
A Novel Semi-supervised IoT Time Series Anomaly Detection Model Using Graph Structure Learning. 375-391 - Yuxin Zhang

, Ruoting Wu
, Jie Liao
, Liang Chen
:
Structural Adversarial Attack for Code Representation Models. 392-413 - Yang Li, Qingyang Zhang, Wenwen Cao, Jie Cui, Hong Zhong:

An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications. 414-434
Processing and Recognition
- Qinkai Jiang, Jiaxing Wang, Bin Cao, Jing Fan:

SimBPG: A Comprehensive Similarity Evaluation Metric for Business Process Graphs. 437-457 - Tong Lu

, Zhiwei Qi, Kun Yue, Liang Duan:
Probabilistic Inference Based Incremental Graph Index for Similarity Search on Social Networks. 458-473 - Yakun Huang, Wenwei Li, Shouyi Wu, Xiuquan Qiao, Meng Guo, Hongshun He, Yang Li:

Cloud-Edge-Device Collaborative Image Retrieval and Recognition for Mobile Web. 474-494 - Shaojiang Deng, Huaxiu Luo, Huafeng Qin, Yantao Li:

Contrastive Learning-Based Finger-Vein Recognition with Automatic Adversarial Augmentation. 495-513 - Yuyu Yin, Qianhui Di, Yuanqing Zhang, Tingting Liang, Youhuizi Li, Yu Li:

Multi-dimensional Sequential Contrastive Learning for QoS Prediction. 514-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














