![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Connection Science, Volume 35
Volume 35, Number 1, December 2023
- Junhui Yu, Yanping Chen, Qinghua Zheng, Yuefei Wu, Ping Chen:
Full-span named entity recognition with boundary regression. - Dongmei Zhao, Guoqing Ji, Shuiguang Zeng:
Network security situation assessment based on dual attention mechanism and HHO-ResNeXt. - Zhihan Xue, Tad Gonsalves:
Monocular vision guided deep reinforcement learning UAV systems with representation learning perception. - Jingzhao Li, Huashun Li, Xiaobo Zhang, Qing Shi:
Monocular vision based on the YOLOv7 and coordinate transformation for vehicles precise positioning. - Jun Wu
, Jiahui Zhu
, Xin Tong
, Tianliang Zhu
, Tianyi Li
, Chunzhi Wang:
Dynamic activation and enhanced image contour features for object detection. - Shujiang Xu
, Jinrong Zhong
, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. - Ryotaro Kamimura:
Impartial competitive learning in multi-layered neural networks. - Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan:
A secure authentication and key agreement scheme with dynamic management for vehicular networks. - Tao Zhang, Chen Wang, Mulmediyage Imantha Udana Chandrasena:
Blockchain-assisted data sharing supports deduplication for cloud storage. - Ning Li
, Ruijie Zhang, Chengyu Zhu, Wei Ou, Wenbao Han, Qionglu Zhang:
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain. - Yang Sun, Jiankun Song, Yong Li, Yi Li, Song Li, Zehao Duan:
IVP-YOLOv5: an intelligent vehicle-pedestrian detection method based on YOLOv5s. - Yong Ren, Yan Ren, Hongwei Tian, Wei Song, Yanhong Yang:
Improving transaction safety via anti-fraud protection based on blockchain. - Feiyi Fang, Junzhu Mao, Wei Yu, Jianfeng Lu:
FPGA-oriented lightweight multi-modal free-space detection network. - Hong Zhao, Chenpeng Zhang, Aolong Wang:
An enhanced text classification model by the inverted attention orthogonal projection module. - S. Ramraj
, G. Usha:
Hybrid feature learning framework for the classification of encrypted network traffic. - Abhilash C. Basavaraju, Kavi Mahesh, Nihar Sanda:
Ontology-based semantic data interestingness using BERT models. - Xiao Liang
, Boran Zhou, Linping Jiang, Guanglei Meng, Yiwei Xiu:
Collaborative pursuit-evasion game of multi-UAVs based on Apollonius circle in the environment with obstacle. - Dazhi Jiang, Runguo Wei, Zhihui He, Senlin Lin, Cheng Liu, Yingqing Lin
:
GASN: gamma distribution test for driver genes identification based on similarity networks. - Erdal Güvenoglu
, Volkan Tunali
:
ZigZag transform with Durstenfeld shuffle for fast and secure image encryption. - Kai Wang
, Yanping Chen, Kunjian Wen, Chao Wei, Bo Dong, Qinghua Zheng, Yongbin Qin:
Cue prompt adapting model for relation extraction. - Xixi Yan
, Pei Yin
, Yongli Tang, Suwei Feng:
A remote sensing encrypted data search method based on a novel double-chain. - Wenjun Zheng, Shunxiang Zhang, Cheng Yang, Peng Hu:
Lightweight multilayer interactive attention network for aspect-based sentiment analysis. - Mengfan Xu
, Xinghua Li:
FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack. - Wei Gao, Weifan Wang, Yaojun Chen:
Isolated toughness and fractional (a,b,n)-critical graphs. - Jia Zhao, Wenhao Wang, Liyuan Zhang, Yan Ding:
Integrate computation intelligence with Bayes theorem into complex construction installation: a heuristic two-stage resource scheduling optimisation approach. - Jing Long, Fei Fang, Cuiting Luo, Yehua Wei, Tien-Hsiung Weng:
MS_HGNN: a hybrid online fraud detection model to alleviate graph-based data imbalance. - Huan Fang, Wangcheng Liu, Wusong Wang, Shunxiang Zhang:
Discovery of process variants based on trace context tree. - Yucong Chen, Xianzhi Tang, Shuaixin Xu, Fangfang Zhu, Qingguo Zhou, Tien-Hsiung Weng:
Analyzing execution path non-determinism of the Linux kernel in different scenarios. - Feixiang Tan
, Guansheng Zheng:
Active learning for deep object detection by fully exploiting unlabeled data. - Bharti Ahuja
, Rajesh Doriya, Sharad Salunke
, Mohammad Farukh Hashmi, Aditya Gupta
, Neeraj Dhanraj Bokde
:
HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system. - Junyan Qiu, Haidong Zhang, Yiping Yang:
Reward estimation with scheduled knowledge distillation for dialogue policy learning. - Yingwen Fu, Nankai Lin
, Zhihe Yang, Shengyi Jiang
:
Towards Malay named entity recognition: an open-source dataset and a multi-task framework. - Kegeng Zhang, Jinyuan Liu, Junshuai Zhong, Yizhou Jing:
Diagnosis of contamination discharge state of porcelain insulators based on GA-CNN. - Mirjana Ivanovic
, Serge Autexier
, Miltiadis Kokkonidis, Johannes Rust:
Quality medical data management within an open AI architecture - cancer patients case. - Sheng Han, Youfang Lin, Zhihui Guo, Kai Lv:
A lightweight and style-robust neural network for autonomous driving in end side devices. - Hang Su, Huangcan Li, Dun Li:
Knowledge reasoning with multiple relational paths. - Fang He, Xiaoxia Wu, Wenyu Zhang, Xiaoling Huang:
A novel bias-alleviated hybrid ensemble model based on over-sampling and post-processing for fair classification. - Jingjing Hu, Xiaojun Xu
, Jin Hao, Xiuqi Yang, Kefan Qiu, Yuanzhang Li:
Microservice combination optimisation based on improved gray wolf algorithm. - Peiqian Liu, Duoduo Wu, Zihao Shen
, Hui Wang:
Trajectory privacy data publishing scheme based on local optimisation and R-tree. - Pengzhen Zhou, Huifu Zhang, Wei Liang:
Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm. - Wenkang Liu, Yuxuan He, Xiaoliang Wang, Ziming Duan, Wei Liang, Yuzhen Liu:
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning. - Keji Mao, Yuxiang Wang, Ligang Ren, Jinhong Zhang, Jiefan Qiu, Guanglin Dai:
Multi-branch feature learning based speech emotion recognition using SCAR-NET. - Jishi Zheng, Junhui Li, Zhigang Ding, Linghua Kong, Qingqiang Chen:
Recognition of expiry data on food packages based on improved DBNet. 1-16 - Kai Jin
, Kun Xie, Jiazheng Tian, Wei Liang, Jigang Wen:
Low cost network traffic measurement and fast recovery via redundant row subspace-based matrix completion. - Jie Xiao, Hui Huang, Chenhuang Wu, Qunshan Chen, Zhenjie Huang
:
A collaborative auditing scheme with dynamic data updates based on blockchain. - Yuyan Gao
, He Di, Mu Yan, Hongmin Zhao:
Realised volatility prediction of high-frequency data with jumps based on machine learning. - Gunjan Singh, Arpita Nagpal, Vijendra Singh
:
Optimal feature selection and invasive weed tunicate swarm algorithm-based hierarchical attention network for text classification. - Huaicheng Zhou, Kanghua Mo, Teng Huang, Yongjin Li:
Empirical study of privacy inference attack against deep reinforcement learning models. - Juan Chen, Wei Liang
, Lijun Xiao, Ce Yang, Ronglin Zhang, Zhenwen Gui, Aneta Poniszewska-Maranda
:
PrivBCS: a privacy-preserving and efficient crowdsourcing system with fine-grained worker selection based on blockchain. - Suzhi Zhang, Xiang Lin, Zijian Bai, Pu Li, Haidi Fan:
CGRS: Collaborative Knowledge Propagation Graph Attention Network for Recipes Recommendation. - Chih-Yuan Chen, Yung-An Fang, Guan-Ren Wang, Peng-Sheng Chen:
A GCC-based checker for compliance with MISRA-C's single-translation-unit rules. - Kotchaporn Karoon, Yupaporn Areepong, Saowanit Sukparungsee
:
Modification of ARL for detecting changes on the double EWMA chart in time series data with the autoregressive model. - Ao Zou
, Wenning Hao, Dawei Jin, Gang Chen, Feiyan Sun:
MoCoUTRL: a momentum contrastive framework for unsupervised text representation learning. - Meijiao Zhang, Xianhao Pan, Jiajin Mai, Mingdong Tang, Tien-Hsiung Weng:
Recommending third-party APIs via using lightweight graph convolutional neural networks. - Wenjuan Feng, Jin Gou, Zongwen Fan, Xiang Chen:
An ensemble machine learning approach for classification tasks using feature generation. - Su-Kyung Sung, Sang-Won Han, Byeong-Seok Shin:
Particle-based simulation technique for medical applications. - Wenyu Zhao, Dong Zhou, Buqing Cao, Wei Liang, Nitin Sukhija:
Exploring latent weight factors and global information for food-oriented cross-modal retrieval. - Zhixing Chen, Jian Shu, Linlan Liu:
The node importance evaluation method based on graph convolution in multilayer heterogeneous networks. - Jueun Jeon
, Seungyeon Baek
, Byeonghui Jeong
, Young-Sik Jeong
:
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT. - Chengjun Yang, Ruijie Zhu, Xinde Yu, Ce Yang, Lijun Xiao, Scott Fowler
:
Real-time reading system for pointer meter based on YolactEdge. - Shuxin Shi, Dezhi Han, Mingming Cui:
A multimodal hybrid parallel network intrusion detection model. - Gebrekiros Gebreyesus Gebremariam, J. Panda, S. Indu:
Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks. - Yixuan Yang
, Sony Peng, Sophort Siet, Sadriddinov Ilkhomjon, Vilakone Phonexay, Seok-Hoon Kim, Doo-Soon Park
:
Detecting susceptible communities and individuals in hospital contact networks: a model based on social network analysis. - Kelei Sun
, Yingying Wang, Mengqi He, Huaping Zhou, Shunxiang Zhang:
Neighbor interaction-based personalised transfer for cross-domain recommendation. - Venkateswara Rao Kagita, Sanjaya Kumar Panda, Ram Krishan, P. Deepak Reddy, Jabba Aswanth:
High-performance computing for static security assessment of large power systems. - Yunus Abdi, Ömer Küllü, Mehmet Kivilcim Keles
, Berk Gökberk:
CPW-DICE: a novel center and pixel-based weighting for damage segmentation. - Lijun Xiao, Wei Liang, Jiahong Cai, Ming Wang, Jiahong Xiao, Yinyan Gong, Weigang Zhang:
An efficiency control strategy of dual-motor multi-gear drive algorithm. - Gang Liu
, Qijun Zhou
, Xiaoxiao Xie
, Qingchen Yu
:
Dual conditional GAN based on external attention for semantic image synthesis. - Xingguang Wang, Shunxiang Zhang, Zichen Ma, Yunduo Liu, Youqiang Zhang:
CFSE: a Chinese short text classification method based on character frequency sub-word enhancement. - Song Gao, Hongwei Wang, Yuanjun Zhu, Jiaqi Liu, Ou Tang:
Comparative relation mining of customer reviews based on a hybrid CSR method. - Hao Wang, Dezhi Han, Mingming Cui, Chongqing Chen:
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention. 1-32 - Zihua Chen
, Runmei Zhang, Zhong Chen, Yu Zheng, Shunxiang Zhang:
ScTCN-LightGBM: a hybrid learning method via transposed dimensionality-reduction convolution for loading measurement of industrial material. - Yu-Kai Lee, Bo-Yi Lin, Tien-Hsiung Weng, Chien-Kang Huang, Chen Liu, Chih-Chin Liu, Shih-Shun Lin, Han-Ching Wang:
Counting and measuring the size and stomach fullness levels for an intelligent shrimp farming system. - YungYu Zhuang
, Ting-Wei Lin, Yin-Jung Huang:
The algorithm and implementation of an extension to LLVM for solving the blocking between instruction sink and division-modulo combine. - Arundhati Sahoo, Asis Kumar Tripathy:
On routing algorithms in the internet of vehicles: a survey. - Minghao Chen
, Shuai Wang
, Jiazhong Zhang
:
A multi-factorial evolutionary algorithm concerning diversity information for solving the multitasking Robust Influence Maximization Problem on networks. - Chao-Lin Lee
, Chun-Ping Chung, Sheng-Yuan Cheng, Jenq-Kuen Lee, Robert Lai:
Accelerating AI performance with the incorporation of TVM and MediaTek NeuroPilot. - Antonio Esposito, Beniamino Di Martino, Rosario Ammendolia, Pietro Lupi, Massimo Orlando, Wei Liang:
Time anomaly detection in the duration of civil trials in Italian justice. - Feng Zhou, Xin Du, Wenli Li, Zhihui Lu, Shih-Chia Huang:
Fidan: a predictive service demand model for assisting nursing home health-care robots. - Keqin Li:
UAV mission scheduling with completion time, flight distance, and resource consumption constraints. - Beniamino Di Martino, Antonio Esposito, Gennaro Junior Pezzullo, Tien-Hsiung Weng:
Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain. - AI-based data analysis for healthcare.
- Mingdong Tang, Xingyu Feng, Weili Chen:
Exploring the NFT market on ethereum: a comprehensive analysis and daily volume forecasting. - Hong-an Li
, Diao Wang
, Jing Zhang
, Zhanli Li
, Tian Ma
:
Image super-resolution reconstruction based on multi-scale dual-attention. - Zhu Ye, Yuan Jing, Qinghua Wang, Pengrui Li, Zhihong Liu, Mingjing Yan, Yongqing Zhang, Dongrui Gao:
Emotion recognition based on convolutional gated recurrent units with attention. - Kyung-yeul Kim, Young-bo Yang, Mi-ra Kim, Ji Su Park, Jihie Kim:
Predicting adolescent violence in Wartegg-ZeichenTest drawing images based on deep learning. - Le Chen, Lina Ge, Wei Zhou:
IIM: an information interaction mechanism for aspect-based sentiment analysis. - Daniele Granata
, Massimiliano Rak
, Giovanni Salzillo
, Giacomo Di Guida, Salvatore Petrillo:
Automated threat modelling and risk analysis in e-Government using BPMN. - Ji Ma, Jinjin Chen:
Reconstructing higher-resolution four-dimensional time-varying volumetric data. - Yanli Liu, Siyi Chen, Heng Zhang
, Neal N. Xiong, Wei Liang:
DOE: a dynamic object elimination scheme based on geometric and semantic constraints. - Henrique Varella Ehrenfried
, Vinicius Tikara Venturi Date
, Eduardo Todt
:
Exploring graph representation strategies for text classification. - Chao Wang, Jiahan Dong, Guangxin Guo, Tianyu Ren, Xiaohu Wang, Ming-yu Pan:
Security situational awareness of power information networks based on machine learning algorithms.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.