default search action
CNML 2023: Zhengzhou, China
- Proceedings of the 2023 International Conference on Communication Network and Machine Learning, CNML 2023, Zhengzhou, China, October 27-28, 2023. ACM 2023
Chapter 1 - Communication System Modeling and Satellite Communication Technology
- Jinao Wang, Jiwei Hua, Jinqi Zhu, Yanmin Wei, Luyao Wang:
Rogue Nodes Detection Using Idle Parking Resources. 1-5 - Zhongmin Pei, Boren Hu, Zhangkai Luo, Jie Ding:
Analysis of node importance of satellite network based on triangular motif. 6-12 - Ying Wang, Zesan Liu, Yanjie Wang, Zhencong Cai, Yu Meng:
Research on Web Configuration Software Interactivity Enhancement Technology Based on Vue and Component Library. 13-17 - Weiming Qin, Wenjing Guo, Jingwen Lin, Jiahao Li, Xuerui Chen, Xinsu Mei, Wei Zhang:
Design and implementation of power communication protocol plug-in based on hot loading. 18-22 - Shuaishuai Pan, Zhongchuan Sun:
Cross Polarization Interference Cancellation Algorithm Based on Maximum Likelihood for Satellite Communication. 23-27 - Fan Jiang, Yangfeng Rong, Jinhe Yu, Mingyuan Liang, Wei Xing, Bo Zhang:
Research on Machine Learning and State Grid Business Risk Prevention and Control Based on the Internet. 28-32 - Zeru Li, Zhongyuan Qin, Xin Sun, Wen Wang:
Efficient fuzzing testcases generation based on SAGAN. 33-38 - Yuchen Yin, Yiping Yang:
Design and Implementation of Intelligent Radar Anti-jamming Simulation System. 39-43 - Qianglong Meng, Li Liu, Dongqing Zhou, Hong Tang, Rongshu Zhang, Xiangjun Liu, Dan Yan:
Application of Artificial Bee Colony Algorithm in Power Communication Network Routing Optimization Simulation. 44-48 - Ji Qi, Yuehui Tan, Qifan Zhao, Weiliang Li, Bao Sun, Yi Wu, Hui Tao, Xin Zhang:
Virtualized Network Function Scaling Strategy Based on Additional Momentum BP Neural Network. 49-55 - Yuhao Xu, Xiaoyu Zhang, Yi Sun, Kai Zhou:
Indoor location algorithm based on improved Kalman filter. 56-60 - Shikun Zhuo:
Insight into the effect and application of LEO satellite network. 61-66 - Bingyu He, Hao Fu, Jinhua Li, Xiaomin Zhu:
A Survey of Multi-Transmission Path Optimization. 67-72 - Shenjie Gao, Bowei Duan, Ping Zhou, Xijing Li, Xin Jing:
Research on Intelligent Recommendation Model for Application Systems. 73-77 - Lijun Tong, Xiang Li, Zheng Kong, Qinghua Wang, Xiang Wang:
Research on PIM Characteristics of High-Power RF Connectors. 78-82 - Tao Liu, Zhifan He, Sijian Li, Yue Ma:
A Secure Power Data Sharing Scheme Based on Sensitive Data Automatic Recognition. 83-87 - Jinhua Lu, Shunzheng Yu:
Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations. 88-92 - Guoquan Zheng, Enguo Zhu, Hailong Zhang, Yan Liu, Chaoliang Wang:
Research on throughput maximization of mass device access based on 5G big connection. 93-96 - Juanning Wang, Qiang Li:
Automatic testing of computerized interlocks based on recognition of the interlocking host computer interface. 97-100 - Beiming Li, Jiahao Xu:
A transform domain communication method based on combinatorial basis function. 101-105 - Zhongfa Zhang:
Research on Network Architecture Based on Improved MPLS Protocol and SDN Technology. 106-110 - Jinyu Zhu, He Li, Shihui Duan, Youyang Zhu, Chenglin Zhao, Haojiang Deng:
End-to-End Performance Verification of 5G-TSN Converged Network. 111-114 - Haiou Li, Zhiwen Kang, Guolin Song, Yajun Liu, Hong Mei, Xin Chen, Ming Gu, Jieli Wang, Geng Chen:
Application of Federated Learning in mobile communication Anti-telecom fraud. 115-118 - Haichao Wang, Zhonghua Wang, Yong Wang:
Analysis of CDMA capacity of multi-beam satellite under beam coding. 119-122 - Ming Ji, Ruidan Luo, Na Xu, Yaping Li, Xiao Chen:
An Opportunistic LEO-based Doppler differential positioning method with baseline optimization. 123-128 - Ruokun Wang, Xiaodong Wu, Qinghao Zhu:
Multi-antenna Signal Synthesis Technique Research Based on Feedforward Neural Network Algorithm in High Frequency Communication. 129-133 - Ni Zeng, Zhe Jia, Zehua Ding, Lingna Hu, Lianghui Ding, Feng Yang:
Co-channel interference cancellation and equalization in aeronautical telemetry using multiple antennas. 134-139 - Yongjie Li, Huanpeng Hou, Jizhao Lu, Wenge Wang:
Digital spread-spectrum watermarking identity authentication technology based on OFDM in satellite-ground communication system. 140-144
Chapter 2 - Information Management and Network Security Technology
- Chaofeng Zeng:
Construction of an Emotional Dictionary for Online Comment Text in Knowledge Services. 145-150 - Rui Chen, Shulin Wu, Shaojun Lin, Helin Zhang, Meiling Jiang:
Design of a comprehensive management and monitoring platform for the operation and security of power information systems. 151-155 - Rong Zhu, Enjian Bai:
A Physical Layer Key Generation Using a Hybrid Quantization Scheme. 156-160 - Rongrui Chen, Hai Cheng:
Low retrieval consumption searchable encryption scheme based on random number pairing. 161-164 - Binyong Li, Jie Fang, Xianhui Deng, Yuhan Sheng:
Petri net-based illegal information flow detection method for node-chain access control model. 165-169 - Ci Xiao, Yajun Chen, Chaoyue Sun:
Research on High-Quality Image Generation Based on the AdvDCGAN Algorithm. 170-173 - Fei Yin, Chengliangyi Xia:
Blockchain-Based Data Secure and Traceable Scheme for Industrial Internet of Things. 174-178 - Weijie Zeng, Rui Fan, Zhi Wang, Yu Xiao, Rui Huang, Mouhai Liu:
Research on Docker Container Network Isolation and Security Management for Multi-Tenant Environments. 179-185 - Changchen Wang, Hong Liu:
A Channel State Information based Respiration Rate Monitoring Method. 186-190 - Hui Li:
Application of artificial intelligence in the construction of computer big data security technology platform. 191-195 - Yimeng Li, Xi Li, Yichao Zhang:
Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural Network. 196-200 - Zhongwen Zhao, Di Lu:
Vulnerability analysis of mission-based spatial information networks. 201-206 - Zihan Xiong, Yuxuan Li, Jun Chen, Dabei Chen:
FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation Prediction. 207-210 - Xinbo Wang:
Application of Deep Learning Based on Artificial Intelligence in Security Monitoring System. 211-214 - Jiayue Xu, Ming Ni, Danjiang Zhu, Xinsheng Yu:
Overview of SQL Injection Attack Detection Techniques. 215-225 - Zixuan Jin, Changbo Xu, Shaozhong Cao, Yi Liu:
Multimodal sentiment analysis based on multiple attention mechanisms. 226-230 - Kewei Li, Fudong Liu:
A hybrid model for classifying malware based on ResNet and Transformer. 231-237 - Runlin Li, Zhizhi Zhang, Xuchao Gong, Qilu Zhao:
A Method for Extracting Sensitive Information from Long Text Based on Natural Language Processing Technology. 238-243 - Jianlu Wu, Qingwang Li:
Design and application adaptation verification of time-sensitive network end system network card based on FPGA. 244-247 - Daojuan Zhang, Tianqi Wu, Xiaoming Zhou, Bo Hu, Wenjie Zhang:
Multi-source System Log Behavior Pattern Mining Method Based on FP-Growth. 248-254 - Kai Jin, Xin Shan, Yuan Zhou, Jing Li, Haidi Dong:
Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security System. 255-258 - Ruihang Zhang:
Enhancing IoT Security-Exploring the Application of Blockchain. 259-263 - Chunlong Lin, Wei Jin, Xiaobo Ling, Hongfu Chen, Mengyu Ruan, Yeqing Zhang, Yukun Fang:
Comparison of Complex Emotion Detection Based on the Basic Emotion Model and the Complex Emotion Model. 264-268 - Lisha Yao:
Image Encryption Algorithm Based on Henon Chaos Theory. 269-273 - Lisha Yao, Qiaoqiao Feng:
Image Style Transfer Based on CycleGAN. 274-278 - Zihan Wang, Caixiao Ouyang, Hongyan Li:
Zero Packet Loss Protection Module Based on IEEE 802.1CB Protocol. 279-283
Chapter 3 - Machine Learning and Intelligent Algorithm Modeling
- Tengxiao Mu, Yaru Liang, Lingzhi Liu:
Classification model based on improved K-means clustering algorithm. 284-288 - Ruihong Dang:
Construction of Online Teaching Effect Evaluation System Based on Complex Learning Behavior Data Analysis. 289-293 - Zihao Liu, Yi Zhou:
Research on SVM intrusion detection algorithm based on improved. 294-297 - Weisong Chen, Kaixian Zheng, Jingyun Xu, Shengkai Lin, Liju Gan, Yican Wu:
Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification Algorithm. 298-302 - Qigui Yao, Xiaojian Zhang, Jiaxuan Fei, Wen Ji, Caiwei Guo:
NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and Simulation. 303-307 - Tong Liu, Haitao Jiang, Yu Liu:
Edge-cloud Collaboration Based Service Deployment and Resource Allocation in Digital Twin 6G network. 308-311 - Shenjin Chen, Junying Yuan, Jianxin Zhang:
Research and application of smart contract technology based on blockchain. 312-319 - Qiao Shen, Hanming Huang, Pengfei Wang:
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing. 320-326 - Tianxiang Liu, Zhengyi Liu:
Mirror Detection in Frequency Domain. 327-331 - Nan Wu, Guozhen Dong, Wenjuan Xing, Shizhong Nie, Yunpeng Xie:
A Multicast Scheduling Method Based on EVPN-VXLAN Extension in Data Center Networks. 332-336 - Weixi Wu:
Traffic anomaly detection method based on bidirectional autoencoder generative adversarial network. 337-340 - Panlong Yi, Gang Lu, Xiaojun Wu, Yumei Zhang:
Problem-guided Neural Math Problem Solvers. 341-345 - Yangquan Zhou, Liuping Feng, Lingyi Chi, Guokai Wang:
Reversible Data Hiding Algorithm based on Paillier Encryption. 346-350 - Yue Zong, Han Xu, Zhaoyang Zhang:
Deep Deterministic Policy Gradient based Dynamic Virtual Network Embedding Algorithm. 351-355 - Lei Tan, Jinmao Xu, Daofu Gong, Fenlin Liu:
Recurrent Attentive Neural Networks for Sequential Recommendation. 356-360 - Jiwei Li, Bo Li, Shi Liu, Hongwei Lv, Fei Chen, Qing Liu:
Efficient retrieval of power structured data with global data access view. 361-365 - Baixin Guo, Jian Li, Haibin Wang:
Neural network reliability analysis based on fault injection. 366-370 - Wenhao Zang, Shuangling Li, Xutao Yang:
A dueling DQN-based online resource allocation algorithm for cloud computing. 371-376 - Yanling Li, Jianwei Zhan, Hui Zhang, Dong Wang:
A Variable Step LMS Algorithm Based on Particle Swarm Optimization. 377-381 - Qi Wang, Liming Wu, Wanyi Li:
Research on Fast Time-Frequency Synchronization Algorithm for NR System. 382-391 - Hongtao Xie, Yang Wang, Xin Tian:
An Online/Offline Power Data Sharing System Based on Blockchain. 392-397 - Yaqi Zhao, Wei Li, Huiqing Xu, Sihe Lu, Yongcan Zhao:
Bearing Fault Diagnosis Based on Parallel Convolutional Neural Network with Attention Mechanism and Bidirectional Gated Recurrent Unit. 398-402 - Si Li, Wei Li, Huaguang Shi, Wenhao Yan, Yi Zhou:
Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System. 403-407 - Xiaoer Wang, Shuang Ding, Guoqing Zhang:
MADDPG: A task offloading algorithm based on multi-agent deep reinforcement learning in vehicle-edge computing. 408-413 - Meng He, Yunli Bai:
LAL-JER: Label-Aware Learning for Adaptive Joint Entity and Relation Extraction with LLM data augmentation. 414-419 - Hao Zeng, Jun Lu:
Sub-regional multi-AGV dynamic path planning method based on improved A* algorithm. 420-424 - Yanyu Zhang, Yang Wang, Zihao Guo, Feixiang Jiao, Yi Zhou:
Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization Algorithm. 425-431 - Tongtong Xu, Guanghui Wang, Yuanhao Xu:
DFCL: Domain-adaptive federated clustering learning. 432-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.