default search action
ACM TUR-C 2019: Chengdu, China
- Proceedings of the ACM Turing Celebration Conference - China, ACM TUR-C 2019, Chengdu, China, May 17-19, 2019. ACM 2019, ISBN 978-1-4503-7158-2
ACM SIGCOMM China
- Zhe Wang, Taoshen Li, Jin Ye, Zhihui Ge, Xudong Gao, Min Wu:
Secure and green SWIPT in energy harvesting cognitive radio network with robust AN-aided beamforming. 1:1-1:7 - Han Wang, Yang Qin, Zechao Liu, Yibing Li:
Processing private queries based on distributed storage in location-based services. 2:1-2:6 - Zhiyong Du, Bin Jiang, Kun Xu, Shengyun Wei, Shengqing Wang, Huatao Zhu:
Second-order multi-armed bandit learning for online optimization in communication and networks. 3:1-3:6 - Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand, Shaoci Xie:
VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm. 4:1-4:7 - Xiaotong Li, Ruiting Zhou, Zongpeng Li:
Cooperative offloading of tasks with deadlines in mobile cloud computing. 5:1-5:6 - Zichen Xu, Li Li, Wenting Zou:
Exploring federated learning on battery-powered devices. 6:1-6:6 - Huanlai Xing, Song Li, Penglin Dai, Shouxi Luo, Ke Li, Hui Yang:
A PBIL for delay constrained virtual network function placement with load balancing. 7:1-7:6 - Xiuhua Li, Xiaofei Wang, Zhengguo Sheng, Chunqiang Hu, Victor C. M. Leung:
Popularity-prediction-driven hierarchical caching in fog-cloud based radio access networks. 8:1-8:6 - Jinli Yan, Lu Tang, Junnan Li, Xiangrui Yang, Wei Quan, Hongyi Chen, Zhigang Sun:
UniSec: a unified security framework with SmartNIC acceleration in public cloud. 9:1-9:6 - Zhiying Tang, Qingjun Xiao, Junzhou Luo:
A memory-compact and fast sketch for online tracking heavy hitters in a data stream. 10:1-10:6 - Mengxiao Hu, Guangxia Xu, Chuang Ma, Mahmoud Daneshmand:
Detecting review spammer groups in dynamic review networks. 11:1-11:6 - Xiaochen Fan, Chaocan Xiang, Liangyi Gong, Xiangjian He, Chao Chen, Xiang Huang:
UrbanEdge: deep learning empowered edge computing for urban IoT time series prediction. 12:1-12:6 - Zhuang Chen, Qian He, Zhifei Mao, Hwei-Ming Chung, Sabita Maharjan:
A study on the characteristics of douyin short videos and implications for edge caching. 13:1-13:6
ACM SIGMOBILE China
- Wei Liu, Shan Chang, Hongzi Zhu, Yiming Liu:
S3: low cost real-time spectrum sensing using SDR. 14:1-14:5 - Haiwen Wang, Lingkun Kong, Luoyi Fu, Xinbing Wang:
Wandering between close and apart: are scholarly domains crossable? 15:1-15:6 - Zhongzhao Hu, Luoyi Fu, Xiaoying Gan:
De-anonymize social network under partial overlap. 16:1-16:5 - Rui Zhang, Jiming Guo, Yueqi Zhou, Hongbo Jiang, Chen Wang:
traj2bits: indexing trajectory data for efficient query. 17:1-17:5 - Yi Zhao, Jianbo Li, Xin Miao, Xuan Ding:
Urban crowd flow forecasting based on cellular network. 18:1-18:5 - Fan Yang, Shining Li, Jiangjiang Zhang, Shaoqing Xu, Li Cong, Yinghai An:
STARLIT: 3D indoor positioning with smartphones and reflection light. 19:1-19:5 - Min Sun, Li Zhang, Ying Liu, Xin Miao, Xuan Ding:
See-your-room: indoor localization with camera vision. 20:1-20:5 - Yuben Qu, Jiajia Liu:
Computation offloading for mobile edge computing with accuracy guarantee. 21:1-21:5 - Wen Tian, Zhenzhen Jiao, Min Liu, Meng Zhang, Dong Li:
Cooperative communication based connectivity recovery for UAV networks. 22:1-22:5 - Yuan Shao, Lin Li, Xiansheng Guo:
A semi-supervised deep learning approach towards localization of crowdsourced data. 23:1-23:5 - Pengqian Lu, Jianhui Zhang, Siwen Zheng, Tianyu Zhang:
Local ratio based distributed bike-dock pair allocation in public bike system. 24:1-24:5 - Yiwen Han, Ding Li, Haotian Qi, Jianji Ren, Xiaofei Wang:
Federated learning-based computation offloading optimization in edge computing-supported internet of things. 25:1-25:5 - Yu Bao, Liang Dong, Yue Zheng, Ying Liu:
WiSafe: a real-time system for intrusion detection based on wifi signals. 26:1-26:5 - Yang Shi, Fangyu Li, Wen-Zhan Song, Xiangyang Li, Jin Ye:
Energy audition based cyber-physical attack detection system in IoT. 27:1-27:5 - Ye Zhou:
Chameleon: towards adaptive honeypot for internet of things. 28:1-28:5 - Haonan Zhang, Chen Feng, Xinbing Wang:
A greedy-based approach of fast transaction broadcasting in bitcoin networks. 29:1-29:5 - Gaoyang Guan, Wei Dong, Jiadong Zhang, Yi Gao, Tao Gu, Jiajun Bu:
Queec: QoE-aware edge computing for complex IoT event processing under dynamic workloads. 30:1-30:5 - Yufu Jia, Wenping Liu, Hongbo Jiang, Yamin Li, Guoyin Jiang, Zhicheng Lui, Yang Yang, Jing Xing:
A unified framework for constrained linearization of 2D/3D sensor networks with arbitrary shapes. 31:1-31:5 - Jian Yao, Xingfa Shen, Jianhui Qiu, Ting Wang:
SeeIME: a Chinese mobile IME for Chinese learners based on hybrid Pinyin code. 32:1-32:5 - Ping Zhao, Jiaxin Sun, Anqi Zhang, Sifan Ni, Guanglin Zhang:
P3S2: practical secure protocol for speech data publishing. 33:1-33:5 - Ruizhi Zhang, Chujie Tian, Yang Ji:
An emotion recognition system based on edge computing and cloud computing applied in the kindergarten. 34:1-34:5 - Ziyi Chang, Hui Li, Zhuqin Chu, Huaxi Gu, Xiaochun Ye:
Crosstalk-aware GA-based wavelength allocation method for ring-based optical network-on-chip. 35:1-35:5 - Yecheng Song, Pengrui Duan, Liang Liu, Huadong Ma:
CNDTSN: enhanced DTSN based on classified nodes. 36:1-36:5 - Ying Liu, Zhiyong Tao, Xiaobing Li:
High efficiency wifi fingerprint localization based on distance costraints. 37:1-37:5 - Feng Lin, Haifeng Zheng, Xinxin Feng:
An attention-based ambient network with 3D convolutional network for incomplete traffic flow prediction. 38:1-38:5 - Cheng Wang, Hangyu Zhu, Chaodong Wang, Qin Zhao, Bo Zhang:
Transport complexity of data dissemination in large-scale online social networks. 39:1-39:5 - Fan Peng, Shaohua Tang, Bowen Zhao, Yuxian Liu:
A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy. 40:1-40:5 - Gongwei Xiao, Xu Chen, Muhong Wu, Zhi Zhou:
Deep reinforcement learning-driven intelligent panoramic video bitrate adaptation. 41:1-41:5 - Xiaoyang Huo, Chuan Wen, Yuchen Yan, Ruijie Wang:
RI-SSGE: a framework with rule inference and sentence schema graph embedding for knowledge base query construction. 42:1-42:5 - Yao Feng, Xiong Wang, Wenkuan Dai, Shujuan Gao, Xiaoying Gan, Siyi Wang:
Congestion-aware deployment of electric vehicle charging stations. 43:1-43:5 - Xiaoxia Qin, Fanping Zeng, Yu Zhang:
MSNdroid: the Android malware detector based on multi-class features and deep belief network. 44:1-44:5 - Jiaming Cui, Huaying Wu, Luoyi Fu, Xiaoying Gan:
De-anonymizing bitcoin networks: an IP matching method via heuristic approach: poster. 45:1-45:2 - Shuqing He, Haifeng Wang, Yunpeng Cao, Deyu Zhao:
A wide-deep event model for complex event processing in edge and cloud computing environment. 46:1-46:2 - Chong Zhang, Xiaoying Gan:
Source detection in the bitcoin network: a multi-reporting approach. 47:1-47:2 - Fan Yang, Shasha Zhang, Shuyu Song, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
A testbed for intelligent software defined security framework. 48:1-48:2 - Yuanhao Sun, Weimin Ding, Lei Shu, Kai Huang, Kailiang Li, Yu Zhang, Zhiqiang Huo:
When mobile crowd sensing meets smart agriculture: poster. 49:1-49:2
ACM SIGMOD China
- Ke Ji, Yahan Yuan, Kun Ma, Runyuan Sun, Zhenxiang Chen, Jun Wu:
Context-aware recommendations via a tree-based ensemble framework. 50:1-50:5 - Jiadong Ren, Qian Wang, Xinqian Liu, Guoyan Huang, Haitao He, Xiaolin Zhao:
Mining important nodes in complex software network based on ripple effects of probability. 51:1-51:8 - Zi-Hua Li, Ling Huang, Kai Wang, Chang-Dong Wang, Wei Shi, Dong Huang:
Network embedding with class discriminability. 52:1-52:5 - Jian Zeng, Bo Tang:
Mining heterogeneous urban data for retail store placement. 53:1-53:5 - Qinshen Wang, Hongzhi Wang, Bo Zheng:
An efficient distributed storage strategy for blockchain. 54:1-54:5 - Xiaoyan Zhang, Yue Mao, Xiangfu Meng:
A spatial clustering approach by combining the geo-social-comment relationships of POIs. 55:1-55:5 - Kaiwen Song, Xinao Wang, Yidan Zhang, Jie Zuo:
Representation learning for heterogeneous network with multiple link attributes. 56:1-56:5 - Jie Liu, Jie Zuo, Ruiqi Qin:
Mining top-k distinguishing periodic patterns in temporal databases. 57:1-57:5 - Xiaohui Zhang, Jie Zuo:
Measuring similarity between sequential datasets. 58:1-58:5 - Geng Deng, Licheng Liu, Jie Zuo:
Scoring framework of soccer matches using possession trajectory data. 59:1-59:2 - Chengxin He, Yidan Zhang, Jie Zuo:
Construction of a heterogeneous information network by fusing multi-source biomedical data. 60:1-60:2
ACM SIGSAC China
- Zhaoyang Han, Liang Liu, Zhe Liu:
An efficient access control scheme for smart lock based on asynchronous communication. 61:1-61:5 - Junlang Zhan, Xuan Liao, Yukun Bao, Lu Gan, Zhiwen Tan, Mengxue Zhang, Ruan He, Jialiang Lu:
An effective feature representation of web log data by leveraging byte pair encoding and TF-IDF. 62:1-62:6 - Ke Ji, Yahan Yuan, Ruanyuan Sun, Lin Wang, Kun Ma, Zhenxiang Chen:
Abnormal telephone identification via an ensemble-based classification framework. 63:1-63:6 - Jie Ma, Bin Qi, Kewei Lv:
Fully private auctions for the highest bid. 64:1-64:6 - Xuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen:
Adversarial attack against scene recognition system for unmanned vehicles. 65:1-65:6 - Yuanyuan Ma, Xiangyang Luo, Zhenyu Li, Yi Zhang, Adrian G. Bors:
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion. 66:1-66:5 - Jia Fan, Zhen Wang, Yili Luo, Jian Bai, Yarong Li, Yao Hao:
A new stealth address scheme for blockchain. 67:1-67:7 - Guishan Dong, Yuxiang Chen, Jia Fan, Jian Bai, Peng Zhang, Feng Li:
Anonymous cross-domain authentication scheme for medical PKI system. 68:1-68:7
ACM SIGCSE China
- Ming Zhang, Yichun Yin:
More Chinese women needed to hold up half the computing sky. 69:1-69:4 - Wei Wang, Libo Huang, Dong Guo, Yanjun Xu, Fenglin Bi, Jun Tang:
MOOBench: towards massive open online workbench. 70:1-70:6 - Yigong Pan, Guangzhong Sun:
CLS-PROG: an intelligent tool for classifying programs in online judge systems. 71:1-71:6 - Xia Sun, Xu Zhao, Yuan Ma, Xinrui Yuan, Feijuan He, Jun Feng:
Muti-behavior features based knowledge tracking using decision tree improved DKVMN. 72:1-72:6 - Shengjun Yin, Qingda Shang, Hongzhi Wang, Boxuan Che:
The analysis and early warning of student loss in MOOC course. 73:1-73:6 - Feng Xiong, Kaifa Zou, Zhemin Liu, Hongzhi Wang:
Predicting learning status in MOOCs using LSTM. 74:1-74:5 - Nannan Wu, Lei Zhang, Yi Gao, Mingfei Zhang, Xia Sun, Jun Feng:
CLMS-Net: dropout prediction in MOOCs with deep learning. 75:1-75:6 - Jun Na, Yuan Liu:
A quantitative revision method to improve usability of self-and peer assessment in MOOCs. 76:1-76:6 - Wenying Kang, Lei Zhang, Bo Li, Jing Chen, Xia Sun, Jun Feng:
Personalized exercise recommendation via implicit skills. 77:1-77:6 - Yu He, Xinying Hu, Guangzhong Sun:
A cognitive diagnosis framework based on peer assessment. 78:1-78:6 - Bo Jiang, Wei Xu, Chunlin Guo, Wenqi Liu, Wenqing Cheng:
A classroom concentration model based on computer vision. 79:1-79:6 - Yaling Zhang, Bei Wu:
Research and application of grade prediction model based on decision tree algorithm. 80:1-80:6 - Qing Sun, Ji Wu, Kaiqi Liu:
How are students' programming skills developed: an empirical study in an object-oriented course. 81:1-81:6 - Dapeng Qu, Songlin Wu:
A competition-oriented student team building method. 82:1-82:2 - Shu Yin, Yingdong Zhang, Xiaomin Zhu:
Experience reports for teaching operating systems towards increasing-sized classes. 83:1-83:2 - Kun Ma, Bo Yang, Kun Liu:
Automated grading of collaborative software engineering training with cloud distributing scripts. 84:1-84:2 - Bin Xu, Fan Gao, Kening Gao, Changkuan Zhao, Dan Yang:
Measuring code similarity using word mover's distance for programming course. 85:1-85:2 - Yun Zhou, Weidong Bao, Xiaomin Zhu:
Engineering cognition oriented cultivation method of innovative quality based on learning-by-doing. 86:1-86:2 - Lynne L. Grewe, Chengzi Hu:
Assisting with frustration in learning via machine learning and computer vision. 87:1-87:2 - Junmin Zhao, Dengao Li, Xiaoyu Wang, Xiaohong Bai, Shasha Zhuang:
Research on the cultivation of new engineering talents based on educational big data. 88:1-88:2
ACM SIGAI China
- Yujia Zhang, Michael Kampffmeyer, Xiaoguang Zhao, Min Tan:
DTR-GAN: dilated temporal relational adversarial network for video summarization. 89:1-89:6 - Junxian Ye, Le Dong, Wenpu Dong, Ning Feng, Ning Zhang:
Policy multi-region integration for video description. 90:1-90:5 - Xiaoran Qin, Yafeng Zhou, Yonggang Li, Siwei Wang, Yongtao Wang, Zhi Tang:
Progressive deep feature learning for manga character recognition via unlabeled training data. 91:1-91:6 - Tong Sun, Jia Wang, Jing Ni, Yu Cao, Benyuan Liu:
End-to-end deep learning based trading platform and its evaluation. 92:1-92:5 - Mohammad Nuruzzaman, Omar Khadeer Hussain:
Identifying facts for chatbot's question answering via sequence labelling using recurrent neural networks. 93:1-93:7 - Jingyu Zhuang, Ziliang Chen, Junyi Zhang, Dongyu Zhang, Zhaoquan Cai:
Domain adaptation for retinal vessel segmentation using asymmetrical maximum classifier discrepancy. 94:1-94:6 - Liyao Yao, Zexi Hu, Caixing Liu, Hanxing Liu, Yingjie Kuang, Yuefang Gao:
Cow face detection and recognition based on automatic feature extraction algorithm. 95:1-95:5 - Junyi Zhang, Ziliang Chen, Junying Huang, Jingyu Zhuang, Dongyu Zhang:
Few-shot domain adaptation for semantic segmentation. 96:1-96:6 - Hongwei Feng, Shuang Li, Dianyuan He, Jun Feng:
A novel feature selection approach based on multiple filters and new separable degree index for credit scoring. 97:1-97:5 - Jiefu Chen, Xing Xu, Yanli Ji, Hua Chen:
Learning to create multi-stylized Chinese character fonts by generative adversarial networks. 98:1-98:6 - Lili Huang, Hefeng Wu, Guanbin Li, Qing Wang:
Instruction-guided object detection. 99:1-99:6 - Xu Xie, Hangxin Liu, Zhenliang Zhang, Yuxing Qiu, Feng Gao, Siyuan Qi, Yixin Zhu, Song-Chun Zhu:
VRGym: a virtual testbed for physical and interactive AI. 100:1-100:6 - Xiu Li, Rujiao Long, Kun Jin:
DeepFuse neural networks. 101:1-101:5 - Tingting Liang, Qijie Zhao, Zhuoying Wang, Kaiyu Shan, Huan Zhang, Yongtao Wang, Zhi Tang:
Pyramidal region context module for semantic segmentation. 102:1-102:6 - Xiaolu Hui, Riquan Chen, Tianshui Chen:
Graph attention propagation for few-shot learning. 103:1-103:4 - Duo Xu, Yonghui Dai, Weihui Dai:
Smart recommendation of personalized cloud music service based on mental model. 104:1-104:6 - Kai Gao, Pingping Zhang, Yan Liu, Ziqin Zhou, Gang Yang, Huchuan Lu:
Deep mutual learning for visual tracking. 105:1-105:5
ACM SIGAPP China
- Xupeng Wang, Zhongwen Guo, Xi Wang, Shiyong Liu, Wei Jing, Yuan Liu:
NNMLInf: social influence prediction with neural network multi-label classification. 106:1-106:5 - Hanjiang Luo, Chao Liu, Yongquan Liang:
A SDN-based testbed for underwater sensor networks. 107:1-107:4 - Chao Liu, Yingbin Li, Ruobing Jiang, Feng Hong, Zhongwen Guo:
OceanNet: a low-cost large-scale maritime communication architecture based on D2D communication technology. 108:1-108:6 - Md. Asif Hasan, Haiming Chen, Yimo Lin, Xiwen Liu:
WiPi: an extendable edge platform for building time-critical cyber-physical-human systems. 109:1-109:5 - Lynne L. Grewe, Garrett Stevenson:
Seeing eye drone: a deep learning, vision-based UAV for assisting the visually impaired with mobility. 110:1-110:5 - Xurong Yan, Feng Hong, Zhaoran Huo:
Research on application recognition technology based on user's touch screen behavior. 111:1-111:4 - Pengpeng Chen, Di Che, Yuqing Yin:
A survey on visible light positioning from the hardware perspective. 112:1-112:5 - Jikun Guo, Huihui Li:
RSWI: a rescue system with wifi sensing and image recognition. 113:1-113:4 - Wei Guo:
Management system for secure mobile application development. 114:1-114:4 - Di Fan, Shuai Fang, Xiaoxin Liu, Yongyi Li, Shang Gao:
A multi-scale face detection algorithm based on improved SSD model. 115:1-115:9
ACM TURC-AIS
- Liang He, Chao Shen, Yun Li:
A conditional-probability zone transformation coding method for categorical features. 116:1-116:6 - Mian Sun, Li Li, Shanqing Zhang, Jianfeng Lu, Xiaoqing Feng, Chin-Chen Chang:
A copy detection algorithm for game character concept design based on pose features. 117:1-117:8 - Jun Zhang, Ping-ping Xia, Juan Zhang, Haiyun Peng:
A healthy node selection method based on particle swarm optimization under network intrusion environment. 118:1-118:7 - Ligong Chen, Zhaohui Zhang, Qiuwen Liu, Lijun Yang, Ying Meng, Pengwei Wang:
A method for online transaction fraud detection based on individual behavior. 119:1-119:8 - Jianfeng Lu, Weiling Cheng, Shanqing Zhang, Li Li:
A novel data hiding algorithm for game texture based on Hamming+1. 120:1-120:8 - Ying Meng, Zhaohui Zhang, Wenqiang Liu, Ligong Chen, Qiuwen Liu, Lijun Yang, Pengwei Wang:
A novel method based on entity relationship for online transaction fraud detection. 121:1-121:10 - Liangbo Xie, Mu Zhou, Xiaolong Yang, Wei Nie, Yong Wang:
A passive wireless temperature sensor tag compatible with EPC Gen2 UHF RFID protocol. 122:1-122:10 - Qianqian Hu, Ying Zhang, Ziyan Zhao, Wei Jia:
A quantum handshake method based on quantum dialogue and wireless network. 123:1-123:7 - Wei Jia, Ying Zhang, Hao Yu, Yuxiang Bian:
A quantum key distribution protocol based on LDPC error correcting codes. 124:1-124:7 - Mingda Wang, Hangyu Hu, Guangmin Hu:
A survey on traffic-behavioral profiling of network end-target. 125:1-125:7 - Fengjie Deng, Yubo Song, Aiqun Hu, Min Fan, Yu Jiang:
Abnormal traffic detection of IoT terminals based on Bloom filter. 126:1-126:7 - Ruixi Yang, Hongxia Wang, Wen Dou:
Acoustic event detection with two-stage judgement in the noisy environment. 127:1-127:7 - Baowei Wang, Weiwen Kong, Hui Guan:
Air quality forcasting based on gated recurrent long short-term memory model. 128:1-128:9 - Zhuoheng Li, Jian Liu, Yueyun Chen:
An energy-efficient resource allocation strategy for vehicular networks. 129:1-129:8 - Jing Wang, Anqi Hou, Yuanfei Tu:
An improved dv-hop localization algorithm based on centroid multilateration. 130:1-130:6 - Suhan Pan, Zhiqiang Li, Juan Dai:
An improved TextRank keywords extraction algorithm. 131:1-131:7 - Jian Liu, Mingxuan Fu, Shasha Zhang:
Application of convolutional neural network in automatic classification of arrhythmia. 132:1-132:8 - Weibo Yang, Peiwei Gao, Hailong Peng, Xiangmin Zhao:
Application of particle filter to concrete freeze-thaw prognosis. 133:1-133:7 - Zheng Fang, Xiongwei Zhang, Xiaotong Deng, Tieyong Cao, Changyan Zheng:
Camouflage people detection via strong semantic dilation network. 134:1-134:7 - Jian Liu, Yanzhong Wang, Yalin Yuan, Yinghua Zhang:
Channel estimation optimization algorithm based on OFDM system. 135:1-135:7 - Wen Dou, Hongxia Wang, Ruixi Yang:
Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environment. 136:1-136:8 - Yingjie Wang, Xing Liu, Weixuan Mao, Wei Wang:
DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. 137:1-137:9 - Xianbo Li, Naiguang Zhang, Qian Wang, Feng Dai, Ziyu Xue:
Deep super-resolution based hashing for image retrieval. 138:1-138:7 - Lilly-Abau Yosia Odwa, Yueyun Chen, Zhiyuan Mai:
Detection of primary user emulation attack based on modified adaptive orthogonal matched pursuit for cognitive radio networks in HCRAN. 139:1-139:7 - Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu:
Enhanced branch obfuscation based on exception handling and encrypted mapping table. 140:1-140:9 - Jinhai Li, Zhunan Qian, Peng Zhang, Youshi He:
Hybrid recommendation algorithm based on multi-attribute rating from online reviews. 141:1-141:7 - XiaoFeng Chen, Hao Wang, Wei Xiang:
Implementation of Tibetan-Chinese translation platform based on LSTM algorithm. 142:1-142:5 - Yubo Song, Qiang Huang, Junjie Yang, Ming Fan, Aiqun Hu, Yu Jiang:
IoT device fingerprinting for relieving pressure in the access control. 143:1-143:8 - Li Dong, Jiantao Zhou, Cuiming Zou, Yulong Wang:
Iterative first-order reverse image filtering. 144:1-144:5 - Xiaofeng Dong, Zhipeng Yang, Jing Peng, Xi Wu:
Multimodality white matter tract segmentation using CNN. 145:1-145:8 - Guang Sun, Fenghua Li, Jiayi Ren, Hongzhang Lv, Yanfei Xiao, Yingchao Wang:
On data visualization for securities investment fund analysis. 146:1-146:11 - Xudong Tang, Chen Xue, Tao Wu, Tiejun Wang:
Optimization of parallel program based on lattice BGK method. 147:1-147:7 - Liu Yan, Wenxin Hu, Longzhe Han:
Optimize SPL test cases with adaptive simulated annealing genetic algorithm. 148:1-148:7 - Liu Yan, Wenxin Hu, Longzhe Han:
Parallel architecture design of genetic algorithms on HPC platform. 149:1-149:7 - Xuemeng Zhai, Hangyu Hu, Guangmin Hu, Youyang Qu:
PRBL: a personalized recommendation system based on bipartite network projection and link community detection. 150:1-150:7 - Xianyu Wu, Canghong Shi, Xiaojie Li, Jia He, Xi Wu, Jiancheng Lv, Jiliu Zhou:
PWGAN: wasserstein GANs with perceptual loss for mode collapse. 151:1-151:7 - Wei Jia, Bao Feng, Hao Yu, Yuxiang Bian:
Quantum key distribution protocol based on CSS error correcting codes. 152:1-152:8 - Qianqian Hu, Tianzi Sun, Bao Feng, Wei Jia:
A quantum key distribution scheme based on quantum error-avoiding code in decoherence-free subspace. 153:1-153:7 - Hong Lai, Liling Zhang, Yanrong Zhu:
Quantum secure direct communication based on orbital angular momentum. 154:1-154:10 - Yangyu Liu, Yueyun Chen, Meijie Yang, Zushen Liu:
Ratio fairness-based power allocation and user scheduling for downlink NOMA heterogeneous networks. 155:1-155:7 - Jin Shi, Peng Jin, Siyu Gu:
Research on credit distribution of cooperative papers according to authors' rank. 156:1-156:7 - Yan Wang, Xiaoyu Chang, Jingjing Han, Yugang Li:
Research on impact evaluation of ISO standards on China's GB based on C4.5 model. 157:1-157:7 - Hui Zeng, Anjie Peng, Xiaodan Lin, Shenghai Luo:
Source smartphone identification for digital zoomed images. 158:1-158:6 - Guang Sun, Yingjie Song, Ziqin Gong, Xiya Zhou, Xinyi Zhou, Yilin Bi:
Survey on streaming data computing system. 159:1-159:8 - Yan Wang, Xuteng Wang, Yugang Li, Yufan Zhou:
The construction of movie marketing index based on factor analysis. 160:1-160:7 - Yan Xiong, Hong Lai:
The improved protocol based on the Bennett 92 protocol. 161:1-161:9 - Chen Chao, Tian Shan, Li Mei-Yan, Xiao Xiao:
The prediction model of initial flowering based on accumulated temperature of different species peach in Longquanyi. 162:1-162:7 - Shi Lin, Fu Pu, Li Cui:
Three attacks of certificateless aggregate signature scheme. 163:1-163:6 - Yan Zheng, Meijuan Yin, Junyong Luo, Gongzhen He:
Truth discovery on multi-dimensional properties of data sources. 164:1-164:8 - Yangyang Gao, Yangyang Li, Yue Jia:
Video computing across trust domains based on blockchain. 165:1-165:9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.