default search action
DASC/PiCom/CBDCom/CyberSciTech 2021: Canada
- IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2174-4
- Ganglin Zhang, Yongjian Liao, Shijie Zhou:
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service. 1-9 - Sven Tomforde, Martin Goller:
Beyond Homeostasis: A Novel Approach for Assessing the Stability and Coherence of Self-Adaptive Systems. 10-17 - Shantian Yang, Bo Yang:
A Meta Multi-agent Reinforcement Learning Algorithm for Multi-intersection Traffic Signal Control. 18-25 - Matthew Leeke:
Reducing Model Complexity and Cost in the Generation of Efficient Error Detection Mechanisms. 26-34 - Chang Liu, Jiaxin Liu, Yong Zhang, Lei Huang:
SFNet: Stage Spatial Attention and Feature Waterfall Fusion for Mathematical Document Text Line Detection. 35-42 - Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada:
Quantitative Security Assurance Case for In-vehicle Embedded Systems. 43-50 - Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. 51-59 - Samaneh Mahdavifar, Nasim Maleki, Arash Habibi Lashkari, Matt Broda, Amir H. Razavi:
Classifying Malicious Domains using DNS Traffic Analysis. 60-67 - Yuxing Tang, Zihao Li, Yanxu Bai:
Rethinking of Reentrancy on the Ethereum. 68-75 - Hirofumi Satou, Kenichi Kourai:
Prevention of a DoS Attack with Copy-on-write in the Overlay Filesystem. 76-83 - Xiaolin Zhang, Fengpei Lei, Shengji Yu:
Self-attention Based Text Matching Model with Generative Pre-training. 84-91 - Luciana Provenzano, Kaj Hänninen, Kristina Lundqvist:
Role-based Approach as Support for Safety Analysis of Collaborative Systems. 92-98 - Xun Sun, Xingwei Lin, Zhou Liao:
An ABI-based Classification Approach for Ethereum Smart Contracts. 99-104 - James Obert, Angie Shia:
Optimizing Dynamic Timing Analysis and Reinforcement Learning. 105-111 - Mohaddaseh Nikseresht, Brent De Blaere, Jens Vankeirsbilck, Davy Pissoort, Jeroen Boydens:
Impact of Selective Implementation on Soft Error Detection Through Low-level Re-execution. 112-117 - Chen Cheng, Yukikazu Nakamoto:
Applying neural networks for plant model simulation in embedded control system. 118-123 - Tatsuki Yamazaki, Tomoyuki Ohta:
A MANET-based Building Evacuation System Considering User Characteristics. 124-129 - Ding Tan, Xingyu Xu, Kaixiang Yu, Sihai Zhang, Tianchi Chen:
Multi-Feature Shuffle Algorithm for Root Cause Detection in Semiconductor Manufacturing. 130-136 - Xingyu Xu, Ding Tan, Sihai Zhang, Tianchi Chen:
How Feature Remove and Shuffle Work in Key Feature Detection? The Perspective of NDER. 137-144 - Solomon Negussie Tesema, El-Bay Bourennane:
Multi-Grid Redundant Bounding Box Annotation for Accurate Object Detection. 145-152 - Ameer Ivoghlian, Kevin I-Kai Wang, Zoran Salcic:
Data-driven Adaptive Network Management with Deep Reinforcement Learning. 153-160 - Thiago Pereira da Silva, Aluízio F. Rocha Neto, Thaís Vasconcelos Batista, Frederico Lopes, Flávia Coimbra Delicato, Paulo F. Pires:
Horizontal Auto-Scaling in Edge Computing Environment using Online Machine Learning. 161-168 - Menglu Li, Eleonora Achiluzzi, Md Fahd Al Georgy, Rasha Kashef:
Malicious Network Traffic Detection in IoT Environments Using A Multi-level Neural Network. 169-175 - David Boulanger, M. Ali Akber Dewan, Vivekanandan Suresh Kumar, Fuhua Oscar Lin:
Lightweight and Interpretable Detection of Affective Engagement for Online Learners. 176-184 - Hamid Shoaraee, Liang Chen, Fan Jiang:
Decision-Making of an Autonomous Vehicle when Approached by an Emergency Vehicle using Deep Reinforcement Learning. 185-191 - Long Luu, Arvind Pillai, Halsey Lea, Rubén Buendía, Faisal M. Khan, Glynn Dennis:
Accurate Step Count With Generalizable Deep Learning on Accelerometer Data. 192-196 - Fabiano P. Martins, João A. R. Paixão, Claudio M. de Farias, Flávia Coimbra Delicato:
Hercules: A context-aware multiple application and multisensor data fusion algorithm. 197-200 - Yoga Suhas Kuruba Manjunath, Vakar Kohli, Salman Ghaffar, Rasha Kashef:
Network Flow Classification and Volume Prediction using Novel Ensemble Deep Learning Architectures in the Era of the Internet of Things (IoT). 201-206 - Giancarlo Fortino, Fabrizio Gabriele, Claudio Savaglio:
A low-cost Smart Farming prototype with Internet of Things (IoT) technologies and Edge Computing devices. 207-212 - Salvatore Venticinque, Rocco Aversa, Dario Branco, Beniamino Di Martino, Antonio Esposito:
A Systematic Review on Tasks Offloading techniques from the Edge based on Code Mobility. 213-220 - Floriano De Rango, Antonio Guerrieri, Pierfrancesco Raimondo, Giandomenico Spezzano:
A Novel Edge-based Multi-Layer Hierarchical Architecture for Federated Learning. 221-225 - Yunlong Chen, Qiang Wang, Yuhong Zhang, Jingtao Sun:
VSA: Vessel Stability Assessment Model for the Response Strategy of Automated Mooring System. 226-231 - Zhicheng Liu, Qiang Wang, Jingtao Sun, Yifan Yang:
Intelligent Tracking Control Algorithm for Under-Actuated Ships Through Automatic Berthing. 232-237 - Rongzhe Ma, Qiang Wang, Yulong Zhang, Jiahong Chen, Jiajing Zhou:
A Dynamic Video Switching Mechanism for Distributed Crane Control System. 238-243 - Ruixin Ma, Chuang Wang, Xin Li:
CP Decomposition for Fast training of Bi-LSTM. 244-248 - Nasratullah Nasrat, Mohammad Dawood Babakerkhell, Gawhar Shah Gawhari, Abdul Rahim Ahmadi:
Implementation of a Predictive Model for Skilled Child Delivery Service use in Afghanistan. 249-255 - Sultanul Kabir, Emad A. Mohammed, Khobaib Zaamout, Salama Ikki:
A Traditional Machine Learning Approach for COVID-19 Detection from CT Images. 256-263 - Yongqing Zhu, Paul Horng-Jyh Wu, Fang Liu, Renuga Kanagavelu:
Disk Failure Prediction for Software-Defined Data Centre (SDDC). 264-268 - Stefano Galantino, Marco Iorio, Fulvio Risso, Antonio Manzalini:
RAYGO: Reserve As You GO. 269-275 - Jitender Pal Singh, Omar Alam, Abdulsalam Yassine:
Response of socioeconomic groups to dynamic and static tariffs of electricity. 276-281 - Robert Ahn, Sam Supakkul, Liping Zhao, Kirthy Kolluri, Tom Hill, Lawrence Chung:
A Goal-Oriented Approach for Preparing a Machine-Learning Dataset to Support Business Problem Validation. 282-289 - Pu Tian, William Grant Hatcher, Weixian Liao, Wei Yu, Erik Blasch:
FALIoTSE: Towards Federated Adversarial Learning for IoT Search Engine Resiliency. 290-297 - Yasuyuki Kawanishi, Hideaki Nishihara, Hirotaka Yoshida, Yoichi Hata:
A Study of The Risk Quantification Method focusing on Direct-Access Attacks in Cyber-Physical Systems. 298-305 - Ping Guo, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A location data protection protocol based on differential privacy. 306-311 - Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang:
Using information entropy to analyze secure multi-party computation protocol. 312-318 - Jianwen Hu, Yuling Chen, Xiaoiun Ren, Yixian Yang, Xiaobin Qian:
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things. 319-325 - Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A De-swinging Scheme in Location Privacy Protection via Smart Contract. 326-333 - Jing Sun, Yuling Chen, Tao Li, Jia Liu, Yixian Yang:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. 334-340 - Tianxiang Zhang, Chong Bao, Hongjia Zhai, Jiazhen Xia, Weicai Ye, Guofeng Zhang:
ARCargo: Multi-Device Integrated Cargo Loading Management System with Augmented Reality. 341-348 - Yunqiu Liu, Jia Cui, Meng Qi:
A Redirected Walking Toolkit for Exploring Large-Scale Virtual Environments. 349-354 - Chenkang Lv, Boyong Gao, Cui Yu:
A hybrid transfer learning framework for stock price index forecasting. 355-359 - Weitao Liu, Xuanyi Liu, Hui Feng, Yiran Wang, Lintao Guan, Weifeng Xu, Guojiang Shen, Zhi Liu, Xiangjie Kong:
ST-TAP: A Traffic Accident Prediction Framework Based on Spatio-Temporal Transformer. 360-365 - Minghao Zhang, Lingmin He, Xiuhui Wang:
RSN-GAN-Based Image Translation. 366-370 - Bing Xiao, Fang Li:
Knowledge-based formal modeling for CPPS in personalized intelligent manufacturing. 371-378 - Daqian Liu, Bowen Fei, Weidong Bao, Xiaomin Zhu, Tong Men:
Cooperative Observation Oriented UAVs Tracking Model in Uncertain Environment. 379-384 - Guoliang Su, Jianjun Cui, Xiang Ma:
Measurement spatial deformation of bone loading based on 3D surface modeling. 385-388 - Rui Yuan, Xinna Wang, Jiangmin Xu, Shunmei Meng:
A Differential-Privacy-based hybrid collaborative recommendation method with factorization and regression. 389-396 - Xinna Wang, Rui Yuan, Jiangmin Xu, Shunmei Meng:
A Privacy-Aware Multi-Preference-Based Collaborative Filtering Recommendation System with LSH. 397-404 - Maozheng Pi, Ning Jin, Xiang Ma, Ke Yan:
Short-term Solar Irradiation Prediction Model Based on WCNN_ALSTM. 405-412 - Yanping Xu, Zhenliang Qiu, Jieyin Zhang, Xia Zhang, Jian Qiu, Fangzhou Guo:
Oversampling based on WGAN for Network Threat Detection. 413-418 - Xinkai Rui, Chengzhuan Bao, Li Zhang, Dehua Chen:
An Ontology-Driven Structured Processing Method for History of Present Illness of Discharge Summary. 419-427 - Zhendong Zhang, Xiang Ma, Ke Yan:
A deep learning model for PM2.5 concentration prediction. 428-433 - Jing Zhang, Jiawei Sun, Jixiang Gan, Qi Liu, Xiaodong Liu:
Improving Domestic NILM Using An Attention-Enabled Seq2Point Learning Approach. 434-439 - Ting Hao, Tong Lu, Xia Li:
Classification of Chest X-ray Images Using Deep Convolutional Neural Network. 440-445 - Jinmei Yang, Bi Huang, Fei Dai, Zhihong Liang, Zhenping Qiang:
Security and Privacy for Blockchain: A Systematic Mapping Study. 446-453 - Zihao Wu, Xueyan Wu, Qi Liu, Xiaodong Liu:
An Intelligent Method for Upper Limb Posture Recognition Based on Limited MEMS Data. 454-459 - Hongyu Zhu, Jianwei Tian, Zheng Tian, Shi Zhu, Haozhi Li, Yuxiang Zhang:
Anomaly Traffic Detection with Verifiable Interpretation in Industrial Networks. 460-467 - Weiwei Yu, Dian Jin, Xiaokun Zhang:
Adaptive Visual Information Support System. 468-474 - Zhichen Hu, Xiangben Hu, Lianyong Qi, Shengjun Xue, Xiaolong Xu:
An Information Extraction Method for Sedimentology Literature with Semantic Rules. 475-481 - Hao Wu, Qi Liu, Xiaodong Liu, Yonghong Zhang, Xiaolong Xu, Muhammad Bilal:
A FCN Approach to Blockage Correction in Radars. 482-487 - Kailin Wu, MengTing Cao, Pan Wang, Zixuan Wang:
Convolutional One-Dimensional Variational Autoencoder Based Intrusion detection. 488-493 - Qingsong Jiao, Botong Xu, Yunjie Fan:
Design of Cloud Native Application Architecture Based on Kubernetes. 494-499 - Weiwei Zhang, Xinhua Tang:
Copy Move Forgery Detection Based on Dense-field and Sparse-field Method. 500-506 - Huihui Xue, Fei Dai, Guozhi Liu, Pengfei Cao, Bi Huang:
Edge Computing: A Systematic Mapping Study. 507-514 - Ilyas Orazbek, Marcelo T. Lafleur, D. Frank Hsu:
Improving SDG Classification Precision of Topic Models with Combinatorial Fusion Algorithm. 515-520 - Weichao Gao, Cheng Qian, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Towards Scalability of the IoT Search Engine. 521-528 - Luanjuan Jiang, Xin Chen:
Understanding the impact of cyber-physical correlation on security analysis of Cyber-Physical Systems. 529-534 - Botong Xu, Hongliang Chen, Siyuan Jin, Qingsong Jiao:
A Digital Currency System with Transaction Amount Privacy Protection. 535-540 - Siying Qian:
IoT Application with Tortoise Smart Home. 541-547 - Xiaopu Wang, Jinwei Deng, Chao Qi:
Unusual Expression Detection in Multiple Scenarios Based on One-Class SVM. 548-553 - Jinwei Deng, Xiaopu Wang, Huiquan Zhang:
Online Environment Abnormal Expression Detection Based on Improved Autoencoder. 554-559 - Wei Zhang, Hanqing Zhu, Zhigang Gao:
An Analytical Model for Normative Financial Texts and Research on Financial Strategies in an Intelligent Multi-factor Framework. 560-566 - Xiangben Hu, Jielin Jiang, Zhichen Hu, Tao Huang, Shengjun Xue, Xiaolong Xu:
DeshengNet: An Information Extraction Model for Table in Digital Documents. 567-573 - Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani:
Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency. 574-581 - Masoud Erfani, Farzaneh Shoeleh, Sajjad Dadkhah, Barjinder Kaur, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani:
A feature exploration approach for IoT attack type classification. 582-588 - Xiaomei Cheng, Hossein Farahmand, Mojtaba Yousefi, Reza Arghandeh, Hao Wang:
Inflow Forecasting Based On Principal Component Analysis and Long Short Term Memory. 589-596 - Ming Zuo, Hongjin Zhao, Meihuaju Huang, Dehua Chen:
Knowledge-Powered Thyroid Nodule Classification with Thyroid Ultrasound Reports. 597-604 - Chunlin Chen, Jing Wang, Liming Wu, Gewen Sun, Shaohua Chang, Junze Tong, Rongrong Ma, Zixuan Wang, Xiaolong Wang:
An automatic fiber coupling system utilizing a modified evolutionary algorithm. 605-610 - Boliang Lv, Peizhe Cheng, Cheng Zhang, Hong Ye, Xianzhe Meng, Xiao Wang:
Research on Modeling of E-banking Fraud Account Identification Based on Federated Learning. 611-618 - Xin Tang, Linna Zhou, Guang Tang, Yixuan Cheng:
Reversible Data Hiding Based on Improved Block Selection Strategy and Pixel Value Ordering. 619-627 - Shengyao Sun, Yinghui Yang, Yun Xing:
NCRG: A Node Classification Method Based on Updated Risk Graph under Hybrid Replica Consistency Strategy. 628-636 - Xiaobing Liu, Entao Luo, Jie Yang, Xiangdong Yin, Tangsen Huang, Lehua Hu:
Semi-Supervised Intrusion Detection Method based on Adversarial Autocoder. 637-643 - Wenzhi Cheng, Entao Luo, Yayuan Tang, Li Wan, Meiyan Wei:
A Survey on Privacy-security in Internet of Vehicles. 644-650 - Chung-Ming Huang, Tzu-Yu Wu:
The Time-Extended V2V2I path Prediction Method for Multi-RSU VANET Data Offloading based on the Multi-Access Edge Computing (MEC) Architecture. 651-658 - Xiaojuan Cai, Yaokai Feng, Kouichi Sakurai:
Sequential Detection of Cyber-attacks Using a Classification Filter. 659-666 - Lei Zeng, Jiawei Sun, Jianhao Ma, Qi Liu:
Task Scheduling Based on Multi-level Hashing and HRRN in cloud computing. 667-672 - Yuhao Hua, Binggang Xiao, Jiaying Li, Kaiyi Wu, Wang Wu, Jiabin Yu:
Design and Implementation of Face Recognition System Based on Raspberry Pie. 673-678 - Xin Shen, Weijian Huang, Jing Gong, Zhixin Sun:
A hyperbolic embedding for scale-free networks. 679-685 - Yifan Chang, Xin Shen, Jing Gong, Zhixin Sun:
MSBiNN: Multi-scale Bipartite Graph Neural Network for Recommender System. 686-692 - Rina Amano, Jianhua Ma:
Recognition and Change Point Detection of Dogs' Activities of Daily Living Using Wearable Devices. 693-699 - Guanghao Xiong, Ke Yan:
Multi-task sentiment classification model based on DistilBert and multi-scale CNN. 700-707 - Hui Leng, Wenmin Lin, Zhigeng Pan:
A Sparsity-Aware Hybrid Collaborative Recommendation Method with Multi-Source Data. 708-715 - Chong Chen, Xiaoyu Zhu, Xiaobin Kang, Han Zhou:
A Deep Learning Algorithm for Groundwater Level Prediction based on Spatial-temporal Attention Mechanism. 716-723 - Brandon D. Anderson, Stephen S. Yau:
A Blockchain-Based Scalable Approach to Protecting Electronic Voting from Central Authority Attacks. 724-730 - Nan Yao, Yuxi Zhao, Xi Wu, Ziquan Liu, Jianhua Qin:
Bolt Defect Detection Based on CenterNet Model. 731-737 - Nan Yao, Ziquan Liu, Zhen Wang, Yongling Lu, Hai Xue:
Detection of Transmission Line Corridors Risk Intrusion based on B-CNN. 738-744 - Ziquan Liu, Nan Yao, Xi Wu, Jinggang Yang, Hai Xue:
Feature Pyramid Hierarchy based DeltaNet Network for Insulator Defect Detection. 745-750 - Zhan Wang, Kai Wang, Yanwei Wang:
Alpha Divergence based Siamese Network for Object Tracking. 751-758 - Brahim Walid, Jianhua Ma, Muxin Ma, Alex Qi, Yunlong Luo, Yihong Qi:
Recent Advances in Radar-Based Sleep Monitoring - A Review. 759-766 - Yang Yan, Ziru You, Wen-Bo Huang:
A Review of the Classification of Artery and Vein Retinal Vessels Based on Machine learning. 767-774 - D. Frank Hsu, Mohammad Shehata, Shao-Min Hung, Shinsuke Shimojo, Ryota Kanai, Christina Schweikert, Michael W. David, Vincenzo Piuri, Jianhua Ma:
Human Cognition and Hyper Intelligence. 775-781 - Ke Zhu, Jiaxin Yang, Xin Qi, Jing Jin, Yusheng Yi, Zhao Cheng, Ke Liang:
High Reliability and Wide Coverage Space-based TT&C System Based on S/Ka Dual band Wide and Narrow Beam Fusion Technology. 782-785 - Yusheng Yi, Ke Liang, Jiaxin Yang, Ke Zhu, Zhao Cheng, Xin Qi, Shuqi Zhang:
Design and Implementation of Space-and-Earth Network for China Manned Spacecraft. 786-789 - Zhao Cheng, Yusheng Yi, Ke Zhu, Xin Qi, Le Ying, Jiaxin Yang, Shuqi Zhang:
Research and Simulation of a Space Network Flow Control Strategy for China's Manned Space Station. 790-793 - Jiaxin Yang, Yusheng Yi, Ke Zhu, Zhao Cheng, Xin Qi, Le Ying, Shuqi Zhang:
Research on Antenna Switching Strategy in Manned-Spacecraft Assembly and Construction. 794-797 - Fatma Outay, Haroon Malik, Anthony Zappin, Kanimozhi Kalaichelvan:
Towards Understanding the Monetization and Censorship Aspect of Streaming Media. 798-801 - Xiaohua Feng, Marc Conrad, Elias Eze, Khalid Hussein:
Artificial Intelligence and Blockchain for Future Cyber Security Application. 802-805 - Lukasz Migacz, Xiaohua Feng, Marc Conrad:
Automotive Security and Theft Prevention Systems: State of The Art. 806-812 - Yun Wang, Pan Wang, Zixuan Wang, Kailin Wu:
Evaluation of feature selection on network traffic classification. 813-818 - Mamoona Naveed Asghar, Mohammad Samar Ansari, Nadia Kanwal, Brian Lee, Marco Herbst, Yuansong Qiao:
Deep Learning based Effective Identification of EU-GDPR Compliant Privacy Safeguards in Surveillance Videos. 819-824 - Jessica Akati, Marc Conrad:
Anti-Tailgating Solution Using Biometric Authentication, Motion Sensors and Image Recognition. 825-830 - P. Zamorski, Mamoona Naveed Asghar, L. Cooke, S. Daly, J. Francis, Nadia Kanwal, Mohammad Samar Ansari, Enda Fallon:
Deep Learning based Customer Count/Flow Monitoring System for Social Distancing. 831-836 - Junke Xu, Tang Ying:
Legal Protection of Personal Data in China. 837-842 - Ruomu Feng, Xiaohua Feng:
Robot, Edge Intelligence and Data Survey. 843-848 - Arta Farahmand, M. Ali Akber Dewan, Fuhua Oscar Lin:
Constructing Intelligent Learning Dashboard for Online Learners. 849-857 - Wu-Yuin Hwang, Rio Nurtantyana, Juli Hildayati:
Investigation of students' understanding of speech with smart mechanisms and scaffolding in flipped classrooms. 858-862 - Stefanie Amiruzzaman, Md. Amiruzzaman:
Students' Academic Performance Multitasking and Digital Social-Networking using Twitter. 863-866 - Xuan Huang, Bo Wu, Hiroyuki Kameda:
Development of a Sign Language Dialogue System for a Healing Dialogue Robot. 867-872 - Hanlin Wu, Yuqiu Pan, Xiaoqi Weng, Hong Chen:
Design of Campus Health Information System using Face Recognition and Body Temperature Detection. 873-878 - Xiaoqi Weng, Hanlin Wu, Yuqiu Pan, Hong Chen:
Decentralized Personal Cloud Data Model and its Application in Campus Health Information System. 879-883 - Weipeng Cen, Zhigang Gao, Ruichao Xu, Bo Wu, Leilei Zheng, Wei Zhao, Lei Xiao, Xuanzhang He:
Extraction Method for Constructive Proposals based on Online Comments. 884-889 - Bo Wu, Yuan Wu, Shoji Nishimura, Qun Jin:
Analysis on Falling Risk of Elderly Workers when Mowing on a Slope via Motion Capture. 890-895 - Jie Gao, Bo Wu, Kiminori Sato:
A Wearable Warning System Design for Mask Recognition via AR Smart Glasses. 896-900 - Zijun Wang, Bo Wu, Kiminori Sato:
A Depth Camera-based Warning System Design for Social distancing Detection. 901-906 - Nanling Shen, Yishui Zhu, Chrispus Zacharia Oroni, Luyang Wang:
Analysis of Drivers' Eye movements with Different Experience and Genders in Straight-line Driving. 907-911 - Chrispus Zacharia Oroni, Yishui Zhu, Nanling Shen:
Eye Movement Driving Analysis during Parallel Parking along Roadways: Comparison of Experienced and Novice Drivers. 912-917 - Dingrui Xue, Jingjun Cheng, Xiangmo Zhao, Zhen Wang:
A Vehicle-in-the-Loop Simulation Test Based Digital-Twin for Intelligent Vehicles. 918-922 - Ting Han, Xuna Zhan, Jing Tao, Ken Cao, Yuheng Xiong:
Anomaly Upload Behavior Detection Based on Fuzzy Inference. 923-929 - Liu Yu, Kailiang Chen, Yue Chang, A. Chen, Qidi Yin, Hangwei Zhang:
A New Correlation Model of IoT Attack Based on Attack Tree. 930-935 - Guanyi Su:
Federated Online Learning Based Recommendation Systems for Mobile Social Applications. 936-939 - Kun Ling, Jiulei Jiang, Shengqing Li:
Research on Personalized Recommendation Algorithm Based on Dynamic Network. 940-945 - Qiao Pan, Qian Li, Dehua Chen, Liying Xie:
Prediction and Interpretation of Epidemic Spread Based on Long-Short Term Memory Model. 946-951 - Jing Tao, A. Chen, Kai Liu, Kailiang Chen, Fengyuan Li, Peng Fu:
Recommendation Method of Honeynet Trapping Component Based on LSTM. 952-957 - Rongzhao Wang, Libo Liu:
Paint to Better Describe: Learning Image Caption by Using Text-to-Image Synthesis. 958-964 - Yanting Bi, Bing Li, Hongzhe Wang:
Detecting Depression on Sina Microblog Using Depressing Domain Lexicon. 965-970 - Na Chen, Shengling Geng, Lin Li:
Modeling and verification of CPS based on uncertain hybrid timed automaton. 971-978 - Kazi Samiul Kader, Md Tareque Hasan Tahsin, Md. Shohrab Hossain, Husnu S. Narman:
Ransomware Detection Using Binary Classification. 979-984 - Chenru Zhao, Carson K. Leung, Adam G. M. Pazdor, Qi Wen:
Analyzing COVID-19 Epidemiological Data. 985-990
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.