default search action
ICEA 2021: Jinan, China
- ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28 - 29, 2022. ACM 2021, ISBN 978-1-4503-9160-3
- Kijung Bong, Jonghyun Kim:
Security Use-Cases for Countering Threats of CLA and UAV in 6G. 10-15 - Ran Dong, Yangfei Lin, Qiong Chang, Junpei Zhong, DongSheng Cai, Soichiro Ikuno:
Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang Transform. 16-21 - Chi-Tse Lu, Chun-Wei Tsai:
An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection. 22-27 - Yu-Chen Luo, Chun-Wei Tsai:
Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light Control. 28-33 - Cong Zhou, Baokang Zhao, Baosheng Wang, Yulei Yuan:
CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture. 34-39 - Yi-Ping Chen, Chun-Wei Tsai:
An Effective Neural Architecture Optimization Algorithm for CNN based on Search Economics. 40-45 - Tong Li, Bingwen Feng, Guofeng Li, Xinzhen Li, Mingjin He, Peiya Li:
Visible Watermark Removal Based on Dual-input Network. 46-52 - Hsiao-Yuan Hsu, Nai-Hsin Cheng, Chun-Wei Tsai:
A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs. 53-58 - Wei-Lun Chuang, Chun-Wei Tsai, Ming-Chao Chiang:
Search Economics for Multi-Objective Vehicle Routing Problem with Time Windows. 59-64 - Meng-Ting Wu, Hung-I Lin, Chun-Wei Tsai:
A Training-free Genetic Neural Architecture Search. 65-70 - Jianmao Xiao, Jia Zeng, Su Yao, Yuanlong Cao, Yiwen Jiang, Wenle Wang:
Listening to the Crowd for the Change File Localization of Mobile Apps. 71-76 - Huifen Feng, Xincheng Yan, Na Zhou, Zhihong Jiang, Ying Liu:
A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT. 77-82 - Wenqing Chang, Xiang Li, Huomin Dong, Chunxiao Wang, Zhigang Zhao, Yinglong Wang:
Real-Time Prediction of Ocean Observation Data Based on Transformer Model. 83-88 - Shujiang Xu, Fengkai Liu, Lingyun Meng, Lianhai Wang, Xu Chang, Weijun Yang:
A Scheme of Traceless File Deletion for Windows FAT32 File System. 89-93 - Panpan Zhang, Xuebin Wang, Jing Ya, Jiapeng Zhao, Tingwen Liu, Jinqiao Shi:
Darknet Public Hazard Entity Recognition Based on Deep Learning. 94-100 - Zeyu Liu, Kexian Liu, Jing Zhang, Jianfeng Guan:
In-network Computing based Transmission Optimization Mechanism in SDN. 101-105 - Yan-Ming Huang, Dongjie Liu, Zhiwei Yan, Yan-Ming Zhang, Guang-Gang Geng:
An Abused Webpage Detection Method Based on Screenshots Text Recognition. 106-110 - XiaoMin Zhu, Wenqian Du, GuangGang Geng, Bing Xue:
Research on pork price prediction based on multi-dimensional feature analysis and machine learning. 111-116 - Yiqi Liu, Longhua Yuan, Daoping Huang:
Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater Treatment. 117-121 - Jingshan Pan, Lei Xiao, Min Tian, Tao Liu, Li Wang:
Heterogeneous multi-core optimization of MUMPS solver and its application. 122-127 - Maoli Wang, Kunlun Yang, Yining Zhao, Yalin Wang, Jinan Guo, Xu Ma:
Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing. 128-133 - Xiuhao Zhao, Zhao Li, Shiwei Wu, Yiming Zhan, Chao Zhang:
Deep Text Matching in Medical Question Answering System. 134-138 - Xuetao Li, Jingjian Zhang, Xiaotong Niu, Jianfeng Guan:
Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments. 139-145 - Junjie Wang, Min Tian, Shan Qiao:
swMETIS: A high performance graph partitioning library on Sunway manycore architecture. 146-151 - Jiawei Liu, Qiang Guo, Yuan Zhuang, Haihong Zhang, Yunhui Zeng:
An automatic many-core code generation method and its implementation under Sunway environment. 152-157 - Hao Liu, Lejun Ji, Ting Xiong, Weijun Li, Lili Wang, Yuanlong Cao:
Blockchain-Based Statistical Library for Telecom Security Fraud Cases. 158-163 - Chuantao Li, Jidong Huo, Zhigang Zhao, Lu Wu:
Intelligent Detection of Marine Organisms with Deep Learning based on Attention Mechanism. 164-169 - Xiang Li, Zhaoqian Zhang, Zhigang Zhao, Lu Wu, Jidong Huo, Jian Zhang, Yinglong Wang:
ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction. 170-175 - Ma Cheng, Wang Lu:
A Fast Light Baking System for Mobile VR Game Based on Edge Computing Framework. 176-181 - Yiqi Liu, Kaqi Li, Daoping Huang:
Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater Treatment. 182-187 - Dan Wang, Junjie Wang, Chaochao Yang, Yongqiang Ren:
Simulating QSAR Model of ERa Bioactivity by Statistics and Machine Learning. 188-193 - Chaochao Yang, Junjie Wang, Anjun Liu, Dan Wang, Jie Hou, Meng Guo:
Prediction effect of ADMET properties based on machine learning. 194-199 - Xu Han, Xincheng Yan, Na Zhou, Zhihong Jiang, Ranshuang Li, Ying Liu:
A Lightware Attribute Based Access Control Mechanism in Software Defined Internet of Things. 200-204 - Xuebin Wang, Zeyu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang:
Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario. 205-210 - Chao Zhang, Zhao Li, Tong Chen, Yiming Zhan, Xiuhao Zhao:
ITGNN: Item Transition Attentive Graph Neural Network for Session-Based Recommendation. 211-216 - Shanghan Xie, Xincheng Yan, Na Zhou, Zhihong Jiang, Ying Liu:
A Delay-guaranteed Routing Mechanism Based on Active Network Telemetry in Deterministic Network. 217-222 - Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. 223-228 - Runhu Wang, Zhuohao Wang, Dong Wang, Ying Liu:
In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack. 229-233 - Chunxiao Wang, Zhigang Zhao, Jian Zhang, Jidong Huo:
Research of Big Data Storage System Based on Underground Space Information. 234-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.