|
Traditional Chinese Medicine Health Status Identification with Graph Attention Network |
|
|
1 | (14) |
|
|
|
|
|
|
|
Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence |
|
|
15 | (12) |
|
|
|
|
|
|
Privacy Preserving CSI Fingerprint Device-Free Localization |
|
|
27 | (13) |
|
|
|
|
|
|
A Novel Blockchain-MEC-Based Near-Domain Medical Resource Sharing Model |
|
|
40 | (17) |
|
|
|
|
Pairwise Decomposition of Directed Graphic Models for Performing Amortized Approximate Inference |
|
|
57 | (15) |
|
|
|
|
|
|
VDDL: A Deep Learning-Based Vulnerability Detection Model for Smart Contracts |
|
|
72 | (15) |
|
|
|
|
|
|
|
|
|
Robust Remote Sensing Scene Classification with Multi-view Voting and Entropy Ranking |
|
|
87 | (12) |
|
|
|
|
|
Visualized Analysis of the Emerging Trends of Automated Audio Description Technology |
|
|
99 | (10) |
|
|
|
Anomaly Detection for Multi-time Series with Normalizing Flow |
|
|
109 | (9) |
|
|
|
|
|
|
|
Encrypted Transmission Method of Network Speech Recognition Information Based on Big Data Analysis |
|
|
118 | (15) |
|
|
A Lightweight NFT Auction Protocol for Cross-chain Environment |
|
|
133 | (14) |
|
|
|
|
A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic Images |
|
|
147 | (13) |
|
|
|
|
|
Swarm Intelligence for Multi-objective Portfolio Optimization |
|
|
160 | (10) |
|
|
|
|
|
Research on Secure Cloud Storage of Regional Economic Data Network Based on Blockchain Technology |
|
|
170 | (15) |
|
|
Data Leakage with Label Reconstruction in Distributed Learning Environments |
|
|
185 | (13) |
|
|
|
|
Analysis Method of Abnormal Traffic of Teaching Network in Higher Vocational Massive Open Online Course Based on Deep Convolutional Neural Network |
|
|
198 | (15) |
|
|
|
Spatio-Temporal Context Modeling for Road Obstacle Detection |
|
|
213 | (15) |
|
|
|
|
|
|
A Survey of Android Malware Detection Based on Deep Learning |
|
|
228 | (15) |
|
|
|
|
|
Information Encryption Transmission Method of Automobile Communication Network Based on Neural Network |
|
|
243 | (14) |
|
|
|
|
Explanation-Guided Minimum Adversarial Attack |
|
|
257 | (14) |
|
Mingting Liu, Xiaozhang Liu, Anli Yan, Yuan Qi, and Wei Li CIFD: A Distance for Complex Intuitionistic Fuzzy Set |
|
|
271 | (10) |
|
|
|
Security Evaluation Method of Distance Education Network Nodes Based on Machine Learning |
|
|
281 | (15) |
|
|
MUEBA: A Multi-model System for Insider Threat Detection |
|
|
296 | (15) |
|
|
|
|
|
Bayesian Based Security Detection Method for Vehicle CAN Bus Network |
|
|
311 | (15) |
|
|
|
Discrete Wavelet Transform-Based CNN for Breast Cancer Classification from Histopathology Images |
|
|
326 | (15) |
|
|
|
|
|
|
Machine Learning Based Security Situation Awareness Method for Network Data Transmission Process |
|
|
341 | (15) |
|
|
Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem |
|
|
356 | (10) |
|
|
|
|
|
High Voltage Power Communication Network Security Early Warning and Monitoring System Based on HMAC Algorithm |
|
|
366 | (14) |
|
|
Large Scale Network Intrusion Detection Model Based on FS Feature Selection |
|
|
380 | (14) |
|
|
|
|
Research on Intelligent Detection Method of Automotive Network Data Security Based on FlexRay/CAN Gateway |
|
|
394 | (15) |
|
|
|
|
Adversarial Attack and Defense on Natural Language Processing in Deep Learning: A Survey and Perspective |
|
|
409 | (16) |
|
|
|
|
|
A Novel Security Scheme for Mobile Healthcare in Digital Twin |
|
|
425 | (17) |
|
|
|
|
Construction of Security Risk Prediction Model for Wireless Transmission of Multi Axis NC Machining Data |
|
|
442 | (15) |
|
|
|
|
Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain |
|
|
457 | (15) |
|
|
|
|
|
Diverse Web APIs Recommendation with Privacy-preservation for Mashup Development |
|
|
472 | (14) |
|
|
|
|
|
|
|
Network Security Evaluation Method of College Freshmen Career Counseling Service Based on Machine Learning |
|
|
486 | (15) |
|
|
|
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning |
|
|
501 | (15) |
|
|
|
|
|
Increase Channel Attention Based on Unet++ Architecture for Medical Images |
|
|
516 | (5) |
|
|
|
|
|
Distributed Power Load Missing Value Forecasting with Privacy Protection |
|
|
521 | (14) |
|
|
|
|
|
|
|
|
|
Differentially Private Generative Model with Ratio-Based Gradient Clipping |
|
|
535 | (15) |
|
|
|
Differential Privacy Protection Algorithm for Data Clustering Center |
|
|
550 | (10) |
|
|
|
|
Improved Kmeans Algorithm Based on Privacy Protection |
|
|
560 | (8) |
|
|
|
|
Symmetry Structured Analysis Sparse Coding for Key Frame Extraction |
|
|
568 | (18) |
|
|
|
|
|
|
Data Reconstruction from Gradient Updates in Federated Learning |
|
|
586 | (11) |
|
|
|
|
|
|
|
Natural Backdoor Attacks on Speech Recognition Models |
|
|
597 | (14) |
|
|
|
|
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction |
|
|
611 | (13) |
|
|
|
|
|
AP-GCL: Adversarial Perturbation on Graph Contrastive Learning |
|
|
624 | (10) |
|
|
|
|
An Overview of Opponent Modeling for Multi-agent Competition |
|
|
634 | (15) |
|
|
|
|
|
|
Research on Potential Threat Identification Algorithm for Electric UAV Network Communication |
|
|
649 | (16) |
|
|
|
|
|
Author Index |
|
665 | |