


default search action
ICEA 2021: Jinan, China
- ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28 - 29, 2022. ACM 2021, ISBN 978-1-4503-9160-3

- Kijung Bong, Jonghyun Kim:

Security Use-Cases for Countering Threats of CLA and UAV in 6G. 10-15 - Ran Dong

, Yangfei Lin, Qiong Chang
, Junpei Zhong, DongSheng Cai
, Soichiro Ikuno:
Motion Feature Extraction and Stylization for Character Animation using Hilbert-Huang Transform. 16-21 - Chi-Tse Lu, Chun-Wei Tsai:

An Effective Adaptive Stacking Ensemble Algorithm for Electricity Theft Detection. 22-27 - Yu-Chen Luo, Chun-Wei Tsai:

Multi-Agent Reinforcement Learning based on Two-Step Neighborhood Experience for Traffic Light Control. 28-33 - Cong Zhou, Baokang Zhao, Baosheng Wang, Yulei Yuan:

CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture. 34-39 - Yi-Ping Chen, Chun-Wei Tsai:

An Effective Neural Architecture Optimization Algorithm for CNN based on Search Economics. 40-45 - Tong Li, Bingwen Feng, Guofeng Li, Xinzhen Li, Mingjin He, Peiya Li:

Visible Watermark Removal Based on Dual-input Network. 46-52 - Hsiao-Yuan Hsu, Nai-Hsin Cheng, Chun-Wei Tsai:

A Deep Learning-Based Integrated Algorithm for Misbehavior Detection System in VANETs. 53-58 - Wei-Lun Chuang, Chun-Wei Tsai, Ming-Chao Chiang:

Search Economics for Multi-Objective Vehicle Routing Problem with Time Windows. 59-64 - Meng-Ting Wu, Hung-I Lin, Chun-Wei Tsai:

A Training-free Genetic Neural Architecture Search. 65-70 - Jianmao Xiao, Jia Zeng, Su Yao, Yuanlong Cao, Yiwen Jiang, Wenle Wang:

Listening to the Crowd for the Change File Localization of Mobile Apps. 71-76 - Huifen Feng, Xincheng Yan

, Na Zhou, Zhihong Jiang, Ying Liu:
A Cross-domain Collaborative DDoS Defense Scheme Based on Blockchain-SDN in the IoT. 77-82 - Wenqing Chang, Xiang Li, Huomin Dong, Chunxiao Wang, Zhigang Zhao, Yinglong Wang

:
Real-Time Prediction of Ocean Observation Data Based on Transformer Model. 83-88 - Shujiang Xu, Fengkai Liu, Lingyun Meng, Lianhai Wang, Xu Chang, Weijun Yang:

A Scheme of Traceless File Deletion for Windows FAT32 File System. 89-93 - Panpan Zhang, Xuebin Wang, Jing Ya, Jiapeng Zhao, Tingwen Liu

, Jinqiao Shi:
Darknet Public Hazard Entity Recognition Based on Deep Learning. 94-100 - Zeyu Liu, Kexian Liu, Jing Zhang, Jianfeng Guan

:
In-network Computing based Transmission Optimization Mechanism in SDN. 101-105 - Yan-Ming Huang, Dongjie Liu, Zhiwei Yan, Yan-Ming Zhang, Guang-Gang Geng:

An Abused Webpage Detection Method Based on Screenshots Text Recognition. 106-110 - XiaoMin Zhu, Wenqian Du, GuangGang Geng, Bing Xue:

Research on pork price prediction based on multi-dimensional feature analysis and machine learning. 111-116 - Yiqi Liu

, Longhua Yuan, Daoping Huang:
Development of Adaptive Soft-Sensors Based on Kalman-Elman Neural Network with Applications in Wastewater Treatment. 117-121 - Jingshan Pan, Lei Xiao, Min Tian, Tao Liu, Li Wang:

Heterogeneous multi-core optimization of MUMPS solver and its application. 122-127 - Maoli Wang, Kunlun Yang

, Yining Zhao, Yalin Wang, Jinan Guo, Xu Ma:
Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing. 128-133 - Xiuhao Zhao, Zhao Li, Shiwei Wu, Yiming Zhan, Chao Zhang:

Deep Text Matching in Medical Question Answering System. 134-138 - Xuetao Li, Jingjian Zhang, Xiaotong Niu, Jianfeng Guan

:
Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments. 139-145 - Junjie Wang

, Min Tian, Shan Qiao:
swMETIS: A high performance graph partitioning library on Sunway manycore architecture. 146-151 - Jiawei Liu, Qiang Guo, Yuan Zhuang, Haihong Zhang, Yunhui Zeng:

An automatic many-core code generation method and its implementation under Sunway environment. 152-157 - Hao Liu, Lejun Ji, Ting Xiong, Weijun Li, Lili Wang, Yuanlong Cao:

Blockchain-Based Statistical Library for Telecom Security Fraud Cases. 158-163 - Chuantao Li, Jidong Huo, Zhigang Zhao, Lu Wu:

Intelligent Detection of Marine Organisms with Deep Learning based on Attention Mechanism. 164-169 - Xiang Li, Zhaoqian Zhang, Zhigang Zhao, Lu Wu, Jidong Huo, Jian Zhang, Yinglong Wang

:
ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction. 170-175 - Ma Cheng, Wang Lu:

A Fast Light Baking System for Mobile VR Game Based on Edge Computing Framework. 176-181 - Yiqi Liu

, Kaqi Li, Daoping Huang:
Prediction of Biochemical Oxygen Demand Based on VIP-PSO-Elman Model in Wastewater Treatment. 182-187 - Dan Wang, Junjie Wang, Chaochao Yang, Yongqiang Ren:

Simulating QSAR Model of ERa Bioactivity by Statistics and Machine Learning. 188-193 - Chaochao Yang, Junjie Wang, Anjun Liu, Dan Wang, Jie Hou, Meng Guo:

Prediction effect of ADMET properties based on machine learning. 194-199 - Xu Han, Xincheng Yan

, Na Zhou, Zhihong Jiang, Ranshuang Li, Ying Liu:
A Lightware Attribute Based Access Control Mechanism in Software Defined Internet of Things. 200-204 - Xuebin Wang, Zeyu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang:

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario. 205-210 - Chao Zhang, Zhao Li, Tong Chen

, Yiming Zhan, Xiuhao Zhao:
ITGNN: Item Transition Attentive Graph Neural Network for Session-Based Recommendation. 211-216 - Shanghan Xie, Xincheng Yan

, Na Zhou, Zhihong Jiang, Ying Liu:
A Delay-guaranteed Routing Mechanism Based on Active Network Telemetry in Deterministic Network. 217-222 - Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:

Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. 223-228 - Runhu Wang, Zhuohao Wang, Dong Wang, Ying Liu:

In-band Network Telemetry Based Fine-Grained Traceability Against IP Address Spooling Attack. 229-233 - Chunxiao Wang, Zhigang Zhao, Jian Zhang, Jidong Huo:

Research of Big Data Storage System Based on Underground Space Information. 234-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














