default search action
AISS 2022: Sanya, China
- Proceedings of the 4th International Conference on Advanced Information Science and System, AISS 2022, Sanya, China, November 25-27, 2022. ACM 2022, ISBN 978-1-4503-9793-3
- Zhenhao Jiang:
An Attention GRU-XGBoost Model for Stock Market Prediction Strategies. 1:1-1:5 - Omar Challaf, Sook-Ling Chua, Lee Kien Foo:
Trip Itinerary Generation with 2-Opt Algorithm. 2:1-2:5 - Jing Zhang, Jinglei Tang, Yingqiu Huo:
Semantic segmentation of pulmonary nodules based on attention mechanism and improved 3D U-Net. 3:1-3:5 - Musashi Takanezawa, Yoshifumi Manabe:
Many-to-many perfect matching. 4:1-4:7 - Peng Duan:
Privacy Protection Technology in IOT Data Storage Based on Blockchain. 5:1-5:4 - Lei Chen, Jinghua Sun, She Jia:
Study on the Application of RTCA/DO-178C in IMA Architecture. 6:1-6:6 - Wennan Wang, Hanxu Zhao, Yu Li, Junyu Su, Jiadong Lu, Baoping Wang:
Research on cross-project software defect prediction based on feature transfer method. 7:1-7:5 - Lixu Lu, Jian-Xun Zhang:
Rearch on AI industry prediction based on Markov model. 8:1-8:5 - Wei Xu, Xiaoyang Wang, Haoyu Mao, Yongkun Li:
The Design and Practice of Linux Kernel Based Experiments for Operating System Course. 9:1-9:5 - Luxia Ai, Xiang Sun, Qianman Zhang, Zhiqing Miao, Guangjie Li, Shaojing Song:
Soil moisture prediction model based on LSTM and Elman neural network. 10:1-10:7 - Shuifa Sun, Yongheng Tang, Yunfei Shi, Yuan Guo, Tinglong Tang, Yirong Wu:
An Efficient Warp-Based Motion Magnification Method to Reveal Subtle Changes in Video. 11:1-11:7 - Lidan Li, Zhe Jiang, Xiaozheng Zhang:
A Video information transmission architecture based on on-top system. 12:1-12:5 - Han Yun, Xin Deng, Yulu Du:
News Recommendation with Multi-views Emotion Analysis. 13:1-13:5 - Lei Bo, Zihang Zhang, Yang Liu, Zecheng Li:
Research on IOT online monitoring system based on efficient utilization pathway of mine water. 14:1-14:6 - Zihang Zhang, Lei Bo, Yang Liu, Zecheng Li:
Mine drainage optimization scheduling based on genetic algorithm. 15:1-15:6 - Linna Zhang, Yuehui Chen, Yi Cao, Yaou Zhao:
BERT Model Compression With Decoupled Knowledge Distillation And Representation Learning. 16:1-16:4 - Hanqiang Deng, Jian Huang, Quan Liu:
Research on Time Synchronization and Routing Maintenance for Narrowband Ad Hoc Networks. 17:1-17:5 - Yi Liu, Honglei An, Hongxu Ma:
A Biped Robot Learning to Walk like Human by Reinforcement Learning. 18:1-18:5 - Zhiyuan Ge, Fei Wang, Rui Hua:
Interdisciplinary Attribute Evaluation Of Postgraduate Supervisors In Beijing University of Technology. 19:1-19:5 - Yixuan Lin:
RPSigmoid: A Randomized Parameterization for a Sigmoidal Activation Function. 20:1-20:5 - Fei He, Wei Zhang, Na Zhan, Xi Wang, Jing Li:
Graph Neural Network Recommendation Method Based on User Behavior. 21:1-21:7 - Jing Zhang:
Research on Construction and Operation of Rural E-commerce Supply chain. 22:1-22:7 - Ruogu Li:
Overturning the Counting Cornerstone: Exploring Fine-Grained Adaptive Losses to Subvert the Conventional Density Estimation. 23:1-23:8 - Wei Liu, Xin Du:
LARW: Network Representation Learning Algorithm Based On Long Anonymous Random Walks. 24:1-24:4 - Ruijie Tian, Weishi Zhang, Fei Wang:
BOD-tree: An One-Dimensional Balanced Indexing Algorithm. 25:1-25:4 - Rongfeng Li, Xiaonan Xu, Yanyan An:
A Beamspace-Based Sparse Estimation Method for Array Signal. 26:1-26:5 - Yijun Huang, Renwen Chen, Yidi Chen, Shanshan Ding, Jiaqing Yao:
A Fast bearing Fault diagnosis method based on lightweight Neural Network RepVGG. 27:1-27:6 - Lin Wang, Dong Sun, Zhu Yuan, Qingwei Gao, Yixiang Lu:
Multi-view clustering study based on subspace. 28:1-28:5 - Margaret Gao, Rachel Huang, Arul Rhik Mazumder, Fei Li:
Comparisons of Classic and Quantum String Matching Algorithms✱. 29:1-29:6 - Songbai Zhu, Guolai Yang:
Research on LightGBM-based fault prediction for electrical equipment in artillery fire control system. 30:1-30:6 - Angesh Anupam:
Nonlinear multivariate modelling of wetland dynamics. 31:1-31:4 - Liangjuan Zhou, Wei Miao:
An improved hybrid regularization approach for extreme learning machine. 32:1-32:7 - Weifeng Chen, Hui Ding, Bo Li, Bin Liu:
Phase-MLP for Generalizable Implicit Neural Representations. 33:1-33:6 - Jiawei Chen, Hongjie Liu, Kexian Gong, Zhongyong Wang, Wei Wang:
Short-term air traffic flow forecasting based on model fusion. 34:1-34:6 - Yanli Li, Congyi Wang:
Improve GAN-based Neural Vocoder using Truncated Pointwise Relativistic Least Square GAN. 35:1-35:7 - Chenbing Zhao:
Capsule Network with Inception Structure for Image Classification. 36:1-36:5 - Shuli Ma, Liting Sun, Yufei Niu, Han Liu, Huiqian Du, Feihuang Chu, Shengliang Fang:
Electromagnetic data completion and prediction method based on tensor train. 37:1-37:6 - Haochen Qi, Huiyan Ji, Jiqiang Zhang, Liu Cheng, Xiangwei Kong:
Defect Classification Method of X-ray Images Based on Improved U-Net. 38:1-38:7 - Hao Wu, Chong Zhang, Li Shui, Yamiao Zhang, Mengda Lei, Xianlong Li:
Research on Radar Signal Recognition Technology Based on Residual Convolutional Neural Network. 39:1-39:6 - Guozheng Feng, Jianbo Xu, Wei Jian, Zhang Liu:
Load prediction optimization based on machine learning in cloud computing environment. 40:1-40:5 - Chunyan Wu, Li Li, Zhigui Liu, Xiaoqian Zhang:
Machine Reading Comprehension Based on SpanBERT and Dynamic Convolutional Attention. 41:1-41:5 - Yanhui Xu, Tong Zhang, Dunzhao Yang:
Application of Vision Technology in Automatic Tracking of Robot. 42:1-42:3 - Xiaofan Zhao, Wenming Ma:
Event Recommendation Based on Heterogeneous Social Network Information and Time Information. 43:1-43:7 - Letan Zhang, Guiwen Lan, Xiaoyong Shi, Xing-Hui Duanmu, Kan Chen:
Point Cloud Classification Method for Transmission Towers based on CAA-PointNet. 44:1-44:4 - Yingchun Huan, Xiaoyong Kang, Zhenjie Zhang, Qi Zhang, Yuju Wang, Yafen Wang:
AIS-Based Vessel Traffic Flow Prediction Using Combined EMD-LSTM Method. 45:1-45:8 - Liang Guo, Yunjun Lu, Qian Liu, Ke Zhu, Lvjun Zhao:
A method for task network partition with limited community number. 46:1-46:6 - Shengzhi Yuan, Jiayu Zhang, Jianwei Lai, Haidi Dong:
Research on An Intelligent Fault Diagnosis Method for Rolling Bearing Based on Wavelet Packet and PSO-BP Network Algorithm. 47:1-47:5 - Chao Xia:
Research on site laboratory data based on isolation forest and canonical correlation analysis. 48:1-48:6 - Yong Hu, Zheng Guan, Tianyu Zhou:
Deep Reinforcement Learning for Dynamic OCW in UORA. 49:1-49:6 - Yaru Yang, Zhi Liu, Jiaxing Song:
TRAPPER: Learning with Weak Supervision for Threat Intelligence Entity Recognition. 50:1-50:7 - Chen Yang, Guo Zhen, Chenya Bian, Yuqiao Ning, Shihao Xue:
Intelligent Connected Vehicles Cybersecurity Vulnerability Rating Methodology Based on Multiple Factors. 51:1-51:6 - Lu Yu, Lun Xin, Manxue Guo:
A Safe Architecture of 5G Network Intelligence Based on Federated Learning and NWDAF. 52:1-52:5 - Leigang Sun, Jin Zhang:
HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop. 53:1-53:4 - Chengxi Xu, Yunyi Zhang, Fan Shi, Huimin Ma, Wanmeng Ding, Hong Shan:
Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior. 54:1-54:6 - Huimin Wang, Dong Liang, Yuliang Xi:
Urban Path Planning Based on Improved Model-based Reinforcement Learning Algorithm. 55:1-55:6 - Lars Kornahrens, Sebastian Kritzler, Dirk Werth:
Extracting Process Instances from User Interaction Logs. 56:1-56:10 - Zhi-Yong Qiu, Zhenhua Guo, Li Wang, Yaqian Zhao, Rengang Li:
Layer-wise based Adabelief Optimization Algorithm for Deep Learning. 57:1-57:6 - Yang Liu:
Research of Network Hotspot Events Joint Extracting Based on BERT-CNN-CRF Model for Internet Public Opinion. 58:1-58:6 - Yuhan Li, Bin Wen, Haixiao Zheng:
Generic O-LLVM Automatic Multi-architecture Deobfuscation Framework Based on Symbolic Execution. 59:1-59:6 - Ming Li, Guikai Liu:
A Network Traffic Classification Model Based On XGBOOST_RFECV Feature Extraction. 60:1-60:5 - Tao Zhou:
Hierarchical Federated Learning with Gaussian Differential Privacy. 61:1-61:6 - Shiyang Song, Jiadong Lu, Hanxu Zhao, Wennan Wang, Chiyu Shi, Ruijie Luo:
Traceability of Product Supply Chain Based on Hyperledger Fabric. 62:1-62:6 - Jiaqing Yao, Renwen Chen, Yijun Huang:
Automatic identification system of aircraft cockpit indicators based on machine vision. 63:1-63:9 - Jian Hu, Jin Hou, Yong Chen, Wen-Hong Li, de hao Shi, Jie Yi, xuan ling Huang:
Rapid face detection in complex environments based on the improved RetinaFace. 64:1-64:7 - Yipeng Li, Wen Cao, Wenbing Chang, Shenghan Zhou, Runyu Zhang:
An XGBoost risk prediction model of cardiovascular and cerebrovascular diseases with plateau healthcare dataset. 65:1-65:6 - Chunyu Wen, Tianer Li, Zhiyang Qiu:
Bitcoin Price Prediction Using Autoregressive Integrated Moving Average (ARIMA) Model. 66:1-66:5 - Chongxia Pan:
Research on the Information Security Investment Strategies Considering Budget Constraints and the Attacker's Preferences. 67:1-67:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.