default search action
DSA 2022: Wulumuqi, China
- 9th International Conference on Dependable Systems and Their Applications, DSA 2022, Wulumuqi, China, August 4-5, 2022. IEEE 2022, ISBN 978-1-6654-8877-8
- Yuan Zhao, Haojie Tang, Quanjun Zhang, Sining Liu, Jin Wang, Jia Liu:
Test Case Classification via Few-Shot Learning. 1-11 - Yuteng Lu, Kaicheng Shao, Weidi Sun, Meng Sun:
RGChaser: A RL-guided Fuzz and Mutation Testing Framework for Deep Learning Systems. 12-23 - Lizhi Cai, Jin Wang, Mingang Chen, Jilong Wang:
Reinforcement Learning Application Testing Method based on Multi-attribute Fusion. 24-33 - Huan Zhang, Yuan Zhao, Shengcheng Yu, Zhenyu Chen:
Automated Quality Assessment for Crowdsourced Test Reports Based on Dependency Parsing. 34-41 - Quanjun Zhang, Xu Zhai, Shicheng Xu, Wanmin Huang, Jingui Zhang, Yaoming Fan:
Interactive Patch Filtering via Test Generation. 42-53 - Mingwei Tang, Zhiwei Xu, Yuhao Qin, Cui Su, Yi Zhu, Feifei Tao, Junhua Ding:
A Quantitative Study of Impact of Incentive to Quality of Software Reviews. 54-63 - Haochen Jin, Zhanqi Cui, Shifan Liu, Liwei Zheng:
Improving Code Clone Detection Accuracy and Efficiency based on Code Complexity Analysis. 64-72 - Weihua Zhang, Lijin Wu, Zhaowei Xu, Yang Jian:
Construction Method of Equipment Software Defect Knowledge Base. 73-80 - Xueqing Li, Maoyuan Ma, Jing Zhang, Hanting Zhao, Wenxiu Zhang, Zixin Liu:
Software Reliability Evaluation System of Ship Information Management System. 81-85 - Junfeng Nie, Xingiun Chen:
Modeling and Solution of Spatio-temporal Collaborative Planning in Joint Operations based on Temporal Constraint Network. 82-87 - Renyan Jiang, Xiaowei Zhu, Wei Xue, Rangda Wu, Yu Cao:
A Novel Method to Estimate Mean Lifetime with Censoring in the Context of Reliability Improvement with Design of Experiments. 86-93 - Xiaochen Li, Ruilian Zhao, Ying Shang:
EFSM Model Construction Method for RTL Digital Circuit. 94-105 - Wan Zhou, Yong Wang, Yang Qu, Li Li:
Automating App Review Classification based on Extended Semantic. 106-115 - Wang Lin, Mi Ding, Kaipeng Lin, Guoquan Mei, Zuohua Ding:
Formal Synthesis of Neural Craig Interpolant via Counterexample Guided Deep Learning. 116-125 - Jing Yan Wang, Lin Qi, Yu Han:
Modulation Recognition based on Complex Binarized Neural Network. 126-132 - Haonan Zhang, Jinbo Wang, Lu Kong, Panpan Xue, Zhaohui Yao:
Design of a Convolutional Neural Network Accelerator based on PYNQ. 133-138 - Wei Zhu, Rongling Zhou:
Employee Portrait Construction based on Deep Neural Networks. 139-142 - Xingguang Zhu, Jiajun Chang, Weikang Li, Bin Yu, Liang Zhao, Xiaobing Wang:
Driver Violation Prediction based on Neural Network. 143-152 - Yaqing Shi, Song Huang, Jinyong Wan:
A Reuse-oriented Clustering Method for Test Cases. 153-162 - Ledio Jahaj, Franz Wotawa:
Testing Photometric Stereo Applications. 163-171 - Jie Hong, Jie Zhang, Qi Qiu, Angang Ma, Meng Li, Shiyu Yan, Helin Gong:
A Metamorphic Relation Identification Method based on GEP. 172-177 - Yue Ma, Ya Pan, Yong Fan:
Metamorphic Testing of Classification Program for the COVID-19 Intelligent Diagnosis. 178-183 - Xuejian Li, Jun-Yi Wang:
Construction of Inductive Property Predicates for Mutable Data Structures. 185-191 - Yujie Wang, Zhi Deng, Kai Tao, Tao Liu, Xianglin Bao, Bin Cheng:
Intelligent Urban Street Lighting System based on IoT Cloud Platform. 192-197 - Mian Wang, Jinlong Sun, Zhiyi Lu, Yu Wang, Yifan Zhang, Jie Zhang, Zhe Zhang, Guan Gui:
A General Dataset Generator for Industrial Internet of Things Using Multi-sensor Information Fusion. 198-202 - Emil Lobachev, Mahmoud Nabil Mahmoud, Ahmad Patooghy:
Blockchain-based Smart Supply Chain Management. 203-208 - Xiaohan Ma, Zhenyu Na:
Energy Efficiency Optimization for Massive MIMO Enabled UAV Communications. 209-214 - Minnan Zhang, Jingdong Jia:
Feature Envy Detection with Deep Learning and Snapshot Ensemble. 215-223 - Lanping Zhang, Jie Yin, Jinhui Ning, Yu Wang, Bamidele Adebisi, Jie Yang:
A Novel Unsupervised Malware Detection Method based on Adversarial Auto-encoder and Deep Clustering. 224-229 - Xiaoyi Hu, Jinhui Ning, Jie Yin, Jie Yang, Bamidele Adebisi, Haris Gacanin:
Efficient Malicious Traffic Classification Methods based on Semi-supervised Learning. 230-235 - Zhiyu Liu, Meishu Luo, Baoying Ma:
Network Intrusion Detection based on RBF Neural Networks and Fuzzy Cluster. 236-240 - Yaling Zhao, Hongbo Du, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang:
Weld Image Recognition based on Deep Learning. 241-248 - Zisen Zhou, Zhongxi Lu, Matthew Guzdial, Fabrício Góes:
Creativity Evaluation Method for Procedural Content Generated Game Items via Machine Learning. 249-253 - Chiyang Gao, Wenbing Luo, Fei Xie:
An Ontology-based Knowledge Base System for Military Software Testing. 254-261 - Xiaoting Zhong, Nan Zhang, Zhenhua Duan:
An Approach for Automatically Generating Traces for Python Programs. 262-268 - Moe Nandi Aung, Yati Phyo, Canh Minh Do, Kazuhiro Ogata:
A Tool for Model Checking Eventual Model Checking in a Stratified Way. 270-279 - Liang Zhao, Leping Wu, Yu Gao, Xiaobing Wang, Bin Yu:
Formal Modeling and Verification of Convolutional Neural Networks based on MSVL. 280-289 - Dongcheng Li, W. Eric Wong, Shenglong Li, Matthew Chau:
Improving Search-based Test Case Generation with Local Search using Adaptive Simulated Annealing and Dynamic Symbolic Execution. 290-301 - Yiang Gong, Minyan Lu, Shiyi Kong, Liang Yan:
Software Failure Prediction based on Thermal Images. 302-309 - Lijin Tang, Chuanqi Tao, Hongjing Guo, Jingxuan Zhang:
Software Defect Prediction via GCN based on Structural and Context Information. 310-319 - Hongning Miao, Shaoying Liu:
Automatic Localization of Potential Faults for Java Runtime Exceptions. 320-329 - Shengcheng Yu, Wanmin Huang, Jingui Zhang, Haitao Zheng:
Automatic Bug Inference via Deep Image Understanding. 330-334 - Zhihua Chen, Xiaolin Ju, Guilong Lu, Xiang Chen:
Blocking Bugs Identification via Binary Relevance and Logistic Regression Analysis. 335-345 - Furong Zhang, Xiaopan Zhang:
Cooperative Area Coverage Path Planning for Multiple UAVs Over Large Areas. 346-352 - Hongquan Shi, Bin He, Jia Liang, Yihua Zang:
Modeling Technology of Naval Formation Area Antiaircraft Kill Web based on Event Graph. 353-359 - Lili Fan, Gui-Fu Lu, Ganyi Tang, Yong Wang:
Kernel Subspace Clustering based on Block Diagonal Representation and Sparse Constraints. 360-367 - Pan Liu, Yihao Li, Shili Ai, Cong Luo, Chengjian Yang:
An Improved Dijkstra-based Algorithm for Resource Constrained Shortest Path. 368-373 - Shiyu Yan, Xiaohua Yang, Zhongjian Lu, Meng Li, Helin Gong, Jie Liu:
Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic Relations. 374-382 - Chiyang Gao, Wenbing Luo, Jian Wang, Yingying Zhang:
Software Quality Evaluation Model based on Multiple Linear Regression and Fuzzy Comprehensive Evaluation Method. 383-389 - Aleem Khalid Alvi, Mohammad Zulkernine:
Security Pattern Detection Through Diagonally Distributed Matrix Matching. 390-402 - Hongwei Tao:
Software Trustworthiness Evaluation Method based on Relationships Between Criteria. 403-408 - Jinglu Xu, Giovanni Russello:
Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future Directions. 409-420 - Han-Lin Lu, Guan Ming Lin, Shih-Kun Huang:
Guan-fuzz: Argument Selection With Mean Shift Clustering for Multi-argument Fuzzing. 421-430 - Senjie Zhang, Shuai Wang, Jinbo Wang, Shan Zhou, Zhaohui Yao:
Quantitative Analysis of Information Leakage Hardware Trojans in IP Cores. 431-436 - Lin Liu, Zheng Zeng, Yufeng Long, Hongji Yang:
Revisiting Hazard Analysis Requirements. 437-445 - Yidan Wang, Xuge Li:
FastTransLog: A Log-based Anomaly Detection Method based on Fastformer. 446-453 - Xiaohu Xu, Yifei Liang, Xixi Zhang, Yu Wang, Yun Lin, Bamidele Adebisi, Haris Gacanin, Guan Gui:
Self-evolving Malware Detection for Cyber Security using Network Traffic and Incremental Learning. 454-463 - Kaixin Chang, Nailiang Zhao, Liang Kou:
A Survey on Malware Detection based on API Calls. 464-471 - Zhen Zhao, Jingchao Li, Bo Deng, Yulong Ying:
Bearing Fault Diagnosis based on Fixed Threshold Wavelet Transform and ELM. 472-479 - Weicong Jin, Weizhi Liu, Wenxuan Zhang, Xia Fang:
A Bearing Fault Diagnosis Method based on Improved LSTM-cascade CatBoost. 480-485 - Jiahui Tao, Zhenyu Na, Ningtao Zhang:
Time-varying Graph Model for LEO Satellite Network Routing. 486-491 - Hanting Zhao, Jing Zhang, Xueqing Li, Zhen An, Lanmin Chen, Xiqiao Pang:
Application of Software Cost Measurement in the Construction of Ship Information Management System. 492-497 - Hubin Yang, Jiaming Zhang, Ruochen Shao, Yucong Chen, Rui Zhou, Qingguo Zhou:
RJMM: Real-time Enhancement for Jailhouse Hypervisor on Multi-Core Platforms via Memory Isolation. 498-502 - Jiayuan Wei, Xingyu Miao, Kehong Xu, Rui Liu, Yongqi Ge:
An Energy-efficient Scheduling based on Q-learning for Energy Harvesting Embedded System. 503-509 - Siyuan Gao, Chang Liu, Anze Cheng, Xu Jiao:
Distributed Sleep Monitoring System with Mobile Terminal. 510-517 - Xiaopeng Xu, Xiaochun Zhang, Hongji Yang:
A Probability Parameter Estimation Tool in C++. 518-523 - Lijin Wu, Yaming Zhang, Zehua Shen, Yang Jian, Longli Tang:
Trustworthy Protection Technology for Industrial Internet. 524-530 - Zili Wu, Jun Ai, Minyan Lu, Jie Wang, Liang Yan:
The Correlation between Training Set Perturbations and Robustness for CNN Models. 531-539 - Junshan Xue, Yu Jiang:
Autonomous Evaluation Method of Unmanned Equipment based on OODA-I Framework. 540-545 - Jun Zhao, QingGuo Yan, Qinwei Dong, Xianguang Zha, Jun Wu, ZeJia He, Xindong Zhao, Xiaowen Zhang:
Speech Instruction Recognition Method based on Stacking Ensemble Learning. 546-553 - Chunyan Xia, Yifan Huang, Song Huang, Changyou Zheng, Yutong Wang, Yu Wang:
Prioritization Method of Test Data for Intelligent Software based on Multi-objective Optimization. 554-561 - Hao Yang, Cheng Peng, Ruirui Sun, Yujun Zhou, Xiaobo Cui:
Student Expression Recognition in Smart Education Environment based on Convolutional Neural Network. 562-568 - Zhiwei Zhang, Haifeng Xu, Aidong Fang, Lin Cui, Xiaoyin Wu, Yang Bai:
Towards Exploring the Engineering Education Certification on Data Science and Big data Technology Specialty: A Case Study of Suzhou University in China. 569-575 - Hongliang Mao, Azragul Yusup, Yifei Ge, Degang Chen:
Named Entity Recognition in Chinese E-commerce Domain Based on Multi-Head Attention. 576-580 - Yingjie Cao, Azragul Yusup:
Chinese Electronic Medical Record Named Entity Recognition based on BERT-WWM-IDCNN-CRF. 582-589 - Ronghua Jiang, Zhandong Liu, Ke Li, Lu Liang:
Dual-branch Attention Detection Network for Scene Text Detection. 590-596 - Weize Shang, Jia Song, Shaojie Ai, Kai Zhao:
Fault Diagnosis and Location of Quadrotor UAV Actuator based on ESO-DF. 597-604 - Yuting Yang, Rui Wang, Youchen Wang, Xu Miao, Bing Liu, Shan Jiang:
Simulink Model Static Analysis Results based on Abstract Interpretation. 605-614 - Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai:
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy. 615-623 - Zhonghao Pan, Shan Zhou, Jianmin Wang, Jinbo Wang, Jiao Jia, Yang Feng:
Test Case Prioritization for Deep Neural Networks. 624-628 - Xiaoying Huang, Rui Yin, Wu Liu, Hong Zhang:
Software Operation Simulation Method based On Complex Network Game. 629-635 - PengQi Wang, Yuan Shi, Lingzhong Meng, Shuting Kang, Yunzhi Xue, Liangliang Yu:
A UAV Cooperative Formation Capability Evaluation Method. 636-643 - Xiang Bi, Hui Gao, He Chen, PengQi Wang, Chenghao Ma:
Evaluating the Robustness of Object Detection in Autonomous Driving System. 645-649 - He Chen, Hongping Ren, Rui Li, Guang Yang, Shanshan Ma:
Generating Autonomous Driving Test Scenarios based on OpenSCENARIO. 650-658 - Yikang Shao, Wu Liu, Jun Ai, Chunhui Yang:
A Quantitative Measurement Method of Code Quality Evaluation Indicators based on Data Mining. 659-669 - Xiaobo Cui, Cheng Peng, Hao Yang:
Intelligent Mineral Identification and Classification based on Vision Transformer. 670-676 - Wei Han, Cheng Peng:
A Dual-channel Text Classification Model based on an Interactive Attention Mechanism. 677-684 - Rong Tang, Gui-Fu Lu:
Constrained Multilinear Multi-view Subspace Representation Learning for Clustering based on Tensor Nuclear Norm. 685-691 - Jiakang Tang, Lin Cui, Zhenggao Pan, Chengfang Tan, Shanshan Li, Weijie Wang:
Face Image Recognition Algorithm based on Singular Value Decomposition. 693-697 - Pengxu Wang, Haijun Zhang:
Speech Separation based on As3-2mix Hybrid Strategy Combined Training Convolutional Time Domain Neural Network. 698-704 - Jian Kong, Xuehan Zhong, Mingli Ding:
Local Matrix Stack Graph Convolutional Networks for Classification. 705-709 - Lian Liu, Zimeng Wang:
Multi-Agents Interaction Approach based on Graph Network and Reinforcement Learning. 710-715 - Wei Cui, Ziwei Wang, Huilin Zhao, Cong Xia, Xing Xu, Zhanyun Feng, Weijie Wu, Yuanjie Hao, Jie Li, Jin Wang, Jiale Chen:
Multi-scale Graph Aggregation based Ship Target Recognition. 716-722 - Fan Xu, Xia Liu, Yanli Cui, Mingdie Yan, Zhongyuan Lai:
Comparison of Image Feature Detection Algorithms. 723-731 - Zheng Tang, Xiaopan Zhang:
Task Scheduling for Warship Formation Air Defense. 732-737 - Guang Yang, PengQi Wang, Yuan Shi, Qian Dong, Weiyu Liu:
A High Precision Annotation Method for Vision Simulation Data of Autonomous Vehicle. 738-745 - Rui Li, Feifan Dai, Lingzhong Meng, Qian Dong:
Autonomous Evaluation of Unmanned Vehicles: A Survey. 746-753 - Hongping Ren, Hui Gao, He Chen, Guangzhen Liu:
A Survey of Autonomous Driving Scenarios and Scenario Databases. 754-762 - Yunxiu Chen, Qian Dong, Guangzhen Liu, Hongping Ren, Yunzhi Xue:
Automatic Driving Scene Sampling Method Based On Key Parameter Identification. 763-771 - Xinyue Wu, Hong Zhang, Tao Shi, Congran Zhang, Liang Yan:
Intelligent Software Testing based on Visual Feedback. 772-779 - Rui Cheng, Haijun Zhang:
Improved Deep Bi-directional Transformer Keyword Extraction based on Semantic Understanding of News. 780-785 - Youren Chen, Yang Li, Ming Wen:
Chinese Psychological QA Database and its Research Problems. 786-792 - Yi Zhu, Xiaoying Chen, Yu Zhao:
Space-time Constraint Resources Modeling and Safety Verification Method for Automated Vehicles. 793-802 - Shu Feng, Yi Zhu, Mei Song, Yuxiang Gao:
Analysis and Verification of Bisimulation Relationship for Learning Time-Behavior Sequence. 803-812 - Wansheng Yang, Chi Hu, Siyou Ma:
A Software Failure Mode Analysis Method Based on Test Knowledge Graph. 813-819 - Liang Zhou, Dongwei Yu, Hua Li:
WebGIS-based Catering Industry Entrepreneurial Decision-making System. 820-826 - Mingwei Shi, Junfeng Nie:
Improvement of Path Planning Algorithm based on Small Step Artificial Potential Field Method. 827-831 - Mengjie Shan, Xiaopan Zhang:
Multi-UAV Path Planning Model with Multiple Battery Recharge Points. 832-837 - Ziyang Weng, Shuhao Wang, Weixin Yan, Guangwei Zhang:
The Tessi Clergy Algorithm Inspired by Potential Gaming Behavior in the Hunt for Geo-data. 844-852 - Mingxing Zhang, Shihai Wang, Weiguo Qiu:
A Software Multi-fault Locating Technique based on Space Shrinkage. 853-858 - Jun Wu, QingGuo Yan, Qinwei Dong, Xianguang Zha, Lin Cui, Xindong Zhao, Wei Dai, Chong Luo:
Task-driven Dialogue System based on Dynamic Intention Capture. 859-864 - Guoda Wang, Miao Zhang, Yaozong Hu, Zhaofeng Ma:
Keyless Entry Security System based on Gait Context. 865-869 - Ziyang Weng, Shuhao Wang:
Nautical Chart Algorithms: A Feedback Strategy to Consider Knowledge Data Production Behavior. 870-875 - Haoxiang Shi, Wu Liu, Jingyu Liu, Jun Ai, Chunhui Yang:
A Software Defect Location Method based on Static Analysis Results. 876-886 - Longmao Hu, Bingwu Fang:
Analysis of Regional Talent Demand based on Recruitment Website Text Mining. 887-892 - Mengyao Chen, Chuanqi Tao, Hongjing Guo:
Understanding Security Issues based on App Comment Analysis. 893-902 - Zhao Shi, Zhi Deng, Wei Zheng, Ning Li:
Campus Indoor and Outdoor Positioning System based on GPS and Wi-Fi. 903-908 - Hongbo Du, Yaling Zhao, Hai Wang, Chunlai Yang, Yongmin Liu, Lei Wang, Manman Xu, Jingsong Gui, Tielong Tan, Xiangdong Wang:
Research on Key Technologies of Human Upper Limb Bone Diagnosis based on Convolutional Neural Network. 909-917 - Shouhang Wang, Yong Wang, Wenge Le:
Adaptive Weight Structure Representation for Multi-view Subspace Clustering. 918-925 - Yifei Ge, Azragul Yusup, Degang Chen, Hongliang Mao, Yingjie Cao:
UGDA: Data Augmentation Methods for Uyghur Language Named Entity Recognition. 926-932 - Ziyang Weng, Shuhao Wang, Weixin Yan:
Understanding Rembrandt: Directed Knowledge Improves Robustness and Evolution of Facial Phenotype Modeling. 933-940 - Dongpu Sun, Su Qi:
Relation Extraction on the Wargame based on Pre-trained Models. 941-944 - Yutao Sun, Yuan Fu, Tianyi Xu:
Research and Analysis of Physical Health Test for Students Based on C4.5 Algorithm in Universities with Industry Characteristics. 945-953 - Binhao Li, Jingwen Zhong, Guoliang Shi, Jie Fang:
Forest Fire Spread Prediction Method based on BP Neural Network. 954-959 - Yuxuan Van, Xingjun Chen, Rui Li, Yujian Jiang:
The Intelligent Pelagic Communication System Architecture of the Fleet based on UAV Swarm Relay. 960-964 - Qingzhi Liu, Zhendong Yin, Mingyang Wu, Zhilu Wu, Zhijiang Xu:
LSTM Network-based SNR Estimator for DS-UWB Wireless Sensor Network. 965-973 - Xuefeng Yang, Li Liu, Yinggang Zhang, Yihao Li, Pan Liu, Shili Ai:
A Privacy-preserving Approach to Distributed Set-membership Estimation over Wireless Sensor Networks. 974-979 - Hanhong Wang, Lin Qi, Yu Han, Yun Lin:
Prototypical Network for Few-Shot Signal Recognition. 980-985 - Lu Sun, Yun Lin:
Spectrum Completion Based on HaLRTC. 986-992 - Hanjie Dong, Yaqiong He, Hongwei Tao, Qianheng Duan:
A Framework for Formal Transformation and Analysis of Smart Contract Code. 993-994 - Bojiang Liu, Lijin Wu, Xiaomei Shen, Wei He, Xinyu Han:
Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code Analysis. 995-996 - Ruizhi Qiu, Chuan Lv, Yuxue Jin:
Evaluation Method of Intelligent Manufacturing Capability Maturity. 997-999 - Chenggang Cao, Kuixian Li:
Spectrum Allocation Algorithm based on Improved Wolf Swarm Algorithm. 1000-1001 - Yandie Yang:
Cognitive Radio Spectrum Sensing Technology. 1002-1003 - Donghui Zhao, Liang Kou, Jilin Zhang:
Online Learning based Self-updating Incremental Malware Detection Model. 1004-1005 - Itsuki Miura, Bin Zhang, Hun-ok Lim:
A High Safety Spherical Flying Robot based on Gimbal Mechanism. 1006-1007 - Shunsuke Wakamatsu, Bin Zhang, Hun-ok Lim:
Development of an Octocopter Drone for Accompanying and Carrying Objects. 1008-1009 - Yuanyuan Han, Jingchao Li, Jialan Shen, Bin Zhang:
Improved Convolutional Neural Network based Feature Extraction Method. 1010-1011 - Yingyan Shen, Shaojie Hu, Siqi Cai, Mincheng Chen:
Software Defect Prediction based on Bayesian Optimization Random Forest. 1012-1013 - Rui Zhang, Zhendong Yin, Zhutian Yang, Zhilu Wu, Yanlong Zhao:
Unsupervised Domain Adaptation based Modulation Classification for Overlapped Signals. 1014-1015 - Hongjun Zhang, Zhendong Yin, Yanlong Zhao, Zhilu Wu:
Mars Exploration Aided by Intelligent Reflecting Surface. 1016-1017 - Tse-Chuan Hsu, William Cheng-Chung Chu, Dong-Meau Chang:
An Improved Visual Recognition Model of Interference Noise Image. 1018-1022 - Hui Guan, Tianyu Ma, Guangwei Wang:
An Improved Dissimilarity based Approach to Semantic Similarity Calculation. 1023-1028 - Ning Luo, Linlin Zhang:
Chaos Driven Development for Software Robustness Enhancement. 1029-1034 - Wei Zhu, Rongling Zhou:
Personalized Learning Task Assignment. 1035-1039 - Youwei Huang, Feng Lu, Xiaolong Sang, Bin Hu, Jiachun Tao:
Precise Epidemic Control based on GeoHash. 1040-1048 - Zhijie Wu, Jilin Zhang, Liang Kou:
A Model for Malware Detection Method based on API call Sequence Clustering. 1049-1050 - Mingqian Liu, Hongyi Zhang:
Parasitic Covert Adversarial Attack on Deep Learning based Modulation Recognition. 1051-1052 - Mingqian Liu, Zhenju Zhang:
Adversarial Attacks on Deep Neural Network based Modulation Recognition. 1053-1054 - Pan Liu, Yihao Li, Shili Ai, Wenjie Zhang:
Four Rules for Converting Complex Loops to Regular Expressions. 1055-1056 - Cheng Chang, Hui Zhou, Chao He, Zilong Zhao, Wulong Li:
Transform Domain End-to-end Learning Communication System. 1057-1058 - Rongheng Xu, Jilin Zhang, Li Zhou:
Malware API Sequence Detection Model based on Pre-trained BERT in Professional domain. 1059-1060 - Yi Zhao, Wenjing Yuan, Yinghua Huang, Zhenyu Chen:
Adversarial Attacks in DNN-based Modulation Recognition: A Preliminary Study. 1061-1062 - Yinghua Huang, Wenjing Yuan, Yi Zhao, Huan Huang:
Machine Learning Algorithms for New Energy Vehicles: A Brief Survey. 1063-1064 - Jiamei Gao, Bo Zhang, Bin Wang, Yang Liu:
A LDPC Decoding Algorithm based on Convolutional Neural Network. 1065-1066 - Hongxuan Li, Jiaxin Zhang, Liang Zhao:
Vehicular High-definition Maps Cache based on Dew Computing. 1067-1068 - Zhuo Zheng:
Multi Feature Modulation Signal Recognition based on Deep Learning. 1069-1070 - Huihui Zhou, Wang Lin, Zuohua Ding:
A Categorical Modelling Framework for Multi-robot Systems in Manufacturing. 1071-1072
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.