


default search action
AISNS 2023: Mianyang, China
- Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security, AISNS 2023, Mianyang, China, December 22-24, 2023. ACM 2023
Chapter 1-Artificial Intelligence Algorithm and Intelligent Detection Model
- Boyu Xiao
, Shujun Chen
, Jiahao Wen
, Xudong Liu
, Yuchen Wang
, Kai Shi
, Shuangxi Li
:
A 3D CNN Model With 3d CBAM Layer For Micro-Expression Recognition. 1-5 - Ying Ji
, Jingyu Huang
, Pengcheng Jin
:
Classification of BGP Anomalies Using GRU with BGP Update Messages. 6-9 - Ji Qi
, Tengfei Bian
, Kaixuan Jiao
, Xinyu Yin
, Kechao Wang
:
Moisture prediction with influencing factors analysis of expanded cut tobacco before resurgence. 10-15 - Qiuyang Yan
, Ruiran Ding
, Ling Lu
:
RPnet: A Relation Perception based Entity-relation Extraction Method. 16-22 - Haoruo Zhang
, Chengyu Zhong
:
Research on Waterway Traffic Volume Prediction Based on Artificial Intelligence. 23-26 - Yuge Song
, Zerui He
:
Research on the Application of Graph Neural Networks in Financial Asset Valuation. 27-31 - Hanlin Feng
, Yao Rao
, Mingxiao Yang
, Ben Lin
:
Global climate mitigation prediction model based on BP neural network. 32-37 - Rongbang Wu
, Zhijie Ye
, Mo Ni
:
Prediction of Word Game Trends and Human Behavior Based on ARIMA and BP Neural Networks. 38-42 - Mengyao Yu
, Changhua He
, Lijun Shi
:
Interactive Genetic Algorithm for Human-Computer Interface Layout Design System. 43-48 - Lina Tao
:
Research on Campus Network Public Opinion Early Warning Based on Genetic Algorithm and BP Neural Network. 49-53 - Feng Tian
, Yuanyuan Jin
, Yuzhi Li
:
Traditional Martial Arts Assessmet Based on Graph Convolutional Network. 54-60 - Jinda Wu
, Qiang Li
:
SMFN: A small target detection method in nylon yarn package images based on neural network. 61-67 - Zhen Wang
, Lizhi Liu
:
PM2.5 concentration prediction model based on SA-LSTM. 68-71 - Yang Zhao
, Feng Chen
:
Improvement of Byzantine consensus algorithm based on election model. 72-76 - Zizhong Wei
, Dongsheng Guo
, Dengrong Huang
, Qilai Zhang
, Sijia Zhang
, Kai Jiang
, Rui Li
:
Detecting and Mitigating the Ungrounded Hallucinations in Text Generation by LLMs. 77-81 - Kai Jiang
, Qilai Zhang
, Dongsheng Guo
, Dengrong Huang
, Sijia Zhang
, Zizhong Wei
, Fanggang Ning
, Rui Li
:
AI-Generated News Articles Based on Large Language Models. 82-87 - Yufeng Ye
, Guanwu Jiang
, Shide Fu
:
Surface defect detection of propellant strips based on YOLOv8. 88-92 - Kai Jiang
, Tong Yang
, Xue Li
, Zizhong Wei
, Qibin Chen
, Qiang Duan
, Junzheng Ge
, Lei Zhang
, Guangxin Wang
, Jiahao Shao
, Rui Li
:
Method for Generalized Structured Information Extraction from Cards Based on Custom Template Matching. 93-98 - Shengnan Li
, Chi Zhou
, Kaili Wang
:
Image-Category Aware Loss for Super-Multiple Category Classification on Chu Bamboo and Silk ancient Chinese characters. 99-104 - Guokai Fu
, Xia Peng
:
NSCLC whole slide image survival analysis by end to end transformer. 105-109 - Weiwei Zou
:
Research and Design of Image White Balance Algorithm Based on FPGA. 110-114 - Zhen Zhen Li
, Chi Yan
, Shuang Wu
, Xin-Qi He
:
Research of Hybrid Encryption Algorithm with RSA and improved SM4. 115-118 - Jiying Tian
:
Prediction of Employee Turnover Trend in MSMEs Based on Whale Alogorithm Optimized Elman Neural Network. 119-123 - Xiaoyu Zhang
, Ligang Chen
, Meng Chen
, Luozhao Jia
:
Analysis of Identification of Seismic Event Properties Based On the permutation entropy of the Variational mode decomposition and support vector machine optimized by pelican optimization algorithm. 124-129 - Wenxin Chen
:
Fourier Ptychography Based on a u-net Convolutional Neural Network. 130-134
Chapter 2-Computer Architecture and System Design
- Yanchun Shen
, Ximing Qiao
, Zhiwang Zhong
, Hongyu Sheng
:
Study on the Characteristics of Liquid Crystal-based Terahertz Metadevices in Wireless Communication Circuits. 135-140 - Kaiyan Jin
, Yanbo Zhu
, Youchen Xu
, Yongyue Chen
:
Evaluation Method and Application of the Civil Aviation Surveillance System Horizontal Position Error for The Performance-Based Surveillance. 141-149 - Weiwei Zhang
:
Finite element statics analysis of a tower crane's balancing arm. 150-153 - Ji Qi
, Zhanwu Shi
, Mingxing Li
, Botao Zhang
, Yujie Lu
:
Radial Basis Function Neural Network-Based Modeling and Application of the Weight Prediction for Expanded Cut Tobacco Before Resurgence. 154-158 - Wei Liu
, Chao Yue
, Lei Yang
, Jirong Tian
:
Application practice of code mapping technology in hydropower project construction management system. 159-168 - Xiaohong Wu
, Hanrui Sun
, Mingming Zhao
:
Application Research of Geological Information Metadata System in Big Data Environment. 169-173 - Xiang Nan
, Rajamohan Parthasarathy
:
Exploration of Cloud Computing Based Data Mining Mobile Intelligent Tourism Guide System. 174-178 - Jia Wei
:
Design and Application of Hotel Room Management Information System in a B/S Architecture. 179-182 - Jian Liu
, Xianghong Kong
, Zhaoxi Wang
, Jin'E Zhao
:
Design and Implementation of Intelligent Analysis Middle Platform for the Mining Field. 183-188 - Yueming Ding
, Rongxi Cu
, Zhicai Xiang
, Jiayu Xu
, Zongfeng Zhang
, Wei Wang
, Xiaolin Li
, Xiaohua An
:
Optimization and Application of Multi-source Data-driven Sensing Terminal for Photovoltaic-Energy Storage System. 189-193 - Jiewei Li
, Xiaoyun Jian
, Jin Xie
, Wen Zhang
, Dongkai Wu
, Jinyao Sun
:
Massive Multi-source Heterogeneous Data Platform with EB-level Expansion. 194-200 - Liyun Jia
:
Development and Application of Smart Marketing Systems Based on Big Data Technology. 201-205 - Ping He
, Jiapeng Shuang
:
Technology Bias in the Intelligent Systems. 206-210 - Zhenquan Zhou
, Lanxin Wang
, Chenxin Tian
, Deprizon Syamsunur
:
The development of the smart factory during the Industry 4.0 period under the study of system thinking. 211-215 - Lian Chen
, Nanxi Zhao
, Xinzi Wang
:
Research on Emergency Support Mechanism for Coal Transportation Based on Complex Networks. 216-220 - Lei Cao, Qingbin Xu
, Chen Chen
, Qinggang Wu
, Jianping Zhang
:
The Architecture of a Comprehensive System for Civil Unmanned Aerial Vehicle Traffic Management in Urban Low-Altitude Airspace. 221-226 - Qingjuan Wang
, Ruoyun Hu
, Gang Sun
, Huan Liu
:
Intelligent Retrieval System for Power Policy Documents Based on Semantic Analysis. 227-232 - Xin Tang
:
Research on the Design of Financial Management System Based on Cloud Platform. 233-240 - Shuwei Wang
, Sigen Song
:
Design of an Integrated System for Government Invested Construction Projects. 241-245 - Zhaoyang Cui
, Jianwen Ling
, Xiongwei Zhang
:
Design of Efficient Device Communication Authentication Protocol in Large-scale Internet of Things Scenarios. 246-251 - Shihu Yu
, Liuqing Yan
:
Research on English Learning System Based on Collaborative Filtering Algorithm. 252-257 - Guotao Cong
, Dan Shan
, Li Wang
:
Design of Dynamic Target Tracking System Based on FPGADynamic Target Tracking System. 258-262 - Li Liu
, Zijin Liu
, Xuefei Qian
:
Construction and Application of Digital Twin Cloud Platform for Rebar Straight Thread Processing Line. 263-276 - Guotao Cong
, Sen Wang
, Henan Li
:
Implementation of Image Watermark Algorithm Based on FPGAImage watermark embedding circuit. 277-282 - Yichen Bao
, Lifei Wei
, Dezhi Han
:
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices. 283-290 - Xiaona Han
, Lei Yang
:
Research on business collaborative optimization of power grid en-terprises based on data mining algorithm. 291-294 - Huilin Cao
, Linchun Tan
:
Student education assessment model based on programming cognitive diagnosis. 295-300 - Qi Guo
, Jie Zhang
, Yuanhong Lu
, Liang Tu
, Haiping Guo
, Hui Luo
, Libin Huang
:
Construction and verification of a power simulation system middle platform based on domain driven design and microservices. 301-308 - Zhigang Sun
, Junmin Wu
:
MHInfer: A FPGA-accelerated Inference Library Based on Domestic Embedded Systems. 309-313 - Yufei Tan
:
Research on Community Service System based on OneNET Platform. 314-317
Chapter 3-Network Security and Intelligent Management Technology
- Wei Li
, Kuang Tian
, Wei Wang
:
Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry. 318-322 - Taiwei Wang
, Yuyang Cheng
:
Development and Application of Intelligent Management System for Personnel Safety in Port Area based on Positioning Technology. 323-330 - Yue Zhang
, Zifan Zhu
, Zhenbo Xu
:
"Study on Derived Risks and Its Governances of \"Social Embedding\" of Artificial Intelligence Algorithm". 331-336 - Xixuan Wang
, Heyu Zhao
, Huixian Deng
, Aili Hairula
, Xiao Wang
, Lijing Guo
:
Real-time detection method of edge iot proxy network intrusion based on PSO-ELM. 337-342 - Mingju Sun
, Linxu Han
, Liang Zhang
, Hao Yin
, Kai Liao
, Jinqiu Hu
, Xiaowen Fan
:
A study on risk propagation and traceability of gas storage based on complex network. 343-348 - Kaihao Hu
, Xiao Zhang
, Youfu Jiang
:
Wireless Sensor Networks Node Localization Approach Based on The Cuckoo Algorithm. 349-354 - Shuai Liu
, Yuanjun Zuo
, Zhuo Chen
, Wenjing Zhang
, Xiaoqing Li
:
Non-invasive event monitoring in digital twin system based on random matrix theory and independent sub-vectors. 355-359 - Shiyong Li
, Shasha Wu
, Xinglin Guo
:
Security Risk Assessment Method for Measurement Control Systems Based on Attack Tree Model and Common Vulnerability Scoring System. 360-369 - Quanjiang Shen
, Lei Zhang
, Chang Liu
:
Harmful Information Detection of Web pages with Attentional Deep Neural Networks and Multi-level Feature Fusion. 370-374 - Yaokuan Wen
, Yanan Li
, Jiewen Li
, Ke Xiao
, Xin Yang
, Ke Zheng
:
Research on The Application of Artificial Intelligence Technology in Emergency Repair and Power Restoration of Residential Areas Under Heavy Rain Disaster Weather. 375-379 - Jiwei Li
, Xuewei Ding
, Yuchen Jiang
, Yongqi Ai
, Zhen Jia
, Xinyi Zhang
:
A Database Security Access Control Method Based on Identity Authentication. 380-385 - Ying Lan
, Qibin Hu
:
Intrusion detection and response of network node attacks based on game theory. 386-390 - Yinlun Xu
:
YOLO-ARDD: An improved feature extraction and enhanced single-stage object detection network. 391-395 - Xinghua Li
, Xiaolong Li
, Feng Wang
, Zhenhua Yan
, Dongge Zhu
:
Security optimization method of key exchange protocol for massive Internet of things terminal equipment. 396-401 - Yadi Zhang
, Fuhai Duan
, Xinshuai Han
:
Reliability analysis of circulating water filtration system in nuclear power plants based on fuzzy GO methodology and Boolean algebra method. 402-408 - Xiaohui Wang
, Li Zhao
, Jinbao Du
, Jingang Liu
, Wei Zhang
, Baozhan Feng
, Hua Chen
:
Dynamic Evaluation of Information Security in Self-organizing Network Based on Knowledge Map Driving. 409-414 - Xiongwei Zhang
, Jianwen Ling
, Muyao Luo
:
Research on Authentication Method for Interface Access Security of Communication Equipment in High Coverage Internet of Things. 415-420 - Shuang Gao
, Jiawei Gao
, Jiashi Zhao
:
Feature Perturbations Extend the Space for Automatic Grading of Diabetic Retinopathy. 421-425 - Qian Zhou
, Husheng Wu
:
Research on Performance Evaluation of UAV Cluster Based on ADC-AHP. 426-430 - Yukun Li
, Songyang Wu
, Zhiguo Ding
, Jiahong Jiang
, Kezhu Song
:
Personalized Privacy Protection and Security Aggregation Technology for Smart Grid. 431-437 - Xiaoyi Cui
, Hequan Han
, Xingang Guo
:
Embedding Space Reconstruction to Enhance ANN for Industrial Process Fault Diagnosis. 438-442 - Feifei Xu
, Cheng Zhang
:
A Solution Space Reduction Approach based on Neural Network and Clustering for Large-scale Service Composition. 443-447 - Wenxuan Xu
, Zejun Yan
, Qijun Zhang
, Weifa Zheng
:
Research on FIDO Authentication Based on IPv6. 448-451 - Shouan Wei
, Zhiheng Zhang
:
Application Methods and Practices of Deep Learning in Network Intrusion Detection. 452-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.