


default search action
AISS 2022: Sanya, China
- Proceedings of the 4th International Conference on Advanced Information Science and System, AISS 2022, Sanya, China, November 25-27, 2022. ACM 2022, ISBN 978-1-4503-9793-3
- Zhenhao Jiang
:
An Attention GRU-XGBoost Model for Stock Market Prediction Strategies. 1:1-1:5 - Omar Challaf
, Sook-Ling Chua
, Lee Kien Foo
:
Trip Itinerary Generation with 2-Opt Algorithm. 2:1-2:5 - Jing Zhang
, Jinglei Tang
, Yingqiu Huo
:
Semantic segmentation of pulmonary nodules based on attention mechanism and improved 3D U-Net. 3:1-3:5 - Musashi Takanezawa
, Yoshifumi Manabe
:
Many-to-many perfect matching. 4:1-4:7 - Peng Duan
:
Privacy Protection Technology in IOT Data Storage Based on Blockchain. 5:1-5:4 - Lei Chen
, Jinghua Sun
, She Jia
:
Study on the Application of RTCA/DO-178C in IMA Architecture. 6:1-6:6 - Wennan Wang
, Hanxu Zhao
, Yu Li
, Junyu Su
, Jiadong Lu
, Baoping Wang
:
Research on cross-project software defect prediction based on feature transfer method. 7:1-7:5 - Lixu Lu
, Jian-Xun Zhang
:
Rearch on AI industry prediction based on Markov model. 8:1-8:5 - Wei Xu
, Xiaoyang Wang
, Haoyu Mao
, Yongkun Li
:
The Design and Practice of Linux Kernel Based Experiments for Operating System Course. 9:1-9:5 - Luxia Ai
, Xiang Sun
, Qianman Zhang
, Zhiqing Miao
, Guangjie Li
, Shaojing Song
:
Soil moisture prediction model based on LSTM and Elman neural network. 10:1-10:7 - Shuifa Sun
, Yongheng Tang
, Yunfei Shi
, Yuan Guo
, Tinglong Tang
, Yirong Wu
:
An Efficient Warp-Based Motion Magnification Method to Reveal Subtle Changes in Video. 11:1-11:7 - Lidan Li
, Zhe Jiang
, Xiaozheng Zhang
:
A Video information transmission architecture based on on-top system. 12:1-12:5 - Han Yun
, Xin Deng
, Yulu Du
:
News Recommendation with Multi-views Emotion Analysis. 13:1-13:5 - Lei Bo
, Zihang Zhang
, Yang Liu
, Zecheng Li
:
Research on IOT online monitoring system based on efficient utilization pathway of mine water. 14:1-14:6 - Zihang Zhang
, Lei Bo
, Yang Liu
, Zecheng Li
:
Mine drainage optimization scheduling based on genetic algorithm. 15:1-15:6 - Linna Zhang
, Yuehui Chen
, Yi Cao
, Yaou Zhao
:
BERT Model Compression With Decoupled Knowledge Distillation And Representation Learning. 16:1-16:4 - Hanqiang Deng
, Jian Huang
, Quan Liu
:
Research on Time Synchronization and Routing Maintenance for Narrowband Ad Hoc Networks. 17:1-17:5 - Yi Liu
, Honglei An
, Hongxu Ma
:
A Biped Robot Learning to Walk like Human by Reinforcement Learning. 18:1-18:5 - Zhiyuan Ge
, Fei Wang
, Rui Hua
:
Interdisciplinary Attribute Evaluation Of Postgraduate Supervisors In Beijing University of Technology. 19:1-19:5 - Yixuan Lin
:
RPSigmoid: A Randomized Parameterization for a Sigmoidal Activation Function. 20:1-20:5 - Fei He
, Wei Zhang
, Na Zhan
, Xi Wang
, Jing Li
:
Graph Neural Network Recommendation Method Based on User Behavior. 21:1-21:7 - Jing Zhang
:
Research on Construction and Operation of Rural E-commerce Supply chain. 22:1-22:7 - Ruogu Li
:
Overturning the Counting Cornerstone: Exploring Fine-Grained Adaptive Losses to Subvert the Conventional Density Estimation. 23:1-23:8 - Wei Liu
, Xin Du
:
LARW: Network Representation Learning Algorithm Based On Long Anonymous Random Walks. 24:1-24:4 - Ruijie Tian
, Weishi Zhang
, Fei Wang
:
BOD-tree: An One-Dimensional Balanced Indexing Algorithm. 25:1-25:4 - Rongfeng Li
, Xiaonan Xu
, Yanyan An
:
A Beamspace-Based Sparse Estimation Method for Array Signal. 26:1-26:5 - Yijun Huang
, Renwen Chen
, Yidi Chen
, Shanshan Ding
, Jiaqing Yao
:
A Fast bearing Fault diagnosis method based on lightweight Neural Network RepVGG. 27:1-27:6 - Lin Wang
, Dong Sun
, Zhu Yuan
, Qingwei Gao
, Yixiang Lu
:
Multi-view clustering study based on subspace. 28:1-28:5 - Margaret Gao
, Rachel Huang
, Arul Rhik Mazumder
, Fei Li
:
Comparisons of Classic and Quantum String Matching Algorithms✱. 29:1-29:6 - Songbai Zhu
, Guolai Yang
:
Research on LightGBM-based fault prediction for electrical equipment in artillery fire control system. 30:1-30:6 - Angesh Anupam
:
Nonlinear multivariate modelling of wetland dynamics. 31:1-31:4 - Liangjuan Zhou
, Wei Miao
:
An improved hybrid regularization approach for extreme learning machine. 32:1-32:7 - Weifeng Chen
, Hui Ding
, Bo Li
, Bin Liu
:
Phase-MLP for Generalizable Implicit Neural Representations. 33:1-33:6 - Jiawei Chen
, Hongjie Liu
, Kexian Gong
, Zhongyong Wang
, Wei Wang
:
Short-term air traffic flow forecasting based on model fusion. 34:1-34:6 - Yanli Li
, Congyi Wang
:
Improve GAN-based Neural Vocoder using Truncated Pointwise Relativistic Least Square GAN. 35:1-35:7 - Chenbing Zhao
:
Capsule Network with Inception Structure for Image Classification. 36:1-36:5 - Shuli Ma
, Liting Sun
, Yufei Niu
, Han Liu
, Huiqian Du
, Feihuang Chu
, Shengliang Fang
:
Electromagnetic data completion and prediction method based on tensor train. 37:1-37:6 - Haochen Qi
, Huiyan Ji
, Jiqiang Zhang
, Liu Cheng
, Xiangwei Kong
:
Defect Classification Method of X-ray Images Based on Improved U-Net. 38:1-38:7 - Hao Wu
, Chong Zhang
, Li Shui
, Yamiao Zhang
, Mengda Lei
, Xianlong Li
:
Research on Radar Signal Recognition Technology Based on Residual Convolutional Neural Network. 39:1-39:6 - Guozheng Feng
, Jianbo Xu
, Wei Jian
, Zhang Liu
:
Load prediction optimization based on machine learning in cloud computing environment. 40:1-40:5 - Chunyan Wu
, Li Li
, Zhigui Liu
, Xiaoqian Zhang
:
Machine Reading Comprehension Based on SpanBERT and Dynamic Convolutional Attention. 41:1-41:5 - Yanhui Xu
, Tong Zhang
, Dunzhao Yang
:
Application of Vision Technology in Automatic Tracking of Robot. 42:1-42:3 - Xiaofan Zhao
, Wenming Ma
:
Event Recommendation Based on Heterogeneous Social Network Information and Time Information. 43:1-43:7 - Letan Zhang
, Guiwen Lan
, Xiaoyong Shi
, Xing-Hui Duanmu
, Kan Chen
:
Point Cloud Classification Method for Transmission Towers based on CAA-PointNet. 44:1-44:4 - Yingchun Huan
, Xiaoyong Kang
, Zhenjie Zhang
, Qi Zhang
, Yuju Wang
, Yafen Wang
:
AIS-Based Vessel Traffic Flow Prediction Using Combined EMD-LSTM Method. 45:1-45:8 - Liang Guo
, Yunjun Lu
, Qian Liu
, Ke Zhu
, Lvjun Zhao
:
A method for task network partition with limited community number. 46:1-46:6 - Shengzhi Yuan
, Jiayu Zhang, Jianwei Lai, Haidi Dong:
Research on An Intelligent Fault Diagnosis Method for Rolling Bearing Based on Wavelet Packet and PSO-BP Network Algorithm. 47:1-47:5 - Chao Xia
:
Research on site laboratory data based on isolation forest and canonical correlation analysis. 48:1-48:6 - Yong Hu
, Zheng Guan
, Tianyu Zhou
:
Deep Reinforcement Learning for Dynamic OCW in UORA. 49:1-49:6 - Yaru Yang
, Zhi Liu
, Jiaxing Song
:
TRAPPER: Learning with Weak Supervision for Threat Intelligence Entity Recognition. 50:1-50:7 - Chen Yang
, Guo Zhen
, Chenya Bian
, Yuqiao Ning
, Shihao Xue
:
Intelligent Connected Vehicles Cybersecurity Vulnerability Rating Methodology Based on Multiple Factors. 51:1-51:6 - Lu Yu
, Lun Xin
, Manxue Guo
:
A Safe Architecture of 5G Network Intelligence Based on Federated Learning and NWDAF. 52:1-52:5 - Leigang Sun
, Jin Zhang
:
HIL-DDoS: A DDoS Attack Simulation System Based on Hardware-In-the-Loop. 53:1-53:4 - Chengxi Xu
, Yunyi Zhang
, Fan Shi
, Huimin Ma
, Wanmeng Ding
, Hong Shan
:
Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior. 54:1-54:6 - Huimin Wang
, Dong Liang
, Yuliang Xi
:
Urban Path Planning Based on Improved Model-based Reinforcement Learning Algorithm. 55:1-55:6 - Lars Kornahrens
, Sebastian Kritzler
, Dirk Werth
:
Extracting Process Instances from User Interaction Logs. 56:1-56:10 - Zhi-Yong Qiu
, Zhenhua Guo
, Li Wang
, Yaqian Zhao
, Rengang Li
:
Layer-wise based Adabelief Optimization Algorithm for Deep Learning. 57:1-57:6 - Yang Liu
:
Research of Network Hotspot Events Joint Extracting Based on BERT-CNN-CRF Model for Internet Public Opinion. 58:1-58:6 - Yuhan Li
, Bin Wen
, Haixiao Zheng
:
Generic O-LLVM Automatic Multi-architecture Deobfuscation Framework Based on Symbolic Execution. 59:1-59:6 - Ming Li
, Guikai Liu
:
A Network Traffic Classification Model Based On XGBOOST_RFECV Feature Extraction. 60:1-60:5 - Tao Zhou
:
Hierarchical Federated Learning with Gaussian Differential Privacy. 61:1-61:6 - Shiyang Song
, Jiadong Lu
, Hanxu Zhao
, Wennan Wang
, Chiyu Shi
, Ruijie Luo
:
Traceability of Product Supply Chain Based on Hyperledger Fabric. 62:1-62:6 - Jiaqing Yao
, Renwen Chen
, Yijun Huang
:
Automatic identification system of aircraft cockpit indicators based on machine vision. 63:1-63:9 - Jian Hu, Jin Hou, Yong Chen, Wen-Hong Li, de hao Shi, Jie Yi, xuan ling Huang:
Rapid face detection in complex environments based on the improved RetinaFace. 64:1-64:7 - Yipeng Li
, Wen Cao, Wenbing Chang, Shenghan Zhou, Runyu Zhang:
An XGBoost risk prediction model of cardiovascular and cerebrovascular diseases with plateau healthcare dataset. 65:1-65:6 - Chunyu Wen
, Tianer Li, Zhiyang Qiu:
Bitcoin Price Prediction Using Autoregressive Integrated Moving Average (ARIMA) Model. 66:1-66:5 - Chongxia Pan
:
Research on the Information Security Investment Strategies Considering Budget Constraints and the Attacker's Preferences. 67:1-67:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.