


default search action
CNCIT 2023: Qinghai, China
- Proceedings of the 2nd International Conference on Networks, Communications and Information Technology, CNCIT 2023, Qinghai, China, June 16-18, 2023. ACM 2023
- Jie Liu
, Mingjie Song
:
Research on Amplitude and Travel Time Image Decentralization Correction in Ultrasonic Imaging Logging. 1-5 - Hao Yang
, Shuning Wei
, Zhi Wang
, Jing Wang
:
A vulnerability detection method based on sparse value flow graphs. 6-10 - Ping Li
, Bang Huang
, Wen-Qin Wang
:
Target detection for MIMO Radar based on reduced-dimension data without training data. 11-16 - Youhui Wang
:
Low signal-to-noise ratio RDSS signal frequency offset estimation algorithm based on GWO-CNN. 17-23 - Shangsheng Gao
, Li Gao
, Qi Li
, Jianjun Xu
:
Application of large language model in intelligent Q&A of digital government. 24-27 - Mai Ye
, Shiming Men
, Lei Xie
, Bing Chen
:
Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoder. 28-34 - Xixing Li
, Qiang Wei
, Zehui Wu
, Wei Guo
:
A comprehensive survey of vulnerability detection method towards Linux-based IoT devices. 35-41 - Yi Liu
, Lin Peng
, Peng Zhang
, Yanlong Qiu
, Sen Zhang
, Xiaowei Guo
, Canqun Yang
:
The Optimization of Multi-physics Application Simulated by Lattice Boltzmann Method Based on Domestic Processors. 42-47 - Yue Yang
, Xu Xu
, Hongye Liu
:
Robust Adaptive Beamforming Based on Steering Vector Estimation and Combined with Sample Covariance Matrix. 48-52 - Weiru Qi
:
Wisdom Tourism System Design in Shaanxi Province of China on Network Technology. 53-58 - Wenxiu Zhang
, Shan Jing
, Chuan Zhao
:
A Survey of SDN Data Plane Attacks and Defense Strategies. 59-65 - Tai Guo
, Haihong Zhan
, Xingde Su
, Tao Wang
:
Anti-intermittent Sampling Jamming Method Based on Random PRI and Intra-pulse Frequency Diversity Radar Waveform. 66-72 - Jinyao Liu
, Xiangyu Bai
, Zhaoran Wang
:
A review of irrigation monitoring based on Internet of Things, remote sensing and artificial intelligence. 73-77 - Jia Wang
, Ziyuan Lu
:
A controllable IPv6 address generation based on conditional variational autoencoder. 78-81 - Qianran Wang
, Jinhua Wang
, Chengbin Huang
:
The Optimization of IPSec VPN in 5G Mobile Communication Network. 82-86 - Mingchu Li
, Dexin Xia
, Wenteng Zhang
:
Dynamic Offloading Task for Internet of Things Based on Meta Supervised Learning. 87-92 - Yuzhe Li
, Bo Li
:
Solving the Performance Issues of Epsilon Estimation Method in Differentially Private ERM: Analysis, Solution and Evaluation. 93-99 - Tianyou Qiu
, Yiping Li
, Xisheng Feng
:
DORM: Distance-based opportunistic routing and medium access protocol for multi-AUV monitoring system. 100-104 - Kun Lu
, Quan Zhou
, Mingchu Li
:
Computation Offloading in E-RAN via Deep Reinforcement Learning. 105-109 - Yi Xie
:
Fast Lane Detection Based on Row Anchor Classification. 110-115 - Xiaoda Xie
, Songlei Jian
, Chenlin Huang
:
LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning. 116-121 - Yuanzhi He
, Huajin Chen
, Changxu Wang
, Yuan Li
, Zhenyu Niu
:
Challenges and Developments of Routing Techniques for Dense LEO Constellations. 122-126 - Xiaowei Zhao
, Lian Zhang
, Mingchu Li
:
Context-Aware Edge Caching Strategy Based On Mobility Prediction. 127-132 - Xiaowei Zhao
, Yuanyuan Zhang
, Mingchu Li
:
Task Migration Optimization Algorithm in Mobile Edge Computing. 133-137 - Zixiang Zhou
, Mingchu Li
:
Deep Reinforcement Learning based Edge-Enabled Vehicle to Everything Service Placement for 5G Millimeter Wave. 138-142 - Jiawei Liu
:
Location Excitation Network for Multi-modal 3D Object Detection. 143-149 - Ming Zhu
, Yiyang Zhou
, Xiangyang Feng
:
Reputation-based consensus mechanism for digital order transaction alliance chain. 150-154 - Yikun Sun
:
Joint Message Passing: Solving Heterogeneous Graphs Challenges in Few-Shot Object Detection. 155-160 - Yukun Zhai
:
Semantic Queries with Transformer for Referring Image Segmentation. 161-167 - Xiaohui Luo
:
Multi-Label Classification for Postoperative Complication Prediction. 168-171 - Linfeng Dai
:
A study on the application of graph neural network in code clone detection: Improving the performance of code clone detection through graph neural networks and attention mechanisms. 172-176 - Jiang Liu
, Hongbo Lu
, Yiyou Yuan
, Haomin Gu
, Kejun Xie
, Dong Li
, Chencheng Luo
, Gang Wu
, Yueming Song
:
Intelligent Operation and Maintenance Schedule System Based on Knowledge Graph: Construction and Applications. 177-181 - Xue-Song Wang
, Mao-Bin Hu
:
Study on the effect of dynamic self-protection on epidemic spreading. 182-185 - Yuman Wang
, Wenhui Wang
, Xiaoxue Bai
, Bo Hu
, Guangkai Ge
, Kexiang Qian
:
RRDD: An ATT&CK-based ICS Network Security Risk Assessment Method. 186-192 - Meng-Yu Li
, Yuan-Hao Xu
, Shuai Huang
, Mao-Bin Hu
:
The effect of simplicial awareness dissemination on epidemic reaction-diffusion. 193-195 - Shaofeng Li
, Tingyu Wang
, Bo Wan
:
A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-time. 196-200 - Jingyu Hao
:
A Blockchain-based Performance Monitoring Scheme for Cloud Applications. 201-207 - Shengjie Zhou
:
LSTM-GATs: Wind field prediction based on graph attention deep neural network. 208-212 - Mengxi Zhang
, Guangxiang Jin
, Jiangsheng Li
, Min Liu
, Xiao Zhang
, Yufei Shi
, Qi Wei
:
OSU-based power communication network service bearer and slice control mechanism. 213-218 - Ziheng Huang
, Bolin Chen
, Yiting Zhao
:
Network Traffic Analysis Method Using the Fusion of Dynamic-Static Features based on Stacked Attention Mechanism. 219-225 - Song Wei Ge
:
Acoustic Propagation Research And Simulation Based On Bellhop. 226-234 - Tai Yue
, Pengfei Wang
, Lei Zhou
, Xu Zhou
, Gen Zhang
, Kai Lu
, Huijun Wu
:
ReForker: Patching x86_64 Binaries with the Fork Server to Improve Hardware-Assisted Fuzzing through Trampoline-Based Binary Rewriting. 235-240 - Ni Zhang
, Wei Dong
, Zehong Xia
, Zhi Feng
, Zhicheng Li
:
Analysis on Technique for Code Obfuscation. 241-245

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.