


default search action
CNML 2023: Zhengzhou, China
- Proceedings of the 2023 International Conference on Communication Network and Machine Learning, CNML 2023, Zhengzhou, China, October 27-28, 2023. ACM 2023
Chapter 1 - Communication System Modeling and Satellite Communication Technology
- Jinao Wang
, Jiwei Hua
, Jinqi Zhu
, Yanmin Wei
, Luyao Wang
:
Rogue Nodes Detection Using Idle Parking Resources. 1-5 - Zhongmin Pei
, Boren Hu
, Zhangkai Luo
, Jie Ding
:
Analysis of node importance of satellite network based on triangular motif. 6-12 - Ying Wang
, Zesan Liu
, Yanjie Wang
, Zhencong Cai
, Yu Meng
:
Research on Web Configuration Software Interactivity Enhancement Technology Based on Vue and Component Library. 13-17 - Weiming Qin
, Wenjing Guo
, Jingwen Lin
, Jiahao Li
, Xuerui Chen
, Xinsu Mei
, Wei Zhang
:
Design and implementation of power communication protocol plug-in based on hot loading. 18-22 - Shuaishuai Pan
, Zhongchuan Sun
:
Cross Polarization Interference Cancellation Algorithm Based on Maximum Likelihood for Satellite Communication. 23-27 - Fan Jiang
, Yangfeng Rong
, Jinhe Yu
, Mingyuan Liang
, Wei Xing
, Bo Zhang
:
Research on Machine Learning and State Grid Business Risk Prevention and Control Based on the Internet. 28-32 - Zeru Li
, Zhongyuan Qin
, Xin Sun
, Wen Wang
:
Efficient fuzzing testcases generation based on SAGAN. 33-38 - Yuchen Yin
, Yiping Yang
:
Design and Implementation of Intelligent Radar Anti-jamming Simulation System. 39-43 - Qianglong Meng
, Li Liu
, Dongqing Zhou
, Hong Tang
, Rongshu Zhang
, Xiangjun Liu
, Dan Yan
:
Application of Artificial Bee Colony Algorithm in Power Communication Network Routing Optimization Simulation. 44-48 - Ji Qi
, Yuehui Tan
, Qifan Zhao
, Weiliang Li
, Bao Sun
, Yi Wu
, Hui Tao
, Xin Zhang
:
Virtualized Network Function Scaling Strategy Based on Additional Momentum BP Neural Network. 49-55 - Yuhao Xu
, Xiaoyu Zhang
, Yi Sun
, Kai Zhou
:
Indoor location algorithm based on improved Kalman filter. 56-60 - Shikun Zhuo
:
Insight into the effect and application of LEO satellite network. 61-66 - Bingyu He
, Hao Fu
, Jinhua Li
, Xiaomin Zhu
:
A Survey of Multi-Transmission Path Optimization. 67-72 - Shenjie Gao
, Bowei Duan
, Ping Zhou
, Xijing Li
, Xin Jing
:
Research on Intelligent Recommendation Model for Application Systems. 73-77 - Lijun Tong
, Xiang Li
, Zheng Kong
, Qinghua Wang
, Xiang Wang
:
Research on PIM Characteristics of High-Power RF Connectors. 78-82 - Tao Liu
, Zhifan He
, Sijian Li
, Yue Ma
:
A Secure Power Data Sharing Scheme Based on Sensitive Data Automatic Recognition. 83-87 - Jinhua Lu
, Shunzheng Yu
:
Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations. 88-92 - Guoquan Zheng
, Enguo Zhu
, Hailong Zhang
, Yan Liu
, Chaoliang Wang
:
Research on throughput maximization of mass device access based on 5G big connection. 93-96 - Juanning Wang
, Qiang Li
:
Automatic testing of computerized interlocks based on recognition of the interlocking host computer interface. 97-100 - Beiming Li
, Jiahao Xu
:
A transform domain communication method based on combinatorial basis function. 101-105 - Zhongfa Zhang
:
Research on Network Architecture Based on Improved MPLS Protocol and SDN Technology. 106-110 - Jinyu Zhu
, He Li
, Shihui Duan
, Youyang Zhu, Chenglin Zhao
, Haojiang Deng
:
End-to-End Performance Verification of 5G-TSN Converged Network. 111-114 - Haiou Li
, Zhiwen Kang
, Guolin Song
, Yajun Liu
, Hong Mei
, Xin Chen
, Ming Gu
, Jieli Wang
, Geng Chen
:
Application of Federated Learning in mobile communication Anti-telecom fraud. 115-118 - Haichao Wang
, Zhonghua Wang
, Yong Wang
:
Analysis of CDMA capacity of multi-beam satellite under beam coding. 119-122 - Ming Ji
, Ruidan Luo
, Na Xu
, Yaping Li
, Xiao Chen
:
An Opportunistic LEO-based Doppler differential positioning method with baseline optimization. 123-128 - Ruokun Wang
, Xiaodong Wu
, Qinghao Zhu
:
Multi-antenna Signal Synthesis Technique Research Based on Feedforward Neural Network Algorithm in High Frequency Communication. 129-133 - Ni Zeng
, Zhe Jia
, Zehua Ding
, Lingna Hu
, Lianghui Ding
, Feng Yang
:
Co-channel interference cancellation and equalization in aeronautical telemetry using multiple antennas. 134-139 - Yongjie Li
, Huanpeng Hou
, Jizhao Lu
, Wenge Wang
:
Digital spread-spectrum watermarking identity authentication technology based on OFDM in satellite-ground communication system. 140-144
Chapter 2 - Information Management and Network Security Technology
- Chaofeng Zeng
:
Construction of an Emotional Dictionary for Online Comment Text in Knowledge Services. 145-150 - Rui Chen
, Shulin Wu
, Shaojun Lin
, Helin Zhang
, Meiling Jiang
:
Design of a comprehensive management and monitoring platform for the operation and security of power information systems. 151-155 - Rong Zhu
, Enjian Bai
:
A Physical Layer Key Generation Using a Hybrid Quantization Scheme. 156-160 - Rongrui Chen
, Hai Cheng
:
Low retrieval consumption searchable encryption scheme based on random number pairing. 161-164 - Binyong Li
, Jie Fang
, Xianhui Deng
, Yuhan Sheng
:
Petri net-based illegal information flow detection method for node-chain access control model. 165-169 - Ci Xiao
, Yajun Chen
, Chaoyue Sun
:
Research on High-Quality Image Generation Based on the AdvDCGAN Algorithm. 170-173 - Fei Yin
, Chengliangyi Xia
:
Blockchain-Based Data Secure and Traceable Scheme for Industrial Internet of Things. 174-178 - Weijie Zeng, Rui Fan, Zhi Wang, Yu Xiao, Rui Huang, Mouhai Liu:
Research on Docker Container Network Isolation and Security Management for Multi-Tenant Environments. 179-185 - Changchen Wang
, Hong Liu
:
A Channel State Information based Respiration Rate Monitoring Method. 186-190 - Hui Li
:
Application of artificial intelligence in the construction of computer big data security technology platform. 191-195 - Yimeng Li
, Xi Li
, Yichao Zhang
:
Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural Network. 196-200 - Zhongwen Zhao
, Di Lu
:
Vulnerability analysis of mission-based spatial information networks. 201-206 - Zihan Xiong
, Yuxuan Li
, Jun Chen
, Dabei Chen
:
FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation Prediction. 207-210 - Xinbo Wang
:
Application of Deep Learning Based on Artificial Intelligence in Security Monitoring System. 211-214 - Jiayue Xu
, Ming Ni
, Danjiang Zhu
, Xinsheng Yu
:
Overview of SQL Injection Attack Detection Techniques. 215-225 - Zixuan Jin
, Changbo Xu
, Shaozhong Cao
, Yi Liu
:
Multimodal sentiment analysis based on multiple attention mechanisms. 226-230 - Kewei Li
, Fudong Liu
:
A hybrid model for classifying malware based on ResNet and Transformer. 231-237 - Runlin Li
, Zhizhi Zhang
, Xuchao Gong
, Qilu Zhao
:
A Method for Extracting Sensitive Information from Long Text Based on Natural Language Processing Technology. 238-243 - Jianlu Wu
, Qingwang Li
:
Design and application adaptation verification of time-sensitive network end system network card based on FPGA. 244-247 - Daojuan Zhang
, Tianqi Wu
, Xiaoming Zhou
, Bo Hu
, Wenjie Zhang
:
Multi-source System Log Behavior Pattern Mining Method Based on FP-Growth. 248-254 - Kai Jin
, Xin Shan
, Yuan Zhou
, Jing Li
, Haidi Dong
:
Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security System. 255-258 - Ruihang Zhang
:
Enhancing IoT Security-Exploring the Application of Blockchain. 259-263 - Chunlong Lin
, Wei Jin
, Xiaobo Ling
, Hongfu Chen
, Mengyu Ruan
, Yeqing Zhang
, Yukun Fang
:
Comparison of Complex Emotion Detection Based on the Basic Emotion Model and the Complex Emotion Model. 264-268 - Lisha Yao
:
Image Encryption Algorithm Based on Henon Chaos Theory. 269-273 - Lisha Yao
, Qiaoqiao Feng
:
Image Style Transfer Based on CycleGAN. 274-278 - Zihan Wang
, Caixiao Ouyang
, Hongyan Li
:
Zero Packet Loss Protection Module Based on IEEE 802.1CB Protocol. 279-283
Chapter 3 - Machine Learning and Intelligent Algorithm Modeling
- Tengxiao Mu
, Yaru Liang
, Lingzhi Liu
:
Classification model based on improved K-means clustering algorithm. 284-288 - Ruihong Dang
:
Construction of Online Teaching Effect Evaluation System Based on Complex Learning Behavior Data Analysis. 289-293 - Zihao Liu
, Yi Zhou
:
Research on SVM intrusion detection algorithm based on improved. 294-297 - Weisong Chen
, Kaixian Zheng
, Jingyun Xu
, Shengkai Lin
, Liju Gan
, Yican Wu
:
Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification Algorithm. 298-302 - Qigui Yao
, Xiaojian Zhang
, Jiaxuan Fei
, Wen Ji
, Caiwei Guo
:
NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and Simulation. 303-307 - Tong Liu
, Haitao Jiang
, Yu Liu
:
Edge-cloud Collaboration Based Service Deployment and Resource Allocation in Digital Twin 6G network. 308-311 - Shenjin Chen
, Junying Yuan
, Jianxin Zhang
:
Research and application of smart contract technology based on blockchain. 312-319 - Qiao Shen
, Hanming Huang
, Pengfei Wang
:
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing. 320-326 - Tianxiang Liu
, Zhengyi Liu
:
Mirror Detection in Frequency Domain. 327-331 - Nan Wu
, Guozhen Dong
, Wenjuan Xing
, Shizhong Nie
, Yunpeng Xie
:
A Multicast Scheduling Method Based on EVPN-VXLAN Extension in Data Center Networks. 332-336 - Weixi Wu
:
Traffic anomaly detection method based on bidirectional autoencoder generative adversarial network. 337-340 - Panlong Yi
, Gang Lu
, Xiaojun Wu
, Yumei Zhang
:
Problem-guided Neural Math Problem Solvers. 341-345 - Yangquan Zhou
, Liuping Feng
, Lingyi Chi
, Guokai Wang
:
Reversible Data Hiding Algorithm based on Paillier Encryption. 346-350 - Yue Zong
, Han Xu
, Zhaoyang Zhang
:
Deep Deterministic Policy Gradient based Dynamic Virtual Network Embedding Algorithm. 351-355 - Lei Tan
, Jinmao Xu
, Daofu Gong
, Fenlin Liu
:
Recurrent Attentive Neural Networks for Sequential Recommendation. 356-360 - Jiwei Li
, Bo Li
, Shi Liu
, Hongwei Lv
, Fei Chen
, Qing Liu
:
Efficient retrieval of power structured data with global data access view. 361-365 - Baixin Guo
, Jian Li
, Haibin Wang
:
Neural network reliability analysis based on fault injection. 366-370 - Wenhao Zang
, Shuangling Li
, Xutao Yang
:
A dueling DQN-based online resource allocation algorithm for cloud computing. 371-376 - Yanling Li
, Jianwei Zhan
, Hui Zhang
, Dong Wang
:
A Variable Step LMS Algorithm Based on Particle Swarm Optimization. 377-381 - Qi Wang
, Liming Wu
, Wanyi Li
:
Research on Fast Time-Frequency Synchronization Algorithm for NR System. 382-391 - Hongtao Xie
, Yang Wang
, Xin Tian
:
An Online/Offline Power Data Sharing System Based on Blockchain. 392-397 - Yaqi Zhao
, Wei Li
, Huiqing Xu
, Sihe Lu
, Yongcan Zhao
:
Bearing Fault Diagnosis Based on Parallel Convolutional Neural Network with Attention Mechanism and Bidirectional Gated Recurrent Unit. 398-402 - Si Li
, Wei Li
, Huaguang Shi
, Wenhao Yan
, Yi Zhou
:
Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System. 403-407 - Xiaoer Wang
, Shuang Ding
, Guoqing Zhang
:
MADDPG: A task offloading algorithm based on multi-agent deep reinforcement learning in vehicle-edge computing. 408-413 - Meng He
, Yunli Bai
:
LAL-JER: Label-Aware Learning for Adaptive Joint Entity and Relation Extraction with LLM data augmentation. 414-419 - Hao Zeng
, Jun Lu
:
Sub-regional multi-AGV dynamic path planning method based on improved A* algorithm. 420-424 - Yanyu Zhang
, Yang Wang
, Zihao Guo
, Feixiang Jiao
, Yi Zhou
:
Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization Algorithm. 425-431 - Tongtong Xu
, Guanghui Wang
, Yuanhao Xu
:
DFCL: Domain-adaptive federated clustering learning. 432-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.