default search action
24th CSE 2021: Shenyang, China
- 24th IEEE International Conference on Computational Science and Engineering, CSE 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-1660-3
- Xin Lu, Junying Jia, Zhiwei Pei, Daolin Wang, Jialin Wang, Bo Sun:
A Method of Surface Defect Detection of Bluetooth Headset Based on Machine Vision. 1-6 - ChuLan Ren, Ning Wang, Yang Zhang:
Human Brain Hippocampus Segmentation Based on Improved U-net Model. 7-11 - Dienul Paramarta, Juan Li:
CFP- A New Approach to Predicting Fantasy Points of NFL Quarterbacks. 12-19 - Hang Yin, Yacui Gao, Chuanyun Liu, Shuangyin Liu:
Fault Diagnosis Method Based on CWGAN-GP-1DCNN. 20-26 - Zhenzhou Guo, Ding Feng, Changqing Gong, Han Qi, Na Lin, Xintong Li:
A new image encryption scheme based on 3D Sine-adjusted-Logistic map and DNA coding. 27-34 - Xiaolin Zhou, Xiaojie Liu, Xingwei Wang, Shiguang Wu, Mingyang Sun:
Multi-Robot Coverage Path Planning based on Deep Reinforcement Learning. 35-42 - Haotian Miao, Yifei Zhang, Daling Wang, Shi Feng:
Multimodal Aesthetic Analysis Assisted by Styles through a Multimodal co-Transformer Model. 43-50 - Guangyao Pang, Guobei Peng, Zizhen Peng, Jie He, Yan Yang, Zhiyi Mo:
A novel sentiment classification based on "word-phrase" attention mechanism. 51-56 - Sami Alenezi, Chunbo Luo, Geyong Min:
Energy-Efficient D2D Communications Based on Centralised Reinforcement Learning Techniques. 57-63 - Han Xu, Haozhe Wang, Jia Hu, Geyong Min:
Analytical Modelling of Content Transfer in Information Centric Networks. 64-71 - Zhaoyang Du, Ganggui Wang, Narisu Cha, Celimuge Wu, Tsutomu Yoshinaga, Rui Yin:
UAV-empowered Vehicular Networking Scheme for Federated Learning in Delay Tolerant Environments. 72-79 - Wenhao Zhao, Shijiao Yang, Mengqun Jin:
Near-duplicate Video Retrieval Based on Deep Unsupervised Key Frame Hashing. 80-86 - Peiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long:
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods. 87-93 - Linjian Hou, Zhengming Wang, Han Long:
An Improvement for Value-Based Reinforcement Learning Method Through Increasing Discount Factor Substitution. 94-100 - Zhenzhou Guo, Weifeng Jin, Xintong Li, Han Qi, Changqing Gong:
A K-nearest neighbor classifier based on homomorphic encryption scheme. 101-107 - Shasha Li, Xiaodong Bai, Songjie Wei:
Blockchain-based Crowdsourcing Task Management and Solution Verification Method. 108-115 - Xiangbin Shi, Jinwen Peng:
A Large-scale Detection Algorithm and Application Based on YOLOv4. 116-122 - Xiangbin Shi, Lin Li:
Loop Closure Detection for Visual SLAM Systems Based on Convolutional Netural Network. 123-129 - Zhenfei Chen, Tianqing Zhu, Bing Tian, Yu Wang, Wei Ren:
A Semantic-based Replacement for Event Image Privacy. 130-137 - Lu Zhang, Reginald Cushing, Cees de Laat, Paola Grosso:
A real-time intrusion detection system based on OC-SVM for containerized applications. 138-145 - Tianyi Wang, Shengzhi Qin, Kam-Pui Chow:
Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach. 146-153 - Pucha Rohan, Priyanka Singh, Manoranjan Mohanty:
Effect of Environmental Conditions on PRNU. 154-161 - Ruicheng Sun, Shuo Han, Weihang Peng, Hanxiang Zhuang, Xin Zeng, Xingang Liu:
Extracting Discriminative Features for Cross-View Gait Recognition Based on the Attention Mechanism. 162-167 - Liam Daly Manocchio, Siamak Layeghy, Marius Portmann:
FlowGAN - Synthetic Network Flow Generation using Generative Adversarial Networks. 168-176 - Ju Xing, Xu Zhang, Zexun Jiang, Ruilin Zhang, Cong Zha, Hao Yin:
Exploring investment strategies for federated learning infrastructure in medical care. 177-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.