


default search action
ICPCSEE 2024: Macao, SAR, China
- Chengzhong Xu, Haiwei Pan, Chen Yu, Jianping Wang, Qilong Han, Xianhua Song, Zeguang Lu:
Data Science - 10th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2024, Macao, China, September 27-30, 2024, Proceedings, Part II. Communications in Computer and Information Science 2214, Springer 2024, ISBN 978-981-97-8745-6
Education Research, Methods and Materials for Data Science and Engineering
- Zhipeng Ou, Zhang Han, Yan Yu, Liu Xia
:
An Empirical Study of the Factors Influencing the Improvement of Education Quality Within Higher Education Institutions - Based on 13 Higher Vocational Institutions in Hainan Province. 3-28 - Dan Xian, Yuanhui Li:
Study on the Intercultural Competence of Students in Hainan Vocational Colleges. 29-47 - Dan Xian, Yuanhui Li:
Study on the Communicative Competence of Students of Tourism-Related Majors in Hainan Vocational Colleges. 48-61 - Linlin Tao, Hong Chen:
Research on the Learning Adaptability and Learning Effectiveness of College Students Under the Background of Digital Education. 62-74 - Yinan Chen, Xia Liu
, Lei Chen:
Research on the Adaptability of Vocational College Majors and Industry Empirical Study Based on 14 Vocational Colleges in Hainan, China. 75-95 - Guobao Zhang, Lujian Wan, Conglin Wang:
Practice of the Campus Data Middle Platform Based on Lakehouse Integrated Architecture. 96-105
Data Security and Privacy
- Zihao Fu, Yang Gao, Wanli Lyu:
Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction. 109-125 - Yue Han, Yuanjian Lv, Zhifang Wang:
QR Code Digital Watermarking Algorithm Based on GWO. 126-138 - Yuanjian Lv, Yue Han, Zhifang Wang:
Fast CKKS Algorithm in the SEAL Library. 139-152 - Lin Yuan, Xun Duan, Lingjie Xiang, Guangqian Kong, Yun Wu:
A Transformer-Based Video Colorization Method Fusing Local Self-attention and Bidirectional Optical Flow. 153-168 - Zhong Kang, Maoning Wang, Meijiao Duan:
An NTRU Lattice-Based Chameleon Hash Scheme for Redactable Blockchain Applications. 169-182 - Haimiao Qin, Meijiao Duan, Yurou Tang, Maoning Wang:
Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain Rewriting. 183-203 - Qianqian Guo, Yong Wang, Siyuan Chen:
Secure Identity Authentication Protocol Based on Blockchain in Smart Home. 204-214 - Chengli Fu, Lin Zhou, Siyuan Chen, Yi Wu, Yong Wang:
False Data Injection Attack Detection Method Based on Long Time Series Prediction. 215-224 - Jishun Liu, Liang Shen, Haixia Wu, Bei Lin, Zhipeng Cui:
A Hybrid Iris Recognition System Model Based on Presentation Attack Detection and Traffic Monitoring Module on AIoT System. 225-236
Big Data Mining and Knowledge Management
- Yongcheng Liu, Xue Ouyang, Huan Zhou, Weichen Peng, Jieming Mao, Yongke Pan:
Leveraging Spatial Characteristics in Trajectory Compression: An Angle-Based Bounded-Error Method. 239-254 - Yukun Cao, Kangle Xu, Yu Cheng, Jialuo Yan, Zhenyi He:
HENF: Hierarchical Entity Neighbor Multi-Relational Fusion Network for Knowledge Graph Completion. 255-268 - Yunlong Ye, Lin Zhou, Xiaobo Hu, Yong Wang:
TCB Intrusion Detection Method Based on Data Enhancement. 269-280 - Yaxing Qiao, Runping He, Zhangyu Chen, Jingwen Ni, Zhigang Xie, Zhefei Wang:
Multi-source Heterogeneous Data Joint Diagnosis Method for Transformers Based on D-S Evidence Theory. 281-292 - Xinsheng Li, Chaochao Sun, Yuan Peng, Ting Zhang:
Progressive Federated Learning Scheme Based on Model Pruning. 293-305 - Gang Li:
Privacy Protection Data Aggregation Scheme Against Quantum Attacks. 306-317 - Guanhao Chen, Jifei Xiao, Jinguo Li:
Location Data Quadtree Partitioning Algorithm Based on Differential Privacy. 318-327 - Mengkun Zhang, Lingli Li, Xin Zheng:
RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning. 328-344

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.