default search action
6th SmartCom 2021: New York City, NY, USA
- Meikang Qiu, Keke Gai, Han Qiu:
Smart Computing and Communication - 6th International Conference, SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings. Lecture Notes in Computer Science 13202, Springer 2022, ISBN 978-3-030-97773-3
Regular Papers
- Peng Liu, Yiming Lu, Guoqing Wang, Wang Zhou:
Efficient Online Service Based on Go-Tensorflow in the Middle-Station Scenario of Grid Service. 3-13 - Zhixin Lu, Lianyu Fu, Yizhao Liu, Xiyang Yin:
Resource Modeling of Power Communication Packet Optical Transport Network. 14-25 - Deyi Kong, Zehua You, Qimei Chen, Juanjuan Wang, Jiwei Hu, Yunfei Xiong, Jing Wu:
Energy-Efficient Federated Learning in IoT Networks. 26-36 - Faguo Zhou, Jing Zhang, Yanan Song:
Chinese Fine-Grained Sentiment Classification Based on Pre-trained Language Model and Attention Mechanism. 37-47 - Xiaohui Wei, Xiaonan Wang, Haixiao Xu, Xingwang Wang, Hao Guo:
Link-Efficiency Multi-channel Transmission Protocol for Data Collection in UASNs. 48-63 - Tingting Zhang, Lintao Yang, Tao Dong, Jie Yin, Zhihui Liu, Zhanwei Wang:
A Multi-attribute Decision Handover Strategy for Giant LEO Mobile Satellite Networks. 64-73 - Liang Zhou, Hao Li, Jianguo Zhou, Changjia Zhou, Tianzhu Shi:
ML-ECN: Multilayer Emergency Communication Network Based on the Combination of Space and Earth. 74-89 - Jing Guo, Bingsen Li, Ping Du, Ziyi Xin, Jianjun Zhang, Jiawei Chen:
Multi-attribute Authentication Method Based on Continuous Trust Evaluation. 90-100 - Jing Wang, Meng Wan, Jue Wang, Xiaoguang Wang, Yangang Wang, Fang Liu, Weixiao Min, He Lei, Lihua Wang:
Defects Detection System of Medical Gloves Based on Deep Learning. 101-111 - Xuqiu Chen, Wei Wang, Wei Gan, Yi Yang, Su Yuan, Meng Li:
Mobile Terminal Identity Authentication Method Based on IBC. 112-122 - He Li, Rongqiang Cao, Hanwen Xiu, Meng Wan, Kai Li, Xiaoguang Wang, Yangang Wang, Jue Wang:
Secure Shell Remote Access for Virtualized Computing Environment. 123-132 - Amr M. H. Saeed, Danghui Wang, Hamas A. M. Alnedhari, Kuizhi Mei, Jihe Wang:
A Survey of Machine Learning and Deep Learning Based DGA Detection Techniques. 133-143 - Meng Wan, Jiaheng Wang, Jue Wang, Rongqiang Cao, Yangang Wang, He Li:
Sci-Base: A Resource Aggregation and Sharing Ecology for Software on Discovery Science. 144-153 - Xu Chu, Xiaoyang Liu, Qimei Chen, Yunfei Xiong, Juanjuan Wang, Han Yu, Xiang Hu:
Joint Accuracy and Resource Allocation for Green Federated Learning Networks. 154-163 - Lu Chen, Zaojian Dai, Nige Li, Yong Li:
Trust Evaluation Method Based on the Degree of Code Obfuscation. 164-174 - Pengyu Zhang, Chunmei Wang, Baocong Hao, Wenhui Hu, Xueyang Liu, Lizhuang Sun:
An SG-CIM Model Table Classification Method Based on Multi Feature Semantic Recognition Technology. 175-185 - Jian Yang, Yawen Lu, Zhihui Lu, Jie Wu, Hui Zhao:
BBCT: A Smart Blockchain-Based Bulk Commodity Trade System. 186-197 - Xu Zhang, Li Zheng, Sujuan Zhang:
Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation. 198-207 - Cong Zhou, Weipeng Cao, Zhiwu Xu:
Charge Prediction for Criminal Law with Semantic Attributes. 208-217 - Jie Wan:
Research on Enterprise Financial Accounting Based on Modern Information Technology. 218-227 - Dansheng Rao, Jie Wan:
Financial Information Management Under the Background of Big Data. 228-237 - Xiaohui Wei, Tao Guo, Hongmei Yu, Zijian Li, Hao Guo, Xiang Li:
AreaTransfer: A Cross-City Crowd Flow Prediction Framework Based on Transfer Learning. 238-253 - Yapeng Sun:
Parallel Improved Quantum Evolutionary Algorithm for Complex Optimization Problems. 254-264 - Yunwei Guo, Haokun Tang, Aidi Tan, Lei Xu, Keke Gai, Xiongwei Jia:
A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium Blockchain. 265-275 - Wanhao Cao, Jihe Wang, Danghui Wang, Kuizhi Mei:
A Hop-Parity-Involved Task Schedule for Lightweight Racetrack-Buffer in Energy-Efficient NoCs. 276-285 - Shaojun Jin, Jun Pan, Qian Chen, Bo Li:
Analysis and Discussion on Standard Cost Allocation Model in State Grid. 286-296 - Mingjun Feng, Buqiong Xiao, Bo Yu, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li:
A Novel Deception Defense-Based Honeypot System for Power Grid Network. 297-307 - Zongxiao Li, Di Liu, Peiran Li, Dawei Li, Yu Sun, Zhenyu Guan, Jianwei Liu, Jie Gao:
Seamless Group Pre-handover Authentication Scheme for 5G High-Speed Rail Network. 308-317 - Xiangtian Tan, Chen Zhang, Bo Li, Binbin Ge, Chen Liu:
Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction. 318-328 - Pengyu Zhang:
High-Performance and Customizable Vector Retrieval Service Based on Faiss in Power Grid Scenarios. 329-339 - Bo Dai, Zhenhai Zhang, Ling Wang, Yuan Liu:
APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow. 340-351 - Xiaoqi Liao, Xinliang Ge, Yufei Li, Wenhui Hu, Xin He, Shijie Gao, Xiaoming Chen, Xueyang Liu:
An Automatic Design Method of Similarity Fusion Neural Network Based on SG-CIM Model. 352-363 - Meng Yue, Han Zheng, Wenzhi Feng, Zhijun Wu:
A Detection Method for I-CIFA Attack in NDN Network. 364-373 - Abdulrahman Azab:
InterGridSim: A Broker-Overlay Based Inter-Grid Simulator. 374-383 - Yun Liu, Shenghao Ding, Jiaxin Huang, Hao Jiang, Jing Wu, Ruiliang Song, Ningning Lu, Zhiqun Song:
Vertical Handover of Satellite-Ground Fusion Network Based on Time and Location Under Early Access Strategy. 384-393 - Wenyong He, Mingming Lu, Yiji Zheng, Neal N. Xiong:
Research on Graph Structure Data Adversarial Examples Based on Graph Theory Metrics. 394-403 - Yiming Yao, Tao Ren, Yuan Qiu, Zheyuan Hu, Yanqi Li:
Computation Offloading and Resource Allocation Based on Multi-agent Federated Learning. 404-415 - Hang He, Tao Ren, Yuan Qiu, Zheyuan Hu, Yanqi Li:
Multi-agent Computation Offloading in UAV Assisted MEC via Deep Reinforcement Learning. 416-426 - Zhixiang Xiao, Mingming Lu, Wenyong He, Jiawen Cai, Neal N. Xiong:
OPN-DTSP: Optimized Pointer Networks for Approximate Solution of Dynamic Traveling Salesman Problem. 427-437 - Bo Chen, Xiaoying Zheng, Yongxin Zhu, Meikang Qiu:
A Novel Client Sampling Scheme for Unbalanced Data Distribution Under Federated Learning. 438-449 - Lan Yang, Zongbo Wu, Jun Guo:
A Novel Secure Speech Biometric Protection Method. 450-459 - Shengchun Wang, Danyi Hu, Changqing Zhou, Jingyu Xu:
Thunderstorm Recognition Based on Neural Network PRDsNET Models. 460-469 - Jun Guo, Gejing Xu, Junjie Wu, Lan Yang, Han Deng:
The Development and Trend of Vehicle Functional Safety. 470-480 - Yan Hui, Jie Zhan, Libin Jiao, Xiu Liang:
Design and Development of Simulation Software Based on AR-Based Torricelli Experiment. 481-490
Short Papers
- Li Ma, Zexian Yang, Wenyin Yang, Huihong Yang, Qidi Lao:
Study on the Organization and Governance of Bigdata for Lifelong Education. 493-500 - Chunyi Lu, Kaili Yan, Mi Zhou:
Fault Location Technique of Distribution Power Network Based on Traveling Wave Measurement. 501-507 - Abdulrahman Azab:
Unikernel and Advanced Container Support in the Socker Tool. 508-512
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.