Skip to main content

previous disabled Page of 40
and
  1. No Access

    Article

    Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...

    Jiangang Hou, **n Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu in Computing (2024)

  2. No Access

    Article

    Multi-example query over ontology-label knowledge graphs

    Multi-example query over knowledge graphs allows users to provide multiple example fragments to express their intention, overcoming the shortage of single example query asks users to give a specific complete q...

    Linlin Ding, Sisi Li, Ji Ma, Mo Li in Computing (2024)

  3. No Access

    Article

    Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations

    This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...

    Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, **nrun Chen in Computing (2024)

  4. No Access

    Article

    Differentially private federated learning with non-IID data

    In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the a...

    Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu in Computing (2024)

  5. No Access

    Article

    SG-NeRF: Sparse-Input Generalized Neural Radiance Fields for Novel View Synthesis

    Traditional neural radiance fields for rendering novel views require intensive input images and pre-scene optimization, which limits their practical applications. We propose a generalization method to infer sc...

    Kuo Xu 徐 阔, Jie Li ** 颉, Zhen-Qiang Li **振** in Journal of Computer Science and Technology (2024)

  6. No Access

    Article

    Community anomaly detection in attribute networks based on refining context

    With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection,...

    Yonghui Lin, Li Xu, Wei Lin, Jiayin Li in Computing (2024)

  7. No Access

    Article

    LGAT: a light graph attention network focusing on message passing for semi-supervised node classification

    Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured da...

    Chengcheng Sun, Fanrong Meng, Chenhao Li, **aobin Rui, Zhixiao Wang in Computing (2024)

  8. No Access

    Article

    Influence maximization in mobile social networks based on RWP-CELF

    Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user...

    Zhenyu Xu, **nxin Zhang, Mingzhi Chen, Li Xu in Computing (2024)

  9. No Access

    Article

    Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach

    The motivation of task scheduling in heterogeneous computing systems is the optimal management of heterogeneous distributed resources as well as the exploitation of system capabilities. Energy consumption is o...

    Cen Li, Li** Chen in Computing (2024)

  10. No Access

    Article

    An association rule mining-oriented approach for prioritizing functional requirements

    Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained developm...

    Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang in Computing (2024)

  11. No Access

    Article

    Enhancing sine cosine algorithm based on social learning and elite opposition-based learning

    In recent years, Sine Cosine Algorithm (SCA) is a kind of meta-heuristic optimization algorithm with simple structure, simple parameters and trigonometric function principle. It has been proved that it has goo...

    Lei Chen, Linyun Ma, Lvjie Li in Computing (2024)

  12. No Access

    Article

    Person re-identification method based on fine-grained feature fusion and self-attention mechanism

    Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a ...

    Kangning Yin, Zhen Ding, Zhihua Dong, **nhui Ji, Zhipei Wang, Dongsheng Chen in Computing (2024)

  13. No Access

    Article

    Adaptive vertical federated learning via feature map transferring in mobile edge computing

    To bring more intelligence to edge systems, Federated Learning (FL) is proposed to provide a privacy-preserving mechanism to train a globally shared model by utilizing a massive amount of user-generated data o...

    Yuanzhang Li, Tianchi Sha, Thar Baker, **ao Yu, Zhiwei Shi, Sikang Hu in Computing (2024)

  14. No Access

    Article

    AutoQNN: An End-to-End Framework for Automatically Quantizing Neural Networks

    Exploring the expected quantizing scheme with suitable mixed-precision policy is the key to compress deep neural networks (DNNs) in high efficiency and accuracy. This exploration implies heavy workloads for do...

    Cheng Gong 龚 成, Ye Lu 卢 冶, Su-Rong Dai 代素蓉 in Journal of Computer Science and Technology (2024)

  15. No Access

    Article

    Understanding and Detecting Inefficient Image Displaying Issues in Android Apps

    Mobile applications (apps for short) often need to display images. However, inefficient image displaying (IID) issues are pervasive in mobile apps, and can severely impact app performance and user experience. ...

    Wen-Jie Li **文杰, Jun Ma 马 骏, Yan-Yan Jiang 蒋炎岩 in Journal of Computer Science and Technology (2024)

  16. No Access

    Article

    Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion

    The incompleteness of the knowledge graph limits its applications to various downstream tasks. To this end, numerous influential knowledge graph embedding models have been presented and have made great achieve...

    **aochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun in Computing (2024)

  17. No Access

    Article

    SAIH: A Scalable Evaluation Methodology for Understanding AI Performance Trend on HPC Systems

    Novel artificial intelligence (AI) technology has expedited various scientific research, e.g., cosmology, physics, and bioinformatics, inevitably becoming a significant category of workload on high-performance...

    Jiang-Su Du 杜江溯, Dong-Sheng Li **东升 in Journal of Computer Science and Technology (2024)

  18. No Access

    Article

    Enhancing Storage Efficiency and Performance: A Survey of Data Partitioning Techniques

    Data partitioning techniques are pivotal for optimal data placement across storage devices, thereby enhancing resource utilization and overall system throughput. However, the design of effective partition sche...

    Peng-Ju Liu 刘鹏举, Cui-** Li **翠** in Journal of Computer Science and Technology (2024)

  19. No Access

    Article

    WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement

    Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-lev...

    Zi-Nuo Li **梓诺, Xu-Hang Chen 陈绪行 in Journal of Computer Science and Technology (2024)

  20. No Access

    Article

    UAV-assisted wireless charging and data processing of power IoT devices

    To ensure the reliability and operational efficiency of the grid system, this paper proposes an unmanned aerial vehicle (UAV)-assisted Power Internet of Things (PIoT), which obtains real-time grid data through...

    Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu in Computing (2024)

previous disabled Page of 40