![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
7,344 Result(s)
-
Article
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...
-
Article
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations
This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...
-
Article
Differentially private federated learning with non-IID data
In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the a...
-
Article
Semantically realizing discovery and composition for RESTful web services
The processes of service discovery and composition are crucial tasks in application development driven by Web Services. However, with RESTful Web Service replacing SOAP-based Web Service as the dominant servic...
-
Article
Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud
Multi-workflows are commonly deployed on cloud platforms to achieve efficient computational power. Diverse task configuration requirements, the heterogeneous nature and dynamic electricity price of cloud serve...
-
Article
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification
Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured da...
-
Article
An association rule mining-oriented approach for prioritizing functional requirements
Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained developm...
-
Article
Person re-identification method based on fine-grained feature fusion and self-attention mechanism
Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a ...
-
Article
Generalizing truth discovery by incorporating multi-truth features
Truth discovery is the fundamental technique for resolving the conflicts between the information provided by different data sources by detecting the true values. Traditional methods assume that each data item ...
-
Article
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning
In recent years, with the deepening of cross-industry cooperation, vertical federated learning with multiple overlap** samples and fewer overlap** features has attracted extensive attention. Vertical feder...
-
Article
An improved indicator-based two-archive algorithm for many-objective optimization problems
The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and...
-
Article
CAT: A Simple yet Effective Cross-Attention Transformer for One-Shot Object Detection
Given a query patch from a novel class, one-shot object detection aims to detect all instances of this class in a target image through the semantic similarity comparison. However, due to the extremely limited ...
-
Article
Computational Approaches for Traditional Chinese Painting: From the “Six Principles of Painting” Perspective
Traditional Chinese painting (TCP) is an invaluable cultural heritage resource and a unique visual art style. In recent years, there has been a growing emphasis on the digitalization of TCP for cultural preser...
-
Article
WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement
Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-lev...
-
Article
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...
-
Article
SinGRAV: Learning a Generative Radiance Volume from a Single Natural Scene
We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from im...
-
Article
10-Million Atoms Simulation of First-Principle Package LS3DF
The growing demand for semiconductor devices simulation poses a big challenge for large-scale electronic structure calculations. Among various methods, the linearly scaling three-dimensional fragment (LS3DF) m...
-
Article
Influence maximization in social networks based on discrete harris hawks optimization algorithm
Influence Maximization (IM) is an important topic in the field of social network analysis, and is widely used in viral marketing, recommendation systems, rumor prevention and other fields. The meta-heuristic m...
-
Article
Missing link prediction using path and community information
Due to the evolving nature of complex networks, link prediction plays a crucial role in exploring likelihood of potential relationships among nodes. There exist a great number of strategies to apply the simila...
-
Article
VPI: Vehicle Programming Interface for Vehicle Computing
The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC), where vehicles serve as a mobile computing platform. However, ...