Skip to main content

previous disabled Page of 368
and
  1. No Access

    Article

    Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...

    Jiangang Hou, **n Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu in Computing (2024)

  2. No Access

    Article

    Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations

    This paper proposes a Robust Spatial-Temporal Graph Neural Network (RSTGNN), which overcomes the limitations faced by graph-based models against dynamic graph perturbations using robust spatial-temporal self-a...

    Zhuo Zeng, Chengliang Wang, Fei Ma, Xusheng Li, **nrun Chen in Computing (2024)

  3. No Access

    Article

    Differentially private federated learning with non-IID data

    In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the a...

    Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu in Computing (2024)

  4. No Access

    Article

    Semantically realizing discovery and composition for RESTful web services

    The processes of service discovery and composition are crucial tasks in application development driven by Web Services. However, with RESTful Web Service replacing SOAP-based Web Service as the dominant servic...

    Haijun Gu, Yingyu Ma, Siqi Wang, **ncheng Chen, Weihua Su in Computing (2024)

  5. No Access

    Article

    Electricity-cost-aware multi-workflow scheduling in heterogeneous cloud

    Multi-workflows are commonly deployed on cloud platforms to achieve efficient computational power. Diverse task configuration requirements, the heterogeneous nature and dynamic electricity price of cloud serve...

    Shuang Wang, Yibing Duan, Yamin Lei, Peng Du, Yamin Wang in Computing (2024)

  6. No Access

    Article

    LGAT: a light graph attention network focusing on message passing for semi-supervised node classification

    Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured da...

    Chengcheng Sun, Fanrong Meng, Chenhao Li, **aobin Rui, Zhixiao Wang in Computing (2024)

  7. No Access

    Article

    An association rule mining-oriented approach for prioritizing functional requirements

    Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained developm...

    Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang in Computing (2024)

  8. No Access

    Article

    Person re-identification method based on fine-grained feature fusion and self-attention mechanism

    Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a ...

    Kangning Yin, Zhen Ding, Zhihua Dong, **nhui Ji, Zhipei Wang, Dongsheng Chen in Computing (2024)

  9. No Access

    Article

    Generalizing truth discovery by incorporating multi-truth features

    Truth discovery is the fundamental technique for resolving the conflicts between the information provided by different data sources by detecting the true values. Traditional methods assume that each data item ...

    **u Susie Fang, **anzhi Wang, Quan Z. Sheng, Lina Yao in Computing (2024)

  10. No Access

    Article

    SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning

    In recent years, with the deepening of cross-industry cooperation, vertical federated learning with multiple overlap** samples and fewer overlap** features has attracted extensive attention. Vertical feder...

    Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang in Computing (2024)

  11. No Access

    Article

    An improved indicator-based two-archive algorithm for many-objective optimization problems

    The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and...

    Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang in Computing (2024)

  12. No Access

    Article

    CAT: A Simple yet Effective Cross-Attention Transformer for One-Shot Object Detection

    Given a query patch from a novel class, one-shot object detection aims to detect all instances of this class in a target image through the semantic similarity comparison. However, due to the extremely limited ...

    Wei-Dong Lin 林蔚东, Yu-Yan Deng 邓玉岩 in Journal of Computer Science and Technology (2024)

  13. No Access

    Article

    Computational Approaches for Traditional Chinese Painting: From the “Six Principles of Painting” Perspective

    Traditional Chinese painting (TCP) is an invaluable cultural heritage resource and a unique visual art style. In recent years, there has been a growing emphasis on the digitalization of TCP for cultural preser...

    Wei Zhang 张 玮, Jian-Wei Zhang 张建伟 in Journal of Computer Science and Technology (2024)

  14. No Access

    Article

    WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement

    Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-lev...

    Zi-Nuo Li **梓诺, Xu-Hang Chen 陈绪行 in Journal of Computer Science and Technology (2024)

  15. No Access

    Article

    Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective

    Graph processing has been widely used in many scenarios, from scientific computing to artificial intelligence. Graph processing exhibits irregular computational parallelism and random memory accesses, unlike t...

    **ao-Fei Liao 廖小飞, Wen-Ju Zhao 赵文举 in Journal of Computer Science and Technology (2024)

  16. No Access

    Article

    SinGRAV: Learning a Generative Radiance Volume from a Single Natural Scene

    We present SinGRAV, an attempt to learn a generative radiance volume from multi-view observations of a single natural scene, in stark contrast to existing category-level 3D generative models that learn from im...

    Yu-Jie Wang 王玉洁, Xue-Lin Chen 陈学霖 in Journal of Computer Science and Technology (2024)

  17. No Access

    Article

    10-Million Atoms Simulation of First-Principle Package LS3DF

    The growing demand for semiconductor devices simulation poses a big challenge for large-scale electronic structure calculations. Among various methods, the linearly scaling three-dimensional fragment (LS3DF) m...

    Yu-** Yan, Hai-Bo Li, Tong Zhao in Journal of Computer Science and Technology (2024)

  18. No Access

    Article

    Influence maximization in social networks based on discrete harris hawks optimization algorithm

    Influence Maximization (IM) is an important topic in the field of social network analysis, and is widely used in viral marketing, recommendation systems, rumor prevention and other fields. The meta-heuristic m...

    Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, **aobin Rui in Computing (2024)

  19. No Access

    Article

    Missing link prediction using path and community information

    Due to the evolving nature of complex networks, link prediction plays a crucial role in exploring likelihood of potential relationships among nodes. There exist a great number of strategies to apply the simila...

    Min Li, Shuming Zhou, Da** Wang, Gaolin Chen in Computing (2024)

  20. No Access

    Article

    VPI: Vehicle Programming Interface for Vehicle Computing

    The emergence of software-defined vehicles (SDVs), combined with autonomous driving technologies, has enabled a new era of vehicle computing (VC), where vehicles serve as a mobile computing platform. However, ...

    Bao-Fu Wu, Ren Zhong, Yuxin Wang, Jian Wan in Journal of Computer Science and Technology (2024)

previous disabled Page of 368