2095-2228

Frontiers of Computer Science (FCS) - April 2022, issue 2 论文列表

本期论文列表
Robust watermarking of databases in order-preserving encrypted domain

Improvement on a batch authenticated key agreement scheme

Semantic and secure search over encrypted outsourcing cloud based on BERT

Return just your search: privacy-preserving homoglyph search for arbitrary languages

Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting

iNet: visual analysis of irregular transition in multivariate dynamic networks

TransRec++: Translation-based sequential recommendation with heterogeneous feedback

EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption

A comprehensive study on fault tolerance in stream processing systems

Spatio-temporal keyword query in semantic trajectories

Cancer classification with data augmentation based on generative adversarial networks

An improved branching algorithm for the proper interval edge deletion problem

Towards better entity linking

Relation Reconstructive Binarization of word embeddings

THS-GWNN: a deep learning framework for temporal network link prediction

Side-channel analysis attacks based on deep learning network

DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning

Probabilistic synthesis against GR(1) winning condition

ForkXplorer: an approach of fork summary generation

Automated detection on the security of the linked-list operations

Flexibility and rigidity index for chromosome packing, flexibility and dynamics analysis

SeBROP: blind ROP attacks without returns

Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication

An efficient and authenticated key establishment scheme based on fog computing for healthcare system

SCARE and power attack on AES-like block ciphers with secret S-box

Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy

Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images

TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data

Demystifying Ethereum account diversity: observations, models and analysis

A dynamic logic for verification of synchronous models based on theorem proving

The parametric complexity of bisimulation equivalence of normed pushdown automata

Rehearsal: learning from prediction to decision

Multi-granularity semantic alignment distillation learning for remote sensing image semantic segmentation

Identification and classification of promoters using the attention mechanism based on long short-term memory

Community search over heterogeneous information networks via weighting strategy and query replacement

Disk based pay-as-you-go record linkage

Disclosing incoherent sparse and low-rank patterns inside homologous GPCR tasks for better modelling of ligand bioactivities

DRPS: efficient disk-resident parameter servers for distributed machine learning

Improving deep reinforcement learning by safety guarding model via hazardous experience planning

Polynomial stacked-attention network for nationality classification

Controllable data synthesis method for grammatical error correction

Accelerating temporal action proposal generation via high performance computing

Exploring associations between streetscape factors and crime behaviors using Google Street View images

Monotonicity and nonmonotonicity in L3-valued propositional logic

Pusher: an augmented fuzzer based on the connection between input and comparison operand

Handling class imbalance problem in software maintainability prediction: an empirical investigation

A structural variation genotyping algorithm enhanced by CNV quantitative transfer

String kernels construction and fusion: a survey with bioinformatics application

Low-cost client-side encryption and secure Internet of things (IoT) provisioning

On the hardness of NTRU problems

An approach for detecting LDoS attack based on cloud model

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage

Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand

Instance-sequence reasoning for video question answering

An efficient graph data compression model based on the germ quotient set structure

Graph convolution machine for context-aware recommender system

Super solutions of the model RB

PSLDA: a novel supervised pseudo document-based topic model for short texts

Non-salient region erasure for time series augmentation

Referring image segmentation with attention guided cross modal fusion for semantic oriented languages

CrowdDesigner: information-rich and personalized product description generation

Data fusing and joint training for learning with noisy labels

Defense against local model poisoning attacks to byzantine-robust federated learning

Distant supervised relation extraction based on residual attention

A survey of music emotion recognition

ResLNet: deep residual LSTM network with longer input for action recognition

Exploiting comments information to improve legal public opinion news abstractive summarization

Revenue-maximizing online stable task assignment on taxi-dispatching platforms

Effort-aware cross-project just-in-time defect prediction framework for mobile apps

Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities

A framework combines supervised learning and dense subgraphs discovery to predict protein complexes

Implementing a sidechain-based asynchronous DPKI

A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor

A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid

Multi-key FHE without ciphertext-expansion in two-server model

MSDA: multi-subset data aggregation scheme without trusted third party

A novel threshold changeable secret sharing scheme

Dynamic road crime risk prediction with urban open data

An optimal differentially private data release mechanism with constrained error

An efficient memory data organization strategy for application-characteristic graph processing

IP-geolocater: a more reliable IP geolocation algorithm based on router error training

Cross-scene passive human activity recognition using commodity WiFi

OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering

The LP-rounding plus greed approach for partial optimization revisited

LIDAR: learning from imperfect demonstrations with advantage rectification

Improving accuracy of automatic optical inspection with machine learning

Label distribution for multimodal machine learning

Understanding the role of human-inspired heuristics for retrieval models

GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding

Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm

SCENERY: a lightweight block cipher based on Feistel structure

Mean estimation over numeric data with personalized local differential privacy

New construction of highly nonlinear resilient S-boxes via linear codes

Collaborative eye tracking based code review through real-time shared gaze visualization

Speech-driven facial animation with spectral gathering and temporal attention

K-ary search tree revisited: improving construction and intersection efficiency

Exploiting user behavior learning for personalized trajectory recommendations

A subgraph matching algorithm based on subgraph index for knowledge graph

Similarity-based privacy protection for publishing k-anonymous trajectories

An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network

Satisfiability threshold of the random regular (s, c, k)-SAT problem

On the use of formal methods to model and verify neuronal archetypes

Full friendly index sets of mCn

Toward few-shot domain adaptation with perturbation-invariant representation and transferable prototypes

Linguistic feature template integration for Chinese-Vietnamese neural machine translation

Biomedical entity linking based on less labeled data

Transferring priors from virtual data for crowd counting in real world

On the learning dynamics of two-layer quadratic neural networks for understanding deep learning

Mask guided diverse face image synthesis

Local feature aggregation algorithm based on graph convolutional network

Model-based automated testing of JavaScript Web applications via longer test sequences

Compressed page walk cache

Accelerating the cryo-EM structure determination in RELION on GPU cluster

A bi-metric autoscaling approach for n-tier web applications on kubernetes

Towards a better prediction of subcellular location of long non-coding RNA

Efficient protocols for heavy hitter identification with local differential privacy

A privacy-preserving group encryption scheme with identity exposure

(Full) Leakage resilience of Fiat-Shamir signatures over lattices

Challenges and future directions of secure federated learning: a survey

Line drawing via saliency map and ETF

Fast and efficient parallel breadth-first search with power-law graph transformation

Efficient and stable quorum-based log replication and replay for modern cluster-databases

Heterogeneous information network embedding with incomplete multi-view fusion

A mobile edge computing-based applications execution framework for Internet of Vehicles

A Bayesian matrix factorization model for dynamic user embedding in recommender system

Metric learning for domain adversarial network

Endowing rotation invariance for 3D finger shape and vein verification

Improving meta-learning model via meta-contrastive loss

Efficient policy evaluation by matrix sketching

A survey of discourse parsing

Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network

Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers

Informative and diverse emotional conversation generation with variational recurrent pointer-generator

Exploiting natural language services: a polarity based black-box attack

Community detection with attributed random walk via seed replacement

Self-corrected unsupervised domain adaptation

Prediction of job characteristics for intelligent resource allocation in HPC systems: a survey and future directions

GCSS: a global collaborative scheduling strategy for wide-area high-performance computing