FCS - volume 16 - 2022 论文列表 |
点击这里查看 Frontiers of Computer Science 的JCR分区、影响因子等信息 |
Tian Zheng Xinyang Qian Jiayin Wang
On the hardness of NTRU problems. An approach for detecting LDoS attack based on cloud model.Wei Shi Dan Tang Sijia Zhan Zheng Qin Xiyin Wang
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.Qingqing Gan Joseph K. Liu Xiaoming Wang Xingliang Yuan Shi-Feng Sun Daxin Huang Cong Zuo Jianfeng Wang
Power diagram based algorithm for the facility location and capacity acquisition problem with dense demand.Yuyou Yao Wenming Wu Gaofeng Zhang Benzhu Xu Liping Zheng
Instance-sequence reasoning for video question answering. CrowdDesigner: information-rich and personalized product description generation.Qiuyun Zhang Bin Guo Sicong Liu Jiaqi Liu Zhiwen Yu
Data fusing and joint training for learning with noisy labels.Yi Wei Mei Xue Xin Liu Pengxiang Xu
Super solutions of the model RB. Referring image segmentation with attention guided cross modal fusion for semantic oriented languages.Qianli Zhou Rong Wang Hai-Miao Hu Quange Tan Wenjin Zhang
Defense against local model poisoning attacks to byzantine-robust federated learning.Shiwei Lu Ruihu Li Xuan Chen Yuena Ma
Revenue-maximizing online stable task assignment on taxi-dispatching platforms.Jingwei Lv Ze Zhao Shuzhen Yao Weifeng Lv
String kernels construction and fusion: a survey with bioinformatics application. Graph convolution machine for context-aware recommender system.Jiancan Wu Xiangnan He Xiang Wang Qifan Wang Weijian Chen Jianxun Lian Xing Xie
Distant supervised relation extraction based on residual attention.Zhiyun Zheng Yun Liu Dun Li Xingjin Zhang
A survey of music emotion recognition.Donghong Han Yanru Kong Jiayi Han Guoren Wang
ResLNet: deep residual LSTM network with longer input for action recognition.Tian Wang Jiakun Li Huai-Ning Wu Ce Li Hichem Snoussi Yang Wu
Exploiting comments information to improve legal public opinion news abstractive summarization.Yuxin Huang Zhengtao Yu Yan Xiang Zhiqiang Yu Junjun Guo
Effort-aware cross-project just-in-time defect prediction framework for mobile apps.Tian Cheng Kunsong Zhao Song Sun Muhammad Mateen Junhao Wen
Performance optimization for cloud computing systems in the microservice era: state-of-the-art and research opportunities.Rong Zeng Xiaofeng Hou Lu Zhang Chao Li Wenli Zheng Minyi Guo
Haifeng Hu Yan Yang Yueming Yin Jiansheng Wu
Endowing rotation invariance for 3D finger shape and vein verification.Hongbin Xu Weili Yang Qiuxia Wu Wenxiong Kang
A mobile edge computing-based applications execution framework for Internet of Vehicles.Libing Wu Rui Zhang Qingan Li Chao Ma Xiaochuan Shi
A survey of discourse parsing.Jiaqi Li Ming Liu Bing Qin Ting Liu
Towards a better prediction of subcellular location of long non-coding RNA.Zhao-Yue Zhang Zi-Jie Sun Yu-He Yang Hao Lin
Line drawing via saliency map and ETF. Multiband decomposition and spectral discriminative analysis for motor imagery BCI via deep neural network.Pengpai Wang Mingliang Wang Yueying Zhou Ziming Xu Daoqiang Zhang
Citywide package deliveries via crowdshipping: minimizing the efforts from crowdsourcers.Sijing Cheng Chao Chen Shenle Pan Hongyu Huang Wei Zhang Yuming Feng
Informative and diverse emotional conversation generation with variational recurrent pointer-generator.Weichao Wang Shi Feng Kaisong Song Daling Wang Shifeng Li
Exploiting natural language services: a polarity based black-box attack.Fatma Gumus Mehmet Fatih Amasyali
Challenges and future directions of secure federated learning: a survey. Self-corrected unsupervised domain adaptation.Tianning Zhang Miao Cai Diming Zhang Hao Huang
Disclosing incoherent sparse and low-rank patterns inside homologous GPCR tasks for better modelling of ligand bioactivities.Jiansheng Wu Chuangchuang Lan Xuelin Ye Jiale Deng Wanqing Huang Xueni Yang Yanxiang Zhu Haifeng Hu
Flexibility and rigidity index for chromosome packing, flexibility and dynamics analysis.Jiajie Peng Jinjin Yang D. Vijay Anand Xuequn Shang Kelin Xia
Precise sensitivity recognizing, privacy preserving, knowledge graph-based method for trajectory data publication.Xianxian Li Bing Cai Li-e Wang Lei Lei
An efficient and authenticated key establishment scheme based on fog computing for healthcare system.Xinghua Li Ting Chen Qingfeng Cheng Jian-Feng Ma
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images.Guoshuai Zhou Xiuxia Tian Aoying Zhou
Demystifying Ethereum account diversity: observations, models and analysis.Chaofan Wang Xiaohai Dai Jiang Xiao Chenchen Li Ming Wen Bingbing Zhou Hai Jin
The parametric complexity of bisimulation equivalence of normed pushdown automata. DRPS: efficient disk-resident parameter servers for distributed machine learning.Zhen Song Yu Gu Zhigang Wang Ge Yu
Improving deep reinforcement learning by safety guarding model via hazardous experience planning.Pai Peng Fei Zhu Xinghong Ling Peiyao Zhao Quan Liu
Polynomial stacked-attention network for nationality classification.Kunyan Li Jie Zhang Shiguang Shan
Controllable data synthesis method for grammatical error correction.Liner Yang Chengcheng Wang Yun Chen Yongping Du Erhong Yang
Pusher: an augmented fuzzer based on the connection between input and comparison operand.Bin Zhang Jiaxi Ye Ruilin Li Chao Feng Yunfei Su Chaojing Tang
Handling class imbalance problem in software maintainability prediction: an empirical investigation. Nighttime image dehazing using color cast removal and dual path multi-scale fusion strategy.Bo Wang Li Hu Bowen Wei Zitong Kang Chongyi Li
Accelerating temporal action proposal generation via high performance computing.Tian Wang Shiye Lei Youyou Jiang Chang Choi Hichem Snoussi Guangcun Shan Yao Fu
Exploring associations between streetscape factors and crime behaviors using Google Street View images.Mingyu Deng Wei Yang Chao Chen Chenxi Liu
SCARE and power attack on AES-like block ciphers with secret S-box.Xin Liu An Wang Liehuang Zhu Yaoling Ding Zeyuan Lyu Zongyue Wang
Monotonicity and nonmonotonicity in L3-valued propositional logic.Yu Hu Derong Shen Tiezheng Nie Yue Kou Ge Yu
K-ary search tree revisited: improving construction and intersection efficiency.Xingshen Song Jinsheng Deng Fengcai Qiao Kun Jiang
Exploiting user behavior learning for personalized trajectory recommendations.Xiao Pan Lei Wu Fenjie Long Ma Ang
Collaborative eye tracking based code review through real-time shared gaze visualization.Shiwei Cheng Jialing Wang Xiaoquan Shen Yijian Chen Anind K. Dey
SCENERY: a lightweight block cipher based on Feistel structure. Transferring priors from virtual data for crowd counting in real world.Xiaoheng Jiang Hao Liu Li Zhang Geyang Li Mingliang Xu Pei Lv Bing Zhou
On the learning dynamics of two-layer quadratic neural networks for understanding deep learning. Mask guided diverse face image synthesis.Sun Song Bo Zhao Muhammad Mateen Xin Chen Junhao Wen
Model-based automated testing of JavaScript Web applications via longer test sequences.Pengfei Gao Yongjie Xu Fu Song Taolue Chen
Compressed page walk cache.Dunbo Zhang Chaoyang Jia Li Shen
On the use of formal methods to model and verify neuronal archetypes.Elisabetta De Maria Abdorrahim Bahrami Thibaud L'Yvonnet Amy P. Felty Daniel Gaffé Annie Ressouche Franck Grammont
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network.Lei Nie Bo Liu Peng Li Heng He Libing Wu
Full friendly index sets of mCn.Yurong Ji Jinmeng Liu Yujie Bai Shufei Wu
Accelerating the cryo-EM structure determination in RELION on GPU cluster.Xin You Hailong Yang Zhongzhi Luan Depei Qian
Towards better entity linking.Mingyang Li Yuqing Xing Fang Kong Guodong Zhou
Probabilistic synthesis against GR(1) winning condition.Wei Zhao Rui Li Wanwei Liu Wei Dong Zhiming Liu
ForkXplorer: an approach of fork summary generation.Zhang Zhang Xinjun Mao Chao Zhang Yao Lu
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor.Lei Wu Fuyou Miao Keju Meng Xu Wang
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid.Zhusen Liu Zhenfu Cao Xiaolei Dong Xiaopeng Zhao Haiyong Bao Jiachen Shen
Multi-key FHE without ciphertext-expansion in two-server model. Dynamic road crime risk prediction with urban open data.Binbin Zhou Longbiao Chen Fangxun Zhou Shijian Li Sha Zhao Gang Pan
An optimal differentially private data release mechanism with constrained error.Hao Wang Zhengquan Xu Xiaoshan Zhang Xiao Peng Kaiju Li
Mean estimation over numeric data with personalized local differential privacy. New construction of highly nonlinear resilient S-boxes via linear codes. Speech-driven facial animation with spectral gathering and temporal attention.Yujin Chai Yanlin Weng Lvdi Wang Kun Zhou
A subgraph matching algorithm based on subgraph index for knowledge graph.Yunhao Sun Guanyu Li Jingjing Du Bo Ning Heng Chen
Similarity-based privacy protection for publishing k-anonymous trajectories.Shuai Wang Chunyi Chen Guijie Zhang
Local feature aggregation algorithm based on graph convolutional network. A bi-metric autoscaling approach for n-tier web applications on kubernetes.Zhuoxin Zhan Mingkai He Weike Pan Zhong Ming
Robust watermarking of databases in order-preserving encrypted domain.Shijun Xiang Guanqi Ruan Hao Li Jiayong He
Improvement on a batch authenticated key agreement scheme.Qingfeng Cheng Ting Chen Siqi Ma Xinghua Li
Semantic and secure search over encrypted outsourcing cloud based on BERT.Zhangjie Fu Yan Wang Xingming Sun Xiaosong Zhang
Defocus blur detection using novel local directional mean patterns (LDMP) and segmentation via KNN matting.Awais Khan Aun Irtaza Ali Javed Tahira Nazir Hafiz Malik Khalid Mahmood Malik Muhammad Ammar Khan
iNet: visual analysis of irregular transition in multivariate dynamic networks.Dongming Han Jiacheng Pan Rusheng Pan Dawei Zhou Nan Cao Jingrui He Mingliang Xu Wei Chen
EcoVis: visual analysis of industrial-level spatio-temporal correlations in electricity consumption.Yong Xiao Kaihong Zheng Supaporn Lonapalawong Wenjie Lu Zexian Chen Bin Qian Tianye Zhang Xin Wang Wei Chen
A comprehensive study on fault tolerance in stream processing systems.Xiaotong Wang Chunxi Zhang Junhua Fang Rong Zhang Weining Qian Aoying Zhou
Spatio-temporal keyword query in semantic trajectories.Xia Wu Jiankun Yu Xiaoming Zhao
An improved branching algorithm for the proper interval edge deletion problem.Wenjun Li Xiaojing Tang Yongjie Yang
Relation Reconstructive Binarization of word embeddings.Feiyang Pan Shuokai Li Xiang Ao Qing He
THS-GWNN: a deep learning framework for temporal network link prediction. Automated detection on the security of the linked-list operations.Hongyu Kuang Jian Wang Ruilin Li Chao Feng Yunfei Su Xing Zhang
Return just your search: privacy-preserving homoglyph search for arbitrary languages.Bowen Zhao Shaohua Tang Ximeng Liu Yiming Wu
Cancer classification with data augmentation based on generative adversarial networks. Side-channel analysis attacks based on deep learning network. DeepM6ASeq-EL: prediction of human N6-methyladenosine (m6A) sites with LSTM and ensemble learning.Ziyuan Li Huimei Wang Jian Liu Ming Xian
IP-geolocater: a more reliable IP geolocation algorithm based on router error training.Shuodi Zu Xiangyang Luo Fan Zhang
LIDAR: learning from imperfect demonstrations with advantage rectification.Xiaoqin Zhang Huimin Ma Xiong Luo Jian Yuan
Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm.Xiaolong Liu Jinchao Liang De-Yu Liu Riqing Chen Shyan-Ming Yuan
MSDA: multi-subset data aggregation scheme without trusted third party.Zhixin Zeng Xiaodi Wang Yi-Ning Liu Liang Chang
A novel threshold changeable secret sharing scheme.Lein Harn Chingfang Hsu Zhe Xia
An efficient memory data organization strategy for application-characteristic graph processing.Peng Fang Fang Wang Zhan Shi Dan Feng Qianxu Yi Xianghao Xu Yongxuan Zhang
Cross-scene passive human activity recognition using commodity WiFi.Yuanrun Fang Fu Xiao Biyun Sheng Letian Sha Lijuan Sun
Improving accuracy of automatic optical inspection with machine learning.Xinyu Tong Ziao Yu Xiaohua Tian Houdong Ge Xinbing Wang
OCSO-CA: opposition based competitive swarm optimizer in energy efficient IoT clustering.Arpita Biswas Abhishek Majumdar Soumyabrata Das Krishna Lal Baishnab
The LP-rounding plus greed approach for partial optimization revisited. Label distribution for multimodal machine learning.Yi Ren Ning Xu Miaogen Ling Xin Geng
Understanding the role of human-inspired heuristics for retrieval models. GridNet: efficiently learning deep hierarchical representation for 3D point cloud understanding.