


default search action
6th SmartCom 2021: New York City, NY, USA
- Meikang Qiu

, Keke Gai
, Han Qiu:
Smart Computing and Communication - 6th International Conference, SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings. Lecture Notes in Computer Science 13202, Springer 2022, ISBN 978-3-030-97773-3
Regular Papers
- Peng Liu, Yiming Lu, Guoqing Wang, Wang Zhou:

Efficient Online Service Based on Go-Tensorflow in the Middle-Station Scenario of Grid Service. 3-13 - Zhixin Lu, Lianyu Fu, Yizhao Liu, Xiyang Yin:

Resource Modeling of Power Communication Packet Optical Transport Network. 14-25 - Deyi Kong, Zehua You, Qimei Chen

, Juanjuan Wang, Jiwei Hu, Yunfei Xiong, Jing Wu:
Energy-Efficient Federated Learning in IoT Networks. 26-36 - Faguo Zhou, Jing Zhang, Yanan Song:

Chinese Fine-Grained Sentiment Classification Based on Pre-trained Language Model and Attention Mechanism. 37-47 - Xiaohui Wei, Xiaonan Wang, Haixiao Xu, Xingwang Wang, Hao Guo:

Link-Efficiency Multi-channel Transmission Protocol for Data Collection in UASNs. 48-63 - Tingting Zhang, Lintao Yang, Tao Dong, Jie Yin, Zhihui Liu, Zhanwei Wang:

A Multi-attribute Decision Handover Strategy for Giant LEO Mobile Satellite Networks. 64-73 - Liang Zhou, Hao Li, Jianguo Zhou, Changjia Zhou, Tianzhu Shi:

ML-ECN: Multilayer Emergency Communication Network Based on the Combination of Space and Earth. 74-89 - Jing Guo, Bingsen Li, Ping Du, Ziyi Xin, Jianjun Zhang, Jiawei Chen:

Multi-attribute Authentication Method Based on Continuous Trust Evaluation. 90-100 - Jing Wang, Meng Wan

, Jue Wang, Xiaoguang Wang, Yangang Wang, Fang Liu, Weixiao Min, He Lei, Lihua Wang:
Defects Detection System of Medical Gloves Based on Deep Learning. 101-111 - Xuqiu Chen, Wei Wang, Wei Gan, Yi Yang, Su Yuan, Meng Li:

Mobile Terminal Identity Authentication Method Based on IBC. 112-122 - He Li

, Rongqiang Cao, Hanwen Xiu, Meng Wan
, Kai Li, Xiaoguang Wang, Yangang Wang, Jue Wang:
Secure Shell Remote Access for Virtualized Computing Environment. 123-132 - Amr M. H. Saeed, Danghui Wang, Hamas A. M. Alnedhari, Kuizhi Mei, Jihe Wang:

A Survey of Machine Learning and Deep Learning Based DGA Detection Techniques. 133-143 - Meng Wan

, Jiaheng Wang, Jue Wang, Rongqiang Cao, Yangang Wang, He Li:
Sci-Base: A Resource Aggregation and Sharing Ecology for Software on Discovery Science. 144-153 - Xu Chu, Xiaoyang Liu, Qimei Chen

, Yunfei Xiong, Juanjuan Wang, Han Yu, Xiang Hu:
Joint Accuracy and Resource Allocation for Green Federated Learning Networks. 154-163 - Lu Chen, Zaojian Dai, Nige Li, Yong Li:

Trust Evaluation Method Based on the Degree of Code Obfuscation. 164-174 - Pengyu Zhang, Chunmei Wang, Baocong Hao, Wenhui Hu, Xueyang Liu, Lizhuang Sun:

An SG-CIM Model Table Classification Method Based on Multi Feature Semantic Recognition Technology. 175-185 - Jian Yang, Yawen Lu, Zhihui Lu, Jie Wu, Hui Zhao:

BBCT: A Smart Blockchain-Based Bulk Commodity Trade System. 186-197 - Xu Zhang, Li Zheng, Sujuan Zhang:

Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation. 198-207 - Cong Zhou, Weipeng Cao, Zhiwu Xu:

Charge Prediction for Criminal Law with Semantic Attributes. 208-217 - Jie Wan:

Research on Enterprise Financial Accounting Based on Modern Information Technology. 218-227 - Dansheng Rao, Jie Wan:

Financial Information Management Under the Background of Big Data. 228-237 - Xiaohui Wei, Tao Guo, Hongmei Yu, Zijian Li

, Hao Guo, Xiang Li:
AreaTransfer: A Cross-City Crowd Flow Prediction Framework Based on Transfer Learning. 238-253 - Yapeng Sun

:
Parallel Improved Quantum Evolutionary Algorithm for Complex Optimization Problems. 254-264 - Yunwei Guo, Haokun Tang, Aidi Tan

, Lei Xu, Keke Gai, Xiongwei Jia:
A Privacy-Preserving Auditable Approach Using Threshold Tag-Based Encryption in Consortium Blockchain. 265-275 - Wanhao Cao, Jihe Wang, Danghui Wang, Kuizhi Mei:

A Hop-Parity-Involved Task Schedule for Lightweight Racetrack-Buffer in Energy-Efficient NoCs. 276-285 - Shaojun Jin, Jun Pan, Qian Chen, Bo Li:

Analysis and Discussion on Standard Cost Allocation Model in State Grid. 286-296 - Mingjun Feng, Buqiong Xiao, Bo Yu, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li:

A Novel Deception Defense-Based Honeypot System for Power Grid Network. 297-307 - Zongxiao Li, Di Liu, Peiran Li, Dawei Li, Yu Sun, Zhenyu Guan, Jianwei Liu

, Jie Gao:
Seamless Group Pre-handover Authentication Scheme for 5G High-Speed Rail Network. 308-317 - Xiangtian Tan, Chen Zhang, Bo Li, Binbin Ge, Chen Liu:

Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction. 318-328 - Pengyu Zhang:

High-Performance and Customizable Vector Retrieval Service Based on Faiss in Power Grid Scenarios. 329-339 - Bo Dai, Zhenhai Zhang, Ling Wang, Yuan Liu:

APT Attack Heuristic Induction Honeypot Platform Based on Snort and OpenFlow. 340-351 - Xiaoqi Liao, Xinliang Ge, Yufei Li, Wenhui Hu, Xin He, Shijie Gao, Xiaoming Chen, Xueyang Liu:

An Automatic Design Method of Similarity Fusion Neural Network Based on SG-CIM Model. 352-363 - Meng Yue, Han Zheng, Wenzhi Feng, Zhijun Wu:

A Detection Method for I-CIFA Attack in NDN Network. 364-373 - Abdulrahman Azab

:
InterGridSim: A Broker-Overlay Based Inter-Grid Simulator. 374-383 - Yun Liu, Shenghao Ding, Jiaxin Huang, Hao Jiang, Jing Wu, Ruiliang Song, Ningning Lu, Zhiqun Song:

Vertical Handover of Satellite-Ground Fusion Network Based on Time and Location Under Early Access Strategy. 384-393 - Wenyong He, Mingming Lu, Yiji Zheng, Neal N. Xiong:

Research on Graph Structure Data Adversarial Examples Based on Graph Theory Metrics. 394-403 - Yiming Yao, Tao Ren, Yuan Qiu, Zheyuan Hu, Yanqi Li:

Computation Offloading and Resource Allocation Based on Multi-agent Federated Learning. 404-415 - Hang He, Tao Ren, Yuan Qiu, Zheyuan Hu, Yanqi Li:

Multi-agent Computation Offloading in UAV Assisted MEC via Deep Reinforcement Learning. 416-426 - Zhixiang Xiao, Mingming Lu, Wenyong He, Jiawen Cai, Neal N. Xiong:

OPN-DTSP: Optimized Pointer Networks for Approximate Solution of Dynamic Traveling Salesman Problem. 427-437 - Bo Chen, Xiaoying Zheng, Yongxin Zhu, Meikang Qiu:

A Novel Client Sampling Scheme for Unbalanced Data Distribution Under Federated Learning. 438-449 - Lan Yang, Zongbo Wu, Jun Guo:

A Novel Secure Speech Biometric Protection Method. 450-459 - Shengchun Wang, Danyi Hu, Changqing Zhou, Jingyu Xu:

Thunderstorm Recognition Based on Neural Network PRDsNET Models. 460-469 - Jun Guo, Gejing Xu, Junjie Wu, Lan Yang, Han Deng:

The Development and Trend of Vehicle Functional Safety. 470-480 - Yan Hui, Jie Zhan, Libin Jiao, Xiu Liang:

Design and Development of Simulation Software Based on AR-Based Torricelli Experiment. 481-490
Short Papers
- Li Ma, Zexian Yang

, Wenyin Yang
, Huihong Yang
, Qidi Lao
:
Study on the Organization and Governance of Bigdata for Lifelong Education. 493-500 - Chunyi Lu, Kaili Yan, Mi Zhou:

Fault Location Technique of Distribution Power Network Based on Traveling Wave Measurement. 501-507 - Abdulrahman Azab

:
Unikernel and Advanced Container Support in the Socker Tool. 508-512

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














