


default search action
CNML 2023: Zhengzhou, China
- Proceedings of the 2023 International Conference on Communication Network and Machine Learning, CNML 2023, Zhengzhou, China, October 27-28, 2023. ACM 2023

Chapter 1 - Communication System Modeling and Satellite Communication Technology
- Jinao Wang

, Jiwei Hua
, Jinqi Zhu
, Yanmin Wei
, Luyao Wang
:
Rogue Nodes Detection Using Idle Parking Resources. 1-5 - Zhongmin Pei

, Boren Hu
, Zhangkai Luo
, Jie Ding
:
Analysis of node importance of satellite network based on triangular motif. 6-12 - Ying Wang

, Zesan Liu
, Yanjie Wang
, Zhencong Cai
, Yu Meng
:
Research on Web Configuration Software Interactivity Enhancement Technology Based on Vue and Component Library. 13-17 - Weiming Qin

, Wenjing Guo
, Jingwen Lin
, Jiahao Li
, Xuerui Chen
, Xinsu Mei
, Wei Zhang
:
Design and implementation of power communication protocol plug-in based on hot loading. 18-22 - Shuaishuai Pan

, Zhongchuan Sun
:
Cross Polarization Interference Cancellation Algorithm Based on Maximum Likelihood for Satellite Communication. 23-27 - Fan Jiang

, Yangfeng Rong
, Jinhe Yu
, Mingyuan Liang
, Wei Xing
, Bo Zhang
:
Research on Machine Learning and State Grid Business Risk Prevention and Control Based on the Internet. 28-32 - Zeru Li

, Zhongyuan Qin
, Xin Sun
, Wen Wang
:
Efficient fuzzing testcases generation based on SAGAN. 33-38 - Yuchen Yin

, Yiping Yang
:
Design and Implementation of Intelligent Radar Anti-jamming Simulation System. 39-43 - Qianglong Meng

, Li Liu
, Dongqing Zhou
, Hong Tang
, Rongshu Zhang
, Xiangjun Liu
, Dan Yan
:
Application of Artificial Bee Colony Algorithm in Power Communication Network Routing Optimization Simulation. 44-48 - Ji Qi

, Yuehui Tan
, Qifan Zhao
, Weiliang Li
, Bao Sun
, Yi Wu
, Hui Tao
, Xin Zhang
:
Virtualized Network Function Scaling Strategy Based on Additional Momentum BP Neural Network. 49-55 - Yuhao Xu

, Xiaoyu Zhang
, Yi Sun
, Kai Zhou
:
Indoor location algorithm based on improved Kalman filter. 56-60 - Shikun Zhuo

:
Insight into the effect and application of LEO satellite network. 61-66 - Bingyu He

, Hao Fu
, Jinhua Li
, Xiaomin Zhu
:
A Survey of Multi-Transmission Path Optimization. 67-72 - Shenjie Gao

, Bowei Duan
, Ping Zhou
, Xijing Li
, Xin Jing
:
Research on Intelligent Recommendation Model for Application Systems. 73-77 - Lijun Tong

, Xiang Li
, Zheng Kong
, Qinghua Wang
, Xiang Wang
:
Research on PIM Characteristics of High-Power RF Connectors. 78-82 - Tao Liu

, Zhifan He
, Sijian Li
, Yue Ma
:
A Secure Power Data Sharing Scheme Based on Sensitive Data Automatic Recognition. 83-87 - Jinhua Lu

, Shunzheng Yu
:
Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations. 88-92 - Guoquan Zheng

, Enguo Zhu
, Hailong Zhang
, Yan Liu
, Chaoliang Wang
:
Research on throughput maximization of mass device access based on 5G big connection. 93-96 - Juanning Wang

, Qiang Li
:
Automatic testing of computerized interlocks based on recognition of the interlocking host computer interface. 97-100 - Beiming Li

, Jiahao Xu
:
A transform domain communication method based on combinatorial basis function. 101-105 - Zhongfa Zhang

:
Research on Network Architecture Based on Improved MPLS Protocol and SDN Technology. 106-110 - Jinyu Zhu

, He Li
, Shihui Duan
, Youyang Zhu, Chenglin Zhao
, Haojiang Deng
:
End-to-End Performance Verification of 5G-TSN Converged Network. 111-114 - Haiou Li

, Zhiwen Kang
, Guolin Song
, Yajun Liu
, Hong Mei
, Xin Chen
, Ming Gu
, Jieli Wang
, Geng Chen
:
Application of Federated Learning in mobile communication Anti-telecom fraud. 115-118 - Haichao Wang

, Zhonghua Wang
, Yong Wang
:
Analysis of CDMA capacity of multi-beam satellite under beam coding. 119-122 - Ming Ji

, Ruidan Luo
, Na Xu
, Yaping Li
, Xiao Chen
:
An Opportunistic LEO-based Doppler differential positioning method with baseline optimization. 123-128 - Ruokun Wang

, Xiaodong Wu
, Qinghao Zhu
:
Multi-antenna Signal Synthesis Technique Research Based on Feedforward Neural Network Algorithm in High Frequency Communication. 129-133 - Ni Zeng

, Zhe Jia
, Zehua Ding
, Lingna Hu
, Lianghui Ding
, Feng Yang
:
Co-channel interference cancellation and equalization in aeronautical telemetry using multiple antennas. 134-139 - Yongjie Li

, Huanpeng Hou
, Jizhao Lu
, Wenge Wang
:
Digital spread-spectrum watermarking identity authentication technology based on OFDM in satellite-ground communication system. 140-144
Chapter 2 - Information Management and Network Security Technology
- Chaofeng Zeng

:
Construction of an Emotional Dictionary for Online Comment Text in Knowledge Services. 145-150 - Rui Chen

, Shulin Wu
, Shaojun Lin
, Helin Zhang
, Meiling Jiang
:
Design of a comprehensive management and monitoring platform for the operation and security of power information systems. 151-155 - Rong Zhu

, Enjian Bai
:
A Physical Layer Key Generation Using a Hybrid Quantization Scheme. 156-160 - Rongrui Chen

, Hai Cheng
:
Low retrieval consumption searchable encryption scheme based on random number pairing. 161-164 - Binyong Li

, Jie Fang
, Xianhui Deng
, Yuhan Sheng
:
Petri net-based illegal information flow detection method for node-chain access control model. 165-169 - Ci Xiao

, Yajun Chen
, Chaoyue Sun
:
Research on High-Quality Image Generation Based on the AdvDCGAN Algorithm. 170-173 - Fei Yin

, Chengliangyi Xia
:
Blockchain-Based Data Secure and Traceable Scheme for Industrial Internet of Things. 174-178 - Weijie Zeng, Rui Fan, Zhi Wang, Yu Xiao, Rui Huang, Mouhai Liu:

Research on Docker Container Network Isolation and Security Management for Multi-Tenant Environments. 179-185 - Changchen Wang

, Hong Liu
:
A Channel State Information based Respiration Rate Monitoring Method. 186-190 - Hui Li

:
Application of artificial intelligence in the construction of computer big data security technology platform. 191-195 - Yimeng Li

, Xi Li
, Yichao Zhang
:
Traffic Classification of Network Security Agents Based on Feature Fusion Convolutional Neural Network. 196-200 - Zhongwen Zhao

, Di Lu
:
Vulnerability analysis of mission-based spatial information networks. 201-206 - Zihan Xiong

, Yuxuan Li
, Jun Chen
, Dabei Chen
:
FusedCNN-LSTM-AttNet: A Neural Network Model for Cyber Security Situation Prediction. 207-210 - Xinbo Wang

:
Application of Deep Learning Based on Artificial Intelligence in Security Monitoring System. 211-214 - Jiayue Xu

, Ming Ni
, Danjiang Zhu
, Xinsheng Yu
:
Overview of SQL Injection Attack Detection Techniques. 215-225 - Zixuan Jin

, Changbo Xu
, Shaozhong Cao
, Yi Liu
:
Multimodal sentiment analysis based on multiple attention mechanisms. 226-230 - Kewei Li

, Fudong Liu
:
A hybrid model for classifying malware based on ResNet and Transformer. 231-237 - Runlin Li

, Zhizhi Zhang
, Xuchao Gong
, Qilu Zhao
:
A Method for Extracting Sensitive Information from Long Text Based on Natural Language Processing Technology. 238-243 - Jianlu Wu

, Qingwang Li
:
Design and application adaptation verification of time-sensitive network end system network card based on FPGA. 244-247 - Daojuan Zhang

, Tianqi Wu
, Xiaoming Zhou
, Bo Hu
, Wenjie Zhang
:
Multi-source System Log Behavior Pattern Mining Method Based on FP-Growth. 248-254 - Kai Jin

, Xin Shan
, Yuan Zhou
, Jing Li
, Haidi Dong
:
Fuzzy Analytic Hierarchy Process for Brittleness of Computer Network Security System. 255-258 - Ruihang Zhang

:
Enhancing IoT Security-Exploring the Application of Blockchain. 259-263 - Chunlong Lin

, Wei Jin
, Xiaobo Ling
, Hongfu Chen
, Mengyu Ruan
, Yeqing Zhang
, Yukun Fang
:
Comparison of Complex Emotion Detection Based on the Basic Emotion Model and the Complex Emotion Model. 264-268 - Lisha Yao

:
Image Encryption Algorithm Based on Henon Chaos Theory. 269-273 - Lisha Yao

, Qiaoqiao Feng
:
Image Style Transfer Based on CycleGAN. 274-278 - Zihan Wang

, Caixiao Ouyang
, Hongyan Li
:
Zero Packet Loss Protection Module Based on IEEE 802.1CB Protocol. 279-283
Chapter 3 - Machine Learning and Intelligent Algorithm Modeling
- Tengxiao Mu

, Yaru Liang
, Lingzhi Liu
:
Classification model based on improved K-means clustering algorithm. 284-288 - Ruihong Dang

:
Construction of Online Teaching Effect Evaluation System Based on Complex Learning Behavior Data Analysis. 289-293 - Zihao Liu

, Yi Zhou
:
Research on SVM intrusion detection algorithm based on improved. 294-297 - Weisong Chen

, Kaixian Zheng
, Jingyun Xu
, Shengkai Lin
, Liju Gan
, Yican Wu
:
Measurement Model of Big Data Leakage Risk Tolerance Based on Extended Bayesian Classification Algorithm. 298-302 - Qigui Yao

, Xiaojian Zhang
, Jiaxuan Fei
, Wen Ji
, Caiwei Guo
:
NFA Regular Expression Matching based Electriuec Power Sensitive Data Recognition Algorithm Design and Simulation. 303-307 - Tong Liu

, Haitao Jiang
, Yu Liu
:
Edge-cloud Collaboration Based Service Deployment and Resource Allocation in Digital Twin 6G network. 308-311 - Shenjin Chen

, Junying Yuan
, Jianxin Zhang
:
Research and application of smart contract technology based on blockchain. 312-319 - Qiao Shen

, Hanming Huang
, Pengfei Wang
:
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing. 320-326 - Tianxiang Liu

, Zhengyi Liu
:
Mirror Detection in Frequency Domain. 327-331 - Nan Wu

, Guozhen Dong
, Wenjuan Xing
, Shizhong Nie
, Yunpeng Xie
:
A Multicast Scheduling Method Based on EVPN-VXLAN Extension in Data Center Networks. 332-336 - Weixi Wu

:
Traffic anomaly detection method based on bidirectional autoencoder generative adversarial network. 337-340 - Panlong Yi

, Gang Lu
, Xiaojun Wu
, Yumei Zhang
:
Problem-guided Neural Math Problem Solvers. 341-345 - Yangquan Zhou

, Liuping Feng
, Lingyi Chi
, Guokai Wang
:
Reversible Data Hiding Algorithm based on Paillier Encryption. 346-350 - Yue Zong

, Han Xu
, Zhaoyang Zhang
:
Deep Deterministic Policy Gradient based Dynamic Virtual Network Embedding Algorithm. 351-355 - Lei Tan

, Jinmao Xu
, Daofu Gong
, Fenlin Liu
:
Recurrent Attentive Neural Networks for Sequential Recommendation. 356-360 - Jiwei Li

, Bo Li
, Shi Liu
, Hongwei Lv
, Fei Chen
, Qing Liu
:
Efficient retrieval of power structured data with global data access view. 361-365 - Baixin Guo

, Jian Li
, Haibin Wang
:
Neural network reliability analysis based on fault injection. 366-370 - Wenhao Zang

, Shuangling Li
, Xutao Yang
:
A dueling DQN-based online resource allocation algorithm for cloud computing. 371-376 - Yanling Li

, Jianwei Zhan
, Hui Zhang
, Dong Wang
:
A Variable Step LMS Algorithm Based on Particle Swarm Optimization. 377-381 - Qi Wang

, Liming Wu
, Wanyi Li
:
Research on Fast Time-Frequency Synchronization Algorithm for NR System. 382-391 - Hongtao Xie

, Yang Wang
, Xin Tian
:
An Online/Offline Power Data Sharing System Based on Blockchain. 392-397 - Yaqi Zhao

, Wei Li
, Huiqing Xu
, Sihe Lu
, Yongcan Zhao
:
Bearing Fault Diagnosis Based on Parallel Convolutional Neural Network with Attention Mechanism and Bidirectional Gated Recurrent Unit. 398-402 - Si Li

, Wei Li
, Huaguang Shi
, Wenhao Yan
, Yi Zhou
:
Fairness-Aware Computation Efficiency Maximization for Multi-UAV-Enabled MEC System. 403-407 - Xiaoer Wang

, Shuang Ding
, Guoqing Zhang
:
MADDPG: A task offloading algorithm based on multi-agent deep reinforcement learning in vehicle-edge computing. 408-413 - Meng He

, Yunli Bai
:
LAL-JER: Label-Aware Learning for Adaptive Joint Entity and Relation Extraction with LLM data augmentation. 414-419 - Hao Zeng

, Jun Lu
:
Sub-regional multi-AGV dynamic path planning method based on improved A* algorithm. 420-424 - Yanyu Zhang

, Yang Wang
, Zihao Guo
, Feixiang Jiao
, Yi Zhou
:
Dynamic Energy-Based Electric Logistics Vehicle Driving Route and V2V Charging Optimization Algorithm. 425-431 - Tongtong Xu

, Guanghui Wang
, Yuanhao Xu
:
DFCL: Domain-adaptive federated clustering learning. 432-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














