


default search action
10th CBD 2022: Guilin, China
- Tenth International Conference on Advanced Cloud and Big Data, CBD 2022, Guilin, China, November 4-5, 2022. IEEE 2022, ISBN 979-8-3503-0971-3

- Lin Shen, Mengyang Liu, Caishan Weng, Jinghui Zhang, Fang Dong, Fa Zheng:

ColorByte: A real time MOT method using fast appearance feature based on ByteTrack. 1-6 - Jingtao Xue, Chunyu Wu, Bin Zhao, Ying Hu:

Collective Spatial Keyword Query on Time Dependent Road Networks. 7-12 - Jining Chen, Weitu Chong, Siyu Yu

, Zhun Xu, Chaohong Tan, Ningjiang Chen:
TCN-based Lightweight Log Anomaly Detection in Cloud-edge Collaborative Environment. 13-18 - Jingwu Wang, Weijun Wang, Haipeng Dai

, Lanlan Li, Guihai Chen:
PEACE: Towards Optimizing Monitoring Utility of Unmanned Aerial Vehicles with Adverse Effect Constraints. 13-18 - Xiaomin Liu, Xiaolan Xie, Qiang Guo:

Research on Cloud Computing load forecasting based on LSTM-ARIMA combined model. 19-23 - Jiaren Yu, Shan Huang

, Guoyuan Yuan, Dezun Dong:
Reservoir: Enhance the Burst-flow Tolerance in Datacenter Networks. 24-29 - Yazeed AlZahrani

, Jun Shen
, Jun Yan
:
Multi-Layer Efficient Data Classification Methods for Enterprise Business Applications. 30-35 - Lijuan Shen, Yingchi Mao, Zibo Wang, Hua Nie, Jianxin Huang:

DNN Training Optimization with Pipelined Parallel Based on Feature Maps Encoding. 36-41 - Jiaang Bao, Chao Yang, Nu Xia, Dian Shen:

Long-Term Workload Forecasting in Grid Cloud using Deep Ensemble Model. 42-47 - Ying Yuan, Yichen Yang, Cong Wang:

Virtual Network Embedding with Virtual Nodes Ranking and Multi Points Sampling. 48-53 - Qiliang Zhu, Yaoqin Zhu, Jin Sun, Zebin Wu

:
A Spark-Based Parallel Implementation of Compressed Hyperspectral Image Reconstruction and Anomaly Detection. 54-59 - Zhe Chen, Hangyu Shao, Yuping Li, Hongru Lu, Jiahui Jin:

Policy-Based Access Control System for Delta Lake. 60-65 - Changjiang Cui, Yifei Lu, Shuren Li, Jingqi Li, Zeqi Ruan:

DASH+: Download Multiple Video Segments with Stream Multiplexing of QUIC. 66-72 - Ruoxi Sun, Jun Yan

, Fenghui Ren:
A Knowledge Graph-based Interactive Recommender System Using Reinforcement Learning. 73-78 - Zhen Wu

, Jingya Zhou, Jie Wang, Xigang Sun:
Wb-MSF: A Large-scale Multi-source Information Diffusion Dataset for Social Information Diffusion Prediction. 79-84 - Xiao Zheng, Qiuyue Zhang, Xuan Tang, Xiujun Wang, Chunlai Du:

Efficient Online and Privacy-preserving Medical Pre-diagnosis Based on Growing Learning Vector Quantization. 85-90 - Chengyu Du, Xiaoxuan Gou, Yuxiang Wang, Xiaoliang Xu:

Efficient and Effective Expert Finding based on Community Search: A Demonstration. 91-97 - Jingyu Yang, Liang Zhao, Jianwu Dang, Yangping Wang, Biao Yue, Zongliang Gu:

A Semantic Segmentation Method for High-resolution Remote Sensing Images Based on Encoder-Decoder. 98-103 - Xiang Li, Zhuoming Xu

, Qi Xu, Yan Tang:
Unsupervised Semantic Segmentation with Feature Enhancement for Few-shot Image Classification. 104-109 - Hailan Wang, Xiaolan Xie, Jili Chen, Yarong Liu:

Weighted Fuzzy Clustering Algorithm Based on Max-Min Distance Criterion and Jeffrey Divergence. 110-115 - Xiaoqian Zeng, Qin Qin, Chao Tan, Genlin Ji:

Label Enhancement with Sample Correlation via Sparse Representation. 116-121 - Zhe Zhang, Yuhao Chen, Huixue Wang, Yunzhe Wang, Qiming Fu, You Lu:

A Multivariate Time Series Anomaly Detection Model Based on Graph Attention Mechanism in Energy Consumption of Intelligent Buildings. 122-127 - Yuqun Wu, Yongzhong Li, Bo Xu:

A Personalized Scenic Spot Recommendation Algorithm Based on Improved TrustSVD Model. 128-132 - Xiaofang Mu, Zhenyu Liu, Jiaji Liu

, Hao Li, Yue Li, Yikun Li:
DC3D: A Video Action Recognition Network Based on Dense Connection. 133-138 - Zhuo Zhang, Haifu Guo, Sheng Ren, Kehua Guo:

Learning Inter-Frame Information for Space-Time Video Super-Resolution. 139-144 - Hui Lv, Fenfang Li, Yatao Liang, La Duo, Jun Shen

, Yan Li, Qingguo Zhou:
Text classification based on machine learning for Tibetan social network. 145-150 - Rui Zhu, Xiaoqing Wu, Yanna Hu, Yize Chen, Bo Liu

:
OEIS: Knowledge Graph based Intelligent Search System in Ocean Engineering. 151-156 - Dongbo Li, Xiangyu Liu, Yuxuan Shao, Yuchen Sun, Siyao Cheng, Jie Liu:

Autoencoder-based OFDM for Agricultural Image Transmission. 157-162 - Peng Yuan, Qiuxia Chen, Zhifeng Wang, Jinfeng Yang:

Personalized tourism recommendation algorithm integrating tag and emotional polarity analysis. 163-168 - Peiying Wu, Xiaohui Li, Junfeng Wang:

A Customized Protocol Cluster Analysis Method based on Reinforcement Learning. 169-177 - Tian Tian, Jianchao Jia, Ran Jia, Shenggang Yan:

A Batching Method For Complex Emitters Based On Frequency Agility Pattern Mining. 178-183 - Qian Huang, Jie Ma, Zhou Xu, Xiaodan Gu, Ming Yang:

A Staging Prediction Model for COVID-19 Pandemic Under Strong Public Health Interventions. 184-189 - Ming Li, Xingwang Han, Hua Sheng, Lin Ma, Hanzhang Kong, Weite Liu, Bo Mao:

A Novel RNN Model with Enhanced Behavior Semantic for Network User Profile. 190-193 - Zhigeng Han, Yuanzhe Fan, Geng Chen, Ting Zhou:

TeCNTS: A Robust Collaborative Filtering Recommendation Scheme Based on Time-effective Close Neighbor Trusted Selection Strategy. 194-199 - Weiwei Wang, Liting Wei, Yun Li, Yi Zhu, Bin Li, Lejun Zhang:

Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept Recommendation. 200-205 - Shang WanXin, Tao Wu, Yang Fei, Xi Chen, Jingjue Chen, Zhenxia Yu:

CUDA Acceleration of Worst-Case Execution Time Analysis Based On Model Checking. 206-211 - Yihang Song, Li Lu, Jiqing Gu, Chong Zhang:

Realizing Power-efficient Encryption Communication for Computational RFID Tags. 212-218 - Yaqiong Guo, Peng Zhou, Xin Lu, Wangshu Sun, Jiasai Sun:

A Fuzzy Multi-Identity Based Signature. 219-223 - Yansheng Qu, Hua Huang, Lin Chen, Lina Zhao, Yuxiang Zhao, Jie Zhang, Bo Mao:

Semantic Integration based User Behavior Monitoring Framework in Zero Trust Network. 224-227 - Penghui Su, Yan Gao, Ming Chen:

A Novel Firewalls ConFigure Fault and Its Repair Method. 228-233 - Tamara Abdulmunim Abduljabbar, Xiaohui Tao, Ji Zhang, Jianming Yong

, Xujuan Zhou:
Decentralized Blockchain Network. 234-239 - Danish Khan, Xujuan Zhou, Jianming Yong:

The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks. 240-245 - Zhe Li, Xiao Jing, Shanshan Cao, Tianfan Zhang, Zhiang Wu:

Detecting Key Offenders from Crime Incidents via Attributed Heterogeneous Network Learning. 246-251 - Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong:

Space-efficient logging for Supply Chain Traceability based on blockchain. 252-257 - Yaogang Ge, Xiaomeng Shen, Bingfeng Xu, Gaofeng He:

A Hybrid Attack Graph Analysis Method based on Model Checking. 258-263 - Guanjun Zhao, Lizhong Jia, Jie Xu, Chang Liu, Weijun Hu, Chunpei Li:

Scheme of Peer-to-Peer Trade in Multi-Microgrid Based on Blockchain. 264-269 - Junjie Zhao, Bingfeng Xu, Xinkai Chen, Bo Wang, Gaofeng He:

Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysML. 270-275 - Jing Wen, Chaohong Tan, Jining Chen, Qin Zhao, Sen Li, Fei Zhou:

The Application of RNN-based API Data Security Detection in Government Cloud Service. 276-281 - Zehua Nie, Can Su, Yichen Mao, Kaigui Bian:

IoTPass: IoT Data Management System for Processing Time-series Data. 288-293 - Ziwen Sheng, Yingchi Mao, Jiajun Wang, Hua Nie, Jianxin Huang:

Request-Aware Task Offloading in Mobile Edge Computing via Deep Reinforcement Learning. 294-299 - Chenyu Lu, Zhaowu Huang, Caishan Weng, Feng Jiao, Xiaolin Guo, Fang Dong:

A Kubernetes-Oriented Edge Network Orchestrator for Heterogeneous Environment. 300-305 - Jianwei Liu, Guozheng Yang, Cheng Zang, Jiajun Chen, Xianming Hu, Jingzhi Zhang, Yinghui He, Jinsong Han, Kui Ren:

Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic. 306-311 - Yuhao Chen, Yunzhe Wang, Zhe Zhang, Qiming Fu, Huixue Wang, You Lu:

Deep Reinforcement Learning for Task Scheduling in Intelligent Building Edge Network. 312-317 - Naixuan Guo, Zhaofeng Chen

, Heyang Xu, Zhechun Zhao, Yu Liu, Sen Xu:
WMLink: Wearable Smart Devices and Mobile Phones Linking through Passive Sniffing BLE and WiFi Signals. 318-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














