default search action
AISNS 2023: Mianyang, China
- Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security, AISNS 2023, Mianyang, China, December 22-24, 2023. ACM 2023
Chapter 1-Artificial Intelligence Algorithm and Intelligent Detection Model
- Boyu Xiao, Shujun Chen, Jiahao Wen, Xudong Liu, Yuchen Wang, Kai Shi, Shuangxi Li:
A 3D CNN Model With 3d CBAM Layer For Micro-Expression Recognition. 1-5 - Ying Ji, Jingyu Huang, Pengcheng Jin:
Classification of BGP Anomalies Using GRU with BGP Update Messages. 6-9 - Ji Qi, Tengfei Bian, Kaixuan Jiao, Xinyu Yin, Kechao Wang:
Moisture prediction with influencing factors analysis of expanded cut tobacco before resurgence. 10-15 - Qiuyang Yan, Ruiran Ding, Ling Lu:
RPnet: A Relation Perception based Entity-relation Extraction Method. 16-22 - Haoruo Zhang, Chengyu Zhong:
Research on Waterway Traffic Volume Prediction Based on Artificial Intelligence. 23-26 - Yuge Song, Zerui He:
Research on the Application of Graph Neural Networks in Financial Asset Valuation. 27-31 - Hanlin Feng, Yao Rao, Mingxiao Yang, Ben Lin:
Global climate mitigation prediction model based on BP neural network. 32-37 - Rongbang Wu, Zhijie Ye, Mo Ni:
Prediction of Word Game Trends and Human Behavior Based on ARIMA and BP Neural Networks. 38-42 - Mengyao Yu, Changhua He, Lijun Shi:
Interactive Genetic Algorithm for Human-Computer Interface Layout Design System. 43-48 - Lina Tao:
Research on Campus Network Public Opinion Early Warning Based on Genetic Algorithm and BP Neural Network. 49-53 - Feng Tian, Yuanyuan Jin, Yuzhi Li:
Traditional Martial Arts Assessmet Based on Graph Convolutional Network. 54-60 - Jinda Wu, Qiang Li:
SMFN: A small target detection method in nylon yarn package images based on neural network. 61-67 - Zhen Wang, Lizhi Liu:
PM2.5 concentration prediction model based on SA-LSTM. 68-71 - Yang Zhao, Feng Chen:
Improvement of Byzantine consensus algorithm based on election model. 72-76 - Zizhong Wei, Dongsheng Guo, Dengrong Huang, Qilai Zhang, Sijia Zhang, Kai Jiang, Rui Li:
Detecting and Mitigating the Ungrounded Hallucinations in Text Generation by LLMs. 77-81 - Kai Jiang, Qilai Zhang, Dongsheng Guo, Dengrong Huang, Sijia Zhang, Zizhong Wei, Fanggang Ning, Rui Li:
AI-Generated News Articles Based on Large Language Models. 82-87 - Yufeng Ye, Guanwu Jiang, Shide Fu:
Surface defect detection of propellant strips based on YOLOv8. 88-92 - Kai Jiang, Tong Yang, Xue Li, Zizhong Wei, Qibin Chen, Qiang Duan, Junzheng Ge, Lei Zhang, Guangxin Wang, Jiahao Shao, Rui Li:
Method for Generalized Structured Information Extraction from Cards Based on Custom Template Matching. 93-98 - Shengnan Li, Chi Zhou, Kaili Wang:
Image-Category Aware Loss for Super-Multiple Category Classification on Chu Bamboo and Silk ancient Chinese characters. 99-104 - Guokai Fu, Xia Peng:
NSCLC whole slide image survival analysis by end to end transformer. 105-109 - Weiwei Zou:
Research and Design of Image White Balance Algorithm Based on FPGA. 110-114 - Zhen Zhen Li, Chi Yan, Shuang Wu, Xin-Qi He:
Research of Hybrid Encryption Algorithm with RSA and improved SM4. 115-118 - Jiying Tian:
Prediction of Employee Turnover Trend in MSMEs Based on Whale Alogorithm Optimized Elman Neural Network. 119-123 - Xiaoyu Zhang, Ligang Chen, Meng Chen, Luozhao Jia:
Analysis of Identification of Seismic Event Properties Based On the permutation entropy of the Variational mode decomposition and support vector machine optimized by pelican optimization algorithm. 124-129 - Wenxin Chen:
Fourier Ptychography Based on a u-net Convolutional Neural Network. 130-134
Chapter 2-Computer Architecture and System Design
- Yanchun Shen, Ximing Qiao, Zhiwang Zhong, Hongyu Sheng:
Study on the Characteristics of Liquid Crystal-based Terahertz Metadevices in Wireless Communication Circuits. 135-140 - Kaiyan Jin, Yanbo Zhu, Youchen Xu, Yongyue Chen:
Evaluation Method and Application of the Civil Aviation Surveillance System Horizontal Position Error for The Performance-Based Surveillance. 141-149 - Weiwei Zhang:
Finite element statics analysis of a tower crane's balancing arm. 150-153 - Ji Qi, Zhanwu Shi, Mingxing Li, Botao Zhang, Yujie Lu:
Radial Basis Function Neural Network-Based Modeling and Application of the Weight Prediction for Expanded Cut Tobacco Before Resurgence. 154-158 - Wei Liu, Chao Yue, Lei Yang, Jirong Tian:
Application practice of code mapping technology in hydropower project construction management system. 159-168 - Xiaohong Wu, Hanrui Sun, Mingming Zhao:
Application Research of Geological Information Metadata System in Big Data Environment. 169-173 - Xiang Nan, Rajamohan Parthasarathy:
Exploration of Cloud Computing Based Data Mining Mobile Intelligent Tourism Guide System. 174-178 - Jia Wei:
Design and Application of Hotel Room Management Information System in a B/S Architecture. 179-182 - Jian Liu, Xianghong Kong, Zhaoxi Wang, Jin'E Zhao:
Design and Implementation of Intelligent Analysis Middle Platform for the Mining Field. 183-188 - Yueming Ding, Rongxi Cu, Zhicai Xiang, Jiayu Xu, Zongfeng Zhang, Wei Wang, Xiaolin Li, Xiaohua An:
Optimization and Application of Multi-source Data-driven Sensing Terminal for Photovoltaic-Energy Storage System. 189-193 - Jiewei Li, Xiaoyun Jian, Jin Xie, Wen Zhang, Dongkai Wu, Jinyao Sun:
Massive Multi-source Heterogeneous Data Platform with EB-level Expansion. 194-200 - Liyun Jia:
Development and Application of Smart Marketing Systems Based on Big Data Technology. 201-205 - Ping He, Jiapeng Shuang:
Technology Bias in the Intelligent Systems. 206-210 - Zhenquan Zhou, Lanxin Wang, Chenxin Tian, Deprizon Syamsunur:
The development of the smart factory during the Industry 4.0 period under the study of system thinking. 211-215 - Lian Chen, Nanxi Zhao, Xinzi Wang:
Research on Emergency Support Mechanism for Coal Transportation Based on Complex Networks. 216-220 - Lei Cao, Qingbin Xu, Chen Chen, Qinggang Wu, Jianping Zhang:
The Architecture of a Comprehensive System for Civil Unmanned Aerial Vehicle Traffic Management in Urban Low-Altitude Airspace. 221-226 - Qingjuan Wang, Ruoyun Hu, Gang Sun, Huan Liu:
Intelligent Retrieval System for Power Policy Documents Based on Semantic Analysis. 227-232 - Xin Tang:
Research on the Design of Financial Management System Based on Cloud Platform. 233-240 - Shuwei Wang, Sigen Song:
Design of an Integrated System for Government Invested Construction Projects. 241-245 - Zhaoyang Cui, Jianwen Ling, Xiongwei Zhang:
Design of Efficient Device Communication Authentication Protocol in Large-scale Internet of Things Scenarios. 246-251 - Shihu Yu, Liuqing Yan:
Research on English Learning System Based on Collaborative Filtering Algorithm. 252-257 - Guotao Cong, Dan Shan, Li Wang:
Design of Dynamic Target Tracking System Based on FPGADynamic Target Tracking System. 258-262 - Li Liu, Zijin Liu, Xuefei Qian:
Construction and Application of Digital Twin Cloud Platform for Rebar Straight Thread Processing Line. 263-276 - Guotao Cong, Sen Wang, Henan Li:
Implementation of Image Watermark Algorithm Based on FPGAImage watermark embedding circuit. 277-282 - Yichen Bao, Lifei Wei, Dezhi Han:
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices. 283-290 - Xiaona Han, Lei Yang:
Research on business collaborative optimization of power grid en-terprises based on data mining algorithm. 291-294 - Huilin Cao, Linchun Tan:
Student education assessment model based on programming cognitive diagnosis. 295-300 - Qi Guo, Jie Zhang, Yuanhong Lu, Liang Tu, Haiping Guo, Hui Luo, Libin Huang:
Construction and verification of a power simulation system middle platform based on domain driven design and microservices. 301-308 - Zhigang Sun, Junmin Wu:
MHInfer: A FPGA-accelerated Inference Library Based on Domestic Embedded Systems. 309-313 - Yufei Tan:
Research on Community Service System based on OneNET Platform. 314-317
Chapter 3-Network Security and Intelligent Management Technology
- Wei Li, Kuang Tian, Wei Wang:
Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry. 318-322 - Taiwei Wang, Yuyang Cheng:
Development and Application of Intelligent Management System for Personnel Safety in Port Area based on Positioning Technology. 323-330 - Yue Zhang, Zifan Zhu, Zhenbo Xu:
"Study on Derived Risks and Its Governances of \"Social Embedding\" of Artificial Intelligence Algorithm". 331-336 - Xixuan Wang, Heyu Zhao, Huixian Deng, Aili Hairula, Xiao Wang, Lijing Guo:
Real-time detection method of edge iot proxy network intrusion based on PSO-ELM. 337-342 - Mingju Sun, Linxu Han, Liang Zhang, Hao Yin, Kai Liao, Jinqiu Hu, Xiaowen Fan:
A study on risk propagation and traceability of gas storage based on complex network. 343-348 - Kaihao Hu, Xiao Zhang, Youfu Jiang:
Wireless Sensor Networks Node Localization Approach Based on The Cuckoo Algorithm. 349-354 - Shuai Liu, Yuanjun Zuo, Zhuo Chen, Wenjing Zhang, Xiaoqing Li:
Non-invasive event monitoring in digital twin system based on random matrix theory and independent sub-vectors. 355-359 - Shiyong Li, Shasha Wu, Xinglin Guo:
Security Risk Assessment Method for Measurement Control Systems Based on Attack Tree Model and Common Vulnerability Scoring System. 360-369 - Quanjiang Shen, Lei Zhang, Chang Liu:
Harmful Information Detection of Web pages with Attentional Deep Neural Networks and Multi-level Feature Fusion. 370-374 - Yaokuan Wen, Yanan Li, Jiewen Li, Ke Xiao, Xin Yang, Ke Zheng:
Research on The Application of Artificial Intelligence Technology in Emergency Repair and Power Restoration of Residential Areas Under Heavy Rain Disaster Weather. 375-379 - Jiwei Li, Xuewei Ding, Yuchen Jiang, Yongqi Ai, Zhen Jia, Xinyi Zhang:
A Database Security Access Control Method Based on Identity Authentication. 380-385 - Ying Lan, Qibin Hu:
Intrusion detection and response of network node attacks based on game theory. 386-390 - Yinlun Xu:
YOLO-ARDD: An improved feature extraction and enhanced single-stage object detection network. 391-395 - Xinghua Li, Xiaolong Li, Feng Wang, Zhenhua Yan, Dongge Zhu:
Security optimization method of key exchange protocol for massive Internet of things terminal equipment. 396-401 - Yadi Zhang, Fuhai Duan, Xinshuai Han:
Reliability analysis of circulating water filtration system in nuclear power plants based on fuzzy GO methodology and Boolean algebra method. 402-408 - Xiaohui Wang, Li Zhao, Jinbao Du, Jingang Liu, Wei Zhang, Baozhan Feng, Hua Chen:
Dynamic Evaluation of Information Security in Self-organizing Network Based on Knowledge Map Driving. 409-414 - Xiongwei Zhang, Jianwen Ling, Muyao Luo:
Research on Authentication Method for Interface Access Security of Communication Equipment in High Coverage Internet of Things. 415-420 - Shuang Gao, Jiawei Gao, Jiashi Zhao:
Feature Perturbations Extend the Space for Automatic Grading of Diabetic Retinopathy. 421-425 - Qian Zhou, Husheng Wu:
Research on Performance Evaluation of UAV Cluster Based on ADC-AHP. 426-430 - Yukun Li, Songyang Wu, Zhiguo Ding, Jiahong Jiang, Kezhu Song:
Personalized Privacy Protection and Security Aggregation Technology for Smart Grid. 431-437 - Xiaoyi Cui, Hequan Han, Xingang Guo:
Embedding Space Reconstruction to Enhance ANN for Industrial Process Fault Diagnosis. 438-442 - Feifei Xu, Cheng Zhang:
A Solution Space Reduction Approach based on Neural Network and Clustering for Large-scale Service Composition. 443-447 - Wenxuan Xu, Zejun Yan, Qijun Zhang, Weifa Zheng:
Research on FIDO Authentication Based on IPv6. 448-451 - Shouan Wei, Zhiheng Zhang:
Application Methods and Practices of Deep Learning in Network Intrusion Detection. 452-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.