The 23rd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP
2023)
Tianjin, China
|
20-22 October 2023
Submission ID | Title | Authors |
---|---|---|
3 | Short Video Account Influence Evaluation Model Based on Improved SF-UIR Algorithm | Xiaojun Guo and Zhihao Wu |
6 | Deep Hash Learning of Feature-Invariant Representation for Single-label and Multi-label Retrieval | Junwei Liu, Xinzheng Shang, Yuan Cao, Chengzhi Qian and Sheng Chen |
7 | Generative Adversarial Network Based Asymmetric Deep Cross-modal Unsupervised Hashing | Na Chen, Yaru Gao, Yuan Cao, Jiacheng Lin and Sheng Chen |
14 | DFECTS: A Deep Fuzzy Ensemble Clusterer for Time Series | Dechong Wu, Jialun Li, Xuan Mo and Weigang Wu |
15 | Energy-aware Smart Task Scheduling in Edge Computing Networks with A3C | Dan Wang, Liang Liu, Binbin Ge, Junjie Qi and Zehui Zhao |
24 | DeepLat: Achieving Minimum Worst Case Latency for DNN Inference with Batch-Aware Dispatching | Jiaheng Gao and Yitao Hu |
25 | Privacy-Preserving and Reliable Distributed Federated Learning | Yipeng Dong, Lei Zhang and Lin Xu |
26 | Joint Optimization of Request Scheduling and Container Prewarming in Serverless Computing | Si Chen, Guanghui Li, Chenglong Dai, Wei Li and Qinglin Zhao |
27 | Multi-Stage Optimization of Incentive Mechanisms for Mobile Crowd Sensing based on Top-Trading Cycles | Jingjie Shang, Haifeng Jiang, Chaogang Tang, Huaming Wu, Shuhao Wang and Shoujun Zhang |
29 | A Chained Forwarding Mechanism for Large Messages | Jiaqi Lin, Tao Feng, Nanxin Zhou, Xianming Gao and Jiang Shanqing |
30 | TDC: Pool-level object cache replacement algorithm based on temperature density | Huacheng Lu, Yong Wang, Junqi Chen, Dahuan Zhang and Zhike Li |
34 | Smart DAG Task Scheduling based on MCTS Method of Multi-Strategy Learning | Lang Shu, Yifei Chen, Fanding Huang, Songchen Li and Yuxia Cheng |
39 | CT-Mixer: Exploiting Multiscale Design for Local-global Representations Learning | Yin Tang, Xili Wan, Xinjie Guan and Aichun Zhu |
41 | FedQL: Q-learning Guided Aggregation for Federated Learning | Mei Cao, Mengying Zhao, Tingting Zhang, Nanxiang Yu and Jianbo Lu |
44 | An Adaptive Instruction Set Encoding Automatic Generation Method for VLIW | Xin Xiao and Zhong Liu |
46 | FastDet: Detecting Encrypted Malicious Traffic Faster via Early Exit | Jiakun Sun, Jintian Lu, Yabo Wang and Shuyuan Jin |
47 | Real-EVE: Real-time Edge-assist Video Enhancement for Joint Denoising and Super-resolution | Liming Ge, Wei Bao, Dong Yuan and Bing Zhou |
48 | Optimizing the Parallelism of Communication and Computation in Distributed Training Platform | Xiang Hou, Yuan Yuan, Sheng Ma, Rui Xu, Bo Wang, Tiejun Li, Wei Jiang, Lizhou Wu and Jianmin Zhang |
49 | FedSC: Compatible Gradient Compression for Communication-Efficient Federated Learning | Xinlei Yu, Zhipeng Gao, Chen Zhao and Zijia Mo |
50 | Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-Party Video Conferencing | Fanhao Kong, Tuo Cao, Zhuzhong Qian, Xiaoliang Wang, Ming Zhao, Liming Wang and Zhenjie Lin |
53 | Performance Comparison of Distributed DNN Training on Optical versus Electrical Interconnect Systems | Fei Dai, Yawen Chen, Zhiyi Huang, Haibo Zhang and Hui Tian |
56 | Dynamic Path Planning Based on Traffic Flow Prediction and Traffic Light Status | Weiyang Chen, Bingyi Liu, Weizhen Han, Gaolei Li and Bin Song |
60 | An optimized SVM Method for Predicting Cluster GPU Utilization | Yang Gao, Bing Gao, Chen Shen and Jun Han |
63 | MSIN: An Efficient Multi-head Self-Attention Framework for Inertial Navigation | Gaotao Shi, Bingjia Pan and Yuzhi Ni |
67 | LearnedSync: A Learning-based Sync Optimization for Cloud Storage | Yuxuan Zhou, Suzhen Wu, Shengzhe Wang, Chufeng Du and Bo Mao |
68 | Optimizing CSR-Based SpMV on a New MIMD Architecture Pezy-SC3s | Jihu Guo, Jie Liu, Qinglin Wang and Xiaoxiong Zhu |
71 | A Multi-Source Domain Adaption Approach to Minority Disk Failure Prediction | Wang Wang, Xuehai Tang, Biyu Zhou, Yangchen Dong, Yuanhang Feng, Jizhong Han and Songlin Hu |
74 | Sequenced Quantization RNN Offloading for Dependency Task in Mobile Edge Computing | Tan Deng, Shixue Li, Xiaoyong Tang, Wenzheng Liu, Ronghui Cao and Yanping Wang |
76 | KylinArm: An Arm Gesture Recognition System for Mobile Devices | Shikun Zhao, Jingxuan Hong, Zixuan Zhang, Xuqiang Wang, Jin Zhang and Xiaoli Gong |
77 | FCSO: Source Code Summarization by Fusing Multiple Code Features and Ensuring Self-consistency Output | Donghua Zhang, Gang Lei, Jianmao Xiao, Zhipeng Xu, Guodong Fan, Yuanlong Cao and Shizhan Chen |
81 | Graph Structure Learning-based Compression Meth-od for Convolutional Neural Networks | Wang Tao, Zheng Xiangwei, Zhang Lifeng and Zhang Yuang |
83 | Reliability-Aware VNF Provisioning in Homogeneous and Heterogeneous Multi-Access Edge Computing | Haolin Liu, Zehang Tan, Zhetao Li, Saiqin Long, Shujuan Tian and Xiaoshan Li |
84 | Approximate Query Processing based on Approximate Materialized View | Yuhan Wu, Haifeng Guo, Donghua Yang, Mengmeng Li, Bo Zheng and Hongzhi Wang |
86 | Schema Integration on Massive Data Sources | Tianbao Li, Haifeng Guo, Donghua Yang, Mengmeng Li, Bo Zheng and Hongzhi Wang |
87 | A Hybrid Few-Shot Learning based Intrusion Detection Method for Internet of vehicles | Yixuan Zhao, Jianming Cui and Ming Liu |
94 | LAST: An Efficient In-Place Static Binary Translator for RISC architectures | Yanzhi Lan, Qi Hu, Gen Niu, Xinyu Li, Liangpu Wang and Fuxin Zhang |
95 | Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks | Hongyun Cai, Ao Zhao, Shiyun Wang, Meiling Zhang and Yu Zhang |
96 | A Pipelined AES and SM4 Hardware Implementation for Multi-Tasking Virtualized Environments | Yukang Xie, Hang Tu, Qin Liu and Changrong Chen |
97 | Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems | Wenyu Xiang, Jie Zhao, Hejiao Huang, Xiaojun Zhang, Zoe Lin Jiang and Daojing He |
102 | Multi-Self-Supervised Light Graph Convolution Network for Social Recommendation | Yunsheng Zhou, Yinying Zhou and Dunhui Yu |
103 | AIFR: Face Recognition Research Based on Age Factor Characteristics | Biaokai Zhu, Zhaojie Zhang, Yupeng Jia, Xinru Hu, Yurong Shen, Manwen Bai, Jie Song, Ping Li, Sanman Liu, Feng Li and Deng-Ao Li |
104 | MANet: An Architecture Adaptive Method for Sparse Matrix Format Selection | Zheng Lun Sun, Peng Qiao and Yong Dou |
105 | Service-Aware Cooperative Task Offloading and Scheduling in Multi-Access Edge Computing Empowered IoT | Zhiyan Chen, Ming Tao, Xueqiang Li and Ligang He |
109 | A Heuristic Method for Data Allocation and Task Scheduling on Heterogeneous Multiprocessor Systems under Memory Constraints | Junwen Ding, Liangcai Song, Siyuan Li, Chen Wu, Ronghua He, Zhouxing Su and Zhipeng Lü |
112 | Label-only Membership Inference Attack Against Federated Distillation | Xi Wang, Yanchao Zhao, Jiale Zhang and Bing Chen |
114 | Efficient proactive resource allocation for multi-stage cloud-native microservices | Pengfei Liao, Xingzhen He, Fanding Huang, Yifei Chen and Yuxia Cheng |
116 | Reliable Function Computation Offloading in Cloud-edge Collaborative Network | Shaonan Li, Yongqiang Xie, Zhongbo Li, Jin Qi and Yumeng Tian |
117 | A Fast, Reliable, Adaptive Multi-hop Broadcast Scheme for Vehicular Ad Hoc Networks | Ping Liu, Xingfu Wang, Ammar Hawbani, Bei Hua and Liang Zhao |
119 | A Grouping-Based Multi-Task Scheduling Strategy with Deadline Constraint on Heterogeneous Edge Computing | Xiaoyong Tang, Wenbiao Cao and Tan Deng |
121 | Real-time Driver Fatigue Detection Method Based on Comprehensive Facial Features | Yihua Zheng, Shuhong Chen, Jianming Wu, Kairen Chen, Tian Wang and Tao Peng |
123 | Addressing Coupled Constrained Reinforcement Learning via Interation Iteration Design | Wei Huang and Shichao Zhang |
125 | A Path Planning and Obstacle Avoidance Method for USV based on Dynamic-Target APF Algorithm in Edge | Di Wang, Haiming Chen and Cangchen Wu |
126 | Node-Disjoint Paths in Balanced Hypercubes with Application to Fault-Tolerant Routing | Shuai Liu, Yan Wang, Jianxi Fan and Baolei Cheng |
127 | Performance Evaluation of Spark, Ray and MPI: A Case Study on Long Read Alignment Algorithm | Kun Ran, Zihang Wang, Yingbo Cui, Shaoliang Peng and Xiangke Liao |
141 | Segmenta: Pipelined BFT Consensus with Slicing Broadcast | Xiang Li, Liang Cai, Weiwei Qiu, Fanglei Huang and Zhigang Lei |
142 | Synthetic Data Generation for Differential Privacy Using Maximum Weight Matching | Miao Zhang, Xinxin Ye and Hai Deng |
146 | Approximate Multicast Coflow Scheduling in Reconfigurable Data Center Networks | Yuhang Wu, Quan Chen, Jianglong Liu, Fulong Li and Lianglun Cheng |
148 | DAS: a DRAM-based Annealing System for Solving Large-Scale Combinatorial Optimization Problems | Wenya Deng, Zhi Wang, Yang Guo, Jian Zhang, Zhenyu Wu and Yaohua Wang |
151 | Spatio-temporal Fusion based Low-loss Video Compression Algorithm for UAVs with Limited Processing Capability | Qianyuan Zhang, Desheng Wan, Hao Chen, Lianghua Cheng, Jiayi Chen and Chaocan Xiang |
153 | CRAFT: Common Router Architecture For Throughput Optimization | Jiahua Yan, Mingyu Wang, Yao Qin and Zhiyi Yu |
155 | A Cross-Chain System Supports Verifiable Complete Data Provenance Queries | Jingyi Tian, Enyuan Zhou, Yang Xiao and Qingqi Pei |
158 | Enabling Traffic-differentiated Load Balancing for Datacenter Networks | Jinbin Hu, Ying Liu, Shuying Rao, Jing Wang and Dengyong Zhang |
159 | Deep Reinforcement Learning based Load Balancing for Heterogeneous Traffic in Datacenter Networks | Jinbin Hu, Wangqing Luo, Yi He, Jing Wang and Dengyong Zhang |
160 | Adaptive Routing for Datacenter Networks Using Ant Colony Optimization | Jinbin Hu, Man He, Shuying Rao, Yue Wang, Jing Wang and Shiming He |
163 | HAECN: Hierarchical Automatic ECN Tuning with Ultra-low Overhead in Datacenter Networks | Jinbin Hu, Youyang Wang, Zikai Zhou, Shuying Rao, Rundong Xin, Jing Wang and Shiming He |
166 | An Android Malware Detection Method based on Metapath Aggregated Graph Neural Network | Qingru Li, Yufei Zhang, Fangwei Wang and Changguang Wang |
168 | A Joint Resource Allocation and Task Offloading Algorithm in Satellite Edge Computing | Zhuoer Chen, Deyu Zhang, Weijun Cai, Wei Luo and Yin Tang |
176 | gGMED: Towards GPU Accelerated Geometric Modeling Evaluation and Derivative Processes | Zhibo Xuan, Hailong Yang, Pengbo Wang, Xin Sun, Jiwei Hao, Zhongzhi Luan and Depei Qian |
189 | Efficient Respiration Rate Estimation Based on MIMO mmWave Radar | Zhicheng Xu, Ling Deng, Biyun Sheng, Linqing Gui and Fu Xiao |
191 | Running serverless function on resource fragments in data center | Wenhao Huang, Yukang Chu and Laiping Zhao |
202 | CSDSE: Apply Cooperative Search to Solve the Exploration-Exploitation Dilemma of Design Space Exploration | Kaijie Feng, Xiaoya Fan, Jianfeng An, Haoyang Wang and Chuxi Li |
204 | Differential Privacy in Federated Dynamic Gradient Clipping Based on Gradient Norm | Yingchi Mao, Chenxin Li, Zibo Wang, Zijian Tu and Ping Ping |
206 | SolGPT: a GPT-Based Static Vulnerability Detection model for enhancing Smart Contract Security | Shengqiang Zeng, Hongwei Zhang, Jinsong Wang and Kai Shi |
210 | Neuron Pruning-Based Federated Learning For Communication-Efficient distributed Training | Jianfeng Guan, Pengcheng Wang, Su Yao and Jing Zhang |
211 | A Novel Network Topology Sensing Method for Network Security Situation Awareness | Yixuan Wang, Bo Zhao, Zhonghao Sun, Zhihui Huo, Xueying Li, Yabiao Wu and Jiao Li |
212 | Distributed Task Offloading Method Based on Federated Reinforcement Learning in Vehicular Networks with Incomplete Information | Rui Cao, Zhengchang Song, Bingxin Niu, Junhua Gu and Chunjie Li |
218 | CAST: An Intricate-Scene Aware Adaptive Bitrate Approach for Video Streaming via Parallel Training | Weihe Li, Jiawei Huang, Yu Liang, Jingling Liu, Wenlu Zhang, Wenjun Lyu and Jianxin Wang |
221 | We Will Find You: An Edge-based Multi-UAV Multi-Recipient Identification Method in Smart Delivery Services | Yi Xu, Ruyi Guo, Jonathan Kua, Haoyu Luo, Zheng Zhang and Xiao Liu |
223 | Multi-objective Optimization for Joint Handover Decision and Computation Offloading in Integrated Communications and Computing 6G Networks | Dong-Fang Wu, Chuanhe Huang, Yabo Yin, Shidong Huang and Hui Gong |
225 | A Joint Optimization Scheme in Heterogeneous UAV-Assisted MEC | Tian Qin, Pengfei Wang and Qiang Zhang |
226 | Multi-UAV Collaborative Face Recognition for Goods Receiver in Edge-based Smart Delivery Services | Yi Xu, Fengguang Luan, Jonathan Kua, Zhipeng Wang and Xiao Liu |
229 | A Novel Transaction Processing Model for Sharded Blockchain | Xiang Ying, Wei Luo and Jianrong Wang |
235 | Privacy-aware Scheduling Heuristic Based on Priority in Edge Environment | Yue Hong, Caie Wang and Wei Zheng |
241 | Eco-SLAM: Resource-Efficient Edge-Assisted Collaborative Visual SLAM System | Wenzhong Ou, Daipeng Feng, Ke Luo and Xu Chen |
242 | PowerDis: Fine-grained Power Monitoring Through Power Disaggregation Model | Xinxin Qi, Juan Chen, Rongyu Deng, Zekai Li and Yonggang Che |
247 | Intelligent Collaborative Control of Multi-Source Heterogeneous Data Streams for Low-Power IoT: A Flow Machine Learning Approach | Haisheng Yu, Rajesh Kumar, Wenyong Wang, Ji Zhang, Zhifeng Liu, Sai Zou and Jiangchuan Yang |
257 | Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing | Wei Jiang, Jin Wang, Lingzhi Li, Dongyang Yu and Can Liu |
259 | RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain | Dongyang Yu, Jin Wang, Lingzhi Li, Wei Jiang and Can Liu |
261 | GLAM-SERP: Building a Graph Learning-Assisted Model for Soft Error Resilience Prediction in GPGPUs | Xiaohui Wei, Jianpeng Zhao, Nan Jiang and Hengshan Yue |
266 | THRCache: DRAM-NVM Multi-level Cache with Thresholded Heterogeneous Random Choices | Tao Tao, Zhiwen Xiao, Jibin Wang, Jing Shang and Zhihui Wu |
267 | AptTE: Efficient Multi-tunnel Flow Scheduling for Traffic Engineering | Renhai Xu, Wenxin Li and Keqiu Li |
270 | EQFF: An Efficient Query Method Using Feature Fingerprints | Xiaolei Zhou, Yuelin Hua, Shan Huang, Qiang Fan, Hao Yan and Shuai Wang |
276 | Joint Controller Placement and Flow Assignment in Software-Defined Edge Networks | Shunpeng Hua, Baoliu Ye, Yue Zeng, Zhihao Qu and Bin Tang |
277 | Distributed Latency-Efficient Beaconing for Multi-Channel Asynchronous Duty-Cycled IoT Networks | Peng Long, Yuhang Wu, Quan Chen, Lianglun Cheng and Yongchao Tao |
278 | Improved Task Allocation in Mobile Crowd Sensing based on Mobility Prediction and Multi-Objective Optimization | Zhidong Xie, Wei You, Tao Peng and Guojun Wang |
279 | SMCoEdge: Simultaneous Multi-Server Offloading for Collaborative Mobile Edge Computing | Changfu Xu, Yupeng Li, Xiaowen Chu, Haodong Zou, Weijia Jia and Tian Wang |
281 | Image Inpainting Forensics Algorithm Based on Dual-Domain Encoder-Decoder Network | Dengyong Zhang, En Tan, Feng Li, Shuai Liu, Jinbin Hu and Jing Wang |
283 | FRAIM: A Feature Importance-Aware Incentive Mechanism for Vertical Federated Learning | Lei Tan, Yunchao Yang, Miao Hu, Yipeng Zhou and Di Wu |
306 | Black-box Graph Backdoor Defense | Xiao Yang, Gaolei Li, Xiaoyi Tao, Chaofeng Zhang and Jianhua Li |
307 | DRL-based optimization algorithm for wireless powered IoT network | Mingjie Zhu, Shubin Zhang and Kaikai Chi |
308 | Efficiently Running SpMV on Multi-Core DSPs for Banded Matrix | Deshun Bi, Shengguo Li, Dezun Dong, Yichen Zhang and Xiaojian Yang |
309 | SR-KGELS: Social Recommendation Based on Knowledge Graph Embedding Method and Long-Short-Term Representation | Xuechang Zhao and Qing Yu |
310 | CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning | Liu Wanyi, Zhang Shigeng, Wang Weiping and Zhang Jian |
312 | Efficient Black-box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems | Fangwei Wang, Ruixin Song, Qingru Li and Changguang Wang |
314 | SW-LeNet: Implementation and Optimization of LeNet-1 Algorithm on Sunway Bluelight II Supercomputer | Zenghui Ren, Tao Liu, Zhaoyuan Liu, Min Tian, Ying Guo and Jingshan Pan |
316 | Multi-label Detection Method for Smart Contract Vulnerabilities based on Expert Knowledge and Pre-training Technology | Chi Jiang, Guojin Sun, Jinqing Shen, Binglei Yue and Yin Zhang |
337 | Explaining Federated Learning through Concepts in Image Classification | Jiaxin Shen, Xiaoyi Tao, Liangzhi Li, Zhiyang Li and Bowen Wang |
338 | FEAML: A Mobile Traffic Classification System with Feature Expansion and Autonomous Machine Learning | Qing Yang, Xiangyu Kong, Yilei Xiao, Yue Lin, Rui Wen and Heng Qi |
363 | SW-TRRM: Parallel Optimization Research of The Random Ray Method Based on Sunway Bluelight II Supercomputer | Zenghui Ren, Tao Liu, Zhaoyuan Liu, Ying Guo, Jingshan Pan, Dawei Zhao, Xiaoming Wu and Meihong Yang |
401 | Log Anomaly Detection Based on Semantic Features and Topic Features | Peipeng Wang, Xiuguo Zhang and Zhiying Cao |
405 | Popularity Cuckoo Filter: Always Keeping Popular Items in Mind | Cheng Xuetan, Luo Lailong and Zou Wei |
406 | Solving Client Dropout in Federated Learning via Client Similarity Discovery and Gradient Supplementation Mechanism | Maoxuan Yan, Qingcai Luo, Bo Zhang and Shanbao Sun |
410 | A KPIs-based Reliability Measuring Method for Service System | Shuwei Yan, Zhiying Cao, Xiuguo Zhang, Peipeng Wang and Zhiwei Chen |
413 | An Uncertainty-aware Auction Mechanism for Federated Learning | Jiali Xu, Bin Tang, Hengrui Cui and Baoliu Ye |
416 | Persistent Sketch: A Memory-efficient and Robust Algorithm for Finding Top-k Persistent Flows | Ziqi Sun, Yue Sun, Yang Du, Jia Liu and He Huang |
418 | FaCa: Fast Aware and Competition-Avoided Balancing for Data Center Network | Haiyang Jiang, Yuchao Zhang, Haoqiang Huang, Lei Wang, Xirong Que, Zhuo Jiang and Wendong Wang |
419 | Optimizing GNN Inference Processing on Very Long Vector Processor | Kangkang Chen, Huayou Su and Chaorun Liu |
423 | GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System | Lixiao Gong, Guangquan Xu, Jingyi Cui, Xiao Wang, Shihui Fu, Xi Zheng and Shaoying Liu |
424 | Privacy-enhanced Dynamic Symmetric Searchable Encryption with Efficient Searches Under Sparse Keywords | Lingyun Cao and Xiang Li |
427 | CBA Sketch: A Sketching Algorithm Mining Persistent Batches in Data Streams | Qian Zhou, Yu-E Sun, He Huang and Yifan Han |
432 | Joint optimization of system bandwidth and transmitting power in space-air-ground integrated mobile edge computing | Yuan Qiu, Jianwei Niu, Yiming Yao, Yuxuan Zhao, Tao Ren, Xinzhong Zhu and Kuntuo Zhu |
433 | A Novel Sensor Method for Dietary Detection | Long Tan, Shuang Xu, Dengao Li, Xiuzhen Guo and Shufeng Hao |
434 | Accelerated Optimization for Simulation of Brian Spiking Neural Network on GPGPUs | Fangzhou Zhang, Mingyue Cui, Jiakang Zhang, Yehua Ling, Han Liu and Kai Huang |
436 | MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree | Xingfei Yao, Zhaoyan Shen, Xiaojun Cai, Taotao Xie and Xiaowei Chen |
437 | A game theory based task offloading scheme for maximizing social welfare in edge computing | Sheng Chen, Yang Liu, Baochao Chen, Tu Hong, Renrui Tan and Xiaoyi Tao |
441 | Distributed Task Offloading for IoAV Using DDP-DQN | Xiting Peng, Wenjie Li, Xiaoyu Zhang, Mianxiong Dong, Kaoru Ota and Shun Song |
443 | Multi-agent Cooperative Intrusion Detection based on Generative Data Augmentation | Ming Liu, Yungang Jia, Chao Li, Peiguo Fu and Zhen Zhang |
444 | Long Short-Term Deterministic Policy Gradient for Joint Optimization of Computational Offloading and Resource Allocation in MEC | Xiang Lei, Qiang Li, Bo Peng, Yu Zhu Zhou, Cheng Chen and Shi Lin Peng |
445 | Query Optimization Mechanism for Blockchain-Based Efficient Data Traceability | Xu Yuan, Fangbo Li, Muhammad Zeeshan Haider, Feng Ding, Ange Qi and Shuo Yu |
448 | Task Offloading in UAV-Assisted Vehicular Edge Computing Networks | Wanjun Zhang, Aimin Wang, Long He, Zemin Sun, Jiahui Li and Geng Sun |
451 | Data Augmentation Method Based on Partial Noise Diffusion Strategy for One-Class Defect Detection Task | Weiwen Chen, Yong Zhang and Wenlong Ke |
452 | K Asynchronous Federated Learning with Cosine Similarity Based Aggregation on Non-IID Data | Shan Wu, Yizhi Zhou, Xuesong Gao and Heng Qi |
459 | An Efficient Scheduling Algorithm for Multi-mode Tasks on Near-data Processing SSDs | Guo Li, Xianzhang Chen, Duo Liu, Jiali Li, Yujuan Tan and Ao Ren |
460 | HR-kESP: A Heuristic Algorithm for Robustness-Oriented k Edge Server Placement | Haiquan Hu, Jifu Chen and Chengying Mao |
461 | A Hybrid Kernel Pruning Approach for Efficient and Accurate CNNs | Xiao Yi, Bo Wang, Shengbai Luo, Tiejun Li, Lizhou Wu, Jianmin Zhang, Kenli Li and Sheng Ma |
466 | A Graph Generation Network with Privacy Preserving Capabilities | Yangyong Miao, Xiaoding Wang and Hui Lin |
468 | Clustered Federated Learning Framework with Acceleration Based on Data Similarity | Zhipeng Gao, Zijian Xiong, Chen Zhao and Futeng Feng |
471 | An Anonymous Authentication Scheme with Low Overhead for Cross-Domain IoT | Long Fan, Jianfeng Guan, Kexian Liu and Pengcheng Wang |
472 | Petal Algorithm based on Wireless Sensor Networks for UAV-Assisted Data Collection and Transmission | Xueqiang Li, Ming Tao and Shuling Yang |
473 | DeletePop: A DLT Execution Time Predictor Based on Comprehensive Modeling | Yongzhe He, Yueyuan Zhou, En Shao, Guangming Tan and Ninghui Sun |
474 | CFChain: A crowdfunding platform that supports identity authentication, privacy protection, and efficient audit | Yueyue He, Koji Inoue and Jiageng Chen |
475 | TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System | Zheng Zhang, Huabin Wang, Aiting Yao, Xuejun Li, Frank Jiang, Jia Xu and Xiao Liu |
477 | Attention Enhanced Package Pick-up Time Prediction via Heterogeneous Behavior Modeling | Baoshen Guo, Weijian Zuo, Shuai Wang, Xiaolei Zhou and Tian He |
478 | Optimizing Pointwise Convolutions on Multi-Core DSPs | Yang Wang, Qinglin Wang, Xiangdong Pei, Songzhu Mei and Jie Liu |
479 | Detecting SDCs in GPGPUs Through Efficient Partial Thread Redundancy | Xiaohui Wei, Yan Wu, Nan Jiang and Hengshan Yue |
489 | An Efficient Fault Tolerance Strategy for Multi-task MapReduce Models Using Coded Distributed Computing | Zaipeng Xie, Jianan Zhang, Yida Zhang, Chenghong Xu, Peng Chen, Zhihao Qu and Wenzhan Song |
492 | Key-Based Transaction Reordering: An Optimized Approach for Concurrency Control in Hyperledger Fabric | Haoliang Ma, Peichang Shi, Xiang Fu and Guodong Yi |