KI-HABS : key information guided hierarchical abstractive summarization
|
Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu
|
p. 4275-4291
|
|
|
|
(An) improved vibe algorithm of moving target extraction for night infrared surveillance video
|
Zhiqiang Feng, Xiaogang Wang, Zhongfan Yang, Shaojie Guo, Xingzhong Xiong
|
p. 4292-4307
|
|
|
|
Study on machine learning techniques for malware classification and detection
|
Jaewoong Moon, Subin Kim, Jaeseung Song, Kyungshin Kim
|
p. 4308-4325
|
|
|
|
Generative adversarial networks for single image with high quality image
|
Liquan Zhao, Yupeng Zhang
|
p. 4326-4344
|
|
|
|
Privacy-preserving and communication-efficient convolutional neural network prediction framework in mobile cloud computing
|
Yanan Bai, Yong Feng, Wenyuan Wu
|
p. 4345-4363
|
|
|
|
(An) efficient service function chains orchestration algorithm for mobile edge computing
|
Xiulei Wang, Bo Xu, Fenglin Jin
|
p. 4364-4384
|
|
|
|
(A) learning-based power control scheme for edge-based ehealth IoT systems
|
Haoru Su, Xiaoming Yuan, Yujie Tang, Rui Tian, Enchang Sun, Hairong Yan
|
p. 4385-4399
|
|
|
|
Design and implementation of a personal health record platform based on patient-consent blockchain technology
|
Heongkyun Kim, Sang Min Lee, Hyunwoo Kwon, Eunmin Kim
|
p. 4400-4419
|
|
|
|
Lightweight multiple scale-patch dehazing network for real-world hazy image
|
Juan Wang, Chang Ding, Minghu Wu, Yuanyuan Liu, Guanhai Chen
|
p. 4420-4438
|
|
|
|
Dual attention based image pyramid network for object detection
|
Xiang Dong, Feng Liu, Huihui Bai, Yao Zhao
|
p. 4439-4455
|
|
|
|
(A) new framework for person re-identification : integrated level feature pattern (ILEP)
|
V.Manimaran, K.G.Srinivasagan, S.Gokul, I.Jeena Jacob, S.Baburenagarajan
|
p. 4456-4475
|
|
|
|
(A) multi-category task for bitrate interval prediction with the target perceptual quality
|
Zhenwei Yang, Liquan Shen
|
p. 4476-4491
|
|
|
|
Sensor density for full-view problem in heterogeneous deployed camera sensor networks
|
Zhimin Liu, Guiyan Jiang
|
p. 4492-4507
|
|
|
|
Randomized block size (RBS) model for secure data storage in distributed server
|
Keshav Sinha, Partha Paul, Amritanjali
|
p. 4508-4530
|
|
|
|
(A) quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data
|
Weiwei Lin, Chaofan Yang, Zeqing Zhang, Xingsi Xue, Reiko Haga
|
p. 4531-4544
|
|
|
|
(A) distributed fog-based access control architecture for IoT
|
Seham Alnefaie, Asma Cherif, Suhair Alshehri
|
p. 4545-4566
|
|
|
|
Analytical approximation algorithm for the inverse of the power of the incomplete gamma function based on extreme value theory
|
Shanshan Wu, Guobing Hu, Li Yang, Bin Gu
|
p. 4567-4583
|
|
|
|
ODPM channel estimation method using multiple MRC and new reliability test in IEEE 802.11p systems with receive diversity
|
Sungmook Lim, Gihoon Ryu, Kyunbyoung Ko
|
p. 4584-4599
|
|
|
|
Advanced energy detector with correlated multiple antennas
|
Sungtae Kim, Sungmook Lim
|
p. 4600-4616
|
|
|
|
Spatial reuse in IEEE 802.11ax : whether and how to use in practice
|
Deqing Zhu, Shenji Luan
|
p. 4617-4632
|
|
|
|