Accepted Paper List
List of Accepted Papers in GPC2024&ICPCSEE2024
Authors | Paper Title |
---|---|
Shi Cheng, Zhiqiang Chen1, Xuanyi Zong and Zelin Wang | Code recommendation of embedded network based on intention analysis |
Wenbin Jiang, Fanxing Pan, Rui Wu, Xinhai Shen, Dongao He and Hai Jin | Accelerating Large-Scale GNN by Combining k-Hop Neighbors Based Feature Caching and Hierarchical GPU-Centric Data Access |
Na Fan, Jialong Li, Yuxin Gao and Junhui Zhang | A Federated Popularity Prediction Method for Vehicular Named Data Networking |
Maoguang Wang and Jiabei He | Stock Price Prediction Based on Investor Sentiment Analysis and CNN-LSTM-Attention Model |
Chen Yufeng, Zhou Xu, Weng Xianfeng, Li Bo, Xiang Zhengtao and Tian Li | Active optimization routing protocol based on SDVN⋆ |
Dan Luo and Xia Liu | Quantitative Analysis of the Factors Influencing Macao's Tourism Industry: A Gray Correlation Approach |
Ziying Zhang and Jie Wang | Multi-AUV Hunting Strategy Based on the Lions Group Algorithm |
Yinan Chen and Xia Liu | Study on the Coupled and Coordinated Relationships between Social Security and Economic and Social Development in Macao |
Liang Qu,Xiaoli Song,Kelei Yuan,Zhen Liu,Shize Shao,Jiehong Sun,Guanghao Yuan,Jianing Sun and Wenxin Jiang | A Segmentation Network for Coastal Cegetation Guided by Category-Wighted Information from UAV Perspective Based on SAM |
Liang Qu,Mengmeng Zhang,Juan Wang, Ruobing Wen and Shengke Wang | GAN-Based Defogging and Multiscale Fusion Approach for UAV-Based Seagrass Bed Imagery Semantic segmentation in challenging marine environments |
Zhiyuan Wu, Junxiang Cao, Xuefei Tian and Xiaoju Dong | SEBWatcher: Visual Analysis System for Subject, Environment and Behavior in Traffic Scenes |
Wen Zhao and Xulun Huo | Research on the Promotion and Enhancement Paths of Hainan Wenbifeng Pangu Cultural Tourist Areas Based on Network Text Analysis |
Wen Zhao and Zejiang Wei | Based on Network Text Analysis: A Study on the Promotion Strategy of a Boundary Island for Lingshui Tourism Experience |
Huaiyuan Liu, Donghua Yang, Hekai Huang, Xinglei Chen, Hongzhi Wang, Yong Cui and Jun Gu | Deep Reinforcement Learning Based on Greed for the Critical Cross section Identification Problem |
Weidong Zeng, Hongshan Yang and Yong Wang | Intrusion Detection Based on Feature Selection and Transformer BiGRU |
Yi Liu and Sheng Cao | Discussion on the construction of power 3D design platform for nested virtualized hybrid cloud |
Yongcheng Liu, Xue Ouyang, Huan Zhou, Weichen Peng, Jieming Mao and Yongke Pan | Leveraging Spatial Characteristics in Trajectory Compression: An Angle-based Bounded-error Method |
Yukun Cao, Kangle Xu, Yu Cheng, Jialuo Yan and Zhenyi He | HENF: Hierarchical Entity Neighbor Multi-Relational Fusion Network for Knowledge Graph Completion |
Yunlong YE, Lin Zhou, Xiaobo Hu and Yong Wang | TCB Intrusion Detection Method Based on Data Enhancement |
Yaxing Qiao, Runping He, Zhangyu Chen, Jingwen Ni, Zhigang Xie and Zhefei Wang | Multi-source Heterogeneous Data Joint Diagnosis Method for Transformers Based on D-S Evidence Theory |
Xinsheng Li, Chaochao Sun, Yuan Peng and Ting Zhang | Progressive Federated Learning Scheme Based on Model Pruning |
Gang Li | Privacy Protection Data Aggregation Scheme Against Quantum Attacks |
Guanhao Chen and Jinguo Li | LOCATION DATA QUADTREE PARTITIONINGALGORITHM BASED ON DIFFERENTIAL PRIVACY |
Mengkun Zhang,Lingli Li and Xin Zheng | RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning |
Xiong Wan, Yuxi Sun, Yanqing Wang and Meng Xia | Android malware detection method based on machine learning |
Xiaobo Yang, Xiaobo Hu, Chao Li, Lin Zhou and Yong Wang | A lightweight edge network intrusion detection system based on MobileVit |
Ming Li and Haizhou Du | TRAFFICNET: A NOVEL NETWORK PERFORMANCE PREDICTION MODEL VIA AGGREGATOR-BASED ENHANCEMENT |
Changfeng Chen, Xuelin Chen, Yangying Zhang and Jianbang Guo | Sentiment analysis for public opinion based on MapReduce and PSO-SVR |
Chunwei Shen and Haiming Li | Personalized Novel Recommendation System Based on Filtering and Sentiment Analysis |
Feifei Xu, Yingchen Zhou, Zheng Zhong, Guangzhen Li and Wang Zhou | Enhancing Relevance and Efficiency in Visual Question Generation through Redundant Object Filtering |
Xiaohua Ke, Binglong Li, Zexian Ou and Xiaobo Wu | Chinese Named Entity Recognition Algorithm integrating Vocabulary Information |
Yukun Cao, Yuanmin Liu, Ming Chen, Jingjing Li and Tianhao Wang | WSDSum:Unsupervised Extractive Summarization Based |
Jing Li and Jiahao Meng | IPFS-DKRM: an efficient keyword retrieval model of IPFS based on ART |
Yao Hu, JiaHong Yang, Yaqin Wang and Liuming Xiao | Multi-Modal Variable-Channel Spatial-Temporal Semantic Action Recognition Network |
Guangyao Si,Chaoxia Shi and Yanqing Wang | Enhanced and pruned motion planning based on bird's-eye view |
Xiaowen Cao and Jiaji Qin | CCU-NET: CBAM and Cascaded Edge Detection Optimization U-NET for Remote Sensing Image Segmentation |
Yongzhen Yu and Daming Liu | Speech Emotion Recognition Using U-Net |
Guixue Cheng and Tianchi Song | Non-Invasive Load Decomposition Model Based On Inception-SimAM-BiLSTM |
Ye Xu and Haizhou Du | A Data-driven Coordinated Active And Reactive Dispatching Strategy For Photovoltaics |
Chen Wang, Mi Wen and Yanbing Bi | PDTNet: An Image-Based Model for PV Panel Defect Detection |
Chonglei Zhu and Hongjiao Li | SAMCNet:A Multi-Channel Face Anti-Spoofing Network Combined with Hyperspectral Images via Self-Attention Mechanism |
Xinqi Yu,Weimin Wei,Renying Pei and Xingchao Zhou | Image Tampering Detection Method Based on Hybrid Attention Mechanism |
Zhiming Ma, Lin Zhou, Xiaobo Hu, Chao Li, Siyuan Chen and Yong Wang | Stage-zero A Dynamic Ensemble method for Intrusion Detection in Industrial Control Systems |
Jing Li and Xuebin Liang | High-precision Anime Conversion Model based on Generative Adversarial Networks |
Lina Ling, Mi Wen and Zhou Zhu | Anomaly Segmentation in Foggy Weather for Autonomous Driving with Adaptive Learnable Filters |
Renying Pei, Weimin Wei, Xinqi Yu and Xingchao Zhou | Image tampering localization based on dual-stream feature fusion |
Xingchao Zhou, Weimin Wei, Xinqi Yu and Renying Pei | Multi-scale Image Tampering Detection Using Inception-UNet Network |
Chenglong Song,Fang Li,Qiang Chen and Chaolei He | Fetal Congenital Heart Disease Diagnosis Based On CBAM-Enhanced ResNet-50 |
Jiamin Fu, Man Xu and Junyi Li | Transformers for Single Object Tracking: Temporal Context Propagation and Frame Relationship Modeling |
Yijie Huang, Sangyu Yao and Fangfang Lu | SAFETY HELMET WEARING DETECTION BASED ON YOLOv7 |
Zihao Fu,Yang Gao and Wanli Lyu | Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction |
Yue Han, Yuanjian Lv and Zhifang Wang | QR code digital watermarking algorithm based on GWO |
Yuanjian Lv, Yue Han and Zhifang Wang | Fast CKKS Algorithm in the SEAL Library |
Lin Yuan, Xun Duan, Lingjie Xiang, Guangqian Kong and Yun Wu | A Transformer-based Video Colorization Method Fusing Local Self-Attention and Bidirectional Optical Flow |
Zhong Kang, Maoning Wang and Meijiao Duan | An NTRU Lattice-Based Chameleon Hash Scheme for Redactable Blockchain Applications |
Haimiao Qin, Meijiao Duan, Yurou Tang and Maoning Wang | Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain Rewriting |
Qianqian Guo, Yong Wang and Siyuan Chen | SECURE IDENTITY AUTHENTICATION PROTOCOL BASED ON BLOCKCHAIN IN SMART HOME |
Chengli Fu, Lin Zhou, Siyuan Chen, Yi Wu and Yong Wang | False Data Injection Attack Detection Method Based on Long Time Series Prediction |
Jishun Liu,Liang Shen,Haixia Wu,Bei Lin and Zhipeng Cui | A Hybrid Iris Recognition System Model based on Presentation Attack Detection and Traffic Monitoring Module on AIoT System |
Zhipeng OU, Han Zhang, Yan Yu and Liu Xia | An empirical study of the factors influencing the improvement of education quality within higher education institutions |
Dan Xian and Yuanhui Li | Study on the Intercultural Competence of Students in Hainan Vocational Colleges |
Dan Xian and Yuanhui Li | Study on the Communicative Competence of Students of Tourism-related Majors in Hainan Vocational Colleges |
Linlin Tao and Hong Chen | Research on the Learning Adaptability and Learning Effectiveness of College Students under the Background of Digital Education |
Yinan Chen, Xia Liu and Lei Chen | Research on the Adaptability of Vocational College Majors and Industry Empirical Study Based on 14 Vocational Colleges in Hainan,China |
Guobao Zhang, Lujian Wan and Conglin Wang | Practice of the Campus Data Middle Platform Based on Lakehouse Integrated Architecture |
Jiahao Miao, Yang Long and Zhixin Li | Application of Deep Learning Models Based on Chaos Modeling in Power Internet of Things Forecasting Tasks |
Xiaojing Mu, Wenliang Wu, Xichao Liu, Gang Wan, Yang, Wang and Weijie Lv | Study on compatibility of vegetable insulating oils and mineral insulating oils for transformer based on molecular simulation methods |
Xu chen and Guixue cheng | Collaborative optimization scheduling model for clean energy in microgrid clusters |
Xiaohan Guo, Haizhou Du and Weina Zhang | A Distributed Multi-Microgrid Intelligent Scheduling for New Power System |
Wenchen LI, Yanhao Huang, Xinglei, Chen and Jing Wen | Development and Application of Intelligent Calculation Analysis Platform For Large Power Grid |
Zhongyang Fan, Chenggang Cui, Tianxiao Yang and Chuanlin Zhang | A Deep Reinforcement Learning Control Strategy with Integrated Droop Control for Parallel DC-DC Buck Converters with CPLs |
Junyi Sha, Mi Wen, Zhaowu Chu ,Chenyun Liu and HongshanYang | MST: A Comprehensive Approach for Short-Term Power Load Forecasting Based on Data Decomposition, Local and Global Modeling |
Zecheng Yang, Zhenya Zhang, Ping Wang and Hongmei Chen | An Approach to Identification Model for Electric Event Based on Clustering Analysis |
Pengpeng Zhang, Zhenya Zhang, Ping Wang and Hongmei Cheng | Research on Prediction Models and Optimization Methods for Electrical Current Consumption of Users |
Yu Han and Zhen Wang | Re-GNN: ANewModelforPredicting Circuit Reliability Degradation |
Caiwei Wang and Guixue Cheng | TRANSFORMER OIL TEMPERATURE PREDICTION METHOD BASED ON CAUSAL DISCOVERY AND GNN-LSTM MODEL |
Jing Li and Shengyu Tang | The Electronic Power Data Traceability Model Based on Hybrid Consensus and IPFS |
Mengyuan Bao and Daming Liu | Research on complementation of new energy spot and medium to long-term transactions based on blockchain |
Xinglei Chen, Jing Wen, Yalou Li, Wenchen Li, Yong Cui and Jun Gu | Knowledge-driven Calculating Method for Transmission Section Limit of Large Power Grid |