Program Booklet

Here is the program booklet guidance

Conference Schedule

9.28 AM

9:00 ~ 9:30 The opening ceremony

9:30 ~ 9:40 A group photo

9:40 ~ 10:10 Keynote Speaker1 : Large-scale Clinical Trial Text Mining through Natural Language Processing

10:10 ~ 10:25 Tea break

10:25 ~ 10:55 Keynote Speaker2 : Constructing intelligent interactive maps of cultural and historical information

10:55 ~ 11:25 Keynote Speaker3

9.28 PM

Room 1002-1

Time Content
session 1 13:00-13:10 Quantitative Analysis of the Factors Influencing Macao's Tourism Industry: A Gray Correlation Approach Dan Luo and Xia Liu
13:10-13:20 Multi-AUV Hunting Strategy Based on the Lions Group Algorithm Ziying Zhang and Jie Wang
13:20-13:30 Study on the Coupled and Coordinated Relationships between Social Security and Economic and Social Development in Macao Yinan Chen and Xia Liu
13:30-13:40 A Segmentation Network for Coastal Cegetation Guided by Category-Wighted Information from UAV Perspective Based on SAM Liang Qu,Xiaoli Song,Kelei Yuan,Zhen Liu,Shize Shao,Jiehong Sun,Guanghao Yuan,Jianing Sun and Wenxin Jiang
13:40-13:50 GAN-Based Defogging and Multiscale Fusion Approach for UAV-Based Seagrass Bed Imagery Semantic segmentation in challenging marine environments Liang Qu,Mengmeng Zhang,Juan Wang, Ruobing Wen and Shengke Wang
13:50-14:00 SEBWatcher: Visual Analysis System for Subject, Environment and Behavior in Traffic Scenes Zhiyuan Wu, Junxiang Cao, Xuefei Tian and Xiaoju Dong
14:00-14:10 Research on the Promotion and Enhancement Paths of Hainan Wenbifeng Pangu Cultural Tourist Areas Based on Network Text Analysis Wen Zhao and Xulun Huo
14:10-14:20 Based on Network Text Analysis: A Study on the Promotion Strategy of a Boundary Island for Lingshui Tourism Experience Wen Zhao and Zejiang Wei
14:20-14:30 Deep Reinforcement Learning Based on Greed for the Critical Cross section Identification Problem Huaiyuan Liu, Donghua Yang, Hekai Huang, Xinglei Chen, Hongzhi Wang, Yong Cui and Jun Gu
14:30-14:40 Intrusion Detection Based on Feature Selection and Transformer BiGRU Weidong Zeng, Hongshan Yang and Yong Wang
14:40-14:50 Discussion on the construction of power 3D design platform for nested virtualized hybrid cloud Yi Liu and Sheng Cao
session 2
14:50-15:00 Leveraging Spatial Characteristics in Trajectory Compression: An Angle-based Bounded-error Method Yongcheng Liu, Xue Ouyang, Huan Zhou, Weichen Peng, Jieming Mao and Yongke Pan
15:00-15:10 HENF: Hierarchical Entity Neighbor Multi-Relational Fusion Network for Knowledge Graph Completion Yukun Cao, Kangle Xu, Yu Cheng, Jialuo Yan and Zhenyi He
15:10-15:20 TCB Intrusion Detection Method Based on Data Enhancement Yunlong YE, Lin Zhou, Xiaobo Hu and Yong Wang
15:20-15:30 Multi-source Heterogeneous Data Joint Diagnosis Method for Transformers Based on D-S Evidence Theory Yaxing Qiao, Runping He, Zhangyu Chen, Jingwen Ni, Zhigang Xie and Zhefei Wang
15:30-15:40 Progressive Federated Learning Scheme Based on Model Pruning Xinsheng Li, Chaochao Sun, Yuan Peng and Ting Zhang
15:40-15:50 Privacy Protection Data Aggregation Scheme Against Quantum Attacks Gang Li
15:50-16:00 LOCATION DATA QUADTREE PARTITIONINGALGORITHM BASED ON DIFFERENTIAL PRIVACY Guanhao Chen and Jinguo Li
16:00-16:10 RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning Mengkun Zhang,Lingli Li and Xin Zheng
16:10-16:20 Android malware detection method based on machine learning Xiong Wan, Yuxi Sun, Yanqing Wang and Meng Xia
16:20-16:30 A lightweight edge network intrusion detection system based on MobileVit Xiaobo Yang, Xiaobo Hu, Chao Li, Lin Zhou and Yong Wang
16:30-16:40 TRAFFICNET: A NOVEL NETWORK PERFORMANCE PREDICTION MODEL VIA AGGREGATOR-BASED ENHANCEMENT Ming Li and Haizhou Du
16:40-16:50 Active optimization routing protocol based on SDVN⋆ Chen Yufeng, Zhou Xu, Weng Xianfeng, Li Bo, Xiang Zhengtao and Tian Li
16:50-17:00 Stock Price Prediction Based on Investor Sentiment Analysis and CNN-LSTM-Attention Model Maoguang Wang and Jiabei He
17:00-17:10 Code recommendation of embedded network based on intention analysis Shi Cheng, Zhiqiang Chen1, Xuanyi Zong and Zelin Wang

Room 1002-2

Time Content
session 1 13:00-13:10 Sentiment analysis for public opinion based on MapReduce and PSO-SVR Changfeng Chen, Xuelin Chen, Yangying Zhang and Jianbang Guo
13:10-13:20 Personalized Novel Recommendation System Based on Filtering and Sentiment Analysis Chunwei Shen and Haiming Li
13:20-13:30 Enhancing Relevance and Efficiency in Visual Question Generation through Redundant Object Filtering Feifei Xu, Yingchen Zhou, Zheng Zhong, Guangzhen Li and Wang Zhou
13:30-13:40 Chinese Named Entity Recognition Algorithm integrating Vocabulary Information Xiaohua Ke, Binglong Li, Zexian Ou and Xiaobo Wu
13:40-13:50 WSDSum:Unsupervised Extractive Summarization Based Yukun Cao, Yuanmin Liu, Ming Chen, Jingjing Li and Tianhao Wang
13:50-14:00 IPFS-DKRM: an efficient keyword retrieval model of IPFS based on ART Jing Li and Jiahao Meng
session 2 13:00-13:10 Sentiment analysis for public opinion based on MapReduce and PSO-SVR Changfeng Chen, Xuelin Chen, Yangying Zhang and Jianbang Guo
14:00-14:10 Multi-Modal Variable-Channel Spatial-Temporal Semantic Action Recognition Network Yao Hu, JiaHong Yang, Yaqin Wang and Liuming Xiao
14:10-14:20 Enhanced and pruned motion planning based on bird's-eye view Guangyao Si,Chaoxia Shi and Yanqing Wang
14:20-14:30 CCU-NET: CBAM and Cascaded Edge Detection Optimization U-NET for Remote Sensing Image Segmentation Xiaowen Cao and Jiaji Qin
14:30-14:40 Speech Emotion Recognition Using U-Net Yongzhen Yu and Daming Liu
14:40-14:50 Non-Invasive Load Decomposition Model Based On Inception-SimAM-BiLSTM Guixue Cheng and Tianchi Song
14:50-15:00 A Data-driven Coordinated Active And Reactive Dispatching Strategy For Photovoltaics Ye Xu and Haizhou Du
15:00-15:10 PDTNet: An Image-Based Model for PV Panel Defect Detection Chen Wang, Mi Wen and Yanbing Bi
15:10-15:20 SAMCNet:A Multi-Channel Face Anti-Spoofing Network Combined with Hyperspectral Images via Self-Attention Mechanism Chonglei Zhu and Hongjiao Li
15:20-15:30 Image Tampering Detection Method Based on Hybrid Attention Mechanism Xinqi Yu,Weimin Wei,Renying Pei and Xingchao Zhou
15:30-15:40 Stage-zero A Dynamic Ensemble method for Intrusion Detection in Industrial Control Systems Zhiming Ma, Lin Zhou, Xiaobo Hu, Chao Li, Siyuan Chen and Yong Wang
15:40-15:50 High-precision Anime Conversion Model based on Generative Adversarial Networks Jing Li and Xuebin Liang
15:50-16:00 Anomaly Segmentation in Foggy Weather for Autonomous Driving with Adaptive Learnable Filters Lina Ling, Mi Wen and Zhou Zhu
16:00-16:10 Image tampering localization based on dual-stream feature fusion Renying Pei, Weimin Wei, Xinqi Yu and Xingchao Zhou
16:10-16:20 Multi-scale Image Tampering Detection Using Inception-UNet Network Xingchao Zhou, Weimin Wei, Xinqi Yu and Renying Pei
16:20-16:30 Fetal Congenital Heart Disease Diagnosis Based On CBAM-Enhanced ResNet-50 Chenglong Song,Fang Li,Qiang Chen and Chaolei He
16:30-16:40 Transformers for Single Object Tracking: Temporal Context Propagation and Frame Relationship Modeling Jiamin Fu, Man Xu and Junyi Li
16:40-16:50 SAFETY HELMET WEARING DETECTION BASED ON YOLOv7 Yijie Huang, Sangyu Yao and Fangfang Lu
16:50-17:00 A Federated Popularity Prediction Method for Vehicular Named Data Networking Na Fan, Jialong Li, Yuxin Gao and Junhui Zhang
17:00-17:10 Accelerating Large-Scale GNN by Combining k-Hop Neighbors Based Feature Caching and Hierarchical GPU-Centric Data Access Wenbin Jiang, Fanxing Pan, Rui Wu, Xinhai Shen, Dongao He and Hai Jin

Forum
- Edge intelligence and networking frontier technologies research and application

18:00 ~ Dinner
9.29 AM

Room 1002-1

Time Content
session 1 09:00-09:10 Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction Zihao Fu,Yang Gao and Wanli Lyu
09:10-09:20 QR code digital watermarking algorithm based on GWO Yue Han, Yuanjian Lv and Zhifang Wang
09:20-09:30 Fast CKKS Algorithm in the SEAL Library Yuanjian Lv, Yue Han and Zhifang Wang
09:30-09:40 A Transformer-based Video Colorization Method Fusing Local Self-Attention and Bidirectional Optical Flow Lin Yuan, Xun Duan, Lingjie Xiang, Guangqian Kong and Yun Wu
09:40-09:50 An NTRU Lattice-Based Chameleon Hash Scheme for Redactable Blockchain Applications Zhong Kang, Maoning Wang and Meijiao Duan
09:50-10:00 Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain Rewriting Haimiao Qin, Meijiao Duan, Yurou Tang and Maoning Wang
10:00-10:10 SECURE IDENTITY AUTHENTICATION PROTOCOL BASED ON BLOCKCHAIN IN SMART HOME Qianqian Guo, Yong Wang and Siyuan Chen
10:10-10:20 False Data Injection Attack Detection Method Based on Long Time Series Prediction Chengli Fu, Lin Zhou, Siyuan Chen, Yi Wu and Yong Wang
10:20-10:30 A Hybrid Iris Recognition System Model based on Presentation Attack Detection and Traffic Monitoring Module on AIoT System Jishun Liu,Liang Shen,Haixia Wu,Bei Lin and Zhipeng Cui
session 2 10:30-10:40 An empirical study of the factors influencing the improvement of education quality within higher education institutions Zhipeng OU, Han Zhang, Yan Yu and Liu Xia
10:40-10:50 Study on the Intercultural Competence of Students in Hainan Vocational Colleges Dan Xian and Yuanhui Li
10:50-11:00 Study on the Communicative Competence of Students of Tourism-related Majors in Hainan Vocational Colleges Dan Xian and Yuanhui Li
11:00-11:10 Research on the Learning Adaptability and Learning Effectiveness of College Students under the Background of Digital Education Linlin Tao and Hong Chen
11:10-11:20 Research on the Adaptability of Vocational College Majors and Industry Empirical Study Based on 14 Vocational Colleges in Hainan,China Yinan Chen, Xia Liu and Lei Chen
11:20-11:30 Practice of the Campus Data Middle Platform Based on Lakehouse Integrated Architecture Guobao Zhang, Lujian Wan and Conglin Wang

Room 1002-2

Time Content
session 1 09:00-09:10 Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction Zihao Fu,Yang Gao and Wanli Lyu
09:00-09:10 Application of Deep Learning Models Based on Chaos Modeling in Power Internet of Things Forecasting Tasks Jiahao Miao, Yang Long and Zhixin Li
09:10-09:20 Study on compatibility of vegetable insulating oils and mineral insulating oils for transformer based on molecular simulation methods Xiaojing Mu, Wenliang Wu, Xichao Liu, Gang Wan, Yang, Wang and Weijie Lv
09:20-09:30 Collaborative optimization scheduling model for clean energy in microgrid clusters Xu chen and Guixue cheng
09:30-09:40 A Distributed Multi-Microgrid Intelligent Scheduling for New Power System Xiaohan Guo, Haizhou Du and Weina Zhang
09:40-09:50 Development and Application of Intelligent Calculation Analysis Platform For Large Power Grid Wenchen LI, Yanhao Huang, Xinglei, Chen and Jing Wen
09:50-10:00 A Deep Reinforcement Learning Control Strategy with Integrated Droop Control for Parallel DC-DC Buck Converters with CPLs Zhongyang Fan, Chenggang Cui, Tianxiao Yang and Chuanlin Zhang
10:00-10:10 MST: A Comprehensive Approach for Short-Term Power Load Forecasting Based on Data Decomposition, Local and Global Modeling Junyi Sha, Mi Wen, Zhaowu Chu ,Chenyun Liu and HongshanYang
session 2 10:10-10:20 An Approach to Identification Model for Electric Event Based on Clustering Analysis Zecheng Yang, Zhenya Zhang, Ping Wang and Hongmei Chen
10:20-10:30 Research on Prediction Models and Optimization Methods for Electrical Current Consumption of Users Pengpeng Zhang, Zhenya Zhang, Ping Wang and Hongmei Cheng
10:30-10:40 Re-GNN: ANewModelforPredicting Circuit Reliability Degradation Yu Han and Zhen Wang
10:40-10:50 TRANSFORMER OIL TEMPERATURE PREDICTION METHOD BASED ON CAUSAL DISCOVERY AND GNN-LSTM MODEL Caiwei Wang and Guixue Cheng
10:50-11:00 The Electronic Power Data Traceability Model Based on Hybrid Consensus and IPFS Jing Li and Shengyu Tang
11:00-11:10 Research on complementation of new energy spot and medium to long-term transactions based on blockchain Mengyuan Bao and Daming Liu
11:10-11:20 Knowledge-driven Calculating Method for Transmission Section Limit of Large Power Grid Xinglei Chen, Jing Wen, Yalou Li, Wenchen Li, Yong Cui and Jun Gu