Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CYBERC
CYBERC 2023
Generate Citations
2023 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Nov. 2 2023 to Nov. 4 2023
Jiangsu, China
ISBN: 979-8-3503-0869-3
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 3-3
Copyright
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-12
Instroduction
Freely available from IEEE.
pp. 13-13
Message from the Technical Program Chairs
Freely available from IEEE.
pp. 14-14
Message from the Steering Committee
Freely available from IEEE.
pp. 15-15
Program Committee
Freely available from IEEE.
pp. 16-18
Reviewers
Freely available from IEEE.
pp. 19-20
Keynotes
Freely available from IEEE.
pp. 21-26
Sponsors
Freely available from IEEE.
pp. 27-27
GRU-CP: Non-stationary Time Series Forecasting with Change Point Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Zhihua Ding
,
Keqin Shi
,
Weiqiang Sun
Large Language Models guided Generative Prompt for Dialogue Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-17
by
Sijie Liu
,
Yiquan Fang
,
Hua Cheng
,
Yiming Pan
,
Yufei Liu
,
Caiting Gao
A Spatial Maximal Co-location Pattern Mining Algorithm Based on Maximal Clique
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-26
by
Li Qiaochen
,
Bao Xuguang
Application of IMVR Convolutional Neural Networks to Classification of Land Use Remote Sensing Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-31
by
Yuanzhen Shuai
,
Ning Xin
,
Md Maruf Hasan
,
Bintao Hu
,
Tianhong Dai
,
Hengyan Liu
EEG-based Anxiety Detection with Feature Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
by
Jeongyeong Park
,
Nanlin Jin
,
Jianjun Chen
,
Jun Qi
Civil Aviation Data Classification and Grading Method Based on Intelligent Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-43
by
Hao Sun
,
Haiyang Zhang
,
Ping Chen
,
Shuai Wang
Artificial Immune-Based Semi-supervised Learning for Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-50
by
Yi Wang
Neural Authorship Attribution: Stylometric Analysis on Large Language Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-54
by
Tharindu Kumarage
,
Huan Liu
Urban Social Segregation with Quantum Walk Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-58
by
Yutong Jiang
,
Xing Wu
,
Jianjia Wang
Optimization of Merkle Tree Structures: A Focus on Subtree Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-67
by
Prasad Ayyalasomayajula
,
Mahalingam Ramkumar
Hard-Negatives Focused Self-Supervised Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-77
by
Yiming Pan
,
Hua Cheng
,
Yiquan Fang
,
Yufei Liu
,
Taotao Liu
Event-Based Weak Target Detection and Tracking for Space Situational Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Pengchao Dong
,
Mingkai Yue
,
Lihua Zhu
,
Fuqiang Xu
,
Zhonghua Du
Patch-Based Multi-Level Attention Mechanism for Few-Shot Multi-Label Medical Image Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-91
by
Mingyuan Li
,
Yichuan Wang
,
Junfeng Huang
,
Erick Purwanto
,
Ka Lok Man
Nested Named Entity Recognition Based on Multi-word Fusion and Boundary Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-95
by
Dou Quansheng
,
Liu Jing
,
Li Bingchun
,
Chen Shuzhen
,
Jiang Ping
DouRN: Improving DouZero by Residual Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Yiquan Chen
,
Yingchao Lyu
,
Di Zhang
Application of Voformer-EC Clustering Algorithm to Stock Multivariate Time Series Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-107
by
Ning Xin
,
Shaheen Khatoon
,
Md Maruf Hasan
Study on Fault Prediction Methods for Short-wave Transmitting System Based on SSA and CKF-LSSVR
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-114
by
Yong Luo
,
Yixue Xiang
,
Tingting Huang
,
Shuohuan Wei
,
Shuoqi Chen
Time-Aware Attentional Knowledge Tracing based on Pre-training and Feature Extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-122
by
Yuxin Tian
,
Zhanquan Wang
Deep research and analysis of ChatGPT based on multiple testing experiments
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-131
by
Shuohuan Wei
,
Yong Luo
,
Shuoqi Chen
,
Tingting Huang
,
Yixue Xiang
Transformer-based Spatial-Temporal Graph Attention Network for Traffic Flow Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-135
by
Fangzhou Yan
,
Qi Chen
Visual-Based Hearing-Dog Robots For Users With Hearing Impairment
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-145
by
Muyi Bao
,
Songhao Li
,
Nanlin Jin
,
Quan Zhang
On the Basin of Attraction and Capacity of Restricted Hopfield Network as an Auto-Associative Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-154
by
Ci Lin
,
Tet Hin Yeap
,
Iluju Kiringa
BS-GSA: Speech Emotion Recognition via Blend-Sample Empowered Global & Spectral Attentive Paradigm
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-158
by
Yichi Zhang
,
Xinyu Yang
An On-Demand Customized Service Function Chain Method with Quality of Service Guarantee
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-164
by
Hongbo Li
,
Ming Chen
,
Yan Gao
Exploring Event-based Dynamic Topic Modeling*
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
Marielle G. Montero
,
Maria Regina Justina E. Estuar
ACLPSO with Dynamic Interval Scaling and Learning Probability Tradeoff Coefficients
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-178
by
Yi Zhang
,
Xiang Yu
,
Kaiwen Xu
Appearance-Motion United Memory Autoencoder for Video Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-187
by
Zihao Jin
,
Yuxuan Zhao
Improvement of Neural Cognitive Diagnosis for Intelligent Education Systems Based on Response Time Factor
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
by
Zhenyu He
,
Weilong He
,
Zhenfeng He
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-199
by
Lei Wang
,
Wei Huang
,
Yiping Chen
,
Ran Chen
Graph Sketch Based Heavy Change Detection for Temporal Network Traffic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-209
by
Hao Su
,
Shaolong Qin
,
Zhenni Wu
,
Tao Peng
,
Shanshan Liu
,
Yan Zhou
Multimodal Deep Learning for Enhanced Arrhythmia Detection Using ECG Time Series and Image Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-216
by
Yitao Xu
,
Jiahao Qin
,
Zihong Luo
,
Zhengxu Jing
,
Bihao You
Image Gradient inspired Generative Adversarial Network for Non-Uniform Deblurring*
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-224
by
Qi Qing
Customizing SAM for histologic image segmentation of kidney biopsy by a detector approach: det-SAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-233
by
Xujia Ning
,
Yi Ni
,
Kaicheng Liang
,
Duan Wang
,
Erick Purwanto
,
Ka Lok Man
Encoding Block Pixel Compensation With Motion Vector on DNN
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-238
by
Wenhao Wang
,
Shiyu Jin
,
Yanfu Jiang
,
Ling Tian
,
Yimin Zhou
An Industrial Instrument Panel Identification System Design Based on an Improved YOLOv7 and UAV
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-248
by
Miao Ye
,
Yuejin Huang
,
Qiuxiang Jiang
,
Peng Wen
,
Hongwen Hu
,
Jin Cheng
Improvement in On-road Object Detection Using YOLOv7 with High-order Spatial Interaction and Attention Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-258
by
Yuning Shi
,
Akinori Hidaka
Using Statistical Distribution to Identify the Influence Connections in Brain Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-262
by
Haodi Mao
,
Xing Wu
,
Jianjia Wang
Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-271
by
Jingyi Deng
,
San Hu
,
Wenjun Fan
A Type of Recharging Scheduling Strategy based on Adjustable Request Threshold in WRSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-280
by
Xiaojie Bian
,
Chao Sha
,
Shu Shen
,
Ruchuan Wang
A Node Confidence Determination Based Moving Target Defense Strategy for SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-288
by
Shimin Sun
,
Guowei Xu
,
Li Han
An Iterative RBSF Kalman Equalizer for MIMO ISI Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Lingfeng Zhang
,
Liangfang Ni
,
Qing Ma
,
Fang Zhou
Joint Trajectory and Association Optimization for Secure UAV Communication Against Random Located Eavesdroppers
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Runze Dong
,
Buhong Wang
,
Kunrui Cao
,
Jiwei Tian
,
Tianhao Cheng
Covert Communication in TDCS with Spectrum Measurement Mismatch and Noise Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-305
by
Liang Fang
,
Xianlong Jiao
,
Fan Yang
Trust Maintenance in IoT for Smart Cities with Complex Network Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-315
by
Haodi Mao
,
Xing Wu
,
Jianjia Wang
Security-Reliability Trade-Off Analysis of Friendly Jammer Selection Aided Energy-Harvesting Cognitive Relay Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-322
by
Ronggui Zou
,
Yang Yang
,
Rongrong Xu
,
Qian Yan
A Concept Drift Tolerant Abnormal Detection Method for Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-330
by
Xu Wang
,
Li Han
,
Shimin Sun
,
Guowei Xu
On the Security of Privacy-preserving Data Aggregation Scheme Based on CRT in Mobile Crowdsensing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-334
by
Jianhong Zhang
,
Jianan Zhang
,
Zongyi Lv
,
Ruxuan Zhang
An IoT-Based Smart Irrigation System
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-338
by
Lorenzo Rodriguez
,
Qinghua Wang
Blockchain-Based Virtual Skin System for Metaverse: Design and Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-346
by
Debin Meng
,
Jinbo Li
,
Mingyu Wang
,
Guanghui Wang
Improvement of Passkey Entry Protocol for Secure Simple Pairing
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-356
by
Sai Swaroop Madugula
,
Ruizhong Wei
Collaborative Vehicle Collision Warning Based on Consensus Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-370
by
Hung-Chin Jang
,
Yu-Cheng Hsu
Safety Verification Model of Desensitization Algorithm for Civil Aviation Passenger Data Based on Statistics
Full-text access may be available. Sign in or learn about subscription options.
pp. 371-374
by
Ping Chen
,
Hao Sun
,
Shuai Wang
,
Xiangwei Zhou
UAV-assisted Blockchain-based Electric Power Grid Inspection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Zhihu Li
,
Bing Zhao
,
Hongxia Guo
,
Feng Zhai
,
Lin Li
A Chaotic Encryption Approach Improving Digital Image Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-392
by
Chenlei Zhang
,
Xinlin Li
,
Yuchen Luan
,
Wenjun Fan
Walking to Authenticate: Identifying Robust Behavioral Biometrics from Step Count Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 393-396
by
Zhen Chen
,
Keqin Shi
,
Weiqiang Sun
Classification and Identification of Phishing Websites based on Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-403
by
Sheng Fang
,
Tianyang Liu
,
Yaning Zhu
,
Wenjun Fan
On Hybrid Artificial Neural Networks and Variational Quantum Classifier for Network Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 410-416
by
Praveen Venkatachalam
,
David Q. Liu
Author Index
Freely available from IEEE.
pp. 407-409
Showing 69 out of 69