Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISCSIC
ISCSIC 2022
Generate Citations
2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)
Nov. 11 2022 to Nov. 13 2022
Beijing, China
ISBN: 978-1-6654-5488-9
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-13
Message from General Chair
Freely available from IEEE.
pp. 14-14
Message from Program Chair
Freely available from IEEE.
pp. 15-15
Organizing Committee
Freely available from IEEE.
pp. 16-16
Program Committee
Freely available from IEEE.
pp. 17-17
Steering Committee
Freely available from IEEE.
pp. 18-18
Sponsors
Freely available from IEEE.
pp. 19-19
Reviewers
Freely available from IEEE.
pp. 20-22
An Improved Method for Making CNN Immune to Backdoor Attack by Activating Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yuang Zhou
,
Yichen Lei
,
Limin Yu
,
Xianyao Li
,
Dingding Chen
,
Tongpo Zhang
Internet of Things Terminal Access Security Based on Zero Trust
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
RiXuan Qiu
,
JunFeng Zhang
,
Lu Chen
,
Wei Li
,
Nan Lin
Research on Multiple Classification Detection for Network Traffic Anomaly Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-16
by
HaiZhou Tong
Research on Security Risk Detection System of Intelligent Internet of Things Terminal
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-20
by
ZhiYuan Ye
,
Can Cao
,
PengCheng Ni
Summary Model based on Semantic Similarity Attention Focus
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-24
by
Fei Qin
,
Lixing Wei
,
Pin Wang
The Design and Implementation of Software Defined Network Security Service Choreography System
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-29
by
zhiYuan Ye
,
Can Cao
,
Lei Wang
A Study on Multi-pose Face Recognition Based on Improved Local Convolutional Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-33
by
Peijie Xu
An Analysis of Current Continual Learning Algorithms in an Image Classification Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
Jess Wakelin
,
Noor Abdalkarem Mohammedali
An Intrusion Detection Approach Based on Improved Deep Belief Network and LightGBM
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-44
by
Qiuting Tian
Application of prototypical networks in microbiome-based disease prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-49
by
Xiao Liu
,
Lei Xiao
,
Li Deng
Identity Identification of Power Intelligent Terminals Based on Behavior Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-54
by
XingJie Huang
,
BeiBei Su
,
ZaoJian Dai
,
JinMeng Zhao
,
Jing Zhang
,
BingJie Lin
Learning Spatiotemporal Features for Video Semantic Segmentation Using 3D Convolutional Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Jiamin Chen
,
Mingchen Wang
,
Shang Jiang
,
Bin Huang
,
Hongbo Sun
Optimal Order Acceptance and Scheduling via Deep Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Jing Qian
,
Chao Chen
,
Keyu Wu
,
Li Yu
Research on Green Driving Algorithm of Electric Power Enterprises based on Driving Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Tiantian Xu
,
Jun Ma
,
Yanran Wu
,
Chenxi Yu
Research on Power Fault Data Fusion and Diagnosis Model Based on Improved BP Network Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-77
by
Li Wang
,
XuYang Zhang
,
Wen Deng
Students' classroom Emotion Analysis Based on Intelligent Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-82
by
Bin Fan
,
XiaoJing Zeng
Connected Multi-speech Task for Detecting Alzheimer’s Disease Using a Two-Layer Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Zigao Peng
,
Jiali Yang
,
Nuo Lei
,
Jingyu Yang
,
Mingying Lan
,
Li Gao
Convolution neural network with multiple pooling strategies for speech emotion recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
Pengxu Jiang
,
Cairong Zou
FAQ question Answering method based on semantic similarity matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Ji Tenghao
Quality assessment of cross-topic article features based on improved CTS model
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-106
by
Pengcheng Huang
,
Li Li
,
Chunyan Wu
,
Xiaoqian Zhang
,
Zhigui Liu
Construction of Early Warning Model of Geological Disasters Based on Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-111
by
Ying Wang
,
XianBin Yang
Design of a multi-channel fatigue test monitoring cloud platform based on the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Haoquan Qi
,
Jianyu Zhao
,
Lingling Sun
,
Tong Cang
,
Yanyu Li
,
Xudong Wang
Evaluation of University Teaching Quality Based on Hadoop and Deep Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-122
by
JuXue Zhao
Research on personalized resource recommendation algorithm for parent education
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-126
by
Fei Tian
Research on Tourism Resources Management Method Based on Deep Learning and Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-131
by
Ling Yang
,
Xin Huang
UNEG: A Description-Enhanced Graph-based News Recommendation Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-136
by
Yipu Chen
,
Jingkun Wang
,
Yongtao Jiang
,
Liqiang Wen
,
Wen Zhao
Construction of rail wear and crack initiation prediction model combined with BP neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-141
by
YiChao Wu
,
ShuYing Wang
Design and Application of Medical Guidance Information System Based on Factor Cluster Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-147
by
Jie Cao
,
Shan Hu
,
Ruidan Shi
,
Renjie Yang
Fatigue Driving Detection Method Based on Multiple Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-152
by
JinFeng Liu
GPR-Bi-LSTM power battery health state estimation and remaining life prediction based on ICEEMDAN algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
Huipeng Li
,
Yiming Yao
,
Jiayu Hou
,
Zhe Zhou
,
Zhiduan Cai
,
Zuxin Li
MLFT-Net: Point Cloud Completion Using Multi-Level Feature Transformer
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-165
by
Yueling Du
,
Jin Xie
Multi-condition Fault Diagnosis of Internal Combustion Engine Based on Convolutional Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-170
by
QingZhong Chu
,
JunHao Huang
,
ShiTong Ren
Real-time Estimation of AOS based on Constant Wind Field Assumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-174
by
Fan Zhubin
,
Yuan Ruikun
Research on Education Cost Prediction Based on Improved BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-179
by
Ping Wei
Research on the Construction of Demand Prediction Model for Talent Training in Colleges Universities under Division of Labor in the Value Chain
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-184
by
Liang Zhou
,
JiaoNan Li
,
ChangSong Ma
State-of-Health Prediction of lithium-Ion Battery Based on Transfer Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-189
by
Jiayu Hou
,
Ping Yu
,
Fengying Zhang
,
Dingding Liu
,
Zuxin Li
Study on flight test of Terrain awareness and warning system
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-194
by
Ma Fei
,
Su Yi
A Real time Decision Making Method of Electronic Warfare Based on the Protection of Key Points
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-199
by
Han Mei
,
Xu Bo
A Real-Time Vehicle Indoor Positioning Algorithm Based on Multi-Camera Perception
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-204
by
Zhaoyu Zheng
,
Kai Zhang
Accurate Trajectory Extraction of Dynamic Targets for Driving Behaviour Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-210
by
Yuhui Jin
,
Sixun Yang
,
You Zhai
,
Huimin Liao
,
Sainan Zhu
,
Jian Huang
Data Access Control Method of Power Terminal Based on Trust and Reputation
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-215
by
Sheng Wang
,
JuLing Zhang
,
Yong Li
,
LingHao Zhang
,
Qing Zhang
,
Jian Zhou
Platoon longitudinal and lateral control and cooperative positioning algorithm based on DMPC and FedKF
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-220
by
Haiqiao Zhang
,
Yinong Li
,
Meiyu Li
Research on Robot Intelligent Control Method Based on Deep Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-225
by
Shu Rao
An Improved Genetic Algorithm for Generation of Pairwise Combination Test Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Lihong Tan
,
Yan Sun
,
Ya Pan
,
Yong Fan
Efficient Traffic Scheduling Using Genetic Algorithm in Time-Sensitive Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-238
by
Xiaoqian Su
,
Chuhang Tang
,
Cheng Gong
Fault Monitoring of Flexible Switching Distribution Network on Account of Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-243
by
Zhao He
,
Jiahu Guo
,
Kai Wang
MFSCD* Lite: A situation-based path planning algorithm for agent in wargame
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-249
by
Tong Wang
,
Song Dai
,
Xuan Liu
,
Meijing Zhao
,
Haidong Zhang
,
Qiyue Yin
Optimization of Material Distribution Route Based on Green Logistics and Ant Colony Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 250-254
by
TianTian Xu
,
Ying Zhang
,
TianMei Chen
,
ChenXi Yu
Research on Delivery Mode of Fresh E-commerce Under Uncertain Delivery-pickup Time
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-260
by
Yanchun Wan
,
Zhongli Tang
Solving VRPTW Problem Based on Improved Drosophila Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-264
by
Pang Biao
,
Zheng Ru Qiu
,
Luo Sheng Jie
Combined Image Enhancement for Recyclable Waste Object Detection In Low-Light Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-269
by
Junshen Zhang
,
Li Kang
Construction of a hybrid education system based on global optimization algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-274
by
Tao Jiang
HDR image identification network based on edge difference
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Rongsong Yang
,
Hui Zeng
,
Kun Yu
,
Anjie Peng
Research on Financial Risk Prediction Method of Listed Companies Based on GA-RBF Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-285
by
Fen Yuan
Research on Recognition Algorithm of Industrial Instrument Based on Convolutional Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-290
by
Qiang Zhou
,
ShanShan Li
,
Lu Jin
,
Kun Yao
,
GuoChang Zhang
Research on safety detection of power terminal based on neural network
Full-text access may be available. Sign in or learn about subscription options.
pp. 291-295
by
HongZhang Xiong
,
DaPeng Zhou
Research on Time-Anchored Law Enforcement Video Correlation Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-300
by
Wei Jiang
Security protection strategy of power terminal based on deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-305
by
RongYan Cai
,
Yong Cheng
,
YongLiang Jia
Synergistic Effect Research of K-modes Algorithm in the Evaluation of Physical Education Teaching
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-310
by
Xue Wang
Temperature Recognition of Infrared Temperature Map Based on Improved BP Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-315
by
Qiang Zhou
,
Jia Yue Sun
,
XueYing Xu
,
Xun Fu
,
Zhong Yuan Zhou
A Real-Time Comparative Analysis Method of Lift Coefficient for Artificial Ice Flight Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-318
by
Yi Wang
An Adaptive GViT for Gas Mixture Identification and Concentration Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-323
by
Ding Wang
,
Wenwen Zhang
Development planning of complex equipment based on cumulative prospect theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-330
by
Biaobiao Qiu
,
Yajie Dou
,
Ziyi Chen
,
Kewei Yang
,
Jiang Jiang
Establishment of Shipping Container Price Prediction Model for International Trade
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
LiYuan Fang
An evaluation system of informatization level in Jinan suburban counties under the background of smart city construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Ruoqi Wang
GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-346
by
Kai Sun
,
Kun Meng
,
Ziqiang Zheng
Research on Security Service Model of Software Defined Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-351
by
Lei Wang
,
SiJiang Xie
,
Can Cao
,
Chen Li
Transmission Line Modeling Based on 3D Laser Scanning Point Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-356
by
ZhaoQing Jiang
,
ZhiZhou Shang
,
ShengXiang Ji
,
YuPeng Wang
,
Xing Zhang
Benchmark Research on Computing Performance of Domestic General-purpose Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-362
by
Bowen Liu
,
Kefeng Fan
,
Hai Chen
,
Lixin Liu
,
Huihua Yang
Big Data Storage Index Mechanism Based on Hierarchical Indexing and Concurrent Updating
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Bowen Yan
,
Yang Yang
,
Wei Guo
,
Zhaoguo Zhou
,
Hongwu Wen
,
Zhenyuan Xu
,
Yaobin Wang
Design of A Programmable PCI-E Encryption System Based on RISC-V
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-373
by
Liu Lu
Research on the Construction and Usage of University History Image Data Database Based on Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-378
by
YunFeng Ye
,
XianLong Chen
Author Index
Freely available from IEEE.
pp. 381-383
Showing 84 out of 84