Sub Num |
Title |
2 |
Email Authentication using Bockchain |
3 |
Channel-TransCNN: An Intrusion Detection System based on Fusion CNN Channel Attention in a CNN-Transformer Hybrid Network |
5 |
Research on Stochastic Feature Selection Optimization Algorithm Fusing Symmetric Uncertainty |
6 |
Emotion Detection through Facial recognition |
7 |
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis |
9 |
Risk Analysis and Protection Suggestions for Artificial Intelligence Data Security |
11 |
An automated construction method for symmetric encryption round function models based on dynamic analysis |
12 |
An Encryption Algorithm Cycle Identification Method Based on Bit Execution |
13 |
StanceDigger: Achieving Efficient Text Stance Detection with Collaborative Attention and Consistent Learning |
16 |
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception |
17 |
An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling |
20 |
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features |
21 |
SDCRT: An Anonymous Communication Network Routing Algorithm Based on SDN Architecture |
22 |
Secure Two-party Newton Interpolation |
23 |
Bias Manipulation Attack of Federated Recommendation System |
24 |
A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions |
25 |
Identifying Data Breaches in Dark Web through Prompt Active Learning |
26 |
Trapping resource orchestration scheme based on electric power environment |
27 |
An Identity-Based Deniable Ring Signature Scheme Based on SM9 Signature Algorithm |
28 |
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding |
29 |
Research on automobile data security risk analysis based on TARA method |
31 |
Optimization Design of Network Attack and Defense Scenarios in Intelligent Clusters |
32 |
Spherical Hierarchical Knowledge Graph Embeddings for Cybersecurity Knowledge Graph Completion |
34 |
A Perturbation-Based Privacy Leakage Defense Method for Federal Learning |
35 |
An Aggregation Procedure Optimization Method by Leveraging Neighboring Prompt for GCN-based Knowledge Graph Completion Model |
36 |
P-meta: Prioritizing Test Inputs via Metamorphic Testing |
37 |
SEAD: Self-aware Adversarial Detection for Black-box Reinforcement Learning |
40 |
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid |
41 |
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web |
43 |
A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber range |
45 |
Enhancing Adversarial Robustness: A Novel Bayesian Uncertainty-Based Ensemble Learning Method |
48 |
Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT |
49 |
NEF-GGCN: Node-Edge Fusion Gated Graph Convolutional Networks For Skeleton-based Medical Action Recognition |
50 |
An Intelligent Retrieval System for Similar Information System Vulnerabilities Based on Knowledge Graph |
54 |
Causal Attention Group Recommendation Integrating Social Information |
55 |
Smart Grid Attack Region Partitioning Strategy Based on Node Importance |
56 |
Aligning Users across Social Networks Based on Hypergraph Embedding |
58 |
Automatic Classification Based on the LSTM-SiTGRU Model for Plaintext and Ciphertext |
59 |
Anonymous Smart Grid System Based on Revocable Ring Signatures |
60 |
Networked Vehicle Practices Based on Networked Firing Ranges |
62 |
Research on fault early warning of industrial control system based on TCN-MKELM |
64 |
Bibliometric Analysis of Large Language Model Artificial Intelligence Based on Knowledge Graphs |
65 |
An Input-Agnostic Hierarchical Deep Learning Model for Traffic Fingerprinting Based on Flow Serialization |
67 |
Visual malware classification and detection method based on convolutional neural network |
68 |
Research on liquid crystal display technology based on regional dynamic dimming algorithm |
69 |
Ultra-high deffnition video quality assessment method based on deep learning |
71 |
Incorporate Data Elements into the Digital Evaluation System of the NewEra |
72 |
Towards Blockchain Services Marketplace for More Efficient Blockchain Development |
73 |
Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research |
74 |
Hate Speech Detection in Network Perception Constrained Scenarios |
75 |
LLM & Bagging for 1-shot Joint IE |
77 |
Research on entity extrection method for rehabilitation medicine knowledge management |
78 |
An Early Detection Model of Prostate Cancer Based on MRI |
79 |
Exploration Study about the Effect of Mask Templates in Automated Program Repair |
80 |
Time Series Anomaly Detection Based on Normalized Flow and Bayesian Networks |
81 |
A Framework for Vietnamese Question-Answering in Law Domain |
82 |
HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network |
84 |
CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in Cybersecurity |
86 |
Encrypted Malicious Traffic Detection Based on Sample Selection Optimization and Data Augmentation |
88 |
SLX:A Multi-class Network Intrusion Detection Method on Stacking Boosting Algorithm |
89 |
Multiple Knowledge Graphs Semantic Interaction based on Graph Embedding and Matching Processing |
90 |
CloudNet:Building a Data-Plane for Anonymous Communication Networks Based on Cloud Services |
91 |
Conduit: An IPFS-based Hidden Access Channel for Mix-net |
92 |
Knowledge Points Semantic Classification Method based on Graph Embedding over Co-word Networks |
93 |
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection |
94 |
Research on Intrusion Detection of Industrial Control System Based on Adversarial Machine Learning |
95 |
Reputation based Adaptive Federated Learning in Medical Scenarios |
96 |
Weapon Target Assignment Based on Deep Q-learning |
98 |
ST-LadderNet: Spatial-Temporal Correlation Stepply Enhanced Deep Learning Model for Urban Traffic Predicting |
99 |
Leveraging LLM based Retrieval-Augmented Generation for Legal Knowledge Graph Completion |
101 |
Source localization based on community partition in early time |
103 |
Deep Learning-based Mortality Prediction of COVID-19 Patients with Cardiovascular Disease |
104 |
Multi-Behavior Hypergraph Contrastive-Enhanced Transformer for Recommender Systems |
105 |
The Ecological and Financial Impact Study of Electric Bus Transition |
106 |
A Novel Method for Honeypot Anti-Identification against Modbus Fuzz Testing in Industrial Control Systems |
107 |
Learning to Distinguish Entities Overlapping for Open Relation Extraction |
108 |
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks |
109 |
Node Fragility Reward Shaping Based on Reinforcement Learning in Intranet Penetration Scenario |
110 |
Knowledge Graph Construction in the Context of Traditional Chinese Medicine: A review |
112 |
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction |
137 |
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing |
154 |
Solution for prediction of customer behavior in call center systems |
155 |
A model for evaluating a digital transformation of rural areas of Mongolia |
168 |
Fairness of Large Music Models: From a Culturally Diverse Perspective |
173 |
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example |
177 |
A prognostic model based on five characteristic genes to predict the prognosis of patients with hepatocellular carcinoma. |
178 |
Single-cell RNA sequencing analysis reveals transcriptional dynamics of immune cells during ovarian cancer metastasis |
179 |
Generation of Synthetic Data for Sharing and Utilization in HealthCare Data |
181 |
Security and Privacy of Artificial Intelligence with Ethical Concerns |
182 |
Government data governance in the context of artificial intelligence |
188 |
Vehicle Network Intrusion Detection Based on K-nearest Neighbor Variational Autoencoder Using Contrastive Learning |
190 |
INN-based Robust JPEG Steganography Through Cover Coefficient Selection |
191 |
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government |
193 |
Deciphering Myopia: Insights From Single-Cell Data and Machine Learning Approaches |
197 |
Research on the construction of Industrial Internet security model based on PetriNet |
198 |
Digital Contracts: A Sustainable and Secure Solution for Modern Businesses - A Case Study of E-Geree.mn in Mongolia |
205 |
Data Augmentation Based on Word Importance and Deep Back-Translation for Low-Resource Biomedical Named Entity Recognition |
219 |
A new approach for non-contact, automated measurement of respiration rate using structured light |
232 |
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing |
236 |
Improving Skin Lesion Classification based on Fusion Multi-Learning Models |
240 |
LocatingGPT: A multi-modal document retrieval method based on retrieval-augmented generation |
243 |
Dynamic detection technology of encryption algorithm based on Pin |
253 |
Managing concurrent course selection requests in a web-based university management system |
260 |
Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia |
263 |
Enhancing IoT Security Using Convolutional Neural Network Model |
265 |
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges |
266 |
Feature Aggregation Network for Memory-Based Industrial Anomaly Detection |
268 |
A Relation Semantic Enhancement Method for Large Language Model Based Knowledge Graph Completion |
269 |
Enhancing CLAHE with Interval-Valued Fermatean Fuzziness for Robust Low-Light Image Enhancement |
270 |
Research on Classification Requirements and Technology of Cross-border Data in Free Trade Ports |
271 |
Cultural Heritage Education in the Metaverse |
272 |
A Universal Semantic-Based Method for Backdoor Attack |
293 |
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression |
347 |
Multi-agent Assignment via Growth Assignment Algorithms |
361 |
Defense Against Graph Injection Attack in Graph Neural Networks |
362 |
Research on Key Technologies of Intelligent Management Platform for Medical Care Objects Based on Internet of Things and Digital Twins |
363 |
Online Health Information Adoption Behavior of Chronic Disease Patients |
364 |
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet |
365 |
Knowledge Base-Guided Modeling of ICS Device Behavior for Status Prediction |
369 |
A Time-tightly Coupled UAV Control Scheduling Scheme |
370 |
Building an autonomous driving platform based on ROS and its safety analysis |
371 |
Analysis of Big Data Research Hotspots Based on Keyword Co-occurrence |