| Sub Num |
Title |
| 2 |
Email Authentication using Bockchain |
| 3 |
Channel-TransCNN: An Intrusion Detection System based on Fusion CNN Channel Attention in a CNN-Transformer Hybrid Network |
| 5 |
Research on Stochastic Feature Selection Optimization Algorithm Fusing Symmetric Uncertainty |
| 6 |
Emotion Detection through Facial recognition |
| 7 |
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis |
| 9 |
Risk Analysis and Protection Suggestions for Artificial Intelligence Data Security |
| 11 |
An automated construction method for symmetric encryption round function models based on dynamic analysis |
| 12 |
An Encryption Algorithm Cycle Identification Method Based on Bit Execution |
| 13 |
StanceDigger: Achieving Efficient Text Stance Detection with Collaborative Attention and Consistent Learning |
| 16 |
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception |
| 17 |
An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling |
| 20 |
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features |
| 21 |
SDCRT: An Anonymous Communication Network Routing Algorithm Based on SDN Architecture |
| 22 |
Secure Two-party Newton Interpolation |
| 23 |
Bias Manipulation Attack of Federated Recommendation System |
| 24 |
A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions |
| 25 |
Identifying Data Breaches in Dark Web through Prompt Active Learning |
| 26 |
Trapping resource orchestration scheme based on electric power environment |
| 27 |
An Identity-Based Deniable Ring Signature Scheme Based on SM9 Signature Algorithm |
| 28 |
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding |
| 29 |
Research on automobile data security risk analysis based on TARA method |
| 31 |
Optimization Design of Network Attack and Defense Scenarios in Intelligent Clusters |
| 32 |
Spherical Hierarchical Knowledge Graph Embeddings for Cybersecurity Knowledge Graph Completion |
| 34 |
A Perturbation-Based Privacy Leakage Defense Method for Federal Learning |
| 35 |
An Aggregation Procedure Optimization Method by Leveraging Neighboring Prompt for GCN-based Knowledge Graph Completion Model |
| 36 |
P-meta: Prioritizing Test Inputs via Metamorphic Testing |
| 37 |
SEAD: Self-aware Adversarial Detection for Black-box Reinforcement Learning |
| 40 |
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid |
| 41 |
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web |
| 43 |
A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber range |
| 45 |
Enhancing Adversarial Robustness: A Novel Bayesian Uncertainty-Based Ensemble Learning Method |
| 48 |
Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT |
| 49 |
NEF-GGCN: Node-Edge Fusion Gated Graph Convolutional Networks For Skeleton-based Medical Action Recognition |
| 50 |
An Intelligent Retrieval System for Similar Information System Vulnerabilities Based on Knowledge Graph |
| 54 |
Causal Attention Group Recommendation Integrating Social Information |
| 55 |
Smart Grid Attack Region Partitioning Strategy Based on Node Importance |
| 56 |
Aligning Users across Social Networks Based on Hypergraph Embedding |
| 58 |
Automatic Classification Based on the LSTM-SiTGRU Model for Plaintext and Ciphertext |
| 59 |
Anonymous Smart Grid System Based on Revocable Ring Signatures |
| 60 |
Networked Vehicle Practices Based on Networked Firing Ranges |
| 62 |
Research on fault early warning of industrial control system based on TCN-MKELM |
| 64 |
Bibliometric Analysis of Large Language Model Artificial Intelligence Based on Knowledge Graphs |
| 65 |
An Input-Agnostic Hierarchical Deep Learning Model for Traffic Fingerprinting Based on Flow Serialization |
| 67 |
Visual malware classification and detection method based on convolutional neural network |
| 68 |
Research on liquid crystal display technology based on regional dynamic dimming algorithm |
| 69 |
Ultra-high deffnition video quality assessment method based on deep learning |
| 71 |
Incorporate Data Elements into the Digital Evaluation System of the NewEra |
| 72 |
Towards Blockchain Services Marketplace for More Efficient Blockchain Development |
| 73 |
Cyber-Range: the Scientific Infrastructure for Cyberspace Security Research |
| 74 |
Hate Speech Detection in Network Perception Constrained Scenarios |
| 75 |
LLM & Bagging for 1-shot Joint IE |
| 77 |
Research on entity extrection method for rehabilitation medicine knowledge management |
| 78 |
An Early Detection Model of Prostate Cancer Based on MRI |
| 79 |
Exploration Study about the Effect of Mask Templates in Automated Program Repair |
| 80 |
Time Series Anomaly Detection Based on Normalized Flow and Bayesian Networks |
| 81 |
A Framework for Vietnamese Question-Answering in Law Domain |
| 82 |
HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network |
| 84 |
CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in Cybersecurity |
| 86 |
Encrypted Malicious Traffic Detection Based on Sample Selection Optimization and Data Augmentation |
| 88 |
SLX:A Multi-class Network Intrusion Detection Method on Stacking Boosting Algorithm |
| 89 |
Multiple Knowledge Graphs Semantic Interaction based on Graph Embedding and Matching Processing |
| 90 |
CloudNet:Building a Data-Plane for Anonymous Communication Networks Based on Cloud Services |
| 91 |
Conduit: An IPFS-based Hidden Access Channel for Mix-net |
| 92 |
Knowledge Points Semantic Classification Method based on Graph Embedding over Co-word Networks |
| 93 |
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection |
| 94 |
Research on Intrusion Detection of Industrial Control System Based on Adversarial Machine Learning |
| 95 |
Reputation based Adaptive Federated Learning in Medical Scenarios |
| 96 |
Weapon Target Assignment Based on Deep Q-learning |
| 98 |
ST-LadderNet: Spatial-Temporal Correlation Stepply Enhanced Deep Learning Model for Urban Traffic Predicting |
| 99 |
Leveraging LLM based Retrieval-Augmented Generation for Legal Knowledge Graph Completion |
| 101 |
Source localization based on community partition in early time |
| 103 |
Deep Learning-based Mortality Prediction of COVID-19 Patients with Cardiovascular Disease |
| 104 |
Multi-Behavior Hypergraph Contrastive-Enhanced Transformer for Recommender Systems |
| 105 |
The Ecological and Financial Impact Study of Electric Bus Transition |
| 106 |
A Novel Method for Honeypot Anti-Identification against Modbus Fuzz Testing in Industrial Control Systems |
| 107 |
Learning to Distinguish Entities Overlapping for Open Relation Extraction |
| 108 |
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex Networks |
| 109 |
Node Fragility Reward Shaping Based on Reinforcement Learning in Intranet Penetration Scenario |
| 110 |
Knowledge Graph Construction in the Context of Traditional Chinese Medicine: A review |
| 112 |
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction |
| 137 |
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing |
| 154 |
Solution for prediction of customer behavior in call center systems |
| 155 |
A model for evaluating a digital transformation of rural areas of Mongolia |
| 168 |
Fairness of Large Music Models: From a Culturally Diverse Perspective |
| 173 |
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example |
| 177 |
A prognostic model based on five characteristic genes to predict the prognosis of patients with hepatocellular carcinoma. |
| 178 |
Single-cell RNA sequencing analysis reveals transcriptional dynamics of immune cells during ovarian cancer metastasis |
| 179 |
Generation of Synthetic Data for Sharing and Utilization in HealthCare Data |
| 181 |
Security and Privacy of Artificial Intelligence with Ethical Concerns |
| 182 |
Government data governance in the context of artificial intelligence |
| 188 |
Vehicle Network Intrusion Detection Based on K-nearest Neighbor Variational Autoencoder Using Contrastive Learning |
| 190 |
INN-based Robust JPEG Steganography Through Cover Coefficient Selection |
| 191 |
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government |
| 193 |
Deciphering Myopia: Insights From Single-Cell Data and Machine Learning Approaches |
| 197 |
Research on the construction of Industrial Internet security model based on PetriNet |
| 198 |
Digital Contracts: A Sustainable and Secure Solution for Modern Businesses - A Case Study of E-Geree.mn in Mongolia |
| 205 |
Data Augmentation Based on Word Importance and Deep Back-Translation for Low-Resource Biomedical Named Entity Recognition |
| 219 |
A new approach for non-contact, automated measurement of respiration rate using structured light |
| 232 |
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing |
| 236 |
Improving Skin Lesion Classification based on Fusion Multi-Learning Models |
| 240 |
LocatingGPT: A multi-modal document retrieval method based on retrieval-augmented generation |
| 243 |
Dynamic detection technology of encryption algorithm based on Pin |
| 253 |
Managing concurrent course selection requests in a web-based university management system |
| 260 |
Implementing Unified Identity and Access Management System: Case Study for the National University of Mongolia |
| 263 |
Enhancing IoT Security Using Convolutional Neural Network Model |
| 265 |
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges |
| 266 |
Feature Aggregation Network for Memory-Based Industrial Anomaly Detection |
| 268 |
A Relation Semantic Enhancement Method for Large Language Model Based Knowledge Graph Completion |
| 269 |
Enhancing CLAHE with Interval-Valued Fermatean Fuzziness for Robust Low-Light Image Enhancement |
| 270 |
Research on Classification Requirements and Technology of Cross-border Data in Free Trade Ports |
| 271 |
Cultural Heritage Education in the Metaverse |
| 272 |
A Universal Semantic-Based Method for Backdoor Attack |
| 293 |
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression |
| 347 |
Multi-agent Assignment via Growth Assignment Algorithms |
| 361 |
Defense Against Graph Injection Attack in Graph Neural Networks |
| 362 |
Research on Key Technologies of Intelligent Management Platform for Medical Care Objects Based on Internet of Things and Digital Twins |
| 363 |
Online Health Information Adoption Behavior of Chronic Disease Patients |
| 364 |
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet |
| 365 |
Knowledge Base-Guided Modeling of ICS Device Behavior for Status Prediction |
| 369 |
A Time-tightly Coupled UAV Control Scheduling Scheme |
| 370 |
Building an autonomous driving platform based on ROS and its safety analysis |
| 371 |
Analysis of Big Data Research Hotspots Based on Keyword Co-occurrence |