Search Results - "2022 18th International Conference on Computational Intelligence and Security (CIS)"

Refine Results
  1. 1

    Research on Bitcoin price prediction based on Support Vector Regression and its variant combination model by Ma, Jiageng, Zhu, Yingjie, Xu, Jiani, Li, Yifan, Zhang, Youyao, Wang, Jie

    “…Bitcoin is one of the most successful cryptocurrencies, and research on Bitcoin price prediction is getting more and more attention. Previous studies have used…”
    Get full text
    Conference Proceeding
  2. 2

    Research and implementation of malicious traffic detection based on machine learning by Xu, Yongqiang, Zhao, Junfan, Wu, Jinting, Tang, Yinhao, Wang, Lei, Yao, Gang

    “…To detect and analyze malicious traffic accurately, a malicious traffic detection system is implemented by using machine learning algorithms and visualization…”
    Get full text
    Conference Proceeding
  3. 3

    Time-series prediction research based on combined prophet-LSTM models by Gao, Jungang

    “…Time series forecasting models are an important model for practical applications, and are some relatively complex class of modelling and forecasting problems…”
    Get full text
    Conference Proceeding
  4. 4

    A new multi-subpopulation co-evolutionary genetic algorithm for cloud resource scheduling by Li, Xunzhang, Wei, Shiwei, Ke, Jie, Zhou, Huiyi

    “…Cloud resource scheduling has become a hot spot in the field of cloud computing. The common method to deal with resource scheduling problem is to build an…”
    Get full text
    Conference Proceeding
  5. 5

    Docscanner: document location and enhancement based on image segmentation by Shan, Ziqi, Wang, Yuying, Wei, Shunzhong, Li, Xiangmin, Pang, Haowen, Zhou, Xinmei

    “…Document scanning aims to transfer the captured photographs documents into scanned document files. However, current methods based on traditional or key point…”
    Get full text
    Conference Proceeding
  6. 6

    A review of point cloud and image cross-modal fusion for self-driving by Ma, Nan, Xiao, Chuansheng, Wang, Mohan, Xu, Genbao

    “…Environmental perception for self-driving has become a hot topic in the domain of computer vision. The field has made great progress in the past decade, and…”
    Get full text
    Conference Proceeding
  7. 7

    Asset pricing models with machine-learning method by Zhang, Cancan, Zhang, Liangliang, Yang, Yajuan, Chen, Kongyan

    “…Traditional asset pricing theories and models are facing more and more challenges in empirical study. Machine learning provides a new tool for asset pricing…”
    Get full text
    Conference Proceeding
  8. 8

    Research on stock price prediction using TextRank based text summarization technology and sentiment analysis by Cui, Hengxuan, ZhU, Yingjie, Gu, Fangqing, Wang, Lianshuang

    “…News sentiment analysis is widely used in stock price forecasting, and the existing research is mostly limited to sentiment mining of news headlines, ignoring…”
    Get full text
    Conference Proceeding
  9. 9

    Research on the quality of graduate students in provincial universities based on entropy weight TOPSIS and RSR-take changchun university as an example by Zhu, Yingjie, Ma, Jiageng, Yang, Xiangqun, Wang, Yiwen, Li, Han, Wang, Dejun

    “…The quality of graduate students is one of the most important aspects that affect the quality of graduate education. This research builds a system of quality…”
    Get full text
    Conference Proceeding
  10. 10

    Convolutional neural network for automatic classification of copper alloy metallographs by Huang, Xueyu, Lin, Huimin, He, Huaiyu

    “…In view of the huge difference and complexity of copper alloy metallographs, and the time-consuming and high error rate of manual identification, the…”
    Get full text
    Conference Proceeding
  11. 11

    A novel match point mapping algorithm based on dominant point for large-scale mlcs problem by Wei, Shiwei, Zhao, Na, Li, Xunzhang, Zhao, Quanyou

    “…Finding the Multiple Longest Common Subsequences (MLCS) is a fundamental problem in many fields such as bioinformatics, computational genomics and pattern…”
    Get full text
    Conference Proceeding
  12. 12

    The knowledge modeling of bridge code for automated completeness checking by Xiao, Yang, Li, Zongjian, Zhao, Qin, Chen, Yaqin, Li, Hao

    “…Completeness checking of BrIM(Bridge Information Model) plays a critical role in identifying missing information according to standard documents and ensuring…”
    Get full text
    Conference Proceeding
  13. 13

    Talent structure fission and breakthrough led by fintech innovation by Xiao, Yun

    “…This paper investigates the industry talent demand and its changes under the leadership of Fintech innovation. The study shows that: (1) There is little change…”
    Get full text
    Conference Proceeding
  14. 14

    Tunnel abnormal sound recognition based on multi-channel convolutional neural network by Lang, Julin, Zheng, Sheng

    “…In order to improve the accuracy of sound detection for abnormal sound events in road tunnels, a multi-channel convolutional neural network model is designed…”
    Get full text
    Conference Proceeding
  15. 15

    Research on signal detection of civil UAV based on digital channelization by He, Wei, Zhou, Qiping, Zhang, Xinyi, Zhang, Bin, Xi, Junbo, Zhang, Li

    “…In view of the complexity of electromagnetic spectrum in urban environment, detecting the UAV data transmission and image transmission signals, and the high…”
    Get full text
    Conference Proceeding
  16. 16

    Prediction of daily patient visits in respiratory department using deep learning by Song, Xiaobo, Zhang, Xinyi, Wang, Xiaoli, Li, Yuan

    “…Since climate changes and air pollution have a direct impact on the number of emergency respiratory patients visited, in this paper, we study predicting…”
    Get full text
    Conference Proceeding
  17. 17

    Entrepreneurial traits, resource bricolage, and entrepreneurial opportunity identification: a grounded theory approach by Chen, Wenli, Wan, Wenshuang

    “…To investigate the resource pooling analysis model in entrepreneurial activities and provide reference suggestions for the growth of entrepreneurs and…”
    Get full text
    Conference Proceeding
  18. 18

    Location planning of electric vehicle charging stations based on a multi-objective three-level optimization model by Wang, Ping, Gu, Fangqing, Liu, Hailin

    “…The construction of electric vehicle (EV) charging stations (CSs) plays an important role in promoting the adoption of EVs. This paper mainly solves EVs'…”
    Get full text
    Conference Proceeding
  19. 19

    A differential privacy federated learning framework for accelerating convergence by Zhang, Yaling, Tang, Dongtai

    “…Federated Learning (FL) is a special distributed machine learning environment. It is jointly trained by many clients under the coordination of a central…”
    Get full text
    Conference Proceeding
  20. 20

    Research on the development limitations of adas under the intelligent trend of new energy vehicles by Xiao, Huijun, Ju, Chengxiao, Zhao, Jiuhong

    “…In order to assist and prevent driving behavior, ADAS employs a variety of sensors installed in the vehicle to sense environmental data. It is the only…”
    Get full text
    Conference Proceeding