WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA最新文献

筛选
英文 中文
Multi-dimensional Data Quick Query for Blockchain-Based Federated Learning 基于区块链的联邦学习多维数据快速查询
Jiaxi Yang, Sheng Cao, Xiangli Peng, Xiong-da Li, Xiaosong Zhang
{"title":"Multi-dimensional Data Quick Query for Blockchain-Based Federated Learning","authors":"Jiaxi Yang, Sheng Cao, Xiangli Peng, Xiong-da Li, Xiaosong Zhang","doi":"10.1007/978-3-031-19211-1_43","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_43","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"15 1","pages":"529-540"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78825058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-View Pre-Trained Model for Code Vulnerability Identification 代码漏洞识别的多视图预训练模型
Xuxia Jiang, Yinhao Xiao, Jun Wang, Wei Zhang
{"title":"Multi-View Pre-Trained Model for Code Vulnerability Identification","authors":"Xuxia Jiang, Yinhao Xiao, Jun Wang, Wei Zhang","doi":"10.48550/arXiv.2208.05227","DOIUrl":"https://doi.org/10.48550/arXiv.2208.05227","url":null,"abstract":". Vulnerability identification is crucial for cyber security in the software-related industry. Early identification methods require significant manual efforts in crafting features or annotating vulnerable code. Although the recent pre-trained models alleviate this issue, they over-look the multiple rich structural information contained in the code it-self. In this paper, we propose a novel Multi-View Pre-Trained Model (MV-PTM) that encodes both sequential and multi-type structural information of the source code and uses contrastive learning to enhance code representations. The experiments conducted on two public datasets demonstrate the superiority of MV-PTM. In particular, MV-PTM improves GraphCodeBERT by 3.36% on average in terms of F1 score.","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"10 1","pages":"127-135"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81814012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On eliminating blocking interference of RFID unauthorized reader detection system RFID非授权读写器检测系统的阻断干扰消除研究
Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang
{"title":"On eliminating blocking interference of RFID unauthorized reader detection system","authors":"Degang Sun, Yue Cui, Siye Wang, Yanfang Zhang","doi":"10.1007/978-3-031-19208-1_49","DOIUrl":"https://doi.org/10.1007/978-3-031-19208-1_49","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"25 1","pages":"591-602"},"PeriodicalIF":0.0,"publicationDate":"2022-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73618795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MineSOS: Long-Range LoRa-Based Distress Gesture Sensing for Coal Mine Rescue MineSOS:基于远程lora的煤矿救援遇险手势感知
Yuqing Yin, Xiaojie Yu, Shouwan Gao, Xu Yang, Pengpeng Chen, Q. Niu
{"title":"MineSOS: Long-Range LoRa-Based Distress Gesture Sensing for Coal Mine Rescue","authors":"Yuqing Yin, Xiaojie Yu, Shouwan Gao, Xu Yang, Pengpeng Chen, Q. Niu","doi":"10.1007/978-3-031-19214-2_9","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_9","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"15 1","pages":"105-116"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74596776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons 基于重要神经元的低中毒率隐形后门攻击
Xiugui Yang, X. Qian, Rui Zhang, Ning Huang, Hui Xia
{"title":"Low-Poisoning Rate Invisible Backdoor Attack Based on Important Neurons","authors":"Xiugui Yang, X. Qian, Rui Zhang, Ning Huang, Hui Xia","doi":"10.1007/978-3-031-19214-2_31","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_31","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"23 1","pages":"375-383"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74680196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Time Utility Function Driven Scheduling Scheme for Managing Mixed-Criticality Traffic in TSN 一种时间效用函数驱动的TSN混合临界流量调度方案
Jinxin Yu, Changyan Yi, T. Zhang, Fang Zhu, Jun Cai
{"title":"A Time Utility Function Driven Scheduling Scheme for Managing Mixed-Criticality Traffic in TSN","authors":"Jinxin Yu, Changyan Yi, T. Zhang, Fang Zhu, Jun Cai","doi":"10.1007/978-3-031-19211-1_2","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_2","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"5 1","pages":"20-28"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75390840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kalman Filter Algorithm Based on Sheep Herding Optimization 基于羊群优化的卡尔曼滤波算法
Peng Wang, Junyi Zhang, Yuqi Zheng, Xiaohu Li, Yixin Li
{"title":"Kalman Filter Algorithm Based on Sheep Herding Optimization","authors":"Peng Wang, Junyi Zhang, Yuqi Zheng, Xiaohu Li, Yixin Li","doi":"10.1007/978-3-031-19214-2_27","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_27","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"73 1","pages":"330-342"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78213963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Efficiency and Quality of Image Caption Generation with CARU 利用CARU提高图像标题生成的效率和质量
Xuefei Huang, Wei Ke, Hao Sheng
{"title":"Enhancing Efficiency and Quality of Image Caption Generation with CARU","authors":"Xuefei Huang, Wei Ke, Hao Sheng","doi":"10.1007/978-3-031-19214-2_38","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_38","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"41 1","pages":"450-459"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84368653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Anti-manipulation Incentive Mechanism Design for Multi-resource Trading in Edge-Assistant Vehicular Networks 边缘辅助车辆网络中多资源交易分布式反操纵激励机制设计
Dongyu Guo, Yubin Zhou, Shenggang Ni
{"title":"Distributed Anti-manipulation Incentive Mechanism Design for Multi-resource Trading in Edge-Assistant Vehicular Networks","authors":"Dongyu Guo, Yubin Zhou, Shenggang Ni","doi":"10.1007/978-3-031-19211-1_3","DOIUrl":"https://doi.org/10.1007/978-3-031-19211-1_3","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"88 1","pages":"31-43"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84073242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LF-DWNet: Robust Depth Estimation Network for Light Field with Disparity Warping LF-DWNet:具有视差扭曲的光场鲁棒深度估计网络
Yuxin Zhao, Zhenglong Cui, Rongshan Chen, D. Yang, Hao Sheng
{"title":"LF-DWNet: Robust Depth Estimation Network for Light Field with Disparity Warping","authors":"Yuxin Zhao, Zhenglong Cui, Rongshan Chen, D. Yang, Hao Sheng","doi":"10.1007/978-3-031-19214-2_24","DOIUrl":"https://doi.org/10.1007/978-3-031-19214-2_24","url":null,"abstract":"","PeriodicalId":89308,"journal":{"name":"WASA ... : International Conference on Wireless Algorithms, Systems, and Applications : proceedings. WASA","volume":"107 4 1","pages":"291-302"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72909757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信