IEEE Open Journal of the Computer Society, Vol. 4, 2023
Table of Contents
1.) An Efficient Connected-Component Labeling Algorithm for 3-D Binary Images. --Xiao Zhao, Yuyan Chao, Hui Zhang, Bin Yao, Lifeng He
2.) SC-FGCL: Self-Adaptive Cluster-Based Federal Graph Contrastive Learning. --Tingqi Wang, Xu Zheng, Lei Gao, Tianqi Wan, Ling Tian
3.) Multi-Robot Systems and Cooperative Object Transport: Communications, Platforms, and Challenges. --Xing An, Celimuge Wu, Yangfei Lin, Min Lin, Tsutomu Yoshinaga, Yusheng Ji
4.) Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. --Jiajing Wu, Kaixin Lin, Dan Lin, Ziye Zheng, Huawei Huang, Zibin Zheng
5.) Towards Area Efficient Logic Circuit: Exploring Potential of Reconfigurable Gate by Generic Exact Synthesis. --Liuting Shang, Azad Naeemi, Chenyun Pan
6.) Online Identification Method of Tea Diseases in Complex Natural Environments. --Senlin Xie, Chunwu Wang, Chang Wang, Yifan Lin, Xiaoqing Dong
7.) Blockchain-Aided Secure Semantic Communication for AI-Generated Content in Metaverse. --Yijing Lin, Hongyang Du, Dusit Niyato, Jiangtian Nie, Jiayi Zhang, Yanyu Cheng, Zhaohui Yang
8.) An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks. --Xinjie Zhu, Debiao He, Zijian Bao, Min Luo, Cong Peng
9.) A Unifying Mathematical Definition of Particle Methods. --Johannes Pahlke, Ivo F. Sbalzarini
10.) FLIS: Clustered Federated Learning Via Inference Similarity for Non-IID Data Distribution. --Mahdi Morafah, Saeed Vahidian, Weijia Wang, Bill Lin
11.) Blockchain-Based Decentralized Application: A Survey. --Peilin Zheng, Zigui Jiang, Jiajing Wu, Zibin Zheng
12.) Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey. --Yudong Li, Shigeng Zhang, Weiping Wang, Hong Song
13.) State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. --Noah L. Schrick,Peter J. Hawrylak
14.) A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes. --Xiao Wei, Muhammad Naveed Aman, Biplab Sikdar
15.) Promoting the Sustainability of Blockchain in Web 3.0 and the Metaverse Through Diversified Incentive Mechanism Design. --Daniel Mawunyo Doe, Jing Li, Niyato Dusit, Zhen Gao, Jun Li, Zhu Han
16.) Disjunctive Threshold Networks for Tabular Data Classification. --Weijia Wang, Litao Qiao, Bill Lin
17.) Reverse Self-Distillation Overcoming the Self-Distillation Barrier. --Shuiping Ni, Xinliang Ma, Mingfu Zhu, Xingwang Li, Yu-Dong Zhang
-------
-------
1.) An Efficient Connected-Component Labeling Algorithm for 3-D Binary Images. --Xiao Zhao, Yuyan Chao, Hui Zhang, Bin Yao, Lifeng He
2.) SC-FGCL: Self-Adaptive Cluster-Based Federal Graph Contrastive Learning. --Tingqi Wang, Xu Zheng, Lei Gao, Tianqi Wan, Ling Tian
3.) Multi-Robot Systems and Cooperative Object Transport: Communications, Platforms, and Challenges. --Xing An, Celimuge Wu, Yangfei Lin, Min Lin, Tsutomu Yoshinaga, Yusheng Ji
4.) Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities. --Jiajing Wu, Kaixin Lin, Dan Lin, Ziye Zheng, Huawei Huang, Zibin Zheng
5.) Towards Area Efficient Logic Circuit: Exploring Potential of Reconfigurable Gate by Generic Exact Synthesis. --Liuting Shang, Azad Naeemi, Chenyun Pan
6.) Online Identification Method of Tea Diseases in Complex Natural Environments. --Senlin Xie, Chunwu Wang, Chang Wang, Yifan Lin, Xiaoqing Dong
7.) Blockchain-Aided Secure Semantic Communication for AI-Generated Content in Metaverse. --Yijing Lin, Hongyang Du, Dusit Niyato, Jiangtian Nie, Jiayi Zhang, Yanyu Cheng, Zhaohui Yang
8.) An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks. --Xinjie Zhu, Debiao He, Zijian Bao, Min Luo, Cong Peng
9.) A Unifying Mathematical Definition of Particle Methods. --Johannes Pahlke, Ivo F. Sbalzarini
10.) FLIS: Clustered Federated Learning Via Inference Similarity for Non-IID Data Distribution. --Mahdi Morafah, Saeed Vahidian, Weijia Wang, Bill Lin
11.) Blockchain-Based Decentralized Application: A Survey. --Peilin Zheng, Zigui Jiang, Jiajing Wu, Zibin Zheng
12.) Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey. --Yudong Li, Shigeng Zhang, Weiping Wang, Hong Song
13.) State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. --Noah L. Schrick,Peter J. Hawrylak
14.) A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes. --Xiao Wei, Muhammad Naveed Aman, Biplab Sikdar
15.) Promoting the Sustainability of Blockchain in Web 3.0 and the Metaverse Through Diversified Incentive Mechanism Design. --Daniel Mawunyo Doe, Jing Li, Niyato Dusit, Zhen Gao, Jun Li, Zhu Han
16.) Disjunctive Threshold Networks for Tabular Data Classification. --Weijia Wang, Litao Qiao, Bill Lin
17.) Reverse Self-Distillation Overcoming the Self-Distillation Barrier. --Shuiping Ni, Xinliang Ma, Mingfu Zhu, Xingwang Li, Yu-Dong Zhang
-------
-------
Xiao Zhao - Personal Name
Weijia Wang - Personal Name
Daniel Mawunyo Doe - Personal Name
Xiao Wei - Personal Name
Noah L. Schrick - Personal Name
Yudong Li - Personal Name
Peilin Zheng - Personal Name
Mahdi Morafah - Personal Name
Johannes Pahlke - Personal Name
Xinjie Zhu - Personal Name
Yijing Lin - Personal Name
Senlin Xie - Personal Name
Liuting Shang - Personal Name
Jiajing Wu - Personal Name
Xing An - Personal Name
Tingqi Wang - Personal Name
Shuiping Ni - Personal Name
Weijia Wang - Personal Name
Daniel Mawunyo Doe - Personal Name
Xiao Wei - Personal Name
Noah L. Schrick - Personal Name
Yudong Li - Personal Name
Peilin Zheng - Personal Name
Mahdi Morafah - Personal Name
Johannes Pahlke - Personal Name
Xinjie Zhu - Personal Name
Yijing Lin - Personal Name
Senlin Xie - Personal Name
Liuting Shang - Personal Name
Jiajing Wu - Personal Name
Xing An - Personal Name
Tingqi Wang - Personal Name
Shuiping Ni - Personal Name
Vol. 4, 2023
2644-1268
e-Journal PTI
Inggris
IEEE Xplore
2023
United States of America
279 hlm
LOADING LIST...
LOADING LIST...