


default search action
ACM TUR-C 2023: Wuhan, China
- Proceedings of the ACM Turing Award Celebration Conference - China 2023, ACM TURC 2023, Wuhan, China, July 28-30, 2023. ACM 2023
- Baochun Li
, Ningxin Su
, Chen Ying
, Fei Wang
:
Plato: An Open-Source Research Framework for Production Federated Learning. 1-2 - Kun Kuang
:
Causal Inspired Trustworthy Machine Learning. 3-4 - Lifeng Fan
:
Towards Artificial Social Intelligence: A Hierarchical Computational Framework for Social Interaction Understanding. 5-6 - Xinwei Sun
:
Sparse Learning in AI: A Differential Inclusion Perspective. 7-8 - Wenjuan Han
, Haozhe Zhao
, Zefan Cai
:
Empowering MultiModal Models' In-Context Learning Ability through Large Language Models. 9-10 - Jiani Cao
, Chengdong Lin
, Yang Liu
, Kun Wang
, Zhenjiang Li
:
Poster: Gaze Tracking on Any Surface with Your Phone. 11-12 - Zheng Gong
, Zhenlin An
, Jingyu Tong
, Donghui Dai
, Lei Yang
:
Building the Future: Empowering Smart Structures with In-Concrete Backscatter Networks. 13-14 - Huanqi Yang
, Weitao Xu
:
Vehicle-Key: A Secret Key Establishment Scheme for LoRa-enabled IoV Communications. 15-16 - Zishang Chen
, Juan Li
:
Double Auction Mechanism Design in Federated Learning. 17-18 - Sicong Liu
, Xiaochen Li
, Zimu Zhou
, Bin Guo
, Yuan Xu
, Zhiwen Yu
:
MoEnlight: Energy-efficient and self-adaptive Low-light Video Stream Enhancement on Mobile Devices. 19-20 - Shan Cao
, Haiqin Hu
, Limin Jiang
, Yi Shi
, Zhiyuan Jiang
, Sheng Zhou
:
A Domain Specific Computing Architecture for Open 6G Baseband Signal Processing. 21-22 - Tianyu Wang
, Jia Liu
:
DenseNet-based RFID Grouping Protocols. 23-24 - Yan Zhao
:
The Research of Relevant Theory and Techniques for Spatial Crowdsourcing. 25-26 - Dongqi Cai
, Yaozong Wu
, Shangguang Wang
, Mengwei Xu
:
FedAdapter: Efficient Federated Learning for Mobile NLP. 27-28 - Xikai Sun
, Xu Wang
, Fan Dang
:
TSTSS: A Time-Sensitive Task Scheduling System for Multi-modal Industrial Internet of Things. 29-30 - Zhui Zhu
, Xu Wang
, Fan Dang
:
A Reference Architecture for Integrating Time-Sensitive Networking in Industrial Internet of Things. 31-32 - Fusang Zhang
, Beihong Jin
, Daqing Zhang
:
Ubiquitous Wireless Sensing - Theory, Technique and Application. 33-34 - Kai Niu
, Xuanzhi Wang
, Zhiyun Yao
, Fusang Zhang
, Si Cheng
, Yalan Jiang
, Daqing Zhang
:
How Target's Location and Orientation Affect Velocity Extraction Accuracy in WiFi Sensing Systems. 35-36 - Dan Xia
, Xiaolong Zheng:
Towards Symmetric Cross-technology Communication among Heterogeneous IoT Devices. 37-38 - Xingyu Feng
, Chengwen Luo
:
Cosen: Efficient Collaborative Sensing with Heterogeneous Neighboring IoT Devices. 39-40 - Xiaojian Liao
:
Revisiting the Storage Stack Design on Fast Storage and Network Hardware. 41-42 - Xingda Wei
, Rong Chen
, Haibo Chen
:
Microsecond-scale Datacenter Computing with Modern Networking. 43-44 - Youmin Chen
:
RDMA-enabled Distributed Persistent Memory System. 45-46 - Chen Zhang
, Guangyu Sun
, Zhenman Fang
, Peipei Zhou
, Jason Cong
:
Caffeine: Towards Uniformed Representation and Acceleration for Deep Convolutional Neural Networks. 47-48 - Zhuoran Song
, Naifeng Jing
, Xiaoyao Liang
:
PRADA: Point Cloud Recognition Acceleration via Dynamic Approximation. 49-50 - Ting Yao
, Jiguang Wan
, Ping Huang
, Yiwen Zhang
, Changsheng Xie
, Xubin He
:
GearDB: A GC-free Key-Value Store on HM-SMR Drives with Gear Compaction. 51-52 - Dong Du
, Yubin Xia
, Binyu Zang
, Haibo Chen
:
Heterogeneous Serverless Computing. 53-54 - Ruiting Zhou
, Jieling Yu
:
A Reinforcement Learning Approach for Minimizing Job Completion Time in Clustered Federated Learning. 55-56 - Weichen Zhang
, Fan Dang
, Xu Wang
:
Low-latency Deterministic Forwarding for Multi-modal Connection Using Time-Sensitive Networking. 57-58 - Weiting Zhang
, Ruibin Guo
, Dong Yang
, Chuan Zhang
:
DetCNCS: Deterministic Computing and Networking Convergence Scheduling. 59-60 - Dan Zhuo
, Jiawei Tang
, Yang Chen
, Shaobin Wang
, Xin Wang
:
Towards the Predictability of IPFS Nodes' Session Time Using Machine Learning. 61-62 - Yuben Qu
, Yuqian Jing
, Chao Dong
, Lei Zhang
, Qihui Wu
, Song Guo
:
Online Federated Learning for Air-Ground Edge Intelligence. 63-64 - Zixuan Chen
, Lei Shi
, Yongbo Gao
, Xuandong Liu
, Xin Ai
, Sen Liu
, Yang Xu
:
Augmenting Distributed AI Training with Loss-tolerant Transmission. 65-66 - Xiaolin Guo
, Zhaowu Huang
, Fan Sun
, Fang Dong
:
Enabling Adaptive Task Dispatching for Real-time Video Analytics in Uncertain Edge Environments. 67-68 - Bowen Zhou
, Jiangshan Hao
, Shucun Fu
, Wei Wang
, Siyu Tan
, Fang Dong
:
APFed: Attention-based Personalized Federated Learning in Model Heterogeneity Scenario. 69-70 - Haihan Zhang
, Haipeng Dai
:
Fixed Cameras Assisted UAVs Monitoring: Enhancing Monitoring Efficiency and Safety. 71-72 - Tuo Shi
:
Optimizing Concurrent Application Processing in IoT Edge Networks. 73-74 - Yuanjie Li
, Hewu Li
, Wei Liu
, Lixin Liu
, Yimei Chen
, Jianping Wu
, Qian Wu
, Jun Liu
, Zeqi Lai
:
A Case for Stateless Mobile Core Functions in Space. 75-76 - Yifan Xu
, Fan Dang
, Jingao Xu
:
A Framework for Industrial Identifier Addressing. 77-78 - Xiuzhen Guo
:
Towards Polymorphic Backscatter Radio Design. 79-80 - Songshi Dou
, Li Qi
, Zehua Guo
:
Maintaining QoS-aware and Resilient Path Programmability for Metaverse in SD-WANs. 81-82 - Jie Zhang
:
Experience Sharing: Research-Oriented Computing Education in Peking University. 83-84 - Yutong Liu
:
China's Nationwide Undergraduate CS Education Reforming Initiatives: the "101 plan". 85-86 - Zhirong Shen
:
The Synergistic Integration of Computer Education and Research. 87-88 - Zijie Zheng
, Siyao Han
, Weiqi Zhang
, Xingming Wang
, Chao Gong
:
Why and How to Teach Machine Learning in High School -A Practice in Bejing National Day School in China. 89-91 - Qiong Zeng
, Yunhai Wang
, Zhaohui Peng
:
Problem-Based Learning with the Interdisciplinary Academic and Industrial Projects for the Practical Data Analysis Course. 92-93 - Haipeng Qu
, Yaojun Hou
, Rongqian Zhou
:
Course Design and Tool Development for Functional Programming Integrating with Program Verification: from the Perspective of the Interactive Theorem Prover. 94-95 - Zhixin Guo
, Guanjie Zheng
, Xinbing Wang
, Chenghu Zhou
:
GeoImageCut: A Toolkit for Image Cut from Geoscience Literature. 96-97 - Weijun Zhu
, Yang Liu
:
Auxiliary Diagnosing Coronary Stenosis based on Machine Learning. 98-99 - Kai Guo
, Zhizun Qin
, Xiaodong Chen
, Haoran Wang
, Hanjiang Luo
:
An Informative Path Planning for Multi-granularity Collaborative Search via Multiple UAVs. 100-101 - Mingyue Shao
, Xiang Li
, Pengyan Dong
, Jiangang Liu
, Hanjiang Luo
:
UAV-based Mobile Acoustic Sink for Dynamic Communication Coverage via Multi-Agent Reinforcement Learning Approach. 102-103 - Gengjian Liao
, Qiyuan Wang
, Zhenni Feng
, Ruobing Jiang
:
How to Sell Crowdsensed Data to Share-Averse Data Consumers: A Reinforcement Learning Approach. 104-105 - Weijun Zhu
, Yang Liu
:
Approximate Automatic Verification and Formal Language Processing. 106-107 - Xiaoxuan Cao
, Chao Liu
:
UltraMOSAS: Monitor Obstructive Sleep Apnea Syndrome using Ultrasound. 108-109 - Keyong Hu
, Guoxiao Liu
, Xin Yang
:
Efficient Air Quality Imputation with Transformer. 110-111 - Qian Wei
, Zhaoyan Shen
:
Improving Blockchain Scalability from Storage Perspective. 112-113 - Qi Han
, Yingjian Liu
:
Multi-language Reverse Dictionary Model Based on Improved mBERT. 114-115 - Yanrong Hu
, Guoming Zhang
:
Poster: Intrusion Detection System Based on Federated Transfer Learning. 116-117 - Xiangyu Xu
, Hao Kong
, Jiadi Yu
:
Towards Robust Multi-user 3D Posture Tracking Through mmWave Signals. 118-119 - Haipeng Qu
, Feng Gao
, Yongguo Jiang
:
The Talent Cultivation System for Computer Science by integrating curriculum and industry practice through knowledge ability matrix. 120-121 - Yongguo Jiang
, Haipeng Qu
, Hao Su
, Hao Zhang
:
Construction of Hardware Course Group in New Engineering Computer Specialty Facing Complex Engineering Problems. 122-124 - Haitao Yuan
:
An Effective Deep Learning Model for Route Travel Time Estimation on A Road Network. 125-126 - Keyu Yang
, Yunjun Gao
, Yifeng Shen
, Baihua Zheng
, Lu Chen
:
DisMASTD: An Efficient Distributed Multi-Aspect Streaming Tensor Decomposition (Poster Abstract). 127-128 - Bo Tang
:
Towards Building The Next Generation Computation Engine. 129-130 - Renjie Xie
, Yixiao Wang
, Jiahao Cao
, Enhuan Dong
, Mingwei Xu
, Kun Sun
, Qi Li
, Licheng Shen
, Menghao Zhang
:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. 131-132 - Fenglu Zhang
, Baojun Liu
, Eihal Alowaisheq
, Jianjun Chen
, Chaoyi Lu
, Linjian Song
, Yong Ma
, Ying Liu
, Haixin Duan
, Min Yang
:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. 133-135 - Xiaozhen Lu
, Zhibo Liu
:
Safety Guide-Based Deep Reinforcement Learning for Network Security Applications. 136-137 - Pengfei Hu
, Wenhao Li
, Riccardo Spolaor
, Xiuzhen Cheng
:
mmEcho: A mmWave-based Acoustic Eavesdropping Method. 138-140 - Xuewei Feng
, Qi Li
, Kun Sun
, Yuxiang Yang
, Ke Xu
:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. 141-142 - Qichao Wang
, Huan Ma
, Wentao Wei
, Hangyu Li
, Changqing Zhang, Peilin Zhao
, Binwen Zhao
, Bo Hu
, Shu Zhang
, Bingzhe Wu
, Liang Chen
:
Attention Paper: How Generative AI Reshapes Digital Shadow Industry? 143-144 - Tiantian Liu
, Feng Lin
:
Exploiting a Benign Loudspeaker as Magnetic Backdoor for Practical Injection Attacks. 145-147 - Guoyi Ye
, Mengying Wu
, Geng Hong
, Min Yang
:
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets. 148-149 - Yan Meng
, Haojin Zhu
:
Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home. 150-151 - Hao Wu
:
APter: Privacy Enhancement in Deep Learning Services following Principle of Least Privilege. 152-153 - Zhenyu Yan
:
Towards Sensing Acoustic Cyber-Physical Coupling for Novel Mobile Systems. 154-155 - Minyuan Zhou
, Jiaqi Zheng
, Guihai Chen
, Wanchun Dou
:
An Efficient Approach for (Multi-)CDN Identification. 156-157 - Xiaochun Yang, Ke Zhang
, Zihao Yu:
Preliminary exploration of a competency model for open-source processor chip design talent. 158-159 - Shufeng Gong
, Song Yu
, Yanfeng Zhang
, Ge Yu
:
Accelerating Incremental Graph Processing by Layering Graph. 160-161 - Zhengyu Hua
, Yihao Zhang
, Long Yuan
:
Efficient distance-generalized (α, β)-core decomposition on bipartite graphs. 162-163 - Chunpeng Ge
, Willy Susilo
, Zhe Liu
, Joonsang Baek
, Xiapu Luo
, Liming Fang
:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. 164-165 - Lili Chen
, Ju Ren
, Yaoxue Zhang
:
Revolutionizing Wireless Connectivity with Cross-band Metasurfaces. 166-167

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.