.- Computer Modeling and Intelligent Information Technology.
.- Subgraph-based lightGBM to Detect Sybil Addresses Across Multiple Blockchain Platforms.
.- Knowledge Extraction for Commercial Aircraft Process Specification Based on LLM Generation Rules.
.- Robo-Advisors in Investment Management: Transforming Accessibility, Personalization, and Efficiency through Artificial Intelligence.
.- Wind speed prediction analysis based on machine learning in wind power generation.
.- Neural Network Visual System Oriented Image Quality Evaluation for Camera Modeling in Cooperative Automated Driving Simulation.
.- Research on the Application of Neural Networks in the Identification and Classification of Data Assets in Network Security Space.
.- A method of locating tropical cyclone center based on gaussian model.
.- Research on Virtualization-Based and Intelligently Guided Fuzzing Method for Industrial Control Systems Abstract.
.- Research and Practice of Dependency Parsing Based on Multiple Parser.
.- The Research on Traditional Chinese Medicine Identification Method Based on YOLOv8 Deep Learning Model.
.- Network Information Security and Anomaly Detection.
.- A malicious code propagation model based on IoT honeypot decoy technology.
.- A Framework Utilizing Deep Learning for Anomaly Detection in Propagation Model.
.- Network Malicious Attack Detection Based on Hierarchical Spatial Attention Mechanism.
.- Research on 5G Channel Reciprocity for Wireless Physical Layer Security.
.- Research on Network Anomaly Traffic Attack Detection.
.- Automated Locating and Isolating Attack Sources in Local Area Networks.
.- Network Security Protection Evaluation Method Based on Multi-source Information Fusion.
.- Intrusion Detection Based on the Combination of TMG-GAN and CNN-BILSTM-Attention.
.- A Blockchain-Based Secure Task Management Scheme for UAV Swarms.