skip to main content
10.1145/3472634acmotherconferencesBook PagePublication Pagesacm-turcConference Proceedingsconference-collections
ACM TURC '21: Proceedings of the ACM Turing Award Celebration Conference - China
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ACM TURC 2021: ACM Turing Award Celebration Conference - China ( ACM TURC 2021) Hefei China 30 July 2021- 1 August 2021
ISBN:
978-1-4503-8567-1
Published:
02 October 2021

Reflects downloads up to 24 Oct 2024Bibliometrics
research-article
Recognition Of Learners’ Personality Traits For Software Engineering Education

It is vital for educators to teach learners in accordance with their aptitude, which can be useful to help learners reach their full potential. Educators have been taking the Myers-Briggs Type Indicator (MBTI) as a powerful tool to understand the ...

research-article
Designing a Course of Programming Language Foundations that Closely Combines Practice

The Computer Science Curricula 2013 (CS2013) calls for undergraduate CS programs to expose their students to the models underlying different programming languages as well as the principles on which language features are defined, composed, and ...

research-article
Reliable and Secure Data Sharing in Decentralized Mobile Crowd Systems

Mobile crowd sensing (MCS) systems, which offer a great opportunity to fully take advantage of wisdom of the crowd, naturally benefits from low deployment cost and widely spatial coverage. Due to failure or risk caused by a central server, we study the ...

research-article
The Study Based On The Deep Learning For Indian Ocean Dipole (IOD) Index Predication

Indian Ocean Dipole (IOD) is a large-scale physical ocean phenomenon occurring in the Indian Ocean basin. IOD is of great help to predict El Niño-Southern Oscillation (ENSO). Predicting the occurrence of IOD is of great significance to the study of ...

research-article
Study On Long Term Sea Surface Temperature (SST) Prediction Based On Temporal Convolutional Network (TCN) Method

The short term and small-scale sea surface temperature prediction using deep learning has achieved good results. It is still an important challenge to obtain accurate large-scale and long-term SST predictions. In this study, we used a temporal ...

research-article
Open Access
Privacy-preserving Decentralized Federated Deep Learning

Deep learning has achieved the high-accuracy of state-of-the-art algorithms in long-standing AI tasks. Due to the obvious privacy issues of deep learning, Google proposes Federal Deep Learning (FDL), in which distributed participants only upload local ...

research-article
Fighting Adversarial Images With Interpretable Gradients

Adversarial images are specifically designed to fool neural networks into making a wrong decision about what they are looking at, which severely degrade neural network accuracy. Recently, empirical and theoretical evidence suggests that robust neural ...

research-article
Cross-chain Workflow Model Based on Trusted Relay

The development of blockchain technology has led to the emergence of a large number of blockchain systems for different domains. These blockchain systems present the problem of data isolation. Chain interoperability technology, that is, cross-chain ...

research-article
A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application

The Computing Curricula 2020 (CC2020) competence model raises a big challenge to cybersecurity education in terms of knowledge, skill and disposition. In this paper, we propose a competence-based three-layer cybersecurity education framework using an ...

research-article
A Passenger Flow Transfer Prediction Model for Collinear Stations Based on Connection Model of New Station

In order to solve the problem that the subway attracts less passenger flow, there are too many overlapping lines between the bus and the subway, resulting in traffic congestion of other conventional bus lines along the subway. For this reason, we take ...

research-article
Trusted-DNN: A TrustZone-based Adaptive Isolation Strategy for Deep Neural Networks

Deep neural network (DNN) models have been widely deployed on embedded and mobile devices in lots of application fields such as health care, face recognition, driver assistance, etc. These applications usually require privacy or trusted computing ...

research-article
EtherH: A Hybrid Index to Support Blockchain Data Query

As the underlying technology of cryptocurrency, blockchain is characterized by decentralization and immutability. It is considered as a new generation of disruptive technology. However, the underlying storage of blockchain only provides limited support ...

research-article
Ship Detection in Large-scale SAR Images Based on Dense Spatial Attention and Multi-level Feature Fusion

In recent years, ship detection in large-scale synthetic aperture radar (SAR) images attracts more attentions and becomes a research hotspot. But it still faces some challenges, such as strong interference of background noise and very small ship ...

research-article
Spatial and Dual-channel Temporal Convolution Networks: A Novel Method for Speed Forecasting

The prediction of real-time speed plays an important role in intelligent transportation system (ITS). However, it is a challenging work because of the serious spatial dependence and complex temporal dependence of traffic speed. In this paper, we ...

research-article
Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System

Intrusion detection system is a primary defense mechanism in aspect of protecting network security. Anomaly detection, as one of the most commonly used intrusion detection methods, plays a significant part in detecting the network traffic data. However,...

research-article
An Edge Server Placement Algorithm based on Genetic Algorithm

With the development of the Internet of Things (IOT) and 5th Generation Mobile Networks (5G), the data traffic generated by edge terminal devices has exploded. Traditional Cloud Computing (CC) technology cannot meet the business requirements of low ...

research-article
Information Security Risk Analysis of Intelligent Terminals in Electricity Information Collection System

Intelligent terminal information security risk analysis is of great significance to the safe operation of electricity information collection systems. Taking smart meters and load control/special transformer electricity information collection terminals ...

research-article
MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks

Deep Neural Networks (DNNs) are vulnerable to backdoor attacks where the adversary can inject malicious data during the DNN training. Such kind of attacks is always activated when the input is stamped with a pre-specified trigger which results in a pre-...

research-article
Efficient and Privacy-preserving Distributed Face Recognition Scheme via FaceNet

In recent years, with the development of deep learning techniques, face recognition has draw numerous attention in both academic and industrial. Meanwhile, it is also widely deployed in smart home and brings great conveniences in people’s life. However,...

research-article
Exploiting Temperature-Varied Voltage Fingerprints for In-vehicle CAN Intrusion Detection

The Controller Area Network (CAN) is the most commonly used in-vehicle protocol for reliable communication between Electronic Control Units (ECUs). Due to its broadcast nature and absence of message authentication mechanisms, CAN bus is vulnerable to ...

research-article
Model Fusion of LightGBM and SAKT for Knowledge Tracking

Knowledge tracking is to model the student’s learning interaction records so that we can evaluate the student’s learning state with relative accuracy and can adjust the students’ learning schedule appropriately or formulate a more reasonable learning ...

research-article
BSLKT: A Bagging Model with Self-Attention and LightGBM for Knowledge Tracing

Knowledge tracing(KT) is a hot topic in computer-supported education. It’s a task that can model a sequences of learning activities that students engage with, so as to trace the students’ continuously developing state of knowledge. One important ...

research-article
A Language Model for Intelligent Speech Recognition of Power Dispatching

The accuracy of power dispatching speech recognition system is related to the effect of language model. In order to improve the accuracy of power dispatching speech recognition, this paper proposes a class label language model based on double ...

research-article
Joint Offloading and Resource Allocation in Cooperative Blockchain-Enabled MEC System

Mobile edge computing (MEC) is regarded as an effective solution for processing computation-intensive tasks. Edge servers with limited resources which are deployed nearby mobile devices (MDs) suffer from many constraints than remote cloud, and relying ...

research-article
Chinese NER Using ALBERT and Multi-word Information

Recently, many Chinese Named Entity Recognition (NER) problems which utilize the character-based approach have a good performance, the character-based approach becomes the dominant current of the approaches, but there are two issues in the existing ...

research-article
Blockchain-based microgrid distributed power transaction model

Compared with the traditional centralized power transaction mode, the distributed power transaction in the microgrid has the advantages of high transaction efficiency, low transaction cost and high privacy, while the characteristics of the block-chain, ...

research-article
Trusted Data Interaction Technology Based on Alliance Chain

The current IP architecture is faced with scalability, security and dynamic problems, while the current DNS also has the problems of centralized management and server security. The defects of IP system make it unable to adapt to the current rapid ...

research-article
Open Access
Research on new energy trading system based on blockchain

With the rapid development of new energy industry, the new energy structure is gradually shifting from centralized system to distributed system. The problems of trust and fair trade have become increasingly prominent in traditional centralized energy ...

research-article
Adaptive VNF Scaling Approach with Proactive Traffic Prediction in NFV-enabled Clouds

Cloud computing and network function virtualization (NFV) are emerging as key technologies to meet different service requirements of users. With NFV, service providers can flexibly deploy network services on clouds, significantly improving user ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations