邢唷> IM  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHKLNRoot Entry FPX]fGJWorkbook拲ETExtDataZSummaryInformation(   羳\pjsy Ba==`WT$8@"1媅SO1媅SO1媅SO1媅SO1.Times New Roman1wiSO1wiSO1Arial1媅SO1>媅SO1媅SO1 媅SO1 媅SO1$媅SO18媅SO1 媅SO1h8媅SO1媅SO1,8媅SO18媅SO1?媅SO14媅SO1 媅SO14媅SO1媅SO1媅SO1<媅SO1.Times New Roman1Arial1wiSO1wiSO+""#,##0;""\-#,##05""#,##0;[Red]""\-#,##07""#,##0.00;""\-#,##0.00A""#,##0.00;[Red]""\-#,##0.00i*2_ ""* #,##0_ ;_ ""* \-#,##0_ ;_ ""* "-"_ ;_ @_ W))_ * #,##0_ ;_ * \-#,##0_ ;_ * "-"_ ;_ @_ y,:_ ""* #,##0.00_ ;_ ""* \-#,##0.00_ ;_ ""* "-"??_ ;_ @_ g+1_ * #,##0.00_ ;_ * \-#,##0.00_ ;_ * "-"??_ ;_ @_ /\$#,##0_);\(\$#,##0\)9\$#,##0_);[Red]\(\$#,##0\);\$#,##0.00_);\(\$#,##0.00\)E \$#,##0.00_);[Red]\(\$#,##0.00\)w9_ ""* #,##0.00_ ;_ ""* \-#,##0.00_ ;_ ""* \-??_ ;_ @_ g1_ ""* #,##0_ ;_ ""* \-#,##0_ ;_ ""* \-_ ;_ @_                   *   /  )    - +               P P      $    攆f7  /   ` a> * +    >    ,  -    9  $  .  .  1  ,  1  5  3  4   x@ @ x@ @ x@ @ 8^膲!20% - :_寚eW[湗r 32&20% - :_寚eW[湗r 3 搹eQ搹eQ!40% - :_寚eW[湗r 32'40% - :_寚eW[湗r 3頬頬!60% - :_寚eW[湗r 32(60% - :_寚eW[湗r 3  鑜蕬 鑜蕬!60% - :_寚eW[湗r 22$60% - :_寚eW[湗r 2 h槝 4h槝 4 f婮T噀,g f婮T噀,g h槝h槝!銐蕬'`噀,g 5銐蕬'`噀,g "h槝 1h槝 1 #h槝 2h槝 2!$60% - :_寚eW[湗r 12 60% - :_寚eW[湗r 1 %h槝 3h槝 3!&60% - :_寚eW[湗r 42,60% - :_寚eW[湗r 4 '搹鶴搹鶴 (梴梴)纇錱USCQ40% - :_寚eW[湗r 62340% - :_寚eW[湗r 6!?60% - :_寚eW[湗r 62460% - :_寚eW[湗r 6ccXTableStyleMedium2PivotStyleLight16` 渙簨噀VV40(|mC A@!  ;C 廭鱏簨噀槝顅裇h R ThQ钀\O覻 TBh5u抍 TdELMo4m6A: a contextual language embedding-based predictor for detecting RNA N6-methyladenosine sitesAIEEE/ACM Transactions on Computational Biology and Bioinformatics-Yongxian Fan*, Guicong Sun, and Xiaoyong Pan*V Multi granularity Hierarchical Feature Extraction forQuestion Answering Understanding56>?Cognitive Computation鎦tQ齎 hTZ 臑BhOe Ng蔕*5 FSDA:FlexibleSubsetDataAggregationforSmartGrid&'*+01 IEEESystemsJournal   _=N枠 R芲乕|Analysis and Improvement of an Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in VANETs乭hg^ R芲乕8 PPRP:Preserving-PrivacyRoutePlanningSchemeinVANETs'(./12' ACMTransactionsonInternetTechnology乭hg^ R芲乕 Brij B. GuptapMulti-task generative adversarial learning for nuclei segmentation with dual attention and recurrent convolution(Biomedical Signal Processing and ControlNHuadeng Wang(jlNS{v), Guang Xu, Xipeng Pan*, Zhenbing Liu, Rushi Lan, Xiaonan LuoVAttention-Inception-based U-Net for Retinal Vessel Segmentation with Advanced Residual$Computers and Electrical Engineering^Huadeng Wang(jlNS{v), Guang Xu, Xipeng Pan*, Zhenbing Liu, Ningning Tang, Rushi Lan*, Xiaonan LuoZ LightweightSecureDetectionServiceforMaliciousAttacksinWSNwithtimestamp-basedMAC  $%()23:;=>ABFGVW3IEEE Transactions on Network and Service ManagementU ZhongyiZhai GuibingLai,BoCheng JunyanQian LingzhongZhao,JinsongWu, Zhiguo, Wan()78=>EF^Continually Detection, Rapidly React: Unseen Rumors Detection based on Continual Prompt-Tuning[Proceedings of the 29th International Conference on Computational Linguistics (COLING 2022) 鎉塻Vf 1gO !咠V8lF Multi-scale error feedback network forlow-lightimageenhancement  &'*+45:;! NeuralComputingandApplications睌z _l齦沵* UO塻wZ _\ _lNa頂觺Tyr乢瀀:_孴Y:\a譙螒剉NOgq顅h纇Km梴:gxvzN裇U\_l齦沵 0NUx 睌z 杸競 _\ wThe Weighted Cross-Modal Attention Mechanism With Sentiment Prediction Auxiliary Task for Multimodal Sentiment AnalysisJJournal of IEEE/ACM Transactions on Audio, Speech, and Language Processing(Qiupu Chen Guimin Huang臑BhOe Yabing WangRAutomatically Constructing a Fine-Grained Sentiment Lexicon for Sentiment Analysis Journal of Cognitive ComputationFYabing Wang Guimin Huang臑BhOe Maolin Li Yiqun Li Xiaowei Zhang Hui LiKQuality-Driven Video Streaming for Ultra-Dense OFDMA Heterogeneous NetworksComputer Networks%臑IQn, R鷁f, Baoxian Zhang, and Cheng Li;Influence-Aware Successive Point-of-Interest Recommendation World Wide Web JournalDXinghe Cheng, Ning Li, Gulsim Rysbayeva, Qing Yang, Jingwei Zhang(*)QAttention mechanism and adaptive convolution actuated fusion network for next POI,International Journal of Intelligent Systems:Qing Yang, Shiyan Hu, Wenxiang Zhang, and Jingwei Zhang(*)N蛓癳剉JS裿cwR_硚翉鹹f[`NFh秅Co-Transfer 噀蕍l, XT哢, YO*俉A Queue Waiting Cost-Aware Control Model for Large Scale Heterogeneous Cloud Datacenter&IEEE TRANSACTIONS ON CLOUD COMPUTING, :Weihua Bai , Jiaxian Zhu, Shaowei Huang, and Huibing ZhangbFrequency separation-based multi-scale cascading residual block network for image super resolution!MULTIMEDIA TOOLS AND APPLICATIONSLiu, ZB; Yuan, L; Sun, L;`Diagnosis of Alzheimer's disease via an attention-based multi-scale convolutional neural networkKNOWLEDGE-BASED SYSTEMS3Liu, ZB; Lu, HX; Pan, XP; Xu, MC; Lan, RS; Luo, XN;OIDMBS: An Interactive System to Find Interesting Co-location Patterns Using SVM DASFAA 20224Liang Chang, Yuxiang Zhang, Xuguang Bao, Tianlong GuWOIIKM: A System for Discovering Implied Knowledge from Spatial Datasets Using Ontology.0Liang Chang, Long Wang, Xuguang Bao, Tianlong Gu)Mining Non-Redundant Co-Location Patterns/IEEE Trans. Neural Networks Learn. Syst TNNLS HXuguang Bao, Jinjie Lu, Tianlong Gu, Liang Chang, Zhoubo Xu, Lizhen Wang_Knowledge-Based Interactive Postmining of User-Preferred Co-Location Patterns Using Ontologies. IEEE Trans. CybernTCYB 9Xuguang Bao, Tianlong Gu, Liang Chang, Zhoubo Xu, Long Li;Behavior-based Ethical Unders< tanding in Chinese Social News  IEEE Trans. Affec. Comp (TAFFC)/Xuan Feng, Tianlong Gu, Xuguang Bao and Long Li]Provable data deletion from efficient data integrity auditing and insertion in cloud storage Computer Standards & Interfaces9Changsong Yang(hg f~g), Yueling Liu, Feng Zhao, Shubin ZhangREfficient data transfer supporting provable data deletion for secure cloud storageSoft Computing+Changsong Yang(hg f~g), Yueling Liu, Yong DingOA BIPMU-based network security situation assessment method for wireless network6 Ziyi Liu, Changsong Yang(hg f~g), Yueling Liu, Yong Ding\Publicly verifiable outsourced data migration scheme supporting efficient integrity checking,Journal of Network and Computer Applications7Changsong Yang(hg f~g), Feng Zhao, Xiaoling Tao, Yong Wang`Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles Ad Hoc Networks`Xiaoling Tao, Yang Peng, Feng Zhao, Changsong Yang(hg f~g), Baohua Qiang, Yufeng Wang, Zuobin XiongMHiding Multiple Images into a Single Image via Joint Compressive AutoencodersPattern RecognitionVXiyao Liu, Ziping Ma, Zhihong Chen, Fangfang Li, Ming Jiang, Gerald Schaefer, Hui FangMDIBR Zero-watermarking based on Invariant Feature and Geometric RectificationIEEE MultimediaAXiyao Liu, Yayun Zhang, Sibo Du, Jian Zhang, Ming Jiang, Hui Fang=Binary Representation via Jointly Personalized Sparse HashingJACM Transactions on Multimedia Computing, Communications, and ApplicationsZXiaoqin Wang, Chen Chen, Rushi Lan, Licheng Liu, Zhenbing Liu, Huiyu Zhou, and Xiaonan Luo7Label Guided Discrete Hashing For Cross-Modal Retrieval7IEEE Transactions on Intelligent Transportation Systems;Rushi Lan, Yu Tan, Xiaoqin Wang, Zhenbing Liu, Xiaonan Luo*jGwPFV: A novel packet forwarding verification mechanism based on gateways in SDN-based storage environment2 Journal of Information Security and Applications%Liu Yuming,WangYong,FengHao,Wang ZeyuAn adaptive read/write optimized algorithm for Ceph heterogeneous systems via performance prediction and multi-attribute decision makingCluster ComputingZhike Li, Yong Wang]On self-adaptive stochastic ranking in decomposition many-objective evolutionary optimizationNeurocomputing Li Li, Guangpeng Li, Liang ChangYConsidering Fine-Grained and Coarse-Grained Information for Context-Aware RecommendationsThe Computer JournalIYiqin Luo, Yanpeng Sun, Liang Chang, Tianlong Gu, Chenzhong Bin, Long Li*lQs^:ghVf[`N俰鮛0R恎N緥梴:gf[銼)Y櫉, Ng櫉*, 8^甆, WIN4t>yQ軂-N#崘柫yOSFU剉zf齹SOL:N龔#xvzo忲Nf[銼)Y櫉, 輴餦,Ng櫉*, Ngvfvf, 8^甆鶺嶯:_Sf[`N剉&Otzf齹SO瓔脋筫誰銼)Y櫉,貧ga,Ng櫉*,S韊IQ,Ng慛墢^Modeling personalized representation for within-basket recommendation based on deep learning. "Expert Systems With Applications. 0Miao Li, Xuguang Bao, Liang Chang*, Tianlong Gu.MA Review of Deep Learning-Based Recommender System in E-learning EnvironmentsArtificial Intelligence Review.1Tieyuan Liu, Qiong Wu, Liang Chang*, Tianlong Gu.GMSDAMulti-subset Data Aggregation Scheme without Trusted Third Party. Frontiers of Computer Science4Zhixin Zeng, Xiaodi Wang, Yining Liu, Liang Chang*. RA Robust and Optional Privacy Data Aggregation Scheme for Fog-Enhanced IoT NetworkIEEE Systems Journal'Zhixin Zeng, Yining Liu, Liang Chang*. 燫:_{|+RsQ鹼剉淨\Oirea螾韹INRrR-N齎螾b_f[c刢冘 l氳*t Ra Ng銺駛 鶺嶯kd-MDD 剉鰁廭'}裃h:y Ng銺駛 3uO:_ c刢冘^HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems Computers & Security2022 N anan Li, Tao Qin, Yongzhong Huang,", Jinghong Lan, ZanHao Liang, Tongtong Geng"#RA span-sharing joint extraction framework for harvesting aspect sentiment tripletsKnowledge-Based SystemsNgO 梘宮N 梘\qf 8^甆 _OuQRSpan-based relational graph transformer network for aspect opinion pair extraction!Knowledge and Information SystemsNgO 媠厤:_ 梘\qf 梘宮N 8^甆2Learning hash index based on a shallow autoencoderApplied Intelligence 梘\qf 臑ck済 NgO5A Scalable Lightweight RDF Knowledge Retrieval SystemTInternational Conference on Database Systems for Advanced Applications (DASFAA 2022) 梘\qf 筫R癳 媱 gsO NgO梶質茤Y顅hv^L坁\'`{梴誰qSMR蹚,O涚~O,銼)Y櫉,8^甆,噀蕍l.hCluster-based spatiotemporal dual self-adaptive network for short-t<werm subway passenger flow forecastingAPPLIED INTELLIGENCE4qSMR蹚,睈8lR`,噀蕍l Wei, Qianjin; Qiu, Yongheng ; Wen, YiminyPublic Key Encryption with Authorized Equality Test on Outsourced Ciphertexts for Cloud-Assisted IoT in Dual Server Model,Wireless Communications and Mobile Computing>Meng Zhao, Yong Ding, Shijie Tang, Hai Liang(乭wm), Huiyong Wang^Label only membership inference attacks on machine unlearning without dependence of posteriorsMZhaobo Lu, Hai Liang(乭wm), Minghao Zhao, Qingzhe Lv, Tiancai Liang, Yilei WangJAn intelligent forecast for COVID 19 based on single and multiple featuresSYilei Wang, Yiting Zhang, Xiujuan Zhang, Hai Liang(乭wm), Guangshun Li, Xiaoying Wang鶺嶯IPv6Q軂剉鹹≧顅h2枴_N繈顣6R崌T2枻b筫誰Ng/c嘯, N荝, 亪筫, _f鶺嶯:SWW剉淨NirTQ颯酧痭恘SO鹼酧o`塠hQf[H&曪 W梍鳾 UHT蔕 Uhf N荝錧N6R鹼邁sQ.暷~鯪塠hQ螛i桙~饛 Q軂N酧o`塠hQf[U隭pg,亪筫,Ng蔕,N荝,媠O荝?Meta Multi-task Nuclei Segmentation with Fewer Training SamplesMedical Image AnalysisChu Han, Huasheng Yao, Bingchao Zhao, Zhenhui Li, Zhenwei Shi, Lei Wu, Xin Chen, Jinrong Qu, Ke Zhao, Rushi Lan*, Changhong Liang*, Xipeng Pan*, Zaiyi Liu*VAttention-inception-based U-Net for retinal vessel segmentation with advanced residual"Computers & Electrical EngineeringYHuadeng Wang, Guang Xu, Xipeng Pan*, Zhenbing Liu, Ningning Tang, Rushi Lan*, Xiaonan LuoAutomated whole-slide images assessment of immune infiltration in resected non-small-cell lung cancer: towards better risk-stratification!Journal of Translational MedicineHuan Lin#, Xipeng Pan#, Zhengyun Feng#, Lixu Yan#, Junjie Hua, Yanting Liang, Chu Han, Zeyan Xu, Yumeng Wang, Lin Wu, Yanfen Cui, Xiaomei Huang, Zhenwei Shi, Xin Chen, Xiaobo Chen, Qingling Zhang, Changhong Liang*, Ke Zhao*, Zhenhui Li*, Zaiyi Liu*WA survey on cross-media search based on user intention understanding in social networks Information Fusion@Shi Lei, Luo Jia, Zhu Chuangying, Kou Feifei,Gang Cheng, Xia LiuGNew construction of highly nonlinear resilient S-boxes via linear codesFRONTIERS OF COMPUTER SCIENCEHaixia Zhao ,Yongzhuang WeiHTwo secondary constructions of bent functions without initial conditionsDESIGNS CODES AND CRYPTOGRAPHYDZhao,Haixia;Wei,Yongzhaung ;Zhang,Fengrong;EnesPasalic; Nastja CepakbCuckoo search algorithm with fuzzy logic and Gauss Cauchy for minimizing localization error of WSNApplied Soft ComputingAXianfeng Ou, Meng Wu, Yuanyuan Pu, Bing Tu, Guoyun Zhang, Zhi* Xu   羳 D%X|鄧悏  d褚MbP?_*+%8&?'?(?)?" dXX??&U} @} A}  A} ADX@X@X@X@X@X@X@X@X@ X@ X@ X@ X@ X@X@X@X@X@X@X@X@X@X@X@X@X@X@X@X@X@X@X@ B B B B B~ C? C C C~ C?~ C@ C C C ~ C?~ C@ C C C ~ C?~ C@ C C C~ C?~ C@ C C C~ C?~ C@ C C C~ C?~ C@ C C C~ C?~ C @ C C C~ C?~ C"@ C C C~ C?~ C$@ C C C!~ C?~ C&@ C" C# C$~ C?~ C(@ C% C& C'~ C?~ C*@ C( C) C*~ C?~ C,@ C+ C, C-~ C?~ C.@ C. D/ C0~ C?~ C0@ C1 C2 C3~ C?~ C1@ C4 C# C5~ C?~ C2@ C6 C7 C8~ C@~ C3@ C9 C: C;~ C?~ C4@ C< C= C>~ C?~ C5@ C? C@ CA~ C?~ C6@ CB C@ CC~ C?~ C7@ CD CE CF~ C?~ C8@ CG CH CI~ C?~ C9@ CJ CK CL~ C@~ C:@ CM CN CO~ C?~ C;@ CP CQ CR~ C?~ C<@ CS CN CT~ C?~ C=@ CU CV CW~ C?~ C>@ CX CY CZ~ C?~ C?@ C[ C\ C]~ C@D@ lFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF X@!X@"X@#X@$X@%X@&X@'X@(X@)X@*X@+X@,X@-X@.X@/X@0X@1X@2X@3X@4X@5X@6X@7X@8X@9X@:X@;X@<X@=X@>X@?X@~ C@@ C^ C_ C`~ C@~ !C@@ !Ca !Cb !Cc~ !C?~ "CA@ "Cd "Ce "Cf~ "C?~ #CA@ #Cg #Ch #Ci~ #C?~ $CB@ $Cj $Ck $Cl~ $C?~ %CB@ %Cm %Cn %Co~ %C?~ &CC@ &Cp &Cq &Cr~ &C?~ 'CC@ 'Cs 'Ct 'Cu~ 'C?~ (CD@ (Cv (Cw (Cx~ (C?~ )CD@ )Cy )C# )Cz~ )C?~ *CE@ *C{ *C| *C}~ *C?~ +CE@ +C~ +C +C~ +C?~ ,CF@ ,C ,C ,C~ ,C?~ -CF@ -C -C -C~ -C?~ .CG@ .C .C .C~ .C?~ /CG@ /C /C# /C~ /C?~ 0CH@ 0C 0C 0C~ 0C?~ 1CH@ 1C 1C 1C~ 1C?~ 2CI@ 2C 2C 2C~ 2C?~ 3CI@ 3C 3C 3C~ 3C?~ 4CJ@ 4C 4C 4C~ 4C?~ 5CJ@ 5C 5Cw 5C~ 5C?~ 6CK@ 6C 6C 6C~ 6C?~ 7CK@ 7C 7C 7C~ 7C?~ 8CL@ 8C 8C2 8C~ 8C@~ 9CL@ 9C 9C2 9C~ 9C@~ :CM@ :C :C# :C~ :C?~ ;CM@ ;C ;C ;C~ ;C?~ <CN@ <C <C <C~ <C?~ =CN@ =C =C =C~ =C@~ >CO@ >C >C >C~ >C?~ ?CO@ ?C ?C ?C~ ?C@D@ lFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF@X@AX@BX@CX@~ @CP@ @C @C @C~ @C@~ AC@P@ AC AC AC~ AC?~ BCP@ BC BC BC~ BC?~ CC繮@ CC CC CC~ CC@ h<FFF痨lf鹪(  餖 hf 3 ]Fh! d NT餖 if 3 ]Fi! d NT餖 jf 3 ]Fj! d NT餖 kf 3 ]Fk! d NT餖 lf 3 ]Fl! d N>@<dFdA   ggD   .<~E 罙. 鄥燆鵒h珣+'迟0    ,8@HPx4TN薘1@2弘@≥fG@f=gMicrosoft Excel 胀諟.摋+,D胀諟.摋+,\   88KSOProductBuildVDocumentSummaryInformation8erKSOReadingLayoutICV2052-11.1.0.13703 !300509E84CD141A483E2B67972D68544