Computer Science ›› 2026, Vol. 53 ›› Issue (4): 163-172.doi: 10.11896/jsjkx.250600205
• Database & Big Data & Data Science • Previous Articles Next Articles
LIU Dehua1, YU Saixuan2, QIAO Jinlan3, HUANG Heqing4, CHENG Wenhui1
CLC Number:
| [1]WU H.A survey of battery swapping stations for electric vehicles:Operation modes and decision scenarios[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(8):10163-10185. [2]KO H,PACK S,LEUNG V C M.An optimal battery charging algorithm in electric vehicle-assisted battery swapping environments[J].IEEE Transactions on Intelligent Transportation Systems,2020,23(5):3985-3994. [3]ZHOU E,LI Z,LIU D,et al.Balancing Electric Scooter Battery Swapping Network by Spatio-Temporal Recommendation[J].IEEE Transactions on Intelligent Transportation Systems,2024,25(12):21315-21326. [4]SARKER M R,PANDZIC H,ORTEGA-VAZQUEZ M A.Optimal operation and services scheduling for an electric vehicle battery swapping station[J].IEEE Transactions on Power Systems,2014,30(2):901-910. [5]CUI D,WANG Z,LIU P,et al.Operation optimization approaches of electric vehicle battery swapping and charging station:A literature review[J].Energy,2023,263:126095. [6]Xinhuanet.Writing the Digital Epic,Sharing the New Quality Future | China Tower Featured at the 2024 China International Fair for Trade in Services.[EB/OL].(2024-09-13)[2025-05-18]http://www.xinhuanet.com/info/20240913/f9e2190e701345969cb0fad08254c5b9/c.html. [7]WANG S,CHEN A,WANG P,et al.Short-term electric vehicle battery swapping demand prediction:Deep learning methods[J].Transportation Research Part D:Transport and Environment,2023,119:103746. [8]CHENG W,LU H,XIANG C,et al.Breaking ‘Chicken-Egg’:Cross-city Battery Swap Demand Prediction via Knowledge-guided Diffusion[C]//IEEE INFOCOM 2025-IEEE Confe-rence on Computer Communications.IEEE,2025:1-10. [9]CHATTERJEE S,HAZRA D,BYUN Y C.GAN-based syn-thetic time-series data generation for improving prediction of demand for electric vehicles[J].Expert Systems with Applications,2025,264:125838. [10]ZHANG Z,WANG L,LIU Y,et al.A GAN-Based EnsembleModel for Predicting the Demand of Shared Bikes in 5G Networks[J].IEEE Transactions on Intelligent Transportation Systems,2023,25(3):2869-2879. [11]CROITORU F A,HONDRU V,IONESCU R T,et al.Diffusion models in vision:A survey[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2023,45(9):10850-10869. [12]KANDWAL S,NEHRA V.A survey of text-to-image diffusion models in generative AI[C]//2024 14th International Confe-rence on Cloud Computing,Data Science & Engineering(Conf-luence).IEEE,2024:73-78. [13]LOVELACE J,KISHORE V,WAN C,et al.Latent diffusion for language generation[J].Advances in Neural Information Processing Systems,2023,36:56998-57025. [14]CHEN N,ZHANG Y,ZEN H,et al.Wavegrad:Estimating gradients for waveform generation[J].arXiv:2009.00713,2020. [15]KONG Z,PING W,HUANG J,et al.Diffwave:A versatile diffusion model for audio synthesis[J].arXiv:2009.09761,2020. [16]SOHL-DICKSTEIN J,WEISS E,MAHESWARANATHAN N,et al.Deep unsupervised learning using nonequilibrium thermodynamics[C]//International Conference on Machine Learning.PMLR,2015:2256-2265. [17]HO J,JAIN A,ABBEEL P.Denoising diffusion probabilisticmodels[J].Advances in Neural Information Processing Systems,2020,33:6840-6851. [18]SONG J,MENG C,ERMON S.Denoising diffusion implicit models[J].arXiv:2010.02502,2020. [19]DHARIWAL P,NICHOL A.Diffusion models beat gans onimage synthesis[J].Advances in Neural Information Processing Systems,2021,34:8780-8794. [20]LIN L,LI Z,LI R,et al.Diffusion models for time-series applications:a survey[J].Frontiers of Information Technology & Electronic Engineering,2024,25(1):19-41. [21]FONSECA J,BACAO F.Tabular and latent space synthetic data generation:a literature review[J].Journal of Big Data,2023,10(1):115. [22]YANG J,WU P,CONG G,et al.SAM:Database generationfrom query workloads with supervised autoregressive models[C]//Proceedings of the 2022 International Conference on Management of Data.2022:1542-1555. [23]GERMAIN M,GREGOR K,MURRAY I,et al.Made:Masked autoencoder for distribution estimation[C]//International Conference on Machine Learning.PMLR,2015:881-889. [24]XU L,SKOULARIDOU M,CUESTA-INFANTE A,et al.Modeling tabular data using conditional GAN[C]//Advances in Neural Information Processing Systems.2019. [25]GOODFELLOW I J,POUGET-ABADIE J,MIRZA M,et al.Generative adversarial nets[C]//Advances in Neural Information Processing Systems.2014. [26]KOTELNIKOV A,BARANCHUK D,RUBACHEV I,et al.Tabddpm:Modelling tabular data with diffusion models[C]//International Conference on Machine Learning.PMLR,2023:17564-17579. [27]THANH-TUNG H,TRAN T.Catastrophic forgetting andmode collapse in GANs[C]//2020 International Joint Confe-rence on Neural Networks(IJCNN).IEEE,2020:1-10. [28]MASSEY JR F J.The Kolmogorov-Smirnov test for goodness of fit[J].Journal of the American Statistical Association,1951,46(253):68-78. [29]CHEN T,ZHANG R,HINTON G.Analog bits:Generating discrete data using diffusion models with self-conditioning[J].ar-Xiv:2208.04202,2022. [30]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010. [31]PEDREGOSA F,VAROQUAUX G,GRAMFORT A,et al.Scikit-learn:Machine learning in Python[J].The Journal of Machine Learning Research,2011,12:2825-2830. [32]NICHOL A Q,DHARIWAL P.Improved denoising diffusionprobabilistic models[C]//International Conference on Machine Learning.PMLR,2021:8162-8171. [33]ZHAO Z,KUNAR A,BIRKE R,et al.CTAB-GAN+:Enhancing tabular data synthesis[J].Frontiers in Big Data,2024,6:1296508. [34]SATTAROV T,SCHREYER M,BORTH D.Findiff:Diffusion models for financial tabular data generation[C]//Proceedings of the Fourth ACM International Conference on AI in Finance.2023:64-72. [35]VERDÚ S.Total variation distance and the distribution of relative information[C]//2014 Information Theory and Applications Workshop(ITA).IEEE,2014:1-3. [36]BENESTY J,CHEN J,HUANG Y,et al.Pearson correlationcoefficient[M]//Noise reduction in speech processing.Berlin:Springer,2009:1-4. [37]YUAN J,ZHENG Y,XIE X.Discovering regions of differentfunctions in a city using human mobility and POIs[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2012:186-194. [38]VAN DER MAATEN L,HINTON G.Visualizing data using t-SNE[J].Journal of Machine Learning Research,2008,9(11):2579-2605. [39]DONG X,YU Z,CAO W,et al.A survey on ensemble learning[J].Frontiers of Computer Science,2020,14:241-258. |
| [1] | JIANG Zixian, YU Saixuan, HUANG Ruixue, SHEN Xin, HUANG Heqing. Vehicle-mounted Video Compression Algorithm for Collaborative Vehicle Crowdsensing [J]. Computer Science, 2026, 53(4): 308-317. |
| [2] | YIN Chuang, LIU Jianyi, ZHANG Ru. Cross-modal Fusion Few-sample Ransomware Classifier:Multimodal Encoding Based on Pre-trained Models [J]. Computer Science, 2026, 53(4): 435-444. |
| [3] | YANG Xin, GUO Yimin. Smart Medical Secure Authentication Protocol for Cloud and Fog Leakage Resistance [J]. Computer Science, 2026, 53(4): 454-468. |
| [4] | YANG Ruoxuan, JIN Feiyu, QU Lianwei, ZHOU Zijie, ZHENG Qibin, LI Zhenhua. A Serverless-based Approach to Fast Measurement of Network Bandwidth [J]. Computer Science, 2026, 53(3): 392-399. |
| [5] | ZHANG Xinfan, CHENG Baolei, FAN Jianxi, WANG Yan. Connectivity and Diagnosability of Data Center Network SWCube [J]. Computer Science, 2026, 53(3): 400-410. |
| [6] | CHANG Huiyan, HU Hongchao, ZHOU Dacheng, XU Depeng, CHENG Guozhen. Research Review of Application-based Covert Channel [J]. Computer Science, 2026, 53(3): 411-423. |
| [7] | CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2026, 53(1): 395-403. |
| [8] | CHEN Jiayi, GU Chengyi, ZHOU Jihua, ZHAO Tao, WANG Shuangchao, ZHU Mingxing, XIANG Chaocan. Cross-regional Battery Swapping Station Deployment Algorithm Based on Intelligent E-scooterFlow Generation [J]. Computer Science, 2025, 52(12): 71-80. |
| [9] | CHEN Haiyan. Efficient Clustering Routing Method for WSNs Based on Clone Reverse Learning Grey WolfOptimization Algorithm [J]. Computer Science, 2025, 52(12): 294-301. |
| [10] | SHI Junnan, CHEN Zemao, ZHANG Liqiang. Automatic Attack Path Discovery Method for Substation Remote Monitoring Network [J]. Computer Science, 2025, 52(12): 339-350. |
| [11] | LIANG Jianpeng, MO Xiuliang, WANG Pengxiang, WANG Huanran, WANG Chundong. Research on Malicious Domain Detection Based on Heterogeneous Graph Inductive Learning [J]. Computer Science, 2025, 52(12): 358-366. |
| [12] | CHEN Xianyi, ZHANG Chengjuan, QIAN Jiangfeng, GUO Qianbin, CUI Qi, FU Zhangjie. Highly Robust Model Structure Backdoor Method Based on Feature Distribution [J]. Computer Science, 2025, 52(12): 374-383. |
| [13] | WEI Zihan, MA Rongkuan, LI Beibei, YANG Yahui, LI Zhuo, SONG Yunkai. Firmware Recovery Based Emulation and Testing Method for Industrial Gateway [J]. Computer Science, 2025, 52(12): 411-418. |
| [14] | LU Bo, LYU Xiao. Detection of Web Command Injection Vulnerabilities on IOS-XE Based on Static Analysis-drivenApproach [J]. Computer Science, 2025, 52(12): 419-427. |
| [15] | WEI Debin, ZHANG Yi, XU Pingduo, WANG Xinrui. Multipath Routing Algorithm for Satellite Networks Based on Convolutional Twin Delay Deep Deterministic Policy Gradient [J]. Computer Science, 2025, 52(11): 280-288. |
|
||