{"title":"Retracted: Path Selection Strategy of Communication Network Based on Graph Convolutional Neural Network","authors":"Security and Communication Networks","doi":"10.1155/2024/9759083","DOIUrl":"https://doi.org/10.1155/2024/9759083","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"17 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Analysis of Risk Assessment of Overseas Infrastructure Projects Integrating BP-ANN Algorithm","authors":"Security and Communication Networks","doi":"10.1155/2024/9792589","DOIUrl":"https://doi.org/10.1155/2024/9792589","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"15 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Performance Evaluation Method of Online Supply Chain Finance Logistics Enterprises Based on GARCH-VAR","authors":"Security and Communication Networks","doi":"10.1155/2024/9847896","DOIUrl":"https://doi.org/10.1155/2024/9847896","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"8 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139444240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence","authors":"Security and Communication Networks","doi":"10.1155/2024/9764159","DOIUrl":"https://doi.org/10.1155/2024/9764159","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"59 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139445223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: A Study on Factors Influencing the Use of Unmanned Driving Technology Based on TAM Model","authors":"Security and Communication Networks","doi":"10.1155/2024/9786741","DOIUrl":"https://doi.org/10.1155/2024/9786741","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"28 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Analysis and Research of Psychological Education Based on Data Mining Technology","authors":"Security and Communication Networks","doi":"10.1155/2024/9809620","DOIUrl":"https://doi.org/10.1155/2024/9809620","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"32 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Design of Chinese Teaching Evaluation System for International Students under the Background of Data Mining","authors":"Security and Communication Networks","doi":"10.1155/2024/9851530","DOIUrl":"https://doi.org/10.1155/2024/9851530","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"20 19","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem","authors":"Security and Communication Networks","doi":"10.1155/2024/9845493","DOIUrl":"https://doi.org/10.1155/2024/9845493","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"50 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor","authors":"Security and Communication Networks","doi":"10.1155/2024/9818710","DOIUrl":"https://doi.org/10.1155/2024/9818710","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"44 31","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Simulation of Film and Television Transmission Path Based on Ant Colony Optimization Algorithm","authors":"Security and Communication Networks","doi":"10.1155/2024/9871428","DOIUrl":"https://doi.org/10.1155/2024/9871428","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"59 49","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}