


default search action
16th ICMLC 2024: Shenzhen, China
- Proceedings of the 2024 16th International Conference on Machine Learning and Computing, ICMLC 2024, Shenzhen, China, February 2-5, 2024. ACM 2024
Data Modeling and Data Analysis
- Yunan Li
, Syeda Sana e Zainab
, Sahraoui Dhelim
, Mohand Tahar Kechadi
:
Weather Data and Agro-climate Indices - Comparative Study. 1-7 - Lei Peng
, Xiang Jia
:
A Multi-source Data Modelling Method for Reliability Evaluation based on conversion factor and improved Particle Swarm Optimization. 8-15 - Shushu Liu
, Dongdong Cheng
, Jiang Xie
:
Granular-ball-based Fast Spectral Embedding Clustering Algorithm for Large-Scale Data. 16-20 - Tian Tong
, Xinxin Wang
, Qiong Gao
, Limei Yu
, Lijie Du
, Yuan Sun
:
Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABE. 21-28 - Sijie Zhang
, Aiguo Chen
, Xincen Zhou
, Tianzi Wang
:
Past Data-Driven Adaptation in Hierarchical Reinforcement Learning. 29-35 - Shilin Liu
, Zhexue Jin
, Yongzhen Li
:
Research on Efficient Stream Cipher Design in Big Data Environment. 36-43 - Soré Safiatou, Frédéric Tounwendyam Ouédraogo
, Moustapha Bikienga
, Yaya Traoré
:
Towards a More Generic and Elastic Metadata Management Model in a Data Lake Environment. 44-51 - Zhiyu Zhang
, Ruilong Ouyang
, Jingu Xie
:
Application of a Remote-Sensing Ship Dataset Based on the Yolov5 Model. 52-56 - Jiamao Han
, Yaxing Wei
, Yingchao Zhen
, Ji Shi
, Lei Wang
, Yu Zhang
, Wenbo Sun
, Rong Wu
:
Flower pollination Algorithm based on triple differential evolution and its application in Research on the classification and leveling of power cloud data. 57-64
Data Privacy and Data Security
- Yang Tan
, Bo Lv
:
Break Two PSI-CA Protocols in Polynomial Time. 65-72 - Yue Zhao
, Bin Yang
, Yarang Yang
:
An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things. 73-79 - Qianyi Chen
, Peijia Zheng
, Yusong Du
, Weiqi Luo
, Hongmei Liu
:
FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking. 80-86 - Junting Duan
, Yujie Luo
, Zhicheng Zhang
, Jianjian Peng
:
A heterogeneous graph-based approach for cyber threat attribution using threat intelligence. 87-93
Machine Learning Models and Algorithms
- Qingqing Xiong
, Jinzhe Jiang
, Chen Li
, Xin Zhang
, Yaqian Zhao
:
Study on The Effect of Encoding Method in Quantum Machine Learning. 94-99 - Raad Bin Tareaf
, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
, Mais Rawwash
:
Applying XAI in Fashion-MNIST: Evaluating Hybrid Deep Neural Networks and Capsule Networks. 100-107 - Yanyou Wei
, Zheng Guan
, Xue Wang
, Yu Yan
, Zhijun Yang
:
Global Feature-guided Knowledge Tracing. 108-114 - Jinbo Wang
, Ruijin Wang
, Xikai Pei
:
FedRL: Federated Learning with Non-IID Data via Review Learning. 115-120 - Shaomu Lu
, Weiwen Zhang
, Lianglun Cheng
:
Combining Sentence-based Relational Features with Biaffine Mechanism for Triple Extraction. 121-127 - Zeyu Teng
, Yong Song
, Xiaozhou Ye
, Ye Ouyang
:
Fine-Tuning LLMs for Multi-Turn Dialogues: Optimizing Cross-Entropy Loss with KL Divergence for All Rounds of Responses. 128-133
Prediction Model Analysis and Calculation
- Camila Ascendina
, Paulo Salgado Gomes de Mattos Neto
, João Fausto Lorenzato de Oliveira
, Péricles B. C. Miranda
:
An Evolutionary Approach to Forecasting Models Hybridization. 134-139 - Dequan Zheng
, Yunjie Sun
, Feng Yu
:
Research on Movie Box Office Prediction Method Based on Blending Model Fusion. 140-146 - Shi Huang Fei
, Yuan Zhu
:
Prediction of gene regulatory networks based on graph attention mechanisms. 147-152 - Yunan Li
, Sahraoui Dhelim
, Mohand Tahar Kechadi
:
Predicting Winter Wheat Emergence and Stem Elongation Time using CNN. 153-160 - Heng Fang
, Ding Ma
:
Cost-Sensitive Ensemble Learning for Venture Capital Exit Prediction. 161-167 - Nicolas Caron
, Christophe Guyeux
, Benjamin Aynes
:
Predicting wildfire events with calibrated probabilities. 168-175 - Zihao Zhao
, Yuxiang Jia
, Zhihong Zhang
:
Multi-Scale Convolution Multi-Graph Attention Neural Networks for Traffic Flow Forecasting. 176-184
Software Analysis and Anomaly Detection
- Roberto Bruzzese
:
Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification. 185-193 - Xiaohua Ke
, Zexian Ou
, Xiaobo Wu
, Binglong Li
:
A New Chinese Event Detection Method based on PMTNet. 194-199 - Srinivas Akkepalli
, Sagar K
:
A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques. 200-205 - Zhiyan Lu
, Hao Yang
, Hao Wu
, Yanli Niu
:
Enhancing Network Intrusion Detection Through Dynamic IP Blacklisting. 206-210 - Mike Jones
, Masrufa Bayesh
, Sharmin Jahan
:
Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights. 211-217 - Sahan Dissanayaka
, Manjusri Wickramasinghe
, Pasindu Marasinghe
:
Temporal Convolution-based Hybrid Model Approach with Representation Learning for Real-Time Acoustic Anomaly Detection. 218-227 - Lijuan Liu
, Li Shi
:
Application case study, security challenges and countermeasures of AIGC in the context of metaverse. 228-232 - Yunxia Zhang
, Bingtao Wu
, Tian Luo
, Jing Bai
:
Parameter Automatic Generation Method For Extended Belief Rule Base. 233-237
Object Detection
- Yunqi Guan
, Zuo Zhang
, Yu Zi Liu
, Wen Bin Ye:
FilterNet: A Convolutional Neural Network for Radar-Based Fall Detection by Filtering Out Non-fall Feature in the Spectrogram. 238-243 - Damini Babbar
, Aditya Jain
, Ankit Sharma
, Dipyaman Banerjee
:
Forgery Detection in Aadhaar-based KYC using Deep Learning. 244-250 - Ya-Fei Wang
, Junfeng Jing
, Siyu Sheng
, Xintian Jiao
:
Light-Trans YOLO: A Lightweight Network Based on Transformer for Defect Detection of Industrial Lace Surface. 251-256 - Ruilin Yao
, Shengwu Xiong
, Yi Rong
:
Context-Aware Gridding Non-local Block for Improving Object Detection in UAV Images. 257-263 - Qili Hou
, Yang Wang
, Banghua Chen
, Song Xu
, Lihong Yang
:
Defect detection for CCGA solder column based on machine vision. 264-270 - Xiao Ge
, Tao Wang
, Kanjian Zhang
:
Visual-Based Detection Method for Oil Leakage in Antarctic Power-Generation Cabin. 271-279 - Hanzhong Xu
, Dianliang Wu
, Kai Zou
, Qihang Yu
, Haiwen Yu
:
An intelligent detection method for assembly based on multi-model cascade. 280-286 - Bin Xue
, Qinghua Zheng
, Zhinan Li
, Weihu Zhao
, Heling Wang
, Xue Feng
:
Lightweight Object Detection-Tracking using Deep Feature Distillation. 287-291 - Wenbo Zhu
, Neng Liu
, Zhengjun Zhu
, Haibing Li
, Zhongbo Zhang
, Xinghao Zhang
:
Ash Content Detection in Coal Slime Flotation Tailings Based on MobileViT. 292-297 - Zongpu Li
, Tengfei Bao
, Zhiyun Xiao
:
Dual Part Siamese Attention Convolution Network for Change detection in Bi-temporal High Resolution Remote Sensing Images. 298-303 - Bin Zhang
, Meizhen Luo
, Shankai Yan
, Juan Hu
, Ling Peng
, Liangshun Wu
, Yujuan Wang
:
Backbone Feature Hierarchy Selection Strategy and Verification in Small Object Detection. 304-310 - Yan-Ying Guo
, Zhi Gang Liu
, Jun Yan Lu
:
Bad Weather Condition Shadow detection of Docking Aircraft Algorithm. 311-315
Computer Vision and Image Analysis
- Xiangzhen Li
, Ping Huang
, Kan Zhou
, Peng Zhang
, Qiujie Zhang
, Xiaohang Wang
:
A method for calculating target data coverage based on 3D model. 316-320 - Yin Huang
, Ziyang Zhang
, Kailing Guo
, Xiangmin Xu
:
SCC-Conv: A Novel Convolution with Spatial-Channel Cheap Operation for Single Image Super-Resolution. 321-326 - Shahid Karim
, Geng Tong
, Jinyang Li
, Xiaochang Yu
, Jia Hao
, Yiting Yu
:
Automatic Machine Learning based Real Time Multi-Tasking Image Fusion. 327-333 - Zikai Shu
, Takashi Nose
, Akinori Ito
:
Toward Photo-Realistic Facial Animation Generation Based on Keypoint Features. 334-339 - Yizhang Yang
, Jianxiu Jin
, Ying Huang
, Kailing Guo
, Xiangmin Xu
:
Reference-based Video Colorization with AB Chrominance Point and Temporal Propagation. 340-346 - Chaoqun Jiang
, Chengxiang Tan
, Zhishuo Zhang
:
3VFP: Three-View Feature Propagation Entity Alignment. 347-354
Digital Image Processing and Applications
- Tomasz Jan Palczewski
, Anirudh Rao
, Yingnan Zhu
:
Generative-AI- and Optical-Flow-Based Aspect Ratio Enhancement of Videos. 355-362 - Sicong Wang
, Yujie Yin
, Longrui Yang
, Xiyuan Wang
, Xijun Zhang
:
A Study on Semantic Segmentation for Small Objects in High-resolution Aerial Images based on Mask R-CNN and HRNet. 363-368 - Hong Huang
, Zhuowei Wang
, Genping Zhao
:
Efficient 3D Reconstruction of Multiple Plants from UAV Images with Deep Learning. 369-375 - Lin Li
, Haili Zhao
, Zhen Hui
, Rongxin Mi
, Weikuang Li
, Zixuan Chen
:
Research on clustering of non-uniformly distributed point clouds in road scenes. 376-381 - Junchang Zhang
, Jiaming Xie
:
An infrared target identification method based on complementary fusion features. 382-388 - Song Gao
, Bo Hui
, Wanwan Li
:
Image Generation of Egyptian Hieroglyphs. 389-397 - Zhuolin Li
, Xiaoting Yu
, Dashuai Wang
, Xiaoguang Liu
:
UAV Farmland Object Tracking Based on Improved QDTrack. 398-403
Image Classification
- Juanxi Tian
, Kaixin Zhu
, Wentao Fan
:
Mpox-PyramidTransferNet: A Hierarchical Transfer Learning Framework for Monkeypox and Dermatological Disease Classification. 404-410 - Haojun Li
, Linjia Li
, Wei Luo
:
Visual-Semantic Alignment for Few-shot Remote Sensing Scene Classification. 411-417 - Meng Yang
, Yaxiong Chen
, Xiongbo Lu
, Shengwu Xiong
:
Preferred Feature Representation for Remote Sensing Scene Classification. 418-423 - Zhenbang Wang
, Pengfei Duan
, Yi Rong
:
SRCPT: Spatial Reconstruction Contrastive Pretext Task for Improving Few-Shot Image Classification. 424-432 - Huanzhou Huang
, Zhuowei Wang
, Genping Zhao
:
Classification and Segmentation of Apple Diseases Based on Deep Learning. 433-440 - Wentao Dou
, Jiaqi Sun
, Dongmei Niu
, Jingliang Peng
:
AdaBoost-Based 3D Object Classification from Surface and Depth Map Descriptors. 441-446 - Min Huang
, Saixing Zhu
, Zehua Wang
, Shuanghong Qu
:
Convolutionally Enhanced Feature Fusion Visual Transformer for Fine-Grained Visual Classification. 447-452 - Raad Bin Tareaf
, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
:
Direct vs. Cross-Validated Stacking in Ensemble Learning: Evaluating the Trade-Off between Inference Time and Generalizability on Fashion-MNIST. 453-461
Modern Information Theory and Security Management
- Celal Alagoz
:
Hierarchy Generation and Exploitation via Extended Local Classification Schemes. 462-469 - Zehao Lei
, Yingwen Wu
, Tao Li
:
Better Generalization in Fast Training: Flat Trainable Weight in Subspace. 470-477 - Abhishek Periwal
, Adhish Prasoon
:
Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous Graph. 478-484 - Nianru Gong
, Pengfei Duan
, Yi Rong
:
Learning Task-Specific Embeddings for Few-Shot Classification via Local Weight Adaptation. 485-491 - Yongbing Li
, Pengfei Duan
, Yi Rong
, Yiwen Yang
, Aoxing Wang
:
Continual Few-Shot Relation Learning Via Dynamic Margin Loss and Space Recall. 492-497 - Wandi Qiao
, Rui Yang
:
Soft Adversarial Offline Reinforcement Learning via Reducing the Attack Strength for Generalization. 498-505 - Ronghui Pang
:
Research on the Application of Word2Vec-Based Job-Person Matching Methods in Corporate Recruitment. 506-510 - Yakun Wang
, Lili Xu
, Liangze Mo
:
Research on the Market Structure Visualization of Chinese High-Liquidity Equity ETFs Based on the Affinity Propagation Algorithm. 511-516
Language Model and Named Entity Recognition
- Rui Wang
, Zhengxin Pan
, Fangyu Wu
, Yifan Lv
, Bailing Zhang
:
Multi-modal Contextual Prompt Learning for Multi-label Classification with Partial Labels. 517-524 - Rui Zhou
, Akinori Ito
, Takashi Nose
:
Character Expressions in Meta-Learning for Extremely Low Resource Language Speech Recognition. 525-529 - Yauwai Yim
, Zirui Wang
:
Distilling Multi-Step Reasoning Capabilities into Smaller Language Model. 530-535 - Yuning Shi
, Masaomi Kimura
:
BERT-Based Models with Attention Mechanism and Lambda Layer for Biomedical Named Entity Recognition. 536-544 - Haiying Zhang
, Yunmei Shi
, Teng Yang
:
BP-TEG: Topic-to-Essay Generation for Official Documents. 545-556 - Sihao Wu
, Xiaoling Wu
, Rui Xie
, Wentao Zhan
:
Chinese NER Based on Adversarial Training and Interactive Attention. 557-561 - Zhihong Zhu
, Weiwen Zhang
, Hongbin Zhang
, Lianglun Cheng
:
Chinese Named Entity Recognition in the Ship News Field Based on Adversarial Transfer Learning. 562-567
Natural Language Analysis and Processing
- Yixiang Huang
, Juan Yang
, Ding Xiao
:
An Effective Model for Aspect Category Sentiment Analysis on a Chinese Tobacco Dataset. 568-573 - Yuchen Shi
, Deqing Yang
:
SETE: Syntax-Enhanced Triplet Extraction with Semantic Consistency. 574-581 - Shayan Shariff
, Ali Adnan
, Muhammad Qasim Pasta
:
Bridging Language and Culture: Applying NLP Methods for Topic Classification of Couplets using BERT. 582-586 - Zhou Yong Mei, Huang Wei Feng, Wang Ji Gang, Wang Ze Peng, Zhou Dong, Yang Ai Min:
An Aspect Sentiment Triplet Extraction Method based on Syntax-Guided Muti-Turn Machine Reading Comprehension. 587-593 - Raad Bin Tareaf
, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
:
Mining Minds: Predicting IQ Scores Using Social Media Textual Analytics. 594-601 - Ye Sun
, Guozhe Jin
, Yahui Zhao
, Rongyi Cui
:
Fine-grained sentiment Feature Extraction Method for Cross-modal Sentiment Analysis. 602-608 - Shuling Yang
, Hanzhu Chen
, Binbin Fang
:
QuDial: A Quadruple-driven Dialogue System for Real Estate Consulting Services. 609-615 - Lijuan Liu
, Li Shi
:
An Intelligent Risk Mining Method by Whole Process-Oriented Risk Analysis Model. 616-620
Intelligent Systems and Optimization Computing Based on Machine Learning
- Asmae Rhanizar
, Zineb El Akkaoui
:
Multi-Objective Deep Reinforcement Learning for Variable Speed Limit Control. 621-627 - Tong Lin
, Cangqi Zhou
, Qianmu Li
, Dianming Hu
:
Multi-level Disentangled Contrastive Learning on Heterogeneous Graphs. 628-634 - Wentao Song
, Naijie Gu
:
Learning Presolver Selection for Mixed-Integer Linear Programming. 635-641 - Yuxin Zhang
, Jun Wu
, Honglin Chen
, Jiajing Xu
, Zhen Huang
:
A lightweight single object tracking algorithm for low-power embedded devices. 642-648 - Honglin Shi
, Xin Zhang
, Bin Ge
, Sheng Zhang
, Dongxu Zhao
:
MESCM: A Multi-stage Explainable Similar Case Matching Framework. 649-657 - Duhania Oktasya Mahara
, Santi Wulan Purnami
, Shofi Andari
:
Copula-based Cox Regression to Modelling Bivariate Time-to-Event Data. 658-664
Next Generation Artificial Intelligence Technology and Engineering Applications
- Changlong Wang
, Akinori Ito
, Takashi Nose
, Chia-Ping Chen
:
Evaluation of Environmental Sound Classification using Vision Transformer. 665-669 - Qiong Wang
, Yan Li
:
PDE-Net: Pyramid Depth Estimation Network for Light Fields. 670-676 - Yoshiyuki Usami
, Shota Moro
:
Integrated Artificial Intelligence for Making Digital Human II. 677-683 - Jingyu Chen
, Xiaojie Zhou
:
Optimizing Chiller Defrosting Control through Spiking Neural Networks-Based Method. 684-692 - Linjia Li
, Jin Deng
, Ying Huang
, Yanyan Chen
, Wei Luo
:
Structural Subspace Learning for Few-shot Fine-grained Recognition. 693-699 - Lihan Lin
, Jin Deng
, Ying Huang
, Yanyan Chen
, Wei Luo
:
Task-aware Local Representation Mining Network for Few-shot Fine-grained Recognition. 700-706 - Rui Tang
, Miao Qi
, Nanqing Wang
:
Music style classification by jointly using CNN and Transformer. 707-712 - Shuang Lai
, Shaoqian Zhang
, Abual Hassan
, Ray Tahir Mushtaq
:
Analyzing Role of Artificial Intelligence in Project Management and Investment Risk: A CiteSpace Insight. 713-719
Digital Network Modeling and Performance Optimization
- Tongyu Wu
, Huaiwen He
:
An Efficient Energy Efficiency Maximization Algorithm for Backscatter-Assisted WP-MEC Network with Relay. 720-727 - Ye Peng, Zhuang Jun Bo, Zhou Qiang, Wang Xi, Chen Wen Bin, Zhou Xing:
Comprehensive Evaluation Method for Wireless Network Optimization Scheme Based on Improved TOPSIS. 728-733 - Yushuai Wang
, Guangya Si
:
Modeling and Analysis Method of Dependency Network Based on Kill Chain and FDNA. 734-740 - Zehui Wei
, Jianbing Ding
, Zening Wang
, Xidong Wang
, Xiaozhou Ye
, Ye Ouyang
:
Multi-task Learning Model for Location Estimation Using RSSI of Wireless LAN in NLoS Environment. 741-744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.