default search action
IFIP IIP 2024: Shenzhen, China
- Zhongzhi Shi, Jim Tørresen, Shengxiang Yang:
Intelligent Information Processing XII - 13th IFIP TC 12 International Conference, IIP 2024, Shenzhen, China, May 3-6, 2024, Proceedings, Part I. IFIP Advances in Information and Communication Technology 703, Springer 2024, ISBN 978-3-031-57807-6
Machine Learning
- Shijie Xue, He Kong, Qi Wang:
Dual Contrastive Learning for Anomaly Detection in Attributed Networks. 3-18 - Peijia Qin, Liyan Song:
Online Learning in Varying Feature Spaces with Informative Variation. 19-33 - Jingran Shen, Nikos Tziritas, Georgios Theodoropoulos:
Towards a Flexible Accuracy-Oriented Deep Learning Module Inference Latency Prediction Framework for Adaptive Optimization Algorithms. 34-47 - Dawei Jin, Rongxin Mi, Tianhang Song:
Table Orientation Classification Model Based on BERT and TCSMN. 48-62 - Hui Ouyang, Cheng Chen, Ke Tang:
Divide-and-Conquer Strategy for Large-Scale Dynamic Bayesian Network Structure Learning. 63-78 - Yuanyuan Liu, Jiajia Zhang, Yifan Li:
Entropy-Based Logic Explanations of Differentiable Decision Tree. 79-91 - Haiwei Hou, Shifei Ding, Xiao Xu, Lili Guo:
Deep Friendly Embedding Space for Clustering. 92-105 - Wenhua Zeng, Junjie Liu, Bo Zhang:
Bayesian Personalized Sorting Based on Time Factors and Hot Recommendations. 106-114 - Maoguang Wang, Ying Cui:
Design and Implementation of Risk Control Model Based on Deep Ensemble Learning Algorithm. 115-124 - Xiaoxi Liu, Lin Lv, Ju Liu, Yanyang Han, Mengnan Liang, Xiao Jiang:
More Teachers Make Greater Students: Compression of CycleGAN. 125-139 - Bianping Su, Chaoyin Liang, Chunkai Wang, Yufan Guo, Shicong Wu, Yan Chen, Longqing Zhang, Jiao Peng:
Hybrid Integrated Dimensionality Reduction Method Based on Conformal Homeomorphism Mapping. 140-154
Natural Language Processing
- Yan Gao, Tong Xu, Enhong Chen:
Are Mixture-of-Modality-Experts Transformers Robust to Missing Modality During Training and Inferring? 157-172 - Xudong Luo, Ying Luo, Binxia Yang:
Question Answering Systems Based on Pre-trained Language Models: Recent Progress. 173-189 - Jinlong Liu, Xudong Luo:
A BERT-Based Model for Legal Document Proofreading. 190-206 - Manman Zhang, Shuocan Zhu, Jingmin Zhang, Yu Han, Xiaoxuan Zhu, Leilei Zhang:
Entity Relation Joint Extraction with Data Augmentation Based on Large Language Model. 207-214
Neural and Evolutionary Computing
- Duc-Cuong Dang, Anton V. Eremeev, Xiaoyu Qin:
Empirical Evaluation of Evolutionary Algorithms with Power-Law Ranking Selection. 217-232 - Zhen Song, Wenjian Luo, Peilan Xu, Zipeng Ye, Kesheng Chen:
An Indicator Based Evolutionary Algorithm for Multiparty Multiobjective Knapsack Problems. 233-246 - Qian Wang, Jingbo Zhang, Zhihua Cui:
Ensemble Strategy Based Hyper-heuristic Evolutionary Algorithm for Many-Objective Optimization. 247-259 - Hui Li, Jiayi Zhou, Qingquan Zhang:
Rolling Horizon Co-evolution for Snake AI Competition. 260-274 - Siphesihle Philezwini Sithungu, Elizabeth Marie Ehlers:
Training Artificial Immune Networks as Standalone Generative Models for Realistic Data Synthesis. 275-288 - Yinan Guo, Guoyu Chen, Dongzhang Jiang, Tong Ding, Wenbo Li:
Structure Optimization for Wide-Channel Plate Heat Exchanger Based on Interval Constraints. 289-302 - Lin Guan, Yalin Wang, Xujie Tan, Chenliang Liu:
Genetic Algorithm Driven by Translational Mutation Operator for the Scheduling Optimization in the Steelmaking-Continuous Casting Production. 303-316 - Yulia V. Zakharova, Maria Yu. Sakhno:
Adaptive Genetic Algorithm with Optimized Operators for Scheduling in Computer Systems. 317-328 - Kexin Lou, Jingzhe Li, Markus Barth, Quanying Liu:
A Data-Driven Framework for Whole-Brain Network Modeling with Simultaneous EEG-SEEG Data. 329-342
Recommendation and Social Computing
- Jinquan Hou, Yuqiu Jian, Guosheng Xu, Qiang Cao, Guoai Xu:
Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. 345-354 - Mingmeng Zhang, Yuanjing Hao, Pengao Lu, Liang Chang, Long Li:
Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks. 355-366 - Yuying Wang, Jing Zhou, Yifan Ji, Qian Liu, Jiaying Wei:
A Recommendation Algorithm Based on Automatic Meta-path Generation and Relationship Aggregation. 367-381 - Ziyu Zhang, Peilan Xu, Zhaoguo Wang, Wenjian Luo:
Cooperative Coevolution for Cross-City Itinerary Planning. 382-391
Business Intelligence and Risk Control
- Maoguang Wang, Jiaqi Yan, Yuxiao Chen:
A Stock Price Trend Prediction Method Based on Market Sentiment Factors and Multi-layer Stacking Ensemble Learning with Dual-CNN-LSTM Models and Nested Heterogeneous Learners. 395-409 - Xiaotong Liu, Haoyu Wang, Kaijie Zhang, Kaile Lin, Qiufeng Shi, Fanhui Zeng:
Credit Default of P2P Online Loans Based on Logistic Regression Model Under Factor Space Theory Risk Prediction Research. 410-424 - Chunkai Wang, Jian Feng:
FedPV-FS: A Feature Selection Method for Federated Learning in Insurance Precision Marketing. 425-437 - Tiancai Liang, Yun Zhao, Haolin Wang, Ziwen Cai, Zhaoguo Wang, Wenchao Wang, Chuanyi Liu:
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching. 438-452 - Siphesihle Philezwini Sithungu, Elizabeth Marie Ehlers:
From Concept to Prototype: Developing and Testing GAAINet for Industrial IoT Intrusion Detection. 453-468 - Zhou Zhou, Xuan Liu, Chenyu Wang, Ruichao Lu:
Efficient and Secure Authentication Scheme for Internet of Vehicles. 469-485
Pattern Recognition
- Jianxia Pan, Liu Yang, Xinping Fu, Hai-Cheng Wei, Jing Zhao:
Research on Wavelet Packet Sample Entropy Features of sEMG Signal in Lower Limb Movement Recognition. 489-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.