default search action
16th ICMLC 2024: Shenzhen, China
- Proceedings of the 2024 16th International Conference on Machine Learning and Computing, ICMLC 2024, Shenzhen, China, February 2-5, 2024. ACM 2024
Data Modeling and Data Analysis
- Yunan Li, Syeda Sana e Zainab, Sahraoui Dhelim, Mohand Tahar Kechadi:
Weather Data and Agro-climate Indices - Comparative Study. 1-7 - Lei Peng, Xiang Jia:
A Multi-source Data Modelling Method for Reliability Evaluation based on conversion factor and improved Particle Swarm Optimization. 8-15 - Shushu Liu, Dongdong Cheng, Jiang Xie:
Granular-ball-based Fast Spectral Embedding Clustering Algorithm for Large-Scale Data. 16-20 - Tian Tong, Xinxin Wang, Qiong Gao, Limei Yu, Lijie Du, Yuan Sun:
Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABE. 21-28 - Sijie Zhang, Aiguo Chen, Xincen Zhou, Tianzi Wang:
Past Data-Driven Adaptation in Hierarchical Reinforcement Learning. 29-35 - Shilin Liu, Zhexue Jin, Yongzhen Li:
Research on Efficient Stream Cipher Design in Big Data Environment. 36-43 - Soré Safiatou, Frédéric Tounwendyam Ouédraogo, Moustapha Bikienga, Yaya Traoré:
Towards a More Generic and Elastic Metadata Management Model in a Data Lake Environment. 44-51 - Zhiyu Zhang, Ruilong Ouyang, Jingu Xie:
Application of a Remote-Sensing Ship Dataset Based on the Yolov5 Model. 52-56 - Jiamao Han, Yaxing Wei, Yingchao Zhen, Ji Shi, Lei Wang, Yu Zhang, Wenbo Sun, Rong Wu:
Flower pollination Algorithm based on triple differential evolution and its application in Research on the classification and leveling of power cloud data. 57-64
Data Privacy and Data Security
- Yang Tan, Bo Lv:
Break Two PSI-CA Protocols in Polynomial Time. 65-72 - Yue Zhao, Bin Yang, Yarang Yang:
An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things. 73-79 - Qianyi Chen, Peijia Zheng, Yusong Du, Weiqi Luo, Hongmei Liu:
FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking. 80-86 - Junting Duan, Yujie Luo, Zhicheng Zhang, Jianjian Peng:
A heterogeneous graph-based approach for cyber threat attribution using threat intelligence. 87-93
Machine Learning Models and Algorithms
- Qingqing Xiong, Jinzhe Jiang, Chen Li, Xin Zhang, Yaqian Zhao:
Study on The Effect of Encoding Method in Quantum Machine Learning. 94-99 - Raad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken, Mais Rawwash:
Applying XAI in Fashion-MNIST: Evaluating Hybrid Deep Neural Networks and Capsule Networks. 100-107 - Yanyou Wei, Zheng Guan, Xue Wang, Yu Yan, Zhijun Yang:
Global Feature-guided Knowledge Tracing. 108-114 - Jinbo Wang, Ruijin Wang, Xikai Pei:
FedRL: Federated Learning with Non-IID Data via Review Learning. 115-120 - Shaomu Lu, Weiwen Zhang, Lianglun Cheng:
Combining Sentence-based Relational Features with Biaffine Mechanism for Triple Extraction. 121-127 - Zeyu Teng, Yong Song, Xiaozhou Ye, Ye Ouyang:
Fine-Tuning LLMs for Multi-Turn Dialogues: Optimizing Cross-Entropy Loss with KL Divergence for All Rounds of Responses. 128-133
Prediction Model Analysis and Calculation
- Camila Ascendina, Paulo Salgado Gomes de Mattos Neto, João Fausto Lorenzato de Oliveira, Péricles B. C. de Miranda:
An Evolutionary Approach to Forecasting Models Hybridization. 134-139 - Dequan Zheng, Yunjie Sun, Feng Yu:
Research on Movie Box Office Prediction Method Based on Blending Model Fusion. 140-146 - Shi Huang Fei, Yuan Zhu:
Prediction of gene regulatory networks based on graph attention mechanisms. 147-152 - Yunan Li, Sahraoui Dhelim, Mohand Tahar Kechadi:
Predicting Winter Wheat Emergence and Stem Elongation Time using CNN. 153-160 - Heng Fang, Ding Ma:
Cost-Sensitive Ensemble Learning for Venture Capital Exit Prediction. 161-167 - Nicolas Caron, Christophe Guyeux, Benjamin Aynes:
Predicting wildfire events with calibrated probabilities. 168-175 - Zihao Zhao, Yuxiang Jia, Zhihong Zhang:
Multi-Scale Convolution Multi-Graph Attention Neural Networks for Traffic Flow Forecasting. 176-184
Software Analysis and Anomaly Detection
- Roberto Bruzzese:
Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification. 185-193 - Xiaohua Ke, Zexian Ou, Xiaobo Wu, Binglong Li:
A New Chinese Event Detection Method based on PMTNet. 194-199 - Srinivas Akkepalli, Sagar K:
A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques. 200-205 - Zhiyan Lu, Hao Yang, Hao Wu, Yanli Niu:
Enhancing Network Intrusion Detection Through Dynamic IP Blacklisting. 206-210 - Mike Jones, Masrufa Bayesh, Sharmin Jahan:
Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights. 211-217 - Sahan Dissanayaka, Manjusri Wickramasinghe, Pasindu Marasinghe:
Temporal Convolution-based Hybrid Model Approach with Representation Learning for Real-Time Acoustic Anomaly Detection. 218-227 - Lijuan Liu, Li Shi:
Application case study, security challenges and countermeasures of AIGC in the context of metaverse. 228-232 - Yunxia Zhang, Bingtao Wu, Tian Luo, Jing Bai:
Parameter Automatic Generation Method For Extended Belief Rule Base. 233-237
Object Detection
- Qi Yun Guan, Zuo Zhang, Yu Zi Liu, Wen Bin Ye:
FilterNet: A Convolutional Neural Network for Radar-Based Fall Detection by Filtering Out Non-fall Feature in the Spectrogram. 238-243 - Damini Babbar, Aditya Jain, Ankit Sharma, Dipyaman Banerjee:
Forgery Detection in Aadhaar-based KYC using Deep Learning. 244-250 - Ya-Fei Wang, Junfeng Jing, Siyu Sheng, Xintian Jiao:
Light-Trans YOLO: A Lightweight Network Based on Transformer for Defect Detection of Industrial Lace Surface. 251-256 - Ruilin Yao, Shengwu Xiong, Yi Rong:
Context-Aware Gridding Non-local Block for Improving Object Detection in UAV Images. 257-263 - Qili Hou, Yang Wang, Banghua Chen, Song Xu, Lihong Yang:
Defect detection for CCGA solder column based on machine vision. 264-270 - Xiao Ge, Tao Wang, Kanjian Zhang:
Visual-Based Detection Method for Oil Leakage in Antarctic Power-Generation Cabin. 271-279 - Hanzhong Xu, Dianliang Wu, Kai Zou, Qihang Yu, Haiwen Yu:
An intelligent detection method for assembly based on multi-model cascade. 280-286 - Bin Xue, Qinghua Zheng, Zhinan Li, Weihu Zhao, Heling Wang, Xue Feng:
Lightweight Object Detection-Tracking using Deep Feature Distillation. 287-291 - Wenbo Zhu, Neng Liu, Zhengjun Zhu, Haibing Li, Zhongbo Zhang, Xinghao Zhang:
Ash Content Detection in Coal Slime Flotation Tailings Based on MobileViT. 292-297 - Zongpu Li, Tengfei Bao, Zhiyun Xiao:
Dual Part Siamese Attention Convolution Network for Change detection in Bi-temporal High Resolution Remote Sensing Images. 298-303 - Bin Zhang, Meizhen Luo, Shankai Yan, Juan Hu, Ling Peng, Liangshun Wu, Yujuan Wang:
Backbone Feature Hierarchy Selection Strategy and Verification in Small Object Detection. 304-310 - Yan-Ying Guo, Zhi Gang Liu, Jun Yan Lu:
Bad Weather Condition Shadow detection of Docking Aircraft Algorithm. 311-315
Computer Vision and Image Analysis
- Xiangzhen Li, Ping Huang, Kan Zhou, Peng Zhang, Qiujie Zhang, Xiaohang Wang:
A method for calculating target data coverage based on 3D model. 316-320 - Yin Huang, Ziyang Zhang, Kailing Guo, Xiangmin Xu:
SCC-Conv: A Novel Convolution with Spatial-Channel Cheap Operation for Single Image Super-Resolution. 321-326 - Shahid Karim, Geng Tong, Jinyang Li, Xiaochang Yu, Jia Hao, Yiting Yu:
Automatic Machine Learning based Real Time Multi-Tasking Image Fusion. 327-333 - Zikai Shu, Takashi Nose, Akinori Ito:
Toward Photo-Realistic Facial Animation Generation Based on Keypoint Features. 334-339 - Yizhang Yang, Jianxiu Jin, Ying Huang, Kailing Guo, Xiangmin Xu:
Reference-based Video Colorization with AB Chrominance Point and Temporal Propagation. 340-346 - Chaoqun Jiang, Chengxiang Tan, Zhishuo Zhang:
3VFP: Three-View Feature Propagation Entity Alignment. 347-354
Digital Image Processing and Applications
- Tomasz Jan Palczewski, Anirudh Rao, Yingnan Zhu:
Generative-AI- and Optical-Flow-Based Aspect Ratio Enhancement of Videos. 355-362 - Sicong Wang, Yujie Yin, Longrui Yang, Xiyuan Wang, Xijun Zhang:
A Study on Semantic Segmentation for Small Objects in High-resolution Aerial Images based on Mask R-CNN and HRNet. 363-368 - Hong Huang, Zhuowei Wang, Genping Zhao:
Efficient 3D Reconstruction of Multiple Plants from UAV Images with Deep Learning. 369-375 - Lin Li, Haili Zhao, Zhen Hui, Rongxin Mi, Weikuang Li, Zixuan Chen:
Research on clustering of non-uniformly distributed point clouds in road scenes. 376-381 - Junchang Zhang, Jiaming Xie:
An infrared target identification method based on complementary fusion features. 382-388 - Song Gao, Bo Hui, Wanwan Li:
Image Generation of Egyptian Hieroglyphs. 389-397 - Zhuolin Li, Xiaoting Yu, Dashuai Wang, Xiaoguang Liu:
UAV Farmland Object Tracking Based on Improved QDTrack. 398-403
Image Classification
- Juanxi Tian, Kaixin Zhu, Wentao Fan:
Mpox-PyramidTransferNet: A Hierarchical Transfer Learning Framework for Monkeypox and Dermatological Disease Classification. 404-410 - Haojun Li, Linjia Li, Wei Luo:
Visual-Semantic Alignment for Few-shot Remote Sensing Scene Classification. 411-417 - Meng Yang, Yaxiong Chen, Xiongbo Lu, Shengwu Xiong:
Preferred Feature Representation for Remote Sensing Scene Classification. 418-423 - Zhenbang Wang, Pengfei Duan, Yi Rong:
SRCPT: Spatial Reconstruction Contrastive Pretext Task for Improving Few-Shot Image Classification. 424-432 - Huanzhou Huang, Zhuowei Wang, Genping Zhao:
Classification and Segmentation of Apple Diseases Based on Deep Learning. 433-440 - Wentao Dou, Jiaqi Sun, Dongmei Niu, Jingliang Peng:
AdaBoost-Based 3D Object Classification from Surface and Depth Map Descriptors. 441-446 - Min Huang, Saixing Zhu, Zehua Wang, Shuanghong Qu:
Convolutionally Enhanced Feature Fusion Visual Transformer for Fine-Grained Visual Classification. 447-452 - Raad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken:
Direct vs. Cross-Validated Stacking in Ensemble Learning: Evaluating the Trade-Off between Inference Time and Generalizability on Fashion-MNIST. 453-461
Modern Information Theory and Security Management
- Celal Alagoz:
Hierarchy Generation and Exploitation via Extended Local Classification Schemes. 462-469 - Zehao Lei, Yingwen Wu, Tao Li:
Better Generalization in Fast Training: Flat Trainable Weight in Subspace. 470-477 - Abhishek Periwal, Adhish Prasoon:
Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous Graph. 478-484 - Nianru Gong, Pengfei Duan, Yi Rong:
Learning Task-Specific Embeddings for Few-Shot Classification via Local Weight Adaptation. 485-491 - Yongbing Li, Pengfei Duan, Yi Rong, Yiwen Yang, Aoxing Wang:
Continual Few-Shot Relation Learning Via Dynamic Margin Loss and Space Recall. 492-497 - Wandi Qiao, Rui Yang:
Soft Adversarial Offline Reinforcement Learning via Reducing the Attack Strength for Generalization. 498-505 - Ronghui Pang:
Research on the Application of Word2Vec-Based Job-Person Matching Methods in Corporate Recruitment. 506-510 - Yakun Wang, Lili Xu, Liangze Mo:
Research on the Market Structure Visualization of Chinese High-Liquidity Equity ETFs Based on the Affinity Propagation Algorithm. 511-516
Language Model and Named Entity Recognition
- Rui Wang, Zhengxin Pan, Fangyu Wu, Yifan Lv, Bailing Zhang:
Multi-modal Contextual Prompt Learning for Multi-label Classification with Partial Labels. 517-524 - Rui Zhou, Akinori Ito, Takashi Nose:
Character Expressions in Meta-Learning for Extremely Low Resource Language Speech Recognition. 525-529 - Yauwai Yim, Zirui Wang:
Distilling Multi-Step Reasoning Capabilities into Smaller Language Model. 530-535 - Yuning Shi, Masaomi Kimura:
BERT-Based Models with Attention Mechanism and Lambda Layer for Biomedical Named Entity Recognition. 536-544 - Haiying Zhang, Yunmei Shi, Teng Yang:
BP-TEG: Topic-to-Essay Generation for Official Documents. 545-556 - Sihao Wu, Xiaoling Wu, Rui Xie, Wentao Zhan:
Chinese NER Based on Adversarial Training and Interactive Attention. 557-561 - Zhihong Zhu, Weiwen Zhang, Hongbin Zhang, Lianglun Cheng:
Chinese Named Entity Recognition in the Ship News Field Based on Adversarial Transfer Learning. 562-567
Natural Language Analysis and Processing
- Yixiang Huang, Juan Yang, Ding Xiao:
An Effective Model for Aspect Category Sentiment Analysis on a Chinese Tobacco Dataset. 568-573 - Yuchen Shi, Deqing Yang:
SETE: Syntax-Enhanced Triplet Extraction with Semantic Consistency. 574-581 - Shayan Shariff, Ali Adnan, Muhammad Qasim Pasta:
Bridging Language and Culture: Applying NLP Methods for Topic Classification of Couplets using BERT. 582-586 - Zhou Yong Mei, Huang Wei Feng, Wang Ji Gang, Wang Ze Peng, Zhou Dong, Yang Ai Min:
An Aspect Sentiment Triplet Extraction Method based on Syntax-Guided Muti-Turn Machine Reading Comprehension. 587-593 - Raad Bin Tareaf, Alex Maximilian Korga, Sebastian Wefers, Keno Hanken:
Mining Minds: Predicting IQ Scores Using Social Media Textual Analytics. 594-601 - Ye Sun, Guozhe Jin, Yahui Zhao, Rongyi Cui:
Fine-grained sentiment Feature Extraction Method for Cross-modal Sentiment Analysis. 602-608 - Shuling Yang, Hanzhu Chen, Binbin Fang:
QuDial: A Quadruple-driven Dialogue System for Real Estate Consulting Services. 609-615 - Lijuan Liu, Li Shi:
An Intelligent Risk Mining Method by Whole Process-Oriented Risk Analysis Model. 616-620
Intelligent Systems and Optimization Computing Based on Machine Learning
- Asmae Rhanizar, Zineb El Akkaoui:
Multi-Objective Deep Reinforcement Learning for Variable Speed Limit Control. 621-627 - Tong Lin, Cangqi Zhou, Qianmu Li, Dianming Hu:
Multi-level Disentangled Contrastive Learning on Heterogeneous Graphs. 628-634 - Wentao Song, Naijie Gu:
Learning Presolver Selection for Mixed-Integer Linear Programming. 635-641 - Yuxin Zhang, Jun Wu, Honglin Chen, Jiajing Xu, Zhen Huang:
A lightweight single object tracking algorithm for low-power embedded devices. 642-648 - Honglin Shi, Xin Zhang, Bin Ge, Sheng Zhang, Dongxu Zhao:
MESCM: A Multi-stage Explainable Similar Case Matching Framework. 649-657 - Duhania Oktasya Mahara, Santi Wulan Purnami, Shofi Andari:
Copula-based Cox Regression to Modelling Bivariate Time-to-Event Data. 658-664
Next Generation Artificial Intelligence Technology and Engineering Applications
- Changlong Wang, Akinori Ito, Takashi Nose, Chia-Ping Chen:
Evaluation of Environmental Sound Classification using Vision Transformer. 665-669 - Qiong Wang, Yan Li:
PDE-Net: Pyramid Depth Estimation Network for Light Fields. 670-676 - Yoshiyuki Usami, Shota Moro:
Integrated Artificial Intelligence for Making Digital Human II. 677-683 - Jingyu Chen, Xiaojie Zhou:
Optimizing Chiller Defrosting Control through Spiking Neural Networks-Based Method. 684-692 - Linjia Li, Jin Deng, Ying Huang, Yanyan Chen, Wei Luo:
Structural Subspace Learning for Few-shot Fine-grained Recognition. 693-699 - Lihan Lin, Jin Deng, Ying Huang, Yanyan Chen, Wei Luo:
Task-aware Local Representation Mining Network for Few-shot Fine-grained Recognition. 700-706 - Rui Tang, Miao Qi, Nanqing Wang:
Music style classification by jointly using CNN and Transformer. 707-712 - Shuang Lai, Shaoqian Zhang, Abual Hassan, Ray Tahir Mushtaq:
Analyzing Role of Artificial Intelligence in Project Management and Investment Risk: A CiteSpace Insight. 713-719
Digital Network Modeling and Performance Optimization
- Tongyu Wu, Huaiwen He:
An Efficient Energy Efficiency Maximization Algorithm for Backscatter-Assisted WP-MEC Network with Relay. 720-727 - Ye Peng, Zhuang Jun Bo, Zhou Qiang, Wang Xi, Chen Wen Bin, Zhou Xing:
Comprehensive Evaluation Method for Wireless Network Optimization Scheme Based on Improved TOPSIS. 728-733 - Yushuai Wang, Guangya Si:
Modeling and Analysis Method of Dependency Network Based on Kill Chain and FDNA. 734-740 - Zehui Wei, Jianbing Ding, Zening Wang, Xidong Wang, Xiaozhou Ye, Ye Ouyang:
Multi-task Learning Model for Location Estimation Using RSSI of Wireless LAN in NLoS Environment. 741-744
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.