default search action
ICMLT 2020: Beijing, China
- ICMLT 2020: 5th International Conference on Machine Learning Technologies, Beijing, China, June, 2020. ACM 2020, ISBN 978-1-4503-7764-5
- Jiyuan Zhang, Qihong Feng, Xianmin Zhang:
The use of machine learning methods for fast estimation of CO2-brine interfacial tension: A comparative study. 1-5 - Xiaodong Su:
Efficient Logistic Regression with L2 Regularization using ADMM on Spark. 6-10 - Ismail Alarab, Simant Prakoonwit, Mohamed Ikbal Nacer:
Comparative Analysis Using Supervised Learning Methods for Anti-Money Laundering in Bitcoin. 11-17 - Zheyu Zhou:
An intelligent teaching assistant system using deep learning technologies. 18-22 - Ismail Alarab, Simant Prakoonwit, Mohamed Ikbal Nacer:
Competence of Graph Convolutional Networks for Anti-Money Laundering in Bitcoin Blockchain. 23-27 - Congyi Deng, Guangshun Shi:
Method for Detecting Android Malware Based on Ensemble Learning. 28-31 - Zeeshan Rasheed, Wei Xiong, Gaoxiang Cong, Hongxun Niu, Jianxiong Wan, Yongsheng Wang, Lixiao Li:
Performance Evaluation and Machine Learning based Thermal Modeling of Tilted Active Tiles in Data Centers. 32-38 - Alexander Verner, Sumitra Mukherjee:
An LSTM-Based Method for Detection and Classification of Sensor Anomalies. 39-45 - Shuaichuang Yang, Minsheng Tan, Shiying Xia, Fangju Liu:
A method of intrusion detection based on Attention-LSTM neural network. 46-50 - Kaki Shu:
Prediction of Soybean Yield using Self-normalizing Neural Networks. 51-55 - Dechun Song, Peiyong Zhang, Feiteng Li:
Speeding Up Deep Convolutional Neural Networks Based on Tucker-CP Decomposition. 56-61 - Shijin Yuan, Bo Shi, Bin Mu:
Data Assimilation by Artificial Neural Network using Conventional Observation for WRF Model. 62-67 - Haoxiong Yu, Xianbo Xu, Ziqi Zhao, Dancheng Li:
YU-net Lung Segment Image Preprocess Methods Used for Common Chest Diseases Prediction. 68-71 - Meiyi Li, Lide Zhou:
Top-down Feature Aggregation Block Fusion Network for Salient Object Detection. 72-78 - Junwei Zhou, Ke Shu, Dongdong Zhao, Zhe Xia:
Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features. 79-85 - Hemanthage S. Bhathiya, Uthayasanker Thayasivam:
Meta Learning for Few-Shot Joint Intent Detection and Slot-Filling. 86-92 - Khaliun Nasanjargal, Jing Lu:
Application of Analytic Hierarchy Process-Fuzzy Comprehensive Evaluation in Public Transport of Ulaanbaatar City, Mongolia. 93-102 - Chenggong Zhai, Yong Kang, Min Luo:
On the Application of Computer War Chess Technology in the Support of Military Supplies. 103-108 - Chenggong Zhai, Zhaofan Yang, Xinpeng Lin:
Application of virtual machine in Quartermaster training. 109-113 - Bing Zhu, Cheng Qian, Xin Pan, Hao Chen:
A Trajectory-based Deep Sequential Method for Customer Churn Prediction. 114-118 - Arnan Mindang, Peerapon Siripongwutikorn:
Solar Power Prediction in IoT Devices using Environmental and Location Factors. 119-123 - Hongli Deng, Tao Yang:
An artificial immune based dynamic forensics model for distributed anonymous network. 124-128 - Wei Yin, Liping Shen:
A Short Text Classification Approach with Event Detection and Conceptual Information. 129-135 - Zhuojun Ren, Guang Chen, Wenke Lu:
Byte Visualization Method for Malware Classification. 136-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.