default search action
KSEM 2022: Singapore
- Gérard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu:
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13370, Springer 2022, ISBN 978-3-031-10988-1
Knowledge Management with Optimization and Security (KMOS)
- Fei Fan, Linnan Yang, Xingyu Wu, Shengken Lin, Huijie Dong, Changshan Yin:
Study on Chinese Named Entity Recognition Based on Dynamic Fusion and Adversarial Training. 3-14 - Yi Xu, Leilei Sun, Bowen Du, Liangzhe Han:
Spatial Semantic Learning for Travel Time Estimation. 15-26 - Xiaoxiao Zhou, Weina Niu, Xiaosong Zhang, Ruidong Chen, Yan Wang:
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures. 27-38 - Ying Lin, Shengfu Ning, Jianpeng Hu, Jiansong Liu, Yifan Cao, Junyuan Zhang, Huan Pi:
PPBR-FL: A Privacy-Preserving and Byzantine-Robust Federated Learning System. 39-50 - Yifan Cao, Ying Lin, Shengfu Ning, Huan Pi, Junyuan Zhang, Jianpeng Hu:
GAN-Based Fusion Adversarial Training. 51-64 - Juxiong Xu, Minbo Li:
MAST-NER: A Low-Resource Named Entity Recognition Method Based on Trigger Pool. 65-76 - Omar A. M. Salem, Haowen Liu, Feng Liu, Yi-Ping Phoebe Chen, Xi Chen:
Fuzzy Information Measures Feature Selection Using Descriptive Statistics Data. 77-90 - Ganghong Huang, Jiang Zhong, Chen Wang, Qizhu Dai, Rongzhen Li:
Prompt-Based Self-training Framework for Few-Shot Named Entity Recognition. 91-103 - Xiangchong Cui, Ting Bai, Bin Wu, Xinkai Meng:
Learning Advisor-Advisee Relationship from Multiplex Network Structure. 104-115 - Zhongxuan Xue, Jiang Zhong, Qizhu Dai, Rongzhen Li:
CorefDRE: Coref-Aware Document-Level Relation Extraction. 116-128 - Ming Lian, Jing Liu:
Single Pollutant Prediction Approach by Fusing MLSTM and CNN. 129-140 - Xin Qi, Langzhou He, Jiaxin Wang, Zhanwei Du, Zheng Luo, Xianghua Li:
A Multi-objective Evolutionary Algorithm Based on Multi-layer Network Reduction for Community Detection. 141-152 - Dingling Su, Zehui Qu:
Detection DDoS of Attacks Based on Federated Learning with Digital Twin Network. 153-164 - Yeqing Qiu, Chenyu Huang, Jianzong Wang, Zhangcheng Huang, Jing Xiao:
A Privacy-Preserving Subgraph-Level Federated Graph Neural Network via Differential Privacy. 165-177 - Errikos Streviniotis, Athina Georgara, Georgios Chalkiadakis:
ε -MC Nets: A Compact Representation Scheme for Large Cooperative Game Settings. 178-190 - Bing Shi, Xizi Huang, Zhi Cao:
An Incentive-Compatible and Efficient Mechanism for Matching and Pricing in Ride-Sharing. 191-204 - Zhengchao Jiang, Fan Zhang, Hao Xu, Li Tao, Zili Zhang:
MEOD: A Robust Multi-stage Ensemble Model Based on Rank Aggregation and Stacking for Outlier Detection. 205-218 - Leyao Chen, Wei Zheng, Wenxin Hu:
MTN-Net: A Multi-Task Network for Detection and Segmentation of Thyroid Nodules in Ultrasound Images. 219-232 - Tao Zhang, Shaojing Yang, Anxiao Song, Guangxia Li, Xuewen Dong:
Dual Adversarial Federated Learning on Non-IID Data. 233-246 - Xiangyang Liu, Weidong He, Tong Xu, Enhong Chen:
Low-Quality itDanMu Detection via Eye-Tracking Patterns. 247-259 - Jinmin Xue, Shengdong Qu, Jingxian Li, Yan Chu, Zhengkui Wang:
TSC-GCN: A Face Clustering Method Based on GCN. 260-271 - Chenlin Wang, Yonghao Yu, Ao Pu, Fan Shi, Cheng Huang:
Spotlight on Video Piracy Websites: Familial Analysis Based on Multidimensional Features. 272-288 - Shuai Xu, Zeheng Zhong, Yikai Luo, Bing Shi:
A Vehicle Value Based Ride-Hailing Order Matching and Dispatching Algorithm. 289-301 - Wenyuan Zhang, Peng Li, Guangjun Wu, Jun Li:
Privacy-Preserving Deep Learning in Internet of Healthcare Things with Blockchain-Based Incentive. 302-315 - Mingzhi Dai, Xiang Feng, Huiqun Yu, Weibin Guo:
A Novel Spectral Ensemble Clustering Algorithm Based on Social Group Migratory Behavior and Emotional Preference. 316-328 - Weiran Liu, Qiyu Ruan, Liang Zhang, Wei Ren:
An Improved Semantic Link Based Cyber Community Discovery Model on Social Network. 329-338 - Lijian Li, Yuanpeng He, Li Li:
NNDF: A New Neural Detection Network for Aspect-Category Sentiment Analysis. 339-355 - Zhengyang Ai, Guangjun Wu, Binbin Li, Yong Wang, Chuantong Chen:
Fourier Enhanced MLP with Adaptive Model Pruning for Efficient Federated Recommendation. 356-368 - Songlak Sakulwichitsintu:
Empowering Graduate Students' Service Delivery by Using an Agile Chatbot: A Conceptual Framework. 369-377 - Zechen Wang, Binbin Li, Yong Wang:
Event Detection Based on Multilingual Information Enhanced Syntactic Dependency GCN. 378-390 - Nourelhouda Hammouda, Mariem Mahfoudh, Mohamed Cherif:
Semantic Annotation of Videos Based on Mask RCNN for a Study of Animal Behavior. 391-402 - Weronika T. Adrian, Julia Ignacyk, Krzysztof Kluza, Miroslawa M. Dlugosz, Antoni Ligeza:
Modeling Empathy Episodes with ARD and DMN. 403-413 - Weipeng Cao, Yuhao Wu, Qiang Wang, Jiyong Zhang, Xingjian Zhang, Meikang Qiu:
A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking. 414-425 - Xingjian Xu, Fang Liu, Fanjun Meng:
Named Entity Recognition in Biology Literature Based on Unsupervised Domain Adaptation Method. 426-437 - Tong Fang, Baoshuai Du, Yunjia Xue, Guang Yang, Jingbo Zhao:
A Lightweight Target Detection Algorithm Based on Improved MobileNetv3-YOLOv3. 438-448 - Jie Yu, Junchen He, Lingyu Xu:
Hypergraph-Based Academic Paper Recommendation. 449-462 - Hongbin He, Hongyu Kuang, Lin Yang, Feng Yang, Qiang Wang, Weipeng Cao:
Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking. 463-476 - Li Yao, Naigang Zhang, Ao Gao, Yan Wan:
Research on Fabric Defect Detection Technology Based on EDSR and Improved Faster RCNN. 477-488 - Jinbang Hong, Keke Tang, Chao Gao, Songxin Wang, Sensen Guo, Peican Zhu:
GM-Attack: Improving the Transferability of Adversarial Attacks. 489-500 - Lijiao Qin, Defu Lian:
Adversarial Cycle-Consistent Autoencoder for Category-Aware Out-of-Town Recommendation. 501-515 - Kun Peng, Nannan Sun, Jiahao Cao, Rui Liu, Jiaqian Ren, Lei Jiang:
Prompt as a Knowledge Probe for Chinese Spelling Check. 516-527 - Yaofeng Chen, Chunyang Zhang, Long Ye, Xiaogang Peng, Meikang Qiu, Weipeng Cao:
W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text Analysis. 528-539 - Shuang Peng, Xianshu Peng, Zhuochen Dai, Li Tao:
HLB-ConvMLP- Rapid Identification of Citrus Leaf Diseases. 540-549 - Hang Jiang, Song Wu, Dehong He, Guoqiang Xiao:
Natural Image Matting with Low-Level Feature Attention Guidance. 550-561 - Yang Qin, Linjiang Zheng, Li Chen, Weining Liu:
Identifying Taxi Commuting Traffic Analysis Zones Using Massive GPS Data. 562-578 - Mei Guo, Jiayu Zhang, Nan Geng, Yaojun Geng, Yongliang Zhang, Mei Li:
Chinese Relation Extraction of Apple Diseases and Pests Based on BERT and Entity Information. 579-592 - Joojo Walker, Ting Zhong, Fengli Zhang, Qiang Gao, Fan Zhou:
Recommendation via Collaborative Diffusion Generative Model. 593-605 - Ziyuan Zhang, Meiqi Wang, Wencheng Chen, Han Qiu, Meikang Qiu:
Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical Study. 606-618 - Abir Zawali, Imen Boukhris:
System Level Recommender System for Academic Venue Personalization: Multi vs. Linked Domain. 619-630 - Kieran Greer, Yaxin Bi:
Energy Consumption Prediction Using Bands-Based Data Analytics. 631-643 - Wei Hu, Dian Xu, Fang Liu, Zimeng Fan:
Software and Hardware Fusion Multi-Head Attention. 644-655 - Wei Hu, Kejie Hu, Fang Liu, Jie Fan:
Hardware and Software Co-optimization for Windows Attention. 656-668 - Yang Sun, Wei Hu, Fang Liu, Feihu Huang, Yonghao Wang:
SSA: A Content-Based Sparse Attention Mechanism. 669-680 - Feihu Huang, Min Jiang, Fang Liu, Dian Xu, Zimeng Fan, Yonghao Wang:
Classification of Heads in Multi-head Attention Mechanisms. 681-692 - Wei Hu, Jie Fan, Fang Liu, Kejie Hu:
Hardware and Software Co-design for Soft Switch in ViT Variants Processing Unit. 693-705 - Xiangyu Gao, Meikang Qiu:
Energy-Based Learning for Preventing Backdoor Attack. 706-721 - Dawei Li, Yangkun Ren, Di Liu, Zhenyu Guan, Qianyun Zhang, Yanzhao Wang, Jianwei Liu:
PUF-Based Intellectual Property Protection for CNN Model. 722-733 - Shudong Zhang, Haichang Gao, Yunyi Zhou, Zihui Wu, Yiwen Tang:
Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial Training. 734-746
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.