


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Yussuf Ahmed
, William Hunt, Haitham H. Mahmoud, Mohamed Ben Farah:
Zunna - The Browser Extension for Protecting Personal Data. KSEM (5) 2024: 203-213 - Weizhen Bian, Siyan Liu, Yubo Zhou, Dezhi Chen, Yijie Liao, Zhenzhen Fan, Aobo Wang:
IntellectSeeker: A Personalized Literature Management System with the Probabilistic Model and Large Language Model. KSEM (5) 2024: 270-282 - Shubin Cai, Honglong Chen, Youyi Huang, Zhong Ming:
ComPAT: A Compiler Principles Course Assistant. KSEM (5) 2024: 74-83 - Kaiyin Chao, Jing Peng, Xiaomian Xiao, Jinglan Deng, Hanyu Yang, Jianfei Yin:
GA-MEPS: Multiple Experts Portfolio Selection Based on Genetic Algorithm. KSEM (5) 2024: 123-133 - Menglin Cui, Xiang Li, Peng Qin:
Explainable Knowledge-Based Learning for Online Medical Question Answering. KSEM (5) 2024: 294-304 - Jiaqi Dai, Min Jiang, Fanzhen Liu, Ronghua Huang:
Personalized Image Aesthetics Assessment Based on Theme and Personality. KSEM (5) 2024: 224-234 - Zhiqi Deng, Xudong Luo, Michael Y. Luo:
A Survey of Game-Theoretic Methods for Controlling COVID-19. KSEM (5) 2024: 58-73 - Feriel Gammoudi
, Mohamed Nazih Omri
:
Deep Learning and Machine Learning-Based Approaches to Inferring Social Media Network Users' Interests from a Missing Data Issues. KSEM (5) 2024: 134-143 - Zihui Gong, Qiang Wang, Wenfeng He, Chuqing Cao, Liang Zheng, Yanwu Yu:
A Novel Network Intrusion Detection Method for Unbalanced Data in Open Scenarios. KSEM (5) 2024: 283-293 - Xiangfu He, Qiyao Peng, Minglai Shao, Yueheng Sun:
Diffusion Review-Based Recommendation. KSEM (5) 2024: 255-269 - Wei Hu, Mingce Hu, Fang Liu, Yi Han:
P-Vit: A Simplified Vision Transformer Model Based on FFN and Simple Attention. KSEM (5) 2024: 316-326 - Jie Liu, Peipei Liu, Yimo Ren, Jinfa Wang, Hongsong Zhu:
Lexicon Graph Adapter Based BERT Model for Chinese Named Entity Recognition. KSEM (5) 2024: 95-105 - Haitham H. Mahmoud
, A. Taufiq Asyhari:
Customer Segmentation for Telecommunication Using Machine Learning. KSEM (5) 2024: 144-154 - Jing Peng, Kaiyin Chao, Geying Chen, Jianfei Yin:
An Online Portfolio Selection Algorithm with Dynamic Coreset Construction. KSEM (5) 2024: 27-37 - Bo Shen, Qian Ma, Gang Yang, Ru Wang:
Profit Maximization in Edge-Enabled Multimedia Data Market: A Game-Based Pricing Approach. KSEM (5) 2024: 176-187 - Chengyu Song
, Jingjing Zhang, Linru Ma, Xinxin Hu, Jianming Zheng, Lin Yang:
Insider Threat Defense Strategies: Survey and Knowledge Integration. KSEM (5) 2024: 106-122 - Suman, Essa Q. Shahra, AbdulRahman A. Al-Sewari, Haitham H. Mahmoud:
Tram Air Conditioning Fault Prediction Using Machine Learning. KSEM (5) 2024: 84-94 - Chenfei Sun:
A Spatio-temporal Neural Network for Medical Insurance Fraud Detection. KSEM (5) 2024: 235-244 - Zhikuang Xin
, Zhenghong Wu
, Dong Zhu, Xiaoguang Wang
, Jue Wang
, Yangang Wang
:
Reinforcement Learning for Scientific Application: A Survey. KSEM (5) 2024: 188-202 - Chengli Xing, Tianxiang Hu, Ninglin Liao, Minghui Zhang, Dongdong Du, Yupeng Wu, Qing Gao:
Active Learning for Low-Resource Project-Specific Code Summarization. KSEM (5) 2024: 48-57 - Lingjiao Xu, Xingyuan Chen, Bing Wang, Peng Jin:
Exploring Language Diversity to Improve Neural Text Generation. KSEM (5) 2024: 245-254 - Xingjian Xu, Liu Fang, Zhuang Lv:
DP-MFRNN: Difficulty Prediction for Examination Questions Based on Neural Network Framework. KSEM (5) 2024: 155-164 - Yanhua Yu, Xiuxiu Cai, Ang Ma, Yimeng Ren, Shuai Zhen, Jie Li, Kangkang Lu, Zhiyong Huang, Tat-Seng Chua:
Adversary and Attention Guided Knowledge Graph Reasoning Based on Reinforcement Learning. KSEM (5) 2024: 3-16 - HuanZhou Yue, Xuren Wang, Rong Chen, Zhengwei Jiang, Yuxia Fu, Jun Jiang:
HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence. KSEM (5) 2024: 214-223 - Hu Zhang, Huifeng Liu, Youli Zhang, Ying Guo, Hongjun Dai, Minghao Shao, Hongyu Xu:
Energy Consumption Prediction Method for Refrigeration Systems Based on Adversarial Networks and Transformer Networks. KSEM (5) 2024: 305-315 - Qiansheng Zhang
, Yuanjun Ou
:
Interval-Valued Fuzzy Portfolio Decision Model with Transaction Cost and Liquidity. KSEM (5) 2024: 38-47 - Zizhuo Zhang
, Lian Wen
, Shaoyang Zhang
, David Chen
, Yanfei Jiang
:
Evaluating GPT's Programming Capability Through CodeWars' Katas. KSEM (5) 2024: 17-26 - Honglei Zhang, Rong Yan:
Causal Relationship Extraction Combined Boundary Detection and Information Interaction. KSEM (5) 2024: 165-175 - Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, A. Taufiq Asyhari
, Yonghao Wang:
Knowledge Science, Engineering and Management - 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part V. Lecture Notes in Computer Science 14888, Springer 2024, ISBN 978-981-97-5488-5 [contents]
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-11 15:15 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint