


default search action
13th ICMLC 2021: Shenzhen, China
- ICMLC 2021: 13th International Conference on Machine Learning and Computing, Shenzhen China, 26 February, 2021- 1 March, 2021. ACM 2021, ISBN 978-1-4503-8931-0

Machine Learning and Algorithms
- Jiajie Zhu, Qi Zhang, Babak Forouraghi, Xiao Wang:

Applications of Machine Learning Techniques in Genetic Circuit Design. 1-7 - Haiming Ye, Weiwen Zhang, Mengna Nie, Depei Wang

, Lianglun Cheng:
Efficient Domain-Specific News Push Service Using Deep Learning Based Text Regression without Users' Information. 8-13 - Ni Gao, Yiyue He, Yuming Jiao, Zhuo Chang:

Online Optimal Investment Portfolio Model Based on Deep Reinforcement Learning. 14-20 - Yunzhuo Wang, Hao Sun, Guangzhong Sun:

DSP-PIGAN: A Precision-Consistency Machine Learning Algorithm for Solving Partial Differential Equations. 21-26 - Meigen Huang, Lingling Wu, Xue Yuan:

Research on Flow Classification Model Based on Similarity and Machine Learning Algorithm. 27-32 - Tianfeng Shi, Jing Peng:

Factors Affecting Accuracy of Genotype Imputation Using Neural Networks in Deep Learning. 33-40 - Ebenezer Nanor, Wei-Ping Wu, Strato Angsoteng Bayitaa

, Victor Kwaku Agbesi, Brighter Agyemang:
Algorithmic Generation of Positive Samples for Compound-Target Interaction Prediction. 41-49 - Imane Lasri, Anouar Riadsolh, Mourad Elbelkacemi:

Toward an Effective Analysis of COVID-19 Moroccan Business Survey Data using Machine Learning Techniques. 50-58 - Jian Jiao, Haini Zhao, Hongsheng Cao:

Using Deep Learning to Construct Auto Web Penetration Test. 59-66
Algorithm Design and Mathematical Calculation
- Song Yang, Ryan Frier, Qiang Shi:

Acoustic Classification of Bird Species Using Wavelets and Learning Algorithms. 67-71 - Jingjing Lu, Shuangyan Yi, Jiaoyan Zhao, Yongsheng Liang, Wei Liu:

Interpretable Robust Feature Selection via Joint -Norms Minimization. 72-78 - Haiping Zhang, Wang Yang:

An Enhanced Adaptive Large Neighborhood Search Algorithm for the Capacitated Vehicle Routing Problem. 79-85 - Yulong Ling, Xiao Zhang:

An Improved K-means Algorithm Based on Multiple Clustering and Density. 86-92 - Wenhan Deng, Ming Zhang, Kai He, Lijin Wang, Juan Lin, Yiwen Zhong:

A Mixed-coding Harmony Search Algorithm for the Closed Loop Layout Problem. 93-100 - Yuhao Wu, Weipeng Cao, Ye Liu, Zhong Ming, Jianqiang Li

, Bo Lu:
Semantic Auto-Encoder with L2-norm Constraint for Zero-Shot Learning. 101-105 - Elie Azeraf

, Emmanuel Monfrini, Wojciech Pieczynski:
Using the Naive Bayes as a discriminative model. 106-110 - Xiaoshun Lu, Si Chen, Zhuoyuan Zheng, Chenyu Weng, Rui Xu:

Generalized Intersection over Union Based Online Weighted Multiple Instance Learning Algorithm for Object Tracking. 111-116 - Zhiyong Li, Yunqi Wang, Jinghan Mu, Weiming Liao, Kui Zhang:

InSAR Deformation Time-series Reconstruction for Rainfall-induced Landslides Based on Gaussian Process Regression. 117-126
New Generation Neural Network and Technology
- Yanping Xu, Xia Zhang, Tingcong Ye, Zhenliang Qiu, Lingjun Zhang, Hua Zhang, Yifan Wu:

1D CNN for Feature Reconstruction on Network Threat Detection. 127-132 - Shangxian Ruan, Jiating Yang, Jianbo Chen:

A Deformable Convolutional Neural Network with Oriented Response for Fine-Grained Visual Classification. 133-140 - Jingwen Xue, Jun Zhang:

A Novel Spec-CNN-CTC Model for End-to-End Speech Recognition. 141-145 - Tujin Zhu, Yunpeng Cai:

Applying Neural Network to Reconstruction of Phylogenetic Tree. 146-152 - Shan Wen, Kai Liu, Shaoqing Tian, Mingming Fan, Lin Yan:

An Infrared Small Target Detection Method Using Segmentation Based Region Proposal and CNN. 153-160 - Alief Aditya Rachman, Suyanto Suyanto

, Ema Rachmawati
:
Leveraging CNN and Bi-LSTM in Indonesian G2P Using Transformer. 161-165 - Amy Aumpansub, Zhen Huang

:
Detecting Software Vulnerabilities Using Neural Networks. 166-171 - Lisi Chen, Changcheng Wang, Jiale Huang:

Maneuvering Target Tracking Based on Neural Network and Error Self-correction Technology. 172-179 - Pranali Bora, Tulika Awalgaonkar, Himanshu Palve, Raviraj Joshi

, Purvi Goel:
ICodeNet - A Hierarchical Neural Network Approach For Source Code Author Identification. 180-185
Computer Modeling and Calculation
- Juanting Liu, Wei Xu, Xianke Wang

, Wenqing Cheng:
An EB-enhanced CNN Model for Piano Music Transcription. 186-190 - Li Huang, Wenyu Chen, Hong Qu:

Accelerating Transformer for Neural Machine Translation. 191-197 - Zhao Wu, Chao Wang, Ruiyou Li, Huaiqing Zhang:

An Extended Factorial Hidden Markov Model for Non-Intrusive Load Monitoring Based on Density Peak Clustering. 198-203 - Jiayu Pi, Yuan Deng:

Graph Networks as Learnable Engines for Relations Inference of Interacting Financial Systems. 204-209 - Yuze Qin, Guangzhong Sun, Jianfeng Li, Tianyu Hu, Yu He:

SCG_FBS: A Code Grading Model for Students' Program in Programming Education. 210-216 - Yi Zhao, Yan Liu, Xiaoyu Guo, ZhongHang Sui:

Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier. 217-222 - Jiayu Tian:

Do You Want to Foresee Your Future? The Best Model Predicting the Success of Kickstarter Campaigns. 223-231 - Zhizhong Su, Yaoyi Xi, Rong Cao, Huifeng Tang, Hangyu Pan:

A Stance Detection Approach Based on Generalized Autoregressive pretrained Language Model in Chinese Microblogs. 232-238 - Wazir Ali, Rajesh Kumar, Yong Dai, Jay Kumar

, Saifullah Tumrani
:
Neural Joint Model for Part-of-Speech Tagging and Entity Extraction. 239-245
Data Science and Information Engineering
- Caidan Zhao, Yang Lei:

Intra-Class Cutmix for Unbalanced Data Augmentation. 246-251 - Zhen Liu, Ruoyu Wang, Wenbin Zhang

, Deyu Tang:
An Unsupervised Feature Learning Method for Enhancing the Generalization of Cancer Diagnosis. 252-257 - Dengfeng Pan, Zhihai Wu:

Fault-Tolerant Consensus for Leader-following Multi-Agent Systems under False Data Injection Attacks. 258-264 - Ling Wang, Zhihai Wu:

Distributed Secure Consensus for Second-Order Multi-Agent Systems under Replay Attacks. 265-270 - Chen Ke:

Visualization Analysis of Library Research in the Context of Big Data Based on Knowledge Map. 271-278 - Renhao Zhao, Menghan Wang, Qiong Yin, Chao Chen:

SC-DGCN: Sentiment Classification Based on Densely Connected Graph Convolutional Network. 279-284 - Jian Zhou, Ding Liu:

A Redundancy Based Unsupervised Feature Selection Method for High-Dimensional Data. 285-289 - Genxuan Hong, Zhanquan Wang, Fuchen Gao, Hengming Ji:

Traffic Flow Prediction Using Spatiotemporal Analysis and Encoder-Decoder Network. 290-297 - Hassan Ezzeddine, Roger Achkar

:
Ensemble Learning in Stock Market Prediction. 298-303
Digital Image Processing and Application
- Xinning Cao, Guangming Li:

An Effective Method of Wood Crack Trace and Quantity Detection Based on Digital Image Processing Technology. 304-309 - Yian Seo, Kyung-shik Shin

:
Towards Explainable Image Classifier: An Analogy to Multiple Choice Question Using Patch-level Similarity Measure. 310-317 - Yaxin Chen, Zhiqiang Guo, Jie Yang:

Spectral-wise Attention-based Residual Network for Hyperspectral Image Classification. 318-323 - Kai Xu, Huaian Chen, Yi Jin, Changan Zhu:

Amplified Noise Map Guided Network for Low-Light Image Enhancement. 324-329 - Yixin Li, Xinran Wu, Chen Li, Changhao Sun

, Xiaoyan Li, Md Mamunur Rahaman
, Yong Zhang:
Intelligent Gastric Histopathology Image Classification Using Hierarchical Conditional Random Field based Attention Mechanism. 330-335 - Yaoyuan Liang:

Unsupervised Super Resolution Reconstruction of Traffic Surveillance Vehicle Images. 336-341 - Sheng Zhang, Tianxiao Cai, Yihang Chen:

Low Light Image Enhancement in USV Imaging System Via U-Net and Attention Mechanism. 342-348 - Lin Li, Huaiyu Wu, Zhihuan Chen

:
Depth image restoration method based on improved FMM algorithm. 349-355
Artificial Intelligence and Engineering Application
- Yifeng Tu, Yang Liu, Xueming Li:

Deepfake Video Detection by Using Convolutional Gated Recurrent Unit. 356-360 - Jing Chen, Zhiqiang Guo, Jie Yang:

Distant Supervision for Relation Extraction via Noise Filtering. 361-367 - Yanbo Zhang, Liying Zheng:

Pedestrian Trajectory Prediction with MLP-social-GRU. 368-372 - Jihong Zheng, Jinming Min, He He:

Tracking Ground Targets with Road Constraint Using a Gaussian Mixture Road-Labeled PHD Filter. 373-377 - Wei Yan, Ting Liu, Yuzhuo Fu:

YOLO-Tight: an Efficient Dynamic Compression Method for YOLO Object Detection Networks. 378-384 - Yunuo Yang, Honghui Li:

Research on Deep Sound Source Separation. 385-391 - Xia Liu, Yazhuo Li, Zhengyuan Xie:

Path Planning of UAV Based on Error Correction. 392-396 - Tianxiao Cai, Sheng Zhang, Boyu Tan:

AEE-Net: An Efficient End-to-End Dehazing Network in UAV Imaging System. 397-403 - Xiu Zhi, Siriguleng Wang:

Research on the Application of BERT in Mongolian-Chinese Neural Machine Translation. 404-409
Intelligent Recognition Technology and Application
- Jiale Zhou, Tao Wang, Jianfeng Deng:

Corpus Construction and Entity Recognition for the Field of Industrial Robot Fault Diagnosis. 410-416 - Tao Zhang, Kai Tang:

An Efficacious Method for Facial Expression Recognition: GAN Erased Facial Feature Network (GE2FN). 417-422 - Jun Wang, Chao Zhu:

Semantically Enhanced Multi-scale Feature Pyramid Fusion for Pedestrian Detection. 423-431 - Vuliem Khong, Ziyu Zeng, Lu Fang, Shengjin Wang:

One-Shot Face Recognition Based on Multiple Classifiers Training. 432-437 - Hao-Tian Ren, Hongbo Zhang, Qinghongya Shi, Qing Lei, Jixiang Du:

DiffNet: Discriminative Feature Fusion Network of Multisurface Skeleton Project Images for Action Recognition. 438-443 - Shanshan Xie, Haifeng Xu, Jiang Liu

, Yan Zhang, Danjv Lv:
Bird Songs Recognition Based on Ensemble Extreme Learning Machine. 444-449 - Fei Deng, Dongdong Zhang, Jing Peng:

Biological Named Entity Recognition and Role Labeling via Deep Multi-task Learning. 450-455 - Lingjun Kong, Yunchao Bao, Qianwen Wang, Lijun Cao, Shengmei Zhao:

A Gradient heatmap based Table Structure Recognition. 456-463 - Jianyang Qi, Peng Liang, Gang Hao, Yuting Wu:

Using Video Restoration to Improve Face Forgery Detection Based on Low-quality Video. 464-470
Computer Theory and Technology
- Shazib Qayyum, Xiaoping Fan, Rao Faizan Ali:

Feature-based Selection for Open-source Video Conferencing Software System Using Fuzzy Analytical Hierarchy Process (FAHP). 471-476 - Michail Salampasis, Theodosios Siomos, Alkiviadis Katsalis, Konstantinos I. Diamantaras, Konstantinos Christantonis, Marina Delianidi

, Iphigenia Karaveli:
Comparison of RNN and Embeddings Methods for Next-item and Last-basket Session-based Recommendations. 477-484 - Francesca Del Bonifro, Maurizio Gabbrielli

, Stefano Zacchiroli:
Content-Based Textual File Type Detection at Scale. 485-492 - Yu Wang, Jinjin Zhang:

The Determination of the Equivalence of Causal Theories. 493-497 - Ren Deng, Ye Liu, Liyan Luo, Dongjing Chen, Xijie Li:

Unsupervised Feature Selection using Pseudo Label Approximation. 498-502 - Dagmawi Alemu Moges, Rubungo Andre Niyongabo, Hong Qu:

Multi-Perspective Reasoning Transformers. 503-508 - Xin Wang, Jun Guo:

A Model for Text Line Segmentation and Classification in Printed Documents. 509-514 - Zuning Fan, Liangwei Chen:

Diverse Conversation Generation System with Sentence Function Classification. 515-521 - Xingfa Qiu, Qiaosha Zou, Chuanjin Richard Shi:

Single-Pass On-Line Event Detection in Twitter Streams. 522-529 - Boyu He, Han Wu

, Congduan Li, Linqi Song
, Weigang Chen
:
K-CSRL: Knowledge Enhanced Conversational Semantic Role Labeling. 530-535
Computer Science and Information Engineering
- Zijian Huang, Changqing Xu:

MNGAN: Detecting Anomalies with Memorized Normal Patterns. 536-541 - WeiCai Niu, Quan Chen, Weiwen Zhang, Jianwen Ma, Zhongqiang Hu:

GCN2-NAA: Two-stage Graph Convolutional Networks with Node-Aware Attention for Joint Entity and Relation Extraction. 542-549 - Ruiyou Li:

Using Principal Component Analysis and Online Sequential Extreme Learning Machine Approach for Transient Electromagnetic Nonlinear Inversion: TEM-Inversion-based-on-PCA-OSELM. 550-556 - Wenping Liu, Ting Chen, Shengsheng Lai, Gangping Zhang, Guangjian Liu, Haoyu Jin:

Identifying the Key Residues Regulating the Binding between Antibody Avelumab and PD-L1 VIA Molecular Dynamics Simulation. 557-561 - Jihong Zheng, He He, Longteng Cong:

Tracking Ground Targets with Road Constraints Using a JMS-GM-PHD Filter. 562-567 - Sakil Barbhuiya, Peter Kilpatrick

, Dimitrios S. Nikolopoulos:
Linear Regression Based DDoS Attack Detection. 568-574 - Fan Shi, Honghua Wang, Tianhang Lu, Chengliang Wang:

Multi-Objective Optimal Design of Excitation Systems of Synchronous Condensers for HVDC Systems Based on MOEA/D. 575-581 - Xinying Hu, Yu He, Guangzhong Sun:

Active Learning for Concept Prerequisite Learning in Wikipedia. 582-587 - Kaiyue Qiu, Ruizhi Chen, He Huang:

A Practical Indoor and Outdoor Seamless Navigation System Based on Electronic Map and Geomagnetism. 588-594 - Shohei Chiba, Hisayuki Sasaoka:

Effectiveness of Transfer Learning in Autonomous Driving using Model Car. 595-601

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














