


default search action
18th AIAI 2022: Hersonissos, Crete, Greece
- Ilias Maglogiannis, Lazaros Iliadis, John MacIntyre, Paulo Cortez:

Artificial Intelligence Applications and Innovations - 18th IFIP WG 12.5 International Conference, AIAI 2022, Hersonissos, Crete, Greece, June 17-20, 2022, Proceedings, Part I. IFIP Advances in Information and Communication Technology 646, Springer 2022, ISBN 978-3-031-08332-7
Adaptive Modeling/Cloud Data Models
- Lisa Elderhorst, Melissa van den Berge, Jan Treur

:
A Second-Order Adaptive Decision Model for Proceeding or Terminating a Pregnancy. 3-15 - Michele Della Ventura

:
A Self-adaptive Learning Music Composition Algorithm as Virtual Tutor. 16-26 - Tajwar Mehmood, Seemab Latif

:
Dynamic Big Data Drift Visualization of CPU and Memory Resource Usage in Cloud Computing. 27-36 - Sophie C. F. Hendrikse

, Jan Treur
, Tom F. Wilderjans
, Suzanne Dikker, Sander L. Koole
:
On the Interplay of Interpersonal Synchrony, Short-Term Affiliation and Long-Term Bonding: A Second-Order Multi-adaptive Neural Agent Model. 37-57 - Mourad El Hamri

, Younès Bennani, Issam Falih:
When Domain Adaptation Meets Semi-supervised Learning Through Optimal Transport. 58-69
Cybersecurity Fraud Intrusion/Anomaly Detection
- Ugur Dolu

, Emre Sefer
:
A Novel GBT-Based Approach for Cross-Channel Fraud Detection on Real-World Banking Transactions. 73-84 - Gonçalo Fontes

, Luís Miguel Matos
, Arthur Matta
, André Luiz Pilastri
, Paulo Cortez
:
An Empirical Study on Anomaly Detection Algorithms for Extremely Imbalanced Datasets. 85-95 - Dragos-Vasile Bratu, Rares Stefan Tiberius Ilinoiu, Alexandru Cristea, Maria-Alexandra Zolya, Sorin-Aurel Moraru:

Anomaly Detection Using Edge Computing AI on Low Powered Devices. 96-107 - K. Bennaceur, Zakaria Sahraoui

, Mohamed Ahmed-Nacer:
Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection. 108-115 - Anastasios Panagiotis Psathas

, Lazaros Iliadis
, Antonios Papaleonidas
, Dimitris Bountas
:
HEDL-IDS: A Hybrid Ensemble Deep Learning Approach for Cyber Intrusion Detection. 116-131 - Tijana Markovic

, Miguel Leon
, David Buffoni, Sasikumar Punnekkat
:
Random Forest Based on Federated Learning for Intrusion Detection. 132-144 - Stavros Stavrinos, Konstantinos Kotis

, Christos Kalloniatis
:
Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things. 145-156
Deep Learning - Convolutional
- Sultan Daud Khan

, Rafi Ullah, Mussadiq Abdul Rahim
, Muhammad Rashid
, Zulfiqar Ali, Mohib Ullah, Habib Ullah:
An Efficient Deep Learning Framework for Face Mask Detection in Complex Scenes. 159-169 - Dimitris Tsiktsiris

, Antonios Lalas
, Minas Dasygenis
, Konstantinos Votis
, Dimitrios Tzovaras
:
An Efficient Method for Addressing COVID-19 Proximity Related Issues in Autonomous Shuttles Public Transportation. 170-179 - Olympia Giannou, Dimitra E. Zazara, Anastasios D. Giannou, Petra Clara Arck, Georgios Pavlidis:

Automatic Semi-quantitative Histological Assessment of Tissue Traits Using a Smart Web Application. 180-191 - Hiba Khodji

, Lucille Herbay
, Pierre Collet
, Julie Dawn Thompson, Anne Jeannin-Girardon
:
MERLIN: Identifying Inaccuracies in Multiple Sequence Alignments Using Object Detection. 192-203 - Milan Kresovic

, Thong Duy Nguyen, Mohib Ullah, Hina Afridi, Faouzi Alaya Cheikh:
PigPose: A Realtime Framework for Farm Animal Pose Estimation and Tracking. 204-215 - Petr Hájek

:
Speech Emotion Recognition from Earnings Conference Calls in Predicting Corporate Financial Distress. 216-228 - Yasuaki Ito, Koji Nakano

, Akihiko Kasagi:
The Bonsai Hypothesis: An Efficient Network Pruning Technique. 229-241
Deep Learning - Recurrent/Reinforcement
- Anshul Rankawat, Rahul Kumar, Arun Kumar:

Deep Recurrent Neural Networks for OYO Hotels Recommendation. 245-256 - Jianye Pang, Wei Ke:

Fine-Grained Double-View Link Prediction Within the Dynamic Interaction Network. 257-269 - Karim Hamadeh, Julia El Zini, Joudi Hajar, Mariette Awad

:
MTMA-DDPG: A Deep Deterministic Policy Gradient Reinforcement Learning for Multi-task Multi-agent Environments. 270-281 - Manoj Shakya

, Huey Yuen Ng
, Darrell Joshua Ong, Bu-Sung Lee:
Reinforcement Learning Approach for Multi-period Inventory with Stochastic Demand. 282-291 - Franz A. Van-Horenbeke

, Angelika Peer
:
The Neocortex-Inspired Locally Recurrent Neural Network (NILRNN) as a Model of the Primary Visual Cortex. 292-303 - Vasilis Kochliaridis

, Eleftherios Kouloumpris
, Ioannis P. Vlahavas
:
TraderNet-CR: Cryptocurrency Trading with Deep Reinforcement Learning. 304-315 - Wei Liu

, Hui Chen
, Yongqiang Ma
, Jianji Wang
, Nanning Zheng
:
Transformer-Based Zero-Shot Detection via Contrastive Learning. 316-327
Energy Streams Modeling
- K. K. Lykothanasi, Spyros Sioutas

, Kostas Tsichlas
:
Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data Streams. 331-342 - Charalampos M. Liapis, Aikaterini Karanikola, Sotiris Kotsiantis:

Energy Load Forecasting: Investigating Mid-Term Predictions with Ensemble Learners. 343-355 - Christos Konstantopoulos, Spyros Sioutas, Konstantinos Tsichlas:

Machine Learning Techniques for Regression in Energy Disaggregation. 356-366
Evolutionary/Biologically Inspired Modeling and Brain Modeling
- Ryan Yu, Andrew Wood, Sarel Cohen, Moshik Hershcovitch, Daniel G. Waddington, Peter Chin:

Biologically Plausible Complex-Valued Neural Networks and Model Optimization. 369-382 - Julia Garbaruk

, Doina Logofatu
, Florin Leon
:
Comparative Study by Using a Greedy Approach and Advanced Bio-Inspired Strategies in the Context of the Traveling Thief Problem. 383-393 - Haodong Jing, Ming Du, Yongqiang Ma

, Nanning Zheng:
Exploring the Relationship Between Visual Information and Language Semantic Concept in the Human Brain. 394-406 - Ming Du

, Haodong Jing, Yongqiang Ma
, Nanning Zheng
:
Hierarchical Causality Network: Find the Effective Connectivity in Visual Cortex. 407-419 - Dragica Rankovic, Nevena Rankovic

, Mirjana Ivanovic, Ljubomir Lazic:
The Generalization of Selection of an Appropriate Artificial Neural Network to Assess the Effort and Costs of Software Projects. 420-431 - Marc Chevallier

, Nistor Grozavu, Faouzi Boufarès, Nicoleta Rogovschi, Charly Clairmont:
Trade Between Population Size and Mutation Rate for GAAM (Genetic Algorithm with Aggressive Mutation) for Feature Selection. 432-444
Explainable AI/Graph Representation and Processing Frameworks
- Giulia Vilone

, Luca Longo
:
A Novel Human-Centred Evaluation Approach and an Argument-Based Method for Explainable Artificial Intelligence. 447-460 - Alabbas Alhaj Ali, Doina Logofatu:

An Analysis on Graph-Processing Frameworks: Neo4j and Spark GraphX. 461-470 - Hassan B. Kazemian, Mohammad Hossein Amirhosseini, Michael Phillips:

Application of Graph-Based Technique to Identity Resolution. 471-482 - Wilmuth Müller, Dirk Mühlenberg, Dirk Pallmer, Uwe Zeltmann, Christian Ellmauer, Konstantinos P. Demestichas:

Knowledge Engineering and Ontology for Crime Investigation. 483-494 - Ahmed Zaiou, Younès Bennani, Mohamed Hibti, Basarab Matei

:
Quantum Approach for Vertex Separator Problem in Directed Graphs. 495-506 - Mina Ameli

, Viktor Pfanschilling
, Anar Amirli
, Wolfgang Maaß
, Kristian Kersting
:
Unsupervised Multi-sensor Anomaly Localization with Explainable AI. 507-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














