


default search action
KSEM 2022: Singapore
- Gérard Memmi, Baijian Yang, Linghe Kong, Tianwei Zhang, Meikang Qiu

:
Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13370, Springer 2022, ISBN 978-3-031-10988-1
Knowledge Management with Optimization and Security (KMOS)
- Fei Fan, Linnan Yang, Xingyu Wu, Shengken Lin, Huijie Dong, Changshan Yin:

Study on Chinese Named Entity Recognition Based on Dynamic Fusion and Adversarial Training. 3-14 - Yi Xu

, Leilei Sun
, Bowen Du
, Liangzhe Han
:
Spatial Semantic Learning for Travel Time Estimation. 15-26 - Xiaoxiao Zhou, Weina Niu, Xiaosong Zhang, Ruidong Chen, Yan Wang:

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures. 27-38 - Ying Lin, Shengfu Ning

, Jianpeng Hu, Jiansong Liu, Yifan Cao, Junyuan Zhang, Huan Pi:
PPBR-FL: A Privacy-Preserving and Byzantine-Robust Federated Learning System. 39-50 - Yifan Cao, Ying Lin, Shengfu Ning, Huan Pi, Junyuan Zhang, Jianpeng Hu:

GAN-Based Fusion Adversarial Training. 51-64 - Juxiong Xu, Minbo Li:

MAST-NER: A Low-Resource Named Entity Recognition Method Based on Trigger Pool. 65-76 - Omar A. M. Salem, Haowen Liu, Feng Liu, Yi-Ping Phoebe Chen

, Xi Chen:
Fuzzy Information Measures Feature Selection Using Descriptive Statistics Data. 77-90 - Ganghong Huang

, Jiang Zhong
, Chen Wang, Qizhu Dai, Rongzhen Li
:
Prompt-Based Self-training Framework for Few-Shot Named Entity Recognition. 91-103 - Xiangchong Cui, Ting Bai, Bin Wu, Xinkai Meng:

Learning Advisor-Advisee Relationship from Multiplex Network Structure. 104-115 - Zhongxuan Xue

, Jiang Zhong
, Qizhu Dai
, Rongzhen Li
:
CorefDRE: Coref-Aware Document-Level Relation Extraction. 116-128 - Ming Lian, Jing Liu:

Single Pollutant Prediction Approach by Fusing MLSTM and CNN. 129-140 - Xin Qi, Langzhou He, Jiaxin Wang, Zhanwei Du, Zheng Luo, Xianghua Li:

A Multi-objective Evolutionary Algorithm Based on Multi-layer Network Reduction for Community Detection. 141-152 - Dingling Su

, Zehui Qu:
Detection DDoS of Attacks Based on Federated Learning with Digital Twin Network. 153-164 - Yeqing Qiu

, Chenyu Huang, Jianzong Wang
, Zhangcheng Huang, Jing Xiao:
A Privacy-Preserving Subgraph-Level Federated Graph Neural Network via Differential Privacy. 165-177 - Errikos Streviniotis, Athina Georgara, Georgios Chalkiadakis:

ε -MC Nets: A Compact Representation Scheme for Large Cooperative Game Settings. 178-190 - Bing Shi, Xizi Huang, Zhi Cao:

An Incentive-Compatible and Efficient Mechanism for Matching and Pricing in Ride-Sharing. 191-204 - Zhengchao Jiang, Fan Zhang, Hao Xu, Li Tao, Zili Zhang:

MEOD: A Robust Multi-stage Ensemble Model Based on Rank Aggregation and Stacking for Outlier Detection. 205-218 - Leyao Chen, Wei Zheng, Wenxin Hu:

MTN-Net: A Multi-Task Network for Detection and Segmentation of Thyroid Nodules in Ultrasound Images. 219-232 - Tao Zhang

, Shaojing Yang
, Anxiao Song
, Guangxia Li
, Xuewen Dong
:
Dual Adversarial Federated Learning on Non-IID Data. 233-246 - Xiangyang Liu, Weidong He, Tong Xu, Enhong Chen:

Low-Quality itDanMu Detection via Eye-Tracking Patterns. 247-259 - Jinmin Xue, Shengdong Qu, Jingxian Li, Yan Chu

, Zhengkui Wang:
TSC-GCN: A Face Clustering Method Based on GCN. 260-271 - Chenlin Wang, Yonghao Yu

, Ao Pu, Fan Shi, Cheng Huang:
Spotlight on Video Piracy Websites: Familial Analysis Based on Multidimensional Features. 272-288 - Shuai Xu, Zeheng Zhong, Yikai Luo, Bing Shi:

A Vehicle Value Based Ride-Hailing Order Matching and Dispatching Algorithm. 289-301 - Wenyuan Zhang

, Peng Li, Guangjun Wu, Jun Li:
Privacy-Preserving Deep Learning in Internet of Healthcare Things with Blockchain-Based Incentive. 302-315 - Mingzhi Dai

, Xiang Feng
, Huiqun Yu
, Weibin Guo:
A Novel Spectral Ensemble Clustering Algorithm Based on Social Group Migratory Behavior and Emotional Preference. 316-328 - Weiran Liu, Qiyu Ruan, Liang Zhang, Wei Ren:

An Improved Semantic Link Based Cyber Community Discovery Model on Social Network. 329-338 - Lijian Li

, Yuanpeng He
, Li Li:
NNDF: A New Neural Detection Network for Aspect-Category Sentiment Analysis. 339-355 - Zhengyang Ai, Guangjun Wu, Binbin Li, Yong Wang, Chuantong Chen

:
Fourier Enhanced MLP with Adaptive Model Pruning for Efficient Federated Recommendation. 356-368 - Songlak Sakulwichitsintu

:
Empowering Graduate Students' Service Delivery by Using an Agile Chatbot: A Conceptual Framework. 369-377 - Zechen Wang, Binbin Li, Yong Wang:

Event Detection Based on Multilingual Information Enhanced Syntactic Dependency GCN. 378-390 - Nourelhouda Hammouda

, Mariem Mahfoudh
, Mohamed Cherif:
Semantic Annotation of Videos Based on Mask RCNN for a Study of Animal Behavior. 391-402 - Weronika T. Adrian

, Julia Ignacyk, Krzysztof Kluza, Miroslawa M. Dlugosz
, Antoni Ligeza
:
Modeling Empathy Episodes with ARD and DMN. 403-413 - Weipeng Cao

, Yuhao Wu, Qiang Wang, Jiyong Zhang, Xingjian Zhang, Meikang Qiu
:
A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking. 414-425 - Xingjian Xu

, Fang Liu
, Fanjun Meng
:
Named Entity Recognition in Biology Literature Based on Unsupervised Domain Adaptation Method. 426-437 - Tong Fang, Baoshuai Du, Yunjia Xue, Guang Yang, Jingbo Zhao:

A Lightweight Target Detection Algorithm Based on Improved MobileNetv3-YOLOv3. 438-448 - Jie Yu, Junchen He, Lingyu Xu:

Hypergraph-Based Academic Paper Recommendation. 449-462 - Hongbin He, Hongyu Kuang

, Lin Yang, Feng Yang, Qiang Wang, Weipeng Cao:
Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking. 463-476 - Li Yao, Naigang Zhang, Ao Gao, Yan Wan:

Research on Fabric Defect Detection Technology Based on EDSR and Improved Faster RCNN. 477-488 - Jinbang Hong, Keke Tang, Chao Gao

, Songxin Wang, Sensen Guo, Peican Zhu
:
GM-Attack: Improving the Transferability of Adversarial Attacks. 489-500 - Lijiao Qin, Defu Lian

:
Adversarial Cycle-Consistent Autoencoder for Category-Aware Out-of-Town Recommendation. 501-515 - Kun Peng

, Nannan Sun, Jiahao Cao
, Rui Liu, Jiaqian Ren, Lei Jiang:
Prompt as a Knowledge Probe for Chinese Spelling Check. 516-527 - Yaofeng Chen, Chunyang Zhang, Long Ye, Xiaogang Peng, Meikang Qiu, Weipeng Cao:

W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text Analysis. 528-539 - Shuang Peng, Xianshu Peng, Zhuochen Dai, Li Tao:

HLB-ConvMLP- Rapid Identification of Citrus Leaf Diseases. 540-549 - Hang Jiang, Song Wu, Dehong He, Guoqiang Xiao:

Natural Image Matting with Low-Level Feature Attention Guidance. 550-561 - Yang Qin, Linjiang Zheng, Li Chen, Weining Liu:

Identifying Taxi Commuting Traffic Analysis Zones Using Massive GPS Data. 562-578 - Mei Guo, Jiayu Zhang, Nan Geng, Yaojun Geng, Yongliang Zhang, Mei Li:

Chinese Relation Extraction of Apple Diseases and Pests Based on BERT and Entity Information. 579-592 - Joojo Walker

, Ting Zhong
, Fengli Zhang
, Qiang Gao
, Fan Zhou
:
Recommendation via Collaborative Diffusion Generative Model. 593-605 - Ziyuan Zhang, Meiqi Wang, Wencheng Chen, Han Qiu, Meikang Qiu:

Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical Study. 606-618 - Abir Zawali

, Imen Boukhris
:
System Level Recommender System for Academic Venue Personalization: Multi vs. Linked Domain. 619-630 - Kieran Greer, Yaxin Bi:

Energy Consumption Prediction Using Bands-Based Data Analytics. 631-643 - Wei Hu

, Dian Xu
, Fang Liu
, Zimeng Fan
:
Software and Hardware Fusion Multi-Head Attention. 644-655 - Wei Hu

, Kejie Hu
, Fang Liu
, Jie Fan
:
Hardware and Software Co-optimization for Windows Attention. 656-668 - Yang Sun

, Wei Hu
, Fang Liu
, Feihu Huang, Yonghao Wang
:
SSA: A Content-Based Sparse Attention Mechanism. 669-680 - Feihu Huang

, Min Jiang
, Fang Liu
, Dian Xu
, Zimeng Fan
, Yonghao Wang
:
Classification of Heads in Multi-head Attention Mechanisms. 681-692 - Wei Hu

, Jie Fan
, Fang Liu
, Kejie Hu
:
Hardware and Software Co-design for Soft Switch in ViT Variants Processing Unit. 693-705 - Xiangyu Gao, Meikang Qiu:

Energy-Based Learning for Preventing Backdoor Attack. 706-721 - Dawei Li, Yangkun Ren, Di Liu, Zhenyu Guan, Qianyun Zhang, Yanzhao Wang, Jianwei Liu

:
PUF-Based Intellectual Property Protection for CNN Model. 722-733 - Shudong Zhang

, Haichang Gao
, Yunyi Zhou
, Zihui Wu
, Yiwen Tang
:
Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial Training. 734-746

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














