


default search action
17th KSEM 2024: Birmingham, UK - Part III
- Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, A. Taufiq Asyhari

, Yonghao Wang:
Knowledge Science, Engineering and Management - 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14886, Springer 2024, ISBN 978-981-97-5497-7
Knowledge Management with Optimization and Security (KMOS)
- Nan Ding, Yong Lai

, Jie Liu:
Knowledge Enhanced Zero-Shot Visual Relationship Detection. 3-15 - Yunyun Qiu

, Weipeng Cao, Zhijiao Xiao, Zhong Ming, Changping Ji, Jiongjiong Gu, Chuqing Cao, Liang Zheng:
WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. 16-27 - Lanlan Chen, Xiaochuan Shi, Linjiang Zhou

, Yilei Wang, Chao Ma, Weiping Zhu:
Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in a JointCloud Environment. 28-40 - Hongyu Kuang

, Jingjing Zhang, Feng Yang, Long Zhang, Zhijian Huang, Lin Yang:
VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. 41-56 - Gen Li

, Cheng Tang
, Li Chen, Daisuke Deguchi, Takayoshi Yamashita, Atsushi Shimada
:
LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. 57-68 - Xiao Li, Gaojie Wu, Jianjian Jiang, Wei-Shi Zheng:

DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. 69-81 - Kaiyue Cai

, Xinzhi Wang
, Xiangfeng Luo
:
Optimize Rule Mining Based on Constraint Learning in Knowledge Graph. 82-98 - Peihao Ding

, Yan Tang
, Xiaoming Ding
, Caijie Guo
:
GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. 99-108 - Haigang Zhang, Wenzhao Teng, Shan Gao, Yujun Zhang, Zhiwei Sun:

An Improved YOLOv7 Based Prohibited Item Detection Model in X-Ray Images. 109-121 - Xiangyun Qian, Yusheng He, Rui Zhang, Zi Kang, Yilin Sheng, Hui Xia:

Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. 122-134 - Zhilong Lv, Zhen Huang, Menglong Lu, Yuxin Yang, Zhiliang Tian, Xin Niu, Dongsheng Li:

Meta Learning Based Rumor Detection with Awareness of Social Bot. 135-151 - Wenxing Hong, Jun Li, Shuyan Li:

Financial FAQ Question-Answering System Based on Question Semantic Similarity. 152-163 - Pengfei Xue, Li Wen

, Chenyang Wang, Chi Zhang, Huimin Ma, Miao Hu:
An Illegal Website Family Discovery Method Based on Association Graph Clustering. 164-178 - Jing Zou, Shungeng Zhang, Meikang Qiu:

Different Attack and Defense Types for AI Cybersecurity. 179-192 - Jinzhu Liu, Peng Wu:

An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. 193-205 - Nady Slam

, Bojie Feng
:
A Belief Evolution Model with Non-axiomatic Logic. 206-219 - Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:

Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. 220-232 - Zihang Liu, Le Yu, Weimiao Li, Tongyu Zhu, Leilei Sun:

Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. 233-247 - Zhengkang Fang

, Keke Gai
, Jing Yu
, Yihang Wei
, Zhentao Wei, Weilin Chan
:
KEEN: Knowledge Graph-Enabled Governance System for Biological Assets. 248-260 - Wenfeng He, Jiawei Lin, Yongpan Zou, Weipeng Cao:

Cop: Continuously Pairing of Heterogeneous Wearable Devices Based on Heartbeat. 261-273 - Shuliang Jiang, Yusheng He, Rui Zhang, Zi Kang, Hui Xia:

DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. 274-285 - Yuhan Tang, Zhiyuan Wu, Bo Gao, Tian Wen, Yuwei Wang, Sheng Sun:

Logits Poisoning Attack in Federated Distillation. 286-298 - Pengyu Qiu

, Yongchao Liu
, Xintan Zeng
:
DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. 299-311 - Junhao Xue, Chuantao Yin, Chen Li, Jun Bai, Hui Chen, Wenge Rong:

Prompt Based CVAE Data Augmentation for Few-Shot Intention Detection. 312-323 - Haoran Xu, Meikang Qiu, Hui Zhao:

Reentrancy Vulnerability Detection Based on Improved Attention Mechanism. 324-335 - Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:

Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. 336-348 - Lian Peng, Meikang Qiu:

AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility. 349-360 - Lida Guo, Zimeng Li, Jingyuan Wang:

Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. 361-372 - Mengjie Guo

, Keke Gai
, Jing Yu
:
Adversarial Examples for Preventing Diffusion Models from Malicious Image Edition. 373-385 - Shuo Wang

, Jing Yu
, Keke Gai
, Liehuang Zhu
:
ReVFed: Representation-Based Privacy-Preserving Vertical Federated Learning with Heterogeneous Models. 386-397 - Jinglei Zhang, Guochang Wen, NingLin Liao, Dongdong Du, Qing Gao, Minghui Zhang, Xixin Cao:

Logit Adjustment with Normalization and Augmentation in Few-Shot Named Entity Recognition. 398-410 - Tangyu Jiang, Haodi Wang

, Rongfang Bie, Libin Jiao:
New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps. 411-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














