


default search action
IFIP IIP 2024: Shenzhen, China
- Zhongzhi Shi, Jim Tørresen, Shengxiang Yang:

Intelligent Information Processing XII - 13th IFIP TC 12 International Conference, IIP 2024, Shenzhen, China, May 3-6, 2024, Proceedings, Part I. IFIP Advances in Information and Communication Technology 703, Springer 2024, ISBN 978-3-031-57807-6
Machine Learning
- Shijie Xue, He Kong, Qi Wang:

Dual Contrastive Learning for Anomaly Detection in Attributed Networks. 3-18 - Peijia Qin, Liyan Song:

Online Learning in Varying Feature Spaces with Informative Variation. 19-33 - Jingran Shen, Nikos Tziritas, Georgios Theodoropoulos:

Towards a Flexible Accuracy-Oriented Deep Learning Module Inference Latency Prediction Framework for Adaptive Optimization Algorithms. 34-47 - Dawei Jin, Rongxin Mi, Tianhang Song:

Table Orientation Classification Model Based on BERT and TCSMN. 48-62 - Hui Ouyang, Cheng Chen, Ke Tang:

Divide-and-Conquer Strategy for Large-Scale Dynamic Bayesian Network Structure Learning. 63-78 - Yuanyuan Liu

, Jiajia Zhang
, Yifan Li
:
Entropy-Based Logic Explanations of Differentiable Decision Tree. 79-91 - Haiwei Hou, Shifei Ding, Xiao Xu, Lili Guo:

Deep Friendly Embedding Space for Clustering. 92-105 - Wenhua Zeng

, Junjie Liu, Bo Zhang:
Bayesian Personalized Sorting Based on Time Factors and Hot Recommendations. 106-114 - Maoguang Wang, Ying Cui:

Design and Implementation of Risk Control Model Based on Deep Ensemble Learning Algorithm. 115-124 - Xiaoxi Liu, Lin Lv, Ju Liu, Yanyang Han, Mengnan Liang, Xiao Jiang:

More Teachers Make Greater Students: Compression of CycleGAN. 125-139 - Bianping Su, Chaoyin Liang, Chunkai Wang, Yufan Guo, Shicong Wu, Yan Chen, Longqing Zhang, Jiao Peng:

Hybrid Integrated Dimensionality Reduction Method Based on Conformal Homeomorphism Mapping. 140-154
Natural Language Processing
- Yan Gao, Tong Xu, Enhong Chen:

Are Mixture-of-Modality-Experts Transformers Robust to Missing Modality During Training and Inferring? 157-172 - Xudong Luo, Ying Luo, Binxia Yang:

Question Answering Systems Based on Pre-trained Language Models: Recent Progress. 173-189 - Jinlong Liu, Xudong Luo:

A BERT-Based Model for Legal Document Proofreading. 190-206 - Manman Zhang

, Shuocan Zhu, Jingmin Zhang, Yu Han, Xiaoxuan Zhu, Leilei Zhang:
Entity Relation Joint Extraction with Data Augmentation Based on Large Language Model. 207-214
Neural and Evolutionary Computing
- Duc-Cuong Dang

, Anton V. Eremeev
, Xiaoyu Qin
:
Empirical Evaluation of Evolutionary Algorithms with Power-Law Ranking Selection. 217-232 - Zhen Song, Wenjian Luo, Peilan Xu, Zipeng Ye, Kesheng Chen:

An Indicator Based Evolutionary Algorithm for Multiparty Multiobjective Knapsack Problems. 233-246 - Qian Wang, Jingbo Zhang, Zhihua Cui:

Ensemble Strategy Based Hyper-heuristic Evolutionary Algorithm for Many-Objective Optimization. 247-259 - Hui Li, Jiayi Zhou, Qingquan Zhang

:
Rolling Horizon Co-evolution for Snake AI Competition. 260-274 - Siphesihle Philezwini Sithungu

, Elizabeth Marie Ehlers
:
Training Artificial Immune Networks as Standalone Generative Models for Realistic Data Synthesis. 275-288 - Yinan Guo, Guoyu Chen, Dongzhang Jiang, Tong Ding, Wenbo Li:

Structure Optimization for Wide-Channel Plate Heat Exchanger Based on Interval Constraints. 289-302 - Lin Guan, Yalin Wang, Xujie Tan, Chenliang Liu:

Genetic Algorithm Driven by Translational Mutation Operator for the Scheduling Optimization in the Steelmaking-Continuous Casting Production. 303-316 - Yulia V. Zakharova

, Maria Yu. Sakhno
:
Adaptive Genetic Algorithm with Optimized Operators for Scheduling in Computer Systems. 317-328 - Kexin Lou

, Jingzhe Li, Markus Barth
, Quanying Liu
:
A Data-Driven Framework for Whole-Brain Network Modeling with Simultaneous EEG-SEEG Data. 329-342
Recommendation and Social Computing
- Jinquan Hou, Yuqiu Jian, Guosheng Xu, Qiang Cao, Guoai Xu:

Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. 345-354 - Mingmeng Zhang, Yuanjing Hao, Pengao Lu, Liang Chang, Long Li:

Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks. 355-366 - Yuying Wang, Jing Zhou, Yifan Ji, Qian Liu, Jiaying Wei:

A Recommendation Algorithm Based on Automatic Meta-path Generation and Relationship Aggregation. 367-381 - Ziyu Zhang, Peilan Xu, Zhaoguo Wang, Wenjian Luo:

Cooperative Coevolution for Cross-City Itinerary Planning. 382-391
Business Intelligence and Risk Control
- Maoguang Wang, Jiaqi Yan, Yuxiao Chen:

A Stock Price Trend Prediction Method Based on Market Sentiment Factors and Multi-layer Stacking Ensemble Learning with Dual-CNN-LSTM Models and Nested Heterogeneous Learners. 395-409 - Xiaotong Liu, Haoyu Wang, Kaijie Zhang, Kaile Lin, Qiufeng Shi, Fanhui Zeng:

Credit Default of P2P Online Loans Based on Logistic Regression Model Under Factor Space Theory Risk Prediction Research. 410-424 - Chunkai Wang, Jian Feng:

FedPV-FS: A Feature Selection Method for Federated Learning in Insurance Precision Marketing. 425-437 - Tiancai Liang

, Yun Zhao, Haolin Wang, Ziwen Cai, Zhaoguo Wang, Wenchao Wang
, Chuanyi Liu:
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching. 438-452 - Siphesihle Philezwini Sithungu

, Elizabeth Marie Ehlers
:
From Concept to Prototype: Developing and Testing GAAINet for Industrial IoT Intrusion Detection. 453-468 - Zhou Zhou, Xuan Liu, Chenyu Wang, Ruichao Lu:

Efficient and Secure Authentication Scheme for Internet of Vehicles. 469-485
Pattern Recognition
- Jianxia Pan, Liu Yang, Xinping Fu, Hai-Cheng Wei, Jing Zhao:

Research on Wavelet Packet Sample Entropy Features of sEMG Signal in Lower Limb Movement Recognition. 489-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














