


default search action
22nd PAKDD 2018: Melbourne, VIC, Australia
- Mohadeseh Ganji, Lida Rashidi, Benjamin C. M. Fung, Can Wang:

Trends and Applications in Knowledge Discovery and Data Mining - PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11154, Springer 2018, ISBN 978-3-030-04502-9
Big Data Analytics for Social Computing (BDASC)
- Senuri Wijenayake

, Timothy Graham
, Peter Christen:
A Decision Tree Approach to Predicting Recidivism in Domestic Violence. 3-15 - Zhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun:

Unsupervised Domain Adaptation Dictionary Learning for Visual Recognition. 16-26 - Liang Zheng, Yali Zhao, Shengjin Wang, Jingdong Wang

, Yi Yang, Qi Tian:
On the Large-Scale Transferability of Convolutional Neural Networks. 27-39 - Tong Chen

, Xue Li
, Hongzhi Yin
, Jun Zhang:
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection. 40-52 - Md Shahzamal, Raja Jurdak

, Bernard Mans
, Ahmad El Shoghri, Frank de Hoog:
Impact of Indirect Contacts in Emerging Infectious Disease on Social Networks. 53-65 - Ibrahim A. Ibrahim

, Abdulqader M. Almars
, Suresh Pokharel, Xin Zhao, Xue Li
:
Interesting Recommendations Based on Hierarchical Visualizations of Medical Data. 66-79 - Chengyuan Zhang, Lei Zhu, Weiren Yu, Jun Long, Fang Huang, Hongbo Zhao

:
Efficient Top K Temporal Spatial Keyword Search. 80-92 - Jun Long, Lei Zhu, Chengyuan Zhang, Shuangqiao Lin, Zhan Yang

, Xinpan Yuan:
HOC-Tree: A Novel Index for Efficient Spatio-Temporal Range Search. 93-107 - Chengyuan Zhang, Lei Zhu, Jun Long, Shuangqiao Lin, Zhan Yang

, Wenti Huang:
A Hybrid Index Model for Efficient Spatio-Temporal Search in HBase. 108-120 - Tong Chen

, Hongxu Chen
, Xue Li
:
Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions. 121-127 - Meng Xu, Jiajun Cheng, Lixiang Guo, Pei Li, Xin Zhang, Hui Wang:

TwiTracker: Detecting and Extracting Events from Twitter for Entity Tracking. 128-134
Australasian Workshop on Machine Learning for Cyber-Security (ML4Cyber)
- Omaru Maruatona, Peter Vamplew

, Richard Dazeley, Paul A. Watters
:
Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA). 137-141 - Lefeng Zhang

, Ping Xiong, Tianqing Zhu:
A Differentially Private Method for Crowdsourcing Data Submission. 142-148 - Ansam Khraisat, Iqbal Gondal

, Peter Vamplew
:
An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier. 149-155 - Kyle Millar, Adriel Cheng, Hong Gunn Chew, Cheng-Chew Lim

:
Deep Learning for Classifying Malicious Network Traffic. 156-161 - Md. Moniruzzaman, Adil M. Bagirov

, Iqbal Gondal
, Simon Brown:
A Server Side Solution for Detecting WebInject: A Machine Learning Approach. 162-167 - Boxiao Pan, Dongfeng Yuan, Weiwei Sun, Cong Liang, Dongyang Li:

A Novel LSTM-Based Daily Airline Demand Forecasting Method Using Vertical and Horizontal Time Series. 168-173 - Hao Chen, Jun Liu, Yanzhang Lv:

A Transfer Metric Learning Method for Spammer Detection. 174-180 - Jayson Pryde, Nestle Angeles, Sheryl Kareen Carinan:

Dynamic Whitelisting Using Locality Sensitive Hashing. 181-185 - Takuya Kuwahara, Yukino Baba, Hisashi Kashima, Takeshi Kishikawa, Jun'ichi Tsurumi, Tomoyuki Haga, Yoshihiro Ujiie, Takamitsu Sasaki, Hideki Matsushima:

Payload-Based Statistical Intrusion Detection for In-Vehicle Networks. 186-192
Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM)
- Youcef Djenouri

, Asma Belhadi, Philippe Fournier-Viger
, Jerry Chun-Wei Lin
:
Discovering Strong Meta Association Rules Using Bees Swarm Optimization. 195-206 - Thuc Duy Le

, Taosheng Xu, Lin Liu
, Hu Shu, Tao Hoang, Jiuyong Li
:
ParallelPC: An R Package for Efficient Causal Exploration in Genomic Data. 207-218 - Yiqing Zhang, Yimeng Dai, Jianzhong Qi

, Xinxing Xu, Rui Zhang:
Citation Field Learning by RNN with Limited Training Data. 219-232 - Runkun Lu

, Jianwei Liu, Siming Lian, Xin Zuo:
Affine Transformation Capsule Net. 233-242 - Huan Phan, Bac Le:

A Novel Algorithm for Frequent Itemsets Mining in Transactional Databases. 243-255 - Abdul Rauf Khan, Henrik Schiøler

, Mohamed Zaki
, Murat Kulahci
:
Rare-Events Classification: An Approach Based on Genetic Algorithm and Voronoi Tessellation. 256-266 - Jie Jiang, Yu-Lin He, Joshua Zhexue Huang:

Particle Swarm Optimization-Based Weighted-Nadaraya-Watson Estimator. 267-279
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI)
- Sikha Bagui, Sharon K. John, John P. Baggs, Subhash C. Bagui:

A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous Features. 283-294 - Qing Zhou, Fenglu Liao, Chao Mou, Ping Wang:

Measuring Interpretability for Different Types of Machine Learning Models. 295-308 - Philip T. Y. Lee:

In Search of Public Agenda with Text Mining: An Exploratory Study of Agenda Setting Dynamics Between the Traditional Media and Wikipedia. 309-317 - Paul A. Watters

:
Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials. 318-329
Data Mining for Energy Modeling and Optimization (DaMEMO)
- Mashud Rana

, Ashfaqur Rahman
, Liwan H. Liyanage
, Mohammed Nazim Uddin:
Comparison and Sensitivity Analysis of Methods for Solar PV Power Prediction. 333-344 - Sean Hsin-Shyuan Lee, Jeremiah D. Deng, Martin K. Purvis, Maryam Purvis, Lizhi Peng:

An Improved PBIL Algorithm for Optimal Coalition Structure Generation of Smart Grids. 345-356 - Yasuno Takato:

Dam Inflow Time Series Regression Models Minimising Loss of Hydropower Opportunities. 357-367

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














