


default search action
KSEM 2021: Tokyo, Japan
- Han Qiu, Cheng Zhang, Zongming Fei, Meikang Qiu

, Sun-Yuan Kung:
Knowledge Science, Engineering and Management - 14th International Conference, KSEM 2021, Tokyo, Japan, August 14-16, 2021, Proceedings, Part III. Lecture Notes in Computer Science 12817, Springer 2021, ISBN 978-3-030-82152-4
Knowledge Management with Optimization and Security (KMOS)
- Zhishen Nie

, Ying Lin, Meng Yan, Yifan Cao, Shengfu Ning:
An Adversarial Training Method for Improving Model Robustness in Unsupervised Domain Adaptation. 3-13 - Ming Liu, Jianxin Liao, Jingyu Wang, Qi Qi, Haifeng Sun:

Context-Aware Anomaly Detection in Attributed Networks. 14-26 - Yang Cao, Shi Wang:

An Efficient Hybrid Approach to Detecting and Correcting Auxiliary Word Errors in Chinese Text. 27-40 - Haozhe Zhao, Guozheng Rao

:
Traffic Accident Prediction Methods Based on Multi-factor Models. 41-52 - Rida Miraj

, Masaki Aono
:
Combining BERT and Multiple Embedding Methods with the Deep Neural Network for Humor Detection. 53-61 - Beibei Ruan, Cui Zhu:

An Efficient Link Prediction Model in Dynamic Heterogeneous Information Networks Based on Multiple Self-attention. 62-74 - Hanming Zheng

, Ling Luo, Goce Ristanoski:
A Clustering-Prediction Pipeline for Customer Churn Analysis. 75-84 - Xinxin Liao

, Mingyan Wu, Heyan Chai, Shuhan Qi, Xuan Wang, Qing Liao
:
Fine-Grained Unbalanced Interaction Network for Visual Question Answering. 85-97 - Wenqi Li, Hui Kang, Tie Feng, Jiahui Li, Zhiru Yue, Geng Sun:

Swarm Intelligence-Based Feature Selection: An Improved Binary Grey Wolf Optimization Method. 98-110 - Liang Zhu, Xinfeng Li, Yonggang Wei, Qin Ma, Weiyi Meng:

Integrating Real-Time Entity Resolution with Top-N Join Query Processing. 111-123 - Shuang Chen, Li Li:

Incorporating Question Information to Enhance the Performance of Automatic Short Answer Grading. 124-136 - Zhaochen Li, Kedian Mu:

Integrating Task Information into Few-Shot Classifier by Channel Attention. 137-148 - Xiaoyun Han, Zhen Huang, Menglong Lu, Dongsheng Li, Jinyan Qiu:

Rumor Verification on Social Media with Stance-Aware Recursive Tree. 149-161 - Chao Liu, Xintong Wei, Min Yu, Gang Li

, Xiangmei Ma, Jianguo Jiang, Weiqing Huang:
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. 162-173 - Guoguo Ai, Hui Yan, Jian Yang, Xin Li:

Beyond Laplacian Smoothing for Semi-supervised Community Detection. 174-187 - Jianguo Jiang, Qiang Liu, Min Yu, Gang Li

, Mingqi Liu, Chao Liu, Weiqing Huang:
Landscape-Enhanced Graph Attention Network for Rumor Detection. 188-199 - Vedavyas Etikala

, Jan Vanthienen
:
An Overview of Methods for Acquiring and Generating Decision Models. 200-208 - Yan Chu

, Zhengkui Wang, Lina Wang, Qingchao Zhao, Wen Shan:
Fine-Grained Image Classification Based on Target Acquisition and Feature Fusion. 209-221 - Linming Zhang, Wenzhong Li

, Zhijie Zhang, Qingning Lu, Ce Hou, Peng Hu, Tong Gui, Sanglu Lu:
LogAttn: Unsupervised Log Anomaly Detection with an AutoEncoder Based Attention Mechanism. 222-235 - Xuan Zang

, Bo Yang
, Xueyan Liu
, Anchen Li
:
DNEA: Dynamic Network Embedding Method for Anomaly Detection. 236-248 - Yashen Wang, Huanhuan Zhang:

Adversarial Constraint Evaluation on Biomedical Text Mining. 249-261 - Hao Liu, Fan Zhang, Yi Fan, Junyou Zhu, Zhen Wang, Chao Gao

:
Enhanced Self-node Weights Based Graph Convolutional Networks for Passenger Flow Prediction. 262-274 - Gaigai Tang, Long Zhang, Feng Yang, Lianxiao Meng, Weipeng Cao, Meikang Qiu, Shuangyin Ren, Lin Yang, Huiqiang Wang:

Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME. 275-286 - Zhengyang Mu

, Qi Qi
, Jingyu Wang
, Haifeng Sun
, Jianxin Liao
:
Efficient Depth Completion Network Based on Dynamic Gated Fusion. 287-298 - Chenkai Guo, Yapeng Zi, Wei Ren:

A Blockchain Based Framework for Smart Greenhouse Data Management. 299-310 - Haiqiang Wang, Xuyuan Dong, Zheng Luo, Junyou Zhu, Peican Zhu

, Chao Gao
:
Medication Combination Prediction via Attention Neural Networks with Prior Medical Knowledge. 311-322 - Yutao Chen, Yuxuan Zhang, Zhongrui Huang, Zhenyao Luo, Jinpeng Chen:

CelebHair: A New Large-Scale Dataset for Hairstyle Recommendation Based on CelebA. 323-336 - Juan Chen

, Ang Gao, Siqi Liu, Haiyang Jia
, Yifan Shao, Wenxin Tang:
Image Super-Resolution Based on Residual Block Dense Connection. 337-348 - Jian Hu, Qing Ding, Wenyu Zhang:

EGIM: Evolution Graph Based Interest Modeling for Click-Through Rate Prediction. 349-360 - Yu Liang

, Arin Chaudhuri
, Haoyu Wang
:
Visualizing the Finer Cluster Structure of Large-Scale and High-Dimensional Data. 361-372 - Lingyao Yan, Chuantao Yin, Hui Chen, Wenge Rong, Zhang Xiong, Bertrand David:

Learning Resource Recommendation in E-Learning Systems Based on Online Learning Style. 373-385 - Jiaye Wu, Xudong Luo:

Alignment-Based Graph Network for Judicial Examination Task. 386-400 - Qiuyue Li, Nianwen Ning, Bin Wu, Wenying Guo:

Embedding-Based Network Alignment Using Neural Tensor Networks. 401-413 - Rania Khaskhoussy

, Yassine Ben Ayed:
Detecting Parkinson's Disease According to Gender Using Speech Signals. 414-425 - Arpad Kerestely, Catherine Costigan, Finbarr Holland, Sabin Tabirca

:
Theoretical Study of Exponential Best-Fit: Modeling hCG for Gestational Trophoblastic Disease. 426-438 - Qi Kong, Liangliang Zhang, Xin Xu:

Lane Keeping Algorithm for Autonomous Driving via Safe Reinforcement Learning. 439-450 - Yue Zhang, Keke Gai

, Yihang Wei, Liehuang Zhu:
BS-KGS: Blockchain Sharding Empowered Knowledge Graph Storage. 451-462 - Xuhao Lin

, Shengsheng Wang
:
Faster Nonlocal UNet for Cell Segmentation in Microscopy Images. 463-474 - Junhao Wang

:
An Improved YOLO Algorithm for Object Detection in All Day Scenarios. 475-486 - Xiaochen Wang, Tingsong Xiao

, Jie Shao:
EMRM: Enhanced Multi-source Review-Based Model for Rating Prediction. 487-499 - Yuwen Li, Hao Yin

, Keke Gai
, Liehuang Zhu, Qing Wang:
Blockchain-as-a-Service Powered Knowledge Graph Construction. 500-511 - Xin Liu, Jun Wu:

Finetuned YOLOv3 for Getting Four Times the Detection Speed. 512-521 - Hajer Ben Haj Ayech, Emna Ammar El Hadj Amor, Sonia Ayachi Ghannouchi:

A Systematic Approach for Maintainable Business Process Models. 522-531 - Xiaoqin Tang, Xuxing Liu:

Improved Evolution Algorithm that Guides the Direction of Individual Mutation for Influence Maximization in Social Networks. 532-545 - Shoukang Han, Neng Gao, Xiaobo Guo, Yiwei Shan:

Incorporating Common Knowledge and Specific Entity Linking Knowledge for Machine Reading Comprehension. 546-558 - Su Pei, Ke Niu, Xueping Peng

, Jingni Zeng:
Readmission Prediction with Knowledge Graph Attention and RNN-Based Ordinary Differential Equations. 559-570 - Xiaohui Wei, Nan Jiang, Xiaonan Wang, Hengshan Yue:

Detecting SDCs in GPGPUs Through an Efficient Instruction Duplication Mechanism. 571-584 - Hui Zhao, Peng Su, Yihang Wei, Keke Gai

, Meikang Qiu:
GAN-Enabled Code Embedding for Reentrant Vulnerabilities Detection. 585-597 - Ang Gao, Linjiang Zheng, Zixu Wang, Xuanxuan Luo, Congjun Xie, Yuankai Luo:

Attention Based Short-Term Metro Passenger Flow Prediction. 598-609 - Saleha Noor

, Yi Guo
, Syed Hamad Hassan Shah
, Habiba Halepoto
:
Thematic Analysis of Twitter as a Platform for Knowledge Management. 610-618 - Tianxiu Xie, Yue Zhang, Keke Gai

, Lei Xu:
Cross-Chain-Based Decentralized Identity for Mortgage Loans. 619-633 - Huiru Zhang, Guangshun Li, Yue Zhang, Keke Gai

, Meikang Qiu:
Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning. 634-646 - Meiquan Wang, Guangshun Li, Yue Zhang, Keke Gai

, Meikang Qiu:
An Edge Trajectory Protection Approach Using Blockchain. 647-658 - Mourad Ellouze, Seifeddine Mechti, Lamia Hadrich Belguith

:
Approach Based on Ontology and Machine Learning for Identifying Causes Affecting Personality Disorder Disease on Twitter. 659-669 - Zhengdong Ren, Jun Wang, Guangxian Lyu, Peng Liu, Wang Zhou, Yu Huang:

QBT: Efficient and Flexible Resource Allocation Method for Data Center of State Grid Scenario. 670-683

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














