default search action
17th KSEM 2024: Birmingham, UK - Part III
- Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, A. Taufiq Asyhari, Yonghao Wang:
Knowledge Science, Engineering and Management - 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14886, Springer 2024, ISBN 978-981-97-5497-7
Knowledge Management with Optimization and Security (KMOS)
- Nan Ding, Yong Lai, Jie Liu:
Knowledge Enhanced Zero-Shot Visual Relationship Detection. 3-15 - Yunyun Qiu, Weipeng Cao, Zhijiao Xiao, Zhong Ming, Changping Ji, Jiongjiong Gu, Chuqing Cao, Liang Zheng:
WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. 16-27 - Lanlan Chen, Xiaochuan Shi, Linjiang Zhou, Yilei Wang, Chao Ma, Weiping Zhu:
Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in a JointCloud Environment. 28-40 - Hongyu Kuang, Jingjing Zhang, Feng Yang, Long Zhang, Zhijian Huang, Lin Yang:
VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. 41-56 - Gen Li, Cheng Tang, Li Chen, Daisuke Deguchi, Takayoshi Yamashita, Atsushi Shimada:
LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. 57-68 - Xiao Li, Gaojie Wu, Jianjian Jiang, Wei-Shi Zheng:
DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. 69-81 - Kaiyue Cai, Xinzhi Wang, Xiangfeng Luo:
Optimize Rule Mining Based on Constraint Learning in Knowledge Graph. 82-98 - Peihao Ding, Yan Tang, Xiaoming Ding, Caijie Guo:
GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. 99-108 - Haigang Zhang, Wenzhao Teng, Shan Gao, Yujun Zhang, Zhiwei Sun:
An Improved YOLOv7 Based Prohibited Item Detection Model in X-Ray Images. 109-121 - Xiangyun Qian, Yusheng He, Rui Zhang, Zi Kang, Yilin Sheng, Hui Xia:
Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. 122-134 - Zhilong Lv, Zhen Huang, Menglong Lu, Yuxin Yang, Zhiliang Tian, Xin Niu, Dongsheng Li:
Meta Learning Based Rumor Detection with Awareness of Social Bot. 135-151 - Wenxing Hong, Jun Li, Shuyan Li:
Financial FAQ Question-Answering System Based on Question Semantic Similarity. 152-163 - Pengfei Xue, Li Wen, Chenyang Wang, Chi Zhang, Huimin Ma, Miao Hu:
An Illegal Website Family Discovery Method Based on Association Graph Clustering. 164-178 - Jing Zou, Shungeng Zhang, Meikang Qiu:
Different Attack and Defense Types for AI Cybersecurity. 179-192 - Jinzhu Liu, Peng Wu:
An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. 193-205 - Nady Slam, Bojie Feng:
A Belief Evolution Model with Non-axiomatic Logic. 206-219 - Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. 220-232 - Zihang Liu, Le Yu, Weimiao Li, Tongyu Zhu, Leilei Sun:
Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. 233-247 - Zhengkang Fang, Keke Gai, Jing Yu, Yihang Wei, Zhentao Wei, Weilin Chan:
KEEN: Knowledge Graph-Enabled Governance System for Biological Assets. 248-260 - Wenfeng He, Jiawei Lin, Yongpan Zou, Weipeng Cao:
Cop: Continuously Pairing of Heterogeneous Wearable Devices Based on Heartbeat. 261-273 - Shuliang Jiang, Yusheng He, Rui Zhang, Zi Kang, Hui Xia:
DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. 274-285 - Yuhan Tang, Zhiyuan Wu, Bo Gao, Tian Wen, Yuwei Wang, Sheng Sun:
Logits Poisoning Attack in Federated Distillation. 286-298 - Pengyu Qiu, Yongchao Liu, Xintan Zeng:
DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. 299-311 - Junhao Xue, Chuantao Yin, Chen Li, Jun Bai, Hui Chen, Wenge Rong:
Prompt Based CVAE Data Augmentation for Few-Shot Intention Detection. 312-323 - Haoran Xu, Meikang Qiu, Hui Zhao:
Reentrancy Vulnerability Detection Based on Improved Attention Mechanism. 324-335 - Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. 336-348 - Lian Peng, Meikang Qiu:
AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility. 349-360 - Lida Guo, Zimeng Li, Jingyuan Wang:
Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. 361-372 - Mengjie Guo, Keke Gai, Jing Yu:
Adversarial Examples for Preventing Diffusion Models from Malicious Image Edition. 373-385 - Shuo Wang, Jing Yu, Keke Gai, Liehuang Zhu:
ReVFed: Representation-Based Privacy-Preserving Vertical Federated Learning with Heterogeneous Models. 386-397 - Jinglei Zhang, Guochang Wen, NingLin Liao, Dongdong Du, Qing Gao, Minghui Zhang, Xixin Cao:
Logit Adjustment with Normalization and Augmentation in Few-Shot Named Entity Recognition. 398-410 - Tangyu Jiang, Haodi Wang, Rongfang Bie, Libin Jiao:
New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps. 411-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.