


default search action
17th KSEM 2024: Birmingham, UK - Part III
- Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, A. Taufiq Asyhari
, Yonghao Wang:
Knowledge Science, Engineering and Management - 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14886, Springer 2024, ISBN 978-981-97-5497-7
Knowledge Management with Optimization and Security (KMOS)
- Nan Ding, Yong Lai
, Jie Liu:
Knowledge Enhanced Zero-Shot Visual Relationship Detection. 3-15 - Yunyun Qiu
, Weipeng Cao, Zhijiao Xiao, Zhong Ming, Changping Ji, Jiongjiong Gu, Chuqing Cao, Liang Zheng:
WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. 16-27 - Lanlan Chen, Xiaochuan Shi, Linjiang Zhou, Yilei Wang, Chao Ma, Weiping Zhu:
Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in a JointCloud Environment. 28-40 - Hongyu Kuang
, Jingjing Zhang, Feng Yang, Long Zhang, Zhijian Huang, Lin Yang:
VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. 41-56 - Gen Li
, Cheng Tang
, Li Chen, Daisuke Deguchi, Takayoshi Yamashita, Atsushi Shimada:
LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. 57-68 - Xiao Li, Gaojie Wu, Jianjian Jiang, Wei-Shi Zheng:
DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. 69-81 - Kaiyue Cai
, Xinzhi Wang
, Xiangfeng Luo
:
Optimize Rule Mining Based on Constraint Learning in Knowledge Graph. 82-98 - Peihao Ding
, Yan Tang
, Xiaoming Ding
, Caijie Guo
:
GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. 99-108 - Haigang Zhang, Wenzhao Teng, Shan Gao, Yujun Zhang, Zhiwei Sun:
An Improved YOLOv7 Based Prohibited Item Detection Model in X-Ray Images. 109-121 - Xiangyun Qian, Yusheng He, Rui Zhang, Zi Kang, Yilin Sheng, Hui Xia:
Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. 122-134 - Zhilong Lv, Zhen Huang, Menglong Lu, Yuxin Yang, Zhiliang Tian, Xin Niu, Dongsheng Li:
Meta Learning Based Rumor Detection with Awareness of Social Bot. 135-151 - Wenxing Hong, Jun Li, Shuyan Li:
Financial FAQ Question-Answering System Based on Question Semantic Similarity. 152-163 - Pengfei Xue, Li Wen
, Chenyang Wang, Chi Zhang, Huimin Ma, Miao Hu:
An Illegal Website Family Discovery Method Based on Association Graph Clustering. 164-178 - Jing Zou, Shungeng Zhang, Meikang Qiu:
Different Attack and Defense Types for AI Cybersecurity. 179-192 - Jinzhu Liu, Peng Wu:
An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. 193-205 - Nady Slam
, Bojie Feng
:
A Belief Evolution Model with Non-axiomatic Logic. 206-219 - Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. 220-232 - Zihang Liu, Le Yu, Weimiao Li, Tongyu Zhu, Leilei Sun:
Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. 233-247 - Zhengkang Fang
, Keke Gai
, Jing Yu
, Yihang Wei
, Zhentao Wei, Weilin Chan
:
KEEN: Knowledge Graph-Enabled Governance System for Biological Assets. 248-260 - Wenfeng He, Jiawei Lin, Yongpan Zou, Weipeng Cao:
Cop: Continuously Pairing of Heterogeneous Wearable Devices Based on Heartbeat. 261-273 - Shuliang Jiang, Yusheng He, Rui Zhang, Zi Kang, Hui Xia:
DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. 274-285 - Yuhan Tang, Zhiyuan Wu, Bo Gao, Tian Wen, Yuwei Wang, Sheng Sun:
Logits Poisoning Attack in Federated Distillation. 286-298 - Pengyu Qiu
, Yongchao Liu
, Xintan Zeng
:
DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. 299-311 - Junhao Xue, Chuantao Yin, Chen Li, Jun Bai, Hui Chen, Wenge Rong:
Prompt Based CVAE Data Augmentation for Few-Shot Intention Detection. 312-323 - Haoran Xu, Meikang Qiu, Hui Zhao:
Reentrancy Vulnerability Detection Based on Improved Attention Mechanism. 324-335 - Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. 336-348 - Lian Peng, Meikang Qiu:
AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility. 349-360 - Lida Guo, Zimeng Li, Jingyuan Wang:
Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. 361-372 - Mengjie Guo
, Keke Gai
, Jing Yu
:
Adversarial Examples for Preventing Diffusion Models from Malicious Image Edition. 373-385 - Shuo Wang
, Jing Yu
, Keke Gai
, Liehuang Zhu
:
ReVFed: Representation-Based Privacy-Preserving Vertical Federated Learning with Heterogeneous Models. 386-397 - Jinglei Zhang, Guochang Wen, NingLin Liao, Dongdong Du, Qing Gao, Minghui Zhang, Xixin Cao:
Logit Adjustment with Normalization and Augmentation in Few-Shot Named Entity Recognition. 398-410 - Tangyu Jiang, Haodi Wang, Rongfang Bie, Libin Jiao:
New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps. 411-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.