default search action
IAIC 2023: Nanjing, China
- Hai Jin, Yi Pan, Jianfeng Lu:
Artificial Intelligence and Machine Learning - First International Artificial Intelligence Conference, IAIC 2023, Nanjing, China, November 25-27, 2023, Revised Selected Papers, Part I. Communications in Computer and Information Science 2058, Springer 2024, ISBN 978-981-97-1276-2 [contents] - Xiangchao Shao, Xueli Xiao, Yingxiong Leng:
Machine Printed Page Number Anomaly Detection Method Based on Multi-scale Self Attention Encoding Decoding. 1-15 - Tiantian Li, Bingchuan He, Huangfei Cheng, Bin Cao:
A Novel MEC Framework for Extractive Summarization Using Semantic Role Graph and Semantic Matching. 16-31 - Zhixuan Zou, Yiwen Sun, Weiguo Li, Yiqi Li, Yintong Wang:
A Paper Citation Link Prediction Method Using Graph Attention Network. 32-41 - Wan Ma Dao Ji, An Jian Cai Rang, Jan Yang Cuo, Gong Bao Jia, De Ji Cuo, Zan La Gong, Yang Qin:
Research on Emotional Analysis of Tibetan Short Text Based on Fusion Sentiment Lexicon. 42-57 - Wenhai Lu, Jieren Cheng, Xiulai Li, Ji He:
A Review of Solving Non-IID Data in Federated Learning: Current Status and Future Directions. 58-72 - Guolong Liao, Xiangyan Tang, Tian Li, Li Zhong, Pengfan Zeng:
A Review of Relationship Extraction Based on Deep Learning. 73-84 - Xiaohou Shi, Jiahao Liu, Yaqi Song:
BERT and LLM-Based Multivariate Hate Speech Detection on Twitter: Comparative Analysis and Superior Performance. 85-97 - Lan Xu:
Deep Learning for Protein-Protein Contact Prediction Using Evolutionary Scale Modeling (ESM) Feature. 98-111 - Mu Chen, Zaojian Dai, Yong Li, Ziang Lu:
FedTag: Towards Automated Attack Investigation Using Federated Learning. 112-126 - Zhang Pan, Qianli Huang, Ziqing Tian, Ying Liu, Jiapeng Lou, Yongguang Gong, Zhiqiang Wang:
Deep Learning Based SQL Injection Attack Detection. 127-141 - Xinran Jing, Yongli Wang:
RSCC: Robust Semi-supervised Learning with Contrastive Learning and Augmentation Consistency Regularization. 142-155 - Tianwen Huang, Mingming Zhang, Kai Liu, Xianhui Li, Yongli Wang:
Enhanced Prototypical Network for Few-Shot Named Entity Recognition. 156-170 - Yonggui Wang, Xiao Feng, Wenjing Li, Tengfei Dong:
Regularized DNN Based Adaptive Compensation Algorithm for Gateway Power Meter in Ultra-High Voltage Substations. 171-181 - Minchao Liang, Mingming Zhang, Kai Liu, Xianhui Li, Yongli Wang:
Dynamic Occlusion Expression Recognition Based on Improved GAN. 182-197 - Yan He, Yongli Wang:
Contrastive Learning Based on AMR Graph for Logic Reasoning. 198-211 - Jiahua Lin, Duan Gui, Quan Xie, Xundao Zhou, Yunxiao Shan:
Automated Detection and Recognition of Wild Dolphin Behaviors Using Deep Learning. 212-219 - Dongyu Wang, Canghong Shi, Junrong Li, Jiaxin Gan, Xianhua Niu, Ling Xiong:
M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC. 220-234 - Haojun Liu, Xiangyan Tang, Taixing Xu, Ji He:
A Survey of Homogeneous and Heterogeneous Multi-source Information Fusion Based on Rough Set Theory. 235-246 - Yuxuan Dong, Kaihu Hou, Yaqin Liu, Xiantao Ma, Ming Chen, Yunfa Gao, Jiming Dai, Jie Long:
Formula Maintenance of Single Material Tobacco Compatibility Based on Co-formulation Analysis Method. 247-261 - Zhenbing Li, Junjie Huang, Shilin Jia, Jinrong Zhang, Jialong Fu, Xiaochuan Fang, Gang Li, Guangjun Wen:
Multi-physical Field Collaborative Simulation Optimization Technology and Reliability Analysis of Power Amplifiers. 262-276 - YuDan Zhao, Wu Zeng, Ying Ni, Peng Xia, Ruochen Tan:
Research and Design of Hydrological Data Visualization Based on Digital Twin. 277-289 - Rui Xu, Ruiming Wen, Gang Li, Guangjun Wen:
Design of Constraint FH-LFM DFRC Waveform. 290-303 - Yiping Zhang, Yiyang Zhou, Jie Yin, Yichen Yang, Wenwei Xie, Guangjun Liang, Lanping Zhang:
A Construction of IoT Malicious Traffic Dataset and Its Applications. 304-318 - Xin Zhong, Jiahao Wang, Zutong Sun, Yuheng Ren, Kuihua Li:
Meta-learning Based on Multi-objective Optimization. 319-332 - Jia Du, Junqiang Yang, Wanli Kou, Huaizhe Zhou:
Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events. 333-339 - Lingyu Song, Yifu Sheng, Hao Li, Jianjun Zhang, Ziwen Yu, Enling Zhou, Haijun Lin, Ziqiu Zhang:
Application of T-S Fuzzy Neural Network in Water Quality Classification and Evaluation. 340-352 - Yuanhe Tang, Shiming Sun, Xin Shan, Tong Tai:
Grid-Level Data Oriented Real-Time Automatic Calculation and Storage Method. 353-362 - Zhi Yuan, Yongli Wang:
FedMLP4SR: Federated MLP-Based Sequential Recommendation System. 363-375 - Ke Zhang, Yongli Wang:
Attribute Encryption Information Sharing Scheme Based on Blockchain Technology. 376-388 - Jingmeng Zhang, Yulong An, Shixing Wu:
An Epidemiological Control Strategy Model of SVEIMQR. 389-403 - Mengjie Han, Daomeng Cai, Zhilin Huo, Zhao Shen, Lianghu Tang, Shan Yang, Cong Wang:
Reducing Overfitting Risk in Small-Sample Learning with ANN: A Case of Predicting Graduate Admission Probability. 404-419 - Hongjuan Wen, Menglu Xu, Yang Gong, Haiyang Zhang, Xiaoting Zhu:
Comparisonof Chinese College Students'Anxiety During and BeforeCOVID19 Pandemic Based on Clustering Algorithm. 420-430 - Zhe Zhao, Yiguo Cai, Zhen Gong, Hao Ni, Zhiyong Xu, Li Sun:
Risk Perception Visualization of Public Health Emergencies Based on Clustering Algorithms. 431-441 - Yiguo Cai, Fang Xia, Ziying Xu, Menglu Xu, Siqi Li, Jingshuo Liu:
Visualization of Tumor Treatment Methods Based on Clustering Algorithms. 442-453 - Shiyu Gao, Yiguo Cai, Shan Huo, Xin Liu, He Wang:
Research on the Operational Efficiency of Listed Pharmaceutical Logistics Companies in China Based on DEA-BCC Model and Malmquist Index. 454-463 - Xin Liu, Fang Xia, Lingzhi Kong, Shuo Zhang:
A Study on the Export Trend Forecast of Chinese Pharmaceutical Industry Based on GM (1, 1) Model. 464-470 - Hua Chen, Wenqian Yang, Wei Wang, Zhicai Liu:
YOLO-TUF: An Improved YOLOv5 Model for Small Object Detection. 471-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.