Skip to main content

previous disabled Page of 153
and
  1. No Access

    Article

    Iterative missing value imputation based on feature importance

    Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces the classification accuracy. To address this problem, the m...

    Cong Guo, Wei Yang, Chun Liu, Zheng Li in Knowledge and Information Systems (2024)

  2. No Access

    Article

    DQN-PACG: load regulation method based on DQN and multivariate prediction model

    Demand response plays a pivotal role in modern smart grid systems, aiding in balancing energy consumption. However, the increasing energy demands of contemporary society have placed a significant burden on pow...

    Rongheng Lin, Shuo Chen, Zheyu He, Budan Wu, **n Zhao in Knowledge and Information Systems (2024)

  3. No Access

    Article

    LightCapsGNN: light capsule graph neural network for graph classification

    Graph neural networks (GNNs) have achieved excellent performances in many graph-related tasks. However, they need appropriate pooling operations to deal with the graph classification tasks, and thus, they may ...

    Yucheng Yan, ** Li, Shuling Xu, **nlong Chen in Knowledge and Information Systems (2024)

  4. No Access

    Article

    Automating localized learning for cardinality estimation based on XGBoost

    For cardinality estimation in DBMS, building multiple local models instead of one global model can usually improve estimation accuracy as well as reducing the effort to label large amounts of training data. Un...

    Jieming Feng, Zhanhuai Li, Qun Chen, Hailong Liu in Knowledge and Information Systems (2024)

  5. No Access

    Article

    Graph neural architecture search with heterogeneous message-passing mechanisms

    In recent years, neural network search has been utilized in designing effective heterogeneous graph neural networks (HGNN) and has achieved remarkable performance beyond manually designed networks. Generally, ...

    Yili Wang, Jiamin Chen, Qiutong Li, Changlong He in Knowledge and Information Systems (2024)

  6. No Access

    Article

    A hybrid storage blockchain-based query efficiency enhancement method for business environment evaluation

    A favorable business environment plays a crucial role in facilitating the high-quality development of a modern economy. In order to enhance the credibility and efficiency of business environment evaluation, th...

    Su Li, Junlu Wang, Wanting Ji, Ze Chen, Baoyan Song in Knowledge and Information Systems (2024)

  7. Article

    Open Access

    On data efficiency of univariate time series anomaly detection models

    In machine learning (ML) problems, it is widely believed that more training samples lead to improved predictive accuracy but incur higher computational costs. Consequently, achieving better data efficiency, that ...

    Wu Sun, Hui Li, Qingqing Liang, **aofeng Zou, Mei Chen, Yanhao Wang in Journal of Big Data (2024)

  8. Article

    Open Access

    Hypoxia within tumor microenvironment characterizes distinct genomic patterns and aids molecular subty** for guiding individualized immunotherapy

    Assessing the hypoxic status within the tumor microenvironment (TME) is crucial for its significant clinical relevance in evaluating drug resistance and tailoring individualized strategies. In this study, we p...

    Run Shi, **g Sun, Hanyu Zhou, Tong Hu, Zhaojia Gao, **n Wang in Journal of Big Data (2024)

  9. No Access

    Article

    Multi-behavior-based graph contrastive learning recommendation

    Graph-based collaborative filtering recommendations can more effectively explore the interaction information between users and items. However, its performance is still affected by the problems of data sparsity...

    Chenzhong Bin, Weiliang Li, Fangjian Wu, Liang Chang in Knowledge and Information Systems (2024)

  10. No Access

    Article

    Reasoning subevent relation over heterogeneous event graph

    Subevent relation identification (SRI) is a challenging natural language processing task of great value for knowledge acquisition and reasoning. Given an event pair, previous work mainly defines SRI as a class...

    Ting-Ting Wu, **ao Ding, Li Du, Bing Qin, Ting Liu in Knowledge and Information Systems (2024)

  11. Article

    Open Access

    A fuel consumption-based method for develo** local-specific CO2 emission rate database using open-source big data

    Emission data collection has always been a significant burden and challenge for Chinese counties to develop a CO2 emission inventory. This paper proposed a fuel consumption-based method to develop a local-specifi...

    Linheng Li, Can Wang, **g Gan, Dapeng Zhang in Journal of Big Data (2024)

  12. Article

    Open Access

    Skyline query under multidimensional incomplete data based on classification tree

    A method for skyline query of multidimensional incomplete data based on a classification tree has been proposed to address the problem of a large amount of useless data in existing skyline queries with multidi...

    Dengke Yuan, Li** Zhang, Song Li, Guanglu Sun in Journal of Big Data (2024)

  13. Article

    Open Access

    DEMFFA: a multi-strategy modified Fennec Fox algorithm with mixed improved differential evolutionary variation strategies

    The Fennec Fox algorithm (FFA) is a new meta-heuristic algorithm that is primarily inspired by the Fennec fox's ability to dig and escape from wild predators. Compared with other classical algorithms, FFA show...

    Gang Hu, Keke Song, **uxiu Li, Yi Wang in Journal of Big Data (2024)

  14. No Access

    Article

    RDAT: an efficient regularized decoupled adversarial training mechanism

    Adversarial examples have exposed the inherent vulnerabilities of deep neural networks. Although adversarial training has emerged as the leading strategy for adversarial defenses, it is frequently hindered by ...

    Yishan Li, Yanming Guo, Yulun Wu in International Journal of Multimedia Inform… (2024)

  15. Article

    Open Access

    High-performance computing in healthcare: An automatic literature analysis perspective

    The adoption of high-performance computing (HPC) in healthcare has gained significant attention in recent years, driving advancements in medical research and clinical practice. Exploring the literature on HPC ...

    Jieyi Li, Shuai Wang, Stevan Rudinac, Anwar Osseyran in Journal of Big Data (2024)

  16. No Access

    Article

    Discriminative boundary generation for effective outlier detection

    Outlier detection is often considered a challenge due to the inherent class imbalance in datasets, with the small number of available outliers that are insufficient to describe their overall distribution. This...

    Ji Zhang, Qiliang Liang, Mohamed Jaward Bah in Knowledge and Information Systems (2024)

  17. No Access

    Article

    Mining Top-K constrained cross-level high-utility itemsets over data streams

    Cross-Level High-Utility Itemsets Mining (CLHUIM) aims to discover interesting relationships between hierarchy levels by introducing the taxonomy of items. To tackle this issue of the current CLHUIM algorithms...

    Meng Han, Shujuan Liu, Zhihui Gao, Dongliang Mu in Knowledge and Information Systems (2024)

  18. No Access

    Article

    BotCL: a social bot detection model based on graph contrastive learning

    The proliferation of social bots on social networks presents significant challenges to network security due to their malicious activities. While graph neural network models have shown promise in detecting soci...

    Yan Li, Zhenyu Li, Daofu Gong, Qian Hu, Haoyu Lu in Knowledge and Information Systems (2024)

  19. Article

    Open Access

    DFA-Net: Dual multi-scale feature aggregation network for vessel segmentation in X-ray digital subtraction angiography

    Even though deep learning is fascinated in fields of coronary vessel segmentation in X-ray angiography and achieves prominent progresses, most of those models probably bring high false and missed detections du...

    He Deng, Xu Liu, Tong Fang, Yuqing Li, **angde Min in Journal of Big Data (2024)

  20. No Access

    Article

    Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning

    While centralized servers pose a risk of being a single point of failure, decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities. Mer...

    Ji Liu, Chunlu Chen, Yu Li, Lin Sun, Yulun Song in Knowledge and Information Systems (2024)

previous disabled Page of 153