![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
225 Result(s)
-
Article
Open AccessLearning de-biased regression trees and forests from complex samples
Regression trees and forests are widely used due to their flexibility and predictive accuracy. Whereas typical tree induction assumes independently identically distributed (i.i.d.) data, in many applications t...
-
Article
Open AccessCoMadOut—a robust outlier detection algorithm based on CoMAD
Unsupervised learning methods are well established in the area of anomaly detection and achieve state of the art performances on outlier datasets. Outliers play a significant role, since they bear the potentia...
-
Article
Open AccessWasserstein dropout
Despite of its importance for safe machine learning, uncertainty quantification for neural networks is far from being solved. State-of-the-art approaches to estimate neural uncertainties are often hybrid, comb...
-
Article
Machine learning with a reject option: a survey
Machine learning models always make a prediction, even when it is likely to be inaccurate. This behavior should be avoided in many decision support applications, where mistakes can have severe consequences. Al...
-
Article
Open AccessIdentifying “sloppy” users in TMS through operation logs
A transportation management system (TMS) is an integral software system for modern logistics and transportation companies. It is crucial to evaluate the quality of a TMS objectively, a task that currently pres...
-
Chapter and Conference Paper
MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks
Backdoor attacks, which manipulate model output, have garnered significant attention from researchers. However, some existing word-level backdoor attack methods in NLP models are difficult to defend effectivel...
-
Chapter and Conference Paper
Initial Development of Cooperative Control and Localization of Multiple Spacecraft Using a Multi-Agent Mission Operations System
Multi-satellite swarms are becoming very popular due to their low costs and short development time. Instead of large and costly monolithic satellites, small satellite swarms can be flown as distributed sensing...
-
Chapter and Conference Paper
Advancing Multimedia Retrieval in Medical, Social Media and Content Recommendation Applications with ImageCLEF 2024
The ImageCLEF evaluation campaign was integrated with CLEF (Conference and Labs of the Evaluation Forum) for more than 20 years and represents a Multimedia Retrieval challenge aimed at evaluating the technolog...
-
Chapter and Conference Paper
Parking Space Matching and Path Planning Based on Wolf Feeding Decision Algorithm in Large Underground Garage
As cities grow, the number of complex underground parking garages with multiple entrances and exits is increasing. Randomly assigning parking spaces can lead to longer wait times for car owners during the park...
-
Article
Open AccessBECIA: a behaviour engineering-based approach for change impact analysis
This paper introduces Behaviour Engineering-based Change Impact Analysis (BECIA), a novel approach to Change Impact Analysis (CIA). BECIA enables visualization of change impacts from modified requirements on a...
-
Chapter and Conference Paper
Overview of Touché 2024: Argumentation Systems
Decision-making and opinion-forming are everyday tasks that involve weighing pro and con arguments. The goal of Touché is to foster the development of support-technologies for decision-making and opinion-formi...
-
Chapter and Conference Paper
Enhanced Diagnostic Fidelity in Pathology Whole Slide Image Compression via Deep Learning
Accurate diagnosis of disease often depends on the exhaustive examination of Whole Slide Images (WSI) at microscopic resolution. Efficient handling of these data-intensive images requires lossy compression te...
-
Chapter and Conference Paper
Industrial Noisy Speech Enhancement Using Joint Time-Frequency Loss Function Based on U-Net
Single-channel speech enhancement research in complex industrial production environments is limited. Current methods, whether based on attention mechanisms or generative adversarial networks, primarily focus o...
-
Chapter and Conference Paper
GRAN Is Superior to GraphRNN: Node Orderings, Kernel- and Graph Embeddings-Based Metrics for Graph Generators
A wide variety of generative models for graphs have been proposed. They are used in drug discovery, road networks, neural architecture search, and program synthesis. Generating graphs has theoretical challenge...
-
Chapter and Conference Paper
Overview of PAN 2024: Multi-author Writing Style Analysis, Multilingual Text Detoxification, Oppositional Thinking Analysis, and Generative AI Authorship Verification
The paper gives a brief overview of the four shared tasks organized at the PAN 2024 lab on digital text forensics and stylometry to be hosted at CLEF 2024. The goal of the PAN lab is to advance the state-of-th...
-
Chapter
Negative Sample Selection for miRNA-Disease Association Prediction Models
-
Chapter and Conference Paper
Integration Model of Deep Forgery Video Detection Based on rPPG and Spatiotemporal Signal
With the development of deep learning, video forgery technology is becoming more and more mature, which may bring security risk and the further development of forgery detection is urgently needed. Most of the ...
-
Chapter and Conference Paper
GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra
Geometrical 3D data is often represented in form of point clouds. A common problem is the registration of point clouds with shared underlying geometry, for example to align two 3D scans. This work presents GAAlig...
-
Chapter and Conference Paper
Intrusion Detection System Based on Adversarial Domain Adaptation Algorithm
With the explosive growth of the Internet, massive high-dimensional data and multiple attack types make intrusion detection systems face greater challenges. In practical application scenarios, the amount of ab...
-
Chapter and Conference Paper
Efficient NAS with FaDE on Hierarchical Spaces
Neural architecture search (NAS) is a challenging problem. Hierarchical search spaces allow for cheap evaluations of neural network sub modules to serve as surrogate for architecture evaluations. Yet, sometime...