Skip to main content

previous disabled Page of 12
and
  1. Article

    Open Access

    Learning de-biased regression trees and forests from complex samples

    Regression trees and forests are widely used due to their flexibility and predictive accuracy. Whereas typical tree induction assumes independently identically distributed (i.i.d.) data, in many applications t...

    Malte Nalenz, Julian Rodemann, Thomas Augustin in Machine Learning (2024)

  2. Article

    Open Access

    CoMadOut—a robust outlier detection algorithm based on CoMAD

    Unsupervised learning methods are well established in the area of anomaly detection and achieve state of the art performances on outlier datasets. Outliers play a significant role, since they bear the potentia...

    Andreas Lohrer, Daniyal Kazempour, Maximilian Hünemörder, Peer Kröger in Machine Learning (2024)

  3. Article

    Open Access

    Wasserstein dropout

    Despite of its importance for safe machine learning, uncertainty quantification for neural networks is far from being solved. State-of-the-art approaches to estimate neural uncertainties are often hybrid, comb...

    Joachim Sicking, Maram Akila, Maximilian Pintz, Tim Wirtz in Machine Learning (2024)

  4. No Access

    Article

    Machine learning with a reject option: a survey

    Machine learning models always make a prediction, even when it is likely to be inaccurate. This behavior should be avoided in many decision support applications, where mistakes can have severe consequences. Al...

    Kilian Hendrickx, Lorenzo Perini, Dries Van der Plas, Wannes Meert in Machine Learning (2024)

  5. Article

    Open Access

    Identifying “sloppy” users in TMS through operation logs

    A transportation management system (TMS) is an integral software system for modern logistics and transportation companies. It is crucial to evaluate the quality of a TMS objectively, a task that currently pres...

    Shaoyang Zhang, Lian Wen, Geraldine Torrisi in International Journal of Information Techn… (2024)

  6. No Access

    Chapter and Conference Paper

    MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks

    Backdoor attacks, which manipulate model output, have garnered significant attention from researchers. However, some existing word-level backdoor attack methods in NLP models are difficult to defend effectivel...

    Shufan Yang, Qianmu Li, Zhichao Lian, Pengchuan Wang in Neural Information Processing (2024)

  7. No Access

    Chapter and Conference Paper

    Initial Development of Cooperative Control and Localization of Multiple Spacecraft Using a Multi-Agent Mission Operations System

    Multi-satellite swarms are becoming very popular due to their low costs and short development time. Instead of large and costly monolithic satellites, small satellite swarms can be flown as distributed sensing...

    Trevor Sorensen, Eric Pilger, Miguel Nunes in Proceedings of the IUTAM Symposium on Opti… (2024)

  8. No Access

    Chapter and Conference Paper

    Advancing Multimedia Retrieval in Medical, Social Media and Content Recommendation Applications with ImageCLEF 2024

    The ImageCLEF evaluation campaign was integrated with CLEF (Conference and Labs of the Evaluation Forum) for more than 20 years and represents a Multimedia Retrieval challenge aimed at evaluating the technolog...

    Bogdan Ionescu, Henning Müller, Ana Maria Drăgulinescu in Advances in Information Retrieval (2024)

  9. No Access

    Chapter and Conference Paper

    Parking Space Matching and Path Planning Based on Wolf Feeding Decision Algorithm in Large Underground Garage

    As cities grow, the number of complex underground parking garages with multiple entrances and exits is increasing. Randomly assigning parking spaces can lead to longer wait times for car owners during the park...

    Nan Dou, Zhigang Lian, Chunlei Guo in 6GN for Future Wireless Networks (2024)

  10. Article

    Open Access

    BECIA: a behaviour engineering-based approach for change impact analysis

    This paper introduces Behaviour Engineering-based Change Impact Analysis (BECIA), a novel approach to Change Impact Analysis (CIA). BECIA enables visualization of change impacts from modified requirements on a...

    Sajid Anwer, Lian Wen, Shaoyang Zhang in International Journal of Information Techn… (2024)

  11. No Access

    Chapter and Conference Paper

    Overview of Touché 2024: Argumentation Systems

    Decision-making and opinion-forming are everyday tasks that involve weighing pro and con arguments. The goal of Touché is to foster the development of support-technologies for decision-making and opinion-formi...

    Johannes Kiesel, Çağrı Çöltekin, Maximilian Heinrich in Advances in Information Retrieval (2024)

  12. No Access

    Chapter and Conference Paper

    Enhanced Diagnostic Fidelity in Pathology Whole Slide Image Compression via Deep Learning

    Accurate diagnosis of disease often depends on the exhaustive examination of Whole Slide Images (WSI) at microscopic resolution. Efficient handling of these data-intensive images requires lossy compression te...

    Maximilian Fischer, Peter Neher, Peter Schüffler in Machine Learning in Medical Imaging (2024)

  13. No Access

    Chapter and Conference Paper

    Industrial Noisy Speech Enhancement Using Joint Time-Frequency Loss Function Based on U-Net

    Single-channel speech enhancement research in complex industrial production environments is limited. Current methods, whether based on attention mechanisms or generative adversarial networks, primarily focus o...

    Rongxin Qin, Zhigang Lian in 6GN for Future Wireless Networks (2024)

  14. No Access

    Chapter and Conference Paper

    GRAN Is Superior to GraphRNN: Node Orderings, Kernel- and Graph Embeddings-Based Metrics for Graph Generators

    A wide variety of generative models for graphs have been proposed. They are used in drug discovery, road networks, neural architecture search, and program synthesis. Generating graphs has theoretical challenge...

    Ousmane Touat, Julian Stier in Machine Learning, Optimization, and Data S… (2024)

  15. No Access

    Chapter and Conference Paper

    Overview of PAN 2024: Multi-author Writing Style Analysis, Multilingual Text Detoxification, Oppositional Thinking Analysis, and Generative AI Authorship Verification

    The paper gives a brief overview of the four shared tasks organized at the PAN 2024 lab on digital text forensics and stylometry to be hosted at CLEF 2024. The goal of the PAN lab is to advance the state-of-th...

    Janek Bevendorff, Xavier Bonet Casals, Berta Chulvi in Advances in Information Retrieval (2024)

  16. No Access

    Chapter

    Negative Sample Selection for miRNA-Disease Association Prediction Models

    Yulian Ding, Fei Wang, Yuchen Zhang in Machine Learning Methods for Multi-Omics D… (2024)

  17. No Access

    Chapter and Conference Paper

    Integration Model of Deep Forgery Video Detection Based on rPPG and Spatiotemporal Signal

    With the development of deep learning, video forgery technology is becoming more and more mature, which may bring security risk and the further development of forgery detection is urgently needed. Most of the ...

    Lujia Yang, Wenye Shu, Yongjia Wang, Zhichao Lian in Green, Pervasive, and Cloud Computing (2024)

  18. No Access

    Chapter and Conference Paper

    GAAlign: Robust Sampling-Based Point Cloud Registration Using Geometric Algebra

    Geometrical 3D data is often represented in form of point clouds. A common problem is the registration of point clouds with shared underlying geometry, for example to align two 3D scans. This work presents GAAlig...

    Kai A. Neumann, Dietmar Hildenbrand in Advanced Computational Applications of Geo… (2024)

  19. No Access

    Chapter and Conference Paper

    Intrusion Detection System Based on Adversarial Domain Adaptation Algorithm

    With the explosive growth of the Internet, massive high-dimensional data and multiple attack types make intrusion detection systems face greater challenges. In practical application scenarios, the amount of ab...

    Jiahui Fei, Yunpeng Sun, Yue** Wang, Zhichao Lian in Green, Pervasive, and Cloud Computing (2024)

  20. No Access

    Chapter and Conference Paper

    Efficient NAS with FaDE on Hierarchical Spaces

    Neural architecture search (NAS) is a challenging problem. Hierarchical search spaces allow for cheap evaluations of neural network sub modules to serve as surrogate for architecture evaluations. Yet, sometime...

    Simon Neumeyer, Julian Stier in Advances in Intelligent Data Analysis XXII (2024)

previous disabled Page of 12