We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  2. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  3. DQMMBSC: design of an augmented deep Q-learning model for mining optimisation in IIoT via hybrid-bioinspired blockchain shards and contextual consensus

    Single-chained blockchains are highly secure but cannot be scaled to larger IIoT (Internet of Industrial Things) network scenarios due to storage...

    Manisha Gokuldas Gedam, Swapnili Karmore in International Journal of Data Science and Analytics
    Article 13 July 2024
  4. Enhancing OCT patch-based segmentation with improved GAN data augmentation and semi-supervised learning

    For optimum performance, deep learning methods, such as those applied for retinal and choroidal layer segmentation in optical coherence tomography...

    Jason Kugelman, David Alonso-Caneiro, ... Michael J. Collins in Neural Computing and Applications
    Article Open access 13 July 2024
  5. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  6. The Multi-attribute impact of hyperlinks in blogs: an emotion-centric approach

    As a digital social medium, blogs have transformed into arenas where individuals can express their perspectives, concepts, and feelings. This...

    Stella Mbila-Uma, Oyindamola Koleoso, ... Nitin Agarwal in Social Network Analysis and Mining
    Article 12 July 2024
  7. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
  8. HyperMatch: long-form text matching via hypergraph convolutional networks

    Semantic text matching plays a vital role in diverse domains, such as information retrieval, question answering, and recommendation. However, longer...

    Junwen Duan, Mingyi Jia, ... Jianxin Wang in Knowledge and Information Systems
    Article 12 July 2024
  9. Hierarchical adaptive evolution framework for privacy-preserving data publishing

    The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...

    Mingshan You, Yong-Feng Ge, ... Georgios Kambourakis in World Wide Web
    Article Open access 12 July 2024
  10. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  11. Anomaly analytics in data-driven machine learning applications

    Machine learning is used widely to create a range of prediction or classification models. The quality of the machine learning (ML) models depends not...

    Article Open access 12 July 2024
  12. Temporal analysis of computational economics: a topic modeling approach

    This study offers a comprehensive investigation into the thematic evolution within computational economics over the past two decades, leveraging...

    Malvika Mishra, Santosh Kumar Vishwakarma, ... S. Anjana in International Journal of Data Science and Analytics
    Article Open access 11 July 2024
  13. De-confounding representation learning for counterfactual inference on continuous treatment via generative adversarial network

    Counterfactual inference for continuous rather than binary treatment variables is more common in real-world causal inference tasks. While there are...

    Yonghe Zhao, Qiang Huang, ... Huiyan Sun in Data Mining and Knowledge Discovery
    Article 11 July 2024
  14. Gradient-based explanation for non-linear non-parametric dimensionality reduction

    Dimensionality reduction (DR) is a popular technique that shows great results to analyze high-dimensional data. Generally, DR is used to produce...

    Sacha Corbugy, Rebecca Marion, Benoît Frénay in Data Mining and Knowledge Discovery
    Article 11 July 2024
  15. Enhancing racism classification: an automatic multilingual data annotation system using self-training and CNN

    Accurate racism classification is crucial on social media, where racist and discriminatory content can harm individuals and society. Automated racism...

    Ikram El Miqdadi, Soufiane Hourri, ... Jamal Kharroubi in Data Mining and Knowledge Discovery
    Article 11 July 2024
  16. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
Did you find what you were looking for? Share feedback.