![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
6,427 Result(s)
-
Chapter and Conference Paper
InDNI: An Infection Time Independent Method for Diffusion Network Inference
Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...
-
Chapter and Conference Paper
Spline-Based Dense Medial Descriptors for Image Simplification Using Saliency Maps
Medial descriptors have attracted increasing interest in image representation, simplification, and compression. Recently, such descriptors have been separately used to (a) increase the local quality of represe...
-
Chapter and Conference Paper
Recognition of Blinding Diseases from Ocular OCT Images Based on Deep Learning
Age-Related Macular Degeneration (AMD) and Diabetes Macular Edema (DME) are eye diseases with the highest blinding rate. Optical Coherence Tomography (OCT) is widely used to diagnose different eye diseases. Ho...
-
Chapter and Conference Paper
Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning
With the increasing amount of data, data privacy has drawn great concern in machine learning among the public. Federated Learning, which is a new kind of distributed learning framework, enables data providers ...
-
Chapter and Conference Paper
CO-AutoML: An Optimizable Automated Machine Learning System
In recent years, many automated machine learning (AutoML) techniques are proposed for the automatic selection or design machine learning models. They bring great convenience to the use of machine learning techniq...
-
Chapter and Conference Paper
Deepfake Video Detection Exploiting Binocular Synchronization
How to accurately figure out Deepfake face video has recently been a popular research topic. The normal genuine faces exhibit binocular synchronization phenomenon of eye movements, either blinking or saccade....
-
Chapter and Conference Paper
A Review of Crop Recognition Methods Based on Multi-source Remote Sensing Data
How to identify crop types faster and more accurately by integrating multiple sources Remote Sensing (hereafter RS) data has become a key technique in topographic regions, yet few literatures has addressed on ...
-
Chapter and Conference Paper
Context Reasoning Attention Network: Generating Plausible Distractors for Multi-choice Questions
Distractor generation, which aims to generate the wrong option part of multi-choice questions, has been proposed to assist educators to test the examinees’ reading comprehension and reasoning ability. Recently...
-
Chapter and Conference Paper
Research on the Design and Education of Serious Network Security Games
Through the correct teaching and game design, not only can innovation be carried out, but the highly effective network security teaching and the training solution countermeasure can also develop the student’s ...
-
Chapter and Conference Paper
Brain Network Connectivity Analysis of Different ADHD Groups Based on CNN-LSTM Classification Model
Attention deficit hyperactivity disorder (ADHD), as a common disease of adolescents, is characterized by the inability to concentrate and moderate impulsive behavior. Since the clinical level mostly depends on...
-
Chapter and Conference Paper
Quantum Entanglement Inspired Correlation Learning for Classification
Correlation is an important information resource, which is often used as a fundamental quantity for modeling tasks in machine learning. Since correlation between quantum entangled systems often surpasses that ...
-
Chapter and Conference Paper
Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party int...
-
Chapter and Conference Paper
Bi-level Optimization Method for Automatic Reward Sha** of Reinforcement Learning
The key to lowering the threshold of the application of reinforcement learning is the simplicity and convenience of reward function design. At present, reinforcement learning with good performance mostly adopt...
-
Chapter and Conference Paper
An Eye Movement Study of Joint Attention Deficits in Children with Autism Spectrum Disorders
Using eye tracking technology to explore the underlying processing mechanisms of joint attention in children with autism spectrum disorders (ASD). The experiment selected 32 ASD children and 34 IQ-matched typi...
-
Chapter and Conference Paper
Enhancing Document-Level Relation Extraction by Entity Knowledge Injection
Document-level relation extraction (RE) aims to identify the relations between entities throughout an entire document. It needs complex reasoning skills to synthesize various knowledge such as coreferences and...
-
Chapter and Conference Paper
Perceptual Image Hashing with Bidirectional Generative Adversarial Networks for Copy Detection
The traditional perceptual hashing algorithm is generally achieved by artificially extracting features from an image and quantizing them into a hash code. However, it is often hard to capture the inherent feat...
-
Chapter and Conference Paper
ECCKG: An Eventuality-Centric Commonsense Knowledge Graph
Eventuality-centric knowledge graphs are essential resources for many downstream applications. However, current knowledge graphs mainly focus on knowledge about entities while ignoring the real-world eventuali...
-
Chapter and Conference Paper
A Flexible Rod-Driven Multimode Spatial Variable Geometry Truss Manipulator for Morphing Wings
In this paper, a flexible rod-driven VGTM for morphing wings is designed. The mechanism contains two parts: flexible parallel mechanism and VGTM. The flexible drive reduces the drives’ number and weight of the...
-
Chapter and Conference Paper
Effects of Different Resistance Schemes Applied by Hip Exoskeleton on Lower-Limb Muscle Recruitment and Coordination
Lower-limb exoskeletons are used in a wide range of scenarios. The extensive applications are based on the effective intervention on people, which relies on the understanding of the effect of the exoskeleton i...
-
Chapter and Conference Paper
Reversible Data Hiding for JPEG Image Based on Paillier Encryption
With the convenient and rapid development of cloud storage, data privacy violations have become increasingly prominent. Reversible Data Hiding (RDH) can be used to embed additional data in encrypted data store...