Skip to main content

previous disabled Page of 77
and
  1. No Access

    Chapter and Conference Paper

    InDNI: An Infection Time Independent Method for Diffusion Network Inference

    Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...

    Guoxin Chen, Yongqing Wang, Jiangli Shao, Boshen Shi, Huawei Shen in Information Retrieval (2023)

  2. No Access

    Chapter and Conference Paper

    Intelligent Modeling Framework for System of Systems Architecture Based on Knowledge Graph

    Enterprise architecture framework such as DoDAF has become an effective method in recent years to describe a system of systems structure and guide its revolution, especially in the military field. However, the...

    Yue Zhang, Minghao Li, **ngliang Wang, Yajie Dou in Knowledge and Systems Sciences (2022)

  3. No Access

    Chapter and Conference Paper

    Research on Construction Method of SoS Architecture Knowledge Graph

    System of systems (SoS) architecture data is the foundation of SoS architecture design, modeling, and evaluation. Traditional methods of architecture data collection generally need the involvement of modelers....

    Yue Zhang, Minghao Li, **ngliang Wang, Yajie Dou in Knowledge and Systems Sciences (2022)

  4. No Access

    Chapter and Conference Paper

    KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment

    Blockchain is a shared database with excellent characteristics, such as high decentralization and traceability. However, data leakage is still a major problem for blockchain transactions. To address this issue...

    Yang Li, Mengmeng Wang, Jianming Zhu, **uli Wang in Data Science (2022)

  5. No Access

    Chapter and Conference Paper

    3D Visualization Supporting Situational Awareness of Model-Based System of Systems

    Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...

    Yuqian Cao, Boyu **e, Jian Wang, **aochen Zheng in Knowledge and Systems Sciences (2022)

  6. No Access

    Chapter and Conference Paper

    CIRS: A Confidence Interval Radius Slope Method for Time Series Points Based on Unsupervised Learning

    The rise of big data has brought various challenges and revolutions to many fields. Even though its development in many industries has gradually become perfect or even mature, its application and development i...

    Shuya Lei, Weiwei Liu, Xudong Zhang, **aogang Gong, Jian** Huang in Data Science (2022)

  7. No Access

    Chapter and Conference Paper

    Exploring the Asymmetric Effects of Perceived Quality on Product Evaluation: A Study of Automobile Review

    Perceived quality reflects consumers’ perceptions of product attributes and then directly affects the overall evaluation. Existing research has concluded that the effect of perceived quality of attributes on o...

    Tong Yang, Yanzhong Dang, Jiangning Wu in Knowledge and Systems Sciences (2022)

  8. No Access

    Chapter and Conference Paper

    Study on the Intelligent Control Model of a Greenhouse Flower Growing Environment

    Intelligent control of the greenhouse planting environment plays an important role in improving planting efficiency and guaranteeing the quality of precious flowers. Among them, how to adapt the air humidity,...

    **yang Zhen, Rui Xu, Jian Li, Shiming Shen, Jianhui Wen in Data Science (2022)

  9. No Access

    Chapter and Conference Paper

    Aligning Internal Regularity and External Influence of Multi-granularity for Temporal Knowledge Graph Embedding

    Representation learning for the Temporal Knowledge Graphs (TKGs) is an emerging topic in the knowledge reasoning community. Existing methods consider the internal and external influence at either element level...

    Tingyi Zhang, Zhixu Li, Jiaan Wang in Database Systems for Advanced Applications (2022)

  10. No Access

    Chapter and Conference Paper

    BugCat: A Novel Approach to Bug Number Categorization with Multi-modal Time Series Learning

    It is of great importance to categorize the number of bugs over time for both software project managers and its end users. This paper proposes a novel approach called BugCat (i.e., Bug number Categorization) t...

    Wen Zhang, Rui Li, Jiangpeng Zhao, Rui Peng, Yongwu Li in Knowledge and Systems Sciences (2022)

  11. No Access

    Chapter and Conference Paper

    Incorporating Commonsense Knowledge into Story Ending Generation via Heterogeneous Graph Networks

    Story ending generation is an interesting and challenging task, which aims to generate a coherent and reasonable ending given a story context. The key challenges of the task lie in how to comprehend the story ...

    Jiaan Wang, Beiqi Zou, Zhixu Li, Jianfeng Qu in Database Systems for Advanced Applications (2022)

  12. No Access

    Chapter and Conference Paper

    Beyond QA: ‘Heuristic QA’ Strategies in JIMI

    JD Instant Messaging intelligence (JIMI) is an intelligent service robot designed for creating an innovative online shop** experience in E-commerce. We will introduce a framework that combines the ‘intellige...

    Shuangyong Song, Bo Zou, Jianghua Lin in Database Systems for Advanced Applications (2022)

  13. No Access

    Chapter and Conference Paper

    Are Graph Neural Network Explainers Robust to Graph Noises?

    With the rapid deployment of graph neural networks (GNNs) based techniques in a wide range of applications such as link prediction, community detection, and node classification, the explainability of GNNs beco...

    Yiqiao Li, Sunny Verma, Shuiqiao Yang in AI 2022: Advances in Artificial Intelligen… (2022)

  14. No Access

    Chapter and Conference Paper

    An Interactive Data Imputation System

    In this demonstration, we propose an interactive data imputation system, called DITS, built upon ten state-of-the-art imputation algorithms and a novel variational generative adversarial imputation network. It co...

    Yangyang Wu, **aoye Miao, Yuchen Peng in Database Systems for Advanced Applications (2022)

  15. No Access

    Chapter and Conference Paper

    Does a Compromise on Fairness Exist in Using AI Models?

    Artificial Intelligence (AI) has been increasingly used to assist decision making in different domains. Multiple parties are usually affected by decisions in decision making, e.g. decision-maker and people aff...

    Jianlong Zhou, Zhidong Li, Chun **ao in AI 2022: Advances in Artificial Intelligen… (2022)

  16. No Access

    Chapter and Conference Paper

    Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud

    Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbuc...

    Meng Li, Mingwei Zhang, Jianbo Gao, Chhagan Lal in Information and Communications Security (2022)

  17. No Access

    Chapter and Conference Paper

    Decentralized Counterparty Matches and Automatic Settlement of Interest Rate Swap Through Blockchain’s Smart Contracts

    Interest Rate Swap (IRS) is the most vivid application of the principle of comparative advantage in the financial field. The effectiveness of interest rate swap in managing interest rate risk has been widely r...

    Jian Zhao, ****g Liu, Hua Wang, Lin Lin, Shaohua **ang in Data Science (2022)

  18. No Access

    Chapter and Conference Paper

    User Incentive Based Bike-Sharing Dispatching Strategy

    As a green and low-carbon transportation way, bike-sharing provides a lot of convenience in the daily traveling. However, after a period of usage, the distribution of shared bikes may not meet the traveling re...

    Bing Shi, Zhaoxiang Song, **zi Huang in Advances in Knowledge Discovery and Data M… (2022)

  19. No Access

    Chapter and Conference Paper

    Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic

    Recently, website fingerprinting (WF) attacks that eavesdrop on the web browsing activity of users by analyzing the observed traffic can endanger the data security of users even if the users have deployed encr...

    Chengpu Jiang, Zhenbo Gao, Meng Shen in Data Science (2022)

  20. No Access

    Chapter and Conference Paper

    DRIB: Interpreting DNN with Dynamic Reasoning and Information Bottleneck

    The interpretability of deep neural networks has aroused widespread concern in the academic and industrial fields. This paper proposes a new method named the dynamic reasoning and information bottleneck (DRIB)...

    Yu Si, Keyang Cheng, Zhou Jiang, Hao Zhou, Rabia Tahir in Data Science (2022)

previous disabled Page of 77