2,500 Result(s)
-
Chapter and Conference Paper
InDNI: An Infection Time Independent Method for Diffusion Network Inference
Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...
-
Chapter and Conference Paper
Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection
Millions of radio frequency identification (RFID) tags are pervasively used all around the globe to identify a wide variety of objects inexpensively. However, the tag cannot use energy-hungry cryptography due ...
-
Chapter and Conference Paper
ITAR: A Method for Indoor RFID Trajectory Automatic Recovery
With the increasing popularity of Radio Frequency Identification (RFID) technology, indoor applications based on RFID trajectory data analysis are becoming more and more extensive, such as personnel location, ...
-
Chapter and Conference Paper
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network
Virtual Private Network (VPN) technology is now widely used in various scenarios such as telecommuting. The importance of VPN traffic identification for network security and management has increased significan...
-
Chapter and Conference Paper
Fine-Grained Head Pose Estimation Based on a 6D Rotation Representation with Multiregression Loss
Estimating the head pose is vital in action evaluation since it has extensive applications such as in automobile driver-assistance systems, performance evaluations of athletes and customers’ attention in retai...
-
Chapter and Conference Paper
Landmark Detection Based on Human Activity Recognition for Automatic Floor Plan Construction
Landmark detection technology has a wide range of applications in people's lives, including map correcting, localization and navigation, etc. Besides, landmarks are also utilized to label different areas for a...
-
Chapter and Conference Paper
User Incentive Based Bike-Sharing Dispatching Strategy
As a green and low-carbon transportation way, bike-sharing provides a lot of convenience in the daily traveling. However, after a period of usage, the distribution of shared bikes may not meet the traveling re...
-
Chapter and Conference Paper
Bi-granularity Adversarial Training for Non-factoid Answer Retrieval
Answer Retrieval is a task of automatically retrieving relevant answers towards a specific question. The recent studies, in this field, have witnessed the vast success of non-factoid QA methods which leverage ...
-
Chapter and Conference Paper
The Differential Gene Detecting Method for Identifying Leukemia Patients
Leukemia is one of the cancers threatening human being for many years. There has not been any general method for identifying acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) accurately. This...
-
Chapter and Conference Paper
A Novel Protein Interface Prediction Framework via Hybrid Attention Mechanism
Protein interface prediction is fundamental to understand the hidden principles of many living activities. Although many approaches to the task of protein interface prediction have been proposed, most of exist...
-
Chapter and Conference Paper
Towards Nested and Fine-Grained Open Information Extraction
Open Information Extraction is a crucial task in natural language processing with wide applications. Existing efforts only work on extracting simple flat triplets that are not minimized, which neglect triplets...
-
Chapter and Conference Paper
Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks
Mobile Crowdsensing (MCS) platforms often require workers to provide their locations for task allocation, which may cause privacy leakage
-
Chapter and Conference Paper
Combining Improvements for Exploiting Dependency Trees in Neural Semantic Parsing
The dependency tree of a natural language sentence can capture the interactions between semantics and words. However, it is unclear whether those methods which exploit such dependency information for semantic ...
-
Chapter and Conference Paper
MFF-AMD: Multivariate Feature Fusion for Android Malware Detection
Researchers have turned their focus on leveraging either dynamic or static features extracted from applications to train AI algorithms to identify malware precisely. However, the adversarial techniques have be...
-
Chapter and Conference Paper
Weibo-MEL, Wikidata-MEL and Richpedia-MEL: Multimodal Entity Linking Benchmark Datasets
Multimodal entity linking (MEL) aims to utilize multimodal information to map mentions to corresponding entities defined in knowledge bases. In this paper, we release three MEL datasets: Weibo-MEL, Wikidata-ME...
-
Chapter and Conference Paper
T-UNet: A Novel TC-Based Point Cloud Super-Resolution Model for Mechanical LiDAR
Mechanical LiDAR is one of the most crucial perception sensors for autonomous vehicles. However, the vertical angular resolution of low-cost multi-beam LiDAR is small, limiting the perception and movement rang...
-
Chapter and Conference Paper
MR-FI: Mobile Application Recommendation Based on Feature Importance and Bilinear Feature Interaction
With the rapid growth of mobile applications in major mobile app stores, it is challenging for users to choose their desired mobile applications. Therefore, it is necessary to provide a high-quality mobile app...
-
Chapter and Conference Paper
TGKG: New Data Graph Based on Game Ontology
With the advent of the big data era, knowledge graph embodies great advantages. Especially in game domain, building a knowledge graph is of great value. However, some open-domain knowledge bases is not designe...
-
Chapter and Conference Paper
LoCo-VAE: Modeling Short-Term Preference as Joint Effect of Long-Term Preference and Context-Aware Impact in Recommendation
User preference modeling is an essential task for online recommender systems. Recently, methods have been applied to model short-term user preferences within a short-term period. These approaches use recent us...
-
Chapter and Conference Paper
A Stepwise Path Selection Scheme Based on Multiple QoS Parameters Evaluation in SDN
Nowadays, the best-effort service can not guarantee the quality of service (QoS) for all kinds of services. QoS routing is an important method to guarantee QoS requirements. It involves path selection for flow...