![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Image denoising via deep network based on edge enhancement
Existing methods for image denoising mainly focused on noise and visual artifacts too much but rarely mentioned the loss of edge information. In this paper, we propose a deep denoising network based on the res...
-
Article
Multi-information fusion based on dual attention and text embedding network for local citation recommendation
Local citation recommendation is a list of references that researchers need to cite based on a given context, so it could help researchers produce high-quality academic writing quickly and efficiently. However...
-
Article
Extreme Learning Machine with Kernels for Solving Elliptic Partial Differential Equations
Finding solutions for partial differential equations based on machine learning methods is an ongoing challenge in applied mathematics. Although machine learning methods have been successfully applied to solve...
-
Chapter and Conference Paper
Candidate-Aware Attention Enhanced Graph Neural Network for News Recommendation
Facing the daily explosive growth of the news quantity, personalized news recommendation for users becomes an increasingly challenging problem. Modeling user interests is critical for accurate news recommendat...
-
Article
SCC-rFMQ: a multiagent reinforcement learning method in cooperative Markov games with continuous actions
Although many multiagent reinforcement learning (MARL) methods have been proposed for learning the optimal solutions in continuous-action domains, multiagent cooperation domains with independent learners (ILs)...
-
Chapter and Conference Paper
Using Multi-level Attention Based on Concept Embedding Enrichen Short Text to Classification
Aiming at the defects of short text, which lack context information and weak ability to describe topic, this paper proposes an attention network based solution for enriching topic information of short text, wh...
-
Chapter and Conference Paper
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography
The development of video steganography has sparked ever-increasing concerns over video steganalysis. In this paper, a novel steganalysis approach against Discrete Cosine/Sine Transform (DCT/DST) based steganog...
-
Chapter and Conference Paper
A Local-Global Self-attention Interaction Network for RGB-D Cross-Modal Person Re-identification
RGB-D cross-modal person re-identification (Re-ID) task aims to match the person images between the RGB and depth modalities. This task is rather challenging for the tremendous discrepancy between these two mo...
-
Chapter and Conference Paper
A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes
Currently, many High Efficiency Video Coding (HEVC) video steganography algorithms based on Intra Prediction Mode (IPM) have been proposed. However, the existing IPM-based steganalysis algorithms designed for ...
-
Article
Is the simple assignment enough? Exploring the interpretability for community detection
The maximum likelihood estimation is a probabilistic inferencing model of community connectivity in large networks. In general, only the adjacency matrix is utilized to perform community structure parameter in...
-
Article
Open Access3D Printing of Well Dispersed Electrospun PLGA Fiber Toughened Calcium Phosphate Scaffolds for Osteoanagenesis
Although the toughening of Calcium phosphate (CaP) scaffold by the addition of fiber has been well recognized, integrated mechanical, structural and functional considerations have been neglected in the design ...
-
Chapter and Conference Paper
Multi-label Classification of Short Text Based on Similarity Graph and Restart Random Walk Model
A multi-label classification method of short text based on similarity graph and restart random walk model is proposed. Firstly, the similarity graph is created by using data and labels as the node, and the wei...
-
Chapter and Conference Paper
Overlap** Community Detection Combining Topological Potential and Trust Value of Nodes
Aiming at the problems of existing algorithms, such as instability, neglecting interaction between nodes and neglecting attributes of node, an overlap** community discovery algorithm combining topological po...
-
Article
SA-IGA: a multiagent reinforcement learning method towards socially optimal outcomes
In multiagent environments, the capability of learning is important for an agent to behave appropriately in face of unknown opponents and dynamic environment. From the system designer’s perspective, it is desi...
-
Chapter and Conference Paper
DCT: Differential Combination Testing of Deep Learning Systems
Deep learning (DL) systems are increasingly used in security-related fields, where the accuracy and predictability of DL systems are critical. However the DL models are difficult to test and existing DL testin...
-
Chapter and Conference Paper
Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment
Efficient scheduling of data elements and computation units can help to reduce the latency of processing big IoT stream data. In many cases, moving computation turns out to be more cost-effective than moving ...
-
Chapter and Conference Paper
Embedding and Predicting Software Security Entity Relationships: A Knowledge Graph Based Approach
Software security knowledge involves heterogeneous security concepts (e.g., software weaknesses and attack patterns) and security instances (e.g., the vulnerabilities of a particular software product), which c...
-
Chapter and Conference Paper
An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET
Vehicular Ad Hoc Network (VANET) is a special application of traditional Mobile Ad Hoc Network (MANET) in traffic roads, which has attracted extensive attention due to its important role in intelligent traffic...
-
Chapter and Conference Paper
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment
With the growing adoption of Internet of Things (IoT), predictive maintenance is gaining momentum for ensuring the reliability of industrial equipment. A common practice of predictive maintenance is to conduct...
-
Chapter and Conference Paper
Microblog Hot Event Detection Based on Restart Random Walk and Modularity
Using traditional method to extract semantic relations between words hardly applied to micro-blog, which make finding hot event not sensitive. We propose a new method based on restart random walk and Modulari...