Skip to main content

previous disabled Page of 91
and
  1. No Access

    Article

    An overview of semantic-based process mining techniques: trends and future directions

    Process mining algorithms essentially reflect the execution behavior of events in an event log for conformance checking, model discovery, or enhancement. Domain experts have developed several process mining al...

    Fadilul-lah Yassaanah Issahaku, Ke Lu, Fang **anwen in Knowledge and Information Systems (2024)

  2. No Access

    Article

    Improving graph-based recommendation with unraveled graph learning

    Graph Collaborative Filtering (GraphCF) has emerged as a promising approach in recommendation systems, leveraging the inferential power of Graph Neural Networks. Furthermore, the integration of contrastive lea...

    Chih-Chieh Chang, Diing-Ruey Tzeng, Chia-Hsun Lu in Data Mining and Knowledge Discovery (2024)

  3. Article

    Retraction Note: Reality of virtual damage identification based on neural networks and vibration analysis of a damaged bridge under a moving vehicle

    Chun-bao **ong, Hua-li Lu, **-song Zhu in Neural Computing and Applications (2024)

  4. Article

    Retraction Note: Lip segmentation using localized active contour model with automatic initial contour

    Yuanyao Lu, Tenghe Zhou in Neural Computing and Applications (2024)

  5. No Access

    Article

    Residual deep fuzzy system with randomized fuzzy modules for accurate time series forecasting

    The data-driven modular deep fuzzy model has demonstrated excellent forecasting performance due to its clear architecture and powerful fuzzy inference ability. However, the fixed structure predesigned for spec...

    Yunxia Liu, Wei Peng, Haixia Wang, Chengdong Li in Neural Computing and Applications (2024)

  6. No Access

    Article

    M-Mix: Patternwise Missing Mix for filling the missing values in traffic flow data

    Real-world traffic flow data often contain missing values, which can limit its usability. Although existing deep learning-based imputation methods have shown promising results by reconstructing observed values...

    **aoyu Guo, Weiwei **ng, **ang Wei, Weibin Liu in Neural Computing and Applications (2024)

  7. Article

    Open Access

    Multi-class vulnerability prediction using value flow and graph neural networks

    In recent years, machine learning models have been increasingly used to detect security vulnerabilities in software, due to their ability to achieve high performance and lower false positive rates compared to ...

    Connor McLaughlin, Yi Lu in Neural Computing and Applications (2024)

  8. No Access

    Article

    A new neighbourhood-based diffusion algorithm for personalized recommendation

    Object ratings in recommendation algorithms are used to represent the extent to which a user likes an object. Most existing recommender systems use these ratings to recommend the top-K objects to a target user...

    Diyawu Mumin, Lei-Lei Shi, Lu Liu, Zi-xuan Han in Knowledge and Information Systems (2024)

  9. No Access

    Article

    A novel metric learning method based on constructing a uniform data hypersphere via simulated forging approach

    Non-uniformly distributed data in unbalanced datasets have the phenomenon of data stacking and data scattering. However, most traditional metric learning algorithms often overemphasize the intra-class compactn...

    Lu Liang, Linxin Su, Lunke Fei in Neural Computing and Applications (2024)

  10. No Access

    Article

    C22MP: the marriage of catch22 and the matrix profile creates a fast, efficient and interpretable anomaly detector

    Many time series data mining algorithms work by reasoning about the relationships the conserved shapes of subsequences. To facilitate this, the Matrix Profile is a data structure that annotates a time series by r...

    Sadaf Tafazoli, Yue Lu, Renjie Wu in Knowledge and Information Systems (2024)

  11. No Access

    Article

    Observer-based practical prescribed time control for fractional-order nonlinear systems with asymmetric state constraints

    The primary emphasis of this work is on investigating the practical prescribed time tracking issue for a type of fractional-order state constrained system with immeasurable states. These unknown system states ...

    Lu Chen, Fa Chen, Jian-an Fang in Neural Computing and Applications (2024)

  12. No Access

    Article

    Counterfactual contextual bandit for recommendation under delayed feedback

    The recommendation system has far-reaching significance and great practical value, which alleviates people’s troubles about choosing from a huge amount of information. The existing recommendation system usuall...

    Ruichu Cai, Ruming Lu, Wei Chen, Zhifeng Hao in Neural Computing and Applications (2024)

  13. No Access

    Article

    Siamada: visual tracking based on Siamese adaptive learning network

    Recently, Siamese trackers based on region proposal networks (RPN) have gained a lot of popularity. However, the design of RPN requires manual tuning of parameters such as object-anchor intersection over union...

    **n Lu, Fusheng Li, Wanqi Yang in Neural Computing and Applications (2024)

  14. No Access

    Article

    Online content-based sequential recommendation considering multimodal contrastive representation and dynamic preferences

    The online content, including live streaming and short videos, provides abundant visual and textual product information to users, which offers insights into users’ multiple and changeable preferences toward pr...

    Yusheng Lu, Yongrui Duan in Neural Computing and Applications (2024)

  15. No Access

    Article

    Invisible backdoor learning in regional transform domain

    The rapid develo** deep learning is highly required by resources and computing resources, which easily leads to backdoor learnings. It is difficult for existing schemes to strike a balance among trigger conc...

    Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang in Neural Computing and Applications (2024)

  16. No Access

    Article

    Contrastive feature decomposition for single image layer separation

    The key challenge of image layer separation stems from recognizing different components in a single image. Typical methods optimize the modeling of different components by performing low-level supervision on t...

    **n Feng, **gyuan Li, Haobo Ji, Wenjie Pei in Neural Computing and Applications (2024)

  17. No Access

    Article

    On the adversarial robustness of generative autoencoders in the latent space

    The generative autoencoders, such as the variational autoencoders or the adversarial autoencoders, have achieved great success in lots of real-world applications, including image generation and signal communic...

    Mingfei Lu, Badong Chen in Neural Computing and Applications (2024)

  18. No Access

    Article

    BotCL: a social bot detection model based on graph contrastive learning

    The proliferation of social bots on social networks presents significant challenges to network security due to their malicious activities. While graph neural network models have shown promise in detecting soci...

    Yan Li, Zhenyu Li, Daofu Gong, Qian Hu, Haoyu Lu in Knowledge and Information Systems (2024)

  19. Article

    Open Access

    PINN-CHK: physics-informed neural network for high-fidelity prediction of early-age cement hydration kinetics

    Cement hydration kinetics, characterized by heat generation in early-age concrete, poses a modeling challenge. This work proposes a physics-informed neural network (PINN) named PINN-CHK designed for cement hyd...

    Md Asif Rahman, Tianjie Zhang, Yang Lu in Neural Computing and Applications (2024)

  20. No Access

    Article

    Adaptive semi-supervised learning from stronger augmentation transformations of discrete text information

    Semi-supervised learning is a promising approach to dealing with the problem of insufficient labeled data. Recent methods grouped into paradigms of consistency regularization and pseudo-labeling have outstandi...

    Xuemiao Zhang, Zhouxing Tan, Fengyu Lu, Rui Yan in Knowledge and Information Systems (2024)

previous disabled Page of 91