![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
MSK-Net: Multi-source Knowledge Base Enhanced Networks for Script Event Prediction
Script event prediction (SEP) aims to choose a correct subsequent event from a candidate list, according to a chain of ordered context events. It is easy for human but difficult for machine to perform such eve...
-
Chapter and Conference Paper
HAEE: Low-Resource Event Detection with Hierarchy-Aware Event Graph Embeddings
The event detection (ED) task aims to extract structured event information from unstructured text. Recent works in ED rely heavily on annotated training data and often lack the ability to construct semantic kn...
-
Chapter and Conference Paper
Multi-view Spatial-Temporal Enhanced Hypergraph Network for Next POI Recommendation
Next point-of-interest (POI) recommendation has been a prominent and trending task to provide next suitable POI suggestions for users. Current state-of-the-art studies have achieved considerable performances b...
-
Chapter and Conference Paper
IMDb30: A Multi-relational Knowledge Graph Dataset of IMDb Movies
Most knowledge graph embedding (KGE) models are trained and evaluated through common benchmark datasets such as WN18 and FB15k. However, these datasets belong to the general filed and have been utilized as lin...
-
Chapter and Conference Paper
Dynamic Network Embedding in Hyperbolic Space via Self-attention
Graph Neural Networks (GNNs) have recently become increasingly popular due to their ability to learn node representations in complex graphs. Existing graph representation learning methods primarily target stat...
-
Chapter and Conference Paper
MACROBERT: Maximizing Certified Region of BERT to Adversarial Word Substitutions
Deep neural networks are deemed to be powerful but vulnerable, because they will be easily fooled by carefully-crafted adversarial examples. Therefore, it is of great importance to develop models with certifie...
-
Chapter and Conference Paper
Neural Demographic Prediction in Social Media with Deep Multi-view Multi-task Learning
Utilizing the demographic information of social media users is very essential for personalized online services. However, it is difficult to collect such information in most realistic scenarios. Luckily, the re...
-
Chapter and Conference Paper
Efficient, Low-Cost, Real-Time Video Super-Resolution Network
Video Super-Resolution (VSR) task aims to reconstruct missing high-frequency information lost in degradation. Researchers have proposed many excellent models. However, these models require large memory and hig...
-
Chapter and Conference Paper
Representing Knowledge Graphs with Gaussian Mixture Embedding
Knowledge Graph Embedding (KGE) has attracted more and more attention and has been widely used in downstream AI tasks. Some proposed models learn the embeddings of Knowledge Graph (KG) into a low-dimensional c...
-
Chapter and Conference Paper
A Robust Embedding for Attributed Networks with Outliers
Network embedding, as a promising tool, aims to learn low-dimensional embeddings for nodes in a network. Most existing methods work well when the topological structure is closely correlated to node attributes....
-
Chapter and Conference Paper
HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation
POI (point-of-interest) recommendation as an important location-based service has been widely utilized in hel** people discover attractive locations. A variety of available check-in data provide a good oppor...
-
Chapter and Conference Paper
An Energy-Efficient Distributed Routing Protocol for Wireless Sensor Networks with Mobile Sinks
Mobile sink(s) can solve the hotspot issue in static wireless sensor networks (WSNs) but also cause frequent change of network topology, increase the network overhead, and thus affect the network performance. ...
-
Chapter and Conference Paper
Node-Edge Bilateral Attributed Network Embedding
This paper addresses attributed network embedding which maps the structural information and multi-modal attribute data into a latent space. Most existing network embedding algorithms concentrate on either node...
-
Chapter and Conference Paper
Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream
Local topic detection is an important task for many applications such as local event discovery, activity recommendation and emergency warning. Recent years have witnessed growing interest in leveraging spatio-...
-
Chapter and Conference Paper
Blockchain-Based Certificate Transparency and Revocation Transparency
Traditional X.509 public key infrastructures (PKIs) depend on certification authorities (CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure channels. However, recent se...
-
Chapter and Conference Paper
CNN-Based Chinese Character Recognition with Skeleton Feature
Recently, the convolutional neural networks (CNNs) show the great power in dealing with various image classification tasks. However, in the task of Chinese character recognition, there is a significant problem...
-
Chapter and Conference Paper
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients
Byzantine fault tolerant (BFT) protocols enhance system safety and availability in asynchronous networks, despite the arbitrary faults at both servers and clients. A practical BFT system should be efficient in bo...
-
Chapter and Conference Paper
Implementing a Covert Timing Channel Based on Mimic Function
Covert timing channel is a mechanism that can be exploited by an attacker to conceal secrets in timing intervals of transmitted packets. With the development of detection techniques against such channel, it ha...
-
Chapter and Conference Paper
Mitigating the Malicious Trust Expansion in Social Network Service
With the growth of Social Network Service(SNS), the trust that plays the role of connecting people brings both good user experience and threat. Trust expansion is not only the means by which the SNS users cons...
-
Chapter and Conference Paper
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control
Attribute based access control (ABAC) provides an intuitive way for security administrators to express conditions (associated with status of objects) in access control policies; however, during the design and ...