Table of Contents
|
Intelligent Information Processing XII Zhongzhi Shi, Jim Torresen, Shengxiang Yang |
Front Matter |
Machine Learning
|
Dual Contrastive Learning for Anomaly Detection in Attributed Networks Shijie Xue, He Kong, Qi Wang |
3-18 |
Online Learning in Varying Feature Spaces with Informative Variation Peijia Qin, Liyan Song |
19-33 |
Towards a Flexible Accuracy-Oriented Deep Learning Module Inference Latency Prediction Framework for Adaptive Optimization Algorithms Jingran Shen, Nikos Tziritas, Georgios Theodoropoulos |
34-47 |
Table Orientation Classification Model Based on BERT and TCSMN Dawei Jin, Rongxin Mi, Tianhang Song |
48-62 |
Divide-and-Conquer Strategy for Large-Scale Dynamic Bayesian Network Structure Learning Hui Ouyang, Cheng Chen, Ke Tang |
63-78 |
Entropy-Based Logic Explanations of Differentiable Decision Tree Yuanyuan Liu, Jiajia Zhang, Yifan Li |
79-91 |
Deep Friendly Embedding Space for Clustering Haiwei Hou, Ding Shifei, Xiao Xu, Lili Guo |
92-105 |
Bayesian Personalized Sorting Based on Time Factors and Hot Recommendations Wenhua Zeng, Junjie Liu, Bo Zhang |
106-114 |
Design and Implementation of Risk Control Model Based on Deep Ensemble Learning Algorithm Maoguang Wang, Ying Cui |
115-124 |
More Teachers Make Greater Students: Compression of CycleGAN Xiaoxi Liu, Lin Lv, Ju Liu, Yanyang Han, Mengnan Liang, Xiao Jiang |
125-139 |
Hybrid Integrated Dimensionality Reduction Method Based on Conformal Homeomorphism Mapping Bianping Su, Chaoyin Liang, Chunkai Wang, Yufan Guo, Shicong Wu, Yan Chen, Longqing Zhang, Jiao Peng |
140-154 |
Natural Language Processing
|
Are Mixture-of-Modality-Experts Transformers Robust to Missing Modality During Training and Inferring? Yan Gao, Tong Xu, Enhong Chen |
157-172 |
Question Answering Systems Based on Pre-trained Language Models: Recent Progress Xudong Luo, Ying Luo, Binxia Yang |
173-189 |
A BERT-Based Model for Legal Document Proofreading Jinlong Liu, Xudong Luo |
190-206 |
Entity Relation Joint Extraction with Data Augmentation Based on Large Language Model Manman Zhang, Shuocan Zhu, Jingmin Zhang, Yu Han, Xiaoxuan Zhu, Leilei Zhang |
207-214 |
Neural and Evolutionary Computing
|
Empirical Evaluation of Evolutionary Algorithms with Power-Law Ranking Selection Duc-Cuong Dang, Anton V. Eremeev, Xiaoyu Qin |
217-232 |
An Indicator Based Evolutionary Algorithm for Multiparty Multiobjective Knapsack Problems Zhen Song, Wenjian Luo, Peilan Xu, Zipeng Ye, Kesheng Chen |
233-246 |
Ensemble Strategy Based Hyper-heuristic Evolutionary Algorithm for Many-Objective Optimization Wang Qian, Zhang Jingbo, Cui Zhihua |
247-259 |
Rolling Horizon Co-evolution for Snake AI Competition Hui Li, Jiayi Zhou, Qingquan Zhang |
260-274 |
Training Artificial Immune Networks as Standalone Generative Models for Realistic Data Synthesis Siphesihle Philezwini Sithungu, Elizabeth Marie Ehlers |
275-288 |
Structure Optimization for Wide-Channel Plate Heat Exchanger Based on Interval Constraints Yinan Guo, Guoyu Chen, Dongzhang Jiang, Tong Ding, Wenbo Li |
289-302 |
Genetic Algorithm Driven by Translational Mutation Operator for the Scheduling Optimization in the Steelmaking-Continuous Casting Production Lin Guan, Yalin Wang, Xujie Tan, Chenliang Liu |
303-316 |
Adaptive Genetic Algorithm with Optimized Operators for Scheduling in Computer Systems Yu. V. Zakharova, M. Yu. Sakhno |
317-328 |
A Data-Driven Framework for Whole-Brain Network Modeling with Simultaneous EEG-SEEG Data Kexin Lou, Jingzhe Li, Markus Barth, Quanying Liu |
329-342 |
Recommendation and Social Computing
|
Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV Jinquan Hou, Yuqiu Jian, Guosheng Xu, Qiang Cao, Guoai Xu |
345-354 |
Flexible k-anonymity Scheme Suitable for Different Scenarios in Social Networks Mingmeng Zhang, Yuanjing Hao, Pengao Lu, Liang Chang, Long Li |
355-366 |
A Recommendation Algorithm Based on Automatic Meta-path Generation and Relationship Aggregation Yuying Wang, Jing Zhou, Yifan Ji, Qian Liu, Jiaying Wei |
367-381 |
Cooperative Coevolution for Cross-City Itinerary Planning Ziyu Zhang, Peilan Xu, Zhaoguo Wang, Wenjian Luo |
382-391 |
Business Intelligence and Risk Control
|
A Stock Price Trend Prediction Method Based on Market Sentiment Factors and Multi-layer Stacking Ensemble Learning with Dual-CNN-LSTM Models and Nested Heterogeneous Learners Maoguang Wang, Jiaqi Yan, Yuxiao Chen |
395-409 |
Credit Default of P2P Online Loans Based on Logistic Regression Model Under Factor Space Theory Risk Prediction Research Xiaotong Liu, Haoyu Wang, Kaijie Zhang, Kaile Lin, Qiufeng Shi, Fanhui Zeng |
410-424 |
FedPV-FS: A Feature Selection Method for Federated Learning in Insurance Precision Marketing Chunkai Wang, Jian Feng |
425-437 |
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching Tiancai Liang, Yun Zhao, Haolin Wang, Ziwen Cai, Zhaoguo Wang, Wenchao Wang, Chuanyi Liu |
438-452 |
From Concept to Prototype: Developing and Testing GAAINet for Industrial IoT Intrusion Detection Siphesihle Philezwini Sithungu, Elizabeth Marie Ehlers |
453-468 |
Efficient and Secure Authentication Scheme for Internet of Vehicles Zhou Zhou, Xuan Liu, Chenyu Wang, Ruichao Lu |
469-485 |
Pattern Recognition
|
Research on Wavelet Packet Sample Entropy Features of sEMG Signal in Lower Limb Movement Recognition Jianxia Pan, Liu Yang, Xinping Fu, Haicheng Wei, Jing Zhao |
489-501 |