default search action
ICCAI 2018: Chengdu, China
- Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, ICCAI 2018, Chengdu, China, March 12-14, 2018. ACM 2018
Intelligent Computing
- Shi Yin, Yaxi Li, Xiaoping Chen:
Combining Explicit and Implicit Semantic Similarity Information for Word Embeddings. 1-8 - Laihong Hu, Xiaogang Yang, Hongdong Fan:
Optimization of Contract Distribution Based on Multi-objective Estimation of Distribution Algorithm. 9-12 - Yafeng Niu, Dongsheng Zou, Yadong Niu, Zhongshi He, Hua Tan:
Improvement on Speech Emotion Recognition Based on Deep Convolutional Neural Networks. 13-18 - Firas Gerges, Germain Zouein, Danielle Azar:
Genetic Algorithms with Local Optima Handling to Solve Sudoku Puzzles. 19-22 - Shanliang Yang, Qi Sun, Huyong Zhou, Zhengjie Gong:
A Multi-Layer Neural Network Model Integrating BiLSTM and CNN for Chinese Sentiment Recognition. 23-29 - Shanliang Yang, Qi Sun, Huyong Zhou, Zhengjie Gong, Yangzhi Zhou, Junhong Huang:
A Topic Detection Method Based on KeyGraph and Community Partition. 30-34
Information Systems and Security
- Rajesh Kumar, Xiaosong Zhang, Riaz Ullah Khan, Jay Kumar, Ijaz Ahad:
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms. 35-40 - Md Khalid Hossen, Yong Wang, Hussain Ahmed Tariq, Gabriel Nyame, Raphael Elimeli Nuhoho:
Statistical Analysis of Extracted Data from Video Site by Using Web Crawler. 41-46 - Yong Fang, Yang Li, Liang Liu, Cheng Huang:
DeepXSS: Cross Site Scripting Detection Based on Deep Learning. 47-51 - Yong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang:
Detecting Webshell Based on Random Forest with FastText. 52-56 - Longbin Zhou, Zhoujun Li:
Fuzz Testing Based on Virtualization Technology. 57-61 - Qi Fan, Jiasheng Yang:
A Denoising Autoencoder Approach for Credit Risk Analysis. 62-65 - Jianpei Shi, Liqiang Zhang, Daohan Ge:
Remote Intelligent Position-Tracking and Control System with MCU/GSM/GPS/IoT. 66-70 - Dimiter Velev, Plamena Zlateva, Xuejun Zong:
Challenges of 5G Usability in Disaster Management. 71-75
Image Processing Technology and Application
- Xiangfeng Chen, Wenbai Chen, Peichao Xu, Mengyao Lv:
Attribute-based Face Recognition and Application in Safety Detection of Intelligent Factory. 76-80 - Rajesh Kumar, Xiaosong Zhang, Riaz Ullah Khan, Ijaz Ahad, Jay Kumar:
Malicious Code Detection based on Image Processing Using Deep Learning. 81-85 - Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Emelia Opoku Aboagye:
Evaluating the Performance of ResNet Model Based on Image Recognition. 86-90 - Xueyan Li:
Image Authenticity Decision Based on Random Sample Consensus and Circular Feature Selection. 91-97 - Fiseha B. Tesema, Hong Wu, William Zhu:
Human Segmentation with Deep Contour-Aware Network. 98-103 - Zeeshan Shaukat, Faheem Akhtar, Juan Fang, Saqib Ali, Muhammad Azeem:
Cloud Based Face Recognition for Google Glass. 104-111
Computer Theory and Practice
- Naoki Igo, Daichi Fujita, Ryusei Yamamoto, Toshifumi Satake, Satoshi Mitsui, Tetsuto Kanno, Kiyoshi Hoshino:
Extended Movement Unit Capable of Moving Rough Terrain for Pepper. 112-117 - Emelia Opoku Aboagye, James C. Gee, Jianbin Gao, Rajesh Kumar, Riaz Ullah Khan:
Probabilistic Time Context Framework for Big Data Collaborative Recommendation. 118-121 - Yiwu Lin, Liping Shen:
Supervised Prediction of China's Seven-Day Interbank Pledged Repo Rate. 122-126 - Li Tang, Heping Pan, Yiyong Yao:
K-Nearest Neighbor Regression with Principal Component Analysis for Financial Time Series Prediction. 127-131 - Wenjing Hong, Longxiang Chen:
Thermo-economic Multi-objective Optimization of Adiabatic Compressed Air Energy Storage (A-CAES) System. 132-138 - Jie Zhang:
Analysis and Design of Item Bank System Based on Improved Genetic Algorithm. 139-143 - Haifeng Wang, Xiaoyan Wang, Yuchou Chang:
Automatic Clustering of Natural Scene Using Color Spatial Envelope Feature. 144-148
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.