


default search action
16th ICMLC 2024: Shenzhen, China
- Proceedings of the 2024 16th International Conference on Machine Learning and Computing, ICMLC 2024, Shenzhen, China, February 2-5, 2024. ACM 2024

Data Modeling and Data Analysis
- Yunan Li

, Syeda Sana e Zainab
, Sahraoui Dhelim
, Mohand Tahar Kechadi
:
Weather Data and Agro-climate Indices - Comparative Study. 1-7 - Lei Peng

, Xiang Jia
:
A Multi-source Data Modelling Method for Reliability Evaluation based on conversion factor and improved Particle Swarm Optimization. 8-15 - Shushu Liu

, Dongdong Cheng
, Jiang Xie
:
Granular-ball-based Fast Spectral Embedding Clustering Algorithm for Large-Scale Data. 16-20 - Tian Tong

, Xinxin Wang
, Qiong Gao
, Limei Yu
, Lijie Du
, Yuan Sun
:
Research on Controlled Access Technology of Power Data Based on Heavy Encryption Combined with CP-ABE. 21-28 - Sijie Zhang

, Aiguo Chen
, Xincen Zhou
, Tianzi Wang
:
Past Data-Driven Adaptation in Hierarchical Reinforcement Learning. 29-35 - Shilin Liu

, Zhexue Jin
, Yongzhen Li
:
Research on Efficient Stream Cipher Design in Big Data Environment. 36-43 - Soré Safiatou, Frédéric Tounwendyam Ouédraogo

, Moustapha Bikienga
, Yaya Traoré
:
Towards a More Generic and Elastic Metadata Management Model in a Data Lake Environment. 44-51 - Zhiyu Zhang

, Ruilong Ouyang
, Jingu Xie
:
Application of a Remote-Sensing Ship Dataset Based on the Yolov5 Model. 52-56 - Jiamao Han

, Yaxing Wei
, Yingchao Zhen
, Ji Shi
, Lei Wang
, Yu Zhang
, Wenbo Sun
, Rong Wu
:
Flower pollination Algorithm based on triple differential evolution and its application in Research on the classification and leveling of power cloud data. 57-64
Data Privacy and Data Security
- Yang Tan

, Bo Lv
:
Break Two PSI-CA Protocols in Polynomial Time. 65-72 - Yue Zhao

, Bin Yang
, Yarang Yang
:
An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things. 73-79 - Qianyi Chen

, Peijia Zheng
, Yusong Du
, Weiqi Luo
, Hongmei Liu
:
FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking. 80-86 - Junting Duan

, Yujie Luo
, Zhicheng Zhang
, Jianjian Peng
:
A heterogeneous graph-based approach for cyber threat attribution using threat intelligence. 87-93
Machine Learning Models and Algorithms
- Qingqing Xiong

, Jinzhe Jiang
, Chen Li
, Xin Zhang
, Yaqian Zhao
:
Study on The Effect of Encoding Method in Quantum Machine Learning. 94-99 - Raad Bin Tareaf

, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
, Mais Rawwash
:
Applying XAI in Fashion-MNIST: Evaluating Hybrid Deep Neural Networks and Capsule Networks. 100-107 - Yanyou Wei

, Zheng Guan
, Xue Wang
, Yu Yan
, Zhijun Yang
:
Global Feature-guided Knowledge Tracing. 108-114 - Jinbo Wang

, Ruijin Wang
, Xikai Pei
:
FedRL: Federated Learning with Non-IID Data via Review Learning. 115-120 - Shaomu Lu

, Weiwen Zhang
, Lianglun Cheng
:
Combining Sentence-based Relational Features with Biaffine Mechanism for Triple Extraction. 121-127 - Zeyu Teng

, Yong Song
, Xiaozhou Ye
, Ye Ouyang
:
Fine-Tuning LLMs for Multi-Turn Dialogues: Optimizing Cross-Entropy Loss with KL Divergence for All Rounds of Responses. 128-133
Prediction Model Analysis and Calculation
- Camila Ascendina

, Paulo Salgado Gomes de Mattos Neto
, João Fausto Lorenzato de Oliveira
, Péricles B. C. Miranda
:
An Evolutionary Approach to Forecasting Models Hybridization. 134-139 - Dequan Zheng

, Yunjie Sun
, Feng Yu
:
Research on Movie Box Office Prediction Method Based on Blending Model Fusion. 140-146 - Shi Huang Fei

, Yuan Zhu
:
Prediction of gene regulatory networks based on graph attention mechanisms. 147-152 - Yunan Li

, Sahraoui Dhelim
, Mohand Tahar Kechadi
:
Predicting Winter Wheat Emergence and Stem Elongation Time using CNN. 153-160 - Heng Fang

, Ding Ma
:
Cost-Sensitive Ensemble Learning for Venture Capital Exit Prediction. 161-167 - Nicolas Caron

, Christophe Guyeux
, Benjamin Aynes
:
Predicting wildfire events with calibrated probabilities. 168-175 - Zihao Zhao

, Yuxiang Jia
, Zhihong Zhang
:
Multi-Scale Convolution Multi-Graph Attention Neural Networks for Traffic Flow Forecasting. 176-184
Software Analysis and Anomaly Detection
- Roberto Bruzzese

:
Building Visual Malware Dataset using VirusShare Data and Comparing Machine Learning Baseline Model to CoAtNet for Malware Classification. 185-193 - Xiaohua Ke

, Zexian Ou
, Xiaobo Wu
, Binglong Li
:
A New Chinese Event Detection Method based on PMTNet. 194-199 - Srinivas Akkepalli

, Sagar K
:
A Survey of Novel Framework of Anomaly-Based Intrusion Detection Systems in Computer Networks Using Ensemble Feature Integration with Deep Learning Techniques. 200-205 - Zhiyan Lu

, Hao Yang
, Hao Wu
, Yanli Niu
:
Enhancing Network Intrusion Detection Through Dynamic IP Blacklisting. 206-210 - Mike Jones

, Masrufa Bayesh
, Sharmin Jahan
:
Unlocking Deeper Understanding: Leveraging Explainable AI for API Anomaly Detection Insights. 211-217 - Sahan Dissanayaka

, Manjusri Wickramasinghe
, Pasindu Marasinghe
:
Temporal Convolution-based Hybrid Model Approach with Representation Learning for Real-Time Acoustic Anomaly Detection. 218-227 - Lijuan Liu

, Li Shi
:
Application case study, security challenges and countermeasures of AIGC in the context of metaverse. 228-232 - Yunxia Zhang

, Bingtao Wu
, Tian Luo
, Jing Bai
:
Parameter Automatic Generation Method For Extended Belief Rule Base. 233-237
Object Detection
- Yunqi Guan

, Zuo Zhang
, Yu Zi Liu
, Wen Bin Ye:
FilterNet: A Convolutional Neural Network for Radar-Based Fall Detection by Filtering Out Non-fall Feature in the Spectrogram. 238-243 - Damini Babbar

, Aditya Jain
, Ankit Sharma
, Dipyaman Banerjee
:
Forgery Detection in Aadhaar-based KYC using Deep Learning. 244-250 - Ya-Fei Wang

, Junfeng Jing
, Siyu Sheng
, Xintian Jiao
:
Light-Trans YOLO: A Lightweight Network Based on Transformer for Defect Detection of Industrial Lace Surface. 251-256 - Ruilin Yao

, Shengwu Xiong
, Yi Rong
:
Context-Aware Gridding Non-local Block for Improving Object Detection in UAV Images. 257-263 - Qili Hou

, Yang Wang
, Banghua Chen
, Song Xu
, Lihong Yang
:
Defect detection for CCGA solder column based on machine vision. 264-270 - Xiao Ge

, Tao Wang
, Kanjian Zhang
:
Visual-Based Detection Method for Oil Leakage in Antarctic Power-Generation Cabin. 271-279 - Hanzhong Xu

, Dianliang Wu
, Kai Zou
, Qihang Yu
, Haiwen Yu
:
An intelligent detection method for assembly based on multi-model cascade. 280-286 - Bin Xue

, Qinghua Zheng
, Zhinan Li
, Weihu Zhao
, Heling Wang
, Xue Feng
:
Lightweight Object Detection-Tracking using Deep Feature Distillation. 287-291 - Wenbo Zhu

, Neng Liu
, Zhengjun Zhu
, Haibing Li
, Zhongbo Zhang
, Xinghao Zhang
:
Ash Content Detection in Coal Slime Flotation Tailings Based on MobileViT. 292-297 - Zongpu Li

, Tengfei Bao
, Zhiyun Xiao
:
Dual Part Siamese Attention Convolution Network for Change detection in Bi-temporal High Resolution Remote Sensing Images. 298-303 - Bin Zhang

, Meizhen Luo
, Shankai Yan
, Juan Hu
, Ling Peng
, Liangshun Wu
, Yujuan Wang
:
Backbone Feature Hierarchy Selection Strategy and Verification in Small Object Detection. 304-310 - Yan-Ying Guo

, Zhi Gang Liu
, Jun Yan Lu
:
Bad Weather Condition Shadow detection of Docking Aircraft Algorithm. 311-315
Computer Vision and Image Analysis
- Xiangzhen Li

, Ping Huang
, Kan Zhou
, Peng Zhang
, Qiujie Zhang
, Xiaohang Wang
:
A method for calculating target data coverage based on 3D model. 316-320 - Yin Huang

, Ziyang Zhang
, Kailing Guo
, Xiangmin Xu
:
SCC-Conv: A Novel Convolution with Spatial-Channel Cheap Operation for Single Image Super-Resolution. 321-326 - Shahid Karim

, Geng Tong
, Jinyang Li
, Xiaochang Yu
, Jia Hao
, Yiting Yu
:
Automatic Machine Learning based Real Time Multi-Tasking Image Fusion. 327-333 - Zikai Shu

, Takashi Nose
, Akinori Ito
:
Toward Photo-Realistic Facial Animation Generation Based on Keypoint Features. 334-339 - Yizhang Yang

, Jianxiu Jin
, Ying Huang
, Kailing Guo
, Xiangmin Xu
:
Reference-based Video Colorization with AB Chrominance Point and Temporal Propagation. 340-346 - Chaoqun Jiang

, Chengxiang Tan
, Zhishuo Zhang
:
3VFP: Three-View Feature Propagation Entity Alignment. 347-354
Digital Image Processing and Applications
- Tomasz Jan Palczewski

, Anirudh Rao
, Yingnan Zhu
:
Generative-AI- and Optical-Flow-Based Aspect Ratio Enhancement of Videos. 355-362 - Sicong Wang

, Yujie Yin
, Longrui Yang
, Xiyuan Wang
, Xijun Zhang
:
A Study on Semantic Segmentation for Small Objects in High-resolution Aerial Images based on Mask R-CNN and HRNet. 363-368 - Hong Huang

, Zhuowei Wang
, Genping Zhao
:
Efficient 3D Reconstruction of Multiple Plants from UAV Images with Deep Learning. 369-375 - Lin Li

, Haili Zhao
, Zhen Hui
, Rongxin Mi
, Weikuang Li
, Zixuan Chen
:
Research on clustering of non-uniformly distributed point clouds in road scenes. 376-381 - Junchang Zhang

, Jiaming Xie
:
An infrared target identification method based on complementary fusion features. 382-388 - Song Gao

, Bo Hui
, Wanwan Li
:
Image Generation of Egyptian Hieroglyphs. 389-397 - Zhuolin Li

, Xiaoting Yu
, Dashuai Wang
, Xiaoguang Liu
:
UAV Farmland Object Tracking Based on Improved QDTrack. 398-403
Image Classification
- Juanxi Tian

, Kaixin Zhu
, Wentao Fan
:
Mpox-PyramidTransferNet: A Hierarchical Transfer Learning Framework for Monkeypox and Dermatological Disease Classification. 404-410 - Haojun Li

, Linjia Li
, Wei Luo
:
Visual-Semantic Alignment for Few-shot Remote Sensing Scene Classification. 411-417 - Meng Yang

, Yaxiong Chen
, Xiongbo Lu
, Shengwu Xiong
:
Preferred Feature Representation for Remote Sensing Scene Classification. 418-423 - Zhenbang Wang

, Pengfei Duan
, Yi Rong
:
SRCPT: Spatial Reconstruction Contrastive Pretext Task for Improving Few-Shot Image Classification. 424-432 - Huanzhou Huang

, Zhuowei Wang
, Genping Zhao
:
Classification and Segmentation of Apple Diseases Based on Deep Learning. 433-440 - Wentao Dou

, Jiaqi Sun
, Dongmei Niu
, Jingliang Peng
:
AdaBoost-Based 3D Object Classification from Surface and Depth Map Descriptors. 441-446 - Min Huang

, Saixing Zhu
, Zehua Wang
, Shuanghong Qu
:
Convolutionally Enhanced Feature Fusion Visual Transformer for Fine-Grained Visual Classification. 447-452 - Raad Bin Tareaf

, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
:
Direct vs. Cross-Validated Stacking in Ensemble Learning: Evaluating the Trade-Off between Inference Time and Generalizability on Fashion-MNIST. 453-461
Modern Information Theory and Security Management
- Celal Alagoz

:
Hierarchy Generation and Exploitation via Extended Local Classification Schemes. 462-469 - Zehao Lei

, Yingwen Wu
, Tao Li
:
Better Generalization in Fast Training: Flat Trainable Weight in Subspace. 470-477 - Abhishek Periwal

, Adhish Prasoon
:
Improving EMI Risk Model for E-commerce with Customer Embedding Obtained through Heterogeneous Graph. 478-484 - Nianru Gong

, Pengfei Duan
, Yi Rong
:
Learning Task-Specific Embeddings for Few-Shot Classification via Local Weight Adaptation. 485-491 - Yongbing Li

, Pengfei Duan
, Yi Rong
, Yiwen Yang
, Aoxing Wang
:
Continual Few-Shot Relation Learning Via Dynamic Margin Loss and Space Recall. 492-497 - Wandi Qiao

, Rui Yang
:
Soft Adversarial Offline Reinforcement Learning via Reducing the Attack Strength for Generalization. 498-505 - Ronghui Pang

:
Research on the Application of Word2Vec-Based Job-Person Matching Methods in Corporate Recruitment. 506-510 - Yakun Wang

, Lili Xu
, Liangze Mo
:
Research on the Market Structure Visualization of Chinese High-Liquidity Equity ETFs Based on the Affinity Propagation Algorithm. 511-516
Language Model and Named Entity Recognition
- Rui Wang

, Zhengxin Pan
, Fangyu Wu
, Yifan Lv
, Bailing Zhang
:
Multi-modal Contextual Prompt Learning for Multi-label Classification with Partial Labels. 517-524 - Rui Zhou

, Akinori Ito
, Takashi Nose
:
Character Expressions in Meta-Learning for Extremely Low Resource Language Speech Recognition. 525-529 - Yauwai Yim

, Zirui Wang
:
Distilling Multi-Step Reasoning Capabilities into Smaller Language Model. 530-535 - Yuning Shi

, Masaomi Kimura
:
BERT-Based Models with Attention Mechanism and Lambda Layer for Biomedical Named Entity Recognition. 536-544 - Haiying Zhang

, Yunmei Shi
, Teng Yang
:
BP-TEG: Topic-to-Essay Generation for Official Documents. 545-556 - Sihao Wu

, Xiaoling Wu
, Rui Xie
, Wentao Zhan
:
Chinese NER Based on Adversarial Training and Interactive Attention. 557-561 - Zhihong Zhu

, Weiwen Zhang
, Hongbin Zhang
, Lianglun Cheng
:
Chinese Named Entity Recognition in the Ship News Field Based on Adversarial Transfer Learning. 562-567
Natural Language Analysis and Processing
- Yixiang Huang

, Juan Yang
, Ding Xiao
:
An Effective Model for Aspect Category Sentiment Analysis on a Chinese Tobacco Dataset. 568-573 - Yuchen Shi

, Deqing Yang
:
SETE: Syntax-Enhanced Triplet Extraction with Semantic Consistency. 574-581 - Shayan Shariff

, Ali Adnan
, Muhammad Qasim Pasta
:
Bridging Language and Culture: Applying NLP Methods for Topic Classification of Couplets using BERT. 582-586 - Yongmei Zhou, Weifeng Huang, Jigang Wang, Zepeng Wang, Dong Zhou, Aimin Yang:

An Aspect Sentiment Triplet Extraction Method based on Syntax-Guided Muti-Turn Machine Reading Comprehension. 587-593 - Raad Bin Tareaf

, Alex Maximilian Korga
, Sebastian Wefers
, Keno Hanken
:
Mining Minds: Predicting IQ Scores Using Social Media Textual Analytics. 594-601 - Ye Sun

, Guozhe Jin
, Yahui Zhao
, Rongyi Cui
:
Fine-grained sentiment Feature Extraction Method for Cross-modal Sentiment Analysis. 602-608 - Shuling Yang

, Hanzhu Chen
, Binbin Fang
:
QuDial: A Quadruple-driven Dialogue System for Real Estate Consulting Services. 609-615 - Lijuan Liu

, Li Shi
:
An Intelligent Risk Mining Method by Whole Process-Oriented Risk Analysis Model. 616-620
Intelligent Systems and Optimization Computing Based on Machine Learning
- Asmae Rhanizar

, Zineb El Akkaoui
:
Multi-Objective Deep Reinforcement Learning for Variable Speed Limit Control. 621-627 - Tong Lin

, Cangqi Zhou
, Qianmu Li
, Dianming Hu
:
Multi-level Disentangled Contrastive Learning on Heterogeneous Graphs. 628-634 - Wentao Song

, Naijie Gu
:
Learning Presolver Selection for Mixed-Integer Linear Programming. 635-641 - Yuxin Zhang

, Jun Wu
, Honglin Chen
, Jiajing Xu
, Zhen Huang
:
A lightweight single object tracking algorithm for low-power embedded devices. 642-648 - Honglin Shi

, Xin Zhang
, Bin Ge
, Sheng Zhang
, Dongxu Zhao
:
MESCM: A Multi-stage Explainable Similar Case Matching Framework. 649-657 - Duhania Oktasya Mahara

, Santi Wulan Purnami
, Shofi Andari
:
Copula-based Cox Regression to Modelling Bivariate Time-to-Event Data. 658-664
Next Generation Artificial Intelligence Technology and Engineering Applications
- Changlong Wang

, Akinori Ito
, Takashi Nose
, Chia-Ping Chen
:
Evaluation of Environmental Sound Classification using Vision Transformer. 665-669 - Qiong Wang

, Yan Li
:
PDE-Net: Pyramid Depth Estimation Network for Light Fields. 670-676 - Yoshiyuki Usami

, Shota Moro
:
Integrated Artificial Intelligence for Making Digital Human II. 677-683 - Jingyu Chen

, Xiaojie Zhou
:
Optimizing Chiller Defrosting Control through Spiking Neural Networks-Based Method. 684-692 - Linjia Li

, Jin Deng
, Ying Huang
, Yanyan Chen
, Wei Luo
:
Structural Subspace Learning for Few-shot Fine-grained Recognition. 693-699 - Lihan Lin

, Jin Deng
, Ying Huang
, Yanyan Chen
, Wei Luo
:
Task-aware Local Representation Mining Network for Few-shot Fine-grained Recognition. 700-706 - Rui Tang

, Miao Qi
, Nanqing Wang
:
Music style classification by jointly using CNN and Transformer. 707-712 - Shuang Lai

, Shaoqian Zhang
, Abual Hassan
, Ray Tahir Mushtaq
:
Analyzing Role of Artificial Intelligence in Project Management and Investment Risk: A CiteSpace Insight. 713-719
Digital Network Modeling and Performance Optimization
- Tongyu Wu

, Huaiwen He
:
An Efficient Energy Efficiency Maximization Algorithm for Backscatter-Assisted WP-MEC Network with Relay. 720-727 - Ye Peng, Zhuang Jun Bo, Zhou Qiang, Wang Xi, Chen Wen Bin, Zhou Xing:

Comprehensive Evaluation Method for Wireless Network Optimization Scheme Based on Improved TOPSIS. 728-733 - Yushuai Wang

, Guangya Si
:
Modeling and Analysis Method of Dependency Network Based on Kill Chain and FDNA. 734-740 - Zehui Wei

, Jianbing Ding
, Zening Wang
, Xidong Wang
, Xiaozhou Ye
, Ye Ouyang
:
Multi-task Learning Model for Location Estimation Using RSSI of Wireless LAN in NLoS Environment. 741-744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














