default search action
18th AIAI 2022: Hersonissos, Crete, Greece
- Ilias Maglogiannis, Lazaros Iliadis, John MacIntyre, Paulo Cortez:
Artificial Intelligence Applications and Innovations - 18th IFIP WG 12.5 International Conference, AIAI 2022, Hersonissos, Crete, Greece, June 17-20, 2022, Proceedings, Part I. IFIP Advances in Information and Communication Technology 646, Springer 2022, ISBN 978-3-031-08332-7
Adaptive Modeling/Cloud Data Models
- Lisa Elderhorst, Melissa van den Berge, Jan Treur:
A Second-Order Adaptive Decision Model for Proceeding or Terminating a Pregnancy. 3-15 - Michele Della Ventura:
A Self-adaptive Learning Music Composition Algorithm as Virtual Tutor. 16-26 - Tajwar Mehmood, Seemab Latif:
Dynamic Big Data Drift Visualization of CPU and Memory Resource Usage in Cloud Computing. 27-36 - Sophie C. F. Hendrikse, Jan Treur, Tom F. Wilderjans, Suzanne Dikker, Sander L. Koole:
On the Interplay of Interpersonal Synchrony, Short-Term Affiliation and Long-Term Bonding: A Second-Order Multi-adaptive Neural Agent Model. 37-57 - Mourad El Hamri, Younès Bennani, Issam Falih:
When Domain Adaptation Meets Semi-supervised Learning Through Optimal Transport. 58-69
Cybersecurity Fraud Intrusion/Anomaly Detection
- Ugur Dolu, Emre Sefer:
A Novel GBT-Based Approach for Cross-Channel Fraud Detection on Real-World Banking Transactions. 73-84 - Gonçalo Fontes, Luís Miguel Matos, Arthur Matta, André Luiz Pilastri, Paulo Cortez:
An Empirical Study on Anomaly Detection Algorithms for Extremely Imbalanced Datasets. 85-95 - Dragos-Vasile Bratu, Rares Stefan Tiberius Ilinoiu, Alexandru Cristea, Maria-Alexandra Zolya, Sorin-Aurel Moraru:
Anomaly Detection Using Edge Computing AI on Low Powered Devices. 96-107 - K. Bennaceur, Zakaria Sahraoui, Mohamed Ahmed-Nacer:
Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion Detection. 108-115 - Anastasios Panagiotis Psathas, Lazaros Iliadis, Antonios Papaleonidas, Dimitris Bountas:
HEDL-IDS: A Hybrid Ensemble Deep Learning Approach for Cyber Intrusion Detection. 116-131 - Tijana Markovic, Miguel Leon, David Buffoni, Sasikumar Punnekkat:
Random Forest Based on Federated Learning for Intrusion Detection. 132-144 - Stavros Stavrinos, Konstantinos Kotis, Christos Kalloniatis:
Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater Things. 145-156
Deep Learning - Convolutional
- Sultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim, Muhammad Rashid, Zulfiqar Ali, Mohib Ullah, Habib Ullah:
An Efficient Deep Learning Framework for Face Mask Detection in Complex Scenes. 159-169 - Dimitris Tsiktsiris, Antonios Lalas, Minas Dasygenis, Konstantinos Votis, Dimitrios Tzovaras:
An Efficient Method for Addressing COVID-19 Proximity Related Issues in Autonomous Shuttles Public Transportation. 170-179 - Olympia Giannou, Dimitra E. Zazara, Anastasios D. Giannou, Petra Clara Arck, Georgios Pavlidis:
Automatic Semi-quantitative Histological Assessment of Tissue Traits Using a Smart Web Application. 180-191 - Hiba Khodji, Lucille Herbay, Pierre Collet, Julie Dawn Thompson, Anne Jeannin-Girardon:
MERLIN: Identifying Inaccuracies in Multiple Sequence Alignments Using Object Detection. 192-203 - Milan Kresovic, Thong Duy Nguyen, Mohib Ullah, Hina Afridi, Faouzi Alaya Cheikh:
PigPose: A Realtime Framework for Farm Animal Pose Estimation and Tracking. 204-215 - Petr Hájek:
Speech Emotion Recognition from Earnings Conference Calls in Predicting Corporate Financial Distress. 216-228 - Yasuaki Ito, Koji Nakano, Akihiko Kasagi:
The Bonsai Hypothesis: An Efficient Network Pruning Technique. 229-241
Deep Learning - Recurrent/Reinforcement
- Anshul Rankawat, Rahul Kumar, Arun Kumar:
Deep Recurrent Neural Networks for OYO Hotels Recommendation. 245-256 - Jianye Pang, Wei Ke:
Fine-Grained Double-View Link Prediction Within the Dynamic Interaction Network. 257-269 - Karim Hamadeh, Julia El Zini, Joudi Hajar, Mariette Awad:
MTMA-DDPG: A Deep Deterministic Policy Gradient Reinforcement Learning for Multi-task Multi-agent Environments. 270-281 - Manoj Shakya, Huey Yuen Ng, Darrell Joshua Ong, Bu-Sung Lee:
Reinforcement Learning Approach for Multi-period Inventory with Stochastic Demand. 282-291 - Franz A. Van-Horenbeke, Angelika Peer:
The Neocortex-Inspired Locally Recurrent Neural Network (NILRNN) as a Model of the Primary Visual Cortex. 292-303 - Vasilis Kochliaridis, Eleftherios Kouloumpris, Ioannis P. Vlahavas:
TraderNet-CR: Cryptocurrency Trading with Deep Reinforcement Learning. 304-315 - Wei Liu, Hui Chen, Yongqiang Ma, Jianji Wang, Nanning Zheng:
Transformer-Based Zero-Shot Detection via Contrastive Learning. 316-327
Energy Streams Modeling
- K. K. Lykothanasi, Spyros Sioutas, Kostas Tsichlas:
Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data Streams. 331-342 - Charalampos M. Liapis, Aikaterini Karanikola, Sotiris Kotsiantis:
Energy Load Forecasting: Investigating Mid-Term Predictions with Ensemble Learners. 343-355 - Christos Konstantopoulos, Spyros Sioutas, Konstantinos Tsichlas:
Machine Learning Techniques for Regression in Energy Disaggregation. 356-366
Evolutionary/Biologically Inspired Modeling and Brain Modeling
- Ryan Yu, Andrew Wood, Sarel Cohen, Moshik Hershcovitch, Daniel G. Waddington, Peter Chin:
Biologically Plausible Complex-Valued Neural Networks and Model Optimization. 369-382 - Julia Garbaruk, Doina Logofatu, Florin Leon:
Comparative Study by Using a Greedy Approach and Advanced Bio-Inspired Strategies in the Context of the Traveling Thief Problem. 383-393 - Haodong Jing, Ming Du, Yongqiang Ma, Nanning Zheng:
Exploring the Relationship Between Visual Information and Language Semantic Concept in the Human Brain. 394-406 - Ming Du, Haodong Jing, Yongqiang Ma, Nanning Zheng:
Hierarchical Causality Network: Find the Effective Connectivity in Visual Cortex. 407-419 - Dragica Rankovic, Nevena Rankovic, Mirjana Ivanovic, Ljubomir Lazic:
The Generalization of Selection of an Appropriate Artificial Neural Network to Assess the Effort and Costs of Software Projects. 420-431 - Marc Chevallier, Nistor Grozavu, Faouzi Boufarès, Nicoleta Rogovschi, Charly Clairmont:
Trade Between Population Size and Mutation Rate for GAAM (Genetic Algorithm with Aggressive Mutation) for Feature Selection. 432-444
Explainable AI/Graph Representation and Processing Frameworks
- Giulia Vilone, Luca Longo:
A Novel Human-Centred Evaluation Approach and an Argument-Based Method for Explainable Artificial Intelligence. 447-460 - Alabbas Alhaj Ali, Doina Logofatu:
An Analysis on Graph-Processing Frameworks: Neo4j and Spark GraphX. 461-470 - Hassan B. Kazemian, Mohammad Hossein Amirhosseini, Michael Phillips:
Application of Graph-Based Technique to Identity Resolution. 471-482 - Wilmuth Müller, Dirk Mühlenberg, Dirk Pallmer, Uwe Zeltmann, Christian Ellmauer, Konstantinos P. Demestichas:
Knowledge Engineering and Ontology for Crime Investigation. 483-494 - Ahmed Zaiou, Younès Bennani, Mohamed Hibti, Basarab Matei:
Quantum Approach for Vertex Separator Problem in Directed Graphs. 495-506 - Mina Ameli, Viktor Pfanschilling, Anar Amirli, Wolfgang Maaß, Kristian Kersting:
Unsupervised Multi-sensor Anomaly Localization with Explainable AI. 507-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.