Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
A BTN-Based Method for Multi-Entity Bitcoin Transaction Analysis and Influence Assessment
Distributed Ledger Technologies: Research and Practice (DLT), Volume 3, Issue 4Article No.: 30, Pages 1–23https://doi.org/10.1145/3686168Bitcoin transaction analysis is valuable for examining Bitcoin events. However, most of the existing methods are inadequate for dealing with transactions involving multiple entities. Furthermore, existing Bitcoin transaction analysis methods neglect to ...
- ArticleDecember 2024
RANGER: Context-Aware Service Unit of Work Recommendation for Incremental Scientific Workflow Composition
Web Information Systems Engineering – WISE 2024Pages 206–222https://doi.org/10.1007/978-981-96-0570-5_15AbstractService discovery and recommendation has been considered an effective technique for freeing workflow developers out from time-consuming work of manually selecting suitable software services from a sea of service candidates. Facing complex ...
- research-articleJanuary 2025
Weakly supervised semantic segmentation by knowledge graph inference
Engineering Applications of Artificial Intelligence (EAAI), Volume 138, Issue PAhttps://doi.org/10.1016/j.engappai.2024.109294AbstractThe weakly supervised semantic segmentation (WSSS) training based on image-level labels in convolutional neural network (CNN) is usually divided into two stages: multi-label classification and semantic segmentation. However, most of the existing ...
- research-articleNovember 2024
Consistent and specific multi-view multi-label learning with correlation information
Information Sciences: an International Journal (ISCI), Volume 687, Issue Chttps://doi.org/10.1016/j.ins.2024.121395AbstractIn multi-view multi-label (MVML) learning, each sample is represented by several heterogeneous distinct feature representations while associated with a set of class labels simultaneously. To achieve MVML learning, most of the existing methods ...
Highlights- A consistent and specific learning framework is proposed to handle MVML data.
- We exploit the multi-view consistency by leveraging low-rank constraint.
- Our proposal can recover specific subspace from each view.
- We provide a ...
- research-articleNovember 2024
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
- Ruixuan Li,
- Shaodong Xiao,
- Baojun Liu,
- Yanzhong Lin,
- Haixin Duan,
- Qingfeng Pan,
- Jianjun Chen,
- Jia Zhang,
- Ximeng Liu,
- Xiuqi Lu,
- Jun Shao
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 659–673https://doi.org/10.1145/3646547.3688425Abnormal email bounces seriously disrupt user lives and company transactions. Proliferating security protocols and protection strategies have made email delivery increasingly complex. A natural question is how and why email delivery fails in the wild. ...
-
- research-articleJanuary 2025
Research on the Status, Problems and Trend of the Communist Youth League Work in Colleges and Universities in China for 20 Years: CiteSpace-based Knowledge Graph Analysis
AIFE '24: Proceeding of the 2024 International Conference on Artificial Intelligence and Future EducationPages 215–220https://doi.org/10.1145/3708394.3708431Purpose: Through the visualization analysis of the knowledge graph, this study explores the paper publication status, journal distribution, research strength, research hotspots and development trend of the research field of the work of college and ...
- research-articleOctober 2024
Building Robust Video-Level Deepfake Detection via Audio-Visual Local-Global Interactions
- Yifan Wang,
- Xuecheng Wu,
- Jia Zhang,
- Mohan Jing,
- Keda Lu,
- Jun Yu,
- Wen Su,
- Fang Gao,
- Qingsong Liu,
- Jianqing Sun,
- Jiaen Liang
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11370–11376https://doi.org/10.1145/3664647.3688985The continual advancements in Generative Artificial Intelligence have created substantial hurdles for accurate deepfake detection, leading to limitations of currently popular detection methods across content-driven video-level deepfake detection ...
- research-articleJanuary 2025
Cross the zone: toward a covert domain hijacking via shared DNS infrastructure
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 322, Pages 5751–5768Domain Name System (DNS) establishes clear responsibility boundaries among nameservers for managing DNS records via authoritative delegation. However, the rise of third-party public services has blurred this boundary. In this paper, we uncover a novel ...
- research-articleAugust 2024
LordNet: An efficient neural network for learning to solve parametric partial differential equations without simulated data
AbstractNeural operators, as a powerful approximation to the non-linear operators between infinite-dimensional function spaces, have proved to be promising in accelerating the solution of partial differential equations (PDE). However, it requires a large ...
- research-articleJuly 2024
Partial and cost-minimized computation offloading in hybrid edge and cloud systems
Expert Systems with Applications: An International Journal (EXWA), Volume 250, Issue Chttps://doi.org/10.1016/j.eswa.2024.123896AbstractNowadays, numerous mobile devices (MDs) provide nearly anytime and anywhere services, running on top of various computation-intensive applications. However, bearing limited battery, bandwidth, computing, and storage resources, MDs cannot ...
Highlights- A hybrid system architecture is designed and characterized by triple queueing models.
- A constrained total cost minimization problem with multiple constraints is formulated.
- The cost minimization problem is solved by a hybrid ...
- research-articleJune 2024
High-order proximity and relation analysis for cross-network heterogeneous node classification
Machine Language (MALE), Volume 113, Issue 9Pages 6247–6272https://doi.org/10.1007/s10994-024-06566-3AbstractCross-network node classification aims to leverage the labeled nodes from a source network to assist the learning in a target network. Existing approaches work mainly in homogeneous settings, i.e., the nodes of the source and target networks are ...
- research-articleJuly 2024
Improved network intrusion classification with attention-assisted bidirectional LSTM and optimized sparse contractive autoencoders▪
Expert Systems with Applications: An International Journal (EXWA), Volume 244, Issue Chttps://doi.org/10.1016/j.eswa.2023.122966AbstractAccurately identifying network intrusion cannot only help individuals and enterprises better deal with network security problems, but also maintain the Internet environment. This work proposes a new hybrid classification method named SABD for ...
Graphical abstractDisplay Omitted
Highlights- A hybrid method named SABD is given for network intrusion detection.
- It uses stacked sparse contractive autoencoders to extract features in data.
- It uses an attention-based bidirectional LSTM to realize the classification.
- It ...
- research-articleJuly 2024
Semi-supervised imbalanced multi-label classification with label propagation
AbstractMulti-label learning tasks usually encounter the problem of the class-imbalance, where samples and their corresponding labels are non-uniformly distributed over multi-label data space. It has attracted increasing attention during the past decade, ...
Highlights- Provide a new method for semi-supervised imbalanced multi-label classification.
- Propose a label regularization matrix to handle the imbalanced multi-label problem.
- Leverage a collaborative manner to ensure the balanced outcomes.
- research-articleJuly 2024
Transferable graph auto-encoders for cross-network node classification
AbstractNode classification is a popular and challenging task in graph neural networks, and existing approaches are mainly developed for a single network. With the advances in domain adaptation, researchers tend to leverage knowledge extracted from a ...
Highlights- TGAE is proposed to handle cross-network node classification problem.
- TGAE encodes local and global information and preserves structural graph information.
- Experimental results demonstrate the superior performance of the proposed ...
- research-articleMay 2024
Cold Start or Hot Start? Robust Slow Start in Congestion Control with A Priori Knowledge for Mobile Web Services
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2870–2878https://doi.org/10.1145/3589334.3645393Mobile web services value a quick loading of contents in the first page, which is quantified by the above-the-fold time of the first page (first AFT) and is likely to fall into the slow start phase in congestion control. However, the widely deployed slow ...
- research-articleMay 2024
mmSign: mmWave-based Few-Shot Online Handwritten Signature Verification
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 4Article No.: 89, Pages 1–31https://doi.org/10.1145/3605945Handwritten signature verification has become one of the most important document authentication methods that are widely used in the financial, legal, and administrative sectors. Compared with offline methods based on static signature images, online ...
- review-articleFebruary 2024
Multi-Time Scale Aware Host Task Preferred Learning for WEEE return prediction
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PEhttps://doi.org/10.1016/j.eswa.2023.122160AbstractRecently, with the improvement of per-capita income, the number of waste electronic and electrical equipment (WEEE) has increased significantly. The WEEE return prediction is an essential part of reverse logistics (RL) due to its helpfulness in ...
Highlights- The relationships among various types of WEEE are used for RL return prediction.
- Multi-time scale features and multi-task common features are extracted collaboratively.
- Polling host-task learning strategy is proposed to achieve ...
- research-articleFebruary 2024
Accurate water quality prediction with attention-based bidirectional LSTM and encoder–decoder
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PChttps://doi.org/10.1016/j.eswa.2023.121807AbstractAccurate prediction of water quality indicators can effectively predict sudden water pollution events and reveal them to water users for reducing the impact of water quality pollution. Neural networks, e.g., Long Short-Term Memory (LSTM) and ...
Highlights- A hybrid prediction method VBAED is designed to predict water quality time series.
- VBAED combines VMD, bidirectional input attention, encoder–decoder, and BiLSTM.
- It uses bidirectional input attention to add weights to features in ...
- research-articleFebruary 2024