default search action
13th ICMLC 2021: Shenzhen, China
- ICMLC 2021: 13th International Conference on Machine Learning and Computing, Shenzhen China, 26 February, 2021- 1 March, 2021. ACM 2021, ISBN 978-1-4503-8931-0
Machine Learning and Algorithms
- Jiajie Zhu, Qi Zhang, Babak Forouraghi, Xiao Wang:
Applications of Machine Learning Techniques in Genetic Circuit Design. 1-7 - Haiming Ye, Weiwen Zhang, Mengna Nie, Depei Wang, Lianglun Cheng:
Efficient Domain-Specific News Push Service Using Deep Learning Based Text Regression without Users' Information. 8-13 - Ni Gao, Yiyue He, Yuming Jiao, Zhuo Chang:
Online Optimal Investment Portfolio Model Based on Deep Reinforcement Learning. 14-20 - Yunzhuo Wang, Hao Sun, Guangzhong Sun:
DSP-PIGAN: A Precision-Consistency Machine Learning Algorithm for Solving Partial Differential Equations. 21-26 - Meigen Huang, Lingling Wu, Xue Yuan:
Research on Flow Classification Model Based on Similarity and Machine Learning Algorithm. 27-32 - Tianfeng Shi, Jing Peng:
Factors Affecting Accuracy of Genotype Imputation Using Neural Networks in Deep Learning. 33-40 - Ebenezer Nanor, Wei-Ping Wu, Strato Angsoteng Bayitaa, Victor Kwaku Agbesi, Brighter Agyemang:
Algorithmic Generation of Positive Samples for Compound-Target Interaction Prediction. 41-49 - Imane Lasri, Anouar Riadsolh, Mourad Elbelkacemi:
Toward an Effective Analysis of COVID-19 Moroccan Business Survey Data using Machine Learning Techniques. 50-58 - Jian Jiao, Haini Zhao, Hongsheng Cao:
Using Deep Learning to Construct Auto Web Penetration Test. 59-66
Algorithm Design and Mathematical Calculation
- Song Yang, Ryan Frier, Qiang Shi:
Acoustic Classification of Bird Species Using Wavelets and Learning Algorithms. 67-71 - Jingjing Lu, Shuangyan Yi, Jiaoyan Zhao, Yongsheng Liang, Wei Liu:
Interpretable Robust Feature Selection via Joint -Norms Minimization. 72-78 - Haiping Zhang, Wang Yang:
An Enhanced Adaptive Large Neighborhood Search Algorithm for the Capacitated Vehicle Routing Problem. 79-85 - Yulong Ling, Xiao Zhang:
An Improved K-means Algorithm Based on Multiple Clustering and Density. 86-92 - Wenhan Deng, Ming Zhang, Kai He, Lijin Wang, Juan Lin, Yiwen Zhong:
A Mixed-coding Harmony Search Algorithm for the Closed Loop Layout Problem. 93-100 - Yuhao Wu, Weipeng Cao, Ye Liu, Zhong Ming, Jianqiang Li, Bo Lu:
Semantic Auto-Encoder with L2-norm Constraint for Zero-Shot Learning. 101-105 - Elie Azeraf, Emmanuel Monfrini, Wojciech Pieczynski:
Using the Naive Bayes as a discriminative model. 106-110 - Xiaoshun Lu, Si Chen, Zhuoyuan Zheng, Chenyu Weng, Rui Xu:
Generalized Intersection over Union Based Online Weighted Multiple Instance Learning Algorithm for Object Tracking. 111-116 - Zhiyong Li, Yunqi Wang, Jinghan Mu, Weiming Liao, Kui Zhang:
InSAR Deformation Time-series Reconstruction for Rainfall-induced Landslides Based on Gaussian Process Regression. 117-126
New Generation Neural Network and Technology
- Yanping Xu, Xia Zhang, Tingcong Ye, Zhenliang Qiu, Lingjun Zhang, Hua Zhang, Yifan Wu:
1D CNN for Feature Reconstruction on Network Threat Detection. 127-132 - Shangxian Ruan, Jiating Yang, Jianbo Chen:
A Deformable Convolutional Neural Network with Oriented Response for Fine-Grained Visual Classification. 133-140 - Jingwen Xue, Jun Zhang:
A Novel Spec-CNN-CTC Model for End-to-End Speech Recognition. 141-145 - Tujin Zhu, Yunpeng Cai:
Applying Neural Network to Reconstruction of Phylogenetic Tree. 146-152 - Shan Wen, Kai Liu, Shaoqing Tian, Mingming Fan, Lin Yan:
An Infrared Small Target Detection Method Using Segmentation Based Region Proposal and CNN. 153-160 - Alief Aditya Rachman, Suyanto Suyanto, Ema Rachmawati:
Leveraging CNN and Bi-LSTM in Indonesian G2P Using Transformer. 161-165 - Amy Aumpansub, Zhen Huang:
Detecting Software Vulnerabilities Using Neural Networks. 166-171 - Lisi Chen, Changcheng Wang, Jiale Huang:
Maneuvering Target Tracking Based on Neural Network and Error Self-correction Technology. 172-179 - Pranali Bora, Tulika Awalgaonkar, Himanshu Palve, Raviraj Joshi, Purvi Goel:
ICodeNet - A Hierarchical Neural Network Approach For Source Code Author Identification. 180-185
Computer Modeling and Calculation
- Juanting Liu, Wei Xu, Xianke Wang, Wenqing Cheng:
An EB-enhanced CNN Model for Piano Music Transcription. 186-190 - Li Huang, Wenyu Chen, Hong Qu:
Accelerating Transformer for Neural Machine Translation. 191-197 - Zhao Wu, Chao Wang, Ruiyou Li, Huaiqing Zhang:
An Extended Factorial Hidden Markov Model for Non-Intrusive Load Monitoring Based on Density Peak Clustering. 198-203 - Jiayu Pi, Yuan Deng:
Graph Networks as Learnable Engines for Relations Inference of Interacting Financial Systems. 204-209 - Yuze Qin, Guangzhong Sun, Jianfeng Li, Tianyu Hu, Yu He:
SCG_FBS: A Code Grading Model for Students' Program in Programming Education. 210-216 - Yi Zhao, Yan Liu, Xiaoyu Guo, ZhongHang Sui:
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier. 217-222 - Jiayu Tian:
Do You Want to Foresee Your Future? The Best Model Predicting the Success of Kickstarter Campaigns. 223-231 - Zhizhong Su, Yaoyi Xi, Rong Cao, Huifeng Tang, Hangyu Pan:
A Stance Detection Approach Based on Generalized Autoregressive pretrained Language Model in Chinese Microblogs. 232-238 - Wazir Ali, Rajesh Kumar, Yong Dai, Jay Kumar, Saifullah Tumrani:
Neural Joint Model for Part-of-Speech Tagging and Entity Extraction. 239-245
Data Science and Information Engineering
- Caidan Zhao, Yang Lei:
Intra-Class Cutmix for Unbalanced Data Augmentation. 246-251 - Zhen Liu, Ruoyu Wang, Wenbin Zhang, Deyu Tang:
An Unsupervised Feature Learning Method for Enhancing the Generalization of Cancer Diagnosis. 252-257 - Dengfeng Pan, Zhihai Wu:
Fault-Tolerant Consensus for Leader-following Multi-Agent Systems under False Data Injection Attacks. 258-264 - Ling Wang, Zhihai Wu:
Distributed Secure Consensus for Second-Order Multi-Agent Systems under Replay Attacks. 265-270 - Chen Ke:
Visualization Analysis of Library Research in the Context of Big Data Based on Knowledge Map. 271-278 - Renhao Zhao, Menghan Wang, Qiong Yin, Chao Chen:
SC-DGCN: Sentiment Classification Based on Densely Connected Graph Convolutional Network. 279-284 - Jian Zhou, Ding Liu:
A Redundancy Based Unsupervised Feature Selection Method for High-Dimensional Data. 285-289 - Genxuan Hong, Zhanquan Wang, Fuchen Gao, Hengming Ji:
Traffic Flow Prediction Using Spatiotemporal Analysis and Encoder-Decoder Network. 290-297 - Hassan Ezzeddine, Roger Achkar:
Ensemble Learning in Stock Market Prediction. 298-303
Digital Image Processing and Application
- Xinning Cao, Guangming Li:
An Effective Method of Wood Crack Trace and Quantity Detection Based on Digital Image Processing Technology. 304-309 - Yian Seo, Kyung-shik Shin:
Towards Explainable Image Classifier: An Analogy to Multiple Choice Question Using Patch-level Similarity Measure. 310-317 - Yaxin Chen, Zhiqiang Guo, Jie Yang:
Spectral-wise Attention-based Residual Network for Hyperspectral Image Classification. 318-323 - Kai Xu, Huaian Chen, Yi Jin, Changan Zhu:
Amplified Noise Map Guided Network for Low-Light Image Enhancement. 324-329 - Yixin Li, Xinran Wu, Chen Li, Changhao Sun, Xiaoyan Li, Md Mamunur Rahaman, Yong Zhang:
Intelligent Gastric Histopathology Image Classification Using Hierarchical Conditional Random Field based Attention Mechanism. 330-335 - Yaoyuan Liang:
Unsupervised Super Resolution Reconstruction of Traffic Surveillance Vehicle Images. 336-341 - Sheng Zhang, Tianxiao Cai, Yihang Chen:
Low Light Image Enhancement in USV Imaging System Via U-Net and Attention Mechanism. 342-348 - Lin Li, Huaiyu Wu, Zhihuan Chen:
Depth image restoration method based on improved FMM algorithm. 349-355
Artificial Intelligence and Engineering Application
- Yifeng Tu, Yang Liu, Xueming Li:
Deepfake Video Detection by Using Convolutional Gated Recurrent Unit. 356-360 - Jing Chen, Zhiqiang Guo, Jie Yang:
Distant Supervision for Relation Extraction via Noise Filtering. 361-367 - Yanbo Zhang, Liying Zheng:
Pedestrian Trajectory Prediction with MLP-social-GRU. 368-372 - Jihong Zheng, Jinming Min, He He:
Tracking Ground Targets with Road Constraint Using a Gaussian Mixture Road-Labeled PHD Filter. 373-377 - Wei Yan, Ting Liu, Yuzhuo Fu:
YOLO-Tight: an Efficient Dynamic Compression Method for YOLO Object Detection Networks. 378-384 - Yunuo Yang, Honghui Li:
Research on Deep Sound Source Separation. 385-391 - Xia Liu, Yazhuo Li, Zhengyuan Xie:
Path Planning of UAV Based on Error Correction. 392-396 - Tianxiao Cai, Sheng Zhang, Boyu Tan:
AEE-Net: An Efficient End-to-End Dehazing Network in UAV Imaging System. 397-403 - Xiu Zhi, Siriguleng Wang:
Research on the Application of BERT in Mongolian-Chinese Neural Machine Translation. 404-409
Intelligent Recognition Technology and Application
- Jiale Zhou, Tao Wang, Jianfeng Deng:
Corpus Construction and Entity Recognition for the Field of Industrial Robot Fault Diagnosis. 410-416 - Tao Zhang, Kai Tang:
An Efficacious Method for Facial Expression Recognition: GAN Erased Facial Feature Network (GE2FN). 417-422 - Jun Wang, Chao Zhu:
Semantically Enhanced Multi-scale Feature Pyramid Fusion for Pedestrian Detection. 423-431 - Vuliem Khong, Ziyu Zeng, Lu Fang, Shengjin Wang:
One-Shot Face Recognition Based on Multiple Classifiers Training. 432-437 - Hao-Tian Ren, Hongbo Zhang, Qinghongya Shi, Qing Lei, Jixiang Du:
DiffNet: Discriminative Feature Fusion Network of Multisurface Skeleton Project Images for Action Recognition. 438-443 - Shanshan Xie, Haifeng Xu, Jiang Liu, Yan Zhang, Danjv Lv:
Bird Songs Recognition Based on Ensemble Extreme Learning Machine. 444-449 - Fei Deng, Dongdong Zhang, Jing Peng:
Biological Named Entity Recognition and Role Labeling via Deep Multi-task Learning. 450-455 - Lingjun Kong, Yunchao Bao, Qianwen Wang, Lijun Cao, Shengmei Zhao:
A Gradient heatmap based Table Structure Recognition. 456-463 - Jianyang Qi, Peng Liang, Gang Hao, Yuting Wu:
Using Video Restoration to Improve Face Forgery Detection Based on Low-quality Video. 464-470
Computer Theory and Technology
- Shazib Qayyum, Xiaoping Fan, Rao Faizan Ali:
Feature-based Selection for Open-source Video Conferencing Software System Using Fuzzy Analytical Hierarchy Process (FAHP). 471-476 - Michail Salampasis, Theodosios Siomos, Alkiviadis Katsalis, Konstantinos I. Diamantaras, Konstantinos Christantonis, Marina Delianidi, Iphigenia Karaveli:
Comparison of RNN and Embeddings Methods for Next-item and Last-basket Session-based Recommendations. 477-484 - Francesca Del Bonifro, Maurizio Gabbrielli, Stefano Zacchiroli:
Content-Based Textual File Type Detection at Scale. 485-492 - Yu Wang, Jinjin Zhang:
The Determination of the Equivalence of Causal Theories. 493-497 - Ren Deng, Ye Liu, Liyan Luo, Dongjing Chen, Xijie Li:
Unsupervised Feature Selection using Pseudo Label Approximation. 498-502 - Dagmawi Alemu Moges, Rubungo Andre Niyongabo, Hong Qu:
Multi-Perspective Reasoning Transformers. 503-508 - Xin Wang, Jun Guo:
A Model for Text Line Segmentation and Classification in Printed Documents. 509-514 - Zuning Fan, Liangwei Chen:
Diverse Conversation Generation System with Sentence Function Classification. 515-521 - Xingfa Qiu, Qiaosha Zou, Chuanjin Richard Shi:
Single-Pass On-Line Event Detection in Twitter Streams. 522-529 - Boyu He, Han Wu, Congduan Li, Linqi Song, Weigang Chen:
K-CSRL: Knowledge Enhanced Conversational Semantic Role Labeling. 530-535
Computer Science and Information Engineering
- Zijian Huang, Changqing Xu:
MNGAN: Detecting Anomalies with Memorized Normal Patterns. 536-541 - WeiCai Niu, Quan Chen, Weiwen Zhang, Jianwen Ma, Zhongqiang Hu:
GCN2-NAA: Two-stage Graph Convolutional Networks with Node-Aware Attention for Joint Entity and Relation Extraction. 542-549 - Ruiyou Li:
Using Principal Component Analysis and Online Sequential Extreme Learning Machine Approach for Transient Electromagnetic Nonlinear Inversion: TEM-Inversion-based-on-PCA-OSELM. 550-556 - Wenping Liu, Ting Chen, Shengsheng Lai, Gangping Zhang, Guangjian Liu, Haoyu Jin:
Identifying the Key Residues Regulating the Binding between Antibody Avelumab and PD-L1 VIA Molecular Dynamics Simulation. 557-561 - Jihong Zheng, He He, Longteng Cong:
Tracking Ground Targets with Road Constraints Using a JMS-GM-PHD Filter. 562-567 - Sakil Barbhuiya, Peter Kilpatrick, Dimitrios S. Nikolopoulos:
Linear Regression Based DDoS Attack Detection. 568-574 - Fan Shi, Honghua Wang, Tianhang Lu, Chengliang Wang:
Multi-Objective Optimal Design of Excitation Systems of Synchronous Condensers for HVDC Systems Based on MOEA/D. 575-581 - Xinying Hu, Yu He, Guangzhong Sun:
Active Learning for Concept Prerequisite Learning in Wikipedia. 582-587 - Kaiyue Qiu, Ruizhi Chen, He Huang:
A Practical Indoor and Outdoor Seamless Navigation System Based on Electronic Map and Geomagnetism. 588-594 - Shohei Chiba, Hisayuki Sasaoka:
Effectiveness of Transfer Learning in Autonomous Driving using Model Car. 595-601
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.