No abstract available.
Front Matter
Front Matter
A Novel Mathematic Entorhinal-Hippocampal System Building Cognitive Map
Place cells and grid cells are crucial parts of the cognitive map, which shows a presentation of the real-world observation. However, the previous architecture, which uses CAN for simulating the activities of grid cells, is redundant. And it could ...
Adaptive Risk-Return Control in Motor Planning
Bayesian decision-making theory presumes that humans can maximize the expected gains by trading off risk-returns in a predefined gain function. Recent findings from spatial reaching and coincident timing tasks have challenged this theory by ...
Discrete Mother Tree Optimization for the Traveling Salesman Problem
The Mother Tree Optimization (MTO) algorithm is a new swarm intelligence technique that we have recently proposed for solving continuous optimization problems. MTO is built on an offspring topology and a set of cooperating agents. In this paper, ...
Dynamic Cloud Workflow Scheduling with a Heuristic-Based Encoding Genetic Algorithm
Cloud computing is a powerful and scalable computing platform that enables the virtualization, share and on-demand use of computing resources. Scientific workflows on clouds are promising for handling computational-intensive and complex scientific ...
Multi-strategy Evolutionary Computation for Automated Jigsaw Puzzles
Solving jigsaw-puzzles has been of increasing importance in many real-world applications. The existing methods endure the problem of local or premature convergence, which perform inefficiently on some challenging images. For an efficient optimizer ...
Real Valued Card Counting Strategies for the Game of Blackjack
Card counting is a family of casino card game advantage gambling strategies, in which a player keeps a mental tally of the cards played in order to calculate whether the next hand is likely to be in the favor of the player or the dealer. A card ...
Front Matter
A Feature Selection Approach to Visual Domain Adaptation in Classification
In machine learning, we presume datasets to be labeled while performing any operation. But, is it true in real-life scenarios? To its contrary, we have an enormous amount of unlabeled datasets available in the form of images, videos, audios, ...
A Framework for Reinforcement Learning with Autocorrelated Actions
The subject of this paper is reinforcement learning. Policies are considered here that produce actions based on states and random elements autocorrelated in subsequent time instants. Consequently, an agent learns from experiments that are ...
A Motif-Based Graph Neural Network to Reciprocal Recommendation for Online Dating
Recommender systems have been widely adopted in various large-scale Web applications. Among these applications, online dating application has attracted more and more research efforts. Essentially, online dating data is a bipartite graph with ...
A Spiking Neural Architecture for Vector Quantization and Clustering
Although a couple of spiking neural network (SNN) architectures have been developed to perform vector quantization, good performances remains hard to attain. Moreover these architectures make use of rate codes that require an unplausible high ...
A Survey of Graph Curvature and Embedding in Non-Euclidean Spaces
Interest has been growing lately towards learning representations for non-Euclidean geometric data structures. Such kinds of data are found everywhere ranging from social network graphs, brain images, sensor networks to 3-dimensional objects. To ...
A Tax Evasion Detection Method Based on Positive and Unlabeled Learning with Network Embedding Features
Tax evasion detection has a crucial role in addressing tax revenue loss. In the real world, an accessed tax dataset only contains a small number of labeled taxpayers who evade tax (positive samples) and a large number of unlabeled taxpayers who ...
Adversarial Rectification Network for Scene Text Regularization
Scene text recognition with irregular layouts is a challenging yet important problem in computer vision. One widely used method is to employ a rectification network before the recognition stage. However, most previous rectification methods either ...
An Overlapping Community Detection with Subspaces on Double-Views
Community detection algorithms are the basic tools for discovering the internal structure and organizational principles of a community. Ranging from model-based and optimization-based methods, existing efforts typically consider two sources of ...
API Based Discrimination of Ransomware and Benign Cryptographic Programs
Ransomware is a widespread class of malware that encrypts files in a victim’s computer and extorts victims into paying a fee to regain access to their data. Previous research has proposed methods for ransomware detection using machine learning ...
AutoGraph: Automated Graph Neural Network
Graphs play an important role in many applications. Recently, Graph Neural Networks (GNNs) have achieved promising results in graph analysis tasks. Some state-of-the-art GNN models have been proposed, e.g., Graph Convolutional Networks (GCNs), ...
Automatic Curriculum Generation by Hierarchical Reinforcement Learning
Curriculum learning has the potential to solve the problem of sparse rewards, a long-standing challenge in reinforcement learning, with greater sample efficiency than traditional reinforcement learning algorithms because curriculum learning ...
Boltzmann Exploration for Deterministic Policy Optimization
Gradient-based reinforcement learning has gained more and more attention. As one of the most important methods, Deep Deterministic Policy Gradient (DDPG) has achieved remarkable success and has been applied to many challenging continuous ...
Causal Inference for Mixed-Type Data in Additive Noise Models
Causal inference between two observed variables has received a widespread attention in science. Generally, most existing approaches are focusing on inferring the casual direction based on data of the same type. However, in practice, it is very ...
CDMC’19—The 10th International Cybersecurity Data Mining Competition
- Shaoning Pang,
- Tao Ban,
- Youki Kadobayashi,
- Jungsuk Song,
- Kaizhu Huang,
- Geongsen Poh,
- Iqbal Gondal,
- Kitsuchart Pasupa,
- Fadi Aloul
CDMC-International Cybersecurity Data Mining Competition () is a world unique data-analytic competition sitting in the trans-disciplinary area of artificial intelligence and cybersecurity. In this paper, we summarize CDMC’19—...
Class-Balanced Loss for Scene Text Detection
To address class imbalance issue in scene text detection, we propose two novel loss functions, namely Class-Balanced Self Adaption Loss (CBSAL) and Class-Balanced First Power Loss (CBFPL). Specifically, CBSAL reshapes Cross Entropy (CE) loss to ...
Coordinated Behavior for Sequential Cooperative Task Using Two-Stage Reward Assignment with Decay
Recently, multi-agent deep reinforcement learning (MADRL) has been studied to learn actions to achieve complicated tasks and generate their coordination structure. The reward assignment in MADRL is a crucial factor to guide and produce both their ...
Deep Hierarchical Non-negative Matrix Factorization for Clustering Short Text
This paper proposes a deep hierarchical Non-negative Matrix Factorization (NMF) method with Skip-Gram with Negative sampling (SGNS) to learn semantic relationships in short text data. The proposed unsupervised method learns a dense lower-order ...
Deep Reinforcement Learning with Temporal-Awareness Network
Advances in deep reinforcement learning have allowed autonomous agents to perform well on video games, often outperforming humans, using only raw pixels to make their decisions. However, timely context awareness is not fully integrated. In this ...
Double Replay Buffers with Restricted Gradient
In this paper we consider the problem of how to balance exploration and exploitation in deep reinforcement learning (DRL). We propose a generative method called double replay buffers with restricted gradient (DRBRG). DRBRG divides the replay ...
Entropy Repulsion for Semi-supervised Learning Against Class Mismatch
A series of semi-supervised learning (SSL) algorithms have been proposed to alleviate the need for labeled data by leveraging large amounts of unlabeled data. Those algorithms have achieved good performance on standard benchmark datasets, however, ...
Recommendations
The integration of french language processing in an information retrieval
RIAO '97: Computer-Assisted Information Searching on Internet - Volume 2Cet article décrit les approches que nous avons implantées dans le cadre d'une collaboration de recherche entre nos deux groupes. Ces approches visent à créer une représentation plus précise pour les documents et les requêtes dans un système de ...