Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2022
An Abused Webpage Detection Method Based on Screenshots Text Recognition
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 106–110https://doi.org/10.1145/3491396.3506562With the rapid development of the Internet, webpages containing abused information such as pornography and gambling have emerged in an endless stream. These webpages are using various methods to evade traditional detection methods and which seriously ...
- research-articleJanuary 2022
Deep Text Matching in Medical Question Answering System
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 134–138https://doi.org/10.1145/3491396.3506536The retrieval question-answering(Q&A) system based on Q&A library is a system that can retrieve the most similar question from Q&A library to get the correct answer. Classic approaches only use TF-IDF, BM25 and other algorithms to calculate the shallow ...
- research-articleJanuary 2022
ITGNN: Item Transition Attentive Graph Neural Network for Session-Based Recommendation
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 211–216https://doi.org/10.1145/3491396.3506535In e-commerce scenario, the goal of a session-based recommendation system(SBRS) is to predict next item clicks of users, while the session is anonymous in the process. Graph Neural Network(GNN) has aroused widespread interest in the SBRS system. However,...
- research-articleJanuary 2022
Darknet Public Hazard Entity Recognition Based on Deep Learning
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 94–100https://doi.org/10.1145/3491396.3506525Due to the strong protection of anonymity, Darknet has been exploited by criminals to distribute harmful content and banned items, such as drugs, weapons, and malware, which are regarded as public hazard entities. The task of public hazard entity ...
- research-articleJanuary 2022
Research on pork price prediction based on multi-dimensional feature analysis and machine learning
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 111–116https://doi.org/10.1145/3491396.3506521According to the situation of pork price fluctuation in Shandong province in recent years, this paper collects relevant data for comprehensive analysis and research. In the analysis, the pork price fluctuation is taken as the breakthrough point, and the ...
- research-articleJanuary 2022
ECNN: One Online Deep Learning Model for Streaming Ocean Data Prediction
ACM ICEA '21: Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging ApplicationsPages 170–175https://doi.org/10.1145/3491396.3506519Despite been extensively explored, current techniques in sequential data modeling and prediction are generally designed for solving regression tasks in a batch learning setting, making them not only computationally inefficient but also poorly scalable ...