Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2024
Novelty Detection Based Discriminative Multiple Instance Feature Mining to Classify NSCLC PD-L1 Status on HE-Stained Histopathological Images
- Rui Xu,
- Dan Yu,
- Xuan Yang,
- Xinchen Ye,
- Zhihui Wang,
- Yi Wang,
- Hongkai Wang,
- Haojie Li,
- Dingpin Huang,
- Fangyi Xu,
- Yi Gan,
- Yuan Tu,
- Hongjie Hu
Medical Image Computing and Computer Assisted Intervention – MICCAI 2024Pages 340–350https://doi.org/10.1007/978-3-031-72083-3_32AbstractIt is crucial to analyze HE-stained histopathological whole slide images (WSIs) to classify PD-L1 status for non-small cell lung cancer (NSCLC) patients, due to the expensive immunohistochemical examination performed in practical clinics. Usually, ...
- research-articleOctober 2023
Feature mining and classifier selection for API calls-based malware detection
Applied Intelligence (KLU-APIN), Volume 53, Issue 23Pages 29094–29108https://doi.org/10.1007/s10489-023-05086-2AbstractThis paper deals with a major challenge in cyber-security: the need to respond to ever renewed techniques used by attackers in order to avoid detection based on analysing static features of malware. These constantly renewed techniques consist of ...
- research-articleSeptember 2023
Fine-grained image recognition method for digital media based on feature enhancement strategy
Neural Computing and Applications (NCAA), Volume 36, Issue 5Pages 2323–2335https://doi.org/10.1007/s00521-023-08968-1AbstractThe emergence of digital media has changed the way people live and learn. In the context of the new era, digital media is gradually integrating into people’s life and learning. Digital media contains massive images, and fine-grained image ...
- research-articleAugust 2023
Short- versus long-term performance of detection models for obfuscated MSOffice-embedded malware
International Journal of Information Security (IJOIS), Volume 23, Issue 1Pages 271–297https://doi.org/10.1007/s10207-023-00736-5AbstractThis paper analyzes the efficiency of various machine learning models (artificial neural networks, random forest, decision tree, AdaBoost and XGBoost) against the evolution of VBA-based (Visual Basic for Applications) malware over a large period ...
- research-articleJuly 2023
DDOFM: Dynamic malicious domain detection method based on feature mining
Computers and Security (CSEC), Volume 130, Issue Chttps://doi.org/10.1016/j.cose.2023.103260AbstractThe domain name system is an essential part of the network, and target hosts are often attacked by malicious domain names to steal resources. Some traditional detection methods have low accuracy, poor generalization ability, and high resource ...
- research-articleJune 2023
Coarse-to-fine sparse self-attention for vehicle re-identification
Knowledge-Based Systems (KNBS), Volume 270, Issue Chttps://doi.org/10.1016/j.knosys.2023.110526AbstractExisting vehicle re-identification (Re-ID) methods usually combine global features and local features to meet the challenge of inter-class similarity and intra-class variance, but almost all existing methods rely on extra auxiliary networks to ...
- ArticleNovember 2022
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance
Information Security Practice and ExperiencePages 287–305https://doi.org/10.1007/978-3-031-21280-2_16AbstractThis paper presents a study on the detection performance of MSOffice-embedded malware; the detection models were trained and tested using a very large database of malicious and benign MSOffice documents (1.8 million files), collected over a long ...
- ArticleAugust 2022
Natural Image Matting with Low-Level Feature Attention Guidance
Knowledge Science, Engineering and ManagementPages 550–561https://doi.org/10.1007/978-3-031-10989-8_44AbstractPrevious natural image matting algorithms have difficulties with transition regions in the foreground and background, such as tiny and detailed structures like hair. This paper argues that more efficient low-level features can help the network ...
- ArticleJuly 2021
What Makes a Turing Award Winner?
Social, Cultural, and Behavioral ModelingPages 310–320https://doi.org/10.1007/978-3-030-80387-2_30AbstractComputer science has grown rapidly since its inception in the 1950s and the pioneers in the field are celebrated annually by the A.M. Turing Award. In this paper, we attempt to shed light on the path to influential computer scientists by examining ...
- articleJune 2019
The study of new features for video traffic classification
Multimedia Tools and Applications (MTAA), Volume 78, Issue 12Pages 15839–15859https://doi.org/10.1007/s11042-018-6965-6Network traffic classification is important for the management of network resource and the support quality of multimedia services. To realize the fine-grained classification of typical Internet video traffic, this paper studies and analyses the ...
- research-articleNovember 2018
Intelligent prediction and recommendation optimization method based on fuzzy clustering and time weighting
iiWAS2018: Proceedings of the 20th International Conference on Information Integration and Web-based Applications & ServicesPages 79–84https://doi.org/10.1145/3282373.3282394In view of the problem of data overload on the Internet platform, it is increasingly difficult for users to dig out useful and useful information. Many scholars have proposed various recommendation systems, but when calculating user similarity, ...
- research-articleSeptember 2017
Big data analysis to Features Opinions Extraction of customer
Procedia Computer Science (PROCS), Volume 112, Issue CPages 906–916https://doi.org/10.1016/j.procs.2017.08.114Opinion mining refers to extract subjective information from text data using tools such as natural language processing (NLP), text analysis and computational linguistics. Micro-blogging and social network are the most popular Web 2.0 applications, like ...
- research-articleFebruary 2017
Automated extraction of product comparison matrices from informal product descriptions
- Sana Ben Nasr,
- Guillaume Bécan,
- Mathieu Acher,
- João Bosco Ferreira Filho,
- Nicolas Sannier,
- Benoit Baudry,
- Jean-Marc Davril
Journal of Systems and Software (JSSO), Volume 124, Issue CPages 82–103https://doi.org/10.1016/j.jss.2016.11.018We propose a procedure for extracting comparison matrices from informal product descriptions.We evaluate our proposal against numerous categories of products mined from BestBuy.Matrices exhibit numerous comparable information and can supplement or even ...
- articleJanuary 2016
Pixel Intensity Based Cumulative Features for Moving Object Tracking (MOT) in Darkness
3D Research (3DRES), Volume 7, Issue 2Article No.: 89, Pages 1–6https://doi.org/10.1007/s13319-016-0089-4Moving Object Tracking (MOT) is one of the frequent used tasks in computer vision systems and on the same time a challenging issue particularly in darkness. Vehicle tracking involves finding new position of vehicles in consecutive frames. This paper ...
- ArticleJuly 2014
Feature Mining for Machine Learning Based Compilation Optimization
IMIS '14: Proceedings of the 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous ComputingPages 207–214https://doi.org/10.1109/IMIS.2014.26Compilation optimization is critical for software performance. Before a product releases, the most effective algorithm combination should be chosen to minimize the object file size or to maximize the running speed. Compilers like GCC usually have ...
- articleJuly 2013
Learning discriminative features for fast frame-based action recognition
Pattern Recognition (PATT), Volume 46, Issue 7Pages 1832–1840https://doi.org/10.1016/j.patcog.2012.08.016In this paper we present an instant action recognition method, which is able to recognize an action in real-time from only two continuous video frames. For the sake of instantaneity, we employ two types of computationally efficient but perceptually ...
- research-articleAugust 2012
Lexicon-based Comments-oriented News Sentiment Analyzer system
Expert Systems with Applications: An International Journal (EXWA), Volume 39, Issue 10Pages 9166–9180https://doi.org/10.1016/j.eswa.2012.02.057Highlights Able to deal with the tendency of many users to express their views in non-standard language. Detects the targets of users' opinions in multi-domain scenarios. Linguistic modularized knowledge model with low-cost adaptability. Hierarchical ...