Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Thompson sampling-based recursive block elimination for dynamic assignment under limited budget in pure-exploration: Thompson Sampling-based Recursive Block...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01083-2AbstractIn this paper, we investigate Thompson sampling-based sequential block elimination approaches for dynamic assignment problems in a pure-exploration Multi-Armed Bandit (MAB) setting with limited budget constraints. The problem can be considered as ...
- research-articleDecember 2024
A new bandit setting balancing information from state evolution and corrupted context: A New Bandit Setting Balancing...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01082-3AbstractWe propose a new sequential decision-making setting, combining key aspects of two established online learning problems with bandit feedback. The optimal action to play at any given moment is contingent on an underlying changing state that is not ...
- research-articleDecember 2024
MIRACLE: Malware image recognition and classification by layered extraction: MIRACLE: malware image recognition...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01078-zAbstractAnnually, over 800,000 individuals are victims of cyberattacks, predominantly through malware, which possesses the capacity to emerge as a formidable instrument of destruction in the realm of cybersecurity. And, it is a challenging task to ...
- research-articleDecember 2024
Meta-path based proximity learning in heterogeneous information networks: Meta-path based proximity learning in heterogeneous...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01076-1AbstractPathSim is a widely used meta-path-based similarity in heterogeneous information networks (HINs). Numerous applications rely on the computation of PathSim, including similarity search and clustering. Computing PathSim scores on large HINs is ...
- research-articleDecember 2024
ARL: analogical reinforcement learning for knowledge graph reasoning: ARL: Analogical Reinforcement...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01080-5AbstractReinforcement Learning (RL) knowledge graph reasoning aims to predict complete triplets by learning existing relationship paths. This greatly improves the efficiency of prediction because the RL-based methods do not traverse all entities and ...
-
- review-articleNovember 2024
A systematic review of deep learning for structural geological interpretation: Deep learning for structural geological interpretation
- Gustavo Lúcius Fernandes,
- Flavio Figueiredo,
- Raphael Siston Hatushika,
- Maria Luiza Leão,
- Breno Augusto Mariano,
- Bruno Augusto Alemão Monteiro,
- Fernando Tonucci de Cerqueira Oliveira,
- Tales Panoutsos,
- João Pedro Pires,
- Thiago Martin Poppe,
- Frederico Zavam
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01079-yAbstractIt is well known that seismic data (or seismic volumes/images) are one of the primary work materials of the oil and gas industry. Nevertheless, the manual interpretation of such data has become increasingly time-consuming and prone to errors. This ...
- research-articleNovember 2024
What do anomaly scores actually mean? Dynamic characteristics beyond accuracy: What do anomaly scores actually mean? Dynamic...
Data Mining and Knowledge Discovery (DMKD), Volume 39, Issue 1https://doi.org/10.1007/s10618-024-01077-0AbstractAnomaly detection has become pervasive in modern technology, covering applications from cybersecurity, to medicine or system failure detection. Before outputting a binary outcome (i.e., anomalous or non-anomalous), most algorithms evaluate ...
- research-articleSeptember 2024
FRUITS: feature extraction using iterated sums for time series classification
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 4122–4156https://doi.org/10.1007/s10618-024-01068-1AbstractWe introduce a pipeline for time series classification that extracts features based on the iterated-sums signature (ISS) and then applies a linear classifier. These features are intrinsically nonlinear, capture chronological information, and, ...
- research-articleSeptember 2024
Bounding the family-wise error rate in local causal discovery using Rademacher averages
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 4157–4183https://doi.org/10.1007/s10618-024-01069-0AbstractMany algorithms have been proposed to learn local graphical structures around target variables of interest from observational data, focusing on two sets of variables. The first one, called Parent–Children (PC) set, contains all the variables that ...
- research-articleSeptember 2024
Efficient learning with projected histograms
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 3948–4000https://doi.org/10.1007/s10618-024-01063-6AbstractHigh dimensional learning is a perennial problem due to challenges posed by the “curse of dimensionality”; learning typically demands more computing resources as well as more training data. In differentially private (DP) settings, this is further ...
- research-articleAugust 2024
Model-agnostic variable importance for predictive uncertainty: an entropy-based approach
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 4184–4216https://doi.org/10.1007/s10618-024-01070-7AbstractIn order to trust the predictions of a machine learning algorithm, it is necessary to understand the factors that contribute to those predictions. In the case of probabilistic and uncertainty-aware models, it is necessary to understand not only ...
- correctionAugust 2024
- research-articleAugust 2024
Detach-ROCKET: sequential feature selection for time series classification with random convolutional kernels
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 3922–3947https://doi.org/10.1007/s10618-024-01062-7AbstractTime Series Classification (TSC) is essential in fields like medicine, environmental science, and finance, enabling tasks such as disease diagnosis, anomaly detection, and stock price analysis. While machine learning models like Recurrent Neural ...
- research-articleAugust 2024
Bayesian network Motifs for reasoning over heterogeneous unlinked datasets
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 3643–3689https://doi.org/10.1007/s10618-024-01054-7AbstractModern data-oriented applications often require integrating data from multiple heterogeneous sources. When these datasets share attributes, but are otherwise unlinked, there is no way to join them and reason at the individual level explicitly. ...
- research-articleAugust 2024
Random walks with variable restarts for negative-example-informed label propagation
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 4024–4039https://doi.org/10.1007/s10618-024-01065-4AbstractLabel propagation is frequently encountered in machine learning and data mining applications on graphs, either as a standalone problem or as part of node classification. Many label propagation algorithms utilize random walks (or network ...
- research-articleAugust 2024
Statistical methods utilizing structural properties of time-evolving networks for event detection
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 3831–3867https://doi.org/10.1007/s10618-024-01060-9AbstractWith the advancement of technology, real-world networks have become vulnerable to many attacks such as cyber-crimes, terrorist attacks, and financial frauds. Accuracy and scalability are the two principal but contrary characteristics for ...
- research-articleAugust 2024
ArcMatch: high-performance subgraph matching for labeled graphs by exploiting edge domains
- Vincenzo Bonnici,
- Roberto Grasso,
- Giovanni Micale,
- Antonio di Maria,
- Dennis Shasha,
- Alfredo Pulvirenti,
- Rosalba Giugno
Data Mining and Knowledge Discovery (DMKD), Volume 38, Issue 6Pages 3868–3921https://doi.org/10.1007/s10618-024-01061-8AbstractConsider a large labeled graph (network), denoted the target. Subgraph matching is the problem of finding all instances of a small subgraph, denoted the query, in the target graph. Unlike the majority of existing methods that are restricted to ...