default search action
CSAI 2023: Beijing, China
- Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, CSAI 2023, Beijing, China, December 8-10, 2023. ACM 2023
Chapter I - Information Systems and Management Based on Machine Learning
- Luhan Wen, Dongmei Zhou, Hao Luo, Yongjian Cheng:
A Novel Classification Model for Automatic Multi-Label ICD Coding via BERT-LSTM. 1-7 - Hong Zhang, Xiaojuan Wang, Yaping Xu, Guijiang Hu:
Research on the dynamic application of trademark similarity determination based on dynamic time regularization and XGBoost. 8-15 - Soumen Sinha, Saketh Innani, Pawan Chinnari, Mehek Khan:
Sentiment Analysis of Russia-Ukraine Conflict: A Hybrid Approach Using VADER, GloVe-embedding and LSTM. 16-22 - Kankan Zhao, Youfang Leng, Hui Zhang:
Scaling Machine Learning with a Ring-based Distributed Framework. 23-32 - Maohong Tian, Jian Liang, Dequan Zhang, Xintong Zhang, Zuo Wang, Hualin Li:
Detection of Financial Fraudulent Activities with Machine Learning: A Case Study of Detecting Potential Tax and Invoice Fraud. 33-39 - Yun Fu, Jingyi Fu, Jinxin Wei:
Activation Function: Absolute Function, One Function Behaves more Individualized. 40-45 - Zhourui Guo, Meng Yao, Yang Yu, Qiyue Yin:
Improve the efficiency of deep reinforcement learning through semantic exploration guided by natural language. 46-52 - Meijuan Yin, Yan Zheng, Shunran Duan, Longlong Jiao, Hao Yang:
User entity alignment method based on cross-attribute knowledge association. 53-61
Chapter II - Data-driven Information Management and Service Platform Development
- Huiying Yan, Yu Zhang:
Analyzing the 'Belt and Road' topic of overseas Chinese media based on the BERTopic modeling. 62-69 - Yingbo Zhai, Yanji Piao:
Research on the Construction of Smart Community Based on Text Mining. 70-75 - Lan Wang, Ran Li:
Study on the Impact of Job Embeddedness on Employee's Innovative Behavior in Information Technology Industry. 76-83 - Hongtao Hu, Xueying Zhang:
WOA-BP Based Predicting Daily Production Method of Single Wells in Oilfield. 84-90
Chapter III - Software and Data Security
- Yi Yin, Yuichiro Tateiwa, Xiaojun Qian, Qian Gao, Lingling Shen, Guoqiang Zhang:
Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy. 91-98 - Biao Gao, Shijie Jia, Peng Yin, Xueying Zhang:
Protection of Access Pattern. 99-105 - Alena Vasileva, Yegor Bugayenko:
Object Specialization to Partially Reduce Polymorphism of Attributes. 106-115 - Abdulrahman Hamman Adama Chukkol, Senlin Luo, Yunusa Haruna, Abdulganiyu Abdu Yusuf, Abulfatahi Mohammed:
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs. 116-122 - Carlos A. Estrada, Sergio S. Naranjo, Veronica J. Toasa, Sang Guun Yoo:
A Systematic Literature Review of Blockchain Technology: Applications Fields, Platforms, and Consensus Protocols. 123-131 - Huixian Wang, Quansheng Dou, Huanling Tang, Shun Zhang, Hao Pan:
A SQL Synthesis System with Operator Handler. 132-136
Chapter IV - Data Structure Analysis and Data Modeling
- Chufeng Liang, Zhicheng Hong, Zeming Wei, Yongzhang Zhou, Hua Tang:
Soil Data Storage Framework based on Blockchain and Improved Merkle Mountain Range. 137-145 - Asma Belaroussi, Khalissa Derbal, Mohamed Fazil Lounis, Adel Mensouri, Mostefa Belhadj Aissa:
From spatial data warehouse into NoSQL document-oriented database: case study Forest fire risk management. 146-151 - Yegor Bugayenko, Mikhail Lipanin:
An Algorithm for Partial Elimination of Jumps in an Object-Oriented Dataflow Language. 152-164 - Guoqing Zhao, Leilei Deng, Zhiyuan Chen, Xianbiao Kang:
Data Fusion Optimization and Contribution Assessment of Dual-Polarization Radar Data in Short-Term Forecasting of Convective Precipitation. 165-171 - Yuelu Wang:
Data Analysis of Attitude Evaluation System in News Discourse. 172-177 - Yong Shuai, Chuan Yang, Biao Li, Xiaoping Huang, Xinyi Su:
An improved combined small sample time series data prediction model. 178-182 - Ting Yang, Shuisheng Zhou:
Iteratively Reweighted Hypergraph Subspace Clustering. 183-189
Chapter V - Digital Image Analysis and Processing Methods
- Wei Yuen Teh, Chern Hong Lim, Mei Kuan Lim, Ian K. T. Tan:
Towards Discrete Object Representations in Vision Transformers with Tensor Products. 190-194 - Zifan Zuo:
Image Segmentation of the Cell Nuclei Staining Using U-net and Segment Anything Model. 195-204 - Simran Kumar, Isha Sahni, Srushti Jagtap, Manish Bhurtel:
Single-Camera 3D Human Pose Estimation: Addressing Occlusion Challenges and Predictive Quality Assessment. 205-211 - Yanan Wang, Xuexu Ma, Zhongmin Wang:
Keep your Eyes on the Road: Hybrid-Anchor guided Road Perception. 212-216 - Tianyu Xiao, Ruining Zhao, Saijun Nie, Xu Ji:
Efficient and Accurate Abdominal Multi-Organ Segmentation using Cross Pseudo-based Semi-Supervised Learning. 217-222 - Xiawei Guan, Hao Zhang, Shaobo Fu, Jia Wang, Han Pan:
Multibeam Imaging Sonar Image Fusion via -total Variation Model. 223-227 - Ziyu Wu, Ziyang Wu:
Instance-based 3D Anchor for Monocular 3D Object Detection. 228-232 - Lihu Pan, Yunting Yang, Zhengkui Wang, Rui Zhang, Wen Shan, Jiashu Li:
Image Segmentation with Vision-Language Models. 233-238 - Yu Jiang, Yancong Deng:
Self-Attention Driven Image-to-image Translation with Conditional Adversarial Networks. 239-245
Chapter VI - Image Detection and Recognition
- Yingbo Wang, Song Si Liang:
Improve the defect detection of printed circuit board by Yolov5s. 246-250 - Yipei Wang, Shiyu Hu, Xin Zhao:
Rethinking Similar Object Interference in Single Object Tracking. 251-258 - Jun Zhang, Chuyang Wen, Yurun Zhao, Peiqin Zhao:
Adaptive Human Interaction Detection Algorithm for Oilfield Security System. 259-263 - Chenrushi Yang, Ruidong Mei, Hui Cheng:
A Comparative Study of Indoor Place Recognition Using Multi-modal Range Information. 264-268 - Xiao Zhen Jiu, Zhang Jian:
Helmet detection algorithm based on improved yolov7. 269-276 - Yang Huang, Guanghua Xie, Kege Yang, Rui Dong:
Domain Adaptive Pedestrian Re-recognition for Oilfield Operations Security. 277-281 - Wenming Wu:
Architectural Floorplan Recognition via Iterative Semantic Segmentation Networks. 282-287 - Yingbo Wang, Liu Zhi, Wang Ying Bo:
Improved YOLOv7 UAV image small target detection algorithm. 288-294 - Yutra Abel Zenebe, Jiangbin Zheng, Xiaoyu Li, Ahmed Endris:
SkinAACN: An Efficient Skin Lesion Classification Based on Attention Augmented ConvNeXt with Hybrid Loss Function. 295-300
Chapter VII - Information Network and Signal Analysis
- Yichen Liu, Huajian Zhang, Yuzhen Huang, Fangfang Zhu, Yiqing Liang, Daqing Gao:
An Anomaly Detection Model Based on CNN-VAE for IoT Devices. 301-305 - Xiyue Tan, Dan Wang, Jiaming Chen:
A hybrid self-attention convolution network for MI signals decoding. 306-311 - Quangphuoc Nguyen, Ngocminh Nguyen, Thanhluan Dang, Vanha Tran:
Vietnamese Voice2Text: A Web Application for Whisper Implementation in Vietnamese Automatic Speech Recognition Tasks: Vietnamese Voice2Text. 312-318 - Xudong Zhang, Feng Gu, Wei Zhong, Chunyu Ai:
A Hybrid Resampling Technique with Adaptive Intervals Used in the Parallel/Distributed Particle Filters. 319-325 - Wei Wei Hua, Yisheng An:
A low-latency vehicle edge computing network distributed task offloading solution. 326-331 - Hewei Li, Jingguo Sun, Zhangyuan Ji, Yuanpei Chang, Ying Xue, Yu Zhang, Jiancun Zuo:
Research on wireless signal dataset and modulation pattern recognition technology. 332-338
Chapter VIII - Modern Information Security Theory and Key Technologies
- Wen-Chi Hu, Shih-Tsung Hsu:
The Future of EFL Reading: How Digital Technology is Changing the Game. 339-345 - Zhendong Du, Kenji Hashimoto:
Exploiting Paraphrasers and Inverse Paraphrasers: A Novel Approach to Enhance English Writing Fluency through Improved Style Transfer Training Data. 346-352 - Arun K. Pujari, Sowmini Devi Veeramachaneni:
Gradient based Hybridization of PSO. 353-360 - Boris Feliksovich Melnikov, Dmitrii Chaikovskii:
Some General Heuristics in the Traveling Salesman Problem and the Problem of Reconstructing the DNA Chain Distance Matrix. 361-368 - Ting Wang, Fengxi Gao, Yuxiao Zhou, Feng Shang, Qingchuan Zhang:
Research on Power Network Fault Event Extraction Based on Hybrid Neural Network. 369-374 - Hongbin Hu, Yongbin Wang, Shuang Feng:
Research on dynamic management of convergence media ecology node based on blockchain. 375-380 - Na Wang, Rongqiang Zhang, Hengyang Wu:
Cultural Heritage Triple Information Extraction Based on Span Pointer Network. 381-387 - Dongxiao Jiang, Hailin Sun, Jiahua Lin, Jie Jiang, Xing Sun, Yanchi Li, Bocheng Xia, Siyuan Xiao, Yulong Liu:
Towards Dual Optimization of Efficiency and Accuracy: Hyper Billion Scale Model Computing Platform for Address Services. 388-395 - Zhenkai Lu, Han Jiao, Danpu Zhang:
An Attention-Based Approach for Spatial-Temporal Trajectory similarity Search. 396-401 - Xingyang Cui, Mingxuan Wei, Guannan Li:
Behavior Mining of Robot-Animal Mixed Swarm. 402-407
Chapter IX - Visualization Data Based on Images
- Yifan Zhou, Yizhou Ding, Yuwu Dong, Hao He:
Ontology-Semantic Alignment On Contrastive Video-Language Model for Multimodel Video Retrieval Task. 408-413 - Peng Lv, Yan Liu:
Analysis of Graph Data Structure from the Perspective of Clustering. 414-419 - Ming Hui Xia, Ya Hui Zhao, Rong Yi Cui, Guo Zhe Jin:
A Study of Unsupervised Multi-document Sentiment Summarization Techniques Based on Graph Structure. 420-428 - Rattawut Vongvit:
Enhancing Maintenance Training with Mobile Augmented Reality: An AHP-Based Development Approach. 429-435 - Matvei Khoimov, Stepan Botman, Natalia Shusharina:
Autoencoder-based representation learning of hand and finger movements in humans. 436-441 - Danning Wu:
Knowledge Ecological Model and Its Implementations in the Context of Metaverse. 442-448
Chapter X - Visualization Data Based on Images
- Yanxia Sun:
Analysis of the performance of PID-based new-generation metaheuristic algorithms for automatic voltage regulation system. 449-454 - Yanxia Sun, Zenghui Wang, Yves Matanga:
Nonlinear system identification using a semi concurrent sequential niching framework. 455-460 - Irfan Ali Channa, Dazi Li:
Detection and classification of power quality disturbances using STFT and deep neural Network. 461-466 - Jiangchen Wu, Yumeng Shi, Yining Chen:
A Method of Predicting the Deposited Film Thickness in IC Fabrication Based on Stacking Ensemble Learning. 467-474 - Hao Wang, Zhilin Duo, Jianfei Chen:
False Data Injection Attacks Intrusion Simulation Applying Semi-Supervised for Power System Based on Knowledge Graph. 475-480 - You-Min Fan, Zhe-Cong Fan:
An Improved Gradient Optimizer with Adaptive Mechanism. 481-485
Chapter XI - Visualization Data Based on Images
- Mikhail E. Abramyan, Boris Feliksovich Melnikov:
On the Study of All Semilattices on the Set of Covering Automata for the Waterloo Automaton. 486-494 - Mingxuan Wei, Xingyang Cui, Kaijie Lai, Fulin Yang, Kaipeng Ji, Lei Wang, Guannan Li:
Design of an experiment platform for robot-fish swarm interaction. 495-500 - Meiliwen Wu, Renli Lv, Xiangmin Guan:
Design of Digital Air Traffic Management System for Multi-operator Unmanned Aerial Vehicle Based on Digital Twin. 501-506 - Wang Zheng, Wang Xin, Feng Gu, Lin Sun:
Research on cross-regional path planning algorithm for aircraft unmanned tractor based on improved A* algorithm. 507-513 - Guanyu Zhu, Thelma Domingo Palaoag, Xia Shao:
Design and Architecture of Smart Agriculture System based on Big Data Analytics. 514-519 - Yaoyao Wang, Yisheng An:
A FCCPN-based Movement Coordination Strategy for Deadlock Avoidance in Multi-AGV Systems. 520-525
Chapter XII - Visualization Data Based on Images
- Yuyanzhen Zhong, Chuan Yang, Xinyi Su, Biao Li, Xiaoping Huang, Yong Shuai:
Review on Research of Automated Machine Learning. 526-532 - Wei Deng, Juncheng Chen, Zhen Li, Weiwei Wang, Zhi Cai:
A-share Trading Strategy Based on MTL-DDPG. 533-538 - Daiveek Sai P, Anouksha Rajesh:
Semantic Topic Extraction from Research Artifacts. 539-545 - Yizhou Ding, Jidong Tian, Shanxing Mei, Yifan Zhou, Yuwu Dong, Hao He, Weisheng Hu:
LDSeq: Latent Diffusion Models for Sequence to Sequence Text Generation. 546-552
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.