skip to main content
10.1145/3590003acmotherconferencesBook PagePublication PagescacmlConference Proceedingsconference-collections
CACML '23: Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CACML 2023: 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning Shanghai China March 17 - 19, 2023
ISBN:
978-1-4503-9944-9
Published:
29 May 2023

Reflects downloads up to 14 Sep 2024Bibliometrics
Abstract

No abstract available.

research-article
Virtual Human Talking-Head Generation

Abstract: Virtual humans created by computers using deep learning technology are being used widely in a variety of fields, including personal assistance, intelligent customer service, and online education. Human-computer interaction systems integrate ...

research-article
Hierarchical Monte Carlo Tree Search for Latent Skill Planning

Monte Carlo Tree Search (MCTS) continues to confront the issue of exponential complexity growth in certain tasks when the planning horizon is excessively long, causing the trajectory’s past to grow exponentially. Our study presents Hierarchical MCTS ...

research-article
Speech image data mining algorithm based on multimodal decision fusion

This paper proposes a data mining algorithm based on multimodal decision fusion, which is mainly used to solve the correlation relationship of multi-level and multi-level multimodal data, the algorithm combines the methods of statistics, queueing study, ...

research-article
Optimized model analysis of blockchain PoW procotol under long delay attack

Abstract:Proof of work(POW) is one of the most widely used consensus method of bitcoin. In some chains, because of the large number of users, the huge amount of information interaction data, equipment hardware failure or malicious attacks on some nodes ...

research-article
ADCapsNet: An Efficient and Robust Capsule Network Model for Anomaly Detection

With the rapid development of the industrial internet of things(IIoT), the anomalies will cause significant damage to the ordinary operation of the industry. Anomaly detection work has increasingly become a hot spot. Although many related kinds of ...

research-article
Customer Service Hot event Discovery Based on Dynamic Dialogue Embedding

Frequent customer service conversations focus on hot topics of communication users, and automatic hot topic discovery is critical to improving user experience. Traditionally, Customer service relies on operator to write traffic summaries. It leads to ...

research-article
MergeTree: a Tree Model with Merged Nodes for Threat Induction

Threat tree model can clearly organize threat induction information and thus is widely used for risk analysis in software assurance. Threat tree will grow to complicated structures, e.g., the number of nodes and branches, when the threat information ...

research-article
Heart Sound Classification Algorithm Based on Sub-band Statistics and Time-frequency Fusion Features

The clinically acquired heart sound signals always have inevitable noise, and the statistical features of these noises are different from heart sounds, so a heart sound classification algorithm based on sub-band statistics and time-frequency fusion ...

research-article
Garment Metaverse: Parametric Digital Human and Dynamic Scene Try-on

As a new concept, the metaverse has been widely concerned by the industry, academia, media and the public. Many domestic and foreign companies have also set up in the field of the metaverse. The traditional 2D and 3D virtual fitting has not achieved ...

research-article
Multi-dimensional analysis of urban shrinkage problem in Liaoning Province based on multi-index system, grey correlation analysis and BP neural network with particle swarm optimization

The rapid development of urbanization in modern China is accompanied by the increasingly serious problem of urban shrinkage. To provide an effective analytical model for the urban shrinkage problem, this paper takes Liaoning Province, which is one of ...

research-article
Helmet wear detection based on YOLOV5

Safety helmet wearing detection is an important safety inspection task with widespread applications in industries, construction, and transportation. Traditional safety helmet wearing detection methods typically use feature-based classifiers such as SVM ...

research-article
An Intrusion Detection Model With Attention and BiLSTM-DNN

Abstract—At present, machine learning and deep learning are often used for network traffic intrusion detection. In order to solve the problem of unfocused feature extraction in these methods and improve the accuracy of network intrusion detection, this ...

research-article
Deep Reinforcement Learning with Copy-oriented Context Awareness and Weighted Rewards for Abstractive Summarization

This paper presents a deep context-aware model with a copy mechanism based on reinforcement learning for abstractive text summarization. Our model is optimized using weighted ROUGEs as global prediction-based rewards and the self-critical policy ...

research-article
An autoencoder-based fast online clustering algorithm for evolving data stream

In the era of Big Data, more and more IoT devices are generating huge amounts of high-dimensional, real-time and dynamic data streams. As a result, there is a growing interest in how to cluster this data effectively and efficiently. Although a number ...

research-article
Estimation of Distribution Algorithm with Discrete Hopfield Neural Network for GRAN3SAT Analysis

The Discrete Hopfield Neural Network introduces a G-Type Random 3 Satisfiability logic structure, which can improve the flexibility of the logic structure and meet the requirements of all combinatorial problems. Usually, Exhaustive Search (ES) is ...

research-article
Face Anti-spoofing Method Based on Deep Supervision

Although face recognition technology is extensively used, it is vulnerable to various face spoofing attacks, such as photo and video attacks. Face anti-spoofing is a crucial step in the face recognition process and is particularly important for the ...

research-article
Genetic algorithm in hopfield neural network with probabilistic 2 satisfiability

Genetic Algorithm (GA) is to convert the problem-solving process into a process similar to the chromosomal changes in biological evolution using the mathematical method and computer simulation operation. This meta-heuristic algorithm has been ...

research-article
Construction of Scene Library System for Commercial Vehicle Products Based on Multidimensional Terminal

Scene-based product design is an effective way to improve user experience, and static scene library is an important basis for commercial vehicle product planners to carry out their design and planning. This paper explores the characteristics of ...

research-article
Research on Epidemic Big Data Monitoring and Application of Ship Berthing Based on Knowledge Graph-Community Detection

The COVID-19 epidemic has been raging overseas for more than three years, and inbound goods and people have become the main risk points of the domestic epidemic. As the main window for China to exchange materials and personnel with foreign countries, ...

research-article
Early warning of corporate financial crisis based on sentiment analysis and AutoML

Establishing an early warning model for corporate financial crises is important for managing risks and ensuring the continued stability of the capital market. A financial crisis early warning indicator system for listed companies was constructed, which ...

research-article
Graph representation learning and software homology matching based A study of JAVA code vulnerability detection techniques

In nowadays using different tools and apps is a basic need of people's behavior in life, but the security issues arising from the existence of source code plagiarism among tools and apps are likely to bring huge losses to companies and even countries, ...

research-article
PhyGNNet: Solving spatiotemporal PDEs with Physics-informed Graph Neural Network

Partial differential equations (PDEs) are a common means of describing physical processes. Solving PDEs can obtain simulated results of physical evolution. Currently, the mainstream neural network method is to minimize the loss of PDEs thus ...

research-article
Multi-strategy Improved Multi-objective Harris Hawk Optimization Algorithm with Elite Opposition-based Learning

Abstract: To make up for the deficiencies of the Harris hawk optimization algorithm (HHO) in solving multi-objective optimization problems with low algorithm accuracy, slow rate of convergence, and easily fall into the trap of local optima, a multi-...

research-article
Elastic Detection Mechanism Aimed at Hybrid DDoS Attack

In Distributed Denial of Service(DDoS) attack, the attacker uses a remotely controlled botnet to attack the target server at the same time to prevent legitimate users from obtaining information services. Previous studies focused on the detection of ...

research-article
Detecting Arbitrary-oriented Objects in Remote Sensing Imagery with Segmentation-Aware Mask

Arbitrary-Oriented object detection in remote sensing images is a hot topic in recent years. Currently, most arbitrary-oriented object detectors adopt the oriented bounding box (OBB) to represent targets in remote sensing imagery. However, OBB ...

research-article
A Review of Routing Optimization Techniques for Quality of Service Assurance in Software-Defined Networks

The traditional military communication network is based on IP architecture, which has the problems of rigid architecture and challenging quality of service guarantee. The rapid development of various new applications has put differentiated demands on ...

research-article
TIRec: Transformer-based Invoice Text Recognition

A novel invoice text recognition model is proposed. In the past few years, researchers have explored text recognition methods with RNN-like structures to model semantic information. However, RNN-based approaches have some obvious drawbacks, such as the ...

research-article
Two-channel Conformance Test Analysis of S-band Dual-polarization Radar

The consistency of the dual-channel radar plays a crucial role in the performance of the dual-polarization radar. In theory, the performance of the two channels is required to be completely consistent, but it cannot be completely consistent due to the ...

research-article
Feature selection based on improved principal component analysis

Abstract: The filtered feature selection method has low computational complexity and less time, and is widely used in feature selection, but the filtered method only considers the importance of features for label classification and ignores the ...

Index Terms

  1. Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Acceptance Rates

      CACML '23 Paper Acceptance Rate 93 of 241 submissions, 39%;
      Overall Acceptance Rate 93 of 241 submissions, 39%
      YearSubmittedAcceptedRate
      CACML '232419339%
      Overall2419339%