Abstract is missing.
- Online Anomaly Detection via Incremental Tensor DecompositionMing Gao, Yunbing Zong, Rui Li, Chengzhi An, Qiang Duan, Qingshan Yin, Xiangcheng Wang. 3-14 [doi]
- Intelligent Trader Model Based on Deep Reinforcement LearningDaoqi Han, Junyao Zhang, Yuhang Zhou, Qing Liu, Nan Yang. 15-21 [doi]
- BiRNN-DKT: Transfer Bi-directional LSTM RNN for Knowledge TracingBin Xu, Sheng Yan, Dan Yang. 22-27 [doi]
- Semi-supervised Learning to Rank with Uncertain DataXin Zhang, ZhongQi Zhao, ChengHou Liu, Chen Zhang, Zhi-cheng. 28-39 [doi]
- Signed Network Embedding Based on Noise Contrastive Estimation and Deep LearningXingong Chang, Wenqiang Shi, Fei Zhang. 40-46 [doi]
- Under Water Object Detection Based on Convolution Neural NetworkShaoqiong Huang, Mengxing Huang, Yu Zhang, Menglong Li. 47-58 [doi]
- Face Photo-Sketch Synthesis Based on Conditional Adversarial NetworksXiaoqi Xie, Huarong Xu, Lifen Weng. 59-71 [doi]
- Research and Implementation of Vehicle Tracking Algorithm Based on Multi-Feature FusionHeng Guan, Huimin Liu, Minghe Yu, Zhibin Zhao. 72-78 [doi]
- An Enterprise Competitiveness Assessment Method Based on Ensemble LearningYaomin Chang, Yuzheng Li, Chuan Chen, Bin Cao, Zhenxing Li. 79-84 [doi]
- A Method for Duplicate Record Detection Using Deep LearningQing Gu, Yongquan Dong, Yang Hu, Yali Liu. 85-91 [doi]
- Case Facts Analysis Method Based on Deep LearningZihuan Xu, Tieke He, Hao Lian, Jiabing Wan, Hui Wang. 92-97 [doi]
- The Air Quality Prediction Based on a Convolutional LSTM NetworkCanyang Guo, Wenzhong Guo, Chi-Hua Chen, Xin Wang, Genggeng Liu. 98-109 [doi]
- Core Solution Computing Algorithm of Web Data ExchangeYuhang Ji, Gui Li, Zhengyu Li, Ziyang Han, Keyan Cao. 113-118 [doi]
- A Novel Adaptive Tuning Mechanism for Kafka-Based Ordering ServiceLi Xu, Xuan Ma, Lizhen Xu. 119-125 [doi]
- Author Name Disambiguation in Heterogeneous Academic NetworksXiao Ma, Ranran Wang, Yin Zhang. 126-137 [doi]
- Is Bigger Data Better for Defect Prediction: Examining the Impact of Data Size on Supervised and Unsupervised Defect PredictionXinyue Liu, Yanhui Li. 138-150 [doi]
- Using Behavior Data to Predict the Internet Addiction of College StudentsWei Peng, Xinlei Zhang, Xin Li. 151-162 [doi]
- Detection of Entity-Description Conflict on Duplicated Data Based on Merkle-Tree for IIoTYan Wang, Hui Zeng, Bingqing Yang, Zhu Zhu, Baoyan Song. 163-168 [doi]
- Anti-money Laundering (AML) Research: A System for Identification and Multi-classificationYixuan Feng, Chao Li, Yun Wang, Jian Wang, Guigang Zhang, Chunxiao Xing, Zhenxing Li, Zengshen Lian. 169-175 [doi]
- Research of Query Verification Algorithm on Body Sensing Data in Cloud Computing EnvironmentYanfang Gao, Lan Yao, Jinyue Yu. 176-188 [doi]
- Analysis of Macro Factors of Welfare Lottery Marketing Based on Big DataCheng Li, Hua Shao, Tiancheng Zhang, Ge Yu 0001. 189-198 [doi]
- An Inflection Point Based Clustering Method for Sequence DataYing Fan, Yilin Shi, Kai Kang, Qingbin Xing. 201-212 [doi]
- Efficient Large-Scale Multi-graph Similarity Search Using MapReduceJun Pang 0002, Minghe Yu, Yu Gu. 213-225 [doi]
- A Subgraph Query Method Based on Adjacent Node Features on Large-Scale Label GraphsXiaohuan Shan, Jingjiao Ma, Jianye Gao, Zixuan Xu, Baoyan Song. 226-238 [doi]
- Semantic Web Service Discovery Based on LDA ClusteringHeng Zhao, Jing Chen, Lei Xu. 239-250 [doi]
- Research and Implementation of Anti-occlusion Algorithm for Vehicle Detection in Video DataYongqi Wu, Zhichao Zhou, Lan Yao, Minghe Yu, Yongming Yan. 251-256 [doi]
- Temporal Dependency Mining from Multi-sensor Event Sequences for Predictive MaintenanceWeiwei Cao, Chen Liu, Yanbo Han. 257-269 [doi]
- An Anomaly Pattern Detection Method for Sensor DataHan Li, Bin Yu, Ting Zhao. 270-281 [doi]
- A Sequence-to-Sequence Text Summarization Model with Topic Based Attention MechanismHeng-Xi Pan, Hai Liu, Yong Tang. 285-297 [doi]
- Sentiment Tendency Analysis of NPC&CPPCC in German NewsYe Liang, Lili Xu, Tianhao Huang. 298-308 [doi]
- Ensemble Methods for Word Embedding Model Based on Judicial TextChunyu Xia, Tieke He, Jiabing Wan, Hui Wang. 309-318 [doi]
- Multilingual Short Text Classification Based on LDA and BiLSTM-CNN Neural NetworkXian-yan Meng, Rong-yi Cui, Ya-hui Zhao, Zhenguo Zhang. 319-323 [doi]
- Random Sequence Coding Based Privacy Preserving Nearest Neighbor Query MethodYunfeng Zou, Shiyuan Song, Chao Xu, Haiqi Luo. 327-339 [doi]
- Multi-keyword Search Based on Attribute EncryptionXueyan Liu, Tingting Lu, Xiaomei He, Xiaotao Yang. 340-346 [doi]
- Private Trajectory Data Publication for Trajectory ClassificationHuaijie Zhu, Xiaochun Yang 0001, Bin Wang 0015, Leixia Wang, Wang-Chien Lee. 347-360 [doi]
- Adaptive Authorization Access Method for Medical Cloud Data Based on Attribute EncryptionYu Wu, Nanzhou Lin, Wei Song 0006, Yuan Shen, Xiandi Yang, Juntao Zhang, Yan Sun. 361-367 [doi]
- Dummy-Based Trajectory Privacy Protection Against Exposure Location AttacksXiangyu Liu, Jinmei Chen, Xiufeng Xia, Chuanyu Zong, Rui Zhu 0003, Jiajia Li. 368-381 [doi]
- Privacy Protection Workflow Publishing Under Differential PrivacyNing Wu, Jiaqiang Liu, Yunfeng Zou, Chao Xu, Weiwei Ni. 382-394 [doi]
- A Cross-Network User Identification Model Based on Two-Phase ExpansionYue Kou, Xiang Li, Shuo Feng, Derong Shen, Tiezheng Nie. 397-403 [doi]
- Link Prediction Based on Node Embedding and Personalized Time Interval in Temporal Multi-relational NetworkYuxin Liu, Derong Shen, Yue Kou, Tiezheng Nie. 404-417 [doi]
- A Unified Relational Storage Scheme for RDF and Property GraphsRan Zhang, Pengkai Liu, Xiefan Guo, Sizhuo Li, Xin Wang. 418-429 [doi]
- Construction Research and Application of Poverty Alleviation Knowledge GraphHongyan Yun, Ying He, Li Lin, Zhenkuan Pan, Xiuhua Zhang. 430-442 [doi]
- Graph Data Retrieval Algorithm for Knowledge FragmentationJingbin Wang, Jing Lin. 443-448 [doi]
- A Method of Link Prediction Using Meta Path and Attribute InformationYu Zhang, Feng Li, Kening Gao, Ge Yu 0001. 449-454 [doi]
- TransFG: A Fine-Grained Model for Knowledge Graph EmbeddingYaowei Yu, Zhuoming Xu, Yan Lv, Jian Li. 455-466 [doi]
- Adjustable Location Privacy-Preserving Nearest Neighbor Query MethodLinfeng Xie, Zhigang Feng, Cong Ji, Yongjin Zhu. 467-479 [doi]
- Semi-supervised Sentiment Classification Method Based on Weibo Social RelationshipWei Liu, Mingxin Zhang. 480-491 [doi]
- Organization and Query Optimization of Large-Scale Product KnowledgeYou Li, Taoyi Huang, Hao Song, Yuming Lin. 492-498 [doi]
- Drug Abuse Detection via Broad LearningChao Kong, Jianye Liu, Hao Li, Ying Liu, Haibei Zhu, Tao Liu. 499-505 [doi]
- Semi-supervised Meta-path-based Algorithm for Community Detection in Heterogeneous Information NetworksLimin Chen, Yan Zhang, Liu Yang. 506-511 [doi]
- CLMed: A Cross-lingual Knowledge Graph Framework for Cardiovascular DiseasesMing Sheng, Han Zhang, Yong Zhang, Chao Li, Chunxiao Xing, Jingwen Wang, Yuyao Shao, Fei Gao. 512-517 [doi]
- How to Empower Disease Diagnosis in a Medical Education System Using Knowledge GraphSamuel Ansong, Kalkidan F. Eteffa, Chao Li, Ming Sheng, Yong Zhang, Chunxiao Xing. 518-523 [doi]
- Blockchain Retrieval Model Based on Elastic Bloom FilterXuan Ma, Li Xu, Lizhen Xu. 527-538 [doi]
- An Empirical Analysis of Supply Chain BPM Model Based on Blockchain and IoT Integrated SystemRuixue Zhao. 539-547 [doi]
- A Trusted System Framework for Electronic Records Management Based on BlockchainSixin Xue, Xu Zhao, Xin Li, Guigang Zhang, Chunxiao Xing. 548-559 [doi]
- A Blockchain Based Secure E-Commerce Transaction SystemYun Zhang, Xiaohua Li, Jili Fan, Tiezheng Nie, Ge Yu 0001. 560-566 [doi]
- Data-Driven Power Quality Disturbance Sources Identification MethodQi Li, Jun Fang, Jia Sheng. 569-574 [doi]
- Research and Implementation of a Skyline Query Method for Hidden Web DatabaseZhengyu Li, Gui Li, Ziyang Han, Ping Sun, Keyan Cao. 575-581 [doi]
- Research on Real-Time Express Pick-Up Scheduling Based on ArcGIS and Weighted kNN AlgorithmYi Ying, Kai Ren, Yajun Liu. 582-588 [doi]
- Similarity Histogram Estimation Based Top-k Similarity Join Algorithm on High-Dimensional DataYouzhong Ma, Ruiling Zhang, Yongxin Zhang. 589-600 [doi]
- Hybrid Indexes by Exploring Traditional B-Tree and Linear RegressionWenwen Qu, Xiaoling Wang, Jingdong Li, Xin Li. 601-613 [doi]
- Crowdsourced Indoor Localization for Diverse Devices with RSSI SequencesJing Sun, Xiaochun Yang 0001, Bin Wang 0015. 614-625 [doi]
- Grading Programs Based on Hybrid AnalysisZhikai Wang, Lei Xu. 626-637 [doi]
- Transferring Java Comments Based on Program Static AnalysisBinger Li, Feifei Li, Xinlin Huang, Xincheng He, Lei Xu. 638-643 [doi]
- A Monitoring Mechanism for Electric Heaters Based on Edge ComputingJing Wang, Zihao Wang, Ling Zhao. 644-649 [doi]
- GRAMI-Based Multi-target Delay Monitoring Node Selection Algorithm in SDNZhi-Qi Wang, Jian-Tao Zhou, Lin Liu. 650-661 [doi]
- Research on Fuzzy Adaptive PID Fuzzy Rule Optimization Based on Improved Discrete Bat AlgorithmXuewu Du, Mingxin Zhang, Guangtao Sha. 662-674 [doi]
- A Tag-Based Group Recommendation AlgorithmWenkai Ma, Gui Li, Zhengyu Li, Ziyang Han, Keyan Cao. 677-683 [doi]
- A Graph Kernel Based Item Similarity Measure for Top-N RecommendationWei Xu, Zhuoming Xu, Bo Zhao. 684-689 [doi]
- Mining Core Contributors in Open-Source ProjectsXiaojin Liu, Jiayang Bai, Lanfeng Liu, Hongrong Ouyang, Hang Zhou, Lei Xu. 690-703 [doi]
- A QueryRating-Based Statistical Model for Predicting Concurrent Query Response TimeZefeng Pei, Baoning Niu, Jinwen Zhang, Muhammad Amjad 0004. 704-713 [doi]
- Application of Patient Similarity in Smart Health: A Case Study in Medical EducationKalkidan Fekadu Eteffa, Samuel Ansong, Chao Li, Ming Sheng, Yong Zhang, Chunxiao Xing. 714-719 [doi]