Abstract is missing.
- YOLO-SA: An Efficient Object Detection Model Based on Self-attention MechanismAng Li, Xiangyu Song, Shijie Sun 0001, Zhaoyang Zhang, Taotao Cai, Huansheng Song. 1-15 [doi]
- Retrieval-Enhanced Event Temporal Relation Extraction by Prompt TuningRong Luo, Po Hu. 16-30 [doi]
- MICA: Multi-channel Representation Refinement Contrastive Learning for Graph Fraud DetectionGuifeng Wang, Disheng Tang, Anatoli Shatsila, Xuecang Zhang. 31-46 [doi]
- Detecting Critical Nodes in Hypergraphs via Hypergraph Convolutional NetworkZhuang Miao, Fuhui Sun, Xiaoyan Wang, Pengpeng Qiao, Kangfei Zhao, Yadong Wang, Zhiwei Zhang, George Y. Yuan. 47-62 [doi]
- Adaptive Label Cleaning for Error Detection on Tabular DataYaru Zhang, Jianbin Qin, Rui Mao 0001, Yan Ji, Yaoshu Wang, Muhammad Asif Ali. 63-78 [doi]
- A Dual-Population Strategy Based Multi-Objective Yin-Yang-Pair Optimization for Cloud ComputingHui Xu, Mingchao Ding. 79-94 [doi]
- Multiview Subspace Clustering of Hyperspectral Images Based on Graph Convolutional NetworksXianju Li, Renxiang Guan, Zihao Li, Hao Liu, Jing Yang. 95-107 [doi]
- Multi-relational Heterogeneous Graph Attention Networks for Knowledge-Aware RecommendationYouxuan Wang, Shunmei Meng, Qi Yan, Jing Zhang. 108-123 [doi]
- Heterogeneous Graph Contrastive Learning with Dual Aggregation Scheme and Adaptive AugmentationYingjie Xie, Qi Yan, Cangqi Zhou, Jing Zhang, Dianming Hu. 124-138 [doi]
- Ultra-DPC: Ultra-scalable and Index-Free Density Peak ClusteringLuyao Ma, Geping Yang, Xiang Chen 0007, Yiyang Yang, Zhiguo Gong, Zhifeng Hao. 139-154 [doi]
- Lifelong Hierarchical Topic Modeling via Non-negative Matrix FactorizationZhicheng Lin, Jiaxing Yan, Zhiqi Lei, Yanghui Rao. 155-170 [doi]
- Time-Aware Preference Recommendation Based on Behavior SequenceJiaQi Wu, Yi Liu, Yidan Xu, Yalei Zang, Wenlong Wu, Wei Zhou, Shidong Xu, Bohan Li. 171-185 [doi]
- Efficient Multi-object Detection for Complexity Spatio-Temporal ScenesKai Wang, Xiangyu Song, Shijie Sun 0001, Juan Zhao, Cai Xu, Huansheng Song. 186-200 [doi]
- PERTAD: Towards Pseudo Verification for Anomaly Detection in Partially Labeled GraphsWenjing Chang, Jianjun Yu, Xiaojun Zhou. 201-216 [doi]
- STTR-3D: Stereo Transformer 3D Network for Video-Based Disparity Change EstimationQitong Yang, Lionel Rakai, Shijie Sun 0001, Huansheng Song, Xiangyu Song, Naveed Akhtar. 217-231 [doi]
- HM-Transformer: Hierarchical Multi-modal Transformer for Long Document Image UnderstandingXi Deng, Shasha Li 0001, Jie Yu, Jun Ma 0015. 232-245 [doi]
- NV-QALSH+: Locality-Sensitive Hashing Optimized for Non-volatile MemoryZhili Yao, Yikai Huang, Zezhao Hu, Jianlin Feng. 246-260 [doi]
- A Novel Causal Discovery Model for Recommendation SystemGuohao Sun, Huirong Hua, Jinhu Lu, Xiu Fang. 261-276 [doi]
- ECS-STPM: An Efficient Model for Tunnel Fire Anomaly DetectionHuansheng Song, Ya-Wen, Xiangyu Song, Shijie Sun 0001, Taotao Cai, Jianxin Li 0001. 277-293 [doi]
- ACE-BERT: Adversarial Cross-Modal Enhanced BERT for E-Commerce RetrievalBoxuan Zhang, Chao Wei, Yan Jin, Cai Xu, Weiru Zhang, Haihong Tang, Ziyu Guan. 294-311 [doi]
- Continual Few-Shot Relation Extraction with Prompt-Based Contrastive LearningFei Wu, Chong Zhang, Zhen Tan, Hao Xu, Bin Ge. 312-327 [doi]
- An Improved Method of Side Channel Leak Assessment for Cryptographic AlgorithmFuxiang Lu, Weijian Li, Zanyu Huang, Chuanlu Chen, Peng Chen. 328-342 [doi]
- Fusing Global and Local Interests with Contrastive Learning in Session-Based RecommendationSu Zhang, Ye Tao 0011, Ying Li 0012, Zhonghai Wu. 343-358 [doi]
- Exploring the Effectiveness of Student Behavior in Prerequisite Relation Discovery for ConceptsJifan Yu, Hanming Li, Gan Luo, Yankai Lin, Peng Li 0030, Jianjun Xu, Lei Hou 0001, Bin Xu 0001. 359-374 [doi]
- Wasserstein Adversarial Variational Autoencoder for Sequential RecommendationWenbiao Liu, Xianjin Rong, Yingli Zhong, Jinghua Zhu. 375-389 [doi]
- Fine-Grained Category Generation for Sets of EntitiesYexing Du, Jifan Yu, Jing Wan, Jianjun Xu, Lei Hou 0001. 390-405 [doi]
- CoTE: A Flexible Method for Joint Learning of Topic and Embedding ModelsBo Zhao, Chunfeng Yuan, Yihua Huang. 406-421 [doi]
- Construction of Multimodal Dialog System via Knowledge Graph in Travel DomainJing Wan, Minghui Yuan, Zhenhao Dong, Lei Hou 0001, Jiawang Xie, Hongyin Zhu, Qinghua Wen. 422-437 [doi]
- DCNS: A Double-Cache Negative Sampling Method for Improving Knowledge Graph EmbeddingHao Zheng, Donghai Guan, Shuai Xu, Weiwei Yuan. 438-450 [doi]
- Influence Maximization in Attributed Social Network Based on Susceptibility Cascade ModelJinyi Chen, Junchang Xin, Shengnan Lei, Keqi Zhou, Baoting Li, Zhiqiong Wang. 451-466 [doi]
- Density Ratio Peak ClusteringShuliang Wang, Xiaojia Liu, Qi Li, Hanning Yuan, Ye Yuan 0001, Ziwen Feng, Fan Zhang. 467-482 [doi]
- Feds: A Highly Efficient Keyword Search System Operating on Federated RDF SystemsMingdao Li, Peng Peng 0001, Zheng Qin. 483-488 [doi]
- CY-Apollo: A Multi-view Profile System for Complicated Network AttacksZhaoquan Gu, Haiyan Wang, Xiayu Xiang, Ke Zhou, Wenying Feng, Jianxin Li. 489-495 [doi]
- GaussTS: Towards Time Series Data Management in OpenGaussLu Li, Xu Zhang, Feifan Pu, Yi Li, Jianqiu Xu, Zhou Zhong. 496-501 [doi]
- URPWS: An Urban Road Ponding Monitoring and Warning System Based on Surveillance VideoRui Xu, Fang Fang 0008, Qingyi Hao, Kang Zheng, Yi Zhou, Yuting Feng, Shengwen Li, Zijing Wan. 502-506 [doi]
- RDBlab: An Artificial Simulation System for RDBMSsYu Yan, Hongzhi Wang 0001, Junfang Huang, Jian Geng, Zixuan Wang, Yuzhuo Wang. 507-512 [doi]
- SeCPlat: A Secure Computation Platform Based on Homomorphic Encryption in CloudFanyou Zhao, Yiping Teng, Zheng Yang, Yuyang Xie, Jiayv Liu, Jiawei Qi. 513-518 [doi]