Abstract is missing.
- Social Network Analysis of Hadith Narrators from Sahih BukhariTanvir Alam, Jens Schneider. 1-5 [doi]
- Knowledge Interaction Enhanced Knowledge Tracing for Learner Performance PredictionWenbin Gan, Yuan Sun, Yi Sun. 1-6 [doi]
- Covid-19 increased collectivistic expression on Sina WeiboXiaopeng Ren, Nuo Han, Tingshao Zhu. 1-4 [doi]
- Testing tailored weekly feedback messages for behavioral change of people living with diabetes using a mHealth applicationNoor Al-Ansari, Dena Al-Thani, Luis Fernández-Luque, Mohammed El-Rishi. 1-4 [doi]
- Characterization of temporal patterns in the occurrence of aggressive behaviors in Bogotá (Colombia)Ana Maria Reyes, Jorge Rudas, Cristian Pulido, Jorge Victorino, Darwin Martínez, Luz Ángela Narváez, Francisco Gómez 0002. 1-4 [doi]
- *Pakindessama M. Konkobo, Rui Zhang, Siyuan Huang, Toussida T. Minoungou, Jose A. Ouedraogo, Lin Li. 1-6 [doi]
- A Manifold Learning Data Enrichment Methodology for Homicide PredictionJuan S. Moreno Pabón, Mateo Dulce Rubio, Yor Castaño, Alvaro J. Riascos, Paula Rodríguez Díaz. 1-4 [doi]
- Eliciting Requirements for a Student-focussed Capture The FlagDavid Szedlak, Andrew M'manga. 1-4 [doi]
- A New Deep Convolutional Neural Network Model for Automated Breast Cancer DetectionXujuan Zhou, Yuefeng Li, Raj Gururajan, Ghazal Bargshady, Xiaohui Tao, Revathi Venkataraman, Prabal Datta Barua, Srinivas Kondalsamy-Chennakesavan. 1-4 [doi]
- Dual Attitude Model of Opinion Diffusion: Experiments with Epistemically Motivated AgentsRiyang Phang, Lin Qiu, Angela Ka-yee Leung. 1-6 [doi]
- Monitoring and Controlling Phone Usage to Raise Awareness and Combat Digital AddictionKlara Potapova, Deniz Cetinkaya, Gernot Liebchen. 1-4 [doi]
- Personality Traits and Coping Strategies of eSports PlayersMaria Semenova, Andrey Lange, Denis Koposov, Andrey Somov, Evgeny Burnaev. 1-5 [doi]
- Electricity Price Forecasting using Convolution and LSTM ModelsDhruv Aditya Mittal, Shaowu Liu, Guandong Xu. 1-4 [doi]
- Pathogen Prevalence, Collectivism and Online Sadness Expression in China *: for Special Track "Covid-19 and Computational Social Psychology"Hao Chen, Bin Hong, Hui-Lin Zang. 1-6 [doi]
- Wireless EEG system for Sport Science: quantitative analysis of movementMurad B. Sultanov, Khadidja Yu. Ismailova. 1-4 [doi]
- How public emotions change with emergent social eventsTing Xue, Hongyu Sun, Meng Zhang. 1-5 [doi]
- Collaborator Recommendation Based on Dynamic Attribute Network Representation LearningHansong Nie, Xiangtai Chen, Xinbei Chu, Wei Wang 0077, Zhenzhen Xu, Feng Xia 0001. 1-6 [doi]
- Sentiment, Count and Cases: Analysis of Twitter discussions during COVID-19 PandemicZainab Tariq Soomro, Sardar Haider Waseem Ilyas, Ussama Yaqub. 1-4 [doi]
- Accuracy and Fairness in a Conditional Generative Adversarial Model of Crime PredictionChristian Urcuqui, Juan Moreno, Carlos Montenegro, Alvaro Riascos, Mateo Dulce Rubio. 1-6 [doi]
- Chinese Zero Pronoun Resolution Based on Biaffine Attention MechanismLikai Wang, Weiguang Qu, Tinxin Wei, Junsheng Zhou, Yanhui Gu, Bin Li. 1-4 [doi]
- MHIVis: Visual Analytics for Exploring Mental Illness of Policyholders in Life Insurance IndustryMd. Rafiqul Islam 0004, Shaowu Liu, Imran Razzak, Muhammad Ashad Kabir, Xianzhi Wang 0001, Peter Tilocca, Guandong Xu. 1-4 [doi]
- Are They Likely to Complain on Phish or Spam? A Prediction ModelSarah Al-Hussaini, Dena Al-Thani, Yin Yang. 1-6 [doi]
- Contextualised Cyber Security Awareness Approach for Online Romance FraudSara Dickerson, Edward Apeh, Gail Ollis. 1-6 [doi]
- A Joint Model of Entity Recognition and Predicate Mapping for Chinese Knowledge Base Question AnsweringHongjing Li, Lin Li. 1-6 [doi]
- Human Capital Structure and High-Quality Development: An Empirical StudyWenwen Qin, Jun Xue, Miao Wei. 1-6 [doi]
- The Influence of National Identity on Prosocial Behavior: The Mediating and Moderating Role of Subjective Perceptions of COVID-19 PandemicLi Zhao, Di Chen, Xintao Li, Jian Guan. 1-4 [doi]
- Analyses of Character Networks in Dramatic Works by Using GraphsMehmet Can Yavuz. 1-4 [doi]
- IT Investment Governance and Corporate Governance: Perspective and ApproachAbhishek Mahalle, Jianming Yong, Xiaohui Tao. 1-6 [doi]
- How Many Orders does a Spoofer Need? - Investigation by Agent-Based Model -Takanobu Mizuta. 1-4 [doi]
- An Emerging Security Framework for Connected Autonomous VehiclesFatema Rashed Almehrezi, Chan Yeob Yeun, Paul D. Yoo, Ernesto Damiani, Yousef Y. Al Hammadi, Hyun Ku Yeun. 1-4 [doi]
- Heuristics-Based Process Mining on Extracted Philippine Public Procurement Event LogsMaria Jihan G. Sangil. 1-4 [doi]
- Effects of Temporal Factors on Human Mobility Lifestyle Through GPS InformationTran Phuong Thao, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi. 1-4 [doi]
- Sentiment Analysis of Russian IRA Troll Messages on Twitter during US Presidential Elections of 2016Ussama Yaqub, Mujtaba Ali Malik, Salma Zaman. 1-6 [doi]
- Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing AppsThomas Welsh, Kaavya Rekanar, Manzar Abbas, Muslim Chochlov, Brian Fitzgerald 0001, Liam Glynn, Kevin Johnson, John Laffey, Bairbre McNicholas, Bashar Nuseibeh, James O'Connell, Derek T. O'Keeffe, Ian R. O'Keeffe, Mike O'Callaghan, Abdul Razzaq, Ita Richardson, Andrew Simpkin, Cristiano Storni, Damyanka Tsvyatkova, Jane Walsh, Jim Buckley. 1-6 [doi]
- Depression and Anxiety Prediction Using Deep Language Models and Transfer LearningTomasz Rutowski, Elizabeth Shriberg, Amir Harati, Yang Lu, Piotr Chlebek, Ricardo Oliveira. 1-6 [doi]
- An Efficient Intrusion Detection Model Combined Bidirectional Gated Recurrent Units With Attention MechanismJingyi Wang, Naiyue Chen, Jinhui Yu, Yi Jin, Yidong Li. 1-6 [doi]
- Emotional Disorders: "If you pinch him, he will squeak". A new perspective on how machines can pass the Turing TestSaríah López-Fierro. 1-5 [doi]
- Designing Meta-choices in a Purpose Made Game to Explore Anti-social ChoicesSarah Eileen Hodge, Jacqui Taylor, John McAlaney. 1-5 [doi]
- Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign IdentityNitin Naik, Paul Jenkins. 1-6 [doi]
- A Lightweight Network for Fast Semantic SegmentationRuiqi Luo, Yuanzhouhan Cao, Yi Jin, Yidong Li. 1-6 [doi]
- An evolutionary algorithm for reducing fear of crimeCristian Pulido, Ana Maria Reyes, Jorge Rudas, Jorge Victorino, Darwin Martínez, Luz Ángela Narváez, Francisco Gómez 0002. 1-6 [doi]
- WhatFits- Deep Learning for Clothing CollocationShengqiong Yuan, Luo Zhong, Lin Li. 1-4 [doi]
- Cooperative Norms and the Growth of Threat: Differences Across Tight and Loose CulturesXinyue Pan, Dana S. Nau, Michele Gelfand. 1-6 [doi]
- Contact Tracing Apps for COVID-19: Access Permission and User AdoptionAmal Awadalla Ali, Asma Hamid ElFadl, Maha Fawzy Abujazar, Sarah Aziz, Alaa A. Abd-alrazaq, Zubair Shah, Samir Brahim Belhaouari, Mowafa Said Househ, Tanvir Alam. 1-7 [doi]