Abstract is missing.
- Low-Rank and Sparse Matrix Completion for RecommendationZhi-Lin Zhao, Ling Huang, Chang-Dong Wang, Jian-Huang Lai, Philip S. Yu. 3-13 [doi]
- Pre-trained Extreme Learning MachineYongshan Zhang, Jia Wu, Zhihua Cai, Siwei Jiang. 14-23 [doi]
- K-Hop Community Search Based on Local Distance DynamicsLijun Cai, Tao Meng, Tingqin He, Lei Chen, Ziyun Deng. 24-34 [doi]
- An Improved Feedback Wavelet Neural Network for Short-Term Passenger Entrance Flow Prediction in Shanghai Subway SystemBo Zhang, Shuqiu Li, Liping Huang, Yongjian Yang. 35-45 [doi]
- Social and Content Based Collaborative Filtering for Point-of-Interest RecommendationsYi-Ning Xu, Lei Xu, Ling Huang, Chang-Dong Wang. 46-56 [doi]
- Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural NetworksSpyros Boukoros, Anupiya Nugaliyadde, Angelos Marnerides, Costas Vassilakis, Polychronis Koutsakis, Kok Wai Wong. 57-66 [doi]
- Multiclass Imbalanced Classification Using Fuzzy C-Mean and SMOTE with Fuzzy Support Vector MachineRatchakoon Pruengkarn, Kok Wai Wong, Chun Che Fung. 67-75 [doi]
- Incremental Matrix Reordering for Similarity-Based Dynamic Data SetsParisa Rastin, Basarab Matei. 76-84 [doi]
- Power Consumption Prediction for Dynamic Adjustment in Hydrocracking Process Based on State Transition Algorithm and Support Vector MachineXiao-Fang Chen, Ying-Can Qian, Ya-Lin Wang. 85-94 [doi]
- Learning with Partially Shared Features for Multi-Task LearningCheng Liu, Wen-Ming Cao, Chutao Zheng, Hau-San Wong. 95-104 [doi]
- Power Users Behavior Analysis and Application Based on Large DataXiaoya Ren, Guotao Hui, Yanhong Luo, Yingchun Wang, Dongsheng Yang, Ge Qi. 105-114 [doi]
- Accelerated Matrix Factorisation Method for Fuzzy ClusteringMingjun Zhan, Bo Li. 115-123 [doi]
- Mining Mobile Phone Base Station Data Based on Clustering Algorithms with Application to Public Traffic Route DesignWhen Shen, Zhihua Wei, Zhiyuan Zhou. 124-133 [doi]
- Extracting Deep Semantic Information for Intelligent RecommendationWang Chen, Hai-Tao Zheng, Xiao-Xi Mao. 134-144 [doi]
- A Hybrid Method of Sine Cosine Algorithm and Differential Evolution for Feature SelectionMohamed E. Abd Elaziz, Ahmed A. Ewees, Diego Oliva, Pengfei Duan, Shengwu Xiong. 145-155 [doi]
- Feature Selection Based on Improved Runner-Root Algorithm Using Chaotic Singer Map and Opposition-Based LearningRehab Ali Ibrahim, Diego Oliva, Ahmed A. Ewees, Songfeng Lu. 156-166 [doi]
- LWMC: A Locally Weighted Meta-Clustering Algorithm for Ensemble ClusteringDong Huang, Chang-Dong Wang, Jian-Huang Lai. 167-176 [doi]
- PUD: Social Spammer Detection Based on PU LearningYuqi Song, Min Gao, Junliang Yu, Wentao Li, Junhao Wen, Qingyu Xiong. 177-185 [doi]
- Discovery of Interconnection Among Knowledge Areas of Standard Computer Science Curricula by a Data Science ApproachYoshitatsu Matsuda, Takayuki Sekiya, Kazunori Yamaguchi. 186-195 [doi]
- A Probabilistic Model for the Cold-Start Problem in Rating Prediction Using Click DataThaiBinh Nguyen, Atsuhiro Takasu. 196-205 [doi]
- Dynamic Forest Model for Sentiment ClassificationMingming Li, Jiao Dai, Wei Liu, Jizhong Han. 206-215 [doi]
- A Multi-attention-Based Bidirectional Long Short-Term Memory Network for Relation ExtractionLingfeng Li, Yuanping Nie, Weihong Han, Jiuming Huang. 216-227 [doi]
- Question Recommendation in Medical Community-Based Question AnsweringHong Cai, Cuiting Yan, Airu Yin, Xuesong Zhao. 228-236 [doi]
- A Visual Analysis of Changes to Weighted Self-Organizing Map PatternsYounjin Chung, Joachim Gudmundsson, Masahiro Takatsuka. 237-246 [doi]
- Periodic Associated Sensor Patterns Mining from Wireless Sensor NetworksMd. Mamunur Rashid, Joarder Kamruzzaman, Iqbal Gondal, Md. Rafiul Hassan. 247-255 [doi]
- Online Multi-label Passive Aggressive Active Learning Algorithm Based on Binary RelevanceXizhi Guo, Yongwei Zhang, Jianhua Xu. 256-266 [doi]
- Predicting Taxi Passenger Demands Based on the Temporal and Spatial InformationSang Ho Kang, Han Bin Bae, Rhee Man Kil, Hee Yong Youn. 267-274 [doi]
- Combining the Global and Local Estimation Models for Predicting PM _10 10 ConcentrationsHan Bin Bae, Tae-Hyun Kim, Rhee Man Kil, Hee Yong Youn. 275-284 [doi]
- Anomaly Detection for Categorical Observations Using Latent Gaussian ProcessFengmao Lv, Guowu Yang, Jinzhao Wu, Chuan Liu, Yuhong Yang. 285-296 [doi]
- Make Users and Preferred Items Closer: Recommendation via Distance Metric LearningJunliang Yu, Min Gao, Wenge Rong, Yuqi Song, Qianqi Fang, Qingyu Xiong. 297-305 [doi]
- Deep Bi-directional Long Short-Term Memory Model for Short-Term Traffic Flow PredictionJingyuan Wang, Fei Hu, Li Li. 306-316 [doi]
- Odor Change of Citrus Juice During Storage Based on Electronic Nose TechnologyXue Jiang, Pengfei Jia, Siqi Qiao, Shukai Duan. 317-326 [doi]
- A Tag-Based Integrated Diffusion Model for Personalized Location RecommendationYaolin Zheng, Yulong Wang, Lei Zhang, Jingyu Wang, Qi Qi. 327-337 [doi]
- Relationship Measurement Using Multiple Factors Extracted from Merged Meeting EventsZeng Chen, Keren Wang, Zheng Yang. 338-347 [doi]
- Reinforcement Label Propagation Algorithm Based on History RecordKai Liu, Yi Zhang, Kai Lu, Xiaoping Wang, Xin Wang. 348-356 [doi]
- A Hybrid Approach for Recovering Information Propagational DirectionXiang-Rui Peng, Ling Huang, Chang-Dong Wang. 357-367 [doi]
- Geo-Pairwise Ranking Matrix Factorization Model for Point-of-Interest RecommendationShenglin Zhao, Irwin King, Michael R. Lyu. 368-377 [doi]
- A Method to Improve Accuracy of Velocity Prediction Using Markov ModelYa-dan Liu, Liang Chu, Nan Xu, Yi-fan Jia, Zhe Xu. 378-386 [doi]
- Strength Analysis on Safety-Belt ISOFIX Anchorage for Vehicles Based on HyperWorks and Ls-DynaPeicheng Shi, Suo Wang, Ping Xiao. 387-396 [doi]
- Robust Adaptive Beamforming in Uniform Circular ArrayXin Song, Ying Guan, Jinkuan Wang, Jing Gao. 397-406 [doi]
- Evaluating Accuracy in Prudence Analysis for Cyber SecurityOmaru Maruatona, Peter Vamplew, Richard Dazeley, Paul A. Watters. 407-417 [doi]
- A Bayesian Posterior Updating Algorithm in Reinforcement LearningFangzhou Xiong, Zhiyong Liu, Xu Yang, Biao Sun, Charles Chiu, Hong Qiao. 418-426 [doi]
- Detecting Black IP Using for Classification and Analysis Through Source IP of Daily Darknet TrafficJinhak Park, JangWon Choi, Jungsuk Song. 427-433 [doi]
- A Linear Online Guided Policy Search AlgorithmBiao Sun, Fangzhou Xiong, Zhiyong Liu, Xu Yang, Hong Qiao. 434-441 [doi]
- Detection of Botnet Activities Through the Lens of a Large-Scale DarknetTao Ban, Lei Zhu, Jumpei Shimamura, Shaoning Pang, Daisuke Inoue, Koji Nakao. 442-451 [doi]
- An Altered Kernel Transformation for Time Series ClassificationYangtao Xue, Li Zhang, Zhiwei Tao, Bangjun Wang, Fanzhang Li. 455-465 [doi]
- An Interweaved Time Series Locally Connected Recurrent Neural Network Model on Crime ForecastingKe Wang, Peidong Zhu, Haoyang Zhu, Pengshuai Cui, Zhenyu Zhang. 466-474 [doi]
- Decouple Adversarial Capacities with Dual-Reservoir NetworkQianli Ma, Lifeng Shen, Wanqing Zhuang, Jieyu Chen. 475-483 [doi]
- Tree Factored Conditional Restricted Boltzmann Machines for Mixed Motion StyleChunZhi Xie, Jiancheng Lv, Bijue Jia, Lei Xia. 484-492 [doi]
- A Piecewise Hybrid of ARIMA and SVMs for Short-Term Traffic Flow PredictionYong Wang, Li Li, Xiaofei Xu. 493-502 [doi]
- TMRCP: A Trend-Matching Resources Coupled Prediction Method over Data StreamRunfan Wu, Yijie Wang, Xingkong Ma, Li Cheng. 503-513 [doi]
- App Uninstalls Prediction: A Machine Learning and Time Series Mining ApproachJiaxing Shang, Jinghao Wang, Ge Liu, Hongchun Wu, Shangbo Zhou, Yong Feng. 514-522 [doi]
- Time Series Forecasting Using GRU Neural Network with Multi-lag After DecompositionXu Zhang, Furao Shen, Jinxi Zhao, Guohai Yang. 523-532 [doi]
- Position-Based Content Attention for Time Series Forecasting with Sequence-to-Sequence RNNsYagmur Gizem Cinar, Hamid Mirisaee, Parantapa Goswami, Éric Gaussier, Ali AĂ¯t-Bachir, Vadim Strijov. 533-544 [doi]
- Deep Sequence-to-Sequence Neural Networks for Ionospheric Activity Map PredictionNoëlie Cherrier, Thibaut Castaings, Alexandre Boulch. 545-555 [doi]
- Spatio-Temporal Wind Power Prediction Using Recurrent Neural NetworksWei Lee Woon, Stefan Oehmcke, Oliver Kramer. 556-563 [doi]
- Bayesian Neural Learning via Langevin Dynamics for Chaotic Time Series PredictionRohitash Chandra, Lamiae Azizi, Sally Cripps. 564-573 [doi]
- Causality Analysis Between Soil of Different Depth Moisture and Precipitation in the United StatesHui Su, Sanqing Hu, Tong Cao, Jianhai Zhang, Yuying Zhu, Bocheng Wang, Lan Jiang. 574-580 [doi]
- Fix-Budget and Recurrent Data Mining for Online Haptic PerceptionLe-le Cao, Fuchun Sun, Xiaolong Liu, Wen-bing Huang, Weihao Cheng, Ramamohanarao Kotagiri. 581-591 [doi]
- Arterial Coordination for Dedicated Bus Priority Based on a Spectral Clustering AlgorithmShuhui Zheng, Xiaoming Liu, Chunlin Shang, Guorong Zheng, Guifang Zheng. 592-599 [doi]
- Multi-resolution Selective Ensemble Extreme Learning Machine for Electricity Consumption PredictionHui Song, A. K. Qin, Flora Dilys Salim. 600-609 [doi]
- Dow Jones Index is Driven Periodically by the Unemployment Rate During Economic Crisis and Non-economic Crisis PeriodsTong Cao, Sanqing Hu, Yuying Zhu, Jianhai Zhang, Hui Su, Bocheng Wang. 610-617 [doi]
- Dynamic Cyclone Wind-Intensity Prediction Using Co-Evolutionary Multi-task LearningRohitash Chandra. 618-627 [doi]
- Layer-Prioritized Influence Maximization in Social NetworksQianwen Zhang, Yuzhu Wu, Jinkui Xie. 631-638 [doi]
- Design of Traffic Signal Controller Based on NetworkXiaoming Liu, Yulin Tian, Chunlin Shang, Peizhou Yan, Lu Wei. 639-646 [doi]
- Motif Iteration Model for Network RepresentationLintao Lv, Zengchang Qin, Tao Wan. 647-656 [doi]
- Inferring Social Network User's Interest Based on Convolutional Neural NetworkYanan Cao, Shi Wang, Xiaoxue Li, Cong Cao, Yanbing Liu, Jianlong Tan. 657-666 [doi]
- Enhanced Deep Learning Models for Sentiment Analysis in Arab Social MediaMariem Abbes, Zied Kechaou, Adel M. Alimi. 667-676 [doi]
- Collective Actions in Three Types of Continuous Public Goods Games in Spatial NetworksZimin Xu, Qiaoyu Li, Jianlei Zhang. 677-688 [doi]
- Analysing the Evolution of Contrary Opinions on a Controversial Network EventQu Liu, Yuanzhuo Wang, Chuang Lin, Guoliang Xing. 689-698 [doi]
- Category Prediction of Questions Posted in Community-Based Question Answering Services Using Deep Learning MethodsQing Ma, Reo Kato, Masaki Murata. 699-709 [doi]
- LCE: A Location Category Embedding Model for Predicting the Category Labels of POIsYue Wang, Meng Chen, Xiaohui Yu, Yang Liu. 710-720 [doi]
- Knowledge Graph Based Question Routing for Community Question AnsweringZhu Liu, Kan Li, Dacheng Qu. 721-730 [doi]
- Exploiting Non-visible Relationship in Link Prediction Based on Asymmetric Local Random WalkChunlong Fan, Dong Li, Yiping Teng, Dongwan Fan, Guohui Ding. 731-740 [doi]
- Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud PretreatmentChangqing Gong, Yun Xiao, Mengfei Li, Shou-Fei Han, Na Lin, Zhenzhou Guo. 741-751 [doi]
- A Linear Time Algorithm for Influence Maximization in Large-Scale Social NetworksHongchun Wu, Jiaxing Shang, Shangbo Zhou, Yong Feng. 752-761 [doi]
- Thyroid Nodule Classification Using Hierarchical Recurrent Neural Network with Multiple Ultrasound ReportsDehua Chen, Cheng Shi, Mei Wang, Qiao Pan. 765-773 [doi]
- Prediction of Stroke Using Deep Learning ModelPattanapong Chantamit-o-pas, Madhu Goyal. 774-781 [doi]
- A Method of Integrating Spatial Proteomics and Protein-Protein Interaction Network DataSteven Squires, Rob Ewing, Adam PrĂ¼gel-Bennett, Mahesan Niranjan. 782-790 [doi]
- Tuning Hyperparameters for Gene Interaction Models in Genome-Wide Association StudiesSuneetha Uppu, Aneesh Krishna. 791-801 [doi]
- Computational Efficacy of GPGPU-Accelerated Simulation for Various Neuron ModelsShun Okuno, Kazuhisa Fujita, Yoshiki Kashimori. 802-809 [doi]
- A Haptics Feedback Based-LSTM Predictive Model for Pericardiocentesis Therapy Using Public Introperative DataAmin Khatami, Yonghang Tai, Abbas Khosravi, Lei Wei, Mohsen Moradi Dalvand, Jun Peng, Saeid Nahavandi. 810-818 [doi]
- Sleep Apnea Event Detection from Nasal Airflow Using Convolutional Neural NetworksRim Haidar, Irena Koprinska, Bryn Jeffries. 819-827 [doi]
- A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNNMing Zhang, Boyi Xu, Shuai Bai, Shuaibing Lu, Zhechao Lin. 828-836 [doi]
- An Integrated Chaotic System with Application to Image EncryptionJinwen He, Rushi Lan, Shouhua Wang, Xiaonan Luo. 837-847 [doi]
- Fast, Automatic and Scalable Learning to Detect Android MalwareMahmood Yousefi Azar, Len Hamey, Vijay Varadharajan, Mark D. McDonnell. 848-857 [doi]
- Intrusion Detection Using Convolutional Neural Networks for Representation LearningZhipeng Li, Zheng Qin, Kai Huang, Xiao Yang, Shuxiong Ye. 858-866 [doi]
- Detect Malicious Attacks from Entire TCP Communication ProcessPeng Fang, Liusheng Huang, Xinyuan Zhang, Hongli Xu, Shaowei Wang. 867-877 [doi]
- Exploiting Cantor Expansion for Covert Channels over LTE-AdvancedZhiqiang He, Liusheng Huang, Wei Yang, Zukui Wang. 878-887 [doi]
- AI Web-Contents Analyzer for Monitoring Underground MarketplaceYuki Kawaguchi, Akira Yamada, Seiichi Ozawa. 888-896 [doi]
- Towards an Affective Computational Model for Machine ConsciousnessRohitash Chandra. 897-907 [doi]
- Measuring Self-monitoring Using Facebook Online Data Based on Snyder's Psychological TheoriesYing Liu, Yongfeng Huang, Xuanmei Qin. 908-918 [doi]
- Coevolution of Cooperation and Complex Networks via Indirect ReciprocityAizhi Liu, Lei Wang, Yanling Zhang, Changyin Sun. 919-926 [doi]