Abstract is missing.
- Knowledge Enhanced Zero-Shot Visual Relationship DetectionNan Ding, Yong Lai, Jie Liu. 3-15 [doi]
- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud EnvironmentsYunyun Qiu, Weipeng Cao, Zhijiao Xiao, Zhong Ming 0001, Changping Ji, Jiongjiong Gu, Chuqing Cao, Liang Zheng. 16-27 [doi]
- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in a JointCloud EnvironmentLanlan Chen, Xiaochuan Shi, Linjiang Zhou, Yilei Wang, Chao Ma 0008, Weiping Zhu 0004. 28-40 [doi]
- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal PerspectiveHongyu Kuang, Jingjing Zhang, Feng Yang, Long Zhang 0004, Zhijian Huang, Lin Yang. 41-56 [doi]
- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher EducationGen Li, Cheng Tang, Li Chen, Daisuke Deguchi, Takayoshi Yamashita, Atsushi Shimada. 57-68 [doi]
- DA-NAS: Learning Transferable Architecture for Unsupervised Domain AdaptationXiao Li, Gaojie Wu, Jianjian Jiang, Wei-Shi Zheng 0001. 69-81 [doi]
- Optimize Rule Mining Based on Constraint Learning in Knowledge GraphKaiyue Cai, Xinzhi Wang 0001, Xiangfeng Luo. 82-98 [doi]
- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series ForecastingPeihao Ding, Yan Tang, Xiaoming Ding, Caijie Guo. 99-108 [doi]
- An Improved YOLOv7 Based Prohibited Item Detection Model in X-Ray ImagesHaigang Zhang, Wenzhao Teng, Shan Gao, Yujun Zhang, Zhiwei Sun. 109-121 [doi]
- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised LearningXiangyun Qian, Yusheng He, Rui Zhang 0050, Zi Kang, Yilin Sheng, Hui Xia 0001. 122-134 [doi]
- Meta Learning Based Rumor Detection with Awareness of Social BotZhilong Lv, Zhen Huang 0006, Menglong Lu, Yuxin Yang, Zhiliang Tian, Xin Niu, Dongsheng Li 0001. 135-151 [doi]
- Financial FAQ Question-Answering System Based on Question Semantic SimilarityWenxing Hong, Jun Li, Shuyan Li. 152-163 [doi]
- An Illegal Website Family Discovery Method Based on Association Graph ClusteringPengfei Xue, Li Wen, Chenyang Wang, Chi Zhang, Huimin Ma, Miao Hu. 164-178 [doi]
- Different Attack and Defense Types for AI CybersecurityJing Zou, Shungeng Zhang, Meikang Qiu. 179-192 [doi]
- An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation KernelJinzhu Liu, Peng Wu. 193-205 [doi]
- A Belief Evolution Model with Non-axiomatic LogicNady Slam, Bojie Feng. 206-219 [doi]
- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection ModelsXiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu. 220-232 [doi]
- Multi-mode Spatial-Temporal Data Modeling with Fully Connected NetworksZihang Liu, Le Yu 0004, Weimiao Li, Tongyu Zhu, Leilei Sun. 233-247 [doi]
- KEEN: Knowledge Graph-Enabled Governance System for Biological AssetsZhengkang Fang, Keke Gai, Jing Yu 0007, Yihang Wei, Zhentao Wei, Weilin Chan. 248-260 [doi]
- Cop: Continuously Pairing of Heterogeneous Wearable Devices Based on HeartbeatWenfeng He, Jiawei Lin, Yongpan Zou, Weipeng Cao. 261-273 [doi]
- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial AttackShuliang Jiang, Yusheng He, Rui Zhang 0050, Zi Kang, Hui Xia 0001. 274-285 [doi]
- Logits Poisoning Attack in Federated DistillationYuhan Tang, Zhiyuan Wu, Bo Gao, Tian Wen, Yuwei Wang, Sheng Sun. 286-298 [doi]
- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing InformationPengYu Qiu, Yongchao Liu, Xintan Zeng. 299-311 [doi]
- Prompt Based CVAE Data Augmentation for Few-Shot Intention DetectionJunhao Xue, Chuantao Yin, Chen Li, Jun Bai, Hui Chen, Wenge Rong. 312-323 [doi]
- Reentrancy Vulnerability Detection Based on Improved Attention MechanismHaoran Xu, Meikang Qiu, Hui Zhao 0002. 324-335 [doi]
- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement LearningJiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu. 336-348 [doi]
- AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and UtilityLian Peng, Meikang Qiu. 349-360 [doi]
- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial NetworkLida Guo, Zimeng Li, Jingyuan Wang. 361-372 [doi]
- Adversarial Examples for Preventing Diffusion Models from Malicious Image EditionMengjie Guo, Keke Gai, Jing Yu 0007. 373-385 [doi]
- ReVFed: Representation-Based Privacy-Preserving Vertical Federated Learning with Heterogeneous ModelsShuo Wang, Jing Yu 0007, Keke Gai, Liehuang Zhu. 386-397 [doi]
- Logit Adjustment with Normalization and Augmentation in Few-Shot Named Entity RecognitionJinglei Zhang, Guochang Wen, NingLin Liao, Dongdong Du, Qing Gao, Minghui Zhang, Xixin Cao. 398-410 [doi]
- New Indicators and Optimizations for Zero-Shot NAS Based on Feature MapsTangyu Jiang, Haodi Wang, Rongfang Bie, Libin Jiao. 411-422 [doi]