Abstract is missing.
- A Decision Tree Approach to Predicting Recidivism in Domestic ViolenceSenuri Wijenayake, Timothy Graham, Peter Christen. 3-15 [doi]
- Unsupervised Domain Adaptation Dictionary Learning for Visual RecognitionZhun Zhong, Zongmin Li, Runlin Li, Xiaoxia Sun. 16-26 [doi]
- On the Large-Scale Transferability of Convolutional Neural NetworksLiang Zheng 0001, Yali Zhao, Shengjin Wang, Jingdong Wang, Yi Yang, Qi Tian 0001. 27-39 [doi]
- Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor DetectionTong Chen, Xue Li, Hongzhi Yin, Jun Zhang. 40-52 [doi]
- Impact of Indirect Contacts in Emerging Infectious Disease on Social NetworksMd Shahzamal, Raja Jurdak, Bernard Mans, Ahmad El Shoghri, Frank de Hoog. 53-65 [doi]
- Interesting Recommendations Based on Hierarchical Visualizations of Medical DataIbrahim A. Ibrahim, Abdulqader M. Almars, Suresh Pokharel, Xin Zhao, Xue Li. 66-79 [doi]
- Efficient Top K Temporal Spatial Keyword SearchChengyuan Zhang, Lei Zhu 0005, Weiren Yu, Jun Long, Fang Huang 0004, Hongbo Zhao. 80-92 [doi]
- HOC-Tree: A Novel Index for Efficient Spatio-Temporal Range SearchJun Long, Lei Zhu 0005, Chengyuan Zhang, Shuangqiao Lin, Zhan Yang, Xinpan Yuan. 93-107 [doi]
- A Hybrid Index Model for Efficient Spatio-Temporal Search in HBaseChengyuan Zhang, Lei Zhu 0005, Jun Long, Shuangqiao Lin, Zhan Yang, Wenti Huang. 108-120 [doi]
- Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data CompositionsTong Chen, Hongxu Chen, Xue Li. 121-127 [doi]
- TwiTracker: Detecting and Extracting Events from Twitter for Entity TrackingMeng Xu, Jiajun Cheng, Lixiang Guo, Pei Li, Xin Zhang, Hui Wang. 128-134 [doi]
- Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)Omaru Maruatona, Peter Vamplew, Richard Dazeley, Paul A. Watters. 137-141 [doi]
- A Differentially Private Method for Crowdsourcing Data SubmissionLefeng Zhang, Ping Xiong, Tianqing Zhu. 142-148 [doi]
- An Anomaly Intrusion Detection System Using C5 Decision Tree ClassifierAnsam Khraisat, Iqbal Gondal, Peter Vamplew. 149-155 [doi]
- Deep Learning for Classifying Malicious Network TrafficK. Millar, A. Cheng, H. G. Chew, C. C. Lim. 156-161 [doi]
- A Server Side Solution for Detecting WebInject: A Machine Learning ApproachMd. Moniruzzaman, Adil M. Bagirov, Iqbal Gondal, Simon Brown. 162-167 [doi]
- A Novel LSTM-Based Daily Airline Demand Forecasting Method Using Vertical and Horizontal Time SeriesBoxiao Pan, Dongfeng Yuan, Weiwei Sun, Cong Liang, Dongyang Li. 168-173 [doi]
- A Transfer Metric Learning Method for Spammer DetectionHao Chen, Jun Liu, Yanzhang Lv. 174-180 [doi]
- Dynamic Whitelisting Using Locality Sensitive HashingJayson Pryde, Nestle Angeles, Sheryl Kareen Carinan. 181-185 [doi]
- Payload-Based Statistical Intrusion Detection for In-Vehicle NetworksTakuya Kuwahara, Yukino Baba, Hisashi Kashima, Takeshi Kishikawa, Jun'ichi Tsurumi, Tomoyuki Haga, Yoshihiro Ujiie, Takamitsu Sasaki, Hideki Matsushima. 186-192 [doi]
- Discovering Strong Meta Association Rules Using Bees Swarm OptimizationYoucef Djenouri, Asma Belhadi, Philippe Fournier-Viger, Jerry Chun-Wei Lin. 195-206 [doi]
- ParallelPC: An R Package for Efficient Causal Exploration in Genomic DataThuc Duy Le, Taosheng Xu, Lin Liu, Hu Shu, Tao Hoang, Jiuyong Li. 207-218 [doi]
- Citation Field Learning by RNN with Limited Training DataYiqing Zhang, Yimeng Dai, Jianzhong Qi, Xinxing Xu, Rui Zhang. 219-232 [doi]
- Affine Transformation Capsule NetRunkun Lu, Jianwei Liu, Siming Lian, Xin Zuo. 233-242 [doi]
- A Novel Algorithm for Frequent Itemsets Mining in Transactional DatabasesHuan Phan, Bac Le. 243-255 [doi]
- Rare-Events Classification: An Approach Based on Genetic Algorithm and Voronoi TessellationAbdul Rauf Khan, Henrik Schiøler, Mohamed Zaki, Murat Kulahci. 256-266 [doi]
- Particle Swarm Optimization-Based Weighted-Nadaraya-Watson EstimatorJie Jiang, Yu-Lin He, Joshua Zhexue Huang. 267-279 [doi]
- A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous FeaturesSikha Bagui, Sharon K. John, John P. Baggs, Subhash C. Bagui. 283-294 [doi]
- Measuring Interpretability for Different Types of Machine Learning ModelsQing Zhou, Fenglu Liao, Chao Mou, Ping Wang. 295-308 [doi]
- In Search of Public Agenda with Text Mining: An Exploratory Study of Agenda Setting Dynamics Between the Traditional Media and WikipediaPhilip T. Y. Lee. 309-317 [doi]
- Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation MaterialsPaul A. Watters. 318-329 [doi]
- Comparison and Sensitivity Analysis of Methods for Solar PV Power PredictionMashud Rana, Ashfaqur Rahman, Liwan Liyanage, Mohammed Nazim Uddin. 333-344 [doi]
- An Improved PBIL Algorithm for Optimal Coalition Structure Generation of Smart GridsSean Hsin-Shyuan Lee, Jeremiah D. Deng, Martin K. Purvis, Maryam Purvis, Lizhi Peng. 345-356 [doi]
- Dam Inflow Time Series Regression Models Minimising Loss of Hydropower OpportunitiesYasuno Takato. 357-367 [doi]