Abstract is missing.
- Adversarial Autoencoder and Multi-Task Semi-Supervised Learning for Multi-stage ProcessAndre Mendes, Julian Togelius, Leandro dos Santos Coelho. 3-16 [doi]
- PEARL: Probabilistic Exact Adaptive Random Forest with Lossy Counting for Data StreamsOcean Wu, Yun Sing Koh, Gillian Dobbie, Thomas Lacombe. 17-30 [doi]
- Mining Dynamic Graph Streams for Predictive Queries Under Resource ConstraintsXuanming Liu, Tingjian Ge. 31-43 [doi]
- Tree-Miner: Mining Sequential Patterns from SP-TreeRedwan Ahmed Rizvee, Mohammad Fahim Arefin, Chowdhury Farhan Ahmed. 44-56 [doi]
- MemMAP: Compact and Generalizable Meta-LSTM Models for Memory Access PredictionAjitesh Srivastava, Ta-Yang Wang, Pengmiao Zhang, César Augusto Fonticielha De Rose, Rajgopal Kannan, Viktor K. Prasanna. 57-68 [doi]
- A Proximity Weighted Evidential k Nearest Neighbor Classifier for Imbalanced DataMd. Eusha Kadir, Pritom Saha Akash, Sadia Sharmin, Amin Ahsan Ali, Mohammad Shoyaib. 71-83 [doi]
- On the Performance of Oversampling Techniques for Class Imbalance ProblemsJiawen Kong, Thiago Rios, Wojtek Kowalczyk, Stefan Menzel, Thomas Bäck. 84-96 [doi]
- Mining Locally Trending High Utility ItemsetsPhilippe Fournier-Viger, Yanjun Yang, Jerry Chun-Wei Lin, Jaroslav Frnda. 99-111 [doi]
- Optimal Subgroup Discovery in Purely Numerical DataAlexandre Millot, Rémy Cazabet, Jean-François Boulicaut. 112-124 [doi]
- Data-Free Adversarial Perturbations for Practical Black-Box AttackZhaoxin Huan, Yulong Wang, Xiaolu Zhang, Lin Shang, Chilin Fu, Jun Zhou. 127-138 [doi]
- Secure and Accurate Two-Step Hash Encoding for Privacy-Preserving Record LinkageThilina Ranbaduge, Peter Christen, Rainer Schnell. 139-151 [doi]
- Assessing Centrality Without Knowing ConnectionsLeyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague. 152-163 [doi]
- Deep Cost-Sensitive Kernel Machine for Binary Software Vulnerability DetectionTuan Nguyen, Trung Le, Khanh Nguyen, Olivier Y. de Vel, Paul Montague, John C. Grundy, Dinh Phung. 164-177 [doi]
- TCN-ATT: A Non-recurrent Model for Sequence-Based Malware DetectionJunyao Huang, Chenhui Lu, Guolou Ping, Lin Sun, Xiaojun Ye. 178-190 [doi]
- dK-Microaggregation: Anonymizing Graphs with Differential Privacy GuaranteesMasooma Iftikhar, Qing Wang, Yu Lin. 191-203 [doi]
- MIRD-Net for Medical Image SegmentationYongfeng Huang, Xueyang Li, Cairong Yan, Lihao Liu, Hao Dai. 207-219 [doi]
- JPLink: On Linking Jobs to Vocational Interest TypesAmila Silva, Pei-Chi Lo, Ee-Peng Lim. 220-232 [doi]
- Exploiting the Matching Information in the Support Set for Few Shot Event ClassificationViet Dac Lai, Franck Dernoncourt, Thien Huu Nguyen. 233-245 [doi]
- Chinese Sentence Semantic Matching Based on Multi-Granularity Fusion ModelXu Zhang, Wenpeng Lu, Guoqiang Zhang, Fangfang Li, Shoujin Wang. 246-257 [doi]
- Reliable Aggregation Method for Vector Regression Tasks in CrowdsourcingJoonyoung Kim, Donghyeon Lee, Kyomin Jung. 261-273 [doi]
- Balancing Exploration and Exploitation in Self-imitation LearningChun-Yao Kang, Ming-Syan Chen. 274-285 [doi]
- Mask-Guided Region Attention Network for Person Re-IdentificationCong Zhou, Han Yu. 286-298 [doi]
- Multi-view Deep Gaussian Process with a Pre-training Acceleration TechniqueHan Zhu, Jing Zhao, Shiliang Sun. 299-311 [doi]
- Semantics-Reconstructing Hashing for Cross-Modal RetrievalPeng-fei Zhang, Zi Huang, Zheng Zhang. 315-327 [doi]
- Connecting the Dots: Hypotheses Generation by Leveraging Semantic ShiftsMenasha Thilakaratne, Katrina Falkner, Thushari Atapattu. 328-340 [doi]
- Efficient Database Search via Tensor Distribution BucketingMihir Mongia, Benjamin Soudry, Arash Gholami Davoodi, Hosein Mohimani. 341-353 [doi]
- SAFE: Similarity-Aware Multi-modal Fake News DetectionXinyi Zhou, Jindi Wu, Reza Zafarani. 354-367 [doi]
- Simultaneous ECG Heartbeat Segmentation and Classification with Feature Fusion and Long Term Context DependenciesXi Qiu, Shen Liang, Yanchun Zhang. 371-383 [doi]
- PhosTransfer: A Deep Transfer Learning Framework for Kinase-Specific Phosphorylation Site Prediction in HierarchyYing Xu, Campbell Wilson, André Leier, Tatiana T. Marquez-Lago, James C. Whisstock, Jiangning Song. 384-395 [doi]
- Multi-information Source HIN for Medical Concept EmbeddingYuwei Cao, Hao Peng, Philip S. Yu. 396-408 [doi]
- Semi-supervised Learning Approach to Generate Neuroimaging Modalities with Adversarial TrainingHarrison Nguyen, Simon Luo, Fabio Ramos. 409-421 [doi]
- An Advanced Two-Step DNN-Based Framework for Arrhythmia DetectionJinyuan He, Jia Rong, Le Sun, Hua Wang, Yanchun Zhang. 422-434 [doi]
- GAIM: Game Action Information Mining Framework for Multiplayer Online Card Games (Rummy as Case Study)Sharanya Eswaran, Vikram Vimal, Deepanshi Seth, Tridib Mukherjee. 435-448 [doi]
- Hydrological Process Surrogate Modelling and Simulation with Neural NetworksRuixi Zhang, Remmy A. M. Zen, Jifang Xing, Dewa Made Sri Arsa, Abhishek Saha, Stéphane Bressan. 449-461 [doi]
- Protecting IP of Deep Neural Networks with Watermarking: A New Label HelpsQi Zhong, Leo Yu Zhang, Jun Zhang 0010, Longxiang Gao, Yong Xiang 0001. 462-474 [doi]
- Improving Multi-turn Response Selection Models with Complementary Last-Utterance Selection by Instance WeightingKun Zhou, Wayne Xin Zhao, Yutao Zhu, Ji-Rong Wen, Jingsong Yu. 475-486 [doi]
- Long-Term Water Pipe Condition Assessment: A Semiparametric Model Using Gaussian Process and Survival AnalysisDilusha Weeraddana, Harini Hapuarachchi, Lakshitha Kumarapperuma, Nguyen Lu Dang Khoa, Chen Cai. 487-499 [doi]
- Canonicalizing Knowledge Bases for Recruitment DomainNausheen Fatma, Vijay Choudhary, Niharika Sachdeva, Nitendra Rajput. 500-513 [doi]
- Revisit Prediction by Deep Survival AnalysisSundong Kim, Hwanjun Song, Sejin Kim, Beomyoung Kim, Jae-Gil Lee 0001. 514-526 [doi]
- Node Conductance: A Scalable Node Centrality Measure on Big NetworksTianshu Lyu, Fei Sun, Yan Zhang. 529-541 [doi]
- Attention-Based Aggregation Graph Networks for Knowledge Graph Information TransferMing Zhao, Weijia Jia, Yusheng Huang. 542-554 [doi]
- Role Equivalence Attention for Label Propagation in Graph Neural NetworksHogun Park, Jennifer Neville. 555-567 [doi]
- Bottom-Up and Top-Down Graph PoolingJia-qi Yang, De-Chuan Zhan, Xin-Chun Li. 568-579 [doi]
- AutoSUM: Automating Feature Extraction and Multi-user Preference Simulation for Entity SummarizationDongjun Wei, Yaxin Liu, Fuqing Zhu, Liangjun Zang, Wei Zhou, Yijun Lu, Songlin Hu. 580-592 [doi]
- Robust Attribute and Structure Preserving Graph EmbeddingBhagya Hettige, Weiqing Wang 0001, Yuan-Fang Li, Wray L. Buntine. 593-606 [doi]
- Negative Sampling for Hyperlink Prediction in NetworksPrasanna Patil, Govind Sharma 0001, M. Narasimha Murty. 607-619 [doi]
- Modeling Citation Trajectories of Scientific PapersDattatreya Mohapatra, Siddharth Pal, Soham De, Ponnurangam Kumaraguru, Tanmoy Chakraborty 0002. 620-632 [doi]
- Drug-Disease Graph: Predicting Adverse Drug Reaction Signals via Graph Neural Network with Clinical DataHeeyoung Kwak, Minwoo Lee, Seunghyun Yoon 0002, Jooyoung Chang, Sang-Min Park, Kyomin Jung. 633-644 [doi]
- Anomaly Detection via Neighbourhood ContrastBo Chen, Kai Ming Ting, Tat-Jun Chin. 647-659 [doi]
- LoPAD: A Local Prediction Approach to Anomaly DetectionSha Lu, Lin Liu, Jiuyong Li, Thuc Duy Le, Jixue Liu. 660-673 [doi]
- L0-norm Constrained Autoencoders for Unsupervised Outlier DetectionYoshinao Ishii, Satoshi Koide, Keiichiro Hayakawa. 674-687 [doi]
- Correlation-Aware Deep Generative Model for Unsupervised Anomaly DetectionHaoyi Fan, Fengbin Zhang, Ruidong Wang, Liang Xi, Zuoyong Li. 688-700 [doi]
- Using Bandits for Effective Database Activity MonitoringHagit Grushka-Cohen, Ofer Biller, Oded Sofer, Lior Rokach, Bracha Shapira. 701-713 [doi]
- Identifying Near-Miss Traffic Incidents in Event Recorder DataShuhei Yamamoto, Takeshi Kurashima, Hiroyuki Toda. 717-728 [doi]
- A Relation Learning Hierarchical Framework for Multi-label Charge PredictionWei Duan, Lin Li, Yi Yu. 729-741 [doi]
- ITGH: Information-Theoretic Granger Causal Inference on Heterogeneous DataSahar Behzadi, Benjamin Schelling, Claudia Plant. 742-755 [doi]
- Learning to Select Important Context Words for Event DetectionNghia Trung Ngo, Tuan Ngo Nguyen, Thien Huu Nguyen. 756-768 [doi]
- Inferring Restricted Regular Expressions with Interleaving from Positive and Negative SamplesYeting Li, Haiming Chen, Lingqi Zhang, Bo Huang, Jianzhao Zhang. 769-781 [doi]
- Fusion-Extraction Network for Multimodal Sentiment AnalysisTao Jiang, Jiahai Wang, Zhiyue Liu, Yingbiao Ling. 785-797 [doi]
- Learning Discriminative Neural Sentiment Units for Semi-supervised Target-Level Sentiment ClassificationJingjing Zhao, Yao Yang, Guansong Pang, Lei Lv, Hong Shang, Zhongqian Sun, Wei Yang. 798-810 [doi]
- EMOVA: A Semi-supervised End-to-End Moving-Window Attentive Framework for Aspect MiningNing Li, Chi-Yin Chow, Jia-Dong Zhang. 811-823 [doi]
- Level Set Estimation with Search Space WarpingManisha Senadeera, Santu Rana, Sunil Gupta 0001, Svetha Venkatesh. 827-839 [doi]
- An Empirical Model for n-gram Frequency Distribution in Large CorporaJoaquim F. Silva, José C. Cunha. 840-851 [doi]
- Towards Understanding Transfer Learning Algorithms Using Meta Transfer FeaturesXin-Chun Li, De-Chuan Zhan, Jia-qi Yang, Yi Shi, Cheng Hang, Yi Lu. 855-866 [doi]
- Tendi: Tensor Disaggregation from Multiple Coarse ViewsFaisal M. Almutairi, Charilaos I. Kanatsoulis, Nicholas D. Sidiropoulos. 867-880 [doi]
- A Distributed Coordinate Descent Algorithm for Learning Factorization MachineKankan Zhao, Jing Zhang, Liangfu Zhang, Cuiping Li, Hong Chen. 881-893 [doi]
- Optimal Topology Search for Fast Model Averaging in Decentralized Parallel SGDMohsan Jameel, Shayan Jawed, Lars Schmidt-Thieme. 894-905 [doi]
- Data Centers Job Scheduling with Deep Reinforcement LearningSisheng Liang, Zhou Yang, Fang Jin, Yong Chen. 906-917 [doi]