Knowledge Science, Engineering and Management [electronic resource] : 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III / edited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang.

Colaborador(es): Cao, Cungeng [editor.] | Chen, Huajun [editor.] | Zhao, Liang [editor.] | Arshad, Junaid [editor.] | Asyhari, Taufiq [editor.] | Wang, Yonghao [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Artificial Intelligence ; 14886Editor: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XIV, 424 p. 108 illus., 93 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9789819754984Tema(s): Artificial intelligence | Computer engineering | Computer networks  | Computers | Information technology -- Management | Social sciences -- Data processing | Application software | Artificial Intelligence | Computer Engineering and Networks | Computing Milieux | Computer Application in Administrative Data Processing | Computer Application in Social and Behavioral Sciences | Computer and Information Systems ApplicationsFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 006.3 Clasificación LoC:Q334-342TA347.A78Recursos en línea: Libro electrónicoTexto
Contenidos:
-- Knowledge Management with Optimization and Security (KMOS). -- Knowledge Enhanced Zero-Shot Visual Relationship Detection. -- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. -- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment. -- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. -- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. -- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. -- Optimize rule mining based on constraint learning in knowledge graph. -- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. -- An improved YOLOv7 based prohibited item detection model in X-ray images. -- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. -- Meta learning based Rumor Detection by Awareness of Social Bot. -- Financial FAQ Question-Answering System Based on Question Semantic Similarity. -- An illegal website family discovery method based on association graph clustering. -- Different Attack and Defense Types for AI Cybersecurity. .-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. -- A Belief Evolution Model with Non-Axiomatic Logic. -- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models. -- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. -- KEEN: Knowledge Graph-enabled Governance System for Biological Assets. -- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat. -- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. -- Logits Poisoning Attack in Federated Distillation. -- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. -- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection. -- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism. -- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. -- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility. -- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. -- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition. -- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models. -- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition. -- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.
En: Springer Nature eBookResumen: The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16-18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

-- Knowledge Management with Optimization and Security (KMOS). -- Knowledge Enhanced Zero-Shot Visual Relationship Detection. -- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. -- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment. -- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. -- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. -- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. -- Optimize rule mining based on constraint learning in knowledge graph. -- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. -- An improved YOLOv7 based prohibited item detection model in X-ray images. -- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. -- Meta learning based Rumor Detection by Awareness of Social Bot. -- Financial FAQ Question-Answering System Based on Question Semantic Similarity. -- An illegal website family discovery method based on association graph clustering. -- Different Attack and Defense Types for AI Cybersecurity. .-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. -- A Belief Evolution Model with Non-Axiomatic Logic. -- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models. -- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. -- KEEN: Knowledge Graph-enabled Governance System for Biological Assets. -- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat. -- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. -- Logits Poisoning Attack in Federated Distillation. -- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. -- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection. -- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism. -- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. -- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility. -- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. -- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition. -- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models. -- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition. -- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.

The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16-18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks.

UABC ; Perpetuidad

Con tecnología Koha