Since the first appearance of the World Wide Web, people more rely on th...
Traditional education has been updated with the development of informati...
Masked image modeling (MIM) learns visual representation by masking and
...
While various knowledge distillation (KD) methods in CNN-based detectors...
We present a strong object detector with encoder-decoder pretraining and...
Deep learning methods have been widely applied to anomaly-based network
...
On-shelf utility mining (OSUM) is an emerging research direction in data...
As an important data mining technology, high utility itemset mining (HUI...
High utility itemset mining approaches discover hidden patterns from lar...
Nowadays, the environments of smart systems for Industry 4.0 and Interne...
Analyzing sequence data usually leads to the discovery of interesting
pa...
Traditional high-utility itemset mining (HUIM) aims to determine all
hig...
Because of usefulness and comprehensibility, fuzzy data mining has been
...
Session-based recommendation plays a central role in a wide spectrum of
...
Monte Carlo (MC) methods are important computational tools for molecular...
Network traffic classification that is widely applicable and highly accu...
Episode discovery from an event is a popular framework for data mining t...
Utility-driven itemset mining is widely applied in many real-world scena...
Owing to some special characteristics and features, blockchain is a very...
Mining is the important part of the blockchain used the proof of work (P...
We consider cache-aided broadcast networks with user cooperation, where ...
In this paper, we construct a universal model to study the search and re...
For nowadays severe refugee issue, we primarily set up an evaluation pat...
In the era of information explosion, facing complex information, it is
d...
In this paper, we consider the coded-caching broadcast network with user...
In this paper, we consider a two-layer caching-aided network, where a si...