- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This two-volume set LNCS 16367 -16368 constitutes the proceedings of the 26th International Conference on Web Information Systems Engineering, WISE 2025, held in Marrakech, Morocco, in December 15-17, 2025.
The 54 full papers and 22 short papers were presented in these proceedings were carefully reviewed and selected from 140 submissions. The papers have been organized in the following topical sections as follows: AI and Machine Learning; Recommender Systems I; Web Applications and Services; Security and Privacy; Large Language Models I; Deep Learning and Networks; Knowledge Graphs I; Security and Networking; Security and Trust; Sentiment Analysis and Classification.
Contents
.- AI and Machine Learning.
.- Towards Cost-Effective Model Update in Online Feature-Incremental Learning.
.- Ilargi: a GPU Compatible Factorized ML Model Training Framework.
.- Multi-Armed Bandit-Based Client Selection for Efficient Federated Learning.
.- Hybrid Adaptive Resonance Theory Model for Online Noisy Data Classification.
.- Recommender Systems I.
.- Intra-Domain Preference Modeling with Cross-Domain Dependency Alignment for Cross-Domain Sequential Recommendation.
.- CLARE : A Category-Aware RAG-Based Framework for Recommending Learning Objects in Education and Professional Training.
.- Recommending the Right Recommender System Software: A Practical Guide.
.- Causal Insights for Debiasing Recommender Systems: Future Directions and Challenges.
.- Web Applications and Services.
.- Collaborative Multi-Agent Anomaly Detection in Web Services using Machine Learning and Semantic Reasoning.
.- A Web-based Fauna Taxonomic Rank Identification Application.
.- Evidence Retrieval for Chinese Tabular Data in the Web Based on Dense Passage Retriever.
.- A Multi-Layered Approach for Proactive Counterfeit Detection and Autonomous Decision-Making in Pharmaceutical Supply Chains.
.- Security and Privacy.
.- Verifying security requirements of fog services communication with Event-B.
.- Convergence and Variability Assessment and Analysis of QGANs and GANs for Advanced Cybersecurity Applications: An Empirical Study.
.- MOMA-DPK: A Multi-Objective Memetic Algorithm for Privacy-Utility Trade-Offs in Differentially Private K-means Clustering.
.- FP-BSS: Full Privacy Blockchain-Based Self-Tallying Score Voting Protocol.
.- Large Language Models I.
.- FORA: An Efficient One-for-All Cross-Task Reasoning Framework for Financial Domain via LLMs.
.- A Comparative Study of ASRs, LLMs, and Few-Shot Learning for Emotion Recognition in Tunisian Dialect.
.- CMANet:Sarcasm Detection with LLMs and Cross-Modal Adaptive Attention Networks.
.- Small Scale, Strategic Advantage: Enhancing LLMs with Domain Knowledge Graph for StarCraft II.
.- Deep Learning and Networks.
.- Interpretable Tree-Structured Deep Learning Model for Extracting Cognitive Pathways from Social Media.
.- Adaptive Online Index Selection with a Noisy Dueling Deep Q-Network.
.- An Advanced-PER based Deep Reinforcement Learning Method for Adversarial Maritime Mission Planning.
.- Deep Cross Networks for Intelligent Prostate Cancer Risk Prediction.
.- Knowledge Graphs I.
.- Graph Reachability Queries: Empirical Evaluation and Practical Guidelines.
.- Context-Aware Hybrid Neuro-Symbolic Approach for Knowledge Graph Enrichment.
.- stvd-kg: A Knowledge Graph for French Electronical Program Guides.
.- DO-RAG: A Domain-Specific QA Framework Using Knowledge Graph-Enhanced Retrieval-Augmented Generation.
.- Security and Networking.
.- PhishSSL: Self-Supervised Contrastive Learning for Phishing Website Detection.
.- TITID: A Transformer-Based IoT Traffic Intrusion Detection Model for MQTT Networks.
.- Explainable CAN Intrusion Detection via Feature Extraction.
.- Extending Hyperbolic Temporal Graph Neural Network to Anomaly Detection for secure Cyber-spaces.
.- Security and Trust.
.- Building Trust on User Attributes for Identity Assurance Frameworks.
.- GCN-InjectionDetect: Injection attack detection method based on Graph Convolutional Networks.
.- Improving Trust in AI-Driven Diabetes Prediction: Explainability Through SHAP and Counterfactual Analysis.
.- SLF-DF: a Framework for Fraud Detection in Airdrop Business Processes.
.- Sentiment Analysis and Classification.
.- EmoCIE: Emotion-Cause Identification with Intensity Estimation.
.- Knowledge Injection in a Neural Model for Aspect-Based Sentiment Classification.
.- Model Knowledge Injection for Aspect-Based Sentiment Classification.
.- Happiness Maximization Queries with Two-sided Fairness.



