Knowledge Science, Engineering and Management : 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III (Lecture Notes in Computer Science) (2024)

個数:

Knowledge Science, Engineering and Management : 17th International Conference, KSEM 2024, Birmingham, UK, August 16-18, 2024, Proceedings, Part III (Lecture Notes in Computer Science) (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 411 p.
  • 言語 ENG
  • 商品コード 9789819754977

Full Description

The five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16-18, 2024.

The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections:

Volume I: Knowledge Science with Learning and AI (KSLA)

Volume II: Knowledge Engineering Research and Applications (KERA)

Volume III: Knowledge Management with Optimization and Security (KMOS)

Volume IV: Emerging Technology

Volume V: Special Tracks

Contents

.- Knowledge Management with Optimization and Security (KMOS).

.- Knowledge Enhanced Zero-Shot Visual Relationship Detection.

.- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments.

.- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment.

.- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.

.- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education.

.- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation.

.- Optimize rule mining based on constraint learning in knowledge graph.

.- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting.

.- An improved YOLOv7 based prohibited item detection model in X-ray images.

.- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning.

.- Meta learning based Rumor Detection by Awareness of Social Bot.

.- Financial FAQ Question-Answering System Based on Question Semantic Similarity.

.- An illegal website family discovery method based on association graph clustering.

.- Different Attack and Defense Types for AI Cybersecurity.

.-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel.

.- A Belief Evolution Model with Non-Axiomatic Logic.

.- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models.

.- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks.

.- KEEN: Knowledge Graph-enabled Governance System for Biological Assets.

.- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat.

.- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack.

.- Logits Poisoning Attack in Federated Distillation.

.- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information.

.- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection.

.- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism.

.- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning.

.- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility.

.- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network.

.- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition.

.- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models.

.- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition.

.- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps.

最近チェックした商品