標(biāo)題: Titlebook: Big Data and Social Computing; 7th China National C Xiaofeng Meng,Qi Xuan,Zi-Ke Zhang Conference proceedings 2022 The Editor(s) (if applica [打印本頁] 作者: Odious 時間: 2025-3-21 19:01
書目名稱Big Data and Social Computing影響因子(影響力)
書目名稱Big Data and Social Computing影響因子(影響力)學(xué)科排名
書目名稱Big Data and Social Computing網(wǎng)絡(luò)公開度
書目名稱Big Data and Social Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Big Data and Social Computing被引頻次
書目名稱Big Data and Social Computing被引頻次學(xué)科排名
書目名稱Big Data and Social Computing年度引用
書目名稱Big Data and Social Computing年度引用學(xué)科排名
書目名稱Big Data and Social Computing讀者反饋
書目名稱Big Data and Social Computing讀者反饋學(xué)科排名
作者: Antigen 時間: 2025-3-21 22:19
The Effects of Intervention Strategies for COVID-19 Transmission Control on Campus Activity is critical to understand the transmission risk of COVID-19 under various scenario, especially during public health emergency. Taking the Tsinghua university’s anniversary as a representative case, a set of prevention and control strategies are established and investigated. In the case study, an al作者: 過份艷麗 時間: 2025-3-22 03:31 作者: LURE 時間: 2025-3-22 07:32
Prediction of Female Fertility Structure and Population Change in China by Modified SIR Modelountries. In recent years, China, where family planning is implemented, has also gradually shown such a trend. The decline of fertility rate limits the further development of the society. In this paper, based on the SIR infectious disease model, we improve the SIR fertility structure model applicabl作者: Initiative 時間: 2025-3-22 11:16
Generative Adversarial Network for?Imputation of?Road Network Traffic State Dataffic data, a novel generative adversarial network for the imputation of road network traffic data is proposed in this paper, i.e., GAE-GAN-LSTM. The spatiotemporal characteristics were extracted using a improved graph auto-encoder (GAE), followed by a generative adversarial network (GAN) to generate作者: 案發(fā)地點(diǎn) 時間: 2025-3-22 16:37 作者: Water-Brash 時間: 2025-3-22 19:47 作者: Anecdote 時間: 2025-3-23 00:45
A Secured Deep Reinforcement Learning Model Based on?Vertical Federated Learning learning. In this work, a secured DRL based on vertical federated learning (VFL), named VF-DRL, is proposed to protect the model’s information. Specifically, in the proposed VF-DRL, each client trains a partial local model, and uploads the feature embedding cooperatively to a server for global mode作者: Afflict 時間: 2025-3-23 01:54 作者: Nmda-Receptor 時間: 2025-3-23 07:43 作者: Archipelago 時間: 2025-3-23 10:34
Identifying Spammers by?Completing the?Ratings of?Low-Degree Usersby these spammers do not match the quality of items, confusing the boundaries of good and bad items and seriously endangering the real interests of merchants and normal users. To eliminate the malicious influence caused by these spammers, many effective spamming detection algorithms are proposed in 作者: febrile 時間: 2025-3-23 15:18
Predicting Upvotes and?Downvotes in?Location-Based Social Networks Using Machine Learningswers or posts, most OSNs design “upvote” or “l(fā)ike” buttons, and some of them provide “downvote” or “dislike” buttons as well. While there are some existing works making predictions related to upvote, downvote prediction has never been systematically explored in OSNs before. However, downvote is jus作者: 小樣他閑聊 時間: 2025-3-23 20:28
How Does Participation Experience in Collective Behavior Contribute to Participation Willingness: A participate. Based on a survey of migrant workers from Shenzhen in China, this study constructs a mediated moderating model, focusing on the moderating role of social networks in the relationship and the mediating role of institutional support. The results show that collective behavior participatio作者: 倫理學(xué) 時間: 2025-3-23 22:42 作者: 多節(jié) 時間: 2025-3-24 03:10 作者: Friction 時間: 2025-3-24 07:33 作者: 共同生活 時間: 2025-3-24 12:45 作者: Alveolar-Bone 時間: 2025-3-24 15:07
Research on?Network Invulnerability and?Its Application on?AS-Level Internet Topologyi-attributes. Finally, we conduct vulnerability analysis experiments on five real datasets to verify the validity of our method. Specially, we apply the method to autonomous systems (AS) Internet networks for different countries, which is of great significance to developing network security.作者: pineal-gland 時間: 2025-3-24 22:31
FedDFA: Dual-Factor Aggregation for?Federated Driver Distraction Detectionis, FedDFA is introduced, which calculates the aggregation weights based on the number of images and that of drivers on each client for better parameter aggregation during federated learning. Extensive experiments are conducted and experimental results show that FedDFA achieves satisfactory performance.作者: 幼稚 時間: 2025-3-25 02:35 作者: Acetabulum 時間: 2025-3-25 05:16 作者: 亂砍 時間: 2025-3-25 10:22 作者: 鉗子 時間: 2025-3-25 15:07
DOE: Screening Using Fractional Factorialsmportant user/item interactions for message passing. Based on the MovieLens-100K, the effectiveness of IGAT-MC is verified based on the evaluation of RMSE. By comparing with several mainstream methods, IGAT-MC surpasses some of the mainstream methods and shows competitive performance.作者: 平息 時間: 2025-3-25 19:45 作者: wreathe 時間: 2025-3-25 21:00
Improve Entrepreneurial Quality,is, FedDFA is introduced, which calculates the aggregation weights based on the number of images and that of drivers on each client for better parameter aggregation during federated learning. Extensive experiments are conducted and experimental results show that FedDFA achieves satisfactory performance.作者: 一致性 時間: 2025-3-26 00:45 作者: 補(bǔ)角 時間: 2025-3-26 05:03
A Secured Deep Reinforcement Learning Model Based on?Vertical Federated Learningning in a distributed fashion. Extensive experiments are carried out to testify the robustness of VF-DRL. The results show that the VF-DRL achieves the state-of-the-art defensibility compared with base-lines.作者: Multiple 時間: 2025-3-26 11:45
Big Data and Social Computing978-981-19-7532-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: conceal 時間: 2025-3-26 15:11
https://doi.org/10.1007/978-981-19-7532-5artificial intelligence; communication systems; computer networks; computer security; computer vision; cr作者: grotto 時間: 2025-3-26 19:39 作者: deforestation 時間: 2025-3-27 00:54
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/185686.jpg作者: 先行 時間: 2025-3-27 04:22 作者: concise 時間: 2025-3-27 06:43 作者: Ataxia 時間: 2025-3-27 10:09
DOE: The Jewel of Quality Engineeringamic influencing process for urban system. To this end, this paper investigates the resilience assessment method of social resilience by using the differences analysis between capacities and demands. A gap analysis-based assessment method for social resilience is developed to quantify the resilience作者: avarice 時間: 2025-3-27 15:59 作者: 不如屎殼郎 時間: 2025-3-27 21:41
DOE: The Jewel of Quality Engineeringffic data, a novel generative adversarial network for the imputation of road network traffic data is proposed in this paper, i.e., GAE-GAN-LSTM. The spatiotemporal characteristics were extracted using a improved graph auto-encoder (GAE), followed by a generative adversarial network (GAN) to generate作者: Anonymous 時間: 2025-3-27 23:01
DOE and Regression Case Studiesitoring event alarm information in the operation and maintenance platform, to automatically recommend monitoring event processing solutions according to the event knowledge base. However, there are currently few methods to classify monitoring events. To solve this problem, our method relies on the B作者: 捏造 時間: 2025-3-28 04:00
DOE: The Jewel of Quality Engineeringraph entity alignment aims to discover the cross-lingual links in the multi-language KGs, which is of wonderful value to solve the NLP problems and integrate multi-language KGs. In the task of aligning cross-language knowledge graphs, the structures of the two graphs are very similar, and the equiva作者: Dappled 時間: 2025-3-28 06:42 作者: Fibrillation 時間: 2025-3-28 13:21 作者: 銼屑 時間: 2025-3-28 15:35 作者: Muffle 時間: 2025-3-28 19:42 作者: 監(jiān)禁 時間: 2025-3-29 02:59
Introduction to English Languageswers or posts, most OSNs design “upvote” or “l(fā)ike” buttons, and some of them provide “downvote” or “dislike” buttons as well. While there are some existing works making predictions related to upvote, downvote prediction has never been systematically explored in OSNs before. However, downvote is jus作者: 歡樂東方 時間: 2025-3-29 07:02
Introduction to English Language participate. Based on a survey of migrant workers from Shenzhen in China, this study constructs a mediated moderating model, focusing on the moderating role of social networks in the relationship and the mediating role of institutional support. The results show that collective behavior participatio作者: Axillary 時間: 2025-3-29 10:53 作者: Repatriate 時間: 2025-3-29 11:27 作者: embolus 時間: 2025-3-29 18:48 作者: vertebrate 時間: 2025-3-29 19:42 作者: EXALT 時間: 2025-3-30 03:28 作者: Decibel 時間: 2025-3-30 04:23
DOE and Regression Case Studiesructure and population prediction model in this paper can predict the female fertility structure in the short term in the future and deduce the population size accordingly, which has better prediction accuracy and the total population accuracy rate can reach 99.945%.The model can provide reference a作者: 極小 時間: 2025-3-30 09:58
DOE: The Jewel of Quality Engineeringods at any data loss ratio considered. The main innovations of the proposed method include two aspects. One, an improved GAE for the imputation of road network data was presented by redefining the loss function of GAE, which could effectively extract the potential spatiotemporal features of a road n作者: 使增至最大 時間: 2025-3-30 16:02
DOE and Regression Case Studiesfication labels of the training data. Finally, we process and analyze the new monitoring events that appear in the operation and maintenance platform, and effectively classify the new events according to the model training results. In addition, our method can periodically train the model to optimize作者: locus-ceruleus 時間: 2025-3-30 19:55
DOE: The Jewel of Quality Engineering first-order subgraphs of the KGs to expand the structural features of the original graph to enhance the representation ability of the entity embedding and improve the alignment accuracy. Experiments show that the proposed method is advanced in the task of entity alignment.作者: 收養(yǎng) 時間: 2025-3-31 00:16
https://doi.org/10.1007/1-84628-200-4 ability of the algorithm and avoids the phenomenon of local search caused by the K-means algorithm. We verify the Bayes-K-means and theoretically analyze its convergence from the aspect of the posterior distribution and the expression of the clustering center, respectively. Finally, applying the co作者: Custodian 時間: 2025-3-31 04:53
https://doi.org/10.1007/1-84628-200-4putation ranking method . is proposed. We then test our improvements compared with DR, IGR, and IOR. Experimental results on three typical data sets suggest that our method combined with IOR has improved by at least ., ., and . in dealing with malicious spammers, respectively. As for results on dete作者: 正面 時間: 2025-3-31 08:42
Introduction to English Languageiction. Secondly, by making use of structural hole theory and information theory, we propose a robust model that can be used for both downvote and upvote prediction. To the best of our knowledge, we are the first to predict number of downvotes in OSNs. Finally, we complete a thorough prediction perf