Big Data Analytics for Social Computing (BDASC) |
|
|
A Decision Tree Approach to Predicting Recidivism in Domestic Violence |
|
|
3 | (13) |
|
|
|
|
Unsupervised Domain Adaptation Dictionary Learning for Visual Recognition |
|
|
16 | (11) |
|
|
|
|
|
On the Large-Scale Transferability of Convolutional Neural Networks |
|
|
27 | (13) |
|
|
|
|
|
|
|
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection |
|
|
40 | (13) |
|
|
|
|
|
Impact of Indirect Contacts in Emerging Infectious Disease on Social Networks |
|
|
53 | (13) |
|
|
|
|
|
|
Interesting Recommendations Based on Hierarchical Visualizations of Medical Data |
|
|
66 | (14) |
|
|
|
|
|
|
Efficient Top K Temporal Spatial Keyword Search |
|
|
80 | (13) |
|
|
|
|
|
|
|
HOC-Tree: A Novel Index for Efficient Spatio-Temporal Range Search |
|
|
93 | (15) |
|
|
|
|
|
|
|
A Hybrid Index Model for Efficient Spatio-Temporal Search in HBase |
|
|
108 | (13) |
|
|
|
|
|
|
|
Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions |
|
|
121 | (7) |
|
|
|
|
TwiTracker: Detecting and Extracting Events from Twitter for Entity Tracking |
|
|
128 | (9) |
|
|
|
|
|
|
Australasian Workshop on Machine Learning for Cyber-Security (ML4Cyber) |
|
|
Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA) |
|
|
137 | (5) |
|
|
|
|
|
A Differentially Private Method for Crowdsourcing Data Submission |
|
|
142 | (7) |
|
|
|
|
An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier |
|
|
149 | (7) |
|
|
|
|
Deep Learning for Classifying Malicious Network Traffic |
|
|
156 | (6) |
|
|
|
|
|
A Server Side Solution for Detecting WebInject: A Machine Learning Approach |
|
|
162 | (6) |
|
|
|
|
|
A Novel LSTM-Based Daily Airline Demand Forecasting Method Using Vertical and Horizontal Time Series |
|
|
168 | (6) |
|
|
|
|
|
|
A Transfer Metric Learning Method for Spammer Detection |
|
|
174 | (7) |
|
|
|
|
Dynamic Whitelisting Using Locality Sensitive Hashing |
|
|
181 | (5) |
|
|
|
|
Payload-Based Statistical Intrusion Detection for In-Vehicle Networks |
|
|
186 | (9) |
|
|
|
|
|
|
|
|
|
Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM) |
|
|
Discovering Strong Meta Association Rules Using Bees Swarm Optimization |
|
|
195 | (12) |
|
|
|
|
|
ParallelPC: An R Package for Efficient Causal Exploration in Genomic Data |
|
|
207 | (12) |
|
|
|
|
|
|
|
Citation Field Learning by RNN with Limited Training Data |
|
|
219 | (14) |
|
|
|
|
|
|
Affine Transformation Capsule Net |
|
|
233 | (10) |
|
|
|
|
|
A Novel Algorithm for Frequent Itemsets Mining in Transactional Databases |
|
|
243 | (13) |
|
|
|
Rare-Events Classification: An Approach Based on Genetic Algorithm and Voronoi Tessellation |
|
|
256 | (11) |
|
|
|
|
|
Particle Swarm Optimization-Based Weighted-Nadaraya-Watson Estimator |
|
|
267 | (16) |
|
|
|
Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) |
|
|
A Parallel Implementation of Information Gain Using Hive in Conjunction with MapReduce for Continuous Features |
|
|
283 | (12) |
|
|
|
|
|
Measuring Interpretability for Different Types of Machine Learning Models |
|
|
295 | (14) |
|
|
|
|
|
In Search of Public Agenda with Text Mining: An Exploratory Study of Agenda Setting Dynamics Between the Traditional Media and Wikipedia |
|
|
309 | (9) |
|
|
Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials |
|
|
318 | (15) |
|
Data Mining for Energy Modeling and Optimization (DaMEMO) |
|
|
Comparison and Sensitivity Analysis of Methods for Solar PV Power Prediction |
|
|
333 | (12) |
|
|
|
|
|
An Improved MIL Algorithm for Optimal Coalition Structure Generation of Smart Grids |
|
|
345 | (12) |
|
|
|
|
|
|
Dam Inflow Time Series Regression Models Minimising Loss of Hydropower Opportunities |
|
|
357 | (12) |
|
Author Index |
|
369 | |