


default search action
ACM Transactions on Intelligent Systems and Technology, Volume 11
Volume 11, Number 1, February 2020
- Binbin Zhou

, Sha Zhao, Longbiao Chen
, Shijian Li, Zhaohui Wu, Gang Pan:
Forecasting Price Trend of Bulk Commodities Leveraging Cross-domain Open Data Fusion. 1:1-1:26 - Yiqun Xie, Xun Zhou

, Shashi Shekhar:
Discovering Interesting Subpaths with Statistical Significance from Spatiotemporal Datasets. 2:1-2:24 - Ramon Lopes

, Renato M. Assunção, Rodrygo L. T. Santos
:
Graph-based Recommendation Meets Bayes and Similarity Measures. 3:1-3:26 - Sofia Amador Nelke

, Steven Okamoto, Roie Zivan:
Market Clearing-based Dynamic Multi-agent Task Allocation. 4:1-4:25 - Marcin Waniek

, Tomasz P. Michalak
, Aamena Alshamsi:
Strategic Attack & Defense in Security Diffusion Games. 5:1-5:35 - Jindong Wang

, Yiqiang Chen
, Wenjie Feng
, Han Yu, Meiyu Huang
, Qiang Yang:
Transfer Learning with Dynamic Distribution Adaptation. 6:1-6:25 - Benjamin D. Horne

, Jeppe Nørregaard, Sibel Adali:
Robust Fake News Detection Over Time and Attack. 7:1-7:23 - Menghai Pan

, Weixiao Huang, Yanhua Li
, Xun Zhou, Zhenming Liu, Rui Song
, Hui Lu, Zhihong Tian, Jun Luo:
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis. 8:1-8:19 - Meng Wang

, Hui Li, Jiangtao Cui, Sourav S. Bhowmick
, Ping Liu:
FROST: Movement History-Conscious Facility Relocation. 9:1-9:26 - Tao-Yang Fu, Wang-Chien Lee

:
Trembr: Exploring Road Networks for Trajectory Representation Learning. 10:1-10:25 - Ghazaleh Beigi

, Jiliang Tang, Huan Liu:
Social Science-guided Feature Engineering: A Novel Approach to Signed Link Analysis. 11:1-11:27 - Ping Luo, Kai Shu, Junjie Wu

, Li Wan, Yong Tan:
Exploring Correlation Network for Cheating Detection. 12:1-12:23
Volume 11, Number 2, March 2020
Survey Paper
- Shuo Zhang

, Krisztian Balog:
Web Table Extraction, Retrieval, and Augmentation: A Survey. 13:1-13:35
- Lei Zhu

, Xu Lu
, Zhiyong Cheng, Jingjing Li, Huaxiang Zhang:
Flexible Multi-modal Hashing for Scalable Multimedia Retrieval. 14:1-14:20 - Samuel E. L. Oliveira

, Victor Diniz, Anísio Lacerda, Luiz H. C. Merschmann, Gisele L. Pappa:
Is Rank Aggregation Effective in Recommender Systems? An Experimental Analysis. 16:1-16:26 - Juan Ye

, Simon Dobson
, Franco Zambonelli:
XLearn: Learning Activity Labels across Heterogeneous Datasets. 17:1-17:28 - Hankz Hankui Zhuo

, Yantian Zha, Subbarao Kambhampati, Xin Tian:
Discovering Underlying Plans Based on Shallow Models. 18:1-18:30 - Chien-Chih Wang, Kent Loong Tan, Chih-Jen Lin

:
Newton Methods for Convolutional Neural Networks. 19:1-19:30 - Shih-Chia Huang, Da-Wei Jaw, Bo-Hao Chen

, Sy-Yen Kuo:
Single Image Snow Removal Using Sparse Representation and Particle Swarm Optimizer. 20:1-20:15 - Wenhe Liu

, Xiaojun Chang
, Ling Chen
, Dinh Phung
, Xiaoqin Zhang, Yi Yang, Alexander G. Hauptmann:
Pair-based Uncertainty and Diversity Promoting Early Active Learning for Person Re-identification. 21:1-21:15 - Lei Chen

, Zhiang Wu
, Jie Cao, Guixiang Zhu, Yong Ge:
Travel Recommendation via Fusing Multi-Auxiliary Information into Matrix Factorization. 22:1-22:24 - Ramon Fraga Pereira

, Nir Oren
, Felipe Meneguzzi
:
Using Sub-Optimal Plan Detection to Identify Commitment Abandonment in Discrete Environments. 23:1-23:26 - Erez Shmueli

, Tamir Tassa:
Mediated Secure Multi-Party Protocols for Collaborative Filtering. 15:1-15:25
Volume 11, Number 3, May 2020
Survey Paper
- Zhuang Liu

, Keli Xiao
, Bo Jin
, Kaiyu Huang, Degen Huang, Yunxia Zhang:
Unified Generative Adversarial Networks for Multiple-Choice Oriented Machine Comprehension. 25:1-25:20 - Ankit Shah, Arunesh Sinha

, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. 32:1-32:20 - Adi Lin

, Jie Lu
, Junyu Xuan
, Fujin Zhu
, Guangquan Zhang:
A Causal Dirichlet Mixture Model for Causal Inference from Observational Data. 33:1-33:29 - Gengyu Lyu, Songhe Feng

, Yidong Li, Yi Jin, Guojun Dai, Congyan Lang:
HERA: Partial Label Learning by Combining Heterogeneous Loss with Sparse and Low-Rank Regularization. 34:1-34:19
- Wei Emma Zhang

, Quan Z. Sheng
, Ahoud Alhazmi
, Chenliang Li:
Adversarial Attacks on Deep-learning Models in Natural Language Processing: A Survey. 24:1-24:41 - Gábor Horváth, Edith Kovács, Roland Molontay

, Szabolcs Nováczki
:
Copula-Based Anomaly Scoring and Localization for Large-Scale, High-Dimensional Continuous Data. 26:1-26:26 - Di Jin, Bingyi Li

, Pengfei Jiao, Dongxiao He, Hongyu Shan, Weixiong Zhang
:
Modeling with Node Popularities for Autonomous Overlapping Community Detection. 27:1-27:23 - Yawei Zhao

, Qian Zhao, Xingxing Zhang, En Zhu, Xinwang Liu, Jianping Yin:
Understand Dynamic Regret with Switching Cost for Online Decision Making. 28:1-28:21 - Xueliang Liu

, Xun Yang, Meng Wang, Richang Hong:
Deep Neighborhood Component Analysis for Visual Similarity Modeling. 29:1-29:15 - Heike Brock

, Felix Law, Kazuhiro Nakadai, Yuji Nagashima:
Learning Three-dimensional Skeleton Data from Sign Language Video. 30:1-30:24 - Lei Zhang, Yixiang Zhang, Xiaolong Zheng

:
WiSign: Ubiquitous American Sign Language Recognition Using Commercial Wi-Fi Devices. 31:1-31:24 - Udit Arora, Hridoy Sankar Dutta, Brihi Joshi, Aditya Chetan

, Tanmoy Chakraborty
:
Analyzing and Detecting Collusive Users Involved in Blackmarket Retweeting Activities. 35:1-35:24
Volume 11, Number 4, July 2020
Survey Paper
- Rui Yao

, Guosheng Lin, Shixiong Xia, Jiaqi Zhao, Yong Zhou:
Video Object Segmentation and Tracking: A Survey. 36:1-36:47
- Yingying Zhang, Quan Fang, Shengsheng Qian, Changsheng Xu:

Knowledge-aware Attentive Wasserstein Adversarial Dialogue Response Generation. 37:1-37:20 - Sidney A. Feygin

, Jessica R. Lazarus, Edward H. Forscher, Valentine Golfier-Vetterli, Jonathan W. Lee
, Abhishek Gupta, Rashid A. Waraich, Colin J. R. Sheppard, Alexandre M. Bayen:
BISTRO: Berkeley Integrated System for Transportation Optimization. 38:1-38:27 - Hui Liu, Haiou Wang, Yan Wu

, Lei Xing
:
Superpixel Region Merging Based on Deep Network for Medical Image Segmentation. 39:1-39:22 - Divya Singhal, Abhinav Gupta

, Anurag Tripathi, Ravi Kothari:
CNN-based Multiple Manipulation Detector Using Frequency Domain Features of Image Residuals. 40:1-40:26 - Lin Li

, Weike Pan
, Zhong Ming:
CoFi-points: Collaborative Filtering via Pointwise Preference Learning on User/Item-Set. 41:1-41:24 - Jing Ma

, Wei Gao, Shafiq R. Joty, Kam-Fai Wong
:
An Attention-based Rumor Detection Model with Tree-structured Recursive Neural Networks. 42:1-42:28 - Jun-Zhe Wang, Yi-Cheng Chen

, Wen-Yueh Shih, Lin Yang, Yu-Shao Liu, Jiun-Long Huang:
Mining High-utility Temporal Patterns on Time Interval-based Data. 43:1-43:31 - Hanrui Wu

, Yuguang Yan, Michael K. Ng, Qingyao Wu:
Domain-attention Conditional Wasserstein Distance for Multi-source Domain Adaptation. 44:1-44:19 - Jungeun Kim, Jae-Gil Lee, Byung Suk Lee, Jiajun Liu:

Geosocial Co-Clustering: A Novel Framework for Geosocial Community Detection. 45:1-45:26 - Yapei Huang

, Yun Tian, Zhijie Liu, Xiaowei Jin, Yanan Liu, Shifeng Zhao, Daxin Tian:
A Traffic Density Estimation Model Based on Crowdsourcing Privacy Protection. 46:1-46:18 - Min Wang

, Congyan Lang, Liqian Liang, Songhe Feng
, Tao Wang, Yutong Gao:
End-to-End Text-to-Image Synthesis with Spatial Constrains. 47:1-47:19 - Guang Wang

, Fan Zhang, Huijun Sun, Yang Wang, Desheng Zhang:
Understanding the Long-Term Evolution of Electric Taxi Networks: A Longitudinal Measurement Study on Mobility and Charging Patterns. 48:1-48:27 - Xiang Zhang

, Lina Yao
, Chaoran Huang, Tao Gu
, Zheng Yang, Yunhao Liu:
DeepKey: A Multimodal Biometric Authentication System via Deep Decoding Gaits and Brainwaves. 49:1-49:24
Volume 11, Number 5, September 2020
Survey Paper
- Garrett Wilson

, Diane J. Cook
:
A Survey of Unsupervised Deep Domain Adaptation. 51:1-51:46
- Chaochao Chen

, Jun Zhou, Bingzhe Wu
, Wenjing Fang, Li Wang, Yuan Qi, Xiaolin Zheng:
Practical Privacy Preserving POI Recommendation. 52:1-52:20 - Nikhil Muralidhar

, Anika Tabassum
, Liangzhe Chen, Supriya Chinthavali, Naren Ramakrishnan
, B. Aditya Prakash:
Cut-n-Reveal: Time Series Segmentations with Explanations. 53:1-53:26 - Jizhou Huang

, Haifeng Wang
, Wei Zhang, Ting Liu:
Multi-Task Learning for Entity Recommendation and Document Ranking in Web Search. 54:1-54:24 - Ahmad Albaqsami

, Maryam S. Hosseini, Masoomeh Jasemi, Nader Bagherzadeh:
Adaptive HTF-MPR: An Adaptive Heterogeneous TensorFlow Mapper Utilizing Bayesian Optimization and Genetic Algorithms. 55:1-55:25 - Rui Liu, Runze Liu, Andrea Pugliese

, V. S. Subrahmanian:
STARS: Defending against Sockpuppet-Based Targeted Attacks on Reviewing Systems. 56:1-56:25 - Yuxiang Zhou

, Lejian Liao, Yang Gao, Heyan Huang, Xiaochi Wei:
A Discriminative Convolutional Neural Network with Context-aware Attention. 57:1-57:21 - Chenglong Dai

, Dechang Pi, Stefanie I. Becker
:
Shapelet-transformed Multi-channel EEG Channel Selection. 58:1-58:27 - Munkh-Erdene Yadamjav

, Zhifeng Bao
, Baihua Zheng
, Farhana Murtaza Choudhury, Hanan Samet:
Querying Recurrent Convoys over Trajectory Data. 59:1-59:24 - Xiaoguang Tu

, Zheng Ma, Jian Zhao, Guodong Du, Mei Xie, Jiashi Feng:
Learning Generalizable and Identity-Discriminative Representations for Face Anti-Spoofing. 60:1-60:19 - Qing Tian

, Wenqiang Zhang, Meng Cao
, Liping Wang, Songcan Chen, Hujun Yin
:
Moment-Guided Discriminative Manifold Correlation Learning on Ordinal Data. 61:1-61:18 - Kun Yuan

, Guannan Liu, Junjie Wu
, Hui Xiong:
Dancing with Trump in the Stock Market: A Deep Information Echoing Model. 62:1-62:22 - Eddy Maddalena

, Luis-Daniel Ibáñez
, Elena Simperl
:
Mapping Points of Interest Through Street View Imagery and Paid Crowdsourcing. 63:1-63:28
Volume 11, Number 6, November 2020
Survey Paper
- Tong Xia

, Yong Li, Jie Feng, Depeng Jin, Qing Zhang, Hengliang Luo, Qingmin Liao:
DeepApp: Predicting Personalized Smartphone App Usage via Context-Aware Multi-Task Learning. 64:1-64:12
- Zimu Zheng

, Jie Pu, Linghui Liu, Dan Wang, Xiangming Mei, Sen Zhang, Quanyu Dai
:
Contextual Anomaly Detection in Solder Paste Inspection with Multi-Task Learning. 65:1-65:17 - Sharon Levy

, Wenhan Xiong, Elizabeth M. Belding, William Yang Wang:
SafeRoute: Learning to Navigate Streets Safely in an Urban Environment. 66:1-66:17 - Zohaib Md. Jan

, Brijesh K. Verma:
Multiple Elimination of Base Classifiers in Ensemble Learning Using Accuracy and Diversity Comparisons. 67:1-67:17 - Bayu Adhi Tama

, Marco Comuzzi
, Jonghyeon Ko
:
An Empirical Investigation of Different Classifiers, Encoding, and Ensemble Schemes for Next Event Prediction Using Business Process Event Logs. 68:1-68:34 - Debopriyo Banerjee

, Krothapalli Sreenivasa Rao, Shamik Sural, Niloy Ganguly:
BOXREC: Recommending a Box of Preferred Outfits in Online Shopping. 69:1-69:28 - Pan Li

, Alexander Tuzhilin
:
Latent Unexpected Recommendations. 70:1-70:25 - Carlos Eiras-Franco

, David Martínez-Rego, Leslie Kanthan, César Piñeiro, Antonio Bahamonde, Bertha Guijarro-Berdiñas, Amparo Alonso-Betanzos:
Fast Distributed kNN Graph Construction Using Auto-tuned Locality-sensitive Hashing. 71:1-71:18 - Junwei Li

, Le Wu, Richang Hong, Kun Zhang, Yong Ge, Yan Li:
A Joint Neural Model for User Behavior Prediction on Social Networking Platforms. 72:1-72:25 - Moshe Mash, Roy Fairstein, Yoram Bachrach, Kobi Gal, Yair Zick:

Human-computer Coalition Formation in Weighted Voting Games. 73:1-73:20 - Xiu Susie Fang

, Quan Z. Sheng
, Xianzhi Wang
, Wei Emma Zhang
, Anne H. H. Ngu, Jian Yang
:
From Appearance to Essence: Comparing Truth Discovery Methods without Using Ground Truth. 74:1-74:24

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














