Default Cover Image

2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI)

Nov. 6 2023 to Nov. 8 2023

Atlanta, GA, USA

ISBN: 979-8-3503-4273-4

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-23
Message from the General ChairFreely available from IEEE.pp. 24-24
Message from the Program ChairsFreely available from IEEE.pp. 25-26
Organizing CommitteeFreely available from IEEE.pp. 27-27
Program CommitteeFreely available from IEEE.pp. 28-30
A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A Two-stage Approach for Tables Extraction in InvoicesFull-text access may be available. Sign in or learn about subscription options.pp. 10-15
A Framework for Paired-Sample Hypothesis Testing for High-Dimensional DataFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
IArch: An AI Tool for Digging Deeper into Archaeological DataFull-text access may be available. Sign in or learn about subscription options.pp. 22-29
Societal Versus Encoded Stereotypes in Text EncodersFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
An Evaluation of Table Detection Methods in Document ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 54-63
Authentic Dialogue Generation to Improve Youth’s Awareness of Cybergrooming for Online SafetyFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
DGSNet: Dual Graph Structure Network for Emotion Recognition in Multimodal ConversationsFull-text access may be available. Sign in or learn about subscription options.pp. 78-85
Personalized One-Shot Collaborative LearningFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Ensemble Learning for Mapper Parameter OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 129-134
Comparative Crime Analysis and Prediction Using Machine Learning Algorithms: Assessing the Tools and Addressing the ThreatsFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
DICE: Data Imputation for Cost Estimates from Multiple Sources to Model User Decision-MakingFull-text access may be available. Sign in or learn about subscription options.pp. 149-154
TDCGL: Two-Level Debiased Contrastive Graph Learning for RecommendationFull-text access may be available. Sign in or learn about subscription options.pp. 155-159
Voting-based Methods for Evaluating Sources and Facts ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
Binary Search-Based Methods for Solving Constraint Hierarchies over Finite DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
MusiComb: a Sample-based Approach to Music Generation Through ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 194-198
Graph based Hiding of Sensitive KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 199-203
Efficient Constraint Learning For Stream ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 204-211
Suspicious: a Resilient Semi-Supervised Framework for Graph Fraud DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 212-220
Hybrid CNN-LSTM and Domain Modeling in Climate-Energy Analysis for a Smart EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 229-233
Generation of Rule-Based Expert Systems with Certainty Factors from DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Persona-Coded Poly-Encoder: Persona-Guided Multi-Stream Conversational Sentence ScoringFull-text access may be available. Sign in or learn about subscription options.pp. 250-257
Graph Neural Networks with No Supervision and Heuristics for the Kidney-Exchange ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
Identifying relevant descriptors for tweet setsFull-text access may be available. Sign in or learn about subscription options.pp. 263-268
Distance-Aware eXplanation Based LearningFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Deep Reinforcement Learning Based Efficient and Robust Navigation Method For Autonomous ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 287-293
Res-ViT: Residual Vision Transformers for Image Recognition Tasks.Full-text access may be available. Sign in or learn about subscription options.pp. 309-316
DBERT-ELVA: Discourse-Aware Extractive Text Summarization with AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 317-324
Non-Refined Abstractions in Counterexample Guided Abstraction Refinement for Multi-Agent Path FindingFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
Integral AI-based planning for management of WSNs in military operationsFull-text access may be available. Sign in or learn about subscription options.pp. 341-348
On Semantics of Hierarchical Planning Domain Models with Decomposition Constraints and Empty MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 349-353
AV-MaskEnhancer: Enhancing Video Representations through Audio-Visual Masked AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 354-360
A Knowledge Representation Framework for Evolutionary Simulations with Cognitive AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 361-368
Dynamic Job Shop Scheduling via Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 369-376
Dynamic All-Different and Maximal Cliques Constraints for Fixed Job SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 385-392
Using On-The-Fly Model Checking to improve Constraint Programming for Dynamic ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 393-398
Rotation-Invariant Descriptors Learned with Circulant Convolution Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 415-422
Verifying Neural Networks with Non-Linear SMT Solvers: a Short Status ReportFull-text access may be available. Sign in or learn about subscription options.pp. 423-428
The remote sensing image segmentation of land cover based on multi-scale attention featuresFull-text access may be available. Sign in or learn about subscription options.pp. 429-436
Pedestrian Recognition with Radar Data-Enhanced Deep Learning Approach Based on Micro-Doppler SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 437-443
A Formal Introduction to Batch-Integrated Gradients for Temporal ExplanationsFull-text access may be available. Sign in or learn about subscription options.pp. 452-459
AI Algorithmic Bias: Understanding its Causes, Ethical and Social ImplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 460-467
ChatGPT: More Human-Like Than Computer-Like, but Not Necessarily in a Good WayFull-text access may be available. Sign in or learn about subscription options.pp. 468-473
Learning to identify and settle dilemmas through contextual user preferencesFull-text access may be available. Sign in or learn about subscription options.pp. 474-479
Invertible Neural Networks for Trustworthy AIFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
A Federated Learning Approach for Anomaly Detection in High Performance ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 496-500
PEAK: Policy Event Assessment of COVID-19 Cases at the Start of the Pandemic in New York CityFull-text access may be available. Sign in or learn about subscription options.pp. 507-512
Enhancing Change Detection in Spectral Images: Integration of UNet and ResNet ClassifiersFull-text access may be available. Sign in or learn about subscription options.pp. 513-517
Global min-max Computation for α-Hölder GamesFull-text access may be available. Sign in or learn about subscription options.pp. 518-525
An Interpretable LSTM Network for Solar Flare PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 526-531
Disjointness axioms between top-level ontology concepts as a heuristic for word similarity evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 538-545
Learning Complicated Navigation Skills from Limited Experience via Augmenting Offline DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 559-566
SCD:Sampling-based Class Distribution for Imbalanced Semi-Supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 567-572
bt-vMF Contrastive and Collaborative Learning for Long-Tailed Visual RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 573-577
Graph Active Learning at Subgraph GranularityFull-text access may be available. Sign in or learn about subscription options.pp. 578-585
Destruction-Restoration Suppresses Data Protection Perturbations against Diffusion ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 586-594
UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 603-610
PGN: A Perturbation Generation Network Against Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 611-618
Offline Reinforcement Learning Via Optimal Transport And Improved Performance Difference TheoremFull-text access may be available. Sign in or learn about subscription options.pp. 619-626
Boosting the Adversarial Transferability of Surrogate Models with Dark KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 627-635
Deep Interaction Behavioral Feature Network for Click-Through Rate PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 636-640
AOSR-Net: All-in-One Sandstorm Removal NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 641-645
Showing 100 out of 154