Default Cover Image

2023 IEEE International Conference on Big Data (BigData)

Dec. 15 2023 to Dec. 18 2023

Sorrento, Italy

ISBN: 979-8-3503-2445-7

Table of Contents

BigData 2023 Author IndexFreely available from IEEE.pp. i-xxxiii
BigData 2023 Committee MemberFreely available from IEEE.pp. i-ii
BigData 2023 Program CommitteeFreely available from IEEE.pp. i-xv
Leveraging Deep Learning to Improve COVID-19 Forecasting Using Wastewater Viral LoadFull-text access may be available. Sign in or learn about subscription options.pp. 2705-2713
Learning with Variational Objectives on MeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 1059-1063
BFRecSys: A Blockchain-based Federated Matrix Factorization for Recommendation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 2283-2292
Crude oil price forecasting base on an EEMD and multi-scale time series analysis combination methodsFull-text access may be available. Sign in or learn about subscription options.pp. 2441-2449
Tabular Data to Image Generation: Benchmark Data, Approaches, and EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 1539-1543
Tripletformer for Probabilistic Interpolation of Irregularly sampled Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 986-995
ATADA: Adaptive Time Aware Anomaly Detection Approach for Real-Time Intelligent Transportation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1563-1570
MIAE: A Mobile Application Recommendation Method Based on a NTK ModelFull-text access may be available. Sign in or learn about subscription options.pp. 4300-4307
Roughness Index for Loss Landscapes of Neural Network Models of Partial Differential Equations*Full-text access may be available. Sign in or learn about subscription options.pp. 966-975
An Analysis of the Dynamics of Ties on TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 5809-5817
Enhancing Concept Drift Detection in Drifting and Imbalanced Data Streams through Meta-LearningFull-text access may be available. Sign in or learn about subscription options.pp. 2648-2657
Discovery and Matching Numerical Attributes in Data LakesFull-text access may be available. Sign in or learn about subscription options.pp. 423-432
Safe data transmission in IoT system for air pollution monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 5438-5443
Increase Merge Efficiency in LSM Trees Through Coordinated Partitioning of Sorted RunsFull-text access may be available. Sign in or learn about subscription options.pp. 530-535
Optimized Model of Ledger Database Management to handle Vehicle RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 2275-2282
Multi-Item Continuous Influence MaximizationFull-text access may be available. Sign in or learn about subscription options.pp. 5282-5291
An Experimental Study on Random Projection Based Biometric SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 3325-3331
Efficient Estimation of Local Causal Effects in Graphs via Neighborhood PoolingFull-text access may be available. Sign in or learn about subscription options.pp. 542-547
On Chatbots for Visual Exploratory Data AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 5924-5929
Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis TestingFull-text access may be available. Sign in or learn about subscription options.pp. 1344-1351
Ethical Hacking in Digital ForensicsFull-text access may be available. Sign in or learn about subscription options.pp. 5539-5548
Deep Learning for Spatiotemporal Big Data: Opportunities and Challenges [Vision Paper]Full-text access may be available. Sign in or learn about subscription options.pp. 1157-1161
Document-Level Event Argument Extraction Based on Bidirectional Span DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1005-1011
SBTREC - A Transformer Framework for Personalized Tour Recommendation Problem with Sentiment AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 5790-5798
Dynamic Mining Interval to Improve Blockchain ThroughputFull-text access may be available. Sign in or learn about subscription options.pp. 46-55
Self-Supervision for Tackling Unsupervised Anomaly Detection: Pitfalls and OpportunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1047-1051
CoMABO: Covariance Matrix Adaptation for Bayesian OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 37-45
A Classification Approach to Detect Social Support in Online Health CommunitiesFull-text access may be available. Sign in or learn about subscription options.pp. 4891-4899
AQUA: A Framework for Spatiotemporal Analysis and Visualizations of Water Quality Data at ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 1555-1562
A Hybrid Model Based on Multi-level External Knowledge for Chinese Semantic MatchingFull-text access may be available. Sign in or learn about subscription options.pp. 1200-1205
Ocean Data Quality Assessment through Outlier Detection-enhanced Active LearningFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Quantitatively Evaluating the Validity of Contrastive Generators for RecourseFull-text access may be available. Sign in or learn about subscription options.pp. 1143-1150
Matching Noisy Keys for ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 5485-5492
gSPICE: Model-Based Event Shedding in Complex Event ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 263-270
Lightweight CNN based on Spatial Features for a Vehicular Damage Detection SystemFull-text access may be available. Sign in or learn about subscription options.pp. 5097-5101
FNDaaS: Content-agnostic Detection of Websites Distributing Fake NewsFull-text access may be available. Sign in or learn about subscription options.pp. 1438-1449
OrthoNets: Orthogonal Channel Attention NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 829-837
LogGPT: Log Anomaly Detection via GPTFull-text access may be available. Sign in or learn about subscription options.pp. 1117-1122
Scientific Error-bounded Lossy Compression with Super-resolution Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
Fast Heavy Inner Product Identification Between Weights and Inputs in Neural Network TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 128-133
Game Based Virtual Reality Platform for GeometryFull-text access may be available. Sign in or learn about subscription options.pp. 4812-4818
Ultra-wide Band Positioning with Signal Interference based on Two-Stream Residual NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 976-985
Interpretable Sock Puppet AttributionFull-text access may be available. Sign in or learn about subscription options.pp. 847-856
ID-MixGCL: Identity Mixup for Graph Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 473-482
Unvisited Out-Of-Town POI Recommendation with Simultaneous Learning of Multiple RegionsFull-text access may be available. Sign in or learn about subscription options.pp. 915-924
IIP-Transformer: Intra-Inter-Part Transformer for Skeleton-Based Action RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 936-945
Robust Fraud Detection via Supervised Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1279-1288
FedSym: Unleashing the Power of Entropy for Benchmarking the Algorithms for Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 4308-4317
Analyzing Code Text Strings for Code EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 5619-5628
Integrating Noisy Knowledge into Language Representations for E-Commerce ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 548-553
Achieving Privacy and Tracing Unauthorised Usage: Anonymisation-based Fingerprinting of Private DataFull-text access may be available. Sign in or learn about subscription options.pp. 5578-5587
Improving Fingerprint Classification Accuracy Using Image Enhancement Deep Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 3245-3254
A Robust Classifier under Missing-Not-at-Random Sample Selection BiasFull-text access may be available. Sign in or learn about subscription options.pp. 1206-1213
CTT: Causally Informed Tensor Train DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 1180-1187
Detecting Semantic Errors in Tables using Textual EvidenceFull-text access may be available. Sign in or learn about subscription options.pp. 292-303
PGAN-KD:Member Privacy Protection of GANs Based on Knowledge DistillationFull-text access may be available. Sign in or learn about subscription options.pp. 1380-1385
MixPCD: a novel method of constructing driving cycle for electric bus with sparse dataFull-text access may be available. Sign in or learn about subscription options.pp. 2639-2647
Humor Level Recognition Based on Prompt Learning and Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1256-1261
SASTDGCN: Self-Attention Based Spatial-Temporal Double Graph Convolutional Networks for Traffic Flow ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 1544-1549
Efficiently Mining Frequent Representative Motifs in Large Collections of Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 66-75
Generating Prototypes for Contradiction Detection Using Large Language Models and Linguistic RulesFull-text access may be available. Sign in or learn about subscription options.pp. 4684-4692
Transferring Lottery Tickets in Computer Vision Models: a Dynamic Pruning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1123-1128
Learning Pruned Structure and Weights Simultaneously from Scratch: an Attention based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1129-1134
Active Data Reconstruction Attacks in Vertical Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1374-1379
Efficient Missing Value Imputation by Maximum Distance LikelihoodFull-text access may be available. Sign in or learn about subscription options.pp. 331-338
Interactive Visualization for Smart Power Grid Efficiency and Outage ExplorationFull-text access may be available. Sign in or learn about subscription options.pp. 656-661
Feature Acquisition Using Monte Carlo Tree Search*Full-text access may be available. Sign in or learn about subscription options.pp. 1188-1193
Showing 100 out of 833