Default Cover Image

2022 4th International Conference on Applied Machine Learning (ICAML)

July 23 2022 to July 25 2022

Changsha, China

ISBN: 978-1-6654-6265-5

Table of Contents

Copyright and Reprint PermissionsFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xiv
EditorialFreely available from IEEE.pp. xv-xvii
Organizing CommitteeFreely available from IEEE.pp. xviii-xix
Programme CommitteeFreely available from IEEE.pp. xx-xxi
SponsorFreely available from IEEE.pp. xxii-xxii
Image Classification Based on Convolution and Lite TransformerFull-text access may be available. Sign in or learn about subscription options.pp. 3-7
Self-Supervised Learning Combined Group and Instance Discrimination for Small Sample SAR ATRFull-text access may be available. Sign in or learn about subscription options.pp. 8-14
Quantum Image Information Hiding Based on Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 15-21
A Meta-learning System for Automatic Objects TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 22-26
Research on Multi-Objective Optimization Method Based on Filter Mimicry Physics AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
SeqMIA: Membership Inference Attacks Against Machine Learning Classifiers Using Sequential InformationFull-text access may be available. Sign in or learn about subscription options.pp. 31-35
Architecture-based Failure Prediction via LSTM and Bayesian Network in Service-oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 36-40
Analysis Influencing Factors of Consumer Satisfaction of Men's Sweaters Based on Online ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 49-53
Research Review of Dispensing Based on Machine VisionFull-text access may be available. Sign in or learn about subscription options.pp. 54-60
MR.DRP: A Parameter Adaptive Machine Learning Framework for Drug Response PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 61-67
A Hybrid Recommendation Algorithm with Co-embedded Item Attributes and RatingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Multi-class Motor Imagery Classification Method Using One-dimensional Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Non-Fungible Token forecast based on LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 81-84
Filter Pruning via Eigenfilter for Deep Convolutional Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Compound Quantitative Structure-activity Relationship Model was Introduced with a Meta-heuristic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Analysis of Multi-Threshold Image Segmentation Method Based on Improved Sparrow Search AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 96-100
Text Mining Based on Web Crawler Technology to Analyze the “Reacting Force” of Film Reviews on FilmsFull-text access may be available. Sign in or learn about subscription options.pp. 103-106
Single-paragraph Extractive Machine Reading Comprehension Model Based on Multi-layer Aligned AttentionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Boundary Detection Enhanced Model for People Name Recognition in Ancient Chinese LiteratureFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Named Entity Recognition of Chinese Legal Text Based on BERTFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Chinese Spelling Error Correction Based on Adaptive Pre-training and Multi-Task LearningFull-text access may be available. Sign in or learn about subscription options.pp. 124-128
Implementation of Automatic Keyword Extraction Software for English Text Based on PythonFull-text access may be available. Sign in or learn about subscription options.pp. 129-132
Optimization of Recommendation Algorithm Based on Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 133-136
Research on Digital Media Recommendation Based on Cluster AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Improved Pre-training and Semi-supervised Learning for Domain-specific Chinese Named Entity RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 142-145
An Acoustic and Voice Source Characteristics Study of Love Songs in EwenkiFull-text access may be available. Sign in or learn about subscription options.pp. 146-150
Research on Automatic Generation of Text Summaries in News Key Information ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Study on the Difference of Ship Track Band Width Based On Weighted Least Square MethodFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Research on Vehicle Logistics Optimization Distribution Based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
Research on Traffic Situational Awareness System Based on Software-Defined NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 169-174
Self-organized UAV Cluster Trajectory Planning Method Based on Ant Colony AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
UAV-Borne Landmine Detection via Intelligent Multispectral FusionFull-text access may be available. Sign in or learn about subscription options.pp. 179-183
Study on the UAV Trajectory Planning Route Based on the Particle Group Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 184-187
Research on Design and Development Trend of Wi-Fi Entertainment System of Civil AircraftFull-text access may be available. Sign in or learn about subscription options.pp. 188-193
Research on Compressor Oil System Based on Frequency Conversion GovernorFull-text access may be available. Sign in or learn about subscription options.pp. 194-197
Research on Optimization Design Method of Underwater Solenoid Electromagnet Based on ACO AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
The Design of Self-customization and Offline Compilation Criterion SystemFull-text access may be available. Sign in or learn about subscription options.pp. 204-208
Research on Jamming Modulation Technology of Monopulse Radar Sidelobe CancellerFull-text access may be available. Sign in or learn about subscription options.pp. 209-213
Dynamic Analysis of Deployment Impact of Offset-fed Truss ReflectorFull-text access may be available. Sign in or learn about subscription options.pp. 214-218
A Target Tracking Scheme Design Based on Multiple CamerasFull-text access may be available. Sign in or learn about subscription options.pp. 219-222
Gray-Box Modeling of Ship Manoeuvring Motion Using On-Line Support Vector MachineFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
LiDAR Odometer Based on Visual EnhancementFull-text access may be available. Sign in or learn about subscription options.pp. 232-236
Enhanced Two-stage Ship Detection Algorithm in Remote Sensing ImageFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
High Resolution Display Model of Wind Profile Radar Based on Multi-core Liquid State MachineFull-text access may be available. Sign in or learn about subscription options.pp. 243-247
Target Recognition Method Based on Incremental LearningFull-text access may be available. Sign in or learn about subscription options.pp. 248-251
WPCNet: Highly Accurate Workpiece Counting Network in Unrestricted ScenesFull-text access may be available. Sign in or learn about subscription options.pp. 255-259
A Transformer-based Method for the Single-target Location in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 260-265
Deep Reinforcement Learning-Based Computation Offloading and Resource Allocation in IoTFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Design of Location Security Protection System Based on Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 273-276
Study on Conceptual System and Analysis Method of Computer Network ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 277-280
Simulation and Analysis of AFDX Performance Based on Petri NetFull-text access may be available. Sign in or learn about subscription options.pp. 285-290
Analysis of Relay Link for Airborne Mobile Communication and Broadband Wireless AccessFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Network Security and Information Literacy Training Based on Big Data Clustering AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Internet of Things Intrusion Detection System Based on D-GRUFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Neural Network-Based DDoS Detection on Edge Computing ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Adversarial Example Attacks Against Intelligent Malware Detection: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Power Transformer Discharge Fault Identification Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 339-344
Energy Saving Train Optimization Problem Based on Particle Swarm Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Inverter Fault Diagnosis Algorithm Based on IGWO-ADAM-BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 365-371
Load Forecasting for Data Centers Based on Time SeriesFull-text access may be available. Sign in or learn about subscription options.pp. 372-377
Information Extraction and Visualization for Cyber Financial Fraud CaseFull-text access may be available. Sign in or learn about subscription options.pp. 381-385
Research on Economic and Financial Data Analysis Method Based on Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 386-390
Cryptocurrency Trading Strategies and Profitability Based on Deep Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Evolution Analysis of Network Public Opinion Theme Based on LDA ModelFull-text access may be available. Sign in or learn about subscription options.pp. 396-400
Analysis of Stock Market Quantitative Trading Strategies Based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 401-404
A Machine Learning Study on the Model Performance of Human Resources Predictive AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 405-409
Credit Risk Evaluation of Supply Chain Finance Based on K-Means-SVM ModelFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
Study on User Identification Method of High Default Risk in Internet Financial PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 414-419
A Trading Strategy Based on LSTMFull-text access may be available. Sign in or learn about subscription options.pp. 420-424
Research on Financial Risk Management Early Warning Method Based on Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 425-429
System Design and Implementation Based on K8s Microservice ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
PBFT Consensus Algorithm Based on Quality of Service ImprovementFull-text access may be available. Sign in or learn about subscription options.pp. 439-443
The Current Situation and Prospect of the Development of Metaverse TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
5G AKA Cryptographic Functions Based on SM4 AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 449-453
Research on Service Quality Improvement of Agro-tourism Integration Scenic Spots Based on BP Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Author IndexFreely available from IEEE.pp. 463-466
Showing 93 out of 93