A review: Knowledge reasoning over knowledge graph
X Chen, S Jia, Y Xiang - Expert systems with applications, 2020 - Elsevier
Mining valuable hidden knowledge from large-scale data relies on the support of reasoning
technology. Knowledge graphs, as a new type of knowledge representation, have gained …
technology. Knowledge graphs, as a new type of knowledge representation, have gained …
The use of video for patient information and education: A scoping review of the variability and effectiveness of interventions
A Chatterjee, G Strong, E Meinert, M Milne-Ives… - Patient Education and …, 2021 - Elsevier
Objective To provide an overview of video interventions used for patient information and
education, and of the tools used to evaluate their effectiveness, in order to consider the …
education, and of the tools used to evaluate their effectiveness, in order to consider the …
HAOP-Miner: Self-adaptive high-average utility one-off sequential pattern mining
One-off sequential pattern mining (SPM)(or SPM under the one-off condition) is a kind of
repetitive SPM with gap constraints, and has been widely applied in many fields. However …
repetitive SPM with gap constraints, and has been widely applied in many fields. However …
Learning precise feature via self-attention and self-cooperation YOLOX for smoke detection
J Wang, X Zhang, K Jing, C Zhang - Expert Systems with Applications, 2023 - Elsevier
Smoke detection is a key process for fire warning systems. However, the existing smoke
detection methods are insufficient to extract precise smoke features due to the smoke's …
detection methods are insufficient to extract precise smoke features due to the smoke's …
Dealing with sensor and actuator deception attacks in supervisory control
We consider feedback control systems where sensor readings and actuator commands may
be compromised by an attacker intending to damage the system. We study this problem at …
be compromised by an attacker intending to damage the system. We study this problem at …
Revealing the unrevealed: Mining smartphone users privacy perception on app markets
M Hatamian, J Serna, K Rannenberg - Computers & Security, 2019 - Elsevier
Popular smartphone apps may receive several thousands of user reviews containing
statements about apps' functionality, interface, user-friendliness, etc. They sometimes also …
statements about apps' functionality, interface, user-friendliness, etc. They sometimes also …
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
Abstract Moving Target Defense (MTD) has emerged as a game changer to reverse the
asymmetric situation between attackers and defenders, and as one of the most effective …
asymmetric situation between attackers and defenders, and as one of the most effective …
Biological activity of polyphenol extracts from different plant sources
Z Zdunczyk, S Frejnagel, M Wróblewska… - Food Research …, 2002 - Elsevier
In experiments on rats, five diets without or supplemented with polyphenol extracts from
different sources (flavons from skullcap, catechins from green tea, anthocyanins from …
different sources (flavons from skullcap, catechins from green tea, anthocyanins from …
Ded: Diagnostic evidence distillation for acne severity grading on face images
Acne seriously affects people's daily life. Acne severity level grading plays a decisive role in
the cure. However, the acne criterion is not unified in the medical field. Most of the current …
the cure. However, the acne criterion is not unified in the medical field. Most of the current …
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection
A Guerra-Manzanares, H Bahsi - Computers & Security, 2022 - Elsevier
The vast body of research in the Android malware detection domain has demonstrated that
machine learning can provide high performance for mobile malware detection. However, the …
machine learning can provide high performance for mobile malware detection. However, the …