Jang, Hankyu Pai, Shreyas Adhikari, Bijaya Pemmaraju, Sriram V.
Published in
Knowledge and Information Systems
This paper studies the problem of detecting asymptomatic cases in a temporal contact network in which multiple outbreaks have occurred. We show that the key to detecting asymptomatic cases well is taking into account both individual risk and the likelihood of disease-flow along edges. We consider both aspects by formulating the asymptomatic case de...
Shen, Yinghan Jiang, Xuhui Li, Zijian Wang, Yuanzhuo Jin, Xiaolong Ma, Shengjie Cheng, Xueqi
Published in
Knowledge and Information Systems
Real-world network data consisting of social interactions can be incomplete due to deliberately erased or unsuccessful data collection, which cause the misleading of social interaction analysis for many various time-aware applications. Naturally, the link prediction task has drawn much research interest to predict the missing edges in the incomplet...
Challapalli, Jhansi Rani Devarakonda, Nagaraju
Published in
Knowledge and information systems
Deep learning is the most dominant area to perform the complex challenging tasks such as image classification and recognition. Earlier researchers have been proposed various convolution neural network (CNN) with different architectures to improve the performance accuracy for the classification and recognition of images. However, the fine-tuning of ...
Bonte, Pieter De Turck, Filip Ongenae, Femke
In today's data landscape, data streams are well represented. This is mainly due to the rise of data-intensive domains such as the Internet of Things (IoT), Smart Industries, Pervasive Health, and Social Media. To extract meaningful insights from these streams, they should be processed in real time, while solving an integration problem as these str...
Catal, Cagatay Giray, Görkem Tekinerdogan, Bedir Kumar, Sandeep Shukla, Suyash
Published in
Knowledge and information systems
Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To avoid and mitigate the risks of these attacks, several phishing detection approaches were developed, among which deep learning a...
Rizzi, Williams Di Francescomarino, Chiara Ghidini, Chiara Maggi, Fabrizio Maria
Published in
Knowledge and information systems
Existing well-investigated Predictive Process Monitoring techniques typically construct a predictive model based on past process executions and then use this model to predict the future of new ongoing cases, without the possibility of updating it with new cases when they complete their execution. This can make Predictive Process Monitoring too rigi...
Bouarroudj, Wissem Boufaida, Zizette Bellatreche, Ladjel
Published in
Knowledge and Information Systems
The ever-growing usage of knowledge graphs (KGs) positions named entity disambiguation (NED) at the heart of designing accurate KG-driven systems such as query answering systems (QAS). According to the current research, most studies dealing with NED on KGs involve long texts, which is not the case of short text fragments, identified by their limite...
Chen, Junde Yang, Shuangyuan Zhang, Defu Nanehkaran, Y A
Published in
Knowledge and information systems
Stock market prediction is extremely important for investors because knowing the future trend of stock prices will reduce the risk of investing capital for profit. Therefore, seeking an accurate, fast, and effective approach to identify the stock market movement is of great practical significance. This study proposes a novel turning point predictio...
Debruyne, Christophe Pandit, Harshvardhan J. Lewis, Dave O’Sullivan, Declan
Published in
Knowledge and Information Systems
Data processing is increasingly becoming the subject of various policies and regulations, such as the European General Data Protection Regulation (GDPR) that came into effect in May 2018. One important aspect of GDPR is informed consent, which captures one’s permission for using one’s personal information for specific data processing purposes. Orga...
Bian, Yuchen Luo, Dongsheng Yan, Yaowei Cheng, Wei Wang, Wei Zhang, Xiang
Published in
Knowledge and Information Systems
Local community detection, which aims to find a target community containing a set of query nodes, has recently drawn intense research interest. The existing local community detection methods usually assume all query nodes are from the same community and only find a single target community. This is a strict requirement and does not allow much flexib...