LEADER 06283nam 22007935 450 001 9910878063003321 005 20240909112035.0 010 $a981-9754-98-4 024 7 $a10.1007/978-981-97-5498-4 035 $a(MiAaPQ)EBC31569745 035 $a(Au-PeEL)EBL31569745 035 $a(CKB)33428447200041 035 $a(DE-He213)978-981-97-5498-4 035 $a(EXLCZ)9933428447200041 100 $a20240726d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aKnowledge Science, Engineering and Management $e17th International Conference, KSEM 2024, Birmingham, UK, August 16?18, 2024, Proceedings, Part III /$fedited by Cungeng Cao, Huajun Chen, Liang Zhao, Junaid Arshad, Taufiq Asyhari, Yonghao Wang 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (438 pages) 225 1 $aLecture Notes in Artificial Intelligence,$x2945-9141 ;$v14886 311 $a981-9754-97-6 327 $a -- Knowledge Management with Optimization and Security (KMOS). -- Knowledge Enhanced Zero-Shot Visual Relationship Detection. -- WGGAL: A Practical Time Series Forecasting Framework for Dynamic Cloud Environments. -- Dynamic Splitting of Diffusion Models for Multivariate Time Series Anomaly Detection in A JointCloud Environment. -- VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective. -- LLM-Driven Ontology Learning to Augment Student Performance Analysis in Higher Education. -- DA-NAS: Learning Transferable Architecture for Unsupervised Domain Adaptation. -- Optimize rule mining based on constraint learning in knowledge graph. -- GC-DAWMAR: A Global-Local Framework for Long-Term Time Series Forecasting. -- An improved YOLOv7 based prohibited item detection model in X-ray images. -- Invisible Backdoor Attacks on Key Regions Based on Target Neurons in Self-Supervised Learning. -- Meta learning based Rumor Detection by Awareness of Social Bot. -- Financial FAQ Question-Answering System Based on Question Semantic Similarity. -- An illegal website family discovery method based on association graph clustering. -- Different Attack and Defense Types for AI Cybersecurity. .-An Improved Ultra-Scalable Spectral Clustering Assessment with Isolation Kernel. -- A Belief Evolution Model with Non-Axiomatic Logic. -- Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks against Lane Detection Models. -- Multi-mode Spatial-Temporal Data Modeling with Fully Connected Networks. -- KEEN: Knowledge Graph-enabled Governance System for Biological Assets. -- Cop: Continously Pairing of Heterogeneous Wearable Devices based on Heartbeat. -- DFDS: Data-Free Dual Substitutes Hard-Label Black-Box Adversarial Attack. -- Logits Poisoning Attack in Federated Distillation. -- DiVerFed: Distribution-Aware Vertical Federated Learning for Missing Information. -- Prompt Based CVAE Data Augmentation for Few-shot Intention Detection. -- Reentrancy Vulnerability Detection Based On Improved Attention Mechanism. -- Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. -- AI in Healthcare Data Privacy-preserving: Enhanced Trade-off between Security and Utility. -- Traj-MergeGAN: A Trajectory Privacy Preservation Model Based on Generative Adversarial Network. -- Adversarial examples for Preventing Diffusion Models from Malicious Image Edition. -- ReVFed: Representation-based Privacy-preserving Vertical Federated Learning with Heterogeneous Models. -- Logit Adjustment with Normalization and Augmentation in Few-shot Named Entity Recognition. -- New Indicators and Optimizations for Zero-Shot NAS Based on Feature Maps. 330 $aThe five-volume set LNCS 14884, 14885, 14886, 14887 & 14888 constitutes the refereed deadline proceedings of the 17th International Conference on Knowledge Science, Engineering and Management, KSEM 2024, held in Birmingham, UK, during August 16?18, 2024. The 160 full papers presented in these proceedings were carefully reviewed and selected from 495 submissions. The papers are organized in the following topical sections: Volume I: Knowledge Science with Learning and AI (KSLA) Volume II: Knowledge Engineering Research and Applications (KERA) Volume III: Knowledge Management with Optimization and Security (KMOS) Volume IV: Emerging Technology Volume V: Special Tracks. 410 0$aLecture Notes in Artificial Intelligence,$x2945-9141 ;$v14886 606 $aArtificial intelligence 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aInformation technology$xManagement 606 $aSocial sciences$xData processing 606 $aApplication software 606 $aArtificial Intelligence 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aComputer Application in Administrative Data Processing 606 $aComputer Application in Social and Behavioral Sciences 606 $aComputer and Information Systems Applications 615 0$aArtificial intelligence. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aInformation technology$xManagement. 615 0$aSocial sciences$xData processing. 615 0$aApplication software. 615 14$aArtificial Intelligence. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aComputer Application in Administrative Data Processing. 615 24$aComputer Application in Social and Behavioral Sciences. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aCao$b Cungeng$01753331 701 $aChen$b Huajun$01651544 701 $aZhao$b Liang$0979440 701 $aArshad$b Junaid$01753332 701 $aAsyhari$b Taufiq$01753333 701 $aWang$b Yonghao$01744522 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910878063003321 996 $aKnowledge Science, Engineering and Management$94189170 997 $aUNINA