| Deep adversarial metric learning for cross-modal retrieval |
38 |
| E-voting scheme using secret sharing and K-anonymity |
30 |
| Multi-scale deep context convolutional neural networks for semantic segmentation |
23 |
| LoTAD: long-term traffic anomaly detection based on crowdsourced bus trajectory data |
20 |
| Towards secure and truthful task assignment in spatial crowdsourcing |
12 |
| Approximate spatio-temporal top-k publish/subscribe |
12 |
| Semantic-aware top-k spatial keyword queries |
9 |
| On fusing the latent deep CNN feature for image classification |
9 |
| Machine learning based fast multi-layer liquefaction disaster assessment |
9 |
| Leveraging multi-aspect time-related influence in location recommendation |
8 |
| Time-aware metric embedding with asymmetric projection for successive POI recommendation |
8 |
| Attention based hierarchical LSTM network for context-aware microblog sentiment classification |
8 |
| SemRec: a personalized semantic recommendation method based on weighted heterogeneous information networks |
7 |
| Recommendations based on a heterogeneous spatio-temporal social network |
6 |
| Temporal link prediction in multi-relational network |
6 |
| SharkDB: an in-memory column-oriented storage for trajectory analysis |
6 |
| Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks |
6 |
| DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices |
6 |
| Neural personalized response generation as domain adaptation |
6 |
| Personalized semantic trajectory privacy preservation through trajectory reconstruction |
6 |
| An effective approach for the protection of privacy text data in the CloudDB |
6 |
| Joint user knowledge and matrix factorization for recommender systems |
6 |
| Continuous monitoring of range spatial keyword query over moving objects |
5 |
| Explainable recommendation with fusion of aspect information |
5 |
| Deep learning approaches for video-based anomalous activity detection |
5 |
| Residual attention-based LSTM for video captioning |
5 |
| An infrastructure framework for privacy protection of community medical internet of things Transmission protection, storage protection and access control |
5 |
| Personalized app recommendation based on app permissions |
5 |
| Fused matrix factorization with multi-tag, social and geographical influences for POI recommendation |
5 |
| Multimodal deep representation learning for video classification |
5 |
| A topic model for co-occurring normal documents and short texts |
4 |
| A new breast tumor ultrasonography CAD system based on decision tree and BI-RADS features |
4 |
| Trustworthy service composition with secure data transmission in sensor networks |
4 |
| User identity linkage across social networks via linked heterogeneous network embedding |
4 |
| Spatio-temporal top-k term search over sliding window |
4 |
| Discovery of accessible locations using region-based geo-social data |
4 |
| Matching user accounts across social networks based on username and display name |
4 |
| A distributed PDP model based on spectral clustering for improving evaluation performance |
4 |
| Analysis of and defense against crowd-retweeting based spam in social networks |
4 |
| Event summarization for sports games using twitter streams |
4 |
| Context-aware trust network extraction in large-scale trust-oriented social networks |
4 |
| Group recommendation based on a bidirectional tensor factorization model |
4 |
| Leveraging semantic resources in diversified query expansion |
4 |
| Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments |
4 |
| SmartVM: a SLA-aware microservice deployment framework |
4 |
| CrimeTelescope: crime hotspot prediction based on urban and social media data fusion |
4 |
| Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT |
3 |
| Dual influence embedded social recommendation |
3 |
| A novel social network hybrid recommender system based on hypergraph topologic structure |
3 |
| Tales of emotion and stock in China: volatility, causality and prediction |
3 |