Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 14, Issue 5October 2023
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Table Of Content Section
SECTION: Regular Papers
research-article
A Joint Entity and Relation Extraction Model based on Efficient Sampling and Explicit Interaction
Article No.: 77, Pages 1–18https://doi.org/10.1145/3604811

Joint entity and relation extraction (RE) construct a framework for unifying entity recognition and relationship extraction, and the approach can exploit the dependencies between the two tasks to improve the performance of the task. However, the existing ...

research-article
Causal Feature Selection in the Presence of Sample Selection Bias
Article No.: 78, Pages 1–18https://doi.org/10.1145/3604809

Almost all existing causal feature selection methods are proposed without considering the problem of sample selection bias. However, in practice, as data-gathering process cannot be fully controlled, sample selection bias often occurs, leading to spurious ...

research-article
Discovering Causes of Traffic Congestion via Deep Transfer Clustering
Article No.: 79, Pages 1–24https://doi.org/10.1145/3604810

Traffic congestion incurs long delay in travel time, which seriously affects our daily travel experiences. Exploring why traffic congestion occurs is significantly important to effectively address the problem of traffic congestion and improve user ...

research-article
Open Access
ReuseKNN: Neighborhood Reuse for Differentially Private KNN-Based Recommendations
Article No.: 80, Pages 1–29https://doi.org/10.1145/3608481

User-based KNN recommender systems (UserKNN) utilize the rating data of a target user’s k nearest neighbors in the recommendation process. This, however, increases the privacy risk of the neighbors, since the recommendations could expose the neighbors’ ...

research-article
Open Access
Reinforcement Learning for Adaptive Video Compressive Sensing
Article No.: 81, Pages 1–21https://doi.org/10.1145/3608479

We apply reinforcement learning to video compressive sensing to adapt the compression ratio. Specifically, video snapshot compressive imaging (SCI), which captures high-speed video using a low-speed camera is considered in this work, in which multiple (B) ...

research-article
Open Access
Unsupervised Graph Representation Learning with Cluster-aware Self-training and Refining
Article No.: 82, Pages 1–21https://doi.org/10.1145/3608480

Unsupervised graph representation learning aims to learn low-dimensional node embeddings without supervision while preserving graph topological structures and node attributive features. Previous Graph Neural Networks (GNN) require a large number of ...

research-article
The Privacy Issue of Counterfactual Explanations: Explanation Linkage Attacks
Article No.: 83, Pages 1–24https://doi.org/10.1145/3608482

Black-box machine learning models are used in an increasing number of high-stakes domains, and this creates a growing need for Explainable AI (XAI). However, the use of XAI in machine learning introduces privacy risks, which currently remain largely ...

research-article
Open Access
Disease Simulation in Airport Scenario Based on Individual Mobility Model
Article No.: 84, Pages 1–24https://doi.org/10.1145/3593589

As the rapid-spreading disease COVID-19 occupies the world, most governments adopt strict control policies to alleviate the impact of the virus. These policies successfully reduced the prevalence and delayed the epidemic peak, while they are also ...

note
Obfuscating the Dataset: Impacts and Applications
Article No.: 85, Pages 1–15https://doi.org/10.1145/3597936

Obfuscating a dataset by adding random noises to protect the privacy of sensitive samples in the training dataset is crucial to prevent data leakage to untrusted parties when dataset sharing is essential. We conduct comprehensive experiments to ...

research-article
Open Access
Qrowdsmith: Enhancing Paid Microtask Crowdsourcing with Gamification and Furtherance Incentives
Article No.: 86, Pages 1–26https://doi.org/10.1145/3604940

Microtask crowdsourcing platforms are social intelligence systems in which volunteers, called crowdworkers, complete small, repetitive tasks in return for a small fee. Beyond payments, task requesters are considering non-monetary incentives such as points,...

research-article
Multi-agent Reinforcement Learning-based Adaptive Heterogeneous DAG Scheduling
Article No.: 87, Pages 1–26https://doi.org/10.1145/3610300

Static scheduling of computational workflow represented by a directed acyclic graph (DAG) is an important problem in many areas of computer science. The main idea and novelty of the proposed algorithm is an adaptive heuristic or graph metric that uses a ...

research-article
DDNAS: Discretized Differentiable Neural Architecture Search for Text Classification
Article No.: 88, Pages 1–22https://doi.org/10.1145/3610299

Neural Architecture Search (NAS) has shown promising capability in learning text representation. However, existing text-based NAS neither performs a learnable fusion of neural operations to optimize the architecture nor encodes the latent hierarchical ...

research-article
Open Access
Argument Schemes and a Dialogue System for Explainable Planning
Article No.: 89, Pages 1–25https://doi.org/10.1145/3610301

Artificial Intelligence (AI) is being increasingly deployed in practical applications. However, there is a major concern whether AI systems will be trusted by humans. To establish trust in AI systems, there is a need for users to understand the reasoning ...

research-article
Robust Location Prediction over Sparse Spatiotemporal Trajectory Data: Flashback to the Right Moment!
Article No.: 90, Pages 1–24https://doi.org/10.1145/3616541

As a fundamental problem in human mobility modeling, location prediction forecasts a user’s next location based on historical user mobility trajectories. Recurrent neural networks (RNNs) have been widely used to capture sequential patterns of user visited ...

research-article
Neural Architectures for Feature Embedding in Person Re-Identification: A Comparative View
Article No.: 91, Pages 1–21https://doi.org/10.1145/3610298

Solving Person Re-Identification (Re-Id) through Deep Convolutional Neural Networks is a daunting challenge due to the small size and variety of the training data, especially in Single-Shot Re-Id, where only two images per person are available. The lack ...

research-article
Public Access
Faithful and Consistent Graph Neural Network Explanations with Rationale Alignment
Article No.: 92, Pages 1–23https://doi.org/10.1145/3616542

Uncovering rationales behind predictions of graph neural networks (GNNs) has received increasing attention over recent years. Instance-level GNN explanation aims to discover critical input elements, such as nodes or edges, that the target GNN relies upon ...

research-article
Local Self-attention-based Hybrid Multiple Instance Learning for Partial Spoof Speech Detection
Article No.: 93, Pages 1–18https://doi.org/10.1145/3616540

The development of speech synthesis technology has increased the attention toward the threat of spoofed speech. Although various high-performance spoofing countermeasures have been proposed in recent years, a particular scenario is overlooked: partially ...

SECTION: Survey Papers
survey
Open Access
Few-shot Named Entity Recognition: Definition, Taxonomy and Research Directions
Article No.: 94, Pages 1–46https://doi.org/10.1145/3609483

Recent years have seen an exponential growth (+98% in 2022 w.r.t. the previous year) of the number of research articles in the few-shot learning field, which aims at training machine learning models with extremely limited available data. The research ...

survey
Fairness in Recommendation: Foundations, Methods, and Applications
Article No.: 95, Pages 1–48https://doi.org/10.1145/3610302

As one of the most pervasive applications of machine learning, recommender systems are playing an important role on assisting human decision-making. The satisfaction of users and the interests of platforms are closely related to the quality of the ...

Subjects

Comments