Results 1 to 10 of about 186,948 (311)
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou+6 more
doaj +2 more sources
Network security and contagion [PDF]
This paper develops a theoretical model of investments in security in a network of interconnected agents. The network connections introduce the possibility of cascading failures depending on exogenous or endogenous attacks and the profile of security investments by the agents.
Azarakhsh Malekian+5 more
openaire +8 more sources
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou+3 more
doaj +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang+6 more
doaj +1 more source
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu+4 more
doaj +1 more source
Design of data leakage prevention model of virtual network ciphertext data for private cloud
In order to create a more secure network ciphertext transmission environment and avoid the leakage of network data information, an improved design of network ciphertext data leakage prevention model was proposed.
TONG Ying+4 more
doaj +1 more source
Wireless Network Security [PDF]
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks.
Yang Xiao+4 more
openaire +3 more sources
Early warning algorithm for highly sensitive network information based on deep neural network
In order to solve the problem that the traditional sensitive information early warning algorithm is difficult to cluster information effectively, a new sensitive information early warning algorithm is proposed.
Ying TONG+4 more
doaj +1 more source
Generating Chinese Event Extraction Method Based on ChatGPT and Prompt Learning
Regarding the scarcity of annotated data for existing event extraction tasks and the insufficient semantic mining of event extraction models in the Chinese domain, this paper proposes a generative joint event extraction model to improve existing models ...
Jianxun Chen, Peng Chen, Xuxu Wu
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li+4 more
doaj +1 more source