[图书][B] Ensemble methods: foundations and algorithms

ZH Zhou - 2012 - books.google.com
An up-to-date, self-contained introduction to a state-of-the-art machine learning approach,
Ensemble Methods: Foundations and Algorithms shows how these accurate methods are …

[HTML][HTML] Random vector functional link network: recent developments, applications, and future directions

AK Malik, R Gao, MA Ganaie, M Tanveer… - Applied Soft …, 2023 - Elsevier
Neural networks have been successfully employed in various domains such as
classification, regression and clustering, etc. Generally, the back propagation (BP) based …

Radiomics: the process and the challenges

V Kumar, Y Gu, S Basu, A Berglund, SA Eschrich… - Magnetic resonance …, 2012 - Elsevier
“Radiomics” refers to the extraction and analysis of large amounts of advanced quantitative
imaging features with high throughput from medical images obtained with computed …

GABAergic signaling to astrocytes in the prefrontal cortex sustains goal-directed behaviors

S Mederos, C Sanchez-Puelles, J Esparza… - Nature …, 2021 - nature.com
GABA interneurons play a critical role in higher brain functions. Astrocytic glial cells interact
with synapses throughout the whole brain and are recognized as regulatory elements of …

Evaluation of clustering algorithms for financial risk analysis using MCDM methods

G Kou, Y Peng, G Wang - Information sciences, 2014 - Elsevier
The evaluation of clustering algorithms is intrinsically difficult because of the lack of objective
measures. Since the evaluation of clustering algorithms normally involves multiple criteria, it …

Essentials of the self-organizing map

T Kohonen - Neural networks, 2013 - Elsevier
The self-organizing map (SOM) is an automatic data-analysis method. It is widely applied to
clustering problems and data exploration in industry, finance, natural sciences, and …

Understanding membership inferences on well-generalized learning models

Y Long, V Bindschaedler, L Wang, D Bu… - arXiv preprint arXiv …, 2018 - arxiv.org
Membership Inference Attack (MIA) determines the presence of a record in a machine
learning model's training data by querying the model. Prior work has shown that the attack is …

A survey of techniques for event detection in twitter

F Atefeh, W Khreich - Computational Intelligence, 2015 - Wiley Online Library
Twitter is among the fastest‐growing microblogging and online social networking services.
Messages posted on Twitter (tweets) have been reporting everything from daily life stories to …

An extensive comparative study of cluster validity indices

O Arbelaitz, I Gurrutxaga, J Muguerza, JM Pérez… - Pattern recognition, 2013 - Elsevier
The validation of the results obtained by clustering algorithms is a fundamental part of the
clustering process. The most used approaches for cluster validation are based on internal …

Heterogeneous face attribute estimation: A deep multi-task learning approach

H Han, AK Jain, F Wang, S Shan… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
Face attribute estimation has many potential applications in video surveillance, face
retrieval, and social media. While a number of methods have been proposed for face …