Speaker | Title | ||
---|---|---|---|
T1 | Prof. Plamen Angelov Lancaster UniversitySpeaker Biography |
From Hyper-parametric towards Prototype-based Deep LearningAbstract | |
T2 | Dr. Edwin Lughofer Johannes Keppler University Austria |
Overview on Evolving Fuzzy Systems (EFS): with Application in On-line Quality Control and Predictive MaintenanceAbstract | |
T3 | Prof. Nikola Kasabov Auckland University of Technology New ZealandSpeaker Biography |
Brain-Inspired Computation based on Spiking Neural Networks: Methods, Implementations, ApplicationsAbstract | |
T4 | Dr. Sun Yajuan Singapore Institute of Manufacturing Technology Singapore |
AI for Manufacturing data analysis in Industrial 4.0 enabled production lineAbstract | |
T5 | Dr. MD Meftahul Ferdaus Nanyang Technological University Singapore |
Hyperplane based Autonomous machine learning algorithms for Data Stream Regression and controlAbstract | |
T6 | Dr. Ke Li University of Exeter UK |
Decomposition Multi-Objective Optimization: Current Developments and Future OpportunitiesAbstract | |
T7 | Dr. Fangfang Zhang et al. Victoria University of Wellington New Zealand |
Genetic Programming and Machine Learning for Job Shop SchedulingAbstract | |
T8 | Dr. Sonali Agarwal Indian Institute of InformationTechnology Allahabad, India |
Unrevealing Data Correlations with Self-Supervised LearningAbstract | |
T9 | Dr. Yannan Sun Sichuan University China |
Evolutionary computation for automating deep neural architecture designAbstract | |
T10 | Dr. P. N. Suganthan Qatar University QatarSpeaker Biography |
Randomization Based Deep and Shallow Learning Methods for Classification and ForecastingAbstract | |
T11 | Prof. Jim Tørresen University of Oslo,NorwayProf. Xin Yao Southern University of Science and Technology,China and University of Birmingham, UK |
Ethical Challenges and Opportunities within Computational Intelligence System DevelopmentAbstractMore Information | |
T12 | Prof. Dipankar Dasgupta University of MemphisSpeaker Biography |
Machine Learning Applications, Adversarial Attacks and Mitigation StrategiesAbstract |