{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:42:17Z","timestamp":1740109337758,"version":"3.37.3"},"reference-count":100,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001824","name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky","doi-asserted-by":"publisher","award":["22-21696S","22-21696S","22-21696S","22-21696S","22-21696S"],"award-info":[{"award-number":["22-21696S","22-21696S","22-21696S","22-21696S","22-21696S"]}],"id":[{"id":"10.13039\/501100001824","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In data science and content-based retrieval, we find many domain-specific techniques that employ a data processing pipeline with two fundamental steps. First, data entities are represented by some visualizations, while in the second step, the visualizations are used with a machine learning model to extract deep features. Deep convolutional neural networks (DCNN) became the standard and reliable choice. The purpose of using DCNN is either a specific classification task or just a deep feature representation of visual data for additional processing (e.g., similarity search). Whereas the deep feature extraction is a domain-agnostic step in the pipeline (inference of an arbitrary visual input), the visualization design itself is domain-dependent and ad hoc for every use case. In this paper, we survey and analyze many instances of data visualizations used with deep learning models (mostly DCNN) for domain-specific tasks. Based on the analysis, we synthesize a taxonomy that provides a systematic overview of visualization techniques suitable for usage with the models. The aim of the taxonomy is to enable the future generalization of the visualization design process to become completely domain-agnostic, leading to the automation of the entire feature extraction pipeline. As the ultimate goal, such an automated pipeline could lead to universal deep feature data representations for content-based retrieval.\n<\/jats:p>","DOI":"10.1007\/s10115-023-01933-3","type":"journal-article","created":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T14:01:47Z","timestamp":1694872907000},"page":"811-840","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Visualizations for universal deep-feature representations: survey and taxonomy"],"prefix":"10.1007","volume":"66","author":[{"given":"Tom\u00e1\u0161","family":"Skopal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ladislav","family":"Pe\u0161ka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Hoksza","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivana","family":"Sixtov\u00e1","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Bernhauer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,9,16]]},"reference":[{"key":"1933_CR1","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-030-87240-3_57","volume-title":"Medical image computing and computer assisted intervention\u2014MICCAI 2021","author":"SN Aakur","year":"2021","unstructured":"Aakur SN, Narayanan S, Indla V et al (2021) Mg-Net: Leveraging pseudo-imaging for multi-modal metagenome analysis. In: de Bruijne M, Cattin PC, Cotin S et al (eds) Medical image computing and computer assisted intervention\u2014MICCAI 2021. Springer International Publishing, Cham, pp 592\u2013602"},{"issue":"3","key":"1933_CR2","first-page":"365","volume":"20","author":"JW Ahn","year":"2013","unstructured":"Ahn JW, Plaisant C, Shneiderman B (2013) A task taxonomy for network evolution analysis. IEEE Trans Vis Comput Graph 20(3):365\u2013376","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"6","key":"1933_CR3","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1007\/s40846-018-0389-7","volume":"38","author":"MM Al Rahhal","year":"2018","unstructured":"Al Rahhal MM, Bazi Y, Al Zuair M et al (2018) Convolutional neural networks for electrocardiogram classification. J Med Biol Eng 38(6):1014\u20131025. https:\/\/doi.org\/10.1007\/s40846-018-0389-7","journal-title":"J Med Biol Eng"},{"issue":"2","key":"1933_CR4","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1080\/24751839.2020.1843121","volume":"5","author":"RH Alvi","year":"2021","unstructured":"Alvi RH, Rahman H, Khan AAS et al (2021) Deep learning approach on tabular data to predict early-onset neonatal sepsis. J Inf Telecommun 5(2):226\u2013246. https:\/\/doi.org\/10.1080\/24751839.2020.1843121","journal-title":"J Inf Telecommun"},{"key":"1933_CR5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-18197-y","author":"O Bazgir","year":"2020","unstructured":"Bazgir O, Zhang R, Dhruba SR et al (2020) Representation of features as images with neighborhood dependencies for compatibility with convolutional neural networks. Nat Commun. https:\/\/doi.org\/10.1038\/s41467-020-18197-y","journal-title":"Nat Commun"},{"issue":"102","key":"1933_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.cose.2020.102166","volume":"103","author":"AS Bozkir","year":"2021","unstructured":"Bozkir AS, Tahillioglu E, Aydos M et al (2021) Catch them alive: a malware detection approach through memory forensics, manifold learning and computer vision. Comput Secur 103(102):166. https:\/\/doi.org\/10.1016\/j.cose.2020.102166","journal-title":"Comput Secur"},{"key":"1933_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1142\/S0218001493000339","volume":"7","author":"J Bromley","year":"1993","unstructured":"Bromley J, Bentz J, Bottou L et al (1993) Signature verification using a Siamese time delay neural network. Int J Pattern Recognit Artif Intell 7:25. https:\/\/doi.org\/10.1142\/S0218001493000339","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"1933_CR8","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown T, Mann B, Ryder N et al (2020) Language models are few-shot learners. Adv Neural Inf Process Syst 33:1877\u20131901","journal-title":"Adv Neural Inf Process Syst"},{"key":"1933_CR9","doi-asserted-by":"publisher","unstructured":"Buturovi\u0107 L, Miljkovi\u0107 D (2020) A novel method for classification of tabular data using convolutional neural networks. bioRxiv https:\/\/doi.org\/10.1101\/2020.05.02.074203,https:\/\/arxiv.org\/abs\/https:\/\/www.biorxiv.org\/content\/early\/2020\/05\/03\/2020.05.02.074203.full.pdf","DOI":"10.1101\/2020.05.02.074203"},{"key":"1933_CR10","doi-asserted-by":"publisher","unstructured":"Chen J, Hu K, Yu Y et\u00a0al (2020) Software visualization and deep transfer learning for effective software defect prediction. In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering. association for computing machinery, New York, NY, USA, ICSE \u201920, p 578-589, https:\/\/doi.org\/10.1145\/3377811.3380389","DOI":"10.1145\/3377811.3380389"},{"key":"1933_CR11","unstructured":"Chengzhi Q, Chenghu Z, Tao P (2003) Taxonomy of visualization techniques and systems\u2013concerns between users and developers are different. In: Asia GIS Conference, p\u00a037"},{"key":"1933_CR12","doi-asserted-by":"crossref","unstructured":"Chi EHH (2000) A taxonomy of visualization techniques using the data state reference model. In: IEEE symposium on information visualization 2000. INFOVIS 2000. Proceedings, IEEE, pp 69\u201375","DOI":"10.1109\/INFVIS.2000.885092"},{"key":"1933_CR13","doi-asserted-by":"publisher","unstructured":"Chiu CH, Tsai YC (2020) Use text mining for financial reports analysis: long text to image converter. In: 2020 the 6th international conference on communication and information processing. Association for computing machinery, New York, NY, USA, ICCIP 2020, pp 7\u201311, https:\/\/doi.org\/10.1145\/3442555.3442557","DOI":"10.1145\/3442555.3442557"},{"issue":"7","key":"1933_CR14","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1109\/TII.2018.2822680","volume":"14","author":"Z Cui","year":"2018","unstructured":"Cui Z, Xue F, Cai X et al (2018) Detection of malicious code variants based on deep learning. IEEE Trans Ind Inf 14(7):3187\u20133196. https:\/\/doi.org\/10.1109\/TII.2018.2822680","journal-title":"IEEE Trans Ind Inf"},{"key":"1933_CR15","doi-asserted-by":"publisher","first-page":"50,426","DOI":"10.1109\/ACCESS.2021.3068854","volume":"9","author":"X Dastile","year":"2021","unstructured":"Dastile X, Celik T (2021) Making deep learning-based predictions for credit scoring explainable. IEEE Access 9:50,426-50,440. https:\/\/doi.org\/10.1109\/ACCESS.2021.3068854","journal-title":"IEEE Access"},{"key":"1933_CR16","doi-asserted-by":"publisher","unstructured":"Debayle J, Hatami N, Gavet Y (2018) Classification of time-series images using deep convolutional neural networks. In: Tenth international conference on machine vision (ICMV 2017), SPIE, pp 242\u2013249, https:\/\/doi.org\/10.1117\/12.2309486","DOI":"10.1117\/12.2309486"},{"key":"1933_CR17","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R et\u00a0al (2009) ImageNet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"1933_CR18","unstructured":"Devlin J, Chang MW, Lee K et\u00a0al (2018) BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"key":"1933_CR19","unstructured":"Donahue J, Jia Y, Vinyals O et al (2014) Decaf: a deep convolutional activation feature for generic visual recognition. In: Proceedings of the 31st international conference on international conference on machine learning, vol 32. JMLR.org, ICML\u201914, p I\u2013647\u2013I\u2013655"},{"key":"1933_CR20","unstructured":"Dosovitskiy A, Beyer L, Kolesnikov A et\u00a0al (2010) An image is worth 16x16 words: transformers for image recognition at scale. arxiv 2020. arXiv preprint arXiv:2010.11929"},{"key":"1933_CR21","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-319-25087-8_24","volume-title":"Similarity search and applications","author":"P Elias","year":"2015","unstructured":"Elias P, Sedmidubsky J, Zezula P (2015) Motion images: an effective representation of motion capture data for similarity search. In: Amato G, Connor R, Falchi F et al (eds) Similarity search and applications. Springer International Publishing, Cham, pp 250\u2013255"},{"key":"1933_CR22","doi-asserted-by":"publisher","unstructured":"Feng G, Li B, Yang M et\u00a0al (2018) V-CNN: data visualizing based convolutional neural network. In: 2018 IEEE international conference on signal processing, communications and computing (ICSPCC), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICSPCC.2018.8567781","DOI":"10.1109\/ICSPCC.2018.8567781"},{"issue":"8","key":"1933_CR23","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1021\/acs.jcim.8b00338","volume":"58","author":"M Fernandez","year":"2018","unstructured":"Fernandez M, Ban F, Woo G et al (2018) Toxic colors: the use of deep learning for predicting toxicity of compounds merely from their graphic images. J Chem Inf Model 58(8):1533\u20131543. https:\/\/doi.org\/10.1021\/acs.jcim.8b00338","journal-title":"J Chem Inf Model"},{"key":"1933_CR24","doi-asserted-by":"crossref","unstructured":"Fischer P, Dosovitskiy A, Brox T (2014) Descriptor matching with convolutional neural networks: a comparison to sift. CoRR arXiv:1405.5769","DOI":"10.1109\/CVPR.2015.7298761"},{"key":"1933_CR25","doi-asserted-by":"publisher","first-page":"43,222","DOI":"10.1109\/ACCESS.2019.2907040","volume":"7","author":"Y Gao","year":"2019","unstructured":"Gao Y, Zhang Y, Wang H et al (2019) Decoding behavior tasks from brain activity using deep transfer learning. IEEE Access 7:43,222-43,232. https:\/\/doi.org\/10.1109\/ACCESS.2019.2907040","journal-title":"IEEE Access"},{"key":"1933_CR26","doi-asserted-by":"publisher","DOI":"10.3389\/fneur.2020.00375","author":"Y Gao","year":"2020","unstructured":"Gao Y, Gao B, Chen Q et al (2020) Deep convolutional neural network-based epileptic electroencephalogram (EEG) signal classification. Front Neurol. https:\/\/doi.org\/10.3389\/fneur.2020.00375","journal-title":"Front Neurol"},{"issue":"3","key":"1933_CR27","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s13735-019-00183-w","volume":"9","author":"T Georgiou","year":"2020","unstructured":"Georgiou T, Liu Y, Chen W et al (2020) A survey of traditional and deep learning-based feature descriptors for high dimensional data in computer vision. Int J Multim Inf Retr 9(3):135\u2013170. https:\/\/doi.org\/10.1007\/s13735-019-00183-w","journal-title":"Int J Multim Inf Retr"},{"issue":"4","key":"1933_CR28","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1177\/1473871611416549","volume":"10","author":"M Gleicher","year":"2011","unstructured":"Gleicher M, Albers D, Walker R et al (2011) Visual comparison for information visualization. Inf Vis 10(4):289\u2013309","journal-title":"Inf Vis"},{"key":"1933_CR29","unstructured":"Goh GB, Siegel C, Vishnu A et\u00a0al (2017) Chemception: a deep neural network with minimal chemistry knowledge matches the performance of expert-developed QSAR\/QSPR models. arxiv:1706.06689"},{"key":"1933_CR30","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S et\u00a0al (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"issue":"7","key":"1933_CR31","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1016\/j.is.2012.05.011","volume":"38","author":"ML Hetland","year":"2013","unstructured":"Hetland ML, Skopal T, Lokoc J et al (2013) Ptolemaic access methods: Challenging the reign of the metric space model. Inf Syst 38(7):989\u20131006. https:\/\/doi.org\/10.1016\/j.is.2012.05.011","journal-title":"Inf Syst"},{"key":"1933_CR32","doi-asserted-by":"crossref","unstructured":"Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 7132\u20137141","DOI":"10.1109\/CVPR.2018.00745"},{"key":"1933_CR33","doi-asserted-by":"publisher","unstructured":"Huerta \u00c1, Mart\u00ednez-Rodrigo A, Puchol A et\u00a0al (2020) Comparison of pre-trained deep learning algorithms for quality assessment of electrocardiographic recordings. In: 2020 international conference on e-health and bioengineering (EHB), pp 1\u20134, https:\/\/doi.org\/10.1109\/EHB50910.2020.9280217","DOI":"10.1109\/EHB50910.2020.9280217"},{"key":"1933_CR34","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-030-95711-7_46","volume-title":"Artificial Intelligence and Speech Technology","author":"V Jain","year":"2022","unstructured":"Jain V, Goel M, Shah K (2022) Deep learning on small tabular dataset: Using transfer learning and image classification. In: Dev A, Agrawal SS, Sharma A (eds) Artificial Intelligence and Speech Technology. Springer International Publishing, Cham, pp 555\u2013568"},{"key":"1933_CR35","doi-asserted-by":"publisher","unstructured":"Karayev S, Trentacoste M, Han H et\u00a0al (2014) Recognizing image style. In: Proceedings of the British machine vision conference. BMVA Press, https:\/\/doi.org\/10.5244\/C.28.122","DOI":"10.5244\/C.28.122"},{"key":"1933_CR36","doi-asserted-by":"publisher","unstructured":"Karras T, Laine S, Aittala M et\u00a0al (2020) Analyzing and improving the image quality of stylegan. In: 2020 IEEE\/CVF conference on computer vision and pattern recognition, CVPR 2020, Seattle, WA, USA, June 13-19, 2020. IEEE, pp 8107\u20138116, https:\/\/doi.org\/10.1109\/CVPR42600.2020.00813","DOI":"10.1109\/CVPR42600.2020.00813"},{"issue":"1","key":"1933_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/2945.981847","volume":"8","author":"DA Keim","year":"2002","unstructured":"Keim DA (2002) Information visualization and visual data mining. IEEE Trans Vis Comput Graph 8(1):1\u20138","journal-title":"IEEE Trans Vis Comput Graph"},{"issue":"6","key":"1933_CR38","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/69.553159","volume":"8","author":"DA Keim","year":"1996","unstructured":"Keim DA, Kriegel HP (1996) Visualization techniques for mining large databases: a comparison. IEEE Trans Knowl Data Eng 8(6):923\u2013938","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1933_CR39","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, vol 25. Curran Associates, Inc., p 1097\u20131105"},{"issue":"100","key":"1933_CR40","doi-asserted-by":"publisher","first-page":"060","DOI":"10.1016\/j.ceja.2020.100060","volume":"5","author":"B Kuang","year":"2021","unstructured":"Kuang B, Nnabuife SG, Rana Z (2021) Pseudo-image-feature-based identification benchmark for multi-phase flow regimes. Chem Eng J Adv 5(100):060. https:\/\/doi.org\/10.1016\/j.ceja.2020.100060","journal-title":"Chem Eng J Adv"},{"key":"1933_CR41","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5815\/ijcnis.2020.06.03","volume":"12","author":"S Lad","year":"2020","unstructured":"Lad S, Adamuthe A (2020) Malware classification with improved convolutional neural network model. Int J Comput Netw Inf Secur 12:30\u201343. https:\/\/doi.org\/10.5815\/ijcnis.2020.06.03","journal-title":"Int J Comput Netw Inf Secur"},{"key":"1933_CR42","unstructured":"Lee B, Plaisant C, Parr CS et\u00a0al (1967\/1983) Semiology of graphics: diagrams, networks, maps. ACM Press, New York"},{"key":"1933_CR43","doi-asserted-by":"publisher","unstructured":"Lee B, Plaisant C, Parr CS et\u00a0al (2006) Task taxonomy for graph visualization. In: Proceedings of the 2006 AVI workshop on BEyond time and errors novel evaluation methods for information visualization\u2014BELIV \u201906. ACM Press, https:\/\/doi.org\/10.1145\/1168149.1168168","DOI":"10.1145\/1168149.1168168"},{"key":"1933_CR44","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1145\/3238147.3238199","volume-title":"$$\\alpha $$Diff: cross-version binary code similarity detection with DNN","author":"B Liu","year":"2018","unstructured":"Liu B, Huo W, Zhang C et al (2018) $$\\alpha $$Diff: cross-version binary code similarity detection with DNN. Association for Computing Machinery, New York, pp 667\u2013678. https:\/\/doi.org\/10.1145\/3238147.3238199"},{"issue":"12","key":"1933_CR45","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/198366.198376","volume":"37","author":"GL Lohse","year":"1994","unstructured":"Lohse GL, Biolsi K, Walker N et al (1994) A classification of visual representations. Commun ACM 37(12):36\u201350","journal-title":"Commun ACM"},{"key":"1933_CR46","unstructured":"Ma S, Zhang Z (2018) OmicsMapNet: transforming omics data to take advantage of deep convolutional neural network for discovery. arxiv:1804.05283"},{"issue":"11","key":"1933_CR47","first-page":"2579","volume":"9","author":"L Van der Maaten","year":"2008","unstructured":"Van der Maaten L, Hinton G (2008) Visualizing data using t-SNE. J Mach Learn Res 9(11):2579\u20132605","journal-title":"J Mach Learn Res"},{"issue":"2","key":"1933_CR48","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1145\/22949.22950","volume":"5","author":"J Mackinlay","year":"1986","unstructured":"Mackinlay J (1986) Automating the design of graphical presentations of relational information. ACM Trans Graph (Tog) 5(2):110\u2013141","journal-title":"ACM Trans Graph (Tog)"},{"key":"1933_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-022-00416-3","author":"A Mallik","year":"2022","unstructured":"Mallik A, Khetarpal A, Kumar S (2022) ConRec: malware classification using convolutional recurrence. J Comput Virol Hacking Tech. https:\/\/doi.org\/10.1007\/s11416-022-00416-3","journal-title":"J Comput Virol Hacking Tech"},{"issue":"7","key":"1933_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0220640","volume":"14","author":"A Mayampurath","year":"2019","unstructured":"Mayampurath A, Sanchez-Pinto LN, Carey KA et al (2019) Combining patient visual timelines with deep learning to predict mortality. PLOS ONE 14(7):1\u201312. https:\/\/doi.org\/10.1371\/journal.pone.0220640","journal-title":"PLOS ONE"},{"key":"1933_CR51","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v70.3512","author":"SZ Mohd Shaid","year":"2014","unstructured":"Mohd Shaid SZ, Maarof M (2014) Malware behaviour visualization. Jurnal Teknologi. https:\/\/doi.org\/10.11113\/jt.v70.3512","journal-title":"Jurnal Teknologi"},{"key":"1933_CR52","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-022-02155-w","author":"Kumar LVR Mohebbanaaz","year":"2022","unstructured":"Mohebbanaaz Kumar LVR, Sai YP (2022) A new transfer learning approach to detect cardiac arrhythmia from ECG signals. Signal Image Video Process. https:\/\/doi.org\/10.1007\/s11760-022-02155-w","journal-title":"Signal Image Video Process"},{"issue":"104","key":"1933_CR53","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.bspc.2022.104230","volume":"79","author":"S Nahak","year":"2023","unstructured":"Nahak S, Pathak A, Saha G (2023) Evaluation of handcrafted features and learned representations for the classification of arrhythmia and congestive heart failure in ECG. Biomed Signal Process Control 79(104):230. https:\/\/doi.org\/10.1016\/j.bspc.2022.104230","journal-title":"Biomed Signal Process Control"},{"key":"1933_CR54","doi-asserted-by":"crossref","unstructured":"Nataraj L, Karthikeyan S, Jacob G et\u00a0al (2011) Malware images: visualization and automatic classification. In: International symposium on visualization for cyber security (VizSec), https:\/\/vision.ece.ucsb.edu\/sites\/default\/files\/publications\/nataraj_vizsec_2011_paper.pdf","DOI":"10.1145\/2016904.2016908"},{"key":"1933_CR55","doi-asserted-by":"publisher","first-page":"e386","DOI":"10.7717\/peerj-cs.386","volume":"7","author":"M Naz","year":"2021","unstructured":"Naz M, Shah JH, Khan MA et al (2021) From ECG signals to images: a transformation based approach for deep learning. PeerJ Comput sci 7:e386\u2013e386. https:\/\/doi.org\/10.7717\/peerj-cs.386","journal-title":"PeerJ Comput sci"},{"key":"1933_CR56","unstructured":"Neyshabur B, Bhojanapalli S, McAllester D et\u00a0al (2017) Exploring generalization in deep learning. In: Advances in neural information processing systems, vol 30"},{"key":"1933_CR57","doi-asserted-by":"crossref","unstructured":"O\u2019Kane TW, Fife D (2021) Multivariate visualization: a taxonomy and novel visualization methods. PsyArXiv","DOI":"10.31234\/osf.io\/6m4yt"},{"issue":"10","key":"1933_CR58","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan SJ, Yang Q (2010) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1933_CR59","unstructured":"Pfitzner D, Hobbs V, Powers D (2003) A unified taxonomic framework for information visualization. In: Proceedings of the Asia-pacific symposium on information visualisation, vol 24. pp 57\u201366"},{"issue":"11","key":"1933_CR60","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1007\/s10994-021-06055-x","volume":"110","author":"JP Pinto","year":"2021","unstructured":"Pinto JP, Pimenta A, Novais P (2021) Deep learning and multivariate time series for cheat detection in video games. Mach Learn 110(11):3037\u20133057. https:\/\/doi.org\/10.1007\/s10994-021-06055-x","journal-title":"Mach Learn"},{"key":"1933_CR61","unstructured":"Radford A, Kim JW, Hallacy C et\u00a0al (2021) Learning transferable visual models from natural language supervision. CoRR arXiv:2103.00020"},{"key":"1933_CR62","unstructured":"Reed S, Akata Z, Yan X et\u00a0al (2016) Generative adversarial text to image synthesis. In: Balcan MF, Weinberger KQ (eds) Proceedings of The 33rd international conference on machine learning, proceedings of machine learning research, vol\u00a048. PMLR, New York, pp 1060\u20131069, https:\/\/proceedings.mlr.press\/v48\/reed16.html"},{"issue":"15","key":"1933_CR63","doi-asserted-by":"publisher","first-page":"10,975","DOI":"10.1007\/s11042-019-08310-9","volume":"79","author":"Z Ren","year":"2020","unstructured":"Ren Z, Chen G, Lu W (2020) Malware visualization methods based on deep convolution neural networks. Multimed Tools Appl 79(15):10,975-10,993. https:\/\/doi.org\/10.1007\/s11042-019-08310-9","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"1933_CR64","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.1039\/c9sc03414e","volume":"11","author":"AS Rifaioglu","year":"2020","unstructured":"Rifaioglu AS, Nalbat E, Atalay V et al (2020) DEEPScreen: high performance drug\u2013target interaction prediction with convolutional neural networks using 2-d structural compound representations. Chem Sci 11(9):2531\u20132557. https:\/\/doi.org\/10.1039\/c9sc03414e","journal-title":"Chem Sci"},{"issue":"4","key":"1933_CR65","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1057\/palgrave.ivs.9500161","volume":"6","author":"JF Rodrigues Jr","year":"2007","unstructured":"Rodrigues JF Jr, Traina AJ, de Oliveira MCF et al (2007) The spatial-perceptual design space: a new comprehension for data visualization. Inf Vis 6(4):261\u2013279","journal-title":"Inf Vis"},{"key":"1933_CR66","doi-asserted-by":"publisher","unstructured":"Salem M, Taheri S, Yuan J (2018) ECG arrhythmia classification using transfer learning from 2- dimensional deep CNN features. In: 2018 IEEE biomedical circuits and systems conference (BioCAS), pp 1\u20134. https:\/\/doi.org\/10.1109\/BIOCAS.2018.8584808","DOI":"10.1109\/BIOCAS.2018.8584808"},{"key":"1933_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28954-6","volume-title":"Explainable AI: interpreting, explaining and visualizing deep learning","author":"W Samek","year":"2019","unstructured":"Samek W, Montavon G, Vedaldi A et al (2019) Explainable AI: interpreting, explaining and visualizing deep learning. Springer, Berlin"},{"key":"1933_CR68","doi-asserted-by":"crossref","unstructured":"Scheibel W, Trapp M, Limberger D et\u00a0al (2020) A taxonomy of treemap visualization techniques. In: VISIGRAPP (3: IVAPP), pp 273\u2013280","DOI":"10.5220\/0009153902730280"},{"issue":"12","key":"1933_CR69","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TVCG.2013.120","volume":"19","author":"HJ Schulz","year":"2013","unstructured":"Schulz HJ, Nocke T, Heitzler M et al (2013) A design space of visualization tasks. IEEE Trans Vis Comput Graph 19(12):2366\u20132375","journal-title":"IEEE Trans Vis Comput Graph"},{"key":"1933_CR70","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-47765-6","author":"A Sharma","year":"2019","unstructured":"Sharma A, Vans E, Shigemizu D et al (2019) DeepInsight: a methodology to transform a non-image data to an image for convolution neural network architecture. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-019-47765-6","journal-title":"Sci Rep"},{"issue":"1","key":"1933_CR71","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/102377.115768","volume":"11","author":"B Shneiderman","year":"1992","unstructured":"Shneiderman B (1992) Tree visualization with tree-maps. ACM Trans Graph 11(1):92\u201399. https:\/\/doi.org\/10.1145\/102377.115768","journal-title":"ACM Trans Graph"},{"key":"1933_CR72","doi-asserted-by":"publisher","unstructured":"Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualizations. In: Proceedings 1996 IEEE symposium on visual languages. IEEE Comput. Soc. Press, https:\/\/doi.org\/10.1109\/vl.1996.545307","DOI":"10.1109\/vl.1996.545307"},{"issue":"1","key":"1933_CR73","doi-asserted-by":"publisher","first-page":"20,701","DOI":"10.1038\/s41598-020-77745-0","volume":"10","author":"P Silva","year":"2020","unstructured":"Silva P, Luz E, Silva G et al (2020) Towards better heartbeat segmentation with deep learning classification. Sci Rep 10(1):20,701. https:\/\/doi.org\/10.1038\/s41598-020-77745-0","journal-title":"Sci Rep"},{"key":"1933_CR74","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"issue":"4","key":"1933_CR75","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1292609.1292619","volume":"32","author":"T Skopal","year":"2007","unstructured":"Skopal T (2007) Unified framework for fast exact and approximate search in dissimilarity spaces. ACM Trans Database Syst 32(4):29. https:\/\/doi.org\/10.1145\/1292609.1292619","journal-title":"ACM Trans Database Syst"},{"key":"1933_CR76","doi-asserted-by":"publisher","unstructured":"Skopal T (2020) On visualizations in the role of universal data representation. In: Gurrin C, J\u00f3nsson B\u00de, Kando N et\u00a0al (eds) Proceedings of the 2020 on international conference on multimedia retrieval, ICMR 2020, Dublin, Ireland, June 8-11, 2020. ACM, pp 362\u2013367, https:\/\/doi.org\/10.1145\/3372278.3390743","DOI":"10.1145\/3372278.3390743"},{"issue":"4","key":"1933_CR77","doi-asserted-by":"publisher","first-page":"34:1","DOI":"10.1145\/1978802.1978813","volume":"43","author":"T Skopal","year":"2011","unstructured":"Skopal T, Bustos B (2011) On nonmetric similarity search problems in complex domains. ACM Comput Surv 43(4):34:1-34:50. https:\/\/doi.org\/10.1145\/1978802.1978813","journal-title":"ACM Comput Surv"},{"key":"1933_CR78","doi-asserted-by":"publisher","first-page":"30,441","DOI":"10.1109\/ACCESS.2021.3059589","volume":"9","author":"SP Sotiroudis","year":"2021","unstructured":"Sotiroudis SP, Sarigiannidis P, Goudos SK et al (2021) Fusing diverse input modalities for path loss prediction: a deep learning approach. IEEE Access 9:30,441-30,451. https:\/\/doi.org\/10.1109\/ACCESS.2021.3059589","journal-title":"IEEE Access"},{"key":"1933_CR79","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1117\/12.2572485","volume-title":"Applications of Machine Learning 2020, International Society for Optics and Photonics","author":"S Sreehari","year":"2020","unstructured":"Sreehari S (2020) Visualization transforms of non-spatial data for convolutional neural networks. In: Zelinski ME, Taha TM, Howe J et al (eds) Applications of Machine Learning 2020, International Society for Optics and Photonics, vol 11511. SPIE, Bellingham, pp 83\u201391. https:\/\/doi.org\/10.1117\/12.2572485"},{"key":"1933_CR80","doi-asserted-by":"publisher","unstructured":"Sun B, Yang L, Dong P et\u00a0al (2018) Super characters: a conversion from sentiment classification to image classification. In: Proceedings of the 9th workshop on computational approaches to subjectivity, sentiment and social media analysis. Association for computational linguistics, Brussels, Belgium, pp 309\u2013315, https:\/\/doi.org\/10.18653\/v1\/W18-6245, https:\/\/aclanthology.org\/W18-6245","DOI":"10.18653\/v1\/W18-6245"},{"key":"1933_CR81","unstructured":"Sun B, Yang L, Chi C et\u00a0al (2019a) Squared english word: a method of generating glyph to use super characters for sentiment analysis. In: Chhaya N, Jaidka K, Sinha AR et\u00a0al (eds) Proceedings of the 2nd workshop on affective content analysis (AffCon 2019) co-located with thirty-third AAAI conference on artificial intelligence (AAAI 2019), Honolulu, USA, January 27, 2019, CEUR Workshop Proceedings, vol 2328. CEUR-WS.org, pp 140\u2013151, http:\/\/ceur-ws.org\/Vol-2328\/4_2_paper_21.pdf"},{"key":"1933_CR82","doi-asserted-by":"crossref","unstructured":"Sun B, Yang L, Zhang W et\u00a0al (2019b) SuperTML: two-dimensional word embedding for the precognition on structured tabular data. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR) workshops","DOI":"10.1109\/CVPRW.2019.00360"},{"key":"1933_CR83","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y et\u00a0al (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"1933_CR84","unstructured":"Tan M, Le QV (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: Chaudhuri K, Salakhutdinov R (eds) Proceedings of the 36th international conference on machine learning, ICML 2019, 9\u201315 June 2019, Long Beach, California, USA, Proceedings of Machine Learning Research, vol\u00a097. PMLR, pp 6105\u20136114, http:\/\/proceedings.mlr.press\/v97\/tan19a.html"},{"issue":"8","key":"1933_CR85","first-page":"1004","volume":"4","author":"B Tang","year":"2012","unstructured":"Tang B, Wang Y (2012) Design of large-scale sensory data processing system based on cloud computing. Res J Appl Sci Eng Technol 4(8):1004\u20131009","journal-title":"Res J Appl Sci Eng Technol"},{"key":"1933_CR86","doi-asserted-by":"crossref","unstructured":"Tory M, Moller T (2004) Rethinking visualization: a high-level taxonomy. In: IEEE symposium on information visualization, IEEE, pp 151\u2013158","DOI":"10.1109\/INFVIS.2004.59"},{"key":"1933_CR87","doi-asserted-by":"crossref","unstructured":"Tweedie L (1997) Characterizing interactive externalizations. In: Proceedings of the ACM SIGCHI conference on human factors in computing systems, pp 375\u2013382","DOI":"10.1145\/258549.258803"},{"issue":"107","key":"1933_CR88","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2020.107138","volume":"171","author":"D Vasan","year":"2020","unstructured":"Vasan D, Alazab M, Wassan S et al (2020) IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171(107):138. https:\/\/doi.org\/10.1016\/j.comnet.2020.107138","journal-title":"Comput Netw"},{"key":"1933_CR89","doi-asserted-by":"publisher","unstructured":"Vu DL, Nguyen TK, Nguyen TV et\u00a0al (2019) A convolutional transformation network for malware classification. In: 2019 6th NAFOSTED conference on information and computer science (NICS), pp 234\u2013239. https:\/\/doi.org\/10.1109\/NICS48868.2019.9023876","DOI":"10.1109\/NICS48868.2019.9023876"},{"issue":"118","key":"1933_CR90","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.eswa.2022.118850","volume":"213","author":"DT V\u00e1rkonyi","year":"2023","unstructured":"V\u00e1rkonyi DT, Seixas JL, Horv\u00e1th T (2023) Dynamic noise filtering for multi-class classification of beehive audio data. Expert Syst Appl 213(118):850. https:\/\/doi.org\/10.1016\/j.eswa.2022.118850","journal-title":"Expert Syst Appl"},{"key":"1933_CR91","doi-asserted-by":"crossref","unstructured":"Wan J, Wang D, Hoi SCH et\u00a0al (2014) Deep learning for content-based image retrieval: a comprehensive study. In: MM \u201914. ACM, pp 157\u2013166","DOI":"10.1145\/2647868.2654948"},{"key":"1933_CR92","doi-asserted-by":"crossref","unstructured":"Wu Z, Lischinski D, Shechtman E (2021) Stylespace analysis: disentangled controls for stylegan image generation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 12863\u201312872","DOI":"10.1109\/CVPR46437.2021.01267"},{"key":"1933_CR93","doi-asserted-by":"publisher","first-page":"112767","DOI":"10.1109\/ACCESS.2019.2930958","volume":"7","author":"G Xu","year":"2019","unstructured":"Xu G, Shen X, Chen S et al (2019) A deep transfer convolutional neural network framework for EEG signal classification. IEEE Access 7:112767\u2013112776. https:\/\/doi.org\/10.1109\/ACCESS.2019.2930958","journal-title":"IEEE Access"},{"key":"1933_CR94","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2020.02.034","volume":"109","author":"Y Xu","year":"2020","unstructured":"Xu Y, Liu Z, Li Y et al (2020) Feature data processing: making medical data fit deep neural networks. Fut Gener Comput Syst 109:149\u2013157. https:\/\/doi.org\/10.1016\/j.future.2020.02.034","journal-title":"Fut Gener Comput Syst"},{"key":"1933_CR95","doi-asserted-by":"publisher","first-page":"47,068","DOI":"10.1109\/ACCESS.2019.2909586","volume":"7","author":"ZW Xu","year":"2019","unstructured":"Xu ZW, Liu XM, Zhang K (2019) Mechanical properties prediction for hot rolled alloy steel using convolutional neural network. IEEE Access 7:47,068-47,078. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909586","journal-title":"IEEE Access"},{"key":"1933_CR96","doi-asserted-by":"publisher","DOI":"10.3390\/s20010168","author":"CL Yang","year":"2020","unstructured":"Yang CL, Chen ZX, Yang CY (2020) Sensor classification using convolutional neural network by encoding multivariate time series as two-dimensional colored images. Sensors. https:\/\/doi.org\/10.3390\/s20010168","journal-title":"Sensors"},{"key":"1933_CR97","unstructured":"Yue S, Wang T (2017) Imbalanced malware images classification: a CNN based approach. arXiv:1708.08042"},{"key":"1933_CR98","unstructured":"Zeiler MD, Fergus R (2017) Visualizing and understanding convolutional networks. CoRR arXiv:1311.2901"},{"key":"1933_CR99","volume-title":"Similarity search: the metric space approach (Advances in database systems)","author":"P Zezula","year":"2005","unstructured":"Zezula P, Amato G, Dohnal V et al (2005) Similarity search: the metric space approach (Advances in database systems). Springer-Verlag, Berlin, Heidelberg"},{"key":"1933_CR100","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-90923-y","author":"Y Zhu","year":"2021","unstructured":"Zhu Y, Brettin T, Xia F et al (2021) Converting tabular data into images for deep learning with convolutional neural networks. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-021-90923-y","journal-title":"Sci Rep"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01933-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-023-01933-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01933-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T14:07:46Z","timestamp":1705500466000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-023-01933-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,16]]},"references-count":100,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1933"],"URL":"https:\/\/doi.org\/10.1007\/s10115-023-01933-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2023,9,16]]},"assertion":[{"value":"9 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"conflict of interest"}}]}}