Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    A novel rule generation and activation method for extended belief rule-based system based on improved decision tree

    Among many classifiers applied to classification problems, the extended belief rule-based (EBRB) system is a powerful tool with the ability to handle both qualitative and quantitative information under uncerta...

    Junwen Ma, An Zhang, Fei Gao, Wenhao Bi, Changhong Tang in Applied Intelligence (2023)

  2. Article

    DC-CNN: Dual-channel Convolutional Neural Networks with attention-pooling for fake news detection

    Fake news detection mainly relies on the extraction of article content features with neural networks. However, it has brought some challenges to reduce the noisy data and redundant features, and learn the long...

    Kun Ma, Changhao Tang, Weijuan Zhang, Benkuan Cui, Ke Ji in Applied Intelligence (2023)

  3. Article

    Long text feature extraction network with data augmentation

    The spread of COVID-19 has had a serious impact on either work or the lives of people. With the decrease in physical social contacts and the rise of anxiety on the pandemic, social media has become the primary...

    Changhao Tang, Kun Ma, Benkuan Cui, Ke Ji, Ajith Abraham in Applied Intelligence (2022)

  4. No Access

    Article

    An intelligent deep learning-enabled recommendation algorithm for teaching music students

    The existing research on data analysis and personalized recommendation algorithms for music mainly focuses on improving traditional recommendation systems such as classical collaborative filtering recommendati...

    Changfei Tang, Jun Zhang in Soft Computing (2022)

  5. No Access

    Chapter and Conference Paper

    A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical Systems

    Recently, blockchain was introduced into the cyber-physical systems, which provides services of privacy and trust. However, reliability and system performance issues exist when blockchain and cyber-physical sy...

    Fang Ouyang, Zheng Bao, Lixiao Zhou in Wireless Algorithms, Systems, and Applicat… (2022)

  6. No Access

    Article

    Joint dictionary and graph learning for unsupervised feature selection

    With the explosion of unlabelled and high-dimensional data, unsupervised feature selection has become an critical and challenging problem in machine learning. Recently, data representation based model has been...

    Deqiong Ding, Fei **a, **aogao Yang, Chang Tang in Applied Intelligence (2020)

  7. No Access

    Chapter and Conference Paper

    A Blockchain-Based Crowdsourcing System with QoS Guarantee via a Proof-of-Strategy Consensus Protocol

    Crowdsourcing technology has been widely used in the online matching system, e.g., Uber and Airbnb, which provides an efficient matching service and enables a balance between service supply and demand. The cur...

    Xusheng Cai, Yue Wang, Feilong Lin, Changbing Tang in Blockchain and Trustworthy Systems (2020)

  8. Article

    Open Access

    Bus-OLAP: A Data Management Model for Non-on-Time Events Query Over Bus Journey Data

    Increasing the on-time rate of bus service can prompt the people’s willingness to travel by bus, which is an effective measure to mitigate the city traffic congestion. Performing queries on the bus arrival can...

    Lei Duan, Tinghai Pang, Jyrki Nummenmaa, Jie Zuo in Data Science and Engineering (2018)

  9. No Access

    Chapter and Conference Paper

    A Large Scale RGB-D Dataset for Action Recognition

    Human activity understanding from RGB-D data has attracted increasing attention since the first work reported in 2010. Over this period, many benchmark datasets have been created to facilitate the development ...

    **g Zhang, Wanqing Li, Pichao Wang in Understanding Human Activities Through 3D … (2018)

  10. No Access

    Article

    Trajectory Tracking Control for Quadrotor Robot Subject to Payload Variation and Wind Gust Disturbance

    This work proposes a hierarchical nonlinear control scheme for quadrotor to track 3D trajectory subject to payload variation and fast time-varying wind gust disturbance. In terms of dynamics model, the 6 DOF d...

    Chen Wang, Bifeng Song, Panfeng Huang in Journal of Intelligent & Robotic Systems (2016)

  11. No Access

    Chapter and Conference Paper

    Mining Top-k Distinguishing Sequential Patterns with Flexible Gap Constraints

    Distinguishing sequential pattern (DSP) mining has been widely employed in many applications, such as building classifiers and comparing/analyzing protein families. However, in previous studies on DSP mining, ...

    Chao Gao, Lei Duan, Guozhu Dong, Haiqing Zhang, Hao Yang in Web-Age Information Management (2016)

  12. No Access

    Article

    Mining outlying aspects on numeric data

    When we are investigating an object in a data set, which itself may or may not be an outlier, can we identify unusual (i.e., outlying) aspects of the object? In this paper, we identify the novel problem of mining...

    Lei Duan, Guanting Tang, Jian Pei, James Bailey in Data Mining and Knowledge Discovery (2015)

  13. No Access

    Chapter and Conference Paper

    Hierarchical Community Evolution Mining from Dynamic Networks

    Research on community evolution contributes to understanding the nature of network evolution. Previous community evolution studies have two defects: (1) the algorithms do not have sufficient stability or canno...

    Yonghui Zhang, Chuan Li, Yanmei Li, Changjie Tang in Web-Age Information Management (2015)

  14. No Access

    Chapter and Conference Paper

    Mining Contrast Subspaces

    In this paper, we tackle a novel problem of mining contrast subspaces. Given a set of multidimensional objects in two classes C  +  and C  − and a query object o, we want to find t...

    Lei Duan, Guanting Tang, Jian Pei in Advances in Knowledge Discovery and Data M… (2014)

  15. No Access

    Chapter and Conference Paper

    Mining Frequent Closed Sequential Patterns with Non-user-defined Gap Constraints

    Frequent closed sequential pattern mining plays an important role in sequence data mining and has a wide range of applications in real life, such as protein sequence analysis, financial data investigation, and...

    Wentao Wang, Lei Duan, Jyrki Nummenmaa, Song Deng in Advanced Data Mining and Applications (2014)

  16. Article

    Open Access

    Agile Prediction of Ongoing Temporal Sequences Based on Dominative Random Subsequences

    This paper identifies a new paradigm of prediction, Agile Prediction of ongoing temporal sequences, which achieves an acceptable accuracy just by the historical subsequences as short as possible and as close to t...

    Ning Yang, Changjie Tang in International Journal of Computational Intelligence Systems (2013)

  17. No Access

    Chapter and Conference Paper

    Searching Similar Trajectories in Real Time: An Effectiveness and Efficiency Study

    Searching similar trajectories in real time has been a challenging task in a large variety of location-aware applications. This paper addresses its two key issues, i.e. evaluating the similarity between two tr...

    Yuchi Ma, Chunyan Qu, Tingting Liu, Ning Yang in Web-Age Information Management (2012)

  18. No Access

    Chapter and Conference Paper

    Detection of High-Risk Zones and Potential Infected Neighbors from Infectious Disease Monitoring Data

    Detecting the high-risk zones as well as potential infected geographical neighbor is necessary and important to reduce the loss caused by infectious disease. However, it is a challenging work, since the outbre...

    Biying Tan, Lei Duan, Chi Gou, Shuyang Huang in Database Systems for Advanced Applications (2012)

  19. Article

    Open Access

    Mining Multi-scale Intervention Rules from Time Series and Complex Network

    This paper proposes the concept of intervention rule which tries to reveal the interventional relationship between elements in a system in the following three aspects. (1) Casual relationship. Intervention rul...

    Jiaoling Zheng, Changjie Tang, Shaojie Qiao in International Journal of Computational Int… (2011)

  20. No Access

    Chapter and Conference Paper

    Early Prediction of Temporal Sequences Based on Information Transfer

    In recent years, early prediction for ongoing sequences has been more and more valuable in a large variety of time-critical applications which demand to classify an ongoing sequence in its early stage. There a...

    Ning Yang, Jian Peng, Yu Chen, Changjie Tang in Web-Age Information Management (2011)

previous disabled Page of 3