Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    ADGCN: A Weakly Supervised Framework for Anomaly Detection in Social Networks

    Detecting abnormal users in social networks is crucial for protecting user privacy and preventing criminal activities. However, existing graph learning methods have limitations. Unsupervised methods focus on t...

    Zhixiang Shen, Tianle Zhang, Haolan He in Neural Information Processing (2024)

  2. No Access

    Chapter and Conference Paper

    PRoA: A Probabilistic Robustness Assessment Against Functional Perturbations

    In safety-critical deep learning applications robustness measurement is a vital pre-deployment phase. However, existing robustness verification methods are not sufficiently practical for deploying machine lear...

    Tianle Zhang, Wenjie Ruan in Machine Learning and Knowledge Discovery i… (2023)

  3. No Access

    Chapter and Conference Paper

    Semantic Perception Swarm Policy with Deep Reinforcement Learning

    Swarm systems with simple, homogeneous and autonomous individuals can efficiently accomplish specified complex tasks. Recent works have shown the power of deep reinforcement learning (DRL) methods to learn coo...

    Tianle Zhang, Zhen Liu, Zhiqiang Pu, Jianqiang Yi in Neural Information Processing (2021)

  4. No Access

    Chapter and Conference Paper

    Data Storage Method for Fast Retrieval in IoT

    Nowadays, data query in the Internet of Things (IoT) is suffering from high latency as increasing amounts of data collected by devices every day. In this paper, we focus on data retrieval and present a novel s...

    Juan Chen, Lihua Yin, Tianle Zhang, Yan Liu in Communications, Signal Processing, and Sys… (2020)

  5. No Access

    Chapter and Conference Paper

    Review of the Electric Vehicle Charging Station Location Problem

    In order to encourage energy conservation and emission reduction, electric vehicles (EV) have gradually become one of the most important emerging strategic industries in many countries. With the gradual maturi...

    Yu Zhang, **angtao Liu, Tianle Zhang in Dependability in Sensor, Cloud, and Big Da… (2019)

  6. No Access

    Chapter and Conference Paper

    Emergency Analysis Based on Affective Computing in Universities Forum

    Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The me...

    Lu Zhang, Xu Wu, **aqing **e, ** Xu, Tianle Zhang in Artificial Intelligence and Security (2019)

  7. No Access

    Chapter and Conference Paper

    An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data

    When the datasets about online public opinion are imbalanced, the classifier is prone to sacrifice the accuracy of minority class to achieve the overall best performance. In order to solve this problem, an onl...

    **ge Dang, Xu Wu, **aqing **e, Tianle Zhang in Artificial Intelligence and Security (2019)

  8. No Access

    Chapter and Conference Paper

    Short Text Topic Recognition and Optimization Method for University Online Community

    The university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post...

    Xu Wu, Haitao Wu, **aqing **e, ** Xu, Tianle Zhang in Artificial Intelligence and Security (2019)

  9. No Access

    Chapter and Conference Paper

    Understanding Information Diffusion via Heterogeneous Information Network Embeddings

    Predicting information diffusion in social networks has attracted substantial research efforts. For a specific user in a social network, whether to forward a contagion is impacted by complex interactions from ...

    Yuan Su, ** Zhang, Senzhang Wang in Database Systems for Advanced Applications (2019)

  10. No Access

    Chapter and Conference Paper

    Research on Modeling of Software Automatic Test

    Software testing is important activity in software development life cycle, automatic test can cut down cost of manual testing and to increase reliability of it. Many approaches have been proposed for automatic...

    **cui Yang, Yuyu Yuan, Tianle Zhang in Trustworthy Computing and Services (2015)

  11. No Access

    Chapter and Conference Paper

    Enhanced AllJoyn Network with Centralized Management

    The Internet of things is an exciting vision which promises to connect people with things and things with each other in ways. AllJoyn system is proposed to establish the network at the right moment. The struct...

    Linghan Li, Yonghua Li, Jiaru Lin, Tianle Zhang in Trustworthy Computing and Services (2015)

  12. No Access

    Chapter and Conference Paper

    Human Mobility Simulation in Smart Energy Grid

    Smart grid is an emerging complex system of systems that continually provide distributed communication service to enable an efficient, optimal, reliable, secure energy transmission and distribution. Rapid grow...

    Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan in Trustworthy Computing and Services (2015)

  13. No Access

    Chapter and Conference Paper

    Online Random Seeking in FLV Video Based on File Cutting

    To support online watching any part of the videos smoothly on the streaming media cluster architecture, a file cutting based random seeking technology in FLV video is proposed in this paper. Three important as...

    Zhihui Du, Wenjun Fan, Yunpeng Chai in Intelligence Computation and Evolutionary … (2013)

  14. No Access

    Chapter and Conference Paper

    A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks

    In realistic vehicular communication systems, network connections suffer from dynamic mobility and random operations of independent nodes. End to end fully connected path may never exist. VDTNs (Vehicular Dela...

    Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu in Trustworthy Computing and Services (2013)

  15. No Access

    Chapter and Conference Paper

    A Pervasive Technology Approach to Social Trustworthiness

    Growing awareness of environmental concerns has been reflected on more and more public’s attention on low carbon lifestyles. The awareness and public participation could be further enhanced and encouraged via ...

    Wang Hongqi, Zongwei Luo, Tianle Zhang, Yuyu Yuan in Trustworthy Computing and Services (2013)

  16. No Access

    Chapter and Conference Paper

    Vulnerability Evaluating Based on Attack Graph

    Networked hosts are facing more and more threats due to software vulnerabilities. Every year, there are an increasing number of security vulnerabilities discovered in software. It is impractical that we patch ...

    Chunlu Wang, Yu Bao, Xuesen Liang, Tianle Zhang in Trustworthy Computing and Services (2013)