Skip to main content

previous disabled Page of 4
and
  1. Article

    Open Access

    Learning Weight Signed Network Embedding with Graph Neural Networks

    Network embedding aims to map nodes in a network to low-dimensional vector representations. Graph neural networks (GNNs) have received much attention and have achieved state-of-the-art performance in learning ...

    Zekun Lu, Qiancheng Yu, **a Li, **aoning Li, Qinwen Yang in Data Science and Engineering (2023)

  2. Article

    Open Access

    An Adaptive Elastic Multi-model Big Data Analysis and Information Extraction System

    With the diverse applications to industry and domain-specific context, multi-source information extraction on semi-structured and unstructured data, as well as across data models, is becoming more common. Howe...

    Qiang Yin, Jianhua Wang, Sheng Du, Jianquan Leng, **tao Li in Data Science and Engineering (2022)

  3. Article

    Open Access

    Deep Multiple Auto-Encoder-Based Multi-view Clustering

    Multi-view clustering (MVC), which aims to explore the underlying structure of data by leveraging heterogeneous information of different views, has brought along a growth of attention. Multi-view clustering al...

    Guowang Du, Lihua Zhou, Yudi Yang, Kevin Lü, Lizhen Wang in Data Science and Engineering (2021)

  4. Article

    Open Access

    “Show Me the Crowds!” Revealing Cluster Structures Through AMTICS

    OPTICS is a popular tool to analyze the clustering structure of a dataset visually. The created two-dimensional plots indicate very dense areas and cluster candidates in the data as troughs. Each horizontal sl...

    Florian Richter, Yifeng Lu, Daniyal Kazempour, Thomas Seidl in Data Science and Engineering (2020)

  5. No Access

    Chapter and Conference Paper

    Lexical Data Augmentation for Text Classification in Deep Learning

    This paper presents our work on using part-of-speech focused lexical substitution for data augmentation (PLSDA) to enhance the prediction capabilities and the performance of deep learning models. This paper expl...

    Rong **ang, Emmanuele Chersoni, Yunfei Long, Qin Lu in Advances in Artificial Intelligence (2020)

  6. Article

    Open Access

    Which Category Is Better: Benchmarking Relational and Graph Database Management Systems

    Over decades, relational database management systems (RDBMSs) have been the first choice to manage data. Recently, due to the variety properties of big data, graph database management systems (GDBMSs) have eme...

    Yijian Cheng, Pengjie Ding, Tongtong Wang, Wei Lu in Data Science and Engineering (2019)

  7. Article

    Open Access

    Distributed Similarity Queries in Metric Spaces

    Similarity queries, including range queries and k nearest neighbor (kNN) queries, in metric spaces have applications in many areas such as multimedia retrieval, computational biology and location-based services....

    Keyu Yang, **n Ding, Yuanliang Zhang, Lu Chen, Baihua Zheng in Data Science and Engineering (2019)

  8. No Access

    Chapter and Conference Paper

    A Novel Hybrid Sequential Model for Review-Based Rating Prediction

    Nowadays, the online interactions between users and items become diverse, and may include textual reviews as well as numerical ratings. Reviews often express various opinions and sentiments, which can alleviat...

    Yuanquan Lu, Wei Zhang, Pan Lu in Advances in Knowledge Discovery and Data M… (2019)

  9. No Access

    Book and Conference Proceedings

    Data Science

    5th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019, Guilin, China, September 20–23, 2019, Proceedings, Part I

    **aohui Cheng, Weipeng **g, **anhua Song, Prof. Zeguang Lu in Communications in Computer and Information Science (2019)

  10. No Access

    Chapter and Conference Paper

    A Convergent Differentially Private k-Means Clustering Algorithm

    Preserving differential privacy (DP) for the iterative clustering algorithms has been extensively studied in the interactive and the non-interactive settings. However, existing interactive differentially priva...

    Zhigang Lu, Hong Shen in Advances in Knowledge Discovery and Data Mining (2019)

  11. No Access

    Chapter and Conference Paper

    CompetitiveBike: Competitive Prediction of Bike-Sharing Apps Using Heterogeneous Crowdsourced Data

    In recent years, bike-sharing systems have been deployed in many cities, which provide an economical lifestyle. With the prevalence of bike-sharing systems, a lot of companies join the market, leading to incre...

    Yi Ouyang, Bin Guo, **njiang Lu, Qi Han, Tong Guo in Green, Pervasive, and Cloud Computing (2019)

  12. No Access

    Chapter and Conference Paper

    Destructive Method with High Quality and Speed to Counter Information Hiding

    Hidden information behavior is becoming more difficult to be detected, causing illegal information spreading. To counter information hiding, more complex and high-dimensional steganalysis methods are applied, ...

    Feng Liu, Xuehu Yan, Yuliang Lu in Data Science (2019)

  13. No Access

    Chapter and Conference Paper

    Online Data Fusion Using Incremental Tensor Learning

    Despite the advances in Structural Health Monitoring (SHM) which provides actionable information on the current and future states of infrastructures, it is still challenging to fuse data properly from heteroge...

    Nguyen Lu Dang Khoa, Hongda Tian, Yang Wang in Advances in Knowledge Discovery and Data M… (2019)

  14. No Access

    Chapter and Conference Paper

    Meteorological Sensor Data Storage Mechanism Based on TimescaleDB and Kafka

    The scale of meteorological sensor data increases at TB level every week. Traditional relational database is inefficient in storing and processing such data and cannot satisfy many soft requirements. However, ...

    Liqun Shen, Yuansheng Lou, Yong Chen, Ming Lu, Feng Ye in Data Science (2019)

  15. No Access

    Chapter and Conference Paper

    Survey of Methods for Time Series Symbolic Aggregate Approximation

    Time series analysis is widely used in the fields of finance, medical, and climate monitoring. However, the high dimension characteristic of time series brings a lot of inconvenience to its application. In ord...

    Lin Wang, Faming Lu, Minghao Cui, Yunxia Bao in Data Science (2019)

  16. No Access

    Chapter and Conference Paper

    AggregationNet: Identifying Multiple Changes Based on Convolutional Neural Network in Bitemporal Optical Remote Sensing Images

    The detection of multiple changes (i.e., different change types) in bitemporal remote sensing images is a challenging task. Numerous methods focus on detecting the changing location while the detailed “from-to...

    Qiankun Ye, **ankai Lu, Hong Huo, Lihong Wan in Advances in Knowledge Discovery and Data M… (2019)

  17. No Access

    Chapter and Conference Paper

    Dynamic Anomaly Detection Using Vector Autoregressive Model

    Identifying vandal users or attackers hidden in dynamic online social network data has been shown a challenging problem. In this work, we develop a dynamic attack/anomaly detection approach using a novel combi...

    Yuemeng Li, Aidong Lu, **ntao Wu in Advances in Knowledge Discovery and Data M… (2019)

  18. No Access

    Chapter and Conference Paper

    Auto-encoder Based Co-training Multi-view Representation Learning

    Multi-view learning is a learning problem that utilizes the various representations of an object to mine valuable knowledge and improve the performance of learning algorithm, and one of the significant directi...

    Run-kun Lu, Jian-wei Liu, Yuan-fang Wang in Advances in Knowledge Discovery and Data M… (2019)

  19. No Access

    Chapter and Conference Paper

    Spatio-Temporal Event Detection from Multiple Data Sources

    The proliferation of Internet-enabled smartphones has ushered in an era where events are reported on social media websites such as Twitter and Facebook. However, the short text nature of social media posts, co...

    Aman Ahuja, Ashish Baghudana, Wei Lu in Advances in Knowledge Discovery and Data M… (2019)

  20. No Access

    Chapter and Conference Paper

    An Improved Method and Implementation of Indoor Position Fingerprint Matching Localization Based on WLAN

    The position fingerprint matching methods are analyzed, this paper improves the insufficient. In the database establishment phase, an AP selection algorithm based on stability is proposed, the Gaussian filter...

    Yanling Lu, Di Zhang, Yao Cheng, Yalong Pan, Lingpan Shi in Human Centered Computing (2019)

previous disabled Page of 4