Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    MSK-Net: Multi-source Knowledge Base Enhanced Networks for Script Event Prediction

    Script event prediction (SEP) aims to choose a correct subsequent event from a candidate list, according to a chain of ordered context events. It is easy for human but difficult for machine to perform such eve...

    Shuang Yang, Daren Zha, Cong Xue in Neural Information Processing (2023)

  2. No Access

    Chapter and Conference Paper

    HAEE: Low-Resource Event Detection with Hierarchy-Aware Event Graph Embeddings

    The event detection (ED) task aims to extract structured event information from unstructured text. Recent works in ED rely heavily on annotated training data and often lack the ability to construct semantic kn...

    Guoxuan Ding, **aobo Guo, Gaode Chen, Lei Wang, Daren Zha in The Semantic Web – ISWC 2023 (2023)

  3. No Access

    Chapter and Conference Paper

    Multi-view Spatial-Temporal Enhanced Hypergraph Network for Next POI Recommendation

    Next point-of-interest (POI) recommendation has been a prominent and trending task to provide next suitable POI suggestions for users. Current state-of-the-art studies have achieved considerable performances b...

    Yantong Lai, Yijun Su, Lingwei Wei in Database Systems for Advanced Applications (2023)

  4. No Access

    Chapter and Conference Paper

    IMDb30: A Multi-relational Knowledge Graph Dataset of IMDb Movies

    Most knowledge graph embedding (KGE) models are trained and evaluated through common benchmark datasets such as WN18 and FB15k. However, these datasets belong to the general filed and have been utilized as lin...

    Wenying Feng, Daren Zha, Lei Wang in Knowledge Science, Engineering and Managem… (2022)

  5. No Access

    Chapter and Conference Paper

    Dynamic Network Embedding in Hyperbolic Space via Self-attention

    Graph Neural Networks (GNNs) have recently become increasingly popular due to their ability to learn node representations in complex graphs. Existing graph representation learning methods primarily target stat...

    Dingyang Duan, Daren Zha, **ao Yang, Nan Mu, Jiahui Shen in Web Engineering (2022)

  6. No Access

    Chapter and Conference Paper

    MACROBERT: Maximizing Certified Region of BERT to Adversarial Word Substitutions

    Deep neural networks are deemed to be powerful but vulnerable, because they will be easily fooled by carefully-crafted adversarial examples. Therefore, it is of great importance to develop models with certifie...

    Fali Wang, Zheng Lin, Zhengxiao Liu in Database Systems for Advanced Applications (2021)

  7. No Access

    Chapter and Conference Paper

    Neural Demographic Prediction in Social Media with Deep Multi-view Multi-task Learning

    Utilizing the demographic information of social media users is very essential for personalized online services. However, it is difficult to collect such information in most realistic scenarios. Luckily, the re...

    Yantong Lai, Yijun Su, Cong Xue, Daren Zha in Database Systems for Advanced Applications (2021)

  8. No Access

    Chapter and Conference Paper

    Efficient, Low-Cost, Real-Time Video Super-Resolution Network

    Video Super-Resolution (VSR) task aims to reconstruct missing high-frequency information lost in degradation. Researchers have proposed many excellent models. However, these models require large memory and hig...

    Guanqun Liu, **n Wang, Daren Zha, Lei Wang, Lin Zhao in Neural Information Processing (2021)

  9. No Access

    Chapter and Conference Paper

    Representing Knowledge Graphs with Gaussian Mixture Embedding

    Knowledge Graph Embedding (KGE) has attracted more and more attention and has been widely used in downstream AI tasks. Some proposed models learn the embeddings of Knowledge Graph (KG) into a low-dimensional c...

    Wenying Feng, Daren Zha, **aobo Guo in Knowledge Science, Engineering and Managem… (2021)

  10. No Access

    Chapter and Conference Paper

    A Robust Embedding for Attributed Networks with Outliers

    Network embedding, as a promising tool, aims to learn low-dimensional embeddings for nodes in a network. Most existing methods work well when the topological structure is closely correlated to node attributes....

    Cheng Zhang, Le Zhang, Yuanye He, Daren Zha in Neural Information Processing (2019)

  11. No Access

    Chapter and Conference Paper

    HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation

    POI (point-of-interest) recommendation as an important location-based service has been widely utilized in hel** people discover attractive locations. A variety of available check-in data provide a good oppor...

    Yijun Su, **ang Li, Daren Zha, Wei Tang, Yiwen Jiang in Neural Information Processing (2019)

  12. No Access

    Chapter and Conference Paper

    An Energy-Efficient Distributed Routing Protocol for Wireless Sensor Networks with Mobile Sinks

    Mobile sink(s) can solve the hotspot issue in static wireless sensor networks (WSNs) but also cause frequent change of network topology, increase the network overhead, and thus affect the network performance. ...

    Hengyi Wen, Tao Wang, Daren Zha, Baoxian Zhang in Ad Hoc Networks (2019)

  13. No Access

    Chapter and Conference Paper

    Node-Edge Bilateral Attributed Network Embedding

    This paper addresses attributed network embedding which maps the structural information and multi-modal attribute data into a latent space. Most existing network embedding algorithms concentrate on either node...

    **gjie Mo, Neng Gao, Ji **ang, Daren Zha in Neural Information Processing (2019)

  14. No Access

    Chapter and Conference Paper

    Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream

    Local topic detection is an important task for many applications such as local event discovery, activity recommendation and emergency warning. Recent years have witnessed growing interest in leveraging spatio-...

    Junsha Chen, Neng Gao, Cong Xue, Chenyang Tu in Database Systems for Advanced Applications (2019)

  15. No Access

    Chapter and Conference Paper

    Blockchain-Based Certificate Transparency and Revocation Transparency

    Traditional X.509 public key infrastructures (PKIs) depend on certification authorities (CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure channels. However, recent se...

    Ze Wang, **gqiang Lin, Quanwei Cai in Financial Cryptography and Data Security (2019)

  16. No Access

    Chapter and Conference Paper

    CNN-Based Chinese Character Recognition with Skeleton Feature

    Recently, the convolutional neural networks (CNNs) show the great power in dealing with various image classification tasks. However, in the task of Chinese character recognition, there is a significant problem...

    Wei Tang, Yijun Su, **ang Li, Daren Zha, Weiyu Jiang in Neural Information Processing (2018)

  17. No Access

    Chapter and Conference Paper

    EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients

    Byzantine fault tolerant (BFT) protocols enhance system safety and availability in asynchronous networks, despite the arbitrary faults at both servers and clients. A practical BFT system should be efficient in bo...

    Quanwei Cai, **gqiang Lin, Fengjun Li in International Conference on Security and P… (2015)

  18. No Access

    Chapter and Conference Paper

    Implementing a Covert Timing Channel Based on Mimic Function

    Covert timing channel is a mechanism that can be exploited by an attacker to conceal secrets in timing intervals of transmitted packets. With the development of detection techniques against such channel, it ha...

    **g Wang, Le Guan, Limin Liu, Daren Zha in Information Security Practice and Experience (2014)

  19. No Access

    Chapter and Conference Paper

    Mitigating the Malicious Trust Expansion in Social Network Service

    With the growth of Social Network Service(SNS), the trust that plays the role of connecting people brings both good user experience and threat. Trust expansion is not only the means by which the SNS users cons...

    Daren Zha, Jiwu **g, Le Kang in Information Security, Practice and Experience (2010)

  20. No Access

    Chapter and Conference Paper

    Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control

    Attribute based access control (ABAC) provides an intuitive way for security administrators to express conditions (associated with status of objects) in access control policies; however, during the design and ...

    Daren Zha, Jiwu **g, Peng Liu in Computational Science and Its Applications… (2010)