Skip to main content

and
  1. Article

    Open Access

    Structural entropy minimization combining graph representation for money laundering identification

    Money laundering identification (MLI) is a challenging task for financial AI research and application due to its massive transaction volume, label sparseness, and label bias. Most of the existing MLI methods f...

    Shaojiang Wang, Pengcheng Wang, Bin Wu in International Journal of Machine Learning … (2024)

  2. Article

    Open Access

    Field investigation combined with modeling uncovers the ecological heterogeneity of Aedes albopictus habitats for strategically improving systematic management during urbanization

    Aedes albopictus is an invasive vector of serious Aedes-borne diseases of global concern. Habitat management remains a critical factor for establishing a cost-effective systematic strategy for sustainable vector ...

    **ang Guo, Lei Luo, Yuxiang Long, **ying Teng, Yuehong Wei in Parasites & Vectors (2023)

  3. No Access

    Article

    Overexpression of LncRNA PSMG3-AS1 Distinguishes Glioblastomas from Sarcoidosis

    In clinical practices, glioblastomas (GBM) in some cases can be misdiagnosed as sarcoidosis. This study aimed to develop a biomarker to distinguish GBM from sarcoidosis. In this study, we found that PSMG3-AS1 ...

    Liusheng Chen, Guanliang Wang, Zihui Xu, Kailong Lin in Journal of Molecular Neuroscience (2020)

  4. Article

    Open Access

    A field-based modeling study on ecological characterization of hourly host-seeking behavior and its associated climatic variables in Aedes albopictus

    The global spread of mosquito-borne diseases (MBD) has presented increasing challenges to public health. The transmission of MBD is mainly attributable to the biting behaviors of female mosquitoes. However, th...

    Qingqing Yin, Li Li, **ang Guo, Rangke Wu, Benyun Shi, Yuji Wang in Parasites & Vectors (2019)

  5. No Access

    Article

    Rectangle Transformation Problem

    In this paper, we propose the rectangle transformation problem (RTP) and its variants. RTP asks for rectangle partitions on two rectangles of the same area which produce two identical sets of pieces. We are in...

    Shaojiang Wang, Kun He, Yicheng Pan, Mingji **a in Algorithmica (2019)

  6. No Access

    Chapter and Conference Paper

    Navigating a Shortest Path with High Probability in Massive Complex Networks

    In this paper, we study the problem of point-to-point shortest path query in massive complex networks. Nowadays a breadth first search in a network containing millions of vertices may cost a few seconds and it...

    Jun Liu, Yicheng Pan, Qifu Hu, Angsheng Li in Analysis of Experimental Algorithms (2019)

  7. Article

    Open Access

    Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure

    Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan in Scientific Reports (2016)

  8. Article

    Open Access

    Three-Dimensional Gene Map of Cancer Cell Types: Structural Entropy Minimisation Principle for Defining Tumour Subtypes

    In this study, we propose a method for constructing cell sample networks from gene expression profiles and a structural entropy minimisation principle for detecting natural structure of networks and for identi...

    Angsheng Li, **anchen Yin, Yicheng Pan in Scientific Reports (2016)

  9. Article

    Open Access

    Homophyly/Kinship Model: Naturally Evolving Networks

    It has been a challenge to understand the formation and roles of social groups or natural communities in the evolution of species, societies and real world networks. Here, we propose the hypothesis that homoph...

    Angsheng Li, Jiankou Li, Yicheng Pan, **anchen Yin, ** Yong in Scientific Reports (2015)

  10. No Access

    Article

    Strategies for network security

    Security of networks has become an increasingly important issue in the highly connected world. Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information ...

    AngSheng Li, XueChen Li, YiCheng Pan, Wei Zhang in Science China Information Sciences (2015)

  11. No Access

    Article

    Global core, and galaxy structure of networks

    We propose a novel approach, namely local reduction of networks, to extract the global core (GC, for short) from a complex network. The algorithm is built based on the small community phenomenon of networks. The ...

    Wei Zhang, YiCheng Pan, Pan Peng, JianKou Li in Science China Information Sciences (2014)

  12. No Access

    Chapter and Conference Paper

    Principles of Network Computing

    In the new century, the study of networks is being developed rapidly. Traditional algorithms based on the classical graph theory have not been able to cope with large scaled networks due to their inefficiency....

    Yicheng Pan in Theory and Applications of Models of Computation (2012)

  13. No Access

    Chapter and Conference Paper

    Characterizations of Locally Testable Linear- and Affine-Invariant Families

    The linear- or affine-invariance is the property of a function family that is closed under linear- or affine- transformations on the domain, and closed under linear combinations of functions, respectively. Bot...

    Angsheng Li, Yicheng Pan in Computing and Combinatorics (2011)

  14. No Access

    Chapter and Conference Paper

    Development of a Control System for Automating of Spiral Concentrators in Coal Preparation Plants

    Spiral concentrators have been widely used in coal preparation plants in Illinois and elsewhere to clean 1 mm ×150 μm particle size coal fraction. The major factors which have made spiral concentrator so popul...

    Josh Hoelscher, Yicheng Pan, Manoj Mohanty, Jarlen Don, Tsuchin Chu in Dynamical Systems (2010)

  15. No Access

    Chapter and Conference Paper

    Input Design for Systems Under Identification as Applied to Ultrasonic Transducers

    An input design system identification (IDSI) method is outlined in this chapter based on input/output data gathered from random excitation of a system so as to excite all modes. The data set is then used to co...

    Nishant Unnikrishnan, Yicheng Pan, Marco Schoen, Ajay Mahajan in Dynamical Systems (2010)

  16. No Access

    Chapter and Conference Paper

    Definable Filters in the Structure of Bounded Turing Reductions

    In this article, we show that there exist c.e. bounded Turing degrees \(\textbf{a}\) ,

    Angsheng Li, Weilin Li, Yicheng Pan in Theory and Applications of Models of Compu… (2008)