Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Safety Assessment and Risk Management of Urban Arterial Traffic Flow Based on Artificial Driving and Intelligent Network Connection: An Overview

    As the problems with managing traffic in cities get worse, this paper looks at a way to make it easier to judge safety and handle risks in the flow of traffic on major roads in cities. By combining artificial ...

    Yulong Pei, Lin Hou in Archives of Computational Methods in Engineering (2024)

  2. No Access

    Chapter and Conference Paper

    Research on Automatic Recognition Method of Action State of High-Voltage Switch Based on Multi-source Information Fusion

    This paper studies a multi-level automatic recognition method for the action state of high-voltage switch based on multi-source information fusion technology in substation. Introduce the current different meth...

    Yulong Pei, Luhai Yuan, Lei Wang in Conference Proceedings of the 2023 3rd Int… (2024)

  3. No Access

    Chapter and Conference Paper

    Research on Working State Evaluation Method of Transformer Based on KPI Assessment Index System

    The multi-level evaluation method for fuzzy comprehensive evaluation of transformer operation state based on the key performance indicator (KPI) is studied. Firstly, the KPI method is used to build the key eva...

    Yulong Pei, **grong Zheng, Lei Wang in Conference Proceedings of the 2023 3rd Int… (2024)

  4. No Access

    Chapter and Conference Paper

    Heterophily-Based Graph Neural Network for Imbalanced Classification

    Graph neural networks (GNNs) have shown promise in addressing graph-related problems, including node classification. However, in real-world scenarios, data often exhibits an imbalanced, sometimes highly-skewed...

    Zirui Liang, Yuntao Li, Tian** Huang in Complex Networks & Their Applications XII (2024)

  5. No Access

    Chapter and Conference Paper

    A Structural-Clustering Based Active Learning for Graph Neural Networks

    In active learning for graph-structured data, Graph Neural Networks (GNNs) have shown effectiveness. However, a common challenge in these applications is the underutilization of important structural informatio...

    Ricky Maulana Fajri, Yulong Pei, Lu Yin in Advances in Intelligent Data Analysis XXII (2024)

  6. No Access

    Chapter and Conference Paper

    Enhancing Adversarial Training via Reweighting Optimization Trajectory

    Despite the fact that adversarial training has become the de facto method for improving the robustness of deep neural networks, it is well-known that vanilla adversarial training suffers from daunting robust o...

    Tian** Huang, Shiwei Liu, Tianlong Chen in Machine Learning and Knowledge Discovery i… (2023)

  7. No Access

    Chapter and Conference Paper

    Hop-Count Based Self-supervised Anomaly Detection on Attributed Networks

    A number of approaches for anomaly detection on attributed networks have been proposed. However, most of them suffer from two major limitations: (1) they rely on unsupervised approaches which are intrinsically...

    Tian** Huang, Yulong Pei, Vlado Menkovski in Machine Learning and Knowledge Discovery i… (2023)

  8. No Access

    Article

    Cluster-preserving sampling algorithm for large-scale graphs

    Graph sampling is a very effective method to deal with scalability issues when analyzing large-scale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using ex...

    Jianpeng Zhang, Hongchang Chen, Dingjiu Yu in Science China Information Sciences (2022)

  9. Article

    Open Access

    ResGCN: attention-based deep residual modeling for anomaly detection on attributed networks

    Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real-world applications such as fraud and intrusion detection. Existing approaches have difficulties with three m...

    Yulong Pei, Tian** Huang, Werner van Ipenburg, Mykola Pechenizkiy in Machine Learning (2022)

  10. No Access

    Chapter and Conference Paper

    Co-Attention Based Multi-contextual Fake News Detection

    recent years, the propagation of fake news on social media has emerged as a major challenge. Several approaches have been proposed to detect fake news on social media using the content of the microblo...

    Paritosh Kapadia, Akrati Saxena, Bhaskarjyoti Das, Yulong Pei in Complex Networks XIII (2022)

  11. No Access

    Chapter and Conference Paper

    Semantic-Based Few-Shot Classification by Psychometric Learning

    Few-shot classification tasks aim to classify images in query sets based on only a few labeled examples in support sets. Most studies usually assume that each image in a task has a single and unique class asso...

    Lu Yin, Vlado Menkovski, Yulong Pei in Advances in Intelligent Data Analysis XX (2022)

  12. No Access

    Article

    Evaluation and forecast method of coordination degree between urban traffic planning and land use

    Under the background of the integration of multiple regulations, there is an urgent need for the coordinated optimization of transportation planning and land use integration in the aspects of urban overall pla...

    Lin Qi, Yulong Pei, Jun Dong in Arabian Journal of Geosciences (2021)

  13. Article

    Open Access

    Sparse evolutionary deep learning with over one million artificial neurons on commodity hardware

    Artificial neural networks (ANNs) have emerged as hot topics in the research community. Despite the success of ANNs, it is challenging to train and deploy modern ANNs on commodity hardware due to the ever-incr...

    Shiwei Liu, Decebal Constantin Mocanu in Neural Computing and Applications (2021)

  14. No Access

    Chapter and Conference Paper

    On Generalization of Graph Autoencoders with Adversarial Training

    Adversarial training is an approach for increasing model’s resilience against adversarial perturbations. Such approaches have been demonstrated to result in models with feature representations that generalize ...

    Tian** Huang, Yulong Pei, Vlado Menkovski in Machine Learning and Knowledge Discovery i… (2021)

  15. Article

    Open Access

    Exceptional spatio-temporal behavior mining through Bayesian non-parametric modeling

    Collective social media provides a vast amount of geo-tagged social posts, which contain various records on spatio-temporal behavior. Modeling spatio-temporal behavior on collective social media is an importan...

    **n Du, Yulong Pei, Wouter Duivesteijn in Data Mining and Knowledge Discovery (2020)

  16. Article

    Open Access

    struc2gauss: Structural role preserving network embedding via Gaussian embedding

    Network embedding (NE) is playing a principal role in network mining, due to its ability to map nodes into efficient low-dimensional embedding vectors. However, two major limitations exist in state-of-the-art ...

    Yulong Pei, **n Du, Jianpeng Zhang, George Fletcher in Data Mining and Knowledge Discovery (2020)

  17. Article

    Open Access

    EEG-based classification of epilepsy and PNES: EEG microstate and functional brain network features

    Epilepsy and psychogenic non-epileptic seizures (PNES) often show over-lap in symptoms, especially at an early disease stage. During a PNES, the electrical activity of the brain remains normal but in case of a...

    Negar Ahmadi, Yulong Pei, Evelien Carrette, Albert P. Aldenkamp in Brain Informatics (2020)

  18. No Access

    Chapter and Conference Paper

    Research on the Visualization Technology of the Secondary Circuit of Intelligent Substation Based on CIM/G

    With the wide application of IEC 61850, the actual electrical connection of the cable in the intelligent substation has been replaced by the other media such as the optical fiber, which directly causes the inv...

    **e Zhang, Haifeng Wang, Jian Zhang in Proceedings of PURPLE MOUNTAIN FORUM 2019-… (2020)

  19. No Access

    Chapter and Conference Paper

    Learning Structural Genetic Information via Graph Neural Embedding

    Learning continuous vector representations of genes has been proved to be conducive for many bioinformatics tasks as it can incorporate information of various sources including gene interactions and gene-disea...

    Yuan **e, Yulong Pei, Yun Lu, Haixu Tang in Bioinformatics Research and Applications (2020)

  20. No Access

    Chapter and Conference Paper

    \( LogRank^+ \) : A Novel Approach to Support Business Process Event Log Sampling

    Massive amounts of business process event logs are collected and stored by modern information systems. Numerous process discovery approaches have been proposed to extract descriptive process models from such e...

    Cong Liu, Yulong Pei, Qingtian Zeng in Web Information Systems Engineering – WISE… (2020)

previous disabled Page of 2