Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Databases and Information Systems

Towards Locality-Aware Meta-Learning Of Tail Node Embeddings On Networks, Zemin Liu, Wentao Zhang, Yuan Fang, Xinming Zhang, Steven C. H. Hoi Oct 2020

Towards Locality-Aware Meta-Learning Of Tail Node Embeddings On Networks, Zemin Liu, Wentao Zhang, Yuan Fang, Xinming Zhang, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Network embedding is an active research area due to the prevalence of network-structured data. While the state of the art often learns high-quality embedding vectors for high-degree nodes with abundant structural connectivity, the quality of the embedding vectors for low-degree or tail nodes is often suboptimal due to their limited structural connectivity. While many real-world networks are long-tailed, to date little effort has been devoted to tail node embedding. In this paper, we formulate the goal of learning tail node embeddings as a few-shot regression problem, given the few links on each tail node. In particular, since each node resides …


Social Influence Attentive Neural Network For Friend-Enhanced Recommendation, Yuanfu Lu, Ruobing Xie, Chuan Shi, Yuan Fang, Wei Wang, Xu Zhang, Leyu Lin Sep 2020

Social Influence Attentive Neural Network For Friend-Enhanced Recommendation, Yuanfu Lu, Ruobing Xie, Chuan Shi, Yuan Fang, Wei Wang, Xu Zhang, Leyu Lin

Research Collection School Of Computing and Information Systems

With the thriving of online social networks, there emerges a new recommendation scenario in many social apps, called FriendEnhanced Recommendation (FER) in this paper. In FER, a user is recommended with items liked/shared by his/her friends (called a friend referral circle). These friend referrals are explicitly shown to users. Different from conventional social recommendation, the unique friend referral circle in FER may significantly change the recommendation paradigm, making users to pay more attention to enhanced social factors. In this paper, we first formulate the FER problem, and propose a novel Social Influence Attentive Neural network (SIAN) solution. In order to …


Meta-Learning On Heterogeneous Information Networks For Cold-Start Recommendation, Yuanfu Lu, Yuan Fang, Chuan Shi Aug 2020

Meta-Learning On Heterogeneous Information Networks For Cold-Start Recommendation, Yuanfu Lu, Yuan Fang, Chuan Shi

Research Collection School Of Computing and Information Systems

Cold-start recommendation has been a challenging problem due to sparse user-item interactions for new users or items. Existing efforts have alleviated the cold-start issue to some extent, most of which approach the problem at the data level. Earlier methods often incorporate auxiliary data as user or item features, while more recent methods leverage heterogeneous information networks (HIN) to capture richer semantics via higher-order graph structures. On the other hand, recent meta-learning paradigm sheds light on addressing cold-start recommendation at the model level, given its ability to rapidly adapt to new tasks with scarce labeled data, or in the context of …


Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao Aug 2020

Dual-Dropout Graph Convolutional Network For Predicting Synthetic Lethality In Human Cancers, Ruichu Cai, Xuexin Chen, Yuan Fang, Min Wu, Yuexing Hao

Research Collection School Of Computing and Information Systems

Motivation: Synthetic lethality (SL) is a promising form of gene interaction for cancer therapy, as it is able to identify specific genes to target at cancer cells without disrupting normal cells. As high-throughput wet-lab settings are often costly and face various challenges, computational approaches have become a practical complement. In particular, predicting SLs can be formulated as a link prediction task on a graph of interacting genes. Although matrix factorization techniques have been widely adopted in link prediction, they focus on mapping genes to latent representations in isolation, without aggregating information from neighboring genes. Graph convolutional networks (GCN) can capture …


Biane: Bipartite Attributed Network Embedding, Wentao Huang, Yuchen Li, Yuan Fang, Ju Fan, Hongxia Yang Jul 2020

Biane: Bipartite Attributed Network Embedding, Wentao Huang, Yuchen Li, Yuan Fang, Ju Fan, Hongxia Yang

Research Collection School Of Computing and Information Systems

Network embedding effectively transforms complex network data into a low-dimensional vector space and has shown great performance in many real-world scenarios, such as link prediction, node classification, and similarity search. A plethora of methods have been proposed to learn node representations and achieve encouraging results. Nevertheless, little attention has been paid on the embedding technique for bipartite attributed networks, which is a typical data structure for modeling nodes from two distinct partitions. In this paper, we propose a novel model called BiANE, short for Bipartite Attributed Network Embedding. In particular, BiANE not only models the inter-partition proximity but also models …


Semi-Supervised Co-Clustering On Attributed Heterogeneous Information Networks, Yugang Ji, Chuan Shi, Yuan Fang, Xiangnan Kong, Mingyang Yin Jul 2020

Semi-Supervised Co-Clustering On Attributed Heterogeneous Information Networks, Yugang Ji, Chuan Shi, Yuan Fang, Xiangnan Kong, Mingyang Yin

Research Collection School Of Computing and Information Systems

Node clustering on heterogeneous information networks (HINs) plays an important role in many real-world applications. While previous research mainly clusters same-type nodes independently via exploiting structural similarity search, they ignore the correlations of different-type nodes. In this paper, we focus on the problem of co-clustering heterogeneous nodes where the goal is to mine the latent relevance of heterogeneous nodes and simultaneously partition them into the corresponding type-aware clusters. This problem is challenging in two aspects. First, the similarity or relevance of nodes is not only associated with multiple meta-path-based structures but also related to numerical and categorical attributes. Second, clusters …


Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng Apr 2020

Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng

Department of Computer Science Faculty Scholarship and Creative Works

In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to …


Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie Mar 2020

Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie

Masters Theses & Doctoral Dissertations

The growing sophistication of attacks and newly emerging cyber threats requires advanced cyber threat detection systems. Although there are several cyber threat detection tools in use, cyber threats and data breaches continue to rise. This research is intended to improve the cyber threat detection approach by developing a cyber threat detection framework using two complementary technologies, search engine and machine learning, combining artificial intelligence and classical technologies.

In this design science research, several artifacts such as a custom search engine library, a machine learning-based engine and different algorithms have been developed to build a new cyber threat detection framework based …


A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath Jan 2020

A Systematic Literature Survey Of Unmanned Aerial Vehicle Based Structural Health Monitoring, Sreehari Sreenath

Theses, Dissertations and Capstones

Unmanned Aerial Vehicles (UAVs) are being employed in a multitude of civil applications owing to their ease of use, low maintenance, affordability, high-mobility, and ability to hover. UAVs are being utilized for real-time monitoring of road traffic, providing wireless coverage, remote sensing, search and rescue operations, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection. They are the next big revolution in technology and civil infrastructure, and it is expected to dominate more than $45 billion market value. The thesis surveys the UAV assisted Structural Health Monitoring or SHM literature over the last decade and categorize UAVs …


Recent Advances In Deep Learning For Object Detection, Xiongwei Wu, Doyen Sahoo, Steven C. H. Hoi Jan 2020

Recent Advances In Deep Learning For Object Detection, Xiongwei Wu, Doyen Sahoo, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Object detection is a fundamental visual recognition problem in computer vision and has been widely studied in the past decades. Visual object detection aims to find objects of certain target classes with precise localization in a given image and assign each object instance a corresponding class label. Due to the tremendous successes of deep learning based image classification, object detection techniques using deep learning have been actively studied in recent years. In this paper, we give a comprehensive survey of recent advances in visual object detection with deep learning. By reviewing a large body of recent related work in literature, …