Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Enhanced Tensorial Self-representation Subspace Learning for Incomplete Multi-view Clustering
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 719–728https://doi.org/10.1145/3664647.3681573Incomplete Multi-View Clustering (IMVC) is a promising topic in multimedia as it breaks the data completeness assumption. Most existing methods solve IMVC from the perspective of graph learning. In contrast, self-representation learning enjoys a superior ...
- research-articleOctober 2024
FedRFC: Federated Learning with Recursive Fuzzy Clustering for improved non-IID data training
Future Generation Computer Systems (FGCS), Volume 160, Issue CPages 835–843https://doi.org/10.1016/j.future.2024.06.049AbstractIn contemporary times, artificial intelligence is extensively applied across domains, concurrently raising concerns about privacy breaches. In response, federated learning has emerged as a promising solution that allows multiple parties to ...
Highlights- Propose a fuzzy clustering-based FL framework for the under utilization of data.
- Propose a recursive bi-partitioning clustering algorithm for client partitioning.
- Design a model fusion strategy to enhance the performance of ...
- research-articleOctober 2024JUST ACCEPTED
An Unbiased Risk Estimator for Partial Label Learning with Augmented Classes
ACM Transactions on Intelligent Systems and Technology (TIST), Just Accepted https://doi.org/10.1145/3700137Partial Label Learning (PLL) is a typical weakly supervised learning task, which assumes each training instance is annotated with a set of candidate labels containing the ground-truth label. Recent PLL methods adopt identification-based disambiguation to ...
- research-articleSeptember 2024JUST ACCEPTED
- ArticleSeptember 2024
Enhancing Sequential Recommendation via Aligning Interest Distributions
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 60–73https://doi.org/10.1007/978-3-031-72356-8_5AbstractContrastive learning improves the performance of sequential recommendation models by mining self-supervised information and mitigating the impact of data sparsity and noise interference. Existing contrastive sequential recommendation models pull ...
-
- ArticleSeptember 2024
Multi-intent Driven Contrastive Sequential Recommendation
Machine Learning and Knowledge Discovery in Databases. Applied Data Science TrackPages 141–156https://doi.org/10.1007/978-3-031-70378-2_9AbstractSequential Recommendation (SR) models with auxiliary tasks of contrastive learning have achieved remarkable progress in recent years, which can effectively mine the self-supervised signals to mitigate the data sparsity problem. However, current ...
- research-articleJune 2024
‘Your Duties Are To Sweep A Floor Remotely’: Low Information Quality in Job Advertisements is a Barrier to Low-Income Job-Seekers’ Successful Use of Digital Platforms
- Sara Kingsley,
- Michael Six Silberman,
- Clara Wang,
- Robert Lambeth,
- Jiayin Zhi,
- Motahhare Eslami,
- Beibei Li,
- Jeffrey Bigham
CHIWORK '24: Proceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for WorkArticle No.: 18, Pages 1–20https://doi.org/10.1145/3663384.3663403Digital platforms have become central in job search. Job-seekers’ experiences with these platforms, however, is a relatively new research area. This paper presents findings from 27 interviews with US low-income job-seekers. Job-seekers encountered many ...
- research-articleJuly 2024
A multi-node attack scheme based on community partitioning in large scale infrastructure networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue Chttps://doi.org/10.1016/j.comnet.2024.110386AbstractNode attack plays a vital role in evaluating the reliability of large scale infrastructure networks, which has attracted intensive research interests. Unfortunately, most of them focus on single node attack. Multi-node attack based on MBA (Module ...
- research-articleJune 2024
A robust Wide & Deep learning framework for log-based anomaly detection
AbstractLog-based anomaly detections have shown huge commercial potential in system maintenance. However, existing methods encounter two practical challenges. Firstly, they struggle to maintain consistent performance when dealing with evolving logs over ...
Highlights- An optimized algorithm is designed for log templates generation and compression.
- A Wide & Deep model is designed for log-based anomaly detection.
- Our method achieves higher peformance and robustness compared with existing methods.
- research-articleFebruary 2024
FishTrack: Multi-object tracking method for fish using spatiotemporal information fusion
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PEhttps://doi.org/10.1016/j.eswa.2023.122194Highlights- FishTrack, a transformer-based, joint multi-fish tracking method is proposed.
- An Encoder is designed to fuse the historical position information iteratively.
- Appearance and motion models are decoded in a decoupled manner.
- A ...
Tracking the fish is a key step in analyzing fish behavior, evaluating their health levels, and warning of abnormal water quality, so it is of significant importance for intelligent monitoring in fish farming. However, multi-object tracking for ...
- research-articleFebruary 2024
Detection and Identification of Non-cooperative UAV Using a COTS mmWave Radar
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 2Article No.: 44, Pages 1–22https://doi.org/10.1145/3638767Small Unmanned Aerial Vehicles (UAVs) are becoming potential threats to security-sensitive areas and personal privacy. A UAV can shoot photos at height, but how to detect such an uninvited intruder is an open problem. This article presents mmHawkeye, a ...
- research-articleSeptember 2024
Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 8982–8997https://doi.org/10.1109/TIFS.2024.3455109Cancellable biometrics is essential for preserving sensitive biometric information from potential exposure. Existing studies usually convert real-valued biometric vectors into protected templates by randomly generated transformation keys. However, this ...
- research-articleMarch 2024
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4780–4793https://doi.org/10.1109/TIFS.2024.3382589Recent studies have demonstrated that malicious adversaries are capable of fingerprinting Internet of Things (IoT) devices in a smart home and further causing privacy breaches. However, many existing anti-fingerprinting schemes, either by traffic padding ...
- research-articleDecember 2023
Ridesharing and Digital Resilience for Urban Anomalies: Evidence from the New York City Taxi Market
Information Systems Research (INFORMS-ISR), Volume 34, Issue 4Pages 1775–1790https://doi.org/10.1287/isre.2023.1212This article investigates how and why the traditional on-demand service (i.e., taxies) and ridesharing platforms (e.g., Uber) perform in contexts of urban uncertainty. We consider different types of unexpected urban anomalies and collect large-scale trip ...
Urban anomalies bring uncertainties to society, urban transportation systems, and businesses. Some urban anomalies, such as no-notice and/or unpredictable terrorist attacks or other urban strikes, if not handled in timely ways may result in loss of life ...
- ArticleNovember 2023
Gemini: A Dual-Task Co-training Model for Partial Label Learning
AI 2023: Advances in Artificial IntelligencePages 328–340https://doi.org/10.1007/978-981-99-8388-9_27AbstractPartial-Label Learning (PLL) is an important weakly supervised learning task that assumes each training instance is annotated with a set of candidate labels. In recent years, self-training PLL models, which learn label confidence vectors and train ...
- research-articleFebruary 2024
An artificial immunity based intrusion detection system for unknown cyberattacks
AbstractThe evolving unknown cyberattacks have rapidly expanded the cyber threat landscape. Identifying unknown cyberattacks, therefore, remains a challenging issue, compounded by the widespread implementation of emerging technologies, such as 5G, ...
Highlights- The artificial immunity based intrusion detection effectively detects unknown attacks.
- Possible unknown attacks are created by evolution algorithm for generating detectors.
- The filtering mechanism designed for evolved antigens ...
- research-articleNovember 2023
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things
Future Generation Computer Systems (FGCS), Volume 148, Issue CPages 367–379https://doi.org/10.1016/j.future.2023.06.011AbstractRecent years have witnessed an increased attack surface of the Industrial Internet of Things (IIoT), as the deep convergence of the Internet of Things (IoT) and other information and communications technologies (ICTs). However, the massive ...
Highlights- Presenting a novel artificial immunity based distributed and fast anomaly detection system for IIoT.
- Designing a new negative selection based hyper-dimensional anomaly detector generation model.
- Crafting a point-hyperspace tree ...
- research-articleOctober 2023
Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach
Future Generation Computer Systems (FGCS), Volume 147, Issue CPages 136–148https://doi.org/10.1016/j.future.2023.05.002AbstractEmerging as a promising distributed learning paradigm, federated learning (FL) has been widely adopted in many fields. Nonetheless, a big challenge for FL in real-world implementation is Byzantine attacks, where compromised clients can mislead or ...
Highlights- Design a new federated learning architecture supporting various deep learning models.
- Craft a ‘phishing’ method to detect Byzantine attacks in federated learning.
- Present a Bayesian inference-based mechanism to evaluate the ...
- ArticleSeptember 2023
A Vlogger-augmented Graph Neural Network Model for Micro-video Recommendation
Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo TrackPages 684–699https://doi.org/10.1007/978-3-031-43427-3_41AbstractExisting micro-video recommendation models exploit the interactions between users and micro-videos and/or multi-modal information of micro-videos to predict the next micro-video a user will watch, ignoring the information related to vloggers, i.e.,...