Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
Explainable next POI recommendation based on spatial–temporal disentanglement representation and pseudo profile generation
AbstractThe current research in Point-of-Interest (POI) recommendation primarily aims to decipher users’ transitional patterns to predict their future location visits. Traditional approaches often intertwine various features to model these check-in ...
- research-articleFebruary 2025
Global and local hypergraph learning method with semantic enhancement for POI recommendation
Information Processing and Management: an International Journal (IPRM), Volume 62, Issue 1https://doi.org/10.1016/j.ipm.2024.103868AbstractThe deep semantic information mining extracts deep semantic features from textual data and effectively utilizes the world knowledge embedded in these features, so it is widely researched in recommendation tasks. In spite of the extensive ...
Highlights- Proposes a novel global and local hypergraph learning framework for POI recommendation Effectively captures long-term and short-term higher-order collaborative preferences.
- Develops a deep semantic enhancement method exploiting pre-...
- research-articleFebruary 2025
CBRec: A causal way balancing multidimensional attraction effect in POI recommendations
AbstractIn the next Point-of-Interest recommendation, sparse and uneven location data generate biases, resulting in homogeneous recommendation outcomes that fail to reflect user preferences. Although there are many related unbiased studies, they still ...
Highlights- Analyze impact of attraction on variables by structural causal graph.
- Build unified debiasing paradigm for different biases by intervening on attraction.
- Utilize causal inference to balance the positive and negative impacts of ...
- research-articleDecember 2024
The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3898–3912https://doi.org/10.1145/3658644.3690188Protecting system observability records (logs) from compromised OSs has gained significant traction in recent times, with several note-worthy approaches proposed. Unfortunately, none of the proposed approaches achieve high performance with tiny log ...
- research-articleDecember 2024
Rethinking Self-Supervised Semantic Segmentation: Achieving End-to-End Segmentation
IEEE Transactions on Pattern Analysis and Machine Intelligence (ITPM), Volume 46, Issue 12Pages 10036–10046https://doi.org/10.1109/TPAMI.2024.3432326The challenge of semantic segmentation with scarce pixel-level annotations has induced many self-supervised works, however most of which essentially train an image encoder or a segmentation head that produces finer dense representations, and when ...
-
- research-articleNovember 2024
TCGC: Temporal Collaboration-Aware Graph Co-Evolution Learning for Dynamic Recommendation
ACM Transactions on Information Systems (TOIS), Volume 43, Issue 1Article No.: 5, Pages 1–27https://doi.org/10.1145/3687470Dynamic recommendation systems, where users interact with items continuously over time, have been widely deployed in real-world online streaming applications. The burst of interaction stream causes a rapid evolution of both users and items. To update ...
- research-articleNovember 2024
SCFL: Spatio-temporal consistency federated learning for next POI recommendation
Information Processing and Management: an International Journal (IPRM), Volume 61, Issue 6https://doi.org/10.1016/j.ipm.2024.103852AbstractExisting personalized federated learning frameworks fail to significantly improve the personalization of user preference learning in next Point-Of-Interest (POI) recommendations, causing notable performance deficits. These frameworks do not fully ...
- research-articleOctober 2024
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 331–343https://doi.org/10.1145/3691620.3695008Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have ...
- research-articleOctober 2024
Optimizing heterogeneous elastic material distributions on 3D models
AbstractOptimizing heterogeneous elastic material distribution on a 3D part to achieve desired deformation behavior is an important task in computer-aided design and additive manufacturing. This paper presents a solution to this problem, which involves ...
Highlights- A geometric deformation-based design is incorporated into the FEM-based optimization.
- An L0-formulation is proposed for determining the material distribution from a given set of base materials.
- The adjoint method is used to derive ...
Display Omitted
- articleSeptember 2024
Pavement Crack Detection and Identification Based on Improved YOLOv8
International Journal of Cognitive Informatics and Natural Intelligence (IJCINI-IGI), Volume 18, Issue 1Pages 1–20https://doi.org/10.4018/IJCINI.356363Aiming at the problem of poor real-time performance and low precision of traditional pavement crack detection, an improved YOLOv8 algorithm is proposed to realize the automatic pavement crack detection and identification. Firstly, the crack image is ...
- research-articleSeptember 2024
SFL: A semantic-based federated learning method for POI recommendation
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121057AbstractTraditional POI recommendation systems use a centralized data storage approach to train models, posing significant risks of privacy breaches. Federated learning offers an effective solution to address user privacy concerns. However, in existing ...
- research-articleSeptember 2024
DSDRec: Next POI recommendation using deep semantic extraction and diffusion model
Information Sciences: an International Journal (ISCI), Volume 678, Issue Chttps://doi.org/10.1016/j.ins.2024.121004AbstractSemantics play a crucial role in many AI tasks, yet the lack of high-quality textual data in LBSNs hampers deep semantic feature learning. Sparse user check-in records, characterized by significant spatial or temporal intervals (cut points), ...
- research-articleAugust 2024
UIHASH: detecting similar android uis through grid-based visual appearance representation
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 38, Pages 665–682User interfaces (UIs) is the main channel for users to interact with mobile apps. As such, attackers often create similar-looking UIs to deceive users, causing various security problems, such as spoofing and phishing. Prior studies identify these similar ...
- research-articleApril 2024
Automatic Root Cause Analysis via Large Language Models for Cloud Incidents
- Yinfang Chen,
- Huaibing Xie,
- Minghua Ma,
- Yu Kang,
- Xin Gao,
- Liu Shi,
- Yunjie Cao,
- Xuedong Gao,
- Hao Fan,
- Ming Wen,
- Jun Zeng,
- Supriyo Ghosh,
- Xuchao Zhang,
- Chaoyun Zhang,
- Qingwei Lin,
- Saravan Rajmohan,
- Dongmei Zhang,
- Tianyin Xu
EuroSys '24: Proceedings of the Nineteenth European Conference on Computer SystemsPages 674–688https://doi.org/10.1145/3627703.3629553Ensuring the reliability and availability of cloud services necessitates efficient root cause analysis (RCA) for cloud incidents. Traditional RCA methods, which rely on manual investigations of data sources such as logs and traces, are often laborious, ...
- research-articleApril 2024
LuoShen: a hyper-converged programmable gateway for multi-tenant multi-service edge clouds
- Tian Pan,
- Kun Liu,
- Xionglie Wei,
- Yisong Qiao,
- Jun Hu,
- Zhiguo Li,
- Jun Liang,
- Tiesheng Cheng,
- Wenqiang Su,
- Jie Lu,
- Yuke Hong,
- Zhengzhong Wang,
- Zhi Xu,
- Chongjing Dai,
- Peiqiao Wang,
- Xuetao Jia,
- Jianyuan Lu,
- Enge Song,
- Jun Zeng,
- Biao Lyu,
- Ennan Zhai,
- Jiao Zhang,
- Tao Huang,
- Dennis Cai,
- Shunmin Zhu
NSDI'24: Proceedings of the 21st USENIX Symposium on Networked Systems Design and ImplementationArticle No.: 49, Pages 877–892Edge clouds are expected to be a key revenue growth driver for cloud vendors in the next decade; however, simply replicating the network infrastructure for the public cloud to the edge experiences deployment issues. At the edge, the challenge for cloud ...
- research-articleApril 2024
RSAFormer: A method of polyp segmentation with region self-attention transformer
Computers in Biology and Medicine (CBIM), Volume 172, Issue Chttps://doi.org/10.1016/j.compbiomed.2024.108268AbstractColonoscopy has attached great importance to early screening and clinical diagnosis of colon cancer. It remains a challenging task to achieve fine segmentation of polyps. However, existing State-of-the-art models still have limited segmentation ...
Highlights- A region self-attention enhancement network (RSAFormer) is proposed.
- RSAFormer uniquely uses a dual decoder structure to generate various feature maps.
- A novel region self-attention enhancement (RSA) module is proposed.
- research-articleJanuary 2024
Dynamic Analysis of Multiplex Networks With Hybrid Maintenance Strategies
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 555–570https://doi.org/10.1109/TIFS.2023.3324386The advent of smart terminals and the IOT era has prompted the emergence of the multiplex network system. With the rapid information transmission in multiplex networks, security incidents caused by malicious attackers occur frequently. In light of the ...
- research-articleNovember 2023
Point-of-interest Recommendation using Deep Semantic Model
Expert Systems with Applications: An International Journal (EXWA), Volume 231, Issue Chttps://doi.org/10.1016/j.eswa.2023.120727AbstractUnder the current paradigm, POI (Point-of-interest) recommendation tasks are mainly focused on representation learning. Therefore, the quality of the trajectory embeddings plays a key role in prediction. Existing methods mainly focus on learning ...
Highlights- Establish causal transfer between check-ins through the medium of semantics.
- Learning the deep semantic feature of trajectory.
- Propose temporal interval encoding to avoid losing temporal information.
- Fusing deep semantic ...
- research-articleNovember 2023
Designing mobile operator’s tariff package pricing scheme based on user’s internet behavior
Computer Communications (COMS), Volume 211, Issue CPages 93–103https://doi.org/10.1016/j.comcom.2023.07.025AbstractGiven the rapid growth of the mobile internet market, high-priced telecom packages are limiting the growth of mobile internet use. Telecom operators and internet companies are working together to offer free-flow packages. This paper proposes a ...
Highlights- A complete content selection and package pricing scheme (CSPPS) is proposed.
- A content selection scheme is developed via modeling users’ internet behaviors.
- A tensor decomposition factor model is built to detect users’ online ...
- research-articleOctober 2023
LGSA: A next POI prediction method by using local and global interest with spatiotemporal awareness
Expert Systems with Applications: An International Journal (EXWA), Volume 227, Issue Chttps://doi.org/10.1016/j.eswa.2023.120291AbstractPredicting the next Point-of-Interest (POI) is a persistent issue in the realm of Location-Based Social Networks (LBSN). To discover the user’s dynamic interests and the dependence between different POIs in user trajectory sequences, ...
Highlights- Learn user interest from both local and global views.
- Personalized ...