Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
A safe screening rule with bi-level optimization of ν support vector machine
AbstractSupport vector machine (SVM) has achieved many successes in machine learning, especially for a small sample problem. As a famous extension of the traditional SVM, the ν support vector machine (ν-SVM) has shown outstanding performance due to its ...
Highlights- A Safe screening rule and the DCDM algorithm are proposed.
- A bi-level optimization structure could guarantee the computational cost.
- The safe screening is first considered in Unsupervised task and constraints with parameters.
- ArticleSeptember 2024
Bootstrap Latents of Nodes and Neighbors for Graph Self-supervised Learning
Machine Learning and Knowledge Discovery in Databases. Research TrackPages 76–92https://doi.org/10.1007/978-3-031-70352-2_5AbstractContrastive learning is a significant paradigm in graph self-supervised learning. However, it requires negative samples to prevent model collapse and learn discriminative representations. These negative samples inevitably lead to heavy computation,...
Poles-based Invariant Generation for Verifying the BIBO Stability of Digital Filters
HSCC '24: Proceedings of the 27th ACM International Conference on Hybrid Systems: Computation and ControlArticle No.: 3, Pages 1–12https://doi.org/10.1145/3641513.3650138Digital filters, a subclass of linear time-invariant systems, are widely used in signal processing and control systems. A digital filter performs mathematical operations on a sampled, discrete-time signal to reduce or enhance certain aspects of that ...
- research-articleFebruary 2024
Matrix-based vs. vector-based linear discriminant analysis: A comparison of regularized variants on multivariate time series data
Information Sciences: an International Journal (ISCI), Volume 654, Issue Chttps://doi.org/10.1016/j.ins.2023.119872AbstractOver the past two decades, matrix-based or bilinear discriminant analysis (BLDA) methods have received much attention. However, it has been reported that the traditional vector-based regularized LDA (RLDA) is still quite competitive and could ...
Highlights- A new regularized BLDA (RBLDA) is proposed for multivariate time series (MTS) classification.
- An efficient model selection algorithm is developed for the proposed RBLDA.
- Empirical results show that the proposed RBLDA generally ...
- research-articleJuly 2023
DStream: A Streaming-Based Highly Parallel IFDS Framework
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 2488–2500https://doi.org/10.1109/ICSE48619.2023.00208The IFDS framework supports interprocedural dataflow analysis with distributive flow functions over finite domains. A large class of interprocedural dataflow analysis problems can be formulated as IFDS problems and thus can be solved with the IFDS ...
-
- research-articleMarch 2023
Robust factored principal component analysis for matrix-valued outlier accommodation and detection
Computational Statistics & Data Analysis (CSDA), Volume 179, Issue Chttps://doi.org/10.1016/j.csda.2022.107657AbstractPrincipal component analysis (PCA) is a popular dimension reduction technique for vector data. Factored PCA (FPCA) is a probabilistic extension of PCA for matrix data, which can substantially reduce the number of parameters in PCA ...
Highlights- A robust Factored PCA (RFPCA) is proposed for matrix-valued outlier accommodation and detection.
- research-articleJune 2023
Research on the Prediction Method of Rural Industry Integration Based on Improved RBF Neural Network Model
ICCDE '23: Proceedings of the 2023 9th International Conference on Computing and Data EngineeringPages 41–47https://doi.org/10.1145/3589845.3589856The integration development of rural industries can promote the high-quality development of rural commerce, cultural industry and tourism. In this paper, we propose an improved RBF neural network-based rural industry integration prediction method to ...
- research-articleJanuary 2023
Deep recommendation system based on knowledge graph and review text
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 45, Issue 5Pages 7661–7673https://doi.org/10.3233/JIFS-230584With the explosive increase of information, recommendation system is applied in a variety of areas. However, the performance of recommendation system is limited due to issues such as data sparsity, cold starts and poor semantic understanding. In order to ...
- ArticleJune 2022
Future Education and Talents Cultivation: A Knowledge Building Approach
Blended Learning: Engaging Students in the New Normal EraPages 35–47https://doi.org/10.1007/978-3-031-08939-8_4AbstractNew era of 21st century and knowledge society required new talents with creative thinking and problem-solving skills, which has become a base for cultivating the new talents for future education. Education transformation has been becoming a ...
- ArticleApril 2022
BRICK: Path Enumeration Based Bounded Reachability Checking of C Program (Competition Contribution)
Tools and Algorithms for the Construction and Analysis of SystemsPages 408–412https://doi.org/10.1007/978-3-030-99527-0_22AbstractBRICK is a bounded reachability checker for embedded C programs. BRICK conducts a path-oriented style checking of the bounded state space of the program, that enumerates and checks all the possible paths of the program in the threshold one by one. ...
- research-articleJanuary 2022
Study on the law of the structure parameters influence on thermal deformation of magnetic poles of magnetic-liquid double suspension bearing
International Journal of Computer Applications in Technology (IJCAT), Volume 69, Issue 3Pages 253–262https://doi.org/10.1504/ijcat.2022.127823The temperature rise and thermal deformation of the magnetic-hydraulic double suspension bearing can easily lead to thermal balance instability and reduce the running stability of the bearing. In this paper, the influence of structural parameters on the ...
- research-articleJanuary 2022
A BERT-Based Aspect-Level Sentiment Analysis Algorithm for Cross-Domain Text
Cross-domain text sentiment analysis is a text sentiment classification task that uses the existing source domain annotation data to assist the target domain, which can not only reduce the workload of new domain data annotation, but also significantly ...
- research-articleJanuary 2022
Optimal Scheduling Model of WDM/OTN Network Transmission Line Based on Machine Learning
In order to solve the problem that the influencing factors are difficult to parameterize in the design and development of WDM/OTN backbone network routing planning tools, the author proposes an optimal scheduling model for WDM/OTN network transmission ...
- research-articleJanuary 2022
Automatic Detection, Validation, and Repair of Race Conditions in Interrupt-Driven Embedded Software
IEEE Transactions on Software Engineering (ISOF), Volume 48, Issue 1Pages 346–363https://doi.org/10.1109/TSE.2020.2989171Interrupt-driven programs are widely deployed in safety-critical embedded systems to perform hardware and resource dependent data operation tasks. The frequent use of interrupts in these systems can cause race conditions to occur due to interactions ...
- research-articleApril 2022
Design and Simulation of Adjustable DC Regulated Power Supply Based on LM317
ICITEE '21: Proceedings of the 4th International Conference on Information Technologies and Electrical EngineeringArticle No.: 33, Pages 1–4https://doi.org/10.1145/3513142.3513176With the development of power integration technology, the power regulator, comparison amplifier, reference voltage circuit and sampling circuit in DC voltage stabilizing circuit are integrated on one chip and have been widely used in various electronic ...
- research-articleApril 2022
Construction and Debugging of High Gain Zero Current Input Ripple Converter
ICITEE '21: Proceedings of the 4th International Conference on Information Technologies and Electrical EngineeringArticle No.: 25, Pages 1–5https://doi.org/10.1145/3513142.3513168The initial voltage provided by photovoltaic modules and energy storage cells is low, so they need higher boost conversion to be integrated into DC microgrid, which means higher gain DC-DC converter is needed. On the other hand, large input current ...
- research-articleAugust 2021
A Safe Semi-supervised Classification Algorithm Using Multiple Classifiers Ensemble
Neural Processing Letters (NPLE), Volume 53, Issue 4Pages 2603–2616https://doi.org/10.1007/s11063-020-10191-1AbstractIn order to improve the performance of semi-supervised learning, a safe semi-supervised classification algorithm using multiple classifiers ensemble (S3C-MC) is proposed. First, unlabeled samples are filtered and unlabeled samples with small ...
- columnDecember 2018
Model-based Construction and Verification of Cyber-Physical Systems
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 43, Issue 3Pages 6–10https://doi.org/10.1145/3229783.3229793By combining communication, computation, and control (3C), Cyber-Physical Systems (CPS)0tightly couple the physical world with the cyber-world, to enable more applications, enhance performance, increase dependability and etc. Among these goals, as CPS ...
- research-articleSeptember 2018
DangDone: Eliminating Dangling Pointers via Intermediate Pointers
Internetware '18: Proceedings of the 10th Asia-Pacific Symposium on InternetwareArticle No.: 6, Pages 1–10https://doi.org/10.1145/3275219.3275231Dangling pointers have become an important class of software bugs that can lead to use-after-free and double-free vulnerabilities. So far, only a few approaches have been proposed to protect against dangling pointers, while most of them suffer from high ...
- research-articleSeptember 2018
Dual-force: understanding WebView malware via cross-language forced execution
ASE '18: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software EngineeringPages 714–725https://doi.org/10.1145/3238147.3238221Modern Android malwares tend to use advanced techniques to cover their malicious behaviors. They usually feature multi-staged, condition-guarded and environment-specific payloads. An increasing number of them utilize WebView, particularly the two-way ...