Wei Wang

Wei Wang

University of California, Los Angeles

H-index: 160

North America-United States

Wei Wang Information

University

University of California, Los Angeles

Position

Leonard Kleinrock Professor in Computer Science

Citations(all)

128728

Citations(since 2020)

78065

Cited By

26623

hIndex(all)

160

hIndex(since 2020)

120

i10Index(all)

1817

i10Index(since 2020)

1478

Email

University Profile Page

University of California, Los Angeles

Wei Wang Skills & Research Interests

data mining

machine learning

big data analytics

bioinformatics and computational biology

computational medicine

Top articles of Wei Wang

Universality and limitations of prompt tuning

Authors

Yihan Wang,Jatin Chauhan,Wei Wang,Cho-Jui Hsieh

Journal

Advances in Neural Information Processing Systems

Published Date

2024/2/13

Despite the demonstrated empirical efficacy of prompt tuning to adapt a pretrained language model for a new task, the theoretical underpinnings of the difference between" tuning parameters before the input" against" the tuning of model weights" are limited. We thus take one of the first steps to understand the role of soft-prompt tuning for transformer-based architectures. By considering a general purpose architecture, we analyze prompt tuning from the lens of both: universal approximation and limitations with finite-depth fixed-weight pretrained transformers for continuous-valued functions. Our universality result guarantees the existence of a strong transformer with a prompt to approximate any sequence-to-sequence function in the set of Lipschitz functions. The limitations of prompt tuning for limited-depth transformers are first proved by constructing a set of datasets, that cannot be memorized by a prompt of any length for a given single encoder layer. We also provide a lower bound on the required number of tunable prompt parameters and compare the result with the number of parameters required for a low-rank update (based on LoRA) for a single-layer setting. We finally extend our analysis to multi-layer settings by providing sufficient conditions under which the transformer can at best learn datasets from invertible functions only. Our theoretical claims are also corroborated by empirical results.

Incidence and risk factors of depression in patients with metabolic syndrome

Authors

Li-Na Zhou,Xian-Cang Ma,Wei Wang

Journal

World Journal of Psychiatry

Published Date

2024/2/2

BACKGROUNDMany studies have explored the relationship between depression and metabolic syndrome (MetS), especially in older people. China has entered an aging society. However, there are still few studies on the elderly in Chinese communities.AIMTo investigate the incidence and risk factors of depression in MetS patients in mainland China and to construct a predictive model.METHODSData from four waves of the China Health and Retirement Longitudinal Study were selected, and middle-aged and elderly patients with MetS (n= 2533) were included based on the first wave. According to the center for epidemiological survey-depression scale (CESD), participants with MetS were divided into depression (n= 938) and non-depression groups (n= 1595), and factors related to depression were screened out. Subsequently, the 2-, 4-, and 7-year follow-up data were analyzed, and a prediction model for …

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management

Authors

Guangquan Xu,Wenqing Lei,Lixiao Gong,Jian Liu,Hongpeng Bai,Kai Chen,Ran Wang,Wei Wang,Kaitai Liang,Weizhe Wang,Weizhi Meng,Shaoying Liu

Journal

Computers & security

Published Date

2023/2/1

The defense of Use-After-Free (UAF) exploits generally could be guaranteed via static or dynamic analysis, however, both of which are restricted to intrinsic deficiency. The static analysis has limitations in loop handling, optimization of memory representation and constructing a satisfactory test input to cover all execution paths. While the lack of maintenance of pointer information in dynamic analysis may lead to defects that cannot accurately identify the relationship between pointers and memory. In order to successfully exploit a UAF vulnerability, attackers need to reference freed memory. However, main existing schemes barely defend all types of UAF exploits because of the incomplete check of pointers. To solve this problem, we propose UAF-GUARD to defend against the UAF exploits via fine-grained memory permission management. Specially, we design two key data structures to enable the fine-grained …

The future of ChatGPT in academic research and publishing: A commentary for clinical and translational medicine

Authors

Jun Wen,Wei Wang

Journal

Clinical and Translational Medicine

Published Date

2023/3

ChatGPT, an artificial intelligence (AI)-powered chatbot developed by OpenAI, is creating a buzz across all occupational sectors. Its name comes from its basis in the Generative Pretrained Transformer (GPT) language model. ChatGPT’s most promising feature is its ability to offer human-like responses to text input using deep learning techniques at a level far superior to any other AI model. Its rapid integration in various industries signals the public’s burgeoning reliance on AI technology. Thus, it is essential to critically evaluate ChatGPT’s potential impacts on academic clinical and translational medicine research.

Anchor link prediction for privacy leakage via de-anonymization in multiple social networks

Authors

Huanran Wang,Wu Yang,Dapeng Man,Wei Wang,Jiguang Lv

Journal

IEEE Transactions on Dependable and Secure Computing

Published Date

2023/2/3

Anchor link prediction exacerbates the risk of privacy leakage via the de-anonymization of social network data. Embedding-based methods for anchor link prediction are limited by the excessive similarity of the associated nodes in a latent feature space and the variation between latent feature spaces caused by the semantics of different networks. In this article, we propose a novel method which reduces the impact of semantic discrepancies between different networks in the latent feature space. The proposed method consists of two phases. First, graph embedding focuses on the network structural roles of nodes and increases the distinction between the associated nodes in the embedding space. Second, a federated adversarial learning framework which performs graph embedding on each social network and an adversarial learning model on the server according to the observable anchor links is used to associate …

Uncover the reasons for performance differences between measurement functions (Provably)

Authors

Chao Wang,Jianchuan Feng,Linfang Liu,Sihang Jiang,Wei Wang

Journal

Applied Intelligence

Published Date

2023/3

Recently, an exciting experimental conclusion in Li et al. (Knowl Inf Syst 62(2):611–637, ) about measures of uncertainty for knowledge bases has attracted great research interest for many scholars. However, these efforts lack solid theoretical interpretations for the experimental conclusion. The main limitation of their research is that the final experimental conclusions are only derived from experiments on three datasets, which makes it still unknown whether the conclusion is universal. In our work, we first review the mathematical theories, definitions, and tools for measuring the uncertainty of knowledge bases. Then, we provide a series of rigorous theoretical proofs to reveal the reasons for the superiority of using the knowledge amount of knowledge structure to measure the uncertainty of the knowledge bases. Combining with experiment results, we verify that knowledge amount has much better performance for …

Filtering‐based concurrent learning adaptive attitude tracking control of rigid spacecraft with inertia parameter identification

Authors

Jiang Long,Yangming Guo,Zun Liu,Wei Wang

Journal

International Journal of Robust and Nonlinear Control

Published Date

2023/5/25

This paper investigates the attitude tracking control problem of rigid spacecraft with inertia parameter identification. Based on the relative attitude and angular velocity error dynamics, a basic adaptive backstepping based attitude tracking control scheme is firstly designed such that asymptotic attitude tracking can be achieved. However, the parameter identification error cannot decay to zero if the persistent excitation (PE) condition is not satisfied. To solve this issue, a filtering‐based concurrent learning adaptive backstepping control scheme is then proposed, by incorporating torque filtering technique with concurrent learning technique. A more mild rank condition, which consists of some collectable historical data, is provided to guarantee the convergence of parameter identification error. In addition, a valid data collection algorithm is given. It should be mentioned that a distinctive feature of the proposed filtering …

MIND-S is a deep-learning prediction model for elucidating protein post-translational modifications in human diseases

Authors

Yu Yan,Jyun-Yu Jiang,Mingzhou Fu,Ding Wang,Alexander R Pelletier,Dibakar Sigdel,Dominic CM Ng,Wei Wang,Peipei Ping

Journal

Cell reports methods

Published Date

2023/3/27

We present a deep-learning-based platform, MIND-S, for protein post-translational modification (PTM) predictions. MIND-S employs a multi-head attention and graph neural network and assembles a 15-fold ensemble model in a multi-label strategy to enable simultaneous prediction of multiple PTMs with high performance and computation efficiency. MIND-S also features an interpretation module, which provides the relevance of each amino acid for making the predictions and is validated with known motifs. The interpretation module also captures PTM patterns without any supervision. Furthermore, MIND-S enables examination of mutation effects on PTMs. We document a workflow, its applications to 26 types of PTMs of two datasets consisting of ∼50,000 proteins, and an example of MIND-S identifying a PTM-interrupting SNP with validation from biological data. We also include use case analyses of targeted …

InfluencerRank: Discovering effective influencers via graph convolutional attentive recurrent neural networks

Authors

Seungbae Kim,Jyun-Yu Jiang,Jinyoung Han,Wei Wang

Journal

Proceedings of the International AAAI Conference on Web and Social Media

Published Date

2023/6/2

As influencers play considerable roles in social media marketing, companies increase the budget for influencer marketing. Hiring effective influencers is crucial in social influencer marketing, but it is challenging to find the right influencers among hundreds of millions of social media users. In this paper, we propose InfluencerRank that ranks influencers by their effectiveness based on their posting behaviors and social relations over time. To represent the posting behaviors and social relations, the graph convolutional neural networks are applied to model influencers with heterogeneous networks during different historical periods. By learning the network structure with the embedded node features, InfluencerRank can derive informative representations for influencers at each period. An attentive recurrent neural network finally distinguishes highly effective influencers from other influencers by capturing the knowledge of the dynamics of influencer representations over time. Extensive experiments have been conducted on an Instagram dataset that consists of 18,397 influencers with their 2,952,075 posts published within 12 months. The experimental results demonstrate that InfluencerRank outperforms existing baseline methods. An in-depth analysis further reveals that all of our proposed features and model components are beneficial to discover effective influencers.

Towards a Generic Framework for Mechanism-guided Deep Learning for Manufacturing Applications

Authors

Hanbo Zhang,Jiangxin Li,Shen Liang,Peng Wang,Themis Palpanas,Chen Wang,Wei Wang,Haoxuan Zhou,Jianwei Song,Wen Lu

Published Date

2023/8/6

Manufacturing data analytics tasks are traditionally undertaken with Mechanism Models (MMs), which are domain-specific mathematical equations modeling the underlying physical or chemical processes of the tasks. Recently, Deep Learning (DL) has been increasingly applied to manufacturing. MMs and DL have their individual pros and cons, motivating the development of Mechanism-guided Deep Learning Models (MDLMs) that combine the two. Existing MDLMs are often tailored to specific tasks or types of MMs, and can fail to effectively 1) utilize interconnections of multiple input examples, 2) adaptively self-correct prediction errors with error bounding, and 3) ensemble multiple MMs. In this work, we propose a generic, task-agnostic MDLM framework that can embed one or more MMs in deep networks, and address the 3 aforementioned issues. We present 2 diverse use cases where we experimentally …

Adjustable bed with tilting mechanisms

Published Date

2023/9/26

An adjustable bed includes a bed frame supporting a plurality of platforms having at least a head platform and a back platform, a back lifting assembly, a foot lifting assembly, a base frame pivotally and detachably connected to the bed frame, a bed frame tilting actuator pivotally connected to the bed frame and the base frame for operably adjusting the bed frame from the horizontal position to the sloping position relative to the base frame, or vice versa. The adjustable bed also includes a head platform tilting actuator pivotally connected to the head platform and the back platform for operably adjusting the head platform in a tilting position or a flat position relative to the back platform.

CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure

Authors

Yuhao Liu,Wei Wang,Yan Jia,Sihan Xu,Zheli Liu

Journal

Heliyon

Published Date

2023/4/1

There are a large number of solutions for big data processing in the Internet of Things (IoT) environments, among which the IoT cloud infrastructure is one of the most mature solutions. Typically, modern IoT cloud infrastructures have different kinds of configuration options. The diversity of configurations leads to frequent software configuration errors. Generally, troubleshooting configuration errors relies on finding the mapping relationship between configuration options in the documents (e.g., official manuals) and their read sites in the source code. Most current works still manually extract configuration read sites. Automated methods are not always interchangeable and they incur considerable time overheads and low extraction rates.In this paper, we propose CRSExtractor, an automatic technique for extracting configuration read sites based on intra-procedural analysis. Using our technique, configuration option read …

Weakly supervised object localization with soft guidance and channel erasing for auto labelling in autonomous driving systems

Authors

Xinyan Xie,Yijiang Li,Ying Gao,Chaojie Wu,Ping Gao,Binjie Song,Wei Wang,Yiqin Lu

Journal

ISA transactions

Published Date

2023/1/1

Automated driving systems (ADSs) conceive an efficient and safe way of driving. The safety of ADSs depends on a precise object detector that needs to be upgraded continuously facing various environments. Massive annotations are required to utilize collected images of surroundings through vehicles and accommodate new environments. Auto labelling is one approach to alleviate such dilemma. To this end, we propose a novel Weakly Supervised Object Localization (WSOL) method which can localize objects precisely without detection annotations. This paper proposed Soft Guidance Module (SGM), Channel Erasing Module (CEM) and incorporate them into a multi-flow framework allowing the two mutually beneficial. Finally, experiments and visualizations are performed to evaluate our method on Stanford Cars, ILSVRC 2016 and CUB-200-2011 datasets.

Huzhou University, Huzhou, China

Authors

Wei Wang,Xuefei Song,Somayah Abdullah Albaradei,Yunfang Liu,Weihua Yang

Journal

Medical knowledge-assisted machine learning technologies in individualized medicine

Published Date

2023/4/24

Diabetic retinopathy (DR) is a complication of diabetic patients and a significant cause of blindness globally among the working population (Antonetti et al., 2021). There are 451 million suffering from DR in the world, and this is projected to increase to 639 million in 2045 (Cho et al., 2018). In diabetics, blood is provided to all retina layers through micro blood vessels that are sensitive to unrestricted blood sugar levels. DR may cause no symptoms or only mild vision problems at first, but it can cause blindness eventually. When substantial glucose or fructose is collected in the blood, blood vessels begin to collapse due to insufficient oxygen supply to the cells. Occlusion in these blood vessels can cause serious eye damage. As a result, metabolic rate decreases, and abnormal blood vessels accumulate in DR (Dai et al., 2021). Microaneurysms (MAs) are the early signs of DR, which

Ensemble neural network model for detecting thyroid eye disease using external photographs

Authors

Justin Karlin,Lisa Gai,Nathan LaPierre,Kayla Danesh,Justin Farajzadeh,Bea Palileo,Kodi Taraszka,Jie Zheng,Wei Wang,Eleazar Eskin,Daniel Rootman

Journal

British Journal of Ophthalmology

Published Date

2023/11/1

PurposeTo describe an artificial intelligence platform that detects thyroid eye disease (TED).DesignDevelopment of a deep learning model.Methods1944 photographs from a clinical database were used to train a deep learning model. 344 additional images (‘test set’) were used to calculate performance metrics. Receiver operating characteristic, precision–recall curves and heatmaps were generated. From the test set, 50 images were randomly selected (‘survey set’) and used to compare model performance with ophthalmologist performance. 222 images obtained from a separate clinical database were used to assess model recall and to quantitate model performance with respect to disease stage and grade.ResultsThe model achieved test set accuracy of 89.2%, specificity 86.9%, recall 93.4%, precision 79.7% and an F1 score of 86.0%. Heatmaps demonstrated that the model identified pixels corresponding to …

Star: Boosting low-resource event extraction by structure-to-text data generation with large language models

Authors

Mingyu Derek Ma,Xiaoxuan Wang,Po-Nien Kung,P Jeffrey Brantingham,Nanyun Peng,Wei Wang

Journal

arXiv preprint arXiv:2305.15090

Published Date

2023/5/24

Structure prediction tasks such as event extraction require an in-depth understanding of the output structure and sub-task dependencies, thus they still heavily rely on task-specific training data to obtain reasonable performance. Due to the high cost of human annotation, low-resource event extraction, which requires minimal human cost, is urgently needed in real-world information extraction applications. We propose to synthesize data instances given limited seed demonstrations to boost low-resource event extraction performance. We propose STAR, a structure-to-text data generation method that first generates complicated event structures (Y) and then generates input passages (X), all with Large Language Models. We design fine-grained step-by-step instructions and the error cases and quality issues identified through self-reflection can be self-refined. Our experiments indicate that data generated by STAR can significantly improve the low-resource event extraction performance and they are even more effective than human-curated data points in some cases.

Glycomedicine: the current state of the art

Authors

Wei Wang

Published Date

2023

There are four equally important major building blocks of life: nucleic acids (DNA and RNA), proteins, carbohydrates (glycans), and lipids. The first two are also known as the first and second alphabets of biology, following the principle of the ‘‘central dogma” of transcription (DNA to RNA) and translation (RNA to protein). However, the latter two crucial components, glycans and lipids, are missing from biology’s central dogma. Regarding the communication between glycans and lipids, there may be a yet-to-bediscovered law: Does a paracentral dogma exist? This commentary focuses on glycans, the third alphabet of life, and their role in the sociomateriality of the cell, which provides a novel dimension of medical science—glycomedicine. This is an allied new discipline that employs glycomics approaches with the aim of better targeting disease diagnostics, as well as drug discovery, prescription choice, and dosing …

GRFlift: uplift modeling for multi-treatment within GMV constraints

Authors

Jun Yang,Wei Wang,Yanshen Dong,Xin He,Li Jia,Huan Chen,Maoyu Mao

Journal

Applied Intelligence

Published Date

2023/2

As a primary goal of predictive analytics, uplift modeling is used to estimate what impact a specific action or treatment will have on an outcome. In convention, the treatment is evaluated as a success once the buyer has purchased following the treatment, regardless of the kinds of treatments and the corresponding cost. Obviously, it cannot be classified as a binary classification problem. Therefore, we extend the ordinary uplift model to support multi-treatments tasks. In order to reconcile this aspect of interpretability with tree-based models, we use random forest (RF) as our base model. We present Gross Merchandise Value (GMV)-based RF for uplift modeling (GRFlift): an uplift model, where typical commercial evaluation GMV is designed as novel tree splitting criteria to directly quantify the uplift achievement. A targeted regularization term is also designed to adjust the splitting distribution differences. The splitting …

Upper and Lower Bounds on Robust One-way Trading with Fixed Costs

Authors

Wei Wang,Wei Cui,Yingjie Lan,Deming Zhou

Published Date

2023/3

This paper considers the one-way trading problem with fixed costs where the trader can only trade in one direction throughout, either sell or buy, and he only knows limited information on price fluctuations beforehand. We construct a robust optimization model based on Savage's regret criterion, in order to find the online trading policy that minimizes the worst-case regret. However, it is very difficult to obtain analytical results if the trading horizon is relatively long, due to the discontinuity in the trader's objective function caused by the fixed cost. Thus we propose to solve the alternative problem with prepaid trading opportunities, which is not only a satisfactory approximation of the original one, but also a realistic problem with many practical applications, such as in the stock or future market. The optimal online trading policy of the new problem can be easily found based on the existing results of the one-way trading …

Adjustable bed with no hinging connections of platforms

Published Date

2023/2/2

A47C31/00—Details or accessories for chairs, beds, or the like, not provided for in other groups of this subclass, eg upholstery fasteners, mattress protectors, stretching devices for mattress nets

Message passing approach to analyze the robustness of hypergraph

Authors

Hao Peng,Cheng Qian,Dandan Zhao,Ming Zhong,Jianmin Han,Runchao Li,Wei Wang

Journal

arXiv preprint arXiv:2302.14594

Published Date

2023/2/28

Hypergraph networks are closer to real life because they can reflect higher-order interactions, so researchers have begun using them to build models for real-world networks. The mean-field approach is the current tool for studying the percolation problem on hypergraph networks. However, we found that when there is a loop in the hypergraph network, the calculated results using this approach deviate from the real results. Therefore, in this paper, we rephrase the percolation on the hypergraph network as a message passing process, thus obtaining a message passing approach. Our proposed approach has been tested in several hypergraph networks with loops, and the experimental results are more accurate than those under the mean-field approach. This is helpful to analyze and understand the robustness of hypergraph networks with loops. In addition, we also specifically analyzed how four different types of loops affect the accuracy of the experiment. Our proposed message passing approach also provides another way to study percolation on hypergraph networks.

LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks

Authors

Haotian Yin,Xin Huang,Bin Xing,Jiajia Huang,Xiaoxin Sun,Jianshuang Li,Sheng Chai,Di Zhang,Rana Abu Bakar,Wei Wang

Journal

IEEE Internet of Things Journal

Published Date

2023/3/27

Wireless body area networks (WBANs) have been deployed in numerous applications, where the most common communication technology is Bluetooth. Bluetooth uses the numeric comparison protocol (NCP) to negotiate session keys based on the elliptic curve cryptography (ECC) and Out-of-Band (OoB) channels. However, the scalar multiplication of ECC is a heavy computing operation for devices in WBANs. To address this issue, we propose the lightweight and secure NCP (LSNCP) which requires less scalar multiplication than the NCP in Bluetooth. New logic expressions and rules are proposed to verify the security of LSNCP in GNY logic. The proof shows that LSNCP is secure. We conduct a provable security analysis by integrating the commitment scheme and short hash function. The result shows that LSNCP is secure in the modified Bellare–Rogaway model. Finally, we conduct theoretical analysis and …

Robustness of higher-order interdependent networks

Authors

Hao Peng,Yifan Zhao,Dandan Zhao,Ming Zhong,Zhaolong Hu,Jianming Han,Runchao Li,Wei Wang

Journal

Chaos, Solitons & Fractals

Published Date

2023/6/1

In recent years, the research of multilayer interdependent networks has become a hotspot in complex networks. However, most of the study is limited to describing pairwise interactions. The systems in the real world are usually networks with higher-order interactions consisting of three or more units, such as epidemic transmission and cooperative communication networks. To better reflect the complex networks in the real world, this paper introduces the higher-order structures in the network, that is, simplicial complexes. In this paper, we construct a theoretical model of a two-layer partial dependence network with simplicial complexes in which failures between nodes occur through the synergistic effects of pairwise and higher-order interactions. In this model, removing a node will cause all other nodes in the same simplex to be removed, and due to the dependency between the two networks, the failure of the node …

Human Prostate-Specific Antigen Carries N-glycans with Ketodeoxynononic Acid

Authors

Wei Wang,Tao Zhang,Jan Nouta,Peter A van Veelen,Noortje de Haan,Theo M de Reijke,Manfred Wuhrer,Guinevere SM Lageveen-Kammeijer

Journal

Engineering

Published Date

2023/7/1

Ketodeoxynononic acid (Kdn) is a rather uncommon class of sialic acid in mammals. However, associations have been found between elevated concentrations of free or conjugated Kdn in relation to human cancer progression. Hitherto, there has been a lack of conclusive evidence that Kdn occurs on (specific) human glycoproteins (conjugated Kdn). Here, we report for the first time that Kdn is expressed on prostate-specific antigen (PSA) N-linked glycans derived from human seminal plasma and urine. Interestingly, Kdn was found only in an α2,3-linkage configuration on an antennary galactose, indicating a highly specific biosynthesis. This unusual glycosylation feature was also identified in a urinary PSA cohort in relation to prostate cancer (PCa), although no differences were found between PCa and non-PCa patients. Further research is needed to investigate the occurrence, biosynthesis, biological role, and …

OH, HO, and RO radical chemistry in a rural forest environment: measurements, model comparisons, and evidence of a missing radical sink

Authors

Brandon Bottorff,Michelle M Lew,Youngjun Woo,Pamela Rickly,Matthew D Rollings,Benjamin Deming,Daniel C Anderson,Ezra Wood,Hariprasad D Alwe,Dylan B Millet,Andrew Weinheimer,Geoff Tyndall,John Ortega,Sebastien Dusanter,Thierry Leonardis,James Flynn,Matt Erickson,Sergio Alvarez,Jean C Rivera-Rios,Joshua D Shutter,Frank Keutsch,Detlev Helmig,Wei Wang,Hannah M Allen,Johnathan H Slade,Paul B Shepson,Steven Bertman,Philip S Stevens

Journal

Atmospheric Chemistry and Physics

Published Date

2023/9/15

The hydroxyl (OH), hydroperoxy (HO, and organic peroxy (RO radicals play important roles in atmospheric chemistry. In the presence of nitrogen oxides (NO, reactions between OH and volatile organic compounds (VOCs) can initiate a radical propagation cycle that leads to the production of ozone and secondary organic aerosols. Previous measurements of these radicals under low-NO conditions in forested environments characterized by emissions of biogenic VOCs, including isoprene and monoterpenes, have shown discrepancies with modeled concentrations. During the summer of 2016, OH, HO, and RO radical concentrations were measured as part of the Program for Research on Oxidants: Photochemistry, Emissions, and Transport – Atmospheric Measurements of Oxidants in Summer (PROPHET-AMOS) campaign in a midlatitude deciduous broadleaf forest. Measurements of OH and HO were made by laser-induced fluorescence–fluorescence assay by gas expansion (LIF-FAGE) techniques, and total peroxy radical (XO mixing ratios were measured by the Ethane CHemical AMPlifier (ECHAMP) instrument. Supporting measurements of photolysis frequencies, VOCs, NO, O, and meteorological data were used to constrain a zero-dimensional box model utilizing either the Regional Atmospheric Chemical Mechanism (RACM2) or the Master Chemical Mechanism (MCM). Model simulations tested the influence of HO regeneration reactions within the isoprene oxidation scheme from the Leuven Isoprene Mechanism (LIM1). On average, the LIM1 models overestimated daytime maximum measurements by approximately 40 % for OH, 65 % for HO …

Vectorization of transactions

Published Date

2023/10/24

Certain aspects of the present disclosure provide techniques for vectorization of transactions including: receiving electronic transaction information of one or more transactions of a user; for each transaction of the one or more transactions: segmenting the electronic transaction information of the transaction into one or more transaction words; generating a second transaction description related to the transaction; and identifying a category of the transaction; generating, based on the corresponding identified categories of the one or more transactions, a set of transaction history data of the user; providing the set of transaction history data of the user as an input to a machine learned model trained to output a set of word embedding vectors; determining, based on an output of the machine learned model comprising a set of word embedding vectors, a set of similar merchants; and providing the set of similar merchants for …

Facial Pose and Expression Transfer Based on Classification Features

Authors

Zhiyi Cao,Lei Shi,Wei Wang,Shaozhang Niu

Journal

Electronics

Published Date

2023/4/7

Transferring facial pose and expression features from one face to another is a challenging problem and an interesting topic in pattern recognition, but is one of great importance with many applications. However, existing models usually learn to transfer pose and expression features with classification labels, which cannot hold all the differences in shape and size between conditional faces and source faces. To solve this problem, we propose a generative adversarial network model based on classification features for facial pose and facial expression transfer. We constructed a two-stage classifier to capture the high-dimensional classification features for each face first. Then, the proposed generation model attempts to transfer pose and expression features with classification features. In addition, we successfully combined two cost functions with different convergence speeds to learn pose and expression features. Compared to state-of-the-art models, the proposed model achieved leading scores for facial pose and expression transfer on two datasets.

Distributed delayed dual averaging for distributed optimization over time-varying digraphs

Authors

Dong Wang,Jiaxun Liu,Jie Lian,Yang Liu,Zhu Wang,Wei Wang

Journal

Automatica

Published Date

2023/4/1

In this paper, a push-sum based distributed delayed dual averaging algorithm (PS-DDDA) is proposed to solve the distributed constrained optimization problem over the time-varying unbalanced directed graph (digraph). It considers the scenario in which each agent has delays while calculating the gradients and communicating. Both delays are assumed to be time-varying but bounded, which are more common in practice. Furthermore, we demonstrate that the cost function at the local state average converges to the optimal value and the local state average converges to the consensus with a rate of O (1/T) by utilizing the diminishing step size, where T is the total number of iterations. Moreover, to solve the distributed online constrained optimization problem, we propose the online version of PS-DDDA, and prove that its regret bound increases sublinearly with a rate of O (T). Finally, the effectiveness of the proposed …

Novel adaptive region spectral-spatial features for land cover classification with high spatial resolution remotely sensed imagery

Authors

ZhiYong Lv,PengFei Zhang,WeiWei Sun,Jón Atli Benediktsson,JunHuai Li,Wei Wang

Journal

IEEE Transactions on Geoscience and Remote Sensing

Published Date

2023/5/12

Spectral–spatial features are important for ground target identification and classification with high spatial resolution remotely sensed (HSRRS) Imagery. In this article, two novel features, named the Gaussian-weighting spectral (GWS) feature and the area shape index (ASI) feature, are proposed to complement the deficiency of the basic image feature for land cover classification with HSRRS imagery. The proposed GWS feature is an adaptive region-based feature that aims to improve the spectral homogeneity of a local area surrounding a pixel. Additionally, it is well known that the spectral feature is inadequate for classifying HSRRS imagery. Therefore, one spatial feature called the ASI feature is proposed here to describe the relationship between the area and shape for an adaptive region around each pixel. The proposed GWS and ASI features coupled with the basic red–green–blue (RGB) feature are fed into a …

Gotta: Generative Few-shot Question Answering by Prompt-based Cloze Data Augmentation

Authors

Xiusi Chen,Yu Zhang,Jinliang Deng,Jyun-Yu Jiang,Wei Wang

Published Date

2023

Few-shot question answering (QA) aims at precisely discovering answers to a set of questions from context passages while only a few training samples are available. Although existing studies have made some progress and can usually achieve proper results, they suffer from understanding deep semantics for reasoning out the questions. In this paper, we develop Gotta, a Generative prOmpT-based da Ta Augmentation framework to mitigate the challenge above. Inspired by the human reasoning process, we propose to integrate the cloze task to enhance few-shot QA learning. Following the recent success of prompt-tuning, we present the cloze task in the same format as the main QA task, allowing the model to learn both tasks seamlessly together to fully take advantage of the power of prompt-tuning. Extensive experiments on widely used benchmarks demonstrate that Gotta consistently outperforms competitive …

Event-Triggered Distributed Consensus Filtering Based on Interval Analysis for Heterogeneous Multienergy Networks With Coupling Output Constraints

Authors

Lei Su,Jun Zhao,Wei Wang

Journal

IEEE Transactions on Industrial Electronics

Published Date

2023/1/23

This article addresses the distributed consensus filtering problem of heterogeneous multienergy networks, where subnetworks exhibit different dynamics and are coupled by output constraints. The global consensus is reached by propagating constraints between subnetworks in the form of interval vectors. Guaranteed intervals satisfying given constraints are returned, which are then used to correct the local states through the probability density function truncation. Given the dependence and wrapping effects during constraint propagation, a hybrid Newton forward–backward propagation (FBP) contractor is proposed for avoiding overly pessimistic estimates. It extends the FBP contractor by replacing the natural inclusion function with centered forms. In addition, an event-triggered mechanism is designed to enhance the efficiency of constraint propagation, which allows the threshold values to be adaptively adjusted …

Coevolution of epidemic and infodemic on higher-order networks

Authors

Wenyao Li,Meng Cai,Xiaoni Zhong,Yanbing Liu,Tao Lin,Wei Wang

Journal

Chaos, Solitons & Fractals

Published Date

2023/3/1

Gathering events, e.g., going to gyms and meetings, are ubiquitous and crucial in the spreading phenomena, which induce higher-order interactions, and thus can be described as higher-order networks. Previous studies on the coevolution of epidemic-infodemic dynamics ignored the higher-order interactions in the social system, which affects our understanding of the reality spreading. We propose a mathematical framework for the coevolution of epidemic and infodemic on higher-order networks described by simplicial complex, and introduce the Microscopic Markov Chain Approach (MMCA) and mean-field approach to establish the dynamic process. We study the coevolution mathematical model on both artificial simplicial complex and real-world higher-order networks and find that the higher-order interactions show a ’double-edged sword’ role in shaping epidemic size, which is dependent on the breakout of …

Portable and adjustable bed

Published Date

2023/2/2

A47C31/00—Details or accessories for chairs, beds, or the like, not provided for in other groups of this subclass, eg upholstery fasteners, mattress protectors, stretching devices for mattress nets

BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations

Authors

Li Duan,Wenyao Xu,Wei Ni,Wei Wang

Journal

Journal of Systems Architecture

Published Date

2023/7/1

In an open Internet-of-Things (IoT) environment, cloud-device collaborative development brings more functional services to users. However, privacy disclosure risks concerning service provision and users’ accessing behavior also increase. Traditional privacy protection approaches involve a centralized system with a third-party administrative server, which has the risk of single-point failures and overlooks the issue of privacy information leakage concerning users’ behaviors. Blockchain is a decentralized and traceable technology that provides a reliable solution for secure access by users. This paper proposes a novel blockchain-based secure access framework (BSAF) for cloud-device service collaborations with privacy protection. Specifically, a key matrix encryption mechanism is used to protect the privacy of users’ behaviors, and a fully homomorphic encryption mechanism is designed to protect the privacy of …

Adjustable bed with aromatherapy system

Published Date

2023/3/14

An adjustable bed includes a frame structure; a plurality of platforms disposed on the frame structure; and an adjustable assembly coupled with the frame structure and the plurality of platforms for operably adjusting one or more of the plurality of platforms in desired positions; and an aromatherapy system attached onto the one or more platforms for producing desired fragrance in a surrounding space of the adjustable bed so as to promote health and well-being of a user. Each aromatherapy device is configured to produce a fragrance when said aromatherapy device is turned on, and one or more working modes. The fragrance is identical to or different from that produced by other aromatherapy device of the one or more aromatherapy devices.

Explainable complex model

Published Date

2023/2/21

Certain aspects of the present disclosure provide techniques for generating a human readable summary explanation to a user for an outcome generated by a complex machine learning model. In one embodiment, a risk assessment service can receive a request from a user in which a risk model of the risk assessment service performs a specific task (eg, determining the level of risk associated with the user). Once the risk model determines the risk associated with the user, in order to comply with regulations from a compliance system, the risk model can provide a user with an explanation as to the outcome for transparency purposes.

Crystal structure of monkeypox H1 phosphatase, an antiviral drug target

Authors

Wen Cui,Haojun Huang,Yinkai Duan,Zhi Luo,Haofeng Wang,Tenan Zhang,Henry C Nguyen,Wei Shen,Dan Su,Xi Li,Xiaoyun Ji,Haitao Yang,Wei Wang

Journal

Protein & Cell

Published Date

2023/6/1

Since its appearance in May 2022, monkeypox has spread to> 100 countries and afflicted tens of thousands of people. Individuals infected with monkeypox present a fever, an extensive characteristic rash, and usually swollen lymph nodes (Chatterjee e t al., 2022). The number of confirmed cases worldwide continues to grow at a rapid rate, but the treatment to this highly infectious viral disease is still very limited. Identification of new targeted-therapies will be crucial to control of this emerging public health threat.The monkeypox virus is an enveloped double-stranded DNA virus that belongs to the Orthopoxvirus genus of the Poxviridae family (Isidro et al., 2022). It has a very large genome (~ 200 kb) and codes around 200 proteins (Kugelman et al., 2014). Poxviruses express a dual specific phosphatase (H1) that de-phosphorylates signal transducer and activator of transcription 1 (STAT1) and blocks interferon signal …

Method for predicting oxygen load in iron and steel enterprises based on production plan

Published Date

2023/9/12

The present disclosure discloses a method for predicting oxygen load in iron and steel enterprises based on production plan, which relates to influencing factor extraction, neural network modeling and similar sequence matching technologies. The method uses the actual industrial operation data to first extract the relevant data such as the production plan and production performance of converter steel-making, analyze the influencing factors, and extract the main influencing variables of oxygen consumption. Then, the neural network prediction model of oxygen consumption of a single converter is established, the mean square error is taken as the evaluation index, and the predicting result of time granularity of a converter in the blowing stage is given. Finally, in combination with the information of smelting time and smelting duration of each device in the converter production plan, the prediction value of oxygen load in …

Machine learning-based prediction of sand and dust storm sources in arid Central Asia

Authors

Wei Wang,Alim Samat,Jilili Abuduwaili,Philippe De Maeyer,Tim Van de Voorde

Journal

International Journal of Digital Earth

Published Date

2023/10/2

With the emergence of multisource data and the development of cloud computing platforms, accurate prediction of event-scale dust source regions based on machine learning (ML) methods should be considered, especially accounting for the temporal variability in sample and predictor variables. Arid Central Asia (ACA) is recognized as one of the world’s primary potential sand and dust storm (SDS) sources. In this study, based on the Google Earth Engine (GEE) platform, four ML methods were used for SDS source prediction in ACA. Fourteen meteorological and terrestrial factors were selected as influencing factors controlling SDS source susceptibility and applied in the modeling process. Generally, the results revealed that the random forest (RF) algorithm performed best, followed by the gradient boosting tree (GBT), maximum entropy (MaxEnt) model and support vector machine (SVM). The Gini impurity index …

Morphological and molecular evidence reveals a new species of chewing louse Pancola ailurus n. sp.(Phthiraptera: Trichodectidae) from the endangered Chinese red panda Ailurus …

Authors

Yuan-Ping Deng,Wei Wang,Yi-Tian Fu,Yu Nie,Yue Xie,Guo-Hua Liu

Journal

International Journal for Parasitology: Parasites and Wildlife

Published Date

2023/4/1

Lice are six-legged, wingless, insect parasites of mammals and birds, and include two main functional groups: blood-sucking lice and chewing lice. However, it is still not clear whether the Chinese red panda Ailurus styani is infested with the parasitic louse. In the present study, we describe a new genus and a species of chewing louse, Pancola ailurus (Phthiraptera: Trichodectidae) based on morphological and molecular datasets. The morphological features showed that Pancola is closer to Paratrichodectes. The genetic divergence of cox1 and 12S rRNA among the Pancola ailurus n. sp. and other Trichodectidae lice was 29.7 – 34.6% and 38.9 – 43.6%, respectively. Phylogenetic analyses based on the available mitochondrial gene sequences showed that P. ailurus n. sp. is more closely related to Trichodectes canis and Geomydoecus aurei than to Felicola subrostratus and together nested within the family …

Adaptive fault-tolerant control for uncertain nonlinear systems with both parameter estimator and controller triggering

Authors

Huijin Fan,Xinpeng Fang,Wei Wang,Jiangshuai Huang,Lei Liu

Journal

Automatica

Published Date

2023/5/1

In this paper, the fault-tolerant control (FTC) problem for a class of nonlinear systems with uncertain parameters and unknown actuator failures is studied. The considered failure number of times is not limited to be finite, and the input-to-state stable assumption is no longer needed. An adaptive FTC scheme is proposed based on event-triggered strategy. A set of event-triggering conditions are designed for not only the controller but also the parameter estimators, with which the parameter estimator-to-controller and controller-to-actuator channels are both event-triggered simultaneously. It is proved that, with our proposed scheme, all the closed-loop signals are globally uniformly bounded, and the system output converges into a compact set which can be made small by appropriately adjusting the design parameters. Also, the Zeno behavior is proved to be excluded. Besides, a modified FTC scheme is designed for the …

Automatically identifying cve affected versions with patches and developer logs

Authors

Yongzhong He,Yiming Wang,Sencun Zhu,Wei Wang,Yunjia Zhang,Qiang Li,Aimin Yu

Journal

IEEE Transactions on Dependable and Secure Computing

Published Date

2023/4/5

While vulnerability databases are important sources of information for software security, it is known that information in these databases is inconsistent. How to rectify these incorrect data is a challenging issue. In this paper, we employ developer logs and patches to automatically identify vulnerable source code versions that each CVE really affects. Our tool organizes all versions of a piece of software into a version tree, and identifies the first vulnerable version, and the last vulnerable versions in the version tree trunk and branches. For evaluation, we took Linux Kernel as the case study and quantified the error rate of the vulnerable versions reported by the NVD. The total number of vulnerable Linux Kernel versions reported by the NVD was 43,727 (as of September 2020), of which the total number of false positives reached 2,497 and the total number of false negatives reached 9,330, accounting for 5.7% and 21.34 …

Effects of particle size on the adsorption behavior and antifouling performance of magnetic resins

Authors

Mancheng Zhang,Wei Wang,Zongxiang Lv,Shui Wang

Journal

Environmental Science and Pollution Research

Published Date

2023/1

Adequately choosing the physicochemical characteristics of adsorbent is crucial in improving its adsorption performance. This work investigated the effect of particle size of magnetic resins on adsorption behaviors of tetracycline (TC) and their antifouling performance. Smaller particle size resin Q150 (10–30 μm) shows notably faster TC adsorption kinetics when compared resins with hundreds of microns (Q100 and Q1). Simulated by Weber-Morris equation, the film diffusion time of Q150 was only 20 min, 2–25 times faster than that of other resins. At this adsorption time, Q150 can reach more than 80% of the maximum adsorption, and the ring-like fluorescence images indicate that the molecules are accumulated on the external surface. Q150 also shows better reusability and antifouling performance over Q100 and Q1. After 20 adsorption–desorption cycles, the adsorption capacity of Q150 at 20 min only decreases 9 …

Adaptive fuzzy fixed-time control for high-order nonlinear systems with sensor and actuator faults

Authors

Huanqing Wang,Jiawei Ma,Xudong Zhao,Ben Niu,Ming Chen,Wei Wang

Journal

IEEE Transactions on Fuzzy Systems

Published Date

2023/1/16

In this article, an adaptive fuzzy fixed-time fault-tolerant tracking control problem for high-order nonlinear systems (HONSs) with sensor and actuator faults is considered. The fuzzy logic systems are introduced to approximate the unknown nonlinear functions of the HONS. In addition, based on backstepping technology and fixed-time theory, an adaptive fuzzy fixed-time fault-tolerant controller is developed to ensure that all the signals of the closed-loop HONS are bounded. Eventually, a numerical example can be shown to prove the rationality of the developed method

Wind power output interval prediction method

Published Date

2023/2/2

G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR

Network distribution and sentiment interaction: Information diffusion mechanisms between social bots and human users on social media

Authors

Meng Cai,Han Luo,Xiao Meng,Ying Cui,Wei Wang

Journal

Information Processing & Management

Published Date

2023/3/1

When public health emergencies occur, a large amount of low-credibility information is widely disseminated by social bots, and public sentiment is easily manipulated by social bots, which may pose a potential threat to the public opinion ecology of social media. Therefore, exploring how social bots affect the mechanism of information diffusion in social networks is a key strategy for network governance. This study combines machine learning methods and causal regression methods to explore how social bots influence information diffusion in social networks with theoretical support. Specifically, combining stakeholder perspective and emotional contagion theory, we proposed several questions and hypotheses to investigate the influence of social bots. Then, the study obtained 144,314 pieces of public opinion data related to COVID-19 in J city from March 1, 2022, to April 18, 2022, on Weibo, and selected 185,782 …

Elastic base structure and upholstered furniture therewith

Published Date

2023/3/2

An elastic base structure and a piece of upholstered furniture therewith. The elastic base structure includes a base frame comprising a pair of first support rods and a pair of second support rods connected to the pair of first support rod to form a square or rectangular structure; a plurality of serpentine springs; and a plurality of double-branched hook clips. Each serpentine spring has two oppose ends disconnectably connected to two double-branched hook clips that are in turn disconnectably connected to the pair of first support rods, respectively, such that the plurality of serpentine springs are parallel to each other.

Adjustable bed with slidable assemblies

Published Date

2023/6/27

An adjustable bed includes a head frame assembly, a first slidable assembly having a slidable assembly base and slidable assembly sides slidable within lower C steel brackets; head lift arm bracket assemblies pivotally connected to the slidable assembly sides; and a head lift platform mounted on the head lift arm bracket assemblies, an upper seat platform mounted on the first slidable assembly, and a lower seat platform movably attached onto the higher C steel bracket; a second slidable assembly with a spacing bracket having a guiding slot mounted on the slidable assembly base and the fixing bracket being mounted on the lower seat platform, and the connecting bolt mounted on the fixing bracket and received in the guiding slot; and a head lift motor secured to the head frame assembly for operably driving the head lift arm bracket assemblies in head lift forward or backward direction.

Smart bed body structure

Published Date

2023/2/9

A smart bed body structure includes: a bed body, a control unit, a speech recognition unit and an audio device. The control unit is electrically connected with the speech recognition unit; the speech recognition unit is electrically connected with the audio device. The bed body includes: a load-bearing mechanism, at least one turnover mechanism and a base. The control unit and the audio device are arranged on the bottom face of the load-bearing mechanism. The load-bearing mechanism is arranged on the top face of the base, the turnover mechanisms being arranged between the load-bearing mechanism and the base, the load-bearing mechanism can be upwards turned over relative to the base by means of the turnover mechanisms. The control unit is electrically connected with the turnover mechanisms.

Unsupervised class-to-class translation for domain variations

Authors

Zhiyi Cao,Wei Wang,Lina Huo,Shaozhang Niu

Journal

Pattern Recognition

Published Date

2023/6/1

The majority of image-to-image translation models tend to struggle in varying domain settings. For one varying domain, samples vary significantly in shape and size and have no domain labels. This paper proposes an unsupervised class-to-class translation model based on conditional contrastive learning to tackle the domain variations problem. The initial hypothesis is that the latent modalities of two varying domains are categorizable by style differences of different samples and turn the image-to-image translation problem into class-to-class translation. Firstly, unsupervised semantic clustering is performed for each domain to divide them into multiple classes and then leverage the classification features of different classes to perform class-to-class translation. Two conditional contrastive learning loss functions for each domain are proposed to perform unsupervised semantic clustering and decompose it into multiple …

Fusing external knowledge resources for natural language understanding techniques: A survey

Authors

Yuqi Wang,Wei Wang,Qi Chen,Kaizhu Huang,Anh Nguyen,Suparna De,Amir Hussain

Journal

Information Fusion

Published Date

2023/4/1

Knowledge resources, e.g. knowledge graphs, which formally represent essential semantics and information for logic inference and reasoning, can compensate for the unawareness nature of many natural language processing techniques based on deep neural networks. This paper provides a focused review of the emerging but intriguing topic that fuses quality external knowledge resources in improving the performance of natural language processing tasks. Existing methods and techniques are summarised in three main categories: (1) static word embeddings, (2) sentence-level deep learning models, and (3) contextualised language representation models, depending on when, how and where external knowledge is fused into the underlying learning models. We focus on the solutions to mitigate two issues: knowledge inclusion and inconsistency between language and knowledge. Details on the design of each …

Multi-feature generation network-based imputation method for industrial data with high missing rate

Authors

Zheng Lv,Kai Chen,Tai Zhang,Jun Zhao,Wei Wang

Journal

Expert Systems with Applications

Published Date

2023/10/1

The integrity of industrial data is of great significance to the related technology research in the industrial field. Aiming at the problem of high missing rate of time series data in industrial system, a multi-feature generation network-based imputation algorithm is proposed in this paper, which combines variational autoencoder with generative adversarial network and transforms industrial data sequence into Gaussian mixture distribution. In order to realize data imputation by using the generation idea, a reconstruction loss function is combined to the objective function in the model, and the generated sequence not only satisfies the target distribution, but also matches the target sequence. Considering the multi-scale characteristics of industrial data, a multi-feature generation method for imputation is designed, which decomposes the data into multi-scale series and imputes the subsequences under multiple time scales …

Self-supervised learning for point cloud data: A survey

Authors

Changyu Zeng,Wei Wang,Anh Nguyen,Yutao Yue

Published Date

2023/9/1

3D point clouds are a crucial type of data collected by LiDAR sensors and widely used in transportation applications due to its concise descriptions and accurate localization. Deep neural networks (DNNs) have achieved remarkable success in processing large amount of disordered and sparse 3D point clouds, especially in various computer vision tasks, such as pedestrian detection and vehicle recognition. Among all the learning paradigms, Self-Supervised Learning (SSL), an unsupervised training paradigm that mines effective information from the data itself, is considered as an essential solution to solve the time-consuming and labor-intensive data labelling problems via smart pre-training task design. This paper provides a comprehensive survey of recent advances on SSL for point clouds. We first present an innovative taxonomy, categorizing the existing SSL methods into four broad categories based on the …

Time series prediction with input noise based on the ESN and the EM and its industrial applications

Authors

Ying Liu,Long Chen,Yunchong Li,Jun Zhao,Wei Wang

Journal

Expert Systems with Applications

Published Date

2023/5/1

Industrial time series data usually have a high noise. In this paper, an echo state network (ESN) model with input noise is proposed to address the problem of predicting time series with noise. In the ESN, the introduction of the input noise makes it difficult to accurately estimate the non-linear states of the dynamical reservoir, therefore, in this study, the states are approximated by linearizing it through an extended Kalman filter (EKF). For the learning of the model parameters, the expectation maximization algorithm (EM) is used to iteratively update all the uncertain parameters to construct the prediction intervals, where the state estimation is performed using a forward back algorithm. To verify the effectiveness of the proposed method, two benchmark data sets and three real gas data sets from steel enterprises are used in this paper. Experimental results show that the prediction accuracy of the proposed method is better …

Cannabis, cannabidiol, cannabinoids, and multigenerational policy

Authors

Albert Stuart Reece,Gary Kenneth Hulse,Wei Wang

Journal

Engineering

Published Date

2023/4/1

While classical laboratory and animal data have long established cannabinoid genotoxicity, it is only recently, with the application of modern analytical techniques, that the scale of epidemiological disease that may be attributable to cannabinoid exposure has been revealed. The importance and urgency of this work is heightened by the increased cannabis use that is accompanying the relaxation of legislation around cannabis use in many places, the widespread global movement toward cannabis legalization, and the general increase in the cannabinoid potency of available strains. Building on an original pathfinding epidemiological study of congenital anomalies in Hawaii, the United States [1] and confirmed by similar findings from Colorado in the United States, Canada, and Australia [2],[3],[4], contemporary studies in the United States and Europe have found that 46/62 and 90/95 congenital anomalies [5],[6 …

Pathogen diversity in meta-population networks

Authors

Yanyi Nie,Xiaoni Zhong,Tao Lin,Wei Wang

Journal

Chaos, Solitons & Fractals

Published Date

2023/1/1

The pathogen diversity means that multiple strains coexist, and widely exist in the biology systems. The new mutation of SARS-CoV-2 leading to worldwide pathogen diversity is a typical example. What are the main factors of inducing the pathogen diversity? Previous studies indicated the pathogen mutation is the most important reason for inducing the pathogen diversity. The traffic network and gene network are crucial in shaping the dynamics of pathogen contagion, while their roles for the pathogen diversity still lacking a theoretical study. To this end, we propose a reaction–diffusion process of pathogens with mutations on meta-population networks, which includes population movement and strain mutation. We extend the Microscopic Markov Chain Approach (MMCA) to describe the model. Traffic networks make pathogen diversity more likely to occur in cities with lower infection densities. The likelihood of …

Link cooperation effect of cooperative epidemics on complex networks

Authors

Jun Wang,Shimin Cai,Wei Wang,Tao Zhou

Journal

Applied Mathematics and Computation

Published Date

2023/1/15

Epidemic spreading dynamic is usually used to describe the virus spread in the biology system and information diffusion in the social system. Previous studies indicated that multiple epidemics rarely evolve dependently, but constantly interact and coevolve. In this paper, a novel mathematical model is proposed to study the link cooperation effect of two epidemics cooperatively spreading on complex networks. The link cooperation effect means that the first epidemic is transmitted through this link, and the second epidemic will have a higher transmission probability when it is transmitted through the same link. We develop an edge-based compartmental method and can well predict the numerical simulations. We find the link cooperation effect promote the epidemic outbreak size. The phase transition is closely relates to the strength of the link cooperation effect and network topology. For the cooperate epidemics on ER …

Distinct Gag interaction properties of HIV-1 RNA 5′ leader conformers reveal a mechanism for dimeric genome selection

Authors

Xin Yang,Yong Liu,Wen Cui,Mengmeng Liu,Wei Wang

Journal

RNA

Published Date

2023/2/1

During HIV-1 assembly, two copies of viral genomic RNAs (gRNAs) are selectively packaged into new viral particles. This process is mediated by specific interactions between HIV-1 Gag and the packaging signals at the 5′ leader (5′L) of viral gRNA. 5′L is able to adopt different conformations, which promotes either gRNA dimerization and packaging or Gag translation. Dimerization and packaging are coupled. Whether the selective packaging of the gRNA dimer is due to favorable interactions between Gag and 5′L in the packaging conformation is not known. Here, using RNAs mimicking the two 5′L conformers, we show that the 5′L conformation dramatically affects Gag–RNA interactions. Compared to the RNA in the translation conformation (5′LT), the RNA in the packaging conformation (5′LP) can bind more Gag molecules. Gag associates with 5′LP faster than it binds to 5′LT, whereas Gag …

Reliability analysis of interdependent hypergraph network under different attack strategies

Authors

Hao Peng,Ziyi Xie,Dandan Zhao,Ming Zhong,Jianmin Han,Wei Wang

Journal

International Journal of Modern Physics C

Published Date

2023/2/30

Nodes usually cooperate to form groups and survive or fail in real-world systems. Researchers typically consider the interdependence between node groups in studying the interdependent network. This paper studies the robustness of interdependent hypergraph networks under different attack strategies. According to the characteristics of the network model, we propose a series of target attack strategies and compare the destructive effect of these strategies on the network. Second, we analyze the impact of the random edge removal strategy on the robustness of hypergraph networks under different edge removal ratios. Finally, we propose four target-node edge removal strategies and compare their destructive effects on the network at the same edge removal ratios. Simulation results show that target attack and edge removal strategies can appreciably reduce the robustness of interdependent hypergraph networks …

Inference of isA commonsense knowledge with lexical taxonomy

Authors

Chao Wang,Jingping Liu,Juntao Liu,Wei Wang

Journal

Applied Intelligence

Published Date

2023/3

Commonsense knowledge is a crucial resource to help the machine understand the human world. However, the conventional methods of extracting commonsense knowledge with isA relation (or isA commonsense knowledge) from text corpora generally do not work well since commonsense knowledge is typically omitted in communication. In this paper, we mainly focus on the inference of isA commonsense knowledge (the definition of isA here to express a hypernym-hyponym relationship and we concentrate on whether the description of (s, isA, o) is correct based on this relationship, e.g., (mammal, isA, animal), (Hello Kitty, isA, cat)) with a special kind of knowledge graph: lexical taxonomy. Lexical and semantic features of terms are both extracted from three relationships including exclusive, compatible, andinclusive relationships then a simple but effective classification model is further utilized to predict whether …

Dumpy: A compact and adaptive index for large data series collections

Authors

Zeyu Wang,Qitong Wang,Peng Wang,Themis Palpanas,Wei Wang

Journal

Proceedings of the ACM on Management of Data

Published Date

2023/5/30

Data series indexes are necessary for managing and analyzing the increasing amounts of data series collections that are nowadays available. These indexes support both exact and approximate similarity search, with approximate search providing high-quality results within milliseconds, which makes it very attractive for certain modern applications. Reducing the pre-processing (i.e., index building) time and improving the accuracy of search results are two major challenges. DSTree and the iSAX index family are state-of-the-art solutions for this problem. However, DSTree suffers from long index building times, while iSAX suffers from low search accuracy. In this paper, we identify two problems of the iSAX index family that adversely affect the overall performance. First, we observe the presence of a proximity-compactness trade-off related to the index structure design (i.e., the node fanout degree), significantly limiting …

A condition knowledge representation and feedback learning framework for dynamic optimization of integrated energy systems

Authors

Tianyu Wang,Jun Zhao,Henry Leung,Wei Wang

Journal

IEEE Transactions on Cybernetics

Published Date

2023/2/6

An optimal energy scheduling strategy for integrated energy systems (IESs) can effectively improve the energy utilization efficiency and reduce carbon emissions. Due to the large-scale state space of IES caused by uncertain factors, it would be beneficial for the model training process to formulate a reasonable state-space representation. Thus, a condition knowledge representation and feedback learning framework based on contrastive reinforcement learning is designed in this study. Considering that different state conditions would bring inconsistent daily economic costs, a dynamic optimization model based on deterministic deep policy gradient is established, so that the condition samples can be partitioned according to the preoptimized daily costs. In order to represent the overall conditions on a daily basis and constrain the uncertain states in the IES environment, the state-space representation is constructed by …

Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning

Authors

Xiaoting Lyu,Yufei Han,Wei Wang,Jingkai Liu,Bin Wang,Jiqiang Liu,Xiangliang Zhang

Journal

Proceedings of the AAAI Conference on Artificial Intelligence

Published Date

2023/6/26

Are Federated Learning (FL) systems free from backdoor poisoning with the arsenal of various defense strategies deployed? This is an intriguing problem with significant practical implications regarding the utility of FL services. Despite the recent flourish of poisoning-resilient FL methods, our study shows that carefully tuning the collusion between malicious participants can minimize the trigger-induced bias of the poisoned local model from the poison-free one, which plays the key role in delivering stealthy backdoor attacks and circumventing a wide spectrum of state-of-the-art defense methods in FL. In our work, we instantiate the attack strategy by proposing a distributed backdoor attack method, namely Cerberus Poisoning (CerP). It jointly tunes the backdoor trigger and controls the poisoned model changes on each malicious participant to achieve a stealthy yet successful backdoor attack against a wide spectrum of defensive mechanisms of federated learning techniques. Our extensive study on 3 large-scale benchmark datasets and 13 mainstream defensive mechanisms confirms that Cerberus Poisoning raises a significantly severe threat to the integrity and security of federated learning practices, regardless of the flourish of robust Federated Learning methods.

Characterization of the fragmented mitochondrial genome of domestic pig louse Haematopinus suis (Insecta: Haematopinidae) from China

Authors

Rong Li,Yu Nie,Yi-Tian Fu,Yuan-Ping Deng,Wei Wang,Ping-Ping Ma,Guo-Hua Liu

Journal

Systematic Parasitology

Published Date

2023/10

The domestic pig louse Haematopinus suis (Linnaeus, 1758) (Phthiraptera: Anoplura) is a common ectoparasite of domestic pigs, which can act as a vector of various infectious disease agents. Despite its significance, the molecular genetics, biology and systematics of H. suis from China have not been studied in detail. In the present study, the entire mitochondrial (mt) genome of H. suis isolate from China was sequenced and compared with that of H. suis isolate from Australia. We identified 37 mt genes located on nine circular mt minichromosomes, 2.9 kb-4.2 kb in size, each containing 2-8 genes and one large non-coding region (NCR) (1,957 bp-2,226 bp). The number of minichromosomes, gene content, and gene order in H. suis isolates from China and Australia are identical. Total sequence identity across coding regions was 96.3% between H. suis isolates from China and Australia. For the 13 protein-coding …

A novel cross-network node pair embedding methodology for anchor link prediction

Authors

Huanran Wang,Wu Yang,Dapeng Man,Wei Wang,Jiguang Lv,Meng Joo Er

Journal

World Wide Web

Published Date

2023/9

Anchor link prediction across social networks is highly important for multiple social network analysis. Traditional methods rely heavily on user-generated information or the quality of network topology information and are not suitable for real-life multiple social networks. Deep learning methods based on graph embedding are limited by the latent similarity of the associated nodes in a single network and the overlap between different networks used for projections of multiple network feature spaces. In this paper, we propose a novel method which eliminates overlapping restriction. The proposed method consists of two phases. First, graph embedding with reconciliation of similarity and distinction is used to obtain an effective embedding vector space. Second, cross-network features for supervised learning are constructed via cross-network feature mining based on collisions between the features of nodes belonging to …

Generating estimates by combining unsupervised and supervised machine learning

Published Date

2023/3/30

A method may include obtaining a cluster. The cluster may include a subset of reference entities. The method may further include calculating distances between features of a target entity and features of the subset of reference entities, selecting, based on the distances, peer entities from the subset, and generating an estimated value of a metric. The generating may include applying, to the features of the target entity, a machine learning model trained using training data including values of the features for the peer entities labeled with a value of the metric. The method may further include presenting the estimated value of the metric.

Code recommendation for open source software developers

Authors

Yiqiao Jin,Yunsheng Bai,Yanqiao Zhu,Yizhou Sun,Wei Wang

Published Date

2023/4/30

Open Source Software (OSS) is forming the spines of technology infrastructures, attracting millions of talents to contribute. Notably, it is challenging and critical to consider both the developers’ interests and the semantic features of the project code to recommend appropriate development tasks to OSS developers. In this paper, we formulate the novel problem of code recommendation, whose purpose is to predict the future contribution behaviors of developers given their interaction history, the semantic features of source code, and the hierarchical file structures of projects. We introduce CODER, a novel graph-based CODE Recommendation framework for open source software developers, which accounts for the complex interactions among multiple parties within the system. CODER jointly models microscopic user-code interactions and macroscopic user-project interactions via a heterogeneous graph and further …

Formation control of TS fuzzy systems with event-triggered sampling scheme via membership function dependent approach

Authors

Wei Wang,Chi Huang,Hak-Keung Lam,Li Wang

Journal

Information Sciences

Published Date

2023/4/1

Formation control of multi-agent systems has a wide range of applications, but it has not been paid much attention in Takagi–Sugeno (T-S) fuzzy systems. In this paper, an event-triggered sampling strategy is designed for the formation control of T-S fuzzy systems, which allows the fuzzy controller and the fuzzy model not to share the same membership functions. The control strategy reduces the transmission frequency of sampling states by setting event conditions for information transmission. By means of Lyapunov stability theory, a set of formation conditions based on LMI is established. Less conservative and more efficient conditions are also obtained based on the properties of membership functions. Numerical examples show the validity of the proposed formation conditions, and the conservatism of the two criteria is compared.

Few-shot learning with unsupervised part discovery and part-aligned similarity

Authors

Wentao Chen,Zhang Zhang,Wei Wang,Liang Wang,Zilei Wang,Tieniu Tan

Journal

Pattern Recognition

Published Date

2023/1/1

Few-shot learning aims to recognize novel concepts with only a few examples. To this end, previous studies resort to acquiring a strong inductive bias via meta-learning on a group of similar tasks, which however needs a large labeled base dataset to sample training tasks. In this paper, we show that such inductive bias can be learned from a flat collection of unlabeled images, and instantiated as transferable representations among seen and unseen classes. Specifically, we propose a novel unsupervised Part Discovery Network (PDN) to learn transferable representations from unlabeled images, which automatically selects the most discriminative part from an input image and then maximizes its similarities to the global view of the input and other neighbors with similar semantics. To better leverage the learned representations for few-shot learning, we further propose Part-Aligned Similarity (PAS), the key of which is …

Lumbar support mechanism and head tilt mechanism and adjustable bed therewith

Published Date

2023/12/12

The lumbar support mechanism and an adjustable bed having the same. The lumbar support mechanism includes a lumbar support member; first, second, third and fourth support legs; a linkage member; and first and second lumbar support brackets operably attachable to a back platform of the adjustable bed. The first and second support legs are pivotally connected between the lumbar support member and the linkage member; and the third and fourth support legs are pivotally connected between the first and second support legs, and the first and second lumbar support brackets, respectively, such that the lumbar support member is operably movable between a retracted position and an expanded (ejected) position when the linkage member moves between first and second positions. The lumbar support is provided when the lumbar support member is in the ejected position.

A novel data-driven approach to analysis and optimal design of forced periodic operation of chemical reactions

Authors

Yuhan Dong,Zi-Qiang Lang,Jun Zhao,Wei Wang,Zhong Lan

Journal

IEEE Transactions on Industrial Electronics

Published Date

2023/1/4

Forced periodic operation is a technique that periodically changes the manipulating variable of a chemical reaction system in order to exploit nonlinear dynamics to improve reactant conversion rate. However, the analysis and design of a periodically operated chemical process is a significant challenge. To resolve this problem, recently, nonlinear frequency response (NFR) based methods have been proposed. However, because of the need to derive the NFR from a first principle model, existing NFR methods can only perform qualitative analysis to simple processes and are often difficult to be applied in engineering practice. This article proposes a novel data driven approach to the analysis and optimal design of forced periodic operation of chemical reactions. From the data generated numerically using the first principle model or experimentally from experimental tests, the approach produces a data-driven NFR …

Community detection fusing graph attention network

Authors

Ruiqiang Guo,Juan Zou,Qianqian Bai,Wei Wang,Xiaomeng Chang

Journal

Mathematics

Published Date

2022/11/7

It has become a tendency to use a combination of autoencoders and graph neural networks for attribute graph clustering to solve the community detection problem. However, the existing methods do not consider the influence differences between node neighborhood information and high-order neighborhood information, and the fusion of structural and attribute features is insufficient. In order to make better use of structural information and attribute information, we propose a model named community detection fusing graph attention network (CDFG). Specifically, we firstly use an autoencoder to learn attribute features. Then the graph attention network not only calculates the influence weight of the neighborhood node on the target node but also adds the high-order neighborhood information to learn the structural features. After that, the two features are initially fused by the balance parameter. The feature fusion module extracts the hidden layer representation of the graph attention layer to calculate the self-correlation matrix, which is multiplied by the node representation obtained by the preliminary fusion to achieve secondary fusion. Finally, the self-supervision mechanism makes it face the community detection task. Experiments are conducted on six real datasets. Using four evaluation metrics, the CDFG model performs better on most datasets, especially for the networks with longer average paths and diameters and smaller clustering coefficients.

Usage Mining of the London Santander Bike-Sharing System

Authors

Suparna De,Wei Wang,Usamah Jassat,Klaus Moessner

Journal

Computer

Published Date

2022/11/24

With cycling moving from being a pastime to a mainstream form of mobility and transport, bike-sharing systems (BSSs) are increasingly being deployed in many cities. Analysis of BSS usage data can provide insights into factors that shape the patterns of trips, uncovering latent city dynamics.

Emotion recognition from gait analyses: Current research and future directions

Authors

Shihao Xu,Jing Fang,Xiping Hu,Edith Ngai,Yi Guo,Victor Leung,Jun Cheng,Bin Hu

Published Date

2020/3/13

Human gait refers to a daily motion that represents not only mobility but can also be used to identify the walker by either human observers or computers. Recent studies reveal that gait even conveys information about the walker’s emotion. Individuals in different emotion states may show different gait patterns. The mapping between various emotions and gait patterns provides a new source for automated emotion recognition. Compared to traditional emotion detection biometrics, such as facial expression, speech, and physiological parameters, gait is remotely observable, more difficult to imitate, and requires less cooperation from the subject. These advantages make gait a promising source for emotion detection. This article reviews current research on gait-based emotion detection, particularly on how gait parameters can be affected by different emotion states and how the emotion states can be recognized through …

Evaluation of pulmonary single‐cell identity specificity in scRNA‐seq analysis

Authors

Xuanqi Liu,Guang Xu,Chengshui Chen,Yuanlin Song,Wei Wang,Xiangdong Wang

Journal

Clinical and Translational Medicine

Published Date

2022/12

Dear Editor, The single cell RNA sequencing (scRNA-seq) technology provides new insights into understanding of single-cell transcriptomic atlas and intercellular communication. 1 scRNA-seq is used to characterize the considerable heterogeneity and complexity of cell type, to uncover the cell fate and context, critical molecular features and progression trajectories, as well as to explore potential pathogenesis and individualized therapeutic targets. 2–4 One of major challenges is to identify of biology-specific biomarkers as the cell identity for cell phenotypes and functional subtypes, although bioinformatic and fstatistical methods for scRNA-seq are developed and improved rapidly. 5 More and more cell type/subtypes are identified in response to various stimulus, external challenge and even pathological conditions. The correctness and specificity of cell-specific transcriptomic profiles based on scRNA-seq are highly …

Aspect-Based Sentiment Analysis with Multi-Task Learning

Authors

Yu Pei,Yuqi Wang,Wei Wang,Jun Qi

Published Date

2022/12/16

In the era of big data, with an increasing number of e-commerce and social media users worldwide, the demand for automated sentiment analysis systems is growing rapidly. With respect to industrial interests, aspect-based sentiment analysis (ABSA), which focuses on the sentiment at the aspect level, has become a popular research topic. ABSA includes two subtasks aspect-term sentiment analysis (ATSA) and aspect-category sentiment analysis (ACSA). This paper proposes a multi-task learning framework based on the pre-trained BERT model as a shared representation layer to jointly learn ATSA and ACSA tasks. To fully exploit the contextual information surrounding the aspects, we add a multi-head self-attention layer with a skip connection on top of the shared BERT model. Experimental results on SemEval datasets show that our multi-task learning model improves the performance of the ATSA task and …

DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference

Authors

Euijin Choo,Mohamed Nabeel,Mashael Alsabah,Issa Khalil,Ting Yu,Wei Wang

Journal

ACM Transactions on Privacy and Security

Published Date

2022/11/7

We propose to identify compromised mobile devices from a network administrator’s point of view. Intuitively, inadvertent users (and thus their devices) who download apps through untrustworthy markets are often lured to install malicious apps through in-app advertisements or phishing. We thus hypothesize that devices sharing similar apps would have a similar likelihood of being compromised, resulting in an association between a compromised device and its apps. We propose to leverage such associations to identify unknown compromised devices using the guilt-by-association principle. Admittedly, such associations could be relatively weak as it is hard, if not impossible, for an app to automatically download and install other apps without explicit user initiation. We describe how we can magnify such associations by carefully choosing parameters when applying graph-based inferences. We empirically evaluate …

A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology

Authors

Jiasheng Cui,Li Duan,Mengchen Li,Wei Wang

Published Date

2022/11/18

Internet of Things (IoT) data from different trust domains is usually shared to assist in providing more services, where privacy sensitive information of shared data will be leaked or accessed without authorization. The traditional centralized access control method is difficult to adapt to the current dynamic and distributed large-scale IoT environment, and there is a risk of the single point of failure. To address these challenges, we propose a fine-grained access control framework for shared data based on cross-blockchain technology and Interplanetary File System (IPFS). In this framework, we firstly introduce a cross-blockchain module to realize cross-domain data sharing and solve the problem of data isolation between different data domains in IoT. Then IPFS is used to store the shared data, avoiding the risk of centralized storage. Combining symmetric encryption algorithm with ciphertext policy attribute based …

CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance

Authors

Longyang Yi,Yangyang Sun,Bin Wang,Li Duan,Hongliang Ma,Bin Wang,Zhen Han,Wei Wang

Journal

International Journal of Intelligent Systems

Published Date

2022/12

Usage‐based insurance (UBI) provides reasonable vehicle insurance premiums based on vehicle usage and driving behavior. In general, there are three major issues in realizing intelligent UBI systems. First, UBI evaluation mechanisms are not auditable to drivers. Insurers may thus deliberately adjust the UBI premiums. Second, the process of collecting driving data by insurers may lead to serious privacy breaches. Third, forging safer driving data for reducing insurance premiums may cause economic losses for insurers. To address these challenges, in this study, we propose CCUBI, a cross‐chain‐based premium competition scheme with privacy preservation for intelligent UBI systems. We introduce tamper‐resistant blockchain and smart contracts to construct credible insurance mechanisms. The cross‐chain technology connects these blockchains in the entire network to form an open premium competition …

Immunoglobulin G N-glycan, inflammation and type 2 diabetes in East Asian and European populations: a Mendelian randomization study

Authors

Biyan Wang,Di Liu,Manshu Song,Wei Wang,Bo Guo,Youxin Wang

Journal

Molecular Medicine

Published Date

2022/12

BackgroundImmunoglobulin G (IgG) N-glycans have been shown to be associated with the risk of type 2 diabetes (T2D) and its risk factors. However, whether these associations reflect causal effects remain unclear. Furthermore, the associations of IgG N-glycans and inflammation are not fully understood.MethodsWe examined the causal associations of IgG N-glycans with inflammation (C-reactive protein (CRP) and fibrinogen) and T2D using two-sample Mendelian randomization (MR) analysis in East Asian and European populations. Genetic variants from IgG N-glycan quantitative trait loci (QTL) data were used as instrumental variables. Two-sample MR was conducted for IgG N-glycans with inflammation (75,391 and 18,348 participants of CRP and fibrinogen in the East Asian population, 204,402 participants of CRP in the European population) and T2D risk (77,418 cases and 356,122 controls of East Asian …

Enhancing Controllability of Complex Networks with Minimum Cost

Authors

Jia Li,Jie Ding,Wei Wang

Published Date

2022/12/16

Complex networks operate in all areas of human life. As a key and popular research direction in the complexity discipline, the study of complex networks has a significant impact and contribution to multidisciplinary fields. In this paper, we study the problem of enhancing network controllability by adding edges from a given candidate set with minimum cost based on the structural controllability theory of complex networks. Specifically, we first formulate such a problem as a bi-objective network optimization model and then transform it into a network flow problem. An algorithm named Controllability Enhancement based Minimum-cost Max-flow (CEMM) is proposed, which can achieve: 1) A certain number of edges selected in the candidate set are added to a network such that the number of driver nodes is minimized; 2) The minimum cost of newly added edges is guaranteed. The feasibility of CEMM is verified by …

Correction of measurement errors on sediment concentration sampled by stirring-sampling method from traditional runoff collection tanks

Authors

Yuhan Huang,Mingquan Zhao,Hui Zhao,Tingwu Lei,Ju Tang,Wei Wang

Journal

International Journal of Agricultural and Biological Engineering

Published Date

2022/12/27

Stirring-sampling method is a widely adopted method to measure sediment concentrations in collection tanks of runoff plots, but with high systematic measurement errors. This research aimed to advance an approach for building correction equations to remove measurement errors in designed sediment concentration range. Experimental data of sediment measurement from the stirring-sampling method, with four representative soils, under the designed sediment concentrations (1, 2, 5, 8, 10, 20, 50, 80, 100, 200, 500, 800, and 1000 kg/m3) were used to demonstrate the correction methodological process. Two correction methods (step-wise correction and universal correction) were suggested for the trial in this study based on the distribution of measurement errors. In the step-wise correction, the correction equations were made with a series of linear functions without intercept for the low concentration group (0-20 kg/m3), a series of linear functions with intercept for the high (20-200 kg/m3) and extremely high (200-1000 kg/m3) concentration groups, consecutively. The correction equations were a series of power functions in the universal correction. For the step-wise correction, most of the relative errors of correction sediment concentrations were smaller than 15% and 10% under high and extremely high concentration groups, but the corrected accuracy was not good in the sediment concentration of 1, 2, 5 kg/m3 with the corrected relative errors of 0.20%-206.07%. For the universal correction, the corrected relative errors (0.19%-31.81%) of the four soils were low under the condition of extremely high sediment concentrations, but other corrected …

Introducing semantics into speech encoders

Authors

Derek Xu,Shuyan Dong,Changhan Wang,Suyoun Kim,Zhaojiang Lin,Akshat Shrivastava,Shang-Wen Li,Liang-Hsuan Tseng,Alexei Baevski,Guan-Ting Lin,Hung-yi Lee,Yizhou Sun,Wei Wang

Journal

arXiv preprint arXiv:2211.08402

Published Date

2022/11/15

Recent studies find existing self-supervised speech encoders contain primarily acoustic rather than semantic information. As a result, pipelined supervised automatic speech recognition (ASR) to large language model (LLM) systems achieve state-of-the-art results on semantic spoken language tasks by utilizing rich semantic representations from the LLM. These systems come at the cost of labeled audio transcriptions, which is expensive and time-consuming to obtain. We propose a task-agnostic unsupervised way of incorporating semantic information from LLMs into self-supervised speech encoders without labeled audio transcriptions. By introducing semantics, we improve existing speech encoder spoken language understanding performance by over 10\% on intent classification, with modest gains in named entity resolution and slot filling, and spoken question answering FF1 score by over 2\%. Our unsupervised approach achieves similar performance as supervised methods trained on over 100 hours of labeled audio transcripts, demonstrating the feasibility of unsupervised semantic augmentations to existing speech encoders.

Surplus-based accelerated algorithms for distributed optimization over directed networks

Authors

Dong Wang,Zhu Wang,Jie Lian,Wei Wang

Journal

Automatica

Published Date

2022/12/1

This paper investigates a distributed optimization problem based on the framework of a multi-agent system over a directed communication network, where the global cost function is the sum of the local cost functions of agents. The communication network is abstracted as a weight-unbalanced directed graph. First, a surplus-based accelerated algorithm with a fixed stepsize (SAAFS) is proposed by integrating the gradient tracking strategy into the surplus-based consensus protocol to address the problem considered. The matrix norm argument and matrix perturbation theory are employed to prove the linear convergence of SAAFS under the assumption that each local cost function is strongly convex with the Lipschitz continuous gradient. Second, the limitation of the stepsize, which is common to all agents, is relaxed in the cases of different stepsizes for each agent, such that the surplus-based accelerated algorithm …

Distributed Adaptive Output Feedback Consensus Tracking of Uncertain Multi-Agent Systems with Communication Delays and Switching Typologies

Authors

Yaozhong Zhang,Jiang Long,Wei Wang

Published Date

2022/12/16

This paper investigates the adaptive consensus tracking control problem for a class of high-order multi-agent systems in a strict feedback form under a directed topology condition. In contrast to the existing consensus tracking results, in this paper, unknown system parameters, unmeasurable states, communication delays and switching topologies of the multiagent systems are considered simultaneously. Given the fact that only the system output is available in the controller design, a group of state estimation filters is designed for each agent to observe its own and its neighbors’ unmeasurable states. By incorporating adaptive backstepping technique with a novel Lyapunov-Krasovskii function, a distributed consensus tracking control scheme is then proposed under switching topology condition. It is shown that with the proposed control scheme, the boundedness of all the closed-loop signals can be guaranteed and …

A risk factor attention-based model for cardiovascular disease prediction

Authors

Yanlong Qiu,Wei Wang,Chengkun Wu,Zhichang Zhang

Journal

BMC bioinformatics

Published Date

2022/12

BackgroundCardiovascular disease (CVD) is a serious disease that endangers human health and is one of the main causes of death. Therefore, using the patient’s electronic medical record (EMR) to predict CVD automatically has important application value in intelligent assisted diagnosis and treatment, and is a hot issue in intelligent medical research. However, existing methods based on natural language processing can only predict CVD according to the whole or part of the context information of EMR.ResultsGiven the deficiencies of the existing research on CVD prediction based on EMRs, this paper proposes a risk factor attention-based model (RFAB) to predict CVD by utilizing CVD risk factors and general EMRs text, which adopts the attention mechanism of a deep neural network to fuse the character sequence and CVD risk factors contained in EMRs text. The experimental results show that the proposed …

DeFiScanner: Spotting DeFi attacks exploiting logic vulnerabilities on blockchain

Authors

Bin Wang,Xiaohan Yuan,Li Duan,Hongliang Ma,Chunhua Su,Wei Wang

Journal

IEEE Transactions on Computational Social Systems

Published Date

2022/12/21

With the rapid development of decentralized financial (DeFi), the total value locked (TVL) in DeFi continues to increase. A big number of adversaries exploit logic vulnerabilities to attack DeFi applications for profit, such as flash loan attacks and price manipulation attacks. However, the current vulnerability detection tools for smart contracts cannot be directly used to detect the logic vulnerabilities generated by the combination of different protocols. How to characterize and detect DeFi attacks that exploited logic vulnerabilities is a big challenge. In this work, we propose a deep-learning-based attack detection system on DeFi, called DeFiScanner, in which we design a novel neural network that includes a global model, a local model, and a fusion model to characterize DeFi attacks. First, the unstructured emitted events are automatically and efficiently normalized. Second, the transaction-related features of normalized …

Foldable and adjustable beds

Published Date

2022/11/10

A foldable bed includes a plurality of boards comprising an upper board, a middle board, and a lower board; a support assembly for supporting the plurality of boards, wherein the support assembly includes a first support structure for supporting the upper board and the middle board, and a second support structure for supporting the lower board; and a pair of connection mechanisms for connecting the first support structure and the second support structure such that the first support structure and the second support structure are pivotally foldable relative to one another at the pair of connection mechanisms.

A Fine-grained Attention Mechanism Model of Knowledge Graph for Recommendation

Authors

Zheng Lv,Yindi Li,Jun Zhao,Wei Wang

Published Date

2022/11/25

Data sparsity and cold start are very challenging and popular problems in the field of recommendation. This paper establishes a personalized model of knowledge graph fine-grained attention mechanism for recommendation(KGFARS). At the user side, the attention mechanism is introduced to capture the weight assigned by use to item, and the information of items is aggregated to learn user’s embedding. A fine-grained attention mechanism algorithm is proposed on the item side, which essentially consists of a two-stage preference: 1) the preference of user and relationship which between a given item and a neighborhood; 2) the preference of user and corresponding neighborhood under the relationship. In addition, a multi-channel information aggregation function is designed for the fusion process of item and neighborhoods, which allows similar entities to transmit more information and improve the generalization …

Method for construction of long-term prediction intervals and its structural learning for gaseous system in steel industry

Published Date

2022/12/13

The present invention belongs to the field of information technology, involving the techniques of fuzzy modeling, reinforcement learning, parallel computing, etc. It is a method combining granular computing and reinforcement learning for construction of long-term prediction interval and determination of its structure. Adopting real industrial data, the present invention constructs multi-layer structure for assigning information granularity in unequal length and establishes corresponding optimization model at first. Then considering the importance of the structure on prediction accuracy, Monte-Carlo method is deployed to learn the structural parameters. Based on the optimal multi-layer granular computing structure along with implementing par allel computing strategy, the long-term prediction intervals of gaseous generation and consumption are finally obtained. The proposed method exhibits superiority on accuracy and …

Connect Your UAV to the Cloud Using Urban 4G and 5G Cellular Networks: Performance Evaluation and Comparison

Authors

Dawei Liu,Qiwen Chen,Shuchang Li,Ziniu Wu,Liqi Chen,Xu He,Xin Huang,Wei Wang

Journal

IEEE Internet of Things Magazine

Published Date

2022/12

Use of unmanned aerial vehicles (UAVs) for urban services has been an exciting topic in today's urban planning and management research. Most UAVs use unlicensed spectrum for remote control and communications. Their communication distance is limited within a few hundred meters; and the control channel is prone to interference. In comparison, urban cellular networks can cover a wide urban area with a low chance of interference, making them a viable alternative for UAVs on services that require real-time and reliable connections. In this article we provide a performance evaluation of this concept. We first address some key challenges in designing and implementing a UAV platform connected to cellular networks. The cellular networks include 4G and 5G. Then we use the platform to test the actual performance of 4G and 5G in urban areas with a focus on their signal strength and packet delay. A comparative …

Tbfl: A trusted blockchain-based federated learning system

Authors

Yufang Wu,Guorong Chen,Yuhao Liu,Chao Li,Mingqing Hu,Wei Wang

Published Date

2022/12/18

Federated learning (FL) is a promising distributed machine learning architecture that allows participants to cooperatively train a global model without sharing local data. However, both the trust of a central FL server and well-designed attacks against FL have significantly restricted the development of FL. In this work, we propose TBFL, a trusted blockchain-based federated learning system. It replaces the traditional central server with the functionalities provided by a decentralized blockchain. To prevent malicious participants from attacking the global model, TBFL employs a novel model verification and a scoring mechanism to keep detecting malicious participants. In addition, TBFL leverages a scalable incentive mechanism to enhance its reliability and fairness. We demonstrate the efficacy and attack-resilience of the proposed TBFL through experimental evaluation. The results validate the great performance and …

A Blockchain-Based Product Traceability System with Off-Chain EPCIS and IoT Device Authentication

Authors

Lulu Li,Huan Qu,Huaizhen Wang,Junyu Wang,Bozhi Wang,Wei Wang,Jinfei Xu,Zhihui Wang

Journal

Sensors

Published Date

2022/11/10

Blockchain-based traceability systems are a promising approach because they are decentralized, transparent, and tamper proof; however, if all traceability data are uploaded to a blockchain platform, it may affect the efficiency or even lead to data explosion. Additionally, it is difficult to guarantee the reliability of the original data source of massive Internet of Things (IoT) devices. Furthermore, when different enterprise nodes adopt different data storage structures, the costs that are associated with data sharing will increase. In this paper, we have proposed a trustworthy product traceability system that is based on hyperledger fabric and Electronic Product Code Information Service (EPCIS), which is not only capable of making products traceable, but it can also authenticate and authorize the IoT devices that are used for data collection. First, we adopted the on-chain and off-chain collaborative management mechanism in order to alleviate data explosion on the chain. Second, we proposed a scheme to authenticate and authorize devices based on blockchain. Third, we complied with EPCIS and Core Business Vocabulary (CBV) standards and provided the EPCIS location discovery service in order to improve the interactivity. Finally, we implemented and tested the proposed traceability system and compared it with the existing research. The proposed solution provides product information traceability, data tamper proofing, data confidentiality, and data source reliability.

Intelligent Computing for Big Data

Authors

Wei Wang,Ka Lok Man

Published Date

2022/11/24

Intelligent Computing for Big Data Edited by Intelligent Computing for Big Data Wei Wang and Ka Lok Man Printed Edition of the Special Issue Published in Applied Sciences www. mdpi. com/journal/applsci Page 2 Intelligent Computing for Big Data Page 3 Page 4 Intelligent Computing for Big Data Editors Wei Wang Ka Lok Man MDPI• Basel• Beijing• Wuhan• Barcelona• Belgrade• Manchester• Tokyo• Cluj• Tianjin Page 5 Editors Wei Wang Xi’an Jiaotong-Liverpool University China Ka Lok Man Xi’an Jiaotong-Liverpool University China Editorial Office MDPI St. Alban-Anlage 66 4052 Basel, Switzerland This is a reprint of articles from the Special Issue published online in the open access journal Applied Sciences (ISSN 2076-3417)(available at: https://www. mdpi. com/journal/applsci/special issues/Intelligent Computing Big Data). For citation purposes, cite each article independently as indicated on the article page …

Fully distributed adaptive consensus tracking of uncertain nonlinear multi-agent systems: an augmented system approach

Authors

Jiang Long,Yangming Guo,Zun Liu,Wei Wang,Siwen Zhou

Journal

IEEE Transactions on Circuits and Systems II: Express Briefs

Published Date

2022/12/8

In this brief, we investigate the consensus tracking control problem for first-order nonlinear multi-agent systems with unknown system parameters, external disturbances and directed communication graph. The system dynamics of each agent is not required to satisfy Lipschitz condition. Besides, the desired trajectory is not of linearly parameterized form with basis functions known by all the agents. In this setting, how to design a fully distributed adaptive control scheme to guarantee consensus tracking is a difficult issue since non-symmetric Laplacian matrix brings difficulties of designing fully distributed parameter update laws. To solve this issue, the design idea of transforming the original first-order multi-agent systems into augmented second-order multi-agent systems is firstly presented. Based on adaptive backstepping technique, a novel fully distributed consensus tracking control scheme is then proposed. Finally …

ML-parser: An efficient and accurate online log parser

Authors

Yu-Qian Zhu,Jia-Ying Deng,Jia-Chen Pu,Peng Wang,Shen Liang,Wei Wang

Journal

Journal of Computer Science and Technology

Published Date

2022/12

A log is a text message that is generated in various services, frameworks, and programs. The majority of log data mining tasks rely on log parsing as the first step, which transforms raw logs into formatted log templates. Existing log parsing approaches often fail to effectively handle the trade-off between parsing quality and performance. In view of this, in this paper, we present Multi-Layer Parser (ML-Parser), an online log parser that runs in a streaming manner. Specifically, we present a multi-layer structure in log parsing to strike a balance between efficiency and effectiveness. Coarse-grained tokenization and a fast similarity measure are applied for efficiency while fine-grained tokenization and an accurate similarity measure are used for effectiveness. In experiments, we compare ML-Parser with two existing online log parsing approaches, Drain and Spell, on ten real-world datasets, five labeled and five unlabeled …

Advcat: Domain-agnostic robustness assessment for cybersecurity-critical applications with categorical inputs

Authors

Helene Orsini,Hongyan Bao,Yujun Zhou,Xiangrui Xu,Yufei Han,Longyang Yi,Wei Wang,Xin Gao,Xiangliang Zhang

Published Date

2022/12/17

Machine Learning-as-a-Service systems (MLaaS) have been largely developed for cybersecurity-critical applications, such as detecting network intrusions and fake news campaigns. Despite effectiveness, their robustness against adversarial attacks is one of the key trust concerns for MLaaS deployment. We are thus motivated to assess the adversarial robustness of the Machine Learning models residing at the core of these securitycritical applications with categorical inputs. Previous research efforts on accessing model robustness against manipulation of categorical inputs are specific to use cases and heavily depend on domain knowledge, or require white-box access to the target ML model. Such limitations prevent the robustness assessment from being as a domain-agnostic service provided to various real-world applications. We propose a provably optimal yet computationally highly efficient adversarial …

See List of Professors in Wei Wang University(University of California, Los Angeles)

Wei Wang FAQs

What is Wei Wang's h-index at University of California, Los Angeles?

The h-index of Wei Wang has been 120 since 2020 and 160 in total.

What are Wei Wang's top articles?

The articles with the titles of

Universality and limitations of prompt tuning

Incidence and risk factors of depression in patients with metabolic syndrome

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management

The future of ChatGPT in academic research and publishing: A commentary for clinical and translational medicine

Anchor link prediction for privacy leakage via de-anonymization in multiple social networks

Uncover the reasons for performance differences between measurement functions (Provably)

Filtering‐based concurrent learning adaptive attitude tracking control of rigid spacecraft with inertia parameter identification

MIND-S is a deep-learning prediction model for elucidating protein post-translational modifications in human diseases

...

are the top articles of Wei Wang at University of California, Los Angeles.

What are Wei Wang's research interests?

The research interests of Wei Wang are: data mining, machine learning, big data analytics, bioinformatics and computational biology, computational medicine

What is Wei Wang's total number of citations?

Wei Wang has 128,728 citations in total.

What are the co-authors of Wei Wang?

The co-authors of Wei Wang are Jiawei Han, Philip S. Yu, Jian Pei, Alexander Tropsha, Carlo Zaniolo, Jack Snoeyink.

    Co-Authors

    H-index: 202
    Jiawei Han

    Jiawei Han

    University of Illinois at Urbana-Champaign

    H-index: 194
    Philip S. Yu

    Philip S. Yu

    University of Illinois at Chicago

    H-index: 110
    Jian Pei

    Jian Pei

    Simon Fraser University

    H-index: 85
    Alexander Tropsha

    Alexander Tropsha

    University of North Carolina at Chapel Hill

    H-index: 63
    Carlo Zaniolo

    Carlo Zaniolo

    University of California, Los Angeles

    H-index: 60
    Jack Snoeyink

    Jack Snoeyink

    University of North Carolina at Chapel Hill

    academic-engine

    Useful Links