Jinsheng Deng

ORCID: 0000-0001-6127-410X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Image Processing Techniques
  • Complex Network Analysis Techniques
  • Image Processing Techniques and Applications
  • Topic Modeling
  • Generative Adversarial Networks and Image Synthesis
  • Digital Media Forensic Detection
  • Infrared Target Detection Methodologies
  • Data Mining Algorithms and Applications
  • Image and Signal Denoising Methods
  • Software Engineering Research
  • Web Data Mining and Analysis
  • Natural Language Processing Techniques
  • Advanced Vision and Imaging
  • Advanced Neural Network Applications
  • Opinion Dynamics and Social Influence
  • Multimodal Machine Learning Applications
  • Face recognition and analysis
  • Distributed and Parallel Computing Systems
  • Image Retrieval and Classification Techniques
  • Cloud Computing and Resource Management
  • Advanced Data Storage Technologies
  • Speech Recognition and Synthesis
  • Advanced Graph Neural Networks
  • Remote Sensing and Land Use
  • Computer Graphics and Visualization Techniques

National University of Defense Technology
2008-2025

Central South University of Forestry and Technology
2024

Central South University
2024

Chinese Academy of Medical Sciences & Peking Union Medical College
1993

10.1109/icassp49660.2025.10888565 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

10.1109/icassp49660.2025.10887785 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Code summarization aims at generating natural language abstraction for source code, and it can be of great help program comprehension software maintenance. The current code approaches have made progress with neural-network. However, most these methods focus on learning the semantic syntax snippets, ignoring dependency codes. In this paper, we propose a novel method based neural-network model using knowledge call between its related We extract dependencies from transform as token sequence...

10.1145/3361242.3362774 article EN 2019-10-24

In recent years, a lot of research has been conducted in the field object detection for aerial image, and many effective methods have emerged. This paper enhances existing Faster RCNN model to achieve better accuracy. We improve feature extraction using multi-scale fusion. Compared with traditional model, accuracy on mAP is improved by 1.06% applying proposed method. The visual effects numerical results verify improvement

10.1109/itaic49862.2020.9339038 article EN 2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) 2020-12-11

With the rapid development of cloud computing, thousands servers and various applications are involved in data center. These changes result more complex flows center, which motivates need for faster, lower overhead, scalable large flow detection technology. This paper firstly shows shortcomings traditional technologies. Then it proposes a new method named EffiEye, efficiently realizes application-aware controller. EffiEye mainly replies on two different mechanisms: one is classification...

10.1109/ccgrid.2017.90 article EN 2017-05-01

Social unrest events are common happenings in modern society which need to be proactively handled. An effective method is continuously assess the risk of upcoming social and predict likelihood these events. Our previous work built a hidden Markov model- (HMM-) based framework indicators associated with country instability, leaving two shortcomings can optimized: omitting event participants’ interaction implicitly learning state residence time. Inspired by this, we propose new prediction this...

10.1155/2020/3915036 article EN cc-by Discrete Dynamics in Nature and Society 2020-10-09

Continuously assessing the risk of upcoming social unrest events and predict likelihood these are great importance. Thanks to era big data, people's understanding, experience, values, ideology mirrored in organization cyber space. In this paper, we propose an online prediction framework, using frequent subgraph patterns hidden semi-Markov models (HSMMs). The feature called BoEAG (Bag-of-Event-Association-subGraph) is constructed based on frequents mining bag word model. new framework...

10.1109/cyberc49757.2020.00036 article EN 2020-10-01

Nowadays, research on social networks has attracted a large amount of attention from both academic and industrial societies. To understand the diffusion process guide viral marketing, it is importance to model then estimate influence seed user target user, which defined as in this paper. In famous models like independent cascade linear threshold model, tremendous computational costs are usually required estimating probability through simulation. paper, we adopt duplicate forwarding propose...

10.1142/s0217979222500345 article EN International Journal of Modern Physics B 2022-01-20

Image deblurring is a classic and important problem in industrial fields, such as aviation photo restoration, object recognition robotics, autonomous vehicles. Blurry images real‐world scenarios consist of mixed blurring types, natural motion owing to shaking the camera. Fast does not deblur entire image because it best option. Considering computational costs, also better have an alternative kernel different objects at high‐semantic level. To achieve restoration quality, beneficial combine...

10.1155/2021/1391801 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

<title>Abstract</title> Existing methods for video super-resolution (VSR) and frame interpolation (VFI) primarily concentrate on devising a general pipeline suitable open-domain videos. However, these approaches tend to overlook the inherent distinctions in animation data. Specifically, often features lines smooth areas that lack textures, thereby complicating estimation of inter-frame motions. Moreover, exaggerated expressions common introduce non-linear highly altered motion...

10.21203/rs.3.rs-4603382/v1 preprint EN Research Square (Research Square) 2024-07-18

To quickly discover suspicious data in massive and facilitate the implementation of audit work, we need to use scientific experimental methods conduct in-depth analysis collected data. This experiment uses bisecting k-means clustering algorithm which is an unsupervised learning method realize on delivery 20 kinds drugs from one hospital 2018. During this experiment, three features drug quantity, retail price total are selected as indexes, that is, coordinate axes three-dimensional diagram,...

10.1109/cyberc.2019.00052 article EN 2019-10-01

Inferring users' occupational categories on the basis of user-generated content becomes an important issue in user profiling and applications such as personalised recommendation systems with rapid explosion usage online social me-dia. Although previous work has demonstrated that language features extracted from media can effectively predict occupations, overcoming challenge time-consuming, expensive expert knowledge low prediction performance is fairly limited mostly based English platforms....

10.1109/bigdia56350.2022.9874228 article EN 2022-08-24

Software developers advance the project process by contributing and discussing on code platform. bot acts as an assistant to help deal with repetitive tasks. In this paper, we explore whether adoption of bots has impact developer sentiment projects progress. We collected issues, pull requests comments from GitHub popular projects. And found that human users had significantly reduced positive in bot-created issues PRs. The average merging time PRs is shorter than human-created ones. solving...

10.1109/icsess54813.2022.9930282 article EN 2022-10-21

With the explosive growth of users’ online information, user profiling, inferring traits or interests, has attracted increasing attention due to its various applications in reliable personalized service and recommender system fields. Most existing studies regard profiling as a node classification task utilize graph-based methods exploit relations affiliated information heterogeneous graphs. However, they only consider single view pair-wise relationships between users, ignoring modeling...

10.1109/dsaa54385.2022.10032374 article EN 2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) 2022-10-13
Coming Soon ...