Jingping Bi

ORCID: 0000-0001-7858-4980
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Data Management and Algorithms
  • Network Security and Intrusion Detection
  • Advanced Graph Neural Networks
  • Anomaly Detection Techniques and Applications
  • Human Mobility and Location-Based Analysis
  • Complex Network Analysis Techniques
  • Cloud Computing and Resource Management
  • Time Series Analysis and Forecasting
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Packet Processing and Optimization
  • Recommender Systems and Techniques
  • Advanced Malware Detection Techniques
  • Mobile Agent-Based Network Management
  • Wireless Networks and Protocols
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks
  • Image and Video Quality Assessment
  • Topic Modeling
  • Privacy-Preserving Technologies in Data

Chinese Academy of Sciences
2015-2024

Institute of Computing Technology
2015-2024

University of Chinese Academy of Sciences
2008-2023

Beijing Institute of Technology
2011-2014

Predicting the next location a user tends to visit is an important task for applications like location-based advertising, traffic planning, and tour recommendation. We consider prediction problem semantic trajectory data, wherein each GPS record attached with text message that describes user's activity. In trajectories, confluence of spatiotemporal transitions textual messages indicates intents at fine granularity has great potential in improving accuracies. Nevertheless, existing methods...

10.1145/3132847.3133056 article EN 2017-11-06

Trajectory clustering, which aims at discovering groups of similar trajectories, has long been considered as a corner stone task for revealing movement patterns well facilitating higher-level applications like location prediction. While plethora trajectory clustering techniques have proposed, they often rely on spatiotemporal similarity measures that are not space- and time-invariant. As result, cannot detect clusters where the within-cluster occurs in different regions time periods. In this...

10.1109/ijcnn.2017.7966345 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2017-05-01

Trajectory similarity computation is a fundamental problem for various applications in trajectory data analysis. However, the high cost of existing measures has become key bottleneck analysis at scale. While there have been many research efforts reducing complexity, they are specific to one measure and often yield limited speedups. We propose NeuTraj accelerate computation. generic accommodate any fast compute given pair linear time. Furthermore, elastic collaborate with all spatial-based...

10.1109/icde.2019.00123 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2019-04-01

Recently, data mining through analyzing the complex structure and diverse relationships on multi-network has attracted much attention in both academia industry. One crucial prerequisite for this kind of is to map nodes across different networks, i.e., so-called network alignment. In paper, we propose a cross-network embedding method CrossMNA alignment problem investigating structural information only. Unlike previous methods focusing pair-wise learning holding topology consistent assumption,...

10.1145/3308558.3313499 article EN 2019-05-13

Computing trajectory similarities is a critical and fundamental task for various spatial-temporal applications, such as clustering, prediction, anomaly detection. Traditional similarity metrics, i.e. DTW Hausdorff, suffer from quadratic computation complexity, leading to their inability on large-scale data. To solve this problem, many representation learning techniques are proposed approximate the metric space while reducing complexity of computation. Nevertheless, these works designed based...

10.1145/3534678.3539358 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2022-08-12

Abstract Trajectory clustering, which aims at discovering groups of similar trajectories, has long been considered as a corner stone task for revealing movement patterns well facilitating higher level applications such location prediction and activity recognition. Although plethora trajectory clustering techniques have proposed, they often rely on spatio‐temporal similarity measures that are not space time invariant. As result, cannot detect clusters where the within‐cluster occurs in...

10.1111/exsy.12252 article EN Expert Systems 2018-02-22

Flight trajectory data plays a vital role in the traffic management community, especially for downstream tasks such as prediction, flight recognition, and anomaly detection. Existing works often utilize handcrafted features design models different individually, which heavily rely on domain expertise are hard to extend. We argue that analysis share same useful of trajectory. Jointly learning unified representation trajectories could be beneficial improving performance various tasks. However,...

10.1609/aaai.v39i12.33330 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Collective classification, as an important technique to study networked data, aims exploit the label autocorrelation for a group of inter-connected entities with complex dependencies. As emergence various heterogeneous information networks (HINs), collective classification at present is confronting several severe challenges stemming from heterogeneity HINs, such relational hierarchy, potential incompatible semantics and node-context semantics. To address challenges, in this paper, we propose...

10.1145/3394486.3403169 article EN 2020-08-20

Temporal data representing chronological observations of complex systems can be ubiquitously collected in smart industry, medicine, finance and etc. In the last decade, many tasks have been studied for mining temporal offered significant value various applications. Among these tasks, causal discovery aims to understand underlying generation mechanism has attracted much research attention. According whether is calibrated, existing approaches divided into two subtasks, i.e., multivariate...

10.1145/3580305.3599552 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2023-08-04

Time series similarity computation is a fundamental primitive that underpins many time data analysis tasks. However, existing measures have high cost. While there has been much research effort for reducing the computational cost, such usually specific to one measure. We propose <sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">NeuTS</small> ( <bold xmlns:xlink="http://www.w3.org/1999/xlink">Neu</b> ral metric learning...

10.1109/tkde.2020.3047070 article EN IEEE Transactions on Knowledge and Data Engineering 2020-12-24

Social media has became a critical manner for people to acquire information in daily life. Despite the great convenience, fake news can be widely spread through social networks, causing various adverse effects on people's lives. Detecting these or misinformations proved task and draws attentions from both governments individuals. Recently, many methods have been proposed solve this problem, but most of them rely body content news, ignoring context such as comments. We argue that comments...

10.1109/ijcnn52387.2021.9533433 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18

In online advertising, marketing mix modeling (MMM) is employed to predict the gross merchandise volume (GMV) of brand shops and help decision-makers adjust budget allocation various advertising channels. Traditional MMM methods leveraging regression techniques can fail in handling complexity marketing. Although some efforts try encode causal structures for better prediction, they have strict restriction that are prior-known unchangeable. this paper, we define a new problem automatically...

10.1145/3616855.3635766 preprint EN other-oa 2024-03-04

10.1109/icde60146.2024.00339 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2024-05-13

In D2D communications, random contacts can be utilized to exchange data among nodes without the support from infrastructures or central control units. Because of huge quantity and high mobility nodes, scarcity available spectrum severely limits delivery capacity in communications. CR technology gives ability use idle licensed radio spectra networks improve capacity. The advantages opportunistic make communications an alternative that provides a complementary for big applications. However,...

10.1109/mwc.2016.7553025 article EN IEEE Wireless Communications 2016-08-01

Despite the recent and remarkable popularity of P2P IPTV systems, study their characteristics on largescale broadcasting is rare. In this paper, we have undertaken a measurement one most popular PPStream, during 29th Olympics broadcasting. We deployed our dedicated tool, PPS-Sniffer, under different network environments, collected extensive data large number events. evaluate playback delay, peering strategies towards local cluster. also investigate scheduling, its impact quality control...

10.1109/glocom.2009.5425399 article EN GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. 2009-11-01

User identity linkage (UIL) task aims to infer the identical users between different social networks/platforms. Existing models leverage labeled inter-linkages or high-quality user attributes make predictions. Nevertheless, it is often difficult even impossible obtain such information in real-world applications. To this end, we paper focus on studying an Anonymized Identity Linkage (AUIL) problem wherein neither anchor nor are available. handle a practical and challenging task, propose novel...

10.1145/3459637.3482214 article EN 2021-10-26

Video streaming uploading service over Vehicular Networks is very useful as it can support many applications. Due to the vehicle's high mobility and roadside access point (AP)'s sparse deployment, how provide a high-quality video with low-price charge still remains an open question. To address this issue, novel scheme based on vehicle moving prediction proposed, in which vehicle-to-infrastructure (V2I) vehicle-to-vehicle communications (V2V) are cooperated forward continuously from vehicles...

10.1109/nas.2015.7255201 article EN 2015-08-01

With the development of internet, there are billions short texts generated each day. However, accuracy large scale text classification is poor due to data sparseness. Traditional methods used use external dataset enrich representation document and solve sparsity problem. But which matches specific hard find. In this paper, we propose a framework problem without using dataset. Our deal with by making most semantic similarity words learned from training texts. First, learn word distributed...

10.1109/ijcnn.2015.7280513 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2015-07-01

The rapid evolution of large language models (LLMs) holds promise for reforming the methodology spatio-temporal data mining. However, current works evaluating understanding capability LLMs are somewhat limited and biased. These either fail to incorporate latest or only focus on assessing memorized knowledge. To address this gap, paper dissects LLMs' into four distinct dimensions: knowledge comprehension, reasoning, accurate computation, downstream applications. We curate several natural...

10.48550/arxiv.2406.19065 preprint EN arXiv (Cornell University) 2024-06-27

In Software-Defined Networking (SDN), Ternary Content Addressable Memory (TCAM) enables fast lookup with flexible wildcard rule patterns for flow tables, however, the scarcity and expensiveness of TCAM dramatically limit number rules that switches can support. Rule caching breaks table size constraint by appropriate combinations hardware software processing. Nevertheless, previous literatures, from viewpoint maximizing cache hit ratio, ignore update operations incurred replacement, which is...

10.1109/iscc.2018.8538355 article EN 2022 IEEE Symposium on Computers and Communications (ISCC) 2018-06-01

10.1007/s00779-016-0948-2 article EN Personal and Ubiquitous Computing 2016-08-20
Coming Soon ...