- Cloud Computing and Resource Management
- Advanced Graph Neural Networks
- Data Management and Algorithms
- Caching and Content Delivery
- Graph Theory and Algorithms
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Traffic Prediction and Management Techniques
- Distributed and Parallel Computing Systems
- Advanced Data Storage Technologies
- Parallel Computing and Optimization Techniques
- Advanced Database Systems and Queries
- Traffic control and management
- Privacy-Preserving Technologies in Data
- Geographic Information Systems Studies
- Fluid Dynamics and Turbulent Flows
- Imbalanced Data Classification Techniques
- ECG Monitoring and Analysis
- Human Mobility and Location-Based Analysis
- Transportation Planning and Optimization
- Interconnection Networks and Systems
- Network Traffic and Congestion Control
- Advanced Neural Network Applications
- Cloud Data Security Solutions
- Computational Fluid Dynamics and Aerodynamics
Dalian Maritime University
2024-2025
Hohai University
2025
Wenzhou Medical University
2022-2024
Second Affiliated Hospital & Yuying Children's Hospital of Wenzhou Medical University
2023-2024
Southeast University
2015-2024
Emory University
2023-2024
Laboratoire d'Informatique de Paris-Nord
2023-2024
Ministry of Education of the People's Republic of China
2020-2024
Wenzhou University
2023-2024
Dalian University of Technology
2024
Large scale data processing is increasingly common in cloud computing systems like MapReduce, Hadoop, and Dryad recent years. In these systems, files are split into many small blocks all replicated over several servers. To process efficiently, each job divided tasks task allocated to a server deals with file block. Because network bandwidth scarce resource enhancing locality(placing on servers that contain their input blocks) crucial for the completion time. Although there have been...
Large scale data processing is increasingly common in cloud computing systems like MapReduce, Hadoop, and Dryad recent years. In these systems, files are split into many small blocks all replicated over several servers. To process efficiently, each job divided tasks task allocated to a server deals with file block. Because network bandwidth scarce resource enhancing locality(placing on servers that contain their input blocks) crucial for the completion time. Although there have been...
Node classification is a substantial problem in graph-based fraud detection. Many existing works adopt Graph Neural Networks (GNNs) to enhance detectors. While promising, currently most GNN-based detectors fail generalize the low homophily setting. Besides, label utilization has been proved be significant factor for node problem. But we find they are less effective detection tasks due graphs. In this work, propose GAGA, novel Group AGgregation enhanced TrAnsformer, tackle above challenges....
The sustainable development of regional higher education is closely related to the level economic development. There a close interdependence between and Based on data from 31 provinces in China 2022, this study uses entropy method construct an evaluation index system explore coupling coordination relationship economy education, as well social network effects presented by various cities. results indicate following: (1) there trend more coordinated eastern region compared western region,...
Recently, graph query is widely adopted for querying knowledge graphs. Given a G <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Q</sub> , the finds subgraphs in that exactly or approximately match . We face two challenges on query: (1) structural gap between and predefined schema causes mismatch with graph, (2) users cannot view answers until terminates, leading to longer system response time (SRT). In this paper, we propose semantic-guided...
Iodine assays hold paramount significance in clinical diagnostics, thyroid hormone synthesis, and pharmaceutical advancements. DNA-based optical fiber biosensors have emerged as a pivotal platform for ion detection, leveraging their biocompatibility, specificity, remarkable sensitivity. Due to the unique bonding characteristics of its bases, DNA probes can only form specific coordination structures with cations, posing challenges anion detection. Based on principle ion-competition binding...
Analysis of range queries on spatial (multidimensional) data is both important and challenging. Most previous analysis attempts have made certain simplifying assumptions about the sets and/or to keep tractable. As a result, they may no be universally applicable. This paper proposes set five techniques estimate selectivity number index nodes accessed in serving query. The underlying philosophy behind these maintain an auxiliary structure called density file, whose creation one-time cost,...
Billions of lightweight Internet Things (IoT) devices have been deployed for various applications nowadays. Most them first collect interested data and then process in some degree according to application requirements. Transparent computing (TC) is a promising technique that makes such suitable even large-size applications. The advantage TC separate code storage from its execution, allowing IoT load blocks nearby server on demand. Distinct existing work, this paper allows the offload tasks...
Recent developments in networking have spurred the emergence of time-sensitive applications such as Web search, social networks, and Industrial Internet. TCP, core protocol, implements reliable packet delivery for these applications. However, TCP isn't specifically optimized timely delivery, so it has poor performance scenarios. To counter this, network research community worked extensively on standards reducing TCP's latency. Explicit Congestion Notification (ECN) is an extension to TCP/IP...
A knowledge graph (KG) manages large-scale and real-world facts as a big in schema-flexible manner. Aggregate query is fundamental over KGs, e.g., "what the average price of cars produced Germany?". Despite its importance, answering aggregate queries on KGs has received little attention literature. can be supported based factoid queries, "find all Germany", by applying an additional operation queries' answers. However, this straightforward method challenging because both accuracy efficiency...
Identifying strategic groups is crucial for businesses to understand the local competitive landscape and develop successful strategies. With advancements in location-based services mobile edge computing, Points of Interest (POI) data customer visiting are used infer relationships. However, existing methods only detect whether relationships exist between pairwise POIs, disregarding multifaceted nature business strategies such as price, target consumer, site selection, which fails group with...
Fraud detection on multi-relation graphs aims to identify fraudsters in graphs. Graph Neural Network (GNN) models leverage graph structures pass messages from neighbors the target nodes, thereby enriching representations of those nodes. However, feature and structural inconsistency graph, owing fraudsters' camouflage behaviors, diminish suspiciousness fraud nodes which hinders effectiveness GNN-based models. In this work, we propose DiG-In-GNN, Discriminative Feature Guided GNN against...
Web-scale information networks containing billions of entities are common nowadays. Querying these can be modeled as a subgraph matching problem. Since incomplete and noisy in nature, it is important to discover answers that match exactly well similar queries. Existing graph algorithms usually use indices improve the efficiency query processing. For web-scale networks, may not feasible build due amount work memory/storage required. In this paper, we propose an efficient algorithm for finding...
Web-scale knowledge graphs containing billions of entities are common nowadays. Querying these can be modeled as a subgraph matching problem. Since incomplete and noisy in nature, it is important to discover answers exactly well similar queries. Existing graph algorithms usually use indices accelerate query processing. For billion-node graphs, may infeasible build the due amount work memory/ storage required. In this paper, we propose an efficient algorithm for finding best k given without...
UAV Ad-hoc Network (UANET) has been widely used in many fields. However, the collaborative communication and data sharing among multiple UAVs UANET are often attacked threatened, due to limited software hardware capability of openness wireless network environment. In this work, we introduce blockchain technology into enhance its security. Instead directly adopting traditional which require huge storage, computation resources, propose a lightweight reputation-based scheme for...