Jiaxin Yu

ORCID: 0000-0002-0297-4605
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Phagocytosis and Immune Regulation
  • Software Engineering Research
  • Cancer Mechanisms and Therapy
  • Software Engineering Techniques and Practices
  • Technology Assessment and Management
  • Distributed systems and fault tolerance
  • Web Data Mining and Analysis
  • Tactile and Sensory Interactions
  • Indoor and Outdoor Localization Technologies
  • Information and Cyber Security
  • Geomechanics and Mining Engineering
  • Petri Nets in System Modeling
  • Advanced Text Analysis Techniques
  • Data Quality and Management
  • Topic Modeling
  • Chemical and Physical Studies
  • Open Source Software Innovations
  • Interactive and Immersive Displays
  • Advanced Malware Detection Techniques
  • Natural Language Processing Techniques
  • Optical Wireless Communication Technologies
  • Security and Verification in Computing
  • PARP inhibition in cancer therapy
  • Healthcare Operations and Scheduling Optimization
  • Advanced Data and IoT Technologies

Wuhan University
2023-2024

Jilin University
2013-2023

Nanjing University of Posts and Telecommunications
2023

Harbin Institute of Technology
2012-2022

Fudan University
2022

Southwest University of Science and Technology
2022

RWTH Aachen University
2022

Liaoning University
2022

Tianjin Normal University
2022

Yangzhou University
2022

Training data is the backbone of developing either Machine Learning (ML) models or specific Deep (DL) algorithms. The lack well-labeled training image has significantly impeded development novel DL methods like Convolutional Neural Networks (CNNs) in mineral thin section images identification. However, annotation, especially pixel-wise annotation always a costly process. Manually creating dense semantic labels for rock been long considered as an unprecedented challenge view ubiquitous...

10.1016/j.cageo.2022.105232 article EN cc-by Computers & Geosciences 2022-09-29

Modern code generation tools, utilizing AI models like Large Language Models (LLMs), have gained popularity for producing functional code. However, their usage presents security challenges, often resulting in insecure merging into the base. Evaluating quality of generated code, especially its security, is crucial. While prior research explored various aspects generation, focus on has been limited, mostly examining produced controlled environments rather than real-world scenarios. To address...

10.48550/arxiv.2310.02059 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Compared with traditional sentence-level relation extraction, document-level extraction is a more challenging task where an entity in document may be mentioned multiple times and associated relations. However, most methods of do not distinguish between mention-level features entity-level features, just apply simple pooling operation for aggregating into features. As result, the distinct semantics different mentions are overlooked. To address this problem, we propose RSMAN paper which...

10.18653/v1/2022.naacl-main.109 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2022-01-01

Security code review aims to combine automated tools and manual efforts detect security defects during development. The rapid development of Large Language Models (LLMs) has shown promising potential in software development, as well opening up new possibilities review. To explore the challenges applying LLMs practical for defect detection, this study compared detection performance three state-of-the-art (Gemini Pro, GPT-4, GPT-3.5) under five prompts on 549 files that contain from real-world...

10.48550/arxiv.2401.16310 preprint EN arXiv (Cornell University) 2024-01-29

In this article, a three-dimensional (3D) pen-like positioning system based on the high-precision 3D ultrasonic (US) method is presented. The US can achieve millimeter-level accuracy in within working area of 2 m × 1.5 m. order to improve real-time performance proposed system, an electronic pen realized by time-of-flight (TOF) detection dynamic threshold and average zero-crossing detection. overcomes limitations traditional that sensitive noise. high without conducting complex calculations....

10.1109/jsen.2020.3016292 article EN IEEE Sensors Journal 2020-08-13

With the growing usage of renewable energy resources, fluctuation and randomness solar wind power output have a significant influence on safe stable operation system. Deciding how to deal with these uncertainties has become hot topic for researchers practitioners. In this paper, hybrid improved marine predators algorithm is proposed solve optimal reactive dispatch problem load demand, wind-solar uncertainties. The ε constrained technique adopted constraints in optimization problem....

10.1109/access.2022.3224744 article EN cc-by IEEE Access 2022-01-01

The predecessor of China Optics was and Applied Digest, which founded in 1985. At that time, it the only retrieval journal field optics China. end 2008, Digest renamed

10.37188/co.2023-0140 article EN Chinese Optics 2024-01-01

Fourier descriptor is an important method used in shape analysis and recognition. A novel for designing the classifier of multi-dimensional data was proposed, which radar chart multi-statistics to show multidimensional applied Descriptors recognize chart. Different formed different distinguished category. Then a new based on polar radius defined, describes curve shape. The Probabilistic Neural network combined with implement automatic classification. Experimental results this has good...

10.1109/icmlc.2008.4620524 article EN International Conference on Machine Learning and Cybernetics 2008-07-01

4-Methylcatechol (4-MC) is one of the metabolites quercetin, which a potential drug for neuroprotection and tumorigenesis inhibition. This study was performed to investigate cytotoxic effect 4-MC in mouse TM4 Sertoli cells. cell viability significantly inhibited by time- dose-dependent manner. The number apoptotic dead cells increased after treatment. Caspase 3 activity prolonged exposure 200 μM 4-MC. upregulated mRNA level Bax gene considerably downregulated Bcl-2 expression...

10.1002/cbin.10420 article EN Cell Biology International 2015-01-05

In this article, a pen-type device that enables three-dimensional (3D) human-computer interaction is presented. This based on high-precision 3D ultrasonic (US) positioning method, which can achieve millimeter-level accurate and six degrees of freedom (6DoF) within working range 4 m × 1.5 m. The the electronic pen realized by highprecision time-of-flight (TOF) detection method dynamic thresholding zero-crossing as well multigroup coordinate averaging method. During process, correlation...

10.1109/access.2020.3014169 article EN cc-by IEEE Access 2020-01-01

Artificial Intelligence (AI) technologies have been developed rapidly, and AI-based systems widely used in various application domains with opportunities challenges. However, little is known about the architecture decisions made development, which has a substantial impact on success sustainability of these systems. To this end, we conducted an empirical study by collecting analyzing data from Stack Overflow (SO) GitHub. More specifically, searched SO six sets keywords explored 32 projects...

10.1109/saner56733.2023.00063 article EN 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 2023-03-01

The aerodynamic performance of vehicles on a bridge deck depends the local wind field, especially in region near tower. This study was carried out large‐scale (1: 20.4) truss girder, and tunnel tests were performed to determine how fields affected by tower presence different barriers. barrier parameters significantly affect field. Wind barriers should be sufficiently high provide wide protection range have relatively small porosities reduce speed. opening form also considered, where...

10.1155/2021/8867668 article EN cc-by Advances in Civil Engineering 2021-01-01

In this paper, we explore a new class of stochastic differential equations called anticipated generalized backward doubly (AGBDSDEs), which not only involve two symmetric integrals related to independent Brownian motions and an integral driven by continuous increasing process but also include generators depending on the terms solution (Y, Z). Firstly, prove existence uniqueness theorem for AGBDSDEs. Further, comparison theorems are obtained after finding GBDSDEs.

10.3390/sym14010114 article EN Symmetry 2022-01-09

Abstract Due to the proliferation of contemporary computer-integrated systems and communication networks, there is more concern than ever regarding privacy, given potential for sensitive data exploitation. A recent cyber-security research trend focus on security principles develop foundations designing safety-critical systems. In this work, we investigated problem verifying current-state opacity in discrete event using labeled Petri nets. system opaque provided that estimate cannot be...

10.1038/s41598-022-25697-y article EN cc-by Scientific Reports 2022-12-14

In this work, we propose a new modified Popov’s method by using inertial effect for solving pseudomonotone variational inequalities in real Hilbert spcaes, which does not require prior information about the Lipschitz constant of mapping, and only needs to compute value mapping once projection onto feasible set at each iterative step. We present weak convergence theorem proposed algorithm. Our results generalize some related literature primary numerical experiments demonstrate applicability scheme.

10.56028/aetr.12.1.512.2024 article EN Advances in Engineering Technology Research 2024-11-28

This work addresses the problem of quantifying opacity for discrete event systems. We consider a passive intruder who knows overall structure system but has limited observational capabilities and tries to infer secret this based on captured information flow. Researchers have developed various approaches quantify compensate lack precision qualitative in describing degree security system. Most existing works study specified probabilistic problems framework systems, where behaviors or states...

10.3390/math11173629 article EN cc-by Mathematics 2023-08-22

The plane-wave expansion method is used to calculate TE and TM mode band gaps for two-dimensional square lattice photonic crystal with hollow anisotropic tellurium (Te) rods under three different rotation operations. effect of on absolute gap investigated. calculated results show that the high order have a close relationship structure symmetry, symmetry distribution Te in x-y plane together influence gaps.

10.7498/aps.57.1061 article EN cc-by Acta Physica Sinica 2008-01-01

Abstract Since the emergence of COVID-19, many hospitals have encountered challenges in performing efficient scheduling and good resource management to ensure quality healthcare provided patients is not compromised. Operating room (OR) one issues that has gained our attention because it related workflow efficiency critical care hospitals. Automatic high predictive accuracy surgical case duration a role improving OR utilization. To estimate duration, rely on historic averages based specific...

10.21203/rs.3.rs-40927/v1 preprint EN cc-by Research Square (Research Square) 2020-07-17

Background: Despite the widespread use of automated security defect detection tools, software projects still contain many defects that could result in serious damage. Such tools are largely context-insensitive and may not cover all possible scenarios testing potential issues, which makes them susceptible to missing complex defects. Hence, thorough entails a synergistic cooperation between these human-intensive techniques, including code review. Code review is widely recognized as crucial...

10.1109/esem56168.2023.10304852 article EN 2023-10-26
Coming Soon ...