- Logic, programming, and type systems
- Formal Methods in Verification
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Logic, Reasoning, and Knowledge
- Software Engineering Research
- Software Testing and Debugging Techniques
- Recommender Systems and Techniques
- Parallel Computing and Optimization Techniques
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Electrocatalysts for Energy Conversion
- Stochastic Gradient Optimization Techniques
- Anomaly Detection Techniques and Applications
- Advanced battery technologies research
- Adversarial Robustness in Machine Learning
- Network Security and Intrusion Detection
- Access Control and Trust
- Real-Time Systems Scheduling
- Advanced Software Engineering Methodologies
- Human Mobility and Location-Based Analysis
- Advanced Photocatalysis Techniques
Beihang University
2024-2025
Donghua University
2024
Materials Science & Engineering
2024
Jinan University
2017-2023
University of Canterbury
2023
Shanghai Jiao Tong University
2023
Tsinghua University
2021-2022
North University of China
2021-2022
Nanjing Tech University
2022
The University of Queensland
2012-2021
As location-based social network (LBSN) services become increasingly popular, trip recommendation that recommends a sequence of points interest (POIs) to visit for user emerges as one many important applications LBSNs. Personalized tailors users' specific tastes by learning from past check-in behaviors users and their peers. Finding the optimal maximizes user's experiences given time budget constraint is an NP hard problem previous solutions do not consider two practical constraints. One POI...
User preferences change over time and capturing such changes is essential for developing accurate recommender systems. Despite its importance, only a few works in collaborative filtering have addressed this issue. In paper, we consider evolving model user dynamics by introducing learning transition matrix each user's latent vectors between consecutive windows. Intuitively, the summarizes time-invariant pattern of evolution user. We first extend conventional probabilistic factorization then...
Characterizing material flows and environmental impacts of plastic value chain is crucial for sustainable management. Here, we combine flow analysis life cycle assessment methods to map the eight major plastics investigate multiple China's chain. We find that packaging textile sectors dominate consumption are responsible burdens, but with low recycling rates. Major generated in production product manufacturing stages because coal-based feedstocks electricity. therefore set up six scenarios...
Monotone learning refers to processes in which expected performance consistently improves as more training data is introduced. Non-monotone behavior of machine has been the topic a series recent works, with various proposals that ensure monotonicity by applying transformations or wrappers on algorithms. In this work, from different perspective, we tackle monotone within framework Probably Approximately Correct (PAC) theory. Following mechanism estimates sample complexity PAC-learnable...
Abstract The pulse‐level quantum control presents a large range of external parameter dependencies, including field noise, frequency detuning, nonlinearities, and uncertainty Hamiltonian parameters, which can lead to significant deviation from the target gate. These terms are not usually considered directly in standard optimization scenarios for robustness, but often found analytical solutions. latter difficult emerge generalize different settings. This paper proposes diffusion‐based...
As location-based social network (LBSN) services become increasingly popular, trip recommendation that recommends a sequence of points interest (POIs) to visit for user emerges as one many important applications LBSNs. Personalized tailors users’ specific tastes by learning from past check-in behaviors users and their peers. Finding the optimal maximizes user’s experiences given time budget constraint is an NP-hard problem previous solutions do not consider three practical constraints. One...
A probabilistic variant of ATL* logic is proposed to work with multi-player games incomplete information and synchronous perfect recall. The semantics the settled over interpreted system partially observed concurrent game structure. While unexpectedly, model checking problem in general undecidable even for single-group fragment, we find a fragment whose complexity 2-EXPTIME. usefulness this shown land search scenario.
Quantum simulation is a prominent application of quantum computers. While there extensive previous work on simulating finite-dimensional systems, less known about algorithms for real-space dynamics. We conduct systematic study such algorithms. In particular, we show that the dynamics <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi>d</mml:mi></mml:math>-dimensional Schrödinger equation with...
Bug-checking tools have been used with some success in recent years to find bugs software. For finding that can cause security vulnerabilities, bug checking require a program analysis which determines whether software be controlled by user-input. In this paper we introduce static for computing user-input dependencies. This as pre-processing filter tool identifying potentially exploited vulnerabilities. order the applicable large commercial millions of lines code, runtime speed and...
The paper discusses the problem of model checking a number noninterference properties in finite state systems: Noninterference, Nondeducibility on Inputs, Generalised Forward Correctability and Restrictiveness. complexity these problems is characterized, possible heuristics for optimization are discussed.
In the information explosion era, large scale data processing and mining is a hot issue. As microblog grows more popular, services have become provider on web scale, so researches begin to focus its content than solely user's relationship analysis before. Although traditional text methods been studied well, no algorithm designed specially for data, which contain structured social network besides plain text. this paper, we introduce novel probabilistic generative model MicroBlog-Latent...
Bug localization refers to the process of identifying source code files that contain defects from textual descriptions in bug reports. Existing techniques work on assumption reports, and identifiers comments files, are written same language (i.e., English). However, software users non-English speaking countries (e.g., China) often use their native languages Chinese) write For this setting, existing studies would not as terms appear reports do code. We refer problem cross-language...
We develop a general testing scenario for probabilistic processes, giving rise to two theories: may and must testing. These are applied simple version of the process calculus CSP. examine algebraic theory testing, show that many axioms standard no longer valid in our setting; even non-probabilistic CSP distinguishing power tests is much greater than tests. method deriving inequations based on extension notion simulation. Using this, we obtain complete axiomatisation processes subject
In 1992 Wang & Larsen extended the may- and must preorders of De Nicola Hennessy to processes featuring probabilistic as well nondeterministic choice. They concluded with two problems that have remained open throughout years, namely find complete axiomatisations alternative characterisations for these preorders. This paper solves both finite silent moves. It characterises may preorder in terms simulation, failure simulation. also gives a characterisation using modal logic. Finally it...
The research on malware detection enabled by deep learning has become a hot issue in the field of network security. existing methods based suffer from some issues, such as weak ability feature extraction, relatively complex model, and insufficient model generalization. Traditional architectures, convolutional neural networks (CNNs) variants, do not consider spatial hierarchies between features, lose information precise position within region, which is crucial for file specific sections. In...
Here, we synthesized a series of Ni3S2/MxSy-NiCo LDH materials (M = Cu, Fe, V, Ce, and Bi) by two-step hydrothermal method for the first time, which display excellent oxygen evolution reaction (OER) urea oxidation (UOR) properties. M ions were firstly doped into NiCo to change original electronic structure enhance activity LDH. Then, Ni3S2 MxSy introduced sulfurization Ni support doping cations, combination Ni3S2, NiCo-LDH improved electron transfer rate material. With Ni3S2/Bi2S3-NiCo...