Chenyi Zhang

ORCID: 0000-0002-3054-5883
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Logic, programming, and type systems
  • Formal Methods in Verification
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Distributed systems and fault tolerance
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Logic, Reasoning, and Knowledge
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Recommender Systems and Techniques
  • Parallel Computing and Optimization Techniques
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • Electrocatalysts for Energy Conversion
  • Stochastic Gradient Optimization Techniques
  • Anomaly Detection Techniques and Applications
  • Advanced battery technologies research
  • Adversarial Robustness in Machine Learning
  • Network Security and Intrusion Detection
  • Access Control and Trust
  • Real-Time Systems Scheduling
  • Advanced Software Engineering Methodologies
  • Human Mobility and Location-Based Analysis
  • Advanced Photocatalysis Techniques

Beihang University
2024-2025

Donghua University
2024

Materials Science & Engineering
2024

Jinan University
2017-2023

University of Canterbury
2023

Shanghai Jiao Tong University
2023

Tsinghua University
2021-2022

North University of China
2021-2022

Nanjing Tech University
2022

The University of Queensland
2012-2021

As location-based social network (LBSN) services become increasingly popular, trip recommendation that recommends a sequence of points interest (POIs) to visit for user emerges as one many important applications LBSNs. Personalized tailors users' specific tastes by learning from past check-in behaviors users and their peers. Finding the optimal maximizes user's experiences given time budget constraint is an NP hard problem previous solutions do not consider two practical constraints. One POI...

10.1145/2806416.2806558 article EN 2015-10-17

User preferences change over time and capturing such changes is essential for developing accurate recommender systems. Despite its importance, only a few works in collaborative filtering have addressed this issue. In paper, we consider evolving model user dynamics by introducing learning transition matrix each user's latent vectors between consecutive windows. Intuitively, the summarizes time-invariant pattern of evolution user. We first extend conventional probabilistic factorization then...

10.1137/1.9781611973440.52 article EN 2014-04-28

10.1007/s10115-015-0825-8 article EN Knowledge and Information Systems 2015-02-12

Characterizing material flows and environmental impacts of plastic value chain is crucial for sustainable management. Here, we combine flow analysis life cycle assessment methods to map the eight major plastics investigate multiple China's chain. We find that packaging textile sectors dominate consumption are responsible burdens, but with low recycling rates. Major generated in production product manufacturing stages because coal-based feedstocks electricity. therefore set up six scenarios...

10.1016/j.isci.2023.107701 article EN cc-by-nc-nd iScience 2023-08-24

Monotone learning refers to processes in which expected performance consistently improves as more training data is introduced. Non-monotone behavior of machine has been the topic a series recent works, with various proposals that ensure monotonicity by applying transformations or wrappers on algorithms. In this work, from different perspective, we tackle monotone within framework Probably Approximately Correct (PAC) theory. Following mechanism estimates sample complexity PAC-learnable...

10.48550/arxiv.2501.05493 preprint EN arXiv (Cornell University) 2025-01-09

Abstract The pulse‐level quantum control presents a large range of external parameter dependencies, including field noise, frequency detuning, nonlinearities, and uncertainty Hamiltonian parameters, which can lead to significant deviation from the target gate. These terms are not usually considered directly in standard optimization scenarios for robustness, but often found analytical solutions. latter difficult emerge generalize different settings. This paper proposes diffusion‐based...

10.1002/apxr.202400159 article EN cc-by Advanced Physics Research 2025-03-19

As location-based social network (LBSN) services become increasingly popular, trip recommendation that recommends a sequence of points interest (POIs) to visit for user emerges as one many important applications LBSNs. Personalized tailors users’ specific tastes by learning from past check-in behaviors users and their peers. Finding the optimal maximizes user’s experiences given time budget constraint is an NP-hard problem previous solutions do not consider three practical constraints. One...

10.1145/2948065 article EN ACM transactions on office information systems 2016-09-08

A probabilistic variant of ATL* logic is proposed to work with multi-player games incomplete information and synchronous perfect recall. The semantics the settled over interpreted system partially observed concurrent game structure. While unexpectedly, model checking problem in general undecidable even for single-group fragment, we find a fragment whose complexity 2-EXPTIME. usefulness this shown land search scenario.

10.1609/aaai.v26i1.8214 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2021-09-20

Quantum simulation is a prominent application of quantum computers. While there extensive previous work on simulating finite-dimensional systems, less known about algorithms for real-space dynamics. We conduct systematic study such algorithms. In particular, we show that the dynamics <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi>d</mml:mi></mml:math>-dimensional Schrödinger equation with...

10.22331/q-2022-11-17-860 article EN cc-by Quantum 2022-11-17

Bug-checking tools have been used with some success in recent years to find bugs software. For finding that can cause security vulnerabilities, bug checking require a program analysis which determines whether software be controlled by user-input. In this paper we introduce static for computing user-input dependencies. This as pre-processing filter tool identifying potentially exploited vulnerabilities. order the applicable large commercial millions of lines code, runtime speed and...

10.1109/scam.2008.22 article EN 2008-09-01

The paper discusses the problem of model checking a number noninterference properties in finite state systems: Noninterference, Nondeducibility on Inputs, Generalised Forward Correctability and Restrictiveness. complexity these problems is characterized, possible heuristics for optimization are discussed.

10.1016/j.entcs.2006.11.002 article EN Electronic Notes in Theoretical Computer Science 2007-02-01

In the information explosion era, large scale data processing and mining is a hot issue. As microblog grows more popular, services have become provider on web scale, so researches begin to focus its content than solely user's relationship analysis before. Although traditional text methods been studied well, no algorithm designed specially for data, which contain structured social network besides plain text. this paper, we introduce novel probabilistic generative model MicroBlog-Latent...

10.1145/2187980.2188238 article EN 2012-04-16

Bug localization refers to the process of identifying source code files that contain defects from textual descriptions in bug reports. Existing techniques work on assumption reports, and identifiers comments files, are written same language (i.e., English). However, software users non-English speaking countries (e.g., China) often use their native languages Chinese) write For this setting, existing studies would not as terms appear reports do code. We refer problem cross-language...

10.1145/2597008.2597788 article EN 2014-05-20

We develop a general testing scenario for probabilistic processes, giving rise to two theories: may and must testing. These are applied simple version of the process calculus CSP. examine algebraic theory testing, show that many axioms standard no longer valid in our setting; even non-probabilistic CSP distinguishing power tests is much greater than tests. method deriving inequations based on extension notion simulation. Using this, we obtain complete axiomatisation processes subject

10.1016/j.entcs.2007.02.013 article EN Electronic Notes in Theoretical Computer Science 2007-04-01

In 1992 Wang & Larsen extended the may- and must preorders of De Nicola Hennessy to processes featuring probabilistic as well nondeterministic choice. They concluded with two problems that have remained open throughout years, namely find complete axiomatisations alternative characterisations for these preorders. This paper solves both finite silent moves. It characterises may preorder in terms simulation, failure simulation. also gives a characterisation using modal logic. Finally it...

10.1109/lics.2007.15 article EN 2007-07-01

The research on malware detection enabled by deep learning has become a hot issue in the field of network security. existing methods based suffer from some issues, such as weak ability feature extraction, relatively complex model, and insufficient model generalization. Traditional architectures, convolutional neural networks (CNNs) variants, do not consider spatial hierarchies between features, lose information precise position within region, which is crucial for file specific sections. In...

10.3390/pr9060929 article EN Processes 2021-05-25

10.1016/j.tcs.2010.08.013 article EN publisher-specific-oa Theoretical Computer Science 2010-08-20

Here, we synthesized a series of Ni3S2/MxSy-NiCo LDH materials (M = Cu, Fe, V, Ce, and Bi) by two-step hydrothermal method for the first time, which display excellent oxygen evolution reaction (OER) urea oxidation (UOR) properties. M ions were firstly doped into NiCo to change original electronic structure enhance activity LDH. Then, Ni3S2 MxSy introduced sulfurization Ni support doping cations, combination Ni3S2, NiCo-LDH improved electron transfer rate material. With Ni3S2/Bi2S3-NiCo...

10.1039/d2dt03047k article EN Dalton Transactions 2022-12-14
Coming Soon ...