Zhan Shi

ORCID: 0000-0002-7798-1121
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Parallel Computing and Optimization Techniques
  • Software-Defined Networks and 5G
  • Graph Theory and Algorithms
  • Topic Modeling
  • Distributed and Parallel Computing Systems
  • Distributed systems and fault tolerance
  • Model-Driven Software Engineering Techniques
  • Peer-to-Peer Network Technologies
  • Adversarial Robustness in Machine Learning
  • Semantic Web and Ontologies
  • Natural Language Processing Techniques
  • Advanced Graph Neural Networks
  • Network Traffic and Congestion Control
  • Text and Document Classification Technologies
  • Radiomics and Machine Learning in Medical Imaging
  • Complex Network Analysis Techniques
  • AI in cancer detection
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Software Engineering Research
  • Neural Networks and Applications
  • Machine Learning and Algorithms

Huazhong University of Science and Technology
2015-2024

Wuhan National Laboratory for Optoelectronics
2013-2024

Changchun University
2023

China Southern Power Grid (China)
2019-2023

Kyoto University
2023

Zhejiang University of Technology
2022

Nanjing Institute of Technology
2020-2022

Stony Brook University
2022

The University of Texas at Austin
2018-2021

University of Illinois Chicago
2017-2021

Different linguistic perspectives causes many diverse segmentation criteria for Chinese word (CWS). Most existing methods focus on improve the performance each single criterion. However, it is interesting to exploit these different and mining their common underlying knowledge. In this paper, we propose adversarial multi-criteria learning CWS by integrating shared knowledge from multiple heterogeneous criteria. Experiments eight corpora with show that of corpus obtains a significant...

10.18653/v1/p17-1110 preprint EN cc-by Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) 2017-01-01

Despite its success in many areas, deep learning is a poor fit for use hardware predictors because these models are impractically large and slow, but this paper shows how we can to help design new cache replacement policy. We first show that replacement, powerful LSTM model an offline setting provide better accuracy than current predictors. then perform analysis interpret model, deriving key insight allows us simple online matches the model's with orders of magnitude lower cost.

10.1145/3352460.3358319 article EN 2019-10-11

This paper presents Voyager, a novel neural network for data prefetching. Unlike previous models prefetching, which are limited to learning delta correlations, our model can also learn address important prefetching irregular sequences of memory accesses. The key solution is its hierarchical structure that separates addresses into pages and offsets introduces mechanism relations among offsets. Voyager provides significant prediction benefits over current prefetchers. For set programs from the...

10.1145/3445814.3446752 article EN 2021-04-11

Abstract Motivation Predicting pathological complete response (pCR) to neoadjuvant chemotherapy (NAC) in triple-negative breast cancer (TNBC) patients accurately is direly needed for clinical decision making. pCR also regarded as a strong predictor of overall survival. In this work, we propose deep learning system predict NAC based on serial pathology images stained with hematoxylin and eosin two immunohistochemical biomarkers (Ki67 PHH3). To support human prior domain knowledge-based...

10.1093/bioinformatics/btac558 article EN Bioinformatics 2022-08-13

In the background of cloud, self-destructing data mainly aims at protecting privacy. All and its copies will become destructed or unreadable after a user-specified period, without any user intervention. Besides, anyone cannot get decryption key timeout, neither sender nor receiver. The Washington's Vanish system is for under cloud computing, it vulnerable to "hopping attack" "sniffer attack". We propose new scheme in this paper, called Safe Vanish, prevent hopping attacks by way extending...

10.1109/cloudcom.2010.21 article EN 2010-11-01

It is desirable but challenging to simultaneously support latency SLO at a pre-defined percentile, i.e., the Xth percentile SLO, and throughput for consolidated VM storage. Ensuring contributes accurately differentiating service levels in metric of application-level compliance, especially application built on multiple VMs. However, enforcement are opposite sides same coin due conflicting requirements level IO concurrency. To address this challenge, paper proposes PSLO, framework supporting...

10.1145/2901318.2901330 article EN 2016-04-12

Dialogue disentanglement aims to separate intermingled messages into detached sessions. The existing research focuses on two-step architectures, in which a model first retrieves the relationships between two and then divides message stream clusters. Almost all work puts significant efforts selecting features for message-pair classification clustering, while ignoring semantic coherence within each session. In this paper, we introduce end-to- end transition-based online dialogue...

10.24963/ijcai.2020/535 article EN 2020-07-01

Abstract The k-Nearest Neighbors (k-NN) algorithm is a classic non-parametric method that has wide applications in data classification and prediction. Like many other machine learning schemes, the performance of k-NN classifiers will be significantly impacted by imbalanced class distributions data. That is, instances majority tend to dominate prediction test instances. In this paper, we look into pre-processing techniques can used rebalance training enhance sets. We conduct extensive...

10.1088/1757-899x/719/1/012072 article EN IOP Conference Series Materials Science and Engineering 2020-01-01

Conversation disentanglement aims to separate intermingled messages into detached sessions, which is a fundamental task in understanding multi-party conversations. Existing work on conversation relies heavily upon human-annotated datasets, expensive obtain practice. In this work, we explore training model without referencing any human annotations. Our method built the deep co-training algorithm, consists of two neural networks: message-pair classifier and session classifier. The former...

10.18653/v1/2021.emnlp-main.181 article EN cc-by Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing 2021-01-01

Fraud detection on multi-relation graphs aims to identify fraudsters in graphs. Graph Neural Network (GNN) models leverage graph structures pass messages from neighbors the target nodes, thereby enriching representations of those nodes. However, feature and structural inconsistency graph, owing fraudsters' camouflage behaviors, diminish suspiciousness fraud nodes which hinders effectiveness GNN-based models. In this work, we propose DiG-In-GNN, Discriminative Feature Guided GNN against...

10.1609/aaai.v38i8.28785 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

The address allocation policy in SSD aims to translate the logical of I/O requests into a physical address, and static is widely used modern SSD. Through extensive experiments, we find that there are significant differences utilization parallelism among different policies. We also observe fixed design prevents SSDs from continuing meet challenges posed by cloud workloads misses possibility further optimization. These situations stem our excessive reliance on over time. In this paper, propose...

10.1109/tpds.2024.3407367 article EN IEEE Transactions on Parallel and Distributed Systems 2024-05-30

Winograd Schema Challenge (WSC) was proposed as an AI-hard problem in testing computers' intelligence on common sense representation and reasoning. This paper presents the new state-of-theart WSC, achieving accuracy of 71.1%. We demonstrate that leading performance benefits from jointly modelling sentence structures, utilizing knowledge learned cutting-edge pretraining models, performing fine-tuning. conduct detailed analyses, showing fine-tuning is critical for performance, but it helps...

10.48550/arxiv.1904.09705 preprint EN other-oa arXiv (Cornell University) 2019-01-01

10.1016/j.future.2019.05.033 article EN Future Generation Computer Systems 2019-05-15

As the performance of computer systems stagnates due to end Moore's Law, there is a need for new models that can understand and optimize execution general purpose code. While growing body work on using Graph Neural Networks (GNNs) learn representations source code, these do not how code dynamically executes. In this work, we propose approach use GNNs fused its execution. Our defines multi-task GNN over low-level program state (i.e., assembly dynamic memory states), converting complex...

10.48550/arxiv.1906.07181 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Determining the number of clusters is important but challenging, especially for data high dimension. In this paper, we propose Deep Embedding Determination (DED), a method that can solve jointly unknown and feature extraction. DED first combines virtues convolutional autoencoder t-SNE technique to extract low dimensional embedded features. Then it determines using an improved density-based clustering algorithm. Our experimental evaluation on image datasets shows significant improvement over...

10.1609/aaai.v32i1.12150 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2018-04-29

10.1016/j.jvlc.2018.06.003 article EN Journal of Visual Languages & Computing 2018-06-18

Nowadays, artificial intelligence (AI) has a big impact in the field of painting. In contrast to hand-painting and challenging personal creativity, AI applications practices add noise, remove restore image conserve present process after converting data. The various generator models, Diffusion model is latest application consist two main word-image mapping diffusion algorithm. This article introduced mechanism how images are generated makes arguments about several ethical issues generation....

10.23977/jaip.2023.060110 article EN Journal of Artificial Intelligence Practice 2023-01-01

10.1007/s11235-013-9689-y article EN Telecommunication Systems 2013-05-01

Effective feature selection methods are essential for improving the accuracy and efficiency of text categorization. Motivated by document frequency, we proposed a new filter-based approach, called categorical frequency. The frequency displays distribution term over each category. Mathematically, variance reflects contribution to Finally, experiments carried out on Reuters-21578 standard corpus. results showed that categorization performance approach is similar or better than information gain...

10.1109/icm.2011.365 article EN International Conference of Information Technology, Computer Engineering and Management Sciences 2011-09-01

As a fundamental cloud service for modern Web applications, the object storage system stores and retrieves millions or even billions of read-heavy data objects. Serving massive amount requests each day makes response latency be vital component user experiences. Due to lack suitable understanding on distribution, current practice is use overprovision resources meet Service Level Agreement (SLA). Hence we build performance model predict percentiles meeting SLA (response requirement), in...

10.1109/icpp.2017.33 article EN 2017-08-01
Coming Soon ...