Weijie Zhao

ORCID: 0000-0003-0967-1436
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Management and Algorithms
  • Advanced Database Systems and Queries
  • Recommender Systems and Techniques
  • Advanced Image and Video Retrieval Techniques
  • Advanced Graph Neural Networks
  • Adversarial Robustness in Machine Learning
  • Advanced Data Storage Technologies
  • Topic Modeling
  • Advanced Bandit Algorithms Research
  • Catalysis for Biomass Conversion
  • Lignin and Wood Chemistry
  • Algorithms and Data Compression
  • Privacy-Preserving Technologies in Data
  • Spam and Phishing Detection
  • Machine Learning and Algorithms
  • Image Retrieval and Classification Techniques
  • Catalysis and Hydrodesulfurization Studies
  • Stochastic Gradient Optimization Techniques
  • Natural Language Processing Techniques
  • Gamma-ray bursts and supernovae
  • Scientific Computing and Data Management
  • Data Mining Algorithms and Applications
  • Advanced Neural Network Applications
  • Planetary Science and Exploration
  • Multimodal Machine Learning Applications

Rochester Institute of Technology
2022-2024

Shenzhen Institutes of Advanced Technology
2024

Chinese Academy of Sciences
2019-2024

University of Chinese Academy of Sciences
2022-2023

Institute of Engineering Thermophysics
2022-2023

LinkedIn (United States)
2023

Bellevue Hospital Center
2021-2022

Baidu (China)
2020-2022

Yangtze University
2022

Cognitive Research (United States)
2020-2021

Merging neutron stars offer an exquisite laboratory for simultaneously studying strong-field gravity and matter in extreme environments. We establish the physical association of electromagnetic counterpart EM170817 to gravitational waves (GW170817) detected from merging stars. By synthesizing a panchromatic dataset, we demonstrate that are long-sought production site forging heavy elements by r-process nucleosynthesis. The weak gamma-rays seen dissimilar classical short gamma-ray bursts with...

10.1126/science.aap9455 article EN Science 2017-10-16

Recently, machine learning models have demonstrated to be vulnerable backdoor attacks, primarily due the lack of transparency in black-box such as deep neural networks. A third-party model can poisoned that it works adequately normal conditions but behaves maliciously on samples with specific trigger patterns. However, injection function is manually defined most existing attack methods, e.g., placing a small patch pixels an image or slightly deforming before poisoning model. This results...

10.1109/iccv48922.2021.01175 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

A novel process for efficient <italic>para</italic> ethyl phenol production was provided <italic>via</italic> the selective cleavage of <italic>p</italic>CA8 linkage lignin.

10.1039/c8gc03617a article EN Green Chemistry 2019-01-01

As one of the major search engines in world, Baidu's Sponsored Search has long adopted use deep neural network (DNN) models for Ads click-through rate (CTR) predictions, as early 2013. The input futures used by online advertising system (a.k.a. "Phoenix Nest'') are extremely high-dimensional (e.g., hundreds or even thousands billions features) and also sparse. size CTR production can well exceed 10TB. This imposes tremendous challenges training, updating, using such production. For system,...

10.1145/3357384.3358045 article EN 2019-11-03

Neural networks of ads systems usually take input from multiple resources, e.g., query-ad relevance, ad features and user portraits. These inputs are encoded into one-hot or multi-hot binary features, with typically only a tiny fraction nonzero feature values per example. Deep learning models in online advertising industries can have terabyte-scale parameters that do not fit the GPU memory nor CPU main on computing node. For example, sponsored system contain more than $10^{11}$ sparse making...

10.48550/arxiv.2003.05622 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Bulk chemicals produced from renewable resources are receiving considerable attention due to the increase in sustainable practices. In this study, a novel, efficient, and strategy has been proposed produce versatile petroleum-based monophenols natural aromatic polymer, lignin, via selective cleavage of its specific chemical linkages by cost-effective catalyst, Ni/MgO. The results demonstrate that 93.4% lignin is converted, yielding 15.0% presence 20% Importantly, 42.3% these volatile found...

10.1021/acssuschemeng.9b05041 article EN ACS Sustainable Chemistry & Engineering 2019-11-09

Approximate nearest neighbor (ANN) searching is a fundamental problem in computer science with numerous applications (e.g.,) machine learning and data mining. Recent studies show that graph-based ANN methods often outperform other types of algorithms. For typical methods, the algorithm executed iteratively execution dependency prohibits GPU adaptations. In this paper, we present novel framework decouples on graph into 3 stages, order to parallel performance-crucial distance computation....

10.1109/icde48307.2020.00094 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2020-04-01

In the summer of 2003, a heat wave swept Europe and caused more than 70 000 additional fatalities [J.-M. Robine et al., C. R. Biologies331 (2008)]. Global warming climate change is no longer prophecy to be fulfilled, as strong waves typhoons, well severe rainfalls, are becoming severe. Extreme weather events in world, especially over North America, widely studied frequently reported media. These may related ongoing change. this NSR forum, active researchers specialized field gather discuss...

10.1093/nsr/nwaa069 article EN cc-by National Science Review 2020-04-15

Deep neural network has been adopted as the standard model to predict ads click-through rate (CTR) for commercial online advertising systems. Deploying an industrial scale system requires overcome numerous challenges, e.g., hundreds or thousands of billions input features and also training samples, which under cost budget can cause fundamental issues on storage, communication, speed. In this work, we present Baidu's industrial-scale practices how apply machine learning techniques address...

10.1145/3448016.3457236 article EN Proceedings of the 2022 International Conference on Management of Data 2021-06-09

Gradient Boosting Decision Tree (GBDT) is one of the most popular machine learning models in various applications. However, traditional settings, all data should be simultaneously accessed training procedure: it does not allow to add or delete any instances after training. In this paper, we propose an efficient online framework for GBDT supporting both incremental and decremental learning. To best our knowledge, first work that considers in-place unified on GBDT. reduce cost, present a...

10.48550/arxiv.2502.01634 preprint EN arXiv (Cornell University) 2025-02-03

Large Language Models (LLMs) are vulnerable to attacks like prompt injection, backdoor attacks, and adversarial which manipulate prompts or models generate harmful outputs. In this paper, departing from traditional deep learning attack paradigms, we explore their intrinsic relationship collectively term them Prompt Trigger Attacks (PTA). This raises a key question: Can determine if is benign poisoned? To address this, propose UniGuardian, the first unified defense mechanism designed detect...

10.48550/arxiv.2502.13141 preprint EN arXiv (Cornell University) 2025-02-18

Abstract This study focuses on the Dongzhuang and Sanmenxia reservoirs, addressing key issues such as water-sediment relationship in reservoir groups, reducing Tongguan gauge elevation, ensuring flood safety lower Weihe River. Utilizing hydrological data from significant stations Yellow River’s tributaries main stream spanning 1960 to 2020, employed Mann-Kendall statistical methods analyze evolution of characteristics relationships basin. The results indicate a declining trend both runoff...

10.1088/1742-6596/2969/1/012007 article EN Journal of Physics Conference Series 2025-02-01

It has been more than 10 years since Satoshi Nakamoto published his famous paper entitled 'Bitcoin: a peer-to-peer electronic cash system', which set the foundation of blockchain technology. Accompanied by price volatility bitcoins from 2017 to 2018, hot word on internet, and particularly in China. Blockchain offers distributed secure system for data storage value transactions. Its applications are springing up multiple fields. The Chinese government is considering these trends with great...

10.1093/nsr/nwy133 article EN cc-by National Science Review 2018-11-12

The 2019 Nobel Prize in Chemistry was awarded to three pioneers of lithium-ion batteries (LIBs)-Prof. John B. Goodenough at the University Texas, Prof. M. Stanley Whittingham State New York and Mr. Akira Yoshino Asahi Corporation Japan, which is a great encouragement whole field. LIBs have been developed for several decades with progress slowing down their performances approaching some theoretical limits. On other hand, new types or power systems, including solid-state batteries, sodium-ion...

10.1093/nsr/nwaa068 article EN cc-by National Science Review 2020-04-15

Open AccessCCS ChemistryCOMMUNICATION1 Mar 2022Dynamic Macro- and Microgels Driven by Adenosine Triphosphate-Fueled Competitive Host–Guest Interaction Xiang Hao, Hairong Wang, Weijie Zhao, Liteng Feng Peng Qiang Yan Hao *Corresponding authors: E-mail Address: [email protected] Beijing Key Laboratory of Lignocellulosic Chemistry, Advanced Innovation Center for Tree Breeding Molecular Design, Forestry University, 100083 , Wang Zhao State Engineering Polymers, Fudan Shanghai 200433...

10.31635/ccschem.021.202100874 article EN cc-by-nc CCS Chemistry 2021-04-13

Along with the evolution of deep neural networks (DNNs) in many real-world applications, complexity model building has also dramatically increased. Therefore, it is vital to protect intellectual property (IP) builder and ensure trustworthiness deployed models. Meanwhile, adversarial attacks on DNNs (e.g., backdoor poisoning attacks) that seek inject malicious behaviors have been investigated recently, demanding a means for verifying integrity users. This paper presents novel DNN...

10.1609/aaai.v36i9.21193 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

User-Defined Functions (UDF) allow application programmers to specify analysis operations on data, while leaving the data management tasks system. This general approach enables numerous custom functions and is at heart of modern Big Data systems. Even though UDF mechanism can theoretically support arbitrary operations, a wide variety common -- such as computing moving average time series, vorticity fluid flow, etc., are hard express slow execute. Since these traditionally performed...

10.1145/3078597.3078599 article EN 2017-06-23

Abstract There has been speculation about a class of relativistic explosions with an initial Lorentz factor Γ init smaller than that classical gamma-ray bursts (GRBs). These “dirty fireballs” would lack prompt GRB emission but could be pursued via their optical afterglow, appearing as transients fade overnight. Here we report search for such (that by 5- σ in magnitude overnight) four years archival photometric data from the intermediate Palomar Transient Factory (iPTF). Our criteria yielded...

10.3847/2041-8213/aaaa62 article EN The Astrophysical Journal Letters 2018-02-09
Coming Soon ...