Zheng Xu

ORCID: 0000-0003-1932-1026
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Advanced Text Analysis Techniques
  • Traffic Prediction and Management Techniques
  • Big Data Technologies and Applications
  • Cloud Computing and Resource Management
  • Topic Modeling
  • Network Security and Intrusion Detection
  • Sentiment Analysis and Opinion Mining
  • Adversarial Robustness in Machine Learning
  • Technology and Data Analysis
  • Text and Document Classification Technologies
  • Cognitive Computing and Networks
  • Domain Adaptation and Few-Shot Learning
  • Data Quality and Management
  • Stochastic Gradient Optimization Techniques
  • Web Data Mining and Analysis
  • Semantic Web and Ontologies
  • Software System Performance and Reliability
  • Data Management and Algorithms
  • Neural Networks and Applications
  • Advanced Image and Video Retrieval Techniques
  • Natural Language Processing Techniques
  • Data Visualization and Analytics
  • Human Mobility and Location-Based Analysis
  • Food Supply Chain Traceability

Stevens Institute of Technology
2024

Shanghai Polytechnic University
2021-2023

Shanghai University
2008-2020

North China University of Technology
2020

Shanghai University of Medicine and Health Sciences
2020

Ministry of Public Security of the People's Republic of China
2014-2019

University of Maryland, College Park
2016-2019

State Key Laboratory of Cryptology
2019

Tsinghua University
2014-2016

Nanyang Technological University
2014

Online comment has become a popular and efficient way for sellers to acquire feedback from customers improve their service quality. However, some key issues need be solved about evaluating improving the hotel quality based on online comments automatically, such as how use less trustworthy comments, discover defects recommend more feasible or economical evaluation indexes comments. To solve above problems, this paper first improves fuzzy comprehensive (FCE) by importing degree it proposes an...

10.1109/tfuzz.2015.2390226 article EN IEEE Transactions on Fuzzy Systems 2015-01-09

Currently, deep neural networks are deployed on low-power portable devices by first training a full-precision model using powerful hardware, and then deriving corresponding low-precision for efficient inference such systems. However, models directly with coarsely quantized weights is key step towards learning embedded platforms that have limited computing resources, memory capacity, power consumption. Numerous recent publications studied methods networks, but these studies mostly been...

10.48550/arxiv.1706.02379 preprint EN other-oa arXiv (Cornell University) 2017-01-01

The explosive increasing of the social media data on Web has created and promoted development big mining area welcomed by researchers from both academia industry. sentiment computing news event is a significant component data. It also attracted lot researches, which could support many real-world applications, such as public opinion monitoring for governments recommendation Websites. However, existing methods are mainly based standard emotion thesaurus or supervised methods, not scalable to...

10.1109/access.2016.2607218 article EN cc-by-nc-nd IEEE Access 2016-09-15

These artificial intelligence technologies have become key tools for solving automated task scheduling as cloud computing applications continue to expand. The paper proposes an automatic scheme large-scale systems based on deep learning and reinforcement learning. addresses the complexity real-time requirements of in such systems. system's parameters are monitored predicted using technology obtain system status information. strategy is then dynamically adjusted state characteristics, a...

10.1117/12.3034052 article EN 2024-10-16

Abstract The supply chain network is one of the most important areas focus in majority business circumstances. Blockchain technology a feasible choice for secure information sharing network. Despite fact that maintaining security at all levels blockchain difficult, cryptographic methods are commonly used existing works. Effective management (SCM) offers various benefits to organizations, such as enhanced customer satisfaction, increased operational efficiency, competitive advantage, and cost...

10.1007/s43926-023-00040-7 article EN cc-by Discover Internet of Things 2023-09-28

Summary As a well‐known field of big data applications, smart city takes advantage massive analysis to achieve efficient management and sustainable development in the current worldwide urbanization process. An important problem is how discover frequent trajectory sequence pattern cluster trajectory. To solve this problem, paper proposes cloud‐based taxi mining clustering framework for city. Our work mainly includes (1) preprocessing raw Global Positioning System trace by calling Baidu API...

10.1002/spe.2435 article EN Software Practice and Experience 2016-08-24

This paper studies how neural network architecture affects the speed of training. We introduce a simple concept called gradient confusion to help formally analyze this. When is high, stochastic gradients produced by different data samples may be negatively correlated, slowing down convergence. But when low, interact harmoniously, and training proceeds quickly. Through theoretical experimental results, we demonstrate confusion, thus efficiency Our results show that, for popular initialization...

10.48550/arxiv.1904.06963 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Sentiment analysis from microblog platform has received an increasing interest web mining community in recent years. Current sentiment methods are mainly based on the hypothesis that each word expresses only one sentiment. However, human prototyped and fuzzy-confined as declared social psychology, which is conflicting with hypothesis. This of barriers impede computation complex public events microblog. Therefore, how to find a reasonable computational model, combining learning technology...

10.1142/s0218194016400076 article EN International Journal of Software Engineering and Knowledge Engineering 2016-11-01

With the continuous expansion of scale cloud computing applications, artificial intelligence technologies such as Deep Learning and Reinforcement have gradually become key tools to solve automated task scheduling large-scale systems. Aiming at complexity real-time requirement in system, this paper proposes an automatic scheme based on deep learning reinforcement learning. Firstly, technology is used monitor predict parameters system real time obtain status information. Then, combined with...

10.48550/arxiv.2403.07905 preprint EN arXiv (Cornell University) 2024-02-26

This paper describes the FAST methodology that enables a single FPGA to accelerate performance of cycle-accurate computer system simulators modeling modem, realistic SoCs, embedded systems and standard desktop/laptop/server systems. The partitions simulator into (i) functional model simulates functionality (ii) predictive predicts other metrics. partitioning is crafted map most parallel work onto hardware-based model, eliminating much complexity difficulty simulating constructs on sequential...

10.1109/iccad.2007.4397280 article EN Digest of technical papers/Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design 2007-11-01

Association link network (ALN) is used to establish associated relations among various resources, aiming at extending the hyperlink World Wide Web an association-rich network, for effectively supporting intelligence activities. Unfortunately, with increase number of challenge incremental building ALN on how perform association weight new coming resources efficiently and exactly. A naive way compare every pair data in existing ALN, thus bearing a O(n <sup...

10.1109/icpads.2009.14 article EN 2009-01-01

10.1016/j.knosys.2016.03.031 article EN publisher-specific-oa Knowledge-Based Systems 2016-04-10

Cite This Article Z. Xu, "Applications and techniques in cyber intelligence," Computer Systems Science Engineering, vol. 34, no.4, pp. 169–170, 2019.

10.32604/csse.2019.34.169 article EN Computer Systems Science and Engineering 2019-01-01

Depth estimation becomes the key technology to resolve communications of stereo vision. We can get real-time depth map based on hardware, which cannot implement complicated algorithm as software, because there are some restrictions in hardware structure. Eventually, wrong matching will inevitably exist process by such FPGA. In order solve problem a postprocessing function is designed this paper. After cost unique test, both left-right and right-left consistency check solutions implemented,...

10.1155/2014/363287 article EN cc-by The Scientific World JOURNAL 2014-01-01

10.1007/s11042-018-5967-8 article EN Multimedia Tools and Applications 2018-04-13

We are living in the era of data deluge. Meanwhile, world big includes a rich and complex set cross-media content, including text, images, video, audio, graphics. To date, substantial research efforts have been dedicated to processing mining, yielding good theoretical underpinnings great practical success. However, studies that jointly consider analytics relatively sparse (Zhang, Liu, Deng, Xu, Choo (2018); Zhang, Wei, Wang, Liao (2018)). This gap needs more attention since it will benefit...

10.1111/exsy.12446 article EN Expert Systems 2019-06-26
Coming Soon ...