Yisong Wang

ORCID: 0000-0003-2126-7006
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Logic, Reasoning, and Knowledge
  • Multi-Agent Systems and Negotiation
  • Logic, programming, and type systems
  • Semantic Web and Ontologies
  • Myasthenia Gravis and Thymoma
  • Topic Modeling
  • Natural Language Processing Techniques
  • Multimodal Machine Learning Applications
  • AI-based Problem Solving and Planning
  • Bayesian Modeling and Causal Inference
  • Remote Sensing and Land Use
  • Remote-Sensing Image Classification
  • Advanced Computational Techniques and Applications
  • Formal Methods in Verification
  • Advanced Graph Neural Networks
  • Adversarial Robustness in Machine Learning
  • Advanced Algebra and Logic
  • Nuclear Structure and Function
  • Domain Adaptation and Few-Shot Learning
  • Constraint Satisfaction and Optimization
  • Privacy-Preserving Technologies in Data
  • Pituitary Gland Disorders and Treatments
  • Rough Sets and Fuzzy Logic
  • Renal and related cancers
  • Infrared Target Detection Methodologies

Guizhou University
2015-2025

Xi'an Jiaotong University
2023-2024

Shandong University
2024

Guizhou Institute of Technology
2022-2024

Tsinghua University
2024

Inner Mongolia University
2022-2023

State Key Laboratory of Electrical Insulation and Power Equipment
2023

East China Normal University
2022

Shihezi University
2022

Beijing University of Posts and Telecommunications
2022

Federated learning is increasingly popular, as it allows us to circumvent challenges due data islands, by training a global model using from one or more owners/sources. However, in edge computing, resource-constrained end devices are vulnerable be compromised and abused facilitate poisoning attacks. Privacy-preserving another important property consider when dealing with sensitive user on devices. Most existing approaches only either defending against attacks supporting privacy, but not both...

10.1109/tdsc.2022.3168556 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-01

Exportin 1 (XPO1) mediates nuclear export of many cellular factors known to play critical roles in malignant processes, and selinexor (KPT-330) is the first XPO1-selective inhibitor compound advanced clinical development phase for cancer treatment. We demonstrated here that inhibition XPO1 drives accumulation important cargo tumor suppressor proteins, including transcription factor FOXO3a p53 thymic epithelial (TET) cells, induces p53-dependent -independent antitumor activity vitro Selinexor...

10.1158/0008-5472.can-17-1323 article EN Cancer Research 2017-08-17

<title>Abstract</title> The circumscription is an elegant non-monotonic logic. However, computing remains challenging due to its computational complexity. This paper presents a weighted partial Maximum Satisfiability (MaxSAT) encoding approach that addresses circumscription, allowing us leverage state-of-the-art MaxSAT solvers for efficient computation.This introduces linear-time scheme captures both parallel and prioritized without requiring fresh predicates. Furthermore, we develop...

10.21203/rs.3.rs-6226254/v1 preprint EN Research Square (Research Square) 2025-04-24

Hyperspectral image's vast data volume brings about many problems in processing. It also comes at a price that such wealthy spectral information is highly correlated. Selection of optimal bands an effective means to mitigate the curse dimensionality for remote sensing data. In this paper, we propose new inter-class separability criterion, Spectral Separability Index, and present band selection algorithm hyperspectral image classification. We take three factors which include amount...

10.1109/sopo.2010.5504325 article EN Symposium on Photonics and Optoelectronics 2010-06-01

Abstract The effectiveness of sequence-to-sequence (seq2seq) models in natural language processing has been well-established over time, and recent studies have extended their utility by treating mathematical computing tasks as instances machine translation achieving remarkable results. However, our exploratory experiments revealed that the seq2seq model, when employing a generic sorting strategy, is incapable inferring on matrices unseen rank, resulting suboptimal performance. This paper...

10.1038/s41598-023-50919-2 article EN cc-by Scientific Reports 2024-01-09

One big limitation of computational tools for analyzing ChIP-seq data is that most them ignore non-unique tags (NUTs) match the human genome even though NUTs comprise up to 60% all raw in data. Effectively utilizing these would increase sequencing depth and allow a more accurate detection enriched binding sites, which turn could lead precise significant biological interpretations. In this study, we have developed tool, LOcating Non-Unique matched Tags (LONUT), improve regions from Our LONUT...

10.1371/journal.pone.0067788 article EN cc-by PLoS ONE 2013-06-25

// Rong An 1, * , Yisong Wang 2, Donna Voeller 1 Arjan Gower 2 In-Kyu Kim Yu-Wen Zhang Giuseppe Giaccone Center for Cancer Research, National Institute, Bethesda, MD 20892, USA Lombardi Comprehensive Center, Georgetown University, Washington DC 20007, These authors have contributed equally to this work Correspondence to: Giaccone, email: gg496@georgetown.edu Keywords: EML4-ALK, NSCLC, CRKL, ALK Received: February 08, 2016 Accepted: March 16, Published: April 7, ABSTRACT Anaplastic lymphoma...

10.18632/oncotarget.8638 article EN Oncotarget 2016-04-07

Computer-aided methods have been extensively applied for diagnosing breast lesions with magnetic resonance imaging (MRI), but fully-automatic diagnosis using deep learning is rarely documented. Deep-learning-technology-based artificial intelligence (AI) was used in this work to classify and diagnose cancer based on MRI images. Breast images from the Rider public dataset were converted into processable joint photographic expert group (JPG) format The location shape of lesion area labeled...

10.3390/diagnostics13091582 article EN cc-by Diagnostics 2023-04-28

Recent advances in high-fidelity virtual environments serve as one of the major driving forces for building intelligent embodied agents to perceive, reason and interact with physical world. Typically, these remain unchanged unless them. However, real-world scenarios, might also face dynamically changing characterized by unexpected events need rapidly take action accordingly. To remedy this gap, we propose a new simulated benchmark, called HAZARD, specifically designed assess decision-making...

10.48550/arxiv.2401.12975 preprint EN other-oa arXiv (Cornell University) 2024-01-01

Description Logic Programs (dl-programs) proposed by Eiter et al. constitute an elegant yet powerful formalism for the integration of answer set programming with description logics, Semantic Web. In this paper, we generalize notions completion and loop formulas logic programs to show that sets a dl-program can be precisely captured models its formulas. Furthermore, propose new, alternative semantics dl-programs, called {\em canonical semantics}, which is defined satisfy what are A desirable...

10.1017/s1471068410000268 article EN Theory and Practice of Logic Programming 2010-07-01

10.1109/tetci.2024.3485624 article EN IEEE Transactions on Emerging Topics in Computational Intelligence 2024-01-01

The sensitive information of vehicles which is closely related to the safety transportation makes privacy problems in vehicular networks a popular concern. development artificial intelligence (AI) has led Internet Vehicles (IoV) next phase intelligence, Social IoV (SIoV). For social purposes, may upload captured images with more information. As result, problem even serious SIoV. exited studies privacy-preserving methods mainly consider spontaneous disclosure. However, main leakage real life...

10.1109/jiot.2022.3189108 article EN IEEE Internet of Things Journal 2022-07-07

Knowledge graphs (KGs) play an important role in many real-world applications like information retrieval, question answering, relation extraction, etc. To reveal implicit knowledge from a graph (KG), viz. completion (KGC), is crucial task for the downstream based on KG. For this purpose various embedding-based approaches have been proposed recently. This paper proposes new approach named HRESCAL to KGC. It extends well-known RESCAL by introducing Hamming distance-based encoder capture...

10.1109/access.2020.3004448 article EN cc-by IEEE Access 2020-01-01

In this article, we consider Answer Set Programming (ASP). It is a declarative problem solving paradigm that can be used to encode as logic program whose answer sets correspond the solutions of problem. has been widely applied in various domains AI and beyond. Given are supposed yield original problem, question “why set atoms an set” becomes important for both semantics understanding debugging. well investigated normal programs. However, class disjunctive programs, which substantial...

10.1145/3568955 article EN ACM Transactions on Computational Logic 2022-10-20
Coming Soon ...