- Logic, Reasoning, and Knowledge
- Multi-Agent Systems and Negotiation
- Logic, programming, and type systems
- Semantic Web and Ontologies
- Myasthenia Gravis and Thymoma
- Topic Modeling
- Natural Language Processing Techniques
- Multimodal Machine Learning Applications
- AI-based Problem Solving and Planning
- Bayesian Modeling and Causal Inference
- Remote Sensing and Land Use
- Remote-Sensing Image Classification
- Advanced Computational Techniques and Applications
- Formal Methods in Verification
- Advanced Graph Neural Networks
- Adversarial Robustness in Machine Learning
- Advanced Algebra and Logic
- Nuclear Structure and Function
- Domain Adaptation and Few-Shot Learning
- Constraint Satisfaction and Optimization
- Privacy-Preserving Technologies in Data
- Pituitary Gland Disorders and Treatments
- Rough Sets and Fuzzy Logic
- Renal and related cancers
- Infrared Target Detection Methodologies
Guizhou University
2015-2025
Xi'an Jiaotong University
2023-2024
Shandong University
2024
Guizhou Institute of Technology
2022-2024
Tsinghua University
2024
Inner Mongolia University
2022-2023
State Key Laboratory of Electrical Insulation and Power Equipment
2023
East China Normal University
2022
Shihezi University
2022
Beijing University of Posts and Telecommunications
2022
Federated learning is increasingly popular, as it allows us to circumvent challenges due data islands, by training a global model using from one or more owners/sources. However, in edge computing, resource-constrained end devices are vulnerable be compromised and abused facilitate poisoning attacks. Privacy-preserving another important property consider when dealing with sensitive user on devices. Most existing approaches only either defending against attacks supporting privacy, but not both...
Exportin 1 (XPO1) mediates nuclear export of many cellular factors known to play critical roles in malignant processes, and selinexor (KPT-330) is the first XPO1-selective inhibitor compound advanced clinical development phase for cancer treatment. We demonstrated here that inhibition XPO1 drives accumulation important cargo tumor suppressor proteins, including transcription factor FOXO3a p53 thymic epithelial (TET) cells, induces p53-dependent -independent antitumor activity vitro Selinexor...
<title>Abstract</title> The circumscription is an elegant non-monotonic logic. However, computing remains challenging due to its computational complexity. This paper presents a weighted partial Maximum Satisfiability (MaxSAT) encoding approach that addresses circumscription, allowing us leverage state-of-the-art MaxSAT solvers for efficient computation.This introduces linear-time scheme captures both parallel and prioritized without requiring fresh predicates. Furthermore, we develop...
Hyperspectral image's vast data volume brings about many problems in processing. It also comes at a price that such wealthy spectral information is highly correlated. Selection of optimal bands an effective means to mitigate the curse dimensionality for remote sensing data. In this paper, we propose new inter-class separability criterion, Spectral Separability Index, and present band selection algorithm hyperspectral image classification. We take three factors which include amount...
Abstract The effectiveness of sequence-to-sequence (seq2seq) models in natural language processing has been well-established over time, and recent studies have extended their utility by treating mathematical computing tasks as instances machine translation achieving remarkable results. However, our exploratory experiments revealed that the seq2seq model, when employing a generic sorting strategy, is incapable inferring on matrices unseen rank, resulting suboptimal performance. This paper...
One big limitation of computational tools for analyzing ChIP-seq data is that most them ignore non-unique tags (NUTs) match the human genome even though NUTs comprise up to 60% all raw in data. Effectively utilizing these would increase sequencing depth and allow a more accurate detection enriched binding sites, which turn could lead precise significant biological interpretations. In this study, we have developed tool, LOcating Non-Unique matched Tags (LONUT), improve regions from Our LONUT...
// Rong An 1, * , Yisong Wang 2, Donna Voeller 1 Arjan Gower 2 In-Kyu Kim Yu-Wen Zhang Giuseppe Giaccone Center for Cancer Research, National Institute, Bethesda, MD 20892, USA Lombardi Comprehensive Center, Georgetown University, Washington DC 20007, These authors have contributed equally to this work Correspondence to: Giaccone, email: gg496@georgetown.edu Keywords: EML4-ALK, NSCLC, CRKL, ALK Received: February 08, 2016 Accepted: March 16, Published: April 7, ABSTRACT Anaplastic lymphoma...
Computer-aided methods have been extensively applied for diagnosing breast lesions with magnetic resonance imaging (MRI), but fully-automatic diagnosis using deep learning is rarely documented. Deep-learning-technology-based artificial intelligence (AI) was used in this work to classify and diagnose cancer based on MRI images. Breast images from the Rider public dataset were converted into processable joint photographic expert group (JPG) format The location shape of lesion area labeled...
Recent advances in high-fidelity virtual environments serve as one of the major driving forces for building intelligent embodied agents to perceive, reason and interact with physical world. Typically, these remain unchanged unless them. However, real-world scenarios, might also face dynamically changing characterized by unexpected events need rapidly take action accordingly. To remedy this gap, we propose a new simulated benchmark, called HAZARD, specifically designed assess decision-making...
Description Logic Programs (dl-programs) proposed by Eiter et al. constitute an elegant yet powerful formalism for the integration of answer set programming with description logics, Semantic Web. In this paper, we generalize notions completion and loop formulas logic programs to show that sets a dl-program can be precisely captured models its formulas. Furthermore, propose new, alternative semantics dl-programs, called {\em canonical semantics}, which is defined satisfy what are A desirable...
The sensitive information of vehicles which is closely related to the safety transportation makes privacy problems in vehicular networks a popular concern. development artificial intelligence (AI) has led Internet Vehicles (IoV) next phase intelligence, Social IoV (SIoV). For social purposes, may upload captured images with more information. As result, problem even serious SIoV. exited studies privacy-preserving methods mainly consider spontaneous disclosure. However, main leakage real life...
Knowledge graphs (KGs) play an important role in many real-world applications like information retrieval, question answering, relation extraction, etc. To reveal implicit knowledge from a graph (KG), viz. completion (KGC), is crucial task for the downstream based on KG. For this purpose various embedding-based approaches have been proposed recently. This paper proposes new approach named HRESCAL to KGC. It extends well-known RESCAL by introducing Hamming distance-based encoder capture...
In this article, we consider Answer Set Programming (ASP). It is a declarative problem solving paradigm that can be used to encode as logic program whose answer sets correspond the solutions of problem. has been widely applied in various domains AI and beyond. Given are supposed yield original problem, question “why set atoms an set” becomes important for both semantics understanding debugging. well investigated normal programs. However, class disjunctive programs, which substantial...