- Blockchain Technology Applications and Security
- Advanced Surface Polishing Techniques
- Data Quality and Management
- Laser Material Processing Techniques
- IoT and Edge/Fog Computing
- E-commerce and Technology Innovations
- Anomaly Detection Techniques and Applications
- Surface Treatment and Residual Stress
- Topic Modeling
- Misinformation and Its Impacts
- Bacillus and Francisella bacterial research
- Privacy-Preserving Technologies in Data
- FinTech, Crowdfunding, Digital Finance
- Natural Language Processing Techniques
- Spam and Phishing Detection
- COVID-19 Pandemic Impacts
- Automated Road and Building Extraction
- COVID-19 impact on air quality
- Erosion and Abrasive Machining
- Infection Control and Ventilation
- Lung Cancer Diagnosis and Treatment
- Evaluation and Optimization Models
- Adversarial Robustness in Machine Learning
- COVID-19 diagnosis using AI
- Bayesian Modeling and Causal Inference
Beijing Institute of Big Data Research
2020-2025
Anyang Institute of Technology
2023-2024
The undeformed chip thickness and grinding force are key parameters for revealing the material removal mechanism in process. However, they difficult to be well expressed due ununiformed protrusion height random position distribution of abrasive grains on wheel surface. This study investigated considering non-uniform characteristics K4002 nickel-based superalloy. First, a novel model was established through kinematic-geometric analysis grain-workpiece contact analysis. Then, series...
The rapid evolution of artificial intelligence (AI) has driven advancements across numerous sectors. In the domain government affairs, large language models (LLMs) hold significant potential for applications such as policy analysis, data processing, and decision support. However, their adoption in settings faces considerable challenges, including accessibility issues, absence standardized evaluation criteria, concerns regarding model accuracy, reliability, security. To address these we...
Data matching - which decides whether two data elements (e.g., string, tuple, column, or knowledge graph entity) are the "same" (a.k.a. a match) is key concept in integration, such as entity and schema matching. The widely used practice to build task-specific even dataset-specific solutions, hard generalize disable opportunities of sharing that can be learned from different datasets multiple tasks. In this paper, we propose Unicorn, unified model for generally supporting common Unicorn...
Visual Transformers (ViTs) and Convolutional Neural Networks (CNNs) are the two primary backbone structures extensively used in various vision tasks. Generating transferable adversarial examples for ViTs is difficult due to ViTs' superior robustness, while transferring across CNNs even harder, since their mechanisms processing images fundamentally distinct. In this work, we propose a novel attack method named Momentum Integrated Gradients (MIG), which not only attacks with high success rate,...
The outbreak of Corona Virus Disease 2019 (COVID-19) has affected the lives people all over world. It is particularly urgent and important to analyze epidemic spreading law support implementation prevention measures. found that there a moderate high correlations between number newly diagnosed cases per day temperature relative humidity in countries with more than 10,000 confirmed worldwide. In this paper, correlation temperature/relative obvious. Governments can adjust measures according...
During the novel coronavirus pneumonia, underlying comments and news of epidemic had bombed on Internet media social networks, reflecting views attitudes governments, society, individuals to situation. Those are closely related people's lives blend with each other. Novel pneumonia affects lives, they publish networks media, information from in turn attitude measures, strategies taken fight life. We collect various network platforms such as Weibo, WeChat, Chinanews, Sina News, NetEase Sohu...
Welcome to the last issue of IEEE Transactions on Computational Social Systems (IEEE TCSS) in 2021. For TCSS, 2021 is an exciting year. TCSS has been added ISI Web Science Sources Citation Index Expanded (SCIE) database 2021, and all articles published since 2018 have indexed by SCIE. This important milestone development TCSS. We would like take this opportunity thank congratulate everyone for their great efforts supports. are looking forward working together further improve publication...
In large space buildings, jet flow nozzle is usually used for ventilation and air conditioning. A secondary airflow-relay system proposed situations that building span larger than the primary range. physical experiment conducted to investigate effect of such airflow-relay; a CFD model built up research airflow velocity relative location terminal on performance. The result validated by experimentally measured vertical temperature distribution in certain points. Various indices including ADPI,...
The present work introduces a laser-induced cavitation bubble technique for forming an axisymmetric structure (i.e., microgroove) and the dynamics of from initial expansion to collapse stages that were also simulated. Furthermore, shock wave signals dynamic properties recorded using hydrophone high-speed camera. experiments on microgrooves formed by stamping carried out, effects laser energy, position bubble, number impacts microformability aluminum sheets are discussed. depth microgroove...
Rights confirmation is the prerequisite and a major problem in sharing of government data resources. In traditional model, some problems restrict opening data, such as unclear rights responsibilities, boundaries ownership use rights, artificial manipulation so on. Based on underlying platform block chain, this paper uses smart contract technology to ensure unique source resources separation solve confirming from flow.
With the development of information technology, various social fields have gradually realised informatisation and digitisation, today's society has entered era big data. A large amount data exists in different departments systems. At present, cross-organisational sharing is often by point-to-point authorisation. However, there are still some threats management control schedule for whole region. To realise secure credible sharing, this paper proposes a data-sharing framework based on...
Data matching, which decides whether two data elements (e.g., string, tuple, column, or knowledge graph entity) are the "same" (a.k.a. a match), is key concept in integration. The widely used practice to build task-specific even dataset-specific solutions, hard generalize and disable opportunities of sharing that can be learned from different datasets multiple tasks. In this paper, we propose Unicorn, unified model for generally supporting common matching Building such challenging due...
We developed an interpretable model, BOUND (Bayesian netwOrk for large-scale lUng caNcer Digital prescreening), using a comprehensive EHR dataset from the China to improve lung cancer detection rates. employs Bayesian network uncertainty inference, allowing it predict risk even with missing data and identify high-risk factors. Developed 905,194 individuals, achieved AUC of 0.866 in internal validation, time- geography-based external validations yielding AUCs 0.848 0.841, respectively. In...
In modern mobile applications, users frequently encounter various new contexts, necessitating on-device continual learning (CL) to ensure consistent model performance. While existing research predominantly focused on developing lightweight CL frameworks, we identify that data scarcity is a critical bottleneck for CL. this work, explore the potential of leveraging abundant cloud-side enrich scarce data, and propose private, efficient effective enrichment framework Delta. Specifically, Delta...
Learning, interpreting, and predicting from complex high-dimensional spatio-temporal data is a natural ability of humans other intelligent agents, one the most important difficult challenges AI. Although objects may present different observed phenomena under situations, their causal mechanism generation rules are stable invariant. Different existing studies that focus on dynamic correlation, we explore latent structure descriptors in dimension at microscopic level, thus revealing principle...
Laser-induced cavitation impact forming is a high-speed process that employs high-energy laser to produce in liquid and act on the workpiece. When irradiated vertically workpiece surface through guide hole, oxidation occurs produced workpiece's surface, affecting quality. oblique formation proposed this paper. The quality of created at various angles investigated by adjusting angle between hole. A finite element model (FEM) was employed simulate temperature change collapse speed...
In this paper, a comprehensive evaluation model for the group decision is established on basis of rough sets.Take personnel comprehensiv example, support system designed and realized in light database, method human-computer interaction.The verified corresponding examplesb provided.
With the rapid development of telecommunications industry, commercial short message service (SMS) provides enterprises with low-cost marketing channels. The increasing illegal behavior not only causes troubles for mobile users, but also has a negative impact on normal supervision industry. Under traditional operation mode, it is challenging to know whether or providers (SP) provide SMS according wishes users. Another reason that makes regulation more lack transparency in identification...