Xiaoyan Yin

ORCID: 0000-0003-3265-2954
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Complex Network Analysis Techniques
  • Auction Theory and Applications
  • ICT Impact and Policies
  • Privacy-Preserving Technologies in Data
  • Opinion Dynamics and Social Influence
  • Anomaly Detection Techniques and Applications
  • Fault Detection and Control Systems
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Graph Neural Networks
  • Security and Verification in Computing
  • Context-Aware Activity Recognition Systems
  • Mobile Crowdsensing and Crowdsourcing
  • Consumer Market Behavior and Pricing
  • Misinformation and Its Impacts
  • Advanced Computational Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Peer-to-Peer Network Technologies
  • Handwritten Text Recognition Techniques
  • Age of Information Optimization
  • Cybercrime and Law Enforcement Studies
  • Image and Video Quality Assessment
  • Human-Automation Interaction and Safety
  • Distributed Control Multi-Agent Systems
  • IoT Networks and Protocols
  • IoT and GPS-based Vehicle Safety Systems

Northwest University
2013-2025

China Datang Corporation (China)
2024

Tianjin University of Finance and Economics
2023

Beijing University of Posts and Telecommunications
2022

Gannan Normal University
2021

ORCID
2018

University of Florida
2009

Northwestern Polytechnical University
2009

George Mason University
2002

Anomaly detection plays a critical role in ensuring safe, smooth, and efficient operation of machinery equipment industrial environments. With the wide deployment multimodal sensors rapid development Internet Things (IoT), data generated modern production has become increasingly diverse complex. However, traditional methods for anomaly based on single source cannot fully utilize to capture anomalies systems. To address this challenge, we propose new model environments using temporal data....

10.3390/s24020637 article EN cc-by Sensors 2024-01-19

Influence maximization in social networks is of great importance for marketing new products. Signed with both positive (friends) and negative (foes) relationships pose challenges opportunities, since the influence can be leveraged to promote information propagation. In this paper, we study problem advertisement recommendation signed networks. We propose a framework characterize propagation process networks, which models dynamics individuals' beliefs attitudes towards based on recommendations...

10.1109/tkde.2019.2947421 article EN IEEE Transactions on Knowledge and Data Engineering 2019-01-01

The timely detection of equipment failure can effectively avoid industrial safety accidents. existing fault diagnosis methods based on single-mode signal not only have low accuracy, but also the inherent risk being misled by noise. In this paper, we reveal possibility using multi-modal monitoring data to improve accuracy prediction. main challenge fusion is how fuse We propose a learning framework for low-quality and high-quality data. essence, are used as compensation Firstly, optimized,...

10.3390/s22186722 article EN cc-by Sensors 2022-09-06

Recently, the practical needs of ``the right to be forgotten'' in federated learning gave birth a paradigm known as unlearning, which enables server forget personal data upon client's removal request. Existing studies on unlearning have primarily focused efficiently eliminating influence requested from model without retraining scratch, however, they rarely doubted reliability global posed by discrepancy between its prediction performance before and after unlearning. To bridge this gap, we...

10.48550/arxiv.2501.11848 preprint EN arXiv (Cornell University) 2025-01-20

For ecologists, understanding the reaction of animals to environmental changes is critical. Using networked sensor technology measure wildlife and parameters can provide accurate, real-time comprehensive data for monitoring, research conservation wildlife. This paper reviews: (i) conventional detection technology; (ii) concepts applications Internet Things (IoT) in animal ecology; (iii) advantages disadvantages IoT. The current theoretical limits IoT ecology are also discussed. Although...

10.1111/1749-4877.12162 article EN Integrative Zoology 2015-09-04

Because of their proficiency in capturing the category characteristics graphs, graph neural networks have shown remarkable advantages for graph-level classification tasks, that is, rumor detection and anomaly detection. Due to manipulation special means (e.g. bots) on online media, rumors may spread across whole network at an overwhelming speed. Compared with normal information, popular usually a propagation structure, especially early stage information dissemination. More specifically,...

10.1177/00368504241307816 article EN cc-by-nc Science Progress 2025-01-01

Crowdsourcing leverages the collective intelligence of massive crowd workers to accomplish tasks in a cost-effective way. On crowdsourcing platform, it is challenging assign an appropriate way due heterogeneity both and workers. In this paper, we explore problem assigning with various skill levels different quality requirements budget constraints. We first formulate task assignment as many-to-one matching problem, which multiple are assigned task, can be successfully completed only if...

10.1109/iwqos.2017.7969165 article EN 2017-06-01

Microeconomics-inspired spectrum auctions can effectively improve the utilization for wireless networks to satisfy ever increasing service demands. Considering spatial reuse, bidding nodes without mutual interference are grouped as virtual bidders competing bands, which turns a multi-winner auction into traditional single-winner auction. To make participating bid truthfully, strategy-proof exploited allocate vacant bands. However, how fairly profits of bidder among winning is still an...

10.1109/glocom.2009.5425718 article EN GLOBECOM '05. IEEE Global Telecommunications Conference, 2005. 2009-11-01

To enable dynamic spectrum access, service providers with spare (sellers) trade those who are in need of additional (buyers). In a market, the transaction result is essentially matching between sellers and buyers. Though it tempting to optimize over certain utility functions, stable more desirable, since no participants have incentives deviate from result. Existing algorithms only consider maximum number channels buyer can purchase, but ignore minimum requirement that essential support...

10.1109/tmc.2018.2792007 article EN IEEE Transactions on Mobile Computing 2018-01-11

Performance of a collaborative task is mostly dependent on the collective effort from participants. To accomplish participatory effectively and efficiently, team formation problem (TFP) outweighs all other considerations. It even more complicated when social connections among candidates taken into account. As we can imagine, large number tasks require members to be socially close. On contrary, portion tasks, e.g., proposal review, pay attention multidimensional view, should selected variety...

10.1109/access.2018.2819992 article EN cc-by-nc-nd IEEE Access 2018-01-01

The VM (Virtual Machine)-based software protection technique provides an effective solution to protect software, making it extremely difficult analyze and crack. This has become the research focus of protection. In this paper, we introduce general design ideas technique. However, there exist some vulnerabilities in design. We these detail come up with improvements mitigate them. develop a VM-based system, named NISLVMP, carry out experiments it. results show that are effective.

10.1109/cis.2013.107 article EN 2013-12-01

Social tie prediction is an important issue in social network analysis. Transfer learning often used for to address the problem of insufficient labeled training data, since few users manually annotate their relationships. In this paper, we propose TranGAN, a novel generative adversarial (GAN) based transfer framework prediction, which leverages theories as common knowledge bridge source and target network. GAN helps augment original data set by generating samples that have similar...

10.1109/icc.2019.8761301 article EN 2019-05-01

Femtocell provides a potential solution for poor coverage and capacity limitation in the indoor environment. For wireless service providers (WSPs), emerging femtocell market brings new opportunities as well challenges. In this paper, we propose an economic framework oligopolistic market, where selfish WSPs try to maximize their net profits by price competition resource allocation. When analyzing optimal strategy each WSP, are facing two major On one hand, it is difficult WSP acquire complete...

10.1109/tvt.2017.2716841 article EN IEEE Transactions on Vehicular Technology 2017-06-20

Abstract Intelligent monitoring of thermal power plants has been receiving growing interest. As one the promising technologies in intelligent monitoring, machine learning-based fault detections for auxiliary equipment plant have widely investigated. In this work, we constructed normal behavior models to predict current a dual-induced draft fan system by gradient-boosting tree regression. For anomaly detection, evaluated residual calculating mean value and meanwhile added control boundary...

10.1088/1742-6596/2728/1/012024 article EN Journal of Physics Conference Series 2024-03-01

Abstract Career planning of higher vocational students has been an issue concern and focus for colleges universities. The article uses logistic regression models to empirically analyze the correlation between career ideological political education students. results single-factor analysis show that significance psychological quality exercise is largest, its OR 1.427. multifactor Logistic awareness enhancement 0.661. greatly influenced by enhancement. In response study, this paper proposes...

10.2478/amns-2024-2846 article EN cc-by Applied Mathematics and Nonlinear Sciences 2024-01-01

10.1007/s11390-017-1798-8 article EN Journal of Computer Science and Technology 2017-11-01

IPTV provides a variety of services to users, e.g., Live TV, Video on Demand (VOD), and Catch-up which allows users freely select from huge pool program genres. A high-quality recommendation system that can well predict users' dynamic preferences is desirable improve user satisfaction. In this paper, we make the first attempt design personalized TV based tensor learning leverages temporal context information implicit feedback. We establish preference model by carefully analyzing influence...

10.1109/glocom.2018.8647211 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2018-12-01

This paper describes and evaluates a predictive algorithm for bandwidth conservation enhanced situation awareness. In such system, knowledge of position intent the participants involved in operation must be readily available, distributed to other units by communications link. objective can achieved predicting tracks each unit ahead time, based on past kinematic history. If predicted is within error requirements, then track estimate not transmitted over communication link, which results...

10.1109/cdc.1998.762080 article EN Proceedings of the 40th IEEE Conference on Decision and Control (Cat. No.01CH37228) 2002-11-28

Nowadays, smartphones have become indispensable for people and many users may browse information on their during walking. This raises severe concerns about pedestrian safety when distracted inadvertently walks from the sidewalk onto street. In this paper, we present WatchOut, a convenient alerting system based fine-grained step classification (e.g., flat, up down ramp) event detection entering street, turn) in an urban environment. contrast to existing systems that rely shoe-mounted sensors,...

10.1109/globecom38437.2019.9014250 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

The targeted covert collection of Internet data, which can not only effectively hide users' traces but also efficiently navigate to target plays an important role in three-dimensional social security. Due big data generated by online networks, large-scale network analysis usually confront with unbearable computational complexity, resulting failing achieve expected results within the specified response time. To retrieve and analyze most predetermined time, we study problem multiple...

10.1109/ispa-bdcloud-socialcom-sustaincom51426.2020.00139 article EN 2020-12-01
Coming Soon ...