Bin Yu

ORCID: 0000-0003-3794-1069
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Graph Neural Networks
  • Complex Network Analysis Techniques
  • Privacy-Preserving Technologies in Data
  • Domain Adaptation and Few-Shot Learning
  • Text and Document Classification Technologies
  • Topic Modeling
  • Seismic Imaging and Inversion Techniques
  • Opinion Dynamics and Social Influence
  • Graph Theory and Algorithms
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Computational Techniques and Applications
  • Recommender Systems and Techniques
  • Web Data Mining and Analysis
  • Bioinformatics and Genomic Networks
  • Privacy, Security, and Data Protection
  • Machine Learning in Healthcare
  • Network Security and Intrusion Detection
  • Gut microbiota and health
  • Seismic Waves and Analysis
  • Advanced Chemical Sensor Technologies
  • Face recognition and analysis
  • Cryptography and Data Security
  • Geophysical Methods and Applications
  • Adversarial Robustness in Machine Learning
  • Mobile Crowdsensing and Crowdsourcing

Northeast Agricultural University
2025

Xidian University
2011-2024

Sinopec (China)
2023-2024

Guangxi University
2024

Yantai Nanshan University
2023

Zhejiang University of Technology
2021

Cisco College
2020

Air Liquide (United States)
2019

Xi’an International University
2018

National Animal Husbandry Service
2018

10.1016/j.knosys.2021.106775 article EN Knowledge-Based Systems 2021-01-21

Chronic Obstructive Pulmonary Disease (COPD) is a prevalent chronic pulmonary condition that affects hundreds of millions people all over the world. Many COPD patients got readmitted to hospital within 30 days after discharge due various reasons. Such readmission can usually be avoided if additional attention paid with high risk and appropriate actions are taken. This makes early prediction an important problem. The goal this paper conduct systematic study on developing different types...

10.1038/s41598-019-39071-y article EN cc-by Scientific Reports 2019-02-20

Recently several different deep learning architectures have been proposed that take a string of characters as the raw input signal and automatically derive features for text classification. Few studies are available compare effectiveness these approaches character based classification with each other. In this paper we perform such an empirical comparison important cybersecurity problem DGA detection: classifying domain names either benign vs. produced by malware (i.e., Domain Generation...

10.1109/ijcnn.2018.8489147 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2018-07-01

Networks, such as social networks, biochemical and protein-protein interaction networks are ubiquitous in the real world. Network representation learning aims to embed nodes a network low-dimensional, dense, real-valued vectors, facilitate downstream analysis. The existing embedding methods commonly endeavor capture structure information network, but lack of consideration subsequent tasks synergies between these tasks, which equal importance for desirable representations. To address this...

10.3389/fnins.2020.00001 article EN cc-by Frontiers in Neuroscience 2020-01-23

Abstract Data mining is a process to extract unknown, hidden, and potentially useful information from data. But the problem of data island makes it arduous for people collect analyze scattered data, there also privacy security issue when A collaboratively decentralized approach called federated learning unites multiple participants generate shareable global optimal model keeps privacy‐sensitive on local devices, which may bring great hope us solving problems protection. Though has been...

10.1002/widm.1443 article EN Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery 2021-12-09

10.1016/j.knosys.2020.106157 article EN Knowledge-Based Systems 2020-06-17

Recently, multi-task learning (MTL) has been extensively studied for various face processing tasks including detection, landmarks localization, pose estimation and gender recognition, which endeavors to train a better model by exploiting the synergy among related tasks. However, raw dataset used training often contains sensitive private information, can be maliciously recovered carefully analyzing outputs. To address this problem, we propose novel privacy-preserving approach, utilizes...

10.3389/fnbot.2019.00112 article EN cc-by Frontiers in Neurorobotics 2020-01-14

Real-world networks are composed of diverse interacting and evolving entities, while most existing researches simply characterize them as particular static networks, without consideration the evolution trend in dynamic networks. Recently, significant progresses tracking properties have been made, which exploit changes entities links network to devise embedding techniques. Compared widely proposed methods, endeavors encode nodes low-dimensional dense representations that effectively preserve...

10.48550/arxiv.2006.08093 preprint EN other-oa arXiv (Cornell University) 2020-01-01

For an explanation of a deep learning model to be effective, it must provide both insight into and suggest corresponding action in order achieve some objective. Too often, the litany proposed explainable methods stop at first step, providing practitioners with model, but no way act on it. In this paper, we propose contextual decomposition penalization (CDEP), method which enables leverage existing increase predictive accuracy models. particular, when shown that has incorrectly assigned...

10.48550/arxiv.1909.13584 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Salmonella enterica serovar Typhimurium (S. Typhimurium), a foodborne pathogen that poses significant public health risks to humans and animals, presents formidable challenge due its antibiotic resistance. This study explores the potential of Lactobacillus acidophilus (L. 1.3251) probiotics as an alternative strategy combat resistance associated with S. infection. In this investigation, twenty-four BALB/c mice were assigned four groups: non-infected, non-treated group (CNG); infected, (CPG);...

10.3390/antibiotics13040352 article EN cc-by Antibiotics 2024-04-11

Fermented soybean meal (FSM), which has lower anti-nutritional factors and higher active enzyme, probiotic oligosaccharide contents than its unfermented form, been reported to improve the feeding value of meal, hence, growth performance piglets. However, whether FSM can affect bacterial metabolites in large intestine piglets remains unknown. This study supplemented wet-FSM (WFSM) or dry-FSM (DFSM) (5% dry matter basis) diet investigated effects on carbon nitrogen metabolism piglets'...

10.1017/s1751731118000058 article EN cc-by-nc-nd animal 2018-01-01

Fermentation using appropriate microorganisms can remove anti-nutritional factors such as protease inhibitor, thus improving the feeding value of soybean meal, a major feed ingredient in pig diet. Two vitro experiments were conducted to obtain conditions for fermentation meal. Experiment 1 consisted eight treatments from combinations two levels three (Bacillus subtilis KC 101, Saccharomyces cerevisiae JM 102 and Bacillus lactis RG 103). broth was mixed with meal 18 L bucket incubated under...

10.1111/jfpp.13114 article EN Journal of Food Processing and Preservation 2016-09-15

Multi-task learning (MTL) is a paradigm which can improve generalization performance by transferring knowledge among multiple tasks. Traditional collaborative filtering recommendation methods suffer from cold start, sparsity and scalability problems. The latest research has shown that applying side information of graph not only solve the problems above, but also accuracy recommendation. However, existing multi-task for enhanced expose obvious issues disclosing private training samples. In...

10.1109/access.2020.3004250 article EN cc-by IEEE Access 2020-01-01

In the era of big data, data has gradually become an important productivity driving social progress. Accelerating development and sharing resources is inherent requirement government transformation. Named entity recognition a wide range applications in fields information extraction retrieval, so its research great significance. Due to complexity Chinese structure lack mature domestic corpora, on named faces enormous challenges. Based analysis actual characteristics entities text, this paper...

10.1145/3297156.3297196 article EN Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence 2018-12-08

Machine learning lies at the heart of new possibilities for scientific discovery, knowledge generation, and artificial intelligence. Its potential benefits to these fields requires going beyond predictive accuracy focusing on interpretability. In particular, many problems require interpretations in a domain-specific interpretable feature space (e.g. frequency domain) whereas attributions raw features pixel space) may be unintelligible or even misleading. To address this challenge, we propose...

10.48550/arxiv.2003.01926 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Smart contracts are commonly used to build finance-related decentralized applications. If a smart contract vulnerability is exploited by an attacker, the owner may suffer financial losses. We focus on particular class of vulnerabilities that require specific sequence multiple transactions trigger, which we call multi-transaction vulnerabilities. Due combinatorial explosion problem caused huge number possible transaction sequences, efficiency and scalability for existing security analyzers...

10.1109/qrs57517.2022.00068 article EN 2022-12-01
Coming Soon ...