Yan Liu

ORCID: 0009-0004-9212-0401
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Explainable Artificial Intelligence (XAI)
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Service-Oriented Architecture and Web Services
  • Distributed and Parallel Computing Systems
  • Traffic Prediction and Management Techniques
  • Advanced Database Systems and Queries
  • Scientific Computing and Data Management
  • Data Management and Algorithms
  • Blockchain Technology Applications and Security
  • Machine Learning and Data Classification
  • Power Systems and Technologies
  • Data Stream Mining Techniques
  • Web Data Mining and Analysis
  • Privacy-Preserving Technologies in Data
  • Business Process Modeling and Analysis
  • Data Mining Algorithms and Applications
  • Human Mobility and Location-Based Analysis
  • Advanced Data Storage Technologies
  • Time Series Analysis and Forecasting
  • Adversarial Robustness in Machine Learning
  • Cloud Data Security Solutions
  • Advanced Computational Techniques and Applications
  • Simulation and Modeling Applications

Tsinghua University
2025

Concordia University
2015-2024

Beijing Wuzi University
2024

Data61
2008-2023

Chongqing University of Posts and Telecommunications
2023

Zhengzhou University
2015-2022

Concordia University
2016-2022

Tongji University
2008-2022

Jingdong (China)
2022

Chifeng University
2012-2020

10.1016/j.eswa.2023.119619 article EN Expert Systems with Applications 2023-02-08

Industrial Internet of Things (IIoT) is producing massive data which are valuable for knowing running status the underlying equipment. However, these involve various operation events that span some time, raise questions on how to model long memory states, and predict based historical accurately. This paper aims develop a method of: (1) analyzing equipment working condition sensed data; (2) building prediction forecasting designing deep neural network (3) improving accuracy by systematic...

10.1109/access.2018.2825538 article EN cc-by-nc-nd IEEE Access 2018-01-01

With the surge of academic papers, it has become a common practice to recommend papers based on authors’ research interests. Existing methods focus leveraging author-paper interactions mine interests with coauthorship networks. However, sparse would pose huge challenge distinguish authors. Fortunately, inter-dependent knowledge across provides rich potential heterogeneous connections for interactions, offering much insights learning Therefore, we propose meta-relation guided coupling...

10.1145/3715101 article EN ACM transactions on office information systems 2025-02-11

Video data has become the largest source of big data. Owing to video data's complexities, velocity, and volume, public security other surveillance applications require efficient, intelligent runtime processing. To address these challenges, a proposed framework combines two cloud-computing technologies: Storm stream processing Hadoop batch It uses deep learning realize intelligence that can help reveal knowledge hidden in An implementation this five architecture styles: service-oriented...

10.1109/ms.2016.31 article EN IEEE Software 2016-02-18

Although Big Data Cloud (e.g., MapReduce, Hadoop and Dryad) makes it easy to develop run highly scalable applications, efficient provisioning fine-tuning of these massively distributed systems remain a major challenge. In this paper, we describe general approach help address challenge, based on instrumentations dataflow-driven performance analysis. Based approach, have implemented HiTune, scalable, lightweight extensible analyzer for Hadoop. We report our experience how HiTune helps users...

10.5555/2170444.2170468 article EN 2011-06-14

Microservices are bundled and generating traffic on the backend systems that need to scale demand. When microservices generate variant unexpected, challenge is classify workload adjust scaling policy reflect resource demand timely accurately. In this paper, we propose a microservice architecture encapsulates functions of monitoring metrics learning pattern. Then service used predict future for decision making provisioning. We deploy two machine algorithms emulated by Netflix benchmark...

10.1109/bigdata.2017.8258201 article EN 2021 IEEE International Conference on Big Data (Big Data) 2017-12-01

Traditional neural networks usually concentrate on temporal data in system simulation, and lack of capabilities to reason inner logic relations between different dimensions collected from embedded sensors. This paper proposes a graph network-based modeling approach for IoT equipment (called GNNM-IoT), which considers both data, vertices denote sensor edges relationships vertices. The GNNM-IoT model's sensors with produce nonlinear complex relationships. We have evaluated the using...

10.1109/access.2019.2902865 article EN cc-by-nc-nd IEEE Access 2019-01-01

In this article, we follow a process of explainable artificial intelligence (XAI) method development and define two metrics in terms consistency efficiency guiding the evaluation XAI explanations.

10.1109/mc.2022.3233806 article EN Computer 2023-04-01

10.1016/j.future.2021.05.020 article EN Future Generation Computer Systems 2021-05-26

Cloud monitoring is of a source big data that are constantly produced from traces infrastructures, platforms, and applications. Analysis delivers insights the system's workload usage pattern ensures workloads operating at optimum levels. The analysis process involves query extraction, analysis, result visualization. Since volume big, these operations require scalable reliable architecture to extract, aggregate, analyze in an arbitrary range granularity. Ultimately, results become knowledge...

10.1109/tst.2016.7399283 article EN Tsinghua Science & Technology 2016-02-01

Machine Learning Operations (MLOps) aim to establish a set of practices that put tools, pipelines, and processes build fast time-to-value machine learning development projects. The lifecycle project encompasses roles, stacks software frameworks multiple types computing resources. Such complexity makes MLOps support usually bundled with commercial cloud platforms is referred as vendor lock. In this paper, we provide an alternative solution devises platform open source on any virtual Our...

10.1016/j.ifacol.2021.04.161 article EN IFAC-PapersOnLine 2020-01-01

In this study, we propose the early adoption of Explainable AI (XAI) with a focus on three properties: Quality explanation, explanation summaries should be consistent across multiple XAI methods; Architectural Compatibility, for effective integration in XAI, architecture styles both methods and models to explained must compatible framework; Configurable operations, explanations are operable, akin machine learning operations. Thus, an reproducible tractable trustworthy. We present XAIport,...

10.1145/3639476.3639759 preprint EN 2024-04-14

This paper presents an enhanced efficiency 3-D convolution operator based on optimal field programmable gate array (FPGA) accelerator platform. The proposed system takes advantages of the intermediate data delay lines, implemented in FPGA, to avoid loading repetition input feature maps. performs 268.07 giga operations per second at 100-MHz operation frequency, with 330-mW power consumption. We experimentally demonstrate accelerator, comparison conventional technologies. may find interesting...

10.1109/access.2017.2699229 article EN cc-by-nc-nd IEEE Access 2017-01-01

The Infrastructure as a Service (IaaS) cloud industry that relies on leasing virtual machines (VMs) has significant portion of business values finding the dynamic equilibrium between two conflicting phenomena: underutilization and surging congestion. Spot instance been proposed an elegant solution to overcome these challenges, with ultimate goal achieve greater profits. However, previous studies recent spot pricing schemes reveal artificial policies do not comply nature phenomena. Motivated...

10.1109/tcc.2018.2878023 article EN IEEE Transactions on Cloud Computing 2018-10-25

Accurate fault localization renders software test resource allocation and maintenance cost-efficient. However, this is challenging when there are false alarm repercussions caused by module coupling of complex software. In article, therefore, we propose a new method for multiple from the perspective network spectrum based on graph neural model. First, constructed model under to represent relationships among modules theory. addition, suits were executed recorded construct program spectrum....

10.1109/tr.2024.3374410 article EN IEEE Transactions on Reliability 2024-03-20

Software vulnerability detection aims to proactively reduce the risk software security and reliability. Despite advancements in deep-learning-based detection, a semantic gap still remains between learned features human-understandable semantics. In this paper, we present an XAI-based framework assess program code graph context as feature representations their effect on classification into multiple Common Weakness Enumeration (CWE) types. Our XAI is deep-learning-model-agnostic...

10.3390/make6020050 article EN cc-by Machine Learning and Knowledge Extraction 2024-05-16

Self-supervised learning continues to drive advancements in machine learning. However, the absence of unified computational processes for benchmarking and evaluation remains a challenge. This study conducts comprehensive analysis state-of-the-art self-supervised algorithms, emphasizing their underlying mechanisms intricacies. Building upon this analysis, we introduce model-agnostic computation (UMAC) process, tailored complement modern algorithms. UMAC serves as global explainable artificial...

10.3390/bdcc8060058 article EN cc-by Big Data and Cognitive Computing 2024-06-03

10.1109/compsac57700.2023.00185 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2023-06-01

The characteristics of neo4j graph database has been introduced, several methods constructing based on importing data have compared and analyzed, the "neo4j-admin" method finally selected to import air crash data, realize visual display query. Specific implementation steps as follows:(1) Data sets worldwide since 1908 [1] cleaned preprocessed remove incomplete lines unimportant fields;(2) Crashed aircraft information table, accident details table above two association relationship designed...

10.1109/itnec48623.2020.9085182 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors actuators well middleware for system controlling. Therefore, analyzing such is highly non-trivial. In this work, we propose to use formal methods pervasive systems. Firstly, a modeling framework proposed cover main characteristics of (e.g., context-awareness, concurrent communications, layered architectures). Secondly, identify the safety requirements free deadlock conflicts...

10.1109/iceccs.2012.19 article EN 2012-07-18

Abstract In this article, an uncertain disturbance rejection control problem for the affine system in presence of asymmetric input constraints is addressed using event‐triggered method. The converted to optimal problem, and a zero‐sum game‐based method proposed solve problem. To deal with constraints, new cost function proposed. controller updated only when triggering condition satisfied, which can reduce computational complexity.In order obtain that minimizes performance index worst‐case...

10.1002/oca.2977 article EN Optimal Control Applications and Methods 2023-01-29

In this paper we introduced a new R-tree node splitting algorithm. As an indexing technique for multi-dimensional data, is widely used in geographical information systems, CAD systems and spatial databases. An consists of nodes which turn consist records. Each must contain limited number records order that it can be stored within one disk block, thus algorithm while inserting record into full node. A the crucial factors query performance since bad splits would result inefficient structure....

10.1109/geoinformatics.2009.5293260 article EN 2009-08-01
Coming Soon ...