Wenjie Fu

ORCID: 0009-0004-9879-946X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Complex Network Analysis Techniques
  • Energy Load and Power Forecasting
  • Solar Radiation and Photovoltaics
  • Photovoltaic System Optimization Techniques
  • Privacy-Preserving Technologies in Data
  • Data-Driven Disease Surveillance
  • Opinion Dynamics and Social Influence
  • Bioinformatics and Genomic Networks
  • COVID-19 Digital Contact Tracing
  • Natural Language Processing Techniques
  • Genomics and Chromatin Dynamics
  • Gene Regulatory Network Analysis
  • Advanced Vision and Imaging
  • Speech and Audio Processing
  • Solar-Powered Water Purification Methods
  • Machine Learning in Healthcare
  • Stochastic processes and statistical mechanics
  • Grey System Theory Applications
  • Adversarial Robustness in Machine Learning
  • Energy Harvesting in Wireless Networks
  • Chromosomal and Genetic Variations
  • Genomics and Phylogenetic Studies
  • Membrane Separation Technologies
  • Image and Signal Denoising Methods

State Grid Corporation of China (China)
2023

Wuhan National Laboratory for Optoelectronics
2023

Huazhong University of Science and Technology
2023

Chengdu University of Information Technology
2016

Sichuan University
2016

Carnegie Mellon University
2009-2010

We propose a family of statistical models for social network evolution over time, which represents an extension Exponential Random Graph Models (ERGMs). Many the methods ERGMs are readily adapted these models, including maximum likelihood estimation algorithms. discuss this type and their properties, give examples, as well demonstration use hypothesis testing classification. believe our temporal ERG represent useful new framework modeling time-evolving networks, rewiring networks from other...

10.1214/09-ejs548 article EN cc-by Electronic Journal of Statistics 2010-01-01

In a dynamic social or biological environment, interactions between the underlying actors can undergo large and systematic changes. Each actor assume multiple roles their degrees of affiliation to these also exhibit rich temporal phenomena. We propose state space mixed membership stochastic blockmodel which track across time evolving actors. derive an efficient variational inference procedure for our model, apply it Enron email networks, rewiring gene regulatory networks yeast. both cases,...

10.1145/1553374.1553416 article EN 2009-06-14

Abstract Accurately forecasting regional distributed photovoltaic (DPV) power is crucial in mitigating the negative impact of high DPV penetration on reliability and resilience distribution network. However, most current methods suffer from two key problems: (1) ignoring asymmetric influence relationship among sites; (2) lack consideration dynamic spatiotemporal correlation sites. As a result, these are unable to fully adapt characteristics DPV, making it challenging directly apply existing...

10.1049/gtd2.12963 article EN cc-by-nc-nd IET Generation Transmission & Distribution 2023-09-07

The increasing parameters and expansive dataset of large lan- guage models (LLMs) highlight the urgent demand for a technical solution to audit underlying privacy risks copyright issues associated with LLMs. Existing studies have partially addressed this need through an exploration pre-training data detection problem, which is instance membership inference attack (MIA). This problem involves determining whether given piece text has been used during phase target LLM. Although existing methods...

10.1609/aaai.v39i26.34939 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Membership Inference Attacks (MIA) aim to infer whether a target data record has been utilized for model training or not. Prior attempts have quantified the privacy risks of language models (LMs) via MIAs, but there is still no consensus on existing MIA algorithms can cause remarkable leakage practical Large Language Models (LLMs). Existing MIAs designed LMs be classified into two categories: reference-free and reference-based attacks. They are both based hypothesis that records consistently...

10.48550/arxiv.2311.06062 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Abstract Motivation: Identifying transcription factor binding sites (TFBSs) encoding complex regulatory signals in metazoan genomes remains a challenging problem computational genomics. Due to degeneracy of nucleotide content among site instances or motifs, and intricate ‘grammatical organization’ motifs within cis-regulatory modules (CRMs), extant pattern matching-based silico motif search methods often suffer from impractically high false positive rates, especially the context analyzing...

10.1093/bioinformatics/btp230 article EN cc-by-nc Bioinformatics 2009-05-27

Accurate distributed photovoltaic power prediction plays a crucial role in supporting retailers making optimal trading strategies and distribution network operators reasonable scheduling plans. The mining utilization of correlation is an effective way to improve the forecasting accuracy target station. However, current methods must rely on data sharing mining, which may lead serious privacy problems. In order protect during modeling while ensuring spatiotemporal correlations, federated...

10.1109/icps57144.2023.10142102 article EN 2023-05-21

Membership Inference Attack (MIA) identifies whether a record exists in machine learning model's training set by querying the model. MIAs on classic classification models have been well-studied, and recent works started to explore how transplant MIA onto generative models. Our investigation indicates that existing designed for mainly depend overfitting target However, can be avoided employing various regularization techniques, whereas demonstrate poor performance practice. Unlike...

10.48550/arxiv.2308.12143 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Accurately predicting individual-level infection state is of great value since its essential role in reducing the damage epidemic. However, there exists an inescapable risk privacy leakage fine-grained user mobility trajectories required by prediction. In this article, we focus on developing a framework privacy-preserving prediction based federated learning (FL) and graph neural networks (GNN). We propose Falcon , F ederated gr A ph L earning method for infe C tion predicti ON . It utilizes...

10.1145/3633202 article EN cc-by ACM transactions on office information systems 2023-12-07

We propose a family of statistical models for social network evolution over time, which represents an extension Exponential Random Graph Models (ERGMs). Many the methods ERGMs are readily adapted these models, including maximum likelihood estimation algorithms. discuss this type and their properties, give examples, as well demonstration use hypothesis testing classification. believe our temporal ERG represent useful new framework modeling time-evolving networks, rewiring networks from other...

10.48550/arxiv.0908.1258 preprint EN other-oa arXiv (Cornell University) 2009-01-01

Speech Emotion Recognition (SER) is still a complex task for computers with average recall rates usually about 70% on the most realistic datasets. Most SER systems use hand-crafted features extracted from audio signal such as energy, zero crossing rate, spectral information, prosodic, mel frequency cepstral coefficient (MFCC), and so on. More recently, using raw waveform training neural network becoming an emerging trend. This approach advantageous it eliminates feature extraction pipeline....

10.48550/arxiv.2402.11954 preprint EN arXiv (Cornell University) 2024-02-19

The increasing parameters and expansive dataset of large language models (LLMs) highlight the urgent demand for a technical solution to audit underlying privacy risks copyright issues associated with LLMs. Existing studies have partially addressed this need through an exploration pre-training data detection problem, which is instance membership inference attack (MIA). This problem involves determining whether given piece text has been used during phase target LLM. Although existing methods...

10.48550/arxiv.2408.08661 preprint EN arXiv (Cornell University) 2024-08-16

A video coding system based on spatial-temporal down-sampling/up-sampling and super-resolution reconstruction method is proposed. The an exploration providing ideas for our future work. pre-reduces the spatial resolutions frame rates of source videos before being encoded by a standardized codec such as HEVC/H.265. On reception side, decoded up-sampled to four times resolution, rate also increased original rate. We tested performance in combination with 2K 60P HEVC/H.265 encoder. experiment...

10.1109/cicn.2016.53 article EN 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN) 2016-12-01

Accurately predicting individual-level infection state is of great value since its essential role in reducing the damage epidemic. However, there exists an inescapable risk privacy leakage fine-grained user mobility trajectories required by prediction. In this paper, we focus on developing a framework privacy-preserving prediction based federated learning (FL) and graph neural networks (GNN). We propose Falcon, Federated grAph Learning method for infeCtion predictiON. It utilizes novel...

10.48550/arxiv.2311.06049 preprint EN other-oa arXiv (Cornell University) 2023-01-01
Coming Soon ...