Peng Yang

ORCID: 0009-0005-3449-5843
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Advanced Bandit Algorithms Research
  • Artificial Immune Systems Applications
  • Speech Recognition and Synthesis
  • Speech and Audio Processing
  • Music and Audio Processing
  • Machine Learning and Algorithms
  • Domain Adaptation and Few-Shot Learning
  • Sparse and Compressive Sensing Techniques
  • Machine Learning and ELM
  • Gene expression and cancer classification
  • Time Series Analysis and Forecasting
  • Computational Drug Discovery Methods
  • Optimization and Search Problems
  • Distributed Control Multi-Agent Systems
  • Machine Learning in Bioinformatics
  • Advanced Neural Network Applications
  • Imbalanced Data Classification Techniques
  • Network Security and Intrusion Detection
  • Bioinformatics and Genomic Networks
  • Face and Expression Recognition
  • Stochastic Gradient Optimization Techniques
  • Data Stream Mining Techniques
  • Adversarial Robustness in Machine Learning
  • Energy Efficient Wireless Sensor Networks

Shanghai Institute of Technology
2024

Bellevue Hospital Center
2019-2023

Kwai Chung Hospital
2022-2023

Cognitive Research (United States)
2019-2022

Baidu (China)
2020-2022

King Abdullah University of Science and Technology
2017-2019

Institute for Infocomm Research
2012-2016

Agency for Science, Technology and Research
2014-2015

Northwestern Polytechnical University
2015

Nanyang Technological University
2011-2014

We analyze two different estimation algorithms for dynamic average consensus in sensing and communication networks, a proportional algorithm proportional-integral algorithm. investigate the stability properties of these estimators under changing inputs network topologies as well their convergence constant or slowly-varying inputs. In doing so, we discover that more complex has performance benefits over simpler

10.1109/cdc.2006.377078 article EN 2006-01-01

Abstract Motivation: In silico methods provide efficient ways to predict possible interactions between drugs and targets. Supervised learning approach, bipartite local model (BLM), has recently been shown be effective in prediction of drug–target interactions. However, for drug-candidate compounds or target-candidate proteins that currently have no known available, its pure ‘local’ is not able learned hence BLM may fail make correct when involving such kind new candidates. Results: We...

10.1093/bioinformatics/bts670 article EN Bioinformatics 2012-11-17

Cooperating mobile sensors can be used to model environmental functions such as the temperature or salinity of a region ocean. In this paper, we adopt an optimal filtering approach fusing local sensor data into global environment. Our is based on use proportional-integral (PI) average consensus estimators, whereby information from each diffuses through communication network. As result, scalable and fully decentralized, allows changing network topologies anonymous agents added subtracted at...

10.1109/tro.2008.921567 article EN IEEE Transactions on Robotics 2008-06-01

Abstract Background: Identifying disease genes from human genome is an important but challenging task in biomedical research. Machine learning methods can be applied to discover new based on the known ones. Existing machine typically use as positive training set P and unknown negative N (non-disease gene does not exist) build classifiers identify genes. However, such kind of actually built a noisy there itself. As result, do perform well they could be. Result: Instead treating examples N, we...

10.1093/bioinformatics/bts504 article EN cc-by-nc Bioinformatics 2012-08-24

An increasing number of genes have been experimentally confirmed in recent years as causative to various human diseases. The newly available knowledge can be exploited by machine learning methods discover additional unknown that are likely associated with In particular, positive unlabeled (PU learning) methods, which require only a training set P (confirmed disease genes) and an U (the candidate instead negative N, shown effective uncovering new the current scenario. Using single source data...

10.1371/journal.pone.0097079 article EN cc-by PLoS ONE 2014-05-09

Phenotypically similar diseases have been found to be caused by functionally related genes, suggesting a modular organization of the genetic landscape human that mirrors modularity observed in biological interaction networks. Protein complexes, as molecular machines integrate multiple gene products perform functions, express underlying protein-protein As such, protein complexes can useful for interrogating networks phenome and interactome elucidate gene-phenotype associations diseases.We...

10.1371/journal.pone.0021502 article EN cc-by PLoS ONE 2011-07-25

We describe distributed estimation algorithms that allow robots in a communication network to maintain estimates of summary statistics describing the shape swarm. show these estimators, combined with motion controllers implemented on each robot, result swarm formation being driven desired values presence changing topology and addition deletion

10.1109/acc.2006.1655446 article EN American Control Conference 2006-01-01

ABSTRACT Motivation Proper prioritization of candidate genes is essential to the genome-based diagnostics a range genetic diseases. However, it highly challenging task involving limited and noisy knowledge genes, diseases their associations. While number computational methods have been developed for disease gene task, performance largely by manually crafted features, network topology, or pre-defined rules data fusion. Results Here, we propose novel graph convolutional network-based method,...

10.1101/532226 preprint EN bioRxiv (Cold Spring Harbor Laboratory) 2019-01-28

Deep neural networks (DNNs) have become state-of-the-art in many application domains. The increasing complexity and cost for building these models demand means protecting their intellectual property (IP). This paper presents a novel DNN framework that optimizes the robustness of embedded watermarks. Our method is originated from fault attacks. Different prior end-to-end watermarking approaches, we only modify tiny subset weights to embed watermark, which also facilities better control model...

10.1109/iccv48922.2021.01457 article EN 2021 IEEE/CVF International Conference on Computer Vision (ICCV) 2021-10-01

Multi-objective Bayesian optimization (MOBO) has shown promising performance on various expensive multi-objective problems (EMOPs). However, effectively modeling complex distributions of the Pareto optimal solutions is difficult with limited function evaluations. Existing set learning algorithms may exhibit considerable instability in such scenarios, leading to significant deviations between obtained solution and (PS). In this paper, we propose a novel Composite Diffusion Model based Set...

10.1609/aaai.v39i25.34913 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

10.1016/j.knosys.2010.09.003 article EN Knowledge-Based Systems 2010-09-20

Outlier detection has many important applications in the field of fraud detection, network robustness analysis and intrusion detection. Some researches have utilized neural to solve problem because it advantage powerful modeling ability. In this paper, we propose a RBF model using subtractive clustering algorithm for selecting hidden node centers, which can achieve faster training speed. meantime, was trained with regularization term so as minimize variances nodes layer perform more accurate...

10.4304/jcp.4.8.755-762 article EN Journal of Computers 2009-08-01

We investigate the use of intrinsic spectral analysis (ISA) for query-by-example spoken term detection (QbE-STD). In task, queries and test utterances in an audio archive are converted to ISA features, dynamic time warping is applied match feature sequence each query with those utterances. Motivated by manifold learning, has been proposed recover from untranscribed a set nonlinear basis functions speech manifold, shown improved phonetic separability inherent speaker independence. Due...

10.21437/interspeech.2014-394 article EN Interspeech 2022 2014-09-14

Cross-speaker style transfer in speech synthesis aims at transferring a from source speaker to synthesized of target speaker's timbre. In most previous methods, the fine-grained prosody features often represent average style, similar one-to-many problem(i.e., multiple variations correspond same text). response this problem, strength-controlled semi-supervised extractor is proposed disentangle content and timbre, improving representation interpretability global embedding, which can alleviate...

10.1109/icassp49357.2023.10095840 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2023-05-05

An outlier is the object which very different from rest of dataset on some measure. Finding such exception has received much attention in data mining field. In this paper, we propose a KNN based detection algorithm consisted two phases. Firstly, it partitions into several clusters and then each cluster, calculates Kth nearest neighborhood for to find outliers. addition, pruning scheme used our algorithm. It can effectively avoid frequent passing entire unnecessary computations. Experimental...

10.1109/ettandgrs.2008.306 article EN 2008-12-01

In this paper, we propose a partial sequence matching based symbolic search (SS) method for the task of language independent query-by-example spoken term detection. One main drawback conventional SS approach is high miss rate long queries. This due to variations in symbol representation query and audios, especially scenario. The successful with its instances audio becomes exponentially more difficult as grows longer. To reduce rate, strategy, which all phone sequences are used instances....

10.1109/icassp.2015.7178961 article EN 2015-04-01

Traditional online learning algorithms are designed for vector data only, which assume that the labels of all training examples provided. In this paper, we study graph classification where only limited nodes chosen labelling by selective sampling. Particularly, first adapt a spectral-based regularization technique to derive novel linear algorithm can handle data, although it still queries and thus is not preferred, as typically time-consuming. To address issue, then propose new...

10.1109/icdm.2015.21 article EN 2015-11-01

Although few-shot meta learning has been extensively studied in machine community, the fast adaptation towards new tasks remains a challenge scenario. The neuroscience research reveals that capability of evolving neural network formulation is essential for task adaptation, which broadly recent meta-learning researches. In this paper, we present novel forward-backward framework (FBM) to facilitate model generalization from perspective, i.e., neuron calibration. particular, FBM models neurons...

10.1109/wacv51458.2022.00048 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2022-01-01

Through the development of powerful algorithms and design tools, deep neural networks (DNNs) have recently approached or even surpassed human-level performance in many real-world applications. Nowadays, since a product-level DNN modeling requires large amount training data expensive computing resources thus models are considered as valuable data, protecting intellectual property (IP) builders becomes an important problem security domain. In this paper, we propose novel watermarking approach...

10.1109/icde53745.2022.00104 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2022-05-01

Multi-Task Learning (MTL) can enhance a classifier's generalization performance by learning multiple related tasks simultaneously. Conventional MTL works under the offline or batch setting, and suffers from expensive training cost poor scalability. To address such inefficiency issues, online techniques have been applied to solve problems. However, most existing algorithms of constrain task relatedness into presumed structure via single weight matrix, which is strict restriction that does not...

10.1109/tkde.2017.2703106 article EN IEEE Transactions on Knowledge and Data Engineering 2017-06-29

Traditional online learning for graph node classification adapts regularization into ridge regression, which may not be suitable when data is adversarially generated. To solve this issue, we propose a more general min-max optimization framework classification. The derived algorithm can achieve regret compared with the optimal linear model found offline. However, assumes that label provided every node, while scare and labeling usually either too time-consuming or expensive in real-world...

10.1145/2806416.2806548 article EN 2015-10-17

Herein, to address the challenges faced by Automatic Guided Vehicles (AGVs) in construction site environments, including heavy vehicle loads, extensive road search areas, and randomly distributed obstacles, this paper presents a hierarchical trajectory planning algorithm that combines coarse precise planning. In first-level planning, lateral longitudinal sampling is performed based on environment constraints. A multi-criteria cost function designed, taking into account factors such as...

10.3390/electronics13061080 article EN Electronics 2024-03-14

This paper studies the effect of communication link weighting schemes and long-range connections in speeding convergence to consensus on average inputs agents a sensor network. Linear programming LMI solutions are provided for problem centralized optimization weights considering possibility intermittent bounded delays. Heuristic that can be implemented distributed fashion also studied. Consensus time may reduced by introducing interactions, creating "small world" network

10.1109/robot.2006.1642176 article EN 2006-07-10
Coming Soon ...