Haoyu Chen

ORCID: 0009-0007-2608-6382
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Ethics and Social Impacts of AI
  • Digital Marketing and Social Media
  • Advanced Bandit Algorithms Research
  • Transportation Planning and Optimization
  • Traffic control and management
  • Sentiment Analysis and Opinion Mining
  • Media Influence and Health
  • Adversarial Robustness in Machine Learning
  • Urban Transport and Accessibility
  • Network Security and Intrusion Detection
  • Data Stream Mining Techniques
  • Software System Performance and Reliability
  • Optimization and Search Problems
  • Digital and Cyber Forensics
  • Software-Defined Networks and 5G
  • Reinforcement Learning in Robotics
  • Topic Modeling
  • Stochastic Gradient Optimization Techniques
  • Machine Learning and Algorithms
  • Advanced Computational Techniques and Applications
  • Gender, Feminism, and Media
  • Embedded Systems and FPGA Design
  • Qualitative Comparative Analysis Research
  • Software Engineering Research

Harbin Institute of Technology
2022-2024

University of Oulu
2024

South China Normal University
2024

Ministry of Industry and Information Technology
2024

Shenzhen Institute of Information Technology
2023

North Carolina State University
2020-2023

China Southern Power Grid (China)
2023

Shantou University
2023

Southwestern University of Finance and Economics
2022

Huazhong University of Science and Technology
2018

Learned embeddings for products are an important building block web-scale e-commerce recommendation systems. At Pinterest, we build a single set of product called ItemSage to provide relevant recommendations in all shopping use cases including user, image and search based recommendations. This approach has led significant improvements engagement conversion metrics, while reducing both infrastructure maintenance cost. While most prior work focuses on from features coming modality, introduce...

10.1145/3534678.3539170 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2022-08-12

Two continuum approximation (CA) optimization models are formulated to design city-wide transit systems at minimum cost.Transit routes assumed lie atop a city's street network.Model 1 assumes that the city streets laid out in ring-radial fashion.Model 2 form grid.Both can furnish hybrid designs, which exhibit intersecting central (downtown) district and only radial branching periphery.Model allows service frequency route spacing location vary arbitrarily with location's distance from...

10.1016/j.trpro.2015.06.017 article EN Transportation research procedia 2015-01-01

Online decision-making problem requires us to make a sequence of decisions based on incremental information. Common solutions often need learn reward model different actions given the contextual information and then maximize long-term reward. It is meaningful know if posited reasonable how performs in asymptotic sense. We study this under setup bandit framework with linear model. The ε-greedy policy adopted address classic exploration-and-exploitation dilemma. Using martingale central limit...

10.1080/01621459.2020.1770098 article EN Journal of the American Statistical Association 2020-05-28

This research investigated the value co-creation behaviors in livestreaming platforms and internal mechanism of perceived on consumer behavior short-video platform TikTok. selected Tiktok as object, uses structural equation model to analyze data. The results indicated that consumer-perceived mediates relationship between engagement citizenship behaviors. In addition, exhibit significant community attributes, interactive forms primary part enhances value. Consumers join look for communities...

10.3389/fpsyg.2022.1110011 article EN cc-by Frontiers in Psychology 2023-01-26

10.1109/cvprw63382.2024.00475 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2024-06-17

Online decision making aims to learn the optimal rule by personalized decisions and updating recursively. It has become easier than before with help of big data, but new challenges also come along. Since should be updated once per step, an offline update which uses all historical data is inefficient in computation storage. To this end, we propose a completely online algorithm that can make via stochastic gradient descent. not only efficient supports kinds parametric reward models. Focusing...

10.1080/01621459.2020.1826325 article EN Journal of the American Statistical Association 2020-09-23

In the context of urban public spaces, which tend to be shrunk and humanistic, micro spaces (MUSs) might offer residents additional opportunities for activities occur because their small scale, discrete distribution, frequent interaction. Cold cities have severe climatic restrictions; thus, as seasons change, MUSs in cold regions are more significant than medium- large-scale spaces. To investigate how contribute enhancing vitality during transition seasons, a system indicators was developed...

10.14246/irspsd.12.3_95 article EN International Review for Spatial Planning and Sustainable Development 2024-07-14

Cloud Storage provides external data storage service by combing and coordinating different types of devices in the network, so that they can collectively work together. However it always exists a trust game relationship between users providers, therefore building healthy, fair secure cloud environment is necessary, especially for security auditing on state operation processes. This paper proposes user behavior (UB)-based scheme, analyzing log from servers. Firstly, we present description...

10.1109/icoacs.2016.7563067 article EN 2016-05-01

Service function chaining (SFC) is able to provide customizable network services the traffic flows of different IoT subjects. Nowadays, SFC becomes profound implement service requirements devices with flexibility and programmability provided by emerging technologies, software defined (SDN) virtualization. These techniques play an increasingly important role for deployment allow requirement certain device be specified subjects, including SDN applications managers. However, independent...

10.1109/access.2018.2876314 article EN cc-by-nc-nd IEEE Access 2018-01-01

Machine learning has become more important in real-life decision-making but people are concerned about the ethical problems it may bring when used improperly. Recent work brings discussion of machine fairness into causal framework and elaborates on concept Counterfactual Fairness. In this article, we develop Fair Learning through dAta Preprocessing (FLAP) algorithm to learn counterfactually fair decisions from biased training data formalize conditions where different preprocessing procedures...

10.1080/01621459.2023.2186885 article EN Journal of the American Statistical Association 2023-03-06

Engagement analysis finds various applications in healthcare, education, advertisement, services. Deep Neural Networks, used for analysis, possess complex architecture and need large amounts of input data, computational power, inference time. These constraints challenge embedding systems into devices real-time use. To address these limitations, we present a novel two-stream feature fusion "Tensor-Convolution Convolution-Transformer Network" (TCCT-Net) architecture. better learn the...

10.48550/arxiv.2404.09474 preprint EN arXiv (Cornell University) 2024-04-15

Person re-identification (ReID) has become a critical component in various security and surveillance systems, necessitating accurate robust identification of individuals across different camera views. The motivation for enhancing ReID systems stems from the need to improve public safety, prevent crime, support forensic investigations. Despite significant advances, faces several key challenges that hinder its deployment real-world applications. This review paper addresses person (ReID):...

10.54254/2755-2721/86/20241592 article EN cc-by Applied and Computational Engineering 2024-07-31

Persona, a special means of image management by social media influencers (SMIs), has become trending phenomenon and it is expected to substantially affect SMIs’ persuasiveness ad effect. This study aims explore the impact personas constructed through personal values on effectiveness video ads. Adopting Stimulus-Organism-Response (S-O-R) framework, this validates how self-enhancement self-transcendence consumer cognitive processes responses. Consumer behavioral intentions are used verify ads...

10.3390/jtaer19030118 article EN cc-by Journal of theoretical and applied electronic commerce research 2024-09-18

User-to-item retrieval has been an active research area in recommendation system, and two tower models are widely adopted due to model simplicity serving efficiency. In this work, we focus on a variant called conditional retrieval, where expect retrieved items be relevant condition (e.g. topic). We propose method that uses the same training data as standard but incorporates item-side information conditions query. This allows us bootstrap new use cases encourages feature interactions between...

10.1145/3640457.3688057 article EN 2024-10-08

Access Control System is evolved from the traditional lock, as name suggests, it used to regulate entrance channel. Password access control system, contactless card system and fingerprint most system. But these systems have many security risks: password easy leak, cards are very lose fingerprints can be easily extracted by criminals. Therefore, in this article I designed an based on dynamic audio token android operating Experiments show that not only safe, but also use, users complete...

10.1109/icalip.2016.7846654 article EN 2016-07-01

Recently, the integrity management of large size atmospheric storage tank in China is still preliminary stage. The purpose and concept management, core technical system are discussed. Main framework about developed, combining with characters including super-large inner volume, corrosive nature media, dangerous leakage explosion, strict request for non-interruption operating, related national codes management. Two elements system, an process tanks which combines quality control, change,...

10.1115/pvp2014-29036 article EN Volume 1: Codes and Standards 2014-07-20

The smart mobile terminals and broadband communications become more popular. Access control systems using traditional mechanical lock, IC card authentication password technology exposes security issues. This paper describes the design implementation of server module. system used JAVA language development JDBC to connect MySQL database. also NIO communication architecture support high concurrent throughput non blocking MINA achieve network transmission data. Experiments show that is stable...

10.1109/icalip.2016.7846657 article EN 2016-07-01

To address the problem of incomplete graph structure features due to lack contextual information in existing neural network-based vulnerability mining methods and over-smoothing that prevents model from learning higher-order resulting poor prediction performance, a detection method based on deep convolutional networks attention mechanism, PSG-GCNIIAT, is proposed. PSG fuses order relational graphs basis program dependency so code statements have ability sense their information, generates...

10.1109/scset58950.2023.00037 article EN 2023-04-01

Machine learning has become more important in real-life decision-making but people are concerned about the ethical problems it may bring when used improperly. Recent work brings discussion of machine fairness into causal framework and elaborates on concept Counterfactual Fairness. In this paper, we develop Fair Learning through dAta Preprocessing (FLAP) algorithm to learn counterfactually fair decisions from biased training data formalize conditions where different preprocessing procedures...

10.48550/arxiv.2202.12440 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Learned embeddings for products are an important building block web-scale e-commerce recommendation systems. At Pinterest, we build a single set of product called ItemSage to provide relevant recommendations in all shopping use cases including user, image and search based recommendations. This approach has led significant improvements engagement conversion metrics, while reducing both infrastructure maintenance cost. While most prior work focuses on from features coming modality, introduce...

10.48550/arxiv.2205.11728 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...