Xing Fang

ORCID: 0000-0001-8574-9149
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Spam and Phishing Detection
  • Cloud Computing and Resource Management
  • Complex Network Analysis Techniques
  • Network Security and Intrusion Detection
  • Access Control and Trust
  • Data Quality and Management
  • Privacy-Preserving Technologies in Data
  • Hydraulic flow and structures
  • Privacy, Security, and Data Protection
  • Internet Traffic Analysis and Secure E-voting
  • Underwater Vehicles and Communication Systems
  • Big Data and Business Intelligence
  • Anomaly Detection Techniques and Applications
  • Simulation and Modeling Applications
  • Energy Efficient Wireless Sensor Networks
  • Digital Media and Visual Art
  • Robotic Locomotion and Control
  • Energy Harvesting in Wireless Networks
  • Data Analysis with R
  • Sentiment Analysis and Opinion Mining
  • User Authentication and Security Systems
  • Control and Dynamics of Mobile Robots
  • Peer-to-Peer Network Technologies
  • Text and Document Classification Technologies
  • Belt Conveyor Systems Engineering

Chinese Academy of Sciences
2018-2024

Institute of Modern Physics
2018-2024

Jiangnan University
2024

Shandong Institute of Automation
2024

Shandong University
2018-2023

Illinois State University
2017-2023

Chongqing University
2009-2022

Huazhong University of Science and Technology
2008-2022

Weihai Science and Technology Bureau
2018-2020

Guangxi University
2019

Sentiment analysis or opinion mining is one of the major tasks NLP (Natural Language Processing). has gain much attention in recent years. In this paper, we aim to tackle problem sentiment polarity categorization, which fundamental problems analysis. A general process for categorization proposed with detailed descriptions. Data used study are online product reviews collected from Amazon.com. Experiments both sentence-level and review-level performed promising outcomes. At last, also give...

10.1186/s40537-015-0015-2 article EN cc-by Journal Of Big Data 2015-06-15

The Jiangmen Underground Neutrino Observatory (JUNO) is proposed to determine the neutrino mass hierarchy using an underground liquid scintillator detector. It located 53 km away from both Yangjiang and Taishan Nuclear Power Plants in Guangdong, China. experimental hall, spanning more than 50 meters, under a granite mountain of over 700 m overburden. Within six years running, detection reactor antineutrinos can resolve at confidence level 3-4$\sigma$, oscillation parameters...

10.48550/arxiv.1508.07166 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Abstract Sentiment analysis is recognized as one of the most important sub-areas in Natural Language Processing (NLP) research, where understanding implicit or explicit sentiments expressed social media contents valuable to customers, business owners, and other stakeholders. Researchers have that generic extracted from textual are inadequate, thus, Aspect Based Analysis (ABSA) was coined capture aspect toward specific review aspects . Existing ABSA methods not only treat analytical problem...

10.1186/s40537-019-0278-0 article EN cc-by Journal Of Big Data 2020-01-06

10.1016/j.applthermaleng.2008.02.014 article EN Applied Thermal Engineering 2008-02-21

Like how useful weather forecasting is, the capability of or predicting cyber threats can never be overestimated. Previous investigations show that attack data exhibits interesting phenomena, such as long-range dependence and high nonlinearity, which impose a particular challenge on modeling rates. Deviating from statistical approach is utilized in literature, this paper we develop deep learning framework by utilizing bi-directional recurrent neural networks with long short-term memory,...

10.1186/s13635-019-0090-6 article EN cc-by EURASIP Journal on Information Security 2019-05-22

10.1016/j.engappai.2019.07.011 article EN Engineering Applications of Artificial Intelligence 2019-07-19

Routing plays a critical role in data transmission for underwater acoustic sensor networks (UWSNs) the internet of things (IoUT). Traditional routing methods suffer from high end-toend delay, limited bandwidth, and energy consumption. With development artificial intelligence machine learning algorithms, many researchers apply these new to improve quality routing. In this paper, we propose Q-learning-based multi-hop cooperative protocol (QMCR) UWSNs. Our can automatically choose nodes with...

10.23919/jcc.2021.08.016 article EN China Communications 2021-08-01

The mechanisms of locomotion in mammals have been extensively studied and inspire the related researches on designing control architectures for legged robots. Reinforcement learning (RL) is a promising approach allowing robots to automatically learn policies. However, careful reward-function adjustments are often required via trial-and-error until achieving desired behavior, as RL policy behaviors sensitive rewards. In this paper, we draw inspiration from rhythmic animals propose new...

10.1109/lra.2022.3177289 article EN IEEE Robotics and Automation Letters 2022-05-23

Online banking authentication plays an important role in the field of online security. In past years, a number methods, including password token, short message password, and USB have been developed for authentication. this paper, we introduce new protocol banking. Our approach enhances performance robustness against various attacks by using mobile phones to store digital certificate clients. We provide attack analysis illustrate strength protocol.

10.1109/futuretech.2010.5482634 article EN 2010-01-01

Social computing can be broadly defined as computational facilitation of social studies and human dynamics well design use information communication technologies that consider context.Novel services applications developed based on have profoundly affected nowadays people's life.However, an emerging research field, it gathers numerous researchers who tend to contribute cutting-edge work computing.In this paper, we provide a brief overview towards the state art computing.

10.1504/ijsccps.2011.043601 article EN International Journal of Social Computing and Cyber-Physical Systems 2011-01-01

For a given source-destination pair in multi-hop underwater acoustic sensor networks (UASNs), an optimal route is the one with lowest energy consumptions that usually consists of same relay nodes even under different transmission tasks. However, this will lead to unbalanced payload UASNs and accelerate loss working ability for entire system. In paper, we propose node balanced ant colony cooperative routing (PB-ACR) protocol UASNs, through combining algorithm transmission. The proposed PB-ACR...

10.1109/access.2021.3072283 article EN cc-by IEEE Access 2021-01-01

Quadruped locomotion is a challenging task for learning-based algorithms. It requires tedious manual tuning and difficult to deploy in reality due the gap. In this paper, we propose quadruped robot learning system agile which does not require any pre-training works well various real-world terrains. We introduce hierarchical framework that uses reinforcement as high-level policy adjust low-level trajectory generator better adaptability terrain. compact observation action space of it on host...

10.1109/iros51168.2021.9636757 article EN 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2021-09-27

In the early 2000s, Texas Department of Transportation funded several research projects to examine unit hydrograph and rainfall hyetograph techniques for hydrologic design in estimation flows stormwater drainage systems. A consortium comprised Lamar University, Tech University Houston, U.S. Geological Survey (USGS), was chosen techniques. Rainfall runoff data collected by USGS at 91 streamflow-gaging stations formed a basis research. These were as part small-watershed urban watershed studies...

10.3133/ofr20041035 article EN Antarctica A Keystone in a Changing World 2004-01-01

The objective of this study was to develop a machine learning (ML) application determine the optimal dosage sodium hypochlorite (NaOCl) curtail corrosion and odor by H2 S in headworks water resource recovery facility (WRRF) without overly consuming volatile fatty acids (VFAs) that are essential for enhanced biological phosphorus removal. Given highly diverse datasets available, three subproblems were formulated, cascaded ML modules developed accordingly. final models, chosen based on...

10.1002/wer.1618 article EN Water Environment Research 2021-07-30

Understanding sentiments embeded in online consumer reviews can assist a variety of decision making processes. Recent studies have extended sentiment analysis to fine-grained level, such as toward different features or characteristics products/services, which is known Aspect Based Sentiment Analysis (ABSA). In this study, we propose transfer learning based multi-label classification approach, building on pre-trained advanced deep model. We evaluate the proposed approach an experiment by...

10.1109/snams.2019.8931817 article EN 2019-10-01

Convolutional neural networks are widely adopted for solving problems in image classification. In this work, we aim to gain a better understanding of deep learning through exploring the miss-classified cases facial and emotion recognitions. Particularly, propose backtracking algorithm order track down activated pixels among last layer feature maps. We then able visualize features that lead miss-classifications, by applying tracking algorithm. A comparative analysis reveals recognition,...

10.1186/s40537-017-0101-8 article EN cc-by Journal Of Big Data 2017-11-13

Despite the significant research achievements on study of communities, how to maintain a benign social environment for community, as problem, has not received much attention. Current existing malicious activity detecting mechanisms are subject limitation underlying online environment. However, we found that information plays an important role in terms socialisation. Malicious activities, like diffusing unreliable and providing inappropriate critics, can severely impact situation community’s...

10.1504/ijipsi.2014.062863 article EN International Journal of Information Privacy Security and Integrity 2014-01-01

Modeling cyber risks has been an important but challenging task in the domain of security, which is mainly caused by high dimensionality and heavy tails risk patterns. Those obstacles have hindered development statistical modeling multivariate risks. In this work, we propose a novel approach for relies on deep learning extreme value theory. The proposed model not only enjoys accurate point predictions via also can provide satisfactory quantile Both simulation empirical studies show that very...

10.1080/02664763.2021.1936468 article EN Journal of Applied Statistics 2021-06-04

Social computing is the backbone of increasing socialized web applications, which more and people are tending to intensively rely on. Trust a critical element for social that has been involved into many computational systems. It topic intriguing numerous studies. In this paper, we present novel Computational Framework based on perspective information sharing. Our able quantify trust value given message. To our best knowledge, first time measured under reliability Entropy. We also explain...

10.1109/socialcom.2010.44 article EN 2010-08-01
Coming Soon ...