Hui Zhao

ORCID: 0000-0003-0718-9005
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Sentiment Analysis and Opinion Mining
  • Text and Document Classification Technologies
  • Advanced Computational Techniques and Applications
  • Advanced Text Analysis Techniques
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Artificial Immune Systems Applications
  • Natural Language Processing Techniques
  • Face and Expression Recognition
  • Emotion and Mood Recognition
  • Image Processing and 3D Reconstruction
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Advanced Algorithms and Applications
  • Handwritten Text Recognition Techniques
  • Adversarial Robustness in Machine Learning
  • Consumer Market Behavior and Pricing
  • Educational Technology and Assessment
  • Cognitive and developmental aspects of mathematical skills
  • Environmental and Agricultural Sciences
  • Advanced Data Compression Techniques
  • Advanced Computing and Algorithms
  • Cryptographic Implementations and Security
  • Rough Sets and Fuzzy Logic

Chinese Institute for Brain Research
2024-2025

Beijing Normal University
2024-2025

McGovern Institute for Brain Research
2025

Xinjiang University
2008-2024

Dalian Minzu University
2024

Xidian University
2022

Beijing University of Posts and Telecommunications
2022

Alibaba Group (China)
2022

Sichuan University
2010-2021

East China Normal University
2015-2021

Sentiment analysis has attracted considerable attention in recent years. In particular, implicit sentiment is a more challenging problem due to the lack of words. It requires us combine contextual information and precisely understand emotion changing process. Graph convolutional network (GCN) techniques have been widely applied for since they are capable learning from complex structures preserving global information. However, these models either only focus on extracting features single...

10.1109/access.2020.2975244 article EN cc-by IEEE Access 2020-01-01

Fuzzing (Fuzz testing) can effectively identify security vulnerabilities in software by providing a large amount of unexpected input to the target program. An important part fuzzing test is data generation. Numerous traditional methods generate have been developed, such as model-based generation and random These techniques require specification format or analyze manual reverse engineering. In this paper, we introduce an approach using Wasserstein generative adversarial networks (WGANs), deep...

10.1109/access.2019.2911121 article EN cc-by-nc-nd IEEE Access 2019-01-01

Aspect-based sentiment classification aims to identify the expressed towards an aspect given a context sentence. There are two main problems with existing methods: First, methods simply take average of sentence and word vectors as representations for certain sentence, but they not explicit will lose considerable useful information. Second, models based on graph convolutional networks (GCNs) only use dependency relationship which cannot fully exploit potential exert powerful feature fusion...

10.1109/access.2020.3012637 article EN cc-by IEEE Access 2020-01-01

Abstract Exposure to green space is associated with both physical and mental health benefits, including the potential buffer acute stress responses, positioning it as a promising non-pharmacological approach protect cognitive functions against stress. However, urban residents often face significant barriers in accessing spaces, which are not equitably distributed. Virtual Reality (VR) technology offers solution by simulating that could be made accessible broader demographic. Here, we...

10.1101/2024.12.31.630298 preprint EN cc-by-nd bioRxiv (Cold Spring Harbor Laboratory) 2025-01-02

Focusing on the distance between magnitudes as starting point to investigate mechanism of relation detection and its contribution mathematical thinking, this study explores precision neural representations numerical their impact children's arithmetic performance. By employing decoding techniques representational similarity analysis, present investigates how accurately brain represents distances relates skills. Twenty-nine school-aged children participated, completing a dot number comparison...

10.1002/hbm.70184 article EN cc-by-nc Human Brain Mapping 2025-03-01

Dynamic reconfiguration of neural network and flexible information integration across multiple tasks has been considered critical to characterize individual difference in complex cognition general intelligence. A promising underexplored question is how these neurocognitive processes related children's academic achievements, a hallmark high-order cognitive abilities that integrate attention, memory problem solving. By using multitasking paradigm which bridging outside-in inside-out...

10.1101/2025.03.28.645841 preprint EN cc-by 2025-04-03

Alleviating the delayed feedback problem is of crucial importance for conversion rate(CVR) prediction in online advertising. Previous modeling methods using an observation window to balance trade-off between waiting accurate labels and consuming fresh feedback. Moreover, estimate CVR upon freshly observed but biased distribution with fake negatives, sampling widely used reduce bias. While effective, we argue that previous approaches falsely treat negative samples as real during weighting...

10.1145/3485447.3511965 article EN Proceedings of the ACM Web Conference 2022 2022-04-25

Present methods of facial expression recognition usually designate an image as one kind six basic expressions. However, a is complex that consists several This paper proposes algorithm based on fuzzy kernel clustering and support vector machines. designs the binary classification tree by using algorithm, trains machines at each node describes complexity according result classification. Experimental results indicate proposed generates higher accuracy for JAFFE database achieves better...

10.1109/icnc.2007.372 article EN 2007-01-01

Based on adaptive rood pattern search (ARPS) algorithm, a new fast and efficient motion estimation algorithm called enhanced (E-ARPS) is proposed in this paper. Unlike ARPS, the E-ARPS utilizes spatial correlations to predict initial centre, then introduces based vector(MV) centre-biased distribution , an unequal-arm follows catch large motions. In process of searching, early terminations are always incorporated. The experimental results show that our has yielded significant efficiency gain...

10.1109/cisp.2008.498 article EN Congress on Image and Signal Processing 2008-01-01

Facial action units (AUs) recognition is a challenging problem with many applications and rapidly becoming an area of intense interest in research field machine vision. Nonadditive AU combinations which the appearance constituent AUs does change greatly increase difficulties recognition. Most methods treated each combination as new AU. However, these are impractical because there over 7000 different combinations. In this paper, novel approach based on fuzzy kernel clustering proposed to...

10.1109/fskd.2008.116 article EN 2008-10-01

ABSTRACT We give an abstraction of multisecret sharing based on Lagrange interpolating polynomial that is accessible to a fully mechanized analysis. This formalized in the applied pi‐calculus by using equational theory characterizes cryptographic semantics polynomial. also present encoding from into convergent rewriting system, which suitable for automated protocol verifier ProVerif. Finally, we verify Yang–Chang–Hwang (YCH) Copyright © 2013 John Wiley & Sons, Ltd.

10.1002/sec.694 article EN Security and Communication Networks 2013-01-24

According to the connections between feature subset and RBF neural network parameter, in order improve accuracy rate of intrusion detection, a detection model (IPSO-BPNN) improving article swarm optimizing is put forward. Take parameter as particle, discover optimum through coordination information exchange particles establish model, adopt KDD Cup99 data set perform simulation experiment. The results experiment show that, IPSO-RBF reduces dimensions, obtains better which high speed.

10.1109/isdea.2015.119 article EN 2015-08-01

Modern e-commerce websites collect immense amounts of transaction data, and almost each them is associated with at least one delivery address. To promote sales, operators are eager to identify the customers consumption levels. However, information resource for target quite limited due privacy protection. In this paper, we propose an integrated framework together empirical method pre-identify purchasing ability. implement that, need recognize implicit within addresses customers. practice,...

10.1109/ccbd.2015.51 article EN 2015-11-01

Online handwriting recognition is a very important part in the field of pattern recognition. Up to now there are few reports about online Uyghur word This paper proposes an effective method based on HMM recognize handwritten word. introduces feature extraction approach and presents language model, resulting higher accuracy.

10.1109/csqrwc.2012.6294993 article EN 2012-07-01

The Latent Dirichlet Allocation (LDA) is a model proposed recently which extracts latent topics from text data. paper uses the LDA in facial expression recognition but not document to excavate distribution relations between Action Unit (AU) and expressions. Using set up AU of relations, we can use ensure unknown category sequence proportion belongs six basic This first LDA-based solution complex recognition. We have validated that based on be used reasonable.

10.1109/icnc.2010.5584696 article EN 2010 Sixth International Conference on Natural Computation 2010-08-01

This thesis tries to analyze the drawbacks and shortages of present ant-based text clustering algorithms (Z-ACTCA algorithm in short). The author attempts improve from following three aspects: similarity calculation, iterations termination condition as well parametric adaption. Meanwhile, preprocession will be done on two-dimensional grid data mapping finally simulation experiment is conducted based dataset corpus Chinese classification Fu Dan University. At end thesis, draws conclusion that...

10.1109/icbda.2017.8078833 article EN 2017-03-01

The model based on deep learning has been widely applied to aspect-based sentiment analysis (ABSA). Most of the research at this stage focused mining comment sentence itself and modeling interaction information between aspect words. However, it neglected importance key phrase information. First, sentences contain phrases words according specific grammatical rules. Phrase can be used explore short-distance collocation Therefore, interactive multi-granularity (contextual, phrase, words) better...

10.2139/ssrn.4519772 preprint EN 2023-01-01
Coming Soon ...