Nan Jiang

ORCID: 0000-0003-1712-1872
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Reinforcement Learning in Robotics
  • Machine Learning and Algorithms
  • Advanced Bandit Algorithms Research
  • Advanced Vision and Imaging
  • Evolutionary Algorithms and Applications
  • Topic Modeling
  • Advanced Image and Video Retrieval Techniques
  • Energy Efficient Wireless Sensor Networks
  • Adversarial Robustness in Machine Learning
  • Interconnection Networks and Systems
  • Complex Network Analysis Techniques
  • Natural Language Processing Techniques
  • Indoor and Outdoor Localization Technologies
  • Mobile Crowdsensing and Crowdsourcing
  • Video Surveillance and Tracking Methods
  • Neural Networks and Applications
  • Privacy-Preserving Technologies in Data
  • Human Pose and Action Recognition
  • Advanced Graph Neural Networks
  • Recommender Systems and Techniques
  • IoT and Edge/Fog Computing
  • Opinion Dynamics and Social Influence
  • Advanced Neural Network Applications
  • Software-Defined Networks and 5G
  • Formal Methods in Verification

East China Jiaotong University
2016-2025

University of Toronto
2025

Tsinghua University
2019-2025

Nanchang University
2025

Purdue University West Lafayette
2022-2024

Jilin Province Science and Technology Department
2024

Jilin University
2024

Shandong Institute of Business and Technology
2024

Shanghai Jiao Tong University
2013-2024

Southeast University
2024

Network-on-Chips (NoCs) are becoming integral parts of modern microprocessors as the number cores and modules integrated on a single chip continues to increase. Research development future NoC technology relies accurate modeling simulations evaluate performance impact analyze cost novel architectures. In this work, we present BookSim, cycle-accurate simulator for NoCs. The is designed simulation flexibility network components. It features modular design offers large set configurable...

10.1109/ispass.2013.6557149 article EN 2013-04-01

We study the problem of off-policy value evaluation in reinforcement learning (RL), where one aims to estimate a new policy based on data collected by different policy. This is often critical step when applying RL real-world problems. Despite its importance, existing general methods either have uncontrolled bias or suffer high variance. In this work, we extend doubly robust estimator for bandits sequential decision-making problems, which gets best both worlds: it guaranteed be unbiased and...

10.48550/arxiv.1511.03722 preprint EN other-oa arXiv (Cornell University) 2015-01-01

We introduce a new photographing guidance (PhotoHelper) for amateur photographers to enhance their portrait photo quality using deep feature retrieval and fusion. In our model, we comprehensively integrate empirical aesthetic rules, traditional machine learning algorithms neural networks extract different kinds of features in both color space aspects. With these features, build modified random forest with structured photograph collection identify types photos. also define the composition...

10.1109/tmm.2022.3144890 article EN IEEE Transactions on Multimedia 2022-01-25

Metallic elements having negative enthalpies of mixing tend to form characteristic local atomic clusters. In this review, we use the structural information in first nearest neighbour shell level, or first-shell cluster, derive composition rules two types complex alloy phases, quasicrystals and bulk metallic glasses, both being composed with mixing. We show phenomena quasicrystal-forming systems, where major such as cluster line, electron concentration size criteria are derived. Then analyse...

10.1088/0022-3727/40/15/r01 article EN Journal of Physics D Applied Physics 2007-07-13

This paper studies systematic exploration for reinforcement learning with rich observations and function approximation. We introduce a new model called contextual decision processes, that unifies generalizes most prior settings. Our first contribution is complexity measure, the Bellman rank, we show enables tractable of near-optimal behavior in these processes naturally small many well-studied second algorithm engages to learn low rank. provably learns number samples polynomial all relevant...

10.48550/arxiv.1610.09512 preprint EN other-oa arXiv (Cornell University) 2016-01-01

With the rise of Internet Things (IoT) and fifth-generation (5G) networks, which have led to a surge in data processing increased transfer time, traditional cloud computing could no longer meet needs workers, so edge has emerged. Edge demand for low time consumption by at network then transmitting it third-party platform. However, since credibility platform is unknown can easily leak privacy workers. For transparent mechanism blockchain, two-stage protection based on blockchain proposed...

10.1002/int.22371 article EN International Journal of Intelligent Systems 2021-01-23

Using inertial measurement units mounted on foot is a feasible approach to improve the positioning accuracy for human motion capture system. This paper presents lightweight and low cost wireless system simultaneous reconstruction of body attitude displacement. First all, device based sensor networks distributes 15 nodes key limbs. Then, after an initial alignment with reduced error, zero-speed update algorithm used calculate In addition, constantly posture information, kind method gradient...

10.1002/int.22689 article EN International Journal of Intelligent Systems 2021-09-27

Custom accelerators improve the energy efficiency, area and performance of deep neural network (DNN) inference. This article presents a scalable DNN accelerator consisting 36 chips connected in mesh on multi-chip-module (MCM) using ground-referenced signaling (GRS). While previous fabricated single monolithic chip are optimal for specific sizes, proposed architecture enables flexible scaling efficient inference wide range DNNs, from mobile to data center domains. Communication is minimized...

10.1109/jssc.2019.2960488 article EN IEEE Journal of Solid-State Circuits 2020-01-14

Social trust assessment that characterizes a pairwise trustworthiness relationship can spur diversified applications. Extensive efforts have been put in exploration, but mainly focusing on applying graph convolutional network to establish social evaluation model, overlooking user feature factors related context-aware information prediction. In this article, we aim design new framework GATrust which integrates multi-aspect properties of users, including context-specific information,...

10.1109/tkde.2022.3174044 article EN IEEE Transactions on Knowledge and Data Engineering 2022-01-01

ABSTRACT Aims This study investigated the current status of nutrition literacy and related influencing factors in stroke patients, with a view to providing reference for development targeted interventions. Design Cross‐sectional study. Methods A convenience sampling method was used select 342 patients from June November 2024 as population, cross‐sectional survey conducted using General Information Questionnaire, Nutrition Literacy Scale, Herth Hope Chronic Disease Self‐Efficacy Scale Social...

10.1111/jocn.17742 article EN Journal of Clinical Nursing 2025-03-18

Recently proposed high-radix interconnection networks [10] require global adaptive routing to achieve optimum performance. Existing direct methods are slow sense congestion remote from the source router and hence misroute many packets before such is detected. This paper introduces indirect (IAR) in which decision uses information that not directly available at router. We describe four IAR methods: credit round trip (CRT) [10], progressive (PAR), piggyback (PB), reservation (RES). evaluate...

10.1145/1555754.1555783 article EN 2009-06-20

For Markov decision processes with long horizons (i.e., discount factors close to one), it is common in practice use reduced during planning speed computation. However, perhaps surprisingly, when the model available agent estimated from data, as will be case most real-world problems, policy found using a shorter horizon can actually better than learned true horizon. In this paper we provide precise explanation for phenomenon based on principles of learning theory. We show formally that...

10.5555/2772879.2773300 article EN Adaptive Agents and Multi-Agents Systems 2015-05-04

Matching the visual appearances of target over consecutive image frames is most critical issue in video-based object tracking. Choosing an appropriate distance metric for matching determines its accuracy and robustness, thus significantly influences tracking performance. Most existing methods employ fixed pre-specified metrics. However, this simple treatment problematic limited practice, because a does not likely to guarantee closest match be true interest. This paper presents new approach...

10.1109/tip.2011.2114895 article EN IEEE Transactions on Image Processing 2011-02-18

We offer an experimental benchmark and empirical study for off-policy policy evaluation (OPE) in reinforcement learning, which is a key problem many safety critical applications. Given the increasing interest deploying learning-based methods, there has been flurry of recent proposals OPE method, leading to need standardized analyses. Our work takes strong focus on diversity design enable stress testing methods. provide comprehensive benchmarking suite interplay different attributes method...

10.48550/arxiv.1911.06854 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Text sentiment classification is of critical importance to improve the autonomous decision making and communication ability among object peers in Social Internet Things (SIoT). To classify polarity on a fine-grained level, aspect-level has become promising direction recent years. However, existing solutions typically ignore mutual information between sentences their respective aspect terms while generally performing by using simple attention mechanism. Thus, relevant results seem be...

10.1109/jiot.2020.2963927 article EN IEEE Internet of Things Journal 2020-01-03

In the participatory sensing framework, privacy protection of Internet Things (IoT) is very important. this article, cryptography-based methods are utilized to protect participants' information in unsecured network channels for dynamic and real-time tasks. The edge computing paradigm introduced traditional framework reduce latency. Then, Rivest Cipher 4 stream cipher logistic mapping combined deal with problems limited resources untruthful third-party platforms. Finally, product algebra...

10.1109/jiot.2020.2990428 article EN publisher-specific-oa IEEE Internet of Things Journal 2020-04-28
Coming Soon ...