Zhifeng Hao

ORCID: 0000-0003-2034-6562
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Face and Expression Recognition
  • Text and Document Classification Technologies
  • Anomaly Detection Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Advanced Clustering Algorithms Research
  • Advanced Algorithms and Applications
  • Bayesian Modeling and Causal Inference
  • Stochastic Gradient Optimization Techniques
  • Machine Learning and Data Classification
  • Time Series Analysis and Forecasting
  • Cryptography and Data Security
  • Imbalanced Data Classification Techniques
  • Gene expression and cancer classification
  • Network Security and Intrusion Detection
  • Advanced Image and Video Retrieval Techniques
  • Data Mining Algorithms and Applications
  • Domain Adaptation and Few-Shot Learning
  • Advanced Graph Neural Networks
  • Neural Networks and Applications
  • Bioinformatics and Genomic Networks
  • Complex Network Analysis Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Reinforcement Learning in Robotics
  • Rough Sets and Fuzzy Logic
  • Image Retrieval and Classification Techniques

Guangdong University of Technology
2013-2025

Shantou University
2021-2025

Xi'an University of Technology
2019

South China University of Technology
2003-2016

Foshan University
2016

Nanjing University
2014

Research on social bot detection plays a crucial role in maintaining the order and reliability of information dissemination while increasing trust interactions. The current mainstream models rely black-box neural network technology, e.g., Graph Neural Network, Transformer, etc., which lacks interpretability. In this work, we present UnDBot, novel unsupervised, interpretable, yet effective practical framework for detecting bots. This is built upon structural theory. We begin by designing...

10.1145/3660522 preprint EN arXiv (Cornell University) 2024-04-21

10.1007/s10115-012-0484-y article EN Knowledge and Information Systems 2012-05-05

In recent years, incomplete multi-view clustering (IMVC), which studies the challenging problem on missing views, has received growing research interests. Previous IMVC methods suffer from following issues: (1) inaccurate imputation for data, leads to suboptimal performance, and (2) most existing models merely consider explicit presence of graph structure in ignoring fact that latent graphs different views also provide valuable information task. To overcome such challenges, we present a...

10.1609/aaai.v38i13.29380 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each result, such that it provably hard the adversary to infer presence or absence of any individual record from published noisy results. The main objective in differentially private maximize accuracy results, while satisfying guarantees. Previous work, notably matrix mechanism [16], has suggested batch correlated queries as whole can...

10.14778/2350229.2350252 article EN Proceedings of the VLDB Endowment 2012-07-01

Covalent adaptable networks incorporating supramolecular interactions are constructed to produce poly(thioctic acid)/aluminum (poly(TA)/Al) self-healing and stretchable composite elastomers for thermal management of advanced electronic devices.

10.1039/d2ta05781f article EN Journal of Materials Chemistry A 2022-01-01

Drug combinations play very important roles in cancer therapy, as they can enhance curative efficacy and overcome drug resistance. Due to the increasing size of combinatorial space, experimental screening for all becomes infeasible practice. Therefore, there is a great need develop accurate computational approaches that predict potential direct screening. In this paper, we propose novel method called GNNSynergy learn embeddings synergy prediction. Given specific cell line, multi-view graph...

10.1109/tcbbio.2024.3522512 article EN 2025-01-01

The task of outlier detection is to identify data objects that are markedly different from or inconsistent with the normal set data. Most existing solutions typically build a model using and outliers do not fit represented very well. However, in addition data, there also exist limited negative examples many applications, may be corrupted such imperfectly labeled. These make far more difficult than traditional ones. This paper presents novel approach address imperfect labels incorporate...

10.1109/tkde.2013.108 article EN IEEE Transactions on Knowledge and Data Engineering 2013-06-26

In the era of big data, we can easily access information from multiple views which may be obtained different sources or feature subsets. Generally, provide complementary for learning tasks. Thus, multi-view facilitate process and is prevalent in a wide range application domains. For example, medical science, measurements series examinations are documented each subject, including clinical, imaging, immunologic, serologic cognitive measures sources. Specifically, brain diagnosis, have...

10.1109/icdm.2014.26 article EN 2014-12-01

Support vector machines (SVMs), which were originally designed for binary classifications, are an excellent tool machine learning. For the multiclass they usually converted into ones before can be used to classify examples. In one-against-one algorithm with SVMs, there exists unclassifiable region where data samples cannot classified by its decision function. This paper extends handle this problem. We also give convergence and computational complexity analysis of proposed method. Finally,...

10.1109/tnn.2008.2003298 article EN IEEE Transactions on Neural Networks 2008-12-01

Multiple-instance learning (MIL) is a generalization of supervised that attempts to learn useful information from bags instances. In MIL, the true labels instances in positive are not available for training. This leads critical challenge, namely, handling which ambiguous (ambiguous instances). To deal with these instances, we propose novel MIL approach, called similarity-based multiple-instance (SMILE). Instead eliminating number training classifier, as done some previous works, SMILE...

10.1109/tcyb.2013.2257749 article EN IEEE Transactions on Cybernetics 2014-03-13

Data mining technology can be used to dig out potential and valuable information from massive data, support vector machine (SVM) is one of the most widely efficient methods in field data classification.However, training set often contains sensitive attributes, traditional method SVM reveals individual privacy information.In view low prediction accuracy poor versatility existing classifiers with protection, this paper proposed a new for differential protection.The algorithm first solved dual...

10.1109/access.2019.2929680 article EN cc-by IEEE Access 2019-01-01

This paper presents a novel framework to uncertain one-class learning and concept summarization on data streams. Our proposed consists of two parts. First, we put forward cope with uncertainty. We first propose local kernel-density-based method generate bound score for each instance, which refines the location corresponding then construct an classifier (UOCC) by incorporating generated into SVM-based phase. Second, support vectors (SVs)-based clustering technique summarize user from history...

10.1109/tkde.2012.235 article EN IEEE Transactions on Knowledge and Data Engineering 2012-11-29

Multiview graph clustering (MGC) methods are increasingly being studied due to the explosion of multiview data with structural information. The critical point MGC is better utilize view-specific and view-common information in features graphs multiple views. However, existing works have an inherent limitation that they unable concurrently consensus across feature To address this issue, we propose a variational generator for (VGMGC). Specifically, novel proposed extract common among graphs....

10.1109/tnnls.2024.3524205 article EN IEEE Transactions on Neural Networks and Learning Systems 2025-01-01

Mining temporal patterns from user behaviors has long been investigated, but most of the existing work centers on single-type user-item interactions, such as purchase or click, which fails to take advantage user’s diversified interests revealed by various types behavior. However, capturing different behavior sequences and modeling complex inter-correlation between them are non-trivial tasks, high sparsity type-related multi-seasonality individual time-variant dependency multi-type activities...

10.1145/3742793 article EN ACM Transactions on Intelligent Systems and Technology 2025-06-03

SVDD has been proved a powerful tool for outlier detection. However, in detecting outliers on multi-distribution data, namely there are distinctive distributions the it is very challenging to generate hyper-sphere distinguishing from normal data. Even if such can be identified, its performance usually not good enough. This paper proposes an multi-sphere approach, named MS-SVDD, detection First, adaptive sphere method proposed detect data dataset. The partitioned terms of identified...

10.1109/icdmw.2009.87 article EN IEEE ... International Conference on Data Mining workshops 2009-12-01

Differential privacy is a promising privacy-preserving paradigm for statistical query processing over sensitive data. It works by injecting random noise into each result such that it provably hard the adversary to infer presence or absence of any individual record from published noisy results. The main objective in differentially private maximize accuracy results while satisfying guarantees. Previous work, notably Li et al. [2010], has suggested that, with an appropriate strategy, batch...

10.1145/2699501 article EN ACM Transactions on Database Systems 2015-06-30

Depression is a common mental disorder that seriously affects patients' social function and daily life. Its accurate diagnosis remains big challenge in depression treatment. In this study, we used electroencephalography (EEG) functional near-infrared spectroscopy (fNIRS) measured the whole brain EEG signals forehead hemodynamic from 25 patients 30 healthy subjects during resting state. On one hand, explored network properties, found clustering coefficient local efficiency of delta theta...

10.3389/fnins.2023.1205931 article EN cc-by Frontiers in Neuroscience 2023-08-24
Coming Soon ...