Minghao Zhao

ORCID: 0000-0003-2871-0023
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Complex Network Analysis Techniques
  • Recommender Systems and Techniques
  • Advanced Graph Neural Networks
  • Advanced Neural Network Applications
  • Network Security and Intrusion Detection
  • Human Pose and Action Recognition
  • Opinion Dynamics and Social Influence
  • Domain Adaptation and Few-Shot Learning
  • Anomaly Detection Techniques and Applications
  • Sentiment Analysis and Opinion Mining
  • Gait Recognition and Analysis
  • Machine Learning and Data Classification
  • Blockchain Technology Applications and Security
  • Topic Modeling
  • Reinforcement Learning in Robotics
  • Water Quality Monitoring Technologies
  • Cryptography and Data Security
  • Consumer Market Behavior and Pricing
  • Digital Games and Media
  • Adaptive Control of Nonlinear Systems
  • Digital Marketing and Social Media
  • Privacy-Preserving Technologies in Data
  • Advanced Bandit Algorithms Research
  • Caching and Content Delivery
  • Adaptive Dynamic Programming Control

East China Normal University
2022-2025

Jilin University
2016-2024

Beihang University
2024

NetEase (China)
2019-2024

Chinese Academy of Medical Sciences & Peking Union Medical College
2024

Guangxi University
2024

Jilin Province Science and Technology Department
2016-2023

Southwest Jiaotong University
2023

Tsinghua University
2018-2022

University of Jinan
2021-2022

Real-world networks feature weights of interactions, where link often represent some physical attributes. In many situations, to recover the missing data or predict network evolution, we need in a network. this paper, first proposed series new centrality indices for links line graph. Then, utilizing these graph indices, as well number original designed three supervised learning methods realize weight prediction both single layer and multiple layers, which perform much better than several...

10.1109/tkde.2018.2801854 article EN IEEE Transactions on Knowledge and Data Engineering 2018-02-05

Community detection plays an important role in social networks, since it can help to naturally divide the network into smaller parts so as simplify analysis. However, on other hand, arises concern that individual information may be overmined, and concept community deception has been proposed protect privacy networks. Here, we introduce formalize problem of attack develop efficient strategies algorithms by rewiring a small number connections, leading protection. In particular, first give two...

10.1109/tcss.2019.2912801 article EN IEEE Transactions on Computational Social Systems 2019-05-14

Sequential recommender systems aim to predict users' next interested item given their historical interactions. However, a long-standing issue is how distinguish between long/short-term interests, which may be heterogeneous and contribute differently the recommendation. Existing approaches usually set pre-defined short-term interest length by exhaustive search or empirical experience, either highly inefficient yields subpar results. The recent advanced transformer-based models can achieve...

10.1145/3543507.3583440 article EN Proceedings of the ACM Web Conference 2022 2023-04-26

Real-world networks exhibit prominent hierarchical and modular structures, with various subgraphs as building blocks. Most existing studies simply consider distinct motifs use only their numbers to characterize the underlying network. Although such statistics can be used describe a network model, or even design some algorithms, role of in applications further explored so improve results. In this article, concept subgraph (SGN) is introduced then applied models, algorithms designed for...

10.1109/tkde.2019.2957755 article EN IEEE Transactions on Knowledge and Data Engineering 2019-12-05

In business domains, bundling is one of the most important marketing strategies to conduct product promotions, which commonly used in online e-commerce and offline retailers. Existing recommender systems mostly focus on recommending individual items that users may be interested in. this paper, we target at a practical but less explored recommendation problem named bundle recommendation, aims offer combination users. To tackle specific context virtual mall games, formalize it as link...

10.1145/3340531.3412734 article EN 2020-10-19

In social networks, by removing some target-sensitive links, privacy protection might be achieved. However, hidden links can still re-observed link prediction methods on observable networks. this paper, the conventional method named Resource Allocation Index (RA) is adopted for attacks. Several defense are proposed, including heuristic and evolutionary approaches, to protect targeted from RA attack. particular, incremental computation proposed accelerating calculation of fitness in...

10.1109/tkde.2019.2933833 article EN IEEE Transactions on Knowledge and Data Engineering 2019-01-01

Recent years have witnessed the great accuracy performance of graph-based Collaborative Filtering (CF) models for recommender systems. By taking user-item interaction behavior as a graph, these CF borrow success Graph Neural Networks (GNN), and iteratively perform neighborhood aggregation to propagate collaborative signals. While conventional are known facing challenges popularity bias that favors popular items, one may wonder "Whether existing alleviate or exacerbate systems?" To answer...

10.1145/3477495.3532005 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2022-07-06

Community detection, aiming to group nodes based on their connections, plays an important role in network analysis since communities, treated as meta-nodes, allow us create a large-scale map of simplify its analysis. However, for privacy reasons, we may want prevent communities from being discovered certain cases, leading the topics community deception. In this article, formalize detection attack problem three scales, including global (macroscale), target (mesoscale), and node (microscale)....

10.1109/tcss.2020.3031596 article EN IEEE Transactions on Computational Social Systems 2020-11-02

Self-attention models have achieved state-of-the-art performance in sequential recommender systems by capturing the dependencies among user-item interactions. However, they rely on positional embeddings to retain information, which may break semantics of item embeddings. In addition, most existing works assume that such exist solely embeddings, but neglect their existence features. this work, we propose a novel system (MLP4Rec) based recent advances MLP-based architectures, is naturally...

10.24963/ijcai.2022/297 article EN Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence 2022-07-01

Target search for moving and invisible objects has always been considered a challenge, as the floating drift with flows. This study focuses on target by multiple autonomous underwater vehicles (AUV) investigates multi-agent method (MATSMI) objects. In MATSMI algorithm, based deep deterministic policy gradient (MADDPG) method, we add spatial temporal information to reinforcement learning state set up specialized rewards in conjunction maritime scenario. Additionally, construct simulation...

10.3390/s22218562 article EN cc-by Sensors 2022-11-07

Skeleton-based action recognition methods are limited by the semantic extraction of spatio-temporal skeletal maps. However, current have difficulty in effectively combining features from both temporal and spatial graph dimensions tend to be thick on one side thin other. In this paper, we propose a Temporal-Channel Aggregation Graph Convolutional Networks (TCA-GCN) learn topologies dynamically efficiently aggregate topological different channel for skeleton-based recognition. We use Temporal...

10.48550/arxiv.2205.15936 preprint EN cc-by-nc-nd arXiv (Cornell University) 2022-01-01

The underwater environment is still unknown for humans, so the high definition camera an important tool data acquisition at short distances underwater. Due to insufficient power, image collected by submersible devices cannot be analyzed in real time. Based on characteristics of Field-Programmable Gate Array (FPGA), low power consumption, strong computing capability, and flexibility, we design embedded FPGA recognition system Convolutional Neural Network (CNN). By using two technologies FPGA,...

10.3390/s19020350 article EN cc-by Sensors 2019-01-16

Reinforcement learning based recommender systems (RL-based RS) aim at a good policy from batch of collected data, by casting recommendations to multi-step decision-making tasks. However, current RL-based RS research commonly has large reality gap. In this paper, we introduce the first open-source real-world dataset, RL4RS, hoping replace artificial datasets and semi-simulated previous studies used due resource limitation domain. Unlike academic RL research, suffers difficulties being...

10.1145/3539618.3591899 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2023-07-18

Skeleton-based action recognition relies on the extraction of spatial-temporal topological information. Hypergraphs can establish prior unnatural dependencies for skeleton. However, existing methods only focus construction spatial topology and ignore time-point dependence. This paper proposes a dynamic hypergraph convolutional network (DST-HCN) to capture information skeleton-based recognition. DST-HCN introduces (TPH) learn relationships at time points. With multiple static hypergraphs TPH,...

10.1109/icme55011.2023.00367 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2023-07-01

Self-attention models have achieved the state-of-the-art performance in sequential recommender systems by capturing dependencies among user–item interactions. However, they rely on adding positional embeddings to item sequence retain information, which may break semantics of due heterogeneity between these two types embeddings. In addition, most existing works assume that such exist solely embeddings, but neglect their existence features. our previous study, we proposed a novel...

10.1145/3637871 article EN ACM transactions on office information systems 2023-12-18

Abstract Distributed in-memory databases are widely adopted to achieve low latency and high bandwidth for data-intensive applications. They support scale-out by sharding distributing data across multiple nodes. To efficiently adapt various workloads, distributed must be capable of migrating shards In this paper, we demonstrate that state-of-the-art approaches experience significant performance degradation during migration due service downtime redundant transfer. Furthermore, our findings...

10.1007/s41019-024-00276-5 article EN cc-by Data Science and Engineering 2025-01-15

In recent years, extreme weather events accompanying the global warming have occurred frequently, which brought significant impact on national economic and social development. The ocean is an important member of climate system plays role in occurrence anomalies. With continuous improvement sensor technology, we use sensors to acquire data for study resource detection disaster prevention, etc. However, acquired by not enough be used directly researchers, so Generative Adversarial Network...

10.32604/cmc.2019.05929 article EN Computers, materials & continua/Computers, materials & continua (Print) 2019-01-01

It is always difficult to evacuate crowds in public places like subway stations. The traditional crowd behavior simulation models often ignore two important issues evacuation: pedestrian tracking and individual differences. To solve the problem, this paper combines social force model (SFM) with deep learning into a novel detection method. Firstly, several algorithms for were compared, best ones sparse dense determined. Next, positions real video acquired by selected algorithms, converted...

10.1109/access.2019.2949106 article EN cc-by IEEE Access 2019-01-01

In recent years, advances in Graph Convolutional Networks (GCNs) have given new insights into the development of social recommendation. However, many existing GCN-based recommendation methods often directly apply GCN to capture user-item and user-user interactions, which probably two main limitations: (a) Due power-law property degree distribution, vanilla with static normalized adjacency matrix has limitations learning node representations, especially for long-tail nodes; (b) multi-typed...

10.1145/3469799 article EN ACM transactions on office information systems 2021-09-27

Online games make up the largest segment of booming global game market in terms revenue as well players. Unlike that sell at one time for profit, online money from in-game purchases by a large number engaged Therefore, Customer Lifetime Value (CLTV) is particularly vital companies to improve marketing decisions and increase revenues. Nowadays, virtual worlds are becoming increasingly innovative, complex, diverse, CLTV massive players highly personalized. That is, different may have very...

10.1145/3530012 article EN ACM transactions on office information systems 2022-04-23

In typical alteration extraction methods, e.g., band math and principal component analysis (PCA), the bands or combinations unitized to extract altered minerals are usually selected based on empirical models previous rules. This results in significant differences of mineral mapping even same area, thus greatly increasing uncertainty resource prediction. this paper, an intelligent approach was proposed which optimization algorithm, i.e., a genetic algorithm (GA), introduced into PCA; is...

10.3390/rs16020392 article EN cc-by Remote Sensing 2024-01-18
Coming Soon ...