Peixin Wang

ORCID: 0000-0003-3241-0023
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Formal Methods in Verification
  • Bayesian Modeling and Causal Inference
  • Distributed systems and fault tolerance
  • Evaluation and Optimization Models
  • Electric Power System Optimization
  • Energy Load and Power Forecasting
  • Machine Learning and Algorithms
  • Anomaly Detection Techniques and Applications
  • Chinese history and philosophy
  • Optimal Power Flow Distribution
  • Software Reliability and Analysis Research
  • Fault Detection and Control Systems
  • Real-Time Systems Scheduling
  • Evaluation Methods in Various Fields
  • SAS software applications and methods
  • Robotics and Automated Systems
  • Rough Sets and Fuzzy Logic
  • CCD and CMOS Imaging Sensors
  • Video Coding and Compression Technologies
  • Data Quality and Management
  • Rock Mechanics and Modeling
  • Landslides and related hazards
  • Advanced Control Systems Optimization
  • Diverse Music Education Insights

University of Oxford
2023-2024

Nanyang Technological University
2016-2024

Zhongyuan University of Technology
2023

Shanghai Jiao Tong University
2019-2022

Jilin University
2020-2022

Guangdong Police College
2021-2022

East China Normal University
2019

Shanghai Key Laboratory of Trustworthy Computing
2019

Northwestern Polytechnical University
2019

Kunming University of Science and Technology
2019

We consider the problem of expected cost analysis over nondeterministic probabilistic programs, which aims at automated methods for analyzing resource-usage such programs. Previous approaches this could only handle nonnegative bounded costs. However, in many scenarios, as queuing networks or cryptocurrency protocols, both positive and negative costs are necessary unbounded well.

10.1145/3314221.3314581 preprint EN 2019-06-07

Tool state monitoring is a key technology in intelligent manufacturing. But it still research stage and lacks general adaptability for different machining conditions. To overcome this limitation, work systematically investigates an intelligent, real-time, visible tool through adopting integrated theories technologies, i.e., (a) distinctively designed experimental technique with comprehensive consideration of cutting parameters wear values as variables, (b) bisensor fusion simultaneous...

10.1155/2019/8431784 article EN cc-by Complexity 2019-01-01

The notion of program sensitivity (aka Lipschitz continuity) specifies that changes in the input result proportional to output. For probabilistic programs is naturally extended expected sensitivity. A previous approach develops a relational logic framework for proving while loops, where number iterations fixed and bounded. In this work, we consider loops not fixed, but randomized depends on initial values. We present sound such programs. Our martingale-based can be automated through existing...

10.1145/3371093 article EN Proceedings of the ACM on Programming Languages 2019-12-20

In Bayesian probabilistic programming, a central problem is to estimate the normalised posterior distribution (NPD) of program with conditioning via score (a.k.a. observe) statements. Most previous approaches address this by Markov Chain Monte Carlo and variational inference, therefore could not generate guaranteed outcomes within finite time limit. Moreover, existing methods for exact inference either impose syntactic restrictions or cannot guarantee successful in general. work, we propose...

10.1145/3656432 article EN Proceedings of the ACM on Programming Languages 2024-06-20

In order to build the post‐peak strain softening model of rock, evolution laws rock parameters ( m , s ) were obtained by using evolutionary mode piecewise linear function regarding maximum principle stress. Based on nonlinear Hoek–Brown criterion, analytical relationship strength ), cohesion c and friction angle φ has been developed theoretical derivation. According analysis four different types it is found that, within range from 0 σ 3min peak hardness becomes smaller as confining pressure...

10.1155/2018/6190376 article EN cc-by Advances in Civil Engineering 2018-01-01

Geomagnetic navigation is a new method, which can make up for the shortcomings of traditional methods. The geomagnetic matching algorithm an important algorithm, obtain relatively high precision position information. However, location data measured by sensor not be uniquely corresponding to database, and it easy produce mismatch rate so that accurate positioning realized. Based on related theory graph theory, method based full-connected constraints proposed in this paper. only correspondence...

10.1109/oceanse.2019.8867319 article EN OCEANS 2019 - Marseille 2019-06-01

We consider the problem of expected cost analysis over nondeterministic probabilistic programs, which aims at automated methods for analyzing resource-usage such programs. Previous approaches this could only handle nonnegative bounded costs. However, in many scenarios, as queuing networks or cryptocurrency protocols, both positive and negative costs are necessary unbounded well. In work, we present a sound efficient approach to obtain polynomial bounds on accumulated Our can (a) general with...

10.48550/arxiv.1902.04659 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Deep Reinforcement Learning (DRL) has gained prominence as an effective approach for control systems. However, its practical deployment is impeded by state perturbations that can severely impact system performance. Addressing this critical challenge requires robustness verification about performance, which involves tackling two quantitative questions: (i) how to establish guaranteed bounds expected cumulative rewards, and (ii) determine tail rewards. In work, we present the first of...

10.1609/aaai.v38i18.29976 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

10.1007/s12204-022-2456-z article EN Journal of Shanghai Jiaotong University (Science) 2022-06-25

The rapid advancement of social media has enabled people from all around the world to create, express and share their feelings easily freely. It also generates voluminous data in various fields including health, education, finance security etc. huge amount is beneficial for research analysis. In this study, a model based on algorithm Random Forest SVM developed classify sentiment comments. Nearly 100 thousand posts Chinese Language are taken comments, then trained tested using emotion...

10.1109/aeeca55500.2022.9918957 article EN 2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA) 2022-08-20

With the implementing of national polices to prevent property bubble, it is difficult for real estate company get sufficient funds from loan. As a result, trust financing has gradually become priority, especially when small or medium-sized enterprise choosing their plans in growth period. Although many advantages on flexibility, application scope, and financial expense, also some risks that could bring negative influence project, like capital operation risk, payment credit etc. This paper...

10.1061/9780784480274.165 article EN ICCREM 2021 2017-08-14

The social contradiction is becoming complex, and the workload of police officers also growing while there no significant increase in number officers. efficient optimization on allocation resources has become an urgent issue for public security organs. Big data technology provides a new method resources. This paper designed potential criminal prediction resource system based existing jurisdiction. Based analysis work, case information, organs, will predict key locations where criminals...

10.1109/ishc54333.2021.00033 article EN 2021-12-01

Valuation methods used by the listed company vary with type of industry and profit model. Real estate business is capital intensive, which characterized occupation large funds a long period turnover. The significance this study to select appropriate evaluation method reflect value real company. Considering characteristics company, paper selects valuation companies. Based on analysis factors having an impact profitability financial risk, explores relationship between price, trading volume,...

10.1061/9780784413777.126 article EN ICCREM 2021 2014-11-03

In Bayesian probabilistic programming, a central problem is to estimate the normalised posterior distribution (NPD) of program with conditioning via score (a.k.a. observe) statements. Most previous approaches address this by Markov Chain Monte Carlo and variational inference, therefore could not generate guaranteed outcomes within finite time limit. Moreover, existing methods for exact inference either impose syntactic restrictions or cannot guarantee successful in general. work, we propose...

10.48550/arxiv.2307.13160 preprint EN other-oa arXiv (Cornell University) 2023-01-01

RISC-V, as an emerging open source instruction set architecture, has the advantages of simplicity and modularity. With increasing maturity perfection related tool chain, construction software ecology is being paid more attention. As video encoder, many scholars have proposed different optimized implementations based on characteristics architectural instructions, but there are few efficient optimizations x264 algorithm library vector instructions for RISC-V platform., this paper rewrites...

10.1109/isctis58954.2023.10213200 article EN 2023-07-07

Deep Reinforcement Learning (DRL) has gained prominence as an effective approach for control systems. However, its practical deployment is impeded by state perturbations that can severely impact system performance. Addressing this critical challenge requires robustness verification about performance, which involves tackling two quantitative questions: (i) how to establish guaranteed bounds expected cumulative rewards, and (ii) determine tail rewards. In work, we present the first of...

10.48550/arxiv.2312.09695 preprint EN other-oa arXiv (Cornell University) 2023-01-01
Coming Soon ...