Haolong Xiang

ORCID: 0000-0003-4565-8829
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Recommender Systems and Techniques
  • Topic Modeling
  • Data Stream Mining Techniques
  • Advanced Graph Neural Networks
  • Cloud Computing and Resource Management
  • Natural Language Processing Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Face and Expression Recognition
  • Text and Document Classification Technologies
  • Machine Learning in Healthcare
  • Video Surveillance and Tracking Methods
  • Advanced Malware Detection Techniques
  • Fault Detection and Control Systems
  • Distributed and Parallel Computing Systems
  • Time Series Analysis and Forecasting
  • Smart Grid Security and Resilience
  • Animal Behavior and Welfare Studies
  • Face recognition and analysis
  • Spam and Phishing Detection
  • Adversarial Robustness in Machine Learning

Nanjing University of Information Science and Technology
2024-2025

Macquarie University
2022-2023

University of Auckland
2018-2022

Nanjing University
2016-2017

Nanjing University of Science and Technology
2017

Embedding-based recommender systems rely on historical interactions to model users, which poses challenges for recommending new known as the user cold-start problem. Some approaches incorporate social networks deduce preferences based circles of users solve problem sparse features. However, such methods have difficulty distinguishing between superficial correlations and causal relationships in behaviors, leading inaccuracies predicting preferences. To address aforementioned issues, we...

10.1145/3711858 article EN ACM transactions on office information systems 2025-01-09

In the social production system, image data are rapidly generated from almost all fields such as factories, hospitals, and transportation, promoting higher requirements for anomaly detection technologies, including low consumption, adaptability, accuracy. However, existing methods fragile to heterogeneous by complex systems tend require strong computing power resource support. To address above problems, a knowledge-driven framework is proposed, in which local feature enhancement method...

10.1109/tcss.2022.3217790 article EN IEEE Transactions on Computational Social Systems 2022-11-07

10.1145/3626772.3657839 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2024-07-10

Mobile cloud computing provides powerful and storage capacity on managing GPS big data by offloading vast workloads to remote clouds. For the mobile applications with urgent or communication deadline, it is necessary reduce workload transmission latency between devices This can be technically achieved expanding cloudlets that are moving co-located Access Points (APs). However, not-trivial place such movable efficiently enhance service for dynamic context-aware applications. In view of this...

10.1109/glocom.2016.7841576 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

With the advent of IoT (Internet Things) age, considerable web services are emerging rapidly in service communities, which places a heavy burden on target users' selection decisions. In this situation, various techniques, e.g., collaborative filtering (i.e., CF) is introduced recommendation to alleviate burden. However, traditional CF-based approaches often assume that historical user-service quality data centralized, while neglect distributed situation. Generally, involves inevitable...

10.1109/icws.2017.15 article EN 2017-06-01

Anomaly detection plays an increasingly important role in various fields for critical tasks such as intrusion cybersecurity, financial risk detection, and human health monitoring. A variety of anomaly methods have been proposed, a category based on the isolation forest mechanism stands out due to its simplicity, effectiveness, efficiency, e.g., iForest is often employed state-of-the-art detector real deployment. While majority forests use binary structure, framework LSHiForest has...

10.24963/ijcai.2023/264 article EN 2023-08-01

Text anomaly detection is crucial for identifying spam, misinformation, and offensive language in natural processing tasks. Despite the growing adoption of embedding-based methods, their effectiveness generalizability across diverse application scenarios remain under-explored. To address this, we present TAD-Bench, a comprehensive benchmark designed to systematically evaluate approaches text detection. TAD-Bench integrates multiple datasets spanning different domains, combining...

10.48550/arxiv.2501.11960 preprint EN arXiv (Cornell University) 2025-01-21

Medical time series has been playing a vital role in real-world healthcare systems as valuable information monitoring health conditions of patients. Accurate classification for medical series, e.g., Electrocardiography (ECG) signals, can help early detection and diagnosis. Traditional methods towards rely on handcrafted feature extraction statistical methods; with the recent advancement artificial intelligence, machine learning deep have become more popular. However, existing often fail to...

10.48550/arxiv.2502.04515 preprint EN arXiv (Cornell University) 2025-02-06

Personalized federated learning (PFL) has recently gained significant attention for its capability to address the poor convergence performance on highly heterogeneous data and lack of personalized solutions traditional (FL). Existing mainstream approaches either perform aggregation based a specific model architecture leverage global knowledge or achieve personalization by exploiting client similarities. However, former overlooks discrepancies in distributions indiscriminately aggregating all...

10.1609/aaai.v39i20.35460 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Graph Contrastive Learning (GCL), as a primary paradigm of graph self-supervised learning, spurs fruitful line research in tackling the data sparsity issue by maximizing consistency user/item embeddings between different augmented views with random perturbations. However, diversity, crucial metric for recommendation performance and user satisfaction, has received rather little attention. In fact, there exists challenging dilemma balancing accuracy diversity. To address these issues, we...

10.1609/aaai.v39i16.33852 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

Graph Neural Networks (GNNs) are widely applied on graph-level tasks, such as node classification, link prediction and graph generation. Existing GNNs mostly adopt a message-passing mechanism to aggregate information with their neighbors, which often makes similar after rounds of aggregations leads oversmoothing. Although recent works have made improvements by combining different message aggregation methods or introducing semantic encodings priors, these based still fail combat oversmoothing...

10.1609/aaai.v39i12.33413 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

With the development of Internet Things (IoT) technology, a vast amount IoT data is generated by mobile applications from devices. Cloudlets provide paradigm that allows and to be offloaded devices cloudlets for processing storage through access points (APs) in Wireless Metropolitan Area Networks (WMANs). Since most relevant personal privacy, it necessary pay attention transmission security. However, still challenge realize goal optimizing time, energy consumption resource utilization with...

10.3390/s18093030 article EN cc-by Sensors 2018-09-10

Anomaly detection is one of the crucial research topics in artificial intelligence, encompassing various fields such as health monitoring, network intrusion detection, and fraud financial transactions. Deep anomaly (DAD) methods are considered effective approaches for addressing complex problems. Among them, deep isolation forest have gained rapid development recently due to their simplicity parameter turning efficiency model training. The existing all based on representation learning, while...

10.1109/icdm58522.2023.00077 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2023-12-01

Anomaly detection is a significant but challenging data mining task in wide range of applications. Different domains usually use different ways to measure the characteristics and define anomaly types. As result, it big challenge develop versatile framework that can be universally applied with satisfactory performance most, if not all, In this article, we propose generic isolation forest based ensemble named EDBHiForest, which spaces arbitrary distance measures. It realized through embedding...

10.1109/mis.2021.3057914 article EN IEEE Intelligent Systems 2021-02-12

Abstract Anomaly detection plays a crucial role in many Internet of Things (IoT) applications such as traffic anomaly for smart transportation and medical diagnosis healthcare. With the explosion IoT data, on data streams raises higher requirements real-time response strong robustness large-scale arriving at same time various application fields. However, existing methods are either slow or application-specific. Inspired by edge computing generic technique, we propose an isolation forest...

10.1007/s11280-022-01052-z article EN cc-by World Wide Web 2022-05-12

With the rapid resource requirements of Internet Things applications, cloud computing technology is regarded as a promising paradigm for provision. To improve efficiency and effectiveness services, it essential to fairness achieve energy savings. However, still challenge schedule virtual machines in an energy-efficient manner while taking into consideration fairness. In view this challenge, fair machine scheduling method applications designed article. Specifically, are analyzed formal way....

10.1177/1550147717694890 article EN cc-by International Journal of Distributed Sensor Networks 2017-02-01

Anomaly detection is one of the most important data mining tasks in many real-life applications such as network intrusion for cybersecurity and medical diagnosis healthcare. In big era, these demand fast versatile anomaly capability to handle various types increasingly huge-volume data. However, existing methods are either slow due high computational complexity, or unable deal with complicated anomalies like local anomalies. this paper, we propose a novel method named OPHiForest use order...

10.1145/3340531.3411988 article EN 2020-10-19

Summary With the development of artificial intelligence, cloud‐edge computing and virtual reality, industrial design that originally depends on human imagination power can be transitioned to metaverse applications in smart manufacturing, which offloads services cloud edge platforms for enhancing quality service (QoS), considering inadequate terminal devices like sensors access points (APs). However, large overhead privacy exposure occur during data transmission cloud, while (ECDs) are at...

10.1002/spe.3301 article EN Software Practice and Experience 2023-12-09
Coming Soon ...