Chenglin Fan

ORCID: 0009-0007-7645-8367
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Computational Geometry and Mesh Generation
  • Data Management and Algorithms
  • Complexity and Algorithms in Graphs
  • Advanced Graph Theory Research
  • Privacy-Preserving Technologies in Data
  • Automated Road and Building Extraction
  • Algorithms and Data Compression
  • Smart Parking Systems Research
  • Digital Image Processing Techniques
  • Remote Sensing and LiDAR Applications
  • Optimization and Packing Problems
  • Graph Labeling and Dimension Problems
  • Optimization and Search Problems
  • Constraint Satisfaction and Optimization
  • Statistical Methods and Inference
  • Sparse and Compressive Sensing Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Geographic Information Systems Studies
  • Anomaly Detection Techniques and Applications
  • Privacy, Security, and Data Protection
  • Video Analysis and Summarization
  • Energy Efficient Wireless Sensor Networks
  • Genome Rearrangement Algorithms
  • Genomics and Phylogenetic Studies
  • Time Series Analysis and Forecasting

Seoul National University
2024-2025

Pennsylvania State University
2024

Sorbonne Université
2022-2023

The University of Texas at Dallas
2019-2022

Cognitive Research (United States)
2022

Bellevue Hospital Center
2022

Baidu (China)
2020

Montana State University
2014-2017

Shenzhen Institutes of Advanced Technology
2010-2014

Chinese Academy of Sciences
2010-2014

10.1007/s10878-012-9458-y article EN Journal of Combinatorial Optimization 2012-02-17

In this article, we study a wide range of variants for computing the (discrete and continuous) Fréchet distance between uncertain curves. An curve is sequence uncertainty regions, where each region disk, line segment, or set points. A realisation polyline connecting one point from region. Given an second (certain uncertain) curve, seek to compute lower upper bound distance, which are minimum maximum any realisations We prove that both problems NP-hard in several models, problem remains hard...

10.1145/3597640 article EN ACM Transactions on Algorithms 2023-05-23

We study the problem of merging decision trees: Given k trees $T_1,T_2,T_3...,T_k$, we merge these into one super tree T with (often) much smaller size. The resultant T, which is an integration each leaf having a major label, can also be considered as (lossless) compression random forest. For any testing instance, it guaranteed that gives same prediction forest consisting $T_1,T_2,T_3...,T_k$ but saves computational effort needed for traversing multiple trees. proposed method suitable...

10.1145/3412815.3416886 article EN 2020-10-15

10.1007/s10878-014-9764-7 article EN Journal of Combinatorial Optimization 2014-06-18

Data about individuals may contain private and sensitive information. The differential privacy (DP) was proposed to address the problem of protecting each individual while keeping useful information a population. Sealfon [1] introduced graph model in which topology is assumed be public weight private. That can express hidden congestion patterns known transportation system. In this paper, we revisit privately releasing approximate distances between all pairs vertices [1]. Our goal minimize...

10.1109/isit50566.2022.9834836 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2022-06-26

Skyline queries are important in many application domains. In this paper, we propose a novel structure Diagram, which given set of points, partitions the plane into regions, referred to as skyline polyominos. All query points same polyomino have results. Similar kth-order Voronoi diagram commonly used facilitate k nearest neighbor (kNN) queries, can be and other applications. However, it may computationally expensive build diagram. By exploiting some interesting properties skyline, present...

10.1109/tkde.2019.2923914 article EN publisher-specific-oa IEEE Transactions on Knowledge and Data Engineering 2019-06-20

10.1007/s11390-014-1475-0 article EN Journal of Computer Science and Technology 2014-09-01

The genomic scaffold filling problem has attracted a lot of attention recently. is on an incomplete sequence (scaffold) I into I', with respect to complete reference genome G, such that the number adjacencies between G and I' maximized. NP-complete APX-hard, admits 1.2-approximation. However, input not quite practical does fit most real datasets (where more often given as list contigs). In this paper, we revisit by considering important case when, (1) S given, missing genes X = c(G) - c(S)...

10.4230/lipics.cpm.2016.15 article EN Combinatorial Pattern Matching 2016-01-01

In normal Voronoi diagram, each site is able to see all points in the plane. this paper, we study problem such that only half-plane and construct so-called Half-plane Diagram (HPVD). We show cell of not necessary convex it could consist many disjoint regions. prove complexity HPVD n sites $O(n^2)$. Then give an algorithm $O(n\log n)$ time $O(n)$ space boundary lines half-planes are parallel visible same side corresponding lines. For where be either lines, $O(n^2)$ HPVD.

10.1109/isvd.2011.25 article EN 2011-06-01

In a normal Voronoi diagram, each site is able to see all the points in plane. this paper, we study case such that only visually restricted region plane and construct so-called Visual Restriction Diagram (VRVD). We show visual restriction cell of not necessarily convex it could consist many disjoint regions. prove combinatorial complexity VRVD on n sites Θ(n2), then can be constructed O(n2) time space. Besides that, also give another algorithm with an extra log factor running compute VRVD,...

10.1016/j.tcs.2013.08.008 article EN publisher-specific-oa Theoretical Computer Science 2013-08-19

Many modern data analysis algorithms either assume or are considerably more efficient if the distances between points satisfy a metric. These include metric learning, clustering, and dimension reduction. As real sets noisy, often fail to For this reason, Gilbert Jain Fan et al. introduced closely related sparse repair violation distance problems. The goal of these problems is as few possible ensure they Three variants were considered, one admitting polynomial time algorithm. other shown be...

10.48550/arxiv.1908.08411 preprint EN other-oa arXiv (Cornell University) 2019-01-01

The Chain Pair Simplification problem (CPS) was posed by Bereg et al. who were motivated the of efficiently computing and visualizing structural resemblance between a pair protein backbones. In this problem, given two polygonal chains lengths n m, goal is to simplify both them simultaneously, so that resulting simplifications as well discrete Frechet distance are bounded. When vertices arbitrary (i.e., not necessarily from original chains), called General CPS (GCPS). In paper we consider...

10.4230/lipics.mfcs.2016.37 article EN Mathematical Foundations of Computer Science 2016-01-01

10.1007/s00454-020-00224-w article EN Discrete & Computational Geometry 2020-08-03

Releasing all pairwise shortest path (APSP) distances between vertices on general graphs under weight Differential Privacy (DP) is known as a challenging task. In the previous attempt of (Sealfon 2016}, by adding Laplace noise to each edge or output distance, achieve DP with some fixed budget, high probability maximal absolute error among published roughly $O(n)$ where $n$ number nodes. It was shown that this could be reduced for special graphs, which, however, hard graphs. Therefore,...

10.48550/arxiv.2204.14247 preprint EN cc-by arXiv (Cornell University) 2022-01-01

Correlation clustering is a central problem in unsupervised learning, with applications spanning community detection, duplicate automated labelling and many more. In the correlation one receives as input set of nodes for each node list co-clustering preferences, goal to output that minimizes disagreement specified nodes' preferences. this paper, we introduce simple computationally efficient algorithm provable privacy guarantees. Our approximation guarantees are stronger than those shown...

10.48550/arxiv.2203.01440 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Given $x\in(\mathbb{R}_{\geqslant 0})(_{2}^{[n]})$ recording pairwise distances, the Metric Violation Distance problem asks to compute $\ell_{0}$ distance between x and metric cone; i.e., modify minimum number of entries make it a metric. Due its large applications in various data analysis optimization tasks, this has been actively studied recently. We present an $O(\log n)$-approximation algorithm for METRIC VIOLATION Distance, exponentially improving previous best approximation ratio...

10.1109/focs54457.2022.00035 article EN 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS) 2022-10-01
Coming Soon ...