11 results on '"Xiong, Neal"'
Search Results
2. CNN-VAE: An intelligent text representation algorithm
- Author
-
Xu, Saijuan, Guo, Canyang, Zhu, Yuhan, Liu, Genggeng, and Xiong, Neal
- Published
- 2023
- Full Text
- View/download PDF
3. An Intelligent Network Traffic Prediction Scheme Based on Ensemble Learning of Multi-Layer Perceptron in Complex Networks.
- Author
-
Wang, Chunzhi, Cao, Weidong, Wen, Xiaodong, Yan, Lingyu, Zhou, Fang, and Xiong, Neal
- Subjects
FEATURE extraction ,INTELLIGENT networks ,CONVOLUTIONAL neural networks ,RECURRENT neural networks ,DEEP learning ,TRAFFIC estimation - Abstract
At present, the amount of network equipment, servers, and network traffic is increasing exponentially, and the way in which operators allocate and efficiently utilize network resources has attracted considerable attention from traffic forecasting researchers. However, with the advent of the 5G era, network traffic has also shown explosive growth, and network complexity has increased dramatically. Accurately predicting network traffic has become a pressing issue that must be addressed. In this paper, a multilayer perceptron ensemble learning method based on convolutional neural networks (CNN) and gated recurrent units (GRU) spatiotemporal feature extraction (MECG) is proposed for network traffic prediction. First, we extract spatial and temporal features of the data by convolutional neural networks (CNN) and recurrent neural networks (RNN). Then, the extracted temporal features and spatial features are fused into new spatiotemporal features through integrated learning of a multilayer perceptron, and a spatiotemporal prediction model is built in the sequence-to-sequence framework. At the same time, the teacher forcing mechanism and attention mechanism are added to improve the accuracy and convergence speed of the model. Finally, the proposed method is compared with other deep learning models for experiments. The experimental results show that the proposed method not only has apparent advantages in accuracy but also shows some superiority in time training cost. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Face Gender and Age Classification Based on Multi-Task, Multi-Instance and Multi-Scale Learning.
- Author
-
Liao, Haibin, Yuan, Li, Wu, Mou, Zhong, Liangji, Jin, Guonian, and Xiong, Neal
- Subjects
RANDOM forest algorithms ,GENDER ,AGE groups ,CLASSIFICATION ,AGE ,FACE ,HUMAN facial recognition software - Abstract
Featured Application: Facial recognition. Automated facial gender and age classification has remained a challenge because of the high inter-subject and intra-subject variations. We addressed this challenging problem by studying multi-instance- and multi-scale-enhanced multi-task random forest architecture. Different from the conventional single facial attribute recognition method, we designed effective multi-task architecture to learn gender and age simultaneously and used the dependency between gender and age to improve its recognition accuracy. In the study, we found that face gender has a great influence on face age grouping; thus, we proposed a random forest face age grouping method based on face gender conditions. Specifically, we first extracted robust multi-instance and multi-scale features to reduce the influence of various intra-subject distortion types, such as low image resolution, illumination and occlusion, etc. Furthermore, we used a random forest classifier to recognize facial gender. Finally, a gender conditional random forest was proposed for age grouping to address inter-subject variations. Experiments were conducted by using two popular MORPH-II and Adience datasets. The experimental results showed that the gender and age recognition rates in our method can reach 99.6% and 96.14% in the MORPH-II database and 93.48% and 63.72% in the Adience database, reaching the state-of-the-art level. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. EDMF: Efficient Deep Matrix Factorization With Review Feature Learning for Industrial Recommender System.
- Author
-
Liu, Hai, Zheng, Chao, Li, Duantengchuan, Shen, Xiaoxuan, Lin, Ke, Wang, Jiazhang, Zhang, Zhen, Zhang, Zhaoli, and Xiong, Neal N.
- Abstract
Recommendation accuracy is a fundamental problem in the quality of the recommendation system. In this article, we propose an efficient deep matrix factorization (EDMF) with review feature learning for the industrial recommender system. Two characteristics in user’s review are revealed. First, interactivity between the user and the item, which can also be considered as the former’s scoring behavior on the latter, is exploited in a review. Second, the review is only a partial description of the user’s preferences for the item, which is revealed as the sparsity property. Specifically, in the first characteristic, EDMF extracts the interactive features of onefold review by convolutional neural networks with word-attention mechanism. Subsequently, ${L}_{0}$ norm is leveraged to constrain the review considering that the review information is a sparse feature, which is the second characteristic. Furthermore, the loss function is constructed by maximum a posteriori estimation theory, where the interactivity and sparsity property are converted as two prior probability functions. Finally, the alternative minimization algorithm is introduced to optimize the loss functions. Experimental results on several datasets demonstrate that the proposed methods, which show good industrial conversion application prospects, outperform the state-of-the-art methods in terms of effectiveness and efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Multi-Scale Dynamic Convolutional Network for Knowledge Graph Embedding.
- Author
-
Zhang, Zhaoli, Li, Zhifei, Liu, Hai, and Xiong, Neal N.
- Subjects
KNOWLEDGE graphs ,VECTOR spaces ,KNOWLEDGE base ,COMPUTER architecture - Abstract
Knowledge graphs are large graph-structured knowledge bases with incomplete or partial information. Numerous studies have focused on knowledge graph embedding to identify the embedded representation of entities and relations, thereby predicting missing relations between entities. Previous embedding models primarily regard (subject entity, relation, and object entity) triplet as translational distance or semantic matching in vector space. However, these models only learn a few expressive features and hard to handle complex relations, i.e., 1-to-N, N-to-1, and N-to-N, in knowledge graphs. To overcome these issues, we introduce a multi-scale dynamic convolutional network (M-DCN) model for knowledge graph embedding. This model features topnotch performance and an ability to generate richer and more expressive feature embeddings than its counterparts. The subject entity and relation embeddings in M-DCN are composed in an alternating pattern in the input layer, which helps extract additional feature interactions and increase the expressiveness. Multi-scale filters are generated in the convolution layer to learn different characteristics among input embeddings. Specifically, the weights of these filters are dynamically related to each relation to model complex relations. The performance of M-DCN on the five benchmark datasets is tested via experiments. Results show that the model can effectively handle complex relations and achieve state-of-the-art link prediction results on most evaluation metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series.
- Author
-
Yin, Chunyong, Zhang, Sun, Wang, Jin, and Xiong, Neal N.
- Subjects
ANOMALY detection (Computer security) ,TIME series analysis ,DEEP learning ,ARTIFICIAL neural networks ,FEATURE extraction ,CONVOLUTIONAL neural networks - Abstract
Internet of Things (IoT) realizes the interconnection of heterogeneous devices by the technology of wireless and mobile communication. The data of target regions are collected by widely distributed sensing devices and transmitted to the processing center for aggregation and analysis as the basis of IoT. The quality of IoT services usually depends on the accuracy and integrity of data. However, due to the adverse environment or device defects, the collected data will be anomalous. Therefore, the effective method of anomaly detection is the crucial issue for guaranteeing service quality. Deep learning is one of the most concerned technology in recent years which realizes automatic feature extraction from raw data. In this article, the integrated model of the convolutional neural network (CNN) and recurrent autoencoder is proposed for anomaly detection. Simple combination of CNN and autoencoder cannot improve classification performance, especially, for time series. Therefore, we utilize the two-stage sliding window in data preprocessing to learn better representations. Based on the characteristics of the Yahoo Webscope S5 dataset, raw time series with anomalous points are extended to fixed-length sequences with normal or anomaly label via the first-stage sliding window. Then, each sequence is transformed into continuous time-dependent subsequences by another smaller sliding window. The preprocessing of the two-stage sliding window can be considered as low-level temporal feature extraction, and we empirically prove that the preprocessing of the two-stage sliding window will be useful for high-level feature extraction in the integrated model. After data preprocessing, spatial and temporal features are extracted in CNN and recurrent autoencoder for the classification in fully connected networks. Empiric results show that the proposed model has better performances on multiple classification metrics and achieves preferable effect on anomaly detection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Intelligent Detection for Key Performance Indicators in Industrial-Based Cyber-Physical Systems.
- Author
-
He, Shiming, Li, Zhuozhou, Wang, Jin, and Xiong, Neal N.
- Abstract
Intelligent anomaly detection for key performance indicators (KPIs) is important for keeping services reliable in industrial-based cyber–physical systems (CPS). However, it is common in practice for various KPI sampling strategies to be utilized. We experimentally verify that anomaly detection is highly sensitive to irregular sampling, and accordingly go on to investigate low-cost anomaly detection for large-scale irregular KPIs. Irregular KPIs can be classified into four types: equal interval and unequal quantity (EIUQ) KPIs, unequal interval (UI) KPIs, unequal interval with equal duration (UIED) KPIs, and segmented irregular KPIs. In this article, we propose an anomaly detection framework based on these irregular types. Moreover, to handle the various lengths and phase shifts among EIUQ KPIs, we propose a normalized version of unequal cross-correlation, which slides the KPIs to enable finding the most similar position. To avoid high computational costs, we analyze the low-rank feature of KPIs data and propose a matrix factorization-based alignment algorithm for UIED KPIs; this algorithm treats UIED KPIs as an incomplete matrix and recovers the KPIs to align them before performing anomaly detection. Extensive simulations using three public datasets and two real-world datasets demonstrate that our algorithm can achieve a larger F1-score than Minkowski distance and less time than dynamic time warping distance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. Using Conditional Random Fields to Optimize a Self-Adaptive Bell–LaPadula Model in Control Systems.
- Author
-
Yang, Li, Wang, Jin, Tang, Zhuo, and Xiong, Neal N.
- Subjects
RANDOM fields ,ALGORITHMS ,ACCESS control ,FEATURE selection ,VITERBI decoding ,DYNAMIC models - Abstract
Once defined, the access control policies and regulations would never be changed in a running and state transition process. However, it will give attackers the possibility of discovering vulnerabilities in the system, and the control systems lack the ability of dynamic perception of security state and risk, causing the systems to be exposed to risks. In this article, a dynamic Bell–LaPadula (BLP) model is proposed. The conditional random field (CRF) is introduced into the BLP model to optimize the rules. First, the model formalizes the security attributes, states of system, transition rules, and constraint models on the basis of the state transition of CRFs. After the historical system access logs are processed as the original dataset, a feature selection method is proposed to extract the requests and current states as feature vectors. Second, this article presents a rules training algorithm based on L-BFGS to implement the study and training of datasets, and then marks the logs in the test set through Viterbi algorithm automatically. On the base of these, a rule generation algorithm is proposed to dynamically adjust the access control rules based on the current security status and events of the system. Third, the security of CRFs-BLP is proved by theoretical analysis. Finally, the validity and accuracy of the model are verified by estimating the value of the precision, recall, and $F1$ -score. As the system threats are shown to be decreased obviously from these experiments, this dynamic model can decrease the vulnerabilities and risk effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection.
- Author
-
Xia, Zhihua, Yuan, Chengsheng, Lv, Rui, Sun, Xingming, Xiong, Neal N., and Shi, Yun-Qing
- Subjects
DESCRIPTOR systems ,NEAR field communication ,BIOMETRIC identification ,SUPPORT vector machines ,BIOMETRIC fingerprinting ,WEBER-Fechner law ,MOBILE commerce - Abstract
In recent years, fingerprint authentication systems have been extensively deployed in various applications, including attendance systems, authentications on smartphones, mobile payment authorizations, as well as various safety certifications. However, similar to the other biometric identification technologies, fingerprint recognition is vulnerable to artificial replicas made from cheap materials, such as silicon, gelatin, etc. Thus, it is especially necessary to distinguish whether a given fingerprint is a live or a spoof one prior to such authentication. In order to solve the problems above, a novel local descriptor named Weber local binary descriptor for fingerprint liveness detection (FLD) has been proposed in this paper. The method consists of two components: the local binary differential excitation component that extracts intensity-variance features and the local binary gradient orientation component that extracts orientation features. The co-occurrence probability of the two components is calculated to construct a discriminative feature vector, which is fed into support vector machine (SVM) classifiers. The effectiveness of the proposed method is intuitively analyzed on the image samples and numerically demonstrated by Mahalanobis distance. Experiments are performed on two public databases from FLD competitions from 2011 and 2013. The results have proved that the proposed method obtains the best detection accuracy among the existing image local descriptors in FLD. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things.
- Author
-
Xia, Zhihua, Jiang, Leqi, Ma, Xiaohe, Yang, Wenyuan, Ji, Puzhao, and Xiong, Neal Naixue
- Abstract
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, and companies are highly motivated to store the data on cloud servers for cost saving and efficient application. However, the IIoT data are always of great value. The direct outsourcing of such data can leak the important information of the companies and cause great business losses. A straightforward solution is to encrypt the data by using standard encryption methods before outsourcing. Nevertheless, this will make data utilization quite inconvenient. This paper focuses on the secure process of image data on cloud servers. Images are stored on cloud servers in encrypted form, and the local binary pattern feature can be directly extracted from the encrypted images for applications. The security analysis and experimental results demonstrate the security and effectiveness of our scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.