40 results on '"Chen, Enhong"'
Search Results
2. The DEAD-box RNA helicase, DDX60, Suppresses immunotherapy and promotes malignant progression of pancreatic cancer
- Author
-
Lai, Tiantian, Su, Xiaowen, Chen, Enhong, Tao, Yue, Zhang, Shuo, Wang, Leisheng, Mao, Yong, and Hu, Hao
- Published
- 2023
- Full Text
- View/download PDF
3. Graph-based cognitive diagnosis for intelligent tutoring systems
- Author
-
Su, Yu, Cheng, Zeyu, Wu, Jinze, Dong, Yanmin, Huang, Zhenya, Wu, Le, Chen, Enhong, Wang, Shijin, and Xie, Fei
- Published
- 2022
- Full Text
- View/download PDF
4. Community hiding using a graph autoencoder
- Author
-
Liu, Dong, Chang, Zhengchao, Yang, Guoliang, and Chen, Enhong
- Published
- 2022
- Full Text
- View/download PDF
5. Detecting evolutionary stages of events on social media: A graph-kernel-based approach
- Author
-
Mu, Lin, Jin, Peiquan, Zhao, Jie, and Chen, Enhong
- Published
- 2021
- Full Text
- View/download PDF
6. A two-stage 3D CNN based learning method for spontaneous micro-expression recognition
- Author
-
Zhao, Sirui, Tao, Hanqing, Zhang, Yangsong, Xu, Tong, Zhang, Kun, Hao, Zhongkai, and Chen, Enhong
- Published
- 2021
- Full Text
- View/download PDF
7. Multiple graph kernel learning based on GMDH-type neural network
- Author
-
Xu, Lixiang, Bai, Lu, Xiao, Jin, Liu, Qi, Chen, Enhong, Wang, Xiaofeng, and Tang, Yuanyan
- Published
- 2021
- Full Text
- View/download PDF
8. A hybrid neural network for predicting Days on Market a measure of liquidity in real estate industry
- Author
-
Kamara, Amadu Fullah, Chen, Enhong, Liu, Qi, and Pan, Zhen
- Published
- 2020
- Full Text
- View/download PDF
9. A dummy-based user privacy protection approach for text information retrieval
- Author
-
Wu, Zongda, Shen, Shigen, Lian, Xinze, Su, Xinning, and Chen, Enhong
- Published
- 2020
- Full Text
- View/download PDF
10. Combining contextual neural networks for time series classification
- Author
-
Fullah Kamara, Amadu, Chen, Enhong, Liu, Qi, and Pan, Zhen
- Published
- 2020
- Full Text
- View/download PDF
11. An empirical analysis on the behavioral differentia of the “Elite-Civilian” users in Sina microblog
- Author
-
Li, Kai, Lv, Tianyang, Shen, Huawei, Qiao, Lisheng, Chen, Enhong, Cheng, Xueqi, and Sun, Zhi
- Published
- 2020
- Full Text
- View/download PDF
12. Position-wise contextual advertising: Placing relevant ads at appropriate positions of a web page
- Author
-
Wu, Zongda, Xu, Guandong, Lu, Chenglang, Chen, Enhong, Zhang, Yanchun, and Zhang, Hong
- Published
- 2013
- Full Text
- View/download PDF
13. Executing SQL queries over encrypted character strings in the Database-As-Service model
- Author
-
Wu, ZongDa, Xu, GuanDong, Yu, Zong, Yi, Xun, Chen, EnHong, and Zhang, YanChun
- Published
- 2012
- Full Text
- View/download PDF
14. Capturing correlations of multiple labels: A generative probabilistic model for multi-label learning
- Author
-
Ma, Haiping, Chen, Enhong, Xu, Linli, and Xiong, Hui
- Published
- 2012
- Full Text
- View/download PDF
15. Profit-based scheduling and channel allocation for multi-item requests in real-time on-demand data broadcast systems
- Author
-
Lv, Jingsong, Lee, Victor C.S., Li, Minming, and Chen, Enhong
- Published
- 2012
- Full Text
- View/download PDF
16. Single and multiple device DSA problems, complexities and online algorithms
- Author
-
Wu, Weiwei, Li, Minming, Tian, Wanyong, Xue, Jason Chun, and Chen, Enhong
- Published
- 2012
- Full Text
- View/download PDF
17. Min-energy scheduling for aligned jobs in accelerate model
- Author
-
Wu, Weiwei, Li, Minming, and Chen, Enhong
- Published
- 2011
- Full Text
- View/download PDF
18. Energy optimal schedules for jobs with multiple active intervals
- Author
-
Tian, Wanyong, Li, Minming, and Chen, Enhong
- Published
- 2010
- Full Text
- View/download PDF
19. Optimal tree structures for group key tree management considering insertion and deletion cost
- Author
-
Wu, Weiwei, Li, Minming, and Chen, Enhong
- Published
- 2009
- Full Text
- View/download PDF
20. An ensemble of a boosted hybrid of deep learning models and technical analysis for forecasting stock prices.
- Author
-
Kamara, Amadu Fullah, Chen, Enhong, and Pan, Zhen
- Subjects
- *
STOCK price forecasting , *DEEP learning , *MOVING average process , *STOCK prices , *STOCK exchanges , *BLENDED learning - Abstract
For several years the modeling as well as forecasting of the prices of stocks have been extremely challenging for the business community and researchers as a result of the existence of noise in samples and also the non-stationary behaviour of information samples. Notwithstanding these drawbacks with improved deep learning, it is now possible to design schemes that will efficiently perform the feature learning task. For this work, we proposed a brand-new end to end algorithm labeled EHTS toward solving the stock price forecasting problem. The AB - CNN and CB - LSTM modules extract features from the stock price dataset and soon after amalgamating the results. Thus, the output of the concatenation stage was feed into the concluding stage which is a stand-alone MLP module. The inclusion of the LSTM and Attention Mechanism in our architecture is to extract long-range and exceptionally long-term stock price information. We experiment the proposed algorithm on two popular stocks both from the NYSE stock market namely "Johnson & Johnson" code-named, " JNJ " and the Bank of America (BAC). In terms of the rMSE, MAE and MAPE error metrics, our proposed scheme gives the lowest error value in all for all datasets. Also, five percentage training window sizes are experimented and EHTS outperforms all the baseline schemes for the different window sizes in all the two datasets with the 70% window size having the highest performance. In terms of number of epochs, EHTS uses the lowest number of epochs for training than the other schemes in all the datasets. Finally, we as well study our stock's information to point out short-range trading opportunities by performing simulations on our stock price data. The metrics considered in the simulation are as follows: Moving Average (MA), Moving Average Convergence Divergence (MACD) curve, MACD histogram, Signal line, Relative Strength Index (RSI), Returns (R), Annual Returns (AR), Sharpe Ratio (SR), Annual Volatility (V), Maximum DrawDown (MDD) and Daily WinningRate (DWR). For all the aforementioned metrics, EHTS performs better than the baselines. Experimental results revealed that our proposed scheme outperformed the stand-alone deep learning schemes, statistical algorithms, and machine learning models from the beginning to the end. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. A semantic term weighting scheme for text categorization
- Author
-
Luo, Qiming, Chen, Enhong, and Xiong, Hui
- Subjects
- *
SEMANTIC computing , *TEXT mining , *INFORMATION technology , *EXPERT systems , *ARTIFICIAL intelligence , *DATA analysis - Abstract
Abstract: Traditional term weighting schemes in text categorization, such as TF-IDF, only exploit the statistical information of terms in documents. Instead, in this paper, we propose a novel term weighting scheme by exploiting the semantics of categories and indexing terms. Specifically, the semantics of categories are represented by senses of terms appearing in the category labels as well as the interpretation of them by WordNet. Also, the weight of a term is correlated to its semantic similarity with a category. Experimental results on three commonly used data sets show that the proposed approach outperforms TF-IDF in the cases that the amount of training data is small or the content of documents is focused on well-defined categories. In addition, the proposed approach compares favorably with two previous studies. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
22. Efficient strategies for tough aggregate constraint-based sequential pattern mining
- Author
-
Chen, Enhong, Cao, Huanhuan, Li, Qing, and Qian, Tieyun
- Subjects
- *
ALGORITHMS , *INFORMATION science , *COMMUNICATION , *ALGEBRA - Abstract
Abstract: Frequent sequential pattern mining with constraints is the task of discovering patterns by incorporating the user defined constraints into the mining process, thus not only improving mining efficiency but also making the discovered patterns to better meet user requirements. Though many studies have been done, few have been carried out on the “tough aggregate constraints” due to the diffIculty of pushing the constraints into the mining process. In this paper we provide efficient strategies to deal with tough aggregate constraints. Through a theoretical analysis of the tough aggregate constraints based on the concept of total contribution of sequences, we first show that two typical kinds of constraints can be transformed into the same form and thus can be processed in a uniform way. We then propose a novel algorithm called PTAC (sequential frequent Patterns mining with Tough Aggregate Constraints) to reduce the cost of using tough aggregate constraints through incorporating two effective strategies. One avoids checking data items one by one by utilizing the features of promisingness exhibited by some other items and validity of the corresponding prefix. The other avoids constructing an unnecessary projected database through effectively pruning those unpromising new patterns that may, otherwise, serve as new prefixes. With these strategies, our algorithm obtains good performance in speed and space, as demonstrated by experimental studies conducted on the synthetic datasets generated by the IBM sequence generator, in addition to a real dataset. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
23. Communication-efficient federated learning with stagewise training strategy.
- Author
-
Cheng, Yifei, Shen, Shuheng, Liang, Xianfeng, Liu, Jingchang, Chen, Joya, Zhang, Tie, and Chen, Enhong
- Subjects
- *
OPTIMIZATION algorithms , *TELECOMMUNICATION employees , *DATA distribution , *COMMUNICATION strategies - Abstract
The efficiency of communication across workers is a significant factor that affects the performance of federated learning. Though periodic communication strategy is applied to reduce communication rounds in training, the communication cost is still high when the training data distributions are not independently and identically distributed (non-IID) which is common in federated learning. Recently, some works introduce variance reduction to eliminate the effect caused by non-IID data among workers. Nevertheless the provable optimal communication complexity O (log (S T)) and convergence rate O (1 / (S T)) cannot be achieved simultaneously, where S denotes the number of sampled workers in each round and T is the number of iterations. To deal with this dilemma, we propose an optimization algorithm SQUARFA that adopts stagewise training framework coupling with variance reduction and uses a quick-start phase in each loop. Theoretical results show that SQUARFA achieves both optimal convergence rate and communication complexity for both strongly convex objectives and non-convex objectives under PL condition, thus fills the gap mentioned above. Then, a variant of SQUARFA yields the optimal theoretical results for general non-convex objectives. We further extend the technique in SQUARFA to the large batch setting and achieve optimal communication complexity. Experimental results demonstrate the superiority of the proposed algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. ME-PLAN: A deep prototypical learning with local attention network for dynamic micro-expression recognition.
- Author
-
Zhao, Sirui, Tang, Huaying, Liu, Shifeng, Zhang, Yangsong, Wang, Hao, Xu, Tong, Chen, Enhong, and Guan, Cuntai
- Subjects
- *
DEEP learning , *FACIAL expression , *LIE detectors & detection , *MACHINE learning , *PSYCHOLOGICAL stress , *HEALING - Abstract
As one of the important psychological stress reactions, Micro-expressions (MEs) are spontaneous and subtle facial movements, which usually occur in a high-stake situation and can reveal genuine human feelings and cognition. ME, Recognition (MER) has essential applications in many fields such as lie detection, criminal investigation, and psychological healing. However, due to the challenges of learning discriminative ME features via fleeting facial subtle reactions as well as the shortage of available MEs data, this research topic is still far from well-studied. To this end, in this paper, we propose a deep prototypical learning framework, namely ME-PLAN, with a local attention mechanism for the MER problem. Specifically, ME-PLAN consists of two components, i.e., a 3D residual prototypical network and a local-wise attention module, where the former aims to learn the precise ME feature prototypes through expression-related knowledge transfer and episodic training, and the latter could facilitate the attention to the local facial movements. Furthermore, to alleviate the dilemma that most MER methods need to depend on manually annotated apex frames, we propose an apex frame spotting method with Unimodal Pattern Constrained (UPC) and further extract ME key-frames sequences based on the detected apex frames to train our proposed ME-PLAN in an end-to-end manner. Finally, through extensive experiments and interpretable analysis regarding the apex frame spotting and MER on composite-database, we demonstrate the superiority and effectiveness of the proposed methods. • We explore deep prototypical learning for the MER problem, and try to address three challenges in this topic. • We propose a novel deep prototypical learning framework, namely ME-PLAN, using a 3D residual prototypical network with episodic training and a local-wise attention module to learn precise ME representation. • A novel apex frame spotting method based on Unimodal Pattern Constraint is proposed to effectively eliminate noise interference and accurately locate apex frames. • Extensive experimental results with a comparison of state-of-the-art methods have demonstrated the effectiveness of our ME-PLAN on apex frame spotting and MER tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Learning recency based comparative choice towards point-of-interest recommendation.
- Author
-
Li, Xin, Xu, Guandong, Chen, Enhong, and Zong, Yu
- Subjects
- *
MACHINE learning , *RECOMMENDER systems , *GLOBAL Positioning System , *SMARTPHONES , *ONLINE social networks , *WINDOWS (Graphical user interfaces) - Abstract
With the prevalence of GPS-enabled smart phones, Location Based Social Network (LBSN) has emerged and become a hot research topic during the past few years. As one of the most important components in LBSN, Points-of-Interests (POIs) has been extensively studied by both academia and industry, yielding POI recommendations to enhance user experience in exploring the city. In conventional methods, rating vectors for both users and POIs are utilized for similarity calculation, which might yield inaccuracy due to the differences of user biases. In our opinion, the rating values themselves do not give exact preferences of users, however the numeric order of ratings given by a user within a certain period provides a hint of preference order of POIs by such user. Firstly, we propose an approach to model users preference by employing utility theory. Secondly, We devise a collection-wise learning method over partial orders through an effective stochastic gradient descent algorithm. We test our model on two real world datasets, i.e., Yelp and TripAdvisor, by comparing with some state-of-the-art approaches including PMF and several user preference modeling methods. In terms of MAP and Recall, we averagely achieve 15% improvement with regard to the baseline methods. The results show the significance of comparative choice in a certain time window and show its superiority to the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
26. Hiding ourselves from community detection through genetic algorithms.
- Author
-
Liu, Dong, Chang, Zhengchao, Yang, Guoliang, and Chen, Enhong
- Subjects
- *
COMMUNITIES , *GENETIC algorithms , *SOCIAL networks - Abstract
• A method of personal privacy protection is proposed. • A genetic algorithm for community hiding is proposed. • A community hiding algorithm based on genetic algorithms using NMI is designed. Community structure plays an important role in social networks, which can reveal potential social relationships and deliver vast economic benefits to enterprises and organizations. Many efficient community detection algorithms have been proposed by researchers. However, effective community detection algorithms are accompanied by a growing problem of privacy disclosure. People have started to worry that their private information will be overexposed by community detection algorithms, so determining how to hide the community structure in the network to resist community detection algorithms has become an important issues. In view of this, we develop effective strategies to attack community detection algorithms through invisible disturbances to the network, namely, adding and removing a small number of connections, thus achieving privacy protection. In particular, a hiding strategy named "community hiding based on genetic algorithms using NMI (CGN)" is proposed in this paper. The algorithm uses normalized mutual information (NMI) as the fitness function and achieves an efficient global hiding effect by introducing a gene pool with prior information. We launched attacks based on CGN against four community detection algorithms on multiple real-world networks. By comparing with several state-of-the-art baseline algorithms, our CGN achieved the optimal results in NMI reduction. By visualizing the attack effect, it is proven that our CGN can achieve the community division error of nodes irrelevant to the connection changes by changing a very small number of connections, which fully reflects the concealment of community hiding. In addition, we further test the transferability and find that the modified network obtained by CGN on a specific community detection algorithm also shows extraordinary hiding effects when extended to other algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. Revisiting bound estimation of pattern measures: A generic framework.
- Author
-
Zhang, Lei, Luo, Ping, Chen, Enhong, and Wang, Min
- Subjects
- *
ESTIMATION theory , *PATTERN recognition systems , *DATA mining , *SEMANTICS , *PERFORMANCE evaluation - Abstract
It is widely recognized that constrained pattern mining helps in the capture of a relatively large amount of semantics among different applications, and thus, increases the effectiveness of mining. One major challenge in this field is how the properties of pattern measures can be pushed deeply into the mining process to achieve improved efficiency. The usual solution to this challenge is to estimate the bound of a given pattern measure, PM , for all the supersets of an itemset, X . However, in most previous studies, the authors estimated the bounds for their proposed pattern measures individually and a generic and unified framework that is applicable to any pattern measure has not been proposed. To this end, we revisit the problem of bound estimation and propose a general framework for it by summarizing the commonality among the estimation methods for different pattern measures. The basic idea is to maximize (or minimize) the measures by assigning any item labels to the items in the original supporting transactions. To achieve a balance between bound tightness and computational efficiency, we also propose techniques for addressing this tradeoff issue in order to improve the overall performance. As a case study, we applied this framework to two typical pattern measures: utility and occupancy . Additionally, we describe the application of our proposed techniques to other measures. The results of our extensive experimental evaluation on real and large synthetic datasets demonstrate the effectiveness of our proposed techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
28. IODRNN - Incremental output decomposition for a valid traffic flow prediction with GNSS data.
- Author
-
Lu, Yihang, meng, Xianwei, Peng, Liqun, Xu, Shucai, and chen, Enhong
- Subjects
- *
TRAFFIC flow , *GLOBAL Positioning System , *RECURRENT neural networks , *INTELLIGENT transportation systems - Abstract
Traffic flow prediction, a crucial application of intelligent transportation systems (ITS), has become an increasingly prevalent research topic. However, existing models that achieved high prediction accuracy on selected metrics may suffer from time delay in prediction curves which has been rarely explored. These models may produce seemingly accurate but invalid predictions by merely tracking and replicating previous true values. To address this anomaly, we propose a highly interpretable prediction mechanism, the Incremental Output Decomposition Recurrent Neural Network (IODRNN). We also introduce a new metric called Shift Divergence Difference (SDD) to assess the degree of latency of the overall sequence and evaluate the effectiveness of IODRNN in reducing the delay phenomenon. Our experimental results using real-world GNSS traffic data show that IODRNN has the smallest degree of latency and improves MAE and RMSE by 16.8% and 17.4% on average, respectively, over most contrast models. Our study presents an effective approach to evaluate prediction latency, ensuring validity and robustness in traffic prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. A Structure-Enriched Neural Network for network embedding.
- Author
-
Qiao, Lisheng, Zhao, Hongke, Huang, Xiaohui, Li, Kai, and Chen, Enhong
- Subjects
- *
ARTIFICIAL neural networks , *EMBEDDINGS (Mathematics) , *PARAMETER estimation , *INFORMATION theory , *NATURAL language processing - Abstract
Highlights • A structure-enriched framework for network embedding from a holistic perspective. • Introducing the direction tuning parameters into multi-order transition matrices. • Using the denoise autoencoder to do the dimension reduction of multi-order matrices. • Employing the method with attention mechanism to combine multi-order information. Abstract Recent years have witnessed the importance of network embedding in many fields, as well as increased attention in academia. Although a number of algorithms have been proposed in this area, most existing models which only utilize the structure topology information of networks often suffer performance losses because of their insufficiency with regard to selecting structure similar patterns, handling noise data, and/or capturing non-linear or high-order structure information. To address these challenges, in this paper, we present a novel S tructure- E nriched N eural N etwork (SENN) for network embedding. Specifically, SENN can not only capture the complex structure similar patterns observed in networks by introducing direction adjustment parameters of the transition probability, but also introduce a stacked denoise autoencoder to perform the dimension reduction for each order matrix independently. Therefore, SENN can preserve more useful structure information and make the embeddings more robust. Moreover, SENN can effectively integrate the multi-order structure information by the combining layer with attention mechanism. Finally, to compare with other state-of-the-art methods, we conduct extensive experiments with both synthetic and real-world datasets on various tasks (e.g.,node classification, visualization). The experimental results clearly demonstrate the effectiveness of our proposed model for network embedding. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
30. A topic modeling based approach to novel document automatic summarization.
- Author
-
Wu, Zongda, Lei, Li, Li, Guiling, Huang, Hui, Zheng, Chengren, Chen, Enhong, and Xu, Guandong
- Subjects
- *
AUTOMATIC summarization , *DOCUMENTATION , *DATA compression , *READABILITY formulas , *SEMANTICS , *BIG data - Abstract
Most of existing text automatic summarization algorithms are targeted for multi-documents of relatively short length, thus difficult to be applied immediately to novel documents of structure freedom and long length. In this paper, aiming at novel documents, we propose a topic modeling based approach to extractive automatic summarization, so as to achieve a good balance among compression ratio, summarization quality and machine readability. First, based on topic modeling, we extract the candidate sentences associated with topic words from a preprocessed novel document. Second, with the goals of compression ratio and topic diversity, we design an importance evaluation function to select the most important sentences from the candidate sentences and thus generate an initial novel summary. Finally, we smooth the initial summary to overcome the semantic confusion caused by ambiguous or synonymous words, so as to improve the summary readability. We evaluate experimentally our proposed approach on a real novel dataset. The experiment results show that compared to those from other candidate algorithms, each automatic summary generated by our approach has not only a higher compression ratio, but also better summarization quality. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
31. Efficient karaoke song recommendation via multiple kernel learning approximation.
- Author
-
Guan, Chu, Fu, Yanjie, Lu, Xinjiang, Chen, Enhong, Li, Xiaolin, and Xiong, Hui
- Subjects
- *
KARAOKE , *APPROXIMATION theory , *RECOMMENDER systems , *DIVERGENCE theorem , *MACHINE learning - Abstract
Online karaoke allows users to practice singing and distribute recordings. Different from traditional music recommendation, online karaoke need to consider users’ vocal competence besides their tastes. In this paper, we develop a karaoke recommender system by taking into account vocal competence. Alone this line, we propose a joint modeling method named MKLA by adopting bregman divergence as the regularizer in the formulation of multiple kernel learning. Specially, we first extract users’ vocal ratings from their singing recordings. Due to an ever-increasing number of recordings, the evaluations in large-scale kernel matrix may cost lots of time and internal storage. Therefore, we propose a sample compression method to eliminate users’ vocal ratings, exploit an MKL method, and learn the latent features of the vocal ratings. These latent features are simultaneously fed into a bregman divergence and then we use the trained classifier to predict the overall rating of a user with respect to a song. Enhanced by this new formulation, we develop the SMO method for optimizing the MKLA dual and present a theoretical analysis to show the lower bound of our method. With the estimated model, we compute the matching degree of users and songs in terms of pitch, volume and rhythm and recommend songs to users. Finally, we conduct extensive experiments with online karaoke data. The results demonstrate the effectiveness of our method. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
32. Finding potential lenders in P2P lending: A Hybrid Random Walk Approach.
- Author
-
Zhang, Hefu, Zhao, Hongke, Liu, Qi, Xu, Tong, Chen, Enhong, and Huang, Xunpeng
- Subjects
- *
PEER-to-peer lending , *RANDOM walks , *ONLINE data processing , *INFORMATION filtering , *RECOMMENDER systems , *BIG data - Abstract
P2P lending is a burgeoning online service that allows individuals to directly borrow money from each other. In these platforms, each loan has a specific duration for raising money from lenders. Following the “all-or-nothing” rule, many loans fail due to insufficient pledges/money in their funding durations. Thus, automatically accessing and finding potential lenders early is crucial for loans. However, this problem has some unique challenges (e.g., the temporality of loan) that are still being explored. To that end, in this paper, we present a holistic study on finding potential lenders in P2P lending. Specifically, we propose a hybrid random walk approach, i.e., RWH , by combining both collaborative filtering and content-based filtering, which can be adapted to loans at any funding progress (e.g., the starting progress). In the content-based filtering of RWH , the model extract dynamic features and adopt bagging to estimate the similarity between loans. Further more, to adapt to the loan temporality, RWH is dynamically established with temporal loans and lenders via a sliding window. Finally, we systematically evaluate our method on large-scale real-world datasets. The experimental results clearly demonstrate the effectiveness and robustness of our solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. Residual objectness for imbalance reduction.
- Author
-
Chen, Joya, Liu, Dong, Luo, Bin, Peng, Xuezheng, Xu, Tong, and Chen, Enhong
- Published
- 2022
- Full Text
- View/download PDF
34. An efficient Wikipedia semantic matching approach to text document classification.
- Author
-
Wu, Zongda, Zhu, Hui, Li, Guiling, Cui, Zongmin, Huang, Hui, Li, Jun, Chen, Enhong, and Xu, Guandong
- Subjects
- *
CLASSIFICATION , *SEMANTICS , *HEURISTIC algorithms , *DOCUMENT classification (Electronic documents) , *MATCHING theory - Abstract
A traditional classification approach based on keyword matching represents each text document as a set of keywords, without considering the semantic information, thereby, reducing the accuracy of classification. To solve this problem, a new classification approach based on Wikipedia matching was proposed, which represents each document as a concept vector in the Wikipedia semantic space so as to understand the text semantics, and has been demonstrated to improve the accuracy of classification. However, the immense Wikipedia semantic space greatly reduces the generation efficiency of a concept vector, resulting in a negative impact on the availability of the approach in an online environment. In this paper, we propose an efficient Wikipedia semantic matching approach to document classification. First, we define several heuristic selection rules to quickly pick out related concepts for a document from the Wikipedia semantic space, making it no longer necessary to match all the concepts in the semantic space, thus greatly improving the generation efficiency of the concept vector. Second, based on the semantic representation of each text document, we compute the similarity between documents so as to accurately classify the documents. Finally, evaluation experiments demonstrate the effectiveness of our approach, i.e., which can improve the classification efficiency of the Wikipedia matching under the precondition of not compromising the classification accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
35. Constructing plausible innocuous pseudo queries to protect user query intention.
- Author
-
Wu, Zongda, Shi, Jie, Lu, Chenglang, Chen, Enhong, Xu, Guandong, Li, Guiling, Xie, Sihong, and Yu, Philip S.
- Subjects
- *
SEARCH engines , *COMPUTER software , *INTERNET searching , *MATHEMATICAL models , *MATHEMATICAL optimization - Abstract
Users of web search engines are increasingly worried that their query activities may expose what topics they are interested in, and in turn, compromise their privacy. It would be desirable for a search engine to protect the true query intention for users without compromising the precision-recall performance. In this paper, we propose a client-based approach to address this problem. The basic idea is to issue plausible but innocuous pseudo queries together with a user query, so as to mask the user intention. First, we present a privacy model which formulates plausibility and innocuousness, and then the requirements which should be satisfied to ensure that the user intention is protected against a search engine effectively. Second, based on a semantic reference space derived from Wikipedia, we propose an approach to construct a group of pseudo queries that exhibit similar characteristic distribution as a given user query, but point to irrelevant topics, so as to meet the security requirements defined by the privacy model. Finally, we conduct extensive experimental evaluations to demonstrate the practicality and effectiveness of our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
36. Estimating fund-raising performance for start-up projects from a market graph perspective.
- Author
-
Wu, Likang, Li, Zhi, Zhao, Hongke, Liu, Qi, and Chen, Enhong
- Subjects
- *
FUNDRAISING , *INTERNET marketing , *ALGORITHMS , *MARKETING models - Abstract
• Modeling the market evolution for start-up projects via a graph-based model. • Modeling the competitiveness pressure by aggregating funding states of rivals. • Propagation tree structure with hierarchical updating can track the market evolution. • The proposed model achieved the best result compared with all powerful baselines. In the online innovation market, the fund-raising performance of the start-up project is a concerning issue for creators, investors and platforms. Unfortunately, existing studies always focus on modeling the fund-raising process after the publishment of a project but the predicting of a project attraction in the market before setting up is largely unexploited. Usually, this prediction is always with great challenges to making a comprehensive understanding of both the start-up project and market environment. To that end, in this paper, we present a focused study on this important problem from a market graph perspective. Specifically, we propose a Graph-based Market Environment (GME) model for predicting the fund-raising performance of the unpublished project by exploiting the market environment. In addition, we discriminatively model the project competitiveness and market preferences by designing two graph-based neural network architectures and incorporating them into a joint optimization stage. Furthermore, to explore the information propagation problem with dynamic environment in a large-scale market graph, we extend the GME model with parallelizing competitiveness quantification and hierarchical propagation algorithm. Finally, we conduct extensive experiments on real-world data. The experimental results clearly demonstrate the effectiveness of our proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Semi-supervised multi-Layer convolution kernel learning in credit evaluation.
- Author
-
Xu, Lixiang, Cui, Lixin, Weise, Thomas, Li, Xinlu, Wu, Zhize, Nie, Feiping, Chen, Enhong, and Tang, Yuanyan
- Subjects
- *
DEEP learning , *SUPPORT vector machines , *CREDIT analysis , *DIFFERENTIAL operators , *ALGORITHMS - Abstract
• We analyze the basic solution of a generalized differential operator. • We give a class of convolution kernel function. • We propose a semi-supervised multi-layer convolution kernel SVM algorithm. • We define two semi-supervised methods: SSMCK-MKL and SSMCK-AO. In many practical credit evaluation problems, a lot of manpower as well as financial and material resources are required to label samples. Therefore, in the process of labeling, only a small number of samples with category labels can be obtained to train classification models and a large number of customer samples is abandoned without category labels. To solve this problem, we introduce a semi-supervised support vector machine (SVM) technology and combines it with a multi-layer convolution kernel to construct a semi-supervised multi-layer convolution kernel SVM (SSMCK) for category customer credit assessment data sets. We first use a basic solution of the generalized differential operator to generate a base convolution kernel function in the H 1 space, and then use the multi-layer strategy of deep learning to construct the multi-layer convolution kernel in the H 2 and H 3 space (called the family of multi-layer convolution kernel) by using the kernel functions in the H 1 space. We further propose a semi-supervised multi-layer convolution kernel SVM algorithm based on the category center estimation and develop two novel SSMCK methods to improve the classification ability: the SSMCK based on multi-kernel learning (SSMCK-MKL) and the SSMCK based on alternative optimization (SSMCK-AO). Finally, experimental verification and analysis is carried out on three customer credit evaluation data sets. The results show that our methods outperforms or are comparable to some the state-of-the-art credit evaluation models. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
38. Effects of sodium fluoride on the actin cytoskeleton of murine ameloblasts
- Author
-
Li, Yong, Decker, Sylvia, Yuan, Zhi-an, DenBesten, Pamela K., Aragon, Melissa A., Jordan-Sciutto, Kelly, Abrams, William R., Huh, Jung, McDonald, Celeste, Chen, Enhong, MacDougall, Mary, and Gibson, Carolyn W.
- Subjects
- *
SODIUM fluoride , *CYTOSKELETON , *PROTEINS , *MEMBRANE proteins - Abstract
Summary: Fluoride is associated with a decrease in the incidence of dental caries, but excess fluoride can lead to enamel fluorosis, a defect that occurs during tooth enamel formation. In fibroblasts, the Arhgap gene encodes a RhoGAP, which regulates the small G protein designated RhoA. Fluoride treatment of fibroblasts inactivates RhoGAP, thereby activating RhoA, which leads to elevation of filamentous actin (F-actin). Since RhoA is a molecular switch, our hypothesis is that in ameloblasts, fluoride may alter the cytoskeleton through interference with the Rho signaling pathway. Our objective was to measure the effects of sodium fluoride on F-actin using tooth organ culture and confocal microscopy. The results indicated that cellular responses to fluoride include elevation of F-actin in ameloblasts. It was concluded from immunohistochemistry, RT-PCR and confocal approaches that the components of the Rho pathway are present in ameloblasts, and that the response to fluoride involves the Rho/ROCK pathway. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
39. On the strength of hyperclique patterns for text categorization
- Author
-
Qian, Tieyun, Xiong, Hui, Wang, Yuanzhen, and Chen, Enhong
- Subjects
- *
CLIQUES (Sociology) , *ASSOCIATIONS, institutions, etc. , *RULES , *ALGORITHMS - Abstract
Abstract: The use of association patterns for text categorization has attracted great interest and a variety of useful methods have been developed. However, the key characteristics of pattern-based text categorization remain unclear. Indeed, there are still no concrete answers for the following two questions: Firstly, what kind of association pattern is the best candidate for pattern-based text categorization? Secondly, what is the most desirable way to use patterns for text categorization? In this paper, we focus on answering the above two questions. More specifically, we show that hyperclique patterns are more desirable than frequent patterns for text categorization. Along this line, we develop an algorithm for text categorization using hyperclique patterns. As demonstrated by our experimental results on various real-world text documents, our method provides much better computational performance than state-of-the-art methods while retaining classification accuracy. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
40. Probabilistic SVM classifier ensemble selection based on GMDH-type neural network.
- Author
-
Xu, Lixiang, Wang, Xiaofeng, Bai, Lu, Xiao, Jin, Liu, Qi, Chen, Enhong, Jiang, Xiaoyi, and Luo, Bin
- Subjects
- *
SUPPORT vector machines , *LEARNING ability , *DATA mining - Abstract
• We propose a standardized symmetric regularity criterion. • We define a novel structure of initial model of GMDH. • We use probabilistic SVM as base learner and integrate the SVM with GMDH. • We design a special classifier ensemble selection approach named GMDH-PSVM. • Our method may obtain good classification results. Support vector machine (SVM) provides a good classification and regression ability, especially, for small sample learning. However, in practice, the learning ability of implemented SVM is occasionally far from the expected level. Group method of data handling neural network (GMDH-NN) has been applied in various fields for pattern recognition and data mining. It makes it possible to automatically find interrelations in data, to select an optimal structure of network or model and to improve the accuracy of existing algorithms. In this work we propose to take the advantages of GMDH-NN for further increasing the classification performance of SVM. One weakness of the symmetric regularity criterion of GMDH-NN is that if one of the input attributes has a relatively big range, then it may overcome the other attributes. Thus, we first define a standardized symmetric regularity criterion (SSRC) to evaluate and select the candidate models, and optimize a classifier ensemble selection approach. Secondly, we define a novel structure of initial model of GMDH-NN which is from the posterior probability outputs of SVMs. These probabilistic outputs are generated from the improved Platt's probabilistic outputs. Thirdly, in real classification tasks, different classifiers usually have different classification advantages. So we use probabilistic SVM as base learner and integrate the probabilistic SVMs with GMDH-NN, and then propose a special classifier ensemble selection approach for probabilistic SVM classifiers based on GMDH-NN called GMDH-PSVM. Moreover, we use the Borda sorting and Random weighted Borda sorting to discuss the results of our experiments. Experiments on standard UCI datasets demonstrate the effectiveness of our method. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.