no code implementations • COLING 2022 • Yao Dong, Lei Wang, Ji Xiang, Xiaobo Guo, Yuqiang Xie
Knowledge graph embedding, which aims to learn representations of entities and relations in knowledge graphs, finds applications in various downstream tasks.
no code implementations • 12 Oct 2022 • Haotian Wu, Peipei Wang, Xin Wang, Ji Xiang, Rui Gong
The compression of videos on social media has destroyed some pixel details that could be used to detect forgeries.
no code implementations • 31 May 2022 • Gaode Chen, Yijun Su, Xinghua Zhang, Anmin Hu, Guochun Chen, Siyuan Feng, Ji Xiang, Junbo Zhang, Yu Zheng
To address the above challenging problems, we propose a novel Cross-city Federated Transfer Learning framework (CcFTL) to cope with the data insufficiency and privacy problems.
1 code implementation • 7 Jun 2021 • Gaode Chen, Xinghua Zhang, Yanyan Zhao, Cong Xue, Ji Xiang
Meanwhile, an ingenious graph is proposed to enhance the interactivity between items in user's behavior sequence, which can capture both global and local item features.
1 code implementation • IEEE International Joint Conference on Neural Network 2020 • Yijun Su, Jia-Dong Zhang, Xiang Li, Daren Zha, Ji Xiang, Wei Tang, and Neng Gao
Recent studies mainly utilize social information, categorical information and/or geographical information to supplement the highly sparse check-in data.
1 code implementation • IEEE International Conference on Communications 2020 • Yijun Su, Xiang Li, Baoping Liu, Daren Zha, Ji Xiang, Wei Tang and Neng Gao.
With the popularity of location-based social networks (LBSNs), Point-of-Interest (POI) recommendation has become an essential location-based service to help people explore novel locations.
no code implementations • 16 Apr 2020 • Xiao Chen, Yanjun Li, Arman Goudarzi, Ji Xiang
This paper models a class of hierarchical cyber-physical systems and studies its associated consensus problem.
1 code implementation • IEEE International Conference on Mobile Data Management (MDM) 2018 • Yijun Su, Xiang Li, Wei Tang, Ji Xiang, Yuanye He
In this paper, we propose a unified location prediction framework to integrate the effect of history check-in and the influence of social circles.
no code implementations • 19 Jun 2017 • Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang
In particular, at a negotiated time slot, a customer is required to reboot the compromised device, then a "white" Mirai operated by the manufacturer breaks into the clean-state IoT devices immediately.
Cryptography and Security