no code implementations • 11 Mar 2023 • Muyang Li, Zijian Zhang, Xiangyu Zhao, Wanyu Wang, Minghao Zhao, Runze Wu, Ruocheng Guo
Sequential recommender systems aim to predict users' next interested item given their historical interactions.
no code implementations • 17 Feb 2023 • Shengqin Wang, Yongji Zhang, Hong Qi, Minghao Zhao, Yu Jiang
With multiple spatial static hypergraphs and dynamic TPH, our network can learn more complete spatial-temporal features.
1 code implementation • 31 May 2022 • Shengqin Wang, Yongji Zhang, Minghao Zhao, Hong Qi, Kai Wang, Fenglin Wei, Yu Jiang
Skeleton-based action recognition methods are limited by the semantic extraction of spatio-temporal skeletal maps.
Ranked #7 on Skeleton Based Action Recognition on N-UCLA
1 code implementation • 26 Apr 2022 • Minghao Zhao, Le Wu, Yile Liang, Lei Chen, Jian Zhang, Qilin Deng, Kai Wang, Xudong Shen, Tangjie Lv, Runze Wu
While conventional CF models are known for facing the challenges of the popularity bias that favors popular items, one may wonder "Whether the existing graph-based CF models alleviate or exacerbate popularity bias of recommender systems?"
no code implementations • 25 Apr 2022 • Muyang Li, Xiangyu Zhao, Chuan Lyu, Minghao Zhao, Runze Wu, Ruocheng Guo
In addition, most existing works assume that such sequential dependencies exist solely in the item embeddings, but neglect their existence among the item features.
1 code implementation • 18 Oct 2021 • Kai Wang, Zhene Zou, Minghao Zhao, Qilin Deng, Yue Shang, Yile Liang, Runze Wu, Xudong Shen, Tangjie Lyu, Changjie Fan
In summary, the RL4RS (Reinforcement Learning for Recommender Systems), a new resource with special concerns on the reality gaps, contains two real-world datasets, data understanding tools, tuned simulation environments, related advanced RL baselines, batch RL baselines, and counterfactual policy evaluation algorithms.
no code implementations • 29 Apr 2021 • Zhiyuan Wu, Yu Jiang, Minghao Zhao, Chupeng Cui, Zongmin Yang, Xinhui Xue, Hong Qi
To further improve the robustness of the student, we extend SD to Enhanced Spirit Distillation (ESD) in exploiting a more comprehensive knowledge by introducing the proximity domain which is similar to the target domain for feature extraction.
no code implementations • 12 Apr 2021 • Qilin Deng, Kai Wang, Minghao Zhao, Zhene Zou, Runze Wu, Jianrong Tao, Changjie Fan, Liang Chen
In business domains, \textit{bundling} is one of the most important marketing strategies to conduct product promotions, which is commonly used in online e-commerce and offline retailers.
no code implementations • 26 Oct 2020 • Zhiyuan Wu, Hong Qi, Yu Jiang, Minghao Zhao, Chupeng Cui, Zongmin Yang, Xinhui Xue
Model compression becomes a recent trend due to the requirement of deploying neural networks on embedded and mobile devices.
no code implementations • 22 Oct 2019 • Jinyin Chen, Yixian Chen, Lihong Chen, Minghao Zhao, Qi Xuan
In this paper, we formalize this community detection attack problem in three scales, including global attack (macroscale), target community attack (mesoscale) and target node attack (microscale).
Social and Information Networks Physics and Society
no code implementations • 21 Mar 2019 • Qi Xuan, Jinhuan Wang, Minghao Zhao, Junkun Yuan, Chenbo Fu, Zhongyuan Ruan, Guanrong Chen
In other words, the structural features of SGNs can complement that of the original network for better network classification, regardless of the feature extraction method used, such as the handcrafted, network embedding and kernel-based methods.
Ranked #10 on Graph Classification on MUTAG
no code implementations • 1 Nov 2018 • Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang
In particular, we first give two heuristic attack strategies, i. e., Community Detection Attack (CDA) and Degree Based Attack (DBA), as baselines, utilizing the information of detected community structure and node degree, respectively.
Social and Information Networks
no code implementations • 16 Sep 2018 • Shanqing Yu, Minghao Zhao, Chenbo Fu, Huimin Huang, Xincheng Shu, Qi Xuan, Guanrong Chen
This is the first time to study privacy protection on targeted links against link-prediction-based attacks.
Social and Information Networks Physics and Society
2 code implementations • 30 Sep 2017 • Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao
Recently, several practical attacks raised serious concerns over the security of searchable encryption.
Cryptography and Security