Yingbin Liang - IEEE Xplore Author Profile

Showing 1-21 of 21 results

Filter Results

Show

Results

In the 21st-century information age, with the development of big data technology, effectively extracting valuable information from massive data has become a key issue. Traditional data mining methods are inadequate when faced with large-scale, high-dimensional and complex data. Especially when labeled data is scarce, their performance is greatly limited. This study optimizes data mining algorithms...Show More
This document presents an in-depth examination of stock market sentiment through the integration of Convolutional Neural Networks (CNN) and Gated Recurrent Units (GRU), enabling precise risk alerts. The robust feature extraction capability of CNN is utilized to preprocess and analyze extensive network text data, identifying local features and patterns. The extracted feature sequences are then inpu...Show More
This paper delves into the significance and interaction between deep learning (DL) and neural architecture search (NAS) within the realm of artificial intelligence. As DL has become integral in addressing complex problems through its robust learning capabilities, NAS offers the potential to autonomously discover efficient neural network structures. The fusion of these technologies not only enhance...Show More
In this paper, Pro-HRnet-CNN, an innovative model combining HRN et and void-convolution techniques, is proposed for disease prediction under lung imaging. Through the experimental comparison on the authoritative LIDC-IDRI dataset, we found that compared with the traditional ResNet-50, Pro-HRnet-CNN showed better performance in the feature extraction and recognition of small-size nodules, significa...Show More
This paper delves into an innovative image recognition algorithm that merges deep learning techniques with Generative Adversarial Networks (GANs) and offers a comparative analysis against traditional image recognition methods. The primary objective of this study is to evaluate the benefits and future prospects of deep learning, with a particular focus on GANs, within the realm of image recognition...Show More
This study examines the implementation of deep learning technologies for data mining within medical texts. Initially, medical textual data is transformed into vectorial representations through the application of the word2vec algorithm, thereby facilitating the effective encoding of complex textual information. Subsequently, this research introduces the use of a Hierarchical Attention Network (HAN)...Show More
Financial fraud refers to the act of obtaining financial benefits through dishonest means. Such behavior not only disrupts the order of the financial market but also harms economic and social development and breeds other illegal and criminal activities. With the popularization of the internet and online payment methods, many fraudulent activities and money laundering behaviors in life have shifted...Show More
Function approximation has experienced significant success in the field of reinforcement learning (RL). Despite a handful of progress on developing theory for Nonstationary RL with function approximation under structural assumptions, existing work for nonstationary RL with general function approximation is still limited. In this work, we propose a UCB-type of algorithm LSVI-Nonstationary following...Show More
Image-text matching is a key multimodal task that aims to model the semantic association between images and text as a matching relationship. With the advent of multimedia information age, image, and text data show explosive growth, and how to accurately realize the efficient and accurate semantic correspondence between them has become the core issue of common concern in academia and industry. In t...Show More
In this paper, we study Poisson fading channels with varying noise levels. This model is motivated by applications of visible light communication systems, in which the noise level is affected by the strength of the background light. We consider scenarios with and without delay constraints. For the case without a delay constraint, we characterize the optimal power allocation scheme that maximizes t...Show More
A secure wireless broadcast network model is investigated, in which a source node broadcasts K confidential message flows to N user nodes, with each message intended to be decoded accurately by one user and to be kept secret from all of other users (who are thus considered to be eavesdroppers with regard to all other messages but their own). The source maintains a queue for each message flow if it...Show More
In this paper, we consider the optimality of the beamforming scheme for both the multiple-input multiple-output (MIMO) point-to-point channel and the MIMO multiple access channel (MAC), where all communication terminals are assumed to be equipped with multiple antennas. For both channels, the channel matrices have correlated elements and are modelled by virtual representation. For the point-to-poi...Show More
Outer bounds on the capacity region of broadcast channels are reviewed and a new outer bound is presented.Show More
The capacity regions are investigated for cooperative relay broadcast channels (RBCs), where relay links are incorporated into standard two-user broadcast channels to support user cooperation. The partially cooperative relay broadcast channel is first studied, where only one user is allowed to transmit to the other user through a relay link. An upper bound on the capacity region is derived and is ...Show More
A Gaussian orthogonal relay model is investigated, where the source transmits to the relay and destination in channel 1, and the relay transmits to the destination in channel 2, with channels 1 and 2 being orthogonalized in the time-frequency plane in order to satisfy practical constraints. The total available channel resource (time and bandwidth) is split into the two orthogonal channels, and the...Show More
The capacity of the multiple-input multiple-output (MIMO) wireless channel with uniform linear arrays (ULAs) of antennas at the transmitter and receiver is investigated. It is assumed that the receiver knows the channel perfectly but that the transmitter knows only the channel statistics. The analysis is carried out using an equivalent virtual representation of the channel that is obtained via a s...Show More
Resource allocation for a fading orthogonal relay channel model is investigated, where the source transmits to the relay and destination in one channel, and the relay transmits to the destination in an orthogonal channel. Separate power constraints at the source and relay are assumed. The fading state information is assumed to be known at both the transmitter and receiver. The source and relay can...Show More
The capacity of the MIMO channel is investigated under the assumption that the elements of the channel matrix are zero mean proper complex Gaussian random variables with a general correlation structure. It is assumed that the receiver knows the channel perfectly but that the transmitter knows only the channel statistics. The analysis is carried out using an equivalent virtual representation of the...Show More
We study the capacity of a noncoherent time-selective block fading channel, under the assumption that the channel changes slowly over the block period N rather than remaining constant. The predictability of the channel is characterized through the rank Q (1 /spl les/ Q /spl les/ N) of the correlation matrix of the vector of channel gains over the block. The model includes the standard block fading...Show More