Loading [MathJax]/extensions/MathZoom.js
Feng Xia - IEEE Xplore Author Profile

Showing 1-25 of 204 results

Filter Results

Show

Results

Multiscale brain networks are crucial for diagnosing brain disorders by revealing the hierarchical organization of brain function and connectivity. However, previous methods that explored multi-atlas approaches to model these networks often failed to represent this organization across multiple spatial and temporal scales, leading to limited representations and potentially inaccurate diagnoses. To ...Show More
Few-shot Knowledge Graph Completion (FKGC) has emerged as a significant area of interest for addressing the long-tail problem in knowledge graphs. Traditional approaches often focus on the sparse few-shot neighborhood to derive semantic representation, overlooking other critical information forms such as relation paths. In this paper, we introduce an innovative method, called PARE, which fully lev...Show More
Dynamic brain networks play a pivotal role in diagnosing brain disorders by capturing temporal changes in brain activity and connectivity. Previous methods often rely on sliding-window approaches for constructing these networks using fMRI data. However, these methods face two key limitations: a fixed temporal length that inadequately captures brain activity dynamics and a global spatial scope that...Show More
Federated graph learning (FGL) enables clients to collaboratively train a robust graph neural network (GNN) while ensuring their private graph data never leaves the local. However, existing FGL frameworks require all clients to train the identical GNN model, which limits their real-world applicability. Although many model-heterogenous frameworks have been proposed for traditional nongraph federate...Show More
Deep learning has achieved remarkable performance in computer vision applications, and gradually becomes one of the mainstream technologies. Image scaling, as an indispensable data pre-processing procedure for most of the computer vision applications, is implemented to resize the unmatched data to fit the input sizes of deep learning models. However, such kind of data pre-processing is vulnerable ...Show More
Large language models (LLMs) have been widely used in society due to their amazing emergent capabilities, but they also bring security issues. A large amount of content on the Internet may be generated by AI. Whether it is social forums or more professional academic fields, the abuse of AI has become a problem. Especially in some professional fields, Blindly trusting what the Internet says is dang...Show More
Current machine learning-based Alzheimer’s disease (AD) diagnosis methods fail to explore the distinctive brain patterns across different AD stages, lacking the ability to trace the trajectory of AD progression. This limitation can lead to an oversight of the pathological mechanisms of AD and suboptimal performance in AD diagnosis. To overcome this challenge, this paper proposes a novel stage-awar...Show More
Leveraging the multimodal brain signals collected from various electronic devices, such as electroencephalography (EEG) and functional near-infrared spectroscopy (fNIRS) data, has been regarded as a promising technique for automated brain disease diagnosis. Existing studies on multimodal brain signal analysis mainly focus on data alignment and basic feature integration, yet fail to capture the spa...Show More
Mobile edge computing (MEC) is considered a promising technology to provide low-latency services by keeping computing and other resources physically close to where they are needed. The functions implemented through network function virtualization (NFV) technology in MEC are called virtual network function (VNF) instances, and the deployment and scheduling of VNF instances have always been a hot to...Show More
Artificial Intelligence (AI) based Consumer Internet of Things (CIoT) flourishes at a rapid speed due to its excellent data collection ability, which plays an important role in optimizing Deep Neural Networks (DNNs) of AI-based CIoT. However, since the CIoT devices can be accessed without the user’s permission, the DNNs of AI-based CIoT face various security threats, especially the backdoor attack...Show More
To date, research on relation mining has typically focused on analyzing explicit relationships between entities, while ignoring the underlying connections between entities, known as implicit relationships. Exploring implicit relationships can reveal more about social dynamics and potential relationships in heterogeneous social networks to better explain complex social behaviors. The research prese...Show More
Few-shot semantic segmentation (FSS), which can perform segmentation using only a limited number of annotated examples, is a promising technique that has been embedded in many electronic products. Existing approaches usually achieve segmentation for the query image by computing the similarity between the support and query images. However, when segmenting a new query image, the model prediction may...Show More
In recent years, wireless rechargeable sensor networks (WRSNs) have gained significant attention in the research community due to the current advancements in wireless power transfer technology. In mobile charger scheduling, previous works primarily emphasized the survival rate of sensor nodes. However, the primary task of a WRSN is to monitor targets in a given area. Therefore, the coverage of tar...Show More
Due to the swift advancement of edge computing and mobile crowdsensing (MCS), edge-assisted MCS (EAMCS) has emerged as a promising paradigm, leveraging sensor-embedded mobile devices for the collection and sharing of environmental data. As the sensing scale increases in the modern urban, the application scenario becomes more and more complex, and the budget of users and platform is limited. Theref...Show More
The proliferation of consumer electronic products has engendered a substantial surge in data generation and information exchange, concurrently escalating the potential for security threats. Detecting anomalies effectively on attributed networks has undeniable positive significance for consumer electronic security, such as fraudulent user detection, malicious consumption actions analysis, and netwo...Show More
Brain networks are built according to the structures or neural activities of different brain regions, which can be modeled as complex networks. Many studies exploit brains from the perspective of graph learning to diagnose the nerve diseases of brains. However, many of these algorithms are unable to automatically construct brain function topology based on electroencephalogram (EEG) and fail to cap...Show More
The spread of the Coronavirus disease-2019 epidemic has caused many courses and exams to be conducted online. The cheating behavior detection model in examination invigilation systems plays a pivotal role in guaranteeing the equality of long-distance examinations. However, cheating behavior is rare, and most researchers do not comprehensively take into account features such as head posture, gaze a...Show More
Network embedding aims to represent nodes with low dimensional vectors while preserving structural information. It has been recently shown that many popular network embedding methods can be transformed into matrix factorization problems. In this paper, we propose the unifying framework “Z-NetMF,” which generalizes random walk samplers to Z-Laplacian graph filters, leading to embedding algorithms w...Show More
Federated recommender systems have been crucially enhanced through data sharing and continuous model updates, attributed to the pervasive connectivity and distributed computing capabilities of Internet of Things (IoT) devices. Given the sensitivity of IoT data, transparent data processing in data sharing and model updates is paramount. However, existing methods fall short in tracing the flow of sh...Show More
As one of the significant supporting technologies for mobile virtual reality (MVR), computer vision is latency-sensitive and always requires real-time response and accurate object analysis. However, the limited computational resources of mobile devices lead to high service delay and low analysis quality, resulting in poor quality of service (QoS). By placing the edge service entities (SEs) of the ...Show More
Over the last decade, the Internet of Things (IoT) technology has advanced significantly in a variety of fields. As a pivotal application of IoT, intelligent transportation systems (ITS) have harvested great attention from the research community. Radio frequency identification (RFID) which is an essential technology in IoT plays a key role in ITS to identify tagged vehicles. Unknown tag identifica...Show More
Cyber-Physical-Social Systems (CPSS) offer a new perspective for applying advanced information technology to improve urban transportation. However, real-world traffic datasets collected from sensing devices like loop sensors often contain corrupted or missing values. The incompleteness of traffic data poses great challenges to downstream data analysis tasks and applications. Most existing data-dri...Show More
Multivariate time series anomaly detection (MTAD) plays a vital role in a wide variety of real-world application domains. Over the past few years, MTAD has attracted rapidly increasing attention from both academia and industry. Many deep learning and graph learning models have been developed for effective anomaly detection in multivariate time series data, which enable advanced applications such a...Show More
Automated multi-label chest X-rays (CXR) image classification has achieved substantial progress in clinical diagnosis via utilizing sophisticated deep learning approaches. However, most deep models have high computational demands, which makes them less feasible for compact devices with low computational requirements. To overcome this problem, we propose a knowledge distillation (KD) strategy to cr...Show More
In the Dynamic Rechargeable Networks (DRNs), to maximize the throughput by efficient energy allocation, the existing studies usually consider the spatio-temporal dynamic factors of the harvested energy, and seldom the network dynamic factors simultaneously, such as the time variable network resources and wireless interference. To take the network dynamic factors together, this paper studies the qu...Show More