Loading [MathJax]/extensions/MathMenu.js
Zhiyong Feng - IEEE Xplore Author Profile

Showing 1-25 of 163 results

Filter Results

Show

Results

For black-box attacks, most existing attack methods exhibit weak transferability due to the significant discrepancy between substitute model and victim model. We argue that the model-specific discriminative regions are a key factor causing overfitting to the source model. However, existing model augmentation methods focus on augmentations within a single domain, thereby restricting the diversity o...Show More
Self-organization scheduling is a critic must to support the wide use of UAVs (Unmanned Aerial-Vehicles) in many scenarios, where frequent changes of network topology caused by high mobility of both UAVs and mobile devices (MDs) lead to great challenges. We propose a self-organization scheduling architecture of dynamic UAV-MD networks containing three sub-problems, respectively for UAVs’ flight ro...Show More
Augmenting missing key aspects in Textual Vulnerability Descriptions (TVDs) is crucial for effective vulnerability analysis. For instance, in TVDs, key aspects include Attack Vector, Vulnerability Type, among others. These key aspects help security engineers understand and address the vulnerability in a timely manner. For software with a large user base (non-long-tail software), augmenting these m...Show More
With the rapid development of the Internet of Vehicles (IoV), vehicles will generate massive data and computation demands, necessitating computation offloading at the edge. However, existing research faces challenges in efficiency and trust. In this paper, we explore the IoV computation offloading from both user and edge facility provider perspectives, working to optimize the quality of experience...Show More
Traditional recommendation systems focus on maximizing user satisfaction by suggesting their favorite items. This user-centric approach may lead to unfair exposure distribution among the providers. On the contrary, a provider-centric design might become unfair to the users. Therefore, this paper proposes a re-ranking model FairSort1 to find a trade-off solution among user-side fairness, provider-s...Show More
With the rapid development of prompt tuning technologies and the emergence of prompt-as-a-service platforms, the security of prompt service has attracted the attention of researchers. Deep neural networks face susceptibility to various adversaries. A particularly malicious altering model behavior is backdoor attack, where model predictions exhibit divergence in the presence of specific triggers in...Show More
With the rapid development of mobile communication and Internet of Things (IoT) technologies, smart mobile devices such as portable and sensor devices have been widely used in our daily lives. However, their compact size and limited energy capacity inherently hinder their ability to efficiently handle computation-intensive tasks within acceptable timeframes. To tackle this challenge, computation o...Show More
With the rapid development of mobile internet, mobile data traffic has increased substantially, and multimedia services have gradually occupied a large proportion of mobile network traffic. Using the Device-to-Device (D2D) technique for multimedia content sharing is considered as an effective solution to address large-scale user requests. D2D communication technology refers to direct data transmis...Show More
With the increasing prevalence of smart services in our daily lives, service ecosystems are rapidly emerging across various domains, including E-commerce, cloud manufacturing, and crowdsourcing, among others. However, evaluating the utility of service ecosystems presents several challenges due to their complex characteristics, including the diversity in crowd intelligence, the cascading effects of...Show More
The governance of service ecosystem needs to balance efficiency and fairness to promote the sustainable development of the system, making it an important topic. However, service entities in the service ecosystem have autonomy and engage in dynamic game with governance strategies, leading to governance challenges. To address this issue, we model the governance process as a repeated sequential game ...Show More
Data service marketplaces are pivotal elements of an intelligent society as they bridge user requirements and the realization of value from data services. Ensuring the efficient circulation of data services and driving industrial chains to create value within data service marketplaces has become a core issue in developing intelligent societies, posing an urgent concern for researchers and governme...Show More
Financial institutions may be subject to financial fraud by malicious users because of the large amount of transaction data and sensitive user information involved. Therefore, it is crucial to design a machine learning model that can detect abnormal data in financial institutions. However, with the development of the economy and technology, the massive amount of user-generated data is distributed ...Show More
In the real world, it can be challenging to annotate a large-scale dataset for all medical images, making few-shot medical image classification an important task. The latest advancements in pre-trained vision-language models as CLIP have demonstrated excellent performance in zero-shot natural image recognition and show advantages in medical applications. However, we have found that deploying such ...Show More
Textbook question answering (TQA) task aims to infer answers for given questions from a multimodal context, including text and diagrams. The existing studies have aggregated intramodal semantics extracted from a single modality but have yet to capture the intermodal semantics between different modalities. A major challenge in learning intermodal semantics is maintaining lossless intramodal semanti...Show More
Multi-scale detection based on Feature Pyramid Networks (FPN) has been a popular approach in object detection to improve accuracy. However, using multi-layer features in the decoder of FPN methods entails performing many convolution operations on high-resolution feature maps, which consumes significant computational resources. In this paper, we propose a novel perspective for FPN in which we direc...Show More
Governance strategies related to platform ecosystems have become a vital issue for developing a smart society, attracting governments’ and practitioners’ attention. Under the consensus of “service as a commodity” and “platform as market,” service providers, platforms, services, and various supply demand matching methods form new supply processes. These elements are continuously and uncertainly cha...Show More
With the development of 5G technology, ultradense cellular networks are becoming a trend, while the deployment of large-area and high-density base stations (BSs) will bring new energy consumption problems. In this article, we explore the energy consumption of the edge demand response (EDR) from the two perspectives of edge users and edge facility providers. While guaranteeing the essential Quality...Show More
Service recommendations are crucial for developers to create mashups such as mobile applications, workflows, e-business solutions, etc. Existing methods based on collaborative filtering or content analysis are manual and cannot automatically acquire services that align with the requirements of mashup creation. A possible solution to automatically acquiring necessary services for mashups is the seq...Show More
Heterogeneous information networks (HINs) are potent models of complex systems. In practice, many nodes in an HIN have their attributes unspecified, resulting in significant performance degradation for supervised and unsupervised representation learning. We developed an unsupervised heterogeneous graph contrastive learning approach for analyzing HINs with missing attributes (HGCA). HGCA adopts a c...Show More
Although large language models (LLMs) have demonstrated impressive performance in code generation, they still face challenges when dealing with complex code generation tasks. In the software development process, humans often refine complex tasks iteratively and continuously modify and improve them. Inspired by this, we propose a self-iteration code generation framework based on large language mode...Show More
Regarding code generation, researchers have recently proposed a retrieve-template-generation approach. This method involves retrieving similar code snippets through a retriever and providing them to a generator along with input descriptions. However, since the retrieved similar code can be influenced by various data types, it may lead the model to reference unrelated content, resulting in some dis...Show More
The conventional crowdsourcing system is dependent on a centralized platform, which grants the platform owner undue authority to manipulate the operation of the system for unethical profits. In this paper, the crowdsourcing system is revolutionized in a decentralized manner with Blockchain as a Service (BaaS). All crowdsourcing operations are implemented with smart contracts deployed on blockchain...Show More
Social recommendations play a crucial role in providing personalized services to users by leveraging social relationships and user sessions. Despite recent advancements, it still faces challenges in dealing with social inconsistency and the loss of critical semantic information in user-service interactions. To overcome these problems, an Evolving Graph Contrastive Learning for Socially-aware Recom...Show More
Mobile Edge Computing (MEC) plays a crucial role in providing diverse computation and storage services to intelligent equipment. In recent years, the utilization of Unmanned Aerial Vehicles (UAVs) equipped with edge servers has emerged as a promising approach to enable ubiquitous edge computing services. This paradigm offers various benefits, such as reduced latency and flexible service provisioni...Show More
With the advent of mobile internet, Online-to-Offline (O2O) home services have emerged, such as home healthcare and repair services, greatly facilitating our lives. Customers book services through online platforms, and workers provide the requested services at the customers’ homes offline. However, each time workers travel to customers’ homes, they incur opportunity cost, leading to increased cost...Show More