no code implementations • 14 Mar 2024 • Zhaoliang Chen, Zhihao Wu, Ylli Sadikaj, Claudia Plant, Hong-Ning Dai, Shiping Wang, Yiu-ming Cheung, Wenzhong Guo
Employing an adversarial training framework, the edge predictor utilizes the line graph transformed from the original graph to estimate the edges to be dropped, which improves the interpretability of the edge-dropping method.
no code implementations • 9 Feb 2024 • Zonggui Tian, Du Zhang, Hong-Ning Dai
Recently, continual graph learning has been increasingly adopted for diverse graph-structured data processing tasks in non-stationary environments.
no code implementations • 20 Sep 2023 • Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Hong-Ning Dai, Jianming Yong
Effective patient monitoring is vital for timely interventions and improved healthcare outcomes.
no code implementations • Taylor & Francis Online 2021 • Yang Li, Hong-Ning Dai, Zibin Zheng
To validate our method, we perform the back-testing on the historical data of two public datasets and a newly constructed dataset.
no code implementations • 7 Aug 2021 • Jiafu Wan, Xiaomin Li, Hong-Ning Dai, Andrew Kusiak, Miguel Martínez-García, Di Li
For that, Artificial Intelligence (AI) is enabling higher value-added manufacturing by accelerating the integration of manufacturing and information communication technologies, including computing, communication, and control.
no code implementations • 20 Mar 2021 • Ke Zhang, Hanbo Ying, Hong-Ning Dai, Lin Li, Yuangyuang Peng, Keyi Guo, Hongfang Yu
Deep Neural Networks (DNNs) have shown great success in completing complex tasks.
no code implementations • 13 Jul 2020 • Jer Shyuan Ng, Wei Yang Bryan Lim, Hong-Ning Dai, Zehui Xiong, Jianqiang Huang, Dusit Niyato, Xian-Sheng Hua, Cyril Leung, Chunyan Miao
The simulation results show that the grand coalition, where all UAVs join a single coalition, is not always stable due to the profit-maximizing behavior of the UAVs.
Networking and Internet Architecture Signal Processing
no code implementations • 26 Mar 2020 • Weilin Zheng, Zibin Zheng, Hong-Ning Dai, Xu Chen, PeiLin Zheng
It is challenging to process and analyze a high volume of raw EOSIO data and establish the mapping from original raw data to the well-grained datasets since it requires substantial efforts in extracting various types of data as well as sophisticated knowledge on software engineering and data analytics.
Computational Engineering, Finance, and Science Cryptography and Security
no code implementations • 11 Dec 2019 • Zibin Zheng, Hong-Ning Dai, Jiajing Wu
Blockchain is gaining extensive attention due to its provision of secure and decentralized resource sharing manner.
no code implementations • 1 Nov 2019 • PeiLin Zheng, Zibin Zheng, Hong-Ning Dai
We name these well-processed Ethereum datasets as XBlock-ETH, which consists of the data of blockchain transactions, smart contracts, and cryptocurrencies (i. e., tokens).
Cryptography and Security
no code implementations • 2 Sep 2019 • Hong-Ning Dai, Raymond Chi-Wing Wong, Hao Wang, Zibin Zheng, Athanasios V. Vasilakos
We then present a detailed survey of the technical solutions to the challenges in BDA for large scale wireless networks according to each stage in the life cycle of BDA.
no code implementations • 1 Sep 2019 • Hong-Ning Dai, Hao Wang, Guangquan Xu, Jiafu Wan, Muhammad Imran
The recent advances in information and communication technology (ICT) have promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing.