no code implementations • 7 Dec 2023 • Yanheng Guo, Yan Zhang, Linjie Wu, Mengxia Li, Xingjuan Cai, Jinjun Chen
This study investigates service deployment and task offloading challenges in a multi-user environment, framing them as a multi-task high-dimensional multi-objective optimization (MT-HD-MOO) problem within an edge environment.
1 code implementation • IEEE Transactions on Artificial Intelligence 2023 • Wenyu Zhao, Dong Zhou, Buqing Cao, Kai Zhang, Jinjun Chen
Our method utilizes a SciBERT as a text encoder and a graph transformer network as a molecule encoder to generate multimodal representations.
Ranked #4 on Cross-Modal Retrieval on ChEBI-20
no code implementations • 4 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
After that, we analyze technical works that have developed blockchain based energy auctions from green perspective.
Cryptography and Security
no code implementations • 2 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Collectively, we propose a private decentralized VPP trading model and named it as Virtual Private Trading (VPT) model.
Cryptography and Security
no code implementations • 2 Feb 2021 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
In this context, usage based dynamic pricing strategies of DSM plays their role and provide users with specific incentives that help shaping their load curve according to the forecasted load.
Cryptography and Security
no code implementations • COLING 2020 • Wenyu Zhao, Dong Zhou, Lin Li, Jinjun Chen
Our second method refines word representations by aligning original and re-fined embedding spaces based on local tangent space instead of performing weighted locally linear combination twice.
1 code implementation • 6 Dec 2018 • Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of development of information and communication technologies (ICT). With the provision of CPSs, the security and privacy threats associated to these systems are also increasing.
Cryptography and Security