Search Results for author: Yuanfang Chen

Found 6 papers, 1 papers with code

EEG-based Emotion Style Transfer Network for Cross-dataset Emotion Recognition

no code implementations9 Aug 2023 Yijin Zhou, Fu Li, Yang Li, Youshuo Ji, Lijian Zhang, Yuanfang Chen, Wenming Zheng, Guangming Shi

The transfer module encodes the domain-specific information of source and target domains and then re-constructs the source domain's emotional pattern and the target domain's statistical characteristics into the new stylized EEG representations.

EEG EEG Emotion Recognition +1

Progressive Graph Convolution Network for EEG Emotion Recognition

no code implementations14 Dec 2021 Yijin Zhou, Fu Li, Yang Li, Youshuo Ji, Guangming Shi, Wenming Zheng, Lijian Zhang, Yuanfang Chen, Rui Cheng

Moreover, motivated by the observation of the relationship between coarse- and fine-grained emotions, we adopt a dual-head module that enables the PGCN to progressively learn more discriminative EEG features, from coarse-grained (easy) to fine-grained categories (difficult), referring to the hierarchical characteristic of emotion.

EEG EEG Emotion Recognition

DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction

1 code implementation1 Oct 2017 Yuanfang Chen, Falin Chen, Yizhi Ren, Ting Wu, Ye Yao

However, as the mobile data of vehicles has been widely collected by sensor-embedded devices in transportation systems, it is possible to predict the traffic flow by analysing mobile data.

Time Series Time Series Prediction

When Traffic Flow Prediction Meets Wireless Big Data Analytics

no code implementations23 Sep 2017 Yuanfang Chen, Mohsen Guizani, Yan Zhang, Lei Wang, Noel Crespi, Gyu Myoung Lee

Traffic congestion is one of the most serious problems in a city, which can be predicted in advance by analyzing traffic flow patterns.

Time Series Time Series Prediction

Deep Learning for Secure Mobile Edge Computing

no code implementations23 Sep 2017 Yuanfang Chen, Yan Zhang, Sabita Maharjan

Our proposed model can be used to detect malicious applications at the edge of a cellular network, which is a serious security threat.

Cloud Computing Edge-computing

Cannot find the paper you are looking for? You can Submit a new open access paper.