UM

Browse/Search Results:  1-10 of 78 Help

Selected(0)Clear Items/Page:    Sort:
Mixed Strategies for Security Games with General Defending Requirements Conference paper
Proceedings of the 31st International Joint Conference on Artificial Intelligence, IJCAI 2022, Vienna, Austria, 23/07/2022
Authors:  Bai Rufan;  Lin Haoxing;  Yang Xinyu;  Wu Xiaowei;  Li Minming;  Jia Weijia
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/18
Security Game  Mixed Strategy  Defending Threshold  
Relation construction for aspect-level sentiment classification Journal article
Information Sciences, 2022,Volume: 586,Page: 209-223
Authors:  Zeng, Jiandian;  Liu, Tianyi;  Jia, Weijia;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2022/03/28
Aspect Relations  Aspect-level  Graph Convolutional Network  Sentiment Analysis  
Hybrid NOMA-FDMA Assisted Dual Computation Offloading: A Latency Minimization Approach Journal article
IEEE Transactions on Network Science and Engineering, 2022
Authors:  Li, Yang;  Wu, Yuan;  Dai, Minghui;  Lin, Bin;  Jia, Weijia;  Shen, Xuemin Sherman
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/05
Cloud computing  Dual computation offloading  Frequency division multiaccess  hybrid NOMAFDMA transmission  Internet of Things  joint computation offloading and resource allocation  NOMA  Optimization  Resource management  Task analysis  
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing Journal article
Digital Communications and Networks, 2022
Authors:  Li, Yang;  Wang, Tianshun;  Wu, Yuan;  Jia, Weijia
Favorite |  | TC[WOS]:1 TC[Scopus]:0 | Submit date:2022/05/17
Multiuser Mobile Edge Computing  Dynamic Bandwidth Allocation  Computation Offloading  Resource Allocations  
Distantly Supervised Relation Extraction using Multi-Layer Revision Network and Confidence-based Multi-Instance Learning Conference paper
EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings, Punta Cana, Dominican Republic, 2021-11-07
Authors:  Lin, Xiangyu;  Liu, Tianyi;  Jia, Weijia;  Gong, Zhiguo
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2022/05/13
Fine-grained Question-Answer sentiment classification with hierarchical graph attention network Journal article
Neurocomputing, 2021,Volume: 457,Page: 214-224
Authors:  Zeng, Jiandian;  Liu, Tianyi;  Jia, Weijia;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/12/08
Graph Attention Network  Question Answer  Sentiment Classification  
Robust Neural Relation Extraction via Multi-Granularity Noises Reduction Journal article
IEEE Transactions on Knowledge and Data Engineering, 2021,Volume: 33,Issue: 9,Page: 3297-3310
Authors:  Zhang, Xinsong;  Liu, Tianyi;  Li, Pengshuai;  Jia, Weijia;  Zhao, Hai
Favorite |  | TC[WOS]:2 TC[Scopus]:1 | Submit date:2021/12/08
Distant Supervision  Multi-instance Learning  Neural Relation Extraction  Transfer Learning  
Optimal channel sharing assisted multi-user computation offloading via NOMA Conference paper
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2021, Vancouver, BC, 10-13 May 2021
Authors:  Wang, Tianshun;  Li, Yang;  Wu, Yuan;  Qian, Liping;  Bin, Lin;  Jia, Weijia
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2021/09/10
Quick Convex Hull-Based Rendezvous Planning for Delay-Harsh Mobile Data Gathering in Disjoint Sensor Networks Journal article
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2021,Volume: 51,Issue: 6,Page: 3844-3854
Authors:  Liu, Xuxun;  Wang, Tian;  Jia, Weijia;  Liu, Anfeng;  Chi, Kaikai
Favorite |  | TC[WOS]:38 TC[Scopus]:35 | Submit date:2021/12/08
Connectivity  Data Gathering  Delivery Latency Minimization  Mobile Sink  Rendezvous Planning  Wireless Sensor Networks (Wsns)  
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system Journal article
Concurrency and Computation: Practice and Experience, 2021,Volume: 33,Issue: 7
Authors:  Zhang, Guangxue;  Wang, Tian;  Wang, Guojun;  Liu, Anfeng;  Jia, Weijia
Favorite |  | TC[WOS]:55 TC[Scopus]:49 | Submit date:2021/12/07
Fog Computing  Hidden Data Attacks  Internal Attacks  Sensor-cloud  Trust Evaluation Mechanism