Junzhao Du
YOU?
Author Swipe
View article: Community evolution prediction based on feature change patterns in social networks
Community evolution prediction based on feature change patterns in social networks Open
Predicting community evolution in dynamic social networks is crucial for relevant authorities to understand trends and implement safety measures in advance. Most existing algorithms for predicting community evolution rely on extracting com…
View article: UniOQA: A Unified Framework for Knowledge Graph Question Answering with Large Language Models
UniOQA: A Unified Framework for Knowledge Graph Question Answering with Large Language Models Open
OwnThink stands as the most extensive Chinese open-domain knowledge graph introduced in recent times. Despite prior attempts in question answering over OwnThink (OQA), existing studies have faced limitations in model representation capabil…
View article: A Performance Evaluation Method of Load Balancing Capability in SaaS Layer of Cloud Platform
A Performance Evaluation Method of Load Balancing Capability in SaaS Layer of Cloud Platform Open
Cloud platform load balancing has become one of the essential elements in modern cloud platform operations. However, there are still some problems in the evaluation methods of cloud platform load balance, such as unreasonable evaluation in…
View article: AdaSpring
AdaSpring Open
There are many deep learning (e.g. DNN) powered mobile and wearable applications today continuously and unobtrusively sensing the ambient surroundings to enhance all aspects of human lives. To enable robust and private mobile sensing, DNN …
View article: AdaDeep: A Usage-Driven, Automated Deep Model Compression Framework for Enabling Ubiquitous Intelligent Mobiles
AdaDeep: A Usage-Driven, Automated Deep Model Compression Framework for Enabling Ubiquitous Intelligent Mobiles Open
Recent breakthroughs in Deep Neural Networks (DNNs) have fueled a tremendously growing demand for bringing DNN-powered intelligence into mobile platforms. While the potential of deploying DNNs on resource-constrained platforms has been dem…
View article: PHYAlert: identity spoofing attack detection and prevention for a wireless edge network
PHYAlert: identity spoofing attack detection and prevention for a wireless edge network Open
Delivering service intelligence to billions of connected devices is the next step in edge computing. Wi-Fi, as the de facto standard for high-throughput wireless connectivity, is highly vulnerable to packet-injection-based identity spoofin…
View article: Privacy Adversarial Network
Privacy Adversarial Network Open
The remarkable success of machine learning has fostered a growing number of cloud-based intelligent services for mobile users. Such a service requires a user to send data, e.g. image, voice and video, to the provider, which presents a seri…
View article: Deep model compression for mobile platforms: A survey
Deep model compression for mobile platforms: A survey Open
Despite the rapid development of mobile and embedded hardware, directly executing computation-expensive and storage-intensive deep learning algorithms on these devices' local side remains constrained for sensory data analysis. In this pape…
View article: Better accuracy with quantified privacy: representations learned via reconstructive adversarial network
Better accuracy with quantified privacy: representations learned via reconstructive adversarial network Open
The remarkable success of machine learning, especially deep learning, has produced a variety of cloud-based services for mobile users. Such services require an end user to send data to the service provider, which presents a serious challen…