Yi Han
YOU?
Author Swipe
View article: A Machine Learning Based Framework for Identifying Consumer Product Injuries from Social Media Data
A Machine Learning Based Framework for Identifying Consumer Product Injuries from Social Media Data Open
View article: Machine Learning Empowers Prognostication in Cardiogenic Shock: Decoding the Predictive Weights of Sofa, Lactate, and Ph
Machine Learning Empowers Prognostication in Cardiogenic Shock: Decoding the Predictive Weights of Sofa, Lactate, and Ph Open
View article: Design Knowledge as Attention Emphasizer in Large Language Model-Based Sentiment Analysis
Design Knowledge as Attention Emphasizer in Large Language Model-Based Sentiment Analysis Open
Aspect-based sentiment analysis (ABSA) enables a systematic identification of user opinions on particular aspects, thus improving the idea creation process in the initial stages of a product/service design. Large language models (LLMs) suc…
View article: Proton Pump Inhibitors and In-Hospital Gastrointestinal Bleeding in Patients With Acute Coronary Syndrome Receiving Dual Antiplatelet Therapy
Proton Pump Inhibitors and In-Hospital Gastrointestinal Bleeding in Patients With Acute Coronary Syndrome Receiving Dual Antiplatelet Therapy Open
View article: Equol, a metabolite of gut microbiota, attenuates liver steatosis via the SIRT1/HNF4α pathway in NAFLD mice
Equol, a metabolite of gut microbiota, attenuates liver steatosis via the SIRT1/HNF4α pathway in NAFLD mice Open
Non-alcoholic fatty liver disease (NAFLD) is a potentially severe liver disease that increases evidence indicates that gut microbiota is related to it. In the study, 16S rRNA sequencing was used to analyze changes in gut microbiota and met…
View article: EXTRACTING LATENT NEEDS FROM ONLINE REVIEWS THROUGH DEEP LEARNING BASED LANGUAGE MODEL
EXTRACTING LATENT NEEDS FROM ONLINE REVIEWS THROUGH DEEP LEARNING BASED LANGUAGE MODEL Open
Aspect-based sentiment analysis (ABSA) provides an opportunity to systematically generate user's opinions of specific aspects to enrich the idea creation process in the early stage of product/service design process. Yet, the current ABSA t…
View article: Learning Joint Structural and Temporal Contextualized Knowledge Embeddings for Temporal Knowledge Graph Completion
Learning Joint Structural and Temporal Contextualized Knowledge Embeddings for Temporal Knowledge Graph Completion Open
Temporal knowledge graph completion that predicts missing links for incomplete temporal knowledge graphs (TKG) is gaining increasing attention.Most existing works have achieved good results by incorporating time information into static kno…
View article: Studies on the characteristics of scientific data citation in Chinese researchers: Case studies of twelve academic journals
Studies on the characteristics of scientific data citation in Chinese researchers: Case studies of twelve academic journals Open
Scientific data citation is a common behavior in the process of scientific research and writing academic papers under the context of data-intensive scientific research paradigm.Standardized citation of scientific data has received continuo…
View article: Table of Contents
Table of Contents Open
View article: An Improved Level Set Algorithm for Prostate Region Segmentation
An Improved Level Set Algorithm for Prostate Region Segmentation Open
Accurate segmentation of prostate region is an important prerequisite to improve the accuracy of computer-aided prostate cancer diagnosis. In this work, a new and accurate prostate segmentation algorithm is proposed and tested. The new alg…
View article: Knowledge Enhanced Multi-modal Fake News Detection
Knowledge Enhanced Multi-modal Fake News Detection Open
Recent years have witnessed the significant damage caused by various types of fake news. Although considerable effort has been applied to address this issue and much progress has been made on detecting fake news, most existing approaches m…
View article: Cooperative agents for multimodal presentation planning
Cooperative agents for multimodal presentation planning Open
This thesis was scanned from the print manuscript for digital preservation and is copyright the author. Researchers can access this thesis by asking their local university, institution or public library to make a request on their behalf. M…
View article: Graph Neural Networks with Continual Learning for Fake News Detection from Social Media
Graph Neural Networks with Continual Learning for Fake News Detection from Social Media Open
Although significant effort has been applied to fact-checking, the prevalence of fake news over social media, which has profound impact on justice, public trust and our society, remains a serious problem. In this work, we focus on propagat…
View article: Image Analysis Enhanced Event Detection from Geo-tagged Tweet Streams
Image Analysis Enhanced Event Detection from Geo-tagged Tweet Streams Open
Events detected from social media streams often include early signs of accidents, crimes or disasters. Therefore, they can be used by related parties for timely and efficient response. Although significant progress has been made on event d…
View article: Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams
Image Analysis Enhanced Event Detection from Geo-Tagged Tweet Streams Open
View article: Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams.
Power-law Verification for Event Detection at Multi-spatial Scales from Geo-tagged Tweet Streams. Open
Compared with traditional news media, social media nowadays provides a richer and more timely source of news. We are interested in multi-spatial level event detection from geo-tagged tweet streams. Specifically, in this paper we (1) examin…
View article: Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification
Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification Open
Compared with traditional news media, social media nowadays provides a richer and more timely source of news. We are interested in multi-spatial level event detection from geo-tagged tweet streams. Specifically, in this paper we (1) examin…
View article: Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking. Open
Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised setting. Accordingly focus has remained with compute…
View article: Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence Open
Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised learning setting. While most existing work studies t…
View article: A Piezoelectric Stick-Slip Nanopositioning Stage With Ultra-High Load Capacity Realizing by Decoupling the Driving and Moving Units
A Piezoelectric Stick-Slip Nanopositioning Stage With Ultra-High Load Capacity Realizing by Decoupling the Driving and Moving Units Open
The stick-slip piezoelectric stage plays an important role in micro-operation and industrial applications due to its nanometer resolution. However, under high load, the output performance of the piezoelectric stage will be seriously influe…
View article: Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks Open
Despite the widespread use of machine learning in adversarial settings such as computer security, recent studies have demonstrated vulnerabilities to evasion attacks—carefully crafted adversarial samples that closely resemble legitimate in…
View article: Reinforcement Learning for Autonomous Defence in Software-Defined Networking
Reinforcement Learning for Autonomous Defence in Software-Defined Networking Open
View article: Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks Open
Despite the wide use of machine learning in adversarial settings including computer security, recent studies have demonstrated vulnerabilities to evasion attacks---carefully crafted adversarial samples that closely resemble legitimate inst…
View article: Defending against co-resident attacks in cloud computing
Defending against co-resident attacks in cloud computing Open