• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:杨震

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 22 >
IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network SCIE
期刊论文 | 2024 , 18 (9) , 2589-2604 | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
Abstract&Keyword Cite

Abstract :

Brain tumors, characterized by uncontrollable cellular growths, are a significant global health challenge. Navigating the complexities of tumor identification due to their varied dimensions and positions, our research introduces enhanced methods for precise detection. Utilizing advanced learning techniques, we've improved early identification by preprocessing clinical dataset-derived images, augmenting them via a Generative Adversarial Network, and applying an Improved Privacy-Preserving Collaborative Convolutional Neural Network (IPC-CNN) for segmentation. Recognizing the critical importance of data security in today's digital era, our framework emphasizes the preservation of patient privacy. We evaluated the performance of our proposed model on the Figshare and BRATS 2018 datasets. By facilitating a collaborative model training environment across multiple healthcare institutions, we harness the power of distributed computing to securely aggregate model updates, ensuring individual data protection while leveraging collective expertise. Our IPC-CNN model achieved an accuracy of 99.40%, marking a notable advancement in brain tumor classification and offering invaluable insights for both the medical imaging and machine learning communities.

Keyword :

Segmentation Segmentation Brain tumors Brain tumors Privacy-Preserving Privacy-Preserving Improved Convolutional Neural Network Improved Convolutional Neural Network Generative Adversarial Network Generative Adversarial Network Figshare Figshare BRATS BRATS

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Raheem, Abdul , Yang, Zhen , Yu, Haiyang et al. IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network [J]. | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , 2024 , 18 (9) : 2589-2604 .
MLA Raheem, Abdul et al. "IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network" . | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 18 . 9 (2024) : 2589-2604 .
APA Raheem, Abdul , Yang, Zhen , Yu, Haiyang , Yaqub, Muhammad , Sabah, Fahad , Ahmed, Shahzad et al. IPC-CNN: A Robust Solution for Precise Brain Tumor Segmentation Using Improved Privacy-Preserving Collaborative Convolutional Neural Network . | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS , 2024 , 18 (9) , 2589-2604 .
Export to NoteExpress RIS BibTex
网络安全与防护课程教学设计探索
期刊论文 | 2023 , (08) , 77-80 | 中国多媒体与网络教学学报(上旬刊)
Abstract&Keyword Cite

Abstract :

由于网络安全领域课程—网络安全与防护课程本身理论性较强,同时教学过程中缺乏对学生学习结果的有效评价方式,实现网络安全与防护课程教学目标存在一定的难度。针对网络安全与防护课程教学建设问题,本文结合线上线下多种形式,提出了新的教学设计思路,并在其中融入了教学思政元素,阐述了课程混合式教学建设过程中的课程目标、教学内容、评价方法等方面的设计。通过对课程实践结果和教学数据的分析,网络安全与防护课程混合式教学设计取得了较好的教学效果。

Keyword :

混合式教学 混合式教学 教学实践 教学实践 网络安全与防护 网络安全与防护 教学设计 教学设计

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 于海阳 , 杨震 , 赖英旭 et al. 网络安全与防护课程教学设计探索 [J]. | 中国多媒体与网络教学学报(上旬刊) , 2023 , (08) : 77-80 .
MLA 于海阳 et al. "网络安全与防护课程教学设计探索" . | 中国多媒体与网络教学学报(上旬刊) 08 (2023) : 77-80 .
APA 于海阳 , 杨震 , 赖英旭 , 刘静 , 王一鹏 . 网络安全与防护课程教学设计探索 . | 中国多媒体与网络教学学报(上旬刊) , 2023 , (08) , 77-80 .
Export to NoteExpress RIS BibTex
Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning SCIE
期刊论文 | 2023 , 14 (2) | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY
Abstract&Keyword Cite

Abstract :

Partial label learning (PLL) aims to learn a robust multi-class classifier from the ambiguous data, where each instance is given with several candidate labels, among which only one label is real. Most existing methods usually cope with such problem by utilizing a feature similarity graph to conduct label disambiguation. However, these methods construct the feature graph by only employing original features, while the influences of latent outliers and the contributions of label space are regrettably ignored. To tackle these issues, in this article, we propose a Prior KnOwledge ConsTrained Adaptive Graph FramEwork (POTAGE) for partial label learning, which utilizes an adaptive graph fused with label information to accurately describe the instance relationship and guide the desired model training. Compared with the feature-induced fixed graph, the adaptive graph is deemed to be more robust and accurate to reveal the intrinsic manifold structure within the data, and the embedding label information is expected to effectively alleviate the label ambiguities and enlarge the gap of label confidences between two instances from different classes. Extensive experiments demonstrate that POTAGE achieves state-of-the-art performance.

Keyword :

adaptive graph adaptive graph Partial label learning Partial label learning label information embedding label information embedding label disambiguation label disambiguation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lyu, Gengyu , Feng, Songhe , Wang, Shaokai et al. Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning [J]. | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY , 2023 , 14 (2) .
MLA Lyu, Gengyu et al. "Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning" . | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY 14 . 2 (2023) .
APA Lyu, Gengyu , Feng, Songhe , Wang, Shaokai , Yang, Zhen . Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning . | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY , 2023 , 14 (2) .
Export to NoteExpress RIS BibTex
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation CPCI-S
期刊论文 | 2023 , 141-152 | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

Teaching requirements elicitation to students who do not have practical experience is challenging, as they usually cannot understand the difficulty. Several recent studies have reported their experience of teaching requirements elicitation with a serious game. However, in these games, the fictitious characters have not been carefully designed to reflect real scenarios. For example, they always respond the same no matter how many times a learner interacts with them. Moreover, most existing serious games contain only one specific scenario and cannot be easily extended to cover various cases. In this paper, we design and implement a dynamic state-based serious game (BARA) for teaching requirements elicitation, which can realistically simulate real-world scenarios and automatically record learners' actions for assessment. Specifically, we model fictitious characters' behaviors using finite-state machines in order to precisely characterize the dynamic states of stakeholders. We also developed an easy-to-use editor for non-programmers to design fictitious characters and thus construct various simulated scenarios. Finally, BARA records learners' actions during the game, based on which we can gain an in-depth understanding of learners' performance and our teaching effectiveness. We evaluated BARA with 60 participants using a simulated scenario. The result shows that most participants are immersed in BARA and can reasonably complete the requirements elicitation task within the simulated scenario.

Keyword :

serious game serious game requirements elicitation requirements elicitation empirical study empirical study goal-based design goal-based design

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yu , Li, Tong , Huang, Zheqing et al. BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation [J]. | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET , 2023 : 141-152 .
MLA Liu, Yu et al. "BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation" . | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET (2023) : 141-152 .
APA Liu, Yu , Li, Tong , Huang, Zheqing , Yang, Zhen . BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation . | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET , 2023 , 141-152 .
Export to NoteExpress RIS BibTex
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain SCIE
期刊论文 | 2023 , 223 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Abstract&Keyword Cite

Abstract :

Decentralized federated learning tries to address the single point of failure and privacy issue of federated learning by leveraging committee-based blockchain, which has been extensively studied among academic and industrial fields. The introduction of committees improves the efficiency of decentralized federated learning. However, it also is prone to attacks from Byzantine committee members, which interfere with the correctness of the global model by modifying aggregation results. Therefore, the security of committees is the key challenge for decentralized federated learning via committee-based blockchain. To solve this problem, in this paper, we propose VDFChain, a secure and verifiable decentralized federated learning scheme via committee-based blockchain. Specifically, based on the polynomial commitment technique, we propose a trusted committee mechanism, which can defend against attacks from Byzantine committee members and ensure the correctness of the aggregation model. Moreover, we use lossless masking techniques and committee mechanisms to effectively provide secure aggregation. For Byzantine attacks in decentralized federated learning, different from traditional defense methods against it, the VDFChain improves the fault tolerance of decentralized federated learning and provides a feasible and practical solution to build a secure decentralized federated learning. Security analysis shows that our scheme is provably secure. We have conducted extensive comparison experiments to evaluate the performance of the proposed framework, and experimental results show that our scheme has superior computational and communication performance compared to the state-of-the-art schemes.

Keyword :

Decentralized federated learning Decentralized federated learning Polynomial commitment techniques Polynomial commitment techniques Committee-based blockchain Committee-based blockchain Byzantine attacks Byzantine attacks Masking techniques Masking techniques Secure aggregation Secure aggregation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhou, Ming , Yang, Zhen , Yu, Haiyang et al. VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain [J]. | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , 2023 , 223 .
MLA Zhou, Ming et al. "VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain" . | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 223 (2023) .
APA Zhou, Ming , Yang, Zhen , Yu, Haiyang , Yu, Shui . VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain . | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , 2023 , 223 .
Export to NoteExpress RIS BibTex
Model optimization techniques in personalized federated learning: A survey SCIE
期刊论文 | 2023 , 243 | EXPERT SYSTEMS WITH APPLICATIONS
WoS CC Cited Count: 5
Abstract&Keyword Cite

Abstract :

Personalized federated learning (PFL) is an exciting approach that allows machine learning (ML) models to be trained on diverse and decentralized sources of data, while maintaining client privacy and autonomy. However, PFL faces several challenges that can deteriorate the performance and effectiveness of the learning process. These challenges include data heterogeneity, communication overhead, model privacy, model drift, client heterogeneity, label noise and imbalance, federated optimization challenges, and client participation and engagement. To address these challenges, researchers are exploring innovative techniques and algorithms that can enable efficient and effective PFL. These techniques include several optimization algorithms. This research survey provides an overview of the challenges and motivations related to the model optimization strategies for PFL, as well as the state-of-the-art (SOTA) methods and algorithms which seek to provide solutions of these challenges. Overall, this survey can be a valuable resource for researchers who are interested in the emerging field of PFL as well as its potential for personalized machine learning in a federated environment.

Keyword :

Distributed machine learning Distributed machine learning Personalized federated learning Personalized federated learning Model optimization Model optimization Collaborative learning Collaborative learning Privacy-preserving Privacy-preserving

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Sabah, Fahad , Chen, Yuwen , Yang, Zhen et al. Model optimization techniques in personalized federated learning: A survey [J]. | EXPERT SYSTEMS WITH APPLICATIONS , 2023 , 243 .
MLA Sabah, Fahad et al. "Model optimization techniques in personalized federated learning: A survey" . | EXPERT SYSTEMS WITH APPLICATIONS 243 (2023) .
APA Sabah, Fahad , Chen, Yuwen , Yang, Zhen , Azam, Muhammad , Ahmad, Nadeem , Sarwar, Raheem . Model optimization techniques in personalized federated learning: A survey . | EXPERT SYSTEMS WITH APPLICATIONS , 2023 , 243 .
Export to NoteExpress RIS BibTex
EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks SCIE
期刊论文 | 2023 , 32 (2) , 1723-1737 | IEEE-ACM TRANSACTIONS ON NETWORKING
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

The rapid development of Industrial IoT (IIoT) opens up promising possibilities for data analysis and machine learning in IIoT networks. As a distributed paradigm, federated learning (FL) allows numerous IIoT devices to collaboratively train a global model without collecting their local data together in central servers. Unfortunately, a centralized server used to aggregate local gradients can be compromised and forge the result, which incurs the need for aggregation verification. Several approaches focusing on verifying the correctness of aggregation have been proposed. However, it is still an open problem since devices have to devote more computation resources for verification, which are especially not friendly to resource-constrained IIoT devices. Furthermore, verifying weighted aggregation has not been supported in existing approaches. In this paper, we propose an efficient verifiable federated learning approach for IIoT networks, which verifies the aggregation of gradients and requires lowest burden on IIoT devices by introducing zero-knowledge proof techniques. Moreover, our design supports weighted aggregation verification to validate the aggregation of weighted gradients in the cloud server. By comparing the proposed approach with the state-of-the-art schemes including VerifyNet and VeriFL, we demonstrate the superior performance of our approach for resource-constrained devices, which minimizes the computational overheads of the IIoT devices.

Keyword :

weighted aggregation weighted aggregation Federated learning Federated learning zero-knowledge proof zero-knowledge proof industrial IoT networks industrial IoT networks verifiability verifiability

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Xu, Runtong , Zhang, Hui et al. EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks [J]. | IEEE-ACM TRANSACTIONS ON NETWORKING , 2023 , 32 (2) : 1723-1737 .
MLA Yu, Haiyang et al. "EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks" . | IEEE-ACM TRANSACTIONS ON NETWORKING 32 . 2 (2023) : 1723-1737 .
APA Yu, Haiyang , Xu, Runtong , Zhang, Hui , Yang, Zhen , Liu, Huan . EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks . | IEEE-ACM TRANSACTIONS ON NETWORKING , 2023 , 32 (2) , 1723-1737 .
Export to NoteExpress RIS BibTex
SPR: Similarity pairwise ranking for personalized recommendation SCIE
期刊论文 | 2022 , 239 | KNOWLEDGE-BASED SYSTEMS
Abstract&Keyword Cite

Abstract :

Bayesian personalized ranking (BPR) has been proposed as an effective method to model pairwise learning, and it is widely used in many personalized recommender systems. However, the effectiveness of BPR can be seriously affected by an imbalanced data distribution because it tends to rank popular items ahead of personalized items. As a result, the personalized needs of users cannot be well met. In this paper, we propose a novel personalized recommendation method called similarity pairwise ranking (SPR) to rank users' favorite items first. SPR eliminates the differences in the scores between popular and personalized items based on their similarity by using a new penalty. In such a way, the SPR-enhanced recommendation will render meaningful and personalized results that better meet the individual needs of users, and it overcomes the negative impact of imbalanced datasets. We design a model to illustrate the improvement of SPR: similarity pairwise ranking matrix factorization (SPRMF). Experimental results obtained using six datasets indicate the superiority in recommendation quality of SPRMF over the recent state-of-the-art methods. (C) 2021 Elsevier B.V. All rights reserved.

Keyword :

Recommender system Recommender system Similar item pair Similar item pair Matrix factorization Matrix factorization Pairwise method Pairwise method

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Junrui , Yang, Zhen , Li, Tong et al. SPR: Similarity pairwise ranking for personalized recommendation [J]. | KNOWLEDGE-BASED SYSTEMS , 2022 , 239 .
MLA Liu, Junrui et al. "SPR: Similarity pairwise ranking for personalized recommendation" . | KNOWLEDGE-BASED SYSTEMS 239 (2022) .
APA Liu, Junrui , Yang, Zhen , Li, Tong , Wu, Di , Wang, Ruiyi . SPR: Similarity pairwise ranking for personalized recommendation . | KNOWLEDGE-BASED SYSTEMS , 2022 , 239 .
Export to NoteExpress RIS BibTex
Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media CPCI-S
期刊论文 | 2022 , 13194-13196 | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE
Abstract&Keyword Cite

Abstract :

This paper presents RealTIS, a Real-time emergent Topic Identification System for user-generated content on the web via social networking services such as Twitter, Weibo, and Facebook. Without user intervention, our proposed RealTIS system can efficiently collect necessary social media posts, construct a quality topic summarization from the vast sea of data, and then automatically identify whether the emerging topics will be out-breaking or just fading into silence. RealTIS uses a time-sliding window to compute the statistics about the basic structure (motifs) variation of the propagation network for a specific topic. These statistics are then used to predict unusual shifts in correlations, make early warning and detect outbreak. Besides, this work also illustrates the mechanism by which our proposed system makes early warning happen.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lu, Ning , Yang, Zhen , Huang, Jian et al. Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media [J]. | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE , 2022 : 13194-13196 .
MLA Lu, Ning et al. "Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media" . | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE (2022) : 13194-13196 .
APA Lu, Ning , Yang, Zhen , Huang, Jian , Wu, Yaxi , Wang, Hesong . Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media . | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE , 2022 , 13194-13196 .
Export to NoteExpress RIS BibTex
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks SCIE
期刊论文 | 2022 , 19 (3) , 2944-2956 | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
WoS CC Cited Count: 2
Abstract&Keyword Cite

Abstract :

The rapid growth of various vehicular apps such as automotive navigation and in-car entertainment has brought the explosion of vehicular data. Such a growth has given rise to a huge challenge of maintaining the quality of cloud storage services for the whole period of storage in vehicular networks. As a result, poor quality of services easily causes data corruption problems and thereby threats vehicular data integrity. Blockchain, a tamper-proofing technique, is considered a promising approach for mitigating data integrity risks in cloud storage. However, existing blockchain-based schemes for auditing long-term cloud data integrity suffer from poor communication performance in a vehicular network. In this study, a blockchain-based offline auditing scheme for cloud storage in the vehicular network is proposed to improve auditing performance. Inspired by the data structure of blockchain, we design an evidence chain to achieve offline auditing, which allows the cloud to spontaneously generate data integrity evidence without communicating with auditors during the evidence generation phase. Furthermore, we extend our scheme to support public and automatic validation based on the smart contract. We prove the security of the proposed scheme under the random oracle model and further provide the performance evaluation by comparing with the state-of-the-art approaches.

Keyword :

Metadata Metadata Vehicle dynamics Vehicle dynamics Blockchains Blockchains Security Security vehicular network vehicular network Data integrity Data integrity offline auditing offline auditing Cloud storage Cloud storage blockchain blockchain Cloud computing Cloud computing Vehicular ad hoc networks Vehicular ad hoc networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Yang, Zhen , Tu, Shanshan et al. Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks [J]. | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2022 , 19 (3) : 2944-2956 .
MLA Yu, Haiyang et al. "Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks" . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 19 . 3 (2022) : 2944-2956 .
APA Yu, Haiyang , Yang, Zhen , Tu, Shanshan , Waqas, Muhammad , Liu, Huan . Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2022 , 19 (3) , 2944-2956 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 22 >

Export

Results:

Selected

to

Format:
Online/Total:969/4742708
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.