Skip to main content

Showing 1–25 of 25 results for author: Lin, J C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18197  [pdf, other

    cs.CV

    Human-free Prompted Based Anomaly Detection: prompt optimization with Meta-guiding prompt scheme

    Authors: Pi-Wei Chen, Jerry Chun-Wei Lin, Jia Ji, Feng-Hao Yeh, Chao-Chun Chen

    Abstract: Pre-trained vision-language models (VLMs) are highly adaptable to various downstream tasks through few-shot learning, making prompt-based anomaly detection a promising approach. Traditional methods depend on human-crafted prompts that require prior knowledge of specific anomaly types. Our goal is to develop a human-free prompt-based anomaly detection framework that optimally learns prompts through… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2406.15396  [pdf, other

    cs.CV cs.AI cs.LG

    Feature Purified Transformer With Cross-level Feature Guiding Decoder For Multi-class OOD and Anomaly Deteciton

    Authors: Jerry Chun-Wei Lin, Pi-Wei Chen, Chao-Chun Chen

    Abstract: Reconstruction networks are prevalently used in unsupervised anomaly and Out-of-Distribution (OOD) detection due to their independence from labeled anomaly data. However, in multi-class datasets, the effectiveness of anomaly detection is often compromised by the models' generalized reconstruction capabilities, which allow anomalies to blend within the expanded boundaries of normality resulting fro… ▽ More

    Submitted 30 April, 2024; originally announced June 2024.

    Comments: 12 pages

  3. arXiv:2311.13160  [pdf, other

    cs.AI

    Large Language Models in Education: Vision and Opportunities

    Authors: Wensheng Gan, Zhenlian Qi, Jiayang Wu, Jerry Chun-Wei Lin

    Abstract: With the rapid development of artificial intelligence technology, large language models (LLMs) have become a hot research topic. Education plays an important role in human social development and progress. Traditional education faces challenges such as individual student differences, insufficient allocation of teaching resources, and assessment of teaching effectiveness. Therefore, the applications… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: IEEE BigData 2023. 10 pages

  4. arXiv:2305.01252  [pdf, other

    cs.LG

    HTPS: Heterogeneous Transferring Prediction System for Healthcare Datasets

    Authors: Jia-Hao Syu, Jerry Chun-Wei Lin, Marcin Fojcik, Rafał Cupek

    Abstract: Medical internet of things leads to revolutionary improvements in medical services, also known as smart healthcare. With the big healthcare data, data mining and machine learning can assist wellness management and intelligent diagnosis, and achieve the P4-medicine. However, healthcare data has high sparsity and heterogeneity. In this paper, we propose a Heterogeneous Transferring Prediction System… ▽ More

    Submitted 2 May, 2023; originally announced May 2023.

  5. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  6. arXiv:2208.12551  [pdf, other

    cs.AI

    Itemset Utility Maximization with Correlation Measure

    Authors: Jiahui Chen, Yixin Xu, Shicheng Wan, Wensheng Gan, Jerry Chun-Wei Lin

    Abstract: As an important data mining technology, high utility itemset mining (HUIM) is used to find out interesting but hidden information (e.g., profit and risk). HUIM has been widely applied in many application scenarios, such as market analysis, medical detection, and web click stream analysis. However, most previous HUIM approaches often ignore the relationship between items in an itemset. Therefore, m… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Comments: Preprint. 5 figures, 7 tables

  7. arXiv:2204.13620  [pdf, other

    eess.IV cs.CV

    Generative Adversarial Networks for Image Super-Resolution: A Survey

    Authors: Chunwei Tian, Xuanyu Zhang, Jerry Chun-Wei Lin, Wangmeng Zuo, Yanning Zhang, Chia-Wen Lin

    Abstract: Single image super-resolution (SISR) has played an important role in the field of image processing. Recent generative adversarial networks (GANs) can achieve excellent results on low-resolution images with small samples. However, there are little literatures summarizing different GANs in SISR. In this paper, we conduct a comparative study of GANs from different perspectives. We first take a look a… ▽ More

    Submitted 3 October, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

  8. arXiv:2104.11699  [pdf, ps, other

    cs.AI

    Secure Artificial Intelligence of Things for Implicit Group Recommendations

    Authors: Ke** Yu, Zhiwei Guo, Yu Shen, Wei Wang, Jerry Chun-Wei Lin, Takuro Sato

    Abstract: The emergence of Artificial Intelligence of Things (AIoT) has provided novel insights for many social computing applications such as group recommender systems. As distance among people has been greatly shortened, it has been a more general demand to provide personalized services to groups instead of individuals. In order to capture group-level preference features from individuals, existing methods… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

  9. Utility Mining Across Multi-Sequences with Individualized Thresholds

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Jiexiong Zhang, Philip S. Yu

    Abstract: Utility-oriented pattern mining has become an emerging topic since it can reveal high-utility patterns (e.g., itemsets, rules, sequences) from different types of data, which provides more information than the traditional frequent/confident-based pattern mining models. The utilities of various items are not exactly equal in realistic situations; each item has its own utility or importance. In gener… ▽ More

    Submitted 25 December, 2019; originally announced December 2019.

    Comments: Accepted by ACM Trans. on Data Science, 29 pages, 6 figures

    Journal ref: ACM Transactions on Data Science, 2020

  10. arXiv:1912.11670  [pdf, other

    cs.DB

    Discovering High Utility Episodes in Sequences

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Philip S. Yu

    Abstract: Sequence data, e.g., complex event sequence, is more commonly seen than other types of data (e.g., transaction data) in real-world applications. For the mining task from sequence data, several problems have been formulated, such as sequential pattern mining, episode mining, and sequential rule mining. As one of the fundamental problems, episode mining has often been studied. The common wisdom is t… ▽ More

    Submitted 25 December, 2019; originally announced December 2019.

    Comments: IEEE Transactions on Big Data, under review, 13 pages, 5 figures

  11. Utility-Driven Mining of Trend Information for Intelligent System

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Philippe Fournier-Viger, Xuan Wang, Philip S. Yu

    Abstract: Useful knowledge, embedded in a database, is likely to change over time. Identifying recent changes in temporal databases can provide valuable up-to-date information to decision-makers. Nevertheless, techniques for mining high-utility patterns (HUPs) seldom consider recency as a criterion to discover patterns. Thus, the traditional utility mining framework is inadequate for obtaining up-to-date in… ▽ More

    Submitted 25 December, 2019; originally announced December 2019.

    Comments: Accepted by ACM Trans. on Management Information Systems, 26 pages, 8 figures

    Journal ref: ACM Transactions on Management Information Systems, 2020

  12. arXiv:1909.03597  [pdf, other

    math.CO cs.DM

    Strongly chordal digraphs and $Γ$-free matrices

    Authors: Pavol Hell, Cesar Hernandez-Cruz, **g Huang, Jephian C. -H. Lin

    Abstract: We define strongly chordal digraphs, which generalize strongly chordal graphs and chordal bipartite graphs, and are included in the class of chordal digraphs. They correspond to square 0,1 matrices that admit a simultaneous row and column permutation avoiding the Γ matrix. In general, it is not clear if these digraphs can be recognized in polynomial time, and we focus on symmetric digraphs (i.e.,… ▽ More

    Submitted 12 November, 2019; v1 submitted 8 September, 2019; originally announced September 2019.

    MSC Class: 05C75; 05C17; 05C20; 05C85

  13. arXiv:1904.12248  [pdf, other

    cs.DB cs.DS

    Fast Utility Mining on Complex Sequences

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Jiexiong Zhang, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu

    Abstract: High-utility sequential pattern mining is an emerging topic in the field of Knowledge Discovery in Databases. It consists of discovering subsequences having a high utility (importance) in sequences, referred to as high-utility sequential patterns (HUSPs). HUSPs can be applied to many real-life applications, such as market basket analysis, E-commerce recommendation, click-stream analysis and scenic… ▽ More

    Submitted 27 April, 2019; originally announced April 2019.

    Comments: Under review in IEEE TKDE, 15 pages

  14. ProUM: Projection-based Utility Mining on Sequence Data

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Jiexiong Zhang, Han-Chieh Chao, Hamido Fujita, Philip S. Yu

    Abstract: Utility is an important concept in economics. A variety of applications consider utility in real-life situations, which has lead to the emergence of utility-oriented mining (also called utility mining) in the recent decade. Utility mining has attracted a great amount of attention, but most of the existing studies have been developed to deal with itemset-based data. Time-ordered sequence data is mo… ▽ More

    Submitted 12 September, 2019; v1 submitted 16 April, 2019; originally announced April 2019.

    Comments: Elsevier Information Science, 17 pages, 4 figures

    Journal ref: Information Science, 2020

  15. Correlated Utility-based Pattern Mining

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Hamido Fujita, Philip S. Yu

    Abstract: In the field of data mining and analytics, the utility theory from Economic can bring benefits in many real-life applications. In recent decade, a new research field called utility-oriented mining has already attracted great attention. Previous studies have, however, the limitation that they rarely consider the inherent correlation of items among patterns. Consider the purchase behaviors of consum… ▽ More

    Submitted 27 April, 2019; v1 submitted 5 April, 2019; originally announced April 2019.

    Comments: Elsevier Information Science, 15 pages

    Report number: 504: 470-486

    Journal ref: Information Sciences, 2019

  16. Utility-driven Data Analytics on Uncertain Data

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Athanasios V. Vasilakos, Philip S. Yu

    Abstract: Modern Internet of Things (IoT) applications generate massive amounts of data, much of it in the form of objects/items of readings, events, and log entries. Specifically, most of the objects in these IoT data contain rich embedded information (e.g., frequency and uncertainty) and different level of importance (e.g., unit utility of items, interestingness, cost, risk, or weight). Many existing appr… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: Under review in IEEE Internet of Things Journal since 2018, 11 pages

    Journal ref: IEEE Systems Journal, 2020

  17. Beyond Frequency: Utility Mining with Varied Item-Specific Minimum Utility

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S Yu

    Abstract: Utility-oriented mining which integrates utility theory and data mining is a useful tool for understanding economic consumer behavior. Traditional algorithms for mining high-utility patterns (HUPs) applies a single/uniform minimum high-utility threshold (minutil) to obtain the set of HUPs, but in some real-life circumstances, some specific products may bring lower utilities compared with others, b… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: Under review in ACM Trans. on Data Science, 31 pages

    Journal ref: ACM Transactions on Internet Technology, 2021

  18. arXiv:1902.09582  [pdf, other

    cs.DB

    Utility Mining Across Multi-Dimensional Sequences

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Jiexiong Zhang, Hongzhi Yin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu

    Abstract: Knowledge extraction from database is the fundamental task in database and data mining community, which has been applied to a wide range of real-world applications and situations. Different from the support-based mining models, the utility-oriented mining framework integrates the utility theory to provide more informative and useful patterns. Time-dependent sequence data is commonly seen in real l… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: Under review in IEEE TKDE, 14 pages

  19. HUOPM: High Utility Occupancy Pattern Mining

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu

    Abstract: Mining useful patterns from varied types of databases is an important research topic, which has many real-life applications. Most studies have considered the frequency as sole interestingness measure for identifying high quality patterns. However, each object is different in nature. The relative importance of objects is not equal, in terms of criteria such as the utility, risk, or interest. Beside… ▽ More

    Submitted 28 December, 2018; originally announced December 2018.

    Comments: Accepted by IEEE Transactions on Cybernetics, 14 pages

    Journal ref: IEEE Transactions on Cybernetics, 2019

  20. Privacy Preserving Utility Mining: A Survey

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Shyue-Liang Wang, Philip S. Yu

    Abstract: In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and applications, such as market basket analysis, retail, click-stream analysis, medical analysis, and bioinformatics. However, analysis of these data with… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

    Comments: 2018 IEEE International Conference on Big Data, 10 pages

    Journal ref: IEEE International Conference on Big Data (Big Data), 2018

  21. A Survey of Parallel Sequential Pattern Mining

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Philip S. Yu

    Abstract: With the growing popularity of shared resources, large volumes of complex data of different types are collected automatically. Traditional data mining algorithms generally have problems and challenges including huge memory cost, low processing speed, and inadequate hard disk space. As a fundamental task of data mining, sequential pattern mining (SPM) is used in a wide variety of real-life applicat… ▽ More

    Submitted 4 April, 2019; v1 submitted 26 May, 2018; originally announced May 2018.

    Comments: Accepted by ACM Trans. on Knowl. Discov. Data, 33 pages

    Journal ref: ACM Transactions on Knowledge Discovery from Data, 2019

  22. A Survey of Utility-Oriented Pattern Mining

    Authors: Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Vincent S. Tseng, Philip S. Yu

    Abstract: The main purpose of data mining and analytics is to find novel, potentially useful patterns that can be utilized in real-world applications to derive beneficial knowledge. For identifying and evaluating the usefulness of different kinds of patterns, many techniques and constraints have been proposed, such as support, confidence, sequence order, and utility parameters (e.g., weight, price, profit,… ▽ More

    Submitted 16 September, 2019; v1 submitted 26 May, 2018; originally announced May 2018.

    Comments: Survey paper, accepted by IEEE TKDE, 20 pages

    Journal ref: IEEE Transactions on Knowledge and Data Engineering, 2021

  23. arXiv:1709.08740  [pdf, ps, other

    math.CO cs.DM math.OC

    On the error of a priori sampling: zero forcing sets and propagation time

    Authors: Franklin H. J. Kenter, Jephian C. -H. Lin

    Abstract: Zero forcing is an iterative process on a graph used to bound the maximum nullity. The process begins with select vertices as colored, and the remaining vertices can become colored under a specific color change rule. The goal is to find a minimum set of vertices such that after iteratively applying the rule, all of the vertices become colored (i.e., a minimum zero forcing set). Of particular inter… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

    Comments: 17 pages

  24. arXiv:1709.08119  [pdf, other

    math.CO cs.DM

    Analogies between the crossing number and the tangle crossing number

    Authors: Robin Anderson, Shuliang Bai, Fidel Barrera-Cruz, Éva Czabarka, Giordano Da Lozzo, Natalie L. F. Hobson, Jephian C. -H. Lin, Austin Mohr, Heather C. Smith, László A. Székely, Hays Whitlatch

    Abstract: Tanglegrams are special graphs that consist of a pair of rooted binary trees with the same number of leaves, and a perfect matching between the two leaf-sets. These objects are of use in phylogenetics and are represented with straightline drawings where the leaves of the two plane binary trees are on two parallel lines and only the matching edges can cross. The tangle crossing number of a tanglegr… ▽ More

    Submitted 23 September, 2017; originally announced September 2017.

    Comments: 13 pages, 6 figures

    MSC Class: Primary: 05C10; Secondary: 05C62; 05C05; 92B10

  25. arXiv:cs/0310046  [pdf, ps, other

    cs.CC

    Theory of One Tape Linear Time Turing Machines

    Authors: Kohtaro Tadaki, Tomoyuki Yamakami, Jack C. H. Lin

    Abstract: A theory of one-tape (one-head) linear-time Turing machines is essentially different from its polynomial-time counterpart since these machines are closely related to finite state automata. This paper discusses structural-complexity issues of one-tape Turing machines of various types (deterministic, nondeterministic, reversible, alternating, probabilistic, counting, and quantum Turing machines) t… ▽ More

    Submitted 17 July, 2009; v1 submitted 23 October, 2003; originally announced October 2003.

    Comments: 26 pages, 10pt, letter size. A few corrections. This is a complete version of the paper that appeared in the Proceedings of the 30th SOFSEM Conference on Current Trends in Theory and Practice of Computer Science, Lecture Notes in Computer Science, Vol.2932, pp.335-348, Springer-Verlag, January 24-30, 2004

    ACM Class: F.1.1; F.1.2; F.4.3

    Journal ref: (journal version) Theoretical Computer Science, Vol.411, pp.22-43, 2010