Jian Yu

Jian Yu
  • Swinburne University of Technology

About

122
Publications
20,857
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,039
Citations

Publications

Publications (122)
Article
Full-text available
In recent years, the growing prevalence of group activities has brought increased interest in Point of Interest (POI) recommendations for groups. While significant progress has been made in recommending POIs for fixed groups, research on personality-aware recommendations for random groups has been still largely untouched. Moreover, existing works r...
Article
Full-text available
Deep learning on graphs, specifically graph convolutional networks (GCNs), has exhibited exceptional efficacy in the domain of recommender systems. Most GCNs have a message-passing architecture that enables nodes to aggregate information from neighbours iteratively through multiple layers. This enables GCNs to learn from higher-order information, b...
Article
Full-text available
Accurately predicting stock prices remains a challenging task due to the volatile and complex nature of financial markets. In this study, we propose a novel hybrid deep learning framework that integrates a large language model (LLM), a Linear Transformer (LT), and a Convolutional Neural Network (CNN) to enhance stock price prediction using solely h...
Preprint
Full-text available
In recent years, the growing prevalence of group activities has increased interest in Point of Interest (POI) recommendations for groups. While progress has been made in recommending POIs for fixed groups, research on personality-aware recommendations for random groups is relatively scarce. Moreover, existing works always recommend a POI list for t...
Preprint
Full-text available
The prediction of stock market price trends has always been a challenging issue, attracting widespread attention from both economists and computer scientists. Recently, integrating stock prices with news data has been shown to be an effective strategy for enhancing the accuracy of the prediction task. Yet, many current methods fail to fully leverag...
Article
Full-text available
Amid the rise of mobile technologies and Location-Based Social Networks (LBSNs), there’s an escalating demand for personalized Point-of-Interest (POI) recommendations. Especially pivotal in smart cities, these systems aim to enhance user experiences by offering location recommendations tailored to past check-ins and visited POIs. Distinguishing its...
Chapter
Proactive service is a kind of service that can be automatically provided based on logical judgment without human intervention. The traditional approach to evaluating proactive services involves conducting quantitative analyses through public datasets. However, this method can only evaluate the effectiveness of the specific algorithms and has limit...
Technical Report
Full-text available
This technical report presents a concrete IoT-BPM application case of dealing with seaborne safety ensurance in transporting Liquefied Natural Gas (LNG), identifies its technical challenges, and outlines the solution provided by the Service-based Methodology for Bridging Business Processes and IoT Big Data (BRIBOT) approach.
Article
Several techniques for Human Activity Recognition (HAR) in a smart indoor environment have been developed and improved along with the rapid advancement of sensor technologies. However, recognizing multiple people’s activities is still challenging due to the complexity of their activities, such as parallel and collaborative activities. To address th...
Article
Indoor localization is a crucial component of IoT applications in many areas, such as healthcare, energy management, and security control. Passive infrared (PIR) sensor has been employed for a location estimation due to its cost effectiveness, low power consumption, and low electromagnetic interference. Compared with its binary output, PIR analog o...
Article
Location estimation or localization is one of the key components in IoT applications such as remote health monitoring and smart homes. Amongst device-free localization technologies, passive infrared (PIR) sensors are one of the promising options due to their low cost, low energy consumption, and good accuracy. However, most of the existing systems...
Article
Full-text available
Background Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning (...
Article
Early DNN-based collaborative filtering (CF) approaches have demonstrated their superior performance than traditional CF such as Matrix Factorization. However, such approaches treat each user-item interaction as separate data and thus overlook the intrinsic relationships among data instances. Inspired by the discovery that the autoencoder architect...
Article
Despite the rapid growth and advancement in the Internet of Things (IoT ), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be potential misuse of users’ data and their identity in IoT applications. Several researchers have prop...
Chapter
We envisage that BPM and IoT Big Data will be the two pillars of next-generation Process-Aware Information Systems (PAIS). While IoT enables BPM to perceive and react to realtime events in the physical world, BPM can equip IoT with a well-developed modelling and implementation platform. However, the integration of BPM and IoT is facing paradigm mis...
Article
Internet of Things (IoT) devices generate a high volume of data that is processed and stored in traditional cloud computing. The processing including data replication in traditional cloud computing often results in excessive resource utilization, performance overhead, and long response time. Fog computing has been proposed to overcome the shortcomi...
Article
Despite the continual increase in the number of Web-APIs available on the internet, it is still challenging for API consumers to discover appropriate Web-APIs that could satisfy their requirements. One of the main reasons for this is that Web-APIs registered on online directories such as ProgrammableWeb are in general isolated , as they are reg...
Article
Easy accessibility of data and functions are the main advantages to develop mashups from abundant sources of Web APIs. However, it simultaneously brings difficulties to choose suitable APIs for a mashup. Existing probabilistic matrix factorization (PMF) recommender systems can effectively exploit the latent features of the invocations with the same...
Chapter
Full-text available
In the era of Web of Things and services, context-aware services (CASs) are emerging as an important technology for building innovative smart applications. CASs enable the information integration from both the physical and virtual world, which affects the way human live. However, it is still challenging to build CASs, due to lack of context provisi...
Chapter
The recent outbreak of the coronavirus disease (COVID-19) rapidly spreads across most of the countries. To alleviate the panics and prevent any potential social crisis, it is essential to effectively detect public concerns through social media. Twitter, a popular online social network, allows people to share their thoughts, views and opinions towar...
Preprint
Full-text available
Background. Forecasting the time of forthcoming pandemic reduces the impact of diseases by taking precautionary steps such as public health messaging and raising the consciousness of doctors. With the continuous and rapid increase in the cumulative incidence of COVID-19, statistical and outbreak prediction models including various machine learning...
Article
With the increasing popularity of the Internet of Things’ (IoT) and fog computing paradigm, aggregating IoT data considering privacy concerns over fog networks can be seen as one of the biggest security challenges. Numerous schemes address this problem. However, most of the existing schemes and their associated methods are heavyweight facing issues...
Article
Multi-resident Activity Recognition (AR), which has become a popular research field in smart environments, aims to recognize the activities of multiple residents based on data collected from various types of sensors, and sensor events segmentation is an important technique for enhancing the performance of activity recognition. While quite some segm...
Chapter
Online auction is one of the most successful internet business models. However, auction fraud has become the highest threat and hazard to the future of this business model. The blockchain provides a new perspective to resolve this problem. It can be used for current financial services, certificates, remittances, and online payments; meanwhile it al...
Article
Indoor device-free localization and tracking can bring both convenience and privacy to users compared with traditional solutions such as camera-based surveillance and RFID tag-based tracking. Technologies such as Wi-Fi, wireless sensor, and infrared have been used to localize and track people living in care homes and office buildings. However, the...
Article
Full-text available
Artifact-centric approach to business process modeling has received considerable attention for elevating data logic to the same level as the process flow logic. With the emergence of this modeling paradigm, several recent works have focused on synthesizing the indispensable lifecycles of key business entities called artifacts from the standalone ac...
Article
Full-text available
The explosion of reusable Web services (e.g., open APIs, open data sources, and cloud/IoT services), has become a new opportunity for modern service-composition based applications development. However, this enormous growth of Web services increases the difficulty of selecting the best suitable Web services for a particular application. Hence, the d...
Chapter
Network embedding models automatically learn low-dimensional and neighborhood graph representation in vector space. Even-though these models have shown improved performances in various applications such as link prediction and classification compare to traditional graph mining approaches, they are still difficult to interpret. Most works rely on vis...
Chapter
Full-text available
In recent years, artifact-centric paradigm as a data-centric approach to business process modeling has gained momentum. Compared to the traditional activity-centric paradigm that focuses on process control-flow and treats data as simple black boxes that act as input and output to these activities, the artifact-centric paradigm provides equal suppor...
Article
Full-text available
Modern software systems are continuously seeking for adaptability realizations, to generate better fit behaviours in response to domain changes. Requirements variability motivates adaptability; hence, understanding the influence of the domain changes, i.e. context variability, to requirements variability is necessary. In this paper, we propose an a...
Chapter
Full-text available
Designing efficient and effective Web service recommendation, primarily based on usage feedback, has become an important task to support the prevalent consumption of services. In the mashup-API invocation scenario, the most available feedback is the implicit invocation data, i.e., the binary data indicating whether or not a mashup has invoked an AP...
Article
Full-text available
By regarding a Solid‐state drive(SSD) as a black box and observing its external behavior instead of peeping into its internal details, we investigate how the factors of I/O granularity and I/O queue depth influence the throughput of an SSD through a series of experiments and relate to the internal parallelism of an SSD, and then propose the concept...
Article
Full-text available
Service composition, which is the integration of heterogeneous Web-accessible services, has introduced an open phenomenon for creating software systems that are deployed in an unpredictable execution context, where changes in the requirements, user preferences, and component services frequently occur. The consideration of adaptability in designing...
Preprint
Full-text available
Adaptability is a significant property which enables software systems to continuously provide the required functionality and achieve optimal performance. The recognised importance of adaptability makes its evaluation an essential task. However, the various adaptability dimensions and implementation mechanisms make adaptive strategies difficult to e...
Preprint
Full-text available
Goal-oriented requirements variability modelling has established the understanding for adaptability in the early stage of software development-the Requirements Engineering phase. Goal-oriented requirements variability modelling considers both the intentions, which are captured as goals in goal models, and the preferences of different stakeholders a...
Chapter
Full-text available
Internet of Things (IoT) is a paradigm that has the capability to revolutionize on everyday life, in sectors of ranging from our homes, health, transport, industry, entertainment to interaction with government. The comfort and benefits that IoT is providing are undeniable, however, these may come with a huge risk of individual identity and data pri...
Conference Paper
Web-APIs such as Google-Maps, Twilio and Twitter APIs form the building blocks of many mobile and web-based applications. They enable cross-organizational functionality integration and data sharing over the Web. Tens of thousands of these Web-APIs with a wide spectrum of functionalities are currently available on various registries such as Programm...
Chapter
Online auction is one of the most successful internet business models. However, auction fraud has become the highest threat and hazard to the future of this business model. The blockchain provides a new perspective to resolve this problem. It can be used for current financial services, certificates, remittances, and online payments; meanwhile it al...
Chapter
In recent decades, internet auctions have become the most significant e-commerce business model worldwide. With the rapid rise of cloud computing over the last few years, the legacy online auction platform is gradually being replaced using service-oriented cloud computing in real time. This chapter describes the design and implementation of a state...
Chapter
Web-APIs enable cross-organizational functionality integration over the Web and thus are the foundation of modern distributed service-based systems. However, despite the rapid increase in the number of Web-APIs available on the Internet, the discovery and uptake of appropriate Web-APIs by businesses on a Web scale is still a great challenge. One of...
Article
Artifact-centric business process modeling is emerging as a promising paradigm for modeling data-intensive business processes as it provides higher flexibility and extensibility support in comparison to the traditional activity-centric modeling paradigm. Several approaches exist on (semi-) automatically generating user interface (UI) models for act...
Preprint
Full-text available
The value and relevance of indigenous knowledge towards sustainability of human societies drives for its preservation. This work explored the use of Facebook groups to promote indigenous knowledge among Igorot peoples in the diaspora. The virtual communities help intensify the connection of Igorot migrants to their traditional culture despite the c...
Conference Paper
Full-text available
Localization and tracking ¹ are key components to enable personalized service in smart homes such as lifestyle support, energy management, and safety. To locate a person in a smart home, various sensors are installed. In this work, sensor data from only non Wifi-based devices and sensors such as PIR, pressure mat etc. are considered. The Particle f...
Conference Paper
Full-text available
Goal-oriented requirements variability modelling considers both the intentions, which are captured as goals in goal models, and the preferences of different stakeholders as the main sources of system behaviour variability. Most often, however, intentions and preferences vary according to contexts. In this paper, we propose an approach for a context...
Conference Paper
Mobile devices have become major sources of context-aware data due to their ubiquity and sensing capabilities. However, deploying mobile devices as dynamic, unabridged context data provider either locally or remotely is still challenging due to their limited computing capability. Furthermore, integrating physical sensor data with social context dat...
Conference Paper
Research on transforming traditional activity-centric processes into the newly emerged artifact-centric processes has gained an increasing interest in recent years. This transformation lead to the emergence of several approaches to transforming standalone activity-centric business processes, while neglecting the inter-organizational processes consi...
Article
The landscape of modern enterprise IT environments is that a large number of distributed software systems interact and cooperate with each other to support daily business operations. With the prevalence of cloud computing, the level of system connectivity increases further. The large scale of such an environment makes it difficult to test a system'...
Conference Paper
Full-text available
In recent years, artifact-centric business process modeling is gaining momentum with its improved flexibility and extensibility. In order to support the rapid translation of the traditional activity-centric processes into this new type of processes, this paper proposes a novel approach to automatically transforming an activity-centric process model...
Conference Paper
Full-text available
Business Process Modeling using artifact-centric approach has gained increasing interest over the past few years. The ability to put data and process aspects on an equal footing has made it a powerful tool for efficient business process modeling. The artifact-centric approach is based on key business-relevant entities called business artifacts, whi...
Article
Full-text available
With the advances of Internet technologies and an explosive growth in the popularity of social media, an increasingly large part of human life is getting digitized and becoming available on the web. This phenomenon brings opportunities and motivates us to infer users’ situations by exploiting their interaction events in various social media such as...
Article
Modern software systems are frequently required to be adaptive in order to cope with constant changes. Unfortunately, service-oriented systems built with WS-BPEL are still too rigid. In this paper, we propose a novel model-driven approach to supporting the development of dynamically adaptive WS-BPEL based systems. We model the system functionality...
Article
Full-text available
We present a social context as a service (SCaaS) platform for managing adaptations in collaborative pervasive applications that support interactions among a dynamic group of actors such as users, stakeholders, infrastructure services, businesses and so on. Such interactions are based on predefined agreements and constraints that characterize the re...
Conference Paper
To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the transformation can incur losses of information and degrade traceability. In this paper, we proposed and developed a workflow executio...
Article
Full-text available
The last decade has witnessed a tremendous growth of web services as a major technology for sharing data, computing resources, and programs on the web. With increasing adoption and presence of web services, designing novel approaches for efficient and effective web service recommendation has become of paramount importance. Most existing web service...
Article
Trust management is one of the most challenging issues in the emerging cloud computing area. Over the past few years, many studies have proposed different techniques to address trust management issues. However, despite these past efforts, several trust management issues such as identification, privacy, personalization, integration, security, and sc...
Article
SUMMARY Composite service selection is one of the core research issues in Web service composition. Because of the complex service correlation context, candidate services may perform differently when being used with other services. Presently, most service selection approaches ignore this issue, which makes the selected composite services less effici...
Conference Paper
Full-text available
In this paper, we present a social context as a service (SCaaS) platform for managing adaptations in collaborative pervasive applications that support interactions among a dynamic group of actors such as users, stakeholders, infrastructure services, businesses and so on. Such interactions are based on predefined agreements and constraints that char...
Conference Paper
Unit testing is a critical step in the development lifecycle of business processes for ensuring product reliability and dependability. Although plenty of unit testing approaches for WS-BPEL have been proposed, only a few of them designed and implemented a runnable unit testing framework, and none of them provides a technique to systematically speci...
Article
Mobile devices are equipped with increasing processing power and sensing capabilities, and mobile services can benefit from these features to provide a more personalized and context-aware experience to final users. To efficiently collect and deliver context information, a proper architecture is required, where heterogeneous context information can...
Article
Full-text available
The resources' heterogeneity and unbalanced capability, together with the diversity of resource requirements in cloud computing systems, have produced great contradictions between resources' tight coupling characteristics and user's multi-granularities ...
Article
An important challenge for the adoption of cloud computing in the scientific community remains the efficient allocation and execution of data-intensive scientific workflows to reduce execution time and the size of transferred data. The transferred data overhead is becoming significant with emerging scientific workflows that have input/output files...
Article
Full-text available
Social context information has been used with encouraging results in developing socially aware applications in different domains. However, users’ social context information is distributed over the Web and managed by many different proprietary applications, which is a challenge for application developers as they must collect information from differe...
Conference Paper
Full-text available
Context-awareness and adaptability are highly desirable features for services that are operating in dynamic environments. Recently, a number of approaches have been introduced to support the development of such services. But, validating the varying requirements of these services is still a major challenge. In this paper, we introduce a novel scenar...
Conference Paper
Full-text available
There is an increasing demand for context-aware adaptive services that can evolve at runtime in response to unanticipated changes in their environments or functionalities. Enabling the runtime evolution of such context-aware adaptive services is still a major challenge. In this paper, we introduce a novel approach to tackle this challenge. At the d...
Conference Paper
Full-text available
With increasing adoption and presence of Web services, designing novel approaches for efficient Web services recommendation has become steadily more important. Existing Web services discovery and recommendation approaches focus on either perishing UDDI registries, or keyword-dominant Web service search engines, which possess many limitations such a...
Conference Paper
Full-text available
Context-awareness and adaptability are highly desirable features for web services that operate in dynamic environments. In recent years, a number of approaches have been proposed to support the development of such services. However, the requirements elicitation of this kind of services and the synthesis of their design models from the requirements...
Conference Paper
Context-aware services often need to adapt their behaviors according to physical situations and user preferences. However, most of the existing approaches to developing context-aware services can only do adaptation based on globally defined adaptation logic without considering the personalized context-aware adaptation needs of a specific user. In t...
Conference Paper
Full-text available
In a cooperative convoy, a vehicle interacts with other vehicles, service providers and infrastructure systems to make the travel safe and convenient. Through these interactions a vehicle can share its domain-specific information -- acquired from service providers and infrastructure - with other vehicles in the convoy. Such interactions are subject...
Article
Modern enterprise software systems often need to interact with a large number of heterogeneous systems in an enterprise IT environment. The distributedness, large-scale-ness, and heterogeneity of such environment makes it difficult to test a system's quality attributes such as performance and scalability before it is actually deployed in the enviro...
Conference Paper
Full-text available
Social Context Information has been used with encouraging results in developing socially-aware applications in different domains. However, users’ social information is distributed over the web and managed by many different proprietary applications, which is a challenge for application developers as they must collect information from different sourc...
Article
Full-text available
Self-adaptive systems and context-aware systems have been proposed to provide the ability for a software system to adapt itself at runtime to cope with changes in its environment and user needs. However, research in self-adaptation and context-awareness has been carried out largely in separate communities, with limited reference to each other. Rese...
Article
User centricity represents a new trend in the currently flourishing serviceoriented computing era. By upgrading end-users to prosumers (producer + consumer) and involving them in the process of service creation, both service consumers and service providers can benefit from a cheaper, faster, and better service provisioning. The EU-IST research proj...
Article
Full-text available
The emergence of radio frequency identification (RFID) technology brings significant social and economic benefits. As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked RFID system formed by a set of distributed and collaborating parties. A trail of such recorded movements is the foundat...
Conference Paper
Full-text available
The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user ab...
Article
Full-text available
Purpose In the last decade, web services have become a major technology to implement loosely coupled business processes and perform application integration. Through the use of context, a new generation of web services, namely context‐aware web services (CASs), is currently emerging as an important technology for building innovative context‐aware ap...
Conference Paper
Full-text available
Service-oriented computing (SOC) has become a dominant paradigm in developing distributed Web-based software systems. Besides the benefits such as interoperability and flexibility brought by SOC, modern service-based software systems are frequently required to be highly adaptable in order to cope with rapid changes and evolution of business goals,...
Article
Full-text available
Follow the promising Web 2.0 paradigm, the telecommunications world also wants to implement the Telco 2.0 vision by inviting its users to actively participate in the creating and sharing of services accessible using handheld devices. The EU-IST research project OPUCE (Open Platform for User- Centric Service Creation and Execution) aims at providing...

Network

Cited By