Yunji Liang

Yunji Liang
Northwestern Polytechnical University | NWPU · Department of Management Information Systems

BS, MS, PHD

About

49
Publications
17,933
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
726
Citations
Additional affiliations
September 2018 - present
Northwestern Polytechnical University
Position
  • Professor (Associate)
January 2018 - September 2018
Chinese Academy of Sciences
Position
  • Research Assistant
October 2012 - July 2017
The University of Arizona
Position
  • Research Assistant

Publications

Publications (49)
Article
Full-text available
The built-in loudspeakers of mobile devices (e.g., smartphones, smartwatches, and tablets) play significant roles in human-machine interaction, such as playing music, making phone calls, and enabling voice-based interaction. Prior studies have pointed out that it is feasible to eavesdrop on the speaker via motion sensors, but whether it is possible...
Article
The blooming of fake news on social networks has devastating impacts on society, economy, and public security. Although numerous studies are conducted for the automatic detection of fake news, the majority tend to utilize deep neural networks to learn event-specific features for superior detection performance on specific datasets. However, the trai...
Poster
Full-text available
The goal of the workshop, fifth in the series at COMPSAC, is to foster interaction and information exchange among AI researchers and practitioners, both from academia and industry, on the safe, reliable and trustworthy application of Artificial intelligence (AI) and Machine learning (ML) in real-world applications. After decades of generous promise...
Article
With the global prevalence of mobile devices, concerns about mobile devices regarding privacy breaches and data leakage are rising. Although sensor permissions are required for mobile applications to access outputs of built-in sensors, motion sensors (e.g., accelerometer and gyroscope) can be visited directly without permission requirement. Extant...
Article
As cybercrimes grow in scale with devastating economic costs, it is important to protect potential victims against diverse attacks. It is the uniform resource locators (URLs) that connect vulnerable users with potential attacks. Although numerous solutions (e.g., rule-based solutions and machine learning-based methods) are proposed for malicious UR...
Article
Full-text available
In ride matching, the search results can be personalized for a particular driver. Given a query with trip plans, it is advantageous to rank potential riders in terms of who are most appealing to the driver for increasing occupancy rates. While personalized ranking approaches such as collaborative filtering and factorization are available, they are...
Article
In e-commerce platforms, the online descriptive information of products shows significant impacts on the purchase behaviors. To attract potential buyers for product promotion, numerous workers are employed to write the impressive product descriptions. The hand-crafted product descriptions are less-efficient with great labor costs and huge time cons...
Article
Full-text available
With the proliferation of Internet of Things (IoT) devices in the consumer market, the unprecedented sensing capability of IoT devices makes it possible to develop advanced sensing and complex inference tasks by leveraging heterogeneous sensors embedded in IoT devices. However, the limited power supply and the restricted computation capability make...
Preprint
The blooming of fake news on social networks has devastating impacts on society, economy, and public security. Although numerous studies are conducted for the automatic detection of fake news, the majority tend to utilize deep neural networks to learn event-specific features for superior detection performance on specific datasets. However, the trai...
Article
Full-text available
With the exponential growth of user-generated content, policies and guidelines are not always enforced in social media, resulting in the prevalence of deviant content violating policies and guidelines. The adverse effects of deviant content are devastating and far-reaching. However, the detection of deviant content from sparse and imbalanced textua...
Chapter
In this paper, we detect the mental health status of the posters based on social media. Due to the wide range of textual data length in social media, we prove that the length of text input has an effect on the main deep learning architectures such as Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) used in text classification....
Article
The rapid proliferation of user generated content has given rise to large volumes of text corpora. Increasingly, scholars, researchers, and organizations employ text classification to mine novel insights for high-impact applications. Despite their prevalence, conventional text classification methods rely on labor-intensive feature engineering effor...
Article
App popularity prediction is significant in mobile service development, providing benefits from app development to targeted investment. Popularity is affected by two factors, i.e., internal ones like reviews and external ones resulted by app interaction. However, existing studies only explore internal factors but neglect external ones. App interact...
Article
Full-text available
The massive spread of false information on social media has become a global risk, implicitly influencing public opinion and threatening social/political development. False information detection (FID) has thus become a surging research topic in recent years. As a promising and rapidly developing research field, we find that much effort has been paid...
Book
This book constitutes the refereed proceedings of the Workshops from the 15th International Conference on Green, Pervasive, and Cloud Computing, GPC 2020, held in Xi'an, China, in November 2020. Due to the COVID-19 pandemic this event was held virtually. The 5 full papers presented in this book together with 3 short papers were carefully reviewed a...
Preprint
Full-text available
The massive spread of misinformation in social networks has become a global risk, implicitly influencing public opinion and threatening social/political development. Misinformation detection (MID) has thus become a surging research topic in recent years. As a promising and rapid developing research field, we find that many efforts have been paid to...
Preprint
Cyber crimes including computer virus/malwares, spam, illegal sales, and phishing websites are proliferated aggressively via the disguised Uniform Resource Locators (URL). Although numerous studies were conducted for the URL classification task, the traditional URL classification solutions retreated due to the hand-crafted feature engineering and t...
Preprint
In the last two decades, the landscape of text generation has undergone tremendous changes and is being reshaped by the success of deep learning. New technologies for text generation ranging from template-based methods to neural network-based methods emerged. Meanwhile, the research objectives have also changed from generating smooth and coherent s...
Article
The landscape of mental health has undergone tremendous changes within the last two decades, but the research on mental health is still at the initial stage with substantial knowledge gaps and the lack of precise diagnosis. Nowadays, big data and artificial intelligence offer new opportunities for the screening and prediction of mental problems. In...
Chapter
With the unprecedented sensing capabilities and the emergence of Internet of things, studies on activity recognition have been hot issues for different application areas, such as pervasive healthcare, industry and commerce, and recommendation systems. Much effort has been devoted to activity recognition using different sensors. Based on the differe...
Conference Paper
Full-text available
The electronic cigarette (e-cigarette) marketing is unregulated on social media currently. Flavor is one of the potent marketing strategies for e-cigarette manufactures and vendors. In this paper, we investigate the flavor-related e-cigarette marketing and online users’ response to flavor-related e-cigarette marketing in Facebook. We find that the...
Article
Full-text available
Social media is becoming a new battlefield for tobacco “wars”. Evaluating the current situation is very crucial for the advocacy of tobacco control in the age of social media. To reveal the impact of tobacco-related user-generated content, this paper characterizes user interaction and social influence utilizing social network analysis and informati...
Article
Full-text available
Social media is becoming a new battlefield for tobacco “wars”. Evaluating the current situation is very crucial for the advocacy of tobacco control in the age of social media. To reveal the impact of tobacco-related user-generated content, this paper characterizes user interaction and social influence utilizing social network analysis and informati...
Article
Full-text available
Background The commercial potential of social media is utilized by tobacco manufacturers and vendors for tobacco promotion online. However, the prevalence and promotional strategies of pro-tobacco content in social media are still not widely understood. Objective The goal of this study was to reveal what is presented by the tobacco industry, and ho...
Article
The study of geo-social behaviors has long been a scientific problem. In contrast to traditional social science, which suffers from the problems such as high data collection cost and imported user subjectivity, a new approach is presented to study social behaviors based on mobile phone sensing data. Different from other similar studies on mobile so...
Article
Full-text available
With the embracing of mobile Internet of Things, participatory media is becoming a new battlefield for tobacco wars. However, how to automatically collect and analyze the large-scale user-generated data that are relevant to tobacco in participatory media is still unexplored. In this paper, we propose an integrated approach of sensing collective act...
Article
Full-text available
Human activities have been investigated and applied in various fields, such as context-aware computing, search engine, social network services, location-based services, automated visual surveillance, and multimodal human-computer interaction. However, the human activities in the review process of academic conferences have seldom been explored. Ther...
Conference Paper
Full-text available
Social media is widely utilized in the tobacco control campaigns. It is a great challenge to evaluate the efficiency of tobacco control policies on social network sites and find gaps among tobacco-oriented social networks. In this paper, we construct three tobacco-oriented social networks according to user interaction on Facebook tobacco-related fa...
Article
Full-text available
The Internet of Things (IoT) represents the future technology trend of sensing, computing, and communication. Under the Wisdom Web of Things (W2T) vision, the next-generation Internet will promote harmonious interaction among humans, computers, and things. Current research on IoT is primarily conducted from the perspective of identifying, connectin...
Article
Full-text available
Activity recognition plays an important role for pervasive healthcare such as health monitoring, assisted living and pro-active services. Despite of the continuous and transparent sensing with various built-in sensors in mobile devices, activity recognition on mobile devices for pervasive healthcare is still a challenge due to the constraint of res...
Article
With the popularity of smart phones, the warm embrace of social networking services, and the perfection of wireless communication, mobile social networking has become a hot research topic. The characteristics of mobile devices and requirements of services in social environments pose challenges to the construction of a social platform. In this chapt...
Chapter
With the unprecedented sensing capabilities and the emergence of Internet of things, studies on activity recognition have been hot issues for different application areas, such as pervasive healthcare, industry and commerce, and recommendation systems. Much effort has been devoted to activity recognition using different sensors. Based on the differe...
Chapter
In the past decades, numerous research efforts have been made to model and extract the contexts of users in pervasive computing environments. The recent explosion of sensor-equipped mobile phone market and the phenomenal growth of geo-tagged data (Twitter messages, Foursquare check-ins, etc.) have enabled the analysis of new dimensions of contexts...
Conference Paper
Full-text available
Over the last few years, many efforts have been devoted to revealing human mobility patterns. However, the regularity and variability of human mobility from a microscopic view, i.e., what factors affect human mobility patterns, has yet not been investigated. In this paper, we aim to study the impact factors that may affect the regularity and variab...
Article
Full-text available
Many pervasive services are embedded in smart homes. It is a great challenge to schedule these services due to the heterogeneity and the mobility of devices. In this article, we elaborate a context-aware service scheduling framework (CASSF), which discovers available services hosted on those heterogeneous and mobile devices, selects suitable servic...
Conference Paper
Full-text available
Smart phone is becoming an ideal platform for continuous and transparent sensing with lots of built-in sensors. Activity recognition on smart phones is still a challenge due to the constraints of resources, such as battery lifetime, computational workload. Keeping in view the demand of low energy activity recognition for mobile devices, we propose...
Article
Full-text available
With the development of wireless communication, the popularity of smart phones, the increasing of social networking services, mobile social networking has become a hot research topic. The characteristics of mobile devices and requirements of services in social environments raise a challenge on building a platform for mobile social services. In this...
Conference Paper
Human activities have been investigated and applied in various fields, such as context-aware computing, social network service, location-based service, etc. However, the human activities in the review process of academic conferences have seldom been analyzed. It is no doubt that review process plays an important role in deciding whether a paper cou...
Conference Paper
Full-text available
There are many devices embedded in a smart home environment. It is a challenge to operate these devices due to the heterogeneity and the mobility of them. In this paper, we propose a context-aware resource management framework, which aims to (1) discover available resources and update the states of those devices according to the changes of contexts...

Network

Cited By