Z. Wu

Z. Wu

About

533
Publications
88,698
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,716
Citations

Publications

Publications (533)
Article
With the reduction of the semiconductor process size, the problems of “memory wall” and “power wall” in von Neumann architectures are becoming increasingly prominent. To solve these problems, brain-inspired computing unifies computing and storage.
Article
This paper proposes a facial expression removal method to recover a 3D neutral face from a single 3D expressional or non-neutral face. We treat a 3D non-neutral face as the sum of its neutral one and the residual. This can be satisfied if the correspondence between 3D vertices of expressional faces and those of neutral faces is established. We prop...
Article
A service ecosystem is an increasingly popular service organization form, where participants, services, data, resources, and capital of different domains are integrated. It can empower business systems to consider the exchanged values and creations in a certain context. How to manage the participants’ cooperation and arrange the elements in the ser...
Article
Full-text available
Forecasting price trend of bulk commodities is important in international trade, not only for markets participants to schedule production and marketing plans but also for government administrators to adjust policies. Previous studies cannot support accurate fine-grained short-term prediction, since they mainly focus on coarse-grained long-term pred...
Article
Full-text available
Smartphones are changing humans' life style. Mobile applications (abbr. apps) on smartphones serve as entries for users to access a wide range of services in our daily lives. What apps installed on one's smartphone, i.e. app list, conveys lots of personal information, such as demographics, interests, and needs. This has the potential to provide us...
Article
Crossover service networks have become a trend promoting cross-enterprise, field, and -industry cooperation. As an innovation process for enterprises, crossover services can provide users creative, novel, and amalgamated services by breaking traditional organization, business, and domain boundaries. However, business and interface inconsistencies i...
Article
Brain-machine interface (BMI) provides a bidirectional pathway between the brain and external facilities. The machine-to-brain pathway makes it possible to send artificial information back into the biological brain, interfering neural activities and generating sensations. The idea of the BMI-assisted bio-robotic animal system is accomplished by sti...
Chapter
Audio replay attack poses great threat to Automatic Speaker Verification (ASV) systems. In this paper, we propose a set of features based on Teager Energy Operator and a slightly modified version of x-vector system to detect replay attacks. The proposed methods are tested on ASVspoof 2017 corpus. When using GMM with the proposed features, our best...
Chapter
Growing demands for automated analysis of animal behavior in areas such as neuroscience, psychology, genetics and pharmacology have been witnessed in recent decades. Some progresses have been made, but studies on social behavior analysis, which is more challenging, are rarely seen and almost all of them rely on hand-crafted features. Motivated by t...
Article
Full-text available
Objective: Brain network connectivity analysis plays an important role in computer-aided automatic localization of seizure onset zone (SOZ) from Intracranial Electroencephalography (iEEG). However, how to accurately compute brain network dynamics is still not well addressed. This work aims to develop an effective measure to find out the dynamics f...
Article
Full-text available
Brain-machine interfaces (BMIs) provide a promising information channel between the biological brain and external devices and are applied in building brain-to-device control. Prior studies have explored the feasibility of establishing a brain-brain interface (BBI) across various brains via the combination of BMIs. However, using BBI to realize the...
Chapter
This chapter begins with the motivation of sparse PCA–to improve the physical interpretation of the loadings. Second, we introduce the issues involved in sparse PCA problem that are distinct from PCA problem. Third, we briefly review some sparse PCA algorithms in the literature, and comment their limitations as well as problems unresolved. Forth, w...
Conference Paper
Full-text available
Spiking neural networks (SNNs) are considered to be biologically plausible and power-efficient on neuromorphic hardware. However, unlike the brain mechanisms, most existing SNN algorithms have fixed network topologies and connection relationships. This paper proposes a method to jointly learn network connections and link weights simultaneously. The...
Article
Full-text available
As more business workflow systems being deployed in modern enterprises and organizations, more employee-activity log data are being collected and analyzed. In this paper we develop a latent ability model (LAM) as a generative probabilistic learning framework for workforce analytics over employee-activity logs. The LAM development is novel in three...
Article
Full-text available
Objective: Computer-aided estimation of brain connectivity aims to reveal information propagation in brain automatically, which has great potential in clinical applications, e.g. epilepsy foci diagnosis. Granger causality is an effective tool for directional connection analysis in multivariate time series. However, most existing methods based on G...
Conference Paper
Full-text available
A new mobile cloud architecture has recently been proposed, where neighbouring mobile devices are brought together as a cohort for resource sharing. Thus, a mobile application can be partitioned into multiple tasks and be performed on different mobile devices, without offloading some tasks to remote cloud services for their processing. In this work...
Chapter
A rat robot is a type of animal robot in which an animal is connected to a machine system via a brain-computer interface (BCI). Electrical stimuli can be generated by the machine system and delivered to the animal’s brain to control its behavior. However, most existing rat robots require that a human observes the environmental layout to guide navig...
Article
Full-text available
Convolutional Neural Network (CNN) has gained attractions in image analytics and speech recognition in recent years. However, employing CNN for classification of graphs remains to be challenging. This paper presents the Ngram graph-block based convolutional neural network model for classification of graphs. Our Ngram deep learning framework consis...
Article
Full-text available
Understanding smartphone users is fundamental for creating better smartphones, improving the smartphone usage experience, and generating generalizable and reproducible research. However, smartphone manufacturers and most of the mobile computing research community make a simplifying assumption that all smartphone users are similar or, at best, const...
Article
Spectral graph theory has been widely applied in unsupervised and semi-supervised learning. In this paper, we find for the first time, to our knowledge, that it also plays a concrete role in supervised classification. It turns out that two classifiers are inherently related to the theory: linear regression for classification (LRC) and normalized ra...
Article
Full-text available
Prediction of memory performance (remembered or forgotten) has various potential applications not only for knowledge learning but also for disease diagnosis. Recently, subsequent memory effects (SMEs)—the statistical differences in electroencephalography (EEG) signals before or during learning between subsequently remembered and forgotten events—ha...
Article
Full-text available
The combination of biological and artificial intelligence is a promising methodology to construct a novel intelligent modality, proposed as cyborg intelligence. The hierarchical conceptual framework is based on the interaction and combination of comparable components of biological cognitive units and computing intelligent units. The authors extend...
Article
Full-text available
The combination of biological and artificial intelligence is particularly driven by two major strands of research: one involves the control of mechanical, usually prosthetic, devices by conscious biological subjects, whereas the other involves the control of animal behaviour by stimulating nervous systems electrically or optically. However, to our...
Conference Paper
Bike sharing is booming globally as a green transportation mode, but the occurrence of over-demand stations that have no bikes or docks available greatly affects user experiences. Directly predicting individual over-demand stations to carry out preventive measures is difficult, since the bike usage pattern of a station is highly dynamic and context...
Conference Paper
Full-text available
Understanding smartphone users is fundamental for creating better smartphones, and improving the smartphone usage experience and generating generalizable and reproducible research. However, smartphone manufacturers and most of the mobile computing research community make a simplifying assumption that all smartphone users are similar or, at best, co...
Article
Full-text available
Service computing offers an exciting paradigm for service provision and consumption. The field is now embracing new opportunities in the mobile Internet era, which is characterized by ubiquitous wireless connectivity and powerful smart devices that let users consume or provide services anytime and anywhere. In this article, the authors describe imp...
Article
Full-text available
Prevalence of smartphones is changing people's lifestyle. Mobile applications (abbr. APPs) on a smartphone serve as entries for users to access a wide range of services. What APPs installed on one's smartphone, i.e., APP list, convey lots of information regarding his/her personal attributes, such as gender, occupation, income, and preferences. This...
Article
This paper presents a system that utilizes process recommendation technology to help design new business processes from scratch in an efficient and accurate way. The proposed system consists of two phases: 1) offline mining and 2) online recommendation. At the first phase, it mines relations among activity nodes from existing processes in repositor...
Article
Smog disasters are becoming more and more frequent and may cause severe consequences on the environment and public health, especially in urban areas. Social media as a real-time urban data source has become an increasingly effective channel to observe people's reactions on smog-related health hazard. It can be used to capture possible smog-related...
Article
Full-text available
With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matri...
Article
Full-text available
Cyborg intelligence is an emerging kind of intelligence paradigm. It aims to deeply integrate machine intelligence with biological intelligence by connecting machines and living beings via neural interfaces, enhancing strength by combining the biological cognition capability with the machine computational capability. Cyborg intelligence is consider...
Data
A rat cyborg traversing complex terrain. (MP4)
Data
Stimulus parameters of the 6 rats/rat cyborgs. (XLS)
Data
Maps of the 24 mazes solved in our experiments. The start is in the bottom-left cell of each maze, and the target is in the top right-cell of each maze. (PDF)
Data
Dead road detection (Algorithm A). Unique road detection (Algorithm B). Loop detection (Algorithm C). (ZIP)
Data
Experimental data of maze solving in the 24 mazes (maze 1 to maze 24) by our algorithm, wall follower, Pledge and Tremaux’s algorithm. (XLS)
Data
Experimental data of maze solving in the 14 mazes (maze 1 to maze 14) by the computer and 6 rats/rat cyborgs. (XLS)
Data
Experimental data of maze solving in the 10 mazes (maze 15 to maze 24) by the computer and 2 rats/rat cyborgs. (XLS)
Article
Modern Service Industry (MSI) is becoming a leading and pillar industry in recent years. Its theory construction, however, has not kept up with the industry development. Specifically, the business process designing and reconstructing, the critical part in business transformation and competition of Modern Service Enterprise, are still handled manual...
Article
We address the problem of traffic sign recognition in a light detection and ranging (LIDAR)-equipped vehicle. With the help of 3-D LIDAR points, the 2-D multiview sign images will be easily detected from the captured images of street signs. After detection, the sign recognition problem is formulated as a multiview object recognition task. We develo...
Article
Full-text available
A rat cyborg system refers to a biological rat implanted with microelectrodes in its brain, via which the outer electrical stimuli can be delivered into the brain in vivo to control its behaviors. Rat cyborgs have various applications in emergency, such as search and rescue in disasters. Prior to a rat cyborg becoming controllable, a lot of effort...
Chapter
In recent years there has been a considerable interest in exploring the nature of learning and memory system among artificial intelligence researchers and neuroscientists about the neural mechanisms, simulation and enhancement. While a number of studies have investigated the artificial neural networks inspired by biological learning and memory syst...
Chapter
Quality-of-service (QoS)-based service selection and recommendation are an important issue of service-oriented computing. This chapter summarizes a series of QoS prediction approaches. For all those models, this chapter not only makes an analysis on their mechanism, but also the corresponding experimental results. At last, this chapter draws a conc...
Chapter
Today, web service, due to its open standards, has been used extensively to build distributed applications. Because web services can be reused and composed to fulfill a complex request, the issue of web service composition has grown to be a hot topic and has attracted many researchers to work on it. This chapter first gives an overview of the area...
Chapter
Service-oriented architecture (SOA), a hot topic in software design and development, is independent of any vendor, product, or technology. Web services, which make functional building blocks accessible over standard Internet protocols, independent of platforms and programing languages, can implement a SOA. This chapter will first provide an overvie...
Chapter
Web service discovery is to find and select the target services that satisfy users’ needs and constraints in the functional interface, interactive behavior, and nonfunctional attributes, through appropriate service-matching criteria and methods, from one or more service registries over a distributed network. This chapter first gives an overview of...
Chapter
Because web services can be reused and composed to fulfill a complex request, the issue of web service composition has grown to be a hot topic, and many researchers are attracted to work on it. This chapter first gives an overview of the area of service composition and addresses new challenges on service composition. Then it introduces three servic...
Chapter
Today, with services as the basic elements, service-oriented architecture as the guiding principle, and service reuse and service composition as the software design methods, service-oriented computing has become the latest developmental direction in current distributed computing. It is undeniable that service computing is leading the new round wave...
Chapter
Middleware, operating systems, and databases have been developed to the point where they have become fundamental components in the modern software era. The JTang middleware platform was developed for the modern service industry, and it offers a range of basic techniques, methods, middleware software, and tools for the services computing technology....
Chapter
Service selection is an important issue in the area of service computing. With the increase in the number of services, it is becoming a bigger challenge. In this section, we propose an efficient approach for Quality of Service (QoS)-based service selection, which decreases the range of choices without effectively pruning the potential candidates by...
Chapter
Identifying and composing a set of best candidates from the available vast services is the key point of composite service recommendation. The new availability of large amounts of data, along with the statistical approaches to crunch this data, offer a whole new way to understand composite service recommendation. In this chapter, we first give an ov...
Article
Full-text available
Container ports are generally measured and compared using performance indicators such as container throughput and facility productivity. Being able to measure the performance of container ports quantitatively is of great importance for researchers to design models for port operation and container logistics. Instead of relying on the manually collec...
Article
With the demand of high dimensional data analysis, data representation (or feature learning) has attracted more and more attention and becomes a central problem in pattern recognition and data mining. Non-negative Matrix Factorization (NMF) which is a useful data representation method makes great contribution in finding the latent structure of the...
Article
Aim: To study the association between expression of BLCA1 and clinicopathological parameters of bladder cancer. Method: Seventy-seven bladder cancer tissue samples were collected and primary antibody of BLCA1 was generated via animal inoculation. Immunohistochemical staining of BLCA1 and several pro-angiogenic factors were performed and evaluate...
Article
Extreme Learning Machine (ELM) proposed by Huang et al. [2] is a novel algorithm for single hidden layer feedforward neural networks (SLFNs) with extremely fast learning speed and good generalization performance. When new hidden nodes are added to the existing network, retraining the network would be time consuming, and EM-ELM [13] was proposed to...
Article
Ratbots with electric stimulation in their brains possess not only their own biological sensation, perception, memory, and locomotion control abilities, but also machine visual sensation, memory and computing functionalities. With electrodes implanted in the medial forebrain bundle (MFB), we propose here a hybrid bio-machine locomotion system in th...
Article
Full-text available
Modern service company (MSC), the enterprise involving special domains, such as the financial industry, information service industry and technology development industry, depends heavily on information technology. Modelling of such enterprise has attracted much research attention because it promises to help enterprise managers to analyse basic busin...
Article
A social event is an occurrence that involves lots of people and is accompanied by an obvious rise in human flow. Analysis of social events has real-world importance because events bring about impacts onmany aspects of city life. Traditionally, detection and impact measurement of social events rely on social investigation, which involves considerab...
Article
Full-text available
A rat robot is a type of animal robots, where an animal is connected to a machine system via a brain-computer interface. Electrical stimuli can be generated by the machine system and delivered to the animal's brain to control its behavior. The sensory capacity and flexible motion ability of rat robots highlight their potential advantages over mecha...
Article
Modern service industry (MSI) is an information and knowledge intensive service industry, relying on information technology and modern management philosophy. The development of MSI is of high significance for promoting rapid global economy, accelerating social progress, and realizing the general strategy of building an innovation-oriented society a...
Article
Improving energy efficiency of data centers has become increasingly important nowadays due to the significant amounts of power needed to operate these centers. An important method for achieving energy efficiency is server consolidation supported by virtualization. However, server consolidation may incur significant degradation to workload performan...
Article
Full-text available
This article proposes a state-space model with Cauchy observation noise (SSMC) to detect seizure onset in a long-term EEG monitoring system. Facing the challenge of high false detection rates (FDRs) in many existing methods caused by impulsive EOG/EMG artifacts, the SSMC uses a nonlinear state-space model to encode the gradual changes of epileptic...
Article
Full-text available
Service mashups are applications created by combining single-functional services (or APIs) dispersed over the web. With the development of cloud computing and web technologies, service mashups are becoming more and more widely used and a large number of mashup platforms have been produced. However, due to the proliferation of services on the web, h...
Chapter
Service-based systems are facing great uncertainty due to the dynamic internet environment. Service verification and reconfiguration are used as the main mechanisms to improve the robustness of service-based system. This chapter first gives an overview of service verification and dynamic reconfiguration. Then it introduces an approach to verify the...
Article
Gait, as a promising biometric for recognizing human identities, can be nonintrusively captured as a series of acceleration signals using wearable or portable smart devices. It can be used for access control. Most existing methods on accelerometer-based gait recognition require explicit step-cycle detection, suffering from cycle detection failures...
Article
In the era of Big Data, companies worldwide are actively deploying web services in both intranet and internet environments. Quality-of-Service (QoS), the fundamental aspect of web service has thus attracted numerous attention in industry and academia. The study on sufficient QoS data keeps advancing the state in Service-Oriented Computing (SOC) are...
Conference Paper
As pairwise constraints are usually easier to access than label information, pairwise constraint propagation attracts more and more attention in semi-supervised learning. Most existing pairwise constraint propagation methods are based on canonical graph propagation model, which heavily depends on the edge weights in the graph and cannot preserve lo...
Article
As a typical cyborg intelligent system, ratbots possess not only their own biological brain but machine visual sensation, memory, and computation. Electrodes implanted in the medial forebrain bundle (MFB) connect the rat's biological brain with the computer, which presents a hybrid bio-machine parallel memory system in the ratbot. For the novel mul...