Dapeng Oliver Wu's research while affiliated with City University of Hong Kong and other places

Publications (300)

Article
The accurate prediction of protein-ligand binding affinity is critical for the success of computer-aided drug discovery. However, the accuracy of current scoring functions is usually unsatisfactory due to their rough approximation or sometimes even omittance of many factors involved in protein-ligand binding. For instance, the intrinsic dynamics of...
Article
A cellular unmanned-aerial-vehicle (UAV)-enabled system is studied in this research, where multiple UAVs work cooperatively to upload the collected sensory data to the base station (BS). The UAVs form a two-tier network with two kinds of communication modes, i.e., UAV-to-Network (U2N) and UAV-to-UAV (UAV) communications. We investigate the communic...
Preprint
Lots of real-time applications over Internet of things (IoT)-based status update systems have imperative demands on information freshness, which is usually evaluated by age of information (AoI). Compared to the average AoI and peak AoI (PAoI), violation probabilities and distributions of AoI and PAoI characterize the timeliness in more details. Thi...
Article
This paper presents GeoDMA , which processes the GPS data from multiple vehicles to detect anomalous driving maneuvers, such as rapid acceleration, sudden braking, and rapid swerving. First, an unsupervised deep auto-encoder is designed to learn a set of unique features from the normal historical GPS data of all drivers. We consider the temporal de...
Article
A deep learning method called PTR-CNN (Predicted frame with Transform unit partition and prediction Residual aided CNN) is proposed for in-loop filtering in video compression. To reduce the computational complexity of an end-to-end CNN in-loop filter, a non-learning method of reference frame selection is designed to select the highest quality frame...
Article
Full-text available
This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profi...
Conference Paper
Federated learning enables multiple distributed devices to collaboratively learn a shared prediction model without centralizing their on-device data. Most of the current algorithms require comparable individual efforts for local training with the same structure and size of on-device models, which, however, impedes participation from resource-constr...
Article
Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning as a Service (MLaaS). Recent studies show that machine learning services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing att...
Article
Resource provisioning for the ever-increasing applications to host the necessary network functions necessitates the efficient and accurate prediction of required resources. However, the current efforts fail to leverage the inherent features hidden in network traffic, such as temporal stability, service correlation and periodicity, to predict the re...
Article
Federated Edge Learning considers a large amount of distributed edge nodes collectively train a global gradient-based model for edge computing in the Artificial Internet of Things, which significantly promotes the development of cloud computing. However, current federated learning algorithms take tens of communication rounds transmitting unwieldy m...
Article
Unsupervised domain adaptation (UDA) aims to utilize knowledge from a label-rich source domain to understand a similar yet distinct unlabeled target domain. Notably, global distribution statistics across domains and local semantic characteristics across samples, are two essential factors of data analysis that should be fully explored. Most existing...
Article
The span of Internet of Things (IoT) is expanding owing to numerous applications being linked to massive devices. Subsequently, node failures frequently occur because of malicious attacks, battery exhaustion, or other malfunctions. A reliable and robust network topology can alleviate the cascading collapse caused by local node failures. Existing op...
Article
Unmanned aerial vehicles (UAVs) play a crucial role in emergency-oriented applications. However, in UAV-aided Internet of Things (IoT) networks, the sensor nodes (SNs) would be mobile which poses a big challenge for trajectory planning of the UAV. In this paper, we investigate priority-oriented UAV-aided time-sensitive data collection problems in a...
Preprint
Full-text available
Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and transmission tasks quickly, robustly, and cost-efficiently via effective cooperation among UAVs. To achieve the promising benefits, the crucial I-UAV networking issue should be tackled. This article argues that I-UAV networking can be classified into three catego...
Article
With the wide deployment of edge devices, a variety of emerging applications have been deployed at the edge of network. To guarantee the safe and efficient operations of the edge applications, especially the extensive web applications, it is important and challenging to detect packet payload anomalies, which can be expressed as a number of specific...
Preprint
The accurate prediction of protein-ligand binding affinity is critical for the success of computer-aided drug discovery. However, the accuracy of current scoring functions is usually unsatisfactory due to their rough approximation or sometimes even omittance of many factors involved in protein-ligand binding. For instance, the intrinsic dynamic of...
Article
Graph clustering, i.e., partitioning nodes or data points into non-overlapping clusters, can be beneficial in a large varieties of computer vision and machine learning applications. However, main graph clustering schemes, such as spectral clustering, cannot be applied to a large network due to prohibitive computational complexity required. While th...
Preprint
In this paper, we propose a single-agent Monte Carlo based reinforced feature selection (MCRFS) method, as well as two efficiency improvement strategies, i.e., early stopping (ES) strategy and reward-level interactive (RI) strategy. Feature selection is one of the most important technologies in data prepossessing, aiming to find the optimal feature...
Article
Internet of Things (IoT) includes numerous sensing nodes that constitute a large scale-free network. Optimizing the network topology to increase resistance against malicious attacks is a complex problem, especially on 3-dimension (3D) topological deployment. Heuristic algorithms, particularly genetic algorithms, can effectively cope with such probl...
Article
In the areas after natural disaster strikes, the ground communication network can be failed, due to the damage of the communication infrastructure. However, during or after the natural disasters such as earthquakes or tsunamis, ground vehicles may not enter the effected areas easily to set up mobile base stations. Unmanned Aerial Vehicles (UAVs) ca...
Article
Widespread deployment of the Internet of Things (IoT) has changed network services in which people, processes, data, and things connect each other. According to Cisco, 500 billion devices are expected to be connected to the Internet by 2030, where IoT is the network of these connected devices. Currently, most advanced IoT devices are equipped with...
Article
Full-text available
Lots of machine learning tasks require dealing with graph data, and among them, scene graph generation is a challenging one that calls for graph neural networks’ potential ability. In this paper, we present a definition of graph neural network (GNN) consists of node, edge and global attribute, as well as their corresponding update and aggregate fun...
Article
The statistical values of the latencies between two sets of hosts over a given period, which is referred as to statistical latency, can benefit many applications in the next-generation networks, such as Network in a Box (NIB) based resource provisioning. However, existing methods can hardly achieve low measurement cost and high prediction accuracy...
Article
This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme...
Article
Indoor positioning technology based on Wi-Fi fingerprint recognition has been widely studied owing to the pervasiveness of hardware facilities and the ease of implementation of software technology. However, the similarity-based method is not sufficiently accurate, whereas the offline training of the neural network-based method is overly time-consum...
Article
In this paper, we develop a novel global-attention-based neural network (GANN) for vision language intelligence, specifically, image captioning (language description of a given image). As many previous works, the encoder-decoder framework is adopted in our proposed model, in which the encoder is responsible for encoding the region proposal features...
Article
The Internet of Things (IoT) has been extensively deployed in smart cities. However, with the expanding scale of networking, the failure of some nodes in the network severely affects the communication capacity of IoT applications. Therefore, researchers pay attention to improving communication capacity caused by network failures for applications th...
Article
Full-text available
Federated learning (FL) enables multiple clients to collaboratively build a global learning model without sharing their own raw data for privacy protection. Unfortunately, recent research still found privacy leakage in FL, especially on image classification tasks, such as the reconstruction of class representatives. Nevertheless, such analysis on i...
Preprint
Full-text available
This paper investigates whether computer usage profiles comprised of process-, network-, mouse- and keystroke-related events are unique and temporally consistent in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profi...
Article
Recognizing human expression in videos is a challenging task due to dynamic changes in facial actions and diverse visual appearances. The key to design a reliable video-based expression recognition system is to extract robust spatial features and make full use of temporal modality characteristics. In this paper, we present a novel network architect...
Article
Recently increasing real-time network applications have raised a new requirement for the future 6G network transmission, which desires the information-update packets arrive at the receiver as timely as possible. Multipath TCP (MPTCP) can be employed in the real-time update transmission system by making use of multiple paths so as to promote the inf...
Article
With the rapid growth in the demand for location-based services in indoor environments, wireless fingerprint localization has attracted increasing attention because of its high precision and easy implementation. However, an effective method does not exist owing to the problems of data loss, noise interference in the fingerprint database, and being...
Article
Future wireless networks are envisioned to serve massive Internet of things (mIoT) via some radio access technologies, where the random access channel (RACH) procedure should be exploited for IoT devices to access the networks. However, the theoretical analysis of the RACH procedure for massive IoT devices is challenging. To address this challenge,...
Preprint
Full-text available
Federated learning allows distributed devices to collectively train a model without sharing or disclosing the local dataset with a central server. The global model is optimized by training and averaging the model parameters of all local participants. However, the improved privacy of federated learning also introduces challenges including higher com...
Article
Mobile Opportunistic Networks (MONs) are characterized by the lack of continuous end-to-end connectivity between two nodes due to node mobility, sparse deployment, and constrained resources. In order to fulfill ubiquitous communication requirements of them, social-aware routing, which exploits social ties and behaviors among nodes to make forwardin...
Article
To enable insight extractions without the risk of information leakage, deep learning (DL) models are increasingly built on federated edge participants holding local data, in combination with differential privacy (DP). The core theme is to tradeoff learning accuracy by adding statistically calibrated noises, particularly to local gradients of edge l...
Article
Computed tomography (CT) images are formally taken as an assistance of early diagnosis in lung nodule analysis. Thus the accurate lung nodule segmentation is in great need for image-driven tasks. However, as heterogeneity exists between different types of lung nodules, the similar visual appearance between the pixels of nodules and pixels of non-no...
Article
Occupying the most significant portion of global data traffic, video is being generated in almost every aspect of our life. Because of its huge volume, we are depending much more heavily on machine intelligence based analysis. In the meantime, video coding technology has been continuously improved for better compression efficiency. However, the sta...
Article
Full-text available
Estimating the depth of image and egomotion of agent are important for autonomous and robot in understanding the surrounding environment and avoiding collision. Most existing unsupervised methods estimate depth and camera egomotion by minimizing photometric error between adjacent frames. However, the photometric consistency sometimes does not meet...
Article
Full-text available
Graph Neural Networks (GNNs) have been applied in many fields of semi-supervised node classification for non-Euclidean data. However, some GNNs cannot make good use of positive information brought by nodes which are far away from each central node for aggregation operations. These remote nodes with positive information can enhance the representatio...
Article
Large volumes of video data recorded by the increasing mobile devices and embedded sensors can be leveraged to answer queries of our lives, physical world and our evolving society. Especially, the rapid development of convolutional neural networks (CNNs) in the past few years offers the great advantage for multiple tasks in video analysis. However,...
Article
Full-text available
Long-term visual tracking undergoes more challenges and is closer to realistic applications than short-term tracking. However, the performances of most existing methods have been limited in the long-term tracking tasks. In this work, we present a reliable yet simple long-term tracking method, which extends the state-of-the-art learning adaptive dis...
Article
Full-text available
This paper is concerned with slicing a radio access network (RAN) for simultaneously serving two 5G-and-Beyond typical use cases, i.e., enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC). Although many researches have been conducted to tackle this issue, few of them have considered the impact of bursty URLLC....
Article
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering methods. Missing instances may make these methods difficult to use directly, and noises will lead to unreliable clustering results. In...
Article
Huanglongbing (HLB) is a devastating citrus disease worldwide. A three-pronged approach to controlling HLB has been suggested, namely, removal of HLB-symptomatic trees, psyllid control, and replacement with HLB-free trees. However, such a strategy did not lead to successful HLB control in many citrus producing regions. We hypothesize this is becaus...
Article
Computational drug design relies on the calculation of binding strength between two biological counterparts especially a chemical compound, i.e., a ligand, and a protein. Predicting the affinity of protein-ligand binding with reasonable accuracy is crucial for drug discovery, and enables the optimization of compounds to achieve better interaction w...
Chapter
Full-text available
Recently web applications have been widely used in enterprises to assist employees in providing effective and efficient business processes. Forecasting upcoming web events in enterprise web applications can be beneficial in many ways, such as efficient caching and recommendation. In this paper, we present a web event forecasting approach, DeepEvent...
Article
Random mobility models (RMMs) capture the random mobility patterns of mobile agents, and have been widely used as the modeling framework for the evaluation and design of mobile networks. All existing RMMs in the literature assume independent movements of mobile agents, which does not hold for unmanned aircraft systems (UASs). In particular, UASs mu...
Article
Unmanned aerial vehicle (UAV) relay networks are convinced to be a significant complement to terrestrial infrastructures to provide robust network capacity. However, most of the existing works either considered enhanced mobile broadband (eMBB) payload communication or ultra-reliable and low latency communications (URLLC) control information communi...
Preprint
Full-text available
Real data often appear in the form of multiple incomplete views. Incomplete multiview clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information between different views and ignore the unique information of each view, which limits their clustering performance and generalizations. To...
Preprint
Full-text available
Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous works assume that all views have the same incompleteness, i.e., balanced incompleteness. However, different views often have distinct incompleteness, i.e., unbalanced incompleteness, which results in strong views (low-incompletene...
Preprint
Multi-view clustering has wide applications in many image processing scenarios. In these scenarios, original image data often contain missing instances and noises, which is ignored by most multi-view clustering methods. However, missing instances may make these methods difficult to use directly and noises will lead to unreliable clustering results....
Article
Future wireless networks are convinced to provide flexible and cost-efficient services via exploiting network slicing techniques. However, it is challenging to configure slicing systems for bursty ultra-reliable and low latency communications (URLLC) service provision due to its stringent requirements on low packet blocking probability and low code...
Article
Erasure coding is widely used in distributed storage systems (DSSs) to efficiently achieve fault tolerance. However, when the original data need to be updated, erasure coding must update every encoded block, resulting in long update time and high bandwidth consumption. Exiting solutions are mainly focused on coding schemes to minimize the size of t...
Article
In this paper, a resource allocation problem is formulated to maximize the throughput of vehicular user equipments (VUEs) in both licensed, and unlicensed frequency bands under constraints of reliability, and latency for vehicular communications as well as the Quality of Service (QoS) for WiFi network based on a network system with coexisting VUEs,...
Article
Full-text available
Internet of Underwater Things (IoUT) has a wide range of application prospects in civil and military fields. As a key enabling technology of IoUT, Underwater acoustic sensor networks (UASNs) feature a variety of unique characteristics, including high latency, high mobility and low bandwidth. All these problems pose challenges in the design of effic...
Preprint
Full-text available
Deep neural networks (DNNs) have become the essential components for various commercialized machine learning services, such as Machine Learning as a Service (MLaaS). Recent studies show that machine learning services face severe privacy threats - well-trained DNNs owned by MLaaS providers can be stolen through public APIs, namely model stealing att...
Preprint
Current federated learning algorithms take tens of communication rounds transmitting unwieldy model weights under ideal circumstances and hundreds when data is poorly distributed. Inspired by recent work on dataset distillation and distributed one-shot learning, we propose Distilled One-Shot Federated Learning, which reduces the number of communica...
Preprint
Asking questions from natural language text has attracted increasing attention recently, and several schemes have been proposed with promising results by asking the right question words and copy relevant words from the input to the question. However, most state-of-the-art methods focus on asking simple questions involving single-hop relations. In t...
Article
Full-text available
Crowdsourcing uses collective intelligence to finish complicated tasks and is widely applied in many fields. However, the crowdsourcing dilemmas between the task requester and the task completer restrict the efficiency of system severely, e.g., the cooperation dilemma leads to the failure in the interactions and the quality of service dilemma resul...
Preprint
Full-text available
Recently web applications have been widely used in enterprises to assist employees in providing effective and efficient business processes. Forecasting upcoming web events in enterprise web applications can be beneficial in many ways, such as efficient caching and recommendation. In this paper, we present a web event forecasting approach, DeepEvent...
Article
With the rapid development of Internet of Things (IoT) technology, location-based services have been widely applied in the construction of smart cities. Satellite-based location services have been utilized in outdoor environments, but they are not suitable for indoor technology due to the absence of global positioning system (GPS) signal. Therefore...
Preprint
Full-text available
The long-term visual tracking undergoes more challenges and is closer to realistic applications than short-term tracking. However, the performances of most existing methods have been limited in the long-term tracking tasks. In this work, we present a reliable yet simple long-term tracking method, which extends the state-of-the-art Learning Adaptive...
Preprint
Full-text available
The long-term visual tracking undergoes more challenges and is closer to realistic applications than short-term tracking. However, most existing methods have not been done and their performances have also been limited. In this work, we present a reliable yet simple long-term tracking method, which extends the state-of-the-art Discriminative Correla...
Preprint
Full-text available
The long-term visual tracking undergoes more challenges and is closer to realistic applications than short-term tracking. However, the performances of most existing methods have been limited in the long-term tracking tasks. In this work, we present a reliable yet simple long-term tracking method, which extends the state-of-the-art Learning Adaptive...
Article
The Industrial Internet of Things (IIoT) is a crucial research field spawned by the Internet of Things (IoT). IIoT links all types of industrial equipment through the network; establishes data acquisition, exchange, and analysis systems; and optimizes processes and services, so as to reduce cost and enhance productivity. The introduction of edge co...
Preprint
Although substantial efforts have been made to learn disentangled representations under the variational autoencoder (VAE) framework, the fundamental properties to the dynamics of learning of most VAE models still remain unknown and under-investigated. In this work, we first propose a novel learning objective, termed the principle-of-relevant-inform...