Haizhen Jiao’s research while affiliated with Beijing University of Posts and Telecommunications and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


NFRR: A Novel Family Relationship Recognition Algorithm Based on Telecom Social Network Spectrum
  • Article

April 2019

·

125 Reads

·

1 Citation

IEICE Transactions on Information and Systems

Kun NIU

·

Haizhen JIAO

·

Cheng CHENG

·

[...]

·

Xiao XU

There are different types of social ties among people, and recognizing specialized types of relationship, such as family or friend, has important significance. It can be applied to personal credit, criminal investigation, anti-terrorism and many other business scenarios. So far, some machine learning algorithms have been used to establish social relationship inferencing models, such as Decision Tree, Support Vector Machine, Naive Bayesian and so on. Although these algorithms discover family members in some context, they still suffer from low accuracy, parameter sensitive, and weak robustness. In this work, we develop a Novel Family Relationship Recognition (NFRR) algorithm on telecom dataset for identifying one's family members from its contact list. In telecom dataset, all attributes are divided into three series, temporal, spatial and behavioral. First, we discover the most probable places of residence and workplace by statistical models, then we aggregate data and select the top-ranked contacts as the user's intimate contacts. Next, we establish Relational Spectrum Matrix (RSM) of each user and its intimate contacts to form communication feature. Then we search the user's nearest neighbors in labelled training set and generate its Specialized Family Spectrum (SFS). Finally, we decide family relationship by comparing the similarity between RSM of intimate contacts and the SFS. We conduct complete experiments to exhibit effectiveness of the proposed algorithm, and experimental results also show that it has a lower complexity.



Back home late case (the user always goes to bed around 22:00).
Unexpected interruption case (there is an incoming call at 2:27).
Shutting down case (the user shut down smartphone before 22:00 and starts up it after 8:00).
Weekday and weekend patterns (in weekend, go to bed and get up later than weekday).
Alarm clock event (alarm rings at 7:00 and wakes the user).

+9

BTP: A Bedtime Predicting Algorithm via Smartphone Screen Status
  • Article
  • Full-text available

October 2018

·

165 Reads

·

3 Citations

Wireless Communications and Mobile Computing

For smartphone service providers, it is of vital importance to recognize characteristics of customers. The process of recognizing these characteristics is generally referred to as user profile, which provides knowledge basis for business decisions, enables intelligent services, and brings unique competitiveness. As a basic component of user profile, bedtime could reflect lifestyle, health condition, and occupation of people. This paper presents a flexible algorithm named BTP (Bedtime Prediction), which is designed for predicting wake time and bedtime by analysing screen status of smartphone. BTP first collects screen status log data of user’s smartphone and conducts preprocessing with a series of auxiliary user profiles. Then, it detects and records users’ wake time and bedtime of one day by searching and combining major screen extinguish periods in the past 24 hours. Finally, BTP predicts future bedtime by matching current screen status sequence with all historical records. By applying BTP, most of night and morning scenario-based applications could provide more considerate services, rather than following fixed execution time like alarm clock. Experiments on practical applications prove that BTP can effectively predict wake time and bedtime without applying complicated machine learning algorithms or uploading data to server.

Download


A developed apriori algorithm based on frequent matrix

January 2017

·

72 Reads

·

8 Citations

Apriori is the most famous frequent pattern mining method. It scans dataset repeatedly and generate item sets by bottom-top approach. In order to reduce time complexity, we proposed a modified algorithm named as Frequent Matrix Apriori (FMA). Firstly, FMA scans the dataset only once to store frequent item information in a frequent matrix. Then, FMA discretize the matrix by the minimum support parameter which is generated automatically. Thirdly, it scans the discretized frequent matrix and find the most frequent item sets recursively. Experimental results proved that FMA is more effective than Apriori on time consuming with similar accuracy.


Subspace Clustering for Vector Clusters

January 2017

·

68 Reads

·

4 Citations

網際網路技術學刊

In many real world applications data is collected in multi-dimensional spaces, with the knowledge hidden in subspaces. It is an open research issue to select meaningful subspaces without any prior knowledge about such hidden patterns. Subspace clustering aims at detecting clusters in any projection of a high dimensional data space. However, almost all of the present subspace clustering methods cannot fnd subspace clusters with arbitrary shape, especially non-axis aligned clusters as we will demonstrate. In this work, we classify subspace clusters into three types: local dense clusters, axis-aligned clusters and nonaxis aligned clusters. To tackle the fundamental challenge of missing non-axis aligned clusters, we propose a new subspace clustering algorithm named SCUE (Subspace Clustering based on United Entropy). It computes each 1-dim entropy and united entropy of each two dimensions to form united entropy matrix. Cluster types are judged by entropy thresholds automatically generated from the matrix. Next it searches interesting subspaces in discretized united entropy matrix and gets clusters from interesting subspaces. Experimental results demonstrate that SCUE signifcantly outperforms present methods in both solution quality and effciency.


A Real-Time Fraud Detection Algorithm Based on Usage Amount Forecast:

August 2016

·

93 Reads

·

1 Citation

Communications in Computer and Information Science

Real-time Fraud Detection has always been a challenging task, especially in financial, insurance, and telecom industries. There are mainly three methods, which are rule set, outlier detection and classification to solve the problem. But those methods have some drawbacks respectively. To overcome these limitations, we propose a new algorithm UAF (Usage Amount Forecast). Firstly, Manhattan distance is used to measure the similarity between fraudulent instances and normal ones. Secondly, UAF gives real-time score which detects the fraud early and reduces as much economic loss as possible. Experiments on various real-world datasets demonstrate the high potential of UAF for processing real-time data and predicting fraudulent users.



Citations (7)


... Especially with the development of artificial intelligence (e.g., deep learning techniques), enhanced information retrieval and users' preferences learning have made RS more effective, so that it can provide more relevant items to users (Zhang et al. 2019, Wu et al. 2021). However, some scholars have found that the overpersonalization resulting from the interest-relevancy recommendation may lead to the failure of recommendation (Cheng et al. 2017, Niu et al. 2018. Therefore, content-diversity is developed to solve this problem (Hou, Pan and Liu 2018, Wu et al. 2020, Szpektor, Maarek and Pelleg 2013. ...

Reference:

Relevancy or Diversity?: Recommendation Strategy Based on the Degree of Multi-Context Use of News Feed Users
A Novel Learning Approach to Improve Mobile Application Recommendation Diversity
  • Citing Conference Paper
  • November 2018

... Wearable devices, such as fitbit 2 and Apple Watch 3 , are smart watch devices that can record sleep time by measuring biometric information during daytime activities when the user wears it on his/her wrist arm. Smartphone applications, such as Sleep Cycle 4 and Sleep Meister 5 , can record sleep patterns by placing the device beside the user's bed before sleeping; then, the alarm will ring at the optimal wake-up time. Users can view recorded sleep data on the application linked to these services. ...

BTP: A Bedtime Predicting Algorithm via Smartphone Screen Status

Wireless Communications and Mobile Computing

... In this stages, the conservation resource theory is used to describes the potential benefit in knowledge hoarding for individual performance. [36,37] In any further development, topics that are more prominent in recent years are knowledge hoarding and knowledge hiding, followed by several diffused themes, such as job insecurity and workplace ostracism. ...

Subspace Clustering for Vector Clusters
  • Citing Article
  • January 2017

網際網路技術學刊

... The Apriori algorithm is the most famous association rule mining algorithm. 40 It effectively incorporates support-based pruning techniques to manage the systematic growth of candidate sets, offering a solution to the exponential increase in possibilities. This algorithm involves the generation of frequent itemsets and the identification of association rules. ...

A developed apriori algorithm based on frequent matrix
  • Citing Conference Paper
  • January 2017

... A significant improvement in clustering performance was observed. Niu et al. [161] proposed a variant of the K-means algorithm termed K-means + to resolve the high complexity problem of low response time requirement in big data clustering. K-means + uses block operation and redesigned distance function to reduce clustering modeling time costs. ...

K-means+: A developed clustering algorithm for big data
  • Citing Conference Paper
  • August 2016

... Machine learning based approaches try to differentiate legitimate users and fraudsters with various algorithms like artificial neural networks (Elmi et al., 2013) or decision trees (Murynets et al., 2014). Real-time approaches provide solutions that detect fraud early and minimise economic losses with intelligent scoring (Niu et al., 2016) or complex event processing (Manunza et al., 2017). Graph analysis establishes the connection between callers and callees to detect fraudulent activities (Jiang et al., 2012;Henecka and Roughan, 2014). ...

A Real-Time Fraud Detection Algorithm Based on Intelligent Scoring for the Telecom Industry
  • Citing Conference Paper
  • July 2016