Jing He's research while affiliated with University of Oxford and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (186)
Traditional privacy-preserving technologies have been unable to provide adequate protection and are vulnerable to background knowledge. MapReduce is parallel distributed computing model which has the advantages of good scalability and high fault tolerance. In this paper, we design a differential privacy protection based on MapReduce for the securit...
Graph distance is also named approximate graph isomorphism, error-tolerant graph matching, it is a measure of similarity (or dissimilarity) between two graphs. The graph distance function is an elusive question remaining a pressing problem in a wide range of fields. In general, graphs are usually enriched with node and edge attributes, namely, hete...
Compared with relatively easy feature creation or generation in data analysis, manual data labelling needs a lot of time and effort in most cases. Even if automated data labelling seems to make it better in some cases, the labelling results still need to be checked and verified by manual. The High Dimension and Low Sample Size (HDLSS) data are ther...
Mitochondrial dysfunction has been regarded as a hallmark of diabetic cardiomyopathy. In addition to their canonical metabolic actions, mitochondria influence various other aspects of cardiomyocyte function, including oxidative stress, iron regulation, metabolic reprogramming, intracellular signaling transduction and cell death. These effects depen...
In diabetic cardiomyopathy (DCM), a major diabetic complication, the myocardium is structurally and functionally altered without evidence of coronary artery disease, hypertension or valvular disease. Although numerous anti-diabetic drugs have been applied clinically, specific medicines to prevent DCM progression are unavailable, so the prognosis of...
Objectives
Dual specificity phosphatase 1 (DUSP1) is regarded as an anti-inflammatory factor in cardiovascular disorders. Mitophagy removes damaged mitochondria and thus promotes mitochondrial regeneration. We investigated whether DUSP1 could attenuate inflammation-induced cardiomyopathy by improving mitophagy.
Methods
Lipopolysaccharide was used...
When dealing with complex and redundant data classification problems, many classifiers cannot provide high predictive accuracy and interpretability. We also find that the least-squares support vector classifiers (LSSVCs) hardly identify important instances and features from data, so they cannot give an interpretable prediction. Although the LSSVC h...
Fuzzy association rule mining (FARM) is a mainstream method to discover hidden patterns and association rules in quantitative data. It is essential to improve performance metrics, including quantity performance (e.g., the number of rules, the number of frequent itemsets) and quality performance (e.g., fuzzy support and confidence). The current appr...
Data intelligence is the core task of the information revolution entering the Internet era. It brings opportunities, but also makes human civilization face risks. Data drowns the idea and data is supreme. People regard manufacturing data as the goal of digital economy, stook data up hoarding and turn data into an immortal holy thing, which is very...
QoS‐aware based web service recommendation is one of the crucial solutions to help users find high‐quality web services. To accurately predict the QoS values of candidate services, it is usually required to collect historical QoS data of users (QoS data for short). If these collected QoS data are improperly processed, QoS data privacy may be threat...
Convex optimization techniques are extensively applied to various models, algorithms, and applications of machine learning and data mining. For optimization-based classification methods, the sparsity principle can greatly help to select simple classifier models, while the single- and multi-kernel methods can effectively address nonlinearly separabl...
With the increasing information load brought by the accelerated growth of research papers, the automatic discovery of a field’s emerging scientific topics becomes vital. It enables broad applications, such as optimizing resource allocations for promising research areas, predicting future technology trends, finding knowledge gaps and new concepts, a...
Mitophagy preserves microvascular structure and function during myocardial ischemia/reperfusion (I/R) injury. Empagliflozin, an anti-diabetes drug, may also protect mitochondria. We explored whether empagliflozin could reduce cardiac microvascular I/R injury by enhancing mitophagy. In mice, I/R injury induced luminal stenosis, microvessel wall dama...
Credit cardholder behavior analysis is a very important issue for credit risk control. And classification method, which is an important topic in data mining, is usually used here for "Bad" credit detection. Data pre-processing may affect classification accuracy. In this paper, an information-based fuzzy partition approach is proposed for bad credit...
Cross-platform difficulties, data privacy, and authentication security are common problems in the Internet of Things (IoT) environment. Despite the fact that blockchain technology has brought new opportunities to the development of the IoT by enhancing interoperability, improving privacy and security, there are still problems such as diversity, lac...
In the present study, we used lipopolysaccharide- (LPS-) stimulated H9C2 cardiomyocytes to investigate whether irisin treatment attenuates septic cardiomyopathy via Fundc1-related mitophagy. Fundc1 levels and mitophagy were significantly reduced in LPS-stimulated H9C2 cardiomyocytes but were significantly increased by irisin treatment. Irisin signi...
The Internet of vehicles (IoV) has a typical Internet of things architecture, which is the specific application of Internet of things (IoT) technology in the field of intelligent transportation. Virtual network embedding (VNE) is the effective allocation of physical network resources to the virtual network, and is a virtualization technology widely...
In recent years, money laundering has become much easier to be achieved but more challenging to be detected than before, which has enormous adversary effects on finance, military, and other related fields. In the real-time scenario, every money laundering case has a unique structure in terms of transactions. It is not sufficient to detect suspiciou...
Pyroptosis is a recently discovered aspartic aspart-specific cysteine protease (Caspase-1/4/5/11) dependent mode of gene-regulated cell death cell death, which is represented by the rupture of cell membrane perforations and the production of proinflammatory mediaters like interleukin-18(IL-18) and interleukin-1β (IL-1β). Mitochondria also play an i...
Given the increasing amounts of data and high feature dimensionalities in forecasting problems, it is challenging to build regression models that are both computationally efficient and highly accurate. Moreover, regression models commonly suffer from low interpretability when using a single kernel function or a composite of multi-kernel functions t...
Transfer learning is an emerging technique in machine learning, by which we can solve a new task with the knowledge obtained from an old task in order to address the lack of labeled data. In particular deep domain adaptation (a branch of transfer learning) gets the most attention in recently published articles. The intuition behind this is that dee...
The definition of factor space and a unified optimization based classification model were developed for linear programming. Intelligent behaviour appeared in a decision process can be treated as a point y, the dynamic state observed and controlled by the agent, moving in a factor space impelled by the goal factor and blocked by the constraint facto...
Deep Learning, also known as deep representation learning, has dramatically improved the performances on a variety of learning tasks and achieved tremendous successes in the past few years. Specifically, artificial neural networks are mainly studied, which mainly include Multilayer Perceptrons (MLPs), Convolutional Neural Networks (CNNs) and Recurr...
Cloud computing is developing rapidly and playing an increasingly important role in many fields. Resource management of data center networks (DCNs) is critical to the performance of cloud computing. Due to the large-scale, distributed, and cross-regional characteristics of DCNs, there is insufficient resource utilization. In this article, we discus...
Studying on EEG (Electroencephalography) data instances to discover potential recognizable patterns has been a emerging hot topic in recent years, particularly for cognitive analysis in online education areas. Machine learning techniques have been widely adopted in EEG analytical processes for non-invasive brain research. Existing work indicated th...
The advancement of cognitive computing for traffic status understanding, powered by machine learning and data analytics, enables prediction of traffic anomalies from continuously generated big GPS trajectory data. Existing methods generally use traffic indicators such as traffic flows and speeds to detect anomalies, but they may over-identify anoma...
Cardiac ischemia-reperfusion (I/R) injury is associated with mitochondrial dysfunction. Recent studies have reported that mitochondrial function is determined by mitochondrial dynamics. Here, we hypothesized that AMPKα2 functions as an upstream mediator that sustains mitochondrial dynamics in cardiac I/R injury and cardiomyocyte hypoxia-reoxygenati...
Yimu Ji Weiheng Gu Fei Chen- [...]
Fei Wu
The traditional blockchain has the shortcoming that a single-chain can only deal with one or a few specific data types. The research question of how to make blockchain be able to deal with various data types has not been well studied. In this paper, we propose a single-chain based extension model of blockchain for fintech (SEBF). In the financial e...
Wireless-body-area-networks (WBANs) comprise various types of sensors to monitor and collect various vital signals, such as blood pressure, pulse, heartbeat, body temperature, and blood sugar. A dense and mobile WBAN often suffers from interference, which causes serious problems, such as wasting energy and degrading throughput. In reality, not all...
Research on electroencephalography (EEG) signals and their data analysis have drawn much attention in recent years. Data mining techniques have been extensively applied as efficient solutions for non-invasive brain–computer interface (BCI) research. Previous research has indicated that human brains produce recognizable EEG signals associated with s...
The increasing amount of solid waste is becoming a significant problem that needs to be addressed urgently. The reliable and accurate classification method is a crucial step in waste disposal because different types of wastes have different disposal ways. The existing waste classification models driven by deep learning are not easy to achieve accur...
When multiple Wireless Body Area Networks (WBANs) are aggregated, the overlapping region of their communications will result in internetwork interference, which could impose severe impacts on the reliability of WBAN performance. Therefore, how to mitigate the internetwork interference becomes the key problem to be solved urgently in practical appli...
The process of blending gas transmission contains multiple kinds of influence factors that are related with the achievement of maximal overall profit for a refinery gas company. It is, therefore, a multiple objective optimization problems. To maximize overall profit, we proposes a multiple objective resultant gradient descent method (RGDM) to solve...
With the advent of next-generation sequencing technology, sequencing costs have fallen sharply compared to the previous sequencing technologies. Genomic big data has become the significant big data application. In the face of growing genomic data, its storage and migration face enormous challenges. Therefore, researchers have proposed a variety of...
Network‐on‐chip (NoC) is a new design method of system‐on‐chip used in very large scale integrated circuit (VLSI) systems. It is an important issue for choosing the appropriate topology for NoC. Wirelength and layout area are significant parameters affecting NoC due to the restriction of chip area. In this paper, we propose a new interconnection ne...
This book constitutes the refereed proceedings of the 6th International Conference on Data Science, ICDS 2019, held in Ningbo, China, during May 2019.
The 64 revised full papers presented were carefully reviewed and selected from 210 submissions.
The research papers cover the areas of Advancement of Data Science and Smart City Applications, Theor...
To improve the quality of service and network performance for the Flash P2P video-on-demand, the prediction Flash P2P network traffic flow is beneficial for the control of the network video traffic. In this paper, a novel prediction algorithm to forecast the traffic rate of Flash P2P video is proposed. This algorithm is based on the combination of...
The performance of active contour model is limited on retinal vessel segmentation as vessel images are usually corrupted with intensity inhomogeneity, low contrast, and weak boundary, which severely affect the segmentation results of retinal vessels. A new active contour model combining the local and global information is proposed in this paper to...
Objective:
To assess the risk factors associated with acute gastrointestinal failure (AGF) in critically ill patients with traumatic brain injury (TBI).
Methods:
Prospective, observational study was conducted in NanFang Hospital, Southern Medical University. All patients admitted to the Department of Critical Care Medicine and Department of Neur...
With the maturity of genome sequencing technology, huge amounts of sequence reads as well as assembled genomes are generating. With the explosive growth of genomic data, the storage and transmission of genomic data are facing enormous challenges. FASTA, as one of the main storage formats for genome sequences, is widely used in the Gene Bank because...
Discovering frequent itemsets is essential for finding association rules, yet too computational expensive using existing algorithms. It is even more challenging to find frequent itemsets upon streaming numeric data. The streaming characteristic leads to a challenge that streaming numeric data cannot be scanned repetitively. The numeric characterist...
Eigenvalue decomposition is widely used in dimensionality reduction for knowledge engineering, in particular principal component analysis. Traditional eigenvalue decomposition algorithms for decomposing a matrix of size
$n \times n$
are usually of complexity
$O(n^3)$
, due to a bottleneck in which Householder/Givens transforms convert a general...
Collaborative filtering is a main-stream technique to alleviate information overload. Singular Value Decomposition (SVD) has become very popular in the field of collaborative filtering. For computation of collaborative filtering, traditional SVD algorithms are too slow, randomized SVD algorithms using sampling techniques are more practical than the...
Cyberspace topologies can be demonstrated mathematically by a graph theoretic approach which basic structure is in accord with the interconnected world of social networks. Subgraph pattern matching analysis is an approach to performing computer network data analysis that executes efficient continuous queries on dynamic social graphs and minimizes t...
With the rise of cloud service providers and the continuous virtualization of data centers, data center networks are also developing rapidly. As data centers become more and more complex, the demand for security increases dramatically. This paper discusses the privacy inherent in data centers. However, there is no general solution to the privacy pr...
The graph isomorphism problem is to determine two finite graphs that are isomorphic which is not known with a polynomial‐time solution. This paper solves the simple undirected graph isomorphism problem with an algorithmic approach as NP=P and proposes a polynomial‐time solution to check if two simple undirected graphs are isomorphic or not. Three n...
Techniques of performance analysis, comprising of various metrics such as accuracy, efficiency and consuming time, have been conducted to evaluate the measures of properties and interestingness for the association rule mining method. Therefore, these metrics combined with different parameters (partitioning points, fuzzy sets) should be analysed tho...
Discovering the concealed patterns of Electroencephalogram (EEG) signals is a crucial part in efficient detection of epileptic seizures. This study develops a new scheme based on Douglas-Peucker algorithm (DP) and principal component analysis (PCA) for extraction of representative and discriminatory information from epileptic EEG data. As the multi...
Individuals' right to privacy includes control over access to their location information. With the advent of location‐based services and personal transport services (such as ridesharing), the risk of location privacy breaches is increased greatly. The potential negative effects of location privacy leakages include spam location‐based service floodi...
Over the past few decades, many classifier methods are suggested for credit risk evaluation. With ever-increasing amounts of data, for multi-criteria optimization classifier (MCOC) and other traditional classification methods, owing to the correlation among different features in data these classifiers often give the poor predictive performance. Thu...
For forecasting by regression, more and more instances and features are collected and added to the regression models. When there are many noisy and redundant instances and features, these models often give the poor predictive accuracy and interpretability owing to overfitting and computational complexity. Besides, least squares support vector regre...
The concept of smart city seems to have received considerable attention shortly after its proposal. Nearly 200 projects in the world related to smart healthcare are in the implementation phase [1], and this number is gradually expanding. The smart healthcare is essential parts of creating a smart city, because anyone can go to the hospital for trea...
Data mining and machine learning are both useful tools in the field of data analysis. Classification algorithm is one of the most important techniques in data mining, therefore, it is of great significance to select suitable classification models with high efficiency to show superiority when solving classification problems with the use of Iris data...
While the Internet has been proposed for a long time, the Internet of Things is a relatively new concept which is constantly evolving, and it is also an embodiment of the practical use for the construction of smart cities. In this study of smart cities, we first illustrate the data processing problems in smart cities, especially the data distributi...
A bi-level programming model is constructed for the oilfield development in this paper with the objective to maximize the total benefit. The management level of the oil company is regarded as the leader in this model, which makes the global programming and assigns the allocated investments to four oilfield development modes (the follower). The lowe...
The problem of risk classification and prediction, an essential research direction, aiming to identify and predict risks for various applications, has been researched in this paper. To identify and predict risks, numerous researchers build models on discovering hidden information of a label (positive credit or negative credit). Fuzzy logic is robus...
The emergence of wearable smart devices enables people to understand their health level in more details and efficiently process information. According to the physical form of the wearable smart device, this paper classifies the wearable smart devices into four categories and conducts the survey regarding the development of related technologies thro...
Density-based clustering, such as Density Peak Clustering (DPC) and DBSCAN, can find clusters with arbitrary shapes and have wide applications such as image processing, spatial data mining and text mining. In DBSCAN, a core point has density greater than a threshold, and can spread its cluster ID to its neighbours. However, the core points selected...
This paper proposes a method to address misreadings and consequent inadequacy of Radio- Frequency Identification (RFID) data for social insect monitoring. Six months worth of field experiment data were collected to demonstrate the application of the method. The data is transformed into a linear combination of Gaussian model and curve-fitted using e...
The chip has been developed for over 60 years, and its design process, manufacturing process, and packaging and testing methods are all mature, and its scale, performance, and functions are constantly improving. Through the research of the whole development process of the chip, this paper expounds the current development status of the chip, involve...
The current safety regulations and its correlative specifications of the coal industry ignore the problem of malfunction. To solve the issue completely, an optimized location model based on the methane sensor is proposed in this paper. The proposed model is not only economic but also reliable for a sensor of methane. In the procedure of establishin...
Diabetes alone does not affect the health, but its complications always bring danger to people’s health. To avoid the development of diabetes and posterior to discover diabetes, checking blood glucose level is an effective way. The development of glucose screening measurements is introduced. Non-invasive glucose monitor methods, as accurate, safe,...
Space-time template matching is considered as a promising approach for human action recognition. However, a major drawback of template based methods is computational overhead due to matching in spatial domain. Recently, spacetime correlation based action filters have been proposed for recognizing human actions in frequency domain. These action filt...