Lianyong Qi’s research while affiliated with Qufu Normal University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (37)


Editorial of Cyber-Physical Social Systems and Smart Environments
  • Article

January 2025

·

2 Reads

International Journal of Crowd Science

Mohamadreza Khosravi

·

Lianyong Qi

Smart environments are now an undeniable part of our life. A day-by-day increase in the use of new technologies based on Artificial Intelligence (AI), Internet of Things (IoT), communication and information systems, human-machine interactions, multimedia sensors, and bio-sensing devices is happening. The good research practice in these areas is absolutely the main factor of advancing our knowledge in this regard. Smart environments contain a variety of applications in different industries including entertainment industry, manufactures, healthcare systems, and Information Technology (IT). From the viewpoint of social systems, the main large-scale applications (not personal) of Cyber-Physical Systems (CPS) to make a smart environment are mainly smart homes and cities, health systems, intelligent transportation systems, green energy systems, and environmental protection and monitoring systems (including remote sensing). The personal use of such technologies is mostly around entertainment including IPTVs, virtual reality, games, other multimedia services, as well as personal healthcare services.




Counterfactual Data Augmentation
Overall training algorithm
Illustration of a typical interaction between a user and a DRL agent in DRL RS. The red line represents the user’s information flow, and the grey line represents the recommender’s information flow. The states are sampled from the environment
Overall results for online simulation environments
Ablation study on VirtualTB
Intrinsically motivated reinforcement learning based recommendation with counterfactual data augmentation
  • Article
  • Full-text available

July 2023

·

65 Reads

·

9 Citations

World Wide Web

Deep reinforcement learning (DRL) has shown promising results in modeling dynamic user preferences in RS in recent literature. However, training a DRL agent in the sparse RS environment poses a significant challenge. This is because the agent must balance between exploring informative user-item interaction trajectories and using existing trajectories for policy learning, a known exploration and exploitation trade-off. This trade-off greatly affects the recommendation performance when the environment is sparse. In DRL-based RS, balancing exploration and exploitation is even more challenging as the agent needs to deeply explore informative trajectories and efficiently exploit them in the context of RS. To address this issue, we propose a novel intrinsically motivated reinforcement learning (IMRL) method that enhances the agent’s capability to explore informative interaction trajectories in the sparse environment. We further enrich these trajectories via an adaptive counterfactual augmentation strategy with a customised threshold to improve their efficiency in exploitation. Our approach is evaluated on six offline datasets and three online simulation platforms, demonstrating its superiority over existing state-of-the-art methods. The extensive experiments show that our IMRL method outperforms other methods in terms of recommendation performance in the sparse RS environment.

Download

Proposed methodology of meteorology report information extraction
BERT-BiLSTM-MultiCRF model
Multi-CRF layer
Comparison of loss of different loss functions
Fluctuation range
Semantic rule-based information extraction for meteorological reports

June 2023

·

29 Reads

·

4 Citations

International Journal of Machine Learning and Cybernetics

Meteorological reports are one of the most important means of recording the weather conditions of a place over a period of time, and the existence of a large number of meteorological reports creates a huge demand for text processing and information extraction. However, valuable data and information are still buried deep in the mountain of meteorological reports, and there is an urgent need for an automated information extraction technique to help people integrate data from multiple meteorological reports and perform data analysis for a more comprehensive understanding of a specific meteorological topic or domain. Named entity recognition (NER) technique can extract useful entity information from meteorological reports. By analyzing the characteristics of nested entities in meteorological reports, this paper further proposes to introduce Multi-Conditional Random Fields (Multi-CRF), which uses each layer of CRF to output the recognition results of each type of entities, which helps to solve the problem of identifying nested entities in meteorological reports. The experimental results show that our model achieves state-of-the-art results. The final recognition results provide effective data support for automatic text verification recognition in the meteorological domain and provide important practical value for the construction of knowledge graphs of related meteorological reports.


VaccineChain: A checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation

June 2023

·

11 Reads

·

8 Citations

Journal of Industrial Information Integration

In the present era of the pandemic, vaccination is necessary to prevent severe infectious diseases, i.e., COVID-19. Specifically, vaccine safety is strongly linked to global health and security. However, the main concerns regarding vaccine record forgery and counterfeiting of vaccines are still common in the traditional vaccine supply chains. The conventional vaccine supply chains do not have proper authentication among all supply chain entities. Blockchain technology is an excellent contender to resolve the issues mentioned above. Although, blockchain based vaccine supply chains can potentially satisfy the objectives and functions of the next-generation supply chain model. However, its integration with the supply chain model is still constrained by substantial scalability and security issues. So, the current blockchain technology with traditional Proof-of-Work (PoW) consensus is incompatible with the next-generation vaccine supply chain framework. This paper introduces a model named "VaccineChain" - a novel checkpoint-assisted scalable blockchain based secure vaccine supply chain. VaccineChain guarantees the complete integrity and immutability of vaccine supply records to combat counterfeited vaccines over the supply chain. The dynamic consensus algorithm with various validating difficulty levels supports the efficient scalability of VaccineChain. Moreover, VaccineChain includes anonymous authentication among entities to provide selective revocation. This work also consists of a use case example of a secure vaccine supply chain using checkpoint assisted scalable blockchain with customized transaction generation-rule and smart contracts to demonstrate the application of VaccineChain. The comprehensive security analysis with standard theoretical proofs ensures the computational infeasibility of VaccineChain. Further, the detailed performance analysis with test simulations shows the practicability of VaccineChain.


Quantum-PSO based unsupervised clustering of users in social networks using attributes

April 2023

·

38 Reads

·

1 Citation

Cluster Computing

Unsupervised cluster detection in social network analysis involves grouping social actors into distinct groups, each distinct from the others. Users in the clusters are semantically very similar to those in the same cluster and dissimilar to those in different clusters. Social network clustering reveals a wide range of useful information about users and has many applications in daily life. Various approaches are developed to find social network users’ clusters, using only links or attributes and links. This work proposes a method for detecting social network users’ clusters based solely on their attributes. In this case, users’ attributes are considered categorical values. The most popular clustering algorithm used for categorical data is the K-mode algorithm. However, it may suffer from local optimum due to its random initialization of centroids. To overcome this issue, this manuscript proposes a methodology named the Quantum PSO approach based on user similarity maximization. In the proposed approach, firstly, dimensionality reduction is conducted by performing the relevant attribute set selection followed by redundant attribute removal. Secondly, the QPSO technique is used to maximize the similarity score between users to get clusters. Three different similarity measures are used separately to perform the dimensionality reduction and similarity maximization processes. Experiments are conducted on two popular social network datasets; ego-Twitter, and ego-Facebook. The results show that the proposed approach performs better clustering results in terms of three different performance metrics than K-Mode and K-Mean algorithms.




Edge Intelligence with Distributed Processing of DNNs: A Survey

January 2023

·

98 Reads

·

3 Citations

With the rapid development of deep learning, the size of data sets and deep neural networks (DNNs) models are also booming. As a result, the intolerable long time for models’ training or inference with conventional strategies can not meet the satisfaction of modern tasks gradually. Moreover, devices stay idle in the scenario of edge computing (EC), which presents a waste of resources since they can share the pressure of the busy devices but they do not. To address the problem, the strategy leveraging distributed processing has been applied to load computation tasks from a single processor to a group of devices, which results in the acceleration of training or inference of DNN models and promotes the high utilization of devices in edge computing. Compared with existing papers, this paper presents an enlightening and novel review of applying distributed processing with data and model parallelism to improve deep learning tasks in edge computing. Considering the practicalities, commonly used lightweight models in a distributed system are introduced as well. As the key technique, the parallel strategy will be described in detail. Then some typical applications of distributed processing will be analyzed. Finally, the challenges of distributed processing with edge computing will be described.


Citations (30)


... The introduction of edge computing for recognizing human activities results in lower latency as the computational tasks are performed closer to the sources of data [19]. Through edge devices, the HAR systems result in quick response time which makes them favorable for various applications. ...

Reference:

Enhanced Aiot Multi‐Modal Fusion for Human Activity Recognition in Ambient Assisted Living Environment
Special Issue on “Ensuring security for artificial intelligence applications in mobile edge computing software systems”
  • Citing Article
  • June 2024

Software Practice and Experience

... I N the realm of the Internet of Things (IoT), image anomaly detection plays a critical role in ensuring the reliability and security of connected systems [1], [2], [3], [4], [5], [6]. This technology is pivotal in a variety of IoT applications, such as quality control, security monitoring, intelligent manufacturing, medical image analysis, and industrial product inspection, where detecting irregularities ensures system stability and safety. ...

6G-Enabled Anomaly Detection for Metaverse Healthcare Analytics in Internet of Things
  • Citing Article
  • January 2023

IEEE Journal of Biomedical and Health Informatics

... Counterfactual reasoning has also gained traction in recommender systems. Chen et al. [3] developed a causal augmentation technique to enhance [27] proposed CausalInt, a method inspired by causal interventions to address challenges in multi-scenario recommendation. Additionally, He et al. [13] tackled the confounding feature issue in recommendation by leveraging causal intervention techniques. ...

Intrinsically motivated reinforcement learning based recommendation with counterfactual data augmentation

World Wide Web

... The pandemic has resulted in major changes in the way government organizations work. The main strategies to control this pandemic are maintaining social distance, lockdown, wearing personal protective equipment and getting vaccinated (Mulberry et al., 2021). Coronavirus is a large family of viruses that has spread devastatingly among people in India and all over the world. ...

VaccineChain: A checkpoint assisted scalable blockchain based secure vaccine supply chain with selective revocation
  • Citing Article
  • June 2023

Journal of Industrial Information Integration

... Text categorization approaches include decision trees, nearest neighbour classifiers, neural networks, regression (Mendel 2017;Sebastiani 2002) and semantic rule-based information extraction. (Cui et al. 2024). ...

Semantic rule-based information extraction for meteorological reports

International Journal of Machine Learning and Cybernetics

... Man-in-the-middle: The use of HTTPS ensures that all communications between clients and servers are encrypted, preventing interception and manipulation of data by attackers during transmission. In addition, transactions to the blockchain are encrypted using the AES-256 encryption algorithm and signed by a user generated private key [33]. This validates the transaction with a confirmed signature associated with the address of the issuing user, thus complicating forgery attacks. ...

Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage
  • Citing Article
  • April 2023

Alexandria Engineering Journal

... Huaizhen et al. [42] presented a method named DI-RAR to find and suggest web API groups for Mashup creation. Firstly, they use a self-attention technique that weights queries to separate core requirements from noncore requirements. ...

Diversity-driven automated web API recommendation based on implicit requirements
  • Citing Article
  • February 2023

Applied Soft Computing

... One potential challenge in implementing advanced relay coordination strategies using edge processing is the limited computational power and storage of edge devices [13]. Edge-based servers facilitate real-time data processing and decision-making at the local level, but heavy computational requirements may overwhelm edge devices, leading to slower response times or potential data loss [14,15]. ...

Edge Intelligence with Distributed Processing of DNNs: A Survey

... In addition, the Systematic Literature Review (SLR) method has not been employed in any of the previous studies. The authors of this study used a systematic review approach to examine the literature on artificial intelligence and machine learning for use in fog and edge computing, following the "Centre for Reviews and Dissemination (CRD) guidelines" provided by [21]. Important significant metrics are compared between our SLR and the relevant surveys in Table 1. ...

Editorial: Convergency of AI and Cloud/Edge Computing for Big Data Applications
  • Citing Article
  • June 2022

Mobile Networks and Applications

... This model integrates user privacy preferences with simplified graph convolutional networks to enhance privacy protection. To address the challenge of sparse user interest preferences, PPCM [22] proposes a group preference-based interest point category recommendation model. This approach uses locality-sensitive hashing to protect user privacy and cluster similar users. ...

Privacy-Aware Point-of-Interest Category Recommendation in Internet of Things
  • Citing Article
  • June 2022

IEEE Internet of Things Journal