Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qingyu Xiong is active.

Publication


Featured researches published by Qingyu Xiong.


international joint conference on neural network | 2016

Dropout prediction in MOOCs using behavior features and multi-view semi-supervised learning.

Wentao Li; Min Gao; Hua Li; Qingyu Xiong; Junhao Wen; Zhongfu Wu

While massive open online courses (MOOCs) have gained increasing popularity in recent years, dropout prediction has been an important task to solve due to the high rates of dropout students found in MOOCs. Current methods normally apply supervised learning methods to dropout prediction, using general features extracted from behavior records without the concern of behavior types. However, student learning behavior is diverse and there are no sufficient labeled data to train a model because it is a time-costing task to label enormous data in practice. To solve these problems, in this work, we proposed a novel multi-view semi-supervised learning model based on behavior features for the dropout prediction task. Specifically, we derived features from each type of learning behavior to form multi-view behavior features. In addition, based on these features, we proposed a new multi-view semi-supervised learning method to make use of a large number of unlabeled data to assist insufficient labeled data for improving prediction performance. We conducted experiments on KDD Cup 2015 dataset, and the results show that our proposed method achieves better prediction of student dropouts as compared to state-of-the-art approaches.


Neurocomputing | 2016

SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems

Wei Zhou; Junhao Wen; Qingyu Xiong; Min Gao; Jun Zeng

Due to the open nature of recommender systems, collaborative recommender systems are vulnerable to profile injection attacks, in which malicious users inject attack profiles into the rating matrix in order to bias the systems ranking list. Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Most of previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles of an attack. There also exist class unbalance problems in supervised detecting methods, the detecting performance is not as good when the amount of samples of attack profiles in training set is smaller. In this paper, we study the use of SVM based method and group characteristics in attack profiles. A two phase detecting method SVM-TIA is proposed based on these two methods. In the first phase, Borderline-SMOTE method is used to alleviate the class unbalance problem in classification; a rough detecting result is obtained in this phase; the second phase is a fine-tuning phase whereby the target items in the potential attack profiles set are analyzed. We conduct tests on the MovieLens 100K Dataset and compare the performance of SVM-TIA with other shilling detecting methods to demonstrate the effectiveness of the proposed approach.


Discrete Dynamics in Nature and Society | 2017

On the Optimal Dynamic Control Strategy of Disruptive Computer Virus

Jichao Bi; Xiaofan Yang; Yingbo Wu; Qingyu Xiong; Junhao Wen; Yuan Yan Tang

Disruptive computer viruses have inflicted huge economic losses. This paper addresses the development of a cost-effective dynamic control strategy of disruptive viruses. First, the development problem is modeled as an optimal control problem. Second, a criterion for the existence of an optimal control is given. Third, the optimality system is derived. Next, some examples of the optimal dynamic control strategy are presented. Finally, the performance of actual dynamic control strategies is evaluated.


Drying Technology | 2016

A recurrent self-evolving fuzzy neural network predictive control for microwave drying process

Jianshuo Li; Qingyu Xiong; Kai Wang; Xin Shi; Shan Liang

ABSTRACT A recurrent self-evolving fuzzy neural network (RSEFNN) predictive control scheme is developed for microwave drying process in this paper. During microwave drying process, the temperature, power absorption efficiency, and moisture variation characteristic in the drying material cannot be exactly known for the complex application environment. So a RSEFNN is constructed to predict the microwave drying process. Based on the RSEFNN, to achieve a highly efficient and safe microwave drying process, a multiple objectives predictive control algorithm is constructed to get a suitable input power over a prediction horizon. To identify the feasibility of the proposed recurrent self-evolving fuzzy neural network predictive control (RSEFNNPC) algorithm, a simulation of Red Maple and an actual application of lignite drying were analyzed in this paper. In the Red Maple drying process, temperature and moisture content are chosen as control objectives. As the simulation results show, the RSEFNNPC could achieve multiple objectives optimization. In the actual lignite drying process, the difference between lignite temperature and presupposed temperature was below 2u2009K. The difference between RSEFNN prediction and actual sampling temperature was below 1u2009K.


knowledge science, engineering and management | 2016

LSSL-SSD: Social Spammer Detection with Laplacian Score and Semi-supervised Learning

Wentao Li; Min Gao; Wenge Rong; Junhao Wen; Qingyu Xiong; Bin Ling

The rapid development of social networks makes it easy for people to communicate online. However, social networks usually suffer from social spammers due to their openness. Spammers deliver information for economic purposes, and they pose threats to the security of social networks. To maintain the long-term running of online social networks, many detection methods are proposed. But current methods normally use high dimension features with supervised learning algorithms to find spammers, resulting in low detection performance. To solve this problem, in this paper, we first apply the Laplacian score method, which is an unsupervised feature selection method, to obtain useful features. Based on the selected features, the semi-supervised ensemble learning is then used to train the detection model. Experimental results on the Twitter dataset show the efficiency of our approach after feature selection. Moreover, the proposed method remains high detection performance in the face of limited labeled data.


PLOS ONE | 2015

Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems

Min Gao; Renli Tian; Junhao Wen; Qingyu Xiong; Bin Ling; Linda Yang

In recent years, recommender systems have become an effective method to process information overload. However, recommendation technology still suffers from many problems. One of the problems is shilling attacks-attackers inject spam user profiles to disturb the list of recommendation items. There are two characteristics of all types of shilling attacks: 1) Item abnormality: The rating of target items is always maximum or minimum; and 2) Attack promptness: It takes only a very short period time to inject attack profiles. Some papers have proposed item anomaly detection methods based on these two characteristics, but their detection rate, false alarm rate, and universality need to be further improved. To solve these problems, this paper proposes an item anomaly detection method based on dynamic partitioning for time series. This method first dynamically partitions item-rating time series based on important points. Then, we use chi square distribution (χ2) to detect abnormal intervals. The experimental results on MovieLens 100K and 1M indicate that this approach has a high detection rate and a low false alarm rate and is stable toward different attack models and filler sizes.


international conference on informatics and semiotics in organisations | 2016

Robust Social Recommendation Techniques: A Review

Feng Jiang; Min Gao; Qingyu Xiong; Junhao Wen; Yi Zhang

Social recommendation plays an important role in solving the cold start problem in recommendation systems and improves the accuracy of recommendation, but still faces serious challenges and problems. Ratings or relationships injected by fake users seriously affect the authenticity of the recommendations as well as users’ trustiness on the recommendation systems. Moreover, the simplification of relationship treatment also seriously affects the recommendation accuracy and user satisfaction to the recommendation systems. This paper first analyzes up to date research of social recommendation and the detecting technology of multiple relationships. Furthermore, it proposes a future research framework for robust social recommendations including modeling and feature extraction of multidimensional relationships, social recommendation shilling attack models based on social relationships, the analysis of the relationships in social networks as well as the roles of relationships on recommendation, and robust social recommendation approaches taking multiple relationships into consideration.


knowledge science, engineering and management | 2017

Connecting Factorization and Distance Metric Learning for Social Recommendations

Junliang Yu; Min Gao; Yuqi Song; Zehua Zhao; Wenge Rong; Qingyu Xiong

Social relations can help to relieve the dilemmas called cold start and data sparsity in traditional recommender systems. Most of existing social recommendation methods are based on matrix factorization, which has been proven effective. In this paper, we introduce a novel social recommender based on the idea that distance reflects likability. It aims to make users in recommender systems be spatially close to their friends and items they like, and be far away from items they dislike by connecting factorization model and distance metric learning. In our method, the positions of users and items are decided by the ratings and social relations jointly, which can help to find appropriate locations for users who have few ratings. Finally, the learnt metric and locations are used to generate understandable and reliable recommendations. The experiments conducted on the real-world dataset have shown that, compared with methods only based on factorization, our method has advantages on both interpretability and accuracy.


IEEE Access | 2017

A Social Recommender Based on Factorization and Distance Metric Learning

Junliang Yu; Min Gao; Wenge Rong; Yuqi Song; Qingyu Xiong

Traditional recommender systems often suffer from the problem of data sparsity, because most users rate only a few of the millions of possible items. With the development of social platforms, incorporating abundant social relationships into recommenders can help to overcome this issue, because users’ preferences can be inferred from those of their friends. Most existing social recommenders are based on matrix factorization, a collaborative filtering model that has been proven to be effective. In this paper, we introduce a novel social recommender based on the idea that distance reflects likability. Compared with matrix factorization, the proposed model enables us to obtain a spatial understanding of the latent factor space and how users and items are positioned inside the space by combining the factorization model and distance metric learning. In our method, users and items are initially mapped into a unified low-dimensional space. The positions of users and items are jointly determined by ratings and social relations, which can help to determine appropriate locations for users who have few ratings. Finally, the learned metrics and positions are used to generate understandable and reliable recommendations. Experiments conducted on real-world data sets have shown that compared with methods based on only matrix factorization, our method significantly improves the recommendation accuracy.


Studies in computational intelligence | 2014

A Web Page Segmentation Approach Using Seam Degree and Content Similarity

Jun Zeng; Brendan Flanagan; Qingyu Xiong; Junhao Wen; Sachio Hirokawa

Page segmentation has received great attention in recent years. However, most research has been based on some pre-defined heuristics or visual cues which may be not suitable for large-scale page segmentation. In this chapter, we proposed two parameters: seam degree and content similarity, to indicate the coherent degree of a page block. Instead of analyzing pre-defined heuristics or visual cues, our method utilizes the visual and content features to determine whether a page block should be divided into smaller blocks. We also proposed a principled page segmentation method using these two parameters. An experiment was conducted to determine the relationship between the two parameters and the number of segment results. The empirical results also show that our segmentation method can effectively segment a page into different semantic parts.

Collaboration


Dive into the Qingyu Xiong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Min Gao

Chongqing University

View shared research outputs
Top Co-Authors

Avatar

Jun Zeng

Chongqing University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kai Wang

Chongqing University

View shared research outputs
Top Co-Authors

Avatar

Wentao Li

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge