William K. Cheung
Hong Kong Baptist University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by William K. Cheung.
IEEE Transactions on Knowledge and Data Engineering | 2007
Bo Yang; William K. Cheung; Jiming Liu
Many complex systems in the real world can be modeled as signed social networks that contain both positive and negative relations. Algorithms for mining social networks have been developed in the past; however, most of them were designed primarily for networks containing only positive relations and, thus, are not suitable for signed networks. In this work, we propose a new algorithm, called FEC, to mine signed social networks where both positive within-group relations and negative between-group relations are dense. FEC considers both the sign and the density of relations as the clustering attributes, making it effective for not only signed networks but also conventional social networks including only positive relations. Also, FEC adopts an agent-based heuristic that makes the algorithm efficient (in linear time with respect to the size of a network) and capable of giving nearly optimal solutions. FEC depends on only one parameter whose value can easily be set and requires no prior knowledge on hidden community structures. The effectiveness and efficacy of FEC have been demonstrated through a set of rigorous experiments involving both benchmark and randomly generated signed networks.
IEEE Intelligent Systems | 2005
Songhua Xu; Francis C. M. Lau; William K. Cheung; Yunhe Pan
Chinese calligraphy is among the finest and most important of all Chinese art forms and an inseparable part of Chinese history. Its delicate aesthetic effects are generally considered to be unique among all calligraphic arts. Its subtle power is integral to traditional Chinese painting. A novel intelligent system uses a constraint-based analogous-reasoning process to automatically generate original Chinese calligraphy that meets visually aesthetic requirements. We propose an intelligent system that can automatically create novel, aesthetically appealing Chinese calligraphy from a few training examples of existing calligraphic styles. To demonstrate the proposed methodologys feasibility, we have implemented a prototype system that automatically generates new Chinese calligraphic art from a small training set.
Expert Systems With Applications | 2008
Minhong Wang; Jiming Liu; Huaiqing Wang; William K. Cheung; Xiaofeng Xie
With e-business emerging as a key enabler to drive supply chains, the focus of supply chain management has been shifted from production efficiency to customer-driven and partnership synchronization approaches. This strategic shift depends on the match between the demands and offerings that deliver the services. To achieve this, we need to coordinate the flow of information among the services, and link their business processes under various constraints. Existing approaches to this problem have relied on complete information of services and resources, and have failed to adequately address the dynamics and uncertainties of the operating environments. The real-world situation is complicated as a result of undetermined requirements of services involved in the chain, unpredictable solutions contributed by service providers, and dynamic selection and aggregation of solutions to services. This paper examines an agent-mediated approach to on-demand e-business supply chain integration. Each agent works as a service broker, exploring individual service decisions as well as interacting with each other for achieving compatibility and coherence among the decisions of all services. Based on the framework, a prototype has been implemented with simulated experiments highlighting the effectiveness of the approach.
IEEE Transactions on Pattern Analysis and Machine Intelligence | 2011
Ning Zhou; William K. Cheung; Guoping Qiu; Xiangyang Xue
The increasing availability of large quantities of user contributed images with labels has provided opportunities to develop automatic tools to tag images to facilitate image search and retrieval. In this paper, we present a novel hybrid probabilistic model (HPM) which integrates low-level image features and high-level user provided tags to automatically tag images. For images without any tags, HPM predicts new tags based solely on the low-level image features. For images with user provided tags, HPM jointly exploits both the image features and the tags in a unified probabilistic framework to recommend additional tags to label the images. The HPM framework makes use of the tag-image association matrix (TIAM). However, since the number of images is usually very large and user-provided tags are diverse, TIAM is very sparse, thus making it difficult to reliably estimate tag-to-tag co-occurrence probabilities. We developed a collaborative filtering method based on nonnegative matrix factorization (NMF) for tackling this data sparsity issue. Also, an L1 norm kernel method is used to estimate the correlations between image features and semantic concepts. The effectiveness of the proposed approach has been evaluated using three databases containing 5,000 images with 371 tags, 31,695 images with 5,587 tags, and 269,648 images with 5,018 tags, respectively.
IEEE Transactions on Pattern Analysis and Machine Intelligence | 2013
Jia Zeng; William K. Cheung; Jiming Liu
Latent Dirichlet allocation (LDA) is an important hierarchical Bayesian model for probabilistic topic modeling, which attracts worldwide interest and touches on many important applications in text mining, computer vision and computational biology. This paper represents the collapsed LDA as a factor graph, which enables the classic loopy belief propagation (BP) algorithm for approximate inference and parameter estimation. Although two commonly used approximate inference methods, such as variational Bayes (VB) and collapsed Gibbs sampling (GS), have gained great success in learning LDA, the proposed BP is competitive in both speed and accuracy, as validated by encouraging experimental results on four large-scale document datasets. Furthermore, the BP algorithm has the potential to become a generic scheme for learning variants of LDA-based topic models in the collapsed space. To this end, we show how to learn two typical variants of LDA-based topic models, such as author-topic models (ATM) and relational topic models (RTM), using BP based on the factor graph representations.
IEEE Internet Computing | 2006
William K. Cheung; Xiaofeng Zhang; Ho-Fai Wong; Jiming Liu; Zongwei Luo; Frank Tong
Data mining research currently faces two great challenges: how to embrace data mining services with just-in-time and autonomous properties and how to mine distributed and privacy-protected data. To address these problems, the authors adopt the business process execution language for Web services in a service-oriented distributed data mining (DDM) platform to choreograph DDM component services and fulfil global data mining requirements. They also use the learning-from-abstraction methodology to achieve privacy-preserving DDM. Finally, they illustrate how localized autonomy on privacy-policy enforcement plus a bidding process can help the service-oriented system self-organize
international conference on web services | 2004
William K. Cheung; Jiming Liu; Kevin H. Tsang; Raymond K. Wong
Web services are becoming important in applications from electronic commerce to application interoperation. While numerous efforts have focused on service composition, service selection among similar services from multiple providers has not been addressed. Such issue is more serious when services are embraced in Grid platforms, which are usually resource-conscious. Experimental results show that our considerations are valid and our preliminary solution works well in our Globus grid network.
Infectious Diseases of Poverty | 2012
Jiming Liu; Bo Yang; William K. Cheung; Guo-Jing Yang
Malaria transmission can be affected by multiple or even hidden factors, making it difficult to timely and accurately predict the impact of elimination and eradication programs that have been undertaken and the potential resurgence and spread that may continue to emerge. One approach at the moment is to develop and deploy surveillance systems in an attempt to identify them as timely as possible and thus to enable policy makers to modify and implement strategies for further preventing the transmission. Most of the surveillance data will be of temporal and spatial nature. From an interdisciplinary point of view, it would be interesting to ask the following important as well as challenging question: Based on the available surveillance data in temporal and spatial forms, how can we build a more effective surveillance mechanism for monitoring and early detecting the relative prevalence and transmission patterns of malaria? What we can note from the existing clustering-based surveillance software systems is that they do not infer the underlying transmission networks of malaria. However, such networks can be quite informative and insightful as they characterize how malaria transmits from one place to another. They can also in turn allow public health policy makers and researchers to uncover the hidden and interacting factors such as environment, genetics and ecology and to discover/predict malaria transmission patterns/trends. The network perspective further extends the present approaches to modelling malaria transmission based on a set of chosen factors. In this article, we survey the related work on transmission network inference, discuss how such an approach can be utilized in developing an effective computational means for inferring malaria transmission networks based on partial surveillance data, and what methodological steps and issues may be involved in its formulation and validation.
Information Systems Frontiers | 2007
Patrick C. K. Hung; Dickson K. W. Chiu; W.W. Fung; William K. Cheung; Raymond K. Wong; Samuel P. M. Choi; Eleanna Kafeza; James Tin-Yau Kwok; Joshua C.C. Pun; Vivying S. Y. Cheng
With the recent adoption of service outsourcing, there have been increasing general demands and concerns for privacy control, in addition to basic requirement of integration. The traditional practice of a bulk transmission of the customers’ information to an external service provider is no longer adequate, especially in the finance and healthcare sectors. From our consultancy experience, application-to-application privacy protection technologies at the middleware layer alone are also inadequate to solve this problem, particularly when human service providers are heavily involved in the outsourced process. Therefore, we propose a layered architecture and a development methodology for enforcing end-to-end privacy control policies of enterprises over the export of personal information. We illustrate how Web services, augmented with updated privacy facilities such as Service Level Agreement (SLA), Platform for Privacy Preferences Project (P3P), and the P3P Preference Exchange Language (APPEL), can provide a suitable interoperation platform for service outsourcing. We further develop a conceptual model and an interaction protocol to send only the required part of a customer’s record at a time. We illustrate our approach for end-to-end privacy control in service outsourcing with a tele-marketing case study and show how the software of the outsourced call center can be integrated effectively with the Web services of a bank to protect privacy.
web intelligence | 2004
William K. Cheung; Jiming Liu; Kevin H. Tsang; Raymond K. Wong
While numerous efforts have focused on service composition in the Grid environment, service selection among similar services from multiple providers has not been addressed. In particular, all service composition work done so far are based on a given selection of services under a well set environment. As a result, uncertainty (e.g., server load, network traffic, computation time of the services due to changing memory and other unexpected conditions) under a real, dynamic environment has never been considered. This paper prototypes the service selection under a Grid environment and proposes an uncertainty framework to address the issue. Experimental results show that our considerations are valid and our preliminary solution works well in our Globus Grid network.