Honghui Chen - IEEE Xplore Author Profile

Showing 1-25 of 51 results

Filter Results

Show

Results

Link prediction on temporal networks aims to predict the future edges by modeling the dynamic evolution involved in the graph data. Previous methods relying on the node/edge attributes or the distance on the graph structure are not practical due to the deficiency of the attributes and the limitation of the explicit distance estimation, respectively. Moreover, the existing graph representation lear...Show More
Inductive link prediction on temporal networks aims to predict the future links associated with node(s) unseen in the historical timestamps. Existing methods generate the predictions mainly by learning node representation from the node/edge attributes as well as the network dynamics or by measuring the distance between nodes on the temporal network structure. However, the attribute information is ...Show More
Graph self-supervised learning is a task replete with potential. Previously, mainstream approaches in graph self-supervised learning were based on contrastive or generative tasks to extract graph embeddings, achieving commendable performance in downstream tasks such as node classification. However, these two methods have their respective strengths and limitations: (i) contrastive graph learning ex...Show More
Temporal networks represent the evolving complex systems by regarding the contained elements as nodes and their connections as edges, respectively, which are both time-varying. Link prediction on temporal networks is an essential problem in real-world applications, which aims to forecast the evolution of temporal networks by predicting the future links to appear. However, existing methods generall...Show More
Event representation aims to transform individual events from a narrative event chain into a set of low-dimensional vectors to help support a series of downstream applications, e.g., similarity differentiation and missing event prediction. Traditional event representation models tend to focus on single modeling perspectives and thus are incapable of capturing physically disconnected yet semantical...Show More
At the intersection of network science, communication models, and military command and control, this study explores the critical impact of network structure on the efficiency of information dissemination. We discuss how these findings can be applied to real-world military situations. Our research employs the SIR model and network simulation to replicate the information propagation process within t...Show More
Resource allocation is pivotal for human society. On-demand resource matching aims to efficiently assign resources to suitable demands based on the resource characteristics, which in widely applicable in area such as e-commerce, recruitment, and military operations. However, conventional matching methods like keyword matching lack semantic analysis, while manual rules have limited adaptability. Wi...Show More
Modern war relies heavily on various combat units, such as command and control units, surveillance units, and reconnaissance units. These units are usually combined organically as a combat SoS (System of Systems) to conduct given missions. To ensure that the combat SoS executes correctly, the communication systems (e.g., communication vehicles, communication UAVs) must be planned carefully to conn...Show More
Hierarchical context modeling plays an important role in the response generation for multi-turn conversational systems. Previous methods mainly model context as multiple independent utterances and rely on attention mechanisms to obtain the context representation. They tend to ignore the explicit responds-to relationships between adjacent utterances and the special role that the user’s latest utter...Show More
Mobile edge computing is a new paradigm in which the computing and storage resources are placed at the edge of the Internet. Data placement and retrieval are fundamental services of mobile edge computing when a network of edge clouds collaboratively provide data services. These services require short-latency and low-overhead implementation in network and computing devices and load balance on edge ...Show More
Current generation models of emotional dialogue pay more attention to integrating emotion into the process of response generation, but not enough attention to the semantic content of response. In order to enhance the quality of semantic content in response generation, this paper proposes an emotional dialogue generation model incorporating topic information (T-ECCM), which can enhance the relevanc...Show More
Generating diversified and affected context-consistent responses is key to intelligent dialogue systems. Previous works about emotional response generation mainly refer to incorporate the emotional category into the decoding process, ignoring the historical emotion in the conversation context. In addition, existing methods mainly fail to consider the diversity of responses and emotional categories...Show More
Edge computing promises a dramatic reduction in the network latency and the traffic volume, where many edge servers are placed at the edge of the Internet. Furthermore, those edge servers cache data to provide services for edge users. The data sharing among those edge servers can effectively shorten the latency to retrieve the data and further reduce the network bandwidth consumption. The key chal...Show More
To enable fast content delivery for delay-sensitive applications, large content providers build edge servers, Points of Presence (PoPs), and datacenters around the world. They are networked together as an integrated infrastructure via a private wide-area network (WAN), named content delivery network (CDN). To deliver quality services in the CDN, there are two critical decisions that should be prop...Show More
The hierarchical mobile edge computing satisfies the stringent latency requirements of data access and processing for emerging edge applications. The data location service is a basic function to provide data storage and retrieval to enable these applications. However, it still lacks research of a scalable and low-latency data location service in the environment. The existing solutions, such as DNS...Show More
With the evolution of multi-access edge computing (MEC) and 5G communications, diverse services can be flexibly offered by multiple cache-enabled base stations (BSs) in dense deployments. This leads to an important request allocation problem, which studies how to direct user requests among multiple BSs. Efficient request allocation faces several challenges corresponding to the risk associated with...Show More
A large number of servers are interconnected using a specific datacenter network to deliver the infrastructure as a service (IaaS). Multicast can jointly utilize the network resources and further reduce the consumption of network bandwidth more than individual unicast. The source of a multicast service, however, does not need to be in a specific location as long as certain constraints are satisfie...Show More
Basket-Sensitive Item Recommendation (BSIR) is a challenging task that aims to recommend an item to add to the current basket given a user’s historical behaviors. The recommended item is supposed to be relevant to the items in current basket. Previous works mainly produce a recommendation based on user’s current basket, ignoring the inherent preference released by user’s long-term behaviors and fa...Show More
Recently, Graph Neural Networks (GNNs) have attracted increasing attention in the field of session-based recommendation, due to its strong ability on capturing complex interactive transitions within sessions. However, existing GNN-based models either lack the use of user's long-term historical behaviors or fail to address the impact of collaborative filtering information from neighbor users on the...Show More
Proximal stochastic gradient plays an important role in large-scale machine learning and big data analysis. It needs to iteratively update models within a feasible set until convergence. The computational cost is usually high due to the projection over the feasible set. To reduce complexity, many projection-free methods such as Frank-Wolfe methods have been proposed. However, those projection-free...Show More
Edge computing satisfies the stringent latency requirements of data access and processing for applications running on edge devices. The data location service is a key function to provide data storage and retrieval to enable these applications. However, it still lacks research of a scalable and low-latency data location service in mobile edge computing. Meanwhile, the existing solutions, such as DN...Show More
Session-aware recommendation is a special form of session-based recommendation, where users' historical interactions before the current session are available. Among the existing session-aware recommendation studies, recurrent neural network (RNN) is a popular choice to model users' current intent of the ongoing session as well as their general preference implied in previous sessions. However, thes...Show More
Vehicular cloud computing (VCC) has been utilized to enhance traffic management and road safety. By connecting with base stations (BSes), VCC can provide the information of real-time dynamics for smart vehicles (SVs). However, the area outside the coverage of BSes will be the blind areas, where SVs cannot obtain the real-time safety guarantee, especially on the highway. In this article, we utilize...Show More
Session-aware recommendation is a special form of sequential recommendation, where users' previous interactions before current session are available. Recently, Recurrent Neural Network (RNN) based models are widely used in sequential recommendation tasks with great success. Previous works mainly focus on the interaction sequences of the current session without analyzing a user's long-term preferen...Show More
Large-scale datacenters are the key infrastructures of cloud computing. Inside a datacenter, a large number of servers are interconnected using a specific datacenter network to deliver the infrastructure as a service (IaaS) for tenants. To realize novel cloud applications like the network virtualization and network isolation among tenants, the principle of software-defined network (SDN) has been a...Show More