scispace - formally typeset
Search or ask a question
Author

Daqing Zhang

Bio: Daqing Zhang is an academic researcher from Peking University. The author has contributed to research in topics: Context (language use) & Mobile computing. The author has an hindex of 67, co-authored 331 publications receiving 16675 citations. Previous affiliations of Daqing Zhang include Institut Mines-Télécom & Institute for Infocomm Research Singapore.


Papers
More filters
Journal ArticleDOI
TL;DR: The results show that SESAME can subtly capture user preference on social media items and consistently outperform baseline approaches by achieving better personalized ranking quality.
Abstract: With the recent popularity of social network services, a significant volume of heterogeneous social media data is generated by users, in the form of texts, photos, videos and collections of points of interest, etc. Such social media data provides users with rich resources for exploring content, such as looking for an interesting video or a favorite point of interest. However, the rapid growth of social media causes difficulties for users to efficiently retrieve their desired media items. Fortunately, users' digital footprints on social networks such as comments massively reflect individual's fine-grained preference on media items, that is, preference on different aspects of the media content, which can then be used for personalized social media search. In this article, we propose SESAME, a fine-grained preference-aware social media search framework leveraging user digital footprints on social networks. First, we collect users' direct feedback on media content from their social networks. Second, we extract users' sentiment about the media content and the associated keywords from their comments to characterize their fine-grained preference. Third, we propose a parallel multituple based ranking tensor factorization algorithm to perform the personalized media item ranking by incorporating two unique features, viz., integrating an enhanced bootstrap sampling method by considering user activeness and adopting stochastic gradient descent parallelization techniques. We experimentally evaluate the SESAME framework using two datasets collected from Foursquare and YouTube, respectively. The results show that SESAME can subtly capture user preference on social media items and consistently outperform baseline approaches by achieving better personalized ranking quality.

17 citations

Journal ArticleDOI
TL;DR: GroupMe is presented, a group-aware smartphone sensing system that supports group management and activity organization in real-world applications and proposes a multigranular group model to support various user needs on group formation and management.
Abstract: Today, social activities are becoming increasingly popular and important to human life. As the number of contacts increases, however, the implicit social graph becomes increasingly complex, leading to a high cost on social activity organization and activity group formation. In this article, the authors present GroupMe, a group-aware smartphone sensing system that supports group management and activity organization in real-world applications. They first present a systematic methodology that can steer the development of mobile group awareness applications, then propose a multigranular group model. Based on the methodology and the model, the authors present their approaches that support various user needs on group formation and management, including closed group suggestion, open/opportunistic grouping, and new group member suggestion. Experimental results verify the effectiveness of the proposed approaches.

17 citations

Journal ArticleDOI
01 Feb 2014
TL;DR: It is believed that the SCI technology has the potential to revolutionize the field of context-aware computing, will transform the understandings of the authors' lives, organizations and societies, and enable completely innovative services in areas like public facilities and outdoor environments.
Abstract: As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network in public facilities and outdoor environments, the "digital footprints" left by people while interacting with cyber-physical spaces are accumulating with unprecedented breadth, depth, and scale. The technology trend towards pervasive sensing and large-scale social and community computing is making "social and community intelligence (SCI)" (Zhang et al. 2011), a new research area that aims at mining the "digital footprints" to reveal the patterns of individual/group behaviours, social interactions, and community dynamics (e.g., city hot spots, traffic jams). It is believed that the SCI technology has the potential to revolutionize the field of context-aware computing, will transform the understandings of our lives, organizations and societies, and enable completely innovative services in areas like...

17 citations

Proceedings ArticleDOI
04 Oct 2017
TL;DR: A Food Delivery Network (FooDNet) is built that investigates the usage of urban taxis to support on demand take-out food delivery by leveraging spatial crowdsourcing and proposes a two-stage method to solve the problem, consisting of the construction algorithm and the Large Neighborhood Search (LNS) algorithm.
Abstract: This paper builds a Food Delivery Network (FooDNet) that investigates the usage of urban taxis to support on demand take-out food delivery by leveraging spatial crowdsourcing. Unlike existing service sharing systems (e.g., ridesharing), the delivery of food in FooDNet is more time-sensitive and the optimization problem is more complex regarding high-efficiency, huge-number of delivery needs. In particular, we study the food delivery problem in association with the Opportunistic Online Takeout Ordering & Delivery service (O-OTOD). Specifically, the food is delivered incidentally by taxis when carrying passengers in the O-OTOD problem, and the optimization goal is to minimize the number of selected taxis to maintain a relative high incentive to the participated drivers. The two-stage method is proposed to solve the problem, consisting of the construction algorithm and the Large Neighborhood Search (LNS) algorithm. Preliminary experiments based on real-world taxi trajectory datasets verify that our proposed algorithms are effective and efficient.

16 citations

Journal ArticleDOI
TL;DR: This paper first characterizes the concept model and unique features and presents a generic framework for CrowdBI, and investigates novel application areas as well as the key challenges and techniques of CrowdBI.
Abstract: Crowdsourced business intelligence (CrowdBI), which leverages the crowdsourced user-generated data to extract useful knowledge about business and create marketing intelligence to excel in the business environment, has become a surging research topic in recent years. Compared with the traditional business intelligence that is based on the firm-owned data and survey data, CrowdBI faces numerous unique issues, such as customer behavior analysis, brand tracking, and product improvement, demand forecasting and trend analysis, competitive intelligence, business popularity analysis and site recommendation, and urban commercial analysis. This paper first characterizes the concept model and unique features and presents a generic framework for CrowdBI. It also investigates novel application areas as well as the key challenges and techniques of CrowdBI. Furthermore, we make discussions about the future research directions of CrowdBI. INDEX TERMS Crowdsourced business intelligence, consumer behaviors, competitive intelligence, crowd intelligence, commercial site recommendation, brand trending.

16 citations


Cited by
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: This work quantitatively investigates how machine learning models leak information about the individual data records on which they were trained and empirically evaluates the inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon.
Abstract: We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if the record was in the model's training dataset. To perform membership inference against a target model, we make adversarial use of machine learning and train our own inference model to recognize differences in the target model's predictions on the inputs that it trained on versus the inputs that it did not train on. We empirically evaluate our inference techniques on classification models trained by commercial "machine learning as a service" providers such as Google and Amazon. Using realistic datasets and classification tasks, including a hospital discharge dataset whose membership is sensitive from the privacy perspective, we show that these models can be vulnerable to membership inference attacks. We then investigate the factors that influence this leakage and evaluate mitigation strategies.

2,059 citations