4.4 Article

APEX2S: A two-layer machine learning model for discovery of host-pathogen protein-protein interactions on cloud-based multiomics data

Journal

Publisher

WILEY
DOI: 10.1002/cpe.5846

Keywords

big data; computational biology; data analysis; machine learning

Funding

  1. China Scholarship Council
  2. University Global Partnership Network

Ask authors/readers for more resources

Presented by the avalanche of biological interactions data, computational biology is now facing greater challenges on big data analysis and solicits more studies to mine and integrate cloud-based multiomics data, especially when the data are related to infectious diseases. Meanwhile, machine learning techniques have recently succeeded in different computational biology tasks. In this article, we have calibrated the focus for host-pathogen protein-protein interactions study, aiming to apply the machine learning techniques for learning the interactions data and making predictions. A comprehensive and practical workflow to harness different cloud-based multiomics data is discussed. In particular, a novel two-layer machine learning model, namely APEX2S, is proposed for discovery of the protein-protein interactions data. The results show that our model can better learn and predict from the accumulated host-pathogen protein-protein interactions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Dataset-Driven Unsupervised Object Discovery for Region-Based Instance Image Retrieval

Zhongyan Zhang, Lei Wang, Yang Wang, Luping Zhou, Jianjia Zhang, Fang Chen

Summary: This paper proposes a novel dataset-driven unsupervised object discovery framework, which utilizes deep feature representation and weakly-supervised object detection to discover objects in the image dataset. The proposed framework improves the performance of region-based instance image retrieval.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

Article Computer Science, Theory & Methods

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Triet H. M. Le, Huaming Chen, M. Ali Babar

Summary: This article highlights the importance of SV assessment and prioritization and provides a taxonomy of past research efforts and best practices. The article also discusses current limitations and proposes potential solutions.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Artificial Intelligence

Designing an optimization model for the vaccine supply chain during the COVID-19 pandemic

Jaber Valizadeh, Shadi Boloukifar, Sepehr Soltani, Ehsan Jabalbarezi Hookerd, Farzaneh Fouladi, Anastasia Andreevna Rushchtc, Bo Du, Jun Shen

Summary: The study presents a solution for the challenges in the vaccine supply chain through a robust optimization model, considering various costs and risks in the public vaccination program. Numerical experiments based on the vaccine supply chain in Kermanshah, Iran, show that the proposed model significantly reduces mortality risk, inequality in vaccine distribution, and total cost.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Engineering, Civil

Feasibility Analysis of Data Transmission in Partially Damaged IoT Networks of Vehicles

Wei Wei, Jun Shen, Akbar Telikani, Mahdi Fahmideh, Wei Gao

Summary: IoV networks, which utilize sensors deployed on vehicles, are a new generation of IoT networks. The use of Fractional Critical Deleted Graph (FCDG) can enhance network stability and reliability, aiding in the recovery or reconfiguration of lost links.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Environmental Studies

Space sharing between pedestrians and micro-mobility vehicles: A systematic review

Cheng Zhang, Bo Du, Zuduo Zheng, Jun Shen

Summary: This paper provides a systematic review of studies on the interactions between pedestrians and MMVs in shared spaces. The findings suggest that space sharing is feasible but more efforts are needed on data collection and further investigations on various MMV types and different conditions.

TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT (2023)

Article Engineering, Electrical & Electronic

A Blockchain-Based Multi-Users Oblivious Data Sharing Scheme for Digital Twin System in Industrial Internet of Things

Wei Wei, Bochao An, Ke Qiao, Jun Shen

Summary: This paper proposes a blockchain based Multi-users Oblivious Data Sharing scheme (MODS) for the digital twin system in the context of Industrial Internet of Things (IIoT). MODS combines trusted hardware and cryptography to achieve a balance between security and efficiency, addressing the security threats posed by centralized data sharing services for sensitive DT data.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2023)

Article Computer Science, Artificial Intelligence

High-Dimensional Feature Selection Based on Improved Binary Ant Colony Optimization Combined with Hybrid Rice Optimization Algorithm

A. Zhiwei Ye, B. Ruihan Li, C. Wen Zhou, D. Mingwei Wang, E. Mengqing Mei, F. Zhe Shu, G. Jun Shen

Summary: This paper proposes two innovative feature selection methods that integrate ant colony optimization (ACO) algorithm and hybrid rice optimization (HRO) to address the issue of redundant or irrelevant features in high-dimensional data analysis.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

PGLR: Pseudo Graph and Label Reuse for Entity Relation Extraction

Hanyue Zhang, Li Li, Jun Shen

Summary: In this paper, a novel model called PGLR is proposed for entity recognition and relation extraction. The model addresses information redundancy by generating a pseudo-graph and employs a label reuse approach to aggregate predicted labels and external knowledge. The reconstructed representations are evaluated using a gating mechanism. Experimental results demonstrate that the proposed model achieves higher accuracy, faster inference speed, and requires fewer parameters.

2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN (2023)

Proceedings Paper Computer Science, Artificial Intelligence

CAKT: Coupling contrastive learning with attention networks for interpretable knowledge tracing

Shuaishuai Zu, Li Li, Jun Shen

Summary: This paper proposes a model called CAKT that combines contrastive learning with attention networks for interpretable knowledge tracing. By using contrastive learning as the training goal, more representative representations of knowledge states and learning interactions can be obtained. Extensive experiments demonstrate the excellent predictive performance of CAKT and the positive effects of considering the two properties. Additionally, CAKT exhibits high interpretability for captured knowledge states.

2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN (2023)

Article Computer Science, Information Systems

TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence

Dong Lu, Yanlong Zhai, Jun Shen, Mahdi Fahmideh, Jianqing Wu, Jude Tchaye-Kondi, Liehuang Zhu

Summary: Edge intelligence combines edge computing and deep learning to bring AI to the network's edge. It has received attention for its low network latency and better privacy preservation. However, the inference of deep neural networks is computationally demanding and results in poor real-time performance, making it challenging for resource-constrained edge devices.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Artificial Intelligence

Iterative Multiview Subspace Learning for Unpaired Multiview Clustering

Wanqi Yang, Like Xin, Lei Wang, Ming Yang, Wenzhu Yan, Yang Gao

Summary: In real applications, unpaired multiview data, where samples between views cannot be matched, is a challenging problem in multiview clustering. Existing methods rely on matched samples, but we propose an iterative unpaired multiview clustering strategy (IUMC) to learn a complete and consistent subspace representation among views. We also design two effective UMC methods based on IUMC, which outperform state-of-the-art methods in terms of clustering performance and applicability in incomplete multiview clustering.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Towards Improving the Anti-attack Capability of the RangeNet plus

Qingguo Zhou, Ming Lei, Peng Zhi, Rui Zhao, Jun Shen, Binbin Yong

Summary: In this paper, we propose novel approaches to improve the security and anti-attack capability of the RangeNet++ model in the field of autonomous driving. One is to calculate the local geometry based on the range image, which can reflect the surface shape of the point cloud. The other is to obtain a general adversarial sample based on the range image that is related only to the image itself and closer to the real world, and add it into the training set for training. Experimental results show that the proposed approaches can effectively improve the RangeNet++ model's defense ability against adversarial attacks and enhance its robustness.

COMPUTER VISION - ACCV 2022 WORKSHOPS (2023)

Article Computer Science, Artificial Intelligence

Defensive Few-Shot Learning

Wenbin Li, Lei Wang, Xingxing Zhang, Lei Qi, Jing Huo, Yang Gao, Jiebo Luo

Summary: This article investigates defensive few-shot learning, a challenging problem in learning robust few-shot models against adversarial attacks. Existing adversarial defense methods cannot effectively solve this problem due to the inconsistency in sample-level distribution between training and test sets in few-shot learning. To overcome this, the authors propose a general defensive few-shot learning framework that addresses two key questions: how to transfer adversarial defense knowledge across different sample distributions, and how to narrow the distribution gap between clean and adversarial examples in few-shot setting. Experimental results show that the proposed framework effectively enhances robustness of existing few-shot models against adversarial attacks. Code is available at https://github.com/WenbinLee/DefensiveFSL.git.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

Article Computer Science, Artificial Intelligence

Selective Contrastive Learning for Unpaired Multi-View Clustering

Like Xin, Wanqi Yang, Lei Wang, Ming Yang

Summary: In this article, the authors investigate the issue of unpaired multi-view clustering and propose an effective method called selective contrastive learning for UMC (scl-UMC) to address the challenging problems of uncertain clustering structure and pairing relationship between views. Extensive experiments demonstrate the efficiency of the proposed method.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Information Systems

A Novel Mix-Normalization Method for Generalizable Multi-Source Person Re-Identification

Lei Qi, Lei Wang, Yinghuan Shi, Xin Geng

Summary: In this paper, a novel method called MixNorm is proposed for tackling the generalizable multi-source person re-identification task. The method enhances the diversity of features through domain-aware mix-normalization and domain-aware center regularization, thereby boosting the model's generalization capability in unseen domains. Extensive experiments validate the effectiveness of the proposed method and demonstrate its superiority over state-of-the-art methods.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

No Data Available