HongYun Cai

Learn More
The exponential growth of online videos, along with increasing user involvement in video-related activities, has been observed as a constant phenomenon during the last decade. User's time spent on video capturing, editing, uploading, searching, and viewing has boosted to an unprecedented level. The massive publishing and sharing of videos has given rise to(More)
We describe an efficient one-pot regio- and stereoselective method for synthesizing diverse 1-hydroxy-12H-6,12-methanodibenzo[d,g][1,3]dioxocines and 3-hydroxy-12H-6,12-methanodibenzo[d,g][1,3]dioxocines using ethylenediammonium diacetate (EDDA) or p-toluenesulfonic acid (PTSA) catalyzed reactions between various resorcinols and a number of(More)
As one of the most representative social media platforms, Twitter provides various real-life information on social events in real time. Despite that social event detection has been actively studied, tweet images, which appear in around 36 percent of the total tweets, have not been well utilized for this research problem. Most existing event detection(More)
Tweet streams provide a variety of real-life and real-time information on social events that dynamically change over time. Although social event detection has been actively studied, how to efficiently monitor evolving events from continuous tweet streams remains open and challenging. One common approach for event detection from text streams is to use(More)
Most of the existing graph embedding methods focus on nodes, which aim to output a vector representation for each node in the graph such that two nodes being " close " on the graph are close too in the low-dimensional space. Despite the success of embedding individual nodes for graph analytics, we notice that an important concept of embedding communities(More)
Effective event modeling allows accurate event identification and monitoring to enable timely response to emergencies occurring in various applications. Although event identification (or detection) has been extensively studied in the last decade, the triggering relationship among initial and subsequent events has not been well studied, which limits the(More)
An application sandbox model based on system call context is proposed and applied to intrusion detection. It overcomes some drawbacks of traditional special-purpose sandboxes: inconvenience for selecting sandbox with user involvement and inaccuracy of intrusion detection for different applications of the same class. The application sandbox, modeling for an(More)
Diverse and functionalized 2-hydroxybenzophenone derivatives were synthesized efficiently in good to excellent yield via the highly regioselective indium(iii)-catalyzed [2+2+2] benzannulation of 3-formylchromones with β-enamino esters or β-enamino ketones. This benzannulation reaction proceeds via a domino(More)