#### Filter Results:

- Full text PDF available (596)

#### Publication Year

1991

2017

- This year (173)
- Last 5 years (975)
- Last 10 years (1,506)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Brain Region

#### Cell Type

#### Data Set Used

#### Key Phrases

#### Method

#### Organism

Learn More

- Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, Ali A. Ghorbani
- 2009 IEEE Symposium on Computational Intelligence…
- 2009

During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly… (More)

- Namrata Vaswani, Wei Lu
- IEEE Transactions on Signal Processing
- 2009

We study the problem of reconstructing a sparse signal from a limited number of its linear projections when a part of its support is known, although the known part may contain some errors. The “known” part of the support, denoted T, may be available from prior knowledge. Alternatively, in a problem of recursively reconstructing time sequences… (More)

- Sung Hyun Jo, Ting Chang, Idongesit E. Ebong, Bhavitavya Bhadviya, Pinaki Mazumder, Wei Lu
- Nano letters
- 2010

A memristor is a two-terminal electronic device whose conductance can be precisely modulated by charge or flux through it. Here we experimentally demonstrate a nanoscale silicon-based memristor device and show that a hybrid system composed of complementary metal-oxide semiconductor neurons and memristor synapses can support important synaptic functions such… (More)

- Amit Goyal, Wei Lu, Laks V. S. Lakshmanan
- 2011 IEEE 11th International Conference on Data…
- 2011

There is significant current interest in the problem of influence maximization: given a directed social network with influence weights on edges and a number k, find k seed nodes such that activating them leads to the maximum expected number of activated nodes, according to a propagation model. Kempe et al. showed, among other things, that under the Linear… (More)

- Wei Lu, Jagath C. Rajapakse
- IEEE Transactions on Neural Networks
- 2005

This work presents the technique of constrained independent component analysis (cICA) and demonstrates two applications, less-complete ICA, and ICA with reference (ICA-R). The cICA is proposed as a general framework to incorporate additional requirements and prior information in the form of constraints into the ICA contrast function. The adaptive solutions… (More)

- Amit Goyal, Wei Lu, Laks V. S. Lakshmanan
- WWW
- 2011

Kempe et al. [4] (KKT) showed the problem of influence maximization is <b>NP</b>-hard and a simple greedy algorithm guarantees the best possible approximation factor in PTIME. However, it has two major sources of inefficiency. First, finding the expected spread of a node set is #<b>P</b>-hard. Second, the basic greedy algorithm is quadratic in the number of… (More)

- Wei Zheng, Jirong Long, +12 authors Xiao Shu
- Nature genetics
- 2009

We carried out a genome-wide association study among Chinese women to identify risk variants for breast cancer. After analyzing 607,728 SNPs in 1,505 cases and 1,522 controls, we selected 29 SNPs for a fast-track replication in an independent set of 1,554 cases and 1,576 controls. We further investigated four replicated loci in a third set of samples… (More)

- Wei Lu, Yanyan Shen, Su Chen, Beng Chin Ooi
- PVLDB
- 2012

k nearest neighbor join (kNN join), designed to find k nearest neighbors from a dataset S for every object in another dataset R, is a primitive operation widely adopted by many data mining applications. As a combination of the k nearest neighbor query and the join operation, kNN join is an expensive operation. Given the increasing volume of data, it is… (More)

- Wei Lu, Hwee Tou Ng, Wee Sun Lee, Luke S. Zettlemoyer
- EMNLP
- 2008

In this paper, we present an algorithm for learning a generative model of natural language sentences together with their formal meaning representations with hierarchical structures. The model is applied to the task of mapping sentences to hierarchical representations of their underlying meaning. We introduce dynamic programming techniques for efficient… (More)

- Wei Chen, Wei Lu, Ning Zhang
- AAAI
- 2012

Influence maximization is a problem of finding a small set of highly influential users in a social network such that the spread of influence under certain propagation models is maximized. In this paper, we consider time-critical influence maximization, in which one wants to maximize influence spread within a given deadline. Since timing is considered in the… (More)