Normalizing flow based uncertainty estimation for deep regression analysis

Journal article


Qi, M., Zhang, B., Sui, W, Li, M. and Huang, Z. 2024. Normalizing flow based uncertainty estimation for deep regression analysis. Neurocomputing. 585 (6), p. 127645. https://doi.org/10.1016/j.neucom.2024.127645
AuthorsQi, M., Zhang, B., Sui, W, Li, M. and Huang, Z.
Abstract

Uncertainty estimation is a critical component of building safe and reliable machine learning models. Accurate estimation of uncertainties is essential for identifying and mitigating potential risks and ensuring that machine learning systems operate reliably in real-world scenarios. Various approaches, such as ensemble and Bayesian neural networks have been developed by sampling probability predictions from submodels, which is computationally expensive. At present, these techniques are incapable of precisely delineating the boundary separating in-distribution (ID) and out-of-distribution (OOD) data. To fill up this research gap, this paper presents a normalizing flow based framework to directly predict parameters of prior distributions over the probability with a neural network, the proposed model is able to effectively differentiate between ID and OOD data in regression problems. The posterior distributions learned by the model precisely represent uncertainties for OOD data based solely on ID data, without the need for OOD data during training. This approach has shown promising results in a number of applications, including image depth estimation and image adversarial attacks.

KeywordsRegression; Predictive uncertainty; Normalizing flow; Probablistic modelling; Adversarial robustness; Calibration
Year2024
JournalNeurocomputing
Journal citation585 (6), p. 127645
PublisherElsevier
ISSN0925-2312
Digital Object Identifier (DOI)https://doi.org/10.1016/j.neucom.2024.127645
Official URLhttps://www.sciencedirect.com/science/article/pii/S0925231224004168
Publication dates
Online07 Jun 2024
Publication process dates
Accepted29 Mar 2024
Deposited20 Jan 2025
Accepted author manuscript
File Access Level
Restricted
Publisher's version
License
File Access Level
Open
Output statusPublished
References

[1] A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai, T. Unterthiner, M. Dehghani, M. Minderer, G. Heigold, S. Gelly, et al., An
image is worth 16x16 words: Transformers for image recognition at scale,
arXiv preprint arXiv:2010.11929 (2020).
[2] C. Godard, O. Mac Aodha, G. J. Brostow, Unsupervised monocular
depth estimation with left-right consistency, in: Proceedings of the
IEEE conference on computer vision and pattern recognition, 2017, pp.
270–279.
[3] L. Ouyang, J. Wu, X. Jiang, D. Almeida, C. L. Wainwright, P. Mishkin,
C. Zhang, S. Agarwal, K. Slama, A. Ray, et al., Training language
models to follow instructions with human feedback, arXiv preprint
arXiv:2203.02155 (2022).
18
[4] T. Brown, B. Mann, N. Ryder, M. Subbiah, J. D. Kaplan, P. Dhariwal,
A. Neelakantan, P. Shyam, G. Sastry, A. Askell, et al., Language models
are few-shot learners, Advances in neural information processing systems
33 (2020) 1877–1901.
[5] C. Blundell, J. Cornebise, K. Kavukcuoglu, D. Wierstra, Weight uncertainty in neural network, in: International conference on machine
learning, PMLR, 2015, pp. 1613–1622.
[6] W. J. Maddox, P. Izmailov, T. Garipov, D. P. Vetrov, A. G. Wilson, A
simple baseline for bayesian uncertainty in deep learning, Advances in
neural information processing systems 32 (2019).
[7] K. Osawa, S. Swaroop, M. E. E. Khan, A. Jain, R. Eschenhagen, R. E.
Turner, R. Yokota, Practical deep learning with bayesian principles,
Advances in neural information processing systems 32 (2019).
[8] D. Eswaran, S. G¨unnemann, C. Faloutsos, The power of certainty: A
dirichlet-multinomial model for belief propagation, in: Proceedings of
the 2017 SIAM International Conference on Data Mining, SIAM, 2017,
pp. 144–152.
[9] B. Lakshminarayanan, A. Pritzel, C. Blundell, Simple and scalable
predictive uncertainty estimation using deep ensembles, Advances in
neural information processing systems 30 (2017).
[10] Y. Gal, Z. Ghahramani, Dropout as a bayesian approximation: Representing model uncertainty in deep learning, in: international conference
on machine learning, PMLR, 2016, pp. 1050–1059.
[11] X. Li, Y. Dai, Y. Ge, J. Liu, Y. Shan, L.-Y. Duan, Uncertainty modeling
for out-of-distribution generalization, arXiv preprint arXiv:2202.03958
(2022).
[12] D. Hendrycks, T. Dietterich, Benchmarking neural network robustness to
common corruptions and perturbations, arXiv preprint arXiv:1903.12261
(2019).
[13] P. W. Koh, S. Sagawa, H. Marklund, S. M. Xie, M. Zhang, A. Balsubramani, W. Hu, M. Yasunaga, R. L. Phillips, I. Gao, et al., Wilds: A
19
benchmark of in-the-wild distribution shifts, in: International Conference
on Machine Learning, PMLR, 2021, pp. 5637–5664.
[14] Y. Gal, et al., Uncertainty in deep learning (2016).
[15] A. Kendall, Y. Gal, What uncertainties do we need in bayesian deep
learning for computer vision?, Advances in neural information processing
systems 30 (2017).
[16] M. Hong, J. Liu, C. Li, Y. Qu, Uncertainty-driven dehazing network, in:
Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 36,
2022, pp. 906–913.
[17] J. Hornauer, V. Belagiannis, Gradient-based uncertainty for monocular
depth estimation, in: Computer Vision–ECCV 2022: 17th European
Conference, Tel Aviv, Israel, October 23–27, 2022, Proceedings, Part
XX, Springer, 2022, pp. 613–630.
[18] C. Guo, G. Pleiss, Y. Sun, K. Q. Weinberger, On calibration of modern
neural networks, in: International conference on machine learning, PMLR,
2017, pp. 1321–1330.
[19] J. Quinonero-Candela, M. Sugiyama, A. Schwaighofer, N. D. Lawrence,
Dataset shift in machine learning, Mit Press, 2008.
[20] S. G. Finlayson, A. Subbaswamy, K. Singh, J. Bowers, A. Kupke, J. Zittrain, I. S. Kohane, S. Saria, The clinician and dataset shift in artificial
intelligence, New England Journal of Medicine 385 (3) (2021) 283–286.
[21] H. Guo, H. Wang, Q. Ji, Uncertainty-guided probabilistic transformer for
complex action recognition, in: Proceedings of the IEEE/CVF Conference
on Computer Vision and Pattern Recognition, 2022, pp. 20052–20061.
[22] D. Hendrycks, S. Basart, N. Mu, S. Kadavath, F. Wang, E. Dorundo,
R. Desai, T. Zhu, S. Parajuli, M. Guo, et al., The many faces of robustness:
A critical analysis of out-of-distribution generalization, in: Proceedings
of the IEEE/CVF International Conference on Computer Vision, 2021,
pp. 8340–8349.
[23] B. Charpentier, D. Z¨ugner, S. G¨unnemann, Posterior network: Uncertainty estimation without ood samples via density-based pseudo-counts,
Advances in Neural Information Processing Systems 33 (2020) 1356–1367.
20
[24] Y. Ovadia, E. Fertig, J. Ren, Z. Nado, D. Sculley, S. Nowozin, J. Dillon,
B. Lakshminarayanan, J. Snoek, Can you trust your model’s uncertainty?
evaluating predictive uncertainty under dataset shift, Advances in neural
information processing systems 32 (2019).
[25] I. Kononenko, Bayesian neural networks, Biological Cybernetics 61 (5)
(1989) 361–370.
[26] O. Sagi, L. Rokach, Ensemble learning: A survey, Wiley Interdisciplinary
Reviews: Data Mining and Knowledge Discovery 8 (4) (2018) e1249.
[27] G. E. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever, R. R. Salakhutdinov, Improving neural networks by preventing co-adaptation of feature
detectors, arXiv preprint arXiv:1207.0580 (2012).
[28] D. Rezende, S. Mohamed, Variational inference with normalizing flows,
in: International conference on machine learning, PMLR, 2015, pp.
1530–1538.
[29] I. Kobyzev, S. J. Prince, M. A. Brubaker, Normalizing flows: An introduction and review of current methods, IEEE transactions on pattern
analysis and machine intelligence 43 (11) (2020) 3964–3979.
[30] J. P. Agnelli, M. Cadeiras, E. G. Tabak, C. V. Turner, E. Vanden-Eijnden,
Clustering and classification through normalizing flows in feature space,
Multiscale Modeling & Simulation 8 (5) (2010) 1784–1802.
[31] D. P. Kingma, P. Dhariwal, Glow: Generative flow with invertible 1x1
convolutions, Advances in neural information processing systems 31
(2018).
[32] L. Dinh, D. Krueger, Y. Bengio, Nice: Non-linear independent components estimation, arXiv preprint arXiv:1410.8516 (2014).
[33] A. Amini, A. Soleimany, S. Karaman, D. Rus, Spatial uncertainty sampling for end-to-end control, arXiv preprint arXiv:1805.04829 (2018).
[34] Y. Gal, J. Hron, A. Kendall, Concrete dropout, Advances in neural
information processing systems 30 (2017).
21
[35] D. Molchanov, A. Ashukha, D. Vetrov, Variational dropout sparsifies
deep neural networks, in: International Conference on Machine Learning,
PMLR, 2017, pp. 2498–2507.
[36] T. Pearce, M. Zaki, A. Brintrup, N. Anastassacos, A. Neely, Uncertainty
in neural networks: Bayesian ensembling, stat 1050 (2018) 12.
[37] M. Biloˇs, B. Charpentier, S. G¨unnemann, Uncertainty on asynchronous
time event prediction, Advances in Neural Information Processing Systems 32 (2019).
[38] A. Malinin, M. Gales, Predictive uncertainty estimation via prior networks, Advances in neural information processing systems 31 (2018).
[39] M. Gales, A. Malinin, Reverse kl-divergence training of prior networks:
Improved uncertainty and adversarial robustness (2019).
[40] M. Sensoy, L. Kaplan, M. Kandemir, Evidential deep learning to quantify
classification uncertainty, Advances in neural information processing
systems 31 (2018).
[41] A. Amini, W. Schwarting, A. Soleimany, D. Rus, Deep evidential regression, Advances in Neural Information Processing Systems 33 (2020)
14927–14937.
[42] G. Parisi, R. Shankar, Statistical field theory (1988).
[43] M. Jordan, The exponential family: Conjugate priors (2009).
[44] L. Dinh, J. Sohl-Dickstein, S. Bengio, Density estimation using real nvp,
arXiv preprint arXiv:1605.08803 (2016).
[45] G. Papamakarios, T. Pavlakou, I. Murray, Masked autoregressive flow for
density estimation, Advances in neural information processing systems
30 (2017).
[46] C.-W. Huang, D. Krueger, A. Lacoste, A. Courville, Neural autoregressive
flows, in: International Conference on Machine Learning, PMLR, 2018,
pp. 2078–2087.
22
[47] D. P. Kingma, T. Salimans, R. Jozefowicz, X. Chen, I. Sutskever,
M. Welling, Improved variational inference with inverse autoregressive
flow, Advances in neural information processing systems 29 (2016).
[48] J. M. Hern´andez-Lobato, R. Adams, Probabilistic backpropagation for
scalable learning of bayesian neural networks, in: International conference
on machine learning, PMLR, 2015, pp. 1861–1869.
[49] N. Silberman, D. Hoiem, P. Kohli, R. Fergus, Indoor segmentation and
support inference from rgbd images., ECCV (5) 7576 (2012) 746–760.
[50] O. Ronneberger, P. Fischer, T. Brox, U-net: Convolutional networks
for biomedical image segmentation, in: Medical Image Computing and
Computer-Assisted Intervention–MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18,
Springer, 2015, pp. 234–241.
[51] J. Tompson, R. Goroshin, A. Jain, Y. LeCun, C. Bregler, Efficient
object localization using convolutional networks, in: Proceedings of the
IEEE conference on computer vision and pattern recognition, 2015, pp.
648–656.
[52] V. Kuleshov, N. Fenner, S. Ermon, Accurate uncertainties for deep
learning using calibrated regression, in: International conference on
machine learning, PMLR, 2018, pp. 2796–2804.
[53] I. J. Goodfellow, J. Shlens, C. Szegedy, Explaining and harnessing
adversarial examples, arXiv preprint arXiv:1412.6572 (2014).
[54] X. Huang, X. Cheng, Q. Geng, B. Cao, D. Zhou, P. Wang, Y. Lin, R. Yang,
The apolloscape dataset for autonomous driving, in: Proceedings of the
IEEE conference on computer vision and pattern recognition workshops,
2018, pp. 954–960.

Permalink -

https://repository.canterbury.ac.uk/item/9q1w7/normalizing-flow-based-uncertainty-estimation-for-deep-regression-analysis

Download files


Publisher's version
1-s2.0-S0925231224004168-main.pdf
License: CC BY 4.0
File access level: Open

  • 2
    total views
  • 0
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

Default clearing and ex-ante contagion in financial systems with a two-layer network structure
Qi, M., Ding, Y., Chun, Y., Liu, W. and Liu, J. 2025. Default clearing and ex-ante contagion in financial systems with a two-layer network structure. Communications in Nonlinear Science and Numerical Simulation. 142 (1), p. 108515. https://doi.org/10.1016/j.cnsns.2024.108515
Two-stage trading mechanism in enabling the design and optimization of flexible resources interaction in smart grid
Qi, M., Chen, Y., Li, H., Liu, Y., Wu, S. and Li, X. 2024. Two-stage trading mechanism in enabling the design and optimization of flexible resources interaction in smart grid. Computing and Informatics. 43 (6), p. 1483–1515. https://doi.org/10.31577/cai_2024_6_1483
Corporate fraud detection based on improved BP neural network
Qi, M., Liu, W., Liu, M,, Yan, C. and Zhang, L. 2024. Corporate fraud detection based on improved BP neural network. Computing and Informatics. 43 (3), pp. 611–632-611–632. https://doi.org/10.31577/cai_2024_3_611
Focusing on the golden skills of effective communication and collaboration to further enhance graduate employability attributes
O'Leary, S., McGee, M., Qi, M., Millns, S. and Eyden, A. 2024. Focusing on the golden skills of effective communication and collaboration to further enhance graduate employability attributes. Graduate College Working Papers.
Feed-forward ANN with Random Forest Technique for Identifying malicious Internet of Things network intrusion
Obarafor, Victor, Qi, Mandi and Zhang, Leishi 2024. Feed-forward ANN with Random Forest Technique for Identifying malicious Internet of Things network intrusion. in: 2024 2nd International Conference on Cyber Resilience (ICCR) IEEE.
The role of use cases when adopting augmented reality into higher education pedagogy
Ward, G., Turner, S., Pitt, C., Qi, M., Richmond-Fuller, A. and Jackson, T. 2024. The role of use cases when adopting augmented reality into higher education pedagogy.
A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions
Obarafor, Victor, Qi, Man and Zhang, L. 2023. A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions. in: 2023 8th IEEE International Conference on Signal and Image Processing (ICSIP) Wuxi, China IEEE. pp. 1074-1078
Pre-processing of social media remarks for forensics
Gao, Xuhao and Qi, Man 2023. Pre-processing of social media remarks for forensics. IEEE. https://doi.org/10.1109/icnc-fskd59587.2023.10280980
Alignment-based conformance checking of hierarchical process models
Wang, L, Han, X., Qi, M., Wang, K. and Lu, P. 2023. Alignment-based conformance checking of hierarchical process models. Computing and Informatics. 43 (1), pp. 149-180. https://doi.org/10.31577/cai_2024_1_149
Research on UBI auto insurance pricing model based on parameter adaptive SAPSO optimal fuzzy controller
Wang, X., Liu, W., Ou, Z., Yan, C., Qi, M. and Jia, W. 2022. Research on UBI auto insurance pricing model based on parameter adaptive SAPSO optimal fuzzy controller. Computing and Informatics. 41 (4), pp. 1078-1113. https://doi.org/10.31577/cai_2022_4_1078
Novel architecture for human re-identification with a two-stream neural network and attention ,echanism
Rahi, B. and Qi, M. 2022. Novel architecture for human re-identification with a two-stream neural network and attention ,echanism. Computing and Informatics. 41 (4), pp. 905-930. https://doi.org/10.31577/cai_2022_4_905
A novel data analytic model for mining user insurance demands from microblogs
Chun Yan, Lu Liu, Wei Liu and Man Qi 2022. A novel data analytic model for mining user insurance demands from microblogs. Computing and Informatics. 41 (3). https://doi.org/10.31577/cai_2022_3_689
Deep learning based real-time facial mask detection and crowd monitoring
Chan-Yun Yang, Hooman Samani, Nana Ji, Chunxu Li, Ding-Bang Chen and Man Qi 2022. Deep learning based real-time facial mask detection and crowd monitoring. Computing and Informatics. 40 (6), pp. 1263-11294. https://doi.org/10.31577/cai_2021_6_1263
Repairing process models with non-free-choice constructs based on token replay
Bai, E., Qi, M., Luan, W., Li, P. and Du, Y. 2022. Repairing process models with non-free-choice constructs based on token replay. Computing and Informatics. 41 (4), pp. 1054-1077. https://doi.org/10.31577/cai_2022_4_1054
Transformers only look once with nonlinear combination for real-time object detection
Xia, R., Li, G., Huang, Z., Pang, Y. and Qi, M. 2022. Transformers only look once with nonlinear combination for real-time object detection. Neural Computing and Applications. https://doi.org/10.1007/s00521-022-07333-y
Deviation detection in clinical pathways based on business alignment
Tian, Y., Li, X., Qi, Man, Han, D. and Du, Yuyue 2022. Deviation detection in clinical pathways based on business alignment. Scientific Programming. 2022, pp. 1-13. https://doi.org/10.1155/2022/6993449
Security vulnerabilities of popular smart home appliances
Qi, M., Induruwa, A. and Hussain, F. 2021. Security vulnerabilities of popular smart home appliances. in: Proceeding of The Twentieth International Conference on Networks April 18, 2021 to April 22, 2021 - Porto, Portugal
Improved adaptive genetic algorithm for the vehicle insurance fraud identification model based on a BP neural network
Yan, C., Li, M., Liu, W. and Qi, M. 2020. Improved adaptive genetic algorithm for the vehicle insurance fraud identification model based on a BP neural network. Theoretical Computer Science. 817, pp. 12-23. https://doi.org/10.1016/j.tcs.2019.06.025
Hybrid Intrusion Detection System for Smart Home Applications
Hussain, Fida, Induruwa, Abhaya and Qi, Man 2020. Hybrid Intrusion Detection System for Smart Home Applications. in: Mahmood, Z. (ed.) Developing and Monitoring Smart Environments for Intelligent Cities IGI Global. pp. 300-322
Payments per claim model of outstanding claims reserve based on fuzzy linear regression
Yan, C., Liu, Q., Liu, J., Liu, W., Li, M. and Qi, M. 2019. Payments per claim model of outstanding claims reserve based on fuzzy linear regression. International Journal of Fuzzy Systems. 21, pp. 1950-1960. https://doi.org/10.1007/s40815-019-00617-x
Fuzzy interacting multiple model H∞ particle filter algorithm based on current statistical model
Wang, Q., Chen, X., Zhang, L., Li, J., Zhao, C. and Qi, M. 2019. Fuzzy interacting multiple model H∞ particle filter algorithm based on current statistical model. International Journal of Fuzzy Systems. 21, pp. 1894-1905. https://doi.org/10.1007/s40815-019-00678-y
Temporal sparse feature auto-combination deep network for video action recognition
Wang, Q., Gong, D., Qi, M., Shen, Y. and Lei, Y. 2018. Temporal sparse feature auto-combination deep network for video action recognition. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4487
Soundness analytics of composed logical workflow nets
Liu, W., Wang, L., Feng, X., Qi, M., Yan, C. and Li, M. 2017. Soundness analytics of composed logical workflow nets. International Journal of Parallel Programming. https://doi.org/10.1007/s10766-017-0536-8
A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters
Liu, Y., Jing, W., Liu, Y., Lv, L., Qi, M. and Xiang, Y. 2016. A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3763
Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems
Luo, C., Zhang, B., Xiang, Y. and Qi, M. 2017. Gaussian-Gamma collaborative filtering: a hierarchical Bayesian model for recommender systems. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2017.03.007
Facilitating visual surveillance with motion detections
Qi, M. 2017. Facilitating visual surveillance with motion detections. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3770
Data security of android applications
Obiri-Yeboah, J. and Qi, M. 2016. Data security of android applications. in: 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery : ICNC-FSKD 2016 : 13-15 August, Changsha, China IEEE Xplore.
AL-DDCNN : a distributed crossing semantic gap learning for person re-identification
Cheng, K., Zhan, Y. and Qi, M. 2017. AL-DDCNN : a distributed crossing semantic gap learning for person re-identification. Concurrency and Computation: Practice and Experience. 29 (3). https://doi.org/10.1002/cpe.3766
Integration of link and semantic relations for information recommendation
Zhao, Q., He, Y., Wang, P., Jiang, C. and Qi, M. 2016. Integration of link and semantic relations for information recommendation. Computing and Informatics. 35 (1), pp. 30-54.
Data-driven pedestrian re-identification based on hierarchical semantic representation
Cheng, K., Xu, F., Tao, F., Qi, M. and Li, M. 2018. Data-driven pedestrian re-identification based on hierarchical semantic representation. Concurrency and Computation: Practice and Experience. 30 (23). https://doi.org/10.1002/cpe.4403
Integrated privacy preserving framework for smart home
Qi, M. and Hussain, F. 2018. Integrated privacy preserving framework for smart home. in: Proceedings of The 14th International Conference on Fuzzy Systems and Knowledge Discovery, 28-30 July 2018 in Huangshan, China.
Parallelizing abnormal event detection in crowded scenes with GPU
Yavari, M., Li, M., Li, S. and Qi, M. 2015. Parallelizing abnormal event detection in crowded scenes with GPU.
Big data management in digital forensics
Qi, M. 2014. Big data management in digital forensics. in: 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE) IEEE. pp. 238-243
Digital forensics and NoSQL databases
Qi, M. 2014. Digital forensics and NoSQL databases. in: Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014 IEEE. pp. 734-739
Employing neural networks for DDoS detection
Qi, M. 2014. Employing neural networks for DDoS detection.
A MapReduce based distributed LSI for scalable information retrieval
Liu, Y., Li, M., Khan, M. and Qi, M. 2014. A MapReduce based distributed LSI for scalable information retrieval. Computing and Informatics. 33 (2), pp. 259-280.
Clear up grey areas: cybercrime legislation progress in China
Qi, M. 2013. Clear up grey areas: cybercrime legislation progress in China.
A resource aware MapReduce based parallel SVM for large scale image classification
Guo, W., Khalid, N., Liu, Y., Li, M., Qi, M., Guo, W., Khalid, N., Liu, Y., Li, M. and Qi, M. 2015. A resource aware MapReduce based parallel SVM for large scale image classification. Neural Processing Letters. 44 (1), pp. 161-184.
Social media in law enforcement: the role and issues
Qi, M. 2012. Social media in law enforcement: the role and issues.
A distributed storage system for archiving broadcast media content
Cherry, D., Li, M. and Qi, M. 2012. A distributed storage system for archiving broadcast media content. in: Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications IGI Global. pp. 669-679
A distributed SVM ensemble for image classification and annotation
Alham, M., Li, M., Liu, Y., Ponraj, M. and Qi, M. 2012. A distributed SVM ensemble for image classification and annotation. in: 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) IEEE. pp. 1581-1584
Computer forensics in communication networks
Wang, Y. and Qi, M. 2012. Computer forensics in communication networks. in: IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011) Curran.
A MapReduce based parallel SVM for large scale spam filtering
Caruana, G., Li, M. and Qi, M. 2011. A MapReduce based parallel SVM for large scale spam filtering. in: Caruana, G. (ed.) Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2011 IEEE.
Cyber safety in schools
Qi, M. 2011. Cyber safety in schools.
The social effects of spam
Mousoli, R., Qi, M. and Edgar-Nevill, D. 2008. The social effects of spam. in: Edgar-Nevill, D. (ed.) Proceedings of CFET 2008 – 2nd Annual International Conference on Cybercrime Forensics Education and Training Canterbury Canterbury Christ Church University. pp. 71-78
A distributed SVM ensemble for large scale image classification and annotation
Alham, K., Li, M., Liu, Y. and Qi, M. 2013. A distributed SVM ensemble for large scale image classification and annotation. Computers and Mathematics with Applications. 66 (10), pp. 1920-1934. https://doi.org/10.1016/j.camwa.2013.07.015
Fast implementation of cel-based animation
Qi, M. 2008. Fast implementation of cel-based animation.
A case-based reasoning model for digital intrusion forensics
Qi, M., Wang, Y. and Xu, R. 2008. A case-based reasoning model for digital intrusion forensics.
Cybercrime legislation in China
Qi, M., Wang, Y. and Xu, R. 2008. Cybercrime legislation in China.
P2P DDoS: Challenges and Countermeasures
Qi, M. 2009. P2P DDoS: Challenges and Countermeasures.
Distributed indexing for resource discovery in P2P(Peer to Peer) networks
Qi, M., Hentschel, M., Li, M. and Ponraj, M. 2009. Distributed indexing for resource discovery in P2P(Peer to Peer) networks.
P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks)
Qi, M. 2009. P2P(peer to peer) network-targeted DDoS(distributed denial-of-service attacks).
Spam and social effects
Qi, M., Edgar-Nevill, D. and Mousoli, R. 2009. Spam and social effects.
Footprints of cyber criminals
Qi, M. and Edgar-Nevill, D. 2007. Footprints of cyber criminals.
Tracking email offenders
Edgar-Nevill, D. and Qi, M. 2007. Tracking email offenders.
Protecting intellectual property and computer software: legislation in China
Qi, M. and Wang, Y. 2010. Protecting intellectual property and computer software: legislation in China.
Machine learning based spam filtering: advantages and challenges
Qi, M. 2010. Machine learning based spam filtering: advantages and challenges.
OBIRE: ontology based bibliographic information publication and retrieval
Liu, X., Li, M., Liu, Y. and Qi, M. 2010. OBIRE: ontology based bibliographic information publication and retrieval. International Journal of Distributed Systems and Technologies. 1 (4), pp. 58-73.
Cybercrime and relevant legislation in China
Qi, M. and Wang, Y. 2010. Cybercrime and relevant legislation in China. in: Reich, P. (ed.) Cybercrime and Security Oxford Oxford University Press. pp. 1-34
Semantic analysis for spam filtering
Qi, M. and Mousoli, R. 2010. Semantic analysis for spam filtering.
MAPBOT: A web based map information retrieval system
Li, M. and Qi, M. 2003. MAPBOT: A web based map information retrieval system. Information and Software Technology. 45 (10), pp. 691-698. https://doi.org/10.1016/S0950-5849(03)00082-X
Leveraging legacy codes to distributed problem-solving environments: a web services approach
Li, M. and Qi, M. 2004. Leveraging legacy codes to distributed problem-solving environments: a web services approach. Software: Practice and Experience. 34 (13), pp. 1297-1309. https://doi.org/10.1002/spe.614
PGGA: a predictable and grouped genetic algorithm for job scheduling
Li, M., Yu, B. and Qi, M. 2006. PGGA: a predictable and grouped genetic algorithm for job scheduling. Future Generation Computer Systems. 22 (5), pp. 588-599. https://doi.org/10.1016/j.future.2005.09.001
Lessons learned from Beijing for the London 2012
Edgar-Nevill, D. and Qi, M. 2009. Lessons learned from Beijing for the London 2012. in: Edgar-Nevill, D. (ed.) Proceedings of the 3rd International Conference on Cybercrime Forensics Euducation and Training CFET 2009 Canterbury, UK Canterbury Christ Church University.
Tracking online trails
Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. in: Jahankhani, H., Revett, K. and Palmer-Brown, D. (ed.) Global E-Security Springer.
Web services discovery with rough sets
Li, M., Yu, B., Sahota, V. and Qi, M. 2009. Web services discovery with rough sets. International Journal of Web Services Research. 6 (1), pp. 69-86.
Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces
Li, M. and Qi, M. 2009. Facilitating resource discovery in grid environments with peer-to-peer structured tuple spaces. Peer-to-Peer Networking and Applications. 2 (4), pp. 283-297. https://doi.org/10.1007/s12083-009-0036-8
Optimizing peer selection in BitTorrent networks with genetic algorithms
Wu, T., Li, M. and Qi, M. 2010. Optimizing peer selection in BitTorrent networks with genetic algorithms. Future Generation Computer Systems. 26 (8), pp. 1151-1156. https://doi.org/10.1016/j.future.2010.05.016
Automatically wrapping legacy software into services: a grid case study
Li, M., Yu, B., Qi, M. and Antonopoulos, N. 2008. Automatically wrapping legacy software into services: a grid case study. Peer-to-Peer Networking and Applications. 1 (2), pp. 139-147. https://doi.org/10.1007/s12083-008-0011-9
Tracking online trails
Qi, M., Edgar-Nevill, D., Wang, Y. and Xu, R. 2008. Tracking online trails. International Journal of Electronic Security and Digital Forensics. 1 (4), pp. 353-361. https://doi.org/10.1504/IJESDF.2008.021453
Social networking searching and privacy issues
Qi, M. and Edgar-Nevill, D. 2011. Social networking searching and privacy issues. Information Security Technical Report. 16 (2), pp. 74-78. https://doi.org/10.1016/j.istr.2011.09.005
A WSRF based shopping cart system
Li, M., Qi, M., Rozati, M. and Yu, B. 2005. A WSRF based shopping cart system. Lecture Notes in Computer Science [Advances in Grid Computing (EGC) 2005 European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers]. 3470, pp. 105-137. https://doi.org/10.1007/b137919
Fighting cybercrime: legislation in China
Qi, M., Wang, Y. and Xu, R. 2009. Fighting cybercrime: legislation in China. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 219-227. https://doi.org/10.1504/IJESDF.2009.024905
Service composition with Al planning
Qi, M. 2009. Service composition with Al planning. in: Li, M. and Yu, B. (ed.) Cyberinfrastructure Technologies and Applications Nova Science Publishers. pp. 179-197