Skip to main content

Showing 1–48 of 48 results for author: Ying, Z

  1. arXiv:2407.03330  [pdf, other

    cs.CV cs.GR

    Efficient Visibility Approximation for Game AI using Neural Omnidirectional Distance Fields

    Authors: Zhi Ying, Nicholas Edwards, Mikhail Kutuzov

    Abstract: Visibility information is critical in game AI applications, but the computational cost of raycasting-based methods poses a challenge for real-time systems. To address this challenge, we propose a novel method that represents a partitioned game scene as neural Omnidirectional Distance Fields (ODFs), allowing scalable and efficient visibility approximation between positions without raycasting. For e… ▽ More

    Submitted 9 May, 2024; originally announced July 2024.

    Comments: I3D 2024

  2. arXiv:2407.01925  [pdf, other

    cs.CV

    Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability

    Authors: Zijian Ying, Qianmu Li, Tao Wang, Zhichao Lian, Shunmei Meng, Xuyun Zhang

    Abstract: Various methods try to enhance adversarial transferability by improving the generalization from different perspectives. In this paper, we rethink the optimization process and propose a novel sequence optimization concept, which is named Looking From the Future (LFF). LFF makes use of the original optimization process to refine the very first local optimization choice. Adapting the LFF concept to t… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  3. DLP: towards active defense against backdoor attacks with decoupled learning process

    Authors: Zonghao Ying, Bin Wu

    Abstract: Deep learning models are well known to be susceptible to backdoor attack, where the attacker only needs to provide a tampered dataset on which the triggers are injected. Models trained on the dataset will passively implant the backdoor, and triggers on the input can mislead the models during testing. Our study shows that the model shows different learning behaviors in clean and poisoned subsets du… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  4. NBA: defensive distillation for backdoor removal via neural behavior alignment

    Authors: Zonghao Ying, Bin Wu

    Abstract: Recently, deep neural networks have been shown to be vulnerable to backdoor attacks. A backdoor is inserted into neural networks via this attack paradigm, thus compromising the integrity of the network. As soon as an attacker presents a trigger during the testing phase, the backdoor in the model is activated, allowing the network to make specific wrong predictions. It is extremely important to def… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  5. arXiv:2406.06302  [pdf, other

    cs.CR cs.CV

    Unveiling the Safety of GPT-4o: An Empirical Study using Jailbreak Attacks

    Authors: Zonghao Ying, Aishan Liu, Xianglong Liu, Dacheng Tao

    Abstract: The recent release of GPT-4o has garnered widespread attention due to its powerful general capabilities. While its impressive performance is widely acknowledged, its safety aspects have not been sufficiently explored. Given the potential societal impact of risky content generated by advanced generative AI such as GPT-4o, it is crucial to rigorously evaluate its safety. In response to this question… ▽ More

    Submitted 2 July, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

  6. arXiv:2406.04031  [pdf, other

    cs.CV cs.CR

    Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt

    Authors: Zonghao Ying, Aishan Liu, Tianyuan Zhang, Zhengmin Yu, Siyuan Liang, Xianglong Liu, Dacheng Tao

    Abstract: In the realm of large vision language models (LVLMs), jailbreak attacks serve as a red-teaming approach to bypass guardrails and uncover safety implications. Existing jailbreaks predominantly focus on the visual modality, perturbing solely visual inputs in the prompt for attacks. However, they fall short when confronted with aligned models that fuse visual and textual features simultaneously for g… ▽ More

    Submitted 1 July, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  7. arXiv:2405.09841  [pdf, other

    stat.ML cs.LG

    Simultaneous Identification of Sparse Structures and Communities in Heterogeneous Graphical Models

    Authors: Dapeng Shi, Tiandong Wang, Zhiliang Ying

    Abstract: Exploring and detecting community structures hold significant importance in genetics, social sciences, neuroscience, and finance. Especially in graphical models, community detection can encourage the exploration of sets of variables with group-like properties. In this paper, within the framework of Gaussian graphical models, we introduce a novel decomposition of the underlying graphical structure… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: 61 pages, 11 figures, 4 tables

  8. arXiv:2403.14806  [pdf, other

    cs.ET physics.app-ph physics.optics

    Photonic-Electronic Integrated Circuits for High-Performance Computing and AI Accelerators

    Authors: Shupeng Ning, Hanqing Zhu, Chenghao Feng, Jiaqi Gu, Zhixing Jiang, Zhoufeng Ying, Jason Midkiff, Sourabh Jain, May H. Hlaing, David Z. Pan, Ray T. Chen

    Abstract: In recent decades, the demand for computational power has surged, particularly with the rapid expansion of artificial intelligence (AI). As we navigate the post-Moore's law era, the limitations of traditional electrical digital computing, including process bottlenecks and power consumption issues, are propelling the search for alternative computing paradigms. Among various emerging technologies, i… ▽ More

    Submitted 11 July, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

  9. arXiv:2403.02691  [pdf, other

    cs.CL cs.CR

    InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

    Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang

    Abstract: Recent work has embodied LLMs as agents, allowing them to access tools, perform actions, and interact with external content (e.g., emails or websites). However, external content introduces the risk of indirect prompt injection (IPI) attacks, where malicious instructions are embedded within the content processed by LLMs, aiming to manipulate these agents into executing detrimental actions against u… ▽ More

    Submitted 25 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: 28 pages, 5 figures, 9 tables

  10. arXiv:2311.12051  [pdf, other

    cs.CV

    Boost Adversarial Transferability by Uniform Scale and Mix Mask Method

    Authors: Tao Wang, Zijian Ying, Qianmu Li, zhichao Lian

    Abstract: Adversarial examples generated from surrogate models often possess the ability to deceive other black-box models, a property known as transferability. Recent research has focused on enhancing adversarial transferability, with input transformation being one of the most effective approaches. However, existing input transformation methods suffer from two issues. Firstly, certain methods, such as the… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  11. arXiv:2311.11195  [pdf, other

    cs.DS

    Online Makespan Minimization: Beat LPT by Dynamic Locking

    Authors: Zhaozi Wang, Zhiwei Ying, Yuhao Zhang

    Abstract: Online makespan minimization is a classic model in the field of scheduling. In this paper, we consider the over-time version, where each job is associated with a release time and a processing time. We only know a job after its release time and should schedule it on one machine afterward. The Longest Processing Time First (LPT) algorithm, as proven by Chen and Vestjens in 1997, achieves a competiti… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  12. arXiv:2306.05963  [pdf, other

    cs.CV cs.AI cs.LG

    Adaptive Contextual Perception: How to Generalize to New Backgrounds and Ambiguous Objects

    Authors: Zhuofan Ying, Peter Hase, Mohit Bansal

    Abstract: Biological vision systems make adaptive use of context to recognize objects in new settings with novel contexts as well as occluded or blurry objects in familiar settings. In this paper, we investigate how vision models adaptively use context for out-of-distribution (OOD) generalization and leverage our analysis results to improve model OOD generalization. First, we formulate two distinct OOD sett… ▽ More

    Submitted 27 October, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: Published at NeurIPS 2023. 23 pages, 13 figures. Our code is available at https://github.com/zfying/AdaptiveContext

  13. arXiv:2305.12474  [pdf, other

    cs.CL cs.AI

    Evaluating the Performance of Large Language Models on GAOKAO Benchmark

    Authors: Xiaotian Zhang, Chunyang Li, Yi Zong, Zhengyu Ying, Liang He, Xipeng Qiu

    Abstract: Large Language Models(LLMs) have demonstrated remarkable performance across various natural language processing tasks; however, how to comprehensively and accurately assess their performance becomes an urgent issue to be addressed. This paper introduces GAOKAO-Bench, an intuitive benchmark that employs questions from the Chinese GAOKAO examination as test samples, including both subjective and obj… ▽ More

    Submitted 24 February, 2024; v1 submitted 21 May, 2023; originally announced May 2023.

  14. arXiv:2305.10666  [pdf, other

    cs.CL cs.AI cs.SD eess.AS

    A unified front-end framework for English text-to-speech synthesis

    Authors: Zelin Ying, Chen Li, Yu Dong, Qiuqiang Kong, Qiao Tian, Yuanyuan Huo, Yuxuan Wang

    Abstract: The front-end is a critical component of English text-to-speech (TTS) systems, responsible for extracting linguistic features that are essential for a text-to-speech model to synthesize speech, such as prosodies and phonemes. The English TTS front-end typically consists of a text normalization (TN) module, a prosody word prosody phrase (PWPP) module, and a grapheme-to-phoneme (G2P) module. However… ▽ More

    Submitted 25 March, 2024; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: Accepted in ICASSP 2024

  15. arXiv:2305.03351  [pdf, other

    cs.CV

    Leaf Cultivar Identification via Prototype-enhanced Learning

    Authors: Yiyi Zhang, Zhiwen Ying, Ying Zheng, Cuiling Wu, Nannan Li, Jun Wang, Xianzhong Feng, Xiaogang Xu

    Abstract: Plant leaf identification is crucial for biodiversity protection and conservation and has gradually attracted the attention of academia in recent years. Due to the high similarity among different varieties, leaf cultivar recognition is also considered to be an ultra-fine-grained visual classification (UFGVC) task, which is facing a huge challenge. In practice, an instance may be related to multipl… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  16. arXiv:2303.17857  [pdf, other

    cs.IT eess.SP

    Vision-Assisted mmWave Beam Management for Next-Generation Wireless Systems: Concepts, Solutions and Open Challenges

    Authors: Kan Zheng, Haojun Yang, Ziqiang Ying, Pengshuo Wang, Lajos Hanzo

    Abstract: Beamforming techniques have been widely used in the millimeter wave (mmWave) bands to mitigate the path loss of mmWave radio links as the narrow straight beams by directionally concentrating the signal energy. However, traditional mmWave beam management algorithms usually require excessive channel state information overhead, leading to extremely high computational and communication costs. This hin… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

  17. arXiv:2302.01036  [pdf, other

    cs.RO

    CREPES: Cooperative RElative Pose Estimation System

    Authors: Zhiren Xun, Jian Huang, Zhehan Li, Zhenjun Ying, Yingjian Wang, Chao Xu, Fei Gao, Yanjun Cao

    Abstract: Mutual localization plays a crucial role in multi-robot cooperation. CREPES, a novel system that focuses on six degrees of freedom (DOF) relative pose estimation for multi-robot systems, is proposed in this paper. CREPES has a compact hardware design using active infrared (IR) LEDs, an IR fish-eye camera, an ultra-wideband (UWB) module and an inertial measurement unit (IMU). By leveraging IR light… ▽ More

    Submitted 28 March, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

  18. arXiv:2210.03543  [pdf, other

    cs.CV

    A2: Efficient Automated Attacker for Boosting Adversarial Training

    Authors: Zhuoer Xu, Guanghui Zhu, Changhua Meng, Shiwen Cui, Zhenzhe Ying, Weiqiang Wang, Ming GU, Yihua Huang

    Abstract: Based on the significant improvement of model robustness by AT (Adversarial Training), various variants have been proposed to further boost the performance. Well-recognized methods have focused on different components of AT (e.g., designing loss functions and leveraging additional unlabeled data). It is generally accepted that stronger perturbations yield more robust models. However, how to genera… ▽ More

    Submitted 16 October, 2022; v1 submitted 7 October, 2022; originally announced October 2022.

    Comments: Accepted by NeurIPS2022

  19. arXiv:2207.09956  [pdf, other

    cs.CV eess.IV

    Telepresence Video Quality Assessment

    Authors: Zhenqiang Ying, Deepti Ghadiyaram, Alan Bovik

    Abstract: Video conferencing, which includes both video and audio content, has contributed to dramatic increases in Internet traffic, as the COVID-19 pandemic forced millions of people to work and learn from home. Global Internet traffic of video conferencing has dramatically increased Because of this, efficient and accurate video quality tools are needed to monitor and perceptually optimize telepresence tr… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: ECCV 2022

  20. arXiv:2206.11212  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    VisFIS: Visual Feature Importance Supervision with Right-for-the-Right-Reason Objectives

    Authors: Zhuofan Ying, Peter Hase, Mohit Bansal

    Abstract: Many past works aim to improve visual reasoning in models by supervising feature importance (estimated by model explanation techniques) with human annotations such as highlights of important image regions. However, recent work has shown that performance gains from feature importance (FI) supervision for Visual Question Answering (VQA) tasks persist even with random supervision, suggesting that the… ▽ More

    Submitted 25 October, 2022; v1 submitted 22 June, 2022; originally announced June 2022.

    Comments: NeurIPS 2022 (first two authors contributed equally)

  21. arXiv:2205.00932  [pdf, other

    cs.CV cs.LG

    Understanding CNNs from excitations

    Authors: Zijian Ying, Qianmu Li, Zhichao Lian, Jun Hou, Tong Lin, Tao Wang

    Abstract: Saliency maps have proven to be a highly efficacious approach for explicating the decisions of Convolutional Neural Networks. However, extant methodologies predominantly rely on gradients, which constrain their ability to explicate complex models. Furthermore, such approaches are not fully adept at leveraging negative gradient information to improve interpretive veracity. In this study, we present… ▽ More

    Submitted 15 January, 2024; v1 submitted 2 May, 2022; originally announced May 2022.

  22. arXiv:2203.12824  [pdf, other

    cs.CV eess.IV

    Subjective and Objective Analysis of Streamed Gaming Videos

    Authors: Xiangxu Yu, Zhenqiang Ying, Neil Birkbeck, Yilin Wang, Balu Adsumilli, Alan C. Bovik

    Abstract: The rising popularity of online User-Generated-Content (UGC) in the form of streamed and shared videos, has hastened the development of perceptual Video Quality Assessment (VQA) models, which can be used to help optimize their delivery. Gaming videos, which are a relatively new type of UGC videos, are created when skilled gamers post videos of their gameplay. These kinds of screenshots of UGC game… ▽ More

    Submitted 23 March, 2022; originally announced March 2022.

  23. arXiv:2202.13625  [pdf, other

    cs.LG cs.CR cs.CV

    Enhance transferability of adversarial examples with model architecture

    Authors: Mingyuan Fan, Wenzhong Guo, Shengxing Yu, Zuobin Ying, Ximeng Liu

    Abstract: Transferability of adversarial examples is of critical importance to launch black-box adversarial attacks, where attackers are only allowed to access the output of the target model. However, under such a challenging but practical setting, the crafted adversarial examples are always prone to overfitting to the proxy model employed, presenting poor transferability. In this paper, we suggest alleviat… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  24. arXiv:2201.06239  [pdf, other

    cs.LG

    MT-GBM: A Multi-Task Gradient Boosting Machine with Shared Decision Trees

    Authors: ZhenZhe Ying, Zhuoer Xu, Zhifeng Li, Weiqiang Wang, Changhua Meng

    Abstract: Despite the success of deep learning in computer vision and natural language processing, Gradient Boosted Decision Tree (GBDT) is yet one of the most powerful tools for applications with tabular data such as e-commerce and FinTech. However, applying GBDT to multi-task learning is still a challenge. Unlike deep models that can jointly learn a shared latent representation across multiple tasks, GBDT… ▽ More

    Submitted 24 January, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Report number: 14

  25. arXiv:2111.06705  [pdf

    cs.ET cs.LG physics.app-ph physics.optics

    A compact butterfly-style silicon photonic-electronic neural chip for hardware-efficient deep learning

    Authors: Chenghao Feng, Jiaqi Gu, Hanqing Zhu, Zhoufeng Ying, Zheng Zhao, David Z. Pan, Ray T. Chen

    Abstract: The optical neural network (ONN) is a promising hardware platform for next-generation neurocomputing due to its high parallelism, low latency, and low energy consumption. Previous ONN architectures are mainly designed for general matrix multiplication (GEMM), leading to unnecessarily large area cost and high control complexity. Here, we move beyond classical GEMM-based ONNs and propose an optical… ▽ More

    Submitted 17 July, 2022; v1 submitted 11 November, 2021; originally announced November 2021.

    Comments: 17 pages,5 figures

  26. arXiv:2109.03273  [pdf, other

    eess.SP cs.IT

    LuMaMi28: Real-Time Millimeter-Wave Massive MIMO Systems with Antenna Selection

    Authors: MinKeun Chung, Liang Liu, Andreas Johansson, Sara Gunnarsson, Martin Nilsson, Zhinong Ying, Olof Zander, Kamal Samanta, Chris Clifton, Toshiyuki Koimori, Shinya Morita, Satoshi Taniguchi, Fredrik Tufvesson, Ove Edfors

    Abstract: This paper presents LuMaMi28, a real-time 28 GHz massive multiple-input multiple-output (MIMO) testbed. In this testbed, the base station has 16 transceiver chains with a fully-digital beamforming architecture (with different pre-coding algorithms) and simultaneously supports multiple user equipments (UEs) with spatial multiplexing. The UEs are equipped with a beam-switchable antenna array for rea… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 14 pages, 17 figures

  27. arXiv:2012.11148  [pdf, other

    cs.ET cs.LG physics.optics

    Efficient On-Chip Learning for Optical Neural Networks Through Power-Aware Sparse Zeroth-Order Optimization

    Authors: Jiaqi Gu, Chenghao Feng, Zheng Zhao, Zhoufeng Ying, Ray T. Chen, David Z. Pan

    Abstract: Optical neural networks (ONNs) have demonstrated record-breaking potential in high-performance neuromorphic computing due to their ultra-high execution speed and low energy consumption. However, current learning protocols fail to provide scalable and efficient solutions to photonic circuit optimization in practical applications. In this work, we propose a novel on-chip learning framework to releas… ▽ More

    Submitted 5 September, 2021; v1 submitted 21 December, 2020; originally announced December 2020.

    Comments: 7 pages content, 2 pages of reference, 6 figures, 4 tables, accepted to Association for the Advancement of Artificial Intelligence (AAAI) 2021

  28. arXiv:2012.01584  [pdf, other

    eess.SP cs.IT

    Millimeter-Wave Massive MIMO Testbed with Hybrid Beamforming

    Authors: MinKeun Chung, Liang Liu, Andreas Johansson, Martin Nilsson, Olof Zander, Zhinong Ying, Fredrik Tufvesson, Ove Edfors

    Abstract: Massive multiple-input multiple-out (MIMO) technology is vital in millimeter-wave (mmWave) bands to obtain large array gains. However, there are practical challenges, such as high hardware cost and power consumption in such systems. A promising solution to these problems is to adopt a hybrid beamforming architecture. This architecture has a much lower number of transceiver (TRx) chains than the to… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Comments: 54th Asilomar Conference on Signals, Systems, and Computers, Nov. 2020

  29. Patch-VQ: 'Patching Up' the Video Quality Problem

    Authors: Zhenqiang Ying, Maniratnam Mandal, Deepti Ghadiyaram, Alan Bovik

    Abstract: No-reference (NR) perceptual video quality assessment (VQA) is a complex, unsolved, and important problem to social and streaming media applications. Efficient and accurate video quality predictors are needed to monitor and guide the processing of billions of shared, often imperfect, user-generated content (UGC). Unfortunately, current NR models are limited in their prediction capabilities on real… ▽ More

    Submitted 25 February, 2022; v1 submitted 26 November, 2020; originally announced November 2020.

  30. arXiv:2009.00717  [pdf, other

    cs.HC cs.AI stat.ME

    Subtask Analysis of Process Data Through a Predictive Model

    Authors: Zhi Wang, Xueying Tang, Jingchen Liu, Zhiliang Ying

    Abstract: Response process data collected from human-computer interactive items contain rich information about respondents' behavioral patterns and cognitive processes. Their irregular formats as well as their large sizes make standard statistical tools difficult to apply. This paper develops a computationally efficient method for exploratory analysis of such process data. The new approach segments a length… ▽ More

    Submitted 29 August, 2020; originally announced September 2020.

    Comments: 34 pages, 10 figures

  31. arXiv:2006.05061  [pdf, other

    stat.CO cs.LG

    ProcData: An R Package for Process Data Analysis

    Authors: Xueying Tang, Susu Zhang, Zhi Wang, Jingchen Liu, Zhiliang Ying

    Abstract: Process data refer to data recorded in the log files of computer-based items. These data, represented as timestamped action sequences, keep track of respondents' response processes of solving the items. Process data analysis aims at enhancing educational assessment accuracy and serving other assessment purposes by utilizing the rich information contained in response processes. The R package ProcDa… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  32. arXiv:2003.13852  [pdf, other

    cs.CV

    Can Deep Learning Recognize Subtle Human Activities?

    Authors: Vincent Jacquot, Zhuofan Ying, Gabriel Kreiman

    Abstract: Deep Learning has driven recent and exciting progress in computer vision, instilling the belief that these algorithms could solve any visual task. Yet, datasets commonly used to train and test computer vision algorithms have pervasive confounding factors. Such biases make it difficult to truly estimate the performance of those algorithms and how well computer vision models can extrapolate outside… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

    Comments: poster at CVPR 2020, includes supplementary figures

  33. arXiv:2001.04568  [pdf, other

    cs.CV cs.HC

    180-degree Outpainting from a Single Image

    Authors: Zhenqiang Ying, Alan Bovik

    Abstract: Presenting context images to a viewer's peripheral vision is one of the most effective techniques to enhance immersive visual experiences. However, most images only present a narrow view, since the field-of-view (FoV) of standard cameras is small. To overcome this limitation, we propose a deep learning approach that learns to predict a 180° panoramic image from a narrow-view image. Specifically, w… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  34. arXiv:1912.10088  [pdf, other

    cs.CV cs.MM eess.IV

    From Patches to Pictures (PaQ-2-PiQ): Mapping the Perceptual Space of Picture Quality

    Authors: Zhenqiang Ying, Haoran Niu, Praful Gupta, Dhruv Mahajan, Deepti Ghadiyaram, Alan Bovik

    Abstract: Blind or no-reference (NR) perceptual picture quality prediction is a difficult, unsolved problem of great consequence to the social and streaming media industries that impacts billions of viewers daily. Unfortunately, popular NR prediction models perform poorly on real-world distorted pictures. To advance progress on this problem, we introduce the largest (by far) subjective picture quality datab… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.

  35. arXiv:1908.06075  [pdf, other

    stat.ML cs.LG stat.AP

    An Exploratory Analysis of the Latent Structure of Process Data via Action Sequence Autoencoder

    Authors: Xueying Tang, Zhi Wang, Jingchen Liu, Zhiliang Ying

    Abstract: Computer simulations have become a popular tool of assessing complex skills such as problem-solving skills. Log files of computer-based items record the entire human-computer interactive processes for each respondent. The response processes are very diverse, noisy, and of nonstandard formats. Few generic methods have been developed for exploiting the information contained in process data. In this… ▽ More

    Submitted 16 August, 2019; originally announced August 2019.

    Comments: 28 pages, 13 figures

  36. arXiv:1902.01947  [pdf

    cs.NI

    Design and Implementation of Location and Activity Monitoring System Based on LoRa

    Authors: Shengwei Lin, Ziqiang Ying, Kan Zheng

    Abstract: The location and human activity are usually used as one of the important parameters to monitor the health status in healthcare devices. However, nearly all existing location and monitoring systems have the limitation of short-range communication and high power consumption. In this paper, we propose a new mechanism to collect and transmit monitoring information based on LoRa technology. The monitor… ▽ More

    Submitted 27 January, 2019; originally announced February 2019.

  37. arXiv:1811.02320  [pdf, other

    cs.CL cs.LG

    Hierarchical Neural Network Architecture In Keyword Spotting

    Authors: Yixiao Qu, Sihao Xue, Zhenyi Ying, Hang Zhou, Jue Sun

    Abstract: Keyword Spotting (KWS) provides the start signal of ASR problem, and thus it is essential to ensure a high recall rate. However, its real-time property requires low computation complexity. This contradiction inspires people to find a suitable model which is small enough to perform well in multi environments. To deal with this contradiction, we implement the Hierarchical Neural Network(HNN), which… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: To be submitted in part to IEEE ICASSP 2019

  38. arXiv:1810.04991  [pdf, other

    cs.CV

    SingleGAN: Image-to-Image Translation by a Single-Generator Network using Multiple Generative Adversarial Learning

    Authors: Xiaoming Yu, Xing Cai, Zhenqiang Ying, Thomas Li, Ge Li

    Abstract: Image translation is a burgeoning field in computer vision where the goal is to learn the mapping between an input image and an output image. However, most recent methods require multiple generators for modeling different domain mappings, which are inefficient and ineffective on some multi-domain image translation tasks. In this paper, we propose a novel method, SingleGAN, to perform multi-domain… ▽ More

    Submitted 17 April, 2020; v1 submitted 11 October, 2018; originally announced October 2018.

    Comments: Accepted in ACCV 2018. Code is available at https://github.com/Xiaoming-Yu/SingleGAN

  39. arXiv:1807.00560  [pdf, other

    cs.LG cs.CL stat.ML

    Weight-importance sparse training in keyword spotting

    Authors: Sihao Xue, Zhenyi Ying, Fan Mo, Min Wang, Jue Sun

    Abstract: Large size models are implemented in recently ASR system to deal with complex speech recognition problems. The num- ber of parameters in these models makes them hard to deploy, especially on some resource-short devices such as car tablet. Besides this, at most of time, ASR system is used to deal with real-time problem such as keyword spotting (KWS). It is contradictory to the fact that large model… ▽ More

    Submitted 8 July, 2018; v1 submitted 2 July, 2018; originally announced July 2018.

  40. arXiv:1806.10050  [pdf, other

    cs.CV

    Multi-Mapping Image-to-Image Translation with Central Biasing Normalization

    Authors: Xiaoming Yu, Zhenqiang Ying, Thomas Li, Shan Liu, Ge Li

    Abstract: Recent advances in image-to-image translation have seen a rise in approaches generating diverse images through a single network. To indicate the target domain for a one-to-many mapping, the latent code is injected into the generator network. However, we found that the injection method leads to mode collapse because of normalization strategies. Existing normalization strategies might either cause t… ▽ More

    Submitted 17 April, 2020; v1 submitted 26 June, 2018; originally announced June 2018.

  41. arXiv:1805.08493  [pdf, other

    cs.CV

    Blind Predicting Similar Quality Map for Image Quality Assessment

    Authors: Da Pan, Ping Shi, Ming Hou, Zefeng Ying, Sizhe Fu, Yuan Zhang

    Abstract: A key problem in blind image quality assessment (BIQA) is how to effectively model the properties of human visual system in a data-driven manner. In this paper, we propose a simple and efficient BIQA model based on a novel framework which consists of a fully convolutional neural network (FCNN) and a pooling network to solve this problem. In principle, FCNN is capable of predicting a pixel-by-pixel… ▽ More

    Submitted 10 March, 2019; v1 submitted 22 May, 2018; originally announced May 2018.

  42. arXiv:1712.05090  [pdf

    cs.CR

    Secure Encrypted Virtualization is Unsecure

    Authors: Zhao-Hui Du, Zhiwei Ying, Zhenke Ma, Yufei Mai, Phoebe Wang, Jesse Liu, Jesse Fang

    Abstract: Virtualization has become more important since cloud computing is getting more and more popular than before. There is an increasing demand for security among the cloud customers. AMD plans to provide Secure Encrypted Virtualization (SEV) technology in its latest processor EPYC to protect virtual machines by encrypting its memory but without integrity protection. In this paper, we analyzed the weak… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 10 pages, 16 figures

  43. arXiv:1711.00591  [pdf, other

    cs.CV

    A Bio-Inspired Multi-Exposure Fusion Framework for Low-light Image Enhancement

    Authors: Zhenqiang Ying, Ge Li, Wen Gao

    Abstract: Low-light images are not conducive to human observation and computer vision algorithms due to their low visibility. Although many image enhancement techniques have been proposed to solve this problem, existing methods inevitably introduce contrast under- and over-enhancement. Inspired by human visual system, we design a multi-exposure fusion framework for low-light image enhancement. Based on the… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

    Comments: Project website: https://baidut.github.io/BIMEF/

  44. ORGB: Offset Correction in RGB Color Space for Illumination-Robust Image Processing

    Authors: Zhenqiang Ying, Ge Li, Sixin Wen, Guozhen Tan

    Abstract: Single materials have colors which form straight lines in RGB space. However, in severe shadow cases, those lines do not intersect the origin, which is inconsistent with the description of most literature. This paper is concerned with the detection and correction of the offset between the intersection and origin. First, we analyze the reason for forming that offset via an optical imaging model. Se… ▽ More

    Submitted 2 August, 2017; originally announced August 2017.

    Comments: Project website: https://baidut.github.io/ORGB/

  45. arXiv:1608.06495  [pdf, other

    cs.CV

    Searching Action Proposals via Spatial Actionness Estimation and Temporal Path Inference and Tracking

    Authors: Nannan Li, Dan Xu, Zhenqiang Ying, Zhihao Li, Ge Li

    Abstract: In this paper, we address the problem of searching action proposals in unconstrained video clips. Our approach starts from actionness estimation on frame-level bounding boxes, and then aggregates the bounding boxes belonging to the same actor across frames via linking, associating, tracking to generate spatial-temporal continuous action paths. To achieve the target, a novel actionness estimation m… ▽ More

    Submitted 23 August, 2016; originally announced August 2016.

  46. arXiv:1212.6659  [pdf, other

    stat.ML cs.AI cs.LG

    Focus of Attention for Linear Predictors

    Authors: Raphael Pelossof, Zhiliang Ying

    Abstract: We present a method to stop the evaluation of a prediction process when the result of the full evaluation is obvious. This trait is highly desirable in prediction tasks where a predictor evaluates all its features for every example in large datasets. We observe that some examples are easier to classify than others, a phenomenon which is characterized by the event when most of the features agree on… ▽ More

    Submitted 29 December, 2012; originally announced December 2012.

    Comments: 9 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1105.0382

  47. arXiv:1105.0382  [pdf, other

    cs.LG stat.ML

    Rapid Learning with Stochastic Focus of Attention

    Authors: Raphael Pelossof, Zhiliang Ying

    Abstract: We present a method to stop the evaluation of a decision making process when the result of the full evaluation is obvious. This trait is highly desirable for online margin-based machine learning algorithms where a classifier traditionally evaluates all the features for every example. We observe that some examples are easier to classify than others, a phenomenon which is characterized by the event… ▽ More

    Submitted 2 May, 2011; originally announced May 2011.

  48. arXiv:1009.5972  [pdf, other

    cs.LG

    The Attentive Perceptron

    Authors: Raphael Pelossof, Zhiliang Ying

    Abstract: We propose a focus of attention mechanism to speed up the Perceptron algorithm. Focus of attention speeds up the Perceptron algorithm by lowering the number of features evaluated throughout training and prediction. Whereas the traditional Perceptron evaluates all the features of each example, the Attentive Perceptron evaluates less features for easy to classify examples, thereby achieving signific… ▽ More

    Submitted 29 September, 2010; originally announced September 2010.

    Comments: Submitted to New York Academy of Sciences Machine Learning symposium 2010