no code implementations • 17 Mar 2024 • Xiaoji Zheng, Lixiu Wu, Zhijie Yan, Yuanrong Tang, Hao Zhao, Chen Zhong, Bokui Chen, Jiangtao Gong
Traditional methods of motion forecasting primarily encode vector information of maps and historical trajectory data of traffic participants, lacking a comprehensive understanding of overall traffic semantics, which in turn affects the performance of prediction tasks.
no code implementations • 30 Nov 2023 • Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney
Our objective is to design a sequential selection policy that dynamically determines which processes to observe at each time with the goal to minimize the delay in making the decision and the total sensing cost.
no code implementations • 15 Dec 2021 • Rui Ma, Sara Eftekharnejad, Chen Zhong, Mustafa Cenk Gursoy
In this paper, a new data-driven TSA approach is developed for TSA with fewer data compared to the conventional methods.
no code implementations • 8 Dec 2021 • Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney
In this setting, we develop an anomaly detection algorithm that chooses the processes to be observed at a given time instant, decides when to stop taking observations, and declares the decision on anomalous processes.
no code implementations • 12 May 2021 • Geethu Joseph, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney
In this paper, we address the anomaly detection problem where the objective is to find the anomalous processes among a given set of processes.
no code implementations • 28 Sep 2020 • Chen Zhong, M. Cenk Gursoy, Senem Velipasalar
In order to improve the detection accuracy and reduce the delay in detection, we introduce a buffer zone in the operation of the proposed GAN-based detector.
no code implementations • 12 Jul 2020 • Feng Wang, Chen Zhong, M. Cenk Gursoy, Senem Velipasalar
As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention.
no code implementations • 28 Aug 2019 • Chen Zhong, M. Cenk Gursoy, Senem Velipasalar
Anomaly detection is widely applied in a variety of domains, involving for instance, smart home systems, network traffic monitoring, IoT applications and sensor networks.
no code implementations • 20 Aug 2019 • Chen Zhong, Ziyang Lu, M. Cenk Gursoy, Senem Velipasalar
We consider both a single-user case and a scenario in which multiple users attempt to access channels simultaneously.
no code implementations • 13 May 2019 • Chen Zhong, M. Cenk Gursoy, Senem Velipasalar
The growing demand on high-quality and low-latency multimedia services has led to much interest in edge caching techniques.
Multi-agent Reinforcement Learning reinforcement-learning +1
no code implementations • 8 Oct 2018 • Chen Zhong, Ziyang Lu, M. Cenk Gursoy, Senem Velipasalar
We consider the dynamic multichannel access problem, which can be formulated as a partially observable Markov decision process (POMDP).