1 code implementation • NeurIPS 2023 • Qiyang Li, Jason Zhang, Dibya Ghosh, Amy Zhang, Sergey Levine
Learning to solve tasks from a sparse reward signal is a major challenge for standard reinforcement learning (RL) algorithms.
no code implementations • 9 Oct 2023 • Mohammad Peivandi, Jason Zhang, Michael Lu, Dongxiao Zhu, Zhifeng Kou
In our evaluation, we compared this improved model to two benchmarks: the pretrained SAM and the widely used model, nnUNetv2.
no code implementations • 5 Oct 2023 • Yanyi Chu, Dan Yu, Yupeng Li, Kaixuan Huang, Yue Shen, Le Cong, Jason Zhang, Mengdi Wang
The model outperformed the best-known benchmark by up to 42% for predicting the Mean Ribosome Loading, and by up to 60% for predicting the Translation Efficiency and the mRNA Expression Level.
no code implementations • 17 Jul 2023 • Yun Tang, Antonio A. Bruto da Costa, Jason Zhang, Irvine Patrick, Siddartha Khastgir, Paul Jennings
Engineering knowledge-based (or expert) systems require extensive manual effort and domain knowledge.
no code implementations • 7 Nov 2022 • Ze Chen, Kangxu Wang, Zijian Cai, Jiewen Zheng, Jiarong He, Max Gao, Jason Zhang
This paper mainly describes the dma submission to the TempoWiC task, which achieves a macro-F1 score of 77. 05% and attains the first place in this task.
no code implementations • ICLR 2022 • Xiaohan Chen, Jason Zhang, Zhangyang Wang
In this work, we define an extended class of subnetworks in randomly initialized NNs called disguised subnetworks, which are not only "hidden" in the random networks but also "disguised" -- hence can only be "unmasked" with certain transformations on weights.
no code implementations • 21 Oct 2020 • Boris Bačić, Jason Zhang
The primary focus of this paper is to produce a proof of concept for extracting drowsiness information from videos to help elderly living on their own.
no code implementations • 10 Feb 2019 • Jason Zhang
In this paper, we have proposed a novel approach by extending our recently suggested artificial neural network (ANN) based model with feature selection using the principal component analysis (PCA) technique for malware detection.
no code implementations • 21 Aug 2018 • Jason Zhang
Due to the popularity of portable document format (PDF) and increasing number of vulnerabilities in major PDF viewer applications, malware writers continue to use it to deliver malware via web downloads, email attachments and other methods in both targeted and non-targeted attacks.
Cryptography and Security