no code implementations • 9 Mar 2024 • Jingbo Zhao, Zhaoming Lu, J. Andrew Zhang, Weicai Li, Yifeng Xiong, Zijun Han, Xiangming Wen, Tao Gu
This document contains the appendices for our paper titled ``Performance Bounds for Passive Sensing in Asynchronous ISAC Systems."
no code implementations • 26 Dec 2023 • Zhen Du, Fan Liu, Yifeng Xiong, Tony Xiao Han, Yonina C. Eldar, Shi Jin
To cope with this issue, we characterize the random AF of OFDM communication signals, and demonstrate that the AF variance is determined by the fourth-moment of the constellation amplitudes.
no code implementations • 13 Nov 2023 • Fuwang Dong, Fan Liu, Shihang Lu, Yifeng Xiong, Qixun Zhang, Zhiyong Feng
Exploring the mutual benefit and reciprocity of sensing and communication (S\&C) functions is fundamental to realizing deeper integration for integrated sensing and communication (ISAC) systems.
no code implementations • 27 Oct 2023 • Zhen Du, Fan Liu, Yifeng Xiong, Tony Xiao Han, Weijie Yuan, Yuanhao Cui, Changhua Yao, Yonina C. Eldar
Integrated Sensing and Communications (ISAC) has garnered significant attention as a promising technology for the upcoming sixth-generation wireless communication systems (6G).
no code implementations • 20 Sep 2023 • Yifeng Xiong, Haoyu Ma, Shanlin Sun, Kun Han, Hao Tang, Xiaohui Xie
Starting from the camera pose matrices, LFD transforms them into light field encoding, with the same shape as the reference image, to describe the direction of each ray.
no code implementations • 5 Sep 2023 • Shihang Lu, Fan Liu, Fuwang Dong, Yifeng Xiong, Jie Xu, Ya-Feng Liu
Radar systems typically employ well-designed deterministic signals for target sensing.
no code implementations • 19 May 2023 • Fuwang Dong, Fan Liu, Shihang Lu, Weijie Yuan, Yuanhao Cui, Yifeng Xiong, Feifei Gao
In particular, a pair of transmission schemes, namely, separated S&C and dual-functional waveform designs, are proposed to optimize the sensing QoS under the constraints of the rate-distortion and power budget.
no code implementations • 8 Apr 2023 • Kun Han, Yifeng Xiong, Chenyu You, Pooya Khosravi, Shanlin Sun, Xiangyi Yan, James Duncan, Xiaohui Xie
Then, we use an image sequence generator and semantic diffusion refiner conditioned on the generated mask sequences to produce realistic 3D medical images that align with the generated masks.
no code implementations • 21 Mar 2023 • Fuwang Dong, Fan Liu, Shihang Lu, Yifeng Xiong
Wireless sensing has been recognized as a key enabling technology for numerous emerging applications.
no code implementations • 28 Jan 2023 • Yasmeen M. Khedr, Yifeng Xiong, Kun He
The probability score method is based on training a Face Verification model for an attribute prediction task to obtain a class probability score for each attribute.
1 code implementation • 10 Nov 2022 • Yuxiang Dong, Fan Liu, Yifeng Xiong
In this letter, we investigate the joint receiver design for integrated sensing and communication (ISAC) systems, where the communication signal and the target echo signal are simultaneously received and processed to achieve a balanced performance between both functionalities.
no code implementations • 1 Nov 2022 • Shihang Lu, Xiao Meng, Zhen Du, Yifeng Xiong, Fan Liu
In this paper, we shed light on the performance gain of integrated sensing and communications (ISAC) from the perspective of channel correlations between radar sensing and communication (S&C), namely ISAC subspace correlation.
1 code implementation • 6 Apr 2022 • Xu Han, Anmin Liu, Yifeng Xiong, Yanbo Fan, Kun He
Deviation between the original gradient and the generated noises may lead to inaccurate gradient update estimation and suboptimal solutions for adversarial transferability, which is crucial for black-box attacks.
1 code implementation • CVPR 2022 • Yifeng Xiong, Jiadong Lin, Min Zhang, John E. Hopcroft, Kun He
The black-box adversarial attack has attracted impressive attention for its practical use in the field of deep learning security.
no code implementations • 29 Sep 2021 • Jiadong Lin, Yifeng Xiong, Min Zhang, John E. Hopcroft, Kun He
Black-box adversarial attack has attracted much attention for its practical use in deep learning applications, and it is very challenging as there is no access to the architecture and weights of the target model.
1 code implementation • 13 Sep 2021 • Xiaosen Wang, Yifeng Xiong, Kun He
Based on this observation, we propose a novel textual adversarial example detection method, termed Randomized Substitution and Vote (RS&V), which votes the prediction label by accumulating the logits of k samples generated by randomly substituting the words in the input text with synonyms.
no code implementations • 15 Dec 2020 • Yifeng Xiong, Daryus Chandra, Soon Xin Ng, Lajos Hanzo
Quantum error mitigation (QEM) is a promising technique of protecting hybrid quantum-classical computation from decoherence, but it suffers from sampling overhead which erodes the computational speed.
Quantum Physics Information Theory Information Theory