Search Results for author: Zhi Lu

Found 9 papers, 0 papers with code

RFPose-OT: RF-Based 3D Human Pose Estimation via Optimal Transport Theory

no code implementations26 Dec 2022 Cong Yu, Dongheng Zhang, Zhi Wu, Zhi Lu, Chunyang Xie, Yang Hu, Yan Chen

Different from existing methods that predict human poses from RF signals on the signal level directly, we consider the structure difference between the RF signals and the human poses, propose to transform the RF signals to the pose domain on the feature level based on Optimal Transport (OT) theory, and generate human poses from the transformed features.

3D Human Pose Estimation

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection

no code implementations2 Dec 2022 Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

Cyber intrusion attacks that compromise the users' critical and sensitive data are escalating in volume and intensity, especially with the growing connections between our daily life and the Internet.

Intrusion Detection Unsupervised Anomaly Detection

Intrusion Detection in Internet of Things using Convolutional Neural Networks

no code implementations18 Nov 2022 Martin Kodys, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing

As security mechanisms are often neglected during the deployment of IoT devices, they are more easily attacked by complicated and large volume intrusion attacks using advanced techniques.

Intrusion Detection

PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection

no code implementations2 Jul 2022 Zhi Lu, Vrizlynn L. L. Thing

It is especially so when the model's incorrect prediction can lead to severe damages or even losses to lives and critical assets.

Decision Making Malware Detection

RFGAN: RF-Based Human Synthesis

no code implementations7 Dec 2021 Cong Yu, Zhi Wu, Dongheng Zhang, Zhi Lu, Yang Hu, Yan Chen

To the best of our knowledge, this is the first work to generate optical images based on RF signals.

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Android Malware Detector

no code implementations6 Nov 2021 Zhi Lu, Vrizlynn L. L. Thing

In the following experiments, we compare the explainability and fidelity of our proposed method with state-of-the-arts, respectively.

Android Malware Detection Malware Detection

Personalized Outfit Recommendation With Learnable Anchors

no code implementations CVPR 2021 Zhi Lu, Yang Hu, Yan Chen, Bing Zeng

To accommodate the variety of users' preferences, we characterize each user with a set of anchors, i. e. a group of learnable latent vectors in the outfit space that are the representatives of the outfits the user likes.

Learning Binary Code for Personalized Fashion Recommendation

no code implementations CVPR 2019 Zhi Lu, Yang Hu, Yunchao Jiang, Yan Chen, Bing Zeng

In this paper, we propose to learn binary code for efficient personalized fashion outfits recommendation.

Automated Detection of Individual Micro-calcifications from Mammograms using a Multi-stage Cascade Approach

no code implementations7 Oct 2016 Zhi Lu, Gustavo Carneiro, Neeraj Dhungel, Andrew P. Bradley

In mammography, the efficacy of computer-aided detection methods depends, in part, on the robust localisation of micro-calcifications ($\mu$C).

Clustering General Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.