no code implementations • 26 Dec 2022 • Cong Yu, Dongheng Zhang, Zhi Wu, Zhi Lu, Chunyang Xie, Yang Hu, Yan Chen
Different from existing methods that predict human poses from RF signals on the signal level directly, we consider the structure difference between the RF signals and the human poses, propose to transform the RF signals to the pose domain on the feature level based on Optimal Transport (OT) theory, and generate human poses from the transformed features.
no code implementations • 2 Dec 2022 • Rahul Kale, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing
Cyber intrusion attacks that compromise the users' critical and sensitive data are escalating in volume and intensity, especially with the growing connections between our daily life and the Internet.
no code implementations • 18 Nov 2022 • Martin Kodys, Zhi Lu, Kar Wai Fok, Vrizlynn L. L. Thing
As security mechanisms are often neglected during the deployment of IoT devices, they are more easily attacked by complicated and large volume intrusion attacks using advanced techniques.
no code implementations • 2 Jul 2022 • Zhi Lu, Vrizlynn L. L. Thing
It is especially so when the model's incorrect prediction can lead to severe damages or even losses to lives and critical assets.
no code implementations • 7 Dec 2021 • Cong Yu, Zhi Wu, Dongheng Zhang, Zhi Lu, Yang Hu, Yan Chen
To the best of our knowledge, this is the first work to generate optical images based on RF signals.
no code implementations • 6 Nov 2021 • Zhi Lu, Vrizlynn L. L. Thing
In the following experiments, we compare the explainability and fidelity of our proposed method with state-of-the-arts, respectively.
no code implementations • CVPR 2021 • Zhi Lu, Yang Hu, Yan Chen, Bing Zeng
To accommodate the variety of users' preferences, we characterize each user with a set of anchors, i. e. a group of learnable latent vectors in the outfit space that are the representatives of the outfits the user likes.
no code implementations • CVPR 2019 • Zhi Lu, Yang Hu, Yunchao Jiang, Yan Chen, Bing Zeng
In this paper, we propose to learn binary code for efficient personalized fashion outfits recommendation.
no code implementations • 7 Oct 2016 • Zhi Lu, Gustavo Carneiro, Neeraj Dhungel, Andrew P. Bradley
In mammography, the efficacy of computer-aided detection methods depends, in part, on the robust localisation of micro-calcifications ($\mu$C).