no code implementations • 24 Mar 2024 • Chenhui Xu, Fuxun Yu, Zirui Xu, Nathan Inkawhich, Xiang Chen
Our experimental results demonstrate the superior performance of the MC Ensemble strategy in OOD detection compared to both the naive Deep Ensemble method and a standalone model of comparable size.
no code implementations • 29 Nov 2023 • Chenhui Xu, Fuxun Yu, Zirui Xu, ChenChen Liu, JinJun Xiong, Xiang Chen
Recent progress in computer vision-oriented neural network designs is mostly driven by capturing high-order neural interactions among inputs and features.
Hardware Aware Neural Architecture Search Neural Architecture Search
no code implementations • 28 Sep 2023 • Zirui Xu, Xiaofeng Lin, Vasileios Tzoumas
MetaBSG leverages a meta-algorithm to learn whether the robots should follow the commands or a recently developed submodular coordination algorithm, Bandit Sequential Greedy (BSG) [1], which has performance guarantees even in unpredictable and partially-observable environments.
1 code implementation • 22 May 2023 • Zirui Xu, Xiaofeng Lin, Vasileios Tzoumas
We are motivated by the future of autonomy that involves multiple robots coordinating actions in dynamic, unstructured, and partially observable environments to complete complex tasks such as target tracking, environmental mapping, and area monitoring.
no code implementations • 2 Jan 2023 • HongYu Zhou, Zirui Xu, Vasileios Tzoumas
In this paper, we enable projection-free online learning within the framework of Online Convex Optimization with Memory (OCO-M) -- OCO-M captures how the history of decisions affects the current outcome by allowing the online learning loss functions to depend on both current and past decisions.
no code implementations • 26 Sep 2022 • Zirui Xu, HongYu Zhou, Vasileios Tzoumas
We are motivated by the future of autonomy that involves multiple robots coordinating in dynamic, unstructured, and adversarial environments to complete complex tasks such as target tracking, environmental mapping, and area monitoring.
no code implementations • 15 Apr 2022 • Zirui Xu, Vasileios Tzoumas
All robots can thus afford our algorithm, irrespective of their resources.
no code implementations • 1 Apr 2022 • Zirui Xu, Fuxun Yu, JinJun Xiong, Xiang Chen
The significant success of Deep Neural Networks (DNNs) is highly promoted by the multiple sophisticated DNN libraries.
no code implementations • 28 Nov 2021 • Fuxun Yu, Weishan Zhang, Zhuwei Qin, Zirui Xu, Di Wang, ChenChen Liu, Zhi Tian, Xiang Chen
Federated learning learns from scattered data by fusing collaborative models from local nodes.
no code implementations • 15 Aug 2020 • Fuxun Yu, Weishan Zhang, Zhuwei Qin, Zirui Xu, Di Wang, ChenChen Liu, Zhi Tian, Xiang Chen
Specifically, we design a feature-oriented regulation method ({$\Psi$-Net}) to ensure explicit feature information allocation in different neural network structures.
no code implementations • 3 Dec 2019 • Zirui Xu, Zhao Yang, JinJun Xiong, Jianlei Yang, Xiang Chen
In this paper, we propose Helios, a heterogeneity-aware FL framework to tackle the straggler issue.
Distributed, Parallel, and Cluster Computing
no code implementations • 17 Oct 2019 • Zirui Xu, Fuxun Yu, Xiang Chen
Based on the detection result, we further propose a data recovery methodology to defend the physical adversarial attacks.
no code implementations • 17 Jun 2019 • Qiang Du, Lorenzo Toniazzi, Zirui Xu
Based on the popular Caputo fractional derivative of order $\beta$ in $(0, 1)$, we define the censored fractional derivative on the positive half-line $\mathbb R_+$.
Classical Analysis and ODEs Probability 26A33, 60G52, 60G40
no code implementations • 21 May 2019 • Zirui Xu, Fuxun Yu, Xiang Chen
To address this issue, we propose DoPa -- a comprehensive CNN detection methodology for various physical adversarial attacks.
no code implementations • 4 Sep 2018 • Zirui Xu, Fuxun Yu, ChenChen Liu, Xiang Chen
In this work, we propose HASP -- a high-performance security enhancement approach to solve this security issue on mobile devices.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +2
no code implementations • 23 May 2018 • Fuxun Yu, Zirui Xu, Yanzhi Wang, ChenChen Liu, Xiang Chen
In recent years, neural networks have demonstrated outstanding effectiveness in a large amount of applications. However, recent works have shown that neural networks are susceptible to adversarial examples, indicating possible flaws intrinsic to the network structures.