1 code implementation • 17 Jul 2024 • Wenhan Wu, Ce Zheng, Zihao Yang, Chen Chen, Srijan Das, Aidong Lu
Subsequently, we develop a mixed transformer architecture to incorporate spatial features with frequency features to model the comprehensive frequency-spatial patterns.
no code implementations • 8 May 2024 • Thomas Carr, Depeng Xu, Aidong Lu
Skeleton-based motion visualization is a rising field in computer vision, especially in the case of virtual reality (VR).
no code implementations • 1 Nov 2023 • Zekun Wu, Shahin Doroudian, Aidong Lu
This work presents a study on a comprehensive data collection of user behaviors, and our analysis approach with time-series classification methods.
1 code implementation • 1 May 2023 • Yilei Hua, Wenhan Wu, Ce Zheng, Aidong Lu, Mengyuan Liu, Chen Chen, Shiqian Wu
This paper proposes an attention-based contrastive learning framework for skeleton representation learning, called SkeAttnCLR, which integrates local similarity and global features for skeleton-based action representations.
no code implementations • 1 Sep 2022 • Wenhan Wu, Yilei Hua, Ce Zheng, Shiqian Wu, Chen Chen, Aidong Lu
Given the unmasked skeleton sequence, the encoder is fine-tuned for the action recognition task.
1 code implementation • 24 Nov 2021 • Ce Zheng, Matias Mendieta, Pu Wang, Aidong Lu, Chen Chen
We propose a pose analysis module that uses graph transformers to exploit structured and implicit joint correlations, and a mesh regression module that combines the extracted pose feature with the mesh template to reconstruct the final human mesh.
Ranked #68 on 3D Human Pose Estimation on 3DPW
no code implementations • 17 Oct 2021 • Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu
Our framework enables attackers to flexibly adjust the attack's focus on prediction accuracy or fairness and accurately quantify the impact of each candidate point to both accuracy loss and fairness violation, thus producing effective poisoning samples.
1 code implementation • 5 Mar 2018 • Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
Currently, most of the fraud detection approaches require a training dataset that contains records of both benign and malicious users.
no code implementations • 3 Jun 2017 • Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu
Due to the small dimension of spectral coordinates (compared with the dimension of the adjacency matrix derived from a graph), training deep neural networks becomes feasible.
no code implementations • 23 Dec 2016 • Yuemeng Li, Xintao Wu, Aidong Lu
It has been shown that the adjacency eigenspace of a network contains key information of its underlying structure.