Search Results for author: Bowen Song

Found 10 papers, 3 papers with code

The Role of Identification in Data-driven Policy Iteration: A System Theoretic Study

no code implementations12 Jan 2024 Bowen Song, Andrea Iannelli

By casting the concurrent model identification and control design as a feedback interconnection between two algorithmic systems, we provide a closed-loop analysis that shows convergence and robustness properties for arbitrary levels of excitation in the data.

Predicting Ground Reaction Force from Inertial Sensors

no code implementations4 Nov 2023 Bowen Song, Marco Paolieri, Harper E. Stewart, Leana Golubchik, Jill L. McNitt-Gray, Vishal Misra, Devavrat Shah

Our aim in this paper is to determine if data collected with inertial measurement units (IMUs), that can be worn by athletes during outdoor runs, can be used to predict GRF with sufficient accuracy to allow the analysis of its derived biomechanical variables (e. g., contact time and loading rate).

Hyperparameter Optimization regression

Evoke: Evoking Critical Thinking Abilities in LLMs via Reviewer-Author Prompt Editing

no code implementations20 Oct 2023 Xinyu Hu, Pengfei Tang, Simiao Zuo, Zihan Wang, Bowen Song, Qiang Lou, Jian Jiao, Denis Charles

In Evoke, there are two instances of a same LLM: one as a reviewer (LLM-Reviewer), it scores the current prompt; the other as an author (LLM-Author), it edits the prompt by considering the edit history and the reviewer's feedback.

Logical Fallacy Detection

Solving Inverse Problems with Latent Diffusion Models via Hard Data Consistency

1 code implementation16 Jul 2023 Bowen Song, Soo Min Kwon, Zecheng Zhang, Xinyu Hu, Qing Qu, Liyue Shen

However, training diffusion models in the pixel space are both data-intensive and computationally demanding, which restricts their applicability as priors for high-dimensional real-world data such as medical images.

Modeling Users' Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection

no code implementations4 Jan 2022 Yongchun Zhu, Dongbo Xi, Bowen Song, Fuzhen Zhuang, Shuai Chen, Xi Gu, Qing He

Thus, in this paper, we further propose a transfer framework to tackle the cross-domain fraud detection problem, which aims to transfer knowledge from existing domains (source domains) with enough and mature data to improve the performance in the new domain (target domain).

Fraud Detection

Neural Hierarchical Factorization Machines for User's Event Sequence Analysis

no code implementations31 Dec 2021 Dongbo Xi, Fuzhen Zhuang, Bowen Song, Yongchun Zhu, Shuai Chen, Dan Hong, Tao Chen, Xi Gu, Qing He

Many prediction tasks of real-world applications need to model multi-order feature interactions in user's event sequence for better detection performance.

Modeling the Field Value Variations and Field Interactions Simultaneously for Fraud Detection

no code implementations8 Aug 2020 Dongbo Xi, Bowen Song, Fuzhen Zhuang, Yongchun Zhu, Shuai Chen, Tianyi Zhang, Yuan Qi, Qing He

In this paper, we propose the Dual Importance-aware Factorization Machines (DIFM), which exploits the internal field information among users' behavior sequence from dual perspectives, i. e., field value variations and field interactions simultaneously for fraud detection.

Fraud Detection Management

Scalable String Reconciliation by Recursive Content-Dependent Shingling

1 code implementation1 Oct 2019 Bowen Song, Ari Trachtenberg

We consider the problem of reconciling similar, but remote, strings with minimum communication complexity.

Information Theory Information Theory

Cannot find the paper you are looking for? You can Submit a new open access paper.