no code implementations • 7 Jan 2025 • Hongyi Wu, Hong Zhang
With the rapid advancement of deep learning, computational pathology has made significant progress in cancer diagnosis and subtyping.
no code implementations • 10 Oct 2024 • Mengxuan Hu, Hongyi Wu, Zihan Guan, Ronghang Zhu, Dongliang Guo, Daiqing Qi, Sheng Li
However, is this effectiveness and cost-efficiency truly a free lunch?
1 code implementation • 29 Sep 2024 • Nuowei Liu, Xinhao Chen, Hongyi Wu, Changzhi Sun, Man Lan, Yuanbin Wu, Xiaopeng Bai, Shaoguang Mao, Yan Xia
Existing rhetorical understanding and generation datasets or corpora primarily focus on single coarse-grained categories or fine-grained categories, neglecting the common interrelations between different rhetorical devices by treating them as independent sub-tasks.
no code implementations • 23 Aug 2024 • Efat Samir Fathalla, Sahar Zargarzadeh, Chunsheng Xin, Hongyi Wu, Peng Jiang, Joao F. Santos, Jacek Kibilda, Aloizio Pereira da
The datasets we have obtained from the beam profiling and the machine learning model for beamforming are valuable for a broad set of network design problems, such as network topology optimization, user equipment association, power allocation, and beam scheduling, in complex and dynamic mmWave networks.
no code implementations • 24 May 2024 • Xiangrui Xu, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu
The prevalent use of Transformer-like models, exemplified by ChatGPT in modern language processing applications, underscores the critical need for enabling private inference essential for many cloud-based services reliant on such models.
no code implementations • 23 Aug 2022 • Anran Liu, Xingyu Li, Hongyi Wu, Bangwei Guo, Jitendra Jonnagaddala, Hong Zhang, Xu Steven Xu
Methods We developed an automated, multiscale LinkNet workflow for quantifying cellular-level TILs for CRC tumors using H&E-stained images.
no code implementations • 29 Apr 2022 • Cong Wang, Bin Hu, Hongyi Wu
Energy is an essential, but often forgotten aspect in large-scale federated systems.
no code implementations • ICCV 2021 • Liuwan Zhu, Rui Ning, Chunsheng Xin, Chonggang Wang, Hongyi Wu
Based on this observation, we propose a novel defense mechanism to pinpoint a malicious pocket by "wrapping" them into a tight convex hull in the feature space.
no code implementations • 12 Nov 2019 • Qiao Zhang, Cong Wang, Chunsheng Xin, Hongyi Wu
This significant speedup enables a wide range of practical applications based on privacy-preserved deep neural networks.