Search Results for author: Jian Yu

Found 18 papers, 6 papers with code

IDPL: Intra-subdomain adaptation adversarial learning segmentation method based on Dynamic Pseudo Labels

no code implementations7 Oct 2022 XueWei Li, Weilun Zhang, Jie Gao, Xuzhou Fu, Jian Yu

Secondly, the subdomain classifier module based on instance confidence is constructed, which can dynamically divide the target domain into easy and difficult subdomains according to the relative proportion of easy and difficult instances.

Pseudo Label Semantic Segmentation +2

Nextformer: A ConvNeXt Augmented Conformer For End-To-End Speech Recognition

1 code implementation29 Jun 2022 Yongjun Jiang, Jian Yu, Wenwen Yang, Bihong Zhang, Yanfeng Wang

To the best of our knowledge, the proposed Nextformer model achieves SOTA results on AISHELL-1(CER 4. 06%) and WenetSpeech(CER 7. 56%/11. 29%).

 Ranked #1 on Speech Recognition on AISHELL-1 (CER metric)

speech-recognition Speech Recognition

Deep Embedded Clustering with Distribution Consistency Preservation for Attributed Networks

1 code implementation28 May 2022 Yimei Zheng, Caiyan Jia, Jian Yu, Xuanya Li

Under the assumption of consistency for data in different views, the cluster structure of network topology and that of node attributes should be consistent for an attributed network.

Knowledge Graph-enhanced Sampling for Conversational Recommender System

1 code implementation13 Oct 2021 Mengyuan Zhao, Xiaowen Huang, Lixi Zhu, Jitao Sang, Jian Yu

Then, two samplers are designed to enhance knowledge by sampling fuzzy samples with high uncertainty for obtaining user preferences and reliable negative samples for updating recommender to achieve efficient acquisition of user preferences and model updating, and thus provide a powerful solution for CRS to deal with E&E problem.

Recommendation Systems

Homogeneous and Heterogeneous Relational Graph for Visible-infrared Person Re-identification

1 code implementation18 Sep 2021 Yujian Feng, Feng Chen, Jian Yu, Yimu Ji, Fei Wu, Shangdong Liu, Xiao-Yuan Jing

Existing VI Re-ID methods mainly focus on extracting homogeneous structural relationships in an image, i. e. the relations between local features, while ignoring the heterogeneous correlation of local features in different modalities.

Person Re-Identification

Comparative Analysis of Machine Learning Approaches to Analyze and Predict the Covid-19 Outbreak

no code implementations11 Feb 2021 Muhammad Naeem, Jian Yu, Muhammad Aamir, Sajjad Ahmad Khan, Olayinka Adeleye, Zardad Khan

Then, the resulting significant variables concerning their lags are used in the regression model selected by the ARDL for predicting and forecasting the trend of the epidemic.

BIG-bench Machine Learning Decision Making +1

FGraDA: A Dataset and Benchmark for Fine-Grained Domain Adaptation in Machine Translation

1 code implementation LREC 2022 Wenhao Zhu, ShuJian Huang, Tong Pu, Pingxuan Huang, Xu Zhang, Jian Yu, Wei Chen, Yanfeng Wang, Jiajun Chen

Previous research for adapting a general neural machine translation (NMT) model into a specific domain usually neglects the diversity in translation within the same domain, which is a core problem for domain adaptation in real-world scenarios.

Autonomous Vehicles Domain Adaptation +3

Learning Contextualized Sentence Representations for Document-Level Neural Machine Translation

no code implementations30 Mar 2020 Pei Zhang, Xu Zhang, Wei Chen, Jian Yu, Yan-Feng Wang, Deyi Xiong

In this paper, we propose a new framework to model cross-sentence dependencies by training neural machine translation (NMT) to predict both the target translation and surrounding sentences of a source sentence.

Document Level Machine Translation Machine Translation +3

A Generalization Theory based on Independent and Task-Identically Distributed Assumption

no code implementations28 Nov 2019 Guanhua Zheng, Jitao Sang, Houqiang Li, Jian Yu, Changsheng Xu

The derived generalization bound based on the ITID assumption identifies the significance of hypothesis invariance in guaranteeing generalization performance.

Image Classification

Attention, Please! Adversarial Defense via Activation Rectification and Preservation

no code implementations24 Nov 2018 Shangxi Wu, Jitao Sang, Kaiyuan Xu, Jiaming Zhang, Jian Yu

This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.

Adversarial Attack Adversarial Defense

Communication: Words and Conceptual Systems

no code implementations29 Jul 2015 Jian Yu

Word (phrase or symbol) representation is the fundamental problem for knowledge representation and understanding.

Generalized Categorization Axioms

no code implementations31 Mar 2015 Jian Yu

Categorization axioms have been proposed to axiomatizing clustering results, which offers a hint of bridging the difference between human recognition system and machine learning through an intuitive observation: an object should be assigned to its most similar category.

BIG-bench Machine Learning Density Estimation +1

Categorization Axioms for Clustering Results

no code implementations9 Mar 2014 Jian Yu, Zongben Xu

Cluster analysis has attracted more and more attention in the field of machine learning and data mining.

General Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.