Search Results for author: Jing Dong

Found 43 papers, 11 papers with code

Learning to Control under Time-Varying Environment

no code implementations6 Jun 2022 Yuzhen Han, Ruben Solozabal, Jing Dong, Xingyu Zhou, Martin Takac, Bin Gu

To the best of our knowledge, our study establishes the first model-based online algorithm with regret guarantees under LTV dynamical systems.

Can We Do Better Than Random Start? The Power of Data Outsourcing

no code implementations17 May 2022 Yi Chen, Jing Dong, Xin T. Tong

Based on three different scenarios, we propose simulation-based algorithms that can utilize a small amount of outsourced data to find good initial points accordingly.

Algorithms and Theory for Supervised Gradual Domain Adaptation

no code implementations25 Apr 2022 Jing Dong, Shiji Zhou, Baoxiang Wang, Han Zhao

We thus study the problem of supervised gradual domain adaptation, where labeled data from shifting distributions are available to the learner along the trajectory, and we aim to learn a classifier on a target data distribution of interest.

Domain Adaptation

Provably Efficient Convergence of Primal-Dual Actor-Critic with Nonlinear Function Approximation

no code implementations28 Feb 2022 Jing Dong, Li Shen, Yinggan Xu, Baoxiang Wang

We study the convergence of the actor-critic algorithm with nonlinear function approximation under a nonconvex-nonconcave primal-dual formulation.

Continuous Control OpenAI Gym

Stochastic Gradient Descent with Dependent Data for Offline Reinforcement Learning

no code implementations6 Feb 2022 Jing Dong, Xin T. Tong

The policy evaluation algorithm is then combined with the policy iteration algorithm to learn the optimal policy.

Q-Learning reinforcement-learning +1

DRAN: Detailed Region-Adaptive Normalization for Conditional Image Synthesis

no code implementations29 Sep 2021 Yueming Lyu, Peibin Chen, Jingna Sun, Xu Wang, Jing Dong, Tieniu Tan

To evaluate the effectiveness and generalization ability of DRAN, we conduct a set of experiments on makeup transfer and semantic image synthesis.

Facial Makeup Transfer Image Generation +1

Incentivizing an Unknown Crowd

no code implementations9 Sep 2021 Jing Dong, Shuai Li, Baoxiang Wang

Motivated by the common strategic activities in crowdsourcing labeling, we study the problem of sequential eliciting information without verification (EIWV) for workers with a heterogeneous and unknown crowd.

reinforcement-learning

A Systematical Solution for Face De-identification

no code implementations19 Jul 2021 Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong

Through this, we can construct unrestricted adversarial image to decrease ID similarity recognized by model.

De-identification Disentanglement +1

Transferable Sparse Adversarial Attack

1 code implementation CVPR 2022 Ziwen He, Wei Wang, Jing Dong, Tieniu Tan

The experiment shows that our method has improved the transferability by a large margin under a similar sparsity setting compared with state-of-the-art methods.

Adversarial Attack Quantization

Cascading Bandit under Differential Privacy

no code implementations24 May 2021 Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao

This paper studies \emph{differential privacy (DP)} and \emph{local differential privacy (LDP)} in cascading bandits.

CFA-Net: Controllable Face Anonymization Network with Identity Representation Manipulation

no code implementations24 May 2021 Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong

We propose a Controllable Face Anonymization Network (CFA-Net), a novel approach that can anonymize the identity of given faces in images and videos, based on a generator that can disentangle face identity from other image contents.

De-identification Face Anonymization

Robust Face-Swap Detection Based on 3D Facial Shape Information

no code implementations28 Apr 2021 Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan

Maliciously-manipulated images or videos - so-called deep fakes - especially face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.

SOGAN: 3D-Aware Shadow and Occlusion Robust GAN for Makeup Transfer

no code implementations21 Apr 2021 Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan

Since human faces are symmetrical in the UV space, we can conveniently remove the undesired shadow and occlusion from the reference image by carefully designing a Flip Attention Module (FAM).

Face Model Facial Makeup Transfer

Combinatorial Bandits under Strategic Manipulations

1 code implementation25 Feb 2021 Jing Dong, Ke Li, Shuai Li, Baoxiang Wang

Strategic behavior against sequential learning methods, such as "click framing" in real recommendation systems, have been widely observed.

Multi-Armed Bandits Recommendation Systems

On the SRPT Scheduling Discipline in Many-Server Queues with Impatient Customers

no code implementations11 Feb 2021 Jing Dong, Rouba Ibrahim

The shortest-remaining-processing-time (SRPT) scheduling policy has been extensively studied, for more than 50 years, in single-server queues with infinitely patient jobs.

Probability 60K25, 68M20, 90B22

A Primal-Dual Approach to Constrained Markov Decision Processes

no code implementations26 Jan 2021 Yi Chen, Jing Dong, Zhaoran Wang

In many operations management problems, we need to make decisions sequentially to minimize the cost while satisfying certain constraints.

Optimization and Control

Exploring Adversarial Fake Images on Face Manifold

no code implementations CVPR 2021 Dongze Li, Wei Wang, Hongxing Fan, Jing Dong

Then, the generated fake images driven by the adversarial latent vectors with the help of GANs can defeat main-stream forensic models.

Adversarial Attack DeepFake Detection +1

Distributed Thompson Sampling

no code implementations3 Dec 2020 Jing Dong, Tan Li, Shaolei Ren, Linqi Song

To further improve the performance of distributed Thompson Sampling, we propose a distributed Elimination based Thompson Sampling algorithm that allow the agents to learn collaboratively.

Multi-Armed Bandits

MUST-GAN: Multi-level Statistics Transfer for Self-driven Person Image Generation

1 code implementation CVPR 2021 Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong

To deal with this problem, we propose a novel multi-level statistics transfer model, which disentangles and transfers multi-level appearance features from person images and merges them with pose features to reconstruct the source person images themselves.

Pose Transfer Style Transfer

TLIO: Tight Learned Inertial Odometry

no code implementations6 Jul 2020 Wenxin Liu, David Caruso, Eddy Ilg, Jing Dong, Anastasios I. Mourikis, Kostas Daniilidis, Vijay Kumar, Jakob Engel

We show that our network, trained with pedestrian data from a headset, can produce statistically consistent measurement and uncertainty to be used as the update step in the filter, and the tightly-coupled system outperforms velocity integration approaches in position estimates, and AHRS attitude filter in orientation estimates.

Accelerating Nonconvex Learning via Replica Exchange Langevin Diffusion

no code implementations ICLR 2019 Yi Chen, Jinglin Chen, Jing Dong, Jian Peng, Zhaoran Wang

To attain the advantages of both regimes, we propose to use replica exchange, which swaps between two Langevin diffusions with different temperatures.

Learning Pose-invariant 3D Object Reconstruction from Single-view Images

1 code implementation3 Apr 2020 Bo Peng, Wei Wang, Jing Dong, Tieniu Tan

Learning to reconstruct 3D shapes using 2D images is an active research topic, with benefits of not requiring expensive 3D data.

3D Object Reconstruction Domain Adaptation

Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition

no code implementations22 Feb 2020 Ziwen He, Wei Wang, Jing Dong, Tieniu Tan

In this paper, we demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.

Adversarial Attack Gait Recognition

Replica Exchange for Non-Convex Optimization

no code implementations23 Jan 2020 Jing Dong, Xin T. Tong

Gradient descent (GD) is known to converge quickly for convex objective functions, but it can be trapped at local minima.

A New Ensemble Method for Concessively Targeted Multi-model Attack

no code implementations19 Dec 2019 Ziwen He, Wei Wang, Xinsheng Xuan, Jing Dong, Tieniu Tan

Thus, in this paper, we propose a new attack mechanism which performs the non-targeted attack when the targeted attack fails.

Image Classification

Scalable Fine-grained Generated Image Classification Based on Deep Metric Learning

no code implementations10 Dec 2019 Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong

The new types of generated images are emerging one after another, and the existing detection methods cannot cope well.

General Classification Image Classification +2

On Constructing Confidence Region for Model Parameters in Stochastic Gradient Descent via Batch Means

no code implementations4 Nov 2019 Yi Zhu, Jing Dong

In this paper, we study a simple algorithm to construct asymptotically valid confidence regions for model parameters using the batch means method.

Efficient Inference and Exploration for Reinforcement Learning

no code implementations ICLR 2020 YI Zhu, Jing Dong, Henry Lam

Despite an ever growing literature on reinforcement learning algorithms and applications, much less is known about their statistical inference.

reinforcement-learning

miniSAM: A Flexible Factor Graph Non-linear Least Squares Optimization Framework

1 code implementation3 Sep 2019 Jing Dong, Zhaoyang Lv

Many problems in computer vision and robotics can be phrased as non-linear least squares optimization problems represented by factor graphs, for example, simultaneous localization and mapping (SLAM), structure from motion (SfM), motion planning, and control.

Motion Planning Simultaneous Localization and Mapping

On the generalization of GAN image forensics

no code implementations27 Feb 2019 Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong

Recently the GAN generated face images are more and more realistic with high-quality, even hard for human eyes to detect.

GAN image forensics Image Forensics

Learning to Align Images using Weak Geometric Supervision

no code implementations4 Aug 2018 Jing Dong, Byron Boots, Frank Dellaert, Ranveer Chandra, Sudipta N. Sinha

Such descriptors are often derived using supervised learning on existing datasets with ground truth correspondences.

Video Alignment

DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval

1 code implementation8 Jun 2018 Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan

There are great demands for automatically regulating inappropriate appearance of shocking firearm images in social media or identifying firearm types in forensics.

Image Retrieval

Continuous-Time Gaussian Process Motion Planning via Probabilistic Inference

1 code implementation24 Jul 2017 Mustafa Mukadam, Jing Dong, Xinyan Yan, Frank Dellaert, Byron Boots

We benchmark our algorithms against several sampling-based and trajectory optimization-based motion planning algorithms on planning problems in multiple environments.

Robotics

SSGAN: Secure Steganography Based on Generative Adversarial Networks

no code implementations6 Jul 2017 Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiao-Yu Zhang

Furthermore, a sophisticated steganalysis network is reconstructed for the discriminative network, and the network can better evaluate the performance of the generated images.

Sparse Gaussian Processes for Continuous-Time Trajectory Estimation on Matrix Lie Groups

2 code implementations17 May 2017 Jing Dong, Byron Boots, Frank Dellaert

Continuous-time trajectory representations are a powerful tool that can be used to address several issues in many practical simultaneous localization and mapping (SLAM) scenarios, like continuously collected measurements distorted by robot motion, or during with asynchronous sensor measurements.

Robotics

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?

1 code implementation5 Nov 2016 Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan

Based on the evaluation results, we also identify the best choices for different factors and propose a new multi-scale image feature representation method to encode the image effectively.

Image Retrieval

4D Crop Monitoring: Spatio-Temporal Reconstruction for Agriculture

no code implementations8 Oct 2016 Jing Dong, John Gary Burnham, Byron Boots, Glen C. Rains, Frank Dellaert

Autonomous crop monitoring at high spatial and temporal resolution is a critical problem in precision agriculture.

Cannot find the paper you are looking for? You can Submit a new open access paper.