no code implementations • 6 Jun 2022 • Yuzhen Han, Ruben Solozabal, Jing Dong, Xingyu Zhou, Martin Takac, Bin Gu
To the best of our knowledge, our study establishes the first model-based online algorithm with regret guarantees under LTV dynamical systems.
no code implementations • 30 May 2022 • Songlin Yang, Wei Wang, Chenye Xu, Bo Peng, Jing Dong
Adversarial attacks seriously threaten the high accuracy of face anti-spoofing models.
no code implementations • 17 May 2022 • Yi Chen, Jing Dong, Xin T. Tong
Based on three different scenarios, we propose simulation-based algorithms that can utilize a small amount of outsourced data to find good initial points accordingly.
no code implementations • 25 Apr 2022 • Jing Dong, Shiji Zhou, Baoxiang Wang, Han Zhao
We thus study the problem of supervised gradual domain adaptation, where labeled data from shifting distributions are available to the learner along the trajectory, and we aim to learn a classifier on a target data distribution of interest.
1 code implementation • 5 Apr 2022 • Joseph Ortiz, Alexander Clegg, Jing Dong, Edgar Sucar, David Novotny, Michael Zollhoefer, Mustafa Mukadam
We present iSDF, a continual learning system for real-time signed distance field (SDF) reconstruction.
no code implementations • 28 Feb 2022 • Jing Dong, Li Shen, Yinggan Xu, Baoxiang Wang
We study the convergence of the actor-critic algorithm with nonlinear function approximation under a nonconvex-nonconcave primal-dual formulation.
no code implementations • 6 Feb 2022 • Jing Dong, Xin T. Tong
The policy evaluation algorithm is then combined with the policy iteration algorithm to learn the optimal policy.
no code implementations • 25 Jan 2022 • Canzhe Zhao, Yanjie Ze, Jing Dong, Baoxiang Wang, Shuai Li
Temporal difference (TD) learning is a widely used method to evaluate policies in reinforcement learning.
no code implementations • 29 Sep 2021 • Yueming Lyu, Peibin Chen, Jingna Sun, Xu Wang, Jing Dong, Tieniu Tan
To evaluate the effectiveness and generalization ability of DRAN, we conduct a set of experiments on makeup transfer and semantic image synthesis.
no code implementations • 9 Sep 2021 • Jing Dong, Shuai Li, Baoxiang Wang
Motivated by the common strategic activities in crowdsourcing labeling, we study the problem of sequential eliciting information without verification (EIWV) for workers with a heterogeneous and unknown crowd.
no code implementations • 19 Jul 2021 • Songlin Yang, Wei Wang, Yuehua Cheng, Jing Dong
Through this, we can construct unrestricted adversarial image to decrease ID similarity recognized by model.
1 code implementation • 2 Jun 2021 • Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang
This competition provides a common platform for benchmarking the adversarial game between current state-of-the-art DeepFake creation and detection methods.
1 code implementation • CVPR 2022 • Ziwen He, Wei Wang, Jing Dong, Tieniu Tan
The experiment shows that our method has improved the transferability by a large margin under a similar sparsity setting compared with state-of-the-art methods.
no code implementations • 24 May 2021 • Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao
This paper studies \emph{differential privacy (DP)} and \emph{local differential privacy (LDP)} in cascading bandits.
no code implementations • 24 May 2021 • Tianxiang Ma, Dongze Li, Wei Wang, Jing Dong
We propose a Controllable Face Anonymization Network (CFA-Net), a novel approach that can anonymize the identity of given faces in images and videos, based on a generator that can disentangle face identity from other image contents.
no code implementations • 28 Apr 2021 • Weinan Guan, Wei Wang, Jing Dong, Bo Peng, Tieniu Tan
Maliciously-manipulated images or videos - so-called deep fakes - especially face-swap images and videos have attracted more and more malicious attackers to discredit some key figures.
no code implementations • 21 Apr 2021 • Yueming Lyu, Jing Dong, Bo Peng, Wei Wang, Tieniu Tan
Since human faces are symmetrical in the UV space, we can conveniently remove the undesired shadow and occlusion from the reference image by carefully designing a Flip Attention Module (FAM).
1 code implementation • 25 Feb 2021 • Jing Dong, Ke Li, Shuai Li, Baoxiang Wang
Strategic behavior against sequential learning methods, such as "click framing" in real recommendation systems, have been widely observed.
no code implementations • 11 Feb 2021 • Jing Dong, Rouba Ibrahim
The shortest-remaining-processing-time (SRPT) scheduling policy has been extensively studied, for more than 50 years, in single-server queues with infinitely patient jobs.
Probability 60K25, 68M20, 90B22
no code implementations • 26 Jan 2021 • Yi Chen, Jing Dong, Zhaoran Wang
In many operations management problems, we need to make decisions sequentially to minimize the cost while satisfying certain constraints.
Optimization and Control
no code implementations • CVPR 2021 • Dongze Li, Wei Wang, Hongxing Fan, Jing Dong
Then, the generated fake images driven by the adversarial latent vectors with the help of GANs can defeat main-stream forensic models.
no code implementations • 3 Dec 2020 • Jing Dong, Tan Li, Shaolei Ren, Linqi Song
To further improve the performance of distributed Thompson Sampling, we propose a distributed Elimination based Thompson Sampling algorithm that allow the agents to learn collaboratively.
1 code implementation • CVPR 2021 • Tianxiang Ma, Bo Peng, Wei Wang, Jing Dong
To deal with this problem, we propose a novel multi-level statistics transfer model, which disentangles and transfers multi-level appearance features from person images and merges them with pose features to reconstruct the source person images themselves.
no code implementations • 6 Jul 2020 • Wenxin Liu, David Caruso, Eddy Ilg, Jing Dong, Anastasios I. Mourikis, Kostas Daniilidis, Vijay Kumar, Jakob Engel
We show that our network, trained with pedestrian data from a headset, can produce statistically consistent measurement and uncertainty to be used as the update step in the filter, and the tightly-coupled system outperforms velocity integration approaches in position estimates, and AHRS attitude filter in orientation estimates.
no code implementations • ICLR 2019 • Yi Chen, Jinglin Chen, Jing Dong, Jian Peng, Zhaoran Wang
To attain the advantages of both regimes, we propose to use replica exchange, which swaps between two Langevin diffusions with different temperatures.
1 code implementation • 3 Apr 2020 • Bo Peng, Wei Wang, Jing Dong, Tieniu Tan
Learning to reconstruct 3D shapes using 2D images is an active research topic, with benefits of not requiring expensive 3D data.
no code implementations • 22 Feb 2020 • Ziwen He, Wei Wang, Jing Dong, Tieniu Tan
In this paper, we demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.
no code implementations • 23 Jan 2020 • Jing Dong, Xin T. Tong
Gradient descent (GD) is known to converge quickly for convex objective functions, but it can be trapped at local minima.
no code implementations • 19 Dec 2019 • Ziwen He, Wei Wang, Xinsheng Xuan, Jing Dong, Tieniu Tan
Thus, in this paper, we propose a new attack mechanism which performs the non-targeted attack when the targeted attack fails.
no code implementations • 10 Dec 2019 • Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong
The new types of generated images are emerging one after another, and the existing detection methods cannot cope well.
no code implementations • 27 Nov 2019 • Xiao-Yu Zhang, Changsheng Li, Haichao Shi, Xiaobin Zhu, Peng Li, Jing Dong
The point process is a solid framework to model sequential data, such as videos, by exploring the underlying relevance.
no code implementations • 4 Nov 2019 • Yi Zhu, Jing Dong
In this paper, we study a simple algorithm to construct asymptotically valid confidence regions for model parameters using the batch means method.
no code implementations • ICLR 2020 • YI Zhu, Jing Dong, Henry Lam
Despite an ever growing literature on reinforcement learning algorithms and applications, much less is known about their statistical inference.
1 code implementation • 3 Sep 2019 • Jing Dong, Zhaoyang Lv
Many problems in computer vision and robotics can be phrased as non-linear least squares optimization problems represented by factor graphs, for example, simultaneous localization and mapping (SLAM), structure from motion (SfM), motion planning, and control.
no code implementations • 27 Feb 2019 • Xinsheng Xuan, Bo Peng, Wei Wang, Jing Dong
Recently the GAN generated face images are more and more realistic with high-quality, even hard for human eyes to detect.
no code implementations • 4 Aug 2018 • Jing Dong, Byron Boots, Frank Dellaert, Ranveer Chandra, Sudipta N. Sinha
Such descriptors are often derived using supervised learning on existing datasets with ground truth correspondences.
no code implementations • 27 Jun 2018 • Wei Wang, Jing Dong, Yinlong Qian, Tieniu Tan
Recently, deep learning has shown its power in steganalysis.
1 code implementation • 8 Jun 2018 • Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan
There are great demands for automatically regulating inappropriate appearance of shocking firearm images in social media or identifying firearm types in forensics.
1 code implementation • 24 Jul 2017 • Mustafa Mukadam, Jing Dong, Xinyan Yan, Frank Dellaert, Byron Boots
We benchmark our algorithms against several sampling-based and trajectory optimization-based motion planning algorithms on planning problems in multiple environments.
Robotics
no code implementations • 6 Jul 2017 • Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiao-Yu Zhang
Furthermore, a sophisticated steganalysis network is reconstructed for the discriminative network, and the network can better evaluate the performance of the generated images.
2 code implementations • 17 May 2017 • Jing Dong, Byron Boots, Frank Dellaert
Continuous-time trajectory representations are a powerful tool that can be used to address several issues in many practical simultaneous localization and mapping (SLAM) scenarios, like continuously collected measurements distorted by robot motion, or during with asynchronous sensor measurements.
Robotics
1 code implementation • 5 Nov 2016 • Jiedong Hao, Jing Dong, Wei Wang, Tieniu Tan
Based on the evaluation results, we also identify the best choices for different factors and propose a new multi-scale image feature representation method to encode the image effectively.
no code implementations • 8 Oct 2016 • Jing Dong, John Gary Burnham, Byron Boots, Glen C. Rains, Frank Dellaert
Autonomous crop monitoring at high spatial and temporal resolution is a critical problem in precision agriculture.