no code implementations • ECCV 2020 • Bingyan Liao, Chenye Wang, Yayun Wang, Yaonong Wang, Jun Yin
In this paper, a Pixel to Global Matching Network (PG-Net) is proposed to suppress the influence of background in search image while achieving state-of-the-art tracking performance.
no code implementations • 12 Jul 2024 • Jianhai Fu, Yuanjie Yu, Ningchuan Li, Yi Zhang, Qichao Chen, Jianping Xiong, Jun Yin, Zhiyu Xiang
Lite-SAM is composed of four main components: a streamlined CNN-Transformer hybrid encoder (LiteViT), an automated prompt proposal network (AutoPPN), a traditional prompt encoder, and a mask decoder.
no code implementations • 11 Jun 2024 • Jun Yin, Linyan Mei, Andre Guntoro, Marian Verhelst
Compared to the fixed dilated causal structure, ST-CNNs with ACCO reach an ~8. 4x better Energy-Delay-Product.
no code implementations • 7 Feb 2024 • Nung Siong Lai, Yi Shen Tew, Xialin Zhong, Jun Yin, Jiali Li, Binhang Yan, Xiaonan Wang
In this article, we demonstrate the application of this AI workflow in the optimization of catalyst synthesis for ammonia production.
no code implementations • 21 Nov 2023 • Jiming Yang, Yutong Zheng, Jiahong Zhou, Huiyu Li, Jun Yin
Our finding suggests that the AI method outperforms both the statistical method and the physics method in its sensitivity.
no code implementations • 5 Sep 2023 • Yuze Liu, Ziming Zhao, Tiehua Zhang, Kang Wang, Xin Chen, Xiaowei Huang, Jun Yin, Zhishu Shen
Sleep stage classification is crucial for detecting patients' health conditions.
no code implementations • 5 Jun 2023 • Aditya Srikanth Veerubhotla, Lahari Poddar, Jun Yin, György Szarvas, Sharanya Eswaran
Self-rationalizing models that also generate a free-text explanation for their predicted labels are an important tool to build trustworthy AI applications.
no code implementations • 2 Jun 2023 • Tiehua Zhang, Rui Xu, Jianping Zhang, Yuze Liu, Xin Chen, Jun Yin, Xi Zheng
Vulnerability detection is a critical problem in software security and attracts growing attention both from academia and industry.
1 code implementation • CVPR 2023 • Lai Wei, Zhengwei Chen, Jun Yin, Changming Zhu, Rigui Zhou, Jin Liu
Spectral-type subspace clustering algorithms have shown excellent performance in many subspace clustering applications.
no code implementations • 30 Jan 2023 • Jun Yin, Stefano Damiano, Marian Verhelst, Toon van Waterschoot, Andre Guntoro
On the algorithmic side, the I-SPOT Project aims to enable detecting, localizing and tracking environmental audio signals by jointly developing microphone array processing and deep learning techniques that specifically target automotive applications.
no code implementations • CVPR 2023 • Luwen Duan, Min Wu, Lijian Mao, Jun Yin, Jianping Xiong, Xi Li
Automatic prohibited item detection in security inspection X-ray images is necessary for transportation. The abundance and diversity of the X-ray security images with prohibited item, termed as prohibited X-ray security images, are essential for training the detection model.
no code implementations • 6 Jun 2022 • Hongbin Zhou, Yupeng Ren, Qiankun Li, Jun Yin, Yonggang Lin
In this work we present Mutual-Attention Siamese Network (MASNet), a general siamese network with mutual-attention plug-in, so to exchange information between the two feature extraction branches.
no code implementations • 23 Oct 2021 • Ziang Ma, HaiTao Zhang, Linyuan Wang, Jun Yin
Polar pooling plays the role of enriching information collected from the semantic keypoints for stronger classification, while extreme pooling facilitates explicit visual patterns of the object boundary for accurate target state estimation.
no code implementations • 29 Sep 2021 • Jiawei Wang, Konghuai Shen, Shao Ming, Jun Yin, Ming Liu
In recent years, a great progress has been witnessed for cross-domain object detection.
no code implementations • 19 Dec 2020 • Huixiang Huang, Renjie Wu, Jingbiao Huang, Jucai Lin, Jun Yin
Generative adversarial network (GAN) still exists some problems in dealing with speech enhancement (SE) task.
no code implementations • 14 Sep 2020 • Jun Yin, Qian Li, Shaowu Liu, Zhiang Wu, Guandong Xu
Our study investigates the spammer detection problem in the context of multi-relation social networks, and makes an attempt to fully exploit the sequences of heterogeneous relations for enhancing the detection accuracy.
no code implementations • 8 Aug 2020 • Ziang Ma, Linyuan Wang, HaiTao Zhang, Wei Lu, Jun Yin
While remarkable progress has been made in robust visual tracking, accurate target state estimation still remains a highly challenging problem.
Ranked #13 on Semi-Supervised Video Object Segmentation on VOT2020
no code implementations • 11 Dec 2019 • Harshvardhan Sikka, Weishun Zhong, Jun Yin, Cengiz Pehlevan
In many data analysis tasks, it is beneficial to learn representations where each dimension is statistically independent and thus disentangled from the others.
1 code implementation • WS 2016 • Jun Yin, Xin Jiang, Zhengdong Lu, Lifeng Shang, Hang Li, Xiaoming Li
Empirical study shows the proposed model can effectively deal with the variations of questions and answers, and generate right and natural answers by referring to the facts in the knowledge-base.