1 code implementation • 12 May 2022 • Shilong Zhang, Zhuoran Yu, Liyang Liu, Xinjiang Wang, Aojun Zhou, Kai Chen
The core of this task is to train a point-to-box regressor on well-labeled images that can be used to predict credible bounding boxes for each point annotation.
1 code implementation • 4 May 2022 • Haodong Duan, Nanxuan Zhao, Kai Chen, Dahua Lin
To mitigate this problem, we developed TransRank, a unified framework for recognizing Transformations in a Ranking formulation.
1 code implementation • 28 Apr 2022 • Yue Zhou, Xue Yang, Gefan Zhang, Jiabao Wang, Yanyi Liu, Liping Hou, Xue Jiang, Xingzhao Liu, Junchi Yan, Chengqi Lyu, Wenwei Zhang, Kai Chen
We present an open-source toolbox, named MMRotate, which provides a coherent algorithm framework of training, inferring, and evaluation for the popular rotated object detection algorithm based on deep learning.
no code implementations • 26 Apr 2022 • Zhenjie Yu, Kai Chen, Shuang Li, Bingfeng Han, Chi Harold Liu, Shuigen Wang
To be specific, ROMA could efficiently translate the unpaired nighttime infrared videos into fine-grained daytime visible ones, meanwhile maintain the spatiotemporal consistency via matching the cross-domain region similarity.
2 code implementations • 20 Apr 2022 • Ren Yang, Radu Timofte, Meisong Zheng, Qunliang Xing, Minglang Qiao, Mai Xu, Lai Jiang, Huaida Liu, Ying Chen, Youcheng Ben, Xiao Zhou, Chen Fu, Pei Cheng, Gang Yu, Junyi Li, Renlong Wu, Zhilu Zhang, Wei Shang, Zhengyao Lv, Yunjin Chen, Mingcai Zhou, Dongwei Ren, Kai Zhang, WangMeng Zuo, Pavel Ostyakov, Vyal Dmitry, Shakarim Soltanayev, Chervontsev Sergey, Zhussip Magauiya, Xueyi Zou, Youliang Yan, Pablo Navarrete Michelini, Yunhua Lu, Diankai Zhang, Shaoli Liu, Si Gao, Biao Wu, Chengjian Zheng, Xiaofeng Zhang, Kaidi Lu, Ning Wang, Thuong Nguyen Canh, Thong Bach, Qing Wang, Xiaopeng Sun, Haoyu Ma, Shijie Zhao, Junlin Li, Liangbin Xie, Shuwei Shi, Yujiu Yang, Xintao Wang, Jinjin Gu, Chao Dong, Xiaodi Shi, Chunmei Nian, Dong Jiang, Jucai Lin, Zhihuai Xie, Mao Ye, Dengyan Luo, Liuhan Peng, Shengjie Chen, Qian Wang, Xin Liu, Boyang Liang, Hang Dong, Yuhao Huang, Kai Chen, Xingbei Guo, Yujing Sun, Huilei Wu, Pengxu Wei, Yulin Huang, Junying Chen, Ik Hyun Lee, Sunder Ali Khowaja, Jiseok Yoon
This challenge includes three tracks.
no code implementations • 14 Apr 2022 • Kai Chen, Rui Cao, Stephen James, Yichuan Li, Yun-hui Liu, Pieter Abbeel, Qi Dou
To continuously improve the quality of pseudo labels, we iterate the above steps by taking the trained student model as a new teacher and re-label real data using the refined teacher model.
1 code implementation • 10 Apr 2022 • Xiangtai Li, Wenwei Zhang, Jiangmiao Pang, Kai Chen, Guangliang Cheng, Yunhai Tong, Chen Change Loy
In particular on KITTI-STEP, the simple method can boost almost 12\% relative improvements over previous methods.
no code implementations • 23 Mar 2022 • Fangjian Lin, Zhanhao Liang, Junjun He, Miao Zheng, Shengwei Tian, Kai Chen
From a perspective on semantic segmentation as per-pixel classification, the previous deep learning-based methods learn the per-pixel representation first through an encoder and a decoder head and then classify each pixel representation to a specific category to obtain the semantic masks.
no code implementations • 21 Mar 2022 • Wenwei Zhang, Jiangmiao Pang, Kai Chen, Chen Change Loy
It also extracts a batch of region embeddings that correspond to some sub-regions in the overlapped area to be contrasted for region consistency.
no code implementations • 15 Mar 2022 • Yangming Shi, Haisong Ding, Kai Chen, Qiang Huo
Style-guided text image generation tries to synthesize text image by imitating reference image's appearance while keeping text content unaltered.
no code implementations • 15 Mar 2022 • Kaican Li, Kai Chen, Haoyu Wang, Lanqing Hong, Chaoqiang Ye, Jianhua Han, Yukuai Chen, Wei zhang, Chunjing Xu, Dit-yan Yeung, Xiaodan Liang, Zhenguo Li, Hang Xu
One main reason that impedes the development of truly reliably self-driving systems is the lack of public datasets for evaluating the performance of object detectors on corner cases.
no code implementations • ACL 2022 • Kai Chen, Ye Wang, Yitong Li, Aiping Li
Temporal factors are tied to the growth of facts in realistic applications, such as the progress of diseases and the development of political situation, therefore, research on Temporal Knowledge Graph (TKG) attracks much attention.
no code implementations • 14 Mar 2022 • Jingwen He, Wu Shi, Kai Chen, Lean Fu, Chao Dong
The style modulation aims to generate realistic face details and the feature modulation dynamically fuses the multi-level encoded features and the generated ones conditioned on the upscaling factor.
no code implementations • 11 Mar 2022 • Xiaojin Zhang, Hanlin Gu, Lixin Fan, Kai Chen, Qiang Yang
In a federated learning scenario where multiple parties jointly learn a model from their respective data, there exist two conflicting goals for the choice of appropriate algorithms.
no code implementations • 5 Mar 2022 • Yidan Feng, Biqi Yang, Xianzhi Li, Chi-Wing Fu, Rui Cao, Kai Chen, Qi Dou, Mingqiang Wei, Yun-hui Liu, Pheng-Ann Heng
Industrial bin picking is a challenging task that requires accurate and robust segmentation of individual object instances.
no code implementations • 10 Feb 2022 • Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang
In this work, we reveal a new type of privacy inference attack, coined Preference Profiling Attack (PPA), that accurately profiles private preferences of a local user.
no code implementations • 17 Jan 2022 • Hao Wang, Yuxuan Qin, ChonLam Lao, Yanfang Le, Wenfei Wu, Kai Chen
However, switch memory is scarce compared to the volume of gradients transmitted in distributed training.
no code implementations • 17 Jan 2022 • Yiding Wang, Decang Sun, Kai Chen, Fan Lai, Mosharaf Chowdhury
To explore this, we first introduce the notion of training plasticity to quantify the training progress of internal DNN layers.
no code implementations • 12 Jan 2022 • Jintao Lin, Haodong Duan, Kai Chen, Dahua Lin, LiMin Wang
Recent works prefer to formulate frame sampling as a sequential decision task by selecting frames one by one according to their importance, while we present a new paradigm of learning instance-specific video condensation policies to select informative frames for representing the entire video only in a single step.
1 code implementation • 28 Dec 2021 • Kai Chen, Weihua Chen, Tao He, Rong Du, Fan Wang, Xiuyu Sun, Yuchen Guo, Guiguang Ding
In TAGPerson, we extract information from target scenes and use them to control our parameterized rendering process to generate target-aware synthetic images, which would hold a smaller gap to the real images in the target domain.
no code implementations • 27 Dec 2021 • Yiqing Ma, Hao Wang, Yiming Zhang, Kai Chen
ByteScheduler partitions and rearranges tensor transmissions to improve the communication efficiency of distributed Deep Neural Network (DNN) training.
2 code implementations • 4 Dec 2021 • Zhao Yang, Jiaqi Wang, Yansong Tang, Kai Chen, Hengshuang Zhao, Philip H. S. Torr
Referring image segmentation is a fundamental vision-language task that aims to segment out an object referred to by a natural language expression from an image.
Ranked #1 on
Referring Expression Segmentation
on RefCOCO+ testA
1 code implementation • NeurIPS 2021 • Yuhang Cao, Jiaqi Wang, Ying Jin, Tong Wu, Kai Chen, Ziwei Liu, Dahua Lin
1) In the association step, in contrast to implicitly leveraging multiple base classes, we construct a compact novel class feature space via explicitly imitating a specific base class feature space.
no code implementations • 22 Nov 2021 • Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang
In this paper, we propose DBIA, a novel data-free backdoor attack against the CV-oriented transformer networks, leveraging the inherent attention mechanism of transformers to generate triggers and injecting the backdoor using the poisoned surrogate dataset.
1 code implementation • 29 Oct 2021 • Kai Chen, Zhipeng Wei, Jingjing Chen, Zuxuan Wu, Yu-Gang Jiang
On both UCF-101 and HMDB-51 datasets, our BSC attack method can achieve about 90\% fooling rate when attacking three mainstream video recognition models, while only occluding \textless 8\% areas in the video.
no code implementations • 25 Oct 2021 • Rui Xu, Xiangyu Xu, Kai Chen, Bolei Zhou, Chen Change Loy
Transformer becomes prevalent in computer vision, especially for high-level vision tasks.
no code implementations • 17 Oct 2021 • Zhong-qi K. Tian, Kai Chen, Songting Li, David W. McLaughlin, Douglas Zhou
However, the interpretation of causal connectivity remains to be fully clarified, in particular, how causal connectivity depends on causality measures and how causal connectivity relates to structural connectivity.
no code implementations • 29 Sep 2021 • Kai Chen, Yongqiang Ma, Mingyang Sheng, Nanning Zheng
Inspired by the mechanism of human visual attention, in this paper, we propose a novel method of reconstructing visual stimulus images, which first decodes the distribution of visual attention from fMRI, and then reconstructs the visual images guided by visual attention.
1 code implementation • 8 Sep 2021 • Tao Gong, Kai Chen, Xinjiang Wang, Qi Chu, Feng Zhu, Dahua Lin, Nenghai Yu, Huamin Feng
In this work, considering the features of the same object instance are highly similar among frames in a video, a novel Temporal RoI Align operator is proposed to extract features from other frames feature maps for current frame proposals by utilizing feature similarity.
Ranked #1 on
Video Instance Segmentation
on YouTube-VIS
1 code implementation • ICCV 2021 • Kai Chen, Lanqing Hong, Hang Xu, Zhenguo Li, Dit-yan Yeung
By pre-training on SODA10M, a large-scale autonomous driving dataset, MultiSiam exceeds the ImageNet pre-trained MoCo-v2, demonstrating the potential of domain-specific pre-training.
no code implementations • 23 Aug 2021 • Jiangmiao Pang, Kai Chen, Qi Li, Zhihai Xu, Huajun Feng, Jianping Shi, Wanli Ouyang, Dahua Lin
In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels - sample level, feature level, and objective level.
no code implementations • 19 Aug 2021 • Jiaze Wang, Kai Chen, Qi Dou
Furthermore, we design a recurrent reconstruction network for iterative residual refinement to progressively improve the reconstruction and correspondence estimations from coarse to fine.
no code implementations • 18 Aug 2021 • Liu Yang, Ben Tan, Bo Liu, Vincent W. Zheng, Kai Chen, Qiang Yang
Federated masked matrix factorization could protect the data privacy in federated recommender systems without sacrificing efficiency or efficacy.
no code implementations • 16 Aug 2021 • Cengguang Zhang, Junxue Zhang, Di Chai, Kai Chen
In this paper, we present Aegis, a trusted, automatic, and accurate verification framework to verify the security of VFL jobs.
1 code implementation • 14 Aug 2021 • Zhanghui Kuang, Hongbin Sun, Zhizhong Li, Xiaoyu Yue, Tsui Hin Lin, Jianyong Chen, Huaqiang Wei, Yiqin Zhu, Tong Gao, Wenwei Zhang, Kai Chen, Wayne Zhang, Dahua Lin
We present MMOCR-an open-source toolbox which provides a comprehensive pipeline for text detection and recognition, as well as their downstream tasks such as named entity recognition and key information extraction.
1 code implementation • 2 Aug 2021 • Shuang Li, Bingfeng Han, Zhenjie Yu, Chi Harold Liu, Kai Chen, Shuigen Wang
Human vision is often adversely affected by complex environmental factors, especially in night vision scenarios.
no code implementations • 29 Jul 2021 • Xiaodian Cheng, Wanhang Lu, Xinyang Huang, Shuihai Hu, Kai Chen
In recent years, federated learning (FL) has been widely applied for supporting decentralized collaborative learning scenarios.
no code implementations • 30 Jun 2021 • Xu Geng, Yilun Jin, Zhengfei Zheng, Yu Yang, Yexin Li, Han Tian, Peibo Duan, Leye Wang, Jiannong Cao, Hai Yang, Qiang Yang, Kai Chen
Data-driven approaches have been applied to many problems in urban computing.
1 code implementation • NeurIPS 2021 • Wenwei Zhang, Jiangmiao Pang, Kai Chen, Chen Change Loy
The framework, named K-Net, segments both instances and semantic categories consistently by a group of learnable kernels, where each kernel is responsible for generating a mask for either a potential instance or a stuff class.
Ranked #4 on
Panoptic Segmentation
on COCO test-dev
no code implementations • 21 Jun 2021 • Jianhua Han, Xiwen Liang, Hang Xu, Kai Chen, Lanqing Hong, Jiageng Mao, Chaoqiang Ye, Wei zhang, Zhenguo Li, Xiaodan Liang, Chunjing Xu
Experiments show that SODA10M can serve as a promising pre-training dataset for different self-supervised learning methods, which gives superior performance when fine-tuning with different downstream tasks (i. e., detection, semantic/instance segmentation) in autonomous driving domain.
no code implementations • CVPR 2021 • Haoang Li, Kai Chen, Ji Zhao, Jiangliu Wang, Pyojin Kim, Zhe Liu, Yun-hui Liu
In contrast, we propose the first approach suitable for both structured and unstructured scenes.
no code implementations • 21 May 2021 • Shijie Fang, Yuhang Cao, Xinjiang Wang, Kai Chen, Dahua Lin, Wayne Zhang
The performance of object detection, to a great extent, depends on the availability of large annotated datasets.
no code implementations • 13 May 2021 • Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu
Compared to the method of retraining from scratch, our approach can achieve 99. 0%, 95. 0%, 91. 9%, 96. 7%, 74. 1% accuracy rates and 66. 7$\times$, 75. 0$\times$, 33. 3$\times$, 29. 4$\times$, 13. 7$\times$ speedups on the MNIST, SVHN, CIFAR-10, Purchase, and ImageNet datasets, respectively.
2 code implementations • 28 Apr 2021 • Haodong Duan, Yue Zhao, Kai Chen, Dahua Lin, Bo Dai
In this work, we propose PoseC3D, a new approach to skeleton-based action recognition, which relies on a 3D heatmap stack instead of a graph sequence as the base representation of human skeletons.
1 code implementation • 25 Mar 2021 • Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li
Most existing solutions embed backdoors in DNN model training such that DNN ownership can be verified by triggering distinguishable model behaviors with a set of secret inputs.
1 code implementation • 19 Mar 2021 • Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, XiaoFeng Wang, Shanqing Guo
In this paper, we present our systematization of knowledge for ASR security and provide a comprehensive taxonomy for existing work based on a modularized workflow.
no code implementations • 18 Mar 2021 • Kai Chen, Qinglei Kong, Yijue Dai, Yue Xu, Feng Yin, Lexi Xu, Shuguang Cui
Empowered by big data and machine learning, next-generation data-driven communication systems will be intelligent with the characteristics of expressiveness, scalability, interpretability, and especially uncertainty modeling, which can confidently involve diversified latent demands and personalized services in the foreseeable future.
1 code implementation • 18 Mar 2021 • Zheng Huang, Kai Chen, Jianhua He, Xiang Bai, Dimosthenis Karatzas, Shjian Lu, C. V. Jawahar
In this competition, we set up three tasks, namely, Scanned Receipt Text Localisation (Task 1), Scanned Receipt OCR (Task 2) and Key Information Extraction from Scanned Receipts (Task 3).
1 code implementation • 10 Feb 2021 • Kai Chen, Guang Chen, Dan Xu, Lijun Zhang, Yuyao Huang, Alois Knoll
Although Transformer has made breakthrough success in widespread domains especially in Natural Language Processing (NLP), applying it to time series forecasting is still a great challenge.
1 code implementation • 8 Feb 2021 • Kai Chen, Qi Lv, Taihe Yi
In addition, an identification preserving loss is proposed to improve the discriminative of the MLS metric, and a multi-layer feature fusion module is proposed to improve the neural network's uncertainty estimation ability.
no code implementations • ICCV 2021 • Haoang Li, Kai Chen, Pyojin Kim, Kuk-Jin Yoon, Zhe Liu, Kyungdon Joo, Yun-hui Liu
Based on this map, we can detect all the VPs.
no code implementations • ICCV 2021 • Kai Chen, Qi Dou
The prior adaptation intrinsically associates the adopted prior with different objects, from which we can accurately reconstruct the 3D canonical model of the specific object for pose estimation.
no code implementations • 24 Dec 2020 • Yangyang Qu, Kai Chen, Chao Liu, Yongsheng Ou
To address this problem, we propose a real-time unsupervised generative adversarial network (GAN) containing multiple discriminators, i. e. a multi-scale discriminator, a texture discriminator, and a color discriminator.
no code implementations • 22 Dec 2020 • Kai Chen, Meng Niu, Qingcai Chen
In this work, we propose a Hierarchical Reasoning Graph Neural Network (HRGNN) for the automatic assessment of question-answer pairs.
no code implementations • CVPR 2021 • Rui Xu, Xintao Wang, Kai Chen, Bolei Zhou, Chen Change Loy
In this work, taking SinGAN and StyleGAN2 as examples, we show that such capability, to a large extent, is brought by the implicit positional encoding when using zero padding in the generators.
no code implementations • 7 Dec 2020 • Jiaqi Wang, Kai Chen, Rui Xu, Ziwei Liu, Chen Change Loy, Dahua Lin
Feature reassembly, i. e. feature downsampling and upsampling, is a key operation in a number of modern convolutional network architectures, e. g., residual networks and feature pyramids.
no code implementations • 25 Nov 2020 • Linhao Luo, Liqi Yang, Ju Xin, Yixiang Fang, Xiaofeng Zhang, Xiaofei Yang, Kai Chen, Zhiyuan Zhang, Kai Liu
In particular, we technically propose a novel random CNN component that can randomly convolute non-adjacent features to capture their interaction information and learn feature embeddings of key attributes to make the final recommendation.
1 code implementation • 19 Nov 2020 • Di Chai, Leye Wang, Kai Chen, Qiang Yang
As an innovative solution for privacy-preserving machine learning (ML), federated learning (FL) is attracting much attention from research and industry areas.
no code implementations • 8 Nov 2020 • Kai Chen, Twan van Laarhoven, Elena Marchiori
The heavy tail and skewness characteristics of such distributions in the spectral domain allow to capture long-range covariance of the signal in the time domain.
no code implementations • 5 Oct 2020 • Andrea Amorese, Andrea Marino, Martin Sundermann, Kai Chen, Zhiwei Hu, Thomas Willers, Fadi Choukani, Philippe Ohresser, Javier Herrero-Martin, Stefano Agrestini, Chien-Te Chen, Hong-Ji Lin, Maurits W. Haverkort, Silvia Seiro, Christoph Geibel, Frank Steglich, Liu Hao Tjeng, Gertrud Zwicknagl, Andrea Severing
The crystal-field ground state wave function of CeCu$_2$Si$_2$ has been investigated with linear polarized $M$-edge x-ray absorption spectroscopy from 250mK to 250K, thus covering the superconducting ($T_{\text{c}}$=0. 6K), the Kondo ($T_{\text{K}}$$\approx$20K) as well as the Curie-Weiss regime.
Strongly Correlated Electrons
1 code implementation • 20 Sep 2020 • Leye Wang, Di Chai, Xuanzhe Liu, Liyue Chen, Kai Chen
The Spatio-Temporal Traffic Prediction (STTP) problem is a classical problem with plenty of prior research efforts that benefit from traditional statistical learning and recent deep learning approaches.
2 code implementations • CVPR 2021 • Jiaqi Wang, Wenwei Zhang, Yuhang Zang, Yuhang Cao, Jiangmiao Pang, Tao Gong, Kai Chen, Ziwei Liu, Chen Change Loy, Dahua Lin
Instances of head classes dominate a long-tailed dataset and they serve as negative samples of tail categories.
no code implementations • 16 Aug 2020 • Hao Wang, Jingrong Chen, Xinchen Wan, Han Tian, Jiacheng Xia, Gaoxiong Zeng, Weiyan Wang, Kai Chen, Wei Bai, Junchen Jiang
Communication overhead poses an important obstacle to distributed DNN training and draws increasing attention in recent years.
no code implementations • 21 Jul 2020 • Zhaoxiong Yang, Shuihai Hu, Kai Chen
Our framework implements the representative Paillier homomorphic cryptosystem with high level synthesis for flexibility and portability, with careful optimization on the modular multiplication operation in terms of processing clock cycle, resource usage and clock frequency.
no code implementations • 7 Jul 2020 • Weiyan Wang, Cengguang Zhang, Liu Yang, Kai Chen, Kun Tan
However, due to the global synchronization nature, its performance can be significantly influenced by network bottlenecks caused by either static topology heterogeneity or dynamic bandwidth contentions.
1 code implementation • 16 May 2020 • Zhaoyi Gu, Lele Liao, Kai Chen, Jing Lu
Extracting the desired speech from a mixture is a meaningful and challenging task.
1 code implementation • 15 May 2020 • Hongsheng Chen, Teng Xiang, Kai Chen, Jing Lu
Acoustic echo cannot be entirely removed by linear adaptive filters due to the nonlinear relationship between the echo and far-end signal.
no code implementations • 16 Apr 2020 • Kai Chen, Fayuan Li, Baotian Hu, Weihua Peng, Qingcai Chen, Hong Yu
We further design a reconstruction mechanism with a novel objective function that can reconstruct the whole entry of the used data sequentially from the hidden states of the decoder, which aids the accuracy of the generated text.
1 code implementation • 7 Apr 2020 • Kai Chen, Yuhang Cao, Chen Change Loy, Dahua Lin, Christoph Feichtenhofer
Feature pyramid networks have been widely adopted in the object detection literature to improve feature representations for better handling of variations in scale.
no code implementations • 6 Apr 2020 • Kai Chen, Jian Yao, Jingmin Tu, Yahui Liu, Yinxuan Li, Li Li
Recently, works on improving the naturalness of stitching images gain more and more extensive attention.
no code implementations • 30 Dec 2019 • Qinghe Jing, Weiyan Wang, Junxue Zhang, Han Tian, Kai Chen
The scarcity of data and isolated data islands encourage different organizations to share data with each other to train machine learning models.
no code implementations • 23 Dec 2019 • Yi-Zheng Zhen, Yingqiu Mao, Kai Chen, Francesco Buscemi, Oscar Dahlsten
The ability of quantum devices to preserve or distribute entanglement is essential in employing quantum technologies.
Quantum Physics
1 code implementation • ECCV 2020 • Jiaqi Wang, Wenwei Zhang, Yuhang Cao, Kai Chen, Jiangmiao Pang, Tao Gong, Jianping Shi, Chen Change Loy, Dahua Lin
To tackle the difficulty of precise localization in the presence of displacements with large variance, we further propose a two-step localization scheme, which first predicts a range of movement through bucket prediction and then pinpoints the precise position within the predicted bucket.
no code implementations • 28 Nov 2019 • Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude some findings in multiple views.
no code implementations • 21 Nov 2019 • Jiaxu Chen, Jing Hao, Kai Chen, Di Xie, Shicai Yang, ShiLiang Pu
This paper introduces an end-to-end audio classification system based on raw waveforms and mix-training strategy.
1 code implementation • 21 Nov 2019 • Yongchao Xu, Mingtao Fu, Qimeng Wang, Yukang Wang, Kai Chen, Gui-Song Xia, Xiang Bai
Yet, the widely adopted horizontal bounding box representation is not appropriate for ubiquitous oriented objects such as objects in aerial images and scene texts.
Ranked #24 on
Object Detection In Aerial Images
on DOTA
11 code implementations • 20 Nov 2019 • Minghui Liao, Zhaoyi Wan, Cong Yao, Kai Chen, Xiang Bai
Recently, segmentation-based methods are quite popular in scene text detection, as the segmentation results can more accurately describe scene text of various shapes such as curve text.
Ranked #5 on
Scene Text Detection
on SCUT-CTW1500
(F-Measure metric)
no code implementations • 14 Aug 2019 • Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu
In cloud security, traditional searchable encryption (SE) requires high computation and communication overhead for dynamic search and update.
no code implementations • 7 Aug 2019 • Kai Chen, Zhongrui Lin, Jian Wan, Lei Xu, Chungen Xu
To address this, this paper proposes secure and efficient multi-keyword ranked search over encrypted cloud data for multi-owner model based on searching adversarial networks.
146 code implementations • 17 Jun 2019 • Kai Chen, Jiaqi Wang, Jiangmiao Pang, Yuhang Cao, Yu Xiong, Xiaoxiao Li, Shuyang Sun, Wansen Feng, Ziwei Liu, Jiarui Xu, Zheng Zhang, Dazhi Cheng, Chenchen Zhu, Tianheng Cheng, Qijie Zhao, Buyu Li, Xin Lu, Rui Zhu, Yue Wu, Jifeng Dai, Jingdong Wang, Jianping Shi, Wanli Ouyang, Chen Change Loy, Dahua Lin
In this paper, we introduce the various features of this toolbox.
no code implementations • 12 Jun 2019 • Di Chai, Leye Wang, Kai Chen, Qiang Yang
The key principle of federated learning is training a machine learning model without needing to know each user's personal raw private data.
no code implementations • ACL 2019 • Nan Du, Kai Chen, Anjuli Kannan, Linh Tran, Yu-Hui Chen, Izhak Shafran
This paper describes novel models tailored for a new application, that of extracting the symptoms mentioned in clinical conversations along with their status.
2 code implementations • ICCV 2019 • Jiaqi Wang, Kai Chen, Rui Xu, Ziwei Liu, Chen Change Loy, Dahua Lin
CARAFE introduces little computational overhead and can be readily integrated into modern network architectures.
1 code implementation • CVPR 2020 • Yuhang Cao, Kai Chen, Chen Change Loy, Dahua Lin
Our experiments demonstrate that it is often more effective to focus on prime samples than hard samples when training a detector.
5 code implementations • CVPR 2019 • Jiangmiao Pang, Kai Chen, Jianping Shi, Huajun Feng, Wanli Ouyang, Dahua Lin
In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels - sample level, feature level, and objective level.
Ranked #130 on
Object Detection
on COCO test-dev
5 code implementations • CVPR 2019 • Kai Chen, Jiangmiao Pang, Jiaqi Wang, Yu Xiong, Xiaoxiao Li, Shuyang Sun, Wansen Feng, Ziwei Liu, Jianping Shi, Wanli Ouyang, Chen Change Loy, Dahua Lin
In exploring a more effective approach, we find that the key to a successful instance segmentation cascade is to fully leverage the reciprocal relationship between detection and segmentation.
Ranked #27 on
Instance Segmentation
on COCO test-dev
2 code implementations • CVPR 2019 • Jiaqi Wang, Kai Chen, Shuo Yang, Chen Change Loy, Dahua Lin
State-of-the-art detectors mostly rely on a dense anchoring scheme, where anchors are sampled uniformly over the spatial domain with a predefined set of scales and aspect ratios.
Ranked #1 on
Region Proposal
on COCO test-dev
no code implementations • 26 Dec 2018 • Yue Zhao, Hong Zhu, Ruigang Liang, Qintao Shen, Shengzhi Zhang, Kai Chen
In this paper, we presented systematic solutions to build robust and practical AEs against real world object detectors.
no code implementations • 18 Sep 2018 • Kai Chen, Jingmin Tu, Jian Yao
Content-Preserving Warping (CPW) is a typical method to deal with this issue, in which geometric and photometric constraints are imposed to guide the warping process.
no code implementations • 18 Sep 2018 • Kai Chen, Jingmin Tu, Binbin Xiang, Li Li, Jian Yao
In this paper, geometric and photometric constraints are combined to improve the alignment quality, which is based on the observation that these two kinds of constraints are complementary.
no code implementations • 7 Aug 2018 • Kai Chen, Twan van Laarhoven, Perry Groot, Jinsong Chen, Elena Marchiori
The resulting kernel is called Multi-Output Convolution Spectral Mixture (MOCSM) kernel.
no code implementations • 3 Aug 2018 • Kai Chen, Twan van Laarhoven, Elena Marchiori, Feng Yin, Shuguang Cui
The function interaction is modeled by using cross convolution of latent functions.
no code implementations • 2 Aug 2018 • Yuting Gao, Zheng Huang, Yuchen Dai, Cheng Xu, Kai Chen, Jie Tuo
In this paper, we propose Double Supervised Network with Attention Mechanism (DSAN), a novel end-to-end trainable framework for scene text recognition.
no code implementations • 1 Aug 2018 • Kai Chen, Yijue Dai, Feng Yin, Elena Marchiori, Sergios Theodoridis
By verifying the presence of dependencies between function components using Gaussian conditionals and posterior covariance, we first propose a new SM kernel variant with a time and phase delay dependency structure (SMD) and then provide a structure adaptation (SA) algorithm for the SMD.
16 code implementations • ICLR 2018 • Adams Wei Yu, David Dohan, Minh-Thang Luong, Rui Zhao, Kai Chen, Mohammad Norouzi, Quoc V. Le
On the SQuAD dataset, our model is 3x to 13x faster in training and 4x to 9x faster in inference, while achieving equivalent accuracy to recurrent models.
Ranked #28 on
Question Answering
on SQuAD1.1 dev
1 code implementation • CVPR 2018 • Kai Chen, Jiaqi Wang, Shuo Yang, Xingcheng Zhang, Yuanjun Xiong, Chen Change Loy, Dahua Lin
High-performance object detection relies on expensive convolutional networks to compute features, often leading to significant challenges in applications, e. g. those that require detecting objects from video streams in real time.
1 code implementation • 13 Feb 2018 • Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiao-Feng Wang, Haixu Tang, Carl A. Gunter, Kai Chen
Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model.
no code implementations • 24 Jan 2018 • Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiao-Feng Wang, Carl A. Gunter
For this purpose, we developed novel techniques that address a key technical challenge: integrating the commands into a song in a way that can be effectively recognized by ASR through the air, in the presence of background noise, while not being detected by a human listener.
no code implementations • 24 Jan 2018 • Alvin Rajkomar, Eyal Oren, Kai Chen, Andrew M. Dai, Nissan Hajaj, Peter J. Liu, Xiaobing Liu, Mimi Sun, Patrik Sundberg, Hector Yee, Kun Zhang, Gavin E. Duggan, Gerardo Flores, Michaela Hardt, Jamie Irvine, Quoc Le, Kurt Litsch, Jake Marcus, Alexander Mossin, Justin Tansuwan, De Wang, James Wexler, Jimbo Wilson, Dana Ludwig, Samuel L. Volchenboum, Katherine Chou, Michael Pearson, Srinivasan Madabushi, Nigam H. Shah, Atul J. Butte, Michael Howell, Claire Cui, Greg Corrado, Jeff Dean
Predictive modeling with electronic health record (EHR) data is anticipated to drive personalized medicine and improve healthcare quality.
no code implementations • 5 Jan 2018 • Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Cryptography and Security
no code implementations • 11 Sep 2017 • Yuchen Dai, Zheng Huang, Yuting Gao, Youxuan Xu, Kai Chen, Jie Guo, Weidong Qiu
In this paper, we introduce a novel end-end framework for multi-oriented scene text detection from an instance-aware semantic segmentation perspective.
Ranked #10 on
Scene Text Detection
on MSRA-TD500
3 code implementations • 1 Aug 2017 • Xiaoxiao Li, Yuankai Qi, Zhe Wang, Kai Chen, Ziwei Liu, Jianping Shi, Ping Luo, Xiaoou Tang, Chen Change Loy
Specifically, our Video Object Segmentation with Re-identification (VS-ReID) model includes a mask propagation module and a ReID module.
1 code implementation • CVPR 2017 • Kai Chen, Hang Song, Chen Change Loy, Dahua Lin
Despite the remarkable progress in recent years, detecting objects in a new context remains a challenging task.
no code implementations • 5 Apr 2017 • Kai Chen, Mathias Seuret
This paper presents a Convolutional Neural Network (CNN) based page segmentation method for handwritten historical document images.
no code implementations • 28 Mar 2017 • Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, Xiao-Feng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin
We systemize this process, by proposing a taxonomy for the IoT ecosystem and organizing IoT security into five problem areas.
Cryptography and Security
no code implementations • 14 Nov 2016 • Kai Chen, Wenbing Tao
In this paper, we propose a Convolutional Regression framework for visual tracking (CRT).
no code implementations • 2 Nov 2016 • Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu
We present novel ideas and techniques to resolve the challenges, and have built the first system for symbolic execution of Android Framework.
Cryptography and Security Software Engineering
no code implementations • 26 Apr 2016 • Kai Chen, Wenbing Tao
As a result, the model need to be initialized and retrained for different objects.
no code implementations • 7 Apr 2016 • Xiaohang Ren, Kai Chen, Jun Sun
In this paper, we propose a CNN based scene text detection algorithm with a new text region extractor.
no code implementations • 7 Apr 2016 • Xiaohang Ren, Kai Chen, Jun Sun
The proposed Chinese text recognition algorithm is evaluated with two Chinese text datasets.
40 code implementations • NeurIPS 2013 • Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, Jeffrey Dean
Motivated by this example, we present a simple method for finding phrases in text, and show that learning good vector representations for millions of phrases is possible.
70 code implementations • 16 Jan 2013 • Tomas Mikolov, Kai Chen, Greg Corrado, Jeffrey Dean
We propose two novel model architectures for computing continuous vector representations of words from very large data sets.
no code implementations • NeurIPS 2012 • Jeffrey Dean, Greg Corrado, Rajat Monga, Kai Chen, Matthieu Devin, Mark Mao, Marc'Aurelio Ranzato, Andrew Senior, Paul Tucker, Ke Yang, Quoc V. Le, Andrew Y. Ng
Recent work in unsupervised feature learning and deep learning has shown that being able to train large models can dramatically improve performance.
1 code implementation • 17 Aug 2012 • Kai Chen, Kai Niu, Jia-Ru Lin
As improved versions of successive cancellation (SC) decoding algorithm, successive cancellation list (SCL) decoding and successive cancellation stack (SCS) decoding are used to improve the finite-length performance of polar codes.
Information Theory Information Theory
1 code implementation • 29 Dec 2011 • Quoc V. Le, Marc'Aurelio Ranzato, Rajat Monga, Matthieu Devin, Kai Chen, Greg S. Corrado, Jeff Dean, Andrew Y. Ng
For example, is it possible to learn a face detector using only unlabeled images?