no code implementations • ICML 2020 • Yangsibo Huang, Zhao Song, Sanjeev Arora, Kai Li
The new ideas in the current paper are: (a) new variants of mixup with negative as well as positive coefficients, and extend the sample-wise mixup to be pixel-wise.
no code implementations • 6 Dec 2023 • Kai Li, Yi Luo
Deploying neural networks to different devices or platforms is in general challenging, especially when the model size is large or model complexity is high.
no code implementations • 6 Dec 2023 • Siguo Bi, Kai Li, Shuyan Hu, Wei Ni, Cong Wang, Xin Wang
Detecting spoofing attacks on the positions of unmanned aerial vehicles (UAVs) within a swarm is challenging.
no code implementations • 30 Nov 2023 • Kai Li, Jingjing Zheng, Xin Yuan, Wei Ni, Ozgur B. Akan, H. Vincent Poor
The attacker then adversarially regenerates the graph structural correlations while maximizing the FL training loss, and subsequently generates malicious local models using the adversarial graph structure and the training data features of the benign ones.
no code implementations • 20 Nov 2023 • Shiying Wang, Xuechao Zou, Kai Li, Junliang Xing, Pin Tao
Pansharpening, a pivotal task in remote sensing, involves integrating low-resolution multispectral images with high-resolution panchromatic images to synthesize an image that is both high-resolution and retains multispectral information.
1 code implementation • 20 Nov 2023 • Chunming He, Chengyu Fang, Yulun Zhang, Kai Li, Longxiang Tang, Chenyu You, Fengyang Xiao, Zhenhua Guo, Xiu Li
These priors are subsequently utilized by RGformer to guide the decomposition of image features into their respective reflectance and illumination components.
no code implementations • 25 Oct 2023 • Kai Li, Yupeng Deng, Yunlong Kong, Diyou Liu, Jingbo Chen, Yu Meng, Junxian Ma
Accurate measurement of the offset from roof-to-footprint in very-high-resolution remote sensing imagery is crucial for urban information extraction tasks.
1 code implementation • 10 Oct 2023 • Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen
Finally, we propose an effective alignment method that explores diverse generation strategies, which can reasonably reduce the misalignment rate under our attack.
no code implementations • 29 Sep 2023 • Samuel Pegg, Kai Li, Xiaolin Hu
We model and capture the time and frequency dimensions of the audio independently using a multi-layered RNN along each dimension.
no code implementations • 25 Sep 2023 • Kai Li, Jonathan Chan
This paper proposes a deep learning pipeline that incorporates XAI to address the challenges of organ segmentation.
no code implementations • 16 Aug 2023 • Ben Chen, Xuechao Zou, Kai Li, Yu Zhang, Junliang Xing, Pin Tao
The extraction of lakes from remote sensing images is a complex challenge due to the varied lake shapes and data noise.
no code implementations • 16 Aug 2023 • Kai Li, Runxuan Yang, Xiaolin Hu
The integration of different modalities, such as audio and visual information, plays a crucial role in human perception of the surrounding environment.
no code implementations • 14 Aug 2023 • Stefan Uhlich, Giorgio Fabbro, Masato Hirano, Shusuke Takahashi, Gordon Wichern, Jonathan Le Roux, Dipam Chakraborty, Sharada Mohanty, Kai Li, Yi Luo, Jianwei Yu, Rongzhi Gu, Roman Solovyev, Alexander Stempkovskiy, Tatiana Habruseva, Mikhail Sukhovei, Yuki Mitsufuji
This paper summarizes the cinematic demixing (CDX) track of the Sound Demixing Challenge 2023 (SDX'23).
no code implementations • 8 Aug 2023 • Ben Chen, Xuechao Zou, Yu Zhang, Jiayu Li, Kai Li, Pin Tao
LEFormer contains four main modules: CNN encoder, Transformer encoder, cross-encoder fusion, and lightweight decoder.
no code implementations • 8 Aug 2023 • Xuechao Zou, Kai Li, Junliang Xing, Yu Zhang, Shiying Wang, Lei Jin, Pin Tao
Optical satellite images are a critical data source; however, cloud cover often compromises their quality, hindering image applications and analysis.
no code implementations • 6 Aug 2023 • Chunming He, Kai Li, Yachao Zhang, Yulun Zhang, Zhenhua Guo, Xiu Li, Martin Danelljan, Fisher Yu
On the prey side, we propose an adversarial training framework, Camouflageator, which introduces an auxiliary generator to generate more camouflaged objects that are harder for a COD method to detect.
no code implementations • 3 Aug 2023 • Longxiang Tang, Kai Li, Chunming He, Yulun Zhang, Xiu Li
In this paper, we propose a consistency regularization framework to develop a more generalizable SFDA method, which simultaneously boosts model performance on both target training and testing datasets.
no code implementations • 19 Jul 2023 • Xiaohong Liu, Xiongkuo Min, Wei Sun, Yulun Zhang, Kai Zhang, Radu Timofte, Guangtao Zhai, Yixuan Gao, Yuqin Cao, Tengchuan Kou, Yunlong Dong, Ziheng Jia, Yilin Li, Wei Wu, Shuming Hu, Sibin Deng, Pengxiang Xiao, Ying Chen, Kai Li, Kai Zhao, Kun Yuan, Ming Sun, Heng Cong, Hao Wang, Lingzhi Fu, Yusheng Zhang, Rongyu Zhang, Hang Shi, Qihang Xu, Longan Xiao, Zhiliang Ma, Mirko Agarla, Luigi Celona, Claudio Rota, Raimondo Schettini, Zhiwei Huang, Yanan Li, Xiaotao Wang, Lei Lei, Hongye Liu, Wei Hong, Ironhead Chuang, Allen Lin, Drake Guan, Iris Chen, Kae Lou, Willy Huang, Yachun Tasi, Yvonne Kao, Haotian Fan, Fangyuan Kong, Shiqi Zhou, Hao liu, Yu Lai, Shanshan Chen, Wenqi Wang, HaoNing Wu, Chaofeng Chen, Chunzheng Zhu, Zekun Guo, Shiling Zhao, Haibing Yin, Hongkui Wang, Hanene Brachemi Meftah, Sid Ahmed Fezza, Wassim Hamidouche, Olivier Déforges, Tengfei Shi, Azadeh Mansouri, Hossein Motamednia, Amir Hossein Bakhtiari, Ahmad Mahmoudi Aznaveh
61 participating teams submitted their prediction results during the development phase, with a total of 3168 submissions.
no code implementations • 17 Jul 2023 • Yuzhuo Wang, Kai Li
However, software is hardly consistently cited: one software entity can be cited as different objects, and the citations can change over time.
no code implementations • 15 Jul 2023 • Chunming He, Kai Li, Guoxia Xu, Jiangpeng Yan, Longxiang Tang, Yulun Zhang, Xiu Li, YaoWei Wang
Specifically, we extract features from an HQ image and explicitly insert the features, which are expected to encode HQ cues, into the enhancement network to guide the LQ enhancement with the variational normalization module.
1 code implementation • 14 Jul 2023 • Longxiang Tang, Kai Li, Chunming He, Yulun Zhang, Xiu Li
This paper aims to address these two issues by proposing the Class-Balanced Mean Teacher (CBMT) model.
no code implementations • 13 Jul 2023 • Kai Li, Billy Pik Lik Lau, Xin Yuan, Wei Ni, Mohsen Guizani, Chau Yuen
In recent years, ubiquitous semantic Metaverse has been studied to revolutionize immersive cyber-virtual experiences for augmented reality (AR) and virtual reality (VR) users, which leverages advanced semantic understanding and representation to enable seamless, context-aware interactions within mixed-reality environments.
no code implementations • 8 Jul 2023 • Wenjin Li, Kai Li
The key to crossing these levels lies in training the autonomous driving model.
1 code implementation • 31 May 2023 • Héctor Martel, Julius Richter, Kai Li, Xiaolin Hu, Timo Gerkmann
We propose Audio-Visual Lightweight ITerative model (AVLIT), an effective and lightweight neural network that uses Progressive Learning (PL) to perform audio-visual speech separation in noisy environments.
no code implementations • 26 May 2023 • Chen Chen, Chao-Han Huck Yang, Kai Li, Yuchen Hu, Pin-Jui Ku, Eng Siong Chng
In this work, we introduce S4M, a new efficient speech separation framework based on neural state-space models (SSM).
1 code implementation • 24 May 2023 • Yushan Su, Vishvak Murahari, Karthik Narasimhan, Kai Li
As language models increase in size by the day, methods for efficient inference are critical to leveraging their capabilities for various applications.
1 code implementation • 24 May 2023 • Yangsibo Huang, Samyak Gupta, Zexuan Zhong, Kai Li, Danqi Chen
Crucially, we find that $k$NN-LMs are more susceptible to leaking private information from their private datastore than parametric models.
no code implementations • NeurIPS 2023 • Chunming He, Kai Li, Yachao Zhang, Guoxia Xu, Longxiang Tang, Yulun Zhang, Zhenhua Guo, Xiu Li
It remains a challenging task since (1) it is hard to distinguish concealed objects from the background due to the intrinsic similarity and (2) the sparsely-annotated training data only provide weak supervision for model learning.
no code implementations • 25 Apr 2023 • Changhao Shi, Haomiao Ni, Kai Li, Shaobo Han, Mingfu Liang, Martin Renqiang Min
We show that this paradigm based on latent classifier guidance is agnostic to pre-trained generative models, and present competitive results for both image generation and sequential manipulation of real and synthetic images.
no code implementations • 21 Apr 2023 • mengqun Jin, Kai Li, Shuyan Li, Chunming He, Xiu Li
We further propose a consistency learning based mean teacher model to effectively adapt the learned UDA model using labeled and unlabeled target samples.
Semi-supervised Domain Adaptation
Unsupervised Domain Adaptation
1 code implementation • 29 Mar 2023 • Xuechao Zou, Kai Li, Junliang Xing, Pin Tao, Yachao Cui
Satellite imagery analysis plays a pivotal role in remote sensing; however, information loss due to cloud cover significantly impedes its application.
1 code implementation • CVPR 2023 • Haomiao Ni, Changhao Shi, Kai Li, Sharon X. Huang, Martin Renqiang Min
In this paper, we propose an approach for cI2V using novel latent flow diffusion models (LFDM) that synthesize an optical flow sequence in the latent space based on the given condition to warp the given image.
no code implementations • 25 Jan 2023 • Tongzhi Niu, Bin Li, Kai Li, Yufeng Lin, Yuwei Li, Weifeng Li, Zhenrong Wang
In the surface defect detection, there are some suspicious regions that cannot be uniquely classified as abnormal or normal.
no code implementations • 11 Jan 2023 • Qiaosong Chu, Shuyan Li, Guangyi Chen, Kai Li, Xiu Li
Source-free object detection (SFOD) aims to transfer a detector pre-trained on a label-rich source domain to an unlabeled target domain without seeing source data.
no code implementations • CVPR 2023 • Chunming He, Kai Li, Yachao Zhang, Longxiang Tang, Yulun Zhang, Zhenhua Guo, Xiu Li
COD is a challenging task due to the intrinsic similarity of camouflaged objects with the background, as well as their ambiguous boundaries.
no code implementations • ICCV 2023 • Chunming He, Kai Li, Guoxia Xu, Yulun Zhang, Runze Hu, Zhenhua Guo, Xiu Li
Heterogeneous image fusion (HIF) techniques aim to enhance image quality by merging complementary information from images captured by different sensors.
no code implementations • ICCV 2023 • Haifeng Xia, Kai Li, Zhengming Ding
Federated learning casts a light on the collaboration of distributed local clients with privacy protected to attain a more generic global model.
no code implementations • ICCV 2023 • Haifeng Xia, Kai Li, Martin Renqiang Min, Zhengming Ding
This operation maximizes the contribution of discriminative frames to further capture the similarity of support and query samples from the same category.
no code implementations • CVPR 2023 • Kai Li, Deep Patel, Erik Kruus, Martin Renqiang Min
Source-free domain adaptation (SFDA) is an emerging research topic that studies how to adapt a pretrained source model using unlabeled target data.
Source-Free Domain Adaptation
Unsupervised Domain Adaptation
1 code implementation • 21 Dec 2022 • Kai Li, Fenghua Xie, Hang Chen, Kexin Yuan, Xiaolin Hu
Then, inspired by the large number of connections between cortical regions and the thalamus, the model fuses the auditory and visual information in a thalamic subnetwork through top-down connections.
Ranked #1 on
Speech Separation
on VoxCeleb2
no code implementations • 7 Dec 2022 • Siddhant Ranade, Christoph Lassner, Kai Li, Christian Haene, Shen-Chi Chen, Jean-Charles Bazin, Sofien Bouaziz
Neural Radiance Fields (NeRFs) encode the radiance in a scene parameterized by the scene's plenoptic function.
no code implementations • 7 Nov 2022 • Harrison Kurunathan, Hailong Huang, Kai Li, Wei Ni, Ekram Hossain
It is also unveiled that the reliability and trust of ML in UAV operations and applications require significant attention before full automation of UAVs and potential cooperation between UAVs and humans come to fruition.
no code implementations • 11 Oct 2022 • Xiaohui Liu, Meng Liu, Lin Zhang, Linjuan Zhang, Chang Zeng, Kai Li, Nan Li, Kong Aik Lee, Longbiao Wang, Jianwu Dang
The Audio Deep Synthesis Detection (ADD) Challenge has been held to detect generated human-like speech.
1 code implementation • 30 Sep 2022 • Kai Li, Runxuan Yang, Xiaolin Hu
In addition, a large-size version of TDANet obtained SOTA results on three datasets, with MACs still only 10\% of Sepformer and the CPU inference time only 24\% of Sepformer.
Ranked #2 on
Speech Separation
on WHAM!
no code implementations • 8 Sep 2022 • Yuzhuo Wang, Chengzhi Zhang, Kai Li
With the advancement of sciences, many scientific methods are being proposed, modified, and used in academic literature.
no code implementations • 5 Sep 2022 • Bin Ma, Yueli Hu, Xianxian Lv, Kai Li
Video denoising for raw image has always been the difficulty of camera image processing.
no code implementations • 30 Jun 2022 • Zhiwei Yu, Kai Li, Yu Ji, Simon X. Yang
Various methods are needed to narrow the gap in swimming performance between robot fishes and fish.
1 code implementation • 22 May 2022 • Fanglei Sun, Yang Li, Ying Wen, Jingchen Hu, Jun Wang, Yang Yang, Kai Li
The design of MAFENN framework and algorithm are dedicated to enhance the learning capability of the feedfoward DL networks or their variations with the simple data feedback.
1 code implementation • 17 May 2022 • Samyak Gupta, Yangsibo Huang, Zexuan Zhong, Tianyu Gao, Kai Li, Danqi Chen
For the first time, we show the feasibility of recovering text from large batch sizes of up to 128 sentences.
1 code implementation • DeeLIO (ACL) 2022 • Christopher Malon, Kai Li, Erik Kruus
We study few-shot debugging of transformer based natural language understanding models, using recently popularized test suites to not just diagnose but correct a problem.
no code implementations • 2 Apr 2022 • Kai Li, Ying Li, Lei Cheng, Qingjiang Shi, Zhi-Quan Luo
The downlink channel covariance matrix (CCM) acquisition is the key step for the practical performance of massive multiple-input and multiple-output (MIMO) systems, including beamforming, channel tracking, and user scheduling.
1 code implementation • CVPR 2022 • Zhiheng Li, Martin Renqiang Min, Kai Li, Chenliang Xu
Based on the identified latent directions of attributes, we propose Compositional Attribute Adjustment to adjust the latent code, resulting in better compositionality of image synthesis.
1 code implementation • 15 Feb 2022 • Jingjing Zheng, Kai Li, Naram Mhaisen, Wei Ni, Eduardo Tovar, Mohsen Guizani
Federated learning (FL) has been increasingly considered to preserve data training privacy from eavesdropping attacks in mobile edge computing-based Internet of Thing (EdgeIoT).
1 code implementation • NeurIPS 2021 • Yangsibo Huang, Samyak Gupta, Zhao Song, Kai Li, Sanjeev Arora
Gradient inversion attack (or input recovery from gradient) is an emerging threat to the security and privacy preservation of Federated learning, whereby malicious eavesdroppers or participants in the protocol can recover (partially) the clients' private data.
no code implementations • NeurIPS Workshop DBAI 2021 • Kai Li, Qi Zhang, Lei Yu, Hong Min
Buffer cache has been widely implemented in database systems to reduce disk I/Os.
no code implementations • ICLR 2022 • Haobo Fu, Weiming Liu, Shuang Wu, Yijia Wang, Tao Yang, Kai Li, Junliang Xing, Bin Li, Bo Ma, Qiang Fu, Yang Wei
The deep policy gradient method has demonstrated promising results in many large-scale games, where the agent learns purely from its own experience.
2 code implementations • 13 Sep 2021 • Kai Li, Jie Yang, Siwei Ma, Bo wang, Shanshe Wang, Yingjie Tian, Zhiquan Qi
For the second issue, we reconsider how to improve detection efficiency with excellent performance, and then propose our lightweight encoder-decoder architecture termed CarNet.
1 code implementation • 8 Sep 2021 • Yangsibo Huang, Xiaoxiao Li, Kai Li
In this paper, we propose a new method called Ensembled Membership Auditing (EMA) for auditing data removal to overcome these limitations.
1 code implementation • 6 Jul 2021 • Weixin Jiang, Eric Schwenker, Trevor Spreadbury, Kai Li, Maria K. Y. Chan, Oliver Cossairt
In scientific literature, XANES/Raman data are usually plotted in line graphs which is a visually appropriate way to represent the information when the end-user is a human reader.
no code implementations • 29 Jun 2021 • Kai Li, Bo wang, Yingjie Tian, Zhiquan Qi
Numerous detection problems in computer vision, including road crack detection, suffer from exceedingly foreground-background imbalance.
no code implementations • CVPR 2021 • Yulun Zhang, Kai Li, Kunpeng Li, Yun Fu
They also fail to sense the entire space of the input, which is critical for high-quality MR image SR. To address those problems, we propose squeeze and excitation reasoning attention networks (SERAN) for accurate MR image SR. We propose to squeeze attention from global spatial information of the input and obtain global descriptors.
Ranked #2 on
Image Super-Resolution
on IXI
no code implementations • 1 Jun 2021 • Tianze Zhou, Fubiao Zhang, Kun Shao, Kai Li, Wenhan Huang, Jun Luo, Weixun Wang, Yaodong Yang, Hangyu Mao, Bin Wang, Dong Li, Wulong Liu, Jianye Hao
In addition, we use a novel agent network named Population Invariant agent with Transformer (PIT) to realize the coordination transfer in more varieties of scenarios.
1 code implementation • NeurIPS 2021 • Yifan Zang, Jinmin He, Kai Li, Lily Cao, Haobo Fu, Qiang Fu, Junliang Xing
In this paper, we propose a cooperative MARL method with sequential credit assignment (SeCA) that deduces each agent's contribution to the team's success one by one to learn better cooperation.
1 code implementation • ICCV 2021 • Kai Li, Chang Liu, Handong Zhao, Yulun Zhang, Yun Fu
This paper studies Semi-Supervised Domain Adaptation (SSDA), a practical yet under-investigated research topic that aims to learn a model of good performance using unlabeled samples and a few labeled samples in the target domain, with the help of labeled samples from a source domain.
no code implementations • 18 Apr 2021 • Kai Li, Curtis Wigington, Chris Tensmeyer, Vlad I. Morariu, Handong Zhao, Varun Manjunatha, Nikolaos Barmpalios, Yun Fu
Contrasted with prior work, this paper provides a complementary solution to align domains by learning the same auxiliary tasks in both domains simultaneously.
no code implementations • 18 Feb 2021 • Zhe Wu, Kai Li, Enmin Zhao, Hang Xu, Meng Zhang, Haobo Fu, Bo An, Junliang Xing
In this work, we propose a novel Learning to Exploit (L2E) framework for implicit opponent modeling.
1 code implementation • 10 Feb 2021 • Sara Bunian, Kai Li, Chaima Jemmali, Casper Harteveld, Yun Fu, Magy Seif El-Nasr
By utilizing this dataset, we propose an object-detection based image retrieval framework that models the UI context and hierarchical structure.
no code implementations • 20 Jan 2021 • Zhuqing Jiang, Chang Liu, Ya'nan Wang, Kai Li, Aidong Men, Haiying Wang, Haiyong Luo
With the goal of tuning up the brightness, low-light image enhancement enjoys numerous applications, such as surveillance, remote sensing and computational photography.
no code implementations • 4 Jan 2021 • Ya'nan Wang, Zhuqing Jiang, Chang Liu, Kai Li, Aidong Men, Haiying Wang
This paper proposes a neural network for multi-level low-light image enhancement, which is user-friendly to meet various requirements by selecting different images as brightness reference.
no code implementations • 1 Jan 2021 • Enmin Zhao, Kai Li, Junliang Xing
Regret matching (RM) plays a crucial role in CFR and its variants to approach Nash equilibrium.
no code implementations • ICCV 2021 • Tiantian Wang, Sifei Liu, Yapeng Tian, Kai Li, Ming-Hsuan Yang
In this paper, we propose to enhance the temporal coherence by Consistency-Regularized Graph Neural Networks (CRGNN) with the aid of a synthesized video matting dataset.
no code implementations • 1 Jan 2021 • Chang Liu, Kai Li, Yun Fu
Unsupervised domain adaptation (UDA) is to make predictions for unlabeled data in a target domain with labeled data from source domain available.
no code implementations • 11 Dec 2020 • Kai Li, Hang Xu, Enmin Zhao, Zhe Wu, Junliang Xing
Owning to the unremitting efforts by a few institutes, significant progress has recently been made in designing superhuman AIs in No-limit Texas Hold'em (NLTH), the primary testbed for large-scale imperfect-information game research.
no code implementations • 12 Nov 2020 • Jiangtao Kong, Yu Cheng, Benjia Zhou, Kai Li, Junliang Xing
To obtain a high-performance vehicle ReID model, we present a novel Distance Shrinking with Angular Marginalizing (DSAM) loss function to perform hybrid learning in both the Original Feature Space (OFS) and the Feature Angular Space (FAS) using the local verification and the global identification information.
1 code implementation • 10 Nov 2020 • Andrey Ignatov, Radu Timofte, Zhilu Zhang, Ming Liu, Haolin Wang, WangMeng Zuo, Jiawei Zhang, Ruimao Zhang, Zhanglin Peng, Sijie Ren, Linhui Dai, Xiaohong Liu, Chengqi Li, Jun Chen, Yuichi Ito, Bhavya Vasudeva, Puneesh Deora, Umapada Pal, Zhenyu Guo, Yu Zhu, Tian Liang, Chenghua Li, Cong Leng, Zhihong Pan, Baopu Li, Byung-Hoon Kim, Joonyoung Song, Jong Chul Ye, JaeHyun Baek, Magauiya Zhussip, Yeskendir Koishekenov, Hwechul Cho Ye, Xin Liu, Xueying Hu, Jun Jiang, Jinwei Gu, Kai Li, Pengliang Tan, Bingxin Hou
This paper reviews the second AIM learned ISP challenge and provides the description of the proposed solutions and results.
no code implementations • 23 Oct 2020 • Li Ren, Kai Li, Liqiang Wang, Kien Hua
In this paper, we address this limitation with an efficient learning objective that considers the discriminative feature distributions between the visual objects and sentence words.
no code implementations • 22 Oct 2020 • Xiaoxiao Li, Yangsibo Huang, Binghui Peng, Zhao Song, Kai Li
To address the issue that deep neural networks (DNNs) are vulnerable to model inversion attacks, we design an objective function, which adjusts the separability of the hidden data representations, as a way to control the trade-off between data utility and vulnerability to inversion attacks.
no code implementations • 22 Oct 2020 • Kai Li, Ying Li, Lei Cheng, Qingjiang Shi, Zhi-Quan Luo
There is a fundamental trade-off between the channel representation resolution of codebooks and the overheads of feedback communications in the fifth generation new radio (5G NR) frequency division duplex (FDD) massive multiple-input and multiple-output (MIMO) systems.
1 code implementation • Findings of the Association for Computational Linguistics 2020 • Yangsibo Huang, Zhao Song, Danqi Chen, Kai Li, Sanjeev Arora
In addition, TextHide fits well with the popular framework of fine-tuning pre-trained language models (e. g., BERT) for any sentence or sentence-pair task.
3 code implementations • 6 Oct 2020 • Yangsibo Huang, Zhao Song, Kai Li, Sanjeev Arora
This paper introduces InstaHide, a simple encryption of training images, which can be plugged into existing distributed deep learning pipelines.
no code implementations • 7 Sep 2020 • Nan Meng, Kai Li, Jianzhuang Liu, Edmund Y. Lam
This paper presents a learning-based approach to synthesize the view from an arbitrary camera position given a sparse set of images.
1 code implementation • CVPR 2020 • Kai Li, Yulun Zhang, Kunpeng Li, Yun Fu
The recent flourish of deep learning in various tasks is largely accredited to the rich and accessible labeled data.
1 code implementation • CVPR 2020 • Kai Li, Curtis Wigington, Chris Tensmeyer, Handong Zhao, Nikolaos Barmpalios, Vlad I. Morariu, Varun Manjunatha, Tong Sun, Yun Fu
We establish a benchmark suite consisting of different types of PDF document datasets that can be utilized for cross-domain DOD model training and evaluation.
no code implementations • 4 Mar 2020 • Yangsibo Huang, Yushan Su, Sachin Ravi, Zhao Song, Sanjeev Arora, Kai Li
This paper attempts to answer the question whether neural network pruning can be used as a tool to achieve differential privacy without losing much data utility.
1 code implementation • 25 Feb 2020 • Zhenyu Song, Daniel S. Berger, Kai Li, Wyatt Lloyd
This paper presents a new approach for caching in CDNs that uses machine learning to approximate the Belady MIN algorithm.
1 code implementation • ICCV 2019 • Kai Li, Martin Renqiang Min, Yun Fu
We instead reformulate ZSL as a conditioned visual classification problem, i. e., classifying visual features based on the classifiers learned from the semantic descriptions.
2 code implementations • ICCV 2019 • Kunpeng Li, Yulun Zhang, Kai Li, Yuanyuan Li, Yun Fu
It outperforms the current best method by 6. 8% relatively for image retrieval and 4. 8% relatively for caption retrieval on MS-COCO (Recall@1 using 1K test set).
Ranked #8 on
Image Retrieval
on Flickr30K 1K test
no code implementations • 4 Jun 2019 • Kai Li, Wei Ni, Eduardo Tovar
A key challenge is online MPT and data collection in the presence of on-board control of a UAV (e. g., patrolling velocity) for preventing battery drainage and data queue overflow of the sensing devices, while up-to-date knowledge on battery level and data queue of the devices is not available at the UAV.
no code implementations • 1 Jun 2019 • Li-Fang Cheng, Bianca Dumitrascu, Michael Zhang, Corey Chivers, Michael Draugelis, Kai Li, Barbara E. Engelhardt
However, capturing the short-term effects of drugs and therapeutic interventions on patient physiological state remains challenging.
no code implementations • 26 Apr 2019 • Yuzhe Tang, Ju Chen, Kai Li, Jianliang Xu, Qi Zhang
To circumvent the limited enclave memory (128 MB with the latest Intel CPUs), we propose to place the memory buffer of the eLSM store outside the enclave and protect the buffer using a new authenticated data structure by digesting individual LSM-tree levels.
Cryptography and Security Databases Distributed, Parallel, and Cluster Computing Data Structures and Algorithms
2 code implementations • 22 Apr 2019 • Peng Zhang, Fuhao Zou, Zhiwen Wu, Nengli Dai, Skarpness Mark, Michael Fu, Juan Zhao, Kai Li
Face Anti-spoofing gains increased attentions recently in both academic and industrial fields.
2 code implementations • ICLR 2019 • Yulun Zhang, Kunpeng Li, Kai Li, Bineng Zhong, Yun Fu
To address this issue, we design local and non-local attention blocks to extract features that capture the long-range dependencies between pixels and pay more attention to the challenging parts.
no code implementations • 18 Mar 2019 • Sergiy Popovych, Davit Buniatyan, Aleksandar Zlateski, Kai Li, H. Sebastian Seung
Convolutional nets have been shown to achieve state-of-the-art accuracy in many biomedical image analysis tasks.
3 code implementations • 8 Jan 2019 • Xiaohu Lu, Yahui Liu, Kai Li
This paper presents a very simple but efficient algorithm for 3D line segment detection from large scale unorganized point cloud.
no code implementations • 5 Dec 2018 • Ken Chen, Fei Chen, Baisheng Lai, Zhongming Jin, Yong liu, Kai Li, Long Wei, Pengfei Wang, Yandong Tang, Jianqiang Huang, Xian-Sheng Hua
To capture the graph dynamics, we use the graph prediction stream to predict the dynamic graph structures, and the predicted structures are fed into the flow prediction stream.
1 code implementation • 18 Aug 2018 • Kai Li, Zhengming Ding, Kunpeng Li, Yulun Zhang, Yun Fu
To ensure scalability and separability, a softmax-like function is formulated to push apart the positive and negative support sets.
no code implementations • 17 Jul 2018 • Dong Hao, Kai Li, Tao Zhou
Repeated game has long been the touchstone model for agents' long-run relationships.
20 code implementations • ECCV 2018 • Yulun Zhang, Kunpeng Li, Kai Li, Lichen Wang, Bineng Zhong, Yun Fu
To solve these problems, we propose the very deep residual channel attention networks (RCAN).
Ranked #14 on
Image Super-Resolution
on BSD100 - 4x upscaling
no code implementations • CVPR 2018 • Kai Li, Junliang Xing, Chi Su, Weiming Hu, Yundong Zhang, Stephen Maybank
First, a novel cost-sensitive multi-task loss function is designed to learn transferable aging features by training on the source population.
no code implementations • 7 May 2018 • Lu Jin, Xiangbo Shu, Kai Li, Zechao Li, Guo-Jun Qi, Jinhui Tang
However, most existing deep hashing methods directly learn the hash functions by encoding the global semantic information, while ignoring the local spatial information of images.
1 code implementation • 30 May 2017 • Vladimir Feinberg, Li-Fang Cheng, Kai Li, Barbara E. Engelhardt
Gaussian processes (GPs), or distributions over arbitrary functions in a continuous domain, can be generalized to the multi-output case: a linear model of coregionalization (LMC) is one approach.
1 code implementation • 27 Mar 2017 • Li-Fang Cheng, Gregory Darnell, Bianca Dumitrascu, Corey Chivers, Michael E Draugelis, Kai Li, Barbara E. Engelhardt
In the scenario of real-time monitoring of hospital patients, high-quality inference of patients' health status using all information available from clinical covariates and lab tests is essential to enable successful medical interventions and improve patient outcomes.
no code implementations • 16 Dec 2015 • Zhao-Long Gu, Kai Li, Jian-Xin Li
We detect the topological properties of Chern insulators with strong Coulomb interactions by use of cluster perturbation theory and variational cluster approach.
Strongly Correlated Electrons
no code implementations • 7 Dec 2015 • Kai Li, Yanjing Wang
We argue that the problem lies in the mix-up of two interpretations of the extensive form game structures: game rules or game runs which do not always coincide.
no code implementations • 6 Jun 2015 • Jun Ye, Hao Hu, Kai Li, Guo-Jun Qi, Kien A. Hua
With the prevalence of the commodity depth cameras, the new paradigm of user interfaces based on 3D motion capturing and recognition have dramatically changed the way of interactions between human and computers.
no code implementations • CVPR 2015 • Mi Zhang, Jian Yao, Menghan Xia, Kai Li, Yi Zhang, Yaping Liu
Fisheye image rectification and estimation of intrinsic parameters for real scenes have been addressed in the literature by using line information on the distorted images.
no code implementations • 19 Mar 2015 • Kai Li, Guo-Jun Qi, Jun Ye, Kien A. Hua
In this work, we propose a novel hash learning framework that encodes feature's rank orders instead of numeric values in a number of optimal low-dimensional ranking subspaces.