Search Results for author: Kun Wang

Found 56 papers, 12 papers with code

LST-Net: Learning a Convolutional Neural Network with a Learnable Sparse Transform

no code implementations ECCV 2020 Lida Li, Kun Wang, Shuai Li, Xiangchu Feng, Lei Zhang

The 2D convolutional (Conv2d) layer is the fundamental element to a deep convolutional neural network (CNN).

Network Traffic Anomaly Detection Method Based on Multi scale Residual Feature

no code implementations8 May 2022 Xueyuan Duan, Yu Fu, Kun Wang

To address the problem that traditional network traffic anomaly detection algorithms do not suffi-ciently mine potential features in long time domain, an anomaly detection method based on mul-ti-scale residual features of network traffic is proposed.

Anomaly Detection Traffic Classification

ERGO: Event Relational Graph Transformer for Document-level Event Causality Identification

no code implementations15 Apr 2022 Meiqi Chen, Yixin Cao, Kunquan Deng, Mukai Li, Kun Wang, Jing Shao, Yan Zhang

In this paper, we propose a novel Event Relational Graph TransfOrmer (ERGO) framework for DECI, which improves existing state-of-the-art (SOTA) methods upon two aspects.

Node Classification Relation Classification

Few-shot Forgery Detection via Guided Adversarial Interpolation

no code implementations12 Apr 2022 Haonan Qiu, Siyu Chen, Bei Gan, Kun Wang, Huafeng Shi, Jing Shao, Ziwei Liu

Realistic visual media synthesis is becoming a critical societal issue with the surge of face manipulation models; new forgery approaches emerge at an unprecedented pace.

Multi-Modal Masked Pre-Training for Monocular Panoramic Depth Completion

no code implementations18 Mar 2022 Zhiqiang Yan, Xiang Li, Kun Wang, Zhenyu Zhang, Jun Li, Jian Yang

Specifically, during pre-training, we simultaneously cover up patches of the panoramic RGB image and sparse depth by shared random mask, then reconstruct the sparse depth in the masked regions.

Depth Completion Transfer Learning

Towards Robust 2D Convolution for Reliable Visual Recognition

no code implementations18 Mar 2022 Lida Li, Shuai Li, Kun Wang, Xiangchu Feng, Lei Zhang

2D convolution (Conv2d), which is responsible for extracting features from the input image, is one of the key modules of a convolutional neural network (CNN).

A Recurrent Differentiable Engine for Modeling Tensegrity Robots Trainable with Low-Frequency Data

no code implementations28 Feb 2022 Kun Wang, Mridul Aanjaneya, Kostas Bekris

A model of NASA's icosahedron SUPERballBot on MuJoCo is used as the ground truth system to collect training data.

Prompt for Extraction? PAIE: Prompting Argument Interaction for Event Argument Extraction

1 code implementation ACL 2022 Yubo Ma, Zehao Wang, Yixin Cao, Mukai Li, Meiqi Chen, Kun Wang, Jing Shao

We have conducted extensive experiments on three benchmarks, including both sentence- and document-level EAE.

Exploring Forensic Dental Identification with Deep Learning

1 code implementation NeurIPS 2021 Yuan Liang, Weikun Han, Liang Qiu, Chen Wu, Yiting shao, Kun Wang, Lei He

In this work, we pioneer to study deep learning for dental forensic identification based on panoramic radiographs.

INTERN: A New Learning Paradigm Towards General Vision

no code implementations16 Nov 2021 Jing Shao, Siyu Chen, Yangguang Li, Kun Wang, Zhenfei Yin, Yinan He, Jianing Teng, Qinghong Sun, Mengya Gao, Jihao Liu, Gengshi Huang, Guanglu Song, Yichao Wu, Yuming Huang, Fenggang Liu, Huan Peng, Shuo Qin, Chengyu Wang, Yujie Wang, Conghui He, Ding Liang, Yu Liu, Fengwei Yu, Junjie Yan, Dahua Lin, Xiaogang Wang, Yu Qiao

Enormous waves of technological innovations over the past several years, marked by the advances in AI technologies, are profoundly reshaping the industry and the society.

Pitch Preservation In Singing Voice Synthesis

no code implementations11 Oct 2021 Shujun Liu, Hai Zhu, Kun Wang, Huajun Wang

For the phoneme encoder, based on the analysis that same phonemes corresponding to varying pitches can produce similar pronunciations, this encoder is followed by an adversarially trained pitch classifier to enforce the identical phonemes with different pitches mapping into the same phoneme feature space.

X2Teeth: 3D Teeth Reconstruction from a Single Panoramic Radiograph

no code implementations30 Aug 2021 Yuan Liang, Weinan Song, Jiawei Yang, Liang Qiu, Kun Wang, Lei He

Different from single object reconstruction from photos, this task has the unique challenge of constructing multiple objects at high resolutions.

3D Reconstruction Object Reconstruction

Domain Adaptation for Underwater Image Enhancement

no code implementations22 Aug 2021 Zhengyong Wang, Liquan Shen, Mei Yu, Kun Wang, Yufei Lin, Mai Xu

However, these methods ignore the significant domain gap between the synthetic and real data (i. e., interdomain gap), and thus the models trained on synthetic data often fail to generalize well to real underwater scenarios.

Domain Adaptation Image Enhancement

FPB: Feature Pyramid Branch for Person Re-Identification

1 code implementation4 Aug 2021 Suofei Zhang, Zirui Yin, Xiofu Wu, Kun Wang, Quan Zhou, Bin Kang

In this paper, we propose a lightweight Feature Pyramid Branch (FPB) to extract features from different layers of networks and aggregate them in a bidirectional pyramid structure.

Object Detection Person Re-Identification

RigNet: Repetitive Image Guided Network for Depth Completion

no code implementations29 Jul 2021 Zhiqiang Yan, Kun Wang, Xiang Li, Zhenyu Zhang, Baobei Xu, Jun Li, Jian Yang

Depth completion deals with the problem of recovering dense depth maps from sparse ones, where color images are often used to facilitate this task.

Depth Completion Depth Estimation

Cascading Bandit under Differential Privacy

no code implementations24 May 2021 Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao

This paper studies \emph{differential privacy (DP)} and \emph{local differential privacy (LDP)} in cascading bandits.

A mm-Wave Patch Antenna with Broad Bandwidth and a Wide Angular Range

no code implementations17 May 2021 Jonas Kornprobst, Kun Wang, Gerhard Hamberger, Thomas F. Eibert

The wide half power beamwidth is achieved by suitably designed parasitic patches for the first resonant mode.

Conservative Contextual Combinatorial Cascading Bandit

no code implementations17 Apr 2021 Kun Wang, Canzhe Zhao, Shuai Li, Shuo Shao

We propose the novel \emph{conservative contextual combinatorial cascading bandit ($C^4$-bandit)}, a cascading online learning game which incorporates the conservative mechanism.

Decision Making online learning +1

GaitSet: Cross-view Gait Recognition through Utilizing Gait as a Deep Set

1 code implementation5 Feb 2021 Hanqing Chao, Kun Wang, Yiwei He, Junping Zhang, Jianfeng Feng

In this paper, we present a novel perspective that utilizes gait as a deep set, which means that a set of gait frames are integrated by a global-local fused deep network inspired by the way our left- and right-hemisphere processes information to learn information that can be used in identification.

Gait Recognition

Atlas-aware ConvNetfor Accurate yet Robust Anatomical Segmentation

no code implementations2 Feb 2021 Yuan Liang, Weinan Song, Jiawei Yang, Liang Qiu, Kun Wang, Lei He

Second, we can largely boost the robustness of existing ConvNets, proved by: (i) testing on scans with synthetic pathologies, and (ii) training and evaluation on scans of different scanning setups across datasets.

Detecting and quantifying entanglement on near-term quantum devices

1 code implementation28 Dec 2020 Kun Wang, Zhixin Song, Xuanqiang Zhao, Zihe Wang, Xin Wang

Firstly, it decomposes a positive map into a combination of quantum operations implementable on near-term quantum devices.

Quantum Physics Strongly Correlated Electrons

Exploring Instance-Level Uncertainty for Medical Detection

no code implementations23 Dec 2020 Jiawei Yang, Yuan Liang, Yao Zhang, Weinan Song, Kun Wang, Lei He

The ability of deep learning to predict with uncertainty is recognized as key for its adoption in clinical routines.

Lung Nodule Detection

Sim2Sim Evaluation of a Novel Data-Efficient Differentiable Physics Engine for Tensegrity Robots

no code implementations10 Nov 2020 Kun Wang, Mridul Aanjaneya, Kostas Bekris

The results indicate that only 0. 25\% of ground truth data are needed to train a policy that works on the ground truth system when the differentiable engine is used for training against training the policy directly on the ground truth system.

Spring-Rod System Identification via Differentiable Physics Engine

no code implementations9 Nov 2020 Kun Wang, Mridul Aanjaneya, Kostas Bekris

We propose a novel differentiable physics engine for system identification of complex spring-rod assemblies.

What Have We Achieved on Text Summarization?

1 code implementation EMNLP 2020 Dandan Huang, Leyang Cui, Sen yang, Guangsheng Bao, Kun Wang, Jun Xie, Yue Zhang

Deep learning has led to significant improvement in text summarization with various methods investigated and improved ROUGE scores reported over the years.

Text Summarization

Single-Sideband Time-Modulated Phased Array With 2-bit Phased Shifters

no code implementations6 Oct 2020 Yanchang Gao, Gang Ni, Kun Wang, Yiqing Liu, Chong He, Ronghong Jin, Xianling Liang

The timemodulated module is implemented by adding periodic phase modulation to 2-bit phase shifters, which is simpler without performance loss compared to existing SSB time-modulated method.

Accurate Anchor Free Tracking

no code implementations13 Jun 2020 Shengyun Peng, Yunxuan Yu, Kun Wang, Lei He

Specifically, a target object is defined by a bounding box center, tracking offset, and object size.

Frame Visual Object Tracking

Sequential Weakly Labeled Multi-Activity Localization and Recognition on Wearable Sensors using Recurrent Attention Networks

2 code implementations13 Apr 2020 Kun Wang, Jun He, Lei Zhang

Recently, several attention mechanisms are proposed to handle the weakly labeled human activity data, which do not require accurate data annotation.

Activity Recognition

A non-cooperative meta-modeling game for automated third-party calibrating, validating, and falsifying constitutive laws with parallelized adversarial attacks

no code implementations13 Apr 2020 Kun Wang, WaiChing Sun, Qiang Du

The evaluation of constitutive models, especially for high-risk and high-regret engineering applications, requires efficient and rigorous third-party calibration, validation and falsification.

reinforcement-learning

Oral-3D: Reconstructing the 3D Bone Structure of Oral Cavity from 2D Panoramic X-ray

no code implementations18 Mar 2020 Weinan Song, Yuan Liang, Jiawei Yang, Kun Wang, Lei He

In this paper, we propose a framework, named Oral-3D, to reconstruct the 3D oral cavity from a single PX image and prior information of the dental arch.

3D Reconstruction

Adapting Object Detectors with Conditional Domain Normalization

no code implementations ECCV 2020 Peng Su, Kun Wang, Xingyu Zeng, Shixiang Tang, Dapeng Chen, Di Qiu, Xiaogang Wang

Then this domain-vector is used to encode the features from another domain through a conditional normalization, resulting in different domains' features carrying the same domain attribute.

3D Object Detection Unsupervised Domain Adaptation

T-Net: Learning Feature Representation with Task-specific Supervision for Biomedical Image Analysis

no code implementations19 Feb 2020 Weinan Song, Yuan Liang, Jiawei Yang, Kun Wang, Lei He

The encoder-decoder network is widely used to learn deep feature representations from pixel-wise annotations in biomedical image analysis.

Region Proposal Representation Learning

Towards the standardization of quantum state verification using optimal strategies

no code implementations3 Feb 2020 Xinhe Jiang, Kun Wang, Kaiyi Qian, Zhaozhong Chen, Zhiyu Chen, Liangliang Lu, Lijun Xia, Fangmin Song, Shining Zhu, Xiaosong Ma

We experimentally obtain the scaling parameter of $r=-0. 88\pm$0. 03 and $-0. 78\pm$0. 07 for nonadaptive and adaptive strategies, respectively.

Quantum Physics Optics

Effective Scaling of Blockchain Beyond Consensus Innovations and Moore's Law

no code implementations7 Jan 2020 Yinqiu Liu, Kai Qian, Jianli Chen, Kun Wang, Lei He

As an emerging technology, blockchain has achieved great success in numerous application scenarios, from intelligent healthcare to smart cities.

Cryptography and Security Distributed, Parallel, and Cluster Computing 68M14 C.2.2

Reconstruction-Aware Imaging System Ranking by use of a Sparsity-Driven Numerical Observer Enabled by Variational Bayesian Inference

no code implementations14 May 2019 Yujia Chen, Yang Lou, Kun Wang, Matthew A. Kupinski, Mark A. Anastasio

In this work, a sparsity-driven observer (SDO) that can be employed to optimize hardware by use of a stochastic object model describing object sparsity is described and investigated.

Bayesian Inference Compressive Sensing +1

Time-sync Video Tag Extraction Using Semantic Association Graph

no code implementations3 May 2019 Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang

Finally, we gain the weight of each word by combining Semantic Weight (SW) and Inverse Document Frequency (IDF).

TAG

Attention-based Convolutional Neural Network for Weakly Labeled Human Activities Recognition with Wearable Sensors

no code implementations24 Mar 2019 Kun Wang, Jun He, Lei Zhang

Unlike images or videos data which can be easily labeled by human being, sensor data annotation is a time-consuming process.

Activity Recognition

A cooperative game for automated learning of elasto-plasticity knowledge graphs and models with AI-guided experimentation

no code implementations8 Mar 2019 Kun Wang, WaiChing Sun, Qiang Du

We introduce a multi-agent meta-modeling game to generate data, knowledge, and models that make predictions on constitutive responses of elasto-plastic materials.

Knowledge Graphs reinforcement-learning

Meta-modeling game for deriving theoretical-consistent, micro-structural-based traction-separation laws via deep reinforcement learning

no code implementations24 Oct 2018 Kun Wang, WaiChing Sun

This paper presents a new meta-modeling framework to employ deep reinforcement learning (DRL) to generate mechanical constitutive models for interfaces.

Game of Go

Ricean K-factor Estimation based on Channel Quality Indicator in OFDM Systems using Neural Network

no code implementations15 Aug 2018 Kun Wang

Ricean channel model is widely used in wireless communications to characterize the channels with a line-of-sight path.

General Classification

Scene Graph Generation from Objects, Phrases and Region Captions

1 code implementation ICCV 2017 Yikang Li, Wanli Ouyang, Bolei Zhou, Kun Wang, Xiaogang Wang

Object detection, scene graph generation and region captioning, which are three scene understanding tasks at different semantic levels, are tied together: scene graphs are generated on top of objects detected in an image with their pairwise relationship predicted, while region captioning gives a language description of the objects, their attributes, relations, and other context information.

Graph Generation Object Detection +2

Crafting GBD-Net for Object Detection

1 code implementation8 Oct 2016 Xingyu Zeng, Wanli Ouyang, Junjie Yan, Hongsheng Li, Tong Xiao, Kun Wang, Yu Liu, Yucong Zhou, Bin Yang, Zhe Wang, Hui Zhou, Xiaogang Wang

The effectiveness of GBD-Net is shown through experiments on three object detection datasets, ImageNet, Pascal VOC2007 and Microsoft COCO.

Object Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.