Search Results for author: Li Zhou

Found 29 papers, 8 papers with code

GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network

no code implementations5 Feb 2022 Li Zhou, Minhuan Huang, YuJun Li, Yuanping Nie, Jin Li, Yiwei Liu

GraphEye is originated from the observation that the code property graph of a non-vulnerable function naturally differs from the code property graph of a vulnerable function with the same functionality.

Graph Attention Graph Classification

A Dual-Perception Graph Neural Network with Multi-hop Graph Generator

no code implementations15 Oct 2021 Li Zhou, Wenyu Chen, Dingyi Zeng, Shaohuan Cheng, Wanlong Liu, Hong Qu

In DPGNN, we utilize node features to construct a feature graph, and perform node representations learning based on the original topology graph and the constructed feature graph simultaneously, which conduce to capture the structural neighborhood information and the feature-related information.

Generating Self-Contained and Summary-Centric Question Answer Pairs via Differentiable Reward Imitation Learning

1 code implementation EMNLP 2021 Li Zhou, Kevin Small, Yong Zhang, Sandeep Atluri

Motivated by suggested question generation in conversational news recommendation systems, we propose a model for generating question-answer pairs (QA pairs) with self-contained, summary-centric questions and length-constrained, article-summarizing answers.

Imitation Learning News Recommendation +3

Spatial-Temporal Deep Intention Destination Networks for Online Travel Planning

no code implementations9 Aug 2021 Yu Li, Fei Xiong, Ziyi Wang, Zulong Chen, Chuanfei Xu, Yuyu Yin, Li Zhou

Therefore, in this paper, we focus on predicting users' intention destinations in online travel platforms.

Scalable Power Control/Beamforming in Heterogeneous Wireless Networks with Graph Neural Networks

1 code implementation12 Apr 2021 Xiaochen Zhang, Haitao Zhao, Jun Xiong, Li Zhou, Jibo Wei

Machine learning (ML) has been widely used for efficient resource allocation (RA) in wireless networks.

Research on AI Composition Recognition Based on Music Rules

no code implementations15 Oct 2020 Yang Deng, Ziyao Xu, Li Zhou, Huanping Liu, Anqi Huang

Starting from the essence of the music, the article constructs a music-rule-identifying algorithm through extracting modes, which will identify the stability of the mode of machine-generated music, to judge whether it is artificial intelligent.

Inverse Reinforcement Learning with Natural Language Goals

no code implementations16 Aug 2020 Li Zhou, Kevin Small

In this paper, we propose a novel adversarial inverse reinforcement learning algorithm to learn a language-conditioned policy and reward function.


XiaoiceSing: A High-Quality and Integrated Singing Voice Synthesis System

no code implementations11 Jun 2020 Peiling Lu, Jie Wu, Jian Luan, Xu Tan, Li Zhou

This paper presents XiaoiceSing, a high-quality singing voice synthesis system which employs an integrated network for spectrum, F0 and duration modeling.

Proq: Projection-based Runtime Assertions for Debugging on a Quantum Computer

no code implementations28 Nov 2019 Gushu Li, Li Zhou, Nengkun Yu, Yufei Ding, Mingsheng Ying, Yuan Xie

In this paper, we propose Proq, a runtime assertion scheme for testing and debugging quantum programs on a quantum computer.

Multifunctional Metasurface Design with a Generative Adversarial Network

no code implementations13 Aug 2019 Sensong An, Bowen Zheng, Hong Tang, Mikhail Y. Shalaginov, Li Zhou, Hang Li, Tian Gu, Juejun Hu, Clayton Fowler, Hualiang Zhang

Metasurfaces have enabled precise electromagnetic wave manipulation with strong potential to obtain unprecedented functionalities and multifunctional behavior in flat optical devices.

Cycle-SUM: Cycle-consistent Adversarial LSTM Networks for Unsupervised Video Summarization

no code implementations17 Apr 2019 Li Yuan, Francis EH Tay, Ping Li, Li Zhou, Jiashi Feng

The evaluator defines a learnable information preserving metric between original video and summary video and "supervises" the selector to identify the most informative frames to form the summary video.

Frame Unsupervised Video Summarization

RNNFast: An Accelerator for Recurrent Neural Networks Using Domain Wall Memory

no code implementations7 Nov 2018 Mohammad Hossein Samavatian, Anys Bacha, Li Zhou, Radu Teodorescu

At the same time, the sequential nature of input/weight processing of RNNs mitigates one of the downsides of DWM, which is the linear (rather than constant) data access time. RNNFast is very efficient and highly scalable, with flexible mapping of logical neurons to RNN hardware blocks.

Speech Recognition Translation

Object Relation Detection Based on One-shot Learning

no code implementations16 Jul 2018 Li Zhou, Jian Zhao, Jianshu Li, Li Yuan, Jiashi Feng

Detecting the relations among objects, such as "cat on sofa" and "person ride horse", is a crucial task in image understanding, and beneficial to bridging the semantic gap between images and natural language.

One-Shot Learning

Understanding Humans in Crowded Scenes: Deep Nested Adversarial Learning and A New Benchmark for Multi-Human Parsing

2 code implementations10 Apr 2018 Jian Zhao, Jianshu Li, Yu Cheng, Li Zhou, Terence Sim, Shuicheng Yan, Jiashi Feng

Despite the noticeable progress in perceptual tasks like detection, instance segmentation and human parsing, computers still perform unsatisfactorily on visually understanding humans in crowded scenes, such as group behavior analysis, person re-identification and autonomous driving, etc.

Autonomous Driving Instance Segmentation +4

End-to-End Offline Goal-Oriented Dialog Policy Learning via Policy Gradient

no code implementations7 Dec 2017 Li Zhou, Kevin Small, Oleg Rokhlenko, Charles Elkan

Learning a goal-oriented dialog policy is generally performed offline with supervised learning algorithms or online with reinforcement learning (RL).

Goal-Oriented Dialog Offline RL +1

Learning for Disparity Estimation through Feature Constancy

2 code implementations CVPR 2018 Zhengfa Liang, Yiliu Feng, Yulan Guo, Hengzhu Liu, Wei Chen, Linbo Qiao, Li Zhou, Jianfeng Zhang

The second part performs matching cost calculation, matching cost aggregation and disparity calculation to estimate the initial disparity using shared features.

Disparity Estimation Stereo Matching +1

Latent Contextual Bandits and their Application to Personalized Recommendations for New Users

no code implementations22 Apr 2016 Li Zhou, Emma Brunskill

We consider both the benefit of leveraging a set of learned latent user classes for new users, and how we can learn such latent classes from prior users.

Multi-Armed Bandits

A Survey on Contextual Multi-armed Bandits

1 code implementation13 Aug 2015 Li Zhou

In this survey we cover a few stochastic and adversarial contextual bandit algorithms.

Multi-Armed Bandits

A Note on Information-Directed Sampling and Thompson Sampling

no code implementations24 Mar 2015 Li Zhou

This note introduce three Bayesian style Multi-armed bandit algorithms: Information-directed sampling, Thompson Sampling and Generalized Thompson Sampling.

Personalized Web Search

no code implementations3 Feb 2015 Li Zhou

Personalization is important for search engines to improve user experience.

Feature Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.