no code implementations • ACL (IWSLT) 2021 • Linlin Zhang
In this paper, we describe Zhejiang University’s submission to the IWSLT2021 Multilingual Speech Translation Task.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +4
1 code implementation • 13 Aug 2024 • Rui Ying, Mengting Hu, Jianfeng Wu, Yalan Xie, Xiaoyi Liu, Zhunheng Wang, Ming Jiang, Hang Gao, Linlin Zhang, Renhong Cheng
Temporal knowledge graph completion aims to infer the missing facts in temporal knowledge graphs.
no code implementations • 14 Jan 2024 • Linlin Zhang, Xiang Yu, Abdulateef Daud, Abdul Rashid Mussah, Yaw Adu-Gyamfi
This study implements a three-stage video analytics framework for extracting high-resolution traffic data such vehicle counts, speed, and acceleration from infrastructure-mounted CCTV cameras.
no code implementations • 13 Jan 2024 • Linlin Zhang, Xiang Yu, Armstrong Aboah, Yaw Adu-Gyamfi
These are the need for multiple LiDAR systems to obtain complete point cloud information of objects of interest, as well as the labor-intensive process of annotating 3D bounding boxes for object detection tasks.
no code implementations • 6 Dec 2021 • Chuan Zhang, Gui Gao, Linlin Zhang, C. Chen, S. Gao, Libo Yao, Shiquan Gou
As a result, an adaptive constant false alarm rate (CFAR) method was implemented based on the joint-SA.
1 code implementation • 25 Aug 2021 • Zhisheng Lu, Juncheng Li, Hong Liu, Chaoyan Huang, Linlin Zhang, Tieyong Zeng
LTB is composed of a series of Efficient Transformers (ET), which occupies a small GPU memory occupation, thanks to the specially designed Efficient Multi-Head Attention (EMHA).
no code implementations • 16 Apr 2021 • Linlin Zhang
Most existing document-level neural machine translation (NMT) models leverage a fixed number of the previous or all global source sentences to handle the context-independent problem in standard NMT.
no code implementations • 16 Apr 2021 • Junliang Guo, Zhirui Zhang, Linlin Zhang, Linli Xu, Boxing Chen, Enhong Chen, Weihua Luo
In this way, our approach is able to more comprehensively find adversarial examples around the decision boundary and effectively conduct adversarial attacks.