no code implementations • 15 Apr 2022 • Nan Zhang, Rami Bahsoon, Nikos Tziritas, Georgios Theodoropoulos
Maintaining such an equivalent model is challenging, especially when the physical systems being modelled are intelligent and autonomous.
1 code implementation • CUHK Course IERG5350 2020 • Nan Zhang, Zixing Song
We plan to apply and adjust some well-known reinforcement learning (RL) algorithms to train an automatic agent to play the 1985 Nintendo game Super Mario Bros under a speedrun rule.
1 code implementation • 2020 • Zhuojie Zhou, Nan Zhang, Gautam Das
Random walk fits naturally with this problem because, for most online social networks, the only query we can issue through the interface is to retrieve the neighbors of a given node (i. e., no access to the full graph topology).
no code implementations • 2019 IEEE International Conference on Multimedia and Expo (ICME) 2019 • Hangqing Guo, Nan Zhang, Wenjun Shi, Saeed ALI-AlQarni, Shaoen Wu, Honggang Wang
Compared to traditional camera-based computer vision and imaging, radio imaging based on wireless sensing does not require lighting and is friendly to privacy.
no code implementations • 17 May 2019 • Yanshan Wang, Yiqing Zhao, Terry M. Therneau, Elizabeth J. Atkinson, Ahmad P. Tafti, Nan Zhang, Shreyasee Amin, Andrew H. Limper, Hongfang Liu
Both unsupervised machine learning approaches could be leveraged to discover patient subgroups using EHRs but with different foci.
no code implementations • 3 May 2018 • Nan Zhang, Xianghang Mi, Xuan Feng, Xiao-Feng Wang, Yuan Tian, Feng Qian
The significance of our findings have already been acknowledged by Amazon and Google, and further evidenced by the risky skills discovered on Alexa and Google markets by the new detection systems we built.
Cryptography and Security
no code implementations • 28 Mar 2017 • Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, Xiao-Feng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin
We systemize this process, by proposing a taxonomy for the IoT ecosystem and organizing IoT security into five problem areas.
Cryptography and Security
no code implementations • ICCV 2015 • Wei Feng, Fei-Peng Tian, Qian Zhang, Nan Zhang, Liang Wan, Jizhou Sun
To guarantee detection sensitivity and accuracy of minute changes, in an observation, we capture a group of images under multiple illuminations, which need only to be roughly aligned to the last time lighting conditions.