no code implementations • 31 Oct 2024 • Fu-Chieh Chang, Yu-Ting Lee, Hui-Ying Shih, Pei-Yuan Wu
This work provides a theoretical framework for understanding the effectiveness of reinforcement learning on CoT reasoning and STaR.
no code implementations • 22 Aug 2024 • Yen-Ru Lai, Fu-Chieh Chang, Pei-Yuan Wu
This situation highlights the importance of finding effective ways to use unlabelled data in offline RL, especially when labelled data is limited or expensive to obtain.
no code implementations • 27 Jun 2024 • Jia-Hau Bai, Chi-Ting Liu, Yu Wang, Fu-Chieh Chang, Pei-Yuan Wu
This study uses CAPM (Convex Adversarial Polytope for Maxpool-based CNN) to improve the verified bound for general purpose maxpool-based convolutional neural networks (CNNs) under bounded norm adversarial perturbations.
no code implementations • 1 Feb 2023 • Sing-Yuan Yeh, Fu-Chieh Chang, Chang-Wei Yueh, Pei-Yuan Wu, Alberto Bernacchia, Sattar Vakili
To the best of our knowledge, this is the first result showing a finite sample complexity under such a general model.
1 code implementation • 2022 International Conference on Image Processing (ICIP 2022) 2022 • Gi-Luen Huang, Pei-Yuan Wu
Meanwhile, to address the lack of datasets, we collected a new dataset named Sen2 MTC from the Sentinel-2 satellite and manually labeled each cloudy and cloud-free image.
no code implementations • 7 May 2020 • Codruta O. Ancuti, Cosmin Ancuti, Florin-Alexandru Vasluianu, Radu Timofte, Jing Liu, Haiyan Wu, Yuan Xie, Yanyun Qu, Lizhuang Ma, Ziling Huang, Qili Deng, Ju-Chin Chao, Tsung-Shan Yang, Peng-Wen Chen, Po-Min Hsu, Tzu-Yi Liao, Chung-En Sun, Pei-Yuan Wu, Jeonghyeok Do, Jongmin Park, Munchurl Kim, Kareem Metwaly, Xuelu Li, Tiantong Guo, Vishal Monga, Mingzhao Yu, Venkateswararao Cherukuri, Shiue-Yuan Chuang, Tsung-Nan Lin, David Lee, Jerome Chang, Zhan-Han Wang, Yu-Bang Chang, Chang-Hong Lin, Yu Dong, Hong-Yu Zhou, Xiangzhen Kong, Sourya Dipta Das, Saikat Dutta, Xuan Zhao, Bing Ouyang, Dennis Estrada, Meiqi Wang, Tianqi Su, Siyi Chen, Bangyong Sun, Vincent Whannou de Dravo, Zhe Yu, Pratik Narang, Aryan Mehra, Navaneeth Raghunath, Murari Mandal
We focus on the proposed solutions and their results evaluated on NH-Haze, a novel dataset consisting of 55 pairs of real haze free and nonhomogeneous hazy images recorded outdoor.
no code implementations • 27 Feb 2019 • Hung Nguyen, Di Zhuang, Pei-Yuan Wu, Morris Chang
Protecting sensitive information against data exploiting attacks is an emerging research area in data mining.
Cryptography and Security