no code implementations • LREC 2022 • Peng Liu, Cristina Marco, Jon Atle Gulla
This method benefits from the English Sentiwordnet and a thesaurus in one of the target languages.
1 code implementation • 21 Mar 2023 • Tao Yang, Chuang Liu, Xiaofeng Ma, Weijia Lu, Ning Wu, Bingyang Li, Zhifei Yang, Peng Liu, Lin Sun, Xiaodong Zhang, Can Zhang
Besides, for our proposed neural network framework, the output of neural network is defined as probability events, and based on the statistical analysis of these events, the inference model for classification task is deduced.
no code implementations • 8 Mar 2023 • Mengguan Pan, Shengheng Liu, Peng Liu, Wangdong Qi, Yongming Huang, Wang Zheng, Qihui Wu, Markus Gardill
Owing to the ubiquity of cellular communication signals, positioning with the fifth generation (5G) signal has emerged as a promising solution in global navigation satellite system-denied areas.
1 code implementation • 7 Feb 2023 • Peng Liu, Lemei Zhang, Jon Atle Gulla
The emergency of Pre-trained Language Models (PLMs) has achieved tremendous success in the field of Natural Language Processing (NLP) by learning universal representations on large corpora in a self-supervised manner.
no code implementations • 20 Jan 2023 • Lan Zhang, Chen Cao, Zhilong Wang, Peng Liu
The Bidirectional Encoder Representations from Transformers (BERT) were proposed in the natural language process (NLP) and shows promising results.
1 code implementation • 26 Dec 2022 • Xinghua Jia, Peng Liu, Wangdong Qi, Shengheng Liu, Yongming Huang, Wang Zheng, Mengguan Pan, Xiaohu You
Channel-state-information-based localization in 5G networks has been a promising way to obtain highly accurate positions compared to previous communication networks.
no code implementations • 23 Dec 2022 • Lemei Zhang, Peng Liu, Jon Atle Gulla
Recent advances in graph-based learning approaches have demonstrated their effectiveness in modelling users' preferences and items' characteristics for Recommender Systems (RSS).
1 code implementation • 24 Oct 2022 • Shijie Han, Siyuan Li, Bo An, Wei Zhao, Peng Liu
In this work, we develop a novel identity detection reinforcement learning (IDRL) framework that allows an agent to dynamically infer the identities of nearby agents and select an appropriate policy to accomplish the task.
Multi-agent Reinforcement Learning
reinforcement-learning
+1
no code implementations • 16 Oct 2022 • Hui Liu, Bo Zhao, Kehuan Zhang, Peng Liu
In this paper, we propose an AutoEncoder-based Adversarial Examples (AEAE) detector, that can guard DNN models by detecting adversarial examples with low computation in an unsupervised manner.
no code implementations • 18 Sep 2022 • Peng Liu, Yanyan Zheng
(2) The central part of return distribution is well described by the symmetrical L\'{e}vy $\alpha$-stable process with a stability parameter comparable with the value of about 1. 4 extracted in the U. S. stock market.
1 code implementation • 10 Sep 2022 • Tiancheng Zhao, Peng Liu, Xiaopeng Lu, Kyusong Lee
Results show that OmDet is able to achieve the state-of-the-art fine-tuned performance on ODinW.
no code implementations • 17 Aug 2022 • Lin Ding, Peng Liu, Wenfeng Shen, Weijia Lu, Shengbo Chen
Model-Agnostic Meta-Learning (MAML) is one of the most successful meta-learning techniques for few-shot learning.
no code implementations • 10 Aug 2022 • Kangqing Ye, Peng Liu, Xiaoyang Zou, Qin Zhou, Guoyan Zheng
Three-dimensional (3D) integrated renal structures (IRS) segmentation is important in clinical practice.
no code implementations • 7 Jul 2022 • Yulin Shao, Yucheng Cai, Taotao Wang, Ziyang Guo, Peng Liu, Jiajun Luo, Deniz Gunduz
We consider the problem of autonomous channel access (AutoCA), where a group of terminals tries to discover a communication strategy with an access point (AP) via a common wireless channel in a distributed fashion.
no code implementations • 20 Jun 2022 • Mengguan Pan, Peng Liu, Shengheng Liu, Wangdong Qi, Yongming Huang, Xiaohu You, Xinghua Jia, XiaoDong Li
Secondly, based on the deployment reality that 5G picocell gNBs only have a small-scale antenna array but have a large signal bandwidth, the proposed scheme decouples the estimation of time-of-arrival (TOA) and direction-of-arrival (DOA) to reduce the huge complexity induced by two-dimensional joint processing.
no code implementations • 24 May 2022 • Liang Xu, Yi Cheng, Fan Zhang, Bingxuan Wu, Pengfei Shao, Peng Liu, Shuwei Shen, Peng Yao, Ronald X. Xu
This loss is effective in addressing quantity imbalances and outliers, while regulating the focus of attention on samples with varying classification difficulties.
1 code implementation • 19 May 2022 • Yang Xiang, Zhihua Wu, Weibao Gong, Siyu Ding, Xianjie Mo, Yuang Liu, Shuohuan Wang, Peng Liu, Yongshuai Hou, Long Li, Bin Wang, Shaohuai Shi, Yaqian Han, Yue Yu, Ge Li, Yu Sun, Yanjun Ma, dianhai yu
We took natural language processing (NLP) as an example to show how Nebula-I works in different training phases that include: a) pre-training a multilingual language model using two remote clusters; and b) fine-tuning a machine translation model using knowledge distilled from pre-trained models, which run through the most popular paradigm of recent deep learning.
Cross-Lingual Natural Language Inference
Distributed Computing
+2
no code implementations • Findings (NAACL) 2022 • Yujie Xing, Jinglun Cai, Nils Barlaug, Peng Liu, Jon Atle Gulla
Furthermore, we propose Domain-specific Frequency (DF), a novel word-level importance weight that measures the relative importance of a word for a specific corpus compared to other corpora.
no code implementations • 8 Apr 2022 • Peng Liu, Yanyan Zheng
(1) The distributions of the numbers for cumulative confirmed cases and deaths obey power-law in early stages of COVID-19 and stretched exponential function in subsequent course.
1 code implementation • ICLR 2022 • Chenjia Bai, Lingxiao Wang, Zhuoran Yang, Zhihong Deng, Animesh Garg, Peng Liu, Zhaoran Wang
We show that such OOD sampling and pessimistic bootstrapping yields provable uncertainty quantifier in linear MDPs, thus providing the theoretical underpinning for PBRL.
no code implementations • 4 Jan 2022 • Hui Liu, Bo Zhao, Yuefeng Peng, Weidong Li, Peng Liu
Experimental results show that the contribution of image transformations to adversarial detection is significantly different, the combination of them can significantly improve the generic detection ability against state-of-the-art adversarial attacks.
no code implementations • 21 Dec 2021 • Peng Liu
It is necessary to force the student network to learn the modality relationship information of the teacher network.
1 code implementation • NeurIPS 2021 • Chenjia Bai, Lingxiao Wang, Lei Han, Animesh Garg, Jianye Hao, Peng Liu, Zhaoran Wang
Exploration methods based on pseudo-count of transitions or curiosity of dynamics have achieved promising results in solving reinforcement learning with sparse rewards.
1 code implementation • 7 Oct 2021 • Kailai Sun, Xiaoteng Ma, Peng Liu, Qianchuan Zhao
Head detection in the indoor video is an essential component of building occupancy detection.
1 code implementation • 5 Oct 2021 • Peng Liu, Charlie T. Tran, Bin Kong, Ruogu Fang
The proposed training strategy and novel unsupervised domain adaptation framework, called Collaborative Adversarial Domain Adaptation (CADA), can effectively overcome the challenge.
no code implementations • 30 Sep 2021 • Zichuan Chen, Peng Liu
VAE, or variational auto-encoder, compresses data into latent attributes, and generates new data of different varieties.
no code implementations • 14 Sep 2021 • Jianye Hao, Tianpei Yang, Hongyao Tang, Chenjia Bai, Jinyi Liu, Zhaopeng Meng, Peng Liu, Zhen Wang
In addition to algorithmic analysis, we provide a comprehensive and unified empirical comparison of different exploration methods for DRL on a set of commonly used benchmarks.
no code implementations • 12 Aug 2021 • Mehedi Hasan, Gazi Mahamud Hasan, Houman Ghorbani, Mohammad Rad, Peng Liu, Eric Bernier, Trevor Hall
Full tuning of the comb of resonances over a free spectral range is achieved with a high-resolution bandwidth of 1. 30 GHz.
no code implementations • 28 Jul 2021 • Fan Zhang, Bo Pan, Pengfei Shao, Peng Liu, Shuwei Shen, Peng Yao, Ronald X. Xu
In this research, we propose a novel end-to-end deep learning approach for automated diagnosis of AD and localization of important brain regions related to the disease from sMRI data.
no code implementations • 19 Jul 2021 • Hui Liu, Bo Zhao, Minzhi Ji, Yuefeng Peng, Jiabao Guo, Peng Liu
In this paper, we reveal that imperceptible adversarial examples are the product of recessive features misleading neural networks, and an adversarial attack is essentially a kind of method to enrich these recessive features in the image.
1 code implementation • 14 May 2021 • Cangning Fan, Fangyi Zhang, Peng Liu, Xiuyu Sun, Hao Li, Ting Xiao, Wei Zhao, Xianglong Tang
In this way, an obvious gap can be produced between the distributions of normal and abnormal data in the target domain, therefore enabling the anomaly detection in the domain.
1 code implementation • 13 May 2021 • Chenjia Bai, Lingxiao Wang, Lei Han, Jianye Hao, Animesh Garg, Peng Liu, Zhaoran Wang
In this paper, we propose a principled exploration method for DRL through Optimistic Bootstrapping and Backward Induction (OB2I).
no code implementations • 11 Mar 2021 • Qing Huang, Xinqing Han, Peng Liu, Jianjian Li, Guanhong Lei, Cheng Li
A much higher concentration of QI particles in NBG-18 than IG-110 was characterized and is suggested to be responsible for the smaller maximum dimensional shrinkage of NBG-18 than IG-110 during irradiation.
Applied Physics
no code implementations • 12 Feb 2021 • Peng Liu, Yuewen Cao, Songxiang Liu, Na Hu, Guangzhi Li, Chao Weng, Dan Su
This paper proposes VARA-TTS, a non-autoregressive (non-AR) text-to-speech (TTS) model using a very deep Variational Autoencoder (VDVAE) with Residual Attention mechanism, which refines the textual-to-acoustic alignment layer-wisely.
no code implementations • 9 Feb 2021 • Ayodeji Oseni, Nour Moustafa, Helge Janicke, Peng Liu, Zahir Tari, Athanasios Vasilakos
The increased adoption of Artificial Intelligence (AI) presents an opportunity to solve many socio-economic and environmental challenges; however, this cannot happen without securing AI-enabled technologies.
1 code implementation • 2 Feb 2021 • Peng Yao, Shuwei Shen, Mengjuan Xu, Peng Liu, Fan Zhang, Jinyu Xing, Pengfei Shao, Benjamin Kaffenberger, Ronald X. Xu
This paper proposes a novel single-model based strategy for classification of skin lesions on small and imbalanced datasets.
no code implementations • 27 Jan 2021 • Krzysztof Dȩbicki, Enkelejd Hashorva, Peng Liu, Zbigniew Michna
In the literature, based on the pioneering research of S. Berman the sojourn times have been utilised to derive the tail asymptotics of supremum of Gaussian processes.
Gaussian Processes
Probability
Primary 60G15, secondary 60G70
no code implementations • 25 Jan 2021 • Peng Liu, Lizhe Wang, Guojin He, Lei Zhao
Which samples should be labelled in a large data set is one of the most important problems for trainingof deep learning.
no code implementations • 7 Jan 2021 • Shuwei Shen, Mengjuan Xu, Fan Zhang, Pengfei Shao, Honghong Liu, Liang Xu, Chi Zhang, Peng Liu, Zhihong Zhang, Peng Yao, Ronald X. Xu
At the network search stage, the DCNNs are fine-tuned with the full training set in order to select the model with the highest BACC.
no code implementations • 1 Jan 2021 • Chenjia Bai, Lingxiao Wang, Peng Liu, Zhaoran Wang, Jianye Hao, Yingnan Zhao
However, such an approach is challenging in developing practical exploration algorithms for Deep Reinforcement Learning (DRL).
1 code implementation • 27 Dec 2020 • Lun-Pin Yuan, Peng Liu, Sencun Zhu
One of the most challenging problems in the field of intrusion detection is anomaly detection for discrete event logs.
no code implementations • 23 Dec 2020 • Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu
Network attacks have become a major security concern for organizations worldwide and have also drawn attention in the academics.
Cryptography and Security
no code implementations • 17 Oct 2020 • Chenjia Bai, Peng Liu, Kaiyu Liu, Lingxiao Wang, Yingnan Zhao, Lei Han, Zhaoran Wang
Efficient exploration remains a challenging problem in reinforcement learning, especially for tasks where extrinsic rewards from environments are sparse or even totally disregarded.
1 code implementation • 14 Oct 2020 • Hui Liu, Bo Zhao, Minzhi Ji, Peng Liu
Adversarial examples are well-designed input samples, in which perturbations are imperceptible to the human eyes, but easily mislead the output of deep neural networks (DNNs).
1 code implementation • 11 Sep 2020 • Lan Zhang, Peng Liu, Yoon-Ho Choi, Ping Chen
As an increasing number of deep-learning-based malware scanners have been proposed, the existing evasion techniques, including code obfuscation and polymorphic malware, are found to be less effective.
no code implementations • 9 Sep 2020 • Ying Chen, Peng Liu, Chung Piaw Teo
Moreover, RTL identifies a small set of word features, corresponding to 3% for Restaurant and 20% for Hotel, which boosts working efficiency by allowing managers to drill down into a much smaller set of important customer reviews.
no code implementations • 24 Jul 2020 • Yuyu Chen, Peng Liu, Yang Liu, Ruodu Wang
Aggregation sets, which represent model uncertainty due to unknown dependence, are an important object in the study of robust risk aggregation.
no code implementations • 20 Jun 2020 • Huirong Huang, Zhiyong Wu, Shiyin Kang, Dongyang Dai, Jia Jia, Tianxiao Fu, Deyi Tuo, Guangzhi Lei, Peng Liu, Dan Su, Dong Yu, Helen Meng
Recent approaches mainly have following limitations: 1) most speaker-independent methods need handcrafted features that are time-consuming to design or unreliable; 2) there is no convincing method to support multilingual or mixlingual speech as input.
no code implementations • 16 May 2020 • Aarsh Patel, Rahul Gupta, Mukund Harakere, Satyapriya Krishna, Aman Alok, Peng Liu
In this research work, we aim to achieve classification parity across explicit as well as implicit sensitive features.
no code implementations • LREC 2020 • Esteban Castillo, Sreekar Dhaduvai, Peng Liu, Kartik-Singh Thakur, Adam Dalton, Tomek Strzalkowski
This paper describes different approaches to detect malicious content in email interactions through a combination of machine learning and natural language processing tools.
no code implementations • 17 Feb 2020 • Peng Liu, Fuyu Li, Wanyi Li
To reduce the gap between visible domain and thermal domain, the proposed method manages to generate simulated fake thermal images that are similar to the target images, and preserves the annotation information of the visible source domain.
2 code implementations • 6 Jan 2020 • Peng Liu, Ruogu Fang
In addition, we develop several attention strategies to guide the networks to learn the important features that have a major impact on prediction accuracy.
no code implementations • 12 Dec 2019 • Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Cryptography and Security
no code implementations • 20 Oct 2019 • Peng Liu, Xiaoxiao Zhou, Junyiyang Li, El Basha Mohammad D, Ruogu Fang
In this paper, we optimize CNN regularization capability by developing a kernel regulation module.
1 code implementation • 19 Oct 2019 • Peng Liu, Xiaoxiao Zhou, Junyi Yang, El Basha Mohammad D, Ruogu Fang
While the depth of convolutional neural networks has attracted substantial attention in the deep learning research, the width of these networks has recently received greater interest.
Ranked #1 on
Grayscale Image Denoising
on BSD200 sigma70
no code implementations • 18 Oct 2019 • Peng Liu, Ruogu Fang
With substantial public concerns on potential cancer risks and health hazards caused by the accumulated radiation exposure in medical imaging, reducing radiation dose in X-ray based medical imaging such as Computed Tomography Perfusion (CTP) has raised significant research interests.
2 code implementations • 16 Oct 2019 • Peng Liu, Bin Kong, Zhongyu Li, Shaoting Zhang, Ruogu Fang
Our proposed CFEA is an interactive paradigm which presents an exquisite of collaborative adaptation through both adversarial learning and ensembling weights.
no code implementations • 8 Oct 2019 • José Ignacio Orlando, Huazhu Fu, João Barbossa Breda, Karel van Keer, Deepti. R. Bathula, Andrés Diaz-Pinto, Ruogu Fang, Pheng-Ann Heng, Jeyoung Kim, Joonho Lee, Joonseok Lee, Xiaoxiao Li, Peng Liu, Shuai Lu, Balamurali Murugesan, Valery Naranjo, Sai Samarth R. Phaye, Sharath M. Shankaranarayana, Apoorva Sikka, Jaemin Son, Anton Van Den Hengel, Shujun Wang, Junyan Wu, Zifeng Wu, Guanghui Xu, Yongli Xu, Pengshuai Yin, Fei Li, Yanwu Xu, Xiulan Zhang, Hrvoje Bogunović
As part of REFUGE, we have publicly released a data set of 1200 fundus images with ground truth segmentations and clinical glaucoma labels, currently the largest existing one.
3 code implementations • 4 Sep 2019 • Chengzhu Yu, Heng Lu, Na Hu, Meng Yu, Chao Weng, Kun Xu, Peng Liu, Deyi Tuo, Shiyin Kang, Guangzhi Lei, Dan Su, Dong Yu
In this paper, we present a generic and robust multimodal synthesis system that produces highly natural speech and facial expression simultaneously.
2 code implementations • 30 Aug 2019 • Peng Liu, Xixin Wu, Shiyin Kang, Guangzhi Li, Dan Su, Dong Yu
End-to-end speech synthesis methods already achieve close-to-human quality performance.
no code implementations • 17 Jul 2019 • Yaochen Hu, Peng Liu, Linglong Kong, Di Niu
Distributed machine learning has been widely studied in order to handle exploding amount of data.
no code implementations • SEMEVAL 2019 • Peng Liu, Jin Wang, Xue-jie Zhang
The LSTM-Attention model uses two LSTM to extract the features of the question and answer pair.
1 code implementation • 21 May 2019 • Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu
In this paper, we present SvTPM, a secure and efficient software-based vTPM implementation based on hardware-rooted Trusted Execution Environment (TEE), providing a whole life cycle protection of vTPMs in the cloud.
Cryptography and Security
no code implementations • 5 Oct 2018 • Brian Paden, Peng Liu, Schuyler Cullen
Linear temporal logic and automaton-based run-time verification provide a powerful framework for designing task and motion planning algorithms for autonomous agents.
1 code implementation • 14 Jun 2018 • Yilong Yang, Nafees Qamar, Peng Liu, Katarina Grolinger, Weiru Wang, Zhi Li, Zhifang Liao
Automated service classification plays a crucial role in service discovery, selection, and composition.
1 code implementation • 28 Jul 2017 • Peng Liu, Ruogu Fang
In this work, we explore an innovative strategy for image denoising by using convolutional neural networks (CNN) to learn pixel-distribution from noisy data.
2 code implementations • 17 Jul 2017 • Peng Liu, Ruogu Fang
We explore an innovative strategy for image denoising by using convolutional neural networks (CNN) to learn similar pixel-distribution features from noisy images.
no code implementations • 19 Jun 2017 • Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang
In particular, at a negotiated time slot, a customer is required to reboot the compromised device, then a "white" Mirai operated by the manufacturer breaks into the clean-state IoT devices immediately.
Cryptography and Security
no code implementations • 30 Nov 2016 • Peng Liu, HUI ZHANG, Kie B. Eom
It is shown that the proposed algorithm is efficient and effective in classifying hyperspectral images.
no code implementations • 18 Nov 2016 • Wei Zhang, Minwei Feng, Yunhui Zheng, Yufei Ren, Yandong Wang, Ji Liu, Peng Liu, Bing Xiang, Li Zhang, Bo-Wen Zhou, Fei Wang
By evaluating the NLC workloads, we show that only the conservative hyper-parameter setup (e. g., small mini-batch size and small learning rate) can guarantee acceptable model accuracy for a wide range of customers.
no code implementations • 2 Nov 2016 • Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu
We present novel ideas and techniques to resolve the challenges, and have built the first system for symbolic execution of Android Framework.
Cryptography and Security Software Engineering
no code implementations • 6 Oct 2016 • Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong
Deep neural networks have proven to be quite effective in a wide variety of machine learning tasks, ranging from improved speech recognition systems to advancing the development of autonomous vehicles.
no code implementations • 15 Jun 2016 • Qiang Guo, Hongwei Chen, Yuxi Wang, Yong Guo, Peng Liu, Xiurui Zhu, Zheng Cheng, Zhenming Yu, Minghua Chen, Sigang Yang, Shizhong Xie
However, according to CS theory, image reconstruction is an iterative process that consumes enormous amounts of computational time and cannot be performed in real time.
no code implementations • CVPR 2016 • Zheng Zhang, Jeff M. Girard, Yue Wu, Xing Zhang, Peng Liu, Umur Ciftci, Shaun Canavan, Michael Reale, Andy Horowitz, Huiyuan Yang, Jeffrey F. Cohn, Qiang Ji, Lijun Yin
The corpus further includes derived features from 3D, 2D, and IR (infrared) sensors and baseline results for facial expression and action unit detection.