no code implementations • 23 Nov 2022 • Yunfan Liu, Qi Li, Zhenan Sun, Tieniu Tan
One-shot face re-enactment is a challenging task due to the identity mismatch between source and driving faces.
no code implementations • 15 Nov 2022 • Wenxi Liu, Qi Li, Weixiang Yang, Jiaxin Cai, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan
We propose a front-to-top view projection (FTVP) module, which takes the constraint of cycle consistency between views into account and makes full use of their correlation to strengthen the view transformation and scene understanding.
1 code implementation • 9 Nov 2022 • Qi Li, Ziyi Shen, Qian Li, Dean C Barratt, Thomas Dowrick, Matthew J Clarkson, Tom Vercauteren, Yipeng Hu
Little benefit was observed by adding frames more than one second away from the predicted transformation, with or without LSTM-based RNNs.
no code implementations • 23 Oct 2022 • Yunfan Liu, Qi Li, Qiyao Deng, Zhenan Sun, Ming-Hsuan Yang
Facial Attribute Manipulation (FAM) aims to aesthetically modify a given face image to render desired attributes, which has received significant attention due to its broad practical applications ranging from digital entertainment to biometric forensics.
no code implementations • 19 Oct 2022 • Shuting Tao, Peng Peng, Qi Li, Hongwei Wang
To solve this problem, we propose a Supervised Contrastive Learning (SCL) method with Tree-structured Parzen Estimator (TPE) technique for imbalanced tabular datasets.
no code implementations • 8 Oct 2022 • Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu
Deep learning (DL) methods have been widely applied to anomaly-based network intrusion detection system (NIDS) to detect malicious traffic.
no code implementations • 3 Oct 2022 • Zehong Wang, Qi Li, Donghua Yu
We argue that when learning high-order information from temporal graphs, we encounter two challenges, i. e., computational inefficiency and over-smoothing, that cannot be solved by conventional techniques applied on static graphs.
1 code implementation • 1 Oct 2022 • Zehong Wang, Qi Li, Donghua Yu, Xiaolong Han, Xiao-Zhi Gao, Shigen Shen
How to mitigate the sampling bias for heterogeneous GCL is another important problem.
1 code implementation • 27 Sep 2022 • Qi Li, Yuyang Ren, Xingli Wang, Luoyi Fu, Jiaxin Ding, Xinde Cao, Xinbing Wang, Chenghu Zhou
Understanding the origin and influence of the publication's idea is critical to conducting scientific research.
1 code implementation • 4 Sep 2022 • Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang
Existing studies on neural architecture search (NAS) mainly focus on efficiently and effectively searching for network architectures with better performance.
no code implementations • 4 Sep 2022 • Yuyang Ren, Haonan Zhang, Qi Li, Luoyi Fu, Jiaxin Ding, Xinde Cao, Xinbing Wang, Chenghu Zhou
In review-based recommendation methods, review data is considered as auxiliary information that can improve the quality of learned user/item or interaction representations for the user rating prediction task.
no code implementations • 31 Jul 2022 • Kang Zhou, Qiao Qiao, Yuepei Li, Qi Li
To reduce human annotations for relation extraction (RE) tasks, distantly supervised approaches have been proposed, while struggling with low performance.
no code implementations • 20 Jun 2022 • Yuchen Jiang, Qi Li, Han Zhu, Jinbei Yu, Jin Li, Ziru Xu, Huihui Dong, Bo Zheng
Industrial recommender systems usually hold data from multiple business scenarios and are expected to provide recommendation services for these scenarios simultaneously.
no code implementations • 26 May 2022 • Qi Li, Khalique Newaz, Tijana Milenković
Here, we evaluate whether analyzing a weighted dynamic aging-specific subnetwork inferred from newer GE and PPIN data improves prediction accuracy upon analyzing the best current subnetwork inferred from outdated data.
no code implementations • 11 May 2022 • Baorui Dai, Gaëtan Frusque, Qi Li, Olga Fink
Therefore, only acoustic sensors (non-intrusive) need to be installed during the application phase, which is convenient and crucial for the condition monitoring of safety-critical infrastructure.
no code implementations • 5 May 2022 • Qi Li, Liang Hu, Jinbo Zhang, Jianping Chen, Guiling Wu
We report on the realization of a long-haul radio frequency (RF) transfer scheme by using multiple-access relay stations (MARSs).
no code implementations • CVPR 2022 • Jianxin Sun, Qiyao Deng, Qi Li, Muyi Sun, Min Ren, Zhenan Sun
AnyFace can achieve high-quality, high-resolution, and high-diversity face synthesis and manipulation results without any constraints on the number and content of input captions.
1 code implementation • 24 Mar 2022 • Qi Li, Weining Wang, Chengzhong Xu, Zhenan Sun
In addition, semantic information is introduced into the semantic-guided fusion module to control the swapped area and model the pose and expression more accurately.
no code implementations • 4 Mar 2022 • Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li
Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos.
no code implementations • 4 Mar 2022 • Harry Cheng, Yangyang Guo, Tianyi Wang, Qi Li, Xiaojun Chang, Liqiang Nie
To this end, a voice-face matching method is devised to measure the matching degree of these two.
no code implementations • 4 Mar 2022 • Yu-Xin Jin, Jun-Jie Hu, Qi Li, Zhi-Cheng Luo, Fang-Yan Zhang, Hao Tang, Kun Qian, Xian-Min Jin
New COVID-19 epidemic strains like Delta and Omicron with increased transmissibility and pathogenicity emerge and spread across the whole world rapidly while causing high mortality during the pandemic period.
1 code implementation • ACL 2022 • Kang Zhou, Yuepei Li, Qi Li
In this paper, we study the named entity recognition (NER) problem under distant supervision.
no code implementations • 14 Feb 2022 • Rihan Chen, Bin Liu, Han Zhu, Yaoxuan Wang, Qi Li, Buting Ma, Qingbo Hua, Jun Jiang, Yunlong Xu, Hongbo Deng, Bo Zheng
In this paper, we propose a novel method to extend ANN search to arbitrary matching functions, e. g., a deep neural network.
no code implementations • 8 Feb 2022 • Fan Ji, Muyi Sun, Xingqun Qi, Qi Li, Zhenan Sun
Furthermore, we design a novel Memory Refinement Loss (MR Loss) for feature alignment in the memory module, which enhances the accuracy of memory slots in an unsupervised manner.
1 code implementation • 19 Jan 2022 • Adithya Kulkarni, Nasim Sabetpour, Alexey Markin, Oliver Eulenstein, Qi Li
This paper adopts the truth discovery idea to aggregate constituency parse trees from different parsers by estimating their reliability in the absence of ground truth.
no code implementations • 5 Jan 2022 • Xingqun Qi, Muyi Sun, Qi Li, Caifeng Shan
In addition, to improve the fidelity of the generated results, we leverage the semantic layouts to construct two types of Representational Graphs which indicate the intra-class semantic features and inter-class structural features of the synthesized images.
no code implementations • ICLR 2022 • Qi Li, Kaichun Mo, Yanchao Yang, Hang Zhao, Leonidas Guibas
While most works focus on single-object or agent-object visual functionality and affordances, our work proposes to study a new kind of visual relationship that is also important to perceive and model -- inter-object functional relationships (e. g., a switch on the wall turns on or off the light, a remote control operates the TV).
no code implementations • 19 Oct 2021 • Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang
For commercial cloud speech APIs, we propose Occam, a decision-only black-box adversarial attack, where only final decisions are available to the adversary.
no code implementations • 15 Sep 2021 • Muyi Sun, Jian Wang, Yunfan Liu, Qi Li, Zhenan Sun
Biphasic facial age translation aims at predicting the appearance of the input face at any age.
1 code implementation • 9 Sep 2021 • Nasim Sabetpour, Adithya Kulkarni, Sihong Xie, Qi Li
The proposed Aggregation method for Sequential Labels from Crowds ($AggSLC$) jointly considers the characteristics of sequential labeling tasks, workers' reliabilities, and advanced machine learning techniques.
1 code implementation • ICCV 2021 • Wenxi Liu, Qi Li, Xindai Lin, Weixiang Yang, Shengfeng He, Yuanlong Yu
In particular, we introduce a novel locality-aware context fusion based segmentation model to process local patches, where the relevance between local patch and its various contexts are jointly and complementarily utilized to handle the semantic regions with large variations.
no code implementations • 23 Aug 2021 • Jiangmiao Pang, Kai Chen, Qi Li, Zhihai Xu, Huajun Feng, Jianping Shi, Wanli Ouyang, Dahua Lin
In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels - sample level, feature level, and objective level.
no code implementations • 21 Aug 2021 • Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu
We also evaluate the effectiveness of our attack under two defenses: one is well-designed adversarial graph detector and the other is that the target GNN model itself is equipped with a defense to prevent adversarial graph generation.
no code implementations • ACL 2021 • Xinya Du, Luheng He, Qi Li, Dian Yu, Panupong Pasupat, Yuan Zhang
To address this problem, we introduce QA-driven slot filling (QASF), which extracts slot-filler spans from utterances with a span-based QA model.
2 code implementations • 13 Jul 2021 • Qi Li, Yue Wang, Yilun Wang, Hang Zhao
By introducing the method and metrics, we invite the community to study this novel map learning problem.
1 code implementation • 12 Jul 2021 • Yinwei Wei, Xiang Wang, Qi Li, Liqiang Nie, Yan Li, Xuanping Li, Tat-Seng Chua
It aims to maximize the mutual dependencies between item content and collaborative signals.
no code implementations • ICCV 2021 • Yuecong Xu, Jianfei Yang, Haozhi Cao, Qi Li, Kezhi Mao, Zhenghua Chen
For videos, such negative transfer could be triggered by both spatial and temporal features, which leads to a more challenging Partial Video Domain Adaptation (PVDA) problem.
no code implementations • 29 Jun 2021 • Xingqun Qi, Muyi Sun, Weining Wang, Xiaoxiao Dong, Qi Li, Caifeng Shan
To tackle these challenges, we propose a novel Semantic-Driven Generative Adversarial Network (SDGAN) which embeds global structure-level style injection and local class-level knowledge re-weighting.
1 code implementation • 28 Jun 2021 • Chuanpu Fu, Qi Li, Meng Shen, Ke Xu
To this end, we propose Whisper, a realtime ML based malicious traffic detection system that achieves both high accuracy and high throughput by utilizing frequency domain features.
no code implementations • 27 Jun 2021 • Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao
In a highly heterogeneous environment, AdaptCL achieves a training speedup of 6. 2x with a slight loss of accuracy.
no code implementations • 24 Jun 2021 • Zhuang He, Qi Li, Huajun Feng, Zhihai Xu
Then, the color and location probability map of the moving area will be calculated through maximum a posteriori probability.
1 code implementation • CVPR 2021 • Weixiang Yang, Qi Li, Wenxi Liu, Yuanlong Yu, Yuexin Ma, Shengfeng He, Jia Pan
Furthermore, our model runs at 35 FPS on a single GPU, which is efficient and applicable for real-time panorama HD map reconstruction.
Autonomous Driving
Monocular Cross-View Road Scene Parsing(Road)
+1
1 code implementation • 12 Jun 2021 • Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li
In deep learning, a typical strategy for transfer learning is to freeze the early layers of a pre-trained model and fine-tune the rest of its layers on the target domain.
1 code implementation • 2 Jun 2021 • Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang
This competition provides a common platform for benchmarking the adversarial game between current state-of-the-art DeepFake creation and detection methods.
1 code implementation • CVPR 2021 • Yuhao Zhu, Qi Li, Jian Wang, Chengzhong Xu, Zhenan Sun
Extensive experiments demonstrate the superiority of MegaFS and the first megapixel level face swapping database is released for research on DeepFake detection and face image editing in the public domain.
Ranked #7 on
Face Swapping
on FaceForensics++
1 code implementation • 30 Apr 2021 • Haoying Li, Yifan Yang, Meng Chang, Huajun Feng, Zhihai Xu, Qi Li, Yueting Chen
Single image super-resolution (SISR) aims to reconstruct high-resolution (HR) images from the given low-resolution (LR) ones, which is an ill-posed problem because one LR image corresponds to multiple HR images.
no code implementations • NAACL 2021 • Dian Yu, Luheng He, Yuan Zhang, Xinya Du, Panupong Pasupat, Qi Li
Few-shot learning arises in important practical scenarios, such as when a natural language understanding system needs to learn new semantic labels for an emerging, resource-scarce domain.
1 code implementation • ICCV 2021 • Mingtao Feng, Zhen Li, Qi Li, Liang Zhang, Xiangdong Zhang, Guangming Zhu, HUI ZHANG, Yaonan Wang, Ajmal Mian
There are three main challenges in 3D object grounding: to find the main focus in the complex and diverse description; to understand the point cloud scene; and to locate the target object.
no code implementations • 28 Mar 2021 • Xiguo Yuan, Yuan Zhao, Yang Guo, Linmei Ge, Wei Liu, Shiyu Wen, Qi Li, Zhangbo Wan, Peina Zheng, Tao Guo, Zhida Li, Martin Peifer, Yupeng Cun
In the past decade, a variety of methods have been developed for subclonal reconstruction using bulk tumor sequencing data.
no code implementations • 11 Mar 2021 • X. M. Huang, Qi Li, Aigen Li, J. H. Chen, F. Z. Liu, C. Y. Xiao
Extremely elongated, conducting dust particles (also known as metallic "needles" or "whiskers") are seen in carbonaceous chondrites and in samples brought back from the Itokawa asteroid.
Astrophysics of Galaxies
no code implementations • 18 Feb 2021 • Minghong Fang, Minghao Sun, Qi Li, Neil Zhenqiang Gong, Jin Tian, Jia Liu
Our empirical results show that the proposed defenses can substantially reduce the estimation errors of the data poisoning attacks.
no code implementations • 18 Feb 2021 • Jin Li, Jie Liu, Shangzhou Li, Yao Xu, Ran Cao, Qi Li, Biye Jiang, Guan Wang, Han Zhu, Kun Gai, Xiaoqiang Zhu
When receiving a user request, matching system (i) finds the crowds that the user belongs to; (ii) retrieves all ads that have targeted those crowds.
no code implementations • 10 Feb 2021 • Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li
Particularly, the localized adversarial examples only perturb a small and contiguous region of the target object, so that they are robust and effective in both digital and physical worlds.
no code implementations • 7 Jan 2021 • Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu
Specifically, we formulate our attack as an optimization problem, such that the injected ratings would maximize the number of normal users to whom the target items are recommended.
no code implementations • 31 Dec 2020 • Hongjian Wang, Qi Li, Lanbo Zhang, Yue Lu, Steven Yoo, Srinivas Vadrevu, Zhenhui Li
Historical features are important in ads click-through rate (CTR) prediction, because they account for past engagements between users and ads.
no code implementations • 27 Nov 2020 • Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du
Deep neural networks (DNNs) have been increasingly used in face recognition (FR) systems.
no code implementations • 19 Nov 2020 • Yunfan Liu, Qi Li, Zhenan Sun, Tieniu Tan
Generative Adversarial Networks (GANs) with style-based generators (e. g. StyleGAN) successfully enable semantic control over image synthesis, and recent studies have also revealed that interpretable image translations could be obtained by modifying the latent code.
1 code implementation • Findings of the Association for Computational Linguistics 2020 • Nasim Sabetpour, Adithya Kulkarni, Qi Li
Our results show that the proposed OptSLA outperforms the state-of-the-art aggregation methods, and the results are easier to interpret.
2 code implementations • NeurIPS 2020 • Houwen Peng, Hao Du, Hongyuan Yu, Qi Li, Jing Liao, Jianlong Fu
The experiments on ImageNet verify such path distillation method can improve the convergence ratio and performance of the hypernetwork, as well as boosting the training of subnetworks.
no code implementations • 26 Oct 2020 • Qi Li, Dianzi Liu, Zhenghua Qian
Data-driven quantitative defect reconstructions using ultrasonic guided waves has recently demonstrated great potential in the area of non-destructive testing.
no code implementations • 14 Sep 2020 • Qi Li, Yihui Da, Yinghong Zhang, Bin Wang, Dianzi Liu, Zhenghua Qian
To address this issue, a novel approach to quantitative reconstruction of defects using the integration of data-driven method with the guided wave scattering analysis has been proposed in this paper.
Computational Engineering, Finance, and Science J.2
no code implementations • 2 Aug 2020 • Xuankai Liu, Fengting Li, Bihan Wen, Qi Li
In this paper, we benchmark the robustness of watermarking, and propose a novel backdoor-based watermark removal framework using limited data, dubbed WILD.
no code implementations • 1 Jul 2020 • Meng Chang, Huajun Feng, Zhihai Xu, Qi Li
Using our data generation method and the proposed LSFNet, we can recover the details and color of the original scene, and improve the low-light image quality effectively.
no code implementations • ACL 2020 • Xuan Wang, Yingjun Guan, Weili Liu, Aabhas Chauhan, Enyi Jiang, Qi Li, David Liem, Dibakar Sigdel, John Caufield, Peipei Ping, Jiawei Han
EVIDENCEMINER is constructed in a completely automated way without any human effort for training data annotation.
2 code implementations • CVPR 2021 • Jiangmiao Pang, Linlu Qiu, Xia Li, Haofeng Chen, Qi Li, Trevor Darrell, Fisher Yu
Compared to methods with similar detectors, it boosts almost 10 points of MOTA and significantly decreases the number of ID switches on BDD100K and Waymo datasets.
Ranked #1 on
One-Shot Object Detection
on PASCAL VOC 2012 val
no code implementations • 3 Jun 2020 • Qiyao Deng, Jie Cao, Yunfan Liu, Zhenhua Chai, Qi Li, Zhenan Sun
Face portrait editing has achieved great progress in recent years.
no code implementations • 7 May 2020 • Qi Li, Khalique Newaz, Tijana Milenković
Instead, we recently inferred a dynamic aging-specific subnetwork using a methodologically more advanced notion of network propagation (NP), which improved upon Induced dynamic aging-specific subnetwork in a different task, that of unsupervised analyses of the aging process.
no code implementations • 1 May 2020 • Shi Zhi, Liyuan Liu, Yu Zhang, Shiyin Wang, Qi Li, Chao Zhang, Jiawei Han
While typical named entity recognition (NER) models require the training set to be annotated with all target types, each available datasets may only cover a part of them.
no code implementations • 21 Apr 2020 • Qi Li, Hanlin Mo, Jinghan Zhao, Hongxiang Hao, Hua Li
The dynamics of human skeletons have significant information for the task of action recognition.
1 code implementation • ECCV 2020 • Bin Liu, Yue Cao, Yutong Lin, Qi Li, Zheng Zhang, Mingsheng Long, Han Hu
This paper introduces a negative margin loss to metric learning based few-shot learning methods.
no code implementations • 24 Feb 2020 • Meng Chang, Chenwei Yang, Huajun Feng, Zhihai Xu, Qi Li
In this paper, we propose a novel method to handle camera motion blur with outliers.
2 code implementations • ECCV 2020 • Meng Chang, Qi Li, Huajun Feng, Zhihai Xu
An encoder-decoder structure with a context block is introduced to capture multiscale information.
Ranked #7 on
Image Denoising
on DND
(using extra training data)
no code implementations • 19 Nov 2019 • You Hao, Hanlin Mo, Qi Li, He Zhang, Hua Li
In this paper, we propose a general framework to derive moment invariants under DAT for objects in M-dimensional space with N channels, which can be called dual-affine moment invariants (DAMI).
no code implementations • 15 Nov 2019 • Yunfan Liu, Qi Li, Zhenan Sun, Tieniu Tan
Face aging, which aims at aesthetically rendering a given face to predict its future appearance, has received significant research attention in recent years.
no code implementations • 29 Oct 2019 • Li Chen, Guowei Zhu, Qi Li, Haifeng Li
This added adversarial perturbation image is called an adversarial example, which poses a serious security problem for systems based on CNN model recognition results.
2 code implementations • 16 Oct 2019 • Yu Zhang, Frank F. Xu, Sha Li, Yu Meng, Xuan Wang, Qi Li, Jiawei Han
With the massive number of repositories available, there is a pressing need for topic-based search.
no code implementations • 10 Oct 2019 • Qi Li, Long Mai, Michael A. Alcorn, Anh Nguyen
Large, pre-trained generative models have been increasingly popular and useful to both the research and wider communities.
no code implementations • IJCNLP 2019 • Pengfei Li, Kezhi Mao, Xuefeng Yang, Qi Li
While attention mechanisms have been proven to be effective in many NLP tasks, majority of them are data-driven.
no code implementations • 21 Aug 2019 • Qi Li, Tijana Milenković
In a systematic and comprehensive evaluation, we find that in many of the evaluation tests: (i) using an aging-specific subnetwork indeed yields more accurate aging-related gene predictions than using the entire network, and (ii) predictive methods from our framework that have not previously been used for supervised prediction of aging-related genes outperform existing prominent methods for the same purpose.
1 code implementation • Nature Communicationsvolume 10, Article number: 3474 (2019) 2019 • Yimin Wang, Qi Li, Li-Juan Liu, Zhi Zhou, Zongcai Ruan, Lingsheng Kong, Yaoyao Li, Yun Wang, Ning Zhong, Renjie Chai, Xiangfeng Luo, Yike Guo, Michael Hawrylycz, Qingming Luo, Zhongze Gu, Wei Xie, Hongkui Zeng, Hanchuan Peng
Neuron morphology is recognized as a key determinant of cell type, yet the quantitative profiling of a mammalian neuron’s complete three-dimensional (3-D) morphology remains arduous when the neuron has complex arborization and long projection.
1 code implementation • IEEE Transactions on Image Processing 2019 • Hongwen Zhang, Qi Li, Zhenan Sun
Then, an end-to-end pipeline is designed to jointly regress the proposed volumetric representation and the coordinate vector.
Ranked #3 on
Face Alignment
on AFLW2000-3D
1 code implementation • 16 Apr 2019 • Zhaoning Li, Qi Li, Xiaotian Zou, Jiangtao Ren
Causality extraction from natural language texts is a challenging open problem in artificial intelligence.
no code implementations • 6 Mar 2019 • Qi Li, Yunfan Liu, Zhenan Sun
Age progression and regression refers to aesthetically render-ing a given face image to present effects of face aging and rejuvenation, respectively.
no code implementations • 25 Feb 2019 • Poonam Yadav, Qi Li, Anthony Brown, Richard Mortier
We continue to see increasingly widespread deployment of IoT devices, with apparent intent to embed them in our built environment likely to accelerate if smart city and related programmes succeed.
Networking and Internet Architecture
no code implementations • 20 Jan 2019 • Li Chen, Hailun Ding, Qi Li, Zhuo Li, Jian Peng, Haifeng Li
Understanding the internal representations of deep neural networks (DNNs) is crucal to explain their behavior.
no code implementations • 25 Dec 2018 • Li Chen, Qi Li, Weiye Chen, Zeyu Wang, Haifeng Li
In this regard, we propose the Adversarial Feature Genome (AFG), a novel type of data that contains both the differences and features about classes.
1 code implementation • CVPR 2019 • Michael A. Alcorn, Qi Li, Zhitao Gong, Chengfei Wang, Long Mai, Wei-Shinn Ku, Anh Nguyen
Using our framework and a self-assembled dataset of 3D objects, we investigate the vulnerability of DNNs to OoD poses of well-known objects in ImageNet.
no code implementations • 27 Nov 2018 • Li Chen, Hailun Ding, Qi Li, Zhuo Li, Jian Peng, Haifeng Li
Understanding the internal representations of deep neural networks (DNNs) is crucal to explain their behavior.
1 code implementation • 21 Oct 2018 • Youshan Zhang, Qi Li
Electricity consumption forecasting has important implications for the mineral companies on guiding quarterly work, normal power system operation, and the management.
no code implementations • 21 Oct 2018 • Youshan Zhang, Liangdong Guo, Qi Li, Junhui Li
This paper deals with the problem of the electricity consumption forecasting method.
no code implementations • 14 Oct 2018 • Yaliang Li, Liuyi Yao, Nan Du, Jing Gao, Qi Li, Chuishi Meng, Chenwei Zhang, Wei Fan
Patients who have medical information demands tend to post questions about their health conditions on these crowdsourced Q&A websites and get answers from other users.
no code implementations • CVPR 2019 • Yunfan Liu, Qi Li, Zhenan Sun
Since it is difficult to collect face images of the same subject over a long range of age span, most existing face aging methods resort to unpaired datasets to learn age mappings.
no code implementations • 30 Aug 2018 • He Zhang, Hanlin Mo, You Hao, Qi Li, Hua Li
According to the Liouville Theorem, an important part of the conformal transformation is the Mobius transformation, so we focus on Mobius transformation and propose two differential expressions that are invariable under 2-D and 3-D Mobius transformation respectively.
no code implementations • 28 Jan 2018 • Hongwen Zhang, Qi Li, Zhenan Sun
Then, a stacked hourglass network is adopted to estimate the volumetric representation from coarse to fine, followed by a 3D convolution network that takes the estimated volume as input and regresses 3D coordinates of the face shape.
Ranked #1 on
3D Facial Landmark Localization
on AFLW2000-3D
no code implementations • 25 Jan 2018 • Pei-Pei Li, Yibo Hu, Qi Li, Ran He, Zhenan Sun
To utilize both global and local facial information, we propose a Global and Local Consistent Age Generative Adversarial Network (GLCA-GAN).
no code implementations • 29 Dec 2017 • Daiguo Deng, Ruomei Wang, Hefeng Wu, Huayong He, Qi Li, Xiaonan Luo
Fabric image retrieval is beneficial to many applications including clothing searching, online shopping and cloth modeling.
1 code implementation • PLOS ONE 2017 • Xinyu Yang, Guoai Xu, Qi Li, Yanhui Guo, Miao Zhang
Then these metrics are input to neural network for supervised learning, the weights of which are output by PSO and BP hybrid algorithm.
no code implementations • NeurIPS 2017 • Qi Li, Zhenan Sun, Ran He, Tieniu Tan
Benefit from recent advances in deep learning, deep hashing methods have achieved promising results for image retrieval.
1 code implementation • 30 Nov 2016 • Hongwen Zhang, Qi Li, Zhenan Sun, Yunfan Liu
This Estimation-Correction-Tuning process perfectly combines the advantages of the global robustness of data-driven method (FCN), outlier correction capability of model-driven method (PDM) and non-parametric optimization of RLMS.
no code implementations • 15 Jun 2016 • Qi Li, Tianshi Li, Baobao Chang
Word embeddings play a significant role in many modern NLP systems.
no code implementations • 3 Oct 2015 • Qi Li
But the premise of inference is that the map procedure holds parameters for all features in the sample.
no code implementations • LREC 2014 • Hai-Bo Li, Masato Hagiwara, Qi Li, Heng Ji
As long as (2) is ensured, the performance of word segmentation does not have appreciable impact on Chinese and Japanese name tagging.