no code implementations • 21 Dec 2020 • Ji-Cheng Zhang, Xiao-Feng Wang, Jun Mo, Gao-Bo Xi, Jie Lin, Xiao-Jun Jiang, Xiao-Ming Zhang, Wen-Xiong Li, Sheng-Yu Yan, Zhi-Hao Chen, Lei Hu, Xue Li, Wei-Li Lin, Han Lin, Cheng Miao, Li-Ming Rui, Han-Na Sai, Dan-Feng Xiang, Xing-Han Zhang
The TMTS system can have a FoV of about 9 deg2 when monitoring the sky with two bands (i. e., SDSS g and r filters) at the same time, and a maximum FoV of ~18 deg2 when four telescopes monitor different sky areas in monochromatic filter mode.
Instrumentation and Methods for Astrophysics
1 code implementation • Journal of Chemical Information and Modeling 2019 • Xiao-Feng Wang, Zhen Li, Mingjian Jiang, Shuang Wang, Shugang Zhang, Zhiqiang Wei
And, multiple C-SGELs are stacked to construct a convolution spatial graph embedding network (C-SGEN) for end-to-end representation learning.
Ranked #2 on
Graph Regression
on Lipophilicity
1 code implementation • 2 Aug 2019 • Di Tang, Xiao-Feng Wang, Haixu Tang, Kehuan Zhang
A security threat to deep neural networks (DNN) is backdoor contamination, in which an adversary poisons the training data of a target model to inject a Trojan so that images carrying a specific trigger will always be classified into a specific label.
Cryptography and Security
1 code implementation • 22 Apr 2019 • Lluís Galbany, Chris Ashall, Peter Hoeflich, Santiago González-Gaitán, Stefan Taubenberger, Maximilian Stritzinger, Eric Y. Hsiao, Paolo Mazzali, Eddie Baron, Stéphane Blondin, Subhash Bose, Mattia Bulla, Jamison F. Burke, Christopher R. Burns, Régis Cartier, Ping Chen, Massimo Della Valle, Tiara R. Diamond, Claudia P. Gutiérrez, Jussi Harmanen, Daichi Hiramatsu, T. W. -S. Holoien, Griffin Hosseinzadeh, D. Andrew Howell, Yiwen Huang, Cosimo Inserra, Thomas de Jaeger, Saurabh W. Jha, Tuomas Kangas, Markus Kromer, Joseph D. Lyman, Kate Maguire, George Howie Marion, Dan Milisavljevic, Simon J. Prentice, Alessandro Razza, Thomas M. Reynolds, David J. Sand, Benjamin J. Shappee, Rohit Shekhar, Stephen J. Smartt, Keivan G. Stassun, Mark Sullivan, Stefano Valenti, Steven Villanueva, Xiao-Feng Wang, J. Craig Wheeler, Qian Zhai, Jujia Zhang
Our modeling suggests that the narrow [Ca II] features observed in the nebular spectrum are associated with $^{48}$Ca from electron capture during the explosion, which is expected to occur only in white dwarfs that explode near or at the $M_{\rm Ch}$ limit.
Solar and Stellar Astrophysics High Energy Astrophysical Phenomena
no code implementations • 16 Feb 2019 • Jang Ik Cho, Xiao-Feng Wang, Yifan Xu, Jiayang Sun
Given two contrasting sequences of images, the image processing in LISA starts with selecting a region of interest in two representative images, followed by automatic or manual segmentation and registration.
no code implementations • 3 May 2018 • Nan Zhang, Xianghang Mi, Xuan Feng, Xiao-Feng Wang, Yuan Tian, Feng Qian
The significance of our findings have already been acknowledged by Amazon and Google, and further evidenced by the risky skills discovered on Alexa and Google markets by the new detection systems we built.
Cryptography and Security
no code implementations • 13 Mar 2018 • Zhe Zhou, Di Tang, Xiao-Feng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang
We propose a kind of brand new attack against face recognition systems, which is realized by illuminating the subject using infrared according to the adversarial examples worked out by our algorithm, thus face recognition systems can be bypassed or misled while simultaneously the infrared perturbations cannot be observed by raw eyes.
Cryptography and Security
1 code implementation • 13 Feb 2018 • Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiao-Feng Wang, Haixu Tang, Carl A. Gunter, Kai Chen
Membership Inference Attack (MIA) determines the presence of a record in a machine learning model's training data by querying the model.
no code implementations • 24 Jan 2018 • Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiao-Feng Wang, Carl A. Gunter
For this purpose, we developed novel techniques that address a key technical challenge: integrating the commands into a song in a way that can be effectively recognized by ASR through the air, in the presence of background noise, while not being detected by a human listener.
Automatic Speech Recognition
Automatic Speech Recognition (ASR)
+1
no code implementations • 5 Jan 2018 • Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Cryptography and Security
no code implementations • 8 Sep 2017 • Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, Xiao-Feng Wang
We discover and describe Apple's set-up for differentially private data processing, including the overall data pipeline, the parameters used for differentially private perturbation of each piece of data, and the frequency with which such data is sent to Apple's servers.
no code implementations • CVPR 2018 • Shizhong Han, Zibo Meng, Zhiyuan Li, James O'Reilly, Jie Cai, Xiao-Feng Wang, Yan Tong
Most recently, Convolutional Neural Networks (CNNs) have shown promise for facial AU recognition, where predefined and fixed convolution filter sizes are employed.
2 code implementations • 23 May 2017 • Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiao-Feng Wang
Consequently, the adversarial example can be effectively detected by comparing the classification results of a given sample and its denoised version, without referring to any prior knowledge of attacks.
no code implementations • 6 Apr 2017 • Zhe Sun, Ting Wang, Ke Deng, Xiao-Feng Wang, Robert Lafyatis, Ying Ding, Ming Hu, Wei Chen
More importantly, as a model-based approach, DIMM-SC is able to quantify the clustering uncertainty for each single cell, facilitating rigorous statistical inference and biological interpretations, which are typically unavailable from existing clustering methods.
no code implementations • 28 Mar 2017 • Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, Xiao-Feng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin
We systemize this process, by proposing a taxonomy for the IoT ecosystem and organizing IoT security into five problem areas.
Cryptography and Security