no code implementations • ECCV 2020 • Yi Huang, Fan Wang, Adams Wai-Kin Kong, Kwok-Yan Lam
The experiments show that the universal patches are able to mislead the detector with greater probabilities.
no code implementations • EANCS 2021 • Yi Huang, Junlan Feng, Xiaoting Wu, Xiaoyu Du
Our findings are: the performance variance of generative DSTs is not only due to the model structure itself, but can be attributed to the distribution of cross-domain values.
1 code implementation • 11 May 2022 • Xu Cao, Xiaoye Li, Liya Ma, Yi Huang, Xuan Feng, Zening Chen, Hongwu Zeng, Jianguo Cao
We show that AggPose outperforms hybrid model HRFormer and TokenPose in the infant pose estimation dataset.
Ranked #7 on
Keypoint Detection
on COCO
no code implementations • 25 Apr 2022 • Shuo Zhang, Junzhou Zhao, Pinghui Wang, Yu Li, Yi Huang, Junlan Feng
Multi-action dialog policy (MADP), which generates multiple atomic dialog actions per turn, has been widely applied in task-oriented dialog systems to provide expressive and efficient system responses.
no code implementations • 13 Apr 2022 • Hong Liu, Yucheng Cai, Zhijian Ou, Yi Huang, Junlan Feng
Recently, Transformer based pretrained language models (PLMs), such as GPT2 and T5, have been leveraged to build generative task-oriented dialog (TOD) systems.
1 code implementation • 4 Mar 2022 • Dmitrii Torbunov, Yi Huang, Haiwang Yu, Jin Huang, Shinjae Yoo, MeiFeng Lin, Brett Viren, Yihui Ren
Image-to-image translation has broad applications in art, design, and scientific simulations.
no code implementations • 12 Nov 2021 • Igor Kulev, Berkay Köprü, Raul Rodriguez-Esteban, Diego Saldana, Yi Huang, Alessandro La Torraca, Elif Ozkirimli
The BioCreative VII Track 3 challenge focused on the identification of medication names in Twitter user timelines.
1 code implementation • 9 Nov 2021 • Yi Huang, Yihui Ren, Shinjae Yoo, Jin Huang
This method shows advantages both in compression fidelity and ratio compared to traditional data compression methods, such as MGARD, SZ, and ZFP.
no code implementations • ICLR 2022 • Yi Huang, Adams Wai-Kin Kong
The vulnerability of deep neural networks to adversarial examples has drawn tremendous attention from the community.
2 code implementations • EMNLP 2021 • Yi Huang, Buse Giledereli, Abdullatif Köksal, Arzucan Özgür, Elif Ozkirimli
Here, we introduce the application of balancing loss functions for multi-label text classification.
Ranked #1 on
Multi-Label Text Classification
on Reuters-21578
no code implementations • 9 Sep 2021 • Hong Liu, Yucheng Cai, Zhenru Lin, Zhijian Ou, Yi Huang, Junlan Feng
In this paper, we propose Variational Latent-State GPT model (VLS-GPT), which is the first to combine the strengths of the two approaches.
no code implementations • 23 Feb 2021 • Yi Huang, Y. Ayino, B. I. Shklovskii
We try to explain this discrepancy in the framework of the theory of the percolation MIT in a strongly compensated semiconductor with the same $N=10^{19}$ cm$^{-3}$.
Materials Science
1 code implementation • 15 Dec 2020 • Shuo Zhang, Junzhou Zhao, Pinghui Wang, Nuo Xu, Yang Yang, Yiting Liu, Yi Huang, Junlan Feng
This will result in the issue of contract inconsistencies, which may severely impair the legal validity of the contract.
1 code implementation • 25 Nov 2020 • Jie Ma, Jun Liu, Junjun Li, Qinghua Zheng, Qingyu Yin, Jianlong Zhou, Yi Huang
Textbook Question Answering (TQA) is a task that one should answer a diagram/non-diagram question given a large multi-modal context consisting of abundant essays and diagrams.
no code implementations • Findings of the Association for Computational Linguistics 2020 • Yi Huang, Junlan Feng, Shuo Ma, Xiaoyu Du, Xiaoting Wu
In this paper, we propose a meta-learning based semi-supervised explicit dialogue state tracker (SEDST) for neural dialogue generation, denoted as MEDST.
no code implementations • 14 Oct 2020 • Yujie Liu, Xu Zhu, Eng Gee Lim, Yufei Jiang, Yi Huang
A low-complexity semi-blind joint estimation scheme of multiple channels, CFOs and IQ imbalances is proposed.
no code implementations • ACL 2020 • Yi Huang, Junlan Feng, Min Hu, Xiaoting Wu, Xiaoyu Du, Shuo Ma
The state-of-the-art accuracy for DST is below 50{\%} for a multi-domain dialogue task.
no code implementations • 2 Mar 2020 • Peng Jia, Xuebo Wu, Yi Huang, Bojun Cai, Dongmei Cai
Assuming point spread functions induced by the atmospheric turbulence with the same profile belong to the same manifold space, we propose a non-parametric point spread function -- PSF-NET.
no code implementations • 28 Nov 2019 • Yi Huang, Xiaoshan Yang, Changsheng Xu
(1) It can model longitudinal heterogeneous EHRs data via capturing the 3-order correlations of different modalities and the irregular temporal impact of historical events.
no code implementations • 4 Nov 2019 • Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay
Large-scale trends in urban crime and global terrorism are well-predicted by socio-economic drivers, but focused, event-level predictions have had limited success.
no code implementations • 26 Sep 2019 • Yi Huang, Ishanu Chattopadhyay
Recognizing subtle historical patterns is central to modeling and forecasting problems in time series analysis.
no code implementations • 29 Jul 2019 • Peng Jia, Yi Huang, Bojun Cai, Dongmei Cai
Texture is one of the most obvious characteristics in solar images and it is normally described by texture features.
1 code implementation • 24 May 2019 • Yi Huang, Peng Jia, Dongmei Cai, Bojun Cai
Next-generation ground-based solar observations require good image quality metrics for post-facto processing techniques.
no code implementations • 6 Sep 2018 • Tingran Gao, Shahab Asoodeh, Yi Huang, James Evans
Inspired by recent interests of developing machine learning and data mining algorithms on hypergraphs, we investigate in this paper the semi-supervised learning algorithm of propagating "soft labels" (e. g. probability distributions, class membership scores) over hypergraphs, by means of optimal transportation.
no code implementations • 9 Apr 2018 • Shahab Asoodeh, Yi Huang, Ishanu Chattopadhyay
We investigate the problem of reliable communication between two legitimate parties over deletion channels under an active eavesdropping (aka jamming) adversarial model.
no code implementations • 17 Nov 2013 • Volker Tresp, Sonja Zillner, Maria J. Costa, Yi Huang, Alexander Cavallaro, Peter A. Fasching, Andre Reis, Martin Sedlmayr, Thomas Ganslandt, Klemens Budde, Carl Hinrichs, Danilo Schmidt, Philipp Daumke, Daniel Sonntag, Thomas Wittenberg, Patricia G. Oppelt, Denis Krompass
We argue that a science of a Clinical Data Intelligence is sensible in the context of a Big Data analysis, i. e., with data from many patients and with complete patient information.