Search Results for author: Yi Xie

Found 27 papers, 8 papers with code

Beimingwu: A Learnware Dock System

1 code implementation24 Jan 2024 Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou

The learnware paradigm proposed by Zhou [2016] aims to enable users to reuse numerous existing well-trained models instead of building machine learning models from scratch, with the hope of solving new user tasks even beyond models' original purposes.

Mask4Align: Aligned Entity Prompting with Color Masks for Multi-Entity Localization Problems

no code implementations CVPR 2024 Haoquan Zhang, Ronggang Huang, Yi Xie, Huaidong Zhang

Consequently the VQA dataset is limited by the limitations of text description and cannot adequately cover scenarios involving multiple entities.

Question Answering Visual Question Answering

D3still: Decoupled Differential Distillation for Asymmetric Image Retrieval

no code implementations CVPR 2024 Yi Xie, Yihong Lin, Wenjie Cai, Xuemiao Xu, Huaidong Zhang, Yong Du, Shengfeng He

Existing methods for asymmetric image retrieval employ a rigid pairwise similarity constraint between the query network and the larger gallery network.

Image Retrieval Retrieval

SAME: Sample Reconstruction against Model Extraction Attacks

1 code implementation17 Dec 2023 Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen

While deep learning models have shown significant performance across various domains, their deployment needs extensive resources and advanced computing infrastructure.

Model extraction

Large Language Models Illuminate a Progressive Pathway to Artificial Healthcare Assistant: A Review

1 code implementation3 Nov 2023 Mingze Yuan, Peng Bao, Jiajia Yuan, Yunhao Shen, ZiFan Chen, Yi Xie, Jie Zhao, Yang Chen, Li Zhang, Lin Shen, Bin Dong

This has sparked significant interest in applying LLMs to enhance various aspects of healthcare, ranging from medical education to clinical decision support.

Towards a Smaller Student: Capacity Dynamic Distillation for Efficient Image Retrieval

no code implementations CVPR 2023 Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He

Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training.

Image Retrieval Knowledge Distillation +1

Easy Begun is Half Done: Spatial-Temporal Graph Modeling with ST-Curriculum Dropout

2 code implementations28 Nov 2022 Hongjun Wang, Jiyuan Chen, Tong Pan, Zipei Fan, Boyuan Zhang, Renhe Jiang, Lingyu Zhang, Yi Xie, Zhongyi Wang, Xuan Song

Spatial-temporal (ST) graph modeling, such as traffic speed forecasting and taxi demand prediction, is an important task in deep learning area.

A Study on Representation Transfer for Few-Shot Learning

no code implementations5 Sep 2022 Chun-Nam Yu, Yi Xie

Few-shot classification aims to learn to classify new object categories well using only a few labeled examples.

Classification feature selection +2

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems

no code implementations15 Jul 2022 Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu

Case studies on the detection of SFDIAs on the benchmark smart grids show that the PowerFDNet achieved significant improvement compared with the state-of-the-art SFDIA detection methods.

Compute Cost Amortized Transformer for Streaming ASR

no code implementations5 Jul 2022 Yi Xie, Jonathan Macoskey, Martin Radfar, Feng-Ju Chang, Brian King, Ariya Rastrow, Athanasios Mouchtaris, Grant P. Strimel

We present a streaming, Transformer-based end-to-end automatic speech recognition (ASR) architecture which achieves efficient neural inference through compute cost amortization.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

CHIP: CHannel Independence-based Pruning for Compact Neural Networks

1 code implementation NeurIPS 2021 Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan

Filter pruning has been widely used for neural network compression because of its enabled practical acceleration.

Neural Network Compression

GiT: Graph Interactive Transformer for Vehicle Re-identification

no code implementations12 Jul 2021 Fei Shen, Yi Xie, Jianqing Zhu, Xiaobin Zhu, Huanqiang Zeng

In the macro view, a list of GiT blocks are stacked to build a vehicle re-identification model, in where graphs are to extract discriminative local features within patches and transformers are to extract robust global features among patches.

Person Re-Identification Vehicle Re-Identification

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

no code implementations13 May 2021 XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang

This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.

Cloud Computing

A Competitive Method to VIPriors Object Detection Challenge

no code implementations19 Apr 2021 Fei Shen, Xin He, Mengwan Wei, Yi Xie

In this report, we introduce the technical details of our submission to the VIPriors object detection challenge.

Data Augmentation Object +2

Noise Injection-based Regularization for Point Cloud Processing

no code implementations28 Mar 2021 Xiao Zang, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan

In this paper, we, for the first time, perform systematic investigation on noise injection-based regularization for point cloud-domain DNNs.

Data Augmentation Semantic Segmentation

ISTD-GCN: Iterative Spatial-Temporal Diffusion Graph Convolutional Network for Traffic Speed Forecasting

no code implementations10 Aug 2020 Yi Xie, Yun Xiong, Yangyong Zhu

Most of the existing algorithms for traffic speed forecasting split spatial features and temporal features to independent modules, and then associate information from both dimensions.

Social and Information Networks

Exploring Spatial Significance via Hybrid Pyramidal Graph Network for Vehicle Re-identification

1 code implementation29 May 2020 Fei Shen, Jianqing Zhu, Xiaobin Zhu, Yi Xie, Jingchang Huang

Secondly, a novel pyramidal graph network (PGN) is designed to comprehensively explore the spatial significance of feature maps at multiple scales.

Vehicle Re-Identification

Estimation of the Laser Frequency Nosie Spectrum by Continuous Dynamical Decoupling

no code implementations8 May 2020 Manchao Zhang, Yi Xie, Jie Zhang, Weichen Wang, Chunwang Wu, Ting Chen, Wei Wu, Pingxing Chen

Decoherence induced by the laser frequency noise is one of the most important obstacles in the quantum information processing.

Quantum Physics

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

no code implementations26 Apr 2020 Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan

These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).

Adversarial Attack

PERMDNN: Efficient Compressed DNN Architecture with Permuted Diagonal Matrices

no code implementations23 Apr 2020 Chunhua Deng, Siyu Liao, Yi Xie, Keshab K. Parhi, Xuehai Qian, Bo Yuan

On the other hand, the recent structured matrix-based approach (i. e., CirCNN) is limited by the relatively complex arithmetic computation (i. e., FFT), less flexible compression ratio, and its inability to fully utilize input sparsity.

Model Compression

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

no code implementations4 Mar 2020 Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan

As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.

Adversarial Attack Room Impulse Response (RIR) +1

CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator

no code implementations16 Dec 2019 Huy Phan, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan

In addition, CAG exhibits high transferability across different DNN classifier models in black-box attack scenario by introducing random dropout in the process of generating perturbations.

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.