Search Results for author: Yi Xie

Found 20 papers, 5 papers with code

Towards a Smaller Student: Capacity Dynamic Distillation for Efficient Image Retrieval

no code implementations16 Mar 2023 Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He

Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training.

Image Retrieval Knowledge Distillation +1

Easy Begun is Half Done: Spatial-Temporal Graph Modeling with ST-Curriculum Dropout

1 code implementation28 Nov 2022 Hongjun Wang, Jiyuan Chen, Tong Pan, Zipei Fan, Boyuan Zhang, Renhe Jiang, Lingyu Zhang, Yi Xie, Zhongyi Wang, Xuan Song

Spatial-temporal (ST) graph modeling, such as traffic speed forecasting and taxi demand prediction, is an important task in deep learning area.

A Study on Representation Transfer for Few-Shot Learning

no code implementations5 Sep 2022 Chun-Nam Yu, Yi Xie

Few-shot classification aims to learn to classify new object categories well using only a few labeled examples.

Classification Few-Shot Learning +1

PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-model Transmission Systems

no code implementations15 Jul 2022 Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu

Case studies on the detection of SFDIAs on the benchmark smart grids show that the PowerFDNet achieved significant improvement compared with the state-of-the-art SFDIA detection methods.

Compute Cost Amortized Transformer for Streaming ASR

no code implementations5 Jul 2022 Yi Xie, Jonathan Macoskey, Martin Radfar, Feng-Ju Chang, Brian King, Ariya Rastrow, Athanasios Mouchtaris, Grant P. Strimel

We present a streaming, Transformer-based end-to-end automatic speech recognition (ASR) architecture which achieves efficient neural inference through compute cost amortization.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

CHIP: CHannel Independence-based Pruning for Compact Neural Networks

1 code implementation NeurIPS 2021 Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan

Filter pruning has been widely used for neural network compression because of its enabled practical acceleration.

Neural Network Compression

GiT: Graph Interactive Transformer for Vehicle Re-identification

no code implementations12 Jul 2021 Fei Shen, Yi Xie, Jianqing Zhu, Xiaobin Zhu, Huanqiang Zeng

In the macro view, a list of GiT blocks are stacked to build a vehicle re-identification model, in where graphs are to extract discriminative local features within patches and transformers are to extract robust global features among patches.

Vehicle Re-Identification

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

no code implementations13 May 2021 XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang

This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.

A Competitive Method to VIPriors Object Detection Challenge

1 code implementation19 Apr 2021 Fei Shen, Xin He, Mengwan Wei, Yi Xie

In this report, we introduce the technical details of our submission to the VIPriors object detection challenge.

Data Augmentation object-detection +1

Noise Injection-based Regularization for Point Cloud Processing

no code implementations28 Mar 2021 Xiao Zang, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan

In this paper, we, for the first time, perform systematic investigation on noise injection-based regularization for point cloud-domain DNNs.

Data Augmentation Semantic Segmentation

ISTD-GCN: Iterative Spatial-Temporal Diffusion Graph Convolutional Network for Traffic Speed Forecasting

no code implementations10 Aug 2020 Yi Xie, Yun Xiong, Yangyong Zhu

Most of the existing algorithms for traffic speed forecasting split spatial features and temporal features to independent modules, and then associate information from both dimensions.

Social and Information Networks

Exploring Spatial Significance via Hybrid Pyramidal Graph Network for Vehicle Re-identification

no code implementations29 May 2020 Fei Shen, Jianqing Zhu, Xiaobin Zhu, Yi Xie, Jingchang Huang

Secondly, a novel pyramidal graph network (PGN) is designed to comprehensively explore the spatial significance of feature maps at multiple scales.

Vehicle Re-Identification

Estimation of the Laser Frequency Nosie Spectrum by Continuous Dynamical Decoupling

no code implementations8 May 2020 Manchao Zhang, Yi Xie, Jie Zhang, Weichen Wang, Chunwang Wu, Ting Chen, Wei Wu, Pingxing Chen

Decoherence induced by the laser frequency noise is one of the most important obstacles in the quantum information processing.

Quantum Physics

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

no code implementations26 Apr 2020 Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan

These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).

Adversarial Attack

PERMDNN: Efficient Compressed DNN Architecture with Permuted Diagonal Matrices

no code implementations23 Apr 2020 Chunhua Deng, Siyu Liao, Yi Xie, Keshab K. Parhi, Xuehai Qian, Bo Yuan

On the other hand, the recent structured matrix-based approach (i. e., CirCNN) is limited by the relatively complex arithmetic computation (i. e., FFT), less flexible compression ratio, and its inability to fully utilize input sparsity.

Model Compression

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

no code implementations4 Mar 2020 Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan

As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.

Adversarial Attack Speaker Recognition

Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models

1 code implementation12 Feb 2020 Xiao Zang, Yi Xie, Jie Chen, Bo Yuan

Worse, the bad actors found for one graph model severely compromise other models as well.

Graph Learning

CAG: A Real-time Low-cost Enhanced-robustness High-transferability Content-aware Adversarial Attack Generator

no code implementations16 Dec 2019 Huy Phan, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan

In addition, CAG exhibits high transferability across different DNN classifier models in black-box attack scenario by introducing random dropout in the process of generating perturbations.

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.