no code implementations • 16 Mar 2023 • Yi Xie, Huaidong Zhang, Xuemiao Xu, Jianqing Zhu, Shengfeng He
Specifically, the employed student model is initially a heavy model to fruitfully learn distilled knowledge in the early training epochs, and the student model is gradually compressed during the training.
1 code implementation • 28 Nov 2022 • Hongjun Wang, Jiyuan Chen, Tong Pan, Zipei Fan, Boyuan Zhang, Renhe Jiang, Lingyu Zhang, Yi Xie, Zhongyi Wang, Xuan Song
Spatial-temporal (ST) graph modeling, such as traffic speed forecasting and taxi demand prediction, is an important task in deep learning area.
no code implementations • 5 Sep 2022 • Chun-Nam Yu, Yi Xie
Few-shot classification aims to learn to classify new object categories well using only a few labeled examples.
1 code implementation • 22 Aug 2022 • Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan
Recently backdoor attack has become an emerging threat to the security of deep neural network (DNN) models.
no code implementations • 15 Jul 2022 • Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu
Case studies on the detection of SFDIAs on the benchmark smart grids show that the PowerFDNet achieved significant improvement compared with the state-of-the-art SFDIA detection methods.
no code implementations • 5 Jul 2022 • Yi Xie, Jonathan Macoskey, Martin Radfar, Feng-Ju Chang, Brian King, Ariya Rastrow, Athanasios Mouchtaris, Grant P. Strimel
We present a streaming, Transformer-based end-to-end automatic speech recognition (ASR) architecture which achieves efficient neural inference through compute cost amortization.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +1
1 code implementation • NeurIPS 2021 • Yang Sui, Miao Yin, Yi Xie, Huy Phan, Saman Zonouz, Bo Yuan
Filter pruning has been widely used for neural network compression because of its enabled practical acceleration.
no code implementations • 12 Jul 2021 • Fei Shen, Yi Xie, Jianqing Zhu, Xiaobin Zhu, Huanqiang Zeng
In the macro view, a list of GiT blocks are stacked to build a vehicle re-identification model, in where graphs are to extract discriminative local features within patches and transformers are to extract robust global features among patches.
no code implementations • 13 May 2021 • XiaoYu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang
This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.
1 code implementation • 19 Apr 2021 • Fei Shen, Xin He, Mengwan Wei, Yi Xie
In this report, we introduce the technical details of our submission to the VIPriors object detection challenge.
no code implementations • 28 Mar 2021 • Xiao Zang, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan
In this paper, we, for the first time, perform systematic investigation on noise injection-based regularization for point cloud-domain DNNs.
no code implementations • Sensors 2021 • Xiaotao Shao, Qing Wang, Wei Yang, Yun Chen, Yi Xie, Yan Shen, Zhongli Wang
MFPN includes two modules, namely double feature pyramid network (FPN) integrated with ResNet (DFR) and repulsion loss of minimum (RLM).
no code implementations • 10 Aug 2020 • Yi Xie, Yun Xiong, Yangyong Zhu
Most of the existing algorithms for traffic speed forecasting split spatial features and temporal features to independent modules, and then associate information from both dimensions.
Social and Information Networks
no code implementations • 29 May 2020 • Fei Shen, Jianqing Zhu, Xiaobin Zhu, Yi Xie, Jingchang Huang
Secondly, a novel pyramidal graph network (PGN) is designed to comprehensively explore the spatial significance of feature maps at multiple scales.
no code implementations • 8 May 2020 • Manchao Zhang, Yi Xie, Jie Zhang, Weichen Wang, Chunwang Wu, Ting Chen, Wei Wu, Pingxing Chen
Decoherence induced by the laser frequency noise is one of the most important obstacles in the quantum information processing.
no code implementations • 26 Apr 2020 • Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan
These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).
no code implementations • 23 Apr 2020 • Chunhua Deng, Siyu Liao, Yi Xie, Keshab K. Parhi, Xuehai Qian, Bo Yuan
On the other hand, the recent structured matrix-based approach (i. e., CirCNN) is limited by the relatively complex arithmetic computation (i. e., FFT), less flexible compression ratio, and its inability to fully utilize input sparsity.
no code implementations • 4 Mar 2020 • Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan
As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.
1 code implementation • 12 Feb 2020 • Xiao Zang, Yi Xie, Jie Chen, Bo Yuan
Worse, the bad actors found for one graph model severely compromise other models as well.
no code implementations • 16 Dec 2019 • Huy Phan, Yi Xie, Siyu Liao, Jie Chen, Bo Yuan
In addition, CAG exhibits high transferability across different DNN classifier models in black-box attack scenario by introducing random dropout in the process of generating perturbations.