Search Results for author: Yuxin Wang

Found 19 papers, 10 papers with code

From Two to One: A New Scene Text Recognizer with Visual Language Modeling Network

1 code implementation ICCV 2021 Yuxin Wang, Hongtao Xie, Shancheng Fang, Jing Wang, Shenggao Zhu, Yongdong Zhang

Such operation guides the vision model to use not only the visual texture of characters, but also the linguistic information in visual context for recognition when the visual cues are confused (e. g. occlusion, noise, etc.).

Language Modelling Scene Text +1

Multi-domain Collaborative Feature Representation for Robust Visual Object Tracking

no code implementations10 Aug 2021 Jiqing Zhang, Kai Zhao, Bo Dong, Yingkai Fu, Yuxin Wang, Xin Yang, BaoCai Yin

Jointly exploiting multiple different yet complementary domain information has been proven to be an effective way to perform robust object tracking.

Visual Object Tracking

PERT: A Progressively Region-based Network for Scene Text Removal

1 code implementation24 Jun 2021 Yuxin Wang, Hongtao Xie, Shancheng Fang, Yadong Qu, Yongdong Zhang

However, there exists two problems: 1) the implicit erasure guidance causes the excessive erasure to non-text areas; 2) the one-stage erasure lacks the exhaustive removal of text region.

Scene Text

First Place Solution of KDD Cup 2021 & OGB Large-Scale Challenge Graph Prediction Track

3 code implementations15 Jun 2021 Chengxuan Ying, Mingqi Yang, Shuxin Zheng, Guolin Ke, Shengjie Luo, Tianle Cai, Chenglin Wu, Yuxin Wang, Yanming Shen, Di He

In this technical report, we present our solution of KDD Cup 2021 OGB Large-Scale Challenge - PCQM4M-LSC Track.

A Survey of Transformers

no code implementations8 Jun 2021 Tianyang Lin, Yuxin Wang, Xiangyang Liu, Xipeng Qiu

X-formers) have been proposed, however, a systematic and comprehensive literature review on these Transformer variants is still missing.

A Two-Stage Attentive Network for Single Image Super-Resolution

1 code implementation21 Apr 2021 Jiqing Zhang, Chengjiang Long, Yuxin Wang, Haiyin Piao, Haiyang Mei, Xin Yang, BaoCai Yin

Recently, deep convolutional neural networks (CNNs) have been widely explored in single image super-resolution (SISR) and contribute remarkable progress.

Image Reconstruction Image Super-Resolution

Read Like Humans: Autonomous, Bidirectional and Iterative Language Modeling for Scene Text Recognition

1 code implementation CVPR 2021 Shancheng Fang, Hongtao Xie, Yuxin Wang, Zhendong Mao, Yongdong Zhang

Additionally, based on the ensemble of iterative predictions, we propose a self-training method which can learn from unlabeled images effectively.

Language Modelling Scene Text +1

Multi-scale Information Assembly for Image Matting

no code implementations7 Jan 2021 Yu Qiao, Yuhao Liu, Qiang Zhu, Xin Yang, Yuxin Wang, Qiang Zhang, Xiaopeng Wei

Image matting is a long-standing problem in computer graphics and vision, mostly identified as the accurate estimation of the foreground in input images.

Image Matting

Optimizing Fitness-For-Use of Differentially Private Linear Queries

no code implementations30 Nov 2020 Yingtai Xiao, Zeyu Ding, Yuxin Wang, Danfeng Zhang, Daniel Kifer

In practice, differentially private data releases are designed to support a variety of applications.


CheckDP: An Automated and Integrated Approach for Proving Differential Privacy or Finding Precise Counterexamples

no code implementations17 Aug 2020 Yuxin Wang, Zeyu Ding, Daniel Kifer, Danfeng Zhang

We propose CheckDP, the first automated and integrated approach for proving or disproving claims that a mechanism is differentially private.

Programming Languages D.3.1

ContourNet: Taking a Further Step toward Accurate Arbitrary-shaped Scene Text Detection

1 code implementation CVPR 2020 Yuxin Wang, Hongtao Xie, Zheng-Jun Zha, Mengting Xing, Zilong Fu, Yongdong Zhang

Then a novel Local Orthogonal Texture-aware Module (LOTM) models the local texture information of proposal features in two orthogonal directions and represents text region with a set of contour points.

Region Proposal Scene Text +1

A Survey of Deep Learning Techniques for Neural Machine Translation

1 code implementation18 Feb 2020 Shuoheng Yang, Yuxin Wang, Xiaowen Chu

In recent years, natural language processing (NLP) has got great development with deep learning techniques.

Machine Translation Translation

Benchmarking the Performance and Energy Efficiency of AI Accelerators for AI Training

no code implementations15 Sep 2019 Yuxin Wang, Qiang Wang, Shaohuai Shi, Xin He, Zhenheng Tang, Kaiyong Zhao, Xiaowen Chu

Different from the existing end-to-end benchmarks which only present the training time, We try to investigate the impact of hardware, vendor's software library, and deep learning framework on the performance and energy consumption of AI training.

Free Gap Information from the Differentially Private Sparse Vector and Noisy Max Mechanisms

no code implementations29 Apr 2019 Zeyu Ding, Yuxin Wang, Danfeng Zhang, Daniel Kifer

We show that it can also release for free the noisy gap between the approximate maximizer and runner-up.

Proving Differential Privacy with Shadow Execution

3 code implementations28 Mar 2019 Yuxin Wang, Zeyu Ding, Guanhong Wang, Daniel Kifer, Danfeng Zhang

Sometimes, combining those two requires substantial changes to program logics: one recent paper is able to verify Report Noisy Max automatically, but it involves a complex verification system using customized program logics and verifiers.

Programming Languages D.2.4

A Distributed Synchronous SGD Algorithm with Global Top-$k$ Sparsification for Low Bandwidth Networks

1 code implementation14 Jan 2019 Shaohuai Shi, Qiang Wang, Kaiyong Zhao, Zhenheng Tang, Yuxin Wang, Xiang Huang, Xiaowen Chu

Current methods that use AllGather to accumulate the sparse gradients have a communication complexity of $O(kP)$, where $P$ is the number of workers, which is inefficient on low bandwidth networks with a large number of workers.

Toward Detecting Violations of Differential Privacy

3 code implementations25 May 2018 Ding Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer

The widespread acceptance of differential privacy has led to the publication of many sophisticated algorithms for protecting privacy.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.