Search Results for author: Zhen Huang

Found 51 papers, 16 papers with code

Reinforced Mnemonic Reader for Machine Reading Comprehension

3 code implementations8 May 2017 Minghao Hu, Yuxing Peng, Zhen Huang, Xipeng Qiu, Furu Wei, Ming Zhou

In this paper, we introduce the Reinforced Mnemonic Reader for machine reading comprehension tasks, which enhances previous attentive readers in two aspects.

Machine Reading Comprehension Question Answering +2

A Multi-Type Multi-Span Network for Reading Comprehension that Requires Discrete Reasoning

1 code implementation IJCNLP 2019 Minghao Hu, Yuxing Peng, Zhen Huang, Dongsheng Li

Rapid progress has been made in the field of reading comprehension and question answering, where several systems have achieved human parity in some simplified settings.

Negation Question Answering +1

SNCSE: Contrastive Learning for Unsupervised Sentence Embedding with Soft Negative Samples

1 code implementation16 Jan 2022 Hao Wang, Yangguang Li, Zhen Huang, Yong Dou, Lingpeng Kong, Jing Shao

To alleviate feature suppression, we propose contrastive learning for unsupervised sentence embedding with soft negative samples (SNCSE).

Contrastive Learning Data Augmentation +7

UniFed: All-In-One Federated Learning Platform to Unify Open-Source Frameworks

1 code implementation21 Jul 2022 Xiaoyuan Liu, Tianneng Shi, Chulin Xie, Qinbin Li, Kangping Hu, Haoyu Kim, Xiaojun Xu, The-Anh Vu-Le, Zhen Huang, Arash Nourian, Bo Li, Dawn Song

The platform streamlines the end-to-end workflow for distributed experimentation and deployment, encompassing 11 popular open-source FL frameworks.

Federated Learning

Cloth-Changing Person Re-identification from A Single Image with Gait Prediction and Regularization

1 code implementation CVPR 2022 Xin Jin, Tianyu He, Kecheng Zheng, Zhiheng Yin, Xu Shen, Zhen Huang, Ruoyu Feng, Jianqiang Huang, Xian-Sheng Hua, Zhibo Chen

Specifically, we introduce Gait recognition as an auxiliary task to drive the Image ReID model to learn cloth-agnostic representations by leveraging personal unique and cloth-independent gait information, we name this framework as GI-ReID.

Cloth-Changing Person Re-Identification Computational Efficiency +1

Social Bot-Aware Graph Neural Network for Early Rumor Detection

1 code implementation COLING 2022 Zhen Huang, Zhilong Lv, Xiaoyun Han, Binyang Li, Menglong Lu, Dongsheng Li

SBAG firstly pre-trains a multi-layer perception network to capture social bot features, and then constructs multiple graph neural networks by embedding the features to model the early propagation of posts, which is further used to detect rumors.

Toward Real-world Single Image Deraining: A New Benchmark and Beyond

1 code implementation11 Jun 2022 Wei Li, Qiming Zhang, Jing Zhang, Zhen Huang, Xinmei Tian, DaCheng Tao

To address these issues, we establish a new high-quality dataset named RealRain-1k, consisting of $1, 120$ high-resolution paired clean and rainy images with low- and high-density rain streaks, respectively.

Domain Generalization Image Restoration +2

DiffuseExpand: Expanding dataset for 2D medical image segmentation using diffusion models

1 code implementation26 Apr 2023 Shitong Shao, Xiaohan Yuan, Zhen Huang, Ziming Qiu, Shuai Wang, Kevin Zhou

Based on this insight, we propose an approach called DiffuseExpand for expanding datasets for 2D medical image segmentation using DPM, which first samples a variety of masks from Gaussian noise to ensure the diversity, and then synthesizes images to ensure the alignment of images and masks.

Image Generation Image Segmentation +3

Revisiting Knowledge Distillation: An Inheritance and Exploration Framework

1 code implementation CVPR 2021 Zhen Huang, Xu Shen, Jun Xing, Tongliang Liu, Xinmei Tian, Houqiang Li, Bing Deng, Jianqiang Huang, Xian-Sheng Hua

The inheritance part is learned with a similarity loss to transfer the existing learned knowledge from the teacher model to the student model, while the exploration part is encouraged to learn representations different from the inherited ones with a dis-similarity loss.

Knowledge Distillation

3D Local Convolutional Neural Networks for Gait Recognition

1 code implementation ICCV 2021 Zhen Huang, Dixiu Xue, Xu Shen, Xinmei Tian, Houqiang Li, Jianqiang Huang, Xian-Sheng Hua

Second, different body parts possess different scales, and even the same part in different frames can appear at different locations and scales.

Gait Recognition

R$^2$F: A General Retrieval, Reading and Fusion Framework for Document-level Natural Language Inference

1 code implementation22 Oct 2022 Hao Wang, Yixin Cao, Yangguang Li, Zhen Huang, Kun Wang, Jing Shao

Document-level natural language inference (DOCNLI) is a new challenging task in natural language processing, aiming at judging the entailment relationship between a pair of hypothesis and premise documents.

Natural Language Inference Retrieval +1

Free-rider Episode Screening via Dual Partition Model

no code implementations19 May 2018 Xiang Ao, Yang Liu, Zhen Huang, Luo Zuo, Qing He

An effective technique for filtering free-rider episodes is using a partition model to divide an episode into two consecutive subepisodes and comparing the observed support of such episode with its expected support under the assumption that these two subepisodes occur independently.

Ocasta: Clustering Configuration Settings For Error Recovery

no code implementations2 Nov 2017 Zhen Huang, David Lie

However, a recent study found that a significant amount of configuration errors require fixing more than one setting together.

Clustering

Maximum a Posteriori Adaptation of Network Parameters in Deep Models

no code implementations6 Mar 2015 Zhen Huang, Sabato Marco Siniscalchi, I-Fan Chen, Jiadong Wu, Chin-Hui Lee

We present a Bayesian approach to adapting parameters of a well-trained context-dependent, deep-neural-network, hidden Markov model (CD-DNN-HMM) to improve automatic speech recognition performance.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +1

BinPro: A Tool for Binary Source Code Provenance

no code implementations2 Nov 2017 Dhaval Miyani, Zhen Huang, David Lie

Enforcing open source licenses such as the GNU General Public License (GPL), analyzing a binary for possible vulnerabilities, and code maintenance are all situations where it is useful to be able to determine the source code provenance of a binary.

Cryptography and Security D.4.6

Attention-Guided Answer Distillation for Machine Reading Comprehension

no code implementations EMNLP 2018 Minghao Hu, Yuxing Peng, Furu Wei, Zhen Huang, Dongsheng Li, Nan Yang, Ming Zhou

Despite that current reading comprehension systems have achieved significant advancements, their promising performances are often obtained at the cost of making an ensemble of numerous models.

Knowledge Distillation Machine Reading Comprehension

SubCharacter Chinese-English Neural Machine Translation with Wubi encoding

no code implementations7 Nov 2019 Wei Zhang, Feifei Lin, Xiaodong Wang, Zhenshuang Liang, Zhen Huang

However, when the translation task involves Chinese, semantic granularity remains at the word and character level, so there is still need more fine-grained translation model of Chinese.

Machine Translation Model Compression +2

Multi-Objective Learning and Mask-Based Post-Processing for Deep Neural Network Based Speech Enhancement

no code implementations21 Mar 2017 Yong Xu, Jun Du, Zhen Huang, Li-Rong Dai, Chin-Hui Lee

We propose a multi-objective framework to learn both secondary targets not directly related to the intended task of speech enhancement (SE) and the primary target of the clean log-power spectra (LPS) features to be used directly for constructing the enhanced speech signals.

Sound

Next Waves in Veridical Network Embedding

no code implementations10 Jul 2020 Owen G. Ward, Zhen Huang, Andrew Davison, Tian Zheng

Embedding nodes of a large network into a metric (e. g., Euclidean) space has become an area of active research in statistical machine learning, which has found applications in natural and social sciences.

Community Detection Link Prediction +2

Topological Hall Effect and Skyrmion-like Bubbles at a Charge-transfer Interface

no code implementations3 Jun 2020 Zhi Shiuh Lim, Changjian Li, Zhen Huang, Xiao Chi, Jun Zhou, Shengwei Zeng, Ganesh Ji Omar, Yuan Ping Feng, Andrivo Rusydi, Stephen John Pennycook, Thirumalai Venkatesan, Ariando Ariando

Here, the emergence, tuning and interpretation of hump-shape Hall Effect from a CaMnO3/CaIrO3/CaMnO3 trilayer structure are studied in detail.

Mesoscale and Nanoscale Physics

Exploring Retraining-Free Speech Recognition for Intra-sentential Code-Switching

no code implementations27 Aug 2021 Zhen Huang, Xiaodan Zhuang, Daben Liu, Xiaoqiang Xiao, Yuchen Zhang, Sabato Marco Siniscalchi

To achieve such an ambitious goal, new mechanisms for foreign pronunciation generation and language model (LM) enrichment have been devised.

Language Modelling speech-recognition +1

Argumentation Mining on Essays at Multi Scales

no code implementations COLING 2020 Hao Wang, Zhen Huang, Yong Dou, Yu Hong

Recent research mainly models the task as a sequence tagging problem and deal with all the argumentation components at word level.

AstBERT: Enabling Language Model for Financial Code Understanding with Abstract Syntax Trees

no code implementations20 Jan 2022 Rong Liang, Tiehua Zhang, Yujie Lu, Yuze Liu, Zhen Huang, Xin Chen

Specifically, we collect a sheer number of source codes (both Java and Python) from the Alipay code repository and incorporate both syntactic and semantic code knowledge into our model through the help of code parsers, in which AST information of the source codes can be interpreted and integrated.

Clone Detection Code Search +2

Adaptive Threshold Selective Self-Attention for Chinese NER

no code implementations COLING 2022 Biao Hu, Zhen Huang, Minghao Hu, Ziwen Zhang, Yong Dou

Recently, Transformer has achieved great success in Chinese named entity recognition (NER) owing to its good parallelism and ability to model long-range dependencies, which utilizes self-attention to encode context.

Chinese Named Entity Recognition named-entity-recognition +2

A Treatise On FST Lattice Based MMI Training

no code implementations17 Oct 2022 Adnan Haider, Tim Ng, Zhen Huang, Xingyu Na, Antti Veikko Rosti

Maximum mutual information (MMI) has become one of the two de facto methods for sequence-level training of speech recognition acoustic models.

speech-recognition Speech Recognition

Teaching What You Should Teach: A Data-Based Distillation Method

no code implementations11 Dec 2022 Shitong Shao, Huanran Chen, Zhen Huang, Linrui Gong, Shuai Wang, Xinxiao wu

To be specific, we design a neural network-based data augmentation module with priori bias, which assists in finding what meets the teacher's strengths but the student's weaknesses, by learning magnitudes and probabilities to generate suitable data samples.

Data Augmentation Knowledge Distillation +1

Meta-Learning Based Knowledge Extrapolation for Temporal Knowledge Graph

no code implementations11 Feb 2023 Zhongwu Chen, Chengjin Xu, Fenglong Su, Zhen Huang, You Dou

Different from KGs and TKGs in the transductive setting, constantly emerging entities and relations in incomplete TKGs create demand to predict missing facts with unseen components, which is the extrapolation setting.

Knowledge Graph Embedding Knowledge Graphs +2

Incorporating Structured Sentences with Time-enhanced BERT for Fully-inductive Temporal Relation Prediction

no code implementations10 Apr 2023 Zhongwu Chen, Chengjin Xu, Fenglong Su, Zhen Huang, Yong Dou

In the inductive setting where test TKGs contain emerging entities, the latest methods are based on symbolic rules or pre-trained language models (PLMs).

Relation Temporal Knowledge Graph Completion

Sequential Recommendation with Diffusion Models

no code implementations10 Apr 2023 Hanwen Du, Huanhuan Yuan, Zhen Huang, Pengpeng Zhao, Xiaofang Zhou

Generative models, such as Variational Auto-Encoder (VAE) and Generative Adversarial Network (GAN), have been successfully applied in sequential recommendation.

Generative Adversarial Network Sequential Recommendation

DaMSTF: Domain Adversarial Learning Enhanced Meta Self-Training for Domain Adaptation

no code implementations5 Aug 2023 Menglong Lu, Zhen Huang, Yunxiang Zhao, Zhiliang Tian, Yang Liu, Dongsheng Li

To this end, we employ domain adversarial learning as a heuristic neural network initialization method, which can help the meta-learning module converge to a better optimal.

Domain Adaptation Meta-Learning +2

Meta-Tsallis-Entropy Minimization: A New Self-Training Approach for Domain Adaptation on Text Classification

no code implementations4 Aug 2023 Menglong Lu, Zhen Huang, Zhiliang Tian, Yunxiang Zhao, Xuanyu Fei, Dongsheng Li

Theoretically, we prove the convergence of the meta-learning algorithm in MTEM and analyze the effectiveness of MTEM in achieving domain adaptation.

Domain Adaptation Meta-Learning +2

GROVE: A Retrieval-augmented Complex Story Generation Framework with A Forest of Evidence

no code implementations9 Oct 2023 Zhihua Wen, Zhiliang Tian, Wei Wu, Yuxin Yang, Yanqi Shi, Zhen Huang, Dongsheng Li

Finally, we select the most fitting chains of evidence from the evidence forest and integrate them into the generated story, thereby enhancing the narrative's complexity and credibility.

Retrieval Story Generation

Acoustic Model Fusion for End-to-end Speech Recognition

no code implementations10 Oct 2023 Zhihong Lei, MingBin Xu, Shiyi Han, Leo Liu, Zhen Huang, Tim Ng, Yuanyuan Zhang, Ernest Pusateri, Mirko Hannemann, Yaqiao Deng, Man-Hung Siu

Recent advances in deep learning and automatic speech recognition (ASR) have enabled the end-to-end (E2E) ASR system and boosted the accuracy to a new level.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +4

Personalization of CTC-based End-to-End Speech Recognition Using Pronunciation-Driven Subword Tokenization

no code implementations16 Oct 2023 Zhihong Lei, Ernest Pusateri, Shiyi Han, Leo Liu, MingBin Xu, Tim Ng, Ruchir Travadi, Youyuan Zhang, Mirko Hannemann, Man-Hung Siu, Zhen Huang

Recent advances in deep learning and automatic speech recognition have improved the accuracy of end-to-end speech recognition systems, but recognition of personal content such as contact names remains a challenge.

Automatic Speech Recognition speech-recognition +1

FIRST: A Million-Entry Dataset for Text-Driven Fashion Synthesis and Design

no code implementations13 Nov 2023 Zhen Huang, Yihao Li, Dong Pei, Jiapeng Zhou, Xuliang Ning, Jianlin Han, Xiaoguang Han, Xuejun Chen

Text-driven fashion synthesis and design is an extremely valuable part of artificial intelligence generative content(AIGC), which has the potential to propel a tremendous revolution in the traditional fashion industry.

Fashion Synthesis

Conformer-Based Speech Recognition On Extreme Edge-Computing Devices

no code implementations16 Dec 2023 MingBin Xu, Alex Jin, Sicheng Wang, Mu Su, Tim Ng, Henry Mason, Shiyi Han, Zhihong Lei Yaqiao Deng, Zhen Huang, Mahesh Krishnamoorthy

With increasingly more powerful compute capabilities and resources in today's devices, traditionally compute-intensive automatic speech recognition (ASR) has been moving from the cloud to devices to better protect user privacy.

Automatic Speech Recognition Automatic Speech Recognition (ASR) +2

POMP: Probability-driven Meta-graph Prompter for LLMs in Low-resource Unsupervised Neural Machine Translation

no code implementations11 Jan 2024 Shilong Pan, Zhiliang Tian, Liang Ding, Zhen Huang, Zhihua Wen, Dongsheng Li

POMP involves constructing a directed acyclic meta-graph for each source language, from which we dynamically sample multiple paths to prompt LLMs to mitigate the linguistic noise and improve translations during training.

In-Context Learning Machine Translation +3

Automating Psychological Hypothesis Generation with AI: Large Language Models Meet Causal Graph

no code implementations22 Feb 2024 Song Tong, Kai Mao, Zhen Huang, Yukun Zhao, Kaiping Peng

Leveraging the synergy between causal knowledge graphs and a large language model (LLM), our study introduces a groundbreaking approach for computational hypothesis generation in psychology.

Knowledge Graphs Language Modelling +2

Learn to Disguise: Avoid Refusal Responses in LLM's Defense via a Multi-agent Attacker-Disguiser Game

no code implementations3 Apr 2024 Qianqiao Xu, Zhiliang Tian, Hongyan Wu, Zhen Huang, Yiping Song, Feng Liu, Dongsheng Li

In this paper, we propose a multi-agent attacker-disguiser game approach to achieve a weak defense mechanism that allows the large model to both safely reply to the attacker and hide the defense intent.

Prompt Engineering

Cannot find the paper you are looking for? You can Submit a new open access paper.