Search Results for author: Zhi Zhang

Found 28 papers, 15 papers with code

GANSER: A Self-supervised Data Augmentation Framework for EEG-based Emotion Recognition

no code implementations7 Sep 2021 Zhi Zhang, Sheng-hua Zhong, Yan Liu

Data augmentation has recently achieved considerable performance improvement for deep learning models: increased accuracy, stability, and reduced over-fitting.

Data Augmentation EEG +2

Quantization Backdoors to Deep Learning Models

no code implementations20 Aug 2021 Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said Al-Sarawi, Derek Abbott

This work reveals that the standard quantization operation can be abused to activate a backdoor.

Quantization

Progressive Coordinate Transforms for Monocular 3D Object Detection

1 code implementation12 Aug 2021 Li Wang, Li Zhang, Yi Zhu, Zhi Zhang, Tong He, Mu Li, xiangyang xue

Recognizing and localizing objects in the 3D space is a crucial ability for an AI agent to perceive its surrounding environment.

Monocular 3D Object Detection Object Localization

AI Enlightens Wireless Communication: Analyses, Solutions and Opportunities on CSI Feedback

no code implementations12 Jun 2021 Han Xiao, Zhiqin Wang, Wenqiang Tian, Xiaofeng Liu, Wendong Liu, Shi Jin, Jia Shen, Zhi Zhang, Ning Yang

In this paper, we give a systematic description of the 1st Wireless Communication Artificial Intelligence (AI) Competition (WAIC) which is hosted by IMT-2020(5G) Promotion Group 5G+AI Work Group.

Quantization

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

no code implementations9 May 2021 Huming Qiu, Hua Ma, Zhi Zhang, Yifeng Zheng, Anmin Fu, Pan Zhou, Yansong Gao, Derek Abbott, Said F. Al-Sarawi

To this end, a 1-bit quantized DNN model or deep binary neural network maximizes the memory efficiency, where each parameter in a BNN model has only 1-bit.

Quantization

Attention in Attention Network for Image Super-Resolution

2 code implementations19 Apr 2021 Haoyu Chen, Jinjin Gu, Zhi Zhang

In this work, we attempt to quantify and visualize attention mechanisms in SISR and show that not all attention modules are equally beneficial.

Image Super-Resolution

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

1 code implementation3 Mar 2021 Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Federated learning (FL) and split learning (SL) are state-of-the-art distributed machine learning techniques to enable machine learning training without accessing raw data on clients or end devices.

Federated Learning

CrossNorm and SelfNorm for Generalization under Distribution Shifts

1 code implementation ICCV 2021 Zhiqiang Tang, Yunhe Gao, Yi Zhu, Zhi Zhang, Mu Li, Dimitris Metaxas

Can we develop new normalization methods to improve generalization robustness under distribution shifts?

Unity of Opposites: SelfNorm and CrossNorm for Model Robustness

no code implementations1 Jan 2021 Zhiqiang Tang, Yunhe Gao, Yi Zhu, Zhi Zhang, Mu Li, Dimitris N. Metaxas

CrossNorm exchanges styles between feature channels to perform style augmentation, diversifying the content and style mixtures.

Object Recognition Unity

Insight-HXMT observations of Swift J0243.6+6124: the evolution of RMS pulse fractions at super-Eddington luminosity

no code implementations24 Dec 2020 P. J. Wang, L. D. Kong, S. Zhang, Y. P. Chen, S. N. Zhang, J. L. Qu, L. Ji, L. Tao, M. Y. Ge, F. J. Lu, L. Chen, L. M. Song, T. P. Li, Y. P. Xu, X. L. Cao, Y. Chen, C. Z. Liu, Q. C. Bu, C. Cai, Z. Chang, G. Chen, T. X. Chen, Y. B. Chen, W. Cui, W. W. Cui, J. K. Deng, Y. W. Dong, Y. Y. Du, M. X. Fu, G. H. Gao, H. Gao, M. Gao, Y. D. Gu, J. Guan, C. C. Guo, D. W. Han, Y. Huang, J. Huo, S. M. Jia, L. H. Jiang, W. C. Jiang, J. Jin, Y. J. Jin, B. Li, C. K. Li, G. Li, M. S. Li, W. Li, X. Li, X. B. Li, X. F. Li, Y. G. Li, Z. W. Li, X. H. Liang, J. Y. Liao, B. S. Liu, G. Q. Liu, H. W. Liu, X. J. Liu, Y. N. Liu, B. Lu, X. F. Lu, Q. Luo, T. Luo, X. Ma, B. Meng, Y. Nang, J. Y. Nie, G. Ou, N. Sai, R. C. Shang, X. Y. Song, L. Sun, Y. Tan, Y. L. Tuo, C. Wang, G. F. Wang, J. Wang, L. J. Wang, W. S. Wang, Y. S. Wang, X. Y. Wen, B. Y. Wu, B. B. Wu, M. Wu, G. C. Xiao, S. Xiao, S. L. Xiong, J. W. Yang, S. Yang, Yan Ji Yang, Yi Jung Yang, Q. B. Yi, Q. Q. Yin, Y. You, A. M. Zhang, C. M. Zhang, F. Zhang, H. M. Zhang, J. Zhang, T. Zhang, W. C. Zhang, W. Zhang, W. Z. Zhang, Y. F. Zhang, Y. J. Zhang, Y. Zhang, Zhao Zhang, Zhi Zhang, Z. L. Zhang, H. S. Zhao, X. F. Zhao, S. J. Zheng, Y. G. Zheng, D. K. Zhou, J. F. Zhou, Y. X. Zhu, Y. Zhu, R. L. Zhuang

The results show a general trend of the pulse fraction increasing with luminosity and energy at super-critical luminosity.

High Energy Astrophysical Phenomena

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

1 code implementation21 Jul 2020 Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

We have also reviewed the flip side of backdoor attacks, which are explored for i) protecting intellectual property of deep learning models, ii) acting as a honeypot to catch adversarial example attacks, and iii) verifying data deletion requested by the data contributor. Overall, the research on defense is far behind the attack, and there is no single defense that can prevent all types of backdoor attacks.

Improving Semantic Segmentation via Self-Training

no code implementations30 Apr 2020 Yi Zhu, Zhongyue Zhang, Chongruo wu, Zhi Zhang, Tong He, Hang Zhang, R. Manmatha, Mu Li, Alexander Smola

In the case of semantic segmentation, this means that large amounts of pixelwise annotations are required to learn accurate models.

Domain Generalization Semantic Segmentation

Integrating independent and centralized multi-agent reinforcement learning for traffic signal network optimization

no code implementations23 Sep 2019 Zhi Zhang, Jiachen Yang, Hongyuan Zha

Traffic congestion in metropolitan areas is a world-wide problem that can be ameliorated by traffic lights that respond dynamically to real-time conditions.

Multi-agent Reinforcement Learning

GluonCV and GluonNLP: Deep Learning in Computer Vision and Natural Language Processing

4 code implementations9 Jul 2019 Jian Guo, He He, Tong He, Leonard Lausen, Mu Li, Haibin Lin, Xingjian Shi, Chenguang Wang, Junyuan Xie, Sheng Zha, Aston Zhang, Hang Zhang, Zhi Zhang, Zhongyue Zhang, Shuai Zheng, Yi Zhu

We present GluonCV and GluonNLP, the deep learning toolkits for computer vision and natural language processing based on Apache MXNet (incubating).

Dynamic Mini-batch SGD for Elastic Distributed Training: Learning in the Limbo of Resources

1 code implementation26 Apr 2019 Haibin Lin, Hang Zhang, Yifei Ma, Tong He, Zhi Zhang, Sheng Zha, Mu Li

One difficulty we observe is that the noise in the stochastic momentum estimation is accumulated over time and will have delayed effects when the batch size changes.

Image Classification Object Detection +1

Bag of Tricks for Image Classification with Convolutional Neural Networks

20 code implementations CVPR 2019 Tong He, Zhi Zhang, Hang Zhang, Zhongyue Zhang, Junyuan Xie, Mu Li

Much of the recent progress made in image classification research can be credited to training procedure refinements, such as changes in data augmentations and optimization methods.

Ranked #364 on Image Classification on ImageNet (using extra training data)

Classification General Classification +4

Progressive Neural Networks for Image Classification

no code implementations25 Apr 2018 Zhi Zhang, Guanghan Ning, Yigang Cen, Yang Li, Zhiqun Zhao, Hao Sun, Zhihai He

The inference structures and computational complexity of existing deep neural networks, once trained, are fixed and remain the same for all test images.

Classification General Classification +1

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

no code implementations20 Feb 2018 Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi Rabhi

In this paper, we propose a reliable and practical system, named KASR, which transparently reduces attack surfaces of commodity OS kernels at runtime without requiring their source code.

Cryptography and Security Operating Systems

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation

no code implementations20 Feb 2018 Yueqiang Cheng, Zhi Zhang, Surya Nepal, Zhi Wang

The exploit is motivated by our key observation that the modern OSes have double-owned kernel buffers (e. g., video buffers) owned concurrently by the kernel and user domains.

Cryptography and Security

Knowledge Projection for Deep Neural Networks

no code implementations26 Oct 2017 Zhi Zhang, Guanghan Ning, Zhihai He

In this paper, we will develop a new framework for training deep neural networks on datasets with limited labeled samples using cross-network knowledge projection which is able to improve the network performance while reducing the overall computational complexity significantly.

Knowledge-Guided Deep Fractal Neural Networks for Human Pose Estimation

1 code implementation5 May 2017 Guanghan Ning, Zhi Zhang, Zhihai He

Human pose estimation using deep neural networks aims to map input images with large variations into multiple body keypoints which must satisfy a set of geometric constraints and inter-dependency imposed by the human body model.

Pose Estimation

Spatially Supervised Recurrent Convolutional Neural Networks for Visual Object Tracking

2 code implementations19 Jul 2016 Guanghan Ning, Zhi Zhang, Chen Huang, Zhihai He, Xiaobo Ren, Haohong Wang

In this paper, we develop a new approach of spatially supervised recurrent convolutional neural networks for visual object tracking.

Object Detection Visual Object Tracking

Cannot find the paper you are looking for? You can Submit a new open access paper.