Search Results for author: Jiamin Wang

Found 6 papers, 0 papers with code

SmartCiteCon: Implicit Citation Context Extraction from Academic Literature Using Supervised Learning

no code implementations WOSP 2020 Chenrui Guo, Haoran Cui, Li Zhang, Jiamin Wang, Wei Lu, Jian Wu

The tool is built on a Support Vector Machine (SVM) model trained on a set of 7, 058 manually annotated citation context sentences, curated from 34, 000 papers from the ACL Anthology.

Scalable second-order consensus of hierarchical groups

no code implementations31 Mar 2024 Jiamin Wang, Jian Liu, Feng Xiao, Ning Xi, Yuanshi Zheng

Motivated by widespread dominance hierarchy, growth of group sizes, and feedback mechanisms in social species, we are devoted to exploring the scalable second-order consensus of hierarchical groups.

RealDex: Towards Human-like Grasping for Robotic Dexterous Hand

no code implementations21 Feb 2024 Yumeng Liu, Yaxun Yang, Youzhuo Wang, Xiaofei Wu, Jiamin Wang, Yichen Yao, Sören Schwertfeger, Sibei Yang, Wenping Wang, Jingyi Yu, Xuming He, Yuexin Ma

In this paper, we introduce RealDex, a pioneering dataset capturing authentic dexterous hand grasping motions infused with human behavioral patterns, enriched by multi-view and multimodal visual data.

Protocol selection for second-order consensus against disturbance

no code implementations10 Dec 2022 Jiamin Wang, Liqi Zhou, Dong Zhang, Jian Liu, Yuanshi Zheng

Noticing that both the absolute and relative velocity protocols can solve the second-order consensus of multi-agent systems, this paper aims to investigate which of the above two protocols has better anti-disturbance capability, in which the anti-disturbance capability is measured by the L2 gain from the disturbance to the consensus error.

An Adversarial Attack via Feature Contributive Regions

no code implementations1 Jan 2021 Yaguan Qian, Jiamin Wang, Xiang Ling, Zhaoquan Gu, Bin Wang, Chunming Wu

Recently, to deal with the vulnerability to generate examples of CNNs, there are many advanced algorithms that have been proposed.

Adversarial Attack

Visually Imperceptible Adversarial Patch Attacks on Digital Images

no code implementations2 Dec 2020 Yaguan Qian, Jiamin Wang, Bin Wang, Shaoning Zeng, Zhaoquan Gu, Shouling Ji, Wassim Swaileh

With this soft mask, we develop a new loss function with inverse temperature to search for optimal perturbations in CFR.

Cannot find the paper you are looking for? You can Submit a new open access paper.