no code implementations • 21 Feb 2024 • Lei Pan, Yunshi Lan, Yang Li, Weining Qian
Among existing methods for UTST tasks, attention masking approach and Large Language Models (LLMs) are deemed as two pioneering methods.
no code implementations • 31 Aug 2023 • Zexin Hu, Kun Hu, Clinton Mo, Lei Pan, Zhiyong Wang
Sketch-based terrain generation seeks to create realistic landscapes for virtual environments in various applications such as computer games, animation and virtual reality.
no code implementations • 14 Aug 2023 • Lei Pan, Von-Wun Soo
Recommending items to potentially interested users has been an important commercial task that faces two main challenges: accuracy and explainability.
no code implementations • 15 Jul 2023 • Lei Pan, Wuyang Luan, Yuan Zheng, Qiang Fu, Junhui Li
The model achieves a more comprehensive feature representation by the features which connect global and local features.
no code implementations • 30 May 2023 • Jiwei Guan, Lei Pan, Chen Wang, Shui Yu, Longxiang Gao, Xi Zheng
As deep learning has been applied to increasingly sensitive tasks, uncertainty measurement is crucial in helping improve model robustness, especially in mission-critical scenarios.
no code implementations • 9 May 2023 • Long Wu, Xunyuan Yin, Lei Pan, Jinfeng Liu
By utilizing this representation, a generic subsystem decomposition method is proposed to partition the entire IES vertically based on the dynamic time scale and horizontally based on the closeness of interconnections between the operating units.
no code implementations • 19 Apr 2023 • Jingjin Li, Chao Chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang
The privacy issues include technical-wise information stealing and policy-wise privacy breaches.
Automatic Speech Recognition Automatic Speech Recognition (ASR) +2
no code implementations • 10 Jul 2022 • Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang
It reduces the success rate of rPPG spoofing attacks in user authentication to 0. 05.
no code implementations • 20 May 2022 • Long Wu, Xunyuan Yin, Lei Pan, Jinfeng Liu
Subsequently, the CEMPC, which includes slow economic model predictive control (EMPC), medium EMPC and fast EMPC, is developed.
no code implementations • 22 Apr 2022 • Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss
Machine learning promotes the continuous development of signal processing in various fields, including network traffic monitoring, EEG classification, face identification, and many more.
no code implementations • 12 Apr 2022 • Jin-Yu Yang, Heng-Chao Li, Wen-Shuai Hu, Lei Pan, Qian Du
Specifically, Sa-GCN and Se-GCN are proposed to extract the spatial and spectral features by modeling correlations between spatial pixels and between spectral bands, respectively.
no code implementations • 16 Jul 2021 • Khondker Fariha Hossain, Sharif Amit Kamran, Alireza Tavakkoli, Lei Pan, Xingjun Ma, Sutharshan Rajasegarar, Chandan Karmaker
Moreover, the model is conditioned on class-specific ECG signals to synthesize realistic adversarial examples.
2 code implementations • 16 Feb 2021 • Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years.
no code implementations • EACL 2021 • Shuo Huang, Zhuang Li, Lizhen Qu, Lei Pan
In this paper, we provide the empirical study on the robustness of semantic parsers in the presence of adversarial attacks.
no code implementations • 9 May 2019 • Wen-Shuai Hu, Heng-Chao Li, Lei Pan, Wei Li, Ran Tao, Qian Du
Particularly, long short-term memory (LSTM), as a special deep learning structure, has shown great ability in modeling long-term dependencies in the time dimension of video or the spectral dimension of HSIs.
no code implementations • 24 Apr 2018 • Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang
Network traffic analytics technology is a cornerstone for cyber security systems.
Cryptography and Security