Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Parallel processing model for low-dose computed tomography image denoising

    Low-dose computed tomography (LDCT) has gained increasing attention owing to its crucial role in reducing radiation exposure in patients. However, LDCT-reconstructed images often suffer from significant noise ...

    Libing Yao, Ji** Wang, Zhongyi Wu in Visual Computing for Industry, Biomedicine… (2024)

  2. No Access

    Chapter and Conference Paper

    TFAugment: A Key Frequency-Driven Data Augmentation Method for Human Activity Recognition

    Data augmentation enhances Human Activity Recognition (HAR) models by diversifying training data through transformations, improving their robustness. However, traditional techniques with random masking pose ch...

    Hao Zhang, Bixiao Zeng, Mei Kuang in Advances in Knowledge Discovery and Data M… (2024)

  3. No Access

    Chapter and Conference Paper

    A New Combination Model for Offshore Wind Power Prediction Considering the Number of Climbing Features

    The accurate identification of offshore wind power ramp events has great effects on wind power forecast. In order to improve the prediction accuracy of offshore wind power, this paper proposes an XGBoost-GRU c...

    Lei Yin, Weian Du, Peng Leng, **aoyan Miao in 6GN for Future Wireless Networks (2024)

  4. No Access

    Article

    Large sequence models for sequential decision-making: a survey

    Transformer architectures have facilitated the development of large-scale and general-purpose sequence models for prediction tasks in natural language processing and computer vision, e.g., GPT-3 and Swin Trans...

    Muning Wen, Runji Lin, Han**g Wang, Yaodong Yang in Frontiers of Computer Science (2023)

  5. Article

    Open Access

    Convergence rate of multiple-try Metropolis independent sampler

    The multiple-try Metropolis method is an interesting extension of the classical Metropolis–Hastings algorithm. However, theoretical understanding about its usefulness and convergence behavior is still lacking....

    **aodong Yang, Jun S. Liu in Statistics and Computing (2023)

  6. Article

    Open Access

    Offline Pre-trained Multi-agent Decision Transformer

    Offline reinforcement learning leverages previously collected offline datasets to learn optimal policies with no necessity to access the real environment. Such a paradigm is also desirable for multi-agent rein...

    Linghui Meng, Muning Wen, Chenyang Le, **yun Li in Machine Intelligence Research (2023)

  7. No Access

    Article

    Online Markov decision processes with non-oblivious strategic adversary

    We study a novel setting in Online Markov Decision Processes (OMDPs) where the loss function is chosen by a non-oblivious strategic adversary who follows a no-external regret algorithm. In this setting, we first ...

    Le Cong Dinh, David Henry Mguni in Autonomous Agents and Multi-Agent Systems (2023)

  8. No Access

    Chapter and Conference Paper

    A Game-Theoretic Approach to Multi-agent Trust Region Optimization

    Trust region methods are widely applied in single-agent reinforcement learning problems due to their monotonic performance-improvement guarantee at every iteration. Nonetheless, when applied in multi-agent set...

    Ying Wen, Hui Chen, Yaodong Yang, Minne Li in Distributed Artificial Intelligence (2023)

  9. No Access

    Article

    Security analysis and improvement of a privacy-preserving authentication scheme in VANET

    The vehicular ad-hoc network (VANET) is a critical component of intelligent transportation, which can improve transportation efficiency and promote road safety. To address security and privacy concerns in VANE...

    **aodong Yang, Wenjia Wang, Caifen Wang in International Journal of Information Security (2022)

  10. No Access

    Article

    Dual layer transfer learning for sEMG-based user-independent gesture recognition

    During the last few years, significant attention has been paid to surface electromyographic (sEMG) signal–based gesture recognition. Nevertheless, sEMG signal is sensitive to various user-dependent factors, li...

    Yingwei Zhang, Yiqiang Chen, Hanchao Yu, **aodong Yang in Personal and Ubiquitous Computing (2022)

  11. No Access

    Chapter and Conference Paper

    Debias the Black-Box: A Fair Ranking Framework via Knowledge Distillation

    Deep neural networks can capture the intricate interaction history information between queries and documents, because of their many complicated nonlinear units, allowing them to provide correct search recommen...

    Zhitao Zhu, Shi**g Si, Jianzong Wang in Web Information Systems Engineering – WISE… (2022)

  12. No Access

    Chapter and Conference Paper

    Neural Network Repair with Reachability Analysis

    Safety is a critical concern for the next generation of autonomy that is likely to rely heavily on deep neural networks for perception and control. This paper proposes a method to repair unsafe ReLU DNNs in sa...

    **aodong Yang, Tom Yamaguchi in Formal Modeling and Analysis of Timed Syst… (2022)

  13. No Access

    Article

    Verification of piecewise deep neural networks: a star set approach with zonotope pre-filter

    Verification has emerged as a means to provide formal guarantees on learning-based systems incorporating neural network before using them in safety-critical applications. This paper proposes a new verification...

    Hoang-Dung Tran, Neelanjana Pal, Diego Manzanas Lopez in Formal Aspects of Computing (2021)

  14. No Access

    Chapter and Conference Paper

    Hyperbolic Tangent Polynomial Parity Cyclic Learning Rate for Deep Neural Network

    With the development of artificial intelligence technology, optimizing the performance of deep neural network model has become a hot issue in the field of scientific research. Learning rate is one of the most ...

    Hong Lin, **aodong Yang, Binyan Wu in PRICAI 2021: Trends in Artificial Intellig… (2021)

  15. Chapter and Conference Paper

    Robustness Verification of Semantic Segmentation Neural Networks Using Relaxed Reachability

    This paper introduces robustness verification for semantic segmentation neural networks (in short, semantic segmentation networks [SSNs]), building on and extending recent approaches for robustness verificatio...

    Hoang-Dung Tran, Neelanjana Pal, Patrick Musau in Computer Aided Verification (2021)

  16. Article

    Open Access

    Transient ischemic attack analysis through non-contact approaches

    The transient ischemic attack (TIA) is a kind of sudden disease, which has the characteristics of short duration and high frequency. Since most patients can return to normal after the onset of the disease, it ...

    Qing Zhang, Yajun Li, Fadi Al-Turjman in Human-centric Computing and Information Sc… (2020)

  17. No Access

    Article

    Diagnosis of the Hypopnea syndrome in the early stage

    Hypopnea syndrome is a chronic respiratory disease that is characterized by repetitive episodes of breathing disruptions during sleep. Hypopnea syndrome is a systemic disease that manifests respiratory proble...

    **aodong Yang, Dou Fan, Aifeng Ren, Nan Zhao in Neural Computing and Applications (2020)

  18. No Access

    Article

    A neighbour scale fixed approach for influence maximization in social networks

    Influence maximization is currently a most extensively researched topic in social network analysis. Existing approaches tackle this task by either pursuing the real influence strength of a node or designing pr...

    **aobin Rui, **aodong Yang, Jian** Fan, Zhixiao Wang in Computing (2020)

  19. No Access

    Chapter and Conference Paper

    Joint Disentangling and Adaptation for Cross-Domain Person Re-Identification

    Although a significant progress has been witnessed in supervised person re-identification (re-id), it remains challenging to generalize re-id models to new domains due to the huge domain gaps. Recently, there ...

    Yang Zou, **aodong Yang, Zhiding Yu, B. V. K. Vijaya Kumar in Computer Vision – ECCV 2020 (2020)

  20. No Access

    Chapter

    Dealing with Label Quality Disparity in Federated Learning

    Federated Learning (FL) is highly useful for the applications which suffer silo effect and privacy preserving, such as healthcare, finance, education, etc. Existing FL approaches generally do not account for d...

    Yiqiang Chen, **aodong Yang, **n Qin, Han Yu, Piu Chan, Zhiqi Shen in Federated Learning (2020)

previous disabled Page of 3