Skip to main content

Showing 1–19 of 19 results for author: Geng, L

  1. Direct May Not Be the Best: An Incremental Evolution View of Pose Generation

    Authors: Yuelong Li, Tengfei Xiao, Lei Geng, Jianming Wang

    Abstract: Pose diversity is an inherent representative characteristic of 2D images. Due to the 3D to 2D projection mechanism, there is evident content discrepancy among distinct pose images. This is the main obstacle bothering pose transformation related researches. To deal with this challenge, we propose a fine-grained incremental evolution centered pose generation framework, rather than traditional direct… ▽ More

    Submitted 15 April, 2024; v1 submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted at AAAI2024

  2. arXiv:2403.02719  [pdf, ps, other

    cs.AI

    Multi-Scale Subgraph Contrastive Learning

    Authors: Yanbei Liu, Yu Zhao, Xiao Wang, Lei Geng, Zhitao Xiao

    Abstract: Graph-level contrastive learning, aiming to learn the representations for each graph by contrasting two augmented graphs, has attracted considerable attention. Previous studies usually simply assume that a graph and its augmented graph as a positive pair, otherwise as a negative pair. However, it is well known that graph structure is always complex and multi-scale, which gives rise to a fundamenta… ▽ More

    Submitted 11 April, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: The 32nd International Joint Conference on Artificial Intelligence (IJCAI-2023)

  3. arXiv:2312.17431  [pdf, other

    cs.CR cs.CV

    MVPatch: More Vivid Patch for Adversarial Camouflaged Attacks on Object Detectors in the Physical World

    Authors: Zheng Zhou, Hongbo Zhao, Ju Liu, Qiaosheng Zhang, Liwei Geng, Shuchang Lyu, Wenquan Feng

    Abstract: Recent investigations demonstrate that adversarial patches can be utilized to manipulate the result of object detection models. However, the conspicuous patterns on these patches may draw more attention and raise suspicions among humans. Moreover, existing works have primarily focused on enhancing the efficacy of attacks in the physical domain, rather than seeking to optimize their stealth attribu… ▽ More

    Submitted 11 January, 2024; v1 submitted 28 December, 2023; originally announced December 2023.

    Comments: 14 pages, 8 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2311.11564  [pdf, other

    cs.CL

    KBioXLM: A Knowledge-anchored Biomedical Multilingual Pretrained Language Model

    Authors: Lei Geng, Xu Yan, Ziqiang Cao, Juntao Li, Wenjie Li, Sujian Li, Xinjie Zhou, Yang Yang, Jun Zhang

    Abstract: Most biomedical pretrained language models are monolingual and cannot handle the growing cross-lingual requirements. The scarcity of non-English domain corpora, not to mention parallel data, poses a significant hurdle in training multilingual biomedical models. Since knowledge forms the core of domain-specific corpora and can be translated into various languages accurately, we propose a model call… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  5. arXiv:2309.07068  [pdf, other

    cs.CV

    FAIR: Frequency-aware Image Restoration for Industrial Visual Anomaly Detection

    Authors: Tongkun Liu, Bing Li, Xiao Du, Bingke Jiang, Leqi Geng, Feiyang Wang, Zhuo Zhao

    Abstract: Image reconstruction-based anomaly detection models are widely explored in industrial visual inspection. However, existing models usually suffer from the trade-off between normal reconstruction fidelity and abnormal reconstruction distinguishability, which damages the performance. In this paper, we find that the above trade-off can be better mitigated by leveraging the distinct frequency biases be… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: 12 pages, 10 figures

  6. arXiv:2308.08176  [pdf, other

    cs.CL

    RSpell: Retrieval-augmented Framework for Domain Adaptive Chinese Spelling Check

    Authors: Siqi Song, Qi Lv, Lei Geng, Ziqiang Cao, Guohong Fu

    Abstract: Chinese Spelling Check (CSC) refers to the detection and correction of spelling errors in Chinese texts. In practical application scenarios, it is important to make CSC models have the ability to correct errors across different domains. In this paper, we propose a retrieval-augmented spelling check framework called RSpell, which searches corresponding domain terms and incorporates them into CSC mo… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

    Journal ref: NLPCC 2023

  7. arXiv:2210.14485  [pdf, other

    cs.CV

    Reconstruction from edge image combined with color and gradient difference for industrial surface anomaly detection

    Authors: Tongkun Liu, Bing Li, Zhuo Zhao, Xiao Du, Bingke Jiang, Leqi Geng

    Abstract: Reconstruction-based methods are widely explored in industrial visual anomaly detection. Such methods commonly require the model to well reconstruct the normal patterns but fail in the anomalies, and thus the anomalies can be detected by evaluating the reconstruction errors. However, in practice, it's usually difficult to control the generalization boundary of the model. The model with an overly s… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: 11 pages, 8 figures

  8. arXiv:2206.06304  [pdf, other

    cs.DC cs.IT cs.LG

    Multi-user Co-inference with Batch Processing Capable Edge Server

    Authors: Wenqi Shi, Sheng Zhou, Zhisheng Niu, Miao Jiang, Lu Geng

    Abstract: Graphics processing units (GPUs) can improve deep neural network inference throughput via batch processing, where multiple tasks are concurrently processed. We focus on novel scenarios that the energy-constrained mobile devices offload inference tasks to an edge server with GPU. The inference task is partitioned into sub-tasks for a finer granularity of offloading and scheduling, and the user ener… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  9. General and Domain Adaptive Chinese Spelling Check with Error Consistent Pretraining

    Authors: Qi Lv, Ziqiang Cao, Lei Geng, Chunhui Ai, Xu Yan, Guohong Fu

    Abstract: The lack of label data is one of the significant bottlenecks for Chinese Spelling Check (CSC). Existing researches use the method of automatic generation by exploiting unlabeled data to expand the supervised corpus. However, there is a big gap between the real input scenario and automatic generated corpus. Thus, we develop a competitive general speller ECSpell which adopts the Error Consistent mas… ▽ More

    Submitted 7 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

  10. arXiv:2110.00896  [pdf, other

    eess.IV cs.CV

    Disarranged Zone Learning (DZL): An unsupervised and dynamic automatic stenosis recognition methodology based on coronary angiography

    Authors: Yanan Dai, Pengxiong Zhu, Bangde Xue, Yun Ling, Xibao Shi, Liang Geng, Qi Zhang, Jun Liu

    Abstract: We proposed a novel unsupervised methodology named Disarranged Zone Learning (DZL) to automatically recognize stenosis in coronary angiography. The methodology firstly disarranges the frames in a video, secondly it generates an effective zone and lastly trains an encoder-decoder GRU model to learn the capability to recover disarranged frames. The breakthrough of our study is to discover and valida… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

  11. arXiv:2102.01876  [pdf, other

    cs.NI

    Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks

    Authors: Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu

    Abstract: In remote regions (e.g., mountain and desert), cellular networks are usually sparsely deployed or unavailable. With the appearance of new applications (e.g., industrial automation and environment monitoring) in remote regions, resource-constrained terminals become unable to meet the latency requirements. Meanwhile, offloading tasks to urban terrestrial cloud (TC) via satellite link will lead to hi… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

  12. Local Geometric Distortions Resilient Watermarking Scheme Based on Symmetry

    Authors: Zehua Ma, Weiming Zhang, Han Fang, Xiaoyi Dong, Linfeng Geng, Nenghai Yu

    Abstract: As an efficient watermark attack method, geometric distortions destroy the synchronization between watermark encoder and decoder. And the local geometric distortion is a famous challenge in the watermark field. Although a lot of geometric distortions resilient watermarking schemes have been proposed, few of them perform well against local geometric distortion like random bending attack (RBA). To a… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Journal ref: Published in IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, no. 12, pp. 4826-4839, Dec. 2021

  13. arXiv:2007.07174  [pdf, other

    cs.IT cs.LG cs.NI eess.SP

    Joint Device Scheduling and Resource Allocation for Latency Constrained Wireless Federated Learning

    Authors: Wenqi Shi, Sheng Zhou, Zhisheng Niu, Miao Jiang, Lu Geng

    Abstract: In federated learning (FL), devices contribute to the global training by uploading their local model updates via wireless channels. Due to limited computation and communication resources, device scheduling is crucial to the convergence rate of FL. In this paper, we propose a joint device scheduling and resource allocation policy to maximize the model accuracy within a given total training time bud… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: submitted to IEEE Trans. Wireless Communications

  14. arXiv:2005.02258  [pdf, other

    cs.CV

    AGE Challenge: Angle Closure Glaucoma Evaluation in Anterior Segment Optical Coherence Tomography

    Authors: Huazhu Fu, Fei Li, Xu Sun, Xingxing Cao, Jingan Liao, Jose Ignacio Orlando, Xing Tao, Yuexiang Li, Shihao Zhang, Mingkui Tan, Chenglang Yuan, Cheng Bian, Ruitao Xie, Jiongcheng Li, Xiaomeng Li, Jing Wang, Le Geng, Panming Li, Huaying Hao, Jiang Liu, Yan Kong, Yongyong Ren, Hrvoje Bogunovic, Xiulan Zhang, Yanwu Xu

    Abstract: Angle closure glaucoma (ACG) is a more aggressive disease than open-angle glaucoma, where the abnormal anatomical structures of the anterior chamber angle (ACA) may cause an elevated intraocular pressure and gradually lead to glaucomatous optic neuropathy and eventually to visual impairment and blindness. Anterior Segment Optical Coherence Tomography (AS-OCT) imaging provides a fast and contactles… ▽ More

    Submitted 31 July, 2020; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: Accepted to Medical Image Analysis (MedIA). AGE Challenge website at: https://age.grand-challenge.org

  15. arXiv:1905.07700  [pdf

    cs.CV

    FORECAST-CLSTM: A New Convolutional LSTM Network for Cloudage Nowcasting

    Authors: Chao Tan, Xin Feng, Jianwu Long, Li Geng

    Abstract: With the highly demand of large-scale and real-time weather service for public, a refinement of short-time cloudage prediction has become an essential part of the weather forecast productions. To provide a weather-service-compliant cloudage nowcasting, in this paper, we propose a novel hierarchical Convolutional Long-Short-Term Memory network based deep learning model, which we term as FORECAST-CL… ▽ More

    Submitted 19 May, 2019; originally announced May 2019.

    Journal ref: IEEE Conference of Visual Communications and Image Processing 2018

  16. arXiv:1904.02325  [pdf, other

    cs.CV

    Feature Pyramid Hashing

    Authors: Yifan Yang, Libing Geng, Hanjiang Lai, Yan Pan, Jian Yin

    Abstract: In recent years, deep-networks-based hashing has become a leading approach for large-scale image retrieval. Most deep hashing approaches use the high layer to extract the powerful semantic representations. However, these methods have limited ability for fine-grained image retrieval because the semantic features extracted from the high layer are difficult in capturing the subtle differences. To thi… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  17. arXiv:1903.03472  [pdf, ps, other

    cs.NI cs.LG

    Improving Device-Edge Cooperative Inference of Deep Learning via 2-Step Pruning

    Authors: Wenqi Shi, Yunzhong Hou, Sheng Zhou, Zhisheng Niu, Yang Zhang, Lu Geng

    Abstract: Deep neural networks (DNNs) are state-of-the-art solutions for many machine learning applications, and have been widely used on mobile devices. Running DNNs on resource-constrained mobile devices often requires the help from edge servers via computation offloading. However, offloading through a bandwidth-limited wireless link is non-trivial due to the tight interplay between the computation resour… ▽ More

    Submitted 8 March, 2019; originally announced March 2019.

  18. arXiv:1804.06061  [pdf, other

    cs.CV

    Improving Deep Binary Embedding Networks by Order-aware Reweighting of Triplets

    Authors: Jikai Chen, Hanjiang Lai, Libing Geng, Yan Pan

    Abstract: In this paper, we focus on triplet-based deep binary embedding networks for image retrieval task. The triplet loss has been shown to be most effective for the ranking problem. However, most of the previous works treat the triplets equally or select the hard triplets based on the loss. Such strategies do not consider the order relations, which is important for retrieval task. To this end, we propos… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

  19. arXiv:1803.09466   

    cs.CV

    Regularizing Deep Hashing Networks Using GAN Generated Fake Images

    Authors: Libing Geng, Yan Pan, Jikai Chen, Hanjiang Lai

    Abstract: Recently, deep-networks-based hashing (deep hashing) has become a leading approach for large-scale image retrieval. It aims to learn a compact bitwise representation for images via deep networks, so that similar images are mapped to nearby hash codes. Since a deep network model usually has a large number of parameters, it may probably be too complicated for the training data we have, leading to mo… ▽ More

    Submitted 2 September, 2018; v1 submitted 26 March, 2018; originally announced March 2018.

    Comments: I need to modify the experiments