
Document Layout Analysis via Dynamic Residual Feature Fusion
The document layout analysis (DLA) aims to split the document image into...
read it

Pretraining strategies and datasets for facial representation learning
What is the best way to learn a universal face representation? Recent wo...
read it

A fusion learning method to subgroup analysis for longitudinal trajectories
Uncovering the heterogeneity in the disease progression of Alzheimer's i...
read it

Some results about double cyclic codes over 𝔽_q+v𝔽_q+v^2𝔽_q
Let 𝔽_q be the finite field with q elements. This paper mainly researche...
read it

Revisiting the Concrete Security of Goldreich's Pseudorandom Generator
Local pseudorandom generators are a class of fundamental cryptographic p...
read it

Federated Multiarmed Bandits with Personalization
A general framework of personalized federated multiarmed bandits (PFMA...
read it

Seasonal association between viral etiologies of hospitalized acute lower respiratory infections and meteorological factors in China
Background: Acute lower respiratory infections present pronounced season...
read it

OrgMining 2.0: A Novel Framework for Organizational Model Mining from Event Logs
Providing appropriate structures around human resources can streamline o...
read it

New (k,l,m)verifiable multisecret sharing schemes based on XTR public key system
Secret sharing was proposed primarily in 1979 to solve the problem of ke...
read it

DARE: AIbased Diver Action Recognition System using MultiChannel CNNs for AUV Supervision
With the growth of sensing, control and robotic technologies, autonomous...
read it

Precoding and Scheduling for AoI Minimization in MIMO Broadcast Channels
In this paper, we consider a status updating system where updates are ge...
read it

Adaptive 3D Face Reconstruction from a Single Image
3D face reconstruction from a single image is a challenging problem, esp...
read it

Training Binary Neural Networks with RealtoBinary Convolutions
This paper shows how to train binary networks to within a few percent po...
read it

Knowledge distillation via adaptive instance normalization
This paper addresses the problem of model compression via knowledge dist...
read it

Stochastic Linear Contextual Bandits with Diverse Contexts
In this paper, we investigate the impact of context diversity on stochas...
read it

Timely Synchronization with Sporadic Status Changes
In this paper, we consider a status updating system where the transmitte...
read it

Decentralized Multiplayer Multiarmed Bandits with No Collision Information
The decentralized stochastic multiplayer multiarmed bandit (MPMAB) pr...
read it

A RealTime Deep Network for Crowd Counting
Automatic analysis of highly crowded people has attracted extensive atte...
read it

Information Freshness for Timely Detection of Status Changes
In this paper, we aim to establish the connection between Age of Informa...
read it

On muSymmetric Polynomials
In this paper, we study functions of the roots of a univariate polynomia...
read it

A Condition for Multiplicity Structure of Univariate Polynomials
We consider the problem of finding a condition for a univariate polynomi...
read it

Cascaded DetailPreserving Networks for SuperResolution of Document Images
The accuracy of OCR is usually affected by the quality of the input docu...
read it

Metaneuralnetwork for Realtime and Passive Deeplearningbased Object Recognition
Deeplearning recently show great success across disciplines yet convent...
read it

ComplexBPNeuralNetworkbased Hybrid Precoding for Millimeter Wave Multiuser Massive MIMO Systems
The high energy consumption of massive multiinput multiout (MIMO) syst...
read it

PowerConsumption Outage Challenge in NextGeneration Cellular Networks
The conventional outage in wireless communication systems is caused by t...
read it

EdgeAware Deep Image Deblurring
Image deblurring is a fundamental and challenging lowlevel vision probl...
read it

Video Crowd Counting via Dynamic Temporal Modeling
Crowd counting aims to count the number of instantaneous people in a cro...
read it

New dynamic and verifiable multisecret sharing schemes based on LFSR public key cryptosystem
A verifiable multisecret sharing (VMSS) scheme enables the dealer to sh...
read it

Adaptive Coding for Information Freshness in a Twouser Broadcast Erasure Channel
In this paper, we investigate the impact of coding on the Age of Informa...
read it

AgeOptimal Transmission of Rateless Codes in an Erasure Channel
In this paper, we examine a status updating system where updates generat...
read it

Neural Networks in Hybrid Precoding for Millimeter Wave Massive MIMO Systems
Neural networks have been applied to the physical layer of wireless comm...
read it

Energy Efficiency of Generalized Spatial Modulation Aided Massive MIMO Systems
One of focuses in green communication studies is the energy efficiency (...
read it

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor
A realtime status updating system is considered, in which an energy har...
read it

Online Learning with Diverse User Preferences
In this paper, we investigate the impact of diverse user preference on l...
read it

Energy Efficiency Optimization of Generalized Spatial Modulation with SubConnected Hybrid Precoding
Energy efficiency (EE) optimization of millimeter wave (mmWave) massive...
read it

When to Preempt? Age of Information Minimization under Link Capacity Constraint
In this paper, we consider a scenario where a source continuously monito...
read it

Adaptive Scenario Discovery for Crowd Counting
Crowd counting, i.e., estimation number of pedestrian in crowd images, i...
read it

Runtime Analysis for Selfadaptive Mutation Rates
We propose and analyze a selfadaptive version of the (1,λ) evolutionary...
read it

Online Timely Status Updates with Erasures for Energy Harvesting Sensors
An energy harvesting sensor that is sending status updates to a destinat...
read it

How Much of Wireless Rate Can Smartphones Support in 5G Networks?
Due to the higher wireless transmission rates in the fifth generation (5...
read it

Age of Information Minimization for an Energy Harvesting Source with Updating Erasures: With and Without Feedback
Consider an energy harvesting (EH) sensor that continuously monitors a s...
read it

To learn image superresolution, use a GAN to learn how to do image degradation first
This paper is on image and face superresolution. The vast majority of p...
read it

Otem&Utem: Over and UnderTranslation Evaluation Metric for NMT
Although neural machine translation(NMT) yields promising translation pe...
read it

Optimal Parameter Choices via Precise BlackBox Analysis
It has been observed that some working principles of evolutionary algori...
read it

To Skip or to Switch? Minimizing Age of Information under Link Capacity Constraint
Consider a scenario where a source continuously monitors an object and s...
read it

AgeMinimal Transmission for Energy Harvesting Sensors with Finite Batteries: Online Policies
An energyharvesting sensor node that is sending status updates to a des...
read it

NonAsymptotic Achievable Rates for Gaussian EnergyHarvesting Channels: BestEffort and SaveandTransmit
An additive white Gaussian noise (AWGN) energyharvesting (EH) channel i...
read it

CostAware Learning and Optimization for Opportunistic Spectrum Access
In this paper, we investigate costaware joint learning and optimization...
read it

Integrating UML with Service Refinement for Requirements Modeling and Analysis
Unified Modeling Language (UML) is the de facto standard for requirement...
read it

Optimal Status Updating for an Energy Harvesting Sensor with a Noisy Channel
Consider an energy harvesting sensor continuously monitors a system and ...
read it
Jing Yang
is this you? claim profile