
An Adversarial Attack Defending System for Securing InVehicle Networks
In a modern vehicle, there are over seventy Electronics Control Units (E...
read it

A Survey of Smart Contract Formal Specification and Verification
A smart contract is a computer program which allows users to define and ...
read it

The Expected Size of Random Convex Layers and Convex Shells
Given a planar point set X, we study the convex shells and the convex la...
read it

Bayesian Survival Analysis Using Gamma Processes with Adaptive Time Partition
In Bayesian semiparametric analyses of timetoevent data, nonparametr...
read it

Streaming Complexity of SVMs
We study the space complexity of solving the biasregularized SVM proble...
read it

Octopus: PrivacyPreserving Collaborative Evaluation of Loan Stacking
With the rise of online lenders, the loan stacking problem has become a ...
read it

Graph Structuraltopic Neural Network
Graph Convolutional Networks (GCNs) achieved tremendous success by effec...
read it

A Revisit to Debiased Lasso for Generalized Linear Models
Debiased lasso has emerged as a popular tool to draw statistical infere...
read it

Nearly Linear Row Sampling Algorithm for Quantile Regression
We give a row sampling algorithm for the quantile loss function with sam...
read it

Weakly Supervised Lesion Localization With ProbabilisticCAM Pooling
Localizing thoracic diseases on chest Xray plays a critical role in cli...
read it

InputSparsity Low Rank Approximation in Schatten Norm
We give the first inputsparsity time algorithms for the rankk low rank...
read it

CosmeticAware Makeup Cleanser
Face verification aims at determining whether a pair of face images belo...
read it

Estimation of timevarying reproduction numbers underlying epidemiological processes: a new statistical tool for the COVID19 pandemic
The coronavirus pandemic has rapidly evolved into an unprecedented crisi...
read it

Estimation of timevarying transmission and removal rates underlying epidemiological processes: a new statistical tool for the COVID19 pandemic
The coronavirus pandemic has rapidly evolved into an unprecedented crisi...
read it

COVID19 Screening on Chest Xray Images Using Deep Learning based Anomaly Detection
Coronaviruses are important human and animal pathogens. To date the nove...
read it

Minimum Enclosing Parallelogram with Outliers
We study the problem of minimum enclosing parallelogram with outliers, w...
read it

Informative Sample Mining Network for MultiDomain ImagetoImage Translation
The performance of multidomain imagetoimage translation has been sign...
read it

MinorizationMaximizationbased Steepest Ascent for Largescale Survival Analysis with TimeVarying Effects: Application to the National Kidney Transplant Dataset
The timevarying effects model is a flexible and powerful tool for model...
read it

Stylebased Variational Autoencoder for RealWorld SuperResolution
Realworld image superresolution is a challenging image translation pro...
read it

Robust Estimation and Variable Selection for the Accelerated Failure Time Model
This paper considers robust modeling of the survival time for cancer pat...
read it

Evolving ab initio trading strategies in heterogeneous environments
Securities markets are quintessential complex adaptive systems in which ...
read it

Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules
With the prosperity of smart contracts and the blockchain technology, va...
read it

A Survey on Theorem Provers in Formal Methods
Mechanical reasoning is a key area of research that lies at the crossroa...
read it

Combining Program Analysis and Statistical Language Model for Code Statement Completion
Automatic code completion helps improve developers' productivity in thei...
read it

Path Planning Games
Path planning is a fundamental and extensively explored problem in robot...
read it

DirectedWeighting Group Lasso for Eltwise Blocked CNN Pruning
Eltwise layer is a commonly used structure in the multibranch deep lear...
read it

OracleSupported Dynamic Exploit Generation for Smart Contracts
Despite the high stakes involved in smart contracts, they are often deve...
read it

Pose Agnostic Crossspectral Hallucination via Disentangling Independent Factors
The crosssensor gap is one of the challenges that arise much research i...
read it

An Empirical Study on the Characteristics of QuestionAnswering Process on Developer Forums
Developer forums are one of the most popular and useful Q&A websites on ...
read it

DataDriven Neuron Allocation for Scale Aggregation Networks
Successful visual recognition networks benefit from aggregating informat...
read it

REPAIR: Removing Representation Bias by Dataset Resampling
Modern machine learning datasets can have biases for certain representat...
read it

Biphasic Learning of GANs for HighResolution ImagetoImage Translation
Despite that the performance of imagetoimage translation has been sign...
read it

Tight Bounds for the Subspace Sketch Problem with Applications
In the subspace sketch problem one is given an n× d matrix A with O((nd)...
read it

Estimation and Inference for High Dimensional Generalized Linear Models: A Splitting and Smoothing Approach
For a better understanding of the molecular causes of lung cancer, the B...
read it

Deterministic Sparse Fourier Transform with an ell_infty Guarantee
In this paper we revisit the deterministic version of the Sparse Fourier...
read it

Detecting Lesion Bounding Ellipses With Gaussian Proposal Networks
Lesions characterized by computed tomography (CT) scans, are arguably of...
read it

A Survey to Deep Facial Attribute Analysis
Facial attribute analysis has received considerable attention with the d...
read it

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems
Deep learning (DL) defines a datadriven programming paradigm that autom...
read it

Image SuperResolution Using TV Priori Guided Convolutional Network
We proposed a TV priori information guided deep learning method for sing...
read it

Testing Matrix Rank, Optimally
We show that for the problem of testing if a matrix A ∈ F^n × n has rank...
read it

LearningBased DelayAware Caching in Wireless D2D Caching Networks
Recently, wireless caching techniques have been studied to satisfy lower...
read it

Large Margin Neural Language Model
We propose a large margin criterion for training neural language models....
read it

Patchbased Contour Prior Image Denoising for Salt and Pepper Noise
The salt and pepper noise brings a significant challenge to image denois...
read it

A Convolutional Neural Networks Denoising Approach for Salt and Pepper Noise
The salt and pepper noise, especially the one with extremely high percen...
read it

Cancer Metastasis Detection With Neural Conditional Random Field
Breast cancer diagnosis often requires accurate detection of metastasis ...
read it

CovarianceInsured Screening
Modern biotechnologies have produced a vast amount of highthroughput d...
read it

DeepIM: Deep Iterative Matching for 6D Pose Estimation
Estimating the 6D pose of objects from images is an important problem in...
read it

SurvBoost: An R Package for HighDimensional Variable Selection in the Stratified Proportional Hazards Model via Gradient Boosting
Highdimensional variable selection in the proportional hazards (PH) mod...
read it

PrivPy: Enabling Scalable and General PrivacyPreserving Computation
We introduce PrivPy, a practical privacypreserving collaborative comput...
read it

Deterministic Heavy Hitters with Sublinear Query Time
This paper studies the classic problem of finding heavy hitters in the t...
read it
Yi Li
is this you? claim profile
∙
0
followers
SenseTime Corporation
∙
CSIRO
∙
University of Michigan
∙
University of California, Irvine
∙
New Jersey Institute of Technology
∙
Tsinghua University
∙
Queen Mary University of London
∙
Nanyang Technological University
∙
Peking University
∙
University of California, San Diego
∙
Syracuse University
∙
Baidu, Inc.
Assistant Professor in the Divison of Mathematial Sciences at Nanyang Technological University