
DemonstrationGuided Reinforcement Learning with Learned Skills
Demonstrationguided reinforcement learning (RL) is a promising approach...
read it

Feature Flow Regularization: Improving Structured Sparsity in Deep Neural Networks
Pruning is a model compression method that removes redundant parameters ...
read it

Generalized Permutation Framework for Testing Model Variable Significance
A common problem in machine learning is determining if a variable signif...
read it

CRTNet: A Generalized and Scalable Framework for the ComputerAided Diagnosis of Electrocardiogram Signals
Electrocardiogram (ECG) signals play critical roles in the clinical scre...
read it

LineCounter: Learning Handwritten Text Line Segmentation by Counting
Handwritten Text Line Segmentation (HTLS) is a lowlevel but important t...
read it

Uncertainty Weighted ActorCritic for Offline Reinforcement Learning
Offline Reinforcement Learning promises to learn effective policies from...
read it

Maximizing Mutual Information Across Feature and Topology Views for Learning Graph Representations
Recently, maximizing mutual information has emerged as a powerful method...
read it

SauvolaNet: Learning Adaptive Sauvola Network for Degraded Document Binarization
Inspired by the classic Sauvola local image thresholding approach, we sy...
read it

StyleAware Normalized Loss for Improving Arbitrary Style Transfer
Neural Style Transfer (NST) has quickly evolved from singlestyle to inf...
read it

HumanOriented Autonomous Traffic Simulation
We present an innovative framework, Crowdsourcing Autonomous Traffic Sim...
read it

Automatic Generation of Largescale 3D Road Networks based on GIS Data
How to automatically generate a realistic largescale 3D road network is...
read it

Modelling Paralinguistic Properties in Conversational Speech to Detect Bipolar Disorder and Borderline Personality Disorder
Bipolar disorder (BD) and borderline personality disorder (BPD) are two ...
read it

Nearly Minimax Optimal Regret for Learning Infinitehorizon Averagereward MDPs with Linear Function Approximation
We study reinforcement learning in an infinitehorizon averagereward se...
read it

A randomised trapezoidal quadrature
A randomised trapezoidal quadrature rule is proposed for continuous func...
read it

Classagnostic Object Detection
Object detection models perform well at localizing and classifying objec...
read it

Unsupervised Domain Adaptation for Visual Navigation
Advances in visual navigation methods have led to intelligent embodied n...
read it

Claw UNet: A Unetbased Network with Deep Feature Concatenation for Scleral Blood Vessel Segmentation
SturgeWeber syndrome (SWS) is a vascular malformation disease, and it m...
read it

Planimation
Planimation is a modular and extensible open source framework to visuali...
read it

Learning to Detect Bipolar Disorder and Borderline Personality Disorder with Language and Speech in NonClinical Interviews
Bipolar disorder (BD) and borderline personality disorder (BPD) are both...
read it

Signal Encryption Strategy based on Domain change of the Fractional Fourier Transform
We provide a double encryption algorithm that uses the lack of invertibi...
read it

Deriving information from missing data: implications for mood prediction
The availability of mobile technologies has enabled the efficient collec...
read it

Semiimplicit Taylor schemes for stiff rough differential equations
We study a class of semiimplicit Taylortype numerical methods that are...
read it

Improving GAN Training with Probability Ratio Clipping and Sample Reweighting
Despite success on a wide range of problems related to vision, generativ...
read it

Demystifying SelfSupervised Learning: An InformationTheoretical Framework
Selfsupervised representation learning adopts selfdefined signals as s...
read it

A Finite Time Analysis of Two TimeScale Actor Critic Methods
Actorcritic (AC) methods have exhibited great empirical success compare...
read it

Future Video Synthesis with Object Motion Prediction
We present an approach to predict future video frames given a sequence o...
read it

Crossmodality Person reidentification with SharedSpecific Feature Transfer
Crossmodality person reidentification (cmReID) is a challenging but k...
read it

Towards Understanding the Spectral Bias of Deep Learning
An intriguing phenomenon observed during training neural networks is the...
read it

Coveragebased Outlier Explanation
Outlier detection is a core task in data mining with a plethora of algor...
read it

Application of Randomized Quadrature Formulas to the Finite Element Method for Elliptic Equations
The implementation of the finite element method for linear elliptic equa...
read it

A Sketched Finite Element Method for Elliptic Models
We consider a sketched implementation of the finite element method for e...
read it

MMDetection: Open MMLab Detection Toolbox and Benchmark
We present MMDetection, an object detection toolbox that contains a rich...
read it

Large Scale Incremental Learning
Modern machine learning suffers from catastrophic forgetting when learni...
read it

Unified Adversarial Invariance
We present a unified invariance framework for supervised neural networks...
read it

Spatially Constrained Generative Adversarial Networks for Conditional Image Generation
Image generation has raised tremendous attention in both academic and in...
read it

Rethinking Classification and Localization in RCNN
Modern RCNN based detectors share the RoI feature extractor head for bo...
read it

QATM: QualityAware Template Matching For Deep Learning
Finding a template in a search image is one of the core problems many co...
read it

AIRD: Adversarial Learning Framework for Image Repurposing Detection
Image repurposing is a commonly used method for spreading misinformation...
read it

Distributed Learning of Decentralized Control Policies for Articulated Mobile Robots
Stateoftheart distributed algorithms for reinforcement learning rely ...
read it

A Note on Random Sampling for Matrix Multiplication
This paper extends the framework of randomised matrix multiplication to ...
read it

Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method
In recent years, blockchainbased techniques have been widely used in cy...
read it

ImagetoGPS Verification Through A BottomUp Pattern Matching Network
The imagetoGPS verification problem asks whether a given image is take...
read it

Towards Understanding Learning Representations: To What Extent Do Different Neural Networks Learn the Same Representation
It is widely believed that learning good representations is one of the m...
read it

Unsupervised Adversarial Invariance
Data representations that contain all the information about target varia...
read it

Energy Efficient and Fair Resource Allocation for LTEUnlicensed Uplink Networks: A Twosided Matching Approach with Partial Information
LTEUnlicensed (LTEU) has recently attracted worldwide interest to meet...
read it

Deep Multimodal ImageRepurposing Detection
Nefarious actors on social media and other platforms often spread rumors...
read it

The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
read it

The Coming Era of AlphaHacking?
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
read it

Predictive Local Smoothness for Stochastic Gradient Methods
Stochastic gradient methods are dominant in nonconvex optimization espec...
read it

Facial Landmark Detection: a Literature Survey
The locations of the fiducial facial landmark points around facial compo...
read it
Yue Wu
is this you? claim profile
Ph.D. student at Department of Electrical & Computer Engineering, Northeastern University