
Signal Encryption Strategy based on Domain change of the Fractional Fourier Transform
We provide a double encryption algorithm that uses the lack of invertibi...
read it

Deriving information from missing data: implications for mood prediction
The availability of mobile technologies has enabled the efficient collec...
read it

Semiimplicit Taylor schemes for stiff rough differential equations
We study a class of semiimplicit Taylortype numerical methods that are...
read it

Improving GAN Training with Probability Ratio Clipping and Sample Reweighting
Despite success on a wide range of problems related to vision, generativ...
read it

Demystifying SelfSupervised Learning: An InformationTheoretical Framework
Selfsupervised representation learning adopts selfdefined signals as s...
read it

A Finite Time Analysis of Two TimeScale Actor Critic Methods
Actorcritic (AC) methods have exhibited great empirical success compare...
read it

Future Video Synthesis with Object Motion Prediction
We present an approach to predict future video frames given a sequence o...
read it

Crossmodality Person reidentification with SharedSpecific Feature Transfer
Crossmodality person reidentification (cmReID) is a challenging but k...
read it

Towards Understanding the Spectral Bias of Deep Learning
An intriguing phenomenon observed during training neural networks is the...
read it

Coveragebased Outlier Explanation
Outlier detection is a core task in data mining with a plethora of algor...
read it

Application of Randomized Quadrature Formulas to the Finite Element Method for Elliptic Equations
The implementation of the finite element method for linear elliptic equa...
read it

A Sketched Finite Element Method for Elliptic Models
We consider a sketched implementation of the finite element method for e...
read it

MMDetection: Open MMLab Detection Toolbox and Benchmark
We present MMDetection, an object detection toolbox that contains a rich...
read it

Large Scale Incremental Learning
Modern machine learning suffers from catastrophic forgetting when learni...
read it

Unified Adversarial Invariance
We present a unified invariance framework for supervised neural networks...
read it

Spatially Constrained Generative Adversarial Networks for Conditional Image Generation
Image generation has raised tremendous attention in both academic and in...
read it

Rethinking Classification and Localization in RCNN
Modern RCNN based detectors share the RoI feature extractor head for bo...
read it

QATM: QualityAware Template Matching For Deep Learning
Finding a template in a search image is one of the core problems many co...
read it

AIRD: Adversarial Learning Framework for Image Repurposing Detection
Image repurposing is a commonly used method for spreading misinformation...
read it

Distributed Learning of Decentralized Control Policies for Articulated Mobile Robots
Stateoftheart distributed algorithms for reinforcement learning rely ...
read it

A Note on Random Sampling for Matrix Multiplication
This paper extends the framework of randomised matrix multiplication to ...
read it

Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method
In recent years, blockchainbased techniques have been widely used in cy...
read it

ImagetoGPS Verification Through A BottomUp Pattern Matching Network
The imagetoGPS verification problem asks whether a given image is take...
read it

Towards Understanding Learning Representations: To What Extent Do Different Neural Networks Learn the Same Representation
It is widely believed that learning good representations is one of the m...
read it

Unsupervised Adversarial Invariance
Data representations that contain all the information about target varia...
read it

Energy Efficient and Fair Resource Allocation for LTEUnlicensed Uplink Networks: A Twosided Matching Approach with Partial Information
LTEUnlicensed (LTEU) has recently attracted worldwide interest to meet...
read it

Deep Multimodal ImageRepurposing Detection
Nefarious actors on social media and other platforms often spread rumors...
read it

The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
read it

The Coming Era of AlphaHacking?
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
read it

Predictive Local Smoothness for Stochastic Gradient Methods
Stochastic gradient methods are dominant in nonconvex optimization espec...
read it

Facial Landmark Detection: a Literature Survey
The locations of the fiducial facial landmark points around facial compo...
read it

Machine Learning for Exam Triage
In this project, we extend the stateoftheart CheXNet (Rajpurkar et al...
read it

Forecasting Future Humphrey Visual Fields Using Deep Learning
Purpose: To determine if deep learning networks could be trained to fore...
read it

Generating retinal flow maps from structural optical coherence tomography with artificial intelligence
Despite significant advances in artificial intelligence (AI) for compute...
read it

Incremental Classifier Learning with Generative Adversarial Networks
In this paper, we address the incremental classifier learning problem, w...
read it

SeismicNet: A Deep Densely Connected Neural Network to Detect Seismic Events
One of the risks of largescale geologic carbon sequestration is the pot...
read it

Clustering with Outlier Removal
Cluster analysis and outlier detection are strongly coupled tasks in dat...
read it

Bidirectional Conditional Generative Adversarial Networks
Conditional variants of Generative Adversarial Networks (GANs), known as...
read it

Simultaneous Facial Landmark Detection, Pose and Deformation Estimation under Facial Occlusion
Facial landmark detection, head pose estimation, and facial deformation ...
read it

Constrained Joint Cascade Regression Framework for Simultaneous Facial Action Unit Recognition and Facial Landmark Detection
Cascade regression framework has been shown to be effective for facial l...
read it

Constrained Deep Transfer Feature Learning and its Applications
Feature learning with deep models has achieved impressive results for bo...
read it

Robust Facial Landmark Detection under Significant Head Poses and Occlusion
There have been tremendous improvements for facial landmark detection on...
read it

A Hierarchical Probabilistic Model for Facial Feature Detection
Facial feature detection from facial images has attracted great attentio...
read it

Facial Feature Tracking under Varying Facial Expressions and Face Poses based on Restricted Boltzmann Machines
Facial feature tracking is an active area in computer vision due to its ...
read it

Cascaded Regionbased Densely Connected Network for Event Detection: A Seismic Application
Automatic event detection from time series signals has wide applications...
read it

Deep Matching and Validation Network  An EndtoEnd Solution to Constrained Image Splicing Localization and Detection
Image splicing is a very common image manipulation technique that is som...
read it

SOL: A Library for Scalable Online Learning Algorithms
SOL is an opensource library for scalable online learning algorithms, a...
read it

Families in the Wild (FIW): LargeScale Kinship Image Database and Benchmarks
We present the largest kinship recognition dataset to date, Families in ...
read it

Facial Landmark Detection with Tweaked Convolutional Neural Networks
We present a novel convolutional neural network (CNN) design for facial ...
read it

Learning Document Image Binarization from Data
In this paper we present a fully trainable binarization solution for deg...
read it
Yue Wu
is this you? claim profile
Ph.D. student at Department of Electrical & Computer Engineering, Northeastern University