Skip to main content

Showing 1–25 of 25 results for author: Ai, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.08285  [pdf

    cs.CV cs.AI eess.SY

    A Survey of Neural Network Robustness Assessment in Image Recognition

    Authors: Jie Wang, Jun Ai, Minyan Lu, Haoran Su, Dan Yu, Yutao Zhang, Junda Zhu, **gyu Liu

    Abstract: In recent years, there has been significant attention given to the robustness assessment of neural networks. Robustness plays a critical role in ensuring reliable operation of artificial intelligence (AI) systems in complex and uncertain environments. Deep learning's robustness problem is particularly significant, highlighted by the discovery of adversarial attacks on image classification models.… ▽ More

    Submitted 15 April, 2024; v1 submitted 12 April, 2024; originally announced April 2024.

    Comments: Corrected typos and grammatical errors in Section 5

  2. arXiv:2403.19943  [pdf, other

    cs.LG cs.AI eess.SP

    TDANet: A Novel Temporal Denoise Convolutional Neural Network With Attention for Fault Diagnosis

    Authors: Zhongzhi Li, Rong Fan, **gqi Tu, **yi Ma, Jianliang Ai, Yiqun Dong

    Abstract: Fault diagnosis plays a crucial role in maintaining the operational integrity of mechanical systems, preventing significant losses due to unexpected failures. As intelligent manufacturing and data-driven approaches evolve, Deep Learning (DL) has emerged as a pivotal technique in fault diagnosis research, recognized for its ability to autonomously extract complex features. However, the practical ap… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

  3. arXiv:2403.19737  [pdf, ps, other

    math.CO cs.CG

    Piercing independent sets in graphs without large induced matching

    Authors: Jiangdong Ai, Hong Liu, Zixiang Xu, Qiang Zhou

    Abstract: Given a graph $G$, denote by $h(G)$ the smallest size of a subset of $V(G)$ which intersects every maximum independent set of $G$. We prove that any graph $G$ without induced matching of size $t$ satisfies $h(G)\le ω(G)^{3t-3+o(1)}$. This resolves a conjecture of Hajebi, Li and Spirkl (Hitting all maximum stable sets in $P_{5}$-free graphs, JCTB 2024).

    Submitted 28 March, 2024; originally announced March 2024.

  4. arXiv:2402.12729  [pdf, other

    cs.LG cs.AI

    Scalable and reliable deep transfer learning for intelligent fault detection via multi-scale neural processes embedded with knowledge

    Authors: Zhongzhi Li, **gqi Tu, Jiacheng Zhu, Jianliang Ai, Yiqun Dong

    Abstract: Deep transfer learning (DTL) is a fundamental method in the field of Intelligent Fault Detection (IFD). It aims to mitigate the degradation of method performance that arises from the discrepancies in data distribution between training set (source domain) and testing set (target domain). Considering the fact that fault data collection is challenging and certain faults are scarce, DTL-based methods… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  5. arXiv:2401.05362  [pdf, other

    cs.CV cs.AI

    DualTeacher: Bridging Coexistence of Unlabelled Classes for Semi-supervised Incremental Object Detection

    Authors: Ziqi Yuan, Liyuan Wang, Wenbo Ding, Xingxing Zhang, Jiachen Zhong, Jianyong Ai, Jianmin Li, Jun Zhu

    Abstract: In real-world applications, an object detector often encounters object instances from new classes and needs to accommodate them effectively. Previous work formulated this critical problem as incremental object detection (IOD), which assumes the object instances of new classes to be fully annotated in incremental data. However, as supervisory signals are usually rare and expensive, the supervised I… ▽ More

    Submitted 13 December, 2023; originally announced January 2024.

  6. BD-MSA: Body decouple VHR Remote Sensing Image Change Detection method guided by multi-scale feature information aggregation

    Authors: Yonghui Tan, Xiaolong Li, Yishu Chen, **quan Ai

    Abstract: The purpose of remote sensing image change detection (RSCD) is to detect differences between bi-temporal images taken at the same place. Deep learning has been extensively used to RSCD tasks, yielding significant results in terms of result recognition. However, due to the shooting angle of the satellite, the impacts of thin clouds, and certain lighting conditions, the problem of fuzzy edges in the… ▽ More

    Submitted 3 March, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  7. arXiv:2309.12708  [pdf, other

    cs.CV cs.AI cs.LG

    PointSSC: A Cooperative Vehicle-Infrastructure Point Cloud Benchmark for Semantic Scene Completion

    Authors: Yuxiang Yan, Boda Liu, Jianfei Ai, Qinbu Li, Ru Wan, Jian Pu

    Abstract: Semantic Scene Completion (SSC) aims to jointly generate space occupancies and semantic labels for complex 3D scenes. Most existing SSC models focus on volumetric representations, which are memory-inefficient for large outdoor spaces. Point clouds provide a lightweight alternative but existing benchmarks lack outdoor point cloud scenes with semantic labels. To address this, we introduce PointSSC,… ▽ More

    Submitted 6 March, 2024; v1 submitted 22 September, 2023; originally announced September 2023.

    Comments: ICRA2024, oral & poster

  8. arXiv:2304.10202  [pdf, ps, other

    math.CO cs.DM

    Bounds on Maximum Weight Directed Cut

    Authors: Jiangdong Ai, Stefanie Gerke, Gregory Gutin, Anders Yeo, Yacong Zhou

    Abstract: We obtain lower and upper bounds for the maximum weight of a directed cut in the classes of weighted digraphs and weighted acyclic digraphs as well as in some of their subclasses. We compare our results with those obtained for the maximum size of a directed cut in unweighted digraphs. In particular, we show that a lower bound obtained by Alon, Bollobas, Gyafas, Lehel and Scott (J Graph Th 55(1) (2… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  9. arXiv:2209.11523  [pdf, other

    cs.CV cs.AI

    WS-3D-Lane: Weakly Supervised 3D Lane Detection With 2D Lane Labels

    Authors: Jianyong Ai, Wenbo Ding, Jiuhua Zhao, Jiachen Zhong

    Abstract: Compared to 2D lanes, real 3D lane data is difficult to collect accurately. In this paper, we propose a novel method for training 3D lanes with only 2D lane labels, called weakly supervised 3D lane detection WS-3D-Lane. By assumptions of constant lane width and equal height on adjacent lanes, we indirectly supervise 3D lane heights in the training. To overcome the problem of the dynamic change of… ▽ More

    Submitted 17 January, 2023; v1 submitted 23 September, 2022; originally announced September 2022.

    Comments: 7 pages, 8 figures. Accepted by ICRA 2023

  10. arXiv:2207.13267  [pdf, other

    cs.CV cs.LG

    Fault Detection and Classification of Aerospace Sensors using a VGG16-based Deep Neural Network

    Authors: Zhongzhi Li, Yunmei Zhao, **yi Ma, Jianliang Ai, Yiqun Dong

    Abstract: Compared with traditional model-based fault detection and classification (FDC) methods, deep neural networks (DNN) prove to be effective for the aerospace sensors FDC problems. However, time being consumed in training the DNN is excessive, and explainability analysis for the FDC neural network is still underwhelming. A concept known as imagefication-based intelligent FDC has been studied in recent… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

  11. arXiv:2207.12157  [pdf, ps, other

    math.CO cs.DM

    Results on the Small Quasi-Kernel Conjecture

    Authors: Jiangdong Ai, Stefanie Gerke, Gregory Gutin, Anders Yeo, Yacong Zhou

    Abstract: A {\em quasi-kernel} of a digraph $D$ is an independent set $Q\subseteq V(D)$ such that for every vertex $v\in V(D)\backslash Q$, there exists a directed path with one or two arcs from $v$ to a vertex $u\in Q$. In 1974, Chvátal and Lovász proved that every digraph has a quasi-kernel. In 1976, Erdős and Sźekely conjectured that every sink-free digraph $D=(V(D),A(D))$ has a quasi-kernel of size at m… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: 14 pages

  12. arXiv:2207.03666  [pdf, other

    cs.CV

    Deepfake Face Traceability with Disentangling Reversing Network

    Authors: Jiaxin Ai, Zhongyuan Wang, Bao** Huang, Zhen Han

    Abstract: Deepfake face not only violates the privacy of personal identity, but also confuses the public and causes huge social harm. The current deepfake detection only stays at the level of distinguishing true and false, and cannot trace the original genuine face corresponding to the fake face, that is, it does not have the ability to trace the source of evidence. The deepfake countermeasure technology fo… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: 5 pages, 4 figures

  13. arXiv:2206.09055   

    cs.CV cs.AI

    Augmented Imagefication: A Data-driven Fault Detection Method for Aircraft Air Data Sensors

    Authors: Hang Zhao, **yi Ma, Zhongzhi Li, Yiqun Dong, Jianliang Ai

    Abstract: In this paper, a novel data-driven approach named Augmented Imagefication for Fault detection (FD) of aircraft air data sensors (ADS) is proposed. Exemplifying the FD problem of aircraft air data sensors, an online FD scheme on edge device based on deep neural network (DNN) is developed. First, the aircraft inertial reference unit measurements is adopted as equivalent inputs, which is scalable to… ▽ More

    Submitted 28 June, 2022; v1 submitted 17 June, 2022; originally announced June 2022.

    Comments: a crucial design defect to acquire flying data by simulation

  14. Consistent Attack: Universal Adversarial Perturbation on Embodied Vision Navigation

    Authors: Chengyang Ying, You Qiaoben, Xinning Zhou, Hang Su, Wenbo Ding, Jianyong Ai

    Abstract: Embodied agents in vision navigation coupled with deep neural networks have attracted increasing attention. However, deep neural networks have been shown vulnerable to malicious adversarial noises, which may potentially cause catastrophic failures in Embodied Vision Navigation. Among different adversarial noises, universal adversarial perturbations (UAP), i.e., a constant image-agnostic perturbati… ▽ More

    Submitted 25 March, 2023; v1 submitted 12 June, 2022; originally announced June 2022.

    Journal ref: Pattern Recognition Letters (PRL), 2023

  15. arXiv:2202.13898   

    cs.SE

    DistAD: Software Anomaly Detection Based on Execution Trace Distribution

    Authors: Shiyi Kong, Jun Ai, Minyan Lu, Shuguang Wang, W. Eric Wong

    Abstract: Modern software systems have become increasingly complex, which makes them difficult to test and validate. Detecting software partial anomalies in complex systems at runtime can assist with handling unintended software behaviors, avoiding catastrophic software failures and improving software runtime availability. These detection techniques aim to identify the manifestation of faults (anomalies) be… ▽ More

    Submitted 26 April, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    Comments: need modification, the experiment results need carefully check

  16. arXiv:2111.09633  [pdf, ps, other

    math.CO cs.DM

    Extended Path Partition Conjecture for Semicomplete and Acyclic Compositions

    Authors: Jiangdong Ai, Stefanie Gerke, Gregory Gutin, Yacong Zhou

    Abstract: Let $D$ be a digraph and let $λ(D)$ denote the number of vertices in a longest path of $D$. For a pair of vertex-disjoint induced subdigraphs $A$ and $B$ of $D$, we say that $(A,B)$ is a partition of $D$ if $V(A)\cup V(B)=V(D).$ The Path Partition Conjecture (PPC) states that for every digraph, $D$, and every integer $q$ with $1\leq q\leqλ(D)-1$, there exists a partition $(A,B)$ of $D$ such that… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: 9 pages

  17. arXiv:2110.06629  [pdf

    cs.SE eess.SY

    Detection Software Content Failures Using Dynamic Execution Information

    Authors: Shiyi Kong, Minyan Lu, Jun Ai, Shuguang Wang

    Abstract: Modern software systems become too complex to be tested and validated. Detecting software partial failures in complex systems at runtime assist to handle software unintended behaviors, avoiding catastrophic software failures and improving software runtime availability. These detection techniques aim to find the manifestation of faults before they finally lead to unavoidable failures, thus supporti… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  18. arXiv:2104.01318  [pdf, other

    cs.CV

    Efficient DETR: Improving End-to-End Object Detector with Dense Prior

    Authors: Zhuyu Yao, Jiangbo Ai, Boxun Li, Chi Zhang

    Abstract: The recently proposed end-to-end transformer detectors, such as DETR and Deformable DETR, have a cascade structure of stacking 6 decoder layers to update object queries iteratively, without which their performance degrades seriously. In this paper, we investigate that the random initialization of object containers, which include object queries and reference points, is mainly responsible for the re… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

    Comments: 10 pages, 5 figures, 10 tables

  19. arXiv:2011.05878  [pdf, ps, other

    math.CO cs.DM

    Kings in Multipartite Hypertournaments

    Authors: Jiangdong Ai, Stefanie Gerke, Gregory Gutin

    Abstract: In his paper "Kings in Bipartite Hypertournaments" (Graphs $\&$ Combinatorics 35, 2019), Petrovic stated two conjectures on 4-kings in multipartite hypertournaments. We prove one of these conjectures and give counterexamples for the other.

    Submitted 16 July, 2021; v1 submitted 11 November, 2020; originally announced November 2020.

  20. arXiv:2005.06184  [pdf, ps, other

    cs.CV

    Attribute-guided Feature Extraction and Augmentation Robust Learning for Vehicle Re-identification

    Authors: Chaoran Zhuge, Yujie Peng, Yadong Li, Jiangbo Ai, Junru Chen

    Abstract: Vehicle re-identification is one of the core technologies of intelligent transportation systems and smart cities, but large intra-class diversity and inter-class similarity poses great challenges for existing method. In this paper, we propose a multi-guided learning approach which utilizing the information of attributes and meanwhile introducing two novel random augments to improve the robustness… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  21. arXiv:2001.10253  [pdf, other

    math.CO cs.DM

    Proximity and Remoteness in Directed and Undirected Graphs

    Authors: Jiangdong Ai, Stefanie Gerke, Gregory Gutin, Sonwabile Mafunda

    Abstract: Let $D$ be a strongly connected digraph. The average distance $\barσ(v)$ of a vertex $v$ of $D$ is the arithmetic mean of the distances from $v$ to all other vertices of $D$. The remoteness $ρ(D)$ and proximity $π(D)$ of $D$ are the maximum and the minimum of the average distances of the vertices of $D$, respectively. We obtain sharp upper and lower bounds on $π(D)$ and $ρ(D)$ as a function of the… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

  22. arXiv:2001.04665  [pdf

    cs.CV

    Face Attribute Invertion

    Authors: X G Tu, Y Luo, H S Zhang, W J Ai, Z Ma, M Xie

    Abstract: Manipulating human facial images between two domains is an important and interesting problem. Most of the existing methods address this issue by applying two generators or one generator with extra conditional inputs. In this paper, we proposed a novel self-perception method based on GANs for automatical face attribute inverse. The proposed method takes face images as inputs and employs only one si… ▽ More

    Submitted 14 January, 2020; originally announced January 2020.

    Comments: 8 pages, 3 figures

  23. arXiv:1907.06379  [pdf, other

    math.CO cs.DM

    Proper Orientation Number of Triangle-free Bridgeless Outerplanar Graphs

    Authors: J. Ai, S. Gerke, G. Gutin, Y. Shi, Z. Taoqiu

    Abstract: An orientation of $G$ is a digraph obtained from $G$ by replacing each edge by exactly one of two possible arcs with the same endpoints. We call an orientation \emph{proper} if neighbouring vertices have different in-degrees. The proper orientation number of a graph $G$, denoted by $\vecχ(G)$, is the minimum maximum in-degree of a proper orientation of G. Araujo et al. (Theor. Comput. Sci. 639 (20… ▽ More

    Submitted 17 March, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

  24. arXiv:1812.08809  [pdf, ps, other

    cs.DM math.CO

    Arc-disjoint strong spanning subdigraphs in compositions and products of digraphs

    Authors: Yuefang Sun, Gregory Gutin, Jiangdong Ai

    Abstract: A digraph $D=(V,A)$ has a good decomposition if $A$ has two disjoint sets $A_1$ and $A_2$ such that both $(V,A_1)$ and $(V,A_2)$ are strong. Let $T$ be a digraph with $t$ vertices $u_1,\dots , u_t$ and let $H_1,\dots H_t$ be digraphs such that $H_i$ has vertices $u_{i,j_i},\ 1\le j_i\le n_i.$ Then the composition $Q=T[H_1,\dots , H_t]$ is a digraph with vertex set… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

  25. arXiv:1601.01502  [pdf, ps, other

    math.CO cs.IT

    The Expurgation-Augmentation Method for Constructing Good Plane Subspace Codes

    Authors: **gmei Ai, Thomas Honold, Haiteng Liu

    Abstract: As shown in [28], one of the five isomorphism types of optimal binary subspace codes of size 77 for packet length v=6, constant dimension k=3 and minimum subspace distance d=4 can be constructed by first expurgating and then augmenting the corresponding lifted Gabidulin code in a fairly simple way. The method was refined in [32,26] to yield an essentially computer-free construction of a currently… ▽ More

    Submitted 17 January, 2016; v1 submitted 7 January, 2016; originally announced January 2016.

    Comments: 44 pages, 3 tables, 1 figure; part of the results was presented at the International Workshop on Algebraic Combinatorics at Zhejiang University, Hangzhou, September 2015; Version 2 contains minor corrections

    MSC Class: 94B05; 05B25; 51E20 (Primary); 51E14; 51E22; 51E23 (Secondary)