Skip to main content

Showing 1–14 of 14 results for author: Chu, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.04145  [pdf, other

    cs.CV

    Depth Completion with Multiple Balanced Bases and Confidence for Dense Monocular SLAM

    Authors: Weijian Xie, Guanyi Chu, Quanhao Qian, Yihao Yu, Hai Li, Danpeng Chen, Shang** Zhai, Nan Wang, Hujun Bao, Guofeng Zhang

    Abstract: Dense SLAM based on monocular cameras does indeed have immense application value in the field of AR/VR, especially when it is performed on a mobile device. In this paper, we propose a novel method that integrates a light-weight depth completion network into a sparse SLAM system using a multi-basis depth representation, so that dense map** can be performed online even on a mobile phone. Specifica… ▽ More

    Submitted 20 September, 2023; v1 submitted 8 September, 2023; originally announced September 2023.

  2. arXiv:2109.07690  [pdf, other

    cs.LG

    The Neural Metric Factorization for Computational Drug Repositioning

    Authors: Xinxing Yang, Genke Yangand Jian Chu

    Abstract: Computational drug repositioning aims to discover new therapeutic diseases for marketed drugs and has the advantages of low cost, short development cycle, and high controllability compared to traditional drug development. The matrix factorization model has become the cornerstone technique for computational drug repositioning due to its ease of implementation and excellent scalability. However, the… ▽ More

    Submitted 28 November, 2021; v1 submitted 15 September, 2021; originally announced September 2021.

    Comments: 16 pages

  3. arXiv:2107.07866  [pdf, other

    cs.DC

    MD Simulation of Hundred-Billion-Metal-Atom Cascade Collision on Sunway Taihulight

    Authors: Genshen Chu, Yang Li, Runchu Zhao, Shuai Ren, Wen Yang, Xinfu He, Chungjun Hu, Jue Wang

    Abstract: Radiation damage to the steel material of reactor pressure vessels is a major threat to the nuclear reactor safety. It is caused by the metal atom cascade collision, initialized when the atoms are struck by a high-energy neutron. The paper presents MISA-MD, a new implementation of molecular dynamics, to simulate such cascade collision with EAM potential. MISA-MD realizes (1) a hash-based data stru… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

  4. arXiv:2010.04904  [pdf, other

    cs.CV cs.AI cs.LG

    Multi-path Neural Networks for On-device Multi-domain Visual Classification

    Authors: Qifei Wang, Junjie Ke, Joshua Greaves, Grace Chu, Gabriel Bender, Luciano Sbaiz, Alec Go, Andrew Howard, Feng Yang, Ming-Hsuan Yang, Jeff Gilbert, Peyman Milanfar

    Abstract: Learning multiple domains/tasks with a single model is important for improving data efficiency and lowering inference cost for numerous vision tasks, especially on resource-constrained mobile devices. However, hand-crafting a multi-domain/task model can be both tedious and challenging. This paper proposes a novel approach to automatically learn a multi-path network for multi-domain visual classifi… ▽ More

    Submitted 8 January, 2021; v1 submitted 10 October, 2020; originally announced October 2020.

    Comments: WACV 2021

  5. arXiv:2008.08178  [pdf, other

    cs.CV

    Discovering Multi-Hardware Mobile Models via Architecture Search

    Authors: Grace Chu, Okan Arikan, Gabriel Bender, Weijun Wang, Achille Brighton, Pieter-Jan Kindermans, Hanxiao Liu, Berkin Akin, Suyog Gupta, Andrew Howard

    Abstract: Hardware-aware neural architecture designs have been predominantly focusing on optimizing model performance on single hardware and model development complexity, where another important factor, model deployment complexity, has been largely ignored. In this paper, we argue that, for applications that may be deployed on multiple hardware, having different single-hardware models across the deployed ha… ▽ More

    Submitted 23 April, 2021; v1 submitted 18 August, 2020; originally announced August 2020.

    Comments: CVPR Workshop 2021

  6. arXiv:2008.06120  [pdf, other

    cs.LG cs.CV stat.ML

    Can weight sharing outperform random architecture search? An investigation with TuNAS

    Authors: Gabriel Bender, Hanxiao Liu, Bo Chen, Grace Chu, Shuyang Cheng, Pieter-Jan Kindermans, Quoc Le

    Abstract: Efficient Neural Architecture Search methods based on weight sharing have shown good promise in democratizing Neural Architecture Search for computer vision models. There is, however, an ongoing debate whether these efficient methods are significantly better than random search. Here we perform a thorough comparison between efficient and random search methods on a family of progressively larger and… ▽ More

    Submitted 13 August, 2020; originally announced August 2020.

    Comments: Published at CVPR 2020

    ACM Class: I.2.10

    Journal ref: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020, pp. 14323-14332

  7. arXiv:1908.06970  [pdf

    cs.CR cs.MA

    Agent-based (BDI) modeling for automation of penetration testing

    Authors: Ge Chu, Alexei Lisitsa

    Abstract: Penetration testing (or pentesting) is one of the widely used and important methodologies to assess the security of computer systems and networks. Traditional pentesting relies on the domain expert knowledge and requires considerable human effort all of which incurs a high cost. The automation can significantly improve the efficiency, availability and lower the cost of penetration testing. Existin… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

  8. arXiv:1906.01737  [pdf, other

    cs.CV

    Geo-Aware Networks for Fine-Grained Recognition

    Authors: Grace Chu, Brian Potetz, Weijun Wang, Andrew Howard, Yang Song, Fernando Brucher, Thomas Leung, Hartwig Adam

    Abstract: Fine-grained recognition distinguishes among categories with subtle visual differences. In order to differentiate between these challenging visual categories, it is helpful to leverage additional information. Geolocation is a rich source of additional information that can be used to improve fine-grained classification accuracy, but has been understudied. Our contributions to this field are twofold… ▽ More

    Submitted 4 September, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: ICCVW 2019

  9. arXiv:1905.02244  [pdf, other

    cs.CV

    Searching for MobileNetV3

    Authors: Andrew Howard, Mark Sandler, Grace Chu, Liang-Chieh Chen, Bo Chen, Mingxing Tan, Weijun Wang, Yukun Zhu, Ruoming Pang, Vijay Vasudevan, Quoc V. Le, Hartwig Adam

    Abstract: We present the next generation of MobileNets based on a combination of complementary search techniques as well as a novel architecture design. MobileNetV3 is tuned to mobile phone CPUs through a combination of hardware-aware network architecture search (NAS) complemented by the NetAdapt algorithm and then subsequently improved through novel architecture advances. This paper starts the exploration… ▽ More

    Submitted 20 November, 2019; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: ICCV 2019

  10. Security and Privacy Analyses of Internet of Things Children's Toys

    Authors: Gordon Chu, Noah Apthorpe, Nick Feamster

    Abstract: This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that… ▽ More

    Submitted 28 August, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 8 pages, 8 figures; publication version

    Journal ref: IEEE Internet of Things Journal (IoT-J), 2018

  11. arXiv:1507.07648  [pdf, ps, other

    cs.AI

    Projected Model Counting

    Authors: Rehan Abdul Aziz, Geoffrey Chu, Christian Muise, Peter Stuckey

    Abstract: Model counting is the task of computing the number of assignments to variables V that satisfy a given propositional theory F. Model counting is an essential tool in probabilistic reasoning. In this paper, we introduce the problem of model counting projected on a subset P of original variables that we call 'priority' variables. The task is to compute the number of assignments to P such that there e… ▽ More

    Submitted 28 July, 2015; originally announced July 2015.

  12. arXiv:1411.5410  [pdf, other

    cs.AI

    Stable Model Counting and Its Application in Probabilistic Logic Programming

    Authors: Rehan Abdul Aziz, Geoffrey Chu, Christian Muise, Peter Stuckey

    Abstract: Model counting is the problem of computing the number of models that satisfy a given propositional theory. It has recently been applied to solving inference tasks in probabilistic logic programming, where the goal is to compute the probability of given queries being true provided a set of mutually independent random variables, a model (a logic program) and some evidence. The core of solving this i… ▽ More

    Submitted 19 November, 2014; originally announced November 2014.

    Comments: Accepted in AAAI, 2015

  13. arXiv:1405.3362  [pdf, ps, other

    cs.AI

    Grounding Bound Founded Answer Set Programs

    Authors: Rehan Abdul Aziz, Geoffrey Chu, Peter James Stuckey

    Abstract: To appear in Theory and Practice of Logic Programming (TPLP) Bound Founded Answer Set Programming (BFASP) is an extension of Answer Set Programming (ASP) that extends stable model semantics to numeric variables. While the theory of BFASP is defined on ground rules, in practice BFASP programs are written as complex non-ground expressions. Flattening of BFASP is a technique used to simplify arbitr… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

  14. arXiv:1306.4418  [pdf, other

    cs.AI

    Structure Based Extended Resolution for Constraint Programming

    Authors: Geoffrey Chu, Peter J. Stuckey

    Abstract: Nogood learning is a powerful approach to reducing search in Constraint Programming (CP) solvers. The current state of the art, called Lazy Clause Generation (LCG), uses resolution to derive nogoods expressing the reasons for each search failure. Such nogoods can prune other parts of the search tree, producing exponential speedups on a wide variety of problems. Nogood learning solvers can be seen… ▽ More

    Submitted 19 June, 2013; originally announced June 2013.