Skip to main content

Showing 1–11 of 11 results for author: Jie, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03963  [pdf, other

    cs.CL cs.AI

    LLM-jp: A Cross-organizational Project for the Research and Development of Fully Open Japanese LLMs

    Authors: LLM-jp, :, Akiko Aizawa, Eiji Aramaki, Bowen Chen, Fei Cheng, Hiroyuki Deguchi, Rintaro Enomoto, Kazuki Fujii, Kensuke Fukumoto, Takuya Fukushima, Namgi Han, Yuto Harada, Chikara Hashimoto, Tatsuya Hiraoka, Shohei Hisada, Sosuke Hosokawa, Lu Jie, Keisuke Kamata, Teruhito Kanazawa, Hiroki Kanezashi, Hiroshi Kataoka, Satoru Katsumata, Daisuke Kawahara, Seiya Kawano , et al. (57 additional authors not shown)

    Abstract: This paper introduces LLM-jp, a cross-organizational project for the research and development of Japanese large language models (LLMs). LLM-jp aims to develop open-source and strong Japanese LLMs, and as of this writing, more than 1,500 participants from academia and industry are working together for this purpose. This paper presents the background of the establishment of LLM-jp, summaries of its… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2401.02313  [pdf, other

    cs.CV

    SuperEdge: Towards a Generalization Model for Self-Supervised Edge Detection

    Authors: Leng Kai, Zhang Zhijie, Liu Jie, Zed Boukhers, Sui Wei, Cong Yang, Li Zhijun

    Abstract: Edge detection is a fundamental technique in various computer vision tasks. Edges are indeed effectively delineated by pixel discontinuity and can offer reliable structural information even in textureless areas. State-of-the-art heavily relies on pixel-wise annotations, which are labor-intensive and subject to inconsistencies when acquired manually. In this work, we propose a novel self-supervised… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: 7pages

  3. arXiv:2311.11021  [pdf

    cs.CR cs.SE

    Secure Software Development: Issues and Challenges

    Authors: Sam Wen **, Jeffrey Cheok Jun Wah, Lee Wen Jie, Jeremy Bong Yong Han, Saira Muzafar

    Abstract: In recent years, technology has advanced considerably with the introduction of many systems including advanced robotics, big data analytics, cloud computing, machine learning and many more. The opportunities to exploit the yet to come security that comes with these systems are going toe to toe with new releases of security protocols to combat this exploitation to provide a secure system. The digit… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: 20 Pages, 4 Figures

  4. arXiv:2311.08891  [pdf, other

    cs.CV

    AdapterShadow: Adapting Segment Anything Model for Shadow Detection

    Authors: Lei** Jie, Hui Zhang

    Abstract: Segment anything model (SAM) has shown its spectacular performance in segmenting universal objects, especially when elaborate prompts are provided. However, the drawback of SAM is twofold. On the first hand, it fails to segment specific targets, e.g., shadow images or lesions in medical images. On the other hand, manually specifying prompts is extremely time-consuming. To overcome the problems, we… ▽ More

    Submitted 15 November, 2023; originally announced November 2023.

  5. arXiv:2305.12231  [pdf, other

    eess.IV cs.CV cs.LG

    Bi-VLGM : Bi-Level Class-Severity-Aware Vision-Language Graph Matching for Text Guided Medical Image Segmentation

    Authors: Chen Wenting, Liu Jie, Yuan Yixuan

    Abstract: Medical reports with substantial information can be naturally complementary to medical images for computer vision tasks, and the modality gap between vision and language can be solved by vision-language matching (VLM). However, current vision-language models distort the intra-model relation and mainly include class information in prompt learning that is insufficient for segmentation task. In this… ▽ More

    Submitted 20 May, 2023; originally announced May 2023.

  6. arXiv:2305.11513  [pdf, other

    cs.CV

    When SAM Meets Shadow Detection

    Authors: Lei** Jie, Hui Zhang

    Abstract: As a promptable generic object segmentation model, segment anything model (SAM) has recently attracted significant attention, and also demonstrates its powerful performance. Nevertheless, it still meets its Waterloo when encountering several tasks, e.g., medical image segmentation, camouflaged object detection, etc. In this report, we try SAM on an unexplored popular task: shadow detection. Specif… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: Technical Report

  7. arXiv:2303.04587  [pdf, other

    cs.HC cs.AI cs.CV cs.IR

    A Prompt Log Analysis of Text-to-Image Generation Systems

    Authors: Yutong Xie, Zhaoying Pan, **ge Ma, Luo Jie, Qiaozhu Mei

    Abstract: Recent developments in large language models (LLM) and generative AI have unleashed the astonishing capabilities of text-to-image generation systems to synthesize high-quality images that are faithful to a given reference text, known as a "prompt". These systems have immediately received lots of attention from researchers, creators, and common users. Despite the plenty of efforts to improve the ge… ▽ More

    Submitted 16 March, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

  8. arXiv:2209.14624  [pdf, other

    cs.LG cs.CV

    Is Complexity Required for Neural Network Pruning? A Case Study on Global Magnitude Pruning

    Authors: Manas Gupta, Efe Camci, Vishandi Rudy Keneta, Abhishek Vaidyanathan, Ritwik Kanodia, Chuan-Sheng Foo, Wu Min, Lin Jie

    Abstract: Pruning neural networks has become popular in the last decade when it was shown that a large number of weights can be safely removed from modern neural networks without compromising accuracy. Numerous pruning methods have been proposed since, each claiming to be better than prior art, however, at the cost of increasingly complex pruning methodologies. These methodologies include utilizing importan… ▽ More

    Submitted 7 January, 2024; v1 submitted 29 September, 2022; originally announced September 2022.

  9. arXiv:2209.08810  [pdf, other

    cs.CV cs.RO

    LMBAO: A Landmark Map for Bundle Adjustment Odometry in LiDAR SLAM

    Authors: Letian Zhang, **** Wang, Lu Jie, Nanjie Chen, Xiaojun Tan, Zhifei Duan

    Abstract: LiDAR odometry is one of the essential parts of LiDAR simultaneous localization and map** (SLAM). However, existing LiDAR odometry tends to match a new scan simply iteratively with previous fixed-pose scans, gradually accumulating errors. Furthermore, as an effective joint optimization mechanism, bundle adjustment (BA) cannot be directly introduced into real-time odometry due to the intensive co… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: 9 pages, 3 tables, 6 figures

  10. arXiv:2007.04756  [pdf, other

    cs.AI cs.CV cs.LG cs.NE

    Learning to Prune Deep Neural Networks via Reinforcement Learning

    Authors: Manas Gupta, Siddharth Aravindan, Aleksandra Kalisz, Vijay Chandrasekhar, Lin Jie

    Abstract: This paper proposes PuRL - a deep reinforcement learning (RL) based algorithm for pruning neural networks. Unlike current RL based model compression approaches where feedback is given only at the end of each episode to the agent, PuRL provides rewards at every pruning step. This enables PuRL to achieve sparsity and accuracy comparable to current state-of-the-art methods, while having a much shorte… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: Accepted at the ICML 2020 Workshop on Automated Machine Learning (AutoML 2020)

  11. arXiv:1909.04779  [pdf, other

    cs.LG cs.CR cs.CV eess.IV stat.ML

    Localized Adversarial Training for Increased Accuracy and Robustness in Image Classification

    Authors: Eitan Rothberg, Tingting Chen, Luo Jie, Hao Ji

    Abstract: Today's state-of-the-art image classifiers fail to correctly classify carefully manipulated adversarial images. In this work, we develop a new, localized adversarial attack that generates adversarial examples by imperceptibly altering the backgrounds of normal images. We first use this attack to highlight the unnecessary sensitivity of neural networks to changes in the background of an image, then… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 4 pages (excluding references). Presented at AdvML: 1st Workshop on Adversarial Learning Methods for Machine Learning and Data Mining at KDD '19