Skip to main content

Showing 1–47 of 47 results for author: Ke, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15860  [pdf, other

    cs.CV cs.AI

    Free Performance Gain from Mixing Multiple Partially Labeled Samples in Multi-label Image Classification

    Authors: Chak Fong Chong, Jielong Guo, Xu Yang, Wei Ke, Yapeng Wang

    Abstract: Multi-label image classification datasets are often partially labeled where many labels are missing, posing a significant challenge to training accurate deep classifiers. However, the powerful Mixup sample-mixing data augmentation cannot be well utilized to address this challenge, as it cannot perform linear interpolation on the unknown labels to construct augmented samples. In this paper, we prop… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  2. Ty** Requirement Model as Coroutines

    Authors: Qiqi Gu, Wei Ke

    Abstract: Model-Driven Engineering (MDE) is a technique that aims to boost productivity in software development and ensure the safety of critical systems. Central to MDE is the refinement of high-level requirement models into executable code. Given that requirement models form the foundation of the entire development process, ensuring their correctness is crucial. RM2PT is a widely used MDE platform that em… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  3. arXiv:2405.04453  [pdf, other

    cs.AI

    Towards Continual Knowledge Graph Embedding via Incremental Distillation

    Authors: Jiajun Liu, Wenjun Ke, Peng Wang, Ziyu Shang, **hua Gao, Guozheng Li, Ke Ji, Yanhe Liu

    Abstract: Traditional knowledge graph embedding (KGE) methods typically require preserving the entire knowledge graph (KG) with significant training costs when new knowledge emerges. To address this issue, the continual knowledge graph embedding (CKGE) task has been proposed to train the KGE model by learning emerging knowledge efficiently while simultaneously preserving decent old knowledge. However, the e… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: Accepted by AAAI 2024

  4. arXiv:2404.17809  [pdf, other

    cs.CL cs.AI

    Recall, Retrieve and Reason: Towards Better In-Context Relation Extraction

    Authors: Guozheng Li, Peng Wang, Wenjun Ke, Yikai Guo, Ke Ji, Ziyu Shang, Jiajun Liu, Zijie Xu

    Abstract: Relation extraction (RE) aims to identify relations between entities mentioned in texts. Although large language models (LLMs) have demonstrated impressive in-context learning (ICL) abilities in various tasks, they still suffer from poor performances compared to most supervised fine-tuned RE methods. Utilizing ICL for RE with LLMs encounters two challenges: (1) retrieving good demonstrations from… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: IJCAI 2024

  5. arXiv:2404.12242  [pdf, other

    cs.CL

    CMNEE: A Large-Scale Document-Level Event Extraction Dataset based on Open-Source Chinese Military News

    Authors: Mengna Zhu, Zijie Xu, Kaisheng Zeng, Kaiming Xiao, Mao Wang, Wenjun Ke, Hongbin Huang

    Abstract: Extracting structured event knowledge, including event triggers and corresponding arguments, from military texts is fundamental to many applications, such as intelligence analysis and decision assistance. However, event extraction in the military field faces the data scarcity problem, which impedes the research of event extraction models in this domain. To alleviate this problem, we propose CMNEE,… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: 13 pages, 7 figures, accepted to LREC-COLING 2024

  6. arXiv:2404.07504  [pdf, other

    cs.CV cs.AI

    Mitigating Object Dependencies: Improving Point Cloud Self-Supervised Learning through Object Exchange

    Authors: Yanhao Wu, Tong Zhang, Wei Ke, Congpei Qiu, Sabine Susstrunk, Mathieu Salzmann

    Abstract: In the realm of point cloud scene understanding, particularly in indoor scenes, objects are arranged following human habits, resulting in objects of certain semantics being closely positioned and displaying notable inter-object correlations. This can create a tendency for neural networks to exploit these strong dependencies, bypassing the individual object patterns. To address this challenge, we i… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  7. arXiv:2403.08426  [pdf, other

    cs.CV cs.AI

    Language-Driven Visual Consensus for Zero-Shot Semantic Segmentation

    Authors: Zicheng Zhang, Tong Zhang, Yi Zhu, Jianzhuang Liu, Xiaodan Liang, QiXiang Ye, Wei Ke

    Abstract: The pre-trained vision-language model, exemplified by CLIP, advances zero-shot semantic segmentation by aligning visual features with class embeddings through a transformer decoder to generate semantic masks. Despite its effectiveness, prevailing methods within this paradigm encounter challenges, including overfitting on seen classes and small fragmentation in masks. To mitigate these issues, we p… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  8. arXiv:2403.06498  [pdf, other

    eess.IV cs.CV

    Incorporating Improved Sinusoidal Threshold-based Semi-supervised Method and Diffusion Models for Osteoporosis Diagnosis

    Authors: Wenchi Ke

    Abstract: Osteoporosis is a common skeletal disease that seriously affects patients' quality of life. Traditional osteoporosis diagnosis methods are expensive and complex. The semi-supervised model based on diffusion model and class threshold sinusoidal decay proposed in this paper can automatically diagnose osteoporosis based on patient's imaging data, which has the advantages of convenience, accuracy, and… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  9. arXiv:2403.01756  [pdf, other

    cs.CV

    Attention Guidance Mechanism for Handwritten Mathematical Expression Recognition

    Authors: Yutian Liu, Wenjun Ke, Jianguo Wei

    Abstract: Handwritten mathematical expression recognition (HMER) is challenging in image-to-text tasks due to the complex layouts of mathematical expressions and suffers from problems including over-parsing and under-parsing. To solve these, previous HMER methods improve the attention mechanism by utilizing historical alignment information. However, this approach has limitations in addressing under-parsing… ▽ More

    Submitted 5 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

  10. arXiv:2402.13741  [pdf, other

    cs.CL cs.AI

    Unlocking Instructive In-Context Learning with Tabular Prompting for Relational Triple Extraction

    Authors: Guozheng Li, Wenjun Ke, Peng Wang, Zijie Xu, Ke Ji, Jiajun Liu, Ziyu Shang, Qiqing Luo

    Abstract: The in-context learning (ICL) for relational triple extraction (RTE) has achieved promising performance, but still encounters two key challenges: (1) how to design effective prompts and (2) how to select proper demonstrations. Existing methods, however, fail to address these challenges appropriately. On the one hand, they usually recast RTE task to text-to-text prompting formats, which is unnatura… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: LREC-COLING 2024

  11. arXiv:2401.16991  [pdf, other

    cs.CV

    Category-wise Fine-Tuning: Resisting Incorrect Pseudo-Labels in Multi-Label Image Classification with Partial Labels

    Authors: Chak Fong Chong, Xinyi Fang, Jielong Guo, Yapeng Wang, Wei Ke, Chan-Tong Lam, Sio-Kei Im

    Abstract: Large-scale image datasets are often partially labeled, where only a few categories' labels are known for each image. Assigning pseudo-labels to unknown labels to gain additional training signals has become prevalent for training deep classification models. However, some pseudo-labels are inevitably incorrect, leading to a notable decline in the model classification performance. In this paper, we… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  12. arXiv:2312.17538  [pdf, other

    cs.CV cs.LG eess.IV

    Distance Guided Generative Adversarial Network for Explainable Binary Classifications

    Authors: Xiangyu Xiong, Yue Sun, Xiaohong Liu, Wei Ke, Chan-Tong Lam, Jiangang Chen, Mingfeng Jiang, Mingwei Wang, Hui Xie, Tong Tong, Qinquan Gao, Hao Chen, Tao Tan

    Abstract: Despite the potential benefits of data augmentation for mitigating the data insufficiency, traditional augmentation methods primarily rely on the prior intra-domain knowledge. On the other hand, advanced generative adversarial networks (GANs) generate inter-domain samples with limited variety. These previous methods make limited contributions to describing the decision boundaries for binary classi… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

    Comments: 12 pages, 8 figures. This work has been submitted to the IEEE TNNLS for possible publication. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media

  13. arXiv:2311.16896  [pdf, other

    physics.optics cs.ET physics.app-ph

    65 GOPS/neuron Photonic Tensor Core with Thin-film Lithium Niobate Photonics

    Authors: Zhong** Lin, Bhavin J. Shastri, Shangxuan Yu, **gxiang Song, Yuntao Zhu, Arman Safarnejadian, Wangning Cai, Yanmei Lin, Wei Ke, Mustafa Hammood, Tianye Wang, Mengyue Xu, Zibo Zheng, Mohammed Al-Qadasi, Omid Esmaeeli, Mohamed Rahim, Grzegorz Pakulski, Jens Schmid, Pedro Barrios, Weihong Jiang, Hugh Morison, Matthew Mitchell, Xiaogang Qiang, Xun Guan, Nicolas A. F. Jaeger , et al. (6 additional authors not shown)

    Abstract: Photonics offers a transformative approach to artificial intelligence (AI) and neuromorphic computing by providing low latency, high bandwidth, and energy-efficient computations. Here, we introduce a photonic tensor core processor enabled by time-multiplexed inputs and charge-integrated outputs. This fully integrated processor, comprising only two thin-film lithium niobate (TFLN) modulators, a III… ▽ More

    Submitted 30 November, 2023; v1 submitted 28 November, 2023; originally announced November 2023.

    Comments: 19 pages, 6 figures

    MSC Class: 78A05

  14. arXiv:2311.14388  [pdf, other

    cs.CV cs.LG

    A Parameterized Generative Adversarial Network Using Cyclic Projection for Explainable Medical Image Classification

    Authors: Xiangyu Xiong, Yue Sun, Xiaohong Liu, Chan-Tong Lam, Tong Tong, Hao Chen, Qinquan Gao, Wei Ke, Tao Tan

    Abstract: Although current data augmentation methods are successful to alleviate the data insufficiency, conventional augmentation are primarily intra-domain while advanced generative adversarial networks (GANs) generate images remaining uncertain, particularly in small-scale datasets. In this paper, we propose a parameterized GAN (ParaGAN) that effectively controls the changes of synthetic samples among do… ▽ More

    Submitted 14 December, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: 5 pages, 4 figures. This work has been submitted to the IEEE ICASSP for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  15. arXiv:2310.05028  [pdf, other

    cs.AI cs.CL

    Revisiting Large Language Models as Zero-shot Relation Extractors

    Authors: Guozheng Li, Peng Wang, Wenjun Ke

    Abstract: Relation extraction (RE) consistently involves a certain degree of labeled or unlabeled data even if under zero-shot setting. Recent studies have shown that large language models (LLMs) transfer well to new tasks out-of-the-box simply given a natural language prompt, which provides the possibility of extracting relations from text without any data and parameter tuning. This work focuses on the stu… ▽ More

    Submitted 24 November, 2023; v1 submitted 8 October, 2023; originally announced October 2023.

    Comments: Findings of EMNLP 2023

  16. arXiv:2308.10548  [pdf, ps, other

    cs.PL

    Ty** Composable Coroutines

    Authors: Qiqi Gu, Wei Ke

    Abstract: Coroutine, as a powerful programming construct, is widely used in asynchronous applications to replace thread-based programming or the callback hell. Using coroutines makes code more readable and maintainable, for its ability to transfer control while kee** the literal scope. However, reasoning about coroutine behavior can be challenging without proper ty**. We propose a type notation and calc… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  17. arXiv:2306.09245  [pdf

    cs.CR cs.CE cs.CV

    Image encryption for Offshore wind power based on 2D-LCLM and Zhou Yi Eight Trigrams

    Authors: Lei Kou, **bo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan

    Abstract: Offshore wind power is an important part of the new power system, due to the complex and changing situation at ocean, its normal operation and maintenance cannot be done without information such as images, therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based… ▽ More

    Submitted 27 June, 2023; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: accepted by Int. J. of Bio-Inspired Computation

    MSC Class: 68P25 ACM Class: E.3

    Journal ref: International Journal of Bio-Inspired Computation.vol. 22, no. 1,pp 53-64 (2023)

  18. Community Detection Using Revised Medoid-Shift Based on KNN

    Authors: Jie Hou, Jiakang Li, Xiaokang Peng, Wei Ke, Yonggang Lu

    Abstract: Community detection becomes an important problem with the booming of social networks. The Medoid-Shift algorithm preserves the benefits of Mean-Shift and can be applied to problems based on distance matrix, such as community detection. One drawback of the Medoid-Shift algorithm is that there may be no data points within the neighborhood region defined by a distance parameter. To deal with the comm… ▽ More

    Submitted 19 September, 2023; v1 submitted 19 April, 2023; originally announced April 2023.

  19. arXiv:2304.06021  [pdf, other

    cs.CV cs.LG

    Crowd Counting with Sparse Annotation

    Authors: Shiwei Zhang, Zhengzheng Wang, Qing Liu, Fei Wang, Wei Ke, Tong Zhang

    Abstract: This paper presents a new annotation method called Sparse Annotation (SA) for crowd counting, which reduces human labeling efforts by sparsely labeling individuals in an image. We argue that sparse labeling can reduce the redundancy of full annotation and capture more diverse information from distant individuals that is not fully captured by Partial Annotation methods. Besides, we propose a point-… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

  20. arXiv:2303.16947  [pdf, other

    cs.CV cs.LG

    De-coupling and De-positioning Dense Self-supervised Learning

    Authors: Congpei Qiu, Tong Zhang, Wei Ke, Mathieu Salzmann, Sabine Süsstrunk

    Abstract: Dense Self-Supervised Learning (SSL) methods address the limitations of using image-level feature representations when handling images with multiple objects. Although the dense features extracted by employing segmentation maps and bounding boxes allow networks to perform SSL for each object, we show that they suffer from coupling and positional bias, which arise from the receptive field increasing… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

  21. arXiv:2303.16235  [pdf, other

    cs.CV

    Spatiotemporal Self-supervised Learning for Point Clouds in the Wild

    Authors: Yanhao Wu, Tong Zhang, Wei Ke, Sabine Süsstrunk, Mathieu Salzmann

    Abstract: Self-supervised learning (SSL) has the potential to benefit many applications, particularly those where manually annotating data is cumbersome. One such situation is the semantic segmentation of point clouds. In this context, existing methods employ contrastive learning strategies and define positive pairs by performing various augmentation of point clusters in a single frame. As such, these metho… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: CVPR accepted

  22. arXiv:2212.01769  [pdf, other

    cs.CV

    CoupAlign: Coupling Word-Pixel with Sentence-Mask Alignments for Referring Image Segmentation

    Authors: Zicheng Zhang, Yi Zhu, Jianzhuang Liu, Xiaodan Liang, Wei Ke

    Abstract: Referring image segmentation aims at localizing all pixels of the visual objects described by a natural language sentence. Previous works learn to straightforwardly align the sentence embedding and pixel-level embedding for highlighting the referred objects, but ignore the semantic consistency of pixels within the same object, leading to incomplete masks and localization errors in predictions. To… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: accept to NeurIPS 2022

  23. arXiv:2211.00221  [pdf

    cs.AI eess.SY

    Review on Monitoring, Operation and Maintenance of Smart Offshore Wind Farms

    Authors: Lei Kou, Yang Li, Fangfang Zhang, Xiaodong Gong, Yinghong Hu, Quande Yuan, Wende Ke

    Abstract: In recent years, with the development of wind energy, the number and scale of wind farms are develo** rapidly. Since offshore wind farm has the advantages of stable wind speed, clean, renewable, non-polluting and no occupation of cultivated land, which has gradually become a new trend of wind power industry all over the world. The operation and maintenance mode of offshore wind power is developi… ▽ More

    Submitted 31 October, 2022; originally announced November 2022.

    Comments: accepted by Sensors

    MSC Class: 90B25 ACM Class: I.2

    Journal ref: Sensors 2022, 22, 2822

  24. arXiv:2210.08079  [pdf, ps, other

    cs.IT

    On Triangular Inequality of the Discounted Least Information Theory of Entropy (DLITE)

    Authors: Kashti S. Umare, Weimao Ke

    Abstract: The Discounted Least Information Theory of Entropy (DLITE) is a new information measure that quantifies the amount of entropic difference between two probability distributions. It manifests multiple critical properties both as an information-theoretic quantity and as metric distance. In the report, we provide a proof of the triangular inequality of DLITE's cube root ($\sqrt[3]{DL}$), an important… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: 3 pages, a technical report

  25. Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid

    Authors: Lei Kou, Zhe Huang, Cuimei Jiang, Fangfang Zhang, Wende Ke, Junhe Wan, Hailin Liu, Hui Li

    Abstract: The information security has an irreplaceable position in the smart grid (SG). In order to avoid the malicious attack and ensure the information security, the cryptographic techniques are essential. This paper focuses on the encryption techniques to ensure the information security of SG. Firstly, an unusual 7-dimensional complex chaotic system (7D-CCS) combined with the cubic memristor is introduc… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: Accepted by Frontiers in Energy Research

  26. arXiv:2207.11539  [pdf, other

    cs.CV

    HPS-Det: Dynamic Sample Assignment with Hyper-Parameter Search for Object Detection

    Authors: Ji Liu, Dong Li, Zekun Li, Han Liu, Wen**g Ke, Lu Tian, Yi Shan

    Abstract: Sample assignment plays a prominent part in modern object detection approaches. However, most existing methods rely on manual design to assign positive / negative samples, which do not explicitly establish the relationships between sample assignment and object detection performance. In this work, we propose a novel dynamic sample assignment scheme based on hyper-parameter search. We first define t… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.

  27. arXiv:2205.02151  [pdf, other

    cs.CV cs.AI cs.LG

    Dual Cross-Attention Learning for Fine-Grained Visual Categorization and Object Re-Identification

    Authors: Haowei Zhu, Wen**g Ke, Dong Li, Ji Liu, Lu Tian, Yi Shan

    Abstract: Recently, self-attention mechanisms have shown impressive performance in various NLP and CV tasks, which can help capture sequential characteristics and derive global information. In this work, we explore how to extend self-attention modules to better learn subtle feature embeddings for recognizing fine-grained objects, e.g., different bird species or person identities. To this end, we propose a d… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: Accepted by CVPR 2022

  28. arXiv:2203.17205  [pdf, other

    cs.CV

    Leverage Your Local and Global Representations: A New Self-Supervised Learning Strategy

    Authors: Tong Zhang, Congpei Qiu, Wei Ke, Sabine Süsstrunk, Mathieu Salzmann

    Abstract: Self-supervised learning (SSL) methods aim to learn view-invariant representations by maximizing the similarity between the features extracted from different crops of the same image regardless of crop** size and content. In essence, this strategy ignores the fact that two crops may truly contain different image information, e.g., background and small objects, and thus tends to restrain the diver… ▽ More

    Submitted 13 April, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: accepted in CVPR 2022

  29. arXiv:2111.00193  [pdf, other

    eess.IV cs.CV

    M2MRF: Many-to-Many Reassembly of Features for Tiny Lesion Segmentation in Fundus Images

    Authors: Qing Liu, Haotian Liu, Wei Ke, Yixiong Liang

    Abstract: Feature reassembly is an essential component in modern CNN-based segmentation approaches, which includes feature downsampling and upsampling operators. Existing operators reassemble multiple features from a small predefined region into one for each target location independently. This may result in loss of spatial information, which could vanish activations caused by tiny lesions particularly when… ▽ More

    Submitted 2 December, 2021; v1 submitted 30 October, 2021; originally announced November 2021.

  30. arXiv:2110.09060  [pdf, other

    cs.CV

    Discovery-and-Selection: Towards Optimal Multiple Instance Learning for Weakly Supervised Object Detection

    Authors: Shiwei Zhang, Wei Ke, Lin Yang

    Abstract: Weakly supervised object detection (WSOD) is a challenging task that requires simultaneously learn object classifiers and estimate object locations under the supervision of image category labels. A major line of WSOD methods roots in multiple instance learning which regards images as bags of instances and selects positive instances from each bag to learn the detector. However, a grand challenge em… ▽ More

    Submitted 5 May, 2022; v1 submitted 18 October, 2021; originally announced October 2021.

  31. A Multiple Classifier Approach for Concatenate-Designed Neural Networks

    Authors: Ka-Hou Chan, Sio-Kei Im, Wei Ke

    Abstract: This article introduces a multiple classifier method to improve the performance of concatenate-designed neural networks, such as ResNet and DenseNet, with the purpose to alleviate the pressure on the final classifier. We give the design of the classifiers, which collects the features produced between the network sets, and present the constituent layers and the activation function for the classifie… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

  32. A General Method for Generating Discrete Orthogonal Matrices

    Authors: Ka-Hou Chan, Wei Ke, Sio-Kei Im

    Abstract: Discrete orthogonal matrices have several applications in information technology, such as in coding and cryptography. It is often challenging to generate discrete orthogonal matrices. A common approach widely in use is to discretize continuous orthogonal functions that have been discovered. The need of certain continuous functions is restrictive. To simplify the process while improving the efficie… ▽ More

    Submitted 28 April, 2021; v1 submitted 13 January, 2021; originally announced January 2021.

  33. arXiv:2004.06266  [pdf, other

    cs.SI physics.soc-ph stat.AP

    Evolution Features and Behavior Characters of Friendship Networks on Campus Life

    Authors: Zongkai Yang, Zhu Su, Sannyuya Liu, Zhi Liu, Wenxiang Ke, Liang Zhao

    Abstract: Analyzing and mining students' behaviors and interactions from big data is an essential part of education data mining. Based on the data of campus smart cards, which include not only static demographic information but also dynamic behavioral data from more than 30000 anonymous students, in this paper, the evolution features of friendship and the relations between behavior characters and student in… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Report number: Volume 158, 15 November 2020, 113519

    Journal ref: Expert Systems with Applications, 2020

  34. arXiv:2004.00163  [pdf, other

    cs.CV cs.LG stat.ML

    Weakly-Supervised Action Localization with Expectation-Maximization Multi-Instance Learning

    Authors: Zhekun Luo, Devin Guillory, Baifeng Shi, Wei Ke, Fang Wan, Trevor Darrell, Huijuan Xu

    Abstract: Weakly-supervised action localization requires training a model to localize the action segments in the video given only video level action label. It can be solved under the Multiple Instance Learning (MIL) framework, where a bag (video) contains multiple instances (action segments). Since only the bag's label is known, the main challenge is assigning which key instances within the bag to trigger t… ▽ More

    Submitted 25 August, 2020; v1 submitted 31 March, 2020; originally announced April 2020.

    Comments: Accepted at European Conference on Computer Vision (ECCV), 2020

  35. arXiv:2002.07888  [pdf, other

    cs.IT math.ST

    DLITE: The Discounted Least Information Theory of Entropy

    Authors: Weimao Ke

    Abstract: We propose an entropy-based information measure, namely the Discounted Least Information Theory of Entropy (DLITE), which not only exhibits important characteristics expected as an information measure but also satisfies conditions of a metric. Classic information measures such as Shannon Entropy, KL Divergence, and Jessen-Shannon Divergence have manifested some of these properties while missing ot… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: 12 pages, 7 figures

  36. arXiv:1912.02252  [pdf, other

    cs.CV

    Multiple Anchor Learning for Visual Object Detection

    Authors: Wei Ke, Tianliang Zhang, Zeyi Huang, Qixiang Ye, Jianzhuang Liu, Dong Huang

    Abstract: Classification and localization are two pillars of visual object detectors. However, in CNN-based detectors, these two modules are usually optimized under a fixed set of candidate (or anchor) bounding boxes. This configuration significantly limits the possibility to jointly optimize classification and localization. In this paper, we propose a Multiple Instance Learning (MIL) approach that selects… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

  37. arXiv:1904.08773  [pdf, other

    cs.CV

    DDNet: Cartesian-polar Dual-domain Network for the Joint Optic Disc and Cup Segmentation

    Authors: Qing Liu, Xiaopeng Hong, Wei Ke, Zailiang Chen, Beiji Zou

    Abstract: Existing joint optic disc and cup segmentation approaches are developed either in Cartesian or polar coordinate system. However, due to the subtle optic cup, the contextual information exploited from the single domain even by the prevailing CNNs is still insufficient. In this paper, we propose a novel segmentation approach, named Cartesian-polar dual-domain network (DDNet), which for the first tim… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

  38. arXiv:1904.05647  [pdf, other

    cs.CV

    C-MIL: Continuation Multiple Instance Learning for Weakly Supervised Object Detection

    Authors: Fang Wan, Chang Liu, Wei Ke, Xiangyang Ji, Jianbin Jiao, Qixiang Ye

    Abstract: Weakly supervised object detection (WSOD) is a challenging task when provided with image category supervision but required to simultaneously learn object locations and object detectors. Many WSOD approaches adopt multiple instance learning (MIL) and have non-convex loss functions which are prone to get stuck into local minima (falsely localize object parts) while missing full object extent during… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: Accept by CVPR2019

  39. arXiv:1903.12255  [pdf, other

    cs.CV

    Improving Object Detection with Inverted Attention

    Authors: Zeyi Huang, Wei Ke, Dong Huang

    Abstract: Improving object detectors against occlusion, blur and noise is a critical step to deploy detectors in real applications. Since it is not possible to exhaust all image defects through data collection, many researchers seek to generate hard samples in training. The generated hard samples are either images or feature maps with coarse patches dropped out in the spatial dimensions. Significant overhea… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Comments: 9 pages, 7 figures, 6 tables

  40. Automated Prototype Generation from Formal Requirements Model

    Authors: Yilong Yang, Xiaoshan Li, Zhiming Liu, Wei Ke, Quan Zu, Xiaohong Chen

    Abstract: Prototy** is an effective and efficient way of requirement validation to avoid introducing errors in the early stage of software development. However, manually develo** a prototype of a software system requires additional efforts, which would increase the overall cost of software development. In this paper, we present an approach with a developed tool to automatic generation of prototypes from… ▽ More

    Submitted 31 August, 2018; originally announced August 2018.

  41. arXiv:1807.09601  [pdf, other

    cs.CV

    Linear Span Network for Object Skeleton Detection

    Authors: Chang Liu, Wei Ke, Fei Qin, Qixiang Ye

    Abstract: Robust object skeleton detection requires to explore rich representative visual features and effective feature fusion strategies. In this paper, we first re-visit the implementation of HED, the essential principle of which can be ideally described with a linear reconstruction model. Hinted by this, we formalize a Linear Span framework, and propose Linear Span Network (LSN) modified by Linear Span… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Comments: Accepted by ECCV2018

  42. arXiv:1807.06621   

    cs.CV

    SRN: Side-output Residual Network for Object Reflection Symmetry Detection and Beyond

    Authors: Wei Ke, Jie Chen, Jianbin Jiao, Guoying Zhao, Qixiang Ye

    Abstract: In this paper, we establish a baseline for object reflection symmetry detection in complex backgrounds by presenting a new benchmark and an end-to-end deep learning approach, opening up a promising direction for symmetry detection in the wild. The new benchmark, Sym-PASCAL, spans challenges including object diversity, multi-objects, part-invisibility, and various complex backgrounds that are far b… ▽ More

    Submitted 15 March, 2019; v1 submitted 17 July, 2018; originally announced July 2018.

    Comments: reject by PAMI

  43. MedShare: Medical Resource Sharing among Autonomous Healthcare Providers

    Authors: Yilong Yang, Xiaoshan Li, Nafees Qamar, Wei Ke, Zhiming Liu

    Abstract: Legacy Electronic Health Records (EHRs) systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources. Large hospitals are less likely to share their data with external hospitals due to economic and political reasons. Motivated by these facts… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: underview of J-BHI

  44. arXiv:1710.03488  [pdf, other

    cs.CV

    Automatic Streaming Segmentation of Stereo Video Using Bilateral Space

    Authors: Wen**g Ke, Yuanjie Zhu, Lei Yu

    Abstract: In this paper, we take advantage of binocular camera and propose an unsupervised algorithm based on semi-supervised segmentation algorithm and extracting foreground part efficiently. We creatively embed depth information into bilateral grid in the graph cut model and achieve considerable segmenting accuracy in the case of no user input. The experi- ment approves the high precision, time efficiency… ▽ More

    Submitted 27 November, 2017; v1 submitted 10 October, 2017; originally announced October 2017.

  45. arXiv:1703.02243  [pdf, other

    cs.CV

    SRN: Side-output Residual Network for Object Symmetry Detection in the Wild

    Authors: Wei Ke, Jie Chen, Jianbin Jiao, Guoying Zhao, Qixiang Ye

    Abstract: In this paper, we establish a baseline for object symmetry detection in complex backgrounds by presenting a new benchmark and an end-to-end deep learning approach, opening up a promising direction for symmetry detection in the wild. The new benchmark, named Sym-PASCAL, spans challenges including object diversity, multi-objects, part-invisibility, and various complex backgrounds that are far beyond… ▽ More

    Submitted 31 March, 2017; v1 submitted 7 March, 2017; originally announced March 2017.

    Comments: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2017

  46. arXiv:1205.0540  [pdf, ps, other

    stat.AP cs.DL cs.SI physics.soc-ph

    A Fitness Model for Scholarly Impact Analysis

    Authors: Weimao Ke

    Abstract: We propose a model to analyze citation growth and influences of fitness (competitiveness) factors in an evolving citation network. Applying the proposed method to modeling citations to papers and scholars in the InfoVis 2004 data, a benchmark collection about a 31-year history of information visualization, leads to findings consistent with citation distributions in general and observations of the… ▽ More

    Submitted 2 May, 2012; originally announced May 2012.

    Comments: 19 pages, 8 figures, 4 tables

  47. arXiv:1205.0312  [pdf, ps, other

    cs.IR cs.IT

    Least Information Modeling for Information Retrieval

    Authors: Weimao Ke

    Abstract: We proposed a Least Information theory (LIT) to quantify meaning of information in probability distribution changes, from which a new information retrieval model was developed. We observed several important characteristics of the proposed theory and derived two quantities in the IR context for document representation. Given probability distributions in a collection as prior knowledge, LI Binary (L… ▽ More

    Submitted 1 May, 2012; originally announced May 2012.

    Comments: 10 pages, 3 figures

    ACM Class: H.3.1; H.3.3