Skip to main content

Showing 1–11 of 11 results for author: Law, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05790  [pdf

    cs.CE cs.AI q-bio.QM

    A Robust eLORETA Technique for Localization of Brain Sources in the Presence of Forward Model Uncertainties

    Authors: A. Noroozi, M. Ravan, B. Razavi, R. S. Fisher, Y. Law, M. S. Hasan

    Abstract: In this paper, we present a robust version of the well-known exact low-resolution electromagnetic tomography (eLORETA) technique, named ReLORETA, to localize brain sources in the presence of different forward model uncertainties. Methods: We first assume that the true lead field matrix is a transformation of the existing lead field matrix distorted by uncertainties and propose an iterative approac… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  2. arXiv:2403.12999  [pdf

    cs.RO cs.AI cs.CL cs.LG

    Prompt Selection and Augmentation for Few Examples Code Generation in Large Language Model and its Application in Robotics Control

    Authors: On Tai Wu, Frodo Kin Sun Chan, Zunhao Zhang, Yan Nei Law, Benny Drescher, Edmond Shiao Bun Lai

    Abstract: Few-shot prompting and step-by-step reasoning have enhanced the capabilities of Large Language Models (LLMs) in tackling complex tasks including code generation. In this paper, we introduce a prompt selection and augmentation algorithm aimed at improving mathematical reasoning and robot arm operations. Our approach incorporates a multi-stage example augmentation scheme combined with an example sel… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 17 pages, 4 figures

  3. arXiv:2309.02150  [pdf, other

    cs.CV

    Domain Adaptation for Satellite-Borne Hyperspectral Cloud Detection

    Authors: Andrew Du, Anh-Dzung Doan, Yee Wei Law, Tat-Jun Chin

    Abstract: The advent of satellite-borne machine learning hardware accelerators has enabled the on-board processing of payload data using machine learning techniques such as convolutional neural networks (CNN). A notable example is using a CNN to detect the presence of clouds in hyperspectral data captured on Earth observation (EO) missions, whereby only clear sky data is downlinked to conserve bandwidth. Ho… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  4. arXiv:2112.01723  [pdf, other

    cs.CV eess.IV

    Adversarial Attacks against a Satellite-borne Multispectral Cloud Detector

    Authors: Andrew Du, Yee Wei Law, Michele Sasdelli, Bo Chen, Ken Clarke, Michael Brown, Tat-Jun Chin

    Abstract: Data collected by Earth-observing (EO) satellites are often afflicted by cloud cover. Detecting the presence of clouds -- which is increasingly done using deep learning -- is crucial preprocessing in EO applications. In fact, advanced EO satellites perform deep learning-based cloud detection on board the satellites and downlink only clear-sky data to save precious bandwidth. In this paper, we high… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

  5. A Multi-viewpoint Outdoor Dataset for Human Action Recognition

    Authors: Asanka G. Perera, Yee Wei Law, Titilayo T. Ogunwa, Javaan Chahl

    Abstract: Advancements in deep neural networks have contributed to near perfect results for many computer vision problems such as object recognition, face recognition and pose estimation. However, human action recognition is still far from human-level performance. Owing to the articulated nature of the human body, it is challenging to detect an action from multiple viewpoints, particularly from an aerial vi… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

    Comments: 10 pages, 4 figures

    Journal ref: IEEE Transactions on Human-Machine Systems, Volume: 50, Issue: 5, Oct. 2020

  6. arXiv:2108.11765  [pdf, other

    cs.CV

    Physical Adversarial Attacks on an Aerial Imagery Object Detector

    Authors: Andrew Du, Bo Chen, Tat-Jun Chin, Yee Wei Law, Michele Sasdelli, Ramesh Rajasegaran, Dillon Campbell

    Abstract: Deep neural networks (DNNs) have become essential for processing the vast amounts of aerial imagery collected using earth-observing satellite platforms. However, DNNs are vulnerable towards adversarial examples, and it is expected that this weakness also plagues DNNs for aerial imagery. In this work, we demonstrate one of the first efforts on physical adversarial attacks on aerial imagery, whereby… ▽ More

    Submitted 20 October, 2021; v1 submitted 26 August, 2021; originally announced August 2021.

  7. High-order FDTD schemes for Maxwell's interface problems with discontinuous coefficients and complex interfaces based on the Correction Function Method

    Authors: Yann-Meing Law, Jean-Christophe Nave

    Abstract: We propose high-order FDTD schemes based on the Correction Function Method (CFM) for Maxwell's interface problems with discontinuous coefficients and complex interfaces. The key idea of the CFM is to model the correction function near an interface to retain the order of a finite difference approximation. For this, we solve a system of PDEs based on the original problem by minimizing an energy func… ▽ More

    Submitted 9 March, 2022; v1 submitted 13 January, 2021; originally announced January 2021.

    Comments: 27 pages, 12 figures

    MSC Class: 35Q61; 78M20; 65M06; 78A45

  8. arXiv:1910.11478  [pdf, other

    cs.CR

    Towards Distributed Privacy-Preserving Prediction

    Authors: Lingjuan Lyu, Yee Wei Law, Kee Siong Ng, Shibei Xue, Jun Zhao, Mengmeng Yang, Lei Liu

    Abstract: In privacy-preserving machine learning, individual parties are reluctant to share their sensitive training data due to privacy concerns. Even the trained model parameters or prediction can pose serious privacy leakage. To address these problems, we demonstrate a generally applicable Distributed Privacy-Preserving Prediction (DPPP) framework, in which instead of sharing more sensitive data or model… ▽ More

    Submitted 3 September, 2020; v1 submitted 24 October, 2019; originally announced October 2019.

    Comments: To appear at SMC'20

  9. arXiv:1901.02602  [pdf, other

    cs.LG cs.CV cs.HC stat.ML

    UAV-GESTURE: A Dataset for UAV Control and Gesture Recognition

    Authors: Asanka G Perera, Yee Wei Law, Javaan Chahl

    Abstract: Current UAV-recorded datasets are mostly limited to action recognition and object tracking, whereas the gesture signals datasets were mostly recorded in indoor spaces. Currently, there is no outdoor recorded public video dataset for UAV commanding signals. Gesture signals can be effectively used with UAVs by leveraging the UAVs visual sensors and operational simplicity. To fill this gap and enable… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

    Comments: 12 pages, 4 figures, UAVision workshop, ECCV, 2018

  10. arXiv:1812.06408  [pdf, other

    cs.CV cs.LG stat.ML

    Human Pose and Path Estimation from Aerial Video using Dynamic Classifier Selection

    Authors: Asanka G Perera, Yee Wei Law, Javaan Chahl

    Abstract: We consider the problem of estimating human pose and trajectory by an aerial robot with a monocular camera in near real time. We present a preliminary solution whose distinguishing feature is a dynamic classifier selection architecture. In our solution, each video frame is corrected for perspective using projective transformation. Then, two alternative feature sets are used: (i) Histogram of Orien… ▽ More

    Submitted 16 December, 2018; originally announced December 2018.

    Comments: For associated dataset, see https://asankagp.github.io/aerialgaitdataset/

    Journal ref: Cogn Comput 10 (2018) 1019-1041

  11. arXiv:1106.5890  [pdf, ps, other

    cs.AI

    A Comparison of Lex Bounds for Multiset Variables in Constraint Programming

    Authors: Yat-Chiu Law, Jimmy Ho-Man Lee, May Hiu-Chun Woo, Toby Walsh

    Abstract: Set and multiset variables in constraint programming have typically been represented using subset bounds. However, this is a weak representation that neglects potentially useful information about a set such as its cardinality. For set variables, the length-lex (LL) representation successfully provides information about the length (cardinality) and position in the lexicographic ordering. For multis… ▽ More

    Submitted 29 June, 2011; originally announced June 2011.

    Comments: 7 pages, Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence (AAAI-11)