Skip to main content

Showing 1–25 of 25 results for author: Xi, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03406  [pdf

    cs.LG cs.AI q-bio.QM

    LncRNA-disease association prediction method based on heterogeneous information completion and convolutional neural network

    Authors: Wen-Yu Xi, Juan Wang, Yu-Lin Zhang, **-Xing Liu, Yin-Lian Gao

    Abstract: The emerging research shows that lncRNA has crucial research value in a series of complex human diseases. Therefore, the accurate identification of lncRNA-disease associations (LDAs) is very important for the warning and treatment of diseases. However, most of the existing methods have limitations in identifying nonlinear LDAs, and it remains a huge challenge to predict new LDAs. In this paper, a… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  2. arXiv:2405.02354  [pdf

    cs.LG cs.AI q-bio.QM

    Heterogeneous network and graph attention auto-encoder for LncRNA-disease association prediction

    Authors: **-Xing Liu, Wen-Yu Xi, Ling-Yun Dai, Chun-Hou Zheng, Ying-Lian Gao

    Abstract: The emerging research shows that lncRNAs are associated with a series of complex human diseases. However, most of the existing methods have limitations in identifying nonlinear lncRNA-disease associations (LDAs), and it remains a huge challenge to predict new LDAs. Therefore, the accurate identification of LDAs is very important for the warning and treatment of diseases. In this work, multiple sou… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 10 pages, 8 figures

    ACM Class: I.2.4; I.2.6; I.2.m

  3. arXiv:2404.07545  [pdf, other

    cs.CV

    Stereo-LiDAR Depth Estimation with Deformable Propagation and Learned Disparity-Depth Conversion

    Authors: Ang Li, Anning Hu, Wei Xi, Wenxian Yu, Dan** Zou

    Abstract: Accurate and dense depth estimation with stereo cameras and LiDAR is an important task for automatic driving and robotic perception. While sparse hints from LiDAR points have improved cost aggregation in stereo matching, their effectiveness is limited by the low density and non-uniform distribution. To address this issue, we propose a novel stereo-LiDAR depth estimation network with Semi-Dense hin… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: Accepted in ICRA 2024. 8 pages, 6 figures

  4. arXiv:2403.16561  [pdf, other

    cs.LG cs.AI

    FedFixer: Mitigating Heterogeneous Label Noise in Federated Learning

    Authors: Xinyuan Ji, Zhaowei Zhu, Wei Xi, Olga Gadyatskaya, Zilong Song, Yong Cai, Yang Liu

    Abstract: Federated Learning (FL) heavily depends on label quality for its performance. However, the label distribution among individual clients is always both noisy and heterogeneous. The high loss incurred by client-specific samples in heterogeneous label noise poses challenges for distinguishing between client-specific and noisy label samples, impacting the effectiveness of existing label noise learning… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: accepted by AAA24

  5. arXiv:2402.14308  [pdf, other

    cs.RO

    Ground-Fusion: A Low-cost Ground SLAM System Robust to Corner Cases

    Authors: Jie Yin, Ang Li, Wei Xi, Wenxian Yu, Dan** Zou

    Abstract: We introduce Ground-Fusion, a low-cost sensor fusion simultaneous localization and map** (SLAM) system for ground vehicles. Our system features efficient initialization, effective sensor anomaly detection and handling, real-time dense color map**, and robust localization in diverse environments. We tightly integrate RGB-D images, inertial measurements, wheel odometer and GNSS signals within a… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  6. Robust Semi-Supervised Learning for Self-learning Open-World Classes

    Authors: Wenjuan Xi, Xin Song, Weili Guo, Yang Yang

    Abstract: Existing semi-supervised learning (SSL) methods assume that labeled and unlabeled data share the same class space. However, in real-world applications, unlabeled data always contain classes not present in the labeled set, which may cause classification performance degradation of known classes. Therefore, open-world SSL approaches are researched to handle the presence of multiple unknown classes in… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

    Journal ref: 2023 IEEE International Conference on Data Mining (ICDM)

  7. arXiv:2311.15570  [pdf, other

    cs.LG cs.CV

    UFDA: Universal Federated Domain Adaptation with Practical Assumptions

    Authors: Xinhui Liu, Zhenghao Chen, Lu** Zhou, Dong Xu, Wei Xi, Gairui Bai, Yihan Zhao, Jizhong Zhao

    Abstract: Conventional Federated Domain Adaptation (FDA) approaches usually demand an abundance of assumptions, which makes them significantly less feasible for real-world situations and introduces security hazards. This paper relaxes the assumptions from previous FDAs and studies a more practical scenario named Universal Federated Domain Adaptation (UFDA). It only requires the black-box model and the label… ▽ More

    Submitted 19 December, 2023; v1 submitted 27 November, 2023; originally announced November 2023.

    Comments: Accepted by AAAI2024

    Journal ref: AAAI2024

  8. arXiv:2307.00976  [pdf

    cs.CV

    Autism Spectrum Disorder Classification in Children based on Structural MRI Features Extracted using Contrastive Variational Autoencoder

    Authors: Ruimin Ma, Ruitao Xie, Yanlin Wang, **tao Meng, Yanjie Wei, Wenhui Xi, Yi Pan

    Abstract: Autism spectrum disorder (ASD) is a highly disabling mental disease that brings significant impairments of social interaction ability to the patients, making early screening and intervention of ASD critical. With the development of the machine learning and neuroimaging technology, extensive research has been conducted on machine classification of ASD based on structural MRI (s-MRI). However, most… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  9. arXiv:2306.09742  [pdf, other

    cs.LG cs.AI

    Meta Generative Flow Networks with Personalization for Task-Specific Adaptation

    Authors: Xinyuan Ji, Xu Zhang, Wei Xi, Haozhi Wang, Olga Gadyatskaya, Yinchuan Li

    Abstract: Multi-task reinforcement learning and meta-reinforcement learning have been developed to quickly adapt to new tasks, but they tend to focus on tasks with higher rewards and more frequent occurrences, leading to poor performance on tasks with sparse rewards. To address this issue, GFlowNets can be integrated into meta-learning algorithms (GFlowMeta) by leveraging the advantages of GFlowNets on task… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: journal

  10. arXiv:2303.13504  [pdf, other

    cs.CV

    ReBotNet: Fast Real-time Video Enhancement

    Authors: Jeya Maria Jose Valanarasu, Rahul Garg, Andeep Toor, Xin Tong, Weijuan Xi, Andreas Lugmayr, Vishal M. Patel, Anne Menini

    Abstract: Most video restoration networks are slow, have high computational load, and can't be used for real-time video enhancement. In this work, we design an efficient and fast framework to perform real-time video enhancement for practical use-cases like live video calls and video streams. Our proposed method, called Recurrent Bottleneck Mixer Network (ReBotNet), employs a dual-branch framework. The first… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: Project Website: https://jeya-maria-jose.github.io/rebotnet-web/

  11. arXiv:2303.05779  [pdf, other

    cs.NI

    CRC-based Reliable WiFi Backscatter Communiation for Supply Chain Management

    Authors: Yun-Hao Liu, Tao Liu, Yimeng Huang, Han Ding, Wei Xi, Wei Gong

    Abstract: Supply chain management is aimed to keep going long-term performance of the supply chain and minimize the costs. Backscatter technology provides a more efficient way of being able to identify items and real-time monitoring. Among the backscatter systems, the ambient backscatter communication (AmBC) system provides a prospect of ultra-low energy consumption and does not require controlled excitatio… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  12. arXiv:2303.04096  [pdf, other

    cs.LG cs.AI cs.GT

    Mastering Strategy Card Game (Legends of Code and Magic) via End-to-End Policy and Optimistic Smooth Fictitious Play

    Authors: Wei Xi, Yongxin Zhang, Changnan Xiao, Xuefeng Huang, Shihong Deng, Haowei Liang, Jie Chen, Peng Sun

    Abstract: Deep Reinforcement Learning combined with Fictitious Play shows impressive results on many benchmark games, most of which are, however, single-stage. In contrast, real-world decision making problems may consist of multiple stages, where the observation spaces and the action spaces can be completely different across stages. We study a two-stage strategy card game Legends of Code and Magic and propo… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  13. arXiv:2302.09511  [pdf, other

    cs.CR cs.DB

    Dynamic Private Task Assignment under Differential Privacy

    Authors: Leilei Du, Peng Cheng, Libin Zheng, Wei Xi, Xuemin Lin, Wenjie Zhang, **g Fang

    Abstract: Data collection is indispensable for spatial crowdsourcing services, such as resource allocation, policymaking, and scientific explorations. However, privacy issues make it challenging for users to share their information unless receiving sufficient compensation. Differential Privacy (DP) is a promising mechanism to release helpful information while protecting individuals' privacy. However, most D… ▽ More

    Submitted 19 February, 2023; originally announced February 2023.

    Comments: [Technical Report]

  14. arXiv:2301.04838  [pdf, other

    cs.LG cs.AI

    LB-SimTSC: An Efficient Similarity-Aware Graph Neural Network for Semi-Supervised Time Series Classification

    Authors: Wenjie Xi, Arnav Jain, Li Zhang, Jessica Lin

    Abstract: Time series classification is an important data mining task that has received a lot of interest in the past two decades. Due to the label scarcity in practice, semi-supervised time series classification with only a few labeled samples has become popular. Recently, Similarity-aware Time Series Classification (SimTSC) is proposed to address this problem by using a graph neural network classification… ▽ More

    Submitted 5 September, 2023; v1 submitted 12 January, 2023; originally announced January 2023.

    Comments: Accpeted by DLG-AAAI'23

  15. arXiv:2211.15069  [pdf, other

    cs.CV

    FeatureBooster: Boosting Feature Descriptors with a Lightweight Neural Network

    Authors: Xinjiang Wang, Zeyu Liu, Yu Hu, Wei Xi, Wenxian Yu, Dan** Zou

    Abstract: We introduce a lightweight network to improve descriptors of keypoints within the same image. The network takes the original descriptors and the geometric properties of keypoints as the input, and uses an MLP-based self-boosting stage and a Transformer-based cross-boosting stage to enhance the descriptors. The boosted descriptors can be either real-valued or binary ones. We use the proposed networ… ▽ More

    Submitted 28 March, 2023; v1 submitted 28 November, 2022; originally announced November 2022.

    Comments: Accept by CVPR2023; 15 pages, 8 figures, 7 tables

  16. arXiv:2204.03654  [pdf, other

    eess.IV cs.CV cs.LG

    Identification of Autism spectrum disorder based on a novel feature selection method and Variational Autoencoder

    Authors: Fangyu Zhang, Yanjie Wei, ** Liu, Yanlin Wang, Wenhui Xi, Yi Pan

    Abstract: The development of noninvasive brain imaging such as resting-state functional magnetic resonance imaging (rs-fMRI) and its combination with AI algorithm provides a promising solution for the early diagnosis of Autism spectrum disorder (ASD). However, the performance of the current ASD classification based on rs-fMRI still needs to be improved. This paper introduces a classification framework to ai… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: 15 pages, 11 figures

  17. arXiv:2201.10792  [pdf, other

    cs.CL cs.SD eess.AS

    On the Effectiveness of Pinyin-Character Dual-Decoding for End-to-End Mandarin Chinese ASR

    Authors: Zhao Yang, Dianwen Ng, Xiao Fu, Li** Han, Wei Xi, Rui Wang, Rui Jiang, Jizhong Zhao

    Abstract: End-to-end automatic speech recognition (ASR) has achieved promising results. However, most existing end-to-end ASR methods neglect the use of specific language characteristics. For Mandarin Chinese ASR tasks, there exist mutual promotion relationship between Pinyin and Character where Chinese characters can be romanized by Pinyin. Based on the above intuition, we first investigate types of end-to… ▽ More

    Submitted 30 March, 2022; v1 submitted 26 January, 2022; originally announced January 2022.

    Comments: submitted to INTERSPEECH 2022

  18. arXiv:2010.10233  [pdf, other

    cs.AR

    Eliminating the Barriers: Demystifying Wi-Fi Baseband Design and Introducing the PicoScenes Wi-Fi Sensing Platform

    Authors: Zhi** Jiang, Tom H. Luan, Xincheng Ren, Dongtao Lv, Han Hao, **g Wang, Kun Zhao, Wei Xi, Yueshen Xu, Rui Li

    Abstract: The research on Wi-Fi sensing has been thriving over the past decade but the process has not been smooth. Three barriers always hamper the research: unknown baseband design and its influence, inadequate hardware, and the lack of versatile and flexible measurement software. This paper tries to eliminate these barriers through the following work. First, we present an in-depth study of the baseband d… ▽ More

    Submitted 11 August, 2021; v1 submitted 20 October, 2020; originally announced October 2020.

  19. arXiv:1907.11388  [pdf, other

    cs.RO

    Learning to Solve a Rubik's Cube with a Dexterous Hand

    Authors: Tingguang Li, Weitao Xi, Meng Fang, Jia Xu, Max Qing-Hu Meng

    Abstract: We present a learning-based approach to solving a Rubik's cube with a multi-fingered dexterous hand. Despite the promising performance of dexterous in-hand manipulation, solving complex tasks which involve multiple steps and diverse internal object structure has remained an important, yet challenging task. In this paper, we tackle this challenge with a hierarchical deep reinforcement learning meth… ▽ More

    Submitted 26 July, 2019; originally announced July 2019.

    Comments: 7 pages, 6 figures

  20. arXiv:1906.10886  [pdf, other

    cs.CV cs.GR eess.IV

    Joint Multi-frame Detection and Segmentation for Multi-cell Tracking

    Authors: Zibin Zhou, Fei Wang, Wenjuan Xi, Huaying Chen, Peng Gao, Chengkang He

    Abstract: Tracking living cells in video sequence is difficult, because of cell morphology and high similarities between cells. Tracking-by-detection methods are widely used in multi-cell tracking. We perform multi-cell tracking based on the cell centroid detection, and the performance of the detector has high impact on tracking performance. In this paper, UNet is utilized to extract inter-frame and intra-f… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: Accepted by International Conference on Image and Graphics (ICIG 2019)

  21. arXiv:1308.6805  [pdf

    cs.NI

    Twins:Device-free Object Tracking using Passive Tags

    Authors: **song Han, Chen Qian, Dan Ma, Xing Wang, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhi** Jiang

    Abstract: Without requiring objects to carry any transceiver, device-free based object tracking provides a promising solution for many localization and tracking systems to monitor non-cooperative objects such as intruders. However, existing device-free solutions mainly use sensors and active RFID tags, which are much more expensive compared to passive tags. In this paper, we propose a novel motion detection… ▽ More

    Submitted 30 August, 2013; originally announced August 2013.

  22. arXiv:1307.6349  [pdf, other

    cs.NI

    Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation

    Authors: Zhi** Jiang, Jizhong Zhao, Xiang-Yang Li, Wei Xi, Kun Zhao, Shaojie Tang, **song Han

    Abstract: Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location based service, and Wi-Fi fingerprint-based approaches are the most popular and inexpensive solutions. Among them, one of the main trends is to incorporate the built-in sensors of smartphone and to exploit crowdsourcing potentials. However the noisy built-in sensors and multi-tasking limita… ▽ More

    Submitted 24 July, 2013; originally announced July 2013.

  23. arXiv:1209.6152  [pdf, ps, other

    cs.IT

    Parity Declustering for Fault-Tolerant Storage Systems via $t$-designs

    Authors: Son Hoang Dau, Yan Jia, Chao **, Weiya Xi, Kheong Sann Chan

    Abstract: Parity declustering allows faster reconstruction of a disk array when some disk fails. Moreover, it guarantees uniform reconstruction workload on all surviving disks. It has been shown that parity declustering for one-failure tolerant array codes can be obtained via Balanced Incomplete Block Designs. We extend this technique for array codes that can tolerate an arbitrary number of disk failures vi… ▽ More

    Submitted 15 March, 2013; v1 submitted 27 September, 2012; originally announced September 2012.

    Comments: 13 pages

  24. arXiv:1208.0688  [pdf, other

    cs.CR

    Efficient and Secure Key Extraction using CSI without Chasing down Errors

    Authors: Jizhong Zhao, Wei Xi, **song Han, Shaojie Tang, Xiangyang Li, Yunhao Liu, Yihong Gong, Zehua Zhou

    Abstract: Generating keys and kee** them secret is critical in secure communications. Due to the "open-air" nature, key distribution is more susceptible to attacks in wireless communications. An ingenious solution is to generate common secret keys by two communicating parties separately without the need of key exchange or distribution, and regenerate them on needs. Recently, it is promising to extract key… ▽ More

    Submitted 3 August, 2012; originally announced August 2012.

    Comments: Submitted to INFOCOM 2013

  25. arXiv:1208.0412  [pdf, other

    cs.NI cs.CR

    Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information

    Authors: Zhi** Jiang, Jizhong Zhao, Xiang-Yang Li, **Song Han, Wei Xi

    Abstract: Comparing to well protected data frames, Wi-Fi management frames (MFs) are extremely vulnerable to various attacks. Since MFs are transmitted without encryption, attackers can forge them easily. Such attacks can be detected in cooperative environment such as Wireless Intrusion Detection System (WIDS). However, in non-cooperative environment it is difficult for a single station to identify these sp… ▽ More

    Submitted 22 May, 2013; v1 submitted 2 August, 2012; originally announced August 2012.