Skip to main content

Showing 1–11 of 11 results for author: Sui, Y

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.01242  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    TRAMBA: A Hybrid Transformer and Mamba Architecture for Practical Audio and Bone Conduction Speech Super Resolution and Enhancement on Mobile and Wearable Platforms

    Authors: Yueyuan Sui, Minghui Zhao, Junxi Xia, Xiaofan Jiang, Stephen Xia

    Abstract: We propose TRAMBA, a hybrid transformer and Mamba architecture for acoustic and bone conduction speech enhancement, suitable for mobile and wearable platforms. Bone conduction speech enhancement has been impractical to adopt in mobile and wearable platforms for several reasons: (i) data collection is labor-intensive, resulting in scarcity; (ii) there exists a performance gap between state of-art m… ▽ More

    Submitted 29 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

  2. arXiv:2404.15284  [pdf, other

    eess.SP cs.AI

    Global 4D Ionospheric STEC Prediction based on DeepONet for GNSS Rays

    Authors: Dijia Cai, Zenghui Shi, Haiyang Fu, Huan Liu, Hongyi Qian, Yun Sui, Feng Xu, Ya-Qiu **

    Abstract: The ionosphere is a vitally dynamic charged particle region in the Earth's upper atmosphere, playing a crucial role in applications such as radio communication and satellite navigation. The Slant Total Electron Contents (STEC) is an important parameter for characterizing wave propagation, representing the integrated electron density along the ray of radio signals passing through the ionosphere. Th… ▽ More

    Submitted 12 March, 2024; originally announced April 2024.

  3. arXiv:2401.03115  [pdf, other

    cs.CV cs.MM eess.IV

    Transferable Learned Image Compression-Resistant Adversarial Perturbations

    Authors: Yang Sui, Zhuohang Li, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Zhenzhong Chen

    Abstract: Adversarial attacks can readily disrupt the image classification system, revealing the vulnerability of DNN-based recognition tasks. While existing adversarial perturbations are primarily applied to uncompressed images or compressed images by the traditional image compression method, i.e., JPEG, limited studies have investigated the robustness of models for image classification in the context of D… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: Accepted as poster at Data Compression Conference 2024 (DCC 2024)

  4. arXiv:2312.10343  [pdf, other

    eess.SP cs.AR cs.LG cs.NE

    In-Sensor Radio Frequency Computing for Energy-Efficient Intelligent Radar

    Authors: Yang Sui, Minning Zhu, Lingyi Huang, Chung-Tse Michael Wu, Bo Yuan

    Abstract: Radio Frequency Neural Networks (RFNNs) have demonstrated advantages in realizing intelligent applications across various domains. However, as the model size of deep neural networks rapidly increases, implementing large-scale RFNN in practice requires an extensive number of RF interferometers and consumes a substantial amount of energy. To address this challenge, we propose to utilize low-rank dec… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  5. arXiv:2311.18103  [pdf, other

    eess.IV cs.CV

    Corner-to-Center Long-range Context Model for Efficient Learned Image Compression

    Authors: Yang Sui, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Bo Yuan, Zhenzhong Chen

    Abstract: In the framework of learned image compression, the context model plays a pivotal role in capturing the dependencies among latent representations. To reduce the decoding time resulting from the serial autoregressive context model, the parallel context model has been proposed as an alternative that necessitates only two passes during the decoding phase, thus facilitating efficient image compression… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  6. arXiv:2304.14508  [pdf

    eess.IV cs.CV cs.LG

    3D Brainformer: 3D Fusion Transformer for Brain Tumor Segmentation

    Authors: Rui Nian, Guoyao Zhang, Yao Sui, Yuqi Qian, Qiuying Li, Mingzhang Zhao, Jianhui Li, Ali Gholipour, Simon K. Warfield

    Abstract: Magnetic resonance imaging (MRI) is critically important for brain map** in both scientific research and clinical studies. Precise segmentation of brain tumors facilitates clinical diagnosis, evaluations, and surgical planning. Deep learning has recently emerged to improve brain tumor segmentation and achieved impressive results. Convolutional architectures are widely used to implement those neu… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: 10 pages, 4 figures

    MSC Class: 68T07 ACM Class: I.4.6; I.5.1

  7. arXiv:2302.03227  [pdf, other

    cs.LG eess.SP q-bio.NC

    Automatic Sleep Stage Classification with Cross-modal Self-supervised Features from Deep Brain Signals

    Authors: Chen Gong, Yue Chen, Yanan Sui, Luming Li

    Abstract: The detection of human sleep stages is widely used in the diagnosis and intervention of neurological and psychiatric diseases. Some patients with deep brain stimulator implanted could have their neural activities recorded from the deep brain. Sleep stage classification based on deep brain recording has great potential to provide more precise treatment for patients. The accuracy and generalizabilit… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: 4 pages, 5 figures, 11th International IEEE EMBS Conference on Neural Engineering (NER)

  8. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning

    Authors: Guanqin Zhang, Jiankun Sun, Feng Xu, H. M. N. Dilum Bandara, Shi** Chen, Yulei Sui, Tim Menzies

    Abstract: Deep neural networks (DNNs), are widely used in many industries such as image recognition, supply chain, medical diagnosis, and autonomous driving. However, prior work has shown the high accuracy of a DNN model does not imply high robustness (i.e., consistent performances on new and future datasets) because the input data and external environment (e.g., software and model configurations) for a dep… ▽ More

    Submitted 25 November, 2022; v1 submitted 17 November, 2022; originally announced November 2022.

  9. arXiv:2206.10119  [pdf

    eess.SY

    Optimization simulation of reflow welding based on prediction of regional center temperature field

    Authors: Yuan Sui, Fan-yang Bu, Zi-long Shao, Wei Yan

    Abstract: Before reflow soldering of integrated electronic products, the numerical simulation of temperature control curve of reflow furnace is crucial for selecting proper parameters and improving the overall efficiency of reflow soldering process and product quality. According to the heat conduction law and the specific heat capacity formula, the first-order ordinary differential equation of the central t… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Comments: in Chinese language. Journal of Computer Simulation

  10. arXiv:2105.14704  [pdf, other

    eess.AS cs.CL cs.SD

    Parkinsonian Chinese Speech Analysis towards Automatic Classification of Parkinson's Disease

    Authors: Hao Fang, Chen Gong, Chen Zhang, Yanan Sui, Luming Li

    Abstract: Speech disorders often occur at the early stage of Parkinson's disease (PD). The speech impairments could be indicators of the disorder for early diagnosis, while motor symptoms are not obvious. In this study, we constructed a new speech corpus of Mandarin Chinese and addressed classification of patients with PD. We implemented classical machine learning methods with ranking algorithms for feature… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: 12 pages, 5 figures, proceedings of the Machine Learning for Health NeurIPS Workshop, PMLR 136:114-125, 2020

  11. arXiv:2011.06341  [pdf

    eess.SP

    Hardware Complexity Aware Design Strategy for a Fused Logarithmic and Anti-Logarithmic Converter

    Authors: Botao Xiong, Yuanfeng Sui

    Abstract: The logarithmic and anti-logarithmic converters are realized with the piecewise linear approximation method, which is implemented by the shift-and-add architecture. This brief utilizes the similarities of Log and Antilog functions so that the adder tree block and multiplexer block can be shared by the Log and Antilog converters. As a result, the Antilog function can be implemented by the Log conve… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.