Skip to main content

Showing 1–50 of 89 results for author: Wu, T

Searching in archive eess. Search in all archives.
.
  1. arXiv:2407.00304  [pdf, other

    eess.SY

    A Review of Safe Reinforcement Learning Methods for Modern Power Systems

    Authors: Tong Su, Tong Wu, Junbo Zhao, Anna Scaglione, Le Xie

    Abstract: Due to the availability of more comprehensive measurement data in modern power systems, there has been significant interest in develo** and applying reinforcement learning (RL) methods for operation and control. Conventional RL training is based on trial-and-error and reward feedback interaction with either a model-based simulated environment or a data-driven and model-free simulation environmen… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

  2. arXiv:2406.16990  [pdf, other

    cs.SD cs.AI eess.AS

    AND: Audio Network Dissection for Interpreting Deep Acoustic Models

    Authors: Tung-Yu Wu, Yu-Xiang Lin, Tsui-Wei Weng

    Abstract: Neuron-level interpretations aim to explain network behaviors and properties by investigating neurons responsive to specific perceptual or structural input patterns. Although there is emerging work in the vision and language domains, none is explored for acoustic models. To bridge the gap, we introduce $\textit{AND}$, the first $\textbf{A}$udio $\textbf{N}$etwork $\textbf{D}$issection framework th… ▽ More

    Submitted 26 June, 2024; v1 submitted 24 June, 2024; originally announced June 2024.

    Comments: Accepted by ICML'24

  3. arXiv:2406.16876  [pdf, other

    eess.SP

    Near-Field Mobile Tracking: A Framework of Using XL-RIS Information

    Authors: Tuo Wu, Cunhua Pan, Kangda Zhi, Hong Ren, Maged Elkashlan, Chau Yuen

    Abstract: This paper introduces a novel mobile tracking framework leveraging the high-dimensional signal received from extremely large-scale (XL) reconfigurable intelligent surfaces (RIS). This received signal, named XL-RIS information, has a much larger data dimension and therefore offers a richer feature set compared to the traditional base station (BS) received signal, i.e., BS information, enabling more… ▽ More

    Submitted 3 April, 2024; originally announced June 2024.

  4. arXiv:2405.11155  [pdf, other

    eess.SY cs.CC

    Inner-approximate Reachability Computation via Zonotopic Boundary Analysis

    Authors: De** Ren, Zhen Liang, Chenyu Wu, Jianqiang Ding, Taoran Wu, Bai Xue

    Abstract: Inner-approximate reachability analysis involves calculating subsets of reachable sets, known as inner-approximations. This analysis is crucial in the fields of dynamic systems analysis and control theory as it provides a reliable estimation of the set of states that a system can reach from given initial states at a specific time instant. In this paper, we study the inner-approximate reachability… ▽ More

    Submitted 21 May, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: the extended version of the paper accepted by CAV 2024

  5. arXiv:2404.13289  [pdf, other

    cs.CL cs.MM cs.SD eess.AS

    Double Mixture: Towards Continual Event Detection from Speech

    Authors: **gqi Kang, Tongtong Wu, **ming Zhao, Guitao Wang, Yinwei Wei, Hao Yang, Guilin Qi, Yuan-Fang Li, Gholamreza Haffari

    Abstract: Speech event detection is crucial for multimedia retrieval, involving the tagging of both semantic and acoustic events. Traditional ASR systems often overlook the interplay between these events, focusing solely on content, even though the interpretation of dialogue can vary with environmental context. This paper tackles two primary challenges in speech event detection: the continual integration of… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

    Comments: The first two authors contributed equally to this work

  6. arXiv:2404.09007  [pdf, ps, other

    eess.SY

    A Framework for Safe Probabilistic Invariance Verification of Stochastic Dynamical Systems

    Authors: Taoran Wu, Yiqing Yu, Bican Xia, Ji Wang, Bai Xue

    Abstract: Ensuring safety through set invariance has proven to be a valuable method in various robotics and control applications. This paper introduces a comprehensive framework for the safe probabilistic invariance verification of both discrete- and continuous-time stochastic dynamical systems over an infinite time horizon. The objective is to ascertain the lower and upper bounds of the liveness probabilit… ▽ More

    Submitted 13 April, 2024; originally announced April 2024.

  7. arXiv:2404.07575  [pdf

    cs.SD cs.AI eess.AS

    An Effective Automated Speaking Assessment Approach to Mitigating Data Scarcity and Imbalanced Distribution

    Authors: Tien-Hong Lo, Fu-An Chao, Tzu-I Wu, Yao-Ting Sung, Berlin Chen

    Abstract: Automated speaking assessment (ASA) typically involves automatic speech recognition (ASR) and hand-crafted feature extraction from the ASR transcript of a learner's speech. Recently, self-supervised learning (SSL) has shown stellar performance compared to traditional methods. However, SSL-based ASA systems are faced with at least three data-related challenges: limited annotated data, uneven distri… ▽ More

    Submitted 11 April, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

    Comments: Accepted to NAACL 2024 Findings

  8. arXiv:2403.16529  [pdf, other

    eess.SP

    Exploit High-Dimensional RIS Information to Localization: What Is the Impact of Faulty Element?

    Authors: Tuo Wu, Cunhua Pan, Kangda Zhi, Hong Ren, Maged Elkashlan, Cheng-Xiang Wang, Robert Schober, Xiaohu You

    Abstract: This paper proposes a novel localization algorithm using the reconfigurable intelligent surface (RIS) received signal, i.e., RIS information. Compared with BS received signal, i.e., BS information, RIS information offers higher dimension and richer feature set, thereby providing an enhanced capacity to distinguish positions of the mobile users (MUs). Additionally, we address a practical scenario w… ▽ More

    Submitted 28 May, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    Comments: 17 pages, Accepted by IEEE JSAC

  9. arXiv:2403.16521  [pdf, other

    eess.SP

    Employing High-Dimensional RIS Information for RIS-aided Localization Systems

    Authors: Tuo Wu, Cunhua Pan, Kangda Zhi, Hong Ren, Maged Elkashlan, Jiangzhou Wang, Chau Yuen

    Abstract: Reconfigurable intelligent surface (RIS)-aided localization systems have attracted extensive research attention due to their accuracy enhancement capabilities. However, most studies primarily utilized the base stations (BS) received signal, i.e., BS information, for localization algorithm design, neglecting the potential of RIS received signal, i.e., RIS information. Compared with BS information,… ▽ More

    Submitted 16 May, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  10. Ordinal Classification with Distance Regularization for Robust Brain Age Prediction

    Authors: Jay Shah, Md Mahfuzur Rahman Siddiquee, Yi Su, Teresa Wu, Baoxin Li

    Abstract: Age is one of the major known risk factors for Alzheimer's Disease (AD). Detecting AD early is crucial for effective treatment and preventing irreversible brain damage. Brain age, a measure derived from brain imaging reflecting structural changes due to aging, may have the potential to identify AD onset, assess disease risk, and plan targeted interventions. Deep learning-based regression technique… ▽ More

    Submitted 6 May, 2024; v1 submitted 25 October, 2023; originally announced March 2024.

    Comments: Accepted in WACV 2024

  11. arXiv:2403.10323  [pdf, ps, other

    eess.SP

    Joint Optimization for Achieving Covertness in MIMO Over-the-Air Computation Networks

    Authors: Junteng Yao, Tuo Wu, Ming **, Cunhua Pan, Quanzhong Li, **hong Yuan

    Abstract: This paper investigates covert data transmission within a multiple-input multiple-output (MIMO) over-the-air computation (AirComp) network, where sensors transmit data to the access point (AP) while guaranteeing covertness to the warden (Willie). Simultaneously, the AP introduces artificial noise (AN) to confuse Willie, meeting the covert requirement. We address the challenge of minimizing mean-sq… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  12. arXiv:2403.00453  [pdf, ps, other

    eess.SP

    Exploring Fairness for FAS-assisted Communication Systems: from NOMA to OMA

    Authors: Junteng Yao, Liaoshi Zhou, Tuo Wu, Ming **, Cunhua Pan, Maged Elkashlan, Kai-Kit Wong

    Abstract: This paper addresses the fairness issue within fluid antenna system (FAS)-assisted non-orthogonal multiple access (NOMA) and orthogonal multiple access (OMA) systems, where a single fixed-antenna base station (BS) transmits superposition-coded signals to two users, each with a single fluid antenna. We define fairness through the minimization of the maximum outage probability for the two users, und… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  13. arXiv:2402.17167  [pdf, ps, other

    eess.SY

    Converse Barrier Certificates for Finite-time Safety Verification of Continuous-time Perturbed Deterministic Systems

    Authors: Yonghan Li, Chenyu Wu, Taoran Wu, Shijie Wang, Bai Xue

    Abstract: In this paper, we investigate the problem of verifying the finite-time safety of continuous-time perturbed deterministic systems represented by ordinary differential equations in the presence of measurable disturbances. Given a finite time horizon, if the system is safe, it, starting from a compact initial set, will remain within an open and bounded safe region throughout the specified time horizo… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  14. arXiv:2402.02159  [pdf, ps, other

    eess.SP

    FAS-assisted Wireless Powered Communication Systems

    Authors: Xiazhi Lai, Kangda Zhi, Wanyi Li, Tuo Wu, Cunhua Pan, Maged Elkashlan

    Abstract: Fluid Antenna System (FAS) is recognized as a promising technology for enhancing communication performance. In this context, we explored the potential of FAS-assisted wireless powered communication systems. Specifically, the transmitter, equipped with FAS, harvests the radio frequency (RF) signal from a power beacon and utilizes the harvested energy for data transmission to the receiver. To evalua… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  15. arXiv:2402.02122  [pdf, other

    eess.SP

    Secure Wireless Communication in Active RIS-Assisted DFRC System

    Authors: Yang Zhang, Hong Ren, Cunhua Pan, Boshi Wang, Zhiyuan Yu, Ruisong Weng, Tuo Wu, Yongchao He

    Abstract: This work considers a dual-functional radar and communication (DFRC) system with an active reconfigurable intelligent surface (RIS) and a potential eavesdropper. Our purpose is to maximize the secrecy rate (SR) of the system by jointly designing the beamforming matrix at the DFRC base station (BS) and the reflecting coefficients at the active RIS, subject to the signal-to-interference-plus-noise-r… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

    Comments: 13 pages, 9 figures

  16. arXiv:2312.17583  [pdf, other

    eess.SY cs.RO

    Enhancing the Performance of DeepReach on High-Dimensional Systems through Optimizing Activation Functions

    Authors: Qian Wang, Tianhao Wu

    Abstract: With the continuous advancement in autonomous systems, it becomes crucial to provide robust safety guarantees for safety-critical systems. Hamilton-Jacobi Reachability Analysis is a formal verification method that guarantees performance and safety for dynamical systems and is widely applicable to various tasks and challenges. Traditionally, reachability problems are solved by using grid-based meth… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  17. arXiv:2311.10245  [pdf, other

    cs.CV eess.IV

    Segment Anything in Defect Detection

    Authors: Bozhen Hu, Bin Gao, Cheng Tan, Tongle Wu, Stan Z. Li

    Abstract: Defect detection plays a crucial role in infrared non-destructive testing systems, offering non-contact, safe, and efficient inspection capabilities. However, challenges such as low resolution, high noise, and uneven heating in infrared thermal images hinder comprehensive and accurate defect detection. In this study, we propose DefectSAM, a novel approach for segmenting defects on highly noisy the… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  18. arXiv:2310.19477  [pdf, other

    cs.CV cs.MM eess.IV

    VDIP-TGV: Blind Image Deconvolution via Variational Deep Image Prior Empowered by Total Generalized Variation

    Authors: Tingting Wu, Zhiyan Du, Zhi Li, Feng-Lei Fan, Tieyong Zeng

    Abstract: Recovering clear images from blurry ones with an unknown blur kernel is a challenging problem. Deep image prior (DIP) proposes to use the deep network as a regularizer for a single image rather than as a supervised model, which achieves encouraging results in the nonblind deblurring problem. However, since the relationship between images and the network architectures is unclear, it is hard to find… ▽ More

    Submitted 10 November, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: 13 pages, 5 figures

  19. arXiv:2310.14251  [pdf, other

    cs.IT eess.SP

    FAS-assisted NOMA Short-Packet Communication Systems

    Authors: Jianchao Zheng, Tuo Wu, Xiazhi Lai, Cunhua Pan, Maged Elkashlan, Kai-Kit Wong

    Abstract: In this paper, we investigate a fluid antenna system (FAS)-assisted downlink non-orthogonal multiple access (NOMA) for short-packet communications. The base station (BS) adopts a single fixed antenna, while both the central user (CU) and the cell-edge user (CEU) are equipped with a FAS. Each FAS comprises $N$ flexible positions (also known as ports), linked to $N$ arbitrarily correlated Rayleigh f… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: Submitted to IEEE journal

  20. arXiv:2310.07550  [pdf, other

    eess.SP

    Proactive Monitoring via Jamming in Fluid Antenna Systems

    Authors: Junteng Yao, Tuo Wu, Xiazhi Lai, Ming **, Cunhua Pan, Maged Elkashlan, Kai-Kit Wong

    Abstract: This paper investigates the efficacy of utilizing fluid antenna system (FAS) at a legitimate monitor to oversee suspicious communication. The monitor switches the antenna position to minimize its outage probability for enhancing the monitoring performance. Our objective is to maximize the average monitoring rate, whose expression involves the integral of the first-order Marcum $Q$ function. The op… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: 3 figs, submitted to IEEE journal

  21. arXiv:2310.05810  [pdf

    physics.optics eess.IV eess.SP

    Dipole-Spread Function Engineering for 6D Super-Resolution Microscopy

    Authors: Tingting Wu, Matthew D. Lew

    Abstract: Fluorescent molecules are versatile nanoscale emitters that enable detailed observations of biophysical processes with nanoscale resolution. Because they are well-approximated as electric dipoles, imaging systems can be designed to visualize their 3D positions and 3D orientations, so-called dipole-spread function (DSF) engineering, for 6D super-resolution single-molecule orientation-localization m… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

    Comments: This is a preprint of the following chapter: Tingting Wu and Matthew D. Lew, Dipole-Spread Function Engineering for 6D Super-Resolution Microscopy, published in Coded optical imaging, edited by **yang Lang, 2023, Springer Nature reproduced with permission of Springer Nature

    Journal ref: Liang, J. (ed) Coded Optical Imaging. Springer, Cham. (2024)

  22. arXiv:2310.04961  [pdf, ps, other

    eess.SY

    Reach-avoid Analysis for Sampled-data Systems with Measurement Uncertainties

    Authors: Taoran Wu, De** Ren, Shuyuan Zhang, Lei Wang, Bai Xue

    Abstract: Digital control has become increasingly prevalent in modern systems, making continuous-time plants controlled by discrete-time (digital) controllers ubiquitous and crucial across industries, including aerospace, automotive, and manufacturing. This paper focuses on investigating the reach-avoid problem in such systems, where the objective is to reach a goal set while avoiding unsafe states, especia… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  23. arXiv:2309.10379  [pdf, ps, other

    cs.SD eess.AS

    PDPCRN: Parallel Dual-Path CRN with Bi-directional Inter-Branch Interactions for Multi-Channel Speech Enhancement

    Authors: Jiahui Pan, Shulin He, Tianci Wu, Hui Zhang, Xueliang Zhang

    Abstract: Multi-channel speech enhancement seeks to utilize spatial information to distinguish target speech from interfering signals. While deep learning approaches like the dual-path convolutional recurrent network (DPCRN) have made strides, challenges persist in effectively modeling inter-channel correlations and amalgamating multi-level information. In response, we introduce the Parallel Dual-Path Convo… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  24. arXiv:2309.08895  [pdf, other

    cs.IT eess.SP

    CDDM: Channel Denoising Diffusion Models for Wireless Semantic Communications

    Authors: Tong Wu, Zhiyong Chen, Dazhi He, Liang Qian, Yin Xu, Meixia Tao, Wenjun Zhang

    Abstract: Diffusion models (DM) can gradually learn to remove noise, which have been widely used in artificial intelligence generated content (AIGC) in recent years. The property of DM for eliminating noise leads us to wonder whether DM can be applied to wireless communications to help the receiver mitigate the channel noise. To address this, we propose channel denoising diffusion models (CDDM) for semantic… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: submitted to IEEE Transactions on Wireless Communications. arXiv admin note: substantial text overlap with arXiv:2305.09161

  25. arXiv:2309.07582  [pdf, other

    eess.SP

    On Performance of Fluid Antenna System using Maximum Ratio Combining

    Authors: Xiazhi Lai, Tuo Wu, Junteng Yao, Cunhua Pan, Maged Elkashlan, Kai-Kit Wong

    Abstract: This letter investigates a fluid antenna system (FAS) where multiple ports can be activated for signal combining for enhanced receiver performance. Given $M$ ports at the FAS, the best $K$ ports out of the $M$ available ports are selected before maximum ratio combining (MRC) is used to combine the received signals from the selected ports. The aim of this letter is to study the achievable performan… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: submitted to IEEE journal

  26. arXiv:2306.05578  [pdf, other

    eess.SP cs.CR

    Differential Privacy for Class-based Data: A Practical Gaussian Mechanism

    Authors: Raksha Ramakrishna, Anna Scaglione, Tong Wu, Nikhil Ravi, Sean Peisert

    Abstract: In this paper, we present a notion of differential privacy (DP) for data that comes from different classes. Here, the class-membership is private information that needs to be protected. The proposed method is an output perturbation mechanism that adds noise to the release of query response such that the analyst is unable to infer the underlying class-label. The proposed DP method is capable of not… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: Under review in IEEE Transactions on Information Forensics & Security

  27. arXiv:2305.18146  [pdf

    eess.AS cs.SD eess.SP

    A Hierarchical Context-aware Modeling Approach for Multi-aspect and Multi-granular Pronunciation Assessment

    Authors: Fu-An Chao, Tien-Hong Lo, Tzu-I Wu, Yao-Ting Sung, Berlin Chen

    Abstract: Automatic Pronunciation Assessment (APA) plays a vital role in Computer-assisted Pronunciation Training (CAPT) when evaluating a second language (L2) learner's speaking proficiency. However, an apparent downside of most de facto methods is that they parallelize the modeling process throughout different speech granularities without accounting for the hierarchical and local contextual relationships… ▽ More

    Submitted 7 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Accepted to Interspeech 2023

  28. arXiv:2305.10983  [pdf, other

    cs.CV eess.IV

    Assessor360: Multi-sequence Network for Blind Omnidirectional Image Quality Assessment

    Authors: Tianhe Wu, Shuwei Shi, Haoming Cai, Mingdeng Cao, **g Xiao, Yinqiang Zheng, Yujiu Yang

    Abstract: Blind Omnidirectional Image Quality Assessment (BOIQA) aims to objectively assess the human perceptual quality of omnidirectional images (ODIs) without relying on pristine-quality image information. It is becoming more significant with the increasing advancement of virtual reality (VR) technology. However, the quality assessment of ODIs is severely hampered by the fact that the existing BOIQA pipe… ▽ More

    Submitted 10 October, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

  29. arXiv:2305.09165  [pdf, other

    cs.IT eess.SP

    Fusion-Based Multi-User Semantic Communications for Wireless Image Transmission over Degraded Broadcast Channels

    Authors: Tong Wu, Zhiyong Chen, Meixia Tao, Bin Xia, Wenjun Zhang

    Abstract: Degraded broadcast channels (DBC) are a typical multi-user communications scenario. There exist classic transmission methods, such as superposition coding with successive interference cancellation, to achieve the DBC capacity region. However, semantic communications method over DBC remains lack of in-depth research. To address this, we design a fusion-based multi-user semantic communications syste… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  30. arXiv:2305.09161  [pdf, other

    cs.IT eess.SP

    CDDM: Channel Denoising Diffusion Models for Wireless Communications

    Authors: Tong Wu, Zhiyong Chen, Dazhi He, Liang Qian, Yin Xu, Meixia Tao, Wenjun Zhang

    Abstract: Diffusion models (DM) can gradually learn to remove noise, which have been widely used in artificial intelligence generated content (AIGC) in recent years. The property of DM for removing noise leads us to wonder whether DM can be applied to wireless communications to help the receiver eliminate the channel noise. To address this, we propose channel denoising diffusion models (CDDM) for wireless c… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  31. arXiv:2304.11550  [pdf, other

    eess.SY

    Provable Reach-avoid Controllers Synthesis Based on Inner-approximating Controlled Reach-avoid Sets

    Authors: Jianqiang Ding, Taoran Wu, Yu** Qian, Lijun Zhang, Bai Xue

    Abstract: In this paper, we propose an approach for synthesizing provable reach-avoid controllers, which drive a deterministic system operating in an unknown environment to safely reach a desired target set. The approach falls within the reachability analysis framework and is based on the computation of inner-approximations of controlled reach-avoid sets(CRSs). Given a target set and a safe set, the control… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

  32. arXiv:2304.08298  [pdf, other

    eess.IV cs.LG

    Implicit Bayes Adaptation: A Collaborative Transport Approach

    Authors: Bo Jiang, Hamid Krim, Tianfu Wu, Derya Cansever

    Abstract: The power and flexibility of Optimal Transport (OT) have pervaded a wide spectrum of problems, including recent Machine Learning challenges such as unsupervised domain adaptation. Its essence of quantitatively relating two probability distributions by some optimal metric, has been creatively exploited and shown to hold promise for many real-world data challenges. In a related theme in the present… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  33. arXiv:2304.05482  [pdf, other

    eess.IV cs.CV

    Computational Pathology: A Survey Review and The Way Forward

    Authors: Mahdi S. Hosseini, Babak Ehteshami Bejnordi, Vincent Quoc-Huy Trinh, Danial Hasan, Xingwen Li, Taehyo Kim, Haochen Zhang, Theodore Wu, Kajanan Chinniah, Sina Maghsoudlou, Ryan Zhang, Stephen Yang, Jiadai Zhu, Lyndon Chan, Samir Khaki, Andrei Buin, Fatemeh Chaji, Ala Salehi, Bich Ngoc Nguyen, Dimitris Samaras, Konstantinos N. Plataniotis

    Abstract: Computational Pathology CPath is an interdisciplinary science that augments developments of computational approaches to analyze and model medical histopathology images. The main objective for CPath is to develop infrastructure and workflows of digital diagnostics as an assistive CAD system for clinical pathology, facilitating transformational changes in the diagnosis and treatment of cancer that a… ▽ More

    Submitted 27 January, 2024; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: Accepted in Elsevier Journal of Pathology Informatics (JPI) 2024

  34. arXiv:2303.15206  [pdf, other

    cs.CV eess.IV

    Perceptual Quality Assessment of NeRF and Neural View Synthesis Methods for Front-Facing Views

    Authors: Hanxue Liang, Tianhao Wu, Param Hanji, Francesco Banterle, Hongyun Gao, Rafal Mantiuk, Cengiz Oztireli

    Abstract: Neural view synthesis (NVS) is one of the most successful techniques for synthesizing free viewpoint videos, capable of achieving high fidelity from only a sparse set of captured images. This success has led to many variants of the techniques, each evaluated on a set of test views typically using image quality metrics such as PSNR, SSIM, or LPIPS. There has been a lack of research on how NVS metho… ▽ More

    Submitted 24 October, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  35. Domain-knowledge Inspired Pseudo Supervision (DIPS) for Unsupervised Image-to-Image Translation Models to Support Cross-Domain Classification

    Authors: Firas Al-Hindawi, Md Mahfuzur Rahman Siddiquee, Teresa Wu, Han Hu, Ying Sun

    Abstract: The ability to classify images is dependent on having access to large labeled datasets and testing on data from the same domain that the model can train on. Classification becomes more challenging when dealing with new data from a different domain, where gathering and especially labeling a larger image dataset for retraining a classification model requires a labor-intensive human effort. Cross-dom… ▽ More

    Submitted 30 September, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: text overlap with arXiv:2212.09107

  36. arXiv:2302.10382  [pdf, other

    eess.SY

    Constrained Reinforcement Learning for Predictive Control in Real-Time Stochastic Dynamic Optimal Power Flow

    Authors: Tong Wu, Anna Scaglione, Daniel Arnold

    Abstract: Deep Reinforcement Learning (DRL) has become a popular method for solving control problems in power systems. Conventional DRL encourages the agent to explore various policies encoded in a neural network (NN) with the goal of maximizing the reward function. However, this approach can lead to infeasible solutions that violate physical constraints such as power flow equations, voltage limits, and dyn… ▽ More

    Submitted 7 July, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  37. arXiv:2302.09200  [pdf, other

    eess.IV cs.CV cs.LG

    Brainomaly: Unsupervised Neurologic Disease Detection Utilizing Unannotated T1-weighted Brain MR Images

    Authors: Md Mahfuzur Rahman Siddiquee, Jay Shah, Teresa Wu, Catherine Chong, Todd J. Schwedt, Gina Dumkrieger, Simona Nikolova, Baoxin Li

    Abstract: Harnessing the power of deep neural networks in the medical imaging domain is challenging due to the difficulties in acquiring large annotated datasets, especially for rare diseases, which involve high costs, time, and effort for annotation. Unsupervised disease detection methods, such as anomaly detection, can significantly reduce human effort in these scenarios. While anomaly detection typically… ▽ More

    Submitted 16 August, 2023; v1 submitted 17 February, 2023; originally announced February 2023.

    Comments: Accepted in WACV 2024

  38. A Framework for Generalizing Critical Heat Flux Detection Models Using Unsupervised Image-to-Image Translation

    Authors: Firas Al-Hindawi, Tejaswi Soori, Han Hu, Md Mahfuzur Rahman Siddiquee, Hyunsoo Yoon, Teresa Wu, Ying Sun

    Abstract: The detection of critical heat flux (CHF) is crucial in heat boiling applications as failure to do so can cause rapid temperature ramp leading to device failures. Many machine learning models exist to detect CHF, but their performance reduces significantly when tested on data from different domains. To deal with datasets from new domains a model needs to be trained from scratch. Moreover, the data… ▽ More

    Submitted 17 March, 2023; v1 submitted 18 December, 2022; originally announced December 2022.

    Comments: This work has been submitted to the Expert Systems With Applications Journal on Sep 25, 2022

  39. arXiv:2212.00611  [pdf, other

    eess.SP

    Ultraviolet Scattering Communication Using Subcarrier Intensity Modulation over Atmospheric Turbulence Channels

    Authors: Zanqiu Shen, Jianshe Ma, Tianfeng Wu, Tao Shan, Yupeng Chen, ** Su

    Abstract: A closed-form non-line-of-sight (NLOS) turbulenceinduced fluctuation model is derived for ultraviolet scattering communication (USC), which models the received irradiance fluctuation by Meijer G function. Based on this model, we investigate the error rates of the USC system in NLOS case using different modulation techniques. Closed-form error rate results are derived by integration of Meijer G fun… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  40. arXiv:2211.16044  [pdf, other

    cs.SD cs.CL cs.CR cs.LG eess.AS

    Model Extraction Attack against Self-supervised Speech Models

    Authors: Tsu-Yuan Hsu, Chen-An Li, Tung-Yu Wu, Hung-yi Lee

    Abstract: Self-supervised learning (SSL) speech models generate meaningful representations of given clips and achieve incredible performance across various downstream tasks. Model extraction attack (MEA) often refers to an adversary stealing the functionality of the victim model with only query access. In this work, we study the MEA problem against SSL speech model with a small number of queries. We propose… ▽ More

    Submitted 8 October, 2023; v1 submitted 29 November, 2022; originally announced November 2022.

  41. arXiv:2210.11998  [pdf, other

    eess.SP

    Fingerprint Based mmWave Positioning System Aided by Reconfigurable Intelligent Surface

    Authors: Tuo Wu, Cunhua Pan, Yi** Pan, Hong Ren, Maged Elkashlan, Cheng-Xiang Wang

    Abstract: Reconfigurable intelligent surface (RIS) is a promising technique for millimeter wave (mmWave) positioning systems. In this paper, we consider multiple mobile users (MUs) positioning problem in the multiple-input multiple-output (MIMO) time-division duplex (TDD) mmWave systems aided by the RIS. We derive the expression for the space-time channel response vector (STCRV) as a novel type of fingerpri… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 5 pages, 9 figures

  42. arXiv:2210.05436  [pdf, other

    eess.IV cs.CV

    Retinex Image Enhancement Based on Sequential Decomposition With a Plug-and-Play Framework

    Authors: Tingting Wu, Wenna Wu, Ying Yang, Feng-Lei Fan, Tieyong Zeng

    Abstract: The Retinex model is one of the most representative and effective methods for low-light image enhancement. However, the Retinex model does not explicitly tackle the noise problem, and shows unsatisfactory enhancing results. In recent years, due to the excellent performance, deep learning models have been widely used in low-light image enhancement. However, these methods have two limitations: i) Th… ▽ More

    Submitted 17 February, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

  43. arXiv:2209.12900  [pdf, other

    cs.SD cs.AI cs.CL eess.AS

    The Efficacy of Self-Supervised Speech Models for Audio Representations

    Authors: Tung-Yu Wu, Chen-An Li, Tzu-Han Lin, Tsu-Yuan Hsu, Hung-Yi Lee

    Abstract: Self-supervised learning (SSL) speech models, which can serve as powerful upstream models to extract meaningful speech representations, have achieved unprecedented success in speech representation learning. However, their effectiveness on non-speech datasets is relatively less explored. In this work, we propose an ensemble framework, with a combination of ensemble techniques, to fuse SSL speech mo… ▽ More

    Submitted 31 January, 2023; v1 submitted 26 September, 2022; originally announced September 2022.

    Comments: to appear in Proceedings of Machine Learning Research (PMLR): NeurIPS 2021 Competition Track

  44. arXiv:2209.01822  [pdf, other

    eess.IV cs.CV

    HealthyGAN: Learning from Unannotated Medical Images to Detect Anomalies Associated with Human Disease

    Authors: Md Mahfuzur Rahman Siddiquee, Jay Shah, Teresa Wu, Catherine Chong, Todd Schwedt, Baoxin Li

    Abstract: Automated anomaly detection from medical images, such as MRIs and X-rays, can significantly reduce human effort in disease diagnosis. Owing to the complexity of modeling anomalies and the high cost of manual annotation by domain experts (e.g., radiologists), a typical technique in the current medical imaging literature has focused on deriving diagnostic models from healthy subjects only, assuming… ▽ More

    Submitted 5 September, 2022; originally announced September 2022.

    Comments: International Workshop on Simulation and Synthesis in Medical Imaging, MICCAI, 2022

  45. arXiv:2209.00992  [pdf, other

    eess.SP physics.optics

    Single-scatter channel impulse response model of non-line-of-sight ultraviolet communications

    Authors: Tian Cao, Shihan Chen, Tianfeng Wu, Changyong Pan, Jian Song

    Abstract: Previous studies on the temporal characteristics of single-scatter transmission in non-line-of-sight (NLOS) ultraviolet communications (UVC) were based on the prolate-spheroidal coordinate system. In this work, a novel single-scatter channel impulse response (CIR) model is proposed in the spherical coordinate system, which is more natural and comprehensible than the prolate-spheroidal coordinate s… ▽ More

    Submitted 28 August, 2022; originally announced September 2022.

    Comments: 10 pages, 4 figures

  46. arXiv:2208.09110  [pdf

    cs.SD eess.AS eess.SP

    3M: An Effective Multi-view, Multi-granularity, and Multi-aspect Modeling Approach to English Pronunciation Assessment

    Authors: Fu-An Chao, Tien-Hong Lo, Tzu-I Wu, Yao-Ting Sung, Berlin Chen

    Abstract: As an indispensable ingredient of computer-assisted pronunciation training (CAPT), automatic pronunciation assessment (APA) plays a pivotal role in aiding self-directed language learners by providing multi-aspect and timely feedback. However, there are at least two potential obstacles that might hinder its performance for practical use. On one hand, most of the studies focus exclusively on leverag… ▽ More

    Submitted 11 September, 2022; v1 submitted 18 August, 2022; originally announced August 2022.

    Comments: Accepted to APSIPA ASC 2022

  47. arXiv:2208.08485  [pdf, other

    cs.LG eess.SY

    Complex-Value Spatio-temporal Graph Convolutional Neural Networks and its Applications to Electric Power Systems AI

    Authors: Tong Wu, Anna Scaglione, Daniel Arnold

    Abstract: The effective representation, precessing, analysis, and visualization of large-scale structured data over graphs are gaining a lot of attention. So far most of the literature has focused on real-valued signals. However, signals are often sparse in the Fourier domain, and more informative and compact representations for them can be obtained using the complex envelope of their spectral components, a… ▽ More

    Submitted 22 September, 2022; v1 submitted 17 August, 2022; originally announced August 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  48. arXiv:2208.07606  [pdf, ps, other

    eess.SP

    RIS-Aided Localization Algorithm and Analysis: Tackling Non-Gaussian Angle Estimation Errors

    Authors: Tuo Wu, Hong Ren, Cunhua Pan, Yi** Pan, Sheng Hong, Maged Elkashlan, Feng Shu, Jiangzhou Wang

    Abstract: Reconfigurable intelligent surface (RIS)-aided localization systems are increasingly recognized for enhancing accuracy in internet of things (IoT) networks. However, prevailing studies tend to either assume a Gaussian distribution for angle estimation error (AEE) or directly neglect the impact of the AEE, overlooking its non-Gaussian nature in real-world scenarios, particularly with diverse estima… ▽ More

    Submitted 18 March, 2024; v1 submitted 16 August, 2022; originally announced August 2022.

    Comments: Keywords: Reconfigurable intelligent surface (RIS), intelligent reflecting surface (IRS)

  49. arXiv:2208.07602  [pdf, other

    eess.SP

    Joint Angle Estimation Error Analysis and 3D Positioning Algorithm Design for mmWave Positioning System

    Authors: Tuo Wu, Cunhua Pan, Yi** Pan, Sheng Hong, Hong Ren, Maged Elkashlan, Feng Shu, Jiangzhou Wang

    Abstract: In this paper, we propose a comprehensive framework to jointly analyze the angle estimation error and design the three-dimensional (3D) positioning algorithm for a millimeter wave (mmWave) positioning system. First, we estimate the angles of arrival (AoAs) at the anchors by applying the two-dimensional discrete Fourier transform (2D-DFT) algorithm. Based on the property of the 2D-DFT algorithm, th… ▽ More

    Submitted 14 November, 2022; v1 submitted 16 August, 2022; originally announced August 2022.

    Comments: Keywords: mmWave Positioning System

  50. arXiv:2205.08598  [pdf, other

    cs.SD cs.CL eess.AS eess.SP

    Deploying self-supervised learning in the wild for hybrid automatic speech recognition

    Authors: Mostafa Karimi, Changliang Liu, Kenichi Kumatani, Yao Qian, Tianyu Wu, Jian Wu

    Abstract: Self-supervised learning (SSL) methods have proven to be very successful in automatic speech recognition (ASR). These great improvements have been reported mostly based on highly curated datasets such as LibriSpeech for non-streaming End-to-End ASR models. However, the pivotal characteristics of SSL is to be utilized for any untranscribed audio data. In this paper, we provide a full exploration on… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.