Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
TADACap: Time-series Adaptive Domain-Aware Captioning
ICAIF '24: Proceedings of the 5th ACM International Conference on AI in FinancePages 54–62https://doi.org/10.1145/3677052.3698690While image captioning has gained significant attention, the potential of captioning time-series images, prevalent in areas like finance and healthcare, remains largely untapped. Existing time-series captioning methods typically offer generic, domain-...
- research-articleOctober 2024
Enhancing weakly supervised semantic segmentation through multi-class token attention learning
AbstractWeakly supervised semantic segmentation using image-level class labels is challenging due to the limitations of Class Activation Maps (CAMs) in convolutional neural networks (CNNs), which often highlight only the most discriminative image regions. ...
- research-articleJuly 2024
Multi-degree-of-freedom unmanned aerial vehicle control combining a hybrid brain-computer interface and visual obstacle avoidance
Engineering Applications of Artificial Intelligence (EAAI), Volume 133, Issue PChttps://doi.org/10.1016/j.engappai.2024.108294Abstract ObjectiveThe difficulty of unmanned aerial vehicle (UAV) control recently lies in multidirectional movement in 3-dimensional space, improving control accuracy and manipulation safety. To address these challenges, a UAV control system that ...
- research-articleMay 2024
InArt: In-Network Aggregation with Route Selection for Accelerating Distributed Training
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2879–2889https://doi.org/10.1145/3589334.3645394Deep learning has brought about a revolutionary transformation in network applications, particularly in domains like e-commerce and online advertising. Distributed training (DT), as a critical means to expedite model training, has progressively emerged ...
- research-articleNovember 2023
FlowMind: Automatic Workflow Generation with LLMs
ICAIF '23: Proceedings of the Fourth ACM International Conference on AI in FinancePages 73–81https://doi.org/10.1145/3604237.3626908The rapidly evolving field of Robotic Process Automation (RPA) has made significant strides in automating repetitive processes, yet its effectiveness diminishes in scenarios requiring spontaneous or unpredictable tasks demanded by users. This paper ...
-
- research-articleNovember 2023
From Pixels to Predictions: Spectrogram and Vision Transformer for Better Time Series Forecasting
ICAIF '23: Proceedings of the Fourth ACM International Conference on AI in FinancePages 82–90https://doi.org/10.1145/3604237.3626905Time series forecasting plays a crucial role in decision-making across various domains, but it presents significant challenges. Recent studies have explored image-driven approaches using computer vision models to address these challenges, often ...
- research-articleMay 2024
Network Intrusion Detection Based on Federated Learning with Inherited Private Models
VSIP '23: Proceedings of the 2023 5th International Conference on Video, Signal and Image ProcessingPages 16–22https://doi.org/10.1145/3638682.3638685To solve the problem of insufficient and imbalanced data in Network Intrusion Detection (NID) in practical scenarios, which leads to low detection accuracy of the model. We propose a network intrusion algorithm based on the Federated Learning with ...
- research-articleNovember 2024
Unveiling Neural Network Data Free Backdoor Threats in Industrial Control Systems
RICSS '24: Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with SecurityPages 97–103https://doi.org/10.1145/3689930.3695208The neural network data-free backdoor attack is an emerging and potent threat, which requires minimal resources and does not rely on original training data to implant backdoors. This threat poses a significant risk to industrial control systems, where ...
- research-articleAugust 2023
Super Intendo: Semantic Robot Programming from Multiple Demonstrations for taskable robots
- Kevin David French,
- Ji Hwang Kim,
- Yidong Du,
- Elizabeth Mamantov Goeddel,
- Zhen Zeng,
- Odest Chadwicke Jenkins
Robotics and Autonomous Systems (ROAS), Volume 166, Issue Chttps://doi.org/10.1016/j.robot.2023.104397AbstractWhen an end-user instructs a taskable robot on a new task, it is important for the robot to learn the user’s intention for the task. Knowing the user’s intention, represented as desired goal conditions, allows the robot to generalize across ...
Highlights- Semantic Robot programming from multiple demonstrations for taskable robotics.
- Factor graph belief propagation for generative inference of user intention.
- Generalization to unseen task with novel classes and numbers of objects.
- research-articleJuly 2023
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 1890–1901https://doi.org/10.1109/TDSC.2023.3294433Network administrators face the challenge of efficiently patching overwhelming volumes of vulnerabilities with limited time and resources. To address this issue, they must prioritize vulnerabilities based on the associated risk/severity measurements (i.e.,...
- abstractMarch 2023
Semantic Scene Understanding for Human-Robot Interaction
HRI '23: Companion of the 2023 ACM/IEEE International Conference on Human-Robot InteractionPages 941–943https://doi.org/10.1145/3568294.3579960Service robots will be co-located with human users in an unstructured human-centered environment and will benefit from understanding the user's daily activities, preferences, and needs towards fully assisting them. This workshop aims to explore how ...
- research-articleFebruary 2023
Self-supervised graph learning for long-tailed cognitive diagnosis
AAAI'23/IAAI'23/EAAI'23: Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial IntelligenceArticle No.: 13, Pages 110–118https://doi.org/10.1609/aaai.v37i1.25082Cognitive diagnosis is a fundamental yet critical research task in the field of intelligent education, which aims to discover the proficiency level of different students on specific knowledge concepts. Despite the effectiveness of existing efforts, ...
- research-articleOctober 2022
An approach based on 1D fully convolutional network for continuous sign language recognition and labeling
Neural Computing and Applications (NCAA), Volume 34, Issue 20Pages 17921–17935https://doi.org/10.1007/s00521-022-07415-xAbstractSign language is the most important communication method for people with speech impairments, and automatic sign language recognition helps them communicate with normal people without barriers. For portability considerations, the device that ...
- ArticleJuly 2022
Resource Allocation for D2D Communication Underlaying Cellular Network
AbstractAt present, resource allocation schemes based on cellular users and D2D users have been widely concerned by the society. With the development of society, the number of cellular users and D2D users has been increasing, but the frequency spectrum ...
- ArticleJuly 2022
Sub-base Station Power Optimization Based on QoS and Interference Temperature Constraints for Multi-user Input and Output
AbstractIn this paper, we study the transmission power allocation of the secondary base station to the secondary user in cognitive radio networks when multiple primary users (PU) and multiple secondary users (SU) adopt NOMA. In the proposed Underlay ...
- research-articleJune 2022
LICALITY—Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning
IEEE Transactions on Network and Service Management (ITNSM), Volume 19, Issue 2Pages 1746–1760https://doi.org/10.1109/TNSM.2021.3133811Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a computer networking system. The widely used expert-based risk prioritization approach, e.g., Common Vulnerability Scoring System (CVSS), cannot realistically ...
- research-articleMay 2022
Composable Causality in Semantic Robot Programming
2022 International Conference on Robotics and Automation (ICRA)Pages 1380–1386https://doi.org/10.1109/ICRA46639.2022.9811365Assembly tasks are challenging for robot manipulation because the robot must reason over the composed effects of actions and execute multi-objective behaviors. Robots typically use predefined priorities provided by users to determine how to compose ...
- research-articleAugust 2022
Security Challenges for Modern Data Centers with IoT: A Preliminary Study
WWW '22: Companion Proceedings of the Web Conference 2022Pages 555–562https://doi.org/10.1145/3487553.3524857The wide deployment of internet of things (IoT) devices makes a profound impact on the data center industry from various perspectives, varying from infrastructure operation, resource management, to end users. This is a double-edged sword – it enables ...
- research-articleFebruary 2022
(2+1)D-SLR: an efficient network for video sign language recognition
Neural Computing and Applications (NCAA), Volume 34, Issue 3Pages 2413–2423https://doi.org/10.1007/s00521-021-06467-9AbstractThe most existing sign language recognition methods have made significant progress. However, there are still problems in the field of sign language recognition: Traditional SLR technology relies on external devices such as data gloves, position ...
- doctoral_thesisJanuary 2022
Risk-Based Network Vulnerability Prioritization
AbstractThis dissertation investigates the problem of efficiently and effectively prioritizing a vulnerability risk in a computer networking system. Vulnerability prioritization is one of the most challenging issues in vulnerability management, which ...