World models aim to learn or construct representations of the environment that enable the prediction of future scenes, thereby supporting intelligent motion planning. However, existing models often struggle to produce...
详细信息
To deal with the domain shift between training and test samples, current methods have primarily focused on learning generalizable features during training and ignore the specificity of unseen samples that are also cri...
To deal with the domain shift between training and test samples, current methods have primarily focused on learning generalizable features during training and ignore the specificity of unseen samples that are also critical during the test. In this paper, we investigate a more challenging task that aims to adapt a trained CNN model to unseen domains during the test. To maximumly mine the information in the test data, we propose a unified method called DomainAdaptor for the test-time adaptation, which consists of an AdaMixBN module and a Generalized Entropy Minimization (GEM) loss. Specifically, AdaMixBN addresses the domain shift by adaptively fusing training and test statistics in the normalization layer via a dynamic mixture co-efficient and a statistic transformation operation. To further enhance the adaptation ability of AdaMixBN, we design a GEM loss that extends the Entropy Minimization loss to better exploit the information in the test data. Extensive experiments show that DomainAdaptor consistently outperforms the state-of-the-art methods on four benchmarks. Furthermore, our method brings more remarkable improvement against existing methods on the few-data unseen domain. The code is available at https://***/koncle/DomainAdaptor.
This paper presents new results for pseudonymetry, a closed-loop feedback mechanism in which active transmissions are watermarked with a pseudonym that, if it interferes with a protected passive radio receiver, can be...
详细信息
ISBN:
(数字)9798350304053
ISBN:
(纸本)9798350304060
This paper presents new results for pseudonymetry, a closed-loop feedback mechanism in which active transmissions are watermarked with a pseudonym that, if it interferes with a protected passive radio receiver, can be demodulated and used to force the transmitter off of the band. This paper addresses amplitude-based watermarking of orthogonal frequency division multiplexing (OFDM) packets. We quantify the ability of a passive receiver to decode the watermark at very low signal-to-noise ratio (SNR) and the impact on the intended communication link. We demonstrate, using a testbed of software-defined radios, that the experimental implementation of pseudonymetry matches the theoretical analysis very closely. Our results quantify a fundamental trade-off in the design of pseudonymetry for OFDM and provide a practical pseudonym receiver design.
Autonomous driving is a highly anticipated approach toward eliminating roadway fatalities. At the same time, the bar for safety is both high and costly to verify. This work considers the role of remotely-located human...
详细信息
Due to the great advance in machine learning (ML) techniques, numerous ML models are expanding their application domains in recent years. To adapt for resource-constrained platforms such as mobile and Internet of Thin...
Due to the great advance in machine learning (ML) techniques, numerous ML models are expanding their application domains in recent years. To adapt for resource-constrained platforms such as mobile and Internet of Things (IoT) devices, pre-trained models are often processed to enhance their efficiency and compactness, using optimization techniques such as pruning and quantization. Similar to the optimization process in other complex systems, e.g., program compilers and databases, optimizations for ML models can contain bugs, leading to severe consequences such as system crashes and financial loss. While bugs in training, compiling and deployment stages have been extensively studied, there is still a lack of systematic understanding and characterization of model optimization bugs (MOBs). In this work, we conduct the first empirical study to identify and characterize MOBs. We collect a comprehensive dataset containing 371 MOBs from TensorFlow and PyTorch, the most extensively used open-source ML frameworks, covering the entire development time span of their optimizers (May 2019 to August 2022). We then investigate the collected bugs from various perspectives, including their symptoms, root causes, life cycles, detection and fixes. Our work unveils the status quo of MOBs in the wild, and reveals their features on which future detection techniques can be based. Our findings also serve as a warning to the developers and the users of ML frameworks, and an appeal to our research community to enact dedicated countermeasures.
Entangled representation of clothing and identity (ID)-intrinsic clues are potentially concomitant in conventional person Re- IDentification (ReID). Nevertheless, eliminating the negative impact of clothing on ID rema...
Entangled representation of clothing and identity (ID)-intrinsic clues are potentially concomitant in conventional person Re- IDentification (ReID). Nevertheless, eliminating the negative impact of clothing on ID remains challenging due to the lack of theory and the difficulty of isolating the exact implications. In this paper, a causality-based Auto-Intervention Model, referred to as AIM 1 1 Codes will publicly available at https://***/BoomShakaY/AIM-CCReID., is first proposed to mitigate clothing bias for robust cloth-changing person ReID (CC-ReID). Specifically, we analyze the effect of clothing on the model inference and adopt a dual-branch model to simulate causal intervention. Progressively, clothing bias is eliminated automatically with model training. AIM is encouraged to learn more discriminative ID clues that are free from clothing bias. Extensive experiments on two standard CC-ReID datasets demonstrate the superiority of the proposed AIM over other state-of-the-art methods.
In this paper, the problem of collaborative vehicle sensing is investigated. In the considered model, a set of cooperative vehicles provide sensing information to sensing request vehicles with limited sensing and comm...
详细信息
Cardiovascular disease (CVD) risk assessment and prognosis in otherwise healthy people is an important part of disease management. Early detection and diagnosis of CVD, supported by the extensive health data on the co...
详细信息
ISBN:
(数字)9798350372502
ISBN:
(纸本)9798350372519
Cardiovascular disease (CVD) risk assessment and prognosis in otherwise healthy people is an important part of disease management. Early detection and diagnosis of CVD, supported by the extensive health data on the condition already stored in hospital systems, has the ability to greatly improve disease outcomes. Clinical practice for the management of Cardiovascular Diseases (CVDs) stands to benefit greatly from the use of machine learning approaches. Patients and the healthcare system can save money thanks to these methods, which can be used to create evidence-based clinical guidelines and management algorithms. This will cut down on expensive and time-consuming clinical and laboratory examinations. This study suggests creating new deep learning algorithms that can automatically identify important variables and detect early-stage heart disease; these algorithms should be resilient, effective, efficient, and unique in order to improve early anticipation and interference for CVDs. An F1-score of around 89% is produced by the suggested Catboost model. Hence, it outperformed numerous other state-of-the-art methods by maximizing classification efficiency with better correctness and precision.
The eyes are the windows to the soul and are crucial for studying human behavior. Therefore, gaze estimation has attracted much attention in the field of computer vision. In recent years, convolutional neural networks...
详细信息
ISBN:
(数字)9798331509538
ISBN:
(纸本)9798331509545
The eyes are the windows to the soul and are crucial for studying human behavior. Therefore, gaze estimation has attracted much attention in the field of computer vision. In recent years, convolutional neural networks have driven significant progress in gaze estimation research. Despite the remarkable achievements of gaze technology based on full-face images, the inability to obtain full-face images in specific scenarios makes research based on eye images particularly important. This paper proposes a three-dimensional gaze estimation model that takes binocular images as input, using VGG16 as the backbone network for feature extraction. To enhance the feature extraction capability, we have embedded channel attention and spatial attention mechanisms. Meanwhile, to improve the stability of gaze estimation, we classify real gaze angles. First, we perform a preliminary screening of gaze direction through a classification task, and then perform linear regression with the true angle. Finally, we optimize gaze features using binocular vision differences to finetune the gaze estimator. Experiments have shown that our method performs well on three public datasets.
暂无评论