Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Hua, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.04162  [pdf, other

    cs.RO

    Light-LOAM: A Lightweight LiDAR Odometry and Mapping based on Graph-Matching

    Authors: Shiquan Yi, Yang Lyu, Lin Hua, Quan Pan, Chunhui Zhao

    Abstract: Simultaneous Localization and Mapping (SLAM) plays an important role in robot autonomy. Reliability and efficiency are the two most valued features for applying SLAM in robot applications. In this paper, we consider achieving a reliable LiDAR-based SLAM function in computation-limited platforms, such as quadrotor UAVs based on graph-based point cloud association. First, contrary to most works sele… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  2. arXiv:2308.01237  [pdf, other

    cs.CR

    LSF-IDM: Automotive Intrusion Detection Model with Lightweight Attribution and Semantic Fusion

    Authors: Pengzhou Cheng, Lei Hua, Haobin Jiang, Gongshen Liu

    Abstract: Autonomous vehicles (AVs) are more vulnerable to network attacks due to the high connectivity and diverse communication modes between vehicles and external networks. Deep learning-based Intrusion detection, an effective method for detecting network attacks, can provide functional safety as well as a real-time communication guarantee for vehicles, thereby being widely used for AVs. Existing works w… ▽ More

    Submitted 26 September, 2023; v1 submitted 2 August, 2023; originally announced August 2023.

    Comments: 18 pages, 8 figures

  3. arXiv:2303.18049  [pdf, other

    cs.CL

    No Place to Hide: Dual Deep Interaction Channel Network for Fake News Detection based on Data Augmentation

    Authors: Biwei Cao, Lulu Hua, Jiuxin Cao, Jie Gui, Bo Liu, James Tin-Yau Kwok

    Abstract: Online Social Network (OSN) has become a hotbed of fake news due to the low cost of information dissemination. Although the existing methods have made many attempts in news content and propagation structure, the detection of fake news is still facing two challenges: one is how to mine the unique key features and evolution patterns, and the other is how to tackle the problem of small samples to bui… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

  4. arXiv:2209.13261  [pdf

    eess.SP cs.AI eess.SY

    SmartFPS: Neural Network based Wireless-inertial fusion positioning system

    Authors: Luchi Hua, Jun Yang

    Abstract: The current fusion positioning systems are mainly based on filtering algorithms, such as Kalman filtering or particle filtering. However, the system complexity of practical application scenarios is often very high, such as noise modeling in pedestrian inertial navigation systems, or environmental noise modeling in fingerprint matching and localization algorithms. To solve this problem, this paper… ▽ More

    Submitted 28 September, 2022; v1 submitted 27 September, 2022; originally announced September 2022.

  5. arXiv:2108.10623  [pdf, other

    cs.LG cs.GT

    Data-Free Evaluation of User Contributions in Federated Learning

    Authors: Hongtao Lv, Zhenzhe Zheng, Tie Luo, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv

    Abstract: Federated learning (FL) trains a machine learning model on mobile devices in a distributed manner using each device's private data and computing resources. A critical issues is to evaluate individual users' contributions so that (1) users' effort in model training can be compensated with proper incentives and (2) malicious and low-quality users can be detected and removed. The state-of-the-art sol… ▽ More

    Submitted 24 August, 2021; originally announced August 2021.

    Comments: accepted by WiOpt 2021

  6. arXiv:2007.00454  [pdf, other

    cs.SI stat.ME

    Pricing cyber insurance for a large-scale network

    Authors: Lei Hua, Maochao Xu

    Abstract: Facing the lack of cyber insurance loss data, we propose an innovative approach for pricing cyber insurance for a large-scale network based on synthetic data. The synthetic data is generated by the proposed risk spreading and recovering algorithm that allows infection and recovery events to occur sequentially, and allows dependence of random waiting time to infection for different nodes. The scale… ▽ More

    Submitted 29 June, 2020; originally announced July 2020.

  7. arXiv:2006.14017  [pdf, other

    cs.CL

    XREF: Entity Linking for Chinese News Comments with Supplementary Article Reference

    Authors: Xinyu Hua, Lei Li, Lifeng Hua, Lu Wang

    Abstract: Automatic identification of mentioned entities in social media posts facilitates quick digestion of trending topics and popular opinions. Nonetheless, this remains a challenging task due to limited context and diverse name variations. In this paper, we study the problem of entity linking for Chinese news comments given mentions' spans. We hypothesize that comments often refer to entities in the co… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: Accepted to AKBC2020, link to openreview: https://openreview.net/forum?id=1hLH6CKIjN

  8. arXiv:2002.07422  [pdf, other

    cs.LG cs.CL cs.NE

    Assessing the Memory Ability of Recurrent Neural Networks

    Authors: Cheng Zhang, Qiuchi Li, Lingyu Hua, Dawei Song

    Abstract: It is known that Recurrent Neural Networks (RNNs) can remember, in their hidden layers, part of the semantic information expressed by a sequence (e.g., a sentence) that is being processed. Different types of recurrent units have been designed to enable RNNs to remember information over longer time spans. However, the memory abilities of different recurrent units are still theoretically and empiric… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: Accepted by ECAI 2020

  9. arXiv:1911.02254  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Secure Federated Submodel Learning

    Authors: Chaoyue Niu, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv, Zhihua Wu, Guihai Chen

    Abstract: Federated learning was proposed with an intriguing vision of achieving collaborative machine learning among numerous clients without uploading their private data to a cloud server. However, the conventional framework requires each client to leverage the full model for learning, which can be prohibitively inefficient for resource-constrained clients and large-scale deep learning tasks. We thus prop… ▽ More

    Submitted 11 November, 2019; v1 submitted 6 November, 2019; originally announced November 2019.

  10. arXiv:1707.00117  [pdf, other

    cs.CL cs.LG stat.ML

    SAM: Semantic Attribute Modulation for Language Modeling and Style Variation

    Authors: Wenbo Hu, Lifeng Hua, Lei Li, Hang Su, Tian Wang, Ning Chen, Bo Zhang

    Abstract: This paper presents a Semantic Attribute Modulation (SAM) for language modeling and style variation. The semantic attribute modulation includes various document attributes, such as titles, authors, and document categories. We consider two types of attributes, (title attributes and category attributes), and a flexible attribute selection scheme by automatically scoring them via an attribute attenti… ▽ More

    Submitted 13 September, 2017; v1 submitted 1 July, 2017; originally announced July 2017.

  11. arXiv:1611.09009  [pdf

    cs.CR

    A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET

    Authors: Mu Han, Lei Hua, Shidian Ma

    Abstract: With the rapid development of vehicular ad hoc Network (VANET), it is gaining significant popularity and receiving increasing attentions from academics and industry in security and efficiency. To address security and efficiency issues, a self-authentication and deniable efficient group key agreement protocol is proposed in this paper. This scheme establishes a group between road-side unit (RSU) an… ▽ More

    Submitted 28 November, 2016; originally announced November 2016.

    Comments: 27 page, 7 figures,4 tables

  12. arXiv:1609.01987  [pdf

    cs.CE q-bio.BM

    CHSalign: A Web Server That Builds upon Junction-Explorer and RNAJAG for Pairwise Alignment of RNA Secondary Structures with Coaxial Helical Stacking

    Authors: Lei Hua, Yang Song, Namhee Kim, Christian Laing, Jason T. L. Wang, Tamar Schlick

    Abstract: RNA junctions are important structural elements of RNA molecules. They are formed when three or more helices come together in three-dimensional space. Recent studies have focused on the annotation and prediction of coaxial helical stacking (CHS) motifs within junctions. Here we exploit such predictions to develop an efficient alignment tool to handle RNA secondary structures with CHS motifs. Speci… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

    Comments: 45 pages, 5 figures

  13. Iterative Thresholded Bi-Histogram Equalization for Medical Image Enhancement

    Authors: Muhammad Ali Qadar, Yan Zhaowen, Li Hua

    Abstract: Enhancement of human vision to get an insight to information content is of vital importance. The traditional histogram equalization methods have been suffering from amplified contrast with the addition of artifacts and a surprising unnatural visibility of the processed images. In order to overcome these drawbacks, this paper proposes interative, mean, and multi-threshold selection criterion with p… ▽ More

    Submitted 24 August, 2015; originally announced August 2015.

    Comments: 8 Pages, 8 Figures, International Journal of Computer Applications (IJCA)

    Journal ref: International Journal of Computer Applications (0975 8887) Volume 114 No. 8, March 2015