Skip to main content

Showing 1–36 of 36 results for author: You, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2604.10484  [pdf, ps, other

    cs.AR

    Strix: Re-thinking NPU Reliability from a System Perspective

    Authors: Jiapeng Guan, Jie Zhang, Hao Zhou, Ran Wei, Dean You, Hui Wang, Yingquan Wang, Tinglue Wang, Xudong Zhao, Jing Li, Zhe Jiang

    Abstract: DNNs and LLMs increasingly rely on hardware accelerators, including in safety-critical domains, while technology scaling and growing model complexity make hardware faults more frequent. Existing system-level mechanisms typically treat the NPU as a monolithic unit, using coarse-grained replication that incurs prohibitive performance and hardware overheads, leaving a gap between reliability requirem… ▽ More

    Submitted 12 April, 2026; originally announced April 2026.

    Comments: This paper has been accepted for publication at DAC 2026

  2. arXiv:2604.05549  [pdf, ps, other

    cs.CL

    Stop Fixating on Prompts: Reasoning Hijacking and Constraint Tightening for Red-Teaming LLM Agents

    Authors: Yanxu Mao, Peipei Liu, Tiehan Cui, Congying Liu, Mingzhe Xing, Datao You

    Abstract: With the widespread application of LLM-based agents across various domains, their complexity has introduced new security threats. Existing red-team methods mostly rely on modifying user prompts, which lack adaptability to new data and may impact the agent's performance. To address the challenge, this paper proposes the JailAgent framework, which completely avoids modifying the user prompt. Specifi… ▽ More

    Submitted 12 April, 2026; v1 submitted 7 April, 2026; originally announced April 2026.

  3. arXiv:2512.13704  [pdf, ps, other

    cs.AI

    Adjudicator: Correcting Noisy Labels with a KG-Informed Council of LLM Agents

    Authors: Doohee You, Sundeep Paul

    Abstract: The performance of production machine learning systems is fundamentally limited by the quality of their training data. In high-stakes industrial applications, noisy labels can degrade performance and erode user trust. This paper presents Adjudicator, a system that addresses the critical data mining challenge of automatically identifying and correcting label noise and has been validated for product… ▽ More

    Submitted 5 December, 2025; originally announced December 2025.

    Comments: 12 pages, 3 figures

  4. arXiv:2510.18855  [pdf, ps, other

    cs.CL cs.AI

    Every Step Evolves: Scaling Reinforcement Learning for Trillion-Scale Thinking Model

    Authors: Ling Team, Anqi Shen, Baihui Li, Bin Hu, Bin Jing, Cai Chen, Chao Huang, Chao Zhang, Chaokun Yang, Cheng Lin, Chengyao Wen, Congqi Li, Deng Zhao, Dingbo Yuan, Donghai You, Fagui Mao, Fanzhuang Meng, Feng Xu, Guojie Li, Guowei Wang, Hao Dai, Haonan Zheng, Hong Liu, Jia Guo, Jiaming Liu , et al. (79 additional authors not shown)

    Abstract: We present Ring-1T, the first open-source, state-of-the-art thinking model with a trillion-scale parameter. It features 1 trillion total parameters and activates approximately 50 billion per token. Training such models at a trillion-parameter scale introduces unprecedented challenges, including train-inference misalignment, inefficiencies in rollout processing, and bottlenecks in the RL system. To… ▽ More

    Submitted 25 October, 2025; v1 submitted 21 October, 2025; originally announced October 2025.

    Comments: Technical Report

  5. arXiv:2510.10225   

    cs.AR

    ISAAC: Intelligent, Scalable, Agile, and Accelerated CPU Verification via LLM-aided FPGA Parallelism

    Authors: Jialin Sun, Yuchen Hu, Dean You, Yushu Du, Hui Wang, Xinwei Fang, Weiwei Shan, Nan Guan, Zhe Jiang

    Abstract: Functional verification is a critical bottleneck in integrated circuit development, with CPU verification being especially time-intensive and labour-consuming. Industrial practice relies on differential testing for CPU verification, yet faces bottlenecks at nearly each stage of the framework pipeline: front-end stimulus generation lacks micro-architectural awareness, yielding low-quality and redun… ▽ More

    Submitted 9 November, 2025; v1 submitted 11 October, 2025; originally announced October 2025.

    Comments: require revision, update later

  6. arXiv:2508.16478  [pdf, ps, other

    cs.CL cs.IR

    LLM-as-classifier: Semi-Supervised, Iterative Framework for Hierarchical Text Classification using Large Language Models

    Authors: Doohee You, Andy Parisi, Zach Vander Velden, Lara Dantas Inojosa

    Abstract: The advent of Large Language Models (LLMs) has provided unprecedented capabilities for analyzing unstructured text data. However, deploying these models as reliable, robust, and scalable classifiers in production environments presents significant methodological challenges. Standard fine-tuning approaches can be resource-intensive and often struggle with the dynamic nature of real-world data distri… ▽ More

    Submitted 22 August, 2025; originally announced August 2025.

    Comments: 20 pages excluding reference list, 2 figures

  7. arXiv:2506.15170  [pdf, ps, other

    cs.CR

    From LLMs to MLLMs to Agents: A Survey of Emerging Paradigms in Jailbreak Attacks and Defenses within LLM Ecosystem

    Authors: Yanxu Mao, Tiehan Cui, Peipei Liu, Datao You, Hongsong Zhu

    Abstract: Large language models (LLMs) are rapidly evolving from single-modal systems to multimodal LLMs and intelligent agents, significantly expanding their capabilities while introducing increasingly severe security risks. This paper presents a systematic survey of the growing complexity of jailbreak attacks and corresponding defense mechanisms within the expanding LLM ecosystem. We first trace the devel… ▽ More

    Submitted 1 August, 2025; v1 submitted 18 June, 2025; originally announced June 2025.

  8. arXiv:2505.14316  [pdf, ps, other

    cs.CR cs.AI

    Exploring Jailbreak Attacks on LLMs through Intent Concealment and Diversion

    Authors: Tiehan Cui, Yanxu Mao, Peipei Liu, Congying Liu, Datao You

    Abstract: Although large language models (LLMs) have achieved remarkable advancements, their security remains a pressing concern. One major threat is jailbreak attacks, where adversarial prompts bypass model safeguards to generate harmful or objectionable content. Researchers study jailbreak attacks to understand security and robustness of LLMs. However, existing jailbreak attack methods face two main chall… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  9. arXiv:2505.12935  [pdf, ps, other

    cs.CV

    LatentINDIGO: An INN-Guided Latent Diffusion Algorithm for Image Restoration

    Authors: Di You, Daniel Siromani, Pier Luigi Dragotti

    Abstract: There is a growing interest in the use of latent diffusion models (LDMs) for image restoration (IR) tasks due to their ability to model effectively the distribution of natural images. While significant progress has been made, there are still key challenges that need to be addressed. First, many approaches depend on a predefined degradation operator, making them ill-suited for complex or unknown de… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: Submitted to IEEE Transactions on Image Processing (TIP)

  10. arXiv:2504.01582  [pdf, other

    cs.AR

    MERE: Hardware-Software Co-Design for Masking Cache Miss Latency in Embedded Processors

    Authors: Dean You, Jieyu Jiang, Xiaoxuan Wang, Yushu Du, Zhihang Tan, Wenbo Xu, Hui Wang, Jiapeng Guan, Zhenyuan Wang, Ran Wei, Shuai Zhao, Zhe Jiang

    Abstract: Runahead execution is a technique to mask memory latency caused by irregular memory accesses. By pre-executing the application code during occurrences of long-latency operations and prefetching anticipated cache-missed data into the cache hierarchy, runahead effectively masks memory latency for subsequent cache misses and achieves high prefetching accuracy; however, this technique has been limited… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

  11. arXiv:2504.01347  [pdf, other

    cs.AR

    MEEK: Re-thinking Heterogeneous Parallel Error Detection Architecture for Real-World OoO Superscalar Processors

    Authors: Zhe Jiang, Minli Liao, Sam Ainsworth, Dean You, Timothy Jones

    Abstract: Heterogeneous parallel error detection is an approach to achieving fault-tolerant processors, leveraging multiple power-efficient cores to re-execute software originally run on a high-performance core. Yet, its complex components, gathering data cross-chip from many parts of the core, raise questions of how to build it into commodity cores without heavy design invasion and extensive re-engineering… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

  12. arXiv:2503.12484  [pdf, other

    eess.IV cs.AI cs.IT cs.LG eess.SP

    SING: Semantic Image Communications using Null-Space and INN-Guided Diffusion Models

    Authors: Jiakang Chen, Selim F. Yilmaz, Di You, Pier Luigi Dragotti, Deniz Gündüz

    Abstract: Joint source-channel coding systems based on deep neural networks (DeepJSCC) have recently demonstrated remarkable performance in wireless image transmission. Existing methods primarily focus on minimizing distortion between the transmitted image and the reconstructed version at the receiver, often overlooking perceptual quality. This can lead to severe perceptual degradation when transmitting ima… ▽ More

    Submitted 16 March, 2025; originally announced March 2025.

  13. arXiv:2502.13873  [pdf, other

    cs.AR cs.AI

    NVR: Vector Runahead on NPUs for Sparse Memory Access

    Authors: Hui Wang, Zhengpeng Zhao, Jing Wang, Yushu Du, Yuan Cheng, Bing Guo, He Xiao, Chenhao Ma, Xiaomeng Han, Dean You, Jiapeng Guan, Ran Wei, Dawei Yang, Zhe Jiang

    Abstract: Deep Neural Networks are increasingly leveraging sparsity to reduce the scaling up of model parameter size. However, reducing wall-clock time through sparsity and pruning remains challenging due to irregular memory access patterns, leading to frequent cache misses. In this paper, we present NPU Vector Runahead (NVR), a prefetching mechanism tailored for NPUs to address cache miss problems in spars… ▽ More

    Submitted 17 March, 2025; v1 submitted 19 February, 2025; originally announced February 2025.

  14. INDIGO+: A Unified INN-Guided Probabilistic Diffusion Algorithm for Blind and Non-Blind Image Restoration

    Authors: Di You, Pier Luigi Dragotti

    Abstract: Generative diffusion models are becoming one of the most popular prior in image restoration (IR) tasks due to their remarkable ability to generate realistic natural images. Despite achieving satisfactory results, IR methods based on diffusion models present several limitations. First of all, most non-blind approaches require an analytical expression of the degradation model to guide the sampling p… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

    Comments: Accepted by IEEE Journal of Selected Topics in Signal Processing (JSTSP)

  15. arXiv:2412.16555  [pdf, ps, other

    cs.CL

    Divide and Conquer: A Hybrid Strategy Defeats Multimodal Large Language Models

    Authors: Yanxu Mao, Peipei Liu, Tiehan Cui, Zhaoteng Yan, Congying Liu, Datao You

    Abstract: Large language models (LLMs) are widely applied in various fields of society due to their powerful reasoning, understanding, and generation capabilities. However, the security issues associated with these models are becoming increasingly severe. Jailbreaking attacks, as an important method for detecting vulnerabilities in LLMs, have been explored by researchers who attempt to induce these models t… ▽ More

    Submitted 29 May, 2025; v1 submitted 21 December, 2024; originally announced December 2024.

  16. arXiv:2412.09922  [pdf, other

    cs.CL

    Low-Resource Fast Text Classification Based on Intra-Class and Inter-Class Distance Calculation

    Authors: Yanxu Mao, Peipei Liu, Tiehan Cui, Congying Liu, Datao You

    Abstract: In recent years, text classification methods based on neural networks and pre-trained models have gained increasing attention and demonstrated excellent performance. However, these methods still have some limitations in practical applications: (1) They typically focus only on the matching similarity between sentences. However, there exists implicit high-value information both within sentences of t… ▽ More

    Submitted 13 December, 2024; originally announced December 2024.

  17. arXiv:2412.02113  [pdf, ps, other

    cs.AI

    Trust & Safety of LLMs and LLMs in Trust & Safety

    Authors: Doohee You, Dan Chon

    Abstract: In recent years, Large Language Models (LLMs) have garnered considerable attention for their remarkable abilities in natural language processing tasks. However, their widespread adoption has raised concerns pertaining to trust and safety. This systematic review investigates the current research landscape on trust and safety in LLMs, with a particular focus on the novel application of LLMs within t… ▽ More

    Submitted 30 June, 2025; v1 submitted 2 December, 2024; originally announced December 2024.

    Comments: 11 pages

  18. arXiv:2410.01141  [pdf, ps, other

    cs.CL cs.AI

    Evaluating Deduplication Techniques for Economic Research Paper Titles with a Focus on Semantic Similarity using NLP and LLMs

    Authors: Doohee You, S Fraiberger

    Abstract: This study investigates efficient deduplication techniques for a large NLP dataset of economic research paper titles. We explore various pairing methods alongside established distance measures (Levenshtein distance, cosine similarity) and a sBERT model for semantic evaluation. Our findings suggest a potentially low prevalence of duplicates based on the observed semantic similarity across different… ▽ More

    Submitted 30 June, 2025; v1 submitted 1 October, 2024; originally announced October 2024.

    Comments: 6 pages, 1 figure

  19. arXiv:2409.14837  [pdf, other

    cs.AR

    MESC: Re-thinking Algorithmic Priority and/or Criticality Inversions for Heterogeneous MCSs

    Authors: Jiapeng Guan, Ran Wei, Dean You, Yingquan Wang, Ruizhe Yang, Hui Wang, Zhe Jiang

    Abstract: Modern Mixed-Criticality Systems (MCSs) rely on hardware heterogeneity to satisfy ever-increasing computational demands. However, most of the heterogeneous co-processors are designed to achieve high throughput, with their micro-architectures executing the workloads in a streaming manner. This streaming execution is often non-preemptive or limited-preemptive, preventing tasks' prioritisation based… ▽ More

    Submitted 23 September, 2024; originally announced September 2024.

    Comments: Accepted at the 2024 IEEE Real-Time Systems Symposium (RTSS)

    ACM Class: C.3; D.4.7

  20. arXiv:2402.09430  [pdf, other

    eess.SP cs.AI cs.CV cs.MM

    WiMANS: A Benchmark Dataset for WiFi-based Multi-user Activity Sensing

    Authors: Shuokang Huang, Kaihan Li, Di You, Yichong Chen, Arvin Lin, Siying Liu, Xiaohui Li, Julie A. McCann

    Abstract: WiFi-based human sensing has exhibited remarkable potential to analyze user behaviors in a non-intrusive and device-free manner, benefiting applications as diverse as smart homes and healthcare. However, most previous works focus on single-user sensing, which has limited practicability in scenarios involving multiple users. Although recent studies have begun to investigate WiFi-based multi-user se… ▽ More

    Submitted 12 March, 2024; v1 submitted 24 January, 2024; originally announced February 2024.

    Comments: We present WiMANS, to our knowledge, the first dataset for multi-user activity sensing based on WiFi

  21. arXiv:2310.01130  [pdf, other

    eess.IV cs.IT cs.LG eess.SP

    CommIN: Semantic Image Communications as an Inverse Problem with INN-Guided Diffusion Models

    Authors: Jiakang Chen, Di You, Deniz Gündüz, Pier Luigi Dragotti

    Abstract: Joint source-channel coding schemes based on deep neural networks (DeepJSCC) have recently achieved remarkable performance for wireless image transmission. However, these methods usually focus only on the distortion of the reconstructed signal at the receiver side with respect to the source at the transmitter side, rather than the perceptual quality of the reconstruction which carries more semanti… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  22. arXiv:2306.02949  [pdf, other

    cs.CV eess.IV

    INDigo: An INN-Guided Probabilistic Diffusion Algorithm for Inverse Problems

    Authors: Di You, Andreas Floros, Pier Luigi Dragotti

    Abstract: Recently it has been shown that using diffusion models for inverse problems can lead to remarkable results. However, these approaches require a closed-form expression of the degradation model and can not support complex degradations. To overcome this limitation, we propose a method (INDigo) that combines invertible neural networks (INN) and diffusion models for general inverse problems. Specifical… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  23. arXiv:2303.15839  [pdf, other

    cs.CV

    AutoKary2022: A Large-Scale Densely Annotated Dataset for Chromosome Instance Segmentation

    Authors: Dan You, Pengcheng Xia, Qiuzhu Chen, Minghui Wu, Suncheng Xiang, Jun Wang

    Abstract: Automated chromosome instance segmentation from metaphase cell microscopic images is critical for the diagnosis of chromosomal disorders (i.e., karyotype analysis). However, it is still a challenging task due to lacking of densely annotated datasets and the complicated morphologies of chromosomes, e.g., dense distribution, arbitrary orientations, and wide range of lengths. To facilitate the develo… ▽ More

    Submitted 25 April, 2023; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: Accepted by ICME 2023

  24. arXiv:2209.05280  [pdf, other

    cs.LG cs.CE

    Non-iterative generation of an optimal mesh for a blade passage using deep reinforcement learning

    Authors: Innyoung Kim, Sejin Kim, Donghyun You

    Abstract: A method using deep reinforcement learning (DRL) to non-iteratively generate an optimal mesh for an arbitrary blade passage is developed. Despite automation in mesh generation using either an empirical approach or an optimization algorithm, repeated tuning of meshing parameters is still required for a new geometry. The method developed herein employs a DRL-based multi-condition optimization techni… ▽ More

    Submitted 9 May, 2023; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: 53 pages and 11 figures

  25. arXiv:2203.10095  [pdf, other

    eess.IV cs.CV

    AlignTransformer: Hierarchical Alignment of Visual Regions and Disease Tags for Medical Report Generation

    Authors: Di You, Fenglin Liu, Shen Ge, Xiaoxia Xie, Jing Zhang, Xian Wu

    Abstract: Recently, medical report generation, which aims to automatically generate a long and coherent descriptive paragraph of a given medical image, has received growing research interests. Different from the general image captioning tasks, medical report generation is more challenging for data-driven neural models. This is mainly due to 1) the serious data bias: the normal visual regions dominate the da… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Accepted by MICCAI 2021 (the 24th International Conference on Medical Image Computing and Computer Assisted Intervention)

  26. arXiv:2111.03454  [pdf, other

    cs.LG physics.flu-dyn

    Control of a fly-mimicking flyer in complex flow using deep reinforcement learning

    Authors: Seungpyo Hong, Sejin Kim, Donghyun You

    Abstract: An integrated framework of computational fluid-structural dynamics (CFD-CSD) and deep reinforcement learning (deep-RL) is developed for control of a fly-scale flexible-winged flyer in complex flow. Dynamics of the flyer in complex flow is highly unsteady and nonlinear, which makes modeling the dynamics challenging. Thus, conventional control methodologies, where the dynamics is modeled, are insuff… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Comments: 53 pages, 13 figures, 1 algorithm, 1 table

  27. arXiv:2110.05945  [pdf, other

    cs.LG physics.flu-dyn

    Multi-condition multi-objective optimization using deep reinforcement learning

    Authors: Sejin Kim, Innyoung Kim, Donghyun You

    Abstract: A multi-condition multi-objective optimization method that can find Pareto front over a defined condition space is developed for the first time using deep reinforcement learning. Unlike the conventional methods which perform optimization at a single condition, the present method learns the correlations between conditions and optimal solutions. The exclusive capability of the developed method is ex… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

    Comments: 46 pages, 8 figures, 1 algorithm

  28. COAST: COntrollable Arbitrary-Sampling NeTwork for Compressive Sensing

    Authors: Di You, Jian Zhang, Jingfen Xie, Bin Chen, Siwei Ma

    Abstract: Recent deep network-based compressive sensing (CS) methods have achieved great success. However, most of them regard different sampling matrices as different independent tasks and need to train a specific model for each target sampling matrix. Such practices give rise to inefficiency in computing and suffer from poor generalization ability. In this paper, we propose a novel COntrollable Arbitrary-… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: Published in IEEE Transactions on Image Processing, 2021

    Journal ref: IEEE Transactions on Image Processing, vol. 30, pp. 6066-6080, 2021

  29. arXiv:2104.10781  [pdf, other

    eess.IV cs.CV

    NTIRE 2021 Challenge on Quality Enhancement of Compressed Video: Methods and Results

    Authors: Ren Yang, Radu Timofte, Jing Liu, Yi Xu, Xinjian Zhang, Minyi Zhao, Shuigeng Zhou, Kelvin C. K. Chan, Shangchen Zhou, Xiangyu Xu, Chen Change Loy, Xin Li, Fanglong Liu, He Zheng, Lielin Jiang, Qi Zhang, Dongliang He, Fu Li, Qingqing Dang, Yibin Huang, Matteo Maggioni, Zhongqian Fu, Shuai Xiao, Cheng li, Thomas Tanay , et al. (47 additional authors not shown)

    Abstract: This paper reviews the first NTIRE challenge on quality enhancement of compressed video, with a focus on the proposed methods and results. In this challenge, the new Large-scale Diverse Video (LDV) dataset is employed. The challenge has three tracks. Tracks 1 and 2 aim at enhancing the videos compressed by HEVC at a fixed QP, while Track 3 is designed for enhancing the videos compressed by x265 at… ▽ More

    Submitted 31 August, 2022; v1 submitted 21 April, 2021; originally announced April 2021.

    Comments: Corrected the MOS values in Table 2, and corrected some minor typos

  30. arXiv:2103.11554  [pdf, other

    cs.CV eess.IV

    ISTA-Net++: Flexible Deep Unfolding Network for Compressive Sensing

    Authors: Di You, Jingfen Xie, Jian Zhang

    Abstract: While deep neural networks have achieved impressive success in image compressive sensing (CS), most of them lack flexibility when dealing with multi-ratio tasks and multi-scene images in practical applications. To tackle these challenges, we propose a novel end-to-end flexible ISTA-unfolding deep network, dubbed ISTA-Net++, with superior performance and strong flexibility. Specifically, by develop… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: ICME 2021 ORAL accepted

  31. arXiv:2008.13335  [pdf, other

    cs.IR cs.AI cs.HC cs.NE

    Quaternion-Based Self-Attentive Long Short-Term User Preference Encoding for Recommendation

    Authors: Thanh Tran, Di You, Kyumin Lee

    Abstract: Quaternion space has brought several benefits over the traditional Euclidean space: Quaternions (i) consist of a real and three imaginary components, encouraging richer representations; (ii) utilize Hamilton product which better encodes the inter-latent interactions across multiple Quaternion components; and (iii) result in a model with smaller degrees of freedom and less prone to overfitting. Unf… ▽ More

    Submitted 30 August, 2020; originally announced August 2020.

    Journal ref: CIKM 2020

  32. arXiv:2001.02214  [pdf, other

    cs.IR cs.CL cs.SI

    Attributed Multi-Relational Attention Network for Fact-checking URL Recommendation

    Authors: Di You, Nguyen Vo, Kyumin Lee, Qiang Liu

    Abstract: To combat fake news, researchers mostly focused on detecting fake news and journalists built and maintained fact-checking sites (e.g., Snopes.com and Politifact.com). However, fake news dissemination has been greatly promoted via social media sites, and these fact-checking sites have not been fully utilized. To overcome these problems and complement existing methods against fake news, in this pape… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: CIKM2019

  33. arXiv:1909.11190  [pdf, ps, other

    physics.soc-ph cs.CY

    Mobile Phone Data for Children on the Move: Challenges and Opportunities

    Authors: Vedran Sekara, Elisa Omodei, Laura Healy, Jan Beise, Claus Hansen, Danzhen You, Saskia Blume, Manuel Garcia-Herranz

    Abstract: Today, 95% of the global population has 2G mobile phone coverage and the number of individuals who own a mobile phone is at an all time high. Mobile phones generate rich data on billions of people across different societal contexts and have in the last decade helped redefine how we do research and build tools to understand society. As such, mobile phone data has the potential to revolutionize how… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: 13 pages, book chapter

  34. arXiv:1906.02448  [pdf, other

    cs.CL cs.LG stat.ML

    Bridging the Gap between Training and Inference for Neural Machine Translation

    Authors: Wen Zhang, Yang Feng, Fandong Meng, Di You, Qun Liu

    Abstract: Neural Machine Translation (NMT) generates target words sequentially in the way of predicting the next word conditioned on the context words. At training time, it predicts with the ground truth words as context while at inference it has to generate the entire sequence from scratch. This discrepancy of the fed context leads to error accumulation among the way. Furthermore, word-level training requi… ▽ More

    Submitted 17 June, 2019; v1 submitted 6 June, 2019; originally announced June 2019.

    Comments: 10 pages, 7 figures

  35. arXiv:1808.05382  [pdf, other

    physics.ao-ph cs.CV

    Typhoon track prediction using satellite images in a Generative Adversarial Network

    Authors: Mario Rüttgers, Sangseung Lee, Donghyun You

    Abstract: Tracks of typhoons are predicted using satellite images as input for a Generative Adversarial Network (GAN). The satellite images have time gaps of 6 hours and are marked with a red square at the location of the typhoon center. The GAN uses images from the past to generate an image one time step ahead. The generated image shows the future location of the typhoon center, as well as the future cloud… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

  36. arXiv:1501.04777  [pdf

    cs.FL

    Transformation From Legal-marking Set to Admissible-marking Set of Petri Nets With Uncontrollable Transitions

    Authors: ShouGuang Wang, Dan You, MengChu Zhou, Carla Seatsu

    Abstract: Linear constraint transformation is an essential step to solve the forbidden state problem in Petri nets that contain uncontrollable transitions. This work studies the equivalent transformation from a legal-marking set to its admissible-marking set given such a net. First, the concepts of an escaping-marking set and a transforming marking set are defined. Based on them, two algorithms are given to… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

    Comments: 13 pages,13 figures, and the second version of TAC

    MSC Class: 00-01