Skip to main content

Showing 1–20 of 20 results for author: Bu, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2603.13956  [pdf, ps, other

    cs.AI

    EviAgent: Evidence-Driven Agent for Radiology Report Generation

    Authors: Tuoshi Qi, Shenshen Bu, Yingfei Xiang, Zhiming Dai

    Abstract: Automated radiology report generation holds immense potential to alleviate the heavy workload of radiologists. Despite the formidable vision-language capabilities of recent Multimodal Large Language Models (MLLMs), their clinical deployment is severely constrained by inherent limitations: their "black-box" decision-making renders the generated reports untraceable due to the lack of explicit visual… ▽ More

    Submitted 14 March, 2026; originally announced March 2026.

  2. arXiv:2507.15683  [pdf, ps, other

    cs.CV

    Hi^2-GSLoc: Dual-Hierarchical Gaussian-Specific Visual Relocalization for Remote Sensing

    Authors: Boni Hu, Zhenyu Xia, Lin Chen, Pengcheng Han, Shuhui Bu

    Abstract: Visual relocalization, which estimates the 6-degree-of-freedom (6-DoF) camera pose from query images, is fundamental to remote sensing and UAV applications. Existing methods face inherent trade-offs: image-based retrieval and pose regression approaches lack precision, while structure-based methods that register queries to Structure-from-Motion (SfM) models suffer from computational complexity and… ▽ More

    Submitted 21 July, 2025; originally announced July 2025.

    Comments: 17 pages, 11 figures

  3. arXiv:2504.11867   

    cs.CR

    MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN

    Authors: Qi Liu, Yanchen Liu, Ruifeng Li, Chenhong Cao, Yufeng Li, Xingyu Li, Peng Wang, Runhan Feng, Shiyang Bu

    Abstract: The integration of intelligent and connected technologies in modern vehicles, while offering enhanced functionalities through Electronic Control Unit (ECU) and interfaces like OBD-II and telematics, also exposes the vehicle's in-vehicle network (IVN) to potential cyberattacks. Unlike prior work, we identify a new time-exciting threat model against IVN. These attacks inject malicious messages that… ▽ More

    Submitted 21 April, 2025; v1 submitted 16 April, 2025; originally announced April 2025.

    Comments: This work was intended as a replacement of arXiv:2411.10258 and any subsequent updates will appear there

  4. arXiv:2411.10258  [pdf, other

    cs.CR cs.LG cs.NI

    MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN

    Authors: Qi Liu, Yanchen Liu, Ruifeng Li, Chenhong Cao, Yufeng Li, Xingyu Li, Peng Wang, Runhan Feng, Shiyang Bu

    Abstract: The integration of intelligent and connected technologies in modern vehicles, while offering enhanced functionalities through Electronic Control Unit (ECU) and interfaces like OBD-II and telematics, also exposes the vehicle's in-vehicle network (IVN) to potential cyberattacks. Unlike prior work, we identify a new time-exciting threat model against IVN. These attacks inject malicious messages that… ▽ More

    Submitted 21 April, 2025; v1 submitted 15 November, 2024; originally announced November 2024.

    Comments: Previously this version appeared as arXiv:2504.11867 which was submitted as a new work by accident

  5. CurriculumLoc: Enhancing Cross-Domain Geolocalization through Multi-Stage Refinement

    Authors: Boni Hu, Lin Chen, Runjian Chen, Shuhui Bu, Pengcheng Han, Haowei Li

    Abstract: Visual geolocalization is a cost-effective and scalable task that involves matching one or more query images, taken at some unknown location, to a set of geo-tagged reference images. Existing methods, devoted to semantic features representation, evolving towards robustness to a wide variety between query and reference, including illumination and viewpoint changes, as well as scale and seasonal var… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 14 pages, 15 figures

  6. arXiv:2305.06924   

    cs.GT cs.AI cs.LG

    An Imitation Learning Based Algorithm Enabling Priori Knowledge Transfer in Modern Electricity Markets for Bayesian Nash Equilibrium Estimation

    Authors: Ziqing Zhu, Ka Wing Chan, Siqi Bu, Ze Hu, Shiwei Xia

    Abstract: The Nash Equilibrium (NE) estimation in bidding games of electricity markets is the key concern of both generation companies (GENCOs) for bidding strategy optimization and the Independent System Operator (ISO) for market surveillance. However, existing methods for NE estimation in emerging modern electricity markets (FEM) are inaccurate and inefficient because the priori knowledge of bidding strat… ▽ More

    Submitted 11 May, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

    Comments: It is old version with mistakes

  7. arXiv:2305.06921   

    cs.GT cs.AI cs.LG

    How to Use Reinforcement Learning to Facilitate Future Electricity Market Design? Part 2: Method and Applications

    Authors: Ziqing Zhu, Siqi Bu, Ka Wing Chan, Bin Zhou, Shiwei Xia

    Abstract: This two-part paper develops a paradigmatic theory and detailed methods of the joint electricity market design using reinforcement-learning (RL)-based simulation. In Part 2, this theory is further demonstrated by elaborating detailed methods of designing an electricity spot market (ESM), together with a reserved capacity product (RC) in the ancillary service market (ASM) and a virtual bidding (VB)… ▽ More

    Submitted 11 May, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

    Comments: It is old version with mistakes

  8. arXiv:2305.02485   

    cs.AI cs.LG eess.SY

    How to Use Reinforcement Learning to Facilitate Future Electricity Market Design? Part 1: A Paradigmatic Theory

    Authors: Ziqing Zhu, Siqi Bu, Ka Wing Chan, Bin Zhou, Shiwei Xia

    Abstract: In face of the pressing need of decarbonization in the power sector, the re-design of electricity market is necessary as a Marco-level approach to accommodate the high penetration of renewable generations, and to achieve power system operation security, economic efficiency, and environmental friendliness. However, existing market design methodologies suffer from the lack of coordination among ener… ▽ More

    Submitted 11 May, 2023; v1 submitted 3 May, 2023; originally announced May 2023.

    Comments: It is old version with mistakes

  9. arXiv:2304.04943  [pdf, other

    cs.RO

    ClusterFusion: Real-time Relative Positioning and Dense Reconstruction for UAV Cluster

    Authors: Yifei Dong, Shuhui Bu, Kun Li, Lin Chen, Zhenyu Xia, Yu Wang, Pengcheng Han, Xuefeng Cao, Ke Li

    Abstract: As robotics technology advances, dense point cloud maps are increasingly in demand. However, dense reconstruction using a single unmanned aerial vehicle (UAV) suffers from limitations in flight speed and battery power, resulting in slow reconstruction and low coverage. Cluster UAV systems offer greater flexibility and wider coverage for map building. Existing methods of cluster UAVs face challenge… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  10. arXiv:2304.04508  [pdf, other

    cs.CV cs.RO

    HybridFusion: LiDAR and Vision Cross-Source Point Cloud Fusion

    Authors: Yu Wang, Shuhui Bu, Lin Chen, Yifei Dong, Kun Li, Xuefeng Cao, Ke Li

    Abstract: Recently, cross-source point cloud registration from different sensors has become a significant research focus. However, traditional methods confront challenges due to the varying density and structure of cross-source point clouds. In order to solve these problems, we propose a cross-source point cloud fusion algorithm called HybridFusion. It can register cross-source dense point clouds from diffe… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

  11. arXiv:2206.11715  [pdf, other

    cs.DC cs.LG

    Deep Reinforcement Learning-Assisted Federated Learning for Robust Short-term Utility Demand Forecasting in Electricity Wholesale Markets

    Authors: Chenghao Huang, Weilong Chen, Shengrong Bu, Yanru Zhang

    Abstract: Short-term load forecasting (STLF) plays a significant role in the operation of electricity trading markets. Considering the growing concern of data privacy, federated learning (FL) is increasingly adopted to train STLF models for utility companies (UCs) in recent research. Inspiringly, in wholesale markets, as it is not realistic for power plants (PPs) to access UCs' data directly, FL is definite… ▽ More

    Submitted 25 July, 2023; v1 submitted 23 June, 2022; originally announced June 2022.

  12. arXiv:2205.08369   

    cs.LG cs.GT eess.SY

    Applications of Reinforcement Learning in Deregulated Power Market: A Comprehensive Review

    Authors: Ziqing Zhu, Ze Hu, Ka Wing Chan, Siqi Bu, Bin Zhou, Shiwei Xia

    Abstract: The increasing penetration of renewable generations, along with the deregulation and marketization of power industry, promotes the transformation of power market operation paradigms. The optimal bidding strategy and dispatching methodology under these new paradigms are prioritized concerns for both market participants and power system operators, with obstacles of uncertain characteristics, computa… ▽ More

    Submitted 11 May, 2023; v1 submitted 7 May, 2022; originally announced May 2022.

    Comments: It is old version with mistakes

  13. arXiv:2203.07585  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Accelerating Stochastic Probabilistic Inference

    Authors: Minta Liu, Suliang Bu

    Abstract: Recently, Stochastic Variational Inference (SVI) has been increasingly attractive thanks to its ability to find good posterior approximations of probabilistic models. It optimizes the variational objective with stochastic optimization, following noisy estimates of the natural gradient. However, almost all the state-of-the-art SVI algorithms are based on first-order optimization algorithm and often… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  14. arXiv:2108.08464  [pdf, other

    cs.PL

    Svar: A Tiny C++ Header Brings Unified Interface for Multiple programming Languages

    Authors: Yong Zhao, Pengcheng Zhao, Shibiao Xu, Lin Chen, Pengcheng Han, Shuhui Bu, Hongkai Jiang

    Abstract: There are numerous types of programming languages developed in the last decades, and most of them provide interface to call C++ or C for high efficiency implementation. The motivation of Svar is to design an efficient, light-weighted and general middle-ware for multiple languages, meanwhile, brings the dynamism features from script language to C++ in a straightforward way. Firstly, a Svar class wi… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

  15. arXiv:2102.08465  [pdf, other

    cs.SI cs.DL cs.IR cs.LG

    Prioritizing Original News on Facebook

    Authors: Xiuyan Ni, Shujian Bu, Igor L. Markov

    Abstract: This work outlines how we prioritize original news, a critical indicator of news quality. By examining the landscape and life-cycle of news posts on our social media platform, we identify challenges of building and deploying an originality score. We pursue an approach based on normalized PageRank values and three-step clustering, and refresh the score on an hourly basis to capture the dynamics of… ▽ More

    Submitted 14 March, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: 9 pages, 8 figures, 6 tables, 2 algorithm pseudocodes

    Journal ref: CIKM 2021

  16. arXiv:2003.08763  [pdf

    cs.CV cs.IR cs.LG stat.ML

    Shape retrieval of non-rigid 3d human models

    Authors: David Pickup, Xianfang Sun, Paul L Rosin, Ralph R Martin, Z Cheng, Zhouhui Lian, Masaki Aono, A Ben Hamza, A Bronstein, M Bronstein, S Bu, Umberto Castellani, S Cheng, Valeria Garro, Andrea Giachetti, Afzal Godil, Luca Isaia, J Han, Henry Johan, L Lai, Bo Li, C Li, Haisheng Li, Roee Litman, X Liu , et al. (6 additional authors not shown)

    Abstract: 3D models of humans are commonly used within computer graphics and vision, and so the ability to distinguish between body shapes is an important shape retrieval problem. We extend our recent paper which provided a benchmark for testing non-rigid 3D shape retrieval algorithms on 3D human models. This benchmark provided a far stricter challenge than previous shape benchmarks. We have added 145 new m… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: International Journal of Computer Vision, 2016

  17. arXiv:1909.03278  [pdf

    q-fin.TR cs.AI

    Automatic Financial Trading Agent for Low-risk Portfolio Management using Deep Reinforcement Learning

    Authors: Wonsup Shin, Seok-Jun Bu, Sung-Bae Cho

    Abstract: The autonomous trading agent is one of the most actively studied areas of artificial intelligence to solve the capital market portfolio management problem. The two primary goals of the portfolio management problem are maximizing profit and restrainting risk. However, most approaches to this problem solely take account of maximizing returns. Therefore, this paper proposes a deep reinforcement learn… ▽ More

    Submitted 7 September, 2019; originally announced September 2019.

    Comments: 18 pages

  18. arXiv:1902.07995  [pdf, other

    cs.CV

    GSLAM: A General SLAM Framework and Benchmark

    Authors: Yong Zhao, Shibiao Xu, Shuhui Bu, Hongkai Jiang, Pengcheng Han

    Abstract: SLAM technology has recently seen many successes and attracted the attention of high-technological companies. However, how to unify the interface of existing or emerging algorithms, and effectively perform benchmark about the speed, robustness and portability are still problems. In this paper, we propose a novel SLAM platform named GSLAM, which not only provides evaluation functionality, but also… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

  19. arXiv:1701.03922  [pdf, ps, other

    cs.GT cs.DC

    Computing Resource Allocation in Three-Tier IoT Fog Networks: a Joint Optimization Approach Combining Stackelberg Game and Matching

    Authors: Huaqing Zhang, Yong Xiao, Shengrong Bu, Dusit Niyato, Richard Yu, Zhu Han

    Abstract: Fog computing is a promising architecture to provide economic and low latency data services for future Internet of things (IoT)-based network systems. It relies on a set of low-power fog nodes that are close to the end users to offload the services originally targeting at cloud data centers. In this paper, we consider a specific fog computing network consisting of a set of data service operators (… ▽ More

    Submitted 14 January, 2017; originally announced January 2017.

  20. arXiv:1406.0588  [pdf, other

    cs.CV

    Image retrieval with hierarchical matching pursuit

    Authors: Shasha Bu, Yu-Jin Zhang

    Abstract: A novel representation of images for image retrieval is introduced in this paper, by using a new type of feature with remarkable discriminative power. Despite the multi-scale nature of objects, most existing models perform feature extraction on a fixed scale, which will inevitably degrade the performance of the whole system. Motivated by this, we introduce a hierarchical sparse coding architecture… ▽ More

    Submitted 4 June, 2014; v1 submitted 3 June, 2014; originally announced June 2014.

    Comments: 5 pages, 6 figures, conference