Skip to main content

Showing 1–14 of 14 results for author: Shu, A

.
  1. arXiv:2312.00085  [pdf, other

    cs.CV

    X-Dreamer: Creating High-quality 3D Content by Bridging the Domain Gap Between Text-to-2D and Text-to-3D Generation

    Authors: Yiwei Ma, Yijun Fan, Jiayi Ji, Haowei Wang, Xiaoshuai Sun, Guannan Jiang, Annan Shu, Rongrong Ji

    Abstract: In recent times, automatic text-to-3D content creation has made significant progress, driven by the development of pretrained 2D diffusion models. Existing text-to-3D methods typically optimize the 3D representation to ensure that the rendered image aligns well with the given text, as evaluated by the pretrained 2D diffusion model. Nevertheless, a substantial domain gap exists between 2D images an… ▽ More

    Submitted 30 July, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: ToMM24

  2. arXiv:2308.05359  [pdf, other

    cs.CV

    Pseudo-label Alignment for Semi-supervised Instance Segmentation

    Authors: Jie Hu, Chen Chen, Liujuan Cao, Shengchuan Zhang, Annan Shu, Guannan Jiang, Rongrong Ji

    Abstract: Pseudo-labeling is significant for semi-supervised instance segmentation, which generates instance masks and classes from unannotated images for subsequent training. However, in existing pipelines, pseudo-labels that contain valuable information may be directly filtered out due to mismatches in class and mask quality. To address this issue, we propose a novel framework, called pseudo-label alignin… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  3. arXiv:2306.15706  [pdf, other

    cs.CV

    Approximated Prompt Tuning for Vision-Language Pre-trained Models

    Authors: Qiong Wu, Shubin Huang, Yiyi Zhou, Pingyang Dai, Annan Shu, Guannan Jiang, Rongrong Ji

    Abstract: Prompt tuning is a parameter-efficient way to deploy large-scale pre-trained models to downstream tasks by adding task-specific tokens. In terms of vision-language pre-trained (VLP) models, prompt tuning often requires a large number of learnable tokens to bridge the gap between the pre-training and downstream tasks, which greatly exacerbates the already high computational overhead. In this paper,… ▽ More

    Submitted 21 August, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  4. arXiv:2303.09048  [pdf, other

    cs.SD cs.AI cs.LG cs.MM eess.AS

    Improving Perceptual Quality, Intelligibility, and Acoustics on VoIP Platforms

    Authors: Joseph Konan, Ojas Bhargave, Shikhar Agnihotri, Hojeong Lee, Ankit Shah, Shuo Han, Yunyang Zeng, Amanda Shu, Haohui Liu, Xuankai Chang, Hamza Khalid, Minseon Gwak, Kawon Lee, Minjeong Kim, Bhiksha Raj

    Abstract: In this paper, we present a method for fine-tuning models trained on the Deep Noise Suppression (DNS) 2020 Challenge to improve their performance on Voice over Internet Protocol (VoIP) applications. Our approach involves adapting the DNS 2020 models to the specific acoustic characteristics of VoIP communications, which includes distortion and artifacts caused by compression, transmission, and plat… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: Under review at European Association for Signal Processing. 5 pages

  5. arXiv:2301.09027  [pdf, other

    cs.SD cs.LG eess.AS

    Cellular Network Speech Enhancement: Removing Background and Transmission Noise

    Authors: Amanda Shu, Hamza Khalid, Haohui Liu, Shikhar Agnihotri, Joseph Konan, Ojas Bhargave

    Abstract: The primary objective of speech enhancement is to reduce background noise while preserving the target's speech. A common dilemma occurs when a speaker is confined to a noisy environment and receives a call with high background and transmission noise. To address this problem, the Deep Noise Suppression (DNS) Challenge focuses on removing the background noise with the next-generation deep learning m… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

  6. Surpassing the Thermal Cramer-Rao Bound with Collisional Thermometry

    Authors: Angeline Shu, Stella Seah, Valerio Scarani

    Abstract: In collisional thermometry, a system in contact with the thermal bath is probed by a stream of ancillas. Coherences and collective measurements were shown to improve the Fisher information in some parameter regimes, for a stream of independent and identically prepared (i.i.d.) ancillas in some specific states [Seah et al., Phys. Rev. Lett., 180602 (2019)]. Here we refine the analysis of this metro… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

    Comments: 6 pages, 5 figures

    Journal ref: Phys. Rev. A 102, 042417 (2020)

  7. Almost thermal operations: inhomogeneous reservoirs

    Authors: Angeline Shu, Yu Cai, Stella Seah, Stefan Nimmrichter, Valerio Scarani

    Abstract: The resource theory of thermal operations explains the state transformations that are possible in a very specific thermodynamic setting: there is only one thermal bath, auxiliary systems can only be in corresponding thermal state (free states), and the interaction must commute with the free Hamiltonian (free operation). In this paper we study the mildest deviation: the reservoir particles are subj… ▽ More

    Submitted 11 October, 2019; v1 submitted 18 April, 2019; originally announced April 2019.

    Comments: 9 pages, 5 figures. Supersedes submission arXiv:1806.08108

    Journal ref: Phys. Rev. A 100, 042107 (2019)

  8. arXiv:1809.09897  [pdf, ps, other

    math.CO

    Some Sufficient Conditions on Pancyclic Graphs

    Authors: Guidong Yu, Tao Yu, Axiu Shu, Xiangwei Xia

    Abstract: A pancyclic graph is a graph that contains cycles of all possible lengths from three up to the number of vertices in the graph. In this paper, we establish some new sufficient conditions for a graph to be pancyclic in terms of the edge number, the spectral radius and the signless Laplacian spectral radius of the graph.

    Submitted 26 September, 2018; originally announced September 2018.

  9. arXiv:1808.05557  [pdf

    physics.app-ph cond-mat.mes-hall

    Digital Biosensing By Foundry-Fabricated Graphene Sensors

    Authors: Brett R Goldsmith, Lauren Locascio, Yingning Gao, Mitchell Lerner, Amy Walker, Jeremy Lerner, Jayla Kyaw, Angela Shue, Savannah Afsahi, Deng Pan, Jolie Nokes, Francie Barron

    Abstract: Biomedical and environmental testing currently require access to highly specialized facilities or extensive training. Current biochemical tests require complex reagents to achieve a simple human readable result such as a color change. This results in low-information tests, with high reagent costs. To maximize information from testing while minimizing costs, biotechnology should leverage complex an… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

    Comments: contact corresponding author at [email protected]

  10. arXiv:1806.08108  [pdf, ps, other

    quant-ph

    Violation of all the second laws of thermal operations by inhomogeneous reservoirs

    Authors: Angeline Shu, Yu Cai, Stella Seah, Stefan Nimmrichter, Valerio Scarani

    Abstract: In the resource theory of thermodynamics, the decrease of the free energy based on von Neumann entropy is not a sufficient condition to determine free evolution. Rather, a whole family of generalised free energies $F_α$ must be monotonically decreasing. We study the resilience of this result to relaxations of the framework. We use a toy collisional model, in which the deviations from the ideal sit… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

    Comments: 7 pages, 4 figures

  11. Power of an optical Maxwell's demon in the presence of photon-number correlations

    Authors: Angeline Shu, Jibo Dai, Valerio Scarani

    Abstract: We study how correlations affect the performance of the simulator of a Maxwell's demon demonstrated in a recent optical experiment [Vidrighin et al., Phys. Rev. Lett. 116, 050401 (2016)]. The power of the demon is found to be enhanced or hindered, depending on the nature of the correlation, in close analogy to the situation faced by a thermal demon.

    Submitted 26 February, 2017; v1 submitted 3 November, 2016; originally announced November 2016.

    Comments: 10 pages, 8 figures

    Journal ref: Phys. Rev. A 95, 022123 (2017)

  12. arXiv:1212.3228  [pdf

    cs.CL cs.IR cs.SI

    Language Without Words: A Pointillist Model for Natural Language Processing

    Authors: Peiyou Song, Anhei Shu, David Phipps, Dan Wallach, Mohit Tiwari, Jedidiah Crandall, George Luger

    Abstract: This paper explores two separate questions: Can we perform natural language processing tasks without a lexicon?; and, Should we? Existing natural language processing techniques are either based on words as units or use units such as grams only for basic classification tasks. How close can a machine come to reasoning about the meanings of words and phrases in a corpus without using any lexicon, bas… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 5 pages, 2 figures

    ACM Class: I.2.7; H.2.8; H.3.1

    Journal ref: The 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) Kobe, Japan

  13. arXiv:1206.4958  [pdf

    cs.IR cs.CL cs.SI

    A Pointillism Approach for Natural Language Processing of Social Media

    Authors: Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, Jedidiah R. Crandall

    Abstract: The Chinese language poses challenges for natural language processing based on the unit of a word even for formal uses of the Chinese language, social media only makes word segmentation in Chinese even more difficult. In this document we propose a pointillism approach to natural language processing. Rather than words that have individual meanings, the basic unit of a pointillism approach is trigra… ▽ More

    Submitted 21 June, 2012; originally announced June 2012.

    Comments: 8 pages, 5 figures

  14. arXiv:1102.2445  [pdf, other

    cs.CR

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Authors: Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach

    Abstract: Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused De… ▽ More

    Submitted 11 February, 2011; originally announced February 2011.