Skip to main content

Showing 1–8 of 8 results for author: Shu, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00085  [pdf, other

    cs.CV

    X-Dreamer: Creating High-quality 3D Content by Bridging the Domain Gap Between Text-to-2D and Text-to-3D Generation

    Authors: Yiwei Ma, Yijun Fan, Jiayi Ji, Haowei Wang, Xiaoshuai Sun, Guannan Jiang, Annan Shu, Rongrong Ji

    Abstract: In recent times, automatic text-to-3D content creation has made significant progress, driven by the development of pretrained 2D diffusion models. Existing text-to-3D methods typically optimize the 3D representation to ensure that the rendered image aligns well with the given text, as evaluated by the pretrained 2D diffusion model. Nevertheless, a substantial domain gap exists between 2D images an… ▽ More

    Submitted 30 July, 2024; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: ToMM24

  2. arXiv:2308.05359  [pdf, other

    cs.CV

    Pseudo-label Alignment for Semi-supervised Instance Segmentation

    Authors: Jie Hu, Chen Chen, Liujuan Cao, Shengchuan Zhang, Annan Shu, Guannan Jiang, Rongrong Ji

    Abstract: Pseudo-labeling is significant for semi-supervised instance segmentation, which generates instance masks and classes from unannotated images for subsequent training. However, in existing pipelines, pseudo-labels that contain valuable information may be directly filtered out due to mismatches in class and mask quality. To address this issue, we propose a novel framework, called pseudo-label alignin… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  3. arXiv:2306.15706  [pdf, other

    cs.CV

    Approximated Prompt Tuning for Vision-Language Pre-trained Models

    Authors: Qiong Wu, Shubin Huang, Yiyi Zhou, Pingyang Dai, Annan Shu, Guannan Jiang, Rongrong Ji

    Abstract: Prompt tuning is a parameter-efficient way to deploy large-scale pre-trained models to downstream tasks by adding task-specific tokens. In terms of vision-language pre-trained (VLP) models, prompt tuning often requires a large number of learnable tokens to bridge the gap between the pre-training and downstream tasks, which greatly exacerbates the already high computational overhead. In this paper,… ▽ More

    Submitted 21 August, 2023; v1 submitted 27 June, 2023; originally announced June 2023.

  4. arXiv:2303.09048  [pdf, other

    cs.SD cs.AI cs.LG cs.MM eess.AS

    Improving Perceptual Quality, Intelligibility, and Acoustics on VoIP Platforms

    Authors: Joseph Konan, Ojas Bhargave, Shikhar Agnihotri, Hojeong Lee, Ankit Shah, Shuo Han, Yunyang Zeng, Amanda Shu, Haohui Liu, Xuankai Chang, Hamza Khalid, Minseon Gwak, Kawon Lee, Minjeong Kim, Bhiksha Raj

    Abstract: In this paper, we present a method for fine-tuning models trained on the Deep Noise Suppression (DNS) 2020 Challenge to improve their performance on Voice over Internet Protocol (VoIP) applications. Our approach involves adapting the DNS 2020 models to the specific acoustic characteristics of VoIP communications, which includes distortion and artifacts caused by compression, transmission, and plat… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: Under review at European Association for Signal Processing. 5 pages

  5. arXiv:2301.09027  [pdf, other

    cs.SD cs.LG eess.AS

    Cellular Network Speech Enhancement: Removing Background and Transmission Noise

    Authors: Amanda Shu, Hamza Khalid, Haohui Liu, Shikhar Agnihotri, Joseph Konan, Ojas Bhargave

    Abstract: The primary objective of speech enhancement is to reduce background noise while preserving the target's speech. A common dilemma occurs when a speaker is confined to a noisy environment and receives a call with high background and transmission noise. To address this problem, the Deep Noise Suppression (DNS) Challenge focuses on removing the background noise with the next-generation deep learning m… ▽ More

    Submitted 21 January, 2023; originally announced January 2023.

  6. arXiv:1212.3228  [pdf

    cs.CL cs.IR cs.SI

    Language Without Words: A Pointillist Model for Natural Language Processing

    Authors: Peiyou Song, Anhei Shu, David Phipps, Dan Wallach, Mohit Tiwari, Jedidiah Crandall, George Luger

    Abstract: This paper explores two separate questions: Can we perform natural language processing tasks without a lexicon?; and, Should we? Existing natural language processing techniques are either based on words as units or use units such as grams only for basic classification tasks. How close can a machine come to reasoning about the meanings of words and phrases in a corpus without using any lexicon, bas… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 5 pages, 2 figures

    ACM Class: I.2.7; H.2.8; H.3.1

    Journal ref: The 6th International Conference on Soft Computing and Intelligent Systems (SCIS-ISIS 2012) Kobe, Japan

  7. arXiv:1206.4958  [pdf

    cs.IR cs.CL cs.SI

    A Pointillism Approach for Natural Language Processing of Social Media

    Authors: Peiyou Song, Anhei Shu, Anyu Zhou, Dan Wallach, Jedidiah R. Crandall

    Abstract: The Chinese language poses challenges for natural language processing based on the unit of a word even for formal uses of the Chinese language, social media only makes word segmentation in Chinese even more difficult. In this document we propose a pointillism approach to natural language processing. Rather than words that have individual meanings, the basic unit of a pointillism approach is trigra… ▽ More

    Submitted 21 June, 2012; originally announced June 2012.

    Comments: 8 pages, 5 figures

  8. arXiv:1102.2445  [pdf, other

    cs.CR

    Quire: Lightweight Provenance for Smart Phone Operating Systems

    Authors: Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach

    Abstract: Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused De… ▽ More

    Submitted 11 February, 2011; originally announced February 2011.