Skip to main content

Showing 1–26 of 26 results for author: Shen, G

Searching in archive eess. Search in all archives.
.
  1. arXiv:2506.21510  [pdf, ps, other

    eess.SY

    Joint Scheduling of DER under Demand Charges: Structure and Approximation

    Authors: Ruixiao Yang, Gulai Shen, Ahmed S. Alahmed, Chuchu Fan

    Abstract: We study the joint scheduling of behind-the-meter distributed energy resources (DERs), including flexible loads, renewable generation, and battery energy storage systems, under net energy metering frameworks with demand charges. The problem is formulated as a stochastic dynamic program aimed at maximizing expected operational surplus while accounting for renewable generation uncertainty. We analyt… ▽ More

    Submitted 26 June, 2025; originally announced June 2025.

    Comments: 15 pages, 4 tables, 4 figures

  2. arXiv:2506.17636  [pdf, ps, other

    cs.GR cs.CV eess.IV

    3D Gaussian Splatting for Fine-Detailed Surface Reconstruction in Large-Scale Scene

    Authors: Shihan Chen, Zhaojin Li, Zeyu Chen, Qingsong Yan, Gaoyang Shen, Ran Duan

    Abstract: Recent developments in 3D Gaussian Splatting have made significant advances in surface reconstruction. However, scaling these methods to large-scale scenes remains challenging due to high computational demands and the complex dynamic appearances typical of outdoor environments. These challenges hinder the application in aerial surveying and autonomous driving. This paper proposes a novel solution… ▽ More

    Submitted 21 June, 2025; originally announced June 2025.

    Comments: IROS 2025

  3. Physical Layer-Based Device Fingerprinting for Wireless Security: From Theory to Practice

    Authors: Junqing Zhang, Francesco Ardizzon, Mattia Piana, Guanxiong Shen, Stefano Tomasin

    Abstract: The identification of the devices from which a message is received is part of security mechanisms to ensure authentication in wireless communications. Conventional authentication approaches are cryptography-based, which, however, are usually computationally expensive and not adequate in the Internet of Things (IoT), where devices tend to be low-cost and with limited resources. This paper provides… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

  4. arXiv:2506.08319  [pdf, ps, other

    eess.SY cs.RO

    DEKC: Data-Enable Control for Tethered Space Robot Deployment in the Presence of Uncertainty via Koopman Operator Theory

    Authors: Ao Jin, Qinyi Wang, Sijie Wen, Ya Liu, Ganghui Shen, Panfeng Huang, Fan Zhang

    Abstract: This work focuses the deployment of tethered space robot in the presence of unknown uncertainty. A data-enable framework called DEKC which contains offline training part and online execution part is proposed to deploy tethered space robot in the presence of uncertainty. The main idea of this work is modeling the unknown uncertainty as a dynamical system, which enables high accuracy and convergence… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

    Comments: 12 pages

  5. arXiv:2506.00981  [pdf, ps, other

    cs.CL cs.AI cs.SD eess.AS

    What do self-supervised speech models know about Dutch? Analyzing advantages of language-specific pre-training

    Authors: Marianne de Heer Kloots, Hosein Mohebbi, Charlotte Pouw, Gaofei Shen, Willem Zuidema, Martijn Bentum

    Abstract: How language-specific are speech representations learned by self-supervised models? Existing work has shown that a range of linguistic features can be successfully decoded from end-to-end models trained only on speech recordings. However, it's less clear to what extent pre-training on specific languages improves language-specific linguistic information. Here we test the encoding of Dutch phonetic… ▽ More

    Submitted 10 July, 2025; v1 submitted 1 June, 2025; originally announced June 2025.

    Comments: Accepted to Interspeech 2025. For model, code, and materials, see https://github.com/mdhk/SSL-NL-eval

    Journal ref: Proc. INTERSPEECH 2025

  6. arXiv:2505.16406  [pdf, ps, other

    cs.CL eess.AS

    On the reliability of feature attribution methods for speech classification

    Authors: Gaofei Shen, Hosein Mohebbi, Arianna Bisazza, Afra Alishahi, Grzegorz Chrupała

    Abstract: As the capabilities of large-scale pre-trained models evolve, understanding the determinants of their outputs becomes more important. Feature attribution aims to reveal which parts of the input elements contribute the most to model outputs. In speech processing, the unique characteristics of the input signal make the application of feature attribution methods challenging. We study how factors such… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  7. arXiv:2505.15041  [pdf, ps, other

    eess.SY

    Co-optimize condenser water temperature and cooling tower fan using high-fidelity synthetic data

    Authors: Gulai Shen, Gurpreet Singh, Ali Mehmani

    Abstract: This paper introduces a novel method for optimizing HVAC systems in buildings by integrating a high-fidelity physics-based simulation model with machine learning and measured data. The method enables a real-time building advisory system that provides optimized settings for condenser water loop operation, assisting building operators in decision-making. The building and its HVAC system are first mo… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  8. Advancing Video Anomaly Detection: A Bi-Directional Hybrid Framework for Enhanced Single- and Multi-Task Approaches

    Authors: Guodong Shen, Yuqi Ouyang, Junru Lu, Yixuan Yang, Victor Sanchez

    Abstract: Despite the prevailing transition from single-task to multi-task approaches in video anomaly detection, we observe that many adopt sub-optimal frameworks for individual proxy tasks. Motivated by this, we contend that optimizing single-task frameworks can advance both single- and multi-task approaches. Accordingly, we leverage middle-frame prediction as the primary proxy task, and introduce an effe… ▽ More

    Submitted 20 April, 2025; originally announced April 2025.

    Comments: Accepted by IEEE Transactions on Image Processing (TIP)

    Journal ref: IEEE Transactions on Image Processing, vol. 33, pp. 6865-6880, 2024

  9. arXiv:2503.07907  [pdf, ps, other

    eess.SY

    Co-Optimizing Distributed Energy Resources under Demand Charges and Bi-Directional Power Flow

    Authors: Ruixiao Yang, Gulai Shen, Ahmed S. Alahmed, Chuchu Fan

    Abstract: We address the co-optimization of behind-the-meter (BTM) distributed energy resources (DER), including flexible demands, renewable distributed generation (DG), and battery energy storage systems (BESS) under net energy metering (NEM) frameworks with demand charges. We formulate the problem as a stochastic dynamic program that accounts for renewable generation uncertainty and operational surplus ma… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

    Comments: 5 pages, 3 figures, 2 tables. Accepted at the 2025 IEEE PES General Meeting, Austin, TX

  10. Residual Channel Boosts Contrastive Learning for Radio Frequency Fingerprint Identification

    Authors: Rui Pan, Hui Chen, Guanxiong Shen, Hongyang Chen

    Abstract: In order to address the issue of limited data samples for the deployment of pre-trained models in unseen environments, this paper proposes a residual channel-based data augmentation strategy for Radio Frequency Fingerprint Identification (RFFI), coupled with a lightweight SimSiam contrastive learning framework. By applying least square (LS) and minimum mean square error (MMSE) channel estimations… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

    Comments: 5 pages, 4 figures

  11. arXiv:2407.06662  [pdf, other

    eess.SP

    Experimental Demonstration of 16D Voronoi Constellation with Two-Level Coding over 50km Four-Core Fiber

    Authors: Can Zhao, Bin Chen, Jiaqi Cai, Zhiwei Liang, Yi Lei, Junjie Xiong, Lin Ma, Daohui Hu, Lin Sun, Gangxiang Shen

    Abstract: A 16-dimensional Voronoi constellation concatenated with multilevel coding is experimentally demonstrated over a 50km four-core fiber transmission system. The proposed scheme reduces the required launch power by 6dB and provides a 17dB larger operating range than 16QAM with BICM at the outer HD-FEC BER threshold.

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 4 pages, 4 figures, accepted by 2024 European Conference on Optical Communication (ECOC)

  12. arXiv:2407.03308  [pdf, other

    physics.med-ph cs.AI eess.IV

    Accelerated Proton Resonance Frequency-based Magnetic Resonance Thermometry by Optimized Deep Learning Method

    Authors: Sijie Xu, Shenyan Zong, Chang-Sheng Mei, Guofeng Shen, Yueran Zhao, He Wang

    Abstract: Proton resonance frequency (PRF) based MR thermometry is essential for focused ultrasound (FUS) thermal ablation therapies. This work aims to enhance temporal resolution in dynamic MR temperature map reconstruction using an improved deep learning method. The training-optimized methods and five classical neural networks were applied on the 2-fold and 4-fold under-sampling k-space data to reconstruc… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  13. arXiv:2405.15098  [pdf

    eess.IV cs.CV cs.LG physics.med-ph

    Magnetic Resonance Image Processing Transformer for General Accelerated Image Reconstruction

    Authors: Guoyao Shen, Mengyu Li, Stephan Anderson, Chad W. Farris, Xin Zhang

    Abstract: Recent advancements in deep learning have enabled the development of generalizable models that achieve state-of-the-art performance across various imaging tasks. Vision Transformer (ViT)-based architectures, in particular, have demonstrated strong feature extraction capabilities when pre-trained on large-scale datasets. In this work, we introduce the Magnetic Resonance Image Processing Transformer… ▽ More

    Submitted 7 February, 2025; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: 28 pages, 8 figures, 5 tables

  14. arXiv:2403.16865  [pdf, other

    cs.CL eess.AS

    Encoding of lexical tone in self-supervised models of spoken language

    Authors: Gaofei Shen, Michaela Watkins, Afra Alishahi, Arianna Bisazza, Grzegorz Chrupała

    Abstract: Interpretability research has shown that self-supervised Spoken Language Models (SLMs) encode a wide variety of features in human speech from the acoustic, phonetic, phonological, syntactic and semantic levels, to speaker characteristics. The bulk of prior research on representations of phonology has focused on segmental features such as phonemes; the encoding of suprasegmental phonology (such as… ▽ More

    Submitted 3 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    Comments: Accepted to NAACL 2024

  15. arXiv:2311.10162  [pdf

    eess.IV cs.CV cs.LG physics.med-ph

    Learning to Reconstruct Accelerated MRI Through K-space Cold Diffusion without Noise

    Authors: Guoyao Shen, Mengyu Li, Chad W. Farris, Stephan Anderson, Xin Zhang

    Abstract: Deep learning-based MRI reconstruction models have achieved superior performance these days. Most recently, diffusion models have shown remarkable performance in image generation, in-painting, super-resolution, image editing and more. As a generalized diffusion model, cold diffusion further broadens the scope and considers models built around arbitrary image transformations such as blurring, down-… ▽ More

    Submitted 5 December, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: 21 pages, 5 figures, 4 tables

  16. arXiv:2306.12365  [pdf

    eess.IV cs.CV cs.LG physics.med-ph

    Attention Hybrid Variational Net for Accelerated MRI Reconstruction

    Authors: Guoyao Shen, Boran Hao, Mengyu Li, Chad W. Farris, Ioannis Ch. Paschalidis, Stephan W. Anderson, Xin Zhang

    Abstract: The application of compressed sensing (CS)-enabled data reconstruction for accelerating magnetic resonance imaging (MRI) remains a challenging problem. This is due to the fact that the information lost in k-space from the acceleration mask makes it difficult to reconstruct an image similar to the quality of a fully sampled image. Multiple deep learning-based structures have been proposed for MRI r… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: 22 pages, 4 figures, 3 tables

  17. arXiv:2207.03001  [pdf, other

    eess.SP

    Towards Length-Versatile and Noise-Robust Radio Frequency Fingerprint Identification

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Mikko Valkama, Joseph Cavallaro

    Abstract: Radio frequency fingerprint identification (RFFI) can classify wireless devices by analyzing the signal distortions caused by the intrinsic hardware impairments. State-of-the-art neural networks have been adopted for RFFI. However, many neural networks, e.g., multilayer perceptron (MLP) and convolutional neural network (CNN), require fixed-size input data. In addition, many IoT devices work in low… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  18. arXiv:2207.02999  [pdf, other

    eess.SP

    Towards Receiver-Agnostic and Collaborative Radio Frequency Fingerprint Identification

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Roger Woods, Joseph Cavallaro, Liquan Chen

    Abstract: Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique, which exploits the hardware characteristics of the RF front-end as device identifiers. RFFI is implemented in the wireless receiver and acts to extract the transmitter impairments and then perform classification. The receiver hardware impairments will actually interfere with the feature extraction pro… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  19. Video Anomaly Detection via Prediction Network with Enhanced Spatio-Temporal Memory Exchange

    Authors: Guodong Shen, Yuqi Ouyang, Victor Sanchez

    Abstract: Video anomaly detection is a challenging task because most anomalies are scarce and non-deterministic. Many approaches investigate the reconstruction difference between normal and abnormal patterns, but neglect that anomalies do not necessarily correspond to large reconstruction errors. To address this issue, we design a Convolutional LSTM Auto-Encoder prediction framework with enhanced spatio-tem… ▽ More

    Submitted 26 June, 2022; originally announced June 2022.

    Comments: Accepted at ICASSP 2022

  20. arXiv:2203.02014  [pdf, other

    eess.SP

    FewSense, Towards a Scalable and Cross-Domain Wi-Fi Sensing System Using Few-Shot Learning

    Authors: Guolin Yin, Junqing Zhang, Guanxiong Shen, Yingying Chen

    Abstract: Wi-Fi sensing can classify human activities because each activity causes unique changes to the channel state information (CSI). Existing WiFi sensing suffers from limited scalability as the system needs to be retrained whenever new activities are added, which cause overheads of data collection and retraining. Cross-domain sensing may fail because the mapping between activities and CSI variations i… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

  21. arXiv:2111.14275  [pdf, other

    eess.SP

    Radio Frequency Fingerprint Identification for Security in Low-Cost IoT Devices

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Mikko Valkama, Joseph Cavallaro

    Abstract: Radio frequency fingerprint identification (RFFI) can uniquely classify wireless devices by analyzing the received signal distortions caused by the intrinsic hardware impairments. The state-of-the-art deep learning techniques such as convolutional neural network (CNN) have been adopted to classify IoT devices with high accuracy. However, deep learning-based RFFI requires input data of a fixed size… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

    Comments: Asilomar 2021

  22. arXiv:2107.02867  [pdf, other

    eess.SP

    Towards Scalable and Channel-Robust Radio Frequency Fingerprint Identification for LoRa

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Joseph Cavallaro

    Abstract: Radio frequency fingerprint identification (RFFI) is a promising device authentication technique based on the transmitter hardware impairments. In this paper, we propose a scalable and robust RFFI framework achieved by deep learning powered radio frequency fingerprint (RFF) extractor. Specifically, we leverage the deep metric learning to train an RFF extractor, which has excellent generalization a… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

  23. arXiv:2101.01668  [pdf, other

    eess.SP cs.LG

    Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN

    Authors: Guanxiong Shen, Junqing Zhang, Alan Marshall, Linning Peng, Xianbin Wang

    Abstract: Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique that relies on intrinsic hardware characteristics of wireless devices. We designed an RFFI scheme for Long Range (LoRa) systems based on spectrogram and convolutional neural network (CNN). Specifically, we used spectrogram to represent the fine-grained time-frequency characteristics of LoRa signals. In… ▽ More

    Submitted 30 December, 2020; originally announced January 2021.

    Comments: Accepted for publication in IEEE INFOCOM 2021

  24. arXiv:2012.12114  [pdf, other

    cs.IT eess.SY

    Deep Deterministic Policy Gradient for Relay Selection and Power Allocation in Cooperative Communication Network

    Authors: Yuanzhe Geng, Erwu Liu, Rui Wang, Yiming Liu, Jie Wang, Gang Shen, Zhao Dong

    Abstract: Perfect channel state information (CSI) is usually required when considering relay selection and power allocation in cooperative communication. However, it is difficult to get an accurate CSI in practical situations. In this letter, we study the outage probability minimizing problem based on optimizing relay selection and transmission power. We propose a prioritized experience replay aided deep de… ▽ More

    Submitted 14 March, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

  25. arXiv:2001.08247  [pdf, other

    cs.CV cs.LG eess.IV

    PENet: Object Detection using Points Estimation in Aerial Images

    Authors: Ziyang Tang, Xiang Liu, Guangyu Shen, Baijian Yang

    Abstract: Aerial imagery has been increasingly adopted in mission-critical tasks, such as traffic surveillance, smart cities, and disaster assistance. However, identifying objects from aerial images faces the following challenges: 1) objects of interests are often too small and too dense relative to the images; 2) objects of interests are often in different relative sizes; and 3) the number of objects in ea… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: 7 pages, 5 figures

  26. arXiv:1910.02354  [pdf, other

    cs.CV cs.LG eess.IV

    AdvSPADE: Realistic Unrestricted Attacks for Semantic Segmentation

    Authors: Guangyu Shen, Chengzhi Mao, Junfeng Yang, Baishakhi Ray

    Abstract: Due to the inherent robustness of segmentation models, traditional norm-bounded attack methods show limited effect on such type of models. In this paper, we focus on generating unrestricted adversarial examples for semantic segmentation models. We demonstrate a simple and effective method to generate unrestricted adversarial examples using conditional generative adversarial networks (CGAN) without… ▽ More

    Submitted 18 November, 2019; v1 submitted 5 October, 2019; originally announced October 2019.