Yiwei Lu

ORCID: 0000-0001-7872-3186
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Topic Modeling
  • Natural Language Processing Techniques
  • Human Pose and Action Recognition
  • Face and Expression Recognition
  • Industrial Vision Systems and Defect Detection
  • Web Data Mining and Analysis
  • Video Surveillance and Tracking Methods
  • Semantic Web and Ontologies
  • Non-Destructive Testing Techniques
  • Artificial Immune Systems Applications
  • Domain Adaptation and Few-Shot Learning
  • Video Analysis and Summarization
  • Advanced Text Analysis Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Graph Neural Networks
  • Advanced Malware Detection Techniques
  • Cognitive Computing and Networks
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Microwave Imaging and Scattering Analysis
  • Geophysical Methods and Applications
  • Machine Fault Diagnosis Techniques
  • Digital and Cyber Forensics

National University of Defense Technology
2018-2025

HBIS (China)
2025

Tianjin University
2023-2024

National Tsing Hua University
2024

National Taipei University of Technology
2020-2023

University of Waterloo
2020-2021

University of Electronic Science and Technology of China
2019-2020

University of Manitoba
2019-2020

Yuan Ze University
2019

Hunan City University
2015

Anomaly detection in videos aims at reporting anything that does not conform the normal behaviour or distribution. However, due to sparsity of abnormal video clips real life, collecting annotated data for supervised learning is exceptionally cumbersome. Inspired by practicability generative models semi-supervised learning, we propose a novel sequential model based on variational autoencoder (VAE) future frame prediction with convolutional LSTM (ConvLSTM). To best our knowledge, this first...

10.1109/avss.2019.8909850 article EN 2019-09-01

Predictive maintenance (PdM) is useful for engineers to schedule flexibly, operate equipment efficiently, and also avoid unexpected downtime. Remaining life (RUL) prediction critical PdM before the need component replacement. Data-driven approaches have attracted more attention RUL in flexible production. Compared with statistical-based conventional machine learning approaches, deep learning-based can extract features from raw sensor data without prior knowledge a domain expert. This study...

10.1109/tsm.2022.3164578 article EN IEEE Transactions on Semiconductor Manufacturing 2022-04-06

With the development of smart manufacturing, in order to detect abnormal conditions equipment, a large number sensors have been used record variables associated with production equipment. This study focuses on prediction Remaining Useful Life (RUL). RUL is part predictive maintenance, which uses trend machine predict when will malfunction. High accuracy not only reduces consumption manpower and materials, but also need for future maintenance. detecting faults as early possible, before needs...

10.3390/pr8091155 article EN Processes 2020-09-15

The management of gas pipelines requires efficient, predictive systems to enhance safety and operational efficiency. limitations include potential data quality issues, sensor accuracy, environmental factors that may affect model performance. To develop an intelligent pipeline system by integrating the Wombat Algorithm-driven Scalable Random Forest (WA-SRF) for improvement scalability, fault detection in performance operations pipelines, various sensors are embedded pipeline, collected from...

10.1177/14727978251324145 article EN other-oa Journal of Computational Methods in Sciences and Engineering 2025-03-03

Data similarity is a key concept in many data-driven applications. Many algorithms are sensitive to measures. To tackle this fundamental problem, automatically learning of information from data via self-expression has been developed and successfully applied various models, such as low-rank representation, sparse subspace learning, semisupervised learning. However, it just tries reconstruct the original some valuable information, e.g., manifold structure, largely ignored. In paper, we argue...

10.1609/aaai.v33i01.33014057 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

We address the problem of image-based crowd counting. In particular, we propose a new called <i>unlabeled scene-adaptive counting</i>. Given target scene, would like to have counting model specifically adapted this particular scene based on data that capture some information about scene. paper, use one or more unlabeled images from perform adaptation. comparison with existing setups (e.g. fully supervised), our proposed setup is closer real-world applications systems. introduce novel...

10.1109/tmm.2021.3062481 article EN IEEE Transactions on Multimedia 2021-03-01

10.1109/prai62207.2024.10826769 article EN 2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI) 2024-08-15

Automated Optical Inspection (AOI) is used for defect inspection during industrial manufacturing process. It uses optical instrument to snap the surface of products and identify defects through technique machine vision processing. Deep learning convolution neural network automatically produce feature which are useful correctly. However, class imbalance number samples normal typically in process, will lead poor accuracy deep model. This paper integrate pix2pix, a Conditional Generative...

10.1109/smile45626.2019.8965320 article EN 2019-04-01

Entity linking, a crucial task in the realm of natural language processing, aims to link entity mentions text their corresponding entities knowledge base. While long documents provide abundant contextual information, facilitating feature extraction for identification and disambiguation, linking Chinese short texts presents significant challenges. This study introduces an innovative approach within texts, combining multiple embedding representations. It integrates representations from both...

10.3390/electronics12122692 article EN Electronics 2023-06-15

Military information extraction is an important means to gain military advantage. named entity recognition the basis of extraction. For entities, a method supervised based on deep learning was proposed identify and extract entities in texts such as troops, geographical locations, weapons so on. This avoids complexity artificial construction features inaccuracy text segmentation. It uses BI-LSTM CRF model automatic character embedding, then identifies entities. Experiments show that this...

10.1109/ccis.2018.8691316 article EN 2018-11-01

In the field of human–computer interaction, millimeter-wave radar has attracted considerable attention as a contactless and private approach to hand gesture recognition. However, single-target recognition scenes are generally simplistic not representative real interactions. Therefore, this research examines feasibility using single recognize gestures in double-target by combining theory with deep learning. First, dynamic range angle image (DRAI) is composed weights DRAIs two gestures. Thus,...

10.1109/jsen.2023.3319339 article EN IEEE Sensors Journal 2023-10-02

Data similarity is a key concept in many data-driven applications. Many algorithms are sensitive to measures. To tackle this fundamental problem, automatically learning of information from data via self-expression has been developed and successfully applied various models, such as low-rank representation, sparse subspace learning, semi-supervised learning. However, it just tries reconstruct the original some valuable information, e.g., manifold structure, largely ignored. In paper, we argue...

10.48550/arxiv.1903.04235 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Abstract Military named entity recognition is the basis of military intelligence analysis and operational information service. In order to solve problems inaccurate word segmentation, diverse forms lack corpus in texts, author proposes a method based on Pre-training language model. On this basis, taking advantage Bi-directional Long Short-Term Memory (BiLSTM) neural network dealing with wide range contextual information, BERT-BiLSTM-CRF model was constructed. The experimental results tagged...

10.1088/1742-6596/1693/1/012161 article EN Journal of Physics Conference Series 2020-12-01

In neural network binarization, BinaryConnect (BC) and its variants are considered the standard. These methods apply sign function in their forward pass respective gradients backpropagated to update weights. However, derivative of is zero whenever defined, which consequently freezes training. Therefore, implementations BC (e.g., BNN) usually replace backward computation with identity or other approximate gradient alternatives. Although such practice works well empirically, it largely a...

10.48550/arxiv.2402.17710 preprint EN arXiv (Cornell University) 2024-02-27

The positioning based on ultra-wideband (UWB) mostly requires the target to carry tags, which is called active positioning. This method a constant power supply for tag and not suitable continuous Therefore, we propose localization passive that achieves position perception without wearing assistive devices. Tomography as one of most promising techniques has many advantages. However, traditional tomography methods require large number fixed-position transceivers form dense links ensure...

10.1109/jsen.2024.3371435 article EN IEEE Sensors Journal 2024-03-06

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4750909 preprint EN 2024-01-01

We revisit the efficacy of several practical methods for approximate machine unlearning developed large-scale deep learning. In addition to complying with data deletion requests, one often-cited potential application is remove effects training on poisoned data. experimentally demonstrate that, while existing have been demonstrated be effective in a number evaluation settings (e.g., alleviating membership inference attacks), they fail poisoning, across variety types poisoning attacks...

10.48550/arxiv.2406.17216 preprint EN arXiv (Cornell University) 2024-06-24

Availability attacks, or unlearnable examples, are defensive techniques that allow data owners to modify their datasets in ways prevent unauthorized machine learning models from effectively while maintaining the data's intended functionality. It has led release of popular black-box tools for users upload personal and receive protected counterparts. In this work, we show such protections can be substantially bypassed if a small set unprotected in-distribution is available. Specifically, an...

10.48550/arxiv.2412.21061 preprint EN arXiv (Cornell University) 2024-12-30
Coming Soon ...