Chien-Yi Wang

ORCID: 0000-0001-9381-6487
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • Caching and Content Delivery
  • Face recognition and analysis
  • Biometric Identification and Security
  • Advanced Wireless Network Optimization
  • Error Correcting Code Techniques
  • Mobile Ad Hoc Networks
  • Advanced Wireless Communication Techniques
  • Advanced Photocatalysis Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Video Surveillance and Tracking Methods
  • Autonomous Vehicle Technology and Safety
  • Explainable Artificial Intelligence (XAI)
  • Machine Learning and Data Classification
  • Face and Expression Recognition
  • Advanced Wireless Communication Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Human-Automation Interaction and Safety
  • Energy Efficient Wireless Sensor Networks
  • User Authentication and Security Systems
  • Advanced Neural Network Applications
  • Hydrogen Storage and Materials
  • Advanced Data Compression Techniques

Nvidia (United Kingdom)
2024

National Yang Ming Chiao Tung University
2022-2023

Chung Hua University
2020

Télécom Paris
2016-2018

Laboratoire Traitement et Communication de l’Information
2016-2018

Université Paris-Saclay
2016-2017

MediaTek (Taiwan)
2017

École Polytechnique Fédérale de Lausanne
2012-2016

National Taiwan University
2008-2012

RWTH Aachen University
2010

An information-theoretic lower bound is developed for the caching system studied by Maddah-Ali and Niesen. By comparing proposed with decentralized coded scheme of Niesen, optimal memory-rate tradeoff characterized to within a multiplicative gap 4.7 worst case, improving previous analytical 12. Furthermore, case when users' requests follow uniform distribution, tightened 4.7, 72. As an independent result interest, single-user average in which user multiple files, it proved that most...

10.1109/ita.2016.7888186 preprint EN 2016-01-01

10.1109/wacv61041.2025.00849 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2025-02-26

Under the paradigm of caching, partial data is delivered before actual requests users are known. In this paper, problem modeled as a canonical distributed source coding with side information, where information represents users' requests. For single-user case, single-letter characterization optimal rate region established, and for several important special cases, closed-form solutions given, including scenario uniformly user it shown that caching strategy closely related to total correlation...

10.1109/tit.2016.2604851 article EN IEEE Transactions on Information Theory 2016-08-31

Improved lower bounds are derived on the average and worst case rate-memory tradeoffs of Maddah-Ali Niesen-coded caching scenario. For any number users files for arbitrary cache sizes, multiplicative gap between exact tradeoff new bound is shown to be less than 2.315 in scenario 2.507 average-case

10.1109/tit.2018.2856885 article EN IEEE Transactions on Information Theory 2018-07-18

As face recognition is widely used in diverse security-critical applications, the study of anti-spoofing (FAS) has attracted more and attention. Several FAS methods have achieved promising performance if attack types testing data are included training data, while significantly degrades for unseen types. It essential to learn generalized discriminative features prevent overfitting pre-defined spoof This paper proposes a novel dual-stage disentangled representation learning method that can...

10.1109/wacv51458.2022.00130 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2022-01-01

In this paper, we consider a cache aided network in which each user is assumed to have individual caches, while upon users' requests, an update message sent through common link all users. First, formulate general information theoretic setting that represents the database as discrete memoryless source, and requests side available everywhere except at encoder. The decoders' objective recover function of source information. By viewing networks terms distributed coding problem arguments, present...

10.1109/tit.2017.2733527 article EN IEEE Transactions on Information Theory 2017-07-31

Function computation over Gaussian networks with orthogonal components is studied for arbitrarily correlated discrete memoryless sources. Two classes of functions are considered: 1) the arithmetic sum function and 2) type function. The in this paper defined as a set multiple weighted sums, which includes averaging sources estimating each special cases. or frequency histogram counts number occurrences argument, yields various fundamental statistics, such mean, variance, maximum, minimum,...

10.1109/tit.2014.2364572 article EN IEEE Transactions on Information Theory 2014-10-23

An information-theoretic lower bound is developed for the caching system studied by Maddah-Ali and Niesen. By comparing proposed with decentralized coded scheme of Niesen, optimal memory--rate tradeoff characterized to within a multiplicative gap $4.7$ worst case, improving previous analytical $12$. Furthermore, case when users' requests follow uniform distribution, tightened $4.7$, $72$. As an independent result interest, single-user average in which user multiple files, it proved that most...

10.48550/arxiv.1601.05690 preprint EN other-oa arXiv (Cornell University) 2016-01-01

This paper investigates the downlink of a cloud radio access network (C-RAN) in which central processor communicates with two mobile users through base stations (BSs). The BSs act as relay nodes and cooperate each other error-free rate-limited links. We develop analyze coding schemes for this scenario. first scheme modifies Liu-Kang (to make it amenable to rigorous analysis) extends introduce common codewords apply C-RAN BS-to-BS cooperation. enables arbitrary correlation among auxiliary...

10.1109/tit.2018.2836675 article EN IEEE Transactions on Information Theory 2018-05-15

In this paper, we present information theoretic inner and outer bounds on the fundamental tradeoff between cache memory size update rate in a multi-user network. Each user is assumed to have individual caches, while upon users' requests, an message sent though common link all users. The database represented as discrete memoryless source request side that available at decoders encoder, but oblivious encoder. We establish two bounds, first based centralized caching strategy second...

10.1109/isit.2016.7541354 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2016-07-01

Improved lower bounds on the worst-case and average-case rate-memory tradeoffs for Maddah-Ali&Niesen coded-caching scenario are presented. For any number of users files arbitrary cache sizes, multiplicative gap between exact tradeoff new bound is less than 2.315 in 2.507 scenario.

10.1109/isit.2017.8006965 preprint EN 2022 IEEE International Symposium on Information Theory (ISIT) 2017-06-01

The fading AWGN two-user two-hop network is considered where the channel coefficients are independent and identically distributed (i.i.d.) according to a continuous distribution vary over time. For broad class of distributions, ergodic sum capacity characterized within constant number bits/second/hertz, signal-to-noise ratio. achievability follows from analysis an interference neutralization scheme relays partitioned into M pairs, neutralized separately by each pair relays. When = 1,...

10.1109/tit.2013.2293573 article EN IEEE Transactions on Information Theory 2014-01-24

Although significant progress has been made in face recognition, demographic bias still exists recognition systems. For instance, it usually happens that the performance for a certain group is lower than others. In this paper, we propose MixFairFace framework to improve fairness models. First of all, argue commonly used attribute-based metric not appropriate recognition. A system can only be considered fair while every person close performance. Hence, new evaluation protocol fairly evaluate...

10.1609/aaai.v37i12.26699 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26

Weakly-Supervised Semantic Segmentation (WSSS) aims to train segmentation models using image data with only image-level supervision. Since precise pixel-level annotations are not accessible, existing methods typically focus on producing pseudo masks for training by refining CAM-like heatmaps. However, the produced heatmaps may capture discriminative regions of object categories or associated co-occurring backgrounds. To address issues, we propose a Prompt Learning WSSS (SemPLeS) framework,...

10.48550/arxiv.2401.11791 preprint EN cc-by arXiv (Cornell University) 2024-01-01

Motivated by the caching problem introduced Maddah-Ali and Niesen, a of distributed source coding with side information is formulated, which captures distinct interesting aspect caching. For single-user case, single-letter characterization optimal rate region presented. cases where composed either independent or nested components, exact regions are found some intuitive strategies confirmed to be optimal. When components arbitrarily correlated uniform requests, strategy closely related total...

10.1109/isit.2015.7282761 article EN 2022 IEEE International Symposium on Information Theory (ISIT) 2015-06-01

In wireless sensor networks, various applications involve learning one or multiple functions of the measurements observed by sensors, rather than themselves. This paper focuses on computation type-threshold which include maximum, minimum, and indicator as special cases. Previous work studied this problem under collocated collision network model showed that many probabilistic models for measurements, achievable rates tend to zero number sensors increases. paper, networks are modeled fully...

10.1109/isit.2013.6620607 article EN 2013-07-01

We consider a fading AWGN 2-user 2-hop network in which the channel coefficients are independently and identically distributed (i.i.d.) drawn from continuous distribution vary over time. For broad class of distributions, we characterize ergodic sum capacity within constant number bits/sec/Hz, independent signal-to-noise ratio. The achievability follows analysis an interference neutralization scheme where relays partitioned into K pairs, is neutralized separately by each pair relays. = 1,...

10.1109/isit.2012.6284255 preprint EN 2012-07-01

This work investigates the downlink of cloud radio access networks (C-RANs), assuming digital cooperation links among base stations (BSs). A generalization data-sharing scheme is proposed for case two BSs and mobile users. The generalized includes a common part allows full exploitation correlation auxiliary codewords. between are used to exchange redirect indices precomputed at central processor. On other hand, by simplifying achievable rate region distributed decode-forward (DDF) scheme, it...

10.1109/wcnc.2017.7925530 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2017-03-01

In wireless sensor networks, various applications involve learning one or multiple functions of the measurements observed by sensors, rather than themselves. This paper focuses on class type-threshold functions, e.g., maximum and indicator functions. A simple network model capturing both broadcast superposition properties channels is considered: collocated Gaussian network. general multiround coding scheme exploiting interaction (through broadcast) developed. Through careful scheduling...

10.1109/tit.2015.2455977 article EN IEEE Transactions on Information Theory 2015-07-13

This paper presents a log-domain decoder for non-binary LDPC over GF(q). Comparing with the conventional O(q <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> ) decoders, proposed can efficiently reduce decoding complexity to O(qlogq) only negligible degradation in BER. Comparisons on both simulated BER performance and computational between existing decoders are also provided.

10.1109/apccas.2008.4746352 article EN 2008-11-01

Deep learning approaches have achieved highly accurate face recognition by training the models with very large image datasets. Unlike availability of 2D datasets, there is a lack 3D datasets available to public. Existing public were usually collected few subjects, leading over-fitting problem. This paper proposes two CNN improve RGB-D task. The first segmentation-aware depth estimation network, called DepthNet, which estimates maps from RGB images including semantic segmentation information...

10.1109/fg52635.2021.9667000 article EN 2021 16th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2021) 2021-12-15

Holistic driving scene understanding is a critical step toward intelligent transportation systems. It involves different levels of analysis, interpretation, reasoning and decision making. In this paper, we propose 3D dynamic analysis framework as the first understanding. Specifically, given sequence synchronized 2D sensory data, systematically integrates perception modules to obtain position, orientation, velocity category traffic participants ego car in reconstructed semantically labeled...

10.1109/ivs.2018.8500559 article EN 2022 IEEE Intelligent Vehicles Symposium (IV) 2018-06-01

The problem of successive refinement in distributed source coding and joint source-channel is considered. emphasis placed on the case where sources have to be recovered losslessly second stage. In coding, it shown that all are successively refinable sum rate, with respect any (joint) distortion measure first assumed independent only a (per letter) function For class multiple access channels, linear functions. Finally, when equal entropy, simple sufficient condition refinability provided for...

10.1109/isit.2014.6875318 article EN 2014-06-01
Coming Soon ...