Yi Sun

ORCID: 0000-0002-7636-0200
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cell Image Analysis Techniques
  • Advanced Computational Techniques and Applications
  • Generative Adversarial Networks and Image Synthesis
  • Multimodal Machine Learning Applications
  • Genetics, Bioinformatics, and Biomedical Research
  • Peer-to-Peer Network Technologies
  • Ear Surgery and Otitis Media
  • COVID-19 diagnosis using AI
  • Distributed and Parallel Computing Systems
  • Topic Modeling
  • Domain Adaptation and Few-Shot Learning
  • Language, Metaphor, and Cognition
  • Medical Imaging Techniques and Applications
  • Medical Image Segmentation Techniques
  • Cellular Automata and Applications
  • Cloud Computing and Resource Management
  • Digital Media Forensic Detection
  • Action Observation and Synchronization
  • Cloud Computing and Remote Desktop Technologies
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Sinusitis and nasal conditions
  • Nanoplatforms for cancer theranostics
  • Advanced Optical Network Technologies
  • Web Applications and Data Management

European Molecular Biology Laboratory
2022-2024

Griffith University
2022-2024

Axiom (United States)
2024

Guangdong University of Foreign Studies
2023-2024

North China Electric Power University
2023

Beijing University of Posts and Telecommunications
2023

University of Illinois Urbana-Champaign
2023

Zhejiang Lab
2023

University of Chinese Academy of Sciences
2023

Amazon (United States)
2022

The metaverse is a unified, persistent, and shared multi-user virtual environment with fully immersive, hyper-temporal, diverse interconnected network. When combined healthcare, it can effectively improve medical services has great potential for development in realizing training, enhanced teaching, remote surgical treatment. provides immersive users through massive multimodal data, its data scale growth rate are bound to show exponential growth. Blockchain-based distributed storage...

10.1109/jbhi.2023.3272021 article EN IEEE Journal of Biomedical and Health Informatics 2023-05-01

Evaluation of biases in language models is often limited to synthetically generated datasets. This dependence traces back the need prompt-style dataset trigger specific behaviors models. In this paper, we address gap by creating a prompt with respect occupations collected from real-world natural sentences present Wikipedia.We aim understand differences between using template-based prompts and sentence when studying gender-occupation We find bias evaluations are very sensitiveto design...

10.18653/v1/2022.naacl-main.203 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2022-01-01

Multi-modal learning with both text and images benefits multiple applications, such as attribute extraction for e-commerce products. In this paper, we propose Cross-Modality Attention Contrastive Language-Image Pre-training (CMA-CLIP), a new multi-modal architecture to jointly learn the fine-grained inter-modality relationship. It fuses CLIP sequence-wise attention module modality-wise module. The network uses bridge gap at global level, capture alignment between images. Besides, it...

10.1109/icip46576.2022.9897323 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2022-10-16

Content distribution networks (CDNs) improve the performance of content delivery by replicating popular on surrogate servers deployed at edge Internet. The CDN-P2P architecture, which combines complementary advantages both CDN and P2P networks, can quality service (QoS). In this paper, we propose a k-coordinated decentralized replica placement algorithm (DRPA) based gain formulation problem. Although is designed for different types focus robust ring-based architecture in study. our approach,...

10.1109/iscc.2010.5546711 article EN 2010-06-01

Current blockchains are restricted by the low throughput. Aimed at this problem, we propose Txilm, a protocol that compresses size of transaction presentation in each block to save bandwidth network. In protocol, carries short hashes TXIDs instead complete transactions. Combined with sorted transactions based on TXIDs, Txilm realizes 80 times data reduction compared original blockchains. We also evaluate probability hash collisions, and provide methods resolving such collisions. Finally,...

10.48550/arxiv.1906.06500 preprint EN other-oa arXiv (Cornell University) 2019-01-01

This paper presents Natural Evolution Strategies (NES), a recent family of algorithms that constitute more principled approach to black-box optimization than established evolutionary algorithms. NES maintains parameterized distribution on the set solution candidates, and natural gradient is used update distribution's parameters in direction higher expected fitness. We introduce collection techniques address issues convergence, robustness, sample complexity, computational complexity...

10.48550/arxiv.1106.4487 preprint EN other-oa arXiv (Cornell University) 2011-01-01

As ML models have increased in capabilities and accuracy, so has the complexity of their deployments. Increasingly, model consumers are turning to service providers serve ML-as-a-service (MLaaS) paradigm. MLaaS proliferates, a critical requirement emerges: how can verify that correct predictions were served, face malicious, lazy, or buggy providers? In this work, we present first practical ImageNet-scale method inference non-interactively, i.e., after been done. To do so, leverage recent...

10.48550/arxiv.2210.08674 preprint EN other-oa arXiv (Cornell University) 2022-01-01

This paper presents a novel algorithm for gesture recognition and identity authentication based on continuous hidden Markov model (CHMM) optical flow method. study aims to solve the information security problems about ubiquitous electric power internet of things. In this system, method is used segment extract features preprocessed dynamic obtain motion track, CHMM chosen establish valid user model, which leads ensuring gestures are accurately recognised. The proposed test recognise result...

10.1504/ijsnet.2021.112889 article EN International Journal of Sensor Networks 2021-01-01

Scedosporium and Lomentospora infections in humans are generally chronic stubborn. The use of azoles alone cannot usually inhibit the growth these fungi. To further explore combined effect multiple drugs potential mechanisms action, we tested antifungal effects tacrolimus (FK506) everolimus combination with vitro vivo on 15 clinical strains / species detected level Rhodamine 6G, ROS activity, apoptosis. results showed that combinations itraconazole, voriconazole, posaconazole synergistic 9...

10.3389/fcimb.2022.864912 article EN cc-by Frontiers in Cellular and Infection Microbiology 2022-04-14

Cyber security visualization designers can benefit from human factors engineering concepts and principles to resolve key challenges in visual interface design. We survey that have been applied the past decade of research. highlight these relate them cybersecurity provide guidelines help address some context use ecological design approach present factors-based for visualization. will

10.1145/3410566.3410606 article EN 2020-08-12

Zero-knowledge (ZK) proof systems have emerged as a promising solution for building security-sensitive applications. However, bugs in ZK applications are extremely difficult to detect and can allow malicious party silently exploit the system without leaving any observable trace. This paper presents Coda, novel statically-typed language zero-knowledge Critically, Coda makes it possible formally specify statically check properties of application through rich refinement type system. One key...

10.48550/arxiv.2304.07648 preprint EN cc-by arXiv (Cornell University) 2023-01-01

In E-commerce search, spelling correction plays an important role to find desired products for customers in processing user-typed search queries. However, resolving phonetic errors is a critical but much overlooked area. The query with tends appear correct based on pronunciation nonetheless inaccurate (e.g., "bluetooth sound system" vs. "blutut sant sistam") numerous noisy forms and sparse occurrences. this work, we propose generalized system integrating phonetics address without additional...

10.18653/v1/2022.ecnlp-1.9 article EN cc-by 2022-01-01

Many bioimage analysis projects produce quantitative descriptors of regions interest in images. Associating these with visual characteristics the objects they describe is a key step understanding data at hand. However, as many and their workflows are moving to cloud, addressing interactive exploration remote environments has become pressing issue. To address it, we developed Image Data Explorer (IDE) web application that integrates linked visualization images derived points exploratory...

10.1371/journal.pone.0273698 article EN cc-by PLoS ONE 2022-09-15

Over the past few years, AI methods of generating images have been increasing in capabilities, with recent breakthroughs enabling high-resolution, photorealistic "deepfakes" (artificially generated purpose misinformation or harm). The rise deepfakes has potential for social disruption. Recent work proposed using ZK-SNARKs (zero-knowledge succinct non-interactive argument knowledge) and attested cameras to verify that were taken by a camera. allow verification image transformations...

10.48550/arxiv.2211.04775 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Autonomous ground robots autonomously are being used inthe places where it is very hazardous for human beings to reach and operate,such as nuclear power plants chemical industries. The aim of the researchpresented here develop a control system that enables such robotsnavigate with various sensors depth camera, 2D scanninglaser, 3D Lidar, GPS, IMU. controller uses current positionmeasured using on Husky A200, given waypoints thedestination. Then calculates best possible route based...

10.3844/jmrsp.2022.90.105 article EN cc-by Journal of Mechatronics and Robotics 2022-01-01

Project 6 during the 2023 BioHackathon Europe in Barcelona focused on "Enhancing image analysis community Galaxy." Despite Galaxy's strong presence genomics and proteomics, its tools workflows are currently scattered. This project aimed to gather efforts across fields build a robust interdisciplinary community.

10.37044/osf.io/w8dsz preprint EN 2024-04-08

Metaphor comprehension is an important component in the process of constructing metaphorical thinking. Therefore, topic “metaphor comprehension” should be a crucial part metaphor studies. This study uses Bibliometrix to conduct bibliometric research on from 2013 2023, focusing knowledge structure, hot spots, and fronts. The co-citation analysis shows that Contemporary Theory (CTM) Cognitive Linguistics has provided dominant foundation for comprehension. A large number hypotheses CTM not only...

10.1177/21582440241241431 article EN cc-by SAGE Open 2024-04-01

The grasp generation of dexterous hand often requires a large number grasping annotations. Especially for functional grasp-requiring the pose to be convenient subsequent use object. However, annotating high DoF is rather challenging. This prompt us explore how people achieve manipulations on new objects based past experiences. We find that are adept at discovering and leveraging various similarities between when items, including shape, layout, type. In light this, we analyze collect...

10.48550/arxiv.2405.08310 preprint EN arXiv (Cornell University) 2024-05-14
Coming Soon ...