Shaojie Wang

ORCID: 0000-0002-9769-8737
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Advanced Image and Video Retrieval Techniques
  • Visual Attention and Saliency Detection
  • Image Enhancement Techniques
  • Real-Time Systems Scheduling
  • Network Security and Intrusion Detection
  • Distributed Control Multi-Agent Systems
  • Parallel Computing and Optimization Techniques
  • Embedded Systems Design Techniques
  • Human Pose and Action Recognition
  • Law, AI, and Intellectual Property
  • Multimodal Machine Learning Applications
  • Generative Adversarial Networks and Image Synthesis
  • Domain Adaptation and Few-Shot Learning
  • Security in Wireless Sensor Networks
  • Face Recognition and Perception
  • Robotic Path Planning Algorithms
  • Innovative Educational Techniques
  • Educational Technology and Pedagogy
  • Higher Education and Teaching Methods
  • Advanced Decision-Making Techniques
  • Advanced Graph Neural Networks
  • Bayesian Methods and Mixture Models
  • Adversarial Robustness in Machine Learning
  • Hand Gesture Recognition Systems

Beihang University
2019-2023

China Electronics Corporation (China)
2023

Shanghai Institute for Science of Science
2023

Anhui University
2023

Nanjing University
2023

Beijing Institute of Technology
2023

State Key Laboratory of Virtual Reality Technology and Systems
2022

Washington University in St. Louis
2021-2022

University of Rochester
2018-2019

Beijing University of Posts and Telecommunications
2019

This paper describes automation methods for device driver development in IP-based embedded systems order to achieve high reliability, productivity, reusability and fast time market. We formally specify behaviors using event driven finite state machines, communication channels, declaratively described rules, constraints synthesis patterns. A is synthesized from this specification a virtual environment that platform (processor, operating system other hardware) independent. The mapped specific...

10.5555/789083.1022717 article EN Design, Automation, and Test in Europe 2003-03-03

This paper presents a correct-by-construction synthesis method for generating operating system based device drivers from formally specified behavior model. Existing driver development is largely manual using an ad-hoc design methodology. Consequently, this task error prone and becomes bottleneck in embedded methodology.Our solution to problem starts by accurately specifying access with formal model, viz. extended event driven finite state machines. We easy check soundness conditions on the...

10.1145/944645.944655 article EN 2003-10-01

Expectation maximization (EM) algorithm is to find maximum likelihood solution for models having latent variables. A typical example Gaussian Mixture Model (GMM) which requires assumption, however, natural images are highly non-Gaussian so that GMM cannot be applied perform image clustering task on pixel space. To overcome such limitation, we propose a GAN based EM learning framework can maximize the of and estimate We call this model GAN-EM, clustering, semi-supervised classification...

10.24963/ijcai.2019/612 article EN 2019-07-28

We experimentally study the robustness of deep camera-LiDAR fusion architectures for 2D object detection in autonomous driving. First, we find that model is usually both more accurate, and robust against single-source attacks than single-sensor neural networks. Furthermore, show without adversarial training, early late fusion, whereas two perform similarly after training. However, note single-channel training often detrimental even to robustness. Moreover, observe cross-channel...

10.1109/wacv51458.2022.00144 article EN 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) 2022-01-01

Many projects have tried to analyze the structure and dynamics of application overlay networks on Internet using packet analysis network flow data. While such is essential for a variety management security tasks, it difficult many networks: either volume data so large as make inspection intractable, or privacy concerns forbid capture require dissociation flows from users' actual IP addresses. In this paper, an algorithm mining preserving item sets proposed. On one hand, only maximal set...

10.1109/icicta.2012.105 article EN 2012-01-01

This paper describes automation methods for device driver development in IP-based embedded systems order to achieve high reliability, productivity, reusability and fast time market. We formally specify behaviors using event driven finite state machines, communication channels, declaratively described rules, constraints synthesis patterns. A is synthesized from this specification a virtual environment that platform (processor, operating system other hardware) independent. The mapped specific...

10.1109/date.2003.1253599 article EN 2003 Design, Automation and Test in Europe Conference and Exhibition 2003-12-22

Conference key agreement is one of the important issues in cryptography. In this paper, we propose a novel conference scheme. Without adopting authenticated broadcasting channel model, use an intermediary node to ensure correctness transmitted messages. A passive adversary or active obtains zero knowledge about common established by all honest participants who follow proposed Keywords: key, Diffie-Hellman, adversary, cryptography

10.1109/iccit.2007.53 article EN 2007 International Conference on Convergence Information Technology (ICCIT 2007) 2007-11-01

Underwater optical imaging is a highly challenging task owing to the intricate underwater environment. This often plagued by issues such as image blur, color distortion, and low contrast, which pose significant obstacles target detection tasks. Traditional methods depend on manually designed features, may not accurately characterize targets can also be impacted factors occlusion sediment burial. paper presents novel baseline for object based YOLOv7 algorithm, an end-to-end algorithm with...

10.1109/oceanslimerick52467.2023.10244658 article EN 2023-06-05

Human hand detection is still a challenging problem in real world setting because the appearance features are less and varied form. So it very important to make good use of context enhance feature through each other. In this paper, we propose Context Attention Feature Pyramid Networks CA-FPN for human detection, where Module (CAM) introduced as new component pyramid architecture. The CAM aims to: (1) capture information reserve local edge feature, (2) figure out relative hands. proposed...

10.1109/icmew.2019.00101 article EN 2019-07-01

Understanding web instructional videos is an essential branch of video understanding in two aspects. First, most existing methods focus on short-term actions for a-few-second-long clips; these are not directly applicable to long videos. Second, unlike unconstrained videos, e.g., movies, more structured that they have step-by-step procedures constraining the task. In this work, we study problem-solving via Visual Question Answering (VQA). Surprisingly, it has been emphasis community despite...

10.1109/wacv48630.2021.00117 article EN 2021-01-01

Camouflaged objects are typically assimilated into their backgrounds and exhibit fuzzy boundaries. The complex environmental conditions the high intrinsic similarity between camouflaged targets surroundings pose significant challenges in accurately locating segmenting these entirety. While existing methods have demonstrated remarkable performance various real-world scenarios, they still face limitations when confronted with difficult cases, such as small targets, thin structures, indistinct...

10.48550/arxiv.2305.12635 preprint EN other-oa arXiv (Cornell University) 2023-01-01

We propose an instance segmentation model, named CoMask, that effectively alleviates the scale variation issue and addresses precise localization. Specifically, we develop a multi-scale feature extraction module (MSFEM) to exploit spatial cues. Besides, channel attention mechanism is also adopted further enhance discriminating ability. Equipped with MSFEMs, multi-level features can be extracted better characterize objects of various sizes provide affluent high-level semantic information. For...

10.1109/icassp43922.2022.9747601 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

10.4156/jdcta.vol7.issue5.35 article EN International Journal of Digital Content Technology and its Applications 2013-03-15
Coming Soon ...