- Handwritten Text Recognition Techniques
- Adversarial Robustness in Machine Learning
- Natural Language Processing Techniques
- Topic Modeling
- interferon and immune responses
- Advanced Computational Techniques and Applications
- Image Retrieval and Classification Techniques
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Advanced Image and Video Retrieval Techniques
- Hate Speech and Cyberbullying Detection
- Image and Signal Denoising Methods
- Mobile Agent-Based Network Management
- Currency Recognition and Detection
- Image Processing and 3D Reconstruction
- Immune Response and Inflammation
- Optical Systems and Laser Technology
- Inflammasome and immune disorders
- Anomaly Detection Techniques and Applications
- Higher Education and Teaching Methods
- Industrial Technology and Control Systems
- Forest Biomass Utilization and Management
- RNA regulation and disease
- Advanced Multi-Objective Optimization Algorithms
Southern University of Science and Technology
2021-2024
Hong Kong University of Science and Technology
2024
University of Hong Kong
2003-2024
Huawei Technologies (United Kingdom)
2023-2024
Huawei Technologies (China)
2021-2023
Ningbo University
2022
State Grid Corporation of China (China)
2021
Ping An (China)
2020-2021
Queen Medical
2021
Xi’an University of Posts and Telecommunications
2020
Computer vision with state-of-the-art deep learning models has achieved huge success in the field of Optical Character Recognition (OCR) including text detection and recognition tasks recently. However, Key Information Extraction (KIE) from documents as downstream task OCR, having a large number use scenarios real-world, remains challenge because not only have textual features extracting OCR systems but also semantic visual that are fully exploited play critical role KIE. Too little work...
The innate immune system is equipped with many molecular sensors for microbial DNA/RNA to quickly mount antimicrobial host responses. In this paper, we identified DHX9, a DExDc helicase family member, as an important viral dsRNA sensor in myeloid dendritic cells (mDCs). Knockdown of DHX9 expression by small heteroduplex RNA dramatically blocked the ability mDCs produce IFN-α/β and proinflammatory cytokines response polyinosine-polycytidylic acid, influenza A, reovirus. could specifically...
Table structure recognition aims to extract the logical and physical of unstructured table images into a machine-readable format. The latest end-to-end image-to-text approaches simultaneously predict two structures by decoders, where prediction (the bounding boxes cells) is based on representation structure. However, previous methods struggle with imprecise as lacks local visual information. To address this issue, we propose an sequential modeling framework for called VAST. It contains novel...
The field of adversarial textual attack has significantly grown over the past few years, where commonly considered objective is to craft examples (AEs) that can successfully fool target model. However, imperceptibility attacks, which also essential for practical attackers, often left out by previous studies. In consequence, crafted AEs tend have obvious structural and semantic differences from original human-written text, making them easily perceptible. this work, we advocate leveraging...
Many members of the DEXD/H box helicase family play important roles in innate immune system against viral infection. Therefore, we isolated dsRNA complex myeloid dendritic cells. We found that DHx15, a DEXDc member, is one components this complex. Knockdown DHX15 expression by short hairpin RNA efficiently reduced ability cells to produce IFN-β, IL-6, and TNF-α response virus. specifically bound polyinosine-polycytidylic acid via its C-terminal domain. interacted with MAVS formed following...
Over the past few years, various word-level textual attack approaches have been proposed to reveal vulnerability of deep neural networks used in natural language processing. Typically, these involve an important optimization step determine which substitute be for each word original input. However, current research on this is still rather limited, from perspectives both problem-understanding and problem-solving. In paper, we address issues by uncovering theoretical properties problem...
Large language models (LLMs) have shown remarkable performance in various tasks and been extensively utilized by the public. However, increasing concerns regarding misuse of LLMs, such as plagiarism spamming, led to development multiple detectors, including fine-tuned classifiers statistical methods. In this study, we equip LLMs with prompts, rather than relying on an external paraphraser, evaluate vulnerability these detectors. We propose a novel Substitution-based In-Context example...
Text recognition methods are gaining rapid development. Some advanced techniques, e.g., powerful modules, language models, and un- semi-supervised learning schemes, consecutively push the performance on public benchmarks forward. However, problem of how to better optimize a text model from perspective loss functions is largely overlooked. CTC-based methods, widely used in practice due their good balance between inference speed, still grapple with accuracy degradation. This because CTC...
A polyclonal antibody against the quinolone drug pazufloxacin (PAZ) but with surprisingly broad specificity was raised to simultaneously detect 24 quinolones (QNs). The developed competitive indirect enzyme-linked immunosorbent assay (ciELISA) exhibited limits of detection (LODs) for QNs ranging from 0.45 15.16 ng/mL, below maximum residue levels (MRLs). To better understand obtained specificity, a genetic algorithm linear assignment hypermolecular alignment data sets (GALAHAD) used generate...
The wood fuel pellet industry has been growing rapidly in recent years. survey results reported here are focused on the annual production, raw material, production cost rankings, market radius, barriers to expansion, and other data that give an overview of during a very difficult economic period. Eighty-four mills across United States were contacted 53 responded. average volume was over 59,000 tons per year. Raw materials for pelletizing labor principal costs according respondents. Market...
Computer vision with state-of-the-art deep learning models has achieved huge success in the field of Optical Character Recognition (OCR) including text detection and recognition tasks recently. However, Key Information Extraction (KIE) from documents as downstream task OCR, having a large number use scenarios real-world, remains challenge because not only have textual features extracting OCR systems but also semantic visual that are fully exploited play critical role KIE. Too little work...
The role of bone marrow-derived cells in gastric cancer formation was not fully understood. In this study, marrow from female green fluorescent protein transgenic mice transplanted into male wild-type to generate sex-mismatched chimeric mice. were treated with carcinogen induce cancer. At time sacrifice, 18.2 % (2/11) showed severe dysplasia and 25 (3/12) successfully induced Fluorescence situ hybridization results that participated renewal mucosa cell fusion observed both precancerous...
The field of adversarial textual attack has significantly grown over the last few years, where commonly considered objective is to craft examples (AEs) that can successfully fool target model. However, imperceptibility attacks, which also essential for practical attackers, often left out by previous studies. In consequence, crafted AEs tend have obvious structural and semantic differences from original human-written text, making them easily perceptible. this work, we advocate leveraging...
Vehicle trajectory prediction technology is of great significance in autonomous driving and intelligent transportation systems. Ego-vehicles can judge the future motion state considering nearby vehicles by predicting their trajectories, which facilitates safe effective decisions to avoid collisions. It a challenging task accurately predict trajectories surrounding vehicles. To solve this problem, we propose Self-Attention Social Generative Adversarial Networks (SA-SGAN) model We use...