Yihong Dong

ORCID: 0000-0001-6228-4019
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Wireless Signal Modulation Classification
  • Blind Source Separation Techniques
  • Software Testing and Debugging Techniques
  • Advanced Image and Video Retrieval Techniques
  • Topic Modeling
  • Software Reliability and Analysis Research
  • Web Application Security Vulnerabilities
  • Advanced Wireless Communication Technologies
  • Financial Distress and Bankruptcy Prediction
  • Natural Language Processing Techniques
  • Multimodal Machine Learning Applications
  • Brain Tumor Detection and Classification
  • Imbalanced Data Classification Techniques
  • UAV Applications and Optimization
  • EEG and Brain-Computer Interfaces
  • Teaching and Learning Programming
  • Advanced SAR Imaging Techniques
  • Machine Learning and ELM
  • Anomaly Detection Techniques and Applications
  • Geophysical Methods and Applications
  • Robotics and Sensor-Based Localization
  • Video Analysis and Summarization
  • AI in Service Interactions
  • Advanced Vision and Imaging

Ningbo University
2025

Peking University
2023-2024

Tongji University
2020-2021

Although large language models (LLMs) have demonstrated remarkable code-generation ability, they still struggle with complex tasks. In real-world software development, humans usually tackle tasks through collaborative teamwork, a strategy that significantly controls development complexity and enhances quality. Inspired by this, we present self-collaboration framework for code generation employing LLMs, exemplified ChatGPT. Specifically, role instructions, (1) Multiple LLM agents act as...

10.1145/3672459 article EN ACM Transactions on Software Engineering and Methodology 2024-06-12

Signal recognition is one of the significant and challenging tasks in signal processing communications field. It often a common situation that there's no training data accessible for some classes to perform task. Hence, as widely-used image field, zero-shot learning (ZSL) also very important recognition. Unfortunately, ZSL regarding this field has hardly been studied due inexplicable semantics. This paper proposes framework, reconstruction convolutional neural networks (SR2CNN), address...

10.1109/tsp.2021.3070186 article EN IEEE Transactions on Signal Processing 2021-01-01

Although large language models (LLMs) have demonstrated impressive ability in code generation, they are still struggling to address the complicated intent provided by humans. It is widely acknowledged that humans typically employ planning decompose complex problems and schedule solution steps prior implementation. To this end, we introduce into generation help model understand reduce difficulty of problem-solving. This paper proposes a self-planning approach with models, which consists two...

10.1145/3672456 article EN ACM Transactions on Software Engineering and Methodology 2024-06-13

Due to the emergence of deep learning, signal recognition has made great strides in performance improvement. The success most learning methods relies on accessibility abundant labeled training data. However, annotation signals is quite expensive, making it challenging train models substantially. This calls for development semi-supervised (SSL) method fully utilize unlabeled data assist models. To achieve this goal, three types loss functions, tailored task SLL-based recognition, are...

10.1109/tccn.2021.3067916 article EN IEEE Transactions on Cognitive Communications and Networking 2021-03-22

A proper code evaluation metric (CEM) profoundly impacts the evolution of generation, which is an important research field in NLP and software engineering. Prevailing match-based CEMs (e.g., BLEU, Accuracy, CodeBLEU) suffer from two significant drawbacks. 1. They primarily measure surface differences between codes without considering their functional equivalence. However, equivalence pivotal evaluating effectiveness as different can perform identical operations. 2. are predominantly designed...

10.1145/3695991 article EN ACM Transactions on Software Engineering and Methodology 2024-09-13

10.1109/icassp49660.2025.10888673 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Unmanned aerial vehicle (UAV) communication has drawn significant interests from the industry and academic due to its low cost, high maneuverability, on-demand deployment. This paper considers priority-based resource coordination in a multi-UAV system, where multiple UAVs are operated by ground base station perform certain task with pre-defined trajectory. To ensure reliable control of UAVs, we formulate problem as mixed-integer programming, mainly aiming maximize minimum signal-to-noise...

10.1109/spawc48557.2020.9154272 article EN 2020-05-01

Deep neural networks have been shown as a class of useful tools for addressing signal recognition issues in recent years, especially identifying the nonlinear feature structures signals. However, this power most deep learning techniques heavily relies on an abundant amount training data, so performance classic nets decreases sharply when number data samples is small or unseen are presented testing phase. This calls advanced strategy, i.e., model-agnostic meta-learning (MAML), which able to...

10.48550/arxiv.2106.04392 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Code generation aims to automatically generate the source code based on given natural language (NL) descriptions, which is of great significance for automated software development. Some models follow a model-based paradigm (LMBP) tokens sequentially. others focus deriving grammatical structure by generating program's abstract syntax tree (AST), i.e., using structure-based (GSBP). Existing studies are trying through one above two models. However, human developers often consider both...

10.1145/3609437.3609465 article EN 2023-08-04

Due to the emergence of deep learning, signal recognition has made great strides in performance improvement. The success most learning methods relies on accessibility abundant labelled training data. However, annotation signals is quite expensive, making it challenging train models substantially. This calls for development semi-supervised (SSL) method fully utilize unlabelled data assist models. To achieve this goal, three types loss function tailored task are carefully designed paper....

10.1109/wcnc49053.2021.9417546 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2021-03-29

Deep neural networks have been shown as a class of useful tools for addressing signal recognition issues in recent years, especially identifying the nonlinear feature structures signals. However, this power most deep learning techniques heavily relies on an abundant amount training data, so performance classic nets decreases sharply when number data samples is small or unseen are presented testing phase. This calls advanced strategy, i.e., model-agnostic meta-learning (MAML), which can...

10.1109/icassp48485.2024.10447867 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Current structured pruning methods often result in considerable accuracy drops due to abrupt network changes and loss of information from pruned structures. To address these issues, we introduce the Decay Pruning Method (DPM), a novel smooth approach with self-rectifying mechanism. DPM consists two key components: (i) Smooth Pruning: It converts conventional single-step into multi-step pruning, gradually reducing redundant structures zero over N steps ongoing optimization. (ii)...

10.48550/arxiv.2406.03879 preprint EN arXiv (Cornell University) 2024-06-06

Different from the flow semantics of natural languages, programming languages are inherently rigid in structure and grammar. Existing fine-tuning methodologies for code vulnerability detection generally treat as long text sequences, stripping away structural elements such newlines ('/n') whitespace. However, this approach inadvertently results loss crucial information, diminishing distinct characteristics impairing accuracy detection. To address these challenges, we propose a novel network...

10.48550/arxiv.2407.18877 preprint EN arXiv (Cornell University) 2024-07-26

Large language models (LLMs) have achieved impressive performance in code generation recently, offering programmers revolutionary assistance software development. However, due to the auto-regressive nature of LLMs, they are susceptible error accumulation during generation. Once an is produced, LLMs can merely continue generate subsequent conditioned on it, given their inability adjust previous outputs. Existing LLM-based approaches typically consider post-revising after generation, leading...

10.48550/arxiv.2411.07112 preprint EN arXiv (Cornell University) 2024-11-11

The rotation averaging problem is a fundamental task in computer vision applications. It generally very difficult to solve due the nonconvex constraints. While sufficient optimality condition available literature, there lack of fast convergent algorithm achieve stationary points. In this paper, by exploring structure, we first propose block coordinate descent (BCD)-based with guaranteed convergence Afterwards, further an alternative applying successive upper-bound minimization (SUM) method....

10.1145/3451263 article EN Proceedings of the ACM on Computer Graphics and Interactive Techniques 2021-04-26
Coming Soon ...