Yinghua Zhang

ORCID: 0000-0003-0324-4812
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Neural Network Applications
  • Domain Adaptation and Few-Shot Learning
  • Topic Modeling
  • Video Surveillance and Tracking Methods
  • Bayesian Modeling and Causal Inference
  • Multi-Criteria Decision Making
  • Advanced Image and Video Retrieval Techniques
  • Machine Learning and ELM
  • Advanced Graph Neural Networks
  • Multimodal Machine Learning Applications
  • Text and Document Classification Technologies
  • Advanced Text Analysis Techniques
  • Anomaly Detection Techniques and Applications
  • Asian Culture and Media Studies
  • Adversarial Robustness in Machine Learning
  • Face recognition and analysis
  • Digital Media Forensic Detection
  • Industrial Technology and Control Systems
  • Advanced Computational Techniques and Applications
  • Higher Education Governance and Development
  • Nosocomial Infections in ICU
  • Human Pose and Action Recognition
  • Wheat and Barley Genetics and Pathology
  • Gait Recognition and Analysis
  • Web Data Mining and Analysis

Gansu Provincial Hospital
2025

Jiaozuo University
2023

Hong Kong University of Science and Technology
2018-2022

University of Hong Kong
2018-2022

United States Global Change Research Program
2022

Qingdao Academy of Intelligent Industries
2020

Dalian University
2017

Chinese Academy of Sciences
2012-2014

Shanghai Jiao Tong University
2014

Institute of Automation
2012-2013

This paper proposes a novel sparse variant of auto-encoders as building block to pre-train deep neural networks. Compared with through KL-divergence, our method requires fewer hyper-parameters and the sparsity level hidden units can be learnt automatically. We have compared several other unsupervised leaning algorithms on benchmark databases. The satisfactory classification accuracy (97.92% MNIST 87.29% NORB) achieved by 2-hidden-layer network pre-trained using algorithm, whole training...

10.1109/icaci.2013.6748512 article EN 2013-10-01

Transfer learning has become a common practice for training deep models with limited labeled data in target domain. On the other hand, are vulnerable to adversarial attacks. Though transfer been widely applied, its effect on model robustness is unclear. To figure out this problem, we conduct extensive empirical evaluations show that fine-tuning effectively enhances under white-box FGSM We also propose black-box attack method which attacks examples produced by source model. systematically...

10.1145/3394486.3403349 preprint EN 2020-08-20

Greedy Equivalent Search (GES) is an effective algorithm for Bayesian network problem, which searches in the space of graph equivalence classes. However, original GES may easily fall into local optimization trap because empty initial structure. In this paper, An improved method prosposed. It firstly makes a draft real network, based on Maximum Information Coefficient (MIC) and conditional independence tests. After step, many independent relations can be found. To ensure correctness, then...

10.1109/icaci.2012.6463292 article EN 2012-10-01

Topic models are widely explored for summarizing a corpus of documents. Recent advances in Variational AutoEncoder (VAE) have enabled the development black-box inference methods topic modeling order to alleviate drawbacks classical statistical inference. Most existing VAE based approaches assume unimodal Gaussian distribution approximate posterior latent variables, which limits flexibility encoding space. In addition, unsupervised architecture hinders incorporation extra label information,...

10.1109/access.2020.3001184 article EN cc-by IEEE Access 2020-01-01

Parameters in deep neural networks which are trained on large-scale databases can generalize across multiple domains, is referred as "transferability". Unfortunately, the transferability usually defined discrete states and it differs with domains network architectures. Existing works heuristically apply parameter-sharing or fine-tuning, there no principled approach to learn a parameter transfer strategy. To address gap, unit (PTU) proposed this paper. The PTU learns fine-grained nonlinear...

10.48550/arxiv.1804.08613 preprint EN other-oa arXiv (Cornell University) 2018-01-01

In this paper we propose a novel multiple target tracking model composed of two detectors and tracker. An on-line detector tracker are used to generate candidates, whose confidence scores then evaluated by the off-line trained detectors. data association stage, high-efficient inference in structural leads optimal result. The experimental results demonstrate that our can overcome occlusion appearance changing problems. be applied analyze information single or among targets.

10.1109/icme.2014.6890133 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2014-07-01

Extracting rich feature representations is a key challenge in person re-identification (Re-ID) tasks. However, traditional Convolutional Neural Networks (CNN) based methods could ignore part of information when processing local regions images, which leads to incomplete extraction. To this end, paper proposes Re-ID method on vision Transformer with hierarchical structure and window shifting. When extracting image features, the model constructed by introducing construction commonly used CNN....

10.1371/journal.pone.0287979 article EN cc-by PLoS ONE 2023-06-30

Pedestrian detection is one of the key technologies in automotive safety, robotic and intelligent video surveillance. Recently, deep convolutional neural networks have achieved significant effect image classification retrieval tasks. In this paper, we propose a novel model for pedestrian to simultaneously extract classify features. The proposed 19 layers network which consists 7 convolution layers, 3 pooling 6 relu 2 normalization layer. classical back propagation algorithm adopted train...

10.1109/icisce.2017.116 article EN 2017-07-01

Fine-tuning can be vulnerable to adversarial attacks. Existing works about black-box attacks on fine-tuned models (BAFT) are limited by strong assumptions. To fill the gap, we propose two novel BAFT settings, cross-domain and cross-architecture BAFT, which only assume that (1) target model for attacking is a model, (2) source domain data known accessible. successfully attack under both first train an generator against adopts encoder-decoder architecture maps clean input example. Then search...

10.1145/3511808.3557276 article EN Proceedings of the 31st ACM International Conference on Information & Knowledge Management 2022-10-16

Deep domain adaptation models learn a neural network in an unlabeled target by leveraging the knowledge from labeled source domain. This can be achieved learning domain-invariant feature space. Though learned representations are separable domain, they usually have large variance and samples with different class labels tend to overlap which yields suboptimal performance. To fill gap, Fisher loss is proposed discriminative within-class compact between-class separable. Experimental results on...

10.48550/arxiv.2003.05636 preprint EN other-oa arXiv (Cornell University) 2020-01-01

The various scale makes detecting and localizing objects a challenging problem, especially for small-scale instances [1, 2]. While most existing models focus on detection in static images, we investigate the video surveillance scenario. In this paper, probabilistic graphical model is proposed to integrate local generic object detector scene-specific contextual features. outperforms part-based by extending them into multiresolution structure. Experimental results public dataset CAVIAR [3]...

10.1109/icip.2014.7025471 article EN 2022 IEEE International Conference on Image Processing (ICIP) 2014-10-01

The paper develops a connection between the first-order logic representation and content structure model in sentiment analysis applications. We propose modified semi-supervised approach to study word-level with well-designed features. is Conditional Random Fields (CRF) latent topic nodes. Introducing features into our can solve long-distance dependency problem. new applied two multi-aspect tasks: sentence labeling task rating prediction task. use data from Amazon corpus movie-review corpus....

10.1109/icnc.2013.6818138 article EN 2013-07-01

Finding the optimistic triangulation in Bayesian network, is NP hard. Optimization Algorithm a new kind of evolutionary algorithm estimation distribution algorithms (EDAs). An improved BOA proposed to get approximate this paper. We carry out four EDAs including our method, on standard networks. Comparing with other Estimation algorithms, method displays better experimental results and robustness.

10.4156/jdcta.vol7.issue5.71 article EN International Journal of Digital Content Technology and its Applications 2013-03-15

The self-organizing map (SOM) is an excellent tool for data mining. In order to know the understanding of businesses establishing environment-friendly enterprise, we carried out a questionnaire 49 manufacturing enterprises in city and clustered results using SOM network. We found that there are four different classes among enterprises. doing this work developed new procedure uniting one-dimensional with two-dimensional visualizing exploring properties training results. can reduce subjective...

10.1109/fskd.2007.563 article EN 2007-01-01
Coming Soon ...