Zobrazeno 1 - 10
of 2 148
pro vyhledávání: '"Li, XiaoDan"'
The decreasing Markov chain on \{1,2,3, \ldots\} with transition probabilities $p(j,j-i) \propto 1/i$ arises as a key component of the analysis of the beta-splitting random tree model. We give a direct and almost self-contained "probability" treatmen
Externí odkaz:
http://arxiv.org/abs/2405.05102
In this paper, we theoretically investigate the many-body localization properties of one-dimensional Ising spin-1 chains by using the methods of exact matrix diagonalization. We compare it with the MBL properties of the Ising spin-1/2 chains. The res
Externí odkaz:
http://arxiv.org/abs/2405.02028
Autor:
Wu, Yuan, Zhou, Yiling, Wang, Xuan, Zhang, Qi, Yao, Xun, Li, Xiaodan, Li, Jianshu, Tian, Haoming, Li, Sheyu
Publikováno v:
JMIR mHealth and uHealth, Vol 7, Iss 8, p e13971 (2019)
BackgroundMobile health interventions are widely used for self-management of diabetes, which is one of the most burdensome noncommunicable chronic diseases worldwide. However, little is known about the distribution of characteristics and functions of
Externí odkaz:
https://doaj.org/article/8048037a2cf44e379eb84b4d0d23f71d
A prevailing belief in attack and defense community is that the higher flatness of adversarial examples enables their better cross-model transferability, leading to a growing interest in employing sharpness-aware minimization and its variants. Howeve
Externí odkaz:
http://arxiv.org/abs/2311.06423
Model Inversion (MI) attacks aim to recover the private training data from the target model, which has raised security concerns about the deployment of DNNs in practice. Recent advances in generative adversarial models have rendered them particularly
Externí odkaz:
http://arxiv.org/abs/2309.00013
Publikováno v:
CVPR 2023
Recent studies have shown that higher accuracy on ImageNet usually leads to better robustness against different corruptions. Therefore, in this paper, instead of following the traditional research paradigm that investigates new out-of-distribution co
Externí odkaz:
http://arxiv.org/abs/2303.17096
Autor:
Gege, Qi, Chen, Yuefeng, Mao, Xiaofeng, Zhu, Yao, Hui, Binyuan, Li, Xiaodan, Zhang, Rong, Xue, Hui
In a transfer-based attack against Automatic Speech Recognition (ASR) systems, attacks are unable to access the architecture and parameters of the target model. Existing attack methods are mostly investigated in voice assistant scenarios with restric
Externí odkaz:
http://arxiv.org/abs/2303.15940
With the development of deep learning technology, the facial manipulation system has become powerful and easy to use. Such systems can modify the attributes of the given facial images, such as hair color, gender, and age. Malicious applications of su
Externí odkaz:
http://arxiv.org/abs/2303.11625
Autor:
Li, Xiaodan, Zheng, Yushu
Publikováno v:
Electron. Commun. Probab. 28: 1-9 (2023)
In this paper, it is shown that $\alpha$-permanent in algebra is closely related to loop soup in probability. We give explicit expansions of $\alpha$-permanents of the block matrices obtained from matrices associated to $*$-forests, which are a speci
Externí odkaz:
http://arxiv.org/abs/2212.06095