Data-centric artificial intelligence: A survey

D Zha, ZP Bhat, KH Lai, F Yang, Z Jiang… - arXiv preprint arXiv …, 2023 - arxiv.org
Artificial Intelligence (AI) is making a profound impact in almost every domain. A vital enabler
of its great success is the availability of abundant and high-quality data for building machine …

Winner-take-all column row sampling for memory efficient adaptation of language model

Z Liu, G Wang, SH Zhong, Z Xu, D Zha… - Advances in …, 2024 - proceedings.neurips.cc
As the model size grows rapidly, fine-tuning the large pre-trained language model has
become increasingly difficult due to its extensive memory usage. Previous works usually …

Hardware solutions for low-power smart edge computing

L Martin Wisniewski, JM Bec, G Boguszewski… - Journal of Low Power …, 2022 - mdpi.com
The edge computing paradigm for Internet-of-Things brings computing closer to data
sources, such as environmental sensors and cameras, using connected smart devices. Over …

DIVISION: memory efficient training via dual activation precision

G Wang, Z Liu, Z Jiang, N Liu… - … on Machine Learning, 2023 - proceedings.mlr.press
Activation compressed training provides a solution towards reducing the memory cost of
training deep neural networks (DNNs). However, state-of-the-art work combines a search of …

Autovideo: An automated video action recognition system

D Zha, ZP Bhat, YW Chen, Y Wang, S Ding… - arXiv preprint arXiv …, 2021 - arxiv.org
Action recognition is an important task for video understanding with broad applications.
However, developing an effective action recognition solution often requires extensive …

TransCAB: Transferable clean-annotation backdoor to object detection with natural trigger in real-world

H Ma, Y Li, Y Gao, Z Zhang, A Abuadbba… - 2023 42nd …, 2023 - ieeexplore.ieee.org
Object detection is the foundation of various critical computer-vision tasks such as
segmentation, object tracking, and event detection, which can be deployed on pervasive …

Qualitative analysis of anomaly detection in time series

MQ Bhat, SA Alex, S Nanda… - 2022 4th International …, 2022 - ieeexplore.ieee.org
We present an end-end system for time series anomaly detection specifically aimed at
detecting fraudulent transactions in bank transaction datasets. The goal of anomaly …

[PDF][PDF] Xia Hu

D Zha - 2023 - repository.rice.edu
Deep reinforcement learning has recently achieved remarkable success in various domains,
ranging from games [10, 11, 12], to real-world applications such as neural architecture …

[PDF][PDF] Backbone search for object detection for applications in intrusion warning systems

ND Thuan, NTL Huong, HS Hong - Int J Artif Intell, 2024 - researchgate.net
In this work, we propose a novel backbone search method for object detection for
applications in intrusion warning systems. The goal is to find a compact model for use in …

Efficient Methods for Deep Reinforcement Learning: Algorithms and Applications

D Zha - 2023 - search.proquest.com
Deep reinforcement learning (deep RL) has recently achieved remarkable success in
various domains, from simulated games to real-world applications. However, deep RL …