Recent Submissions

  • Autonomous agents in snake game via deep reinforcement learning 

    Wei, Zhepei; Wang, Di; Zhang, Ming; Tan, Ah-Hwee; Miao, Chunyan; Zhou, You (2018)
    Since DeepMind pioneered a deep reinforcement learning (DRL) model to play the Atari games, DRL has become a commonly adopted method to enable the agents to learn complex control policies in various video games. However, ...
  • ntuer at SemEval-2019 Task 3 : Emotion classification with word and sentence representations in RCNN 

    Zhong, Peixiang; Miao, Chunyan (2019)
    In this paper we present our model on the task of emotion detection in textual conversations in SemEval-2019. Our model extends the Recurrent Convolutional Neural Network (RCNN) by using external fine-tuned word representations ...
  • A socially-aware incentive mechanism for mobile crowdsensing service market 

    Nie, Jiangtian; Xiong, Zehui; Niyato, Dusit; Wang, Ping; Luo, Jun (2019)
    Mobile Crowdsensing has shown a great potential to address large-scale problems by allocating sensing tasks to pervasive Mobile Users (MUs). The MUs will participate in a Crowdsensing platform if they can receive satisfactory ...
  • System fusion for high-performance voice conversion 

    Tian, Xiaohai; Wu, Zhizheng; Lee, Siu Wa; Nguyen, Quy Hy; Dong, Minghui; Chng, Eng Siong (2015)
    Recently, a number of voice conversion methods have been developed. These methods attempt to improve conversion performance by using diverse mapping techniques in various acoustic domains, e.g. high-resolution spectra and ...
  • EGRET : extortion graph exploration techniques in the Bitcoin network 

    Phetsouvanh, Silivanxay; Oggier, Frédérique; Datta, Anwitaman (2018)
    The Bitcoin network is a complex network that records anonymous financial transactions while encapsulating the relationships among its pseudonymous users. This paper proposes graph mining techniques to explore the relationships ...
  • Free-head appearance-based eye gaze estimation on mobile devices 

    Liu, Jigang; Lee, Francis Bu Sung; Rajan, Deepu (2019)
    Eye gaze tracking plays an important role in human-computer interaction applications. In recent years, many research have been performed to explore gaze estimation methods to handle free-head movement, most of which focused ...
  • BiVA : Bitcoin network visualization & analysis 

    Oggier, Frédérique; Phetsouvanh, Silivanxay; Datta, Anwitaman (2018)
    We showcase a graph mining tool, BiVA, for visualization and analysis of the Bitcoin network. It enables data exploration, visualization of subgraphs around nodes of interest, and integrates both standard and new algorithms, ...
  • Integration design of supply chain hybrid simulation 

    Tan, Wen Jun; Cai, Wentong; Zhang, Allan NengSheng (2017)
    A supply chain (SC) consists of multiple entities representing the retailers, manufacturers, distributors or suppliers. A firm can be one of the entities within the whole SC. To study the external effects on its internal ...
  • Surrogate assisted calibration framework for crowd model calibration 

    Yi, Wenchao; Zhong, Jinghui; Tan, Singkuang; Cai, Wentong; Hu, Nan (2017)
    Surrogate models are commonly used to approximate the multivariate input or output behavior of complex systems. In this paper, surrogate assisted calibration frameworks are proposed to calibrate the crowd model. To integrate ...
  • The NNi Vietnamese speech recognition system for mediaeval 2016 

    Wang, Lei; Ni, Chongjia; Leung, Cheung-Chi; You, Changhuai; Xie, Lei; Xu, Haihua; Xiao, Xiong; Nwe, Tin Lay; Chng, Eng Siong; Ma, Bin; Li, Haizhou (2016)
    This paper provides an overall description of the Vietnamese speech recognition system developed by the joint team for MediaEval 2016. The submitted system consisted of 3 subsystems, and adopted different deep neural ...
  • Entropy-based graph clustering - a simulated annealing approach 

    Oggier, Frédérique; Phetsouvanh, Silivanxay; Datta, Anwitaman (2018)
    We revisit a Renyi entropy based measure introduced originally for image clustering [1], and study its application to graph clustering. To effectuate Renyi entropy based graph clustering, we propose a simulated annealing ...
  • Entropic centrality for non-atomic flow networks 

    Oggier, Frédérique; Phetsouvanh, Silivanxay; Datta, Anwitaman (2018)
    Given a graph, the notion of entropic centrality was introduced by Tutzauer to characterize vertices which are important in the sense that there is a high uncertainty about the destination of an atomic flow starting at ...
  • Revisiting public reputation calculation in a personalized trust model 

    Cohen, Robin; Wang, Peng Fei; Hu, Zehong (2018)
    In this paper, we present a strategy for agents to predict the trustworthiness of other agents based on reports from peers, when the public reputation reflected by majority opinion may be suspect. We ground our discussion ...
  • A comprehensive exploration to the machine learning techniques for diabetes identification 

    Wei, Sidong; Zhao, Xuejiao; Miao, Chunyan (2018)
    Diabetes mellitus, known as diabetes, is a group of metabolic disorders and has affected hundreds of millions of people. The detection of diabetes is of great importance, concerning its severe complications. There have ...
  • Protecting block ciphers against differential fault attacks without re-keying 

    Baksi, Anubhab; Bhasin, Shivam; Breier, Jakub; Khairallah, Mustafa; Peyrin, Thomas (2018)
    In this article, we propose a new method to protect block cipher implementations against Differential Fault Attacks (DFA). Our strategy, so-called “Tweak-in-Plaintext”, ensures that an uncontrolled value ('tweak-in') is ...
  • Comparison between ternary and binary Gray-code based phase unwrapping methods 

    Zheng, Dongliang; Kemao, Qian; Da, Feipeng; Seah, Hock Soon (2017)
    Phase-shifting profilometry using binary patterns with projector defocusing has been widely used for high-speed 3D measurement. Recently, a ternary Gray-code based phase unwrapping method has been proposed, which enables ...
  • Application of EMD in fringe analysis: new developments 

    Wang, Chenxing; Kemao, Qian; Da, Feipeng; Gai, Shaoyan (2017)
    Empirical mode decomposition (EMD) based methods have been widely used in fringe pattern analysis, including denoising, detrending, normalization, etc. The common problem of using EMD and Bi-dimensional EMD is the mode ...
  • A review of sensing technologies for small and large-scale touch panels 

    Qian, Kemao; Kakarala, Ramakrishna; Akhtar, Humza (2017)
    A touch panel is an input device for human computer interaction. It consists of a network of sensors, a sampling circuit and a micro controller for detecting and locating a touch input. Touch input can come from either ...
  • WFF-BM3D : a hybrid denoising scheme for fringe patterns 

    Zhao, Ming; Qian, Kemao (2015)
    Fringe patterns are widely used in the optical interferometry. The captured fringe patterns usually have noises, and thus a filtering process for fringe patterns is necessary. The windowed Fourier filtering (WFF) algorithm ...
  • Visual pattern degradation based image quality assessment 

    Wu, Jinjian; Li, Leida; Shi, Guangming; Lin, Weisi; Wan, Wenfei (2015)
    In this paper, we introduce a visual pattern degradation based full-reference (FR) image quality assessment (IQA) method. Researches on visual recognition indicate that the human visual system (HVS) is highly adaptive to ...

View more