1 code implementation • ACL 2022 • Amanul Haque, Vaibhav Garg, Hui Guo, Munindar Singh
We present Pixie, a manually annotated dataset for preference classification comprising 8, 890 sentences drawn from app reviews.
no code implementations • 31 Jan 2024 • Yicui Peng, Hao Chen, ChingSheng Lin, Guo Huang, Jinrong Hu, Hui Guo, Bin Kong, Shu Hu, Xi Wu, Xin Wang
Providing explanations within the recommendation system would boost user satisfaction and foster trust, especially by elaborating on the reasons for selecting recommended items tailored to the user.
no code implementations • 28 Jan 2024 • Jianxiang Lu, Cong Xie, Hui Guo
Our proposed method aims to address the challenges of generalizability and fidelity in an object-driven way, using only a single input image and the object-specific regions of interest.
no code implementations • 4 Feb 2023 • Chenghong Sun, Weidong Ji, Guohui Zhou, Hui Guo, Zengxiang Yin, Yuqi Yue
We propose the hypothesis that the key semantic information inside the sentence plays a key role in entity relationship extraction.
no code implementations • 21 Dec 2022 • Xiaojiang Ren, Hui Guo, Sheng Kai, Guoqiang Mao
While the increased automation levels of production and operation equipment have led to improved productivity of mining activity in open pit mines, the capacity of mine transport system become a bottleneck.
no code implementations • 21 Oct 2022 • Hui Guo, Xin Wang, Siwei Lyu
Specifically, we authenticate video calls by displaying a distinct pattern on the screen and using the corneal reflection extracted from the images of the call participant's face.
no code implementations • 13 May 2022 • Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu
In this work, we develop an online platform called Open-eye to study the human performance of AI-synthesized face detection.
no code implementations • 15 Feb 2022 • Xin Wang, Hui Guo, Shu Hu, Ming-Ching Chang, Siwei Lyu
Generative Adversarial Networks (GAN) have led to the generation of very realistic face images, which have been used in fake social media accounts and other disinformation matters that can generate profound impacts.
no code implementations • 28 Jan 2022 • Jack Kelly, Carlo Berzuini, Bernard Keavney, Maciej Tomaszewski, Hui Guo
With the increasing availability and size of multi-omics datasets, investigating the casual relationships between molecular phenotypes has become an important aspect of exploring underlying biology and genetics.
no code implementations • 5 Sep 2021 • Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu
However, images from existing public datasets do not represent real-world scenarios well enough in terms of view variations and data distributions (where real faces largely outnumber synthetic faces).
no code implementations • 1 Sep 2021 • Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu
Generative adversary network (GAN) generated high-realistic human faces have been used as profile images for fake social media accounts and are visually challenging to discern from real ones.
no code implementations • 16 Apr 2021 • Peilun Wu, Fan Yan, Hui Guo
Email threat is a serious issue for enterprise security, which consists of various malicious scenarios, such as phishing, fraud, blackmail and malvertisement.
1 code implementation • COLING 2020 • Parth Diwanji, Hui Guo, Munindar Singh, Anup Kalia
Commitments and requests are a hallmark of collaborative communication, especially in team settings.
no code implementations • 23 Oct 2020 • Shiyi Yang, Peilun Wu, Hui Guo
Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years.
no code implementations • 5 Aug 2020 • Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo
High false alarm rate and low detection rate are the major sticking points for unknown threat perception.
no code implementations • 19 Jan 2020 • Peilun Wu, Hui Guo, Nour Moustafa
To address this problem, the network intrusion detection system (NIDS) has been used.
1 code implementation • 22 Sep 2019 • Peilun Wu, Hui Guo
Our experiments on two network traffic datasets show that compared to the state-of-the-art network intrusion detection techniques, LuNet not only offers a high level of detection capability but also has a much low rate of false positive-alarm.
no code implementations • 5 Sep 2019 • Peilun Wu, Hui Guo, Richard Buckland
ConvNet can also be applied to network intrusion detection.