Blog(1)
Almost all of us has one or more smartphones, where we keep our personal data such as credit card information, photos, business contacts and so on. It is therefore important to protect this valuable information from unauthorized access.
Research Areas(0)
Publications(59)
Token Fusion: Bridging the Gap between Token Pruning and Token Merging
AuthorRetiree,Shangqian Gao,Yen-Chang Hsu,Yilin Shen,Hongxia Jin
PublishedIEEE Winter Conference on Applications of Computer Vision (WACV)
Date2024-01-03
Enhanced AI Based CSI Prediction Solutions for Massive MIMO in 5G and 6G Systems
AuthorDaoud Burghal,Yang Li,Pranav Madadi,Yeqing Hu,Joonyoung Cho,Jeongho Jeon,Andreas Molisch,Charlie Zhang
PublishedIEEE Access
Date2023-06-30
Voice Spoofing Detection Through Residual Network, Max Feature Map, and Depthwise Separable Convolution
AuthorIl-Youp Kwak; Sungsu Kwag; Junhee Lee; Youngbae Jeon; Jeonghwan Hwang; Hyo-Jung Choi; Jong-Hoon Yang; So-Yul Han, Jun Ho Huh, Choong-Hoon Lee, Ji Won Yoon
Date2023-05-12
News(4)
Convolutional neural networks (CNNs) are widely used today in various vision tasks such as classification, detection and segmentation.
Recent works achieve excellent results in defocus deblurring task based on dual-pixel data using convolutional neural network (CNN), while the scarcity of data limits the exploration and attempt of vision transformer in this task.
Despite the soaring use of convolutional neural networks (CNNs) in mobile applications, uniformly sustaining high-performance inference on mobile has been elusive due to the excessive computational demands of modern CNNs and the increasing diversity of deployed devices. A popular alternative comprises offloading CNN processing to powerful cloud-based servers.
Others(0)