Picture for Xinyi Tong

Xinyi Tong

Evolutionary Greedy Algorithm for Optimal Sensor Placement Problem in Urban Sewage Surveillance

Add code
Sep 25, 2024
Viaarxiv icon

MusicAOG: an Energy-Based Model for Learning and Sampling a Hierarchical Representation of Symbolic Music

Add code
Jan 05, 2024
Viaarxiv icon

SSLCL: An Efficient Model-Agnostic Supervised Contrastive Learning Framework for Emotion Recognition in Conversations

Add code
Oct 25, 2023
Viaarxiv icon

Reducing Information Loss for Spiking Neural Networks

Add code
Jul 10, 2023
Viaarxiv icon

Personalized Federated Learning with Feature Alignment and Classifier Collaboration

Add code
Jun 20, 2023
Viaarxiv icon

Real Spike: Learning Real-valued Spikes for Spiking Neural Networks

Add code
Oct 13, 2022
Figure 1 for Real Spike: Learning Real-valued Spikes for Spiking Neural Networks
Figure 2 for Real Spike: Learning Real-valued Spikes for Spiking Neural Networks
Figure 3 for Real Spike: Learning Real-valued Spikes for Spiking Neural Networks
Figure 4 for Real Spike: Learning Real-valued Spikes for Spiking Neural Networks
Viaarxiv icon

An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication

Add code
May 18, 2022
Figure 1 for An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication
Figure 2 for An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication
Figure 3 for An Information-theoretic Method for Collaborative Distributed Learning with Limited Communication
Viaarxiv icon

Differentially Private ERM Based on Data Perturbation

Add code
Feb 20, 2020
Figure 1 for Differentially Private ERM Based on Data Perturbation
Figure 2 for Differentially Private ERM Based on Data Perturbation
Figure 3 for Differentially Private ERM Based on Data Perturbation
Viaarxiv icon

Input Perturbation: A New Paradigm between Central and Local Differential Privacy

Add code
Feb 20, 2020
Figure 1 for Input Perturbation: A New Paradigm between Central and Local Differential Privacy
Figure 2 for Input Perturbation: A New Paradigm between Central and Local Differential Privacy
Figure 3 for Input Perturbation: A New Paradigm between Central and Local Differential Privacy
Figure 4 for Input Perturbation: A New Paradigm between Central and Local Differential Privacy
Viaarxiv icon