Searched for: author%3A%22Xu%2C+J.%22
(1 - 20 of 44)

Pages

document
Xu, J. (author), Broekens, D.J. (author), Hindriks, K.V. (author), Neerincx, M.A. (author)
Mood contagion is an automatic mechanism that induces a congruent mood state by means of the observation of another person's emotional expression. In this paper, we address the question whether robot mood displayed during an imitation game can (a) be recognized by participants and (b) produce contagion effects. Robot mood was displayed by...
conference paper 2014
document
Weerheijm, J. (author), Lu, Y. (author), Xu, J. (author)
This paper presents a numerical modelling study on the simulation of the cracking process and fracture energy in concrete under high strain rate. To capture the stress wave effect and the damage evolution at the meso-length scale, both a homogeneous model with a millimetreresolution mesh and an explicit heterogeneous mesoscale model with random...
conference paper 2013
document
Xu, J. (author), van den Boom, A.J.J. (author), Busoniu, L (author), De Schutter, B.H.K. (author)
This paper considers model predictive control for continuous piecewise affine (PWA) systems. In general, this leads to a nonlinear, nonconvex optimization problem. We introduce an approach based on optimistic optimization to solve the resulting optimization problem. Optimistic optimization is based on recursive partitioning of the feasible set...
conference paper 2016
document
Xu, J. (author), Busoniu, L (author), van den Boom, A.J.J. (author), De Schutter, B.H.K. (author)
This paper addresses the infinite-horizon optimal control problem for max-plus linear systems where the considered objective function is a sum of discounted stage costs over an infinite horizon. The minimization problem of the cost function is equivalently transformed into a maximization problem of a reward function. The resulting optimal...
conference paper 2016
document
Ping, Y. (author), Yao, X. (author), Xu, J. (author), Li, Juntian (author), Song, Y. (author), Vink, P. (author)
The angle of attack (AOA) of an airplane changes the direction of the gravitational force on passengers and thereby might influence passengers’ flying experience. However, the contribution of the AOA regarding comfort/discomfort is not fully explored. In this paper, we aim to fill this knowledge gap by identifying the relationships between the...
conference paper 2021
document
Koffas, S. (author), Xu, J. (author), Conti, M. (author), Picek, S. (author)
This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, we make the backdoor attack challenging to detect for legitimate users and, consequently, potentially more dangerous. We conduct experiments on two versions of a speech dataset and three neural networks and explore the...
conference paper 2022
document
Xu, J. (author), Wang, R. (author), Koffas, S. (author), Liang, K. (author), Picek, S. (author)
Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to...
conference paper 2022
document
Conti, M. (author), Li, Jiaxin (author), Picek, S. (author), Xu, J. (author)
Graph Neural Networks (GNNs), inspired by Convolutional Neural Networks (CNNs), aggregate the message of nodes' neighbors and structure information to acquire expressive representations of nodes for node classification, graph classification, and link prediction. Previous studies have indicated that node-level GNNs are vulnerable to Membership...
conference paper 2022
document
Xu, J. (author), Hong, C. (author), Huang, J. (author), Chen, Lydia Y. (author), Decouchant, Jérémie (author)
Federated learning is a private-by-design distributed learning paradigm where clients train local models on their own data before a central server aggregates their local updates to compute a global model. Depending on the aggregation method used, the local updates are either the gradients or the weights of local learning models, e.g., FedAvg...
conference paper 2023
document
Wu, Y. (author), Soeiro, Thiago B. (author), Shekhar, A. (author), Xu, J. (author), Bauer, P. (author)
LCL filter is widely adopted for strict standard compliance of grid-tied voltage source converters (VSCs). The third order low-pass filtering provides great attenuation for the high frequency harmonics generated by the power electronics guaranteeing low output currents noise injection into the grid. A major concern of the implementation of the...
conference paper 2021
document
Xu, J. (author), Abad, Gorka (author), Picek, S. (author)
Backdoor attacks have been demonstrated as a security threat for machine learning models. Traditional backdoor attacks intend to inject backdoor functionality into the model such that the backdoored model will perform abnormally on inputs with predefined backdoor triggers and still retain state-of-the-art performance on the clean inputs. While...
conference paper 2023
document
Xu, J. (author), Koffas, S. (author), Ersoy, Oǧuzhan (author), Picek, S. (author)
Graph Neural Networks (GNNs) have achieved promising performance in various real-world applications. Building a powerful GNN model is not a trivial task, as it requires a large amount of training data, powerful computing resources, and human expertise. Moreover, with the development of adversarial attacks, e.g., model stealing attacks, GNNs...
conference paper 2023
document
Xu, J. (author), Xue, Minhui (author), Picek, S. (author)
Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works on backdoor attacks on neural networks, but only a few works consider graph neural...
conference paper 2021
document
Xu, J. (author), Picek, S. (author)
Graph Neural Networks (GNNs) have achieved impressive results in various graph learning tasks. They have found their way into many applications, such as fraud detection, molecular property prediction, or knowledge graph reasoning. However, GNNs have been recently demonstrated to be vulnerable to backdoor attacks. In this work, we explore a...
conference paper 2022
document
Xu, J. (author), Buşoniu, Lucian (author), De Schutter, B.H.K. (author)
We consider the infinite-horizon optimal control of discrete-time, Lipschitz continuous piecewise affine systems with a single input. Stage costs are discounted, bounded, and use a 1 or ∞-norm. Rather than using the usual fixed-horizon approach from model-predictive control, we tailor an adaptive-horizon method called optimistic planning for...
conference paper 2017
document
Xu, J. (author)
doctoral thesis 2015
document
Xu, J. (author)
doctoral thesis 2016
document
Xu, J. (author)
This PhD thesis considers the development of optimization and model-based control techniques for max-plus linear (MPL) and continuous piecewise affine (PWA) systems. The three main topics investigated in this thesis are as follows: 1. Optimistic optimization and planning for model-based control of MPL systems; 2. Optimistic optimization for MPC...
doctoral thesis 2019
document
Xu, J. (author), Broekens, D.J. (author), Hindriks, K.V. (author), Neerincx, M.A. (author)
The aim of our work is to design bodily mood expressions of humanoid robots for interactive settings that can be recognized by users and have (positive) effects on people who interact with the robots. To this end, we develop a parameterized behavior model for humanoid robots to express mood through body language. Different settings of the...
journal article 2015
document
Xu, J. (author)
journal article 2009
Searched for: author%3A%22Xu%2C+J.%22
(1 - 20 of 44)

Pages