Skip to main content

Showing 1–50 of 1,504 results for author: Li, Q

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05846  [pdf, other

    cs.CR cs.CV

    Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models

    Authors: Zhe Ma, Xuhong Zhang, Qingming Li, Tianyu Du, Wenzhi Chen, Zonghui Wang, Shouling Ji

    Abstract: The past few years have witnessed substantial advancement in text-guided image generation powered by diffusion models. However, it was shown that text-to-image diffusion models are vulnerable to training image memorization, raising concerns on copyright infringement and privacy invasion. In this work, we perform practical analysis of memorization in text-to-image diffusion models. Targeting a set… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  2. arXiv:2405.05787  [pdf, other

    cs.RO cs.CV eess.SY

    Autonomous Robotic Ultrasound System for Liver Follow-up Diagnosis: Pilot Phantom Study

    Authors: Tianpeng Zhang, Sekeun Kim, Jerome Charton, Haitong Ma, Kyungsang Kim, Na Li, Quanzheng Li

    Abstract: The paper introduces a novel autonomous robot ultrasound (US) system targeting liver follow-up scans for outpatients in local communities. Given a computed tomography (CT) image with specific target regions of interest, the proposed system carries out the autonomous follow-up scan in three steps: (i) initial robot contact to surface, (ii) coordinate mapping between CT image and robot, and (iii) ta… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  3. arXiv:2405.05538  [pdf, other

    cs.CV

    A Survey on Personalized Content Synthesis with Diffusion Models

    Authors: Xulu Zhang, Xiao-Yong Wei, Wengyu Zhang, Jinlin Wu, Zhaoxiang Zhang, Zhen Lei, Qing Li

    Abstract: Recent advancements in generative models have significantly impacted content creation, leading to the emergence of Personalized Content Synthesis (PCS). With a small set of user-provided examples, PCS aims to customize the subject of interest to specific user-defined prompts. Over the past two years, more than 150 methods have been proposed. However, existing surveys mainly focus on text-to-image… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2405.04034  [pdf, other

    cs.LG cs.CR cs.CY

    Differentially Private Post-Processing for Fair Regression

    Authors: Ruicheng Xian, Qiaobo Li, Gautam Kamath, Han Zhao

    Abstract: This paper describes a differentially private post-processing algorithm for learning fair regressors satisfying statistical parity, addressing privacy concerns of machine learning models trained on sensitive data, as well as fairness concerns of their potential to propagate historical biases. Our algorithm can be applied to post-process any given regressor to improve fairness by remapping its outp… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: ICML 2024. Code is at https://github.com/rxian/fair-regression

  5. arXiv:2405.03526  [pdf, other

    cs.NI cs.LG

    ReinWiFi: A Reinforcement-Learning-Based Framework for the Application-Layer QoS Optimization of WiFi Networks

    Authors: Qianren Li, Bojie Lv, Yuncong Hong, Rui Wang

    Abstract: In this paper, a reinforcement-learning-based scheduling framework is proposed and implemented to optimize the application-layer quality-of-service (QoS) of a practical wireless local area network (WLAN) suffering from unknown interference. Particularly, application-layer tasks of file delivery and delay-sensitive communication, e.g., screen projection, in a WLAN with enhanced distributed channel… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  6. arXiv:2405.03197  [pdf, other

    cs.CV

    StyleSeg V2: Towards Robust One-shot Segmentation of Brain Tissue via Optimization-free Registration Error Perception

    Authors: Zhiwei Wang, Xiaoyu Zeng, Chongwei Wu, Jinxin lv, Xu Zhang, Wei Fang, Qiang Li

    Abstract: One-shot segmentation of brain tissue requires training registration-segmentation (reg-seg) dual-model iteratively, where reg-model aims to provide pseudo masks of unlabeled images for seg-model by warping a carefully-labeled atlas. However, the imperfect reg-model induces image-mask misalignment, poisoning the seg-model subsequently. Recent StyleSeg bypasses this bottleneck by replacing the unlab… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 9 pages, 8 figures, 2 tables

  7. arXiv:2405.03085  [pdf, other

    cs.CL

    Compressing Long Context for Enhancing RAG with AMR-based Concept Distillation

    Authors: Kaize Shi, Xueyao Sun, Qing Li, Guandong Xu

    Abstract: Large Language Models (LLMs) have made significant strides in information acquisition. However, their overreliance on potentially flawed parametric knowledge leads to hallucinations and inaccuracies, particularly when handling long-tail, domain-specific queries. Retrieval Augmented Generation (RAG) addresses this limitation by incorporating external, non-parametric knowledge. Nevertheless, the ret… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  8. arXiv:2405.02952  [pdf, other

    cs.LG math.NA

    Accelerating Legacy Numerical Solvers by Non-intrusive Gradient-based Meta-solving

    Authors: Sohei Arisaka, Qianxiao Li

    Abstract: Scientific computing is an essential tool for scientific discovery and engineering design, and its computational cost is always a main concern in practice. To accelerate scientific computing, it is a promising approach to use machine learning (especially meta-learning) techniques for selecting hyperparameters of traditional numerical methods. There have been numerous proposals to this direction, b… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  9. I$^3$Net: Inter-Intra-slice Interpolation Network for Medical Slice Synthesis

    Authors: Haofei Song, Xintian Mao, Jing Yu, Qingli Li, Yan Wang

    Abstract: Medical imaging is limited by acquisition time and scanning equipment. CT and MR volumes, reconstructed with thicker slices, are anisotropic with high in-plane resolution and low through-plane resolution. We reveal an intriguing phenomenon that due to the mentioned nature of data, performing slice-wise interpolation from the axial view can yield greater benefits than performing super-resolution fr… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  10. arXiv:2405.02670  [pdf, other

    cs.LG

    From Generalization Analysis to Optimization Designs for State Space Models

    Authors: Fusheng Liu, Qianxiao Li

    Abstract: A State Space Model (SSM) is a foundation model in time series analysis, which has recently been shown as an alternative to transformers in sequence modeling. In this paper, we theoretically study the generalization of SSMs and propose improvements to training algorithms based on the generalization results. Specifically, we give a \textit{data-dependent} generalization bound for SSMs, showing an i… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  11. arXiv:2405.01927  [pdf, other

    cs.LG

    SlotGAT: Slot-based Message Passing for Heterogeneous Graph Neural Network

    Authors: Ziang Zhou, Jieming Shi, Renchi Yang, Yuanhang Zou, Qing Li

    Abstract: Heterogeneous graphs are ubiquitous to model complex data. There are urgent needs on powerful heterogeneous graph neural networks to effectively support important applications. We identify a potential semantic mixing issue in existing message passing processes, where the representations of the neighbors of a node $v$ are forced to be transformed to the feature space of $v$ for aggregation, though… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Published as a conference paper at ICML 2023

  12. Ergodic Spectral Efficiency Analysis of Intelligent Omni-Surface Aided Systems Suffering From Imperfect CSI and Hardware Impairments

    Authors: Qingchao Li, Mohammed El-Hajjar, Lajos Hanzo

    Abstract: In contrast to the conventional reconfigurable intelligent surfaces (RIS), intelligent omni-surfaces (IOS) are capable of full-space coverage of smart radio environments by simultaneously transmitting and reflecting the incident signals. In this paper, we investigate the ergodic spectral efficiency of IOS-aided systems for transmission over random channel links, while considering both realistic im… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: IEEE Transactions on Communications, 2024

  13. Performance Analysis of Reconfigurable Holographic Surfaces in the Near-Field Scenario of Cell-Free Networks Under Hardware Impairments

    Authors: Qingchao Li, Mohammed El-Hajjar, Yanshi Sun, Lajos Hanzo

    Abstract: We propose a hybrid beamforming architecture for near-field reconfigurable holographic surfaces (RHS) harnessed in cell-free networks. Specifically, the holographic beamformer of each base station (BS) is designed for maximizing the channel gain based on the local channel state information (CSI). By contrast, the digital beamformer at the central processing unit is designed based on the minimum me… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 13 pages, 7 figures. IEEE Transactions on Wireless Communications, 2024

  14. Energy-Efficient Reconfigurable Holographic Surfaces Operating in the Presence of Realistic Hardware Impairments

    Authors: Qingchao Li, Mohammed El-Hajjar, Yanshi Sun, Ibrahim Hemadeh, Arman Shojaeifard, Lajos Hanzo

    Abstract: Reconfigurable holographic surfaces (RHSs) constitute a promising technique of supporting energy-efficient communications. In this paper, we formulate the energy efficiency maximization problem of the switch-controlled RHS-aided beamforming architecture by alternately optimizing the holographic beamformer at the RHS, the digital beamformer, the total transmit power and the power sharing ratio of e… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: IEEE Transactions on Communications, 2024

  15. Achievable Rate Analysis of Intelligent Omni-Surface Assisted NOMA Holographic MIMO Systems

    Authors: Qingchao Li, Mohammed El-Hajjar, Yanshi Sun, Ibrahim Hemadeh, Yingming Tsai, Arman Shojaeifard, Lajos Hanzo

    Abstract: An intelligent omni-surface (IOS) assisted holographic multiple-input and multiple-output architecture is conceived for $360^\circ$ full-space coverage at a low energy consumption. The theoretical ergodic rate lower bound of our non-orthogonal multiple access (NOMA) scheme is derived based on the moment matching approximation method, while considering the signal distortion at transceivers imposed… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 6 pages, 3 figures. IEEE Transactions on Vehicular Technology, 2024

  16. arXiv:2405.00526  [pdf, other

    cs.CR

    JNI Global References Are Still Vulnerable: Attacks and Defenses

    Authors: Yi He, Yuan Zhou, Yacong Gu, Purui Su, Qi Li, Yajin Zhou, Yong Jiang

    Abstract: System services and resources in Android are accessed through IPC based mechanisms. Previous research has demonstrated that they are vulnerable to the denial-of-service attack (DoS attack). For instance, the JNI global reference (JGR), which is widely used by system services, can be exhausted to cause the system reboot (hence the name JGRE attack). Even though the Android team tries to fix the pro… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  17. arXiv:2405.00236  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    STT: Stateful Tracking with Transformers for Autonomous Driving

    Authors: Longlong Jing, Ruichi Yu, Xu Chen, Zhengli Zhao, Shiwei Sheng, Colin Graber, Qi Chen, Qinru Li, Shangxuan Wu, Han Deng, Sangjin Lee, Chris Sweeney, Qiurui He, Wei-Chih Hung, Tong He, Xingyi Zhou, Farshid Moussavi, Zijian Guo, Yin Zhou, Mingxing Tan, Weilong Yang, Congcong Li

    Abstract: Tracking objects in three-dimensional space is critical for autonomous driving. To ensure safety while driving, the tracker must be able to reliably track objects across frames and accurately estimate their states such as velocity and acceleration in the present. Existing works frequently focus on the association task while either neglecting the model performance on state estimation or deploying c… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

    Comments: ICRA 2024

  18. arXiv:2404.18411  [pdf, other

    cs.RO cs.CV

    Multi-modal Perception Dataset of In-water Objects for Autonomous Surface Vehicles

    Authors: Mingi Jeong, Arihant Chadda, Ziang Ren, Luyang Zhao, Haowen Liu, Monika Roznere, Aiwei Zhang, Yitao Jiang, Sabriel Achong, Samuel Lensgraf, Alberto Quattrini Li

    Abstract: This paper introduces the first publicly accessible multi-modal perception dataset for autonomous maritime navigation, focusing on in-water obstacles within the aquatic environment to enhance situational awareness for Autonomous Surface Vehicles (ASVs). This dataset, consisting of diverse objects encountered under varying environmental conditions, aims to bridge the research gap in marine robotics… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: Accepted to the IEEE ICRA Workshop on Field Robotics 2024

  19. arXiv:2404.17871  [pdf, other

    cs.SE cs.AI

    A Survey of Deep Learning Library Testing Methods

    Authors: Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan

    Abstract: In recent years, software systems powered by deep learning (DL) techniques have significantly facilitated people's lives in many aspects. As the backbone of these DL systems, various DL libraries undertake the underlying optimization and computation. However, like traditional software, DL libraries are not immune to bugs, which can pose serious threats to users' personal property and safety. Study… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: 34 pages, 8 figures, 4 tables

  20. arXiv:2404.16823  [pdf, other

    cs.RO cs.AI cs.CV cs.LG

    Learning Visuotactile Skills with Two Multifingered Hands

    Authors: Toru Lin, Yu Zhang, Qiyang Li, Haozhi Qi, Brent Yi, Sergey Levine, Jitendra Malik

    Abstract: Aiming to replicate human-like dexterity, perceptual experiences, and motion patterns, we explore learning from human demonstrations using a bimanual system with multifingered hands and visuotactile data. Two significant challenges exist: the lack of an affordable and accessible teleoperation system suitable for a dual-arm setup with multifingered hands, and the scarcity of multifingered hand hard… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Code and Project Website: https://toruowo.github.io/hato/

  21. arXiv:2404.16571  [pdf, other

    cs.CV

    MonoPCC: Photometric-invariant Cycle Constraint for Monocular Depth Estimation of Endoscopic Images

    Authors: Zhiwei Wang, Ying Zhou, Shiquan He, Ting Li, Fan Huang, Qiang Ding, Xinxia Feng, Mei Liu, Qiang Li

    Abstract: Photometric constraint is indispensable for self-supervised monocular depth estimation. It involves warping a source image onto a target view using estimated depth&pose, and then minimizing the difference between the warped and target images. However, the endoscopic built-in light causes significant brightness fluctuations, and thus makes the photometric constraint unreliable. Previous efforts onl… ▽ More

    Submitted 7 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

    Comments: 11 pages, 10 figures

  22. arXiv:2404.15687  [pdf, other

    cs.SE cs.AI cs.CR

    Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

    Authors: Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

    Abstract: Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection, owing to their ability to capture the underlying semantic structure of source code. However, GNNs face significant challenges in explainability due to their inherently black-box natu… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: This paper was accepted in the proceedings of the 33nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)

  23. arXiv:2404.14928  [pdf, other

    cs.LG cs.AI cs.CL cs.SI

    Graph Machine Learning in the Era of Large Language Models (LLMs)

    Authors: Wenqi Fan, Shijie Wang, Jiani Huang, Zhikai Chen, Yu Song, Wenzhuo Tang, Haitao Mao, Hui Liu, Xiaorui Liu, Dawei Yin, Qing Li

    Abstract: Graphs play an important role in representing complex relationships in various domains like social networks, knowledge graphs, and molecular discovery. With the advent of deep learning, Graph Neural Networks (GNNs) have emerged as a cornerstone in Graph Machine Learning (Graph ML), facilitating the representation and processing of graph structures. Recently, LLMs have demonstrated unprecedented ca… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  24. arXiv:2404.14405  [pdf, other

    cs.RO

    Learning H-Infinity Locomotion Control

    Authors: Junfeng Long, Wenye Yu, Quanyi Li, Zirui Wang, Dahua Lin, Jiangmiao Pang

    Abstract: Stable locomotion in precipitous environments is an essential capability of quadruped robots, demanding the ability to resist various external disturbances. However, recent learning-based policies only use basic domain randomization to improve the robustness of learned policies, which cannot guarantee that the robot has adequate disturbance resistance capabilities. In this paper, we propose to mod… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: Project Page: https://junfeng-long.github.io/HINF/

  25. arXiv:2404.14249  [pdf, other

    cs.CV

    CLIP-GS: CLIP-Informed Gaussian Splatting for Real-time and View-consistent 3D Semantic Understanding

    Authors: Guibiao Liao, Jiankun Li, Zhenyu Bao, Xiaoqing Ye, Jingdong Wang, Qing Li, Kanglin Liu

    Abstract: The recent 3D Gaussian Splatting (GS) exhibits high-quality and real-time synthesis of novel views in 3D scenes. Currently, it primarily focuses on geometry and appearance modeling, while lacking the semantic understanding of scenes. To bridge this gap, we present CLIP-GS, which integrates semantics from Contrastive Language-Image Pre-Training (CLIP) into Gaussian Splatting to efficiently comprehe… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: https://github.com/gbliao/CLIP-GS

  26. arXiv:2404.13923  [pdf, other

    cs.CV

    MaterialSeg3D: Segmenting Dense Materials from 2D Priors for 3D Assets

    Authors: Zeyu Li, Ruitong Gan, Chuanchen Luo, Yuxi Wang, Jiaheng Liu, Ziwei Zhu Man Zhang, Qing Li, Xucheng Yin, Zhaoxiang Zhang, Junran Peng

    Abstract: Driven by powerful image diffusion models, recent research has achieved the automatic creation of 3D objects from textual or visual guidance. By performing score distillation sampling (SDS) iteratively across different views, these methods succeed in lifting 2D generative prior to the 3D space. However, such a 2D generative image prior bakes the effect of illumination and shadow into the texture.… ▽ More

    Submitted 24 April, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

  27. arXiv:2404.13911  [pdf

    cs.CV

    Global OpenBuildingMap -- Unveiling the Mystery of Global Buildings

    Authors: Xiao Xiang Zhu, Qingyu Li, Yilei Shi, Yuanyuan Wang, Adam Stewart, Jonathan Prexl

    Abstract: Understanding how buildings are distributed globally is crucial to revealing the human footprint on our home planet. This built environment affects local climate, land surface albedo, resource distribution, and many other key factors that influence well-being and human health. Despite this, quantitative and comprehensive data on the distribution and properties of buildings worldwide is lacking. To… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  28. arXiv:2404.12738  [pdf, other

    cs.NI cs.CR

    DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches

    Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang

    Abstract: Device fingerprinting can be used by Internet Service Providers (ISPs) to identify vulnerable IoT devices for early prevention of threats. However, due to the wide deployment of middleboxes in ISP networks, some important data, e.g., 5-tuples and flow statistics, are often obscured, rendering many existing approaches invalid. It is further challenged by the high-speed traffic of hundreds of teraby… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE/ACM Transactions on Networking (ToN)

  29. arXiv:2404.12274  [pdf, other

    cs.CL cs.AI

    Advancing the Robustness of Large Language Models through Self-Denoised Smoothing

    Authors: Jiabao Ji, Bairu Hou, Zhen Zhang, Guanhua Zhang, Wenqi Fan, Qing Li, Yang Zhang, Gaowen Liu, Sijia Liu, Shiyu Chang

    Abstract: Although large language models (LLMs) have achieved significant success, their vulnerability to adversarial perturbations, including recent jailbreak attacks, has raised considerable concerns. However, the increasing size of these models and their limited access make improving their robustness a challenging task. Among various defense strategies, randomized smoothing has shown great potential for… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: Accepted by NAACL 2024. Jiabao, Bairu, Zhen, Guanhua contributed equally. This is an updated version of the paper: arXiv:2307.07171

  30. arXiv:2404.12055  [pdf, other

    cs.CV cs.RO

    Improving the perception of visual fiducial markers in the field using Adaptive Active Exposure Control

    Authors: Ziang Ren, Samuel Lensgraf, Alberto Quattrini Li

    Abstract: Accurate localization is fundamental for autonomous underwater vehicles (AUVs) to carry out precise tasks, such as manipulation and construction. Vision-based solutions using fiducial marker are promising, but extremely challenging underwater because of harsh lighting condition underwater. This paper introduces a gradient-based active camera exposure control method to tackle sharp lighting variati… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: Paper accepted by ISER 2023

  31. arXiv:2404.12006  [pdf, other

    cs.CL

    Variational Multi-Modal Hypergraph Attention Network for Multi-Modal Relation Extraction

    Authors: Qian Li, Cheng Ji, Shu Guo, Yong Zhao, Qianren Mao, Shangguang Wang, Yuntao Wei, Jianxin Li

    Abstract: Multi-modal relation extraction (MMRE) is a challenging task that aims to identify relations between entities in text leveraging image information. Existing methods are limited by their neglect of the multiple entity pairs in one sentence sharing very similar contextual information (ie, the same text and image), resulting in increased difficulty in the MMRE task. To address this limitation, we pro… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  32. arXiv:2404.11467  [pdf, other

    cs.SE cs.CR

    A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems

    Authors: Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li

    Abstract: Package managers such as NPM, Maven, and PyPI play a pivotal role in open-source software (OSS) ecosystems, streamlining the distribution and management of various freely available packages. The fine-grained details within software packages can unveil potential risks within existing OSS ecosystems, offering valuable insights for detecting malicious packages. In this study, we undertake a large-sca… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  33. arXiv:2404.11121  [pdf, other

    cs.CR cs.AI

    TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment

    Authors: Qinfeng Li, Zhiqiang Shen, Zhenghan Qin, Yangfan Xie, Xuhong Zhang, Tianyu Du, Jianwei Yin

    Abstract: Proprietary large language models (LLMs) have been widely applied in various scenarios. Additionally, deploying LLMs on edge devices is trending for efficiency and privacy reasons. However, edge deployment of proprietary LLMs introduces new security challenges: edge-deployed models are exposed as white-box accessible to users, enabling adversaries to conduct effective model stealing (MS) attacks.… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2310.07152 by other authors

  34. arXiv:2404.10995  [pdf, other

    math.OC cs.CR cs.LG

    Clipped SGD Algorithms for Privacy Preserving Performative Prediction: Bias Amplification and Remedies

    Authors: Qiang Li, Michal Yemini, Hoi-To Wai

    Abstract: Clipped stochastic gradient descent (SGD) algorithms are among the most popular algorithms for privacy preserving optimization that reduces the leakage of users' identity in model training. This paper studies the convergence properties of these algorithms in a performative prediction setting, where the data distribution may shift due to the deployed prediction model. For example, the latter is cau… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 22 pages, 11 figures

  35. arXiv:2404.09995  [pdf, other

    cs.CV cs.AI cs.LG

    Taming Latent Diffusion Model for Neural Radiance Field Inpainting

    Authors: Chieh Hubert Lin, Changil Kim, Jia-Bin Huang, Qinbo Li, Chih-Yao Ma, Johannes Kopf, Ming-Hsuan Yang, Hung-Yu Tseng

    Abstract: Neural Radiance Field (NeRF) is a representation for 3D reconstruction from multi-view images. Despite some recent work showing preliminary success in editing a reconstructed NeRF with diffusion prior, they remain struggling to synthesize reasonable geometry in completely uncovered regions. One major reason is the high diversity of synthetic contents from the diffusion model, which hinders the rad… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Project page: https://hubert0527.github.io/MALD-NeRF

  36. arXiv:2404.09622  [pdf, other

    cs.RO cs.AI

    DIDLM:A Comprehensive Multi-Sensor Dataset with Infrared Cameras, Depth Cameras, LiDAR, and 4D Millimeter-Wave Radar in Challenging Scenarios for 3D Mapping

    Authors: WeiSheng Gong, Chen He, KaiJie Su, QingYong Li

    Abstract: This study presents a comprehensive multi-sensor dataset designed for 3D mapping in challenging indoor and outdoor environments. The dataset comprises data from infrared cameras, depth cameras, LiDAR, and 4D millimeter-wave radar, facilitating exploration of advanced perception and mapping techniques. Integration of diverse sensor data enhances perceptual capabilities in extreme conditions such as… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  37. PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound

    Authors: Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li

    Abstract: Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive information theft, enormous economic and personnel losses, and even a potential compromise of national security. As a fingerprint that can coincidentally match a specific proportion of… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: in Proc. of NDSS, 2024

  38. arXiv:2404.08566  [pdf, other

    eess.SP cs.LG

    Mitigating Receiver Impact on Radio Frequency Fingerprint Identification via Domain Adaptation

    Authors: Liu Yang, Qiang Li, Xiaoyang Ren, Yi Fang, Shafei Wang

    Abstract: Radio Frequency Fingerprint Identification (RFFI), which exploits non-ideal hardware-induced unique distortion resident in the transmit signals to identify an emitter, is emerging as a means to enhance the security of communication systems. Recently, machine learning has achieved great success in developing state-of-the-art RFFI models. However, few works consider cross-receiver RFFI problems, whe… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted by IEEE Internet of Things Journal

  39. arXiv:2404.05916  [pdf, other

    cs.CV

    Prompt-driven Universal Model for View-Agnostic Echocardiography Analysis

    Authors: Sekeun Kim, Hui Ren, Peng Guo, Abder-Rahman Ali, Patrick Zhang, Kyungsang Kim, Xiang Li, Quanzheng Li

    Abstract: Echocardiography segmentation for cardiac analysis is time-consuming and resource-intensive due to the variability in image quality and the necessity to process scans from various standard views. While current automated segmentation methods in echocardiography show promising performance, they are trained on specific scan views to analyze corresponding data. However, this solution has a limitation… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  40. arXiv:2404.05689  [pdf, other

    cs.LG cs.AI

    Automated discovery of symbolic laws governing skill acquisition from naturally occurring data

    Authors: Sannyuya Liu, Qing Li, Xiaoxuan Shen, Jianwen Sun, Zongkai Yang

    Abstract: Skill acquisition is a key area of research in cognitive psychology as it encompasses multiple psychological processes. The laws discovered under experimental paradigms are controversial and lack generalizability. This paper aims to unearth the laws of skill learning from large-scale training log data. A two-stage algorithm was developed to tackle the issues of unobservable cognitive states and al… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  41. arXiv:2404.05639  [pdf, other

    cs.LG cs.AI cs.CR

    Investigating the Impact of Quantization on Adversarial Robustness

    Authors: Qun Li, Yuan Meng, Chen Tang, Jiacheng Jiang, Zhi Wang

    Abstract: Quantization is a promising technique for reducing the bit-width of deep models to improve their runtime performance and storage efficiency, and thus becomes a fundamental step for deployment. In real-world scenarios, quantized models are often faced with adversarial attacks which cause the model to make incorrect inferences by introducing slight perturbations. However, recent studies have paid le… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: Accepted to ICLR 2024 Workshop PML4LRS

  42. arXiv:2404.05363  [pdf, other

    cs.LG

    A parameter-free clustering algorithm for missing datasets

    Authors: Qi Li, Xianjun Zeng, Shuliang Wang, Wenhao Zhu, Shijie Ruan, Zhimeng Yuan

    Abstract: Missing datasets, in which some objects have missing values in certain dimensions, are prevalent in the Real-world. Existing clustering algorithms for missing datasets first impute the missing values and then perform clustering. However, both the imputation and clustering processes require input parameters. Too many input parameters inevitably increase the difficulty of obtaining accurate clusteri… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  43. arXiv:2404.05188  [pdf, other

    cs.CR cs.AI cs.CL

    Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging

    Authors: Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang

    Abstract: Model merging is a promising lightweight model empowerment technique that does not rely on expensive computing devices (e.g., GPUs) or require the collection of specific training data. Instead, it involves editing different upstream model parameters to absorb their downstream task capabilities. However, uncertified model merging can infringe upon the Intellectual Property (IP) rights of the origin… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: Technical Report

  44. arXiv:2404.04991  [pdf, other

    cs.CR cs.SE

    OSS Malicious Package Analysis in the Wild

    Authors: Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li

    Abstract: The open-source software (OSS) ecosystem suffers from various security threats and risks, and malicious packages play a central role in software supply chain (SSC) attacks. Although malware research has a history of over thirty years, less attention has been paid to OSS malware. Its existing research has three limitations: a lack of high-quality datasets, malware diversity, and attack campaign con… ▽ More

    Submitted 21 April, 2024; v1 submitted 7 April, 2024; originally announced April 2024.

  45. arXiv:2404.04953  [pdf, other

    cs.CV

    High-Discriminative Attribute Feature Learning for Generalized Zero-Shot Learning

    Authors: Yu Lei, Guoshuai Sheng, Fangfang Li, Quanxue Gao, Cheng Deng, Qin Li

    Abstract: Zero-shot learning(ZSL) aims to recognize new classes without prior exposure to their samples, relying on semantic knowledge from observed classes. However, current attention-based models may overlook the transferability of visual features and the distinctiveness of attribute localization when learning regional features in images. Additionally, they often overlook shared attributes among different… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  46. arXiv:2404.04937  [pdf, other

    cs.CR cs.GT

    Optimizing Information Propagation for Blockchain-empowered Mobile AIGC: A Graph Attention Network Approach

    Authors: Jiana Liao, Jinbo Wen, Jiawen Kang, Yang Zhang, Jianbo Du, Qihao Li, Weiting Zhang, Dong Yang

    Abstract: Artificial Intelligence-Generated Content (AIGC) is a rapidly evolving field that utilizes advanced AI algorithms to generate content. Through integration with mobile edge networks, mobile AIGC networks have gained significant attention, which can provide real-time customized and personalized AIGC services and products. Since blockchains can facilitate decentralized and transparent data management… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2403.13237

  47. arXiv:2404.04856  [pdf, other

    cs.CV cs.AI

    Msmsfnet: a multi-stream and multi-scale fusion net for edge detection

    Authors: Chenguang Liu, Chisheng Wang, Feifei Dong, Xin Su, Chuanhua Zhu, Dejin Zhang, Qingquan Li

    Abstract: Edge detection is a long standing problem in computer vision. Recent deep learning based algorithms achieve state of-the-art performance in publicly available datasets. Despite the efficiency of these algorithms, their performance, however, relies heavily on the pretrained weights of the backbone network on the ImageNet dataset. This limits heavily the design space of deep learning based edge dete… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  48. arXiv:2404.04810  [pdf, other

    cond-mat.mtrl-sci cs.LG

    AlphaCrystal-II: Distance matrix based crystal structure prediction using deep learning

    Authors: Yuqi Song, Rongzhi Dong, Lai Wei, Qin Li, Jianjun Hu

    Abstract: Computational prediction of stable crystal structures has a profound impact on the large-scale discovery of novel functional materials. However, predicting the crystal structure solely from a material's composition or formula is a promising yet challenging task, as traditional ab initio crystal structure prediction (CSP) methods rely on time-consuming global searches and first-principles free ener… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: 16 pages

  49. arXiv:2404.04722  [pdf, other

    cs.CL cs.CR cs.SE

    PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics

    Authors: Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz

    Abstract: Despite tremendous advancements in large language models (LLMs) over recent years, a notably urgent challenge for their practical deployment is the phenomenon of hallucination, where the model fabricates facts and produces non-factual statements. In response, we propose PoLLMgraph, a Polygraph for LLMs, as an effective model-based white-box detection and forecasting approach. PoLLMgraph distinctly… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: 15 pages

  50. Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks

    Authors: Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu

    Abstract: In this paper, we uncover a new side-channel vulnerability in the widely used NAT port preservation strategy and an insufficient reverse path validation strategy of Wi-Fi routers, which allows an off-path attacker to infer if there is one victim client in the same network communicating with another host on the Internet using TCP. After detecting the presence of TCP connections between the victim c… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2024