Skip to main content

Showing 1–50 of 142 results for author: Liao, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.18149  [pdf, other

    cs.CV cs.AI cs.MM

    Compressed Deepfake Video Detection Based on 3D Spatiotemporal Trajectories

    Authors: Zongmei Chen, Xin Liao, Xiaoshuai Wu, Yanxiang Chen

    Abstract: The misuse of deepfake technology by malicious actors poses a potential threat to nations, societies, and individuals. However, existing methods for detecting deepfakes primarily focus on uncompressed videos, such as noise characteristics, local textures, or frequency statistics. When applied to compressed videos, these methods experience a decrease in detection performance and are less suitable f… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  2. arXiv:2404.18136  [pdf, other

    cs.CV cs.MM

    SafePaint: Anti-forensic Image Inpainting with Domain Adaptation

    Authors: Dunyun Chen, Xin Liao, Xiaoshuai Wu, Shiwei Chen

    Abstract: Existing image inpainting methods have achieved remarkable accomplishments in generating visually appealing results, often accompanied by a trend toward creating more intricate structural textures. However, while these models excel at creating more realistic image content, they often leave noticeable traces of tampering, posing a significant threat to security. In this work, we take the anti-foren… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  3. arXiv:2404.17867  [pdf, other

    cs.CV eess.IV

    Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics

    Authors: Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin

    Abstract: AI-generated content has accelerated the topic of media synthesis, particularly Deepfake, which can manipulate our portraits for positive or malicious purposes. Before releasing these threatening face images, one promising forensics solution is the injection of robust watermarks to track their own provenance. However, we argue that current watermarking models, originally devised for genuine images… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: Accepted by IJCAI 2024

  4. arXiv:2404.14642  [pdf, other

    cs.LG

    Uncertainty Quantification on Graph Learning: A Survey

    Authors: Chao Chen, Chenghua Guo, Rui Xu, Xiangwen Liao, Xi Zhang, Sihong Xie, Hui Xiong, Philip Yu

    Abstract: Graphical models, including Graph Neural Networks (GNNs) and Probabilistic Graphical Models (PGMs), have demonstrated their exceptional capabilities across numerous fields. These models necessitate effective uncertainty quantification to ensure reliable decision-making amid the challenges posed by model training discrepancies and unpredictable testing scenarios. This survey examines recent works t… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  5. arXiv:2403.17328  [pdf, other

    cs.AI cs.NE

    Learning Traffic Signal Control via Genetic Programming

    Authors: Xiao-Cheng Liao, Yi Mei, Mengjie Zhang

    Abstract: The control of traffic signals is crucial for improving transportation efficiency. Recently, learning-based methods, especially Deep Reinforcement Learning (DRL), garnered substantial success in the quest for more efficient traffic signal control strategies. However, the design of rewards in DRL highly demands domain knowledge to converge to an effective policy, and the final policy also presents… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  6. arXiv:2403.16398  [pdf, other

    cs.LG cs.AI

    Rethinking the Representation in Federated Unsupervised Learning with Non-IID Data

    Authors: Xinting Liao, Weiming Liu, Chaochao Chen, Pengyang Zhou, Fengyuan Yu, Huabin Zhu, Binhui Yao, Tao Wang, Xiaolin Zheng, Yanchao Tan

    Abstract: Federated learning achieves effective performance in modeling decentralized data. In practice, client data are not well-labeled, which makes it potential for federated unsupervised learning (FUSL) with non-IID data. However, the performance of existing FUSL methods suffers from insufficient representations, i.e., (1) representation collapse entanglement among local and global models, and (2) incon… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: CVPR 2024

  7. arXiv:2403.15836  [pdf, other

    cs.CV

    VLM-CPL: Consensus Pseudo Labels from Vision-Language Models for Human Annotation-Free Pathological Image Classification

    Authors: Lanfeng Zhong, Xin Liao, Shaoting Zhang, Xiaofan Zhang, Guotai Wang

    Abstract: Despite that deep learning methods have achieved remarkable performance in pathology image classification, they heavily rely on labeled data, demanding extensive human annotation efforts. In this study, we present a novel human annotation-free method for pathology image classification by leveraging pre-trained Vision-Language Models (VLMs). Without human annotation, pseudo labels of the training s… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

    Comments: Under review

  8. arXiv:2403.01798  [pdf, other

    cs.NI cs.LG

    Towards Fair and Efficient Learning-based Congestion Control

    Authors: Xudong Liao, Han Tian, Chaoliang Zeng, Xinchen Wan, Kai Chen

    Abstract: Recent years have witnessed a plethora of learning-based solutions for congestion control (CC) that demonstrate better performance over traditional TCP schemes. However, they fail to provide consistently good convergence properties, including {\em fairness}, {\em fast convergence} and {\em stability}, due to the mismatch between their objective functions and these properties. Despite being intuiti… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  9. arXiv:2403.01244  [pdf, other

    cs.CL cs.AI

    Mitigating Catastrophic Forgetting in Large Language Models with Self-Synthesized Rehearsal

    Authors: Jianheng Huang, Leyang Cui, Ante Wang, Chengyi Yang, Xinting Liao, Linfeng Song, Junfeng Yao, Jinsong Su

    Abstract: Large language models (LLMs) suffer from catastrophic forgetting during continual learning. Conventional rehearsal-based methods rely on previous training data to retain the model's ability, which may not be feasible in real-world applications. When conducting continual learning based on a publicly-released LLM checkpoint, the availability of the original training data may be non-existent. To addr… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

  10. arXiv:2402.17959  [pdf, other

    cs.CL cs.HC

    An Iterative Associative Memory Model for Empathetic Response Generation

    Authors: Zhou Yang, Zhaochun Ren, Yufeng Wang, Chao Chen, Haizhou Sun, Xiaofei Zhu, Xiangwen Liao

    Abstract: Empathetic response generation is to comprehend the cognitive and emotional states in dialogue utterances and generate proper responses. Psychological theories posit that comprehending emotional and cognitive states necessitates iteratively capturing and understanding associated words across dialogue utterances. However, existing approaches regard dialogue utterances as either a long sequence or i… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 12 pages, 4 figures

  11. arXiv:2402.17437  [pdf, other

    cs.CL cs.AI

    Exploiting Emotion-Semantic Correlations for Empathetic Response Generation

    Authors: Zhou Yang, Zhaochun Ren, Yufeng Wang, Xiaofei Zhu, Zhihao Chen, Tiecheng Cai, Yunbing Wu, Yisong Su, Sibo Ju, Xiangwen Liao

    Abstract: Empathetic response generation aims to generate empathetic responses by understanding the speaker's emotional feelings from the language of dialogue. Recent methods capture emotional words in the language of communicators and construct them as static vectors to perceive nuanced emotions. However, linguistic research has shown that emotional words in language are dynamic and have correlations with… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 12 pages, 3 figures, Findings of EMNLP 2023

  12. arXiv:2402.11801  [pdf, other

    cs.HC

    Enhancing Empathetic Response Generation by Augmenting LLMs with Small-scale Empathetic Models

    Authors: Zhou Yang, Zhaochun Ren, Wang Yufeng, Shizhong Peng, Haizhou Sun, Xiaofei Zhu, Xiangwen Liao

    Abstract: Empathetic response generation is increasingly significant in AI, necessitating nuanced emotional and cognitive understanding coupled with articulate response expression. Current large language models (LLMs) excel in response expression; however, they lack the ability to deeply understand emotional and cognitive nuances, particularly in pinpointing fine-grained emotions and their triggers. Convers… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: 12 pages, 4 figures

  13. arXiv:2401.13516  [pdf, other

    cs.CV cs.CR

    Delocate: Detection and Localization for Deepfake Videos with Randomly-Located Tampered Traces

    Authors: Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou

    Abstract: Deepfake videos are becoming increasingly realistic, showing few tampering traces on facial areasthat vary between frames. Consequently, existing Deepfake detection methods struggle to detect unknown domain Deepfake videos while accurately locating the tampered region. To address thislimitation, we propose Delocate, a novel Deepfake detection model that can both recognize andlocalize unknown domai… ▽ More

    Submitted 5 May, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2308.09921, arXiv:2305.05943

  14. arXiv:2401.03321  [pdf, other

    cs.CL

    PIXAR: Auto-Regressive Language Modeling in Pixel Space

    Authors: Yintao Tai, Xiyang Liao, Alessandro Suglia, Antonio Vergari

    Abstract: Recent work showed the possibility of building open-vocabulary large language models (LLMs) that directly operate on pixel representations. These models are implemented as autoencoders that reconstruct masked patches of rendered text. However, these pixel-based LLMs are limited to discriminative tasks (e.g., classification) and, similar to BERT, cannot be used to generate text. Therefore, they can… ▽ More

    Submitted 23 February, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

  15. arXiv:2401.03315  [pdf, other

    cs.CR cs.AI

    Malla: Demystifying Real-world Large Language Model Integrated Malicious Services

    Authors: Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang

    Abstract: The underground exploitation of large language models (LLMs) for malicious services (i.e., Malla) is witnessing an uptick, amplifying the cyber threat landscape and posing questions about the trustworthiness of LLM technologies. However, there has been little effort to understand this new cybercrime, in terms of its magnitude, impact, and techniques. In this paper, we conduct the first systematic… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

  16. arXiv:2401.00865  [pdf, other

    cs.DC

    Xorbits: Automating Operator Tiling for Distributed Data Science

    Authors: Weizheng Lu, Kaisheng He, Xuye Qin, Chengjie Li, Zhong Wang, Tao Yuan, Xia Liao, Feng Zhang, Yueguo Chen, Xiaoyong Du

    Abstract: Data science pipelines commonly utilize dataframe and array operations for tasks such as data preprocessing, analysis, and machine learning. The most popular tools for these tasks are pandas and NumPy. However, these tools are limited to executing on a single node, making them unsuitable for processing large-scale data. Several systems have attempted to distribute data science applications to clus… ▽ More

    Submitted 19 March, 2024; v1 submitted 29 December, 2023; originally announced January 2024.

    Comments: ICDE 2024 Industrial and Application Track

  17. arXiv:2401.00166  [pdf, ps, other

    cs.IT eess.SP

    Block-Level MU-MISO Interference Exploitation Precoding: Optimal Structure and Explicit Duality

    Authors: Junwen Yang, Ang Li, Xuewen Liao, Christos Masouros, A. L. Swindlehurst

    Abstract: This paper investigates block-level interference exploitation (IE) precoding for multi-user multiple-input single-output (MU-MISO) downlink systems. To overcome the need for symbol-level IE precoding to frequently update the precoding matrix, we propose to jointly optimize all the precoders or transmit signals within a transmission block. The resultant precoders only need to be updated once per bl… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: Submitted to IEEE

  18. arXiv:2312.12023  [pdf, other

    eess.IV cs.CV

    Progressive Frequency-Aware Network for Laparoscopic Image Desmoking

    Authors: Jiale Zhang, Wenfeng Huang, Xiangyun Liao, Qiong Wang

    Abstract: Laparoscopic surgery offers minimally invasive procedures with better patient outcomes, but smoke presence challenges visibility and safety. Existing learning-based methods demand large datasets and high computational resources. We propose the Progressive Frequency-Aware Network (PFAN), a lightweight GAN framework for laparoscopic image desmoking, combining the strengths of CNN and Transformer for… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  19. arXiv:2312.11577  [pdf, other

    cs.CV

    PR-NeuS: A Prior-based Residual Learning Paradigm for Fast Multi-view Neural Surface Reconstruction

    Authors: Jianyao Xu, Qingshan Xu, Xinyao Liao, Wanjuan Su, Chen Zhang, Yew-Soon Ong, Wenbing Tao

    Abstract: Neural surfaces learning has shown impressive performance in multi-view surface reconstruction. However, most existing methods use large multilayer perceptrons (MLPs) to train their models from scratch, resulting in hours of training for a single scene. Recently, how to accelerate the neural surfaces learning has received a lot of attention and remains an open problem. In this work, we propose a p… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  20. arXiv:2312.07556  [pdf, other

    cs.CL cs.AI cs.IR

    Federated Learning for Short Text Clustering

    Authors: Mengling Hu, Chaochao Chen, Weiming Liu, Xinting Liao, Xiaolin Zheng

    Abstract: Short text clustering has been popularly studied for its significance in mining valuable insights from many short texts. In this paper, we focus on the federated short text clustering (FSTC) problem, i.e., clustering short texts that are distributed in different clients, which is a realistic problem under privacy requirements. Compared with the centralized short text clustering problem that short… ▽ More

    Submitted 23 November, 2023; originally announced December 2023.

  21. arXiv:2312.05990  [pdf, other

    cs.CL

    Constructing Vec-tionaries to Extract Message Features from Texts: A Case Study of Moral Appeals

    Authors: Zening Duan, Anqi Shao, Yicheng Hu, Heysung Lee, Xining Liao, Yoo Ji Suh, Jisoo Kim, Kai-Cheng Yang, Kaiping Chen, Sijia Yang

    Abstract: While researchers often study message features like moral content in text, such as party manifestos and social media, their quantification remains a challenge. Conventional human coding struggles with scalability and intercoder reliability. While dictionary-based methods are cost-effective and computationally efficient, they often lack contextual sensitivity and are limited by the vocabularies dev… ▽ More

    Submitted 8 March, 2024; v1 submitted 10 December, 2023; originally announced December 2023.

  22. arXiv:2312.04900  [pdf

    cs.DC

    Graph for Science: From API based Programming to Graph Engine based Programming for HPC

    Authors: Yu Zhang, Zixiao Wang, Jin Zhao, Yuluo Guo, Hui Yu, Zhiying Huang, Xuanhua Shi, Xiaofei Liao

    Abstract: Modern scientific applications predominantly run on large-scale computing platforms, necessitating collaboration between scientific domain experts and high-performance computing (HPC) experts. While domain experts are often skilled in customizing domain-specific scientific computing routines, which often involves various matrix computations, HPC experts are essential for achieving efficient execut… ▽ More

    Submitted 2 April, 2024; v1 submitted 8 December, 2023; originally announced December 2023.

  23. arXiv:2311.13953  [pdf, other

    cs.LG cs.AI

    Learning Uniform Clusters on Hypersphere for Deep Graph-level Clustering

    Authors: Mengling Hu, Chaochao Chen, Weiming Liu, Xinyi Zhang, Xinting Liao, Xiaolin Zheng

    Abstract: Graph clustering has been popularly studied in recent years. However, most existing graph clustering methods focus on node-level clustering, i.e., grouping nodes in a single graph into clusters. In contrast, graph-level clustering, i.e., grouping multiple graphs into clusters, remains largely unexplored. Graph-level clustering is critical in a variety of real-world applications, such as, propertie… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  24. arXiv:2311.12341  [pdf, other

    cs.GT

    Game Theoretic Application to Intersection Management: A Literature Review

    Authors: Ziye Qin, Ang Ji, Zhanbo Sun, Guoyuan Wu, Peng Hao, Xishun Liao

    Abstract: The emergence of vehicle-to-everything (V2X) technology offers new insights into intersection management. This, however, has also presented new challenges, such as the need to understand and model the interactions of traffic participants, including their competition and cooperation behaviors. Game theory has been widely adopted to study rationally selfish or cooperative behaviors during interactio… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  25. arXiv:2311.10181  [pdf, other

    cs.CL

    The Impact of Familiarity on Naming Variation: A Study on Object Naming in Mandarin Chinese

    Authors: Yunke He, Xixian Liao, Jialing Liang, Gemma Boleda

    Abstract: Different speakers often produce different names for the same object or entity (e.g., "woman" vs. "tourist" for a female tourist). The reasons behind variation in naming are not well understood. We create a Language and Vision dataset for Mandarin Chinese that provides an average of 20 names for 1319 naturalistic images, and investigate how familiarity with a given kind of object relates to the de… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  26. arXiv:2310.11834  [pdf, other

    cs.CV

    HB-net: Holistic bursting cell cluster integrated network for occluded multi-objects recognition

    Authors: Xudong Gao, Xiao Guang Gao, Jia Rong, Xiaowei Chen, Xiang Liao, Jun Chen

    Abstract: Within the realm of image recognition, a specific category of multi-label classification (MLC) challenges arises when objects within the visual field may occlude one another, demanding simultaneous identification of both occluded and occluding objects. Traditional convolutional neural networks (CNNs) can tackle these challenges; however, those models tend to be bulky and can only attain modest lev… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  27. arXiv:2310.10698   

    cs.CL

    Bridging Code Semantic and LLMs: Semantic Chain-of-Thought Prompting for Code Generation

    Authors: Yingwei Ma, Yue Yu, Shanshan Li, Yu Jiang, Yong Guo, Yuanliang Zhang, Yutao Xie, Xiangke Liao

    Abstract: Large language models (LLMs) have showcased remarkable prowess in code generation. However, automated code generation is still challenging since it requires a high-level semantic mapping between natural language requirements and codes. Most existing LLMs-based approaches for code generation rely on decoder-only causal language models often treate codes merely as plain text tokens, i.e., feeding th… ▽ More

    Submitted 22 October, 2023; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: There may be calculation errors in Table 4 of the paper. We need time to verify and supplement, so the manuscript needs to be withdrawn. Thanks!

  28. arXiv:2310.02543  [pdf, other

    cs.LG

    Provable Tensor Completion with Graph Information

    Authors: Kaidong Wang, Yao Wang, Xiuwu Liao, Shaojie Tang, Can Yang, Deyu Meng

    Abstract: Graphs, depicting the interrelations between variables, has been widely used as effective side information for accurate data recovery in various matrix/tensor recovery related applications. In this paper, we study the tensor completion problem with graph information. Current research on graph-regularized tensor completion tends to be task-specific, lacking generality and systematic approaches. Fur… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  29. arXiv:2309.05115  [pdf, other

    eess.SY cs.HC

    Real-time Learning of Driving Gap Preference for Personalized Adaptive Cruise Control

    Authors: Zhouqiao Zhao, Xishun Liao, Amr Abdelraouf, Kyungtae Han, Rohit Gupta, Matthew J. Barth, Guoyuan Wu

    Abstract: Advanced Driver Assistance Systems (ADAS) are increasingly important in improving driving safety and comfort, with Adaptive Cruise Control (ACC) being one of the most widely used. However, pre-defined ACC settings may not always align with driver's preferences and habits, leading to discomfort and potential safety issues. Personalized ACC (P-ACC) has been proposed to address this problem, but most… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

  30. arXiv:2308.11646  [pdf, other

    cs.LG cs.AI cs.GT

    Joint Local Relational Augmentation and Global Nash Equilibrium for Federated Learning with Non-IID Data

    Authors: Xinting Liao, Chaochao Chen, Weiming Liu, Pengyang Zhou, Huabin Zhu, Shuheng Shen, Weiqiang Wang, Mengling Hu, Yanchao Tan, Xiaolin Zheng

    Abstract: Federated learning (FL) is a distributed machine learning paradigm that needs collaboration between a server and a series of clients with decentralized data. To make FL effective in real-world applications, existing work devotes to improving the modeling of decentralized data with non-independent and identical distributions (non-IID). In non-IID settings, there are intra-client inconsistency that… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: To appear in ACM International Conference on Multimedia (ACM MM23)

  31. arXiv:2308.09921  [pdf, other

    cs.CV cs.AI

    Recap: Detecting Deepfake Video with Unpredictable Tampered Traces via Recovering Faces and Mapping Recovered Faces

    Authors: Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou

    Abstract: The exploitation of Deepfake techniques for malicious intentions has driven significant research interest in Deepfake detection. Deepfake manipulations frequently introduce random tampered traces, leading to unpredictable outcomes in different facial regions. However, existing detection methods heavily rely on specific forgery indicators, and as the forgery mode improves, these traces become incre… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.05943

  32. arXiv:2308.02158  [pdf, other

    cs.CV

    CTP-Net: Character Texture Perception Network for Document Image Forgery Localization

    Authors: Xin Liao, Siliang Chen, Jiaxin Chen, Tianyi Wang, Xiehua Li

    Abstract: Due to the progression of information technology in recent years, document images have been widely disseminated on social networks. With the help of powerful image editing tools, document images are easily forged without leaving visible manipulation traces, which leads to severe issues if significant information is falsified for malicious use. Therefore, the research of document image forensics is… ▽ More

    Submitted 14 August, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

  33. arXiv:2308.01512  [pdf, other

    cs.CR

    Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding

    Authors: Hangcheng Liu, Tao Xiang, Shangwei Guo, Han Li, Tianwei Zhang, Xiaofeng Liao

    Abstract: Deep hiding, embedding images with others using deep neural networks, has demonstrated impressive efficacy in increasing the message capacity and robustness of secret sharing. In this paper, we challenge the robustness of existing deep hiding schemes by preventing the recovery of secret images, building on our in-depth study of state-of-the-art deep hiding schemes and their vulnerabilities. Levera… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  34. arXiv:2307.16825  [pdf, other

    cs.CV

    Random Sub-Samples Generation for Self-Supervised Real Image Denoising

    Authors: Yizhong Pan, Xiao Liu, Xiangyu Liao, Yuanzhouhan Cao, Chao Ren

    Abstract: With sufficient paired training samples, the supervised deep learning methods have attracted much attention in image denoising because of their superior performance. However, it is still very challenging to widely utilize the supervised methods in real cases due to the lack of paired noisy-clean images. Meanwhile, most self-supervised denoising methods are ineffective as well when applied to the r… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: Accepted to ICCV2023

  35. arXiv:2307.14384  [pdf, other

    cs.LG cs.AI

    HyperFed: Hyperbolic Prototypes Exploration with Consistent Aggregation for Non-IID Data in Federated Learning

    Authors: Xinting Liao, Weiming Liu, Chaochao Chen, Pengyang Zhou, Huabin Zhu, Yanchao Tan, Jun Wang, Yue Qi

    Abstract: Federated learning (FL) collaboratively models user data in a decentralized way. However, in the real world, non-identical and independent data distributions (non-IID) among clients hinder the performance of FL due to three issues, i.e., (1) the class statistics shifting, (2) the insufficient hierarchical information utilization, and (3) the inconsistency in aggregating clients. To address the abo… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: IJCAI 2023

  36. arXiv:2307.01434  [pdf, other

    cs.LG cs.NE math.CO

    Learning to Branch in Combinatorial Optimization with Graph Pointer Networks

    Authors: Rui Wang, Zhiming Zhou, Tao Zhang, Ling Wang, Xin Xu, Xiangke Liao, Kaiwen Li

    Abstract: Branch-and-bound is a typical way to solve combinatorial optimization problems. This paper proposes a graph pointer network model for learning the variable selection policy in the branch-and-bound. We extract the graph features, global features and historical features to represent the solver state. The proposed model, which combines the graph neural network and the pointer mechanism, can effective… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  37. arXiv:2306.10013  [pdf, other

    cs.CV cs.RO

    PanoOcc: Unified Occupancy Representation for Camera-based 3D Panoptic Segmentation

    Authors: Yuqi Wang, Yuntao Chen, Xingyu Liao, Lue Fan, Zhaoxiang Zhang

    Abstract: Comprehensive modeling of the surrounding 3D world is key to the success of autonomous driving. However, existing perception tasks like object detection, road structure segmentation, depth & elevation estimation, and open-set object localization each only focus on a small facet of the holistic 3D scene understanding task. This divide-and-conquer strategy simplifies the algorithm development proced… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: technical report

  38. arXiv:2306.07265  [pdf, other

    cs.CV

    detrex: Benchmarking Detection Transformers

    Authors: Tianhe Ren, Shilong Liu, Feng Li, Hao Zhang, Ailing Zeng, Jie Yang, Xingyu Liao, Ding Jia, Hongyang Li, He Cao, Jianan Wang, Zhaoyang Zeng, Xianbiao Qi, Yuhui Yuan, Jianwei Yang, Lei Zhang

    Abstract: The DEtection TRansformer (DETR) algorithm has received considerable attention in the research community and is gradually emerging as a mainstream approach for object detection and other perception tasks. However, the current field lacks a unified and comprehensive benchmark specifically tailored for DETR-based models. To address this issue, we develop a unified, highly modular, and lightweight co… ▽ More

    Submitted 13 June, 2023; v1 submitted 12 June, 2023; originally announced June 2023.

    Comments: project link: https://github.com/IDEA-Research/detrex

  39. arXiv:2305.18830  [pdf, other

    cs.CV

    Semi-supervised Pathological Image Segmentation via Cross Distillation of Multiple Attentions

    Authors: Lanfeng Zhong, Xin Liao, Shaoting Zhang, Guotai Wang

    Abstract: Segmentation of pathological images is a crucial step for accurate cancer diagnosis. However, acquiring dense annotations of such images for training is labor-intensive and time-consuming. To address this issue, Semi-Supervised Learning (SSL) has the potential for reducing the annotation cost, but it is challenged by a large number of unlabeled training images. In this paper, we propose a novel SS… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: Provisional Accepted by MICCAI 2023

  40. arXiv:2305.16335  [pdf, other

    cs.CL cs.AI cs.LG

    Robust Representation Learning with Reliable Pseudo-labels Generation via Self-Adaptive Optimal Transport for Short Text Clustering

    Authors: Xiaolin Zheng, Mengling Hu, Weiming Liu, Chaochao Chen, Xinting Liao

    Abstract: Short text clustering is challenging since it takes imbalanced and noisy data as inputs. Existing approaches cannot solve this problem well, since (1) they are prone to obtain degenerate solutions especially on heavy imbalanced datasets, and (2) they are vulnerable to noises. To tackle the above issues, we propose a Robust Short Text Clustering (RSTC) model to improve robustness against imbalanced… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  41. arXiv:2305.16163  [pdf, other

    cs.IR cs.AI

    PPGenCDR: A Stable and Robust Framework for Privacy-Preserving Cross-Domain Recommendation

    Authors: Xinting Liao, Weiming Liu, Xiaolin Zheng, Binhui Yao, Chaochao Chen

    Abstract: Privacy-preserving cross-domain recommendation (PPCDR) refers to preserving the privacy of users when transferring the knowledge from source domain to target domain for better performance, which is vital for the long-term development of recommender systems. Existing work on cross-domain recommendation (CDR) reaches advanced and satisfying recommendation performance, but mostly neglects preserving… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: To be appear in AAAI2023

  42. arXiv:2305.06582  [pdf, other

    cs.CV

    Exploiting Fine-Grained DCT Representations for Hiding Image-Level Messages within JPEG Images

    Authors: Junxue Yang, Xin Liao

    Abstract: Unlike hiding bit-level messages, hiding image-level messages is more challenging, which requires large capacity, high imperceptibility, and high security. Although recent advances in hiding image-level messages have been remarkable, existing schemes are limited to lossless spatial images as covers and cannot be directly applied to JPEG images, the ubiquitous lossy format images in daily life. The… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: ACM Multimedia 23 submitted by Xin Liao (https://xin-liao.github.io/)

  43. arXiv:2305.06321  [pdf, other

    cs.CV cs.MM eess.IV

    SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection

    Authors: Xiaoshuai Wu, Xin Liao, Bo Ou

    Abstract: Malicious Deepfakes have led to a sharp conflict over distinguishing between genuine and forged faces. Although many countermeasures have been developed to detect Deepfakes ex-post, undoubtedly, passive forensics has not considered any preventive measures for the pristine face before foreseeable manipulations. To complete this forensics ecosystem, we thus put forward the proactive solution dubbed… ▽ More

    Submitted 1 August, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: Accepted by ACM MM 2023

  44. arXiv:2305.05943  [pdf, other

    cs.MM

    Mover: Mask and Recovery based Facial Part Consistency Aware Method for Deepfake Video Detection

    Authors: Juan Hu, Xin Liao, Difei Gao, Satoshi Tsutsui, Qian Wang, Zheng Qin, Mike Zheng Shou

    Abstract: Deepfake techniques have been widely used for malicious purposes, prompting extensive research interest in developing Deepfake detection methods. Deepfake manipulations typically involve tampering with facial parts, which can result in inconsistencies across different parts of the face. For instance, Deepfake techniques may change smiling lips to an upset lip, while the eyes remain smiling. Existi… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2303.01740

  45. arXiv:2305.00456   

    cs.CY

    Graph Global Attention Network with Memory for Fake News Detection

    Authors: Qian Chang, Xia Lia, Patrick S. W. Fong

    Abstract: With the proliferation of social media, the detection of fake news has become a critical issue that poses a significant threat to society. The dissemination of fake information can lead to social harm and damage the credibility of information. To address this issue, deep learning has emerged as a promising approach, especially with the development of natural language processing (NLP). This study a… ▽ More

    Submitted 17 May, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: There are some errors in the readability of the paper, which cannot be corrected through the updated version

  46. arXiv:2304.11384  [pdf, other

    cs.SE

    Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning

    Authors: Mingyang Geng, Shangwen Wang, Dezun Dong, Haotian Wang, Ge Li, Zhi Jin, Xiaoguang Mao, Xiangke Liao

    Abstract: Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for existing approaches is that given a code snippet, they can only generate one comment while developers usually need to know information from diverse perspectives such as what is the functionali… ▽ More

    Submitted 14 June, 2023; v1 submitted 22 April, 2023; originally announced April 2023.

    Comments: Accepted by the 46th International Conference on Software Engineering (ICSE 2024)

  47. arXiv:2304.11300  [pdf, other

    cs.CR cs.AI cs.IR

    MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion

    Authors: Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu

    Abstract: As a prominent instance of vandalism edits, Wiki search poisoning for illicit promotion is a cybercrime in which the adversary aims at editing Wiki articles to promote illicit businesses through Wiki search results of relevant queries. In this paper, we report a study that, for the first time, shows that such stealthy blackhat SEO on Wiki can be automated. Our technique, called MAWSEO, employs adv… ▽ More

    Submitted 5 November, 2023; v1 submitted 21 April, 2023; originally announced April 2023.

  48. arXiv:2304.10691  [pdf, other

    eess.IV cs.CV cs.LG

    SkinGPT-4: An Interactive Dermatology Diagnostic System with Visual Large Language Model

    Authors: Juexiao Zhou, Xiaonan He, Liyuan Sun, Jiannan Xu, Xiuying Chen, Yuetan Chu, Longxi Zhou, Xingyu Liao, Bin Zhang, Xin Gao

    Abstract: Skin and subcutaneous diseases rank high among the leading contributors to the global burden of nonfatal diseases, impacting a considerable portion of the population. Nonetheless, the field of dermatology diagnosis faces three significant hurdles. Firstly, there is a shortage of dermatologists accessible to diagnose patients, particularly in rural regions. Secondly, accurately interpreting skin di… ▽ More

    Submitted 8 June, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

  49. arXiv:2304.08018  [pdf, ps, other

    cs.MA

    Dynamics-Based Algorithm-Level Privacy Preservation for Push-Sum Average Consensus

    Authors: Huqiang Cheng, Xiaofeng Liao, Huaqing Li, Qingguo Lü

    Abstract: Average consensus is essential for multi-agent systems to achieve specific functions and is widely used in network control, information fusion, etc. In conventional average consensus algorithms, all agents reach an agreement by individual calculations and sharing information with their respective neighbors. Nevertheless, the information interactions that occur in the communication network may make… ▽ More

    Submitted 9 April, 2024; v1 submitted 17 April, 2023; originally announced April 2023.

  50. arXiv:2303.15822  [pdf, other

    cs.SE cs.AI

    One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization

    Authors: Deze Wang, Boxing Chen, Shanshan Li, Wei Luo, Shaoliang Peng, Wei Dong, Xiangke Liao

    Abstract: As pre-trained models automate many code intelligence tasks, a widely used paradigm is to fine-tune a model on the task dataset for each programming language. A recent study reported that multilingual fine-tuning benefits a range of tasks and models. However, we find that multilingual fine-tuning leads to performance degradation on recent models UniXcoder and CodeT5. To alleviate the potentially… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Accepted to the 45th International Conference on Software Engineering (ICSE 2023)