Skip to main content

Showing 1–50 of 2,984 results for author: Wu, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.05784  [pdf, other

    cs.CR cs.LG

    Link Stealing Attacks Against Inductive Graph Neural Networks

    Authors: Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang

    Abstract: A graph neural network (GNN) is a type of neural network that is specifically designed to process graph-structured data. Typically, GNNs can be implemented in two settings, including the transductive setting and the inductive setting. In the transductive setting, the trained model can only predict the labels of nodes that were observed at the training time. In the inductive setting, the trained mo… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: To appear in the 24th Privacy Enhancing Technologies Symposium (PETS 2024), July 15-20, 2024

  2. arXiv:2405.05589  [pdf, other

    cs.RO

    Rotation Initialization and Stepwise Refinement for Universal LiDAR Calibration

    Authors: Yifan Duan, Xinran Zhang, Guoliang You, Yilong Wu, Xingchen Li, Yao Li, Xiaomeng Chu, Jie Peng, Yu Zhang, Jianmin Ji, Yanyong Zhang

    Abstract: Autonomous systems often employ multiple LiDARs to leverage the integrated advantages, enhancing perception and robustness. The most critical prerequisite under this setting is the estimating the extrinsic between each LiDAR, i.e., calibration. Despite the exciting progress in multi-LiDAR calibration efforts, a universal, sensor-agnostic calibration method remains elusive. According to the coarse-… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: 19 pages, 19 figures

  3. arXiv:2405.05579  [pdf

    cs.HC eess.SY

    Intelligent EC Rearview Mirror: Enhancing Driver Safety with Dynamic Glare Mitigation via Cloud Edge Collaboration

    Authors: Junyi Yang, Zefei Xu, Huayi Lai, Hongjian Chen, Sifan Kong, Yutong Wu, Huan Yang

    Abstract: Sudden glare from trailing vehicles significantly increases driving safety risks. Existing anti-glare technologies such as electronic, manually-adjusted, and electrochromic rearview mirrors, are expensive and lack effective adaptability in different lighting conditions. To address these issues, our research introduces an intelligent rearview mirror system utilizing novel all-liquid electrochromic… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2405.05496  [pdf, other

    cs.CL

    Boosting Large Language Models with Continual Learning for Aspect-based Sentiment Analysis

    Authors: Xuanwen Ding, Jie Zhou, Liang Dou, Qin Chen, Yuanbin Wu, Chengcai Chen, Liang He

    Abstract: Aspect-based sentiment analysis (ABSA) is an important subtask of sentiment analysis, which aims to extract the aspects and predict their sentiments. Most existing studies focus on improving the performance of the target domain by fine-tuning domain-specific models (trained on source domains) based on the target domain dataset. Few works propose continual learning tasks for ABSA, which aim to lear… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  5. arXiv:2405.05445  [pdf, other

    cs.LG

    Large Language Model Enhanced Machine Learning Estimators for Classification

    Authors: Yuhang Wu, Yingfei Wang, Chu Wang, Zeyu Zheng

    Abstract: Pre-trained large language models (LLM) have emerged as a powerful tool for simulating various scenarios and generating output given specific instructions and multimodal input. In this work, we analyze the specific use of LLM to enhance a classical supervised machine learning method for classification problems. We propose a few approaches to integrate LLM into a classical machine learning estimato… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  6. arXiv:2405.04867  [pdf, other

    eess.IV cs.CV

    MIPI 2024 Challenge on Demosaic for HybridEVS Camera: Methods and Results

    Authors: Yaqi Wu, Zhihao Fan, Xiaofeng Chu, Jimmy S. Ren, Xiaoming Li, Zongsheng Yue, Chongyi Li, Shangcheng Zhou, Ruicheng Feng, Yuekun Dai, Peiqing Yang, Chen Change Loy, Senyan Xu, Zhijing Sun, Jiaying Zhu, Yurui Zhu, Xueyang Fu, Zheng-Jun Zha, Jun Cao, Cheng Li, Shu Chen, Liang Ma, Shiyang Zhou, Haijin Zeng, Kai Feng , et al. (24 additional authors not shown)

    Abstract: The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photogra… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: MIPI@CVPR2024. Website: https://mipi-challenge.org/MIPI2024/

  7. arXiv:2405.04803  [pdf, other

    cs.CR cs.NI

    Blockchains for Internet of Things: Fundamentals, Applications, and Challenges

    Authors: Yusen Wu, Ye Hu, Mingzhe Chen, Yelena Yesha, Mérouane Debbah

    Abstract: Internet of Things (IoT) services necessitate the storage, transmission, and analysis of diverse data for inference, autonomy, and control. Blockchains, with their inherent properties of decentralization and security, offer efficient database solutions for these devices through consensus-based data sharing. However, it's essential to recognize that not every blockchain system is suitable for speci… ▽ More

    Submitted 8 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

  8. arXiv:2405.04346  [pdf, other

    cs.LG cs.AI cs.CL stat.ML

    Revisiting character-level adversarial attacks

    Authors: Elias Abad Rocamora, Yongtao Wu, Fanghui Liu, Grigorios G. Chrysos, Volkan Cevher

    Abstract: Adversarial attacks in Natural Language Processing apply perturbations in the character or token levels. Token-level attacks, gaining prominence for their use of gradient-based methods, are susceptible to altering sentence semantics, leading to invalid adversarial examples. While character-level attacks easily maintain semantics, they have received less attention as they cannot easily adopt popula… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: Accepted in ICML 2024

  9. arXiv:2405.04146  [pdf, other

    cs.RO cs.DC

    pFedLVM: A Large Vision Model (LVM)-Driven and Latent Feature-Based Personalized Federated Learning Framework in Autonomous Driving

    Authors: Wei-Bin Kou, Qingfeng Lin, Ming Tang, Sheng Xu, Rongguang Ye, Yang Leng, Shuai Wang, Zhenyu Chen, Guangxu Zhu, Yik-Chung Wu

    Abstract: Deep learning-based Autonomous Driving (AD) models often exhibit poor generalization due to data heterogeneity in an ever domain-shifting environment. While Federated Learning (FL) could improve the generalization of an AD model (known as FedAD system), conventional models often struggle with under-fitting as the amount of accumulated training data progressively increases. To address this issue, i… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: This paper was submitted to IEEE Transactions on Mobile Computing (TMC) on Apr. 6th, 2024

  10. arXiv:2405.04144  [pdf, other

    cs.IT

    Lossy Compression with Data, Perception, and Classification Constraints

    Authors: Yuhan Wang, Youlong Wu, Shuai Ma, Ying-Jun Angela Zhang

    Abstract: Balancing diverse task objectives under limited rate is crucial for developing robust multi-task deep learning (DL) models and improving performance across various domains. In this paper, we consider the lossy compression problem with human-centric and task-oriented metrics, such as perceptual quality and classification accuracy. We investigate two ternary relationships, namely, the rate-distortio… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, in part submitted to ITW 2024

  11. arXiv:2405.04100  [pdf, other

    cs.CV cs.LG

    ESP: Extro-Spective Prediction for Long-term Behavior Reasoning in Emergency Scenarios

    Authors: Dingrui Wang, Zheyuan Lai, Yuda Li, Yi Wu, Yuexin Ma, Johannes Betz, Ruigang Yang, Wei Li

    Abstract: Emergent-scene safety is the key milestone for fully autonomous driving, and reliable on-time prediction is essential to maintain safety in emergency scenarios. However, these emergency scenarios are long-tailed and hard to collect, which restricts the system from getting reliable predictions. In this paper, we build a new dataset, which aims at the long-term prediction with the inconspicuous stat… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: Accepted by ICRA 2024 as Oral Presentation

  12. arXiv:2405.03924  [pdf, other

    cs.DB cs.AI cs.LG

    NeurDB: An AI-powered Autonomous Data System

    Authors: Beng Chin Ooi, Shaofeng Cai, Gang Chen, Kian Lee Tan, Yuncheng Wu, Xiaokui Xiao, Naili Xing, Cong Yue, Lingze Zeng, Meihui Zhang, Zhanhao Zhao

    Abstract: In the wake of rapid advancements in artificial intelligence (AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB (AIxDB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, sel… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  13. arXiv:2405.03562  [pdf, other

    cs.IR

    ID-centric Pre-training for Recommendation

    Authors: Yiqing Wu, Ruobing Xie, Zhao Zhang, Fuzhen Zhuang, Xu Zhang, Leyu Lin, Zhanhui Kang, Yongjun Xu

    Abstract: Classical sequential recommendation models generally adopt ID embeddings to store knowledge learned from user historical behaviors and represent items. However, these unique IDs are challenging to be transferred to new domains. With the thriving of pre-trained language model (PLM), some pioneer works adopt PLM for pre-trained recommendation, where modality information (e.g., text) is considered un… ▽ More

    Submitted 7 May, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  14. arXiv:2405.03516  [pdf, other

    cs.LG

    GI-SMN: Gradient Inversion Attack against Federated Learning without Prior Knowledge

    Authors: Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jipeng Chen, Huan Bao

    Abstract: Federated learning (FL) has emerged as a privacy-preserving machine learning approach where multiple parties share gradient information rather than original user data. Recent work has demonstrated that gradient inversion attacks can exploit the gradients of FL to recreate the original user data, posing significant privacy risks. However, these attacks make strong assumptions about the attacker, su… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 18 pages, 10 figures, conference

  15. arXiv:2405.03486  [pdf, other

    cs.CR cs.CV cs.SI

    UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images

    Authors: Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang

    Abstract: Image safety classifiers play an important role in identifying and mitigating the spread of unsafe images online (e.g., images including violence, hateful rhetoric, etc.). At the same time, with the advent of text-to-image models and increasing concerns about the safety of AI models, developers are increasingly relying on image safety classifiers to safeguard their models. Yet, the performance of… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  16. arXiv:2405.02830  [pdf, other

    cs.CV

    You Only Need Half: Boosting Data Augmentation by Using Partial Content

    Authors: Juntao Hu, Yuan Wu

    Abstract: We propose a novel data augmentation method termed You Only Need hAlf (YONA), which simplifies the augmentation process. YONA bisects an image, substitutes one half with noise, and applies data augmentation techniques to the remaining half. This method reduces the redundant information in the original image, encourages neural networks to recognize objects from incomplete views, and significantly e… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: Technical report,16 pages

  17. arXiv:2405.02814  [pdf, other

    cs.CL

    NegativePrompt: Leveraging Psychology for Large Language Models Enhancement via Negative Emotional Stimuli

    Authors: Xu Wang, Cheng Li, Yi Chang, Jindong Wang, Yuan Wu

    Abstract: Large Language Models (LLMs) have become integral to a wide spectrum of applications, ranging from traditional computing tasks to advanced artificial intelligence (AI) applications. This widespread adoption has spurred extensive research into LLMs across various disciplines, including the social sciences. Notably, studies have revealed that LLMs possess emotional intelligence, which can be further… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: This paper has been accepted by IJCAI 2024

  18. arXiv:2405.01814  [pdf, other

    cs.LG cs.DC

    Efficient and Economic Large Language Model Inference with Attention Offloading

    Authors: Shaoyuan Chen, Yutong Lin, Mingxing Zhang, Yongwei Wu

    Abstract: Transformer-based large language models (LLMs) exhibit impressive performance in generative tasks but introduce significant challenges in real-world serving due to inefficient use of the expensive, computation-optimized accelerators. This mismatch arises from the autoregressive nature of LLMs, where the generation phase comprises operators with varying resource demands. Specifically, the attention… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  19. arXiv:2405.01029  [pdf, other

    cs.AI cs.LG

    MVMoE: Multi-Task Vehicle Routing Solver with Mixture-of-Experts

    Authors: Jianan Zhou, Zhiguang Cao, Yaoxin Wu, Wen Song, Yining Ma, Jie Zhang, Chi Xu

    Abstract: Learning to solve vehicle routing problems (VRPs) has garnered much attention. However, most neural solvers are only structured and trained independently on a specific problem, making them less generic and practical. In this paper, we aim to develop a unified neural solver that can cope with a range of VRP variants simultaneously. Specifically, we propose a multi-task vehicle routing solver with m… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: Accepted at ICML 2024

  20. arXiv:2405.00938  [pdf, other

    cs.GR

    Virtual Psychedelia

    Authors: Jacob Yenney, Weichen Liu, Ying C. Wu

    Abstract: We present an approach to designing 3D Iterated Function Systems (IFS) within the Unity Editor and rendered to VR in real-time. Objects are modeled as a hierarchical tree of primitive shapes and operators, editable using a graphical user interface allowing artists to develop psychedelic scenes with little to no coding knowledge, and is easily extensible for more advanced users to add their own pri… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 4 pages, 5 figures. Submitted to IEEE VIS 2024

  21. arXiv:2405.00902  [pdf, ps, other

    cs.LG cs.AI cs.MA

    MESA: Cooperative Meta-Exploration in Multi-Agent Learning through Exploiting State-Action Space Structure

    Authors: Zhicheng Zhang, Yancheng Liang, Yi Wu, Fei Fang

    Abstract: Multi-agent reinforcement learning (MARL) algorithms often struggle to find strategies close to Pareto optimal Nash Equilibrium, owing largely to the lack of efficient exploration. The problem is exacerbated in sparse-reward settings, caused by the larger variance exhibited in policy learning. This paper introduces MESA, a novel meta-exploration method for cooperative multi-agent learning. It lear… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: Accepted to AAMAS 2024. 15 pages

  22. arXiv:2405.00705  [pdf, other

    cs.CL cs.LG

    SHED: Shapley-Based Automated Dataset Refinement for Instruction Fine-Tuning

    Authors: Yexiao He, Ziyao Wang, Zheyu Shen, Guoheng Sun, Yucong Dai, Yongkai Wu, Hongyi Wang, Ang Li

    Abstract: The pre-trained Large Language Models (LLMs) can be adapted for many downstream tasks and tailored to align with human preferences through fine-tuning. Recent studies have discovered that LLMs can achieve desirable performance with only a small amount of high-quality data, suggesting that a large amount of the data in these extensive datasets is redundant or even harmful. Identifying high-quality… ▽ More

    Submitted 23 April, 2024; originally announced May 2024.

  23. arXiv:2405.00675  [pdf, other

    cs.LG cs.AI cs.CL stat.ML

    Self-Play Preference Optimization for Language Model Alignment

    Authors: Yue Wu, Zhiqing Sun, Huizhuo Yuan, Kaixuan Ji, Yiming Yang, Quanquan Gu

    Abstract: Traditional reinforcement learning from human feedback (RLHF) approaches relying on parametric models like the Bradley-Terry model fall short in capturing the intransitivity and irrationality in human preferences. Recent advancements suggest that directly working with preference probabilities can yield a more accurate reflection of human preferences, enabling more flexible and accurate language mo… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 25 pages, 4 figures, 5 tables

  24. arXiv:2405.00568  [pdf, other

    cs.DB cs.AI

    Powering In-Database Dynamic Model Slicing for Structured Data Analytics

    Authors: Lingze Zeng, Naili Xing, Shaofeng Cai, Gang Chen, Beng Chin Ooi, Jian Pei, Yuncheng Wu

    Abstract: Relational database management systems (RDBMS) are widely used for the storage and retrieval of structured data. To derive insights beyond statistical aggregation, we typically have to extract specific subdatasets from the database using conventional database operations, and then apply deep neural networks (DNN) training and inference on these respective subdatasets in a separate machine learning… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  25. arXiv:2405.00428  [pdf, other

    cs.SE

    CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection

    Authors: Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yan Liu, Yang Liu

    Abstract: With the development of the open source community, the code is often copied, spread, and evolved in multiple software systems, which brings uncertainty and risk to the software system (e.g., bug propagation and copyright infringement). Therefore, it is important to conduct code clone detection to discover similar code pairs. Many approaches have been proposed to detect code clones where token-base… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 21 pages, 7 figures

  26. arXiv:2404.19519  [pdf, ps, other

    cs.LG cs.DB

    Generating Robust Counterfactual Witnesses for Graph Neural Networks

    Authors: Dazhuo Qiu, Mengying Wang, Arijit Khan, Yinghui Wu

    Abstract: This paper introduces a new class of explanation structures, called robust counterfactual witnesses (RCWs), to provide robust, both counterfactual and factual explanations for graph neural networks. Given a graph neural network M, a robust counterfactual witness refers to the fraction of a graph G that are counterfactual and factual explanation of the results of M over G, but also remains so for a… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by ICDE 2024

  27. arXiv:2404.19243  [pdf, other

    cs.DB

    Co-occurrence order-preserving pattern mining

    Authors: Youxi Wu, Zhen Wang, Yan Li, Yingchun Guo, He Jiang, Xingquan Zhu, Xindong Wu

    Abstract: Recently, order-preserving pattern (OPP) mining has been proposed to discover some patterns, which can be seen as trend changes in time series. Although existing OPP mining algorithms have achieved satisfactory performance, they discover all frequent patterns. However, in some cases, users focus on a particular trend and its associated trends. To efficiently discover trend information related to a… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  28. arXiv:2404.19063  [pdf, other

    cs.CL

    SuperCLUE-Fin: Graded Fine-Grained Analysis of Chinese LLMs on Diverse Financial Tasks and Applications

    Authors: Liang Xu, Lei Zhu, Yaotong Wu, Hang Xue

    Abstract: The SuperCLUE-Fin (SC-Fin) benchmark is a pioneering evaluation framework tailored for Chinese-native financial large language models (FLMs). It assesses FLMs across six financial application domains and twenty-five specialized tasks, encompassing theoretical knowledge and practical applications such as compliance, risk management, and investment analysis. Using multi-turn, open-ended conversation… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: 11 pages, 19 figures, and tables

  29. arXiv:2404.18946  [pdf, other

    physics.optics cs.IR eess.IV

    Align-Free Multi-Plane Phase Retrieval

    Authors: Jiabao Wang, Yang Wu, Jun Wang, Ni Chen

    Abstract: The multi-plane phase retrieval method provides a budget-friendly and effective way to perform phase imaging, yet it often encounters alignment challenges due to shifts along the optical axis in experiments. Traditional methods, such as employing beamsplitters instead of mechanical stage movements or adjusting focus using tunable light sources, add complexity to the setup required for multi-plane… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  30. arXiv:2404.18515  [pdf, other

    cs.SE

    An Agile Formal Specification Language Design Based on K Framework

    Authors: Jianyu Zhang, Long Zhang, Yixuan Wu, Feng Yang

    Abstract: Formal Methods (FMs) are currently essential for verifying the safety and reliability of software systems. However, the specification writing in formal methods tends to be complex and challenging to learn, requiring familiarity with various intricate formal specification languages and verification technologies. In response to the increasing complexity of software frameworks, existing specification… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  31. arXiv:2404.18284  [pdf, other

    cs.CV

    S3-SLAM: Sparse Tri-plane Encoding for Neural Implicit SLAM

    Authors: Zhiyao Zhang, Yunzhou Zhang, Yanmin Wu, Bin Zhao, Xingshuo Wang, Rui Tian

    Abstract: With the emergence of Neural Radiance Fields (NeRF), neural implicit representations have gained widespread applications across various domains, including simultaneous localization and mapping. However, current neural implicit SLAM faces a challenging trade-off problem between performance and the number of parameters. To address this problem, we propose sparse tri-plane encoding, which efficiently… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  32. arXiv:2404.18143  [pdf, other

    cs.CV

    Tracking Transforming Objects: A Benchmark

    Authors: You Wu, Yuelong Wang, Yaxin Liao, Fuliang Wu, Hengzhou Ye, Shuiwang Li

    Abstract: Tracking transforming objects holds significant importance in various fields due to the dynamic nature of many real-world scenarios. By enabling systems accurately represent transforming objects over time, tracking transforming objects facilitates advancements in areas such as autonomous systems, human-computer interaction, and security applications. Moreover, understanding the behavior of transfo… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  33. arXiv:2404.18066  [pdf, other

    cs.NE cs.AI cs.AR cs.CV q-bio.NC

    Quantized Context Based LIF Neurons for Recurrent Spiking Neural Networks in 45nm

    Authors: Sai Sukruth Bezugam, Yihao Wu, JaeBum Yoo, Dmitri Strukov, Bongjin Kim

    Abstract: In this study, we propose the first hardware implementation of a context-based recurrent spiking neural network (RSNN) emphasizing on integrating dual information streams within the neocortical pyramidal neurons specifically Context- Dependent Leaky Integrate and Fire (CLIF) neuron models, essential element in RSNN. We present a quantized version of the CLIF neuron (qCLIF), developed through a har… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: 7 Pages, 7 Figures, 2 Tables

  34. arXiv:2404.17164  [pdf, other

    cs.LG

    DPGAN: A Dual-Path Generative Adversarial Network for Missing Data Imputation in Graphs

    Authors: Xindi Zheng, Yuwei Wu, Yu Pan, Wanyu Lin, Lei Ma, Jianjun Zhao

    Abstract: Missing data imputation poses a paramount challenge when dealing with graph data. Prior works typically are based on feature propagation or graph autoencoders to address this issue. However, these methods usually encounter the over-smoothing issue when dealing with missing data, as the graph neural network (GNN) modules are not explicitly designed for handling missing data. This paper proposes a n… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

    Comments: 9 pages

  35. arXiv:2404.17136  [pdf, other

    cs.DB cs.AI cs.CL

    Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

    Authors: Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin

    Abstract: The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently, many deep learning-based approaches have been developed for NL2Vis. Despite the considerable efforts made by these approaches, challenges persist in visualizing data sourced from un… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  36. arXiv:2404.16339  [pdf, other

    cs.CV cs.AI

    Training-Free Unsupervised Prompt for Vision-Language Models

    Authors: Sifan Long, Linbin Wang, Zhen Zhao, Zichang Tan, Yiming Wu, Shengsheng Wang, Jingdong Wang

    Abstract: Prompt learning has become the most effective paradigm for adapting large pre-trained vision-language models (VLMs) to downstream tasks. Recently, unsupervised prompt tuning methods, such as UPL and POUF, directly leverage pseudo-labels as supervisory information to fine-tune additional adaptation modules on unlabeled data. However, inaccurate pseudo labels easily misguide the tuning process and r… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  37. arXiv:2404.16022  [pdf, other

    cs.CV

    PuLID: Pure and Lightning ID Customization via Contrastive Alignment

    Authors: Zinan Guo, Yanze Wu, Zhuowei Chen, Lang Chen, Qian He

    Abstract: We propose Pure and Lightning ID customization (PuLID), a novel tuning-free ID customization method for text-to-image generation. By incorporating a Lightning T2I branch with a standard diffusion one, PuLID introduces both contrastive alignment loss and accurate ID loss, minimizing disruption to the original model and ensuring high ID fidelity. Experiments show that PuLID achieves superior perform… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Tech Report. Codes and models will be available at https://github.com/ToTheBeginning/PuLID

  38. arXiv:2404.15817  [pdf, other

    cs.CV cs.LG

    Vision Transformer-based Adversarial Domain Adaptation

    Authors: Yahan Li, Yuan Wu

    Abstract: Unsupervised domain adaptation (UDA) aims to transfer knowledge from a labeled source domain to an unlabeled target domain. The most recent UDA methods always resort to adversarial training to yield state-of-the-art results and a dominant number of existing UDA methods employ convolutional neural networks (CNNs) as feature extractors to learn domain invariant features. Vision transformer (ViT) has… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 6 pages

  39. arXiv:2404.15687  [pdf, other

    cs.SE cs.AI cs.CR

    Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

    Authors: Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

    Abstract: Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection, owing to their ability to capture the underlying semantic structure of source code. However, GNNs face significant challenges in explainability due to their inherently black-box natu… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: This paper was accepted in the proceedings of the 33nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)

  40. arXiv:2404.15675  [pdf, other

    cs.IR

    Hi-Gen: Generative Retrieval For Large-Scale Personalized E-commerce Search

    Authors: Yanjing Wu, Yinfu Feng, Jian Wang, Wenji Zhou, Yunan Ye, Rong Xiao

    Abstract: Leveraging generative retrieval (GR) techniques to enhance search systems is an emerging methodology that has shown promising results in recent years. In GR, a text-to-text model maps string queries directly to relevant document identifiers (docIDs), so it dramatically simplifies the whole retrieval process. However, when applying most GR models in large-scale E-commerce for personalized item sear… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  41. arXiv:2404.15552  [pdf, other

    cs.CV astro-ph.IM cs.LG gr-qc

    Cross-Temporal Spectrogram Autoencoder (CTSAE): Unsupervised Dimensionality Reduction for Clustering Gravitational Wave Glitches

    Authors: Yi Li, Yunan Wu, Aggelos K. Katsaggelos

    Abstract: The advancement of The Laser Interferometer Gravitational-Wave Observatory (LIGO) has significantly enhanced the feasibility and reliability of gravitational wave detection. However, LIGO's high sensitivity makes it susceptible to transient noises known as glitches, which necessitate effective differentiation from real gravitational wave signals. Traditional approaches predominantly employ fully s… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  42. arXiv:2404.15454  [pdf, ps, other

    math.ST cs.IT

    Prediction from compression for models with infinite memory, with applications to hidden Markov and renewal processes

    Authors: Yanjun Han, Tianze Jiang, Yihong Wu

    Abstract: Consider the problem of predicting the next symbol given a sample path of length n, whose joint distribution belongs to a distribution class that may have long-term memory. The goal is to compete with the conditional predictor that knows the true model. For both hidden Markov models (HMMs) and renewal processes, we determine the optimal prediction risk in Kullback- Leibler divergence up to univers… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: 37 Pages

  43. arXiv:2404.15364  [pdf, other

    eess.SP cs.AI cs.CV cs.LG

    MP-DPD: Low-Complexity Mixed-Precision Neural Networks for Energy-Efficient Digital Predistortion of Wideband Power Amplifiers

    Authors: Yizhuo Wu, Ang Li, Mohammadreza Beikmirza, Gagan Deep Singh, Qinyu Chen, Leo C. N. de Vreede, Morteza Alavi, Chang Gao

    Abstract: Digital Pre-Distortion (DPD) enhances signal quality in wideband RF power amplifiers (PAs). As signal bandwidths expand in modern radio systems, DPD's energy consumption increasingly impacts overall system efficiency. Deep Neural Networks (DNNs) offer promising advancements in DPD, yet their high complexity hinders their practical deployment. This paper introduces open-source mixed-precision (MP)… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE Microwave and Wireless Technology Letters (MWTL)

  44. arXiv:2404.15303  [pdf, ps, other

    cs.HC

    State Space Paradox of Computational Research in Creativity

    Authors: Ömer Akin, Yuning Wu

    Abstract: This paper explores the paradoxical nature of computational creativity, focusing on the inherent limitations of closed digital systems in emulating the open-ended, dynamic process of human creativity. Through a comprehensive analysis, we delve into the concept of the State Space Paradox (SSP) in computational research on creativity, which arises from the attempt to model or replicate creative beha… ▽ More

    Submitted 28 March, 2024; originally announced April 2024.

    Comments: 7 pages, 3 tables

  45. arXiv:2404.15137  [pdf, other

    cs.MA cs.RO

    From Space-Time to Space-Order: Directly Planning a Temporal Planning Graph by Redefining CBS

    Authors: Yu Wu, Rishi Veerapaneni, Jiaoyang Li, Maxim Likhachev

    Abstract: The majority of multi-agent path finding (MAPF) methods compute collision-free space-time paths which require agents to be at a specific location at a specific discretized timestep. However, executing these space-time paths directly on robotic systems is infeasible due to real-time execution differences (e.g. delays) which can lead to collisions. To combat this, current methods translate the space… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  46. arXiv:2404.15131  [pdf, other

    cs.RO

    Optimizing Multi-Touch Textile and Tactile Skin Sensing Through Circuit Parameter Estimation

    Authors: Bo Ying Su, Yuchen Wu, Chengtao Wen, Changliu Liu

    Abstract: Tactile and textile skin technologies have become increasingly important for enhancing human-robot interaction and allowing robots to adapt to different environments. Despite notable advancements, there are ongoing challenges in skin signal processing, particularly in achieving both accuracy and speed in dynamic touch sensing. This paper introduces a new framework that poses the touch sensing prob… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  47. arXiv:2404.15067  [pdf, other

    cs.CL

    Enhancing Textual Personality Detection toward Social Media: Integrating Long-term and Short-term Perspectives

    Authors: Haohao Zhu, Xiaokun Zhang, Junyu Lu, Youlin Wu, Zewen Bai, Changrong Min, Liang Yang, Bo Xu, Dongyu Zhang, Hongfei Lin

    Abstract: Textual personality detection aims to identify personality characteristics by analyzing user-generated content toward social media platforms. Numerous psychological literature highlighted that personality encompasses both long-term stable traits and short-term dynamic states. However, existing studies often concentrate only on either long-term or short-term personality representations, without eff… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: 11 pages, 9 figures

  48. arXiv:2404.14961  [pdf, other

    cs.LG

    Cache-Aware Reinforcement Learning in Large-Scale Recommender Systems

    Authors: Xiaoshuang Chen, Gengrui Zhang, Yao Wang, Yulin Wu, Shuo Su, Kaiqiao Zhan, Ben Wang

    Abstract: Modern large-scale recommender systems are built upon computation-intensive infrastructure and usually suffer from a huge difference in traffic between peak and off-peak periods. In peak periods, it is challenging to perform real-time computation for each request due to the limited budget of computational resources. The recommendation with a cache is a solution to this problem, where a user-wise r… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: 8 pages, 8 figures

  49. arXiv:2404.14832  [pdf, other

    cs.IT

    GLDPC-PC Codes for MIMO Systems with Iterative Detection and Decoding

    Authors: Binghui Shi, Yongpeng Wu, Yin Xu, Xiqi Gao, Xiaohu You, Wenjun Zhang

    Abstract: In this work, we propose the integration of GLDPC codes with short polar-like component codes, termed GLDPC codes with polar component codes (GLDPC-PC). This approach leverages the good distance properties of polar-like codes and mitigates their high decoding latency in long block lengths. A recently proposed soft-input soft-output decoder for polar-like codes enables effective iterative belief pr… ▽ More

    Submitted 9 May, 2024; v1 submitted 23 April, 2024; originally announced April 2024.

    Comments: submitted to globecom 2024

  50. arXiv:2404.14828  [pdf, other

    cs.IT

    GLDPC-PC Codes: Channel Coding Towards 6G Communications

    Authors: Li Shen, Yongpeng Wu, Yin Xu, Xiaohu You, Xiqi Gao, Wenjun Zhang

    Abstract: The sixth generation (6G) wireless communication system will improve the key technical indicators by one to two orders of magnitude, and come with some new features. As a crucial technique to enhance the reliability and efficiency of data transmission, the next generation channel coding is not only required to satisfy the stringent requirements of 6G, but also expected to be backward compatible to… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE Communications Magazine