Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 144 results for author: Sui, Y

.
  1. arXiv:2407.12588  [pdf, other

    cs.CV cs.AI

    Benchmarking Robust Self-Supervised Learning Across Diverse Downstream Tasks

    Authors: Antoni Kowalczuk, Jan Dubiński, Atiyeh Ashari Ghomi, Yi Sui, George Stein, Jiapeng Wu, Jesse C. Cresswell, Franziska Boenisch, Adam Dziedzic

    Abstract: Large-scale vision models have become integral in many applications due to their unprecedented performance and versatility across downstream tasks. However, the robustness of these foundation models has primarily been explored for a single task, namely image classification. The vulnerability of other common vision tasks, such as semantic segmentation and depth estimation, remains largely unknown.… ▽ More

    Submitted 18 July, 2024; v1 submitted 17 July, 2024; originally announced July 2024.

    Comments: Accepted at the ICML 2024 Workshop on Foundation Models in the Wild

  2. arXiv:2407.11472  [pdf, other

    cs.RO cs.AI

    DynSyn: Dynamical Synergistic Representation for Efficient Learning and Control in Overactuated Embodied Systems

    Authors: Kaibo He, Chenhui Zuo, Chengtian Ma, Yanan Sui

    Abstract: Learning an effective policy to control high-dimensional, overactuated systems is a significant challenge for deep reinforcement learning algorithms. Such control scenarios are often observed in the neural control of vertebrate musculoskeletal systems. The study of these control mechanisms will provide insights into the control of high-dimensional, overactuated systems. The coordination of actuato… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: ICML 2024

  3. arXiv:2407.08426  [pdf, other

    cond-mat.str-el cond-mat.mtrl-sci

    Raman study of the structural transition in LiVO$_2$

    Authors: Yuri S. Ponosov, Evgenia V. Komleva, Elizaveta A. Pankrushina, Haohang Xu, Yu Sui, Sergey V. Streltsov

    Abstract: The results of polarization-dependent Raman spectroscopy of single-crystalline LiVO$_2$ exhibiting transition to a diamagnetic state below $T_c \sim $500K are reported. Our measurements clearly detect additional peaks in the low-temperature phase, which disappear nearly completely when heated above $T_c$. Proposed $\sqrt{3}$a \times $\sqrt{3}$a lattice reconstruction explains these new Raman peaks… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  4. arXiv:2407.06176  [pdf, other

    cs.CV eess.IV

    Contour-weighted loss for class-imbalanced image segmentation

    Authors: Zhhengyong Huang, Yao Sui

    Abstract: Image segmentation is critically important in almost all medical image analysis for automatic interpretations and processing. However, it is often challenging to perform image segmentation due to data imbalance between intra- and inter-class, resulting in over- or under-segmentation. Consequently, we proposed a new methodology to address the above issue, with a compact yet effective contour-weight… ▽ More

    Submitted 7 June, 2024; originally announced July 2024.

    Comments: ICIP 2024

  5. arXiv:2406.15788  [pdf, other

    cs.LG

    Distributionally Robust Constrained Reinforcement Learning under Strong Duality

    Authors: Zhengfei Zhang, Kishan Panaganti, Laixi Shi, Yanan Sui, Adam Wierman, Yisong Yue

    Abstract: We study the problem of Distributionally Robust Constrained RL (DRC-RL), where the goal is to maximize the expected reward subject to environmental distribution shifts and constraints. This setting captures situations where training and testing environments differ, and policies must satisfy constraints motivated by safety or limited budgets. Despite significant progress toward algorithm design for… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    Comments: Accepted at the Reinforcement Learning Conference (RLC) 2024; 28 pages, 4 figures

  6. arXiv:2406.10193  [pdf

    cond-mat.str-el cond-mat.supr-con

    Three-dimensional quantum Griffiths singularity in bulk iron-pnictide superconductors

    Authors: Shao-Bo Liu, Congkuan Tian, Yongqing Cai, Hang Cui, Xinjian Wei, Mantang Chen, Yang Zhao, Yuan Sui, Shuyue Guan, Shuang Jia, Yu Zhang, Ya Feng, Jiankun Li, Jian Cui, Yuanjun Song, Tingting Hao, Chaoyu Chen, Jian-Hao Chen

    Abstract: The quantum Griffiths singularity (QGS) is a phenomenon driven by quenched disorders that break conventional scaling invariance and result in a divergent dynamical critical exponent during quantum phase transitions (QPT). While this phenomenon has been well-documented in low-dimensional conventional superconductors and in three-dimensional (3D) magnetic metal systems, its presence in 3D supercondu… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 17 pages, 4 figures

  7. arXiv:2406.04333  [pdf, other

    cs.CV

    BitsFusion: 1.99 bits Weight Quantization of Diffusion Model

    Authors: Yang Sui, Yanyu Li, Anil Kag, Yerlan Idelbayev, Junli Cao, Ju Hu, Dhritiman Sagar, Bo Yuan, Sergey Tulyakov, Jian Ren

    Abstract: Diffusion-based image generation models have achieved great success in recent years by showing the capability of synthesizing high-quality content. However, these models contain a huge number of parameters, resulting in a significantly large model size. Saving and transferring them is a major bottleneck for various applications, especially those running on resource-constrained devices. In this wor… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: Project Page: https://snap-research.github.io/BitsFusion

  8. arXiv:2406.03839  [pdf, other

    cs.SE

    PCART: Automated Repair of Python API Parameter Compatibility Issues

    Authors: Shuai Zhang, Guanping Xiao, Jun Wang, Huashan Lei, Yepang Liu, Yulei Sui, Zheng Zheng

    Abstract: In modern software development, Python third-party libraries have become crucial, particularly due to their widespread use in fields such as deep learning and scientific computing. However, the parameters of APIs in third-party libraries often change during evolution, causing compatibility issues for client applications that depend on specific versions. Due to Python's flexible parameter-passing m… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: Submitted to IEEE Transactions on Software Engineering

  9. arXiv:2406.00317  [pdf, other

    stat.ML cs.LG stat.ME

    Combining Experimental and Historical Data for Policy Evaluation

    Authors: Ting Li, Chengchun Shi, Qianglin Wen, Yang Sui, Yongli Qin, Chunbo Lai, Hongtu Zhu

    Abstract: This paper studies policy evaluation with multiple data sources, especially in scenarios that involve one experimental dataset with two arms, complemented by a historical dataset generated under a single control arm. We propose novel data integration methods that linearly integrate base policy value estimators constructed based on the experimental and historical data, with weights optimized to min… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  10. A possible spin Jahn-Teller material: ordered pseudobrookite FeTi2O5

    Authors: Hao-Hang Xu, Jian Liu, L. L. Tao, Xian-Jie Wang, Sergey V. Streltsov, Yu Sui

    Abstract: We investigated the spin-lattice coupling in orthorhombic pseudobrookite FeTi2O5 single crystal with highly ordered $ Fe^{2+} / Ti^{4+}$ occupation, which consists of quasi-1D S=2 chains running along a-axis. Both the magnetization and specific heat measurements confirm that the antiferromagnetic phase transition of FeTi2O5 occurs at TN = 42 K. The structural distortions were also observed around… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 20 pages, 7 figures

    Journal ref: Physical Review B, 109 (2024) 184430

  11. arXiv:2405.13873  [pdf, other

    cs.AI cs.CL

    FiDeLiS: Faithful Reasoning in Large Language Model for Knowledge Graph Question Answering

    Authors: Yuan Sui, Yufei He, Nian Liu, Xiaoxin He, Kun Wang, Bryan Hooi

    Abstract: While large language models (LLMs) have achieved significant success in various applications, they often struggle with hallucinations, especially in scenarios that require deep and responsible reasoning. These issues could be partially mitigate by integrating external knowledge graphs (KG) in LLM reasoning. However, the method of their incorporation is still largely unexplored. In this paper, we p… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  12. arXiv:2405.01242  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    TRAMBA: A Hybrid Transformer and Mamba Architecture for Practical Audio and Bone Conduction Speech Super Resolution and Enhancement on Mobile and Wearable Platforms

    Authors: Yueyuan Sui, Minghui Zhao, Junxi Xia, Xiaofan Jiang, Stephen Xia

    Abstract: We propose TRAMBA, a hybrid transformer and Mamba architecture for acoustic and bone conduction speech enhancement, suitable for mobile and wearable platforms. Bone conduction speech enhancement has been impractical to adopt in mobile and wearable platforms for several reasons: (i) data collection is labor-intensive, resulting in scarcity; (ii) there exists a performance gap between state of-art m… ▽ More

    Submitted 29 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

  13. arXiv:2404.17489  [pdf, other

    cs.LG cs.AI stat.ML

    Tabular Data Contrastive Learning via Class-Conditioned and Feature-Correlation Based Augmentation

    Authors: Wei Cui, Rasa Hosseinzadeh, Junwei Ma, Tongzi Wu, Yi Sui, Keyvan Golestan

    Abstract: Contrastive learning is a model pre-training technique by first creating similar views of the original data, and then encouraging the data and its corresponding views to be close in the embedding space. Contrastive learning has witnessed success in image and natural language data, thanks to the domain-specific augmentation techniques that are both intuitive and effective. Nonetheless, in tabular d… ▽ More

    Submitted 30 April, 2024; v1 submitted 26 April, 2024; originally announced April 2024.

    Comments: 14 pages, 4 algorithms, 3 figures, 5 tables

  14. arXiv:2404.17136  [pdf, other

    cs.DB cs.AI cs.CL

    Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

    Authors: Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin

    Abstract: The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently, many deep learning-based approaches have been developed for NL2Vis. Despite the considerable efforts made by these approaches, challenges persist in visualizing data sourced from un… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  15. arXiv:2404.15687  [pdf, other

    cs.SE cs.AI cs.CR

    Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

    Authors: Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

    Abstract: Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection, owing to their ability to capture the underlying semantic structure of source code. However, GNNs face significant challenges in explainability due to their inherently black-box natu… ▽ More

    Submitted 15 July, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

    Comments: This paper was accepted in the proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)

  16. arXiv:2404.15639  [pdf, other

    cs.CL

    CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

    Authors: Batu Guan, Yao Wan, Zhangqian Bi, Zheng Wang, Hongyu Zhang, Yulei Sui, Pan Zhou, Lichao Sun

    Abstract: As Large Language Models (LLMs) are increasingly used to automate code generation, it is often desired to know if the code is AI-generated and by which model, especially for purposes like protecting intellectual property (IP) in industry and preventing academic misconduct in education. Incorporating watermarks into machine-generated content is one way to provide code provenance, but existing solut… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: 13 pages, 7 figures

  17. arXiv:2404.15284  [pdf, other

    eess.SP cs.AI

    Global 4D Ionospheric STEC Prediction based on DeepONet for GNSS Rays

    Authors: Dijia Cai, Zenghui Shi, Haiyang Fu, Huan Liu, Hongyi Qian, Yun Sui, Feng Xu, Ya-Qiu Jin

    Abstract: The ionosphere is a vitally dynamic charged particle region in the Earth's upper atmosphere, playing a crucial role in applications such as radio communication and satellite navigation. The Slant Total Electron Contents (STEC) is an important parameter for characterizing wave propagation, representing the integrated electron density along the ray of radio signals passing through the ionosphere. Th… ▽ More

    Submitted 12 March, 2024; originally announced April 2024.

  18. arXiv:2404.14296  [pdf, other

    cs.SE cs.AI

    Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

    Authors: Yao Wan, Guanghua Wan, Shijie Zhang, Hongyu Zhang, Yulei Sui, Pan Zhou, Hai Jin, Lichao Sun

    Abstract: Recent years have witnessed significant progress in developing deep learning-based models for automated code completion. Although using source code in GitHub has been a common practice for training deep-learning-based models for code completion, it may induce some legal and ethical issues such as copyright infringement. In this paper, we investigate the legal and ethical issues of current neural c… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  19. arXiv:2404.03339  [pdf

    cond-mat.mtrl-sci

    Significantly Enhanced Vacancy Diffusion in Mn-containing Alloys

    Authors: Huaqing Guan, Hanwen Cui, Ning Ding, Kuo Yang, Siqi Jiang, Yanfei Sui, Yuanyuan Wang, Fuyang Tian, Zhe Li, Shuai Wang, Pengfei Zheng, Chenyang Lu, Qiu Xu, Levente Vitos, Shaosong Huang

    Abstract: Manipulating point defects for tailored macroscopic properties remains a formidable challenge in materials science. This study demonstrates a proof-of-principle for a universal law involving element Mn, significantly enhancing vacancy diffusion through an unprecedented anomalous Friedel Oscillations phenomenon, across most metals in the periodic table. The correlation between Mn-induced point-defe… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  20. Masked Multi-Domain Network: Multi-Type and Multi-Scenario Conversion Rate Prediction with a Single Model

    Authors: Wentao Ouyang, Xiuwu Zhang, Chaofeng Guo, Shukui Ren, Yupei Sui, Kun Zhang, Jinmei Luo, Yunfeng Chen, Dongbo Xu, Xiangzheng Liu, Yanlong Du

    Abstract: In real-world advertising systems, conversions have different types in nature and ads can be shown in different display scenarios, both of which highly impact the actual conversion rate (CVR). This results in the multi-type and multi-scenario CVR prediction problem. A desired model for this problem should satisfy the following requirements: 1) Accuracy: the model should achieve fine-grained accura… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: CIKM 2023 (larger figures)

  21. arXiv:2403.16792  [pdf, other

    cs.CL cs.SE

    Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback

    Authors: Zhangqian Bi, Yao Wan, Zheng Wang, Hongyu Zhang, Batu Guan, Fangxin Lu, Zili Zhang, Yulei Sui, Hai Jin, Xuanhua Shi

    Abstract: Large Language Models (LLMs) have shown remarkable progress in automated code generation. Yet, LLM-generated code may contain errors in API usage, class, data structure, or missing project-specific information. As much of this project-specific context cannot fit into the prompts of LLMs, we must find ways to allow the model to explore the project-level code context. We present CoCoGen, a new code… ▽ More

    Submitted 10 June, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  22. arXiv:2403.13093  [pdf, other

    cs.MA cs.RO

    Graph Neural Network-based Multi-agent Reinforcement Learning for Resilient Distributed Coordination of Multi-Robot Systems

    Authors: Anthony Goeckner, Yueyuan Sui, Nicolas Martinet, Xinliang Li, Qi Zhu

    Abstract: Existing multi-agent coordination techniques are often fragile and vulnerable to anomalies such as agent attrition and communication disturbances, which are quite common in the real-world deployment of systems like field robotics. To better prepare these systems for the real world, we present a graph neural network (GNN)-based multi-agent reinforcement learning (MARL) method for resilient distribu… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  23. arXiv:2402.14853  [pdf, other

    cs.CL cs.AI

    NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries

    Authors: Wei Zhao, Zhitao Hou, Siyuan Wu, Yan Gao, Haoyu Dong, Yao Wan, Hongyu Zhang, Yulei Sui, Haidong Zhang

    Abstract: Writing formulas on spreadsheets, such as Microsoft Excel and Google Sheets, is a widespread practice among users performing data analysis. However, crafting formulas on spreadsheets remains a tedious and error-prone task for many end-users, particularly when dealing with complex operations. To alleviate the burden associated with writing spreadsheet formulas, this paper introduces a novel benchma… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: To appear at EACL 2024

  24. arXiv:2402.05962  [pdf, other

    cs.LG

    EXGC: Bridging Efficiency and Explainability in Graph Condensation

    Authors: Junfeng Fang, Xinglin Li, Yongduo Sui, Yuan Gao, Guibin Zhang, Kun Wang, Xiang Wang, Xiangnan He

    Abstract: Graph representation learning on vast datasets, like web data, has made significant strides. However, the associated computational and storage overheads raise concerns. In sight of this, Graph condensation (GCond) has been introduced to distill these large real datasets into a more concise yet information-rich synthetic graph. Despite acceleration efforts, existing GCond methods mainly grapple wit… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  25. Dynamic Sparse Learning: A Novel Paradigm for Efficient Recommendation

    Authors: Shuyao Wang, Yongduo Sui, Jiancan Wu, Zhi Zheng, Hui Xiong

    Abstract: In the realm of deep learning-based recommendation systems, the increasing computational demands, driven by the growing number of users and items, pose a significant challenge to practical deployment. This challenge is primarily twofold: reducing the model size while effectively learning user and item representations for efficient recommendations. Despite considerable advancements in model compres… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 10 pages, 5 figures, 4 tables. Accecpted by WSDM 2024

  26. arXiv:2402.02739  [pdf, other

    cs.CR cs.CV cs.LG

    DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models

    Authors: Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan

    Abstract: In the exciting generative AI era, the diffusion model has emerged as a very powerful and widely adopted content generation and editing tool for various data modalities, making the study of their potential security risks very necessary and critical. Very recently, some pioneering works have shown the vulnerability of the diffusion model against backdoor attacks, calling for in-depth analysis and i… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  27. arXiv:2402.02025  [pdf, ps, other

    cs.LG cs.AI

    A Survey of Constraint Formulations in Safe Reinforcement Learning

    Authors: Akifumi Wachi, Xun Shen, Yanan Sui

    Abstract: Safety is critical when applying reinforcement learning (RL) to real-world problems. As a result, safe RL has emerged as a fundamental and powerful paradigm for optimizing an agent's policy while incorporating notions of safety. A prevalent safe RL approach is based on a constrained criterion, which seeks to maximize the expected cumulative reward subject to specific safety constraints. Despite re… ▽ More

    Submitted 7 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Accepted at IJCAI-24 survey track

  28. arXiv:2402.01242  [pdf, other

    cs.LG

    Two Heads Are Better Than One: Boosting Graph Sparse Training via Semantic and Topological Awareness

    Authors: Guibin Zhang, Yanwei Yue, Kun Wang, Junfeng Fang, Yongduo Sui, Kai Wang, Yuxuan Liang, Dawei Cheng, Shirui Pan, Tianlong Chen

    Abstract: Graph Neural Networks (GNNs) excel in various graph learning tasks but face computational challenges when applied to large-scale graphs. A promising solution is to remove non-essential edges to reduce the computational overheads in GNN. Previous literature generally falls into two categories: topology-guided and semantic-guided. The former maintains certain graph topological properties yet often u… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

  29. arXiv:2401.17618  [pdf, other

    cs.CR cs.OS

    Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

    Authors: Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Guoren Li, Wenbo Shen, Yulei Sui, Zhiyun Qian

    Abstract: The widespread deployment of control-flow integrity has propelled non-control data attacks into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control data, local attackers can directly gain root access or privilege escalation without hijacking the control flow. As a result, OS kernels have been restricting the availability of such non-control data. This forces att… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: 14 pages, in submission of the 31th ACM Conference on Computer and Communications Security (CCS), 2024

  30. arXiv:2401.13744  [pdf, other

    cs.LG cs.HC stat.ML

    Conformal Prediction Sets Improve Human Decision Making

    Authors: Jesse C. Cresswell, Yi Sui, Bhargava Kumar, Noël Vouitsis

    Abstract: In response to everyday queries, humans explicitly signal uncertainty and offer alternative answers when they are unsure. Machine learning models that output calibrated prediction sets through conformal prediction mimic this human behaviour; larger sets signal greater uncertainty while providing alternatives. In this work, we study the usefulness of conformal prediction sets as an aid for human de… ▽ More

    Submitted 9 June, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: Published at ICML 2024. Code available at https://github.com/layer6ai-labs/hitl-conformal-prediction

  31. arXiv:2401.10341  [pdf, other

    cs.CV cs.AI

    ELRT: Efficient Low-Rank Training for Compact Convolutional Neural Networks

    Authors: Yang Sui, Miao Yin, Yu Gong, Jinqi Xiao, Huy Phan, Bo Yuan

    Abstract: Low-rank compression, a popular model compression technique that produces compact convolutional neural networks (CNNs) with low rankness, has been well-studied in the literature. On the other hand, low-rank training, as an alternative way to train low-rank CNNs from scratch, has been exploited little yet. Unlike low-rank compression, low-rank training does not need pre-trained full-rank models, an… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  32. arXiv:2401.03115  [pdf, other

    cs.CV cs.MM eess.IV

    Transferable Learned Image Compression-Resistant Adversarial Perturbations

    Authors: Yang Sui, Zhuohang Li, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Zhenzhong Chen

    Abstract: Adversarial attacks can readily disrupt the image classification system, revealing the vulnerability of DNN-based recognition tasks. While existing adversarial perturbations are primarily applied to uncompressed images or compressed images by the traditional image compression method, i.e., JPEG, limited studies have investigated the robustness of models for image classification in the context of D… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: Accepted as poster at Data Compression Conference 2024 (DCC 2024)

  33. arXiv:2401.02737  [pdf, other

    cs.SE

    The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors

    Authors: Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Yulei Sui, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang

    Abstract: Vulnerability detection is a crucial component in the software development lifecycle. Existing vulnerability detectors, especially those based on deep learning (DL) models, have achieved high effectiveness. Despite their capability of detecting vulnerable code snippets from given code fragments, the detectors are typically unable to further locate the fine-grained information pertaining to the vul… ▽ More

    Submitted 21 February, 2024; v1 submitted 5 January, 2024; originally announced January 2024.

  34. arXiv:2401.02650  [pdf, other

    cs.LG stat.ML

    Improving sample efficiency of high dimensional Bayesian optimization with MCMC

    Authors: Zeji Yi, Yunyue Wei, Chu Xin Cheng, Kaibo He, Yanan Sui

    Abstract: Sequential optimization methods are often confronted with the curse of dimensionality in high-dimensional spaces. Current approaches under the Gaussian process framework are still burdened by the computational complexity of tracking Gaussian process posteriors and need to partition the optimization problem into small regions to ensure exploration or assume an underlying low-dimensional structure.… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

  35. arXiv:2401.01579  [pdf, other

    cs.LG cs.NE

    An Invariant Information Geometric Method for High-Dimensional Online Optimization

    Authors: Zhengfei Zhang, Yunyue Wei, Yanan Sui

    Abstract: Sample efficiency is crucial in optimization, particularly in black-box scenarios characterized by expensive evaluations and zeroth-order feedback. When computing resources are plentiful, Bayesian optimization is often favored over evolution strategies. In this paper, we introduce a full invariance oriented evolution strategies algorithm, derived from its corresponding framework, that effectively… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  36. arXiv:2401.00288  [pdf, other

    cs.SE cs.AI

    Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit

    Authors: Yao Wan, Yang He, Zhangqian Bi, Jianguo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu

    Abstract: Code intelligence leverages machine learning techniques to extract knowledge from extensive code corpora, with the aim of developing intelligent tools to improve the quality and productivity of computer programming. Currently, there is already a thriving research community focusing on code intelligence, with efforts ranging from software engineering, machine learning, data mining, natural language… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

  37. arXiv:2312.10343  [pdf, other

    eess.SP cs.AR cs.LG cs.NE

    In-Sensor Radio Frequency Computing for Energy-Efficient Intelligent Radar

    Authors: Yang Sui, Minning Zhu, Lingyi Huang, Chung-Tse Michael Wu, Bo Yuan

    Abstract: Radio Frequency Neural Networks (RFNNs) have demonstrated advantages in realizing intelligent applications across various domains. However, as the model size of deep neural networks rapidly increases, implementing large-scale RFNN in practice requires an extensive number of RF interferometers and consumes a substantial amount of energy. To address this challenge, we propose to utilize low-rank dec… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  38. arXiv:2312.09039  [pdf, other

    cs.CL cs.AI

    TAP4LLM: Table Provider on Sampling, Augmenting, and Packing Semi-structured Data for Large Language Model Reasoning

    Authors: Yuan Sui, Jiaru Zou, Mengyu Zhou, Xinyi He, Lun Du, Shi Han, Dongmei Zhang

    Abstract: Table-based reasoning has shown remarkable progress in combining deep models with discrete reasoning, which requires reasoning over both free-form natural language (NL) questions and semi-structured tabular data. However, previous table reasoning solutions only consider small-sized tables and exhibit limitations in handling larger tables. In addition, most existing methods struggle to reason over… ▽ More

    Submitted 17 February, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

  39. arXiv:2312.05473  [pdf, other

    cs.AI

    Self Model for Embodied Intelligence: Modeling Full-Body Human Musculoskeletal System and Locomotion Control with Hierarchical Low-Dimensional Representation

    Authors: Chenhui Zuo, Kaibo He, Jing Shao, Yanan Sui

    Abstract: Modeling and control of the human musculoskeletal system is important for understanding human motor functions, developing embodied intelligence, and optimizing human-robot interaction systems. However, current human musculoskeletal models are restricted to a limited range of body parts and often with a reduced number of muscles. There is also a lack of algorithms capable of controlling over 600 mu… ▽ More

    Submitted 25 May, 2024; v1 submitted 9 December, 2023; originally announced December 2023.

    Comments: ICRA 2024

  40. arXiv:2311.18103  [pdf, other

    eess.IV cs.CV

    Corner-to-Center Long-range Context Model for Efficient Learned Image Compression

    Authors: Yang Sui, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Bo Yuan, Zhenzhong Chen

    Abstract: In the framework of learned image compression, the context model plays a pivotal role in capturing the dependencies among latent representations. To reduce the decoding time resulting from the serial autoregressive context model, the parallel context model has been proposed as an alternative that necessitates only two passes during the decoding phase, thus facilitating efficient image compression… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

  41. arXiv:2311.00447  [pdf, other

    cs.AI

    On the Opportunities of Green Computing: A Survey

    Authors: You Zhou, Xiujing Lin, Xiang Zhang, Maolin Wang, Gangwei Jiang, Huakang Lu, Yupeng Wu, Kai Zhang, Zhe Yang, Kehang Wang, Yongduo Sui, Fengwei Jia, Zuoli Tang, Yao Zhao, Hongxuan Zhang, Tiannuo Yang, Weibo Chen, Yunong Mao, Yi Li, De Bao, Yu Li, Hongrui Liao, Ting Liu, Jingwen Liu, Jinchi Guo , et al. (16 additional authors not shown)

    Abstract: Artificial Intelligence (AI) has achieved significant advancements in technology and research with the development over several decades, and is widely used in many areas including computing vision, natural language processing, time-series analysis, speech synthesis, etc. During the age of deep learning, especially with the arise of Large Language Models, a large majority of researchers' attention… ▽ More

    Submitted 8 November, 2023; v1 submitted 1 November, 2023; originally announced November 2023.

    Comments: 113 pages, 18 figures

  42. arXiv:2310.17124  [pdf, other

    math.ST

    Implicit Regularization in Over-Parameterized Support Vector Machine

    Authors: Yang Sui, Xin He, Yang Bai

    Abstract: In this paper, we design a regularization-free algorithm for high-dimensional support vector machines (SVMs) by integrating over-parameterization with Nesterov's smoothing method, and provide theoretical guarantees for the induced implicit regularization phenomenon. In particular, we construct an over-parameterized hinge loss function and estimate the true parameters by leveraging regularization-f… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  43. arXiv:2310.09122  [pdf

    cs.CV

    Equirectangular image construction method for standard CNNs for Semantic Segmentation

    Authors: Haoqian Chen, Jian Liu, Minghe Li, Kaiwen Jiang, Ziheng Xu, Rencheng Sun, Yi Sui

    Abstract: 360° spherical images have advantages of wide view field, and are typically projected on a planar plane for processing, which is known as equirectangular image. The object shape in equirectangular images can be distorted and lack translation invariance. In addition, there are few publicly dataset of equirectangular images with labels, which presents a challenge for standard CNNs models to process… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  44. arXiv:2310.07756  [pdf, other

    cs.LG

    Self-supervised Representation Learning From Random Data Projectors

    Authors: Yi Sui, Tongzi Wu, Jesse C. Cresswell, Ga Wu, George Stein, Xiao Shi Huang, Xiaochen Zhang, Maksims Volkovs

    Abstract: Self-supervised representation learning~(SSRL) has advanced considerably by exploiting the transformation invariance assumption under artificially designed data augmentations. While augmentation-based SSRL algorithms push the boundaries of performance in computer vision and natural language processing, they are often not directly applicable to other data modalities, and can conflict with applicati… ▽ More

    Submitted 20 March, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

    Comments: Published as a conference paper of ICLR 2024. https://openreview.net/pdf?id=EpYnZpDpsQ

  45. Effect of Attention and Self-Supervised Speech Embeddings on Non-Semantic Speech Tasks

    Authors: Payal Mohapatra, Akash Pandey, Yueyuan Sui, Qi Zhu

    Abstract: Human emotion understanding is pivotal in making conversational technology mainstream. We view speech emotion understanding as a perception task which is a more realistic setting. With varying contexts (languages, demographics, etc.) different share of people perceive the same speech segment as a non-unanimous emotion. As part of the ACM Multimedia 2023 Computational Paralinguistics ChallengE (Com… ▽ More

    Submitted 27 September, 2023; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: Accepted to appear at ACM Multimedia 2023 Multimedia Grand Challenges Track

  46. arXiv:2306.04675  [pdf, other

    cs.LG cs.CV stat.ML

    Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models

    Authors: George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem

    Abstract: We systematically study a wide variety of generative models spanning semantically-diverse image datasets to understand and improve the feature extractors and metrics used to evaluate them. Using best practices in psychophysics, we measure human perception of image realism for generated samples by conducting the largest experiment evaluating generative models to date, and find that no existing metr… ▽ More

    Submitted 30 October, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: NeurIPS 2023. 53 pages, 29 figures, 12 tables. Code at https://github.com/layer6ai-labs/dgm-eval, reviews at https://openreview.net/forum?id=08zf7kTOoh

    Journal ref: Thirty-seventh Conference on Neural Information Processing Systems (2023)

  47. arXiv:2306.01125  [pdf, other

    cs.CV cs.AI

    Reconstruction Distortion of Learned Image Compression with Imperceptible Perturbations

    Authors: Yang Sui, Zhuohang Li, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Zhenzhong Chen

    Abstract: Learned Image Compression (LIC) has recently become the trending technique for image transmission due to its notable performance. Despite its popularity, the robustness of LIC with respect to the quality of image reconstruction remains under-explored. In this paper, we introduce an imperceptible attack approach designed to effectively degrade the reconstruction quality of LIC, resulting in the rec… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 7 pages

  48. arXiv:2305.13062  [pdf, other

    cs.CL cs.AI cs.IR

    Table Meets LLM: Can Large Language Models Understand Structured Table Data? A Benchmark and Empirical Study

    Authors: Yuan Sui, Mengyu Zhou, Mingjie Zhou, Shi Han, Dongmei Zhang

    Abstract: Large language models (LLMs) are becoming attractive as few-shot reasoners to solve Natural Language (NL)-related tasks. However, the understanding of their capability to process structured data like tables remains an under-explored area. While tables can be serialized as input for LLMs, there is a lack of comprehensive studies on whether LLMs genuinely comprehend this data. In this paper, we try… ▽ More

    Submitted 17 July, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: This paper has been accepted as a full paper at WSDM 2024. Explore the MS research blog of our work at https://www.microsoft.com/en-us/research/blog/improving-llm-understanding-of-structured-data-and-exploring-advanced-prompting-methods/

  49. Adaptive Learning based Upper-Limb Rehabilitation Training System with Collaborative Robot

    Authors: Jun Hong Lim, Kaibo He, Zeji Yi, Chen Hou, Chen Zhang, Yanan Sui, Luming Li

    Abstract: Rehabilitation training for patients with motor disabilities usually requires specialized devices in rehabilitation centers. Home-based multi-purpose training would significantly increase treatment accessibility and reduce medical costs. While it is unlikely to equip a set of rehabilitation robots at home, we investigate the feasibility to use the general-purpose collaborative robot for rehabilita… ▽ More

    Submitted 12 July, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Journal ref: EMBC2023

  50. arXiv:2305.05949  [pdf, other

    cs.SE

    Scalable and Precise Application-Centered Call Graph Construction for Python

    Authors: Kaifeng Huang, Yixuan Yan, Bihuan Chen, Zixin Tao, Yulei Sui, Xin Peng

    Abstract: Call graph construction is the foundation of inter-procedural static analysis. PYCG is the state-of-the-art approach for constructing call graphs for Python programs. Unfortunately, PyCG does not scale to large programs when adapted to whole-program analysis where application and dependent libraries are both analyzed. Moreover, PyCG is flow-insensitive and does not fully support Python's features,… ▽ More

    Submitted 25 March, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: 13 pages