Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 455 results for author: Gong, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10082  [pdf, other

    eess.AS cs.CV cs.SD

    Whisper-Flamingo: Integrating Visual Features into Whisper for Audio-Visual Speech Recognition and Translation

    Authors: Andrew Rouditchenko, Yuan Gong, Samuel Thomas, Leonid Karlinsky, Hilde Kuehne, Rogerio Feris, James Glass

    Abstract: Audio-Visual Speech Recognition (AVSR) uses lip-based video to improve performance in noise. Since videos are harder to obtain than audio, the video training data of AVSR models is usually limited to a few thousand hours. In contrast, speech models such as Whisper are trained with hundreds of thousands of hours of data, and thus learn a better speech-to-text decoder. The huge training data differe… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Interspeech 2024. Code https://github.com/roudimit/whisper-flamingo

  2. arXiv:2406.09710  [pdf, other

    cs.CV cs.AI

    Fine-Grained Urban Flow Inference with Multi-scale Representation Learning

    Authors: Shilu Yuan, Dongfeng Li, Wei Liu, Xinxin Zhang, Meng Chen, Junjie Zhang, Yongshun Gong

    Abstract: Fine-grained urban flow inference (FUFI) is a crucial transportation service aimed at improving traffic efficiency and safety. FUFI can infer fine-grained urban traffic flows based solely on observed coarse-grained data. However, most of existing methods focus on the influence of single-scale static geographic information on FUFI, neglecting the interactions and dynamic information between differe… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  3. arXiv:2406.09321  [pdf, other

    cs.CR cs.AI cs.CL

    JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models

    Authors: Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang

    Abstract: Jailbreak attacks aim to induce Large Language Models (LLMs) to generate harmful responses for forbidden instructions, presenting severe misuse threats to LLMs. Up to now, research into jailbreak attacks and defenses is emerging, however, there is (surprisingly) no consensus on how to evaluate whether a jailbreak attempt is successful. In other words, the methods to assess the harmfulness of an LL… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Our code is available at https://github.com/ThuCCSLab/JailbreakEval

  4. arXiv:2406.06558  [pdf, other

    cs.CL cs.AI

    Enhancing Text Authenticity: A Novel Hybrid Approach for AI-Generated Text Detection

    Authors: Ye Zhang, Qian Leng, Mengran Zhu, Rui Ding, Yue Wu, Jintong Song, Yulu Gong

    Abstract: The rapid advancement of Large Language Models (LLMs) has ushered in an era where AI-generated text is increasingly indistinguishable from human-generated content. Detecting AI-generated text has become imperative to combat misinformation, ensure content authenticity, and safeguard against malicious uses of AI. In this paper, we propose a novel hybrid approach that combines traditional TF-IDF tech… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  5. arXiv:2406.06007  [pdf, other

    cs.LG cs.CL cs.CV cs.CY

    CARES: A Comprehensive Benchmark of Trustworthiness in Medical Vision Language Models

    Authors: Peng Xia, Ze Chen, Juanxi Tian, Yangrui Gong, Ruibo Hou, Yue Xu, Zhenbang Wu, Zhiyuan Fan, Yiyang Zhou, Kangyu Zhu, Wenhao Zheng, Zhaoyang Wang, Xiao Wang, Xuchao Zhang, Chetan Bansal, Marc Niethammer, Junzhou Huang, Hongtu Zhu, Yun Li, Jimeng Sun, Zongyuan Ge, Gang Li, James Zou, Huaxiu Yao

    Abstract: Artificial intelligence has significantly impacted medical applications, particularly with the advent of Medical Large Vision Language Models (Med-LVLMs), sparking optimism for the future of automated and personalized healthcare. However, the trustworthiness of Med-LVLMs remains unverified, posing significant risks for future model deployment. In this paper, we introduce CARES and aim to comprehen… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  6. arXiv:2405.21045  [pdf

    cs.LG

    An Attention-Based Multi-Context Convolutional Encoder-Decoder Neural Network for Work Zone Traffic Impact Prediction

    Authors: Qinhua Jiang, Xishun Liao, Yaofa Gong, Jiaqi Ma

    Abstract: Work zone is one of the major causes of non-recurrent traffic congestion and road incidents. Despite the significance of its impact, studies on predicting the traffic impact of work zones remain scarce. In this paper, we propose a data integration pipeline that enhances the utilization of work zone and traffic data from diversified platforms, and introduce a novel deep learning model to predict th… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  7. arXiv:2405.20234  [pdf, other

    cs.AI

    Context Injection Attacks on Large Language Models

    Authors: Cheng'an Wei, Kai Chen, Yue Zhao, Yujia Gong, Lu Xiang, Shenchen Zhu

    Abstract: Large Language Models (LLMs) such as ChatGPT and Llama-2 have become prevalent in real-world applications, exhibiting impressive text generation performance. LLMs are fundamentally developed from a scenario where the input data remains static and lacks a clear structure. To behave interactively over time, LLM-based chat systems must integrate additional contextual information (i.e., chat history)… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  8. arXiv:2405.19943  [pdf, other

    cs.CV

    Multi-View People Detection in Large Scenes via Supervised View-Wise Contribution Weighting

    Authors: Qi Zhang, Yunfei Gong, Daijie Chen, Antoni B. Chan, Hui Huang

    Abstract: Recent deep learning-based multi-view people detection (MVD) methods have shown promising results on existing datasets. However, current methods are mainly trained and evaluated on small, single scenes with a limited number of multi-view frames and fixed camera views. As a result, these methods may not be practical for detecting people in larger, more complex scenes with severe occlusions and came… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: AAAI 2024

  9. arXiv:2405.16093  [pdf, other

    cs.CV

    Diverse Teacher-Students for Deep Safe Semi-Supervised Learning under Class Mismatch

    Authors: Qikai Wang, Rundong He, Yongshun Gong, Chunxiao Ren, Haoliang Sun, Xiaoshui Huang, Yilong Yin

    Abstract: Semi-supervised learning can significantly boost model performance by leveraging unlabeled data, particularly when labeled data is scarce. However, real-world unlabeled data often contain unseen-class samples, which can hinder the classification of seen classes. To address this issue, mainstream safe SSL methods suggest detecting and discarding unseen-class samples from unlabeled data. Nevertheles… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  10. MS MARCO Web Search: a Large-scale Information-rich Web Dataset with Millions of Real Click Labels

    Authors: Qi Chen, Xiubo Geng, Corby Rosset, Carolyn Buractaon, Jingwen Lu, Tao Shen, Kun Zhou, Chenyan Xiong, Yeyun Gong, Paul Bennett, Nick Craswell, Xing Xie, Fan Yang, Bryan Tower, Nikhil Rao, Anlei Dong, Wenqi Jiang, Zheng Liu, Mingqin Li, Chuanjie Liu, Zengzhong Li, Rangan Majumder, Jennifer Neville, Andy Oakley, Knut Magne Risvik , et al. (6 additional authors not shown)

    Abstract: Recent breakthroughs in large models have highlighted the critical significance of data scale, labels and modals. In this paper, we introduce MS MARCO Web Search, the first large-scale information-rich web dataset, featuring millions of real clicked query-document labels. This dataset closely mimics real-world web document and query distribution, provides rich information for various kinds of down… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 10 pages, 6 figures, for associated dataset, see http://github.com/microsoft/MS-MARCO-Web-Search

  11. arXiv:2405.07022  [pdf, other

    cs.LG cs.DB

    DTMamba : Dual Twin Mamba for Time Series Forecasting

    Authors: Zexue Wu, Yifeng Gong, Aoqian Zhang

    Abstract: We utilized the Mamba model for time series data prediction tasks, and the experimental results indicate that our model performs well.

    Submitted 11 May, 2024; originally announced May 2024.

  12. arXiv:2405.06389  [pdf, other

    cs.CV cs.AI

    Continual Novel Class Discovery via Feature Enhancement and Adaptation

    Authors: Yifan Yu, Shaokun Wang, Yuhang He, Junzhe Chen, Yihong Gong

    Abstract: Continual Novel Class Discovery (CNCD) aims to continually discover novel classes without labels while maintaining the recognition capability for previously learned classes. The main challenges faced by CNCD include the feature-discrepancy problem, the inter-session confusion problem, etc. In this paper, we propose a novel Feature Enhancement and Adaptation method for the CNCD to tackle the above… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  13. arXiv:2405.05446  [pdf, other

    cs.CV cs.AI cs.GR cs.LG eess.IV

    GDGS: Gradient Domain Gaussian Splatting for Sparse Representation of Radiance Fields

    Authors: Yuanhao Gong

    Abstract: The 3D Gaussian splatting methods are getting popular. However, they work directly on the signal, leading to a dense representation of the signal. Even with some techniques such as pruning or distillation, the results are still dense. In this paper, we propose to model the gradient of the original signal. The gradients are much sparser than the original signal. Therefore, the gradients use much le… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2404.09105

  14. How to Gain Commit Rights in Modern Top Open Source Communities?

    Authors: Xin Tan, Yan Gong, Geyu Huang, Haohua Wu, Li Zhang

    Abstract: The success of open source software (OSS) projects relies on voluntary contributions from various community roles.Being a committer signifies gaining trust and higher privileges. Substantial studies have focused on the requirements of becoming a committer, but most of them are based on interviews or several hypotheses, lacking a comprehensive understanding of committers' qualifications.We explore… ▽ More

    Submitted 16 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: 23 pages,5 figures,FSE 2024

    Journal ref: Proceedings of the ACM on Software Engineering (PACMSE) Issue FSE 2024

  15. arXiv:2405.00026  [pdf

    cs.CE cs.AI

    Enhancing Credit Card Fraud Detection A Neural Network and SMOTE Integrated Approach

    Authors: Mengran Zhu, Ye Zhang, Yulu Gong, Changxin Xu, Yafei Xiang

    Abstract: Credit card fraud detection is a critical challenge in the financial sector, demanding sophisticated approaches to accurately identify fraudulent transactions. This research proposes an innovative methodology combining Neural Networks (NN) and Synthet ic Minority Over-sampling Technique (SMOTE) to enhance the detection performance. The study addresses the inherent imbalance in credit card transact… ▽ More

    Submitted 26 February, 2024; originally announced May 2024.

  16. arXiv:2404.19087  [pdf, other

    cs.RO cs.AI cs.LG eess.SY

    Deep Reinforcement Learning for Advanced Longitudinal Control and Collision Avoidance in High-Risk Driving Scenarios

    Authors: Dianwei Chen, Yaobang Gong, Xianfeng Yang

    Abstract: Existing Advanced Driver Assistance Systems primarily focus on the vehicle directly ahead, often overlooking potential risks from following vehicles. This oversight can lead to ineffective handling of high risk situations, such as high speed, closely spaced, multi vehicle scenarios where emergency braking by one vehicle might trigger a pile up collision. To overcome these limitations, this study i… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  17. arXiv:2404.18419  [pdf

    cs.CV cs.AI

    Research on Intelligent Aided Diagnosis System of Medical Image Based on Computer Deep Learning

    Authors: Jiajie Yuan, Linxiao Wu, Yulu Gong, Zhou Yu, Ziang Liu, Shuyao He

    Abstract: This paper combines Struts and Hibernate two architectures together, using DAO (Data Access Object) to store and access data. Then a set of dual-mode humidity medical image library suitable for deep network is established, and a dual-mode medical image assisted diagnosis method based on the image is proposed. Through the test of various feature extraction methods, the optimal operating characteris… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  18. arXiv:2404.14678  [pdf, other

    cs.CV

    3DBench: A Scalable 3D Benchmark and Instruction-Tuning Dataset

    Authors: Junjie Zhang, Tianci Hu, Xiaoshui Huang, Yongshun Gong, Dan Zeng

    Abstract: Evaluating the performance of Multi-modal Large Language Models (MLLMs), integrating both point cloud and language, presents significant challenges. The lack of a comprehensive assessment hampers determining whether these models truly represent advancements, thereby impeding further progress in the field. Current evaluations heavily rely on classification and caption tasks, falling short in provid… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  19. arXiv:2404.13576  [pdf, other

    cs.CV cs.LG

    I2CANSAY:Inter-Class Analogical Augmentation and Intra-Class Significance Analysis for Non-Exemplar Online Task-Free Continual Learning

    Authors: Songlin Dong, Yingjie Chen, Yuhang He, Yuhan Jin, Alex C. Kot, Yihong Gong

    Abstract: Online task-free continual learning (OTFCL) is a more challenging variant of continual learning which emphasizes the gradual shift of task boundaries and learns in an online mode. Existing methods rely on a memory buffer composed of old samples to prevent forgetting. However,the use of memory buffers not only raises privacy concerns but also hinders the efficient learning of new samples. To addres… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

  20. arXiv:2404.09155  [pdf, other

    cs.LG cs.AI cs.CL

    Mitigating Heterogeneity among Factor Tensors via Lie Group Manifolds for Tensor Decomposition Based Temporal Knowledge Graph Embedding

    Authors: Jiang Li, Xiangdong Su, Yeyun Gong, Guanglai Gao

    Abstract: Recent studies have highlighted the effectiveness of tensor decomposition methods in the Temporal Knowledge Graphs Embedding (TKGE) task. However, we found that inherent heterogeneity among factor tensors in tensor decomposition significantly hinders the tensor fusion process and further limits the performance of link prediction. To overcome this limitation, we introduce a novel method that maps f… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  21. arXiv:2404.09105  [pdf, other

    cs.CV cs.AI cs.GR eess.IV

    EGGS: Edge Guided Gaussian Splatting for Radiance Fields

    Authors: Yuanhao Gong

    Abstract: The Gaussian splatting methods are getting popular. However, their loss function only contains the $\ell_1$ norm and the structural similarity between the rendered and input images, without considering the edges in these images. It is well-known that the edges in an image provide important information. Therefore, in this paper, we propose an Edge Guided Gaussian Splatting (EGGS) method that levera… ▽ More

    Submitted 22 April, 2024; v1 submitted 13 April, 2024; originally announced April 2024.

  22. arXiv:2404.08242  [pdf, other

    cs.NE cs.AI

    RLEMMO: Evolutionary Multimodal Optimization Assisted By Deep Reinforcement Learning

    Authors: Hongqiao Lian, Zeyuan Ma, Hongshu Guo, Ting Huang, Yue-Jiao Gong

    Abstract: Solving multimodal optimization problems (MMOP) requires finding all optimal solutions, which is challenging in limited function evaluations. Although existing works strike the balance of exploration and exploitation through hand-crafted adaptive strategies, they require certain expert knowledge, hence inflexible to deal with MMOP with different properties. In this paper, we propose RLEMMO, a Meta… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted as full paper at GECCO 2024

  23. arXiv:2404.08239  [pdf, other

    cs.NE cs.AI

    Auto-configuring Exploration-Exploitation Tradeoff in Evolutionary Computation via Deep Reinforcement Learning

    Authors: Zeyuan Ma, Jiacheng Chen, Hongshu Guo, Yining Ma, Yue-Jiao Gong

    Abstract: Evolutionary computation (EC) algorithms, renowned as powerful black-box optimizers, leverage a group of individuals to cooperatively search for the optimum. The exploration-exploitation tradeoff (EET) plays a crucial role in EC, which, however, has traditionally been governed by manually designed rules. In this paper, we propose a deep reinforcement learning-based framework that autonomously conf… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted as a full paper at GECCO 2024

  24. arXiv:2404.07965  [pdf, other

    cs.CL cs.AI

    Rho-1: Not All Tokens Are What You Need

    Authors: Zhenghao Lin, Zhibin Gou, Yeyun Gong, Xiao Liu, Yelong Shen, Ruochen Xu, Chen Lin, Yujiu Yang, Jian Jiao, Nan Duan, Weizhu Chen

    Abstract: Previous language model pre-training methods have uniformly applied a next-token prediction loss to all training tokens. Challenging this norm, we posit that ''Not all tokens in a corpus are equally important for language model training''. Our initial analysis examines token-level training dynamics of language model, revealing distinct loss patterns for different tokens. Leveraging these insights,… ▽ More

    Submitted 23 May, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

    Comments: First two authors equal contribution

  25. arXiv:2404.07121  [pdf, other

    cs.IT eess.SP

    Digital Over-the-Air Computation: Achieving High Reliability via Bit-Slicing

    Authors: Jiawei Liu, Yi Gong, Kaibin Huang

    Abstract: 6G mobile networks aim to realize ubiquitous intelligence at the network edge via distributed learning, sensing, and data analytics. Their common operation is to aggregate high-dimensional data, which causes a communication bottleneck that cannot be resolved using traditional orthogonal multi-access schemes. A promising solution, called over-the-air computation (AirComp), exploits channels' wavefo… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  26. arXiv:2404.05236  [pdf, other

    cs.CV cs.GR

    Stylizing Sparse-View 3D Scenes with Hierarchical Neural Representation

    Authors: Y. Wang, A. Gao, Y. Gong, Y. Zeng

    Abstract: Recently, a surge of 3D style transfer methods has been proposed that leverage the scene reconstruction power of a pre-trained neural radiance field (NeRF). To successfully stylize a scene this way, one must first reconstruct a photo-realistic radiance field from collected images of the scene. However, when only sparse input views are available, pre-trained few-shot NeRFs often suffer from high-fr… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  27. arXiv:2404.05188  [pdf, other

    cs.CR cs.AI cs.CL

    Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging

    Authors: Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang

    Abstract: Model merging is a promising lightweight model empowerment technique that does not rely on expensive computing devices (e.g., GPUs) or require the collection of specific training data. Instead, it involves editing different upstream model parameters to absorb their downstream task capabilities. However, uncertified model merging can infringe upon the Intellectual Property (IP) rights of the origin… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

    Comments: Technical Report

  28. arXiv:2404.04118  [pdf, other

    cs.LG cs.DC

    GNNBENCH: Fair and Productive Benchmarking for Single-GPU GNN System

    Authors: Yidong Gong, Pradeep Kumar

    Abstract: We hypothesize that the absence of a standardized benchmark has allowed several fundamental pitfalls in GNN System design and evaluation that the community has overlooked. In this work, we propose GNNBench, a plug-and-play benchmarking platform focused on system innovation. GNNBench presents a new protocol to exchange their captive tensor data, supports custom classes in System APIs, and allows au… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

  29. arXiv:2404.01067  [pdf, other

    cs.CL

    Exploring the Mystery of Influential Data for Mathematical Reasoning

    Authors: Xinzhe Ni, Yeyun Gong, Zhibin Gou, Yelong Shen, Yujiu Yang, Nan Duan, Weizhu Chen

    Abstract: Selecting influential data for fine-tuning on downstream tasks is a key factor for both performance and computation efficiency. Recent works have shown that training with only limited data can show a superior performance on general tasks. However, the feasibility on mathematical reasoning tasks has not been validated. To go further, there exist two open questions for mathematical reasoning: how to… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  30. arXiv:2404.00323  [pdf, other

    cs.CV cs.LG

    CLIP-driven Outliers Synthesis for few-shot OOD detection

    Authors: Hao Sun, Rundong He, Zhongyi Han, Zhicong Lin, Yongshun Gong, Yilong Yin

    Abstract: Few-shot OOD detection focuses on recognizing out-of-distribution (OOD) images that belong to classes unseen during training, with the use of only a small number of labeled in-distribution (ID) images. Up to now, a mainstream strategy is based on large-scale vision-language models, such as CLIP. However, these methods overlook a crucial issue: the lack of reliable OOD supervision information, whic… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

    Comments: 9 pages,5 figures

  31. arXiv:2403.18201  [pdf, other

    cs.CV

    Few-shot Online Anomaly Detection and Segmentation

    Authors: Shenxing Wei, Xing Wei, Zhiheng Ma, Songlin Dong, Shaochen Zhang, Yihong Gong

    Abstract: Detecting anomaly patterns from images is a crucial artificial intelligence technique in industrial applications. Recent research in this domain has emphasized the necessity of a large volume of training data, overlooking the practical scenario where, post-deployment of the model, unlabeled data containing both normal and abnormal samples can be utilized to enhance the model's performance. Consequ… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  32. arXiv:2403.17549  [pdf

    cs.AI cs.CV

    Practical Applications of Advanced Cloud Services and Generative AI Systems in Medical Image Analysis

    Authors: Jingyu Xu, Binbin Wu, Jiaxin Huang, Yulu Gong, Yifan Zhang, Bo Liu

    Abstract: The medical field is one of the important fields in the application of artificial intelligence technology. With the explosive growth and diversification of medical data, as well as the continuous improvement of medical needs and challenges, artificial intelligence technology is playing an increasingly important role in the medical field. Artificial intelligence technologies represented by computer… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  33. arXiv:2403.16443  [pdf, other

    cs.CL cs.AI cs.SE

    CodeS: Natural Language to Code Repository via Multi-Layer Sketch

    Authors: Daoguang Zan, Ailun Yu, Wei Liu, Dong Chen, Bo Shen, Wei Li, Yafen Yao, Yongshun Gong, Xiaolin Chen, Bei Guan, Zhiguang Yang, Yongji Wang, Qianxiang Wang, Lizhen Cui

    Abstract: The impressive performance of large language models (LLMs) on code-related tasks has shown the potential of fully automated software development. In light of this, we introduce a new software engineering task, namely Natural Language to code Repository (NL2Repo). This task aims to generate an entire code repository from its natural language requirements. To address this task, we propose a simple y… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: https://github.com/NL2Code/CodeS

  34. arXiv:2403.16212  [pdf, other

    eess.IV cs.CV cs.LG

    Leveraging Deep Learning and Xception Architecture for High-Accuracy MRI Classification in Alzheimer Diagnosis

    Authors: Shaojie Li, Haichen Qu, Xinqi Dong, Bo Dang, Hengyi Zang, Yulu Gong

    Abstract: Exploring the application of deep learning technologies in the field of medical diagnostics, Magnetic Resonance Imaging (MRI) provides a unique perspective for observing and diagnosing complex neurodegenerative diseases such as Alzheimer Disease (AD). With advancements in deep learning, particularly in Convolutional Neural Networks (CNNs) and the Xception network architecture, we are now able to a… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  35. arXiv:2403.14775  [pdf, ps, other

    cs.IT eess.SP

    RIS-Aided Cooperative Mobile Edge Computing: Computation Efficiency Maximization via Joint Uplink and Downlink Resource Allocation

    Authors: Zhenrong Liu, Zongze Li, Yi Gong, Yik-Chung Wu

    Abstract: In mobile edge computing (MEC) systems, the wireless channel condition is a critical factor affecting both the communication power consumption and computation rate of the offloading tasks. This paper exploits the idea of cooperative transmission and employing reconfigurable intelligent surface (RIS) in MEC to improve the channel condition and maximize computation efficiency (CE). The resulting pro… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: This paper has been accepted for publication in IEEE Transactions on Wireless Communications

  36. arXiv:2403.14483  [pdf, other

    cs.LG cs.AI q-fin.ST

    Utilizing the LightGBM Algorithm for Operator User Credit Assessment Research

    Authors: Shaojie Li, Xinqi Dong, Danqing Ma, Bo Dang, Hengyi Zang, Yulu Gong

    Abstract: Mobile Internet user credit assessment is an important way for communication operators to establish decisions and formulate measures, and it is also a guarantee for operators to obtain expected benefits. However, credit evaluation methods have long been monopolized by financial industries such as banks and credit. As supporters and providers of platform network technology and network resources, co… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  37. arXiv:2403.14244  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Isotropic Gaussian Splatting for Real-Time Radiance Field Rendering

    Authors: Yuanhao Gong, Lantao Yu, Guanghui Yue

    Abstract: The 3D Gaussian splatting method has drawn a lot of attention, thanks to its high performance in training and high quality of the rendered image. However, it uses anisotropic Gaussian kernels to represent the scene. Although such anisotropic kernels have advantages in representing the geometry, they lead to difficulties in terms of computation, such as splitting or merging two kernels. In this pap… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  38. arXiv:2403.13619  [pdf

    cs.DC cs.AI

    Dynamic Resource Allocation for Virtual Machine Migration Optimization using Machine Learning

    Authors: Yulu Gong, Jiaxin Huang, Bo Liu, Jingyu Xu, Binbin Wu, Yifan Zhang

    Abstract: The paragraph is grammatically correct and logically coherent. It discusses the importance of mobile terminal cloud computing migration technology in meeting the demands of evolving computer and cloud computing technologies. It emphasizes the need for efficient data access and storage, as well as the utilization of cloud computing migration technology to prevent additional time delays. The paragra… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

  39. arXiv:2403.12343  [pdf, other

    cs.HC

    Glanceable Data Visualizations for Older Adults: Establishing Thresholds and Examining Disparities Between Age Groups

    Authors: Zack While, Tanja Blascheck, Yujie Gong, Petra Isenberg, Ali Sarvghad

    Abstract: We present results of a replication study on smartwatch visualizations with adults aged 65 and older. The older adult population is rising globally, coinciding with their increasing interest in using small wearable devices, such as smartwatches, to track and view data. Smartwatches, however, pose challenges to this population: fonts and visualizations are often small and meant to be seen at a glan… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 17 pages, 10 figures, accepted to CHI '24

  40. arXiv:2403.11838  [pdf, other

    cs.CL cs.AI

    Ensuring Safe and High-Quality Outputs: A Guideline Library Approach for Language Models

    Authors: Yi Luo, Zhenghao Lin, Yuhao Zhang, Jiashuo Sun, Chen Lin, Chengjin Xu, Xiangdong Su, Yelong Shen, Jian Guo, Yeyun Gong

    Abstract: Large Language Models (LLMs) exhibit impressive capabilities but also present risks such as biased content generation and privacy issues. One of the current alignment techniques includes principle-driven integration, but it faces challenges arising from the imprecision of manually crafted rules and inadequate risk perception in models without safety training. To address these, we introduce Guide-A… ▽ More

    Submitted 23 March, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: Accepted to NAACL 2024 main conference

  41. Bandwidth-Effective DRAM Cache for GPUs with Storage-Class Memory

    Authors: Jeongmin Hong, Sungjun Cho, Geonwoo Park, Wonhyuk Yang, Young-Ho Gong, Gwangsun Kim

    Abstract: We propose overcoming the memory capacity limitation of GPUs with high-capacity Storage-Class Memory (SCM) and DRAM cache. By significantly increasing the memory capacity with SCM, the GPU can capture a larger fraction of the memory footprint than HBM for workloads that oversubscribe memory, achieving high speedups. However, the DRAM cache needs to be carefully designed to address the latency and… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: Published in 2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA'24)

  42. arXiv:2403.08822  [pdf

    cs.LG cs.CL

    LoRA-SP: Streamlined Partial Parameter Adaptation for Resource-Efficient Fine-Tuning of Large Language Models

    Authors: Yichao Wu, Yafei Xiang, Shuning Huo, Yulu Gong, Penghao Liang

    Abstract: In addressing the computational and memory demands of fine-tuning Large Language Models(LLMs), we propose LoRA-SP(Streamlined Partial Parameter Adaptation), a novel approach utilizing randomized half-selective parameter freezing within the Low-Rank Adaptation(LoRA)framework. This method efficiently balances pre-trained knowledge retention and adaptability for task-specific optimizations. Through a… ▽ More

    Submitted 28 February, 2024; originally announced March 2024.

  43. arXiv:2403.07905  [pdf

    cs.DC cs.AI cs.LG

    Enhancing Kubernetes Automated Scheduling with Deep Learning and Reinforcement Techniques for Large-Scale Cloud Computing Optimization

    Authors: Zheng Xu, Yulu Gong, Yanlin Zhou, Qiaozhi Bao, Wenpin Qian

    Abstract: With the continuous expansion of the scale of cloud computing applications, artificial intelligence technologies such as Deep Learning and Reinforcement Learning have gradually become the key tools to solve the automated task scheduling of large-scale cloud computing systems. Aiming at the complexity and real-time requirement of task scheduling in large-scale cloud computing system, this paper pro… ▽ More

    Submitted 26 February, 2024; originally announced March 2024.

  44. arXiv:2403.06670  [pdf, other

    cs.CV cs.AI

    CEAT: Continual Expansion and Absorption Transformer for Non-Exemplar Class-Incremental Learning

    Authors: Xinyuan Gao, Songlin Dong, Yuhang He, Xing Wei, Yihong Gong

    Abstract: In real-world applications, dynamic scenarios require the models to possess the capability to learn new tasks continuously without forgetting the old knowledge. Experience-Replay methods store a subset of the old images for joint training. In the scenario of more strict privacy protection, storing the old images becomes infeasible, which leads to a more severe plasticity-stability dilemma and clas… ▽ More

    Submitted 11 March, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

  45. arXiv:2403.03477  [pdf, other

    cs.CV

    Continual Segmentation with Disentangled Objectness Learning and Class Recognition

    Authors: Yizheng Gong, Siyue Yu, Xiaoyang Wang, Jimin Xiao

    Abstract: Most continual segmentation methods tackle the problem as a per-pixel classification task. However, such a paradigm is very challenging, and we find query-based segmenters with built-in objectness have inherent advantages compared with per-pixel ones, as objectness has strong transfer ability and forgetting resistance. Based on these findings, we propose CoMasTRe by disentangling continual segment… ▽ More

    Submitted 31 March, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024

  46. arXiv:2403.02333  [pdf, other

    cs.CL cs.AI

    Key-Point-Driven Data Synthesis with its Enhancement on Mathematical Reasoning

    Authors: Yiming Huang, Xiao Liu, Yeyun Gong, Zhibin Gou, Yelong Shen, Nan Duan, Weizhu Chen

    Abstract: Large language models (LLMs) have shown great potential in complex reasoning tasks, yet their performance is often hampered by the scarcity of high-quality and reasoning-focused training datasets. Addressing this challenge, we propose Key-Point-Driven Data Synthesis (KPDDS), a novel data synthesis framework that synthesizes question-answer pairs by leveraging key points and exemplar practices from… ▽ More

    Submitted 7 May, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: In progress

  47. arXiv:2403.02131  [pdf, other

    cs.NE cs.AI

    Deep Reinforcement Learning for Dynamic Algorithm Selection: A Proof-of-Principle Study on Differential Evolution

    Authors: Hongshu Guo, Yining Ma, Zeyuan Ma, Jiacheng Chen, Xinglin Zhang, Zhiguang Cao, Jun Zhang, Yue-Jiao Gong

    Abstract: Evolutionary algorithms, such as Differential Evolution, excel in solving real-parameter optimization challenges. However, the effectiveness of a single algorithm varies across different problem instances, necessitating considerable efforts in algorithm selection or configuration. This paper aims to address the limitation by leveraging the complementary strengths of a group of algorithms and dynam… ▽ More

    Submitted 7 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted by IEEE Transactions on Systems, Man, and Cybernetics: Systems at Thu, Feb 29, 2024

  48. arXiv:2403.01131  [pdf, other

    math.OC cs.AI cs.CL cs.LG cs.NE cs.SE

    LLaMoCo: Instruction Tuning of Large Language Models for Optimization Code Generation

    Authors: Zeyuan Ma, Hongshu Guo, Jiacheng Chen, Guojun Peng, Zhiguang Cao, Yining Ma, Yue-Jiao Gong

    Abstract: Recent research explores optimization using large language models (LLMs) by either iteratively seeking next-step solutions from LLMs or directly prompting LLMs for an optimizer. However, these approaches exhibit inherent limitations, including low operational efficiency, high sensitivity to prompt design, and a lack of domain-specific knowledge. We introduce LLaMoCo, the first instruction-tuning f… ▽ More

    Submitted 5 March, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

  49. arXiv:2402.17979  [pdf, other

    cs.CE cs.AI cs.LG

    Ensemble Methodology:Innovations in Credit Default Prediction Using LightGBM, XGBoost, and LocalEnsemble

    Authors: Mengran Zhu, Ye Zhang, Yulu Gong, Kaijuan Xing, Xu Yan, Jintong Song

    Abstract: In the realm of consumer lending, accurate credit default prediction stands as a critical element in risk mitigation and lending decision optimization. Extensive research has sought continuous improvement in existing models to enhance customer experiences and ensure the sound economic functioning of lending institutions. This study responds to the evolving landscape of credit default prediction, c… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  50. arXiv:2402.17216  [pdf

    cs.DC cs.AI cs.LG

    Application of Machine Learning Optimization in Cloud Computing Resource Scheduling and Management

    Authors: Yifan Zhang, Bo Liu, Yulu Gong, Jiaxin Huang, Jingyu Xu, Weixiang Wan

    Abstract: In recent years, cloud computing has been widely used. Cloud computing refers to the centralized computing resources, users through the access to the centralized resources to complete the calculation, the cloud computing center will return the results of the program processing to the user. Cloud computing is not only for individual users, but also for enterprise users. By purchasing a cloud server… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.