Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 118 results for author: Lau, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18563  [pdf

    cs.CY cs.AI cs.CV cs.LG

    Interdisciplinary Expertise to Advance Equitable Explainable AI

    Authors: Chloe R. Bennett, Heather Cole-Lewis, Stephanie Farquhar, Naama Haamel, Boris Babenko, Oran Lang, Mat Fleck, Ilana Traynis, Charles Lau, Ivor Horn, Courtney Lyles

    Abstract: The field of artificial intelligence (AI) is rapidly influencing health and healthcare, but bias and poor performance persists for populations who face widespread structural oppression. Previous work has clearly outlined the need for more rigorous attention to data representativeness and model performance to advance equity and reduce bias. However, there is an opportunity to also improve the expla… ▽ More

    Submitted 29 May, 2024; originally announced June 2024.

  2. arXiv:2405.06697  [pdf, other

    cs.CL cs.AI

    Automated Conversion of Static to Dynamic Scheduler via Natural Language

    Authors: Paul Mingzheng Tang, Kenji Kah Hoe Leong, Nowshad Shaik, Hoong Chuin Lau

    Abstract: In this paper, we explore the potential application of Large Language Models (LLMs) that will automatically model constraints and generate code for dynamic scheduling problems given an existing static model. Static scheduling problems are modelled and coded by optimization experts. These models may be easily obsoleted as the underlying constraints may need to be fine-tuned in order to reflect chan… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: 7 pages (excluding appendix), 10 figures, 3 tables

  3. arXiv:2405.03162  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Advancing Multimodal Medical Capabilities of Gemini

    Authors: Lin Yang, Shawn Xu, Andrew Sellergren, Timo Kohlberger, Yuchen Zhou, Ira Ktena, Atilla Kiraly, Faruk Ahmed, Farhad Hormozdiari, Tiam Jaroensri, Eric Wang, Ellery Wulczyn, Fayaz Jamil, Theo Guidroz, Chuck Lau, Siyuan Qiao, Yun Liu, Akshay Goel, Kendall Park, Arnav Agharwal, Nick George, Yang Wang, Ryutaro Tanno, David G. T. Barrett, Wei-Hung Weng , et al. (22 additional authors not shown)

    Abstract: Many clinical tasks require an understanding of specialized data, such as medical images and genomics, which is not typically found in general-purpose large multimodal models. Building upon Gemini's multimodal models, we develop several models within the new Med-Gemini family that inherit core capabilities of Gemini and are optimized for medical use via fine-tuning with 2D and 3D radiology, histop… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  4. arXiv:2404.18416  [pdf, other

    cs.AI cs.CL cs.CV cs.LG

    Capabilities of Gemini Models in Medicine

    Authors: Khaled Saab, Tao Tu, Wei-Hung Weng, Ryutaro Tanno, David Stutz, Ellery Wulczyn, Fan Zhang, Tim Strother, Chunjong Park, Elahe Vedadi, Juanma Zambrano Chaves, Szu-Yeu Hu, Mike Schaekermann, Aishwarya Kamath, Yong Cheng, David G. T. Barrett, Cathy Cheung, Basil Mustafa, Anil Palepu, Daniel McDuff, Le Hou, Tomer Golany, Luyang Liu, Jean-baptiste Alayrac, Neil Houlsby , et al. (42 additional authors not shown)

    Abstract: Excellence in a wide variety of medical applications poses considerable challenges for AI, requiring advanced reasoning, access to up-to-date medical knowledge and understanding of complex multimodal data. Gemini models, with strong general capabilities in multimodal and long-context reasoning, offer exciting possibilities in medicine. Building on these core strengths of Gemini, we introduce Med-G… ▽ More

    Submitted 1 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

  5. arXiv:2404.15435  [pdf, other

    cs.HC

    Introduction to Eye Tracking: A Hands-On Tutorial for Students and Practitioners

    Authors: Enkelejda Kasneci, Hong Gao, Suleyman Ozdel, Virmarie Maquiling, Enkeleda Thaqi, Carrie Lau, Yao Rong, Gjergji Kasneci, Efe Bozkir

    Abstract: Eye-tracking technology is widely used in various application areas such as psychology, neuroscience, marketing, and human-computer interaction, as it is a valuable tool for understanding how people process information and interact with their environment. This tutorial provides a comprehensive introduction to eye tracking, from the basics of eye anatomy and physiology to the principles and applica… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  6. arXiv:2403.18545  [pdf, other

    cs.DC

    Optimal Resource Efficiency with Fairness in Heterogeneous GPU Clusters

    Authors: Zizhao Mo, Huanle Xu, Wing Cheong Lau

    Abstract: Ensuring the highest training throughput to maximize resource efficiency, while maintaining fairness among users, is critical for deep learning (DL) training in heterogeneous GPU clusters. However, current DL schedulers provide only limited fairness properties and suboptimal training throughput, impeding tenants from effectively leveraging heterogeneous resources. The underlying design challenge s… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  7. Embedding Large Language Models into Extended Reality: Opportunities and Challenges for Inclusion, Engagement, and Privacy

    Authors: Efe Bozkir, Süleyman Özdel, Ka Hei Carrie Lau, Mengdi Wang, Hong Gao, Enkelejda Kasneci

    Abstract: Advances in artificial intelligence and human-computer interaction will likely lead to extended reality (XR) becoming pervasive. While XR can provide users with interactive, engaging, and immersive experiences, non-player characters are often utilized in pre-scripted and conventional ways. This paper argues for using large language models (LLMs) in XR by embedding them in avatars or as narratives… ▽ More

    Submitted 20 June, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: ACM Conversational User Interfaces 2024

  8. arXiv:2312.11017  [pdf, ps, other

    cs.IT math.CO math.NT

    Information Inequalities via Ideas from Additive Combinatorics

    Authors: Chin Wa Lau, Chandra Nair

    Abstract: Ruzsa's equivalence theorem provided a framework for converting certain families of inequalities in additive combinatorics to entropic inequalities (which sometimes did not possess stand-alone entropic proofs). In this work, we first establish formal equivalences between some families (different from Ruzsa) of inequalities in additive combinatorics and entropic ones. As a first step to further the… ▽ More

    Submitted 20 December, 2023; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: 15 pages, The authors were made aware that some of the results had been obtained earlier. The revised version acknowledges and references this work. A conference version of this was published in the proceeding of IEEE ISIT 2023. s

  9. An In-Depth Survey on Virtualization Technologies in 6G Integrated Terrestrial and Non-Terrestrial Networks

    Authors: Sahar Ammar, Chun Pong Lau, Basem Shihada

    Abstract: 6G networks are envisioned to deliver a large diversity of applications and meet stringent quality of service (QoS) requirements. Hence, integrated terrestrial and non-terrestrial networks (TN-NTNs) are anticipated to be key enabling technologies. However, the TN-NTNs integration faces a number of challenges that could be addressed through network virtualization technologies such as Software-Defin… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  10. arXiv:2311.17074  [pdf, other

    cs.CV

    Self-Supervised Learning of Whole and Component-Based Semantic Representations for Person Re-Identification

    Authors: Siyuan Huang, Yifan Zhou, Ram Prabhakar, Xijun Liu, Yuxiang Guo, Hongrui Yi, Cheng Peng, Rama Chellappa, Chun Pong Lau

    Abstract: Person Re-Identification (ReID) is a challenging problem, focusing on identifying individuals across diverse settings. However, previous ReID methods primarily concentrated on a single domain or modality, such as Clothes-Changing ReID (CC-ReID) and video ReID. Real-world ReID is not constrained by factors like clothes or input types. Recent approaches emphasize on learning semantics through pre-tr… ▽ More

    Submitted 14 March, 2024; v1 submitted 27 November, 2023; originally announced November 2023.

  11. arXiv:2311.15551  [pdf, other

    cs.CV cs.AI cs.CR cs.LG eess.IV

    Instruct2Attack: Language-Guided Semantic Adversarial Attacks

    Authors: Jiang Liu, Chen Wei, Yuxiang Guo, Heng Yu, Alan Yuille, Soheil Feizi, Chun Pong Lau, Rama Chellappa

    Abstract: We propose Instruct2Attack (I2A), a language-guided semantic attack that generates semantically meaningful perturbations according to free-form language instructions. We make use of state-of-the-art latent diffusion models, where we adversarially guide the reverse diffusion process to search for an adversarial latent code conditioned on the input image and text instruction. Compared to existing no… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

    Comments: under submission, code coming soon

  12. RelJoin: Relative-cost-based Selection of Distributed Join Methods for Query Plan Optimization

    Authors: F. Liang, F. C. M. Lau, H. Cui, Y. Li, B. Lin, C. Li, X. Hu

    Abstract: Selecting appropriate distributed join methods for logical join operations in a query plan is crucial for the performance of data-intensive scalable computing (DISC). Different network communication patterns in the data exchange phase generate varying network communication workloads and significantly affect the distributed join performance. However, most cost-based query optimizers focus on the lo… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

    Journal ref: Information Sciences 658 (2024) 120022

  13. arXiv:2311.05725  [pdf, other

    cs.CV

    Whole-body Detection, Recognition and Identification at Altitude and Range

    Authors: Siyuan Huang, Ram Prabhakar Kathirvel, Chun Pong Lau, Rama Chellappa

    Abstract: In this paper, we address the challenging task of whole-body biometric detection, recognition, and identification at distances of up to 500m and large pitch angles of up to 50 degree. We propose an end-to-end system evaluated on diverse datasets, including the challenging Biometric Recognition and Identification at Range (BRIAR) dataset. Our approach involves pre-training the detector on common im… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  14. arXiv:2310.17097  [pdf, other

    cs.CV cs.DC

    Navigating Data Heterogeneity in Federated Learning A Semi-Supervised Federated Object Detection

    Authors: Taehyeon Kim, Eric Lin, Junu Lee, Christian Lau, Vaikkunth Mugunthan

    Abstract: Federated Learning (FL) has emerged as a potent framework for training models across distributed data sources while maintaining data privacy. Nevertheless, it faces challenges with limited high-quality labels and non-IID client data, particularly in applications like autonomous driving. To address these hurdles, we navigate the uncharted waters of Semi-Supervised Federated Object Detection (SSFOD)… ▽ More

    Submitted 2 January, 2024; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: NeurIPS 2023

  15. Joint Design of Source-Channel Codes with Linear Source Encoding Complexity and Good Channel Thresholds Based on Double-Protograph LDPC Codes

    Authors: Jia Zhan, Francis C. M. Lau

    Abstract: We propose the use of a lower or upper triangular sub-base matrix to replace the identity matrix in the source-check-channel-variable linking protomatrix of a double-protograph low-density parity-check joint-source-channel code (DP-LDPC JSCC). The elements along the diagonal of the proposed lower or upper triangular sub-base matrix are assigned as "1" and the other non-zero elements can take any n… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 7 pages, 5 figures, 3 tables, to appear in IEEE Communications Letters

  16. arXiv:2308.16501  [pdf, other

    cs.MA cs.AI

    Individually Rational Collaborative Vehicle Routing through Give-And-Take Exchanges

    Authors: Paul Mingzheng Tang, Ba Phong Tran, Hoong Chuin Lau

    Abstract: In this paper, we are concerned with the automated exchange of orders between logistics companies in a marketplace platform to optimize total revenues. We introduce a novel multi-agent approach to this problem, focusing on the Collaborative Vehicle Routing Problem (CVRP) through the lens of individual rationality. Our proposed algorithm applies the principles of Vehicle Routing Problem (VRP) to pa… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: 7 pages 4 figures This paper was presented in the IJCAI 2023 First International Workshop on Search and Planning with Complex Objectives (WoSePCO) http://idm-lab.org/wiki/complex-objective

  17. arXiv:2308.08785  [pdf, other

    quant-ph cs.DS

    A Feasibility-Preserved Quantum Approximate Solver for the Capacitated Vehicle Routing Problem

    Authors: Ningyi Xie, Xinwei Lee, Dongsheng Cai, Yoshiyuki Saito, Nobuyoshi Asai, Hoong Chuin Lau

    Abstract: The Capacitated Vehicle Routing Problem (CVRP) is an NP-optimization problem (NPO) that arises in various fields including transportation and logistics. The CVRP extends from the Vehicle Routing Problem (VRP), aiming to determine the most efficient plan for a fleet of vehicles to deliver goods to a set of customers, subject to the limited carrying capacity of each vehicle. As the number of possibl… ▽ More

    Submitted 21 April, 2024; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: 10 pages, 10 figures, 1 table

  18. arXiv:2308.01317  [pdf

    cs.CV eess.IV

    ELIXR: Towards a general purpose X-ray artificial intelligence system through alignment of large language models and radiology vision encoders

    Authors: Shawn Xu, Lin Yang, Christopher Kelly, Marcin Sieniek, Timo Kohlberger, Martin Ma, Wei-Hung Weng, Atilla Kiraly, Sahar Kazemzadeh, Zakkai Melamed, Jungyeon Park, Patricia Strachan, Yun Liu, Chuck Lau, Preeti Singh, Christina Chen, Mozziyar Etemadi, Sreenivasa Raju Kalidindi, Yossi Matias, Katherine Chou, Greg S. Corrado, Shravya Shetty, Daniel Tse, Shruthi Prabhakara, Daniel Golden , et al. (3 additional authors not shown)

    Abstract: In this work, we present an approach, which we call Embeddings for Language/Image-aligned X-Rays, or ELIXR, that leverages a language-aligned image encoder combined or grafted onto a fixed LLM, PaLM 2, to perform a broad range of chest X-ray tasks. We train this lightweight adapter architecture using images paired with corresponding free-text radiology reports from the MIMIC-CXR dataset. ELIXR ach… ▽ More

    Submitted 7 September, 2023; v1 submitted 2 August, 2023; originally announced August 2023.

  19. arXiv:2307.16382  [pdf, other

    cs.LG cs.CL

    Does fine-tuning GPT-3 with the OpenAI API leak personally-identifiable information?

    Authors: Albert Yu Sun, Eliott Zemour, Arushi Saxena, Udith Vaidyanathan, Eric Lin, Christian Lau, Vaikkunth Mugunthan

    Abstract: Machine learning practitioners often fine-tune generative pre-trained models like GPT-3 to improve model performance at specific tasks. Previous works, however, suggest that fine-tuned machine learning models memorize and emit sensitive information from the original fine-tuning dataset. Companies such as OpenAI offer fine-tuning services for their models, but no prior work has conducted a memoriza… ▽ More

    Submitted 15 April, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

  20. arXiv:2307.14578  [pdf, other

    cs.CV

    GADER: GAit DEtection and Recognition in the Wild

    Authors: Yuxiang Guo, Cheng Peng, Ram Prabhakar, Chun Pong Lau, Rama Chellappa

    Abstract: Gait recognition holds the promise of robustly identifying subjects based on their walking patterns instead of color information. While previous approaches have performed well for curated indoor scenes, they have significantly impeded applicability in unconstrained situations, e.g. outdoor, long distance scenes. We propose an end-to-end GAit DEtection and Recognition (GADER) algorithm for human au… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  21. arXiv:2307.14334  [pdf, other

    cs.CL cs.CV

    Towards Generalist Biomedical AI

    Authors: Tao Tu, Shekoofeh Azizi, Danny Driess, Mike Schaekermann, Mohamed Amin, Pi-Chuan Chang, Andrew Carroll, Chuck Lau, Ryutaro Tanno, Ira Ktena, Basil Mustafa, Aakanksha Chowdhery, Yun Liu, Simon Kornblith, David Fleet, Philip Mansfield, Sushant Prakash, Renee Wong, Sunny Virmani, Christopher Semturs, S Sara Mahdavi, Bradley Green, Ewa Dominowska, Blaise Aguera y Arcas, Joelle Barral , et al. (7 additional authors not shown)

    Abstract: Medicine is inherently multimodal, with rich data modalities spanning text, imaging, genomics, and more. Generalist biomedical artificial intelligence (AI) systems that flexibly encode, integrate, and interpret this data at scale can potentially enable impactful applications ranging from scientific discovery to care delivery. To enable the development of these models, we first curate MultiMedBench… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  22. arXiv:2306.09128  [pdf, ps, other

    cs.DS cs.DM cs.LG math.CO

    Fast Algorithms for Directed Graph Partitioning Using Flows and Reweighted Eigenvalues

    Authors: Lap Chi Lau, Kam Chuen Tung, Robert Wang

    Abstract: We consider a new semidefinite programming relaxation for directed edge expansion, which is obtained by adding triangle inequalities to the reweighted eigenvalue formulation. Applying the matrix multiplicative weight update method to this relaxation, we derive almost linear-time algorithms to achieve $O(\sqrt{\log{n}})$-approximation and Cheeger-type guarantee for directed edge expansion, as well… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  23. Taming Reversible Halftoning via Predictive Luminance

    Authors: Cheuk-Kit Lau, Menghan Xia, Tien-Tsin Wong

    Abstract: Traditional halftoning usually drops colors when dithering images with binary dots, which makes it difficult to recover the original color information. We proposed a novel halftoning technique that converts a color image into a binary halftone with full restorability to its original version. Our novel base halftoning technique consists of two convolutional neural networks (CNNs) to produce the rev… ▽ More

    Submitted 7 February, 2024; v1 submitted 14 June, 2023; originally announced June 2023.

    Comments: published in IEEE Transactions on Visualization and Computer Graphics

  24. arXiv:2306.00985  [pdf

    eess.IV cs.CV cs.LG

    Using generative AI to investigate medical imagery models and datasets

    Authors: Oran Lang, Doron Yaya-Stupp, Ilana Traynis, Heather Cole-Lewis, Chloe R. Bennett, Courtney Lyles, Charles Lau, Christopher Semturs, Dale R. Webster, Greg S. Corrado, Avinatan Hassidim, Yossi Matias, Yun Liu, Naama Hammel, Boris Babenko

    Abstract: AI models have shown promise in many medical imaging tasks. However, our ability to explain what signals these models have learned is severely lacking. Explanations are needed in order to increase the trust in AI-based models, and could enable novel scientific discovery by uncovering signals in the data that are not yet known to experts. In this paper, we present a method for automatic visual expl… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 34 pages, 1 figure

  25. arXiv:2305.13625  [pdf, other

    cs.CV cs.CR

    DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection

    Authors: Jiang Liu, Chun Pong Lau, Rama Chellappa

    Abstract: The increasingly pervasive facial recognition (FR) systems raise serious concerns about personal privacy, especially for billions of users who have publicly shared their photos on social media. Several attempts have been made to protect individuals from being identified by unauthorized FR systems utilizing adversarial attacks to generate encrypted face images. However, existing methods suffer from… ▽ More

    Submitted 28 May, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: Code will be available at https://github.com/joellliu/DiffProtect/

  26. arXiv:2305.13548  [pdf, ps, other

    cs.CV cs.CR

    Attribute-Guided Encryption with Facial Texture Masking

    Authors: Chun Pong Lau, Jiang Liu, Rama Chellappa

    Abstract: The increasingly pervasive facial recognition (FR) systems raise serious concerns about personal privacy, especially for billions of users who have publicly shared their photos on social media. Several attempts have been made to protect individuals from unauthorized FR systems utilizing adversarial attacks to generate encrypted face images to protect users from being identified by FR systems. Howe… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  27. arXiv:2305.02799  [pdf, ps, other

    eess.SP cs.IT

    A Heterogeneous 6G Networked Sensing Architecture with Active and Passive Anchors

    Authors: Qipeng Wang, Liang Liu, Shuowen Zhang, Boya Di, Francis C. M. Lau

    Abstract: In the future 6G integrated sensing and communication (ISAC) cellular systems, networked sensing is a promising technique that can leverage the cooperation among the base stations (BSs) to perform high-resolution localization. However, a dense deployment of BSs to fully reap the networked sensing gain is not a cost-efficient solution in practice. Motivated by the advance in the intelligent reflect… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: submitted to IEEE journal

  28. arXiv:2305.01942  [pdf, ps, other

    cs.DS cs.LG stat.CO stat.ML

    Experimental Design for Any $p$-Norm

    Authors: Lap Chi Lau, Robert Wang, Hong Zhou

    Abstract: We consider a general $p$-norm objective for experimental design problems that captures some well-studied objectives (D/A/E-design) as special cases. We prove that a randomized local search approach provides a unified algorithm to solve this problem for all $p$. This provides the first approximation algorithm for the general $p$-norm objective, and a nice interpolation of the best known bounds of… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 29 pages

  29. arXiv:2303.14646  [pdf, other

    cs.LG cs.AI

    A Survey of Machine Learning-Based Ride-Hailing Planning

    Authors: Dacheng Wen, Yupeng Li, Francis C. M. Lau

    Abstract: Ride-hailing is a sustainable transportation paradigm where riders access door-to-door traveling services through a mobile phone application, which has attracted a colossal amount of usage. There are two major planning tasks in a ride-hailing system: (1) matching, i.e., assigning available vehicles to pick up the riders, and (2) repositioning, i.e., proactively relocating vehicles to certain locat… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  30. arXiv:2301.00407  [pdf, other

    cs.LG cs.PF

    MIGPerf: A Comprehensive Benchmark for Deep Learning Training and Inference Workloads on Multi-Instance GPUs

    Authors: Huaizheng Zhang, Yuanming Li, Wencong Xiao, Yizheng Huang, Xing Di, Jianxiong Yin, Simon See, Yong Luo, Chiew Tong Lau, Yang You

    Abstract: New architecture GPUs like A100 are now equipped with multi-instance GPU (MIG) technology, which allows the GPU to be partitioned into multiple small, isolated instances. This technology provides more flexibility for users to support both deep learning training and inference workloads, but efficiently utilizing it can still be challenging. The vision of this paper is to provide a more comprehensiv… ▽ More

    Submitted 1 January, 2023; originally announced January 2023.

    Comments: 10 pages, 11 figures

  31. arXiv:2212.03659  [pdf, other

    math.OC cs.LG

    The BeMi Stardust: a Structured Ensemble of Binarized Neural Networks

    Authors: Ambrogio Maria Bernardelli, Stefano Gualandi, Hoong Chuin Lau, Simone Milanesi

    Abstract: Binarized Neural Networks (BNNs) are receiving increasing attention due to their lightweight architecture and ability to run on low-power devices. The state-of-the-art for training classification BNNs restricted to few-shot learning is based on a Mixed Integer Programming (MIP) approach. This paper proposes the BeMi ensemble, a structured architecture of BNNs based on training a single BNN for eac… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: 17 pages, 5 figure, 2 tables

  32. arXiv:2211.09776  [pdf, other

    cs.DS cs.DM cs.LG math.CO math.PR

    Cheeger Inequalities for Directed Graphs and Hypergraphs Using Reweighted Eigenvalues

    Authors: Lap Chi Lau, Kam Chuen Tung, Robert Wang

    Abstract: We derive Cheeger inequalities for directed graphs and hypergraphs using the reweighted eigenvalue approach that was recently developed for vertex expansion in undirected graphs [OZ22,KLT22,JPV22]. The goal is to develop a new spectral theory for directed graphs and an alternative spectral theory for hypergraphs. The first main result is a Cheeger inequality relating the vertex expansion… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 51 pages, 3 figures

  33. arXiv:2211.03061  [pdf, other

    cs.CL cs.SI

    Improved Target-specific Stance Detection on Social Media Platforms by Delving into Conversation Threads

    Authors: Yupeng Li, Haorui He, Shaonan Wang, Francis C. M. Lau, Yunya Song

    Abstract: Target-specific stance detection on social media, which aims at classifying a textual data instance such as a post or a comment into a stance class of a target issue, has become an emerging opinion mining paradigm of importance. An example application would be to overcome vaccine hesitancy in combating the coronavirus pandemic. However, existing stance detection strategies rely merely on the indiv… ▽ More

    Submitted 6 November, 2022; originally announced November 2022.

  34. arXiv:2211.00759  [pdf, other

    cs.LG cs.AI

    Online Control of Adaptive Large Neighborhood Search using Deep Reinforcement Learning

    Authors: Robbert Reijnen, Yingqian Zhang, Hoong Chuin Lau, Zaharah Bukhsh

    Abstract: The Adaptive Large Neighborhood Search (ALNS) algorithm has shown considerable success in solving combinatorial optimization problems (COPs). Nonetheless, the performance of ALNS relies on the proper configuration of its selection and acceptance parameters, which is known to be a complex and resource-intensive task. To address this, we introduce a Deep Reinforcement Learning (DRL) based approach c… ▽ More

    Submitted 3 April, 2024; v1 submitted 1 November, 2022; originally announced November 2022.

  35. arXiv:2210.04050  [pdf, other

    cs.CV

    Multi-Modal Human Authentication Using Silhouettes, Gait and RGB

    Authors: Yuxiang Guo, Cheng Peng, Chun Pong Lau, Rama Chellappa

    Abstract: Whole-body-based human authentication is a promising approach for remote biometrics scenarios. Current literature focuses on either body recognition based on RGB images or gait recognition based on body shapes and walking patterns; both have their advantages and drawbacks. In this work, we propose Dual-Modal Ensemble (DME), which combines both RGB and silhouette data to achieve more robust perform… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  36. arXiv:2209.05245  [pdf, other

    cs.NE cs.LG eess.IV

    Continual learning benefits from multiple sleep mechanisms: NREM, REM, and Synaptic Downscaling

    Authors: Brian S. Robinson, Clare W. Lau, Alexander New, Shane M. Nichols, Erik C. Johnson, Michael Wolmetz, William G. Coon

    Abstract: Learning new tasks and skills in succession without losing prior learning (i.e., catastrophic forgetting) is a computational challenge for both artificial and biological neural networks, yet artificial systems struggle to achieve parity with their biological analogues. Mammalian brains employ numerous neural operations in support of continual learning during sleep. These are ripe for artificial ad… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

    Comments: 9 pages, 12 figures, code available upon reasonable request. Corresponding author: William G. Coon (will.coon@jhuapl.edu)

  37. CreatureShop: Interactive 3D Character Modeling and Texturing from a Single Color Drawing

    Authors: Congyi Zhang, Lei Yang, Nenglun Chen, Nicholas Vining, Alla Sheffer, Francis C. M. Lau, Guoping Wang, Wenping Wang

    Abstract: Creating 3D shapes from 2D drawings is an important problem with applications in content creation for computer animation and virtual reality. We introduce a new sketch-based system, CreatureShop, that enables amateurs to create high-quality textured 3D character models from 2D drawings with ease and efficiency. CreatureShop takes an input bitmap drawing of a character (such as an animal or other c… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

    Comments: This is the author's version of the article published in IEEE Transactions on Visualization and Computer Graphics, 2022

  38. arXiv:2207.09109  [pdf, other

    cs.LG cs.DC

    Active-Learning-as-a-Service: An Automatic and Efficient MLOps System for Data-Centric AI

    Authors: Yizheng Huang, Huaizheng Zhang, Yuanming Li, Chiew Tong Lau, Yang You

    Abstract: The success of today's AI applications requires not only model training (Model-centric) but also data engineering (Data-centric). In data-centric AI, active learning (AL) plays a vital role, but current AL tools 1) require users to manually select AL strategies, and 2) can not perform AL tasks efficiently. To this end, this paper presents an automatic and efficient MLOps system for AL, named ALaaS… ▽ More

    Submitted 5 November, 2022; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: 13 pages, 5 figures

  39. arXiv:2205.12667  [pdf, ps, other

    eess.SP cs.IT

    Trilateration-Based Device-Free Sensing: Two Base Stations and One Passive IRS Are Sufficient

    Authors: Qipeng Wang, Liang Liu, Shuowen Zhang, Francis C. M. Lau

    Abstract: The classic trilateration technique can localize each target based on its distances to three anchors with known coordinates. Usually, this technique requires all the anchors and targets, e.g., the satellites and the mobile phones in Global Navigation Satellite System (GNSS), to actively transmit/receive radio signals such that the delay of the one-way radio signal propagated between each anchor an… ▽ More

    Submitted 27 May, 2022; v1 submitted 25 May, 2022; originally announced May 2022.

    Comments: submitted for possible publication

  40. arXiv:2205.08121  [pdf, other

    cs.IT

    Design of Joint Source-Channel Codes Based on a Generic Protograph

    Authors: Jia Zhan, Francis C. M. Lau

    Abstract: In this paper, we propose using a generic protograph to design joint source-channel codes (JSCCs). We present a generalized algorithm, called protograph extrinsic information transfer for JSCC algorithm (PEXIT-JSCC algorithm), for analyzing the channel threshold of the proposed JSCC. We also propose a source generic protograph EXIT (SGP-EXIT) algorithm, which is more appropriate than the generaliz… ▽ More

    Submitted 18 October, 2022; v1 submitted 17 May, 2022; originally announced May 2022.

    Comments: 26 pages, 15 figures, 5 tables

  41. arXiv:2203.10139  [pdf

    cs.LG cs.AI cs.CV eess.IV

    AI system for fetal ultrasound in low-resource settings

    Authors: Ryan G. Gomes, Bellington Vwalika, Chace Lee, Angelica Willis, Marcin Sieniek, Joan T. Price, Christina Chen, Margaret P. Kasaro, James A. Taylor, Elizabeth M. Stringer, Scott Mayer McKinney, Ntazana Sindano, George E. Dahl, William Goodnight III, Justin Gilmer, Benjamin H. Chi, Charles Lau, Terry Spitz, T Saensuksopa, Kris Liu, Jonny Wong, Rory Pilgrim, Akib Uddin, Greg Corrado, Lily Peng , et al. (4 additional authors not shown)

    Abstract: Despite considerable progress in maternal healthcare, maternal and perinatal deaths remain high in low-to-middle income countries. Fetal ultrasound is an important component of antenatal care, but shortage of adequately trained healthcare workers has limited its adoption. We developed and validated an artificial intelligence (AI) system that uses novice-acquired "blind sweep" ultrasound videos to… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

  42. arXiv:2203.06168  [pdf, other

    cs.DS cs.DM math.CO math.PR

    Cheeger Inequalities for Vertex Expansion and Reweighted Eigenvalues

    Authors: Tsz Chiu Kwok, Lap Chi Lau, Kam Chuen Tung

    Abstract: The classical Cheeger's inequality relates the edge conductance $φ$ of a graph and the second smallest eigenvalue $λ_2$ of the Laplacian matrix. Recently, Olesker-Taylor and Zanetti discovered a Cheeger-type inequality $ψ^2 / \log |V| \lesssim λ_2^* \lesssim ψ$ connecting the vertex expansion $ψ$ of a graph $G=(V,E)$ and the maximum reweighted second smallest eigenvalue $λ_2^*$ of the Laplacian ma… ▽ More

    Submitted 19 September, 2022; v1 submitted 11 March, 2022; originally announced March 2022.

    Comments: 65 pages, 1 figure. Minor changes

  43. arXiv:2201.01485  [pdf, ps, other

    eess.SP cs.IT

    Exploiting Temporal Side Information in Massive IoT Connectivity

    Authors: Qipeng Wang, Liang Liu, Shuowen Zhang, Francis C. M. Lau

    Abstract: This paper considers the joint device activity detection and channel estimation problem in a massive Internet of Things (IoT) connectivity system, where a large number of IoT devices exist but merely a random subset of them become active for short-packet transmission in each coherence block. In particular, we propose to leverage the temporal correlation in device activity, e.g., a device active in… ▽ More

    Submitted 5 January, 2022; originally announced January 2022.

    Comments: submitted for possible IEEE journal publication

  44. arXiv:2112.08557  [pdf, ps, other

    cs.IT

    Protograph Bit-Interleaved Coded Modulation: A Bandwidth-Efficient Design Paradigm for 6G Wireless Communications

    Authors: Yi Fang, Pingping Chen, Yong Liang Guan, Francis C. M. Lau, Yonghui Li, Guanrong Chen

    Abstract: Bit-interleaved coded modulation (BICM) has attracted considerable attention from the research community in the past three decades, because it can achieve desirable error performance with relatively low implementation complexity for a large number of communication and storage systems. By exploiting the iterative demapping and decoding (ID), the BICM is able to approach capacity limits of coded mod… ▽ More

    Submitted 27 October, 2022; v1 submitted 15 December, 2021; originally announced December 2021.

  45. Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses

    Authors: Chun Pong Lau, Jiang Liu, Hossein Souri, Wei-An Lin, Soheil Feizi, Rama Chellappa

    Abstract: Adversarial training (AT) is considered to be one of the most reliable defenses against adversarial attacks. However, models trained with AT sacrifice standard accuracy and do not generalize well to novel attacks. Recent works show generalization improvement with adversarial samples under novel threat models such as on-manifold threat model or neural perceptual threat model. However, the former re… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: Under submission

  46. Mutual Adversarial Training: Learning together is better than going alone

    Authors: Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa

    Abstract: Recent studies have shown that robustness to adversarial attacks can be transferred across networks. In other words, we can make a weak model more robust with the help of a strong teacher model. We ask if instead of learning from a static teacher, can models "learn together" and "teach each other" to achieve better robustness? In this paper, we study how interactions among models affect robustness… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    Comments: Under submission

  47. arXiv:2112.04532  [pdf, other

    cs.CV cs.CR eess.IV

    Segment and Complete: Defending Object Detectors against Adversarial Patch Attacks with Robust Patch Detection

    Authors: Jiang Liu, Alexander Levine, Chun Pong Lau, Rama Chellappa, Soheil Feizi

    Abstract: Object detection plays a key role in many security-critical systems. Adversarial patch attacks, which are easy to implement in the physical world, pose a serious threat to state-of-the-art object detectors. Developing reliable defenses for object detectors against patch attacks is critical but severely understudied. In this paper, we propose Segment and Complete defense (SAC), a general framework… ▽ More

    Submitted 2 May, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: CVPR 2022 camera ready

  48. One model Packs Thousands of Items with Recurrent Conditional Query Learning

    Authors: Dongda Li, Zhaoquan Gu, Yuexuan Wang, Changwei Ren, Francis C. M. Lau

    Abstract: Recent studies have revealed that neural combinatorial optimization (NCO) has advantages over conventional algorithms in many combinatorial optimization problems such as routing, but it is less efficient for more complicated optimization tasks such as packing which involves mutually conditioned action spaces. In this paper, we propose a Recurrent Conditional Query Learning (RCQL) method to solve b… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

    Comments: 16 pages, 5 figures, 3 tables. Accepted to Knowledge-Based Systems, 2022

    ACM Class: I.2.6; I.2.8

    Journal ref: Knowledge-Based Systems, Volume 235, 2022, 107683, ISSN 0950-7051

  49. arXiv:2110.07906  [pdf, ps, other

    cs.IT

    Hardware Architecture of Layered Decoders for PLDPC-Hadamard Codes

    Authors: Peng W. Zhang, Francis C. M. Lau, Chiu-W. Sham

    Abstract: Protograph-based low-density parity-check Hadamard codes (PLDPC-HCs) are a new type of ultimate-Shannon-limit-approaching codes. In this paper, we propose a hardware architecture for the PLDPC-HC layered decoders. The decoders consist mainly of random address memories, Hadamard sub-decoders and control logics. Two types of pipelined structures are presented and the latency and throughput of these… ▽ More

    Submitted 19 August, 2022; v1 submitted 15 October, 2021; originally announced October 2021.

    Comments: The paper has been accepted to IEEE Trans. on Circuits on Systems I

  50. arXiv:2110.06802  [pdf, other

    cs.LG cs.CR cs.CV

    Identification of Attack-Specific Signatures in Adversarial Examples

    Authors: Hossein Souri, Pirazh Khorramshahi, Chun Pong Lau, Micah Goldblum, Rama Chellappa

    Abstract: The adversarial attack literature contains a myriad of algorithms for crafting perturbations which yield pathological behavior in neural networks. In many cases, multiple algorithms target the same tasks and even enforce the same constraints. In this work, we show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they q… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.