-
Disentangling spatio-temporal knowledge for weakly supervised object detection and segmentation in surgical video
Authors:
Guiqiu Liao,
Matjaz Jogan,
Sai Koushik,
Eric Eaton,
Daniel A. Hashimoto
Abstract:
Weakly supervised video object segmentation (WSVOS) enables the identification of segmentation maps without requiring an extensive training dataset of object masks, relying instead on coarse video labels indicating object presence. Current state-of-the-art methods either require multiple independent stages of processing that employ motion cues or, in the case of end-to-end trainable networks, lack…
▽ More
Weakly supervised video object segmentation (WSVOS) enables the identification of segmentation maps without requiring an extensive training dataset of object masks, relying instead on coarse video labels indicating object presence. Current state-of-the-art methods either require multiple independent stages of processing that employ motion cues or, in the case of end-to-end trainable networks, lack in segmentation accuracy, in part due to the difficulty of learning segmentation maps from videos with transient object presence. This limits the application of WSVOS for semantic annotation of surgical videos where multiple surgical tools frequently move in and out of the field of view, a problem that is more difficult than typically encountered in WSVOS. This paper introduces Video Spatio-Temporal Disentanglement Networks (VDST-Net), a framework to disentangle spatiotemporal information using semi-decoupled knowledge distillation to predict high-quality class activation maps (CAMs). A teacher network designed to resolve temporal conflicts when specifics about object location and timing in the video are not provided works with a student network that integrates information over time by leveraging temporal dependencies. We demonstrate the efficacy of our framework on a public reference dataset and on a more challenging surgical video dataset where objects are, on average, present in less than 60\% of annotated frames. Our method outperforms state-of-the-art techniques and generates superior segmentation masks under video-level weak supervision.
△ Less
Submitted 23 July, 2024; v1 submitted 22 July, 2024;
originally announced July 2024.
-
A Hybrid Training-time and Run-time Defense Against Adversarial Attacks in Modulation Classification
Authors:
Lu Zhang,
Sangarapillai Lambotharan,
Gan Zheng,
Guisheng Liao,
Ambra Demontis,
Fabio Roli
Abstract:
Motivated by the superior performance of deep learning in many applications including computer vision and natural language processing, several recent studies have focused on applying deep neural network for devising future generations of wireless networks. However, several recent works have pointed out that imperceptible and carefully designed adversarial examples (attacks) can significantly deter…
▽ More
Motivated by the superior performance of deep learning in many applications including computer vision and natural language processing, several recent studies have focused on applying deep neural network for devising future generations of wireless networks. However, several recent works have pointed out that imperceptible and carefully designed adversarial examples (attacks) can significantly deteriorate the classification accuracy. In this paper, we investigate a defense mechanism based on both training-time and run-time defense techniques for protecting machine learning-based radio signal (modulation) classification against adversarial attacks. The training-time defense consists of adversarial training and label smoothing, while the run-time defense employs a support vector machine-based neural rejection (NR). Considering a white-box scenario and real datasets, we demonstrate that our proposed techniques outperform existing state-of-the-art technologies.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Online Optimization of DNN Inference Network Utility in Collaborative Edge Computing
Authors:
Rui Li,
Tao Ouyang,
Liekang Zeng,
Guocheng Liao,
Zhi Zhou,
Xu Chen
Abstract:
Collaborative Edge Computing (CEC) is an emerging paradigm that collaborates heterogeneous edge devices as a resource pool to compute DNN inference tasks in proximity such as edge video analytics. Nevertheless, as the key knob to improve network utility in CEC, existing works mainly focus on the workload routing strategies among edge devices with the aim of minimizing the routing cost, remaining a…
▽ More
Collaborative Edge Computing (CEC) is an emerging paradigm that collaborates heterogeneous edge devices as a resource pool to compute DNN inference tasks in proximity such as edge video analytics. Nevertheless, as the key knob to improve network utility in CEC, existing works mainly focus on the workload routing strategies among edge devices with the aim of minimizing the routing cost, remaining an open question for joint workload allocation and routing optimization problem from a system perspective. To this end, this paper presents a holistic, learned optimization for CEC towards maximizing the total network utility in an online manner, even though the utility functions of task input rates are unknown a priori. In particular, we characterize the CEC system in a flow model and formulate an online learning problem in a form of cross-layer optimization. We propose a nested-loop algorithm to solve workload allocation and distributed routing iteratively, using the tools of gradient sampling and online mirror descent. To improve the convergence rate over the nested-loop version, we further devise a single-loop algorithm. Rigorous analysis is provided to show its inherent convexity, efficient convergence, as well as algorithmic optimality. Finally, extensive numerical simulations demonstrate the superior performance of our solutions.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Using Large Language Models for Humanitarian Frontline Negotiation: Opportunities and Considerations
Authors:
Zilin Ma,
Susannah,
Su,
Nathan Zhao,
Linn Bieske,
Blake Bullwinkel,
Yanyi Zhang,
Sophia,
Yang,
Ziqing Luo,
Siyao Li,
Gekai Liao,
Boxiang Wang,
Jinglun Gao,
Zihan Wen,
Claude Bruderlein,
Weiwei Pan
Abstract:
Humanitarian negotiations in conflict zones, called \emph{frontline negotiation}, are often highly adversarial, complex, and high-risk. Several best-practices have emerged over the years that help negotiators extract insights from large datasets to navigate nuanced and rapidly evolving scenarios. Recent advances in large language models (LLMs) have sparked interest in the potential for AI to aid d…
▽ More
Humanitarian negotiations in conflict zones, called \emph{frontline negotiation}, are often highly adversarial, complex, and high-risk. Several best-practices have emerged over the years that help negotiators extract insights from large datasets to navigate nuanced and rapidly evolving scenarios. Recent advances in large language models (LLMs) have sparked interest in the potential for AI to aid decision making in frontline negotiation. Through in-depth interviews with 13 experienced frontline negotiators, we identified their needs for AI-assisted case analysis and creativity support, as well as concerns surrounding confidentiality and model bias. We further explored the potential for AI augmentation of three standard tools used in frontline negotiation planning. We evaluated the quality and stability of our ChatGPT-based negotiation tools in the context of two real cases. Our findings highlight the potential for LLMs to enhance humanitarian negotiations and underscore the need for careful ethical and practical considerations.
△ Less
Submitted 30 May, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
Age-minimal Multicast by Graph Attention Reinforcement Learning
Authors:
Yanning Zhang,
Guocheng Liao,
Shengbin Cao,
Ning Yang,
Meng Zhang
Abstract:
Age of Information (AoI) is an emerging metric used to assess the timeliness of information, gaining research interest in real-time multicast applications such as video streaming and metaverse platforms. In this paper, we consider a dynamic multicast network with energy constraints, where our objective is to minimize the expected time-average AoI through energy-constrained multicast routing and sc…
▽ More
Age of Information (AoI) is an emerging metric used to assess the timeliness of information, gaining research interest in real-time multicast applications such as video streaming and metaverse platforms. In this paper, we consider a dynamic multicast network with energy constraints, where our objective is to minimize the expected time-average AoI through energy-constrained multicast routing and scheduling. The inherent complexity of the problem, given the NP-hardness and intertwined scheduling and routing decisions, makes existing approaches inapplicable. To address these challenges, we decompose the original problem into two subtasks, each amenable to reinforcement learning (RL) methods. Subsequently, we propose an innovative framework based on graph attention networks (GATs) to effectively capture graph information with superior generalization capabilities. To validate our framework, we conduct experiments on three datasets including a real-world dataset called AS-733, and show that our proposed scheme reduces the average weighted AoI by 62.9% and reduces the energy consumption by at most 72.5% compared to baselines.
△ Less
Submitted 31 May, 2024; v1 submitted 28 April, 2024;
originally announced April 2024.
-
CLIP-GS: CLIP-Informed Gaussian Splatting for Real-time and View-consistent 3D Semantic Understanding
Authors:
Guibiao Liao,
Jiankun Li,
Zhenyu Bao,
Xiaoqing Ye,
Jingdong Wang,
Qing Li,
Kanglin Liu
Abstract:
The recent 3D Gaussian Splatting (GS) exhibits high-quality and real-time synthesis of novel views in 3D scenes. Currently, it primarily focuses on geometry and appearance modeling, while lacking the semantic understanding of scenes. To bridge this gap, we present CLIP-GS, which integrates semantics from Contrastive Language-Image Pre-Training (CLIP) into Gaussian Splatting to efficiently comprehe…
▽ More
The recent 3D Gaussian Splatting (GS) exhibits high-quality and real-time synthesis of novel views in 3D scenes. Currently, it primarily focuses on geometry and appearance modeling, while lacking the semantic understanding of scenes. To bridge this gap, we present CLIP-GS, which integrates semantics from Contrastive Language-Image Pre-Training (CLIP) into Gaussian Splatting to efficiently comprehend 3D environments without annotated semantic data. In specific, rather than straightforwardly learning and rendering high-dimensional semantic features of 3D Gaussians, which significantly diminishes the efficiency, we propose a Semantic Attribute Compactness (SAC) approach. SAC exploits the inherent unified semantics within objects to learn compact yet effective semantic representations of 3D Gaussians, enabling highly efficient rendering (>100 FPS). Additionally, to address the semantic ambiguity, caused by utilizing view-inconsistent 2D CLIP semantics to supervise Gaussians, we introduce a 3D Coherent Self-training (3DCS) strategy, resorting to the multi-view consistency originated from the 3D model. 3DCS imposes cross-view semantic consistency constraints by leveraging refined, self-predicted pseudo-labels derived from the trained 3D Gaussian model, thereby enhancing precise and view-consistent segmentation results. Extensive experiments demonstrate that our method remarkably outperforms existing state-of-the-art approaches, achieving improvements of 17.29% and 20.81% in mIoU metric on Replica and ScanNet datasets, respectively, while maintaining real-time rendering speed. Furthermore, our approach exhibits superior performance even with sparse input data, verifying the robustness of our method.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Bullion: A Column Store for Machine Learning
Authors:
Gang Liao,
Ye Liu,
Jianjun Chen,
Daniel J. Abadi
Abstract:
The past two decades have witnessed columnar storage revolutionizing data warehousing and analytics. However, the rapid growth of machine learning poses new challenges to this domain. This paper presents Bullion, a columnar storage system tailored for machine learning workloads. Bullion addresses the complexities of data compliance, optimizes the encoding of long sequence sparse features, efficien…
▽ More
The past two decades have witnessed columnar storage revolutionizing data warehousing and analytics. However, the rapid growth of machine learning poses new challenges to this domain. This paper presents Bullion, a columnar storage system tailored for machine learning workloads. Bullion addresses the complexities of data compliance, optimizes the encoding of long sequence sparse features, efficiently manages wide-table projections, and introduces feature quantization in storage. By aligning with the evolving requirements of ML applications, Bullion extends columnar storage to various scenarios, from advertising and recommendation systems to the expanding realm of Generative AI.
Preliminary experimental results and theoretical analysis demonstrate Bullion's superior performance in handling the unique demands of machine learning workloads compared to existing columnar storage solutions. Bullion significantly reduces I/O costs for deletion compliance, achieves substantial storage savings with its optimized encoding scheme for sparse features, and drastically improves metadata parsing speed for wide-table projections. These advancements position Bullion as a critical component in the future of machine learning infrastructure, enabling organizations to efficiently manage and process the massive volumes of data required for training and inference in modern AI applications.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
SFVInt: Simple, Fast and Generic Variable-Length Integer Decoding using Bit Manipulation Instructions
Authors:
Gang Liao,
Ye Liu,
Yonghua Ding,
Le Cai,
Jianjun Chen
Abstract:
The ubiquity of variable-length integers in data storage and communication necessitates efficient decoding techniques. In this paper, we present SFVInt, a simple and fast approach to decode the prevalent Little Endian Base-128 (LEB128) varints. Our approach effectively utilizes the Bit Manipulation Instruction Set 2 (BMI2) in modern Intel and AMD processors, achieving significant performance impro…
▽ More
The ubiquity of variable-length integers in data storage and communication necessitates efficient decoding techniques. In this paper, we present SFVInt, a simple and fast approach to decode the prevalent Little Endian Base-128 (LEB128) varints. Our approach effectively utilizes the Bit Manipulation Instruction Set 2 (BMI2) in modern Intel and AMD processors, achieving significant performance improvement while maintaining simplicity and avoiding overengineering. SFVInt, with its generic design, effectively processes both 32-bit and 64-bit unsigned integers using a unified code template, marking a significant leap forward in varint decoding efficiency. We thoroughly evaluate SFVInt's performance across various datasets and scenarios, demonstrating that it achieves up to a 2x increase in decoding speed when compared to varint decoding methods used in established frameworks like Facebook Folly and Google Protobuf.
△ Less
Submitted 7 June, 2024; v1 submitted 11 March, 2024;
originally announced March 2024.
-
OV-NeRF: Open-vocabulary Neural Radiance Fields with Vision and Language Foundation Models for 3D Semantic Understanding
Authors:
Guibiao Liao,
Kaichen Zhou,
Zhenyu Bao,
Kanglin Liu,
Qing Li
Abstract:
The development of Neural Radiance Fields (NeRFs) has provided a potent representation for encapsulating the geometric and appearance characteristics of 3D scenes. Enhancing the capabilities of NeRFs in open-vocabulary 3D semantic perception tasks has been a recent focus. However, current methods that extract semantics directly from Contrastive Language-Image Pretraining (CLIP) for semantic field…
▽ More
The development of Neural Radiance Fields (NeRFs) has provided a potent representation for encapsulating the geometric and appearance characteristics of 3D scenes. Enhancing the capabilities of NeRFs in open-vocabulary 3D semantic perception tasks has been a recent focus. However, current methods that extract semantics directly from Contrastive Language-Image Pretraining (CLIP) for semantic field learning encounter difficulties due to noisy and view-inconsistent semantics provided by CLIP. To tackle these limitations, we propose OV-NeRF, which exploits the potential of pre-trained vision and language foundation models to enhance semantic field learning through proposed single-view and cross-view strategies. First, from the single-view perspective, we introduce Region Semantic Ranking (RSR) regularization by leveraging 2D mask proposals derived from SAM to rectify the noisy semantics of each training view, facilitating accurate semantic field learning. Second, from the cross-view perspective, we propose a Cross-view Self-enhancement (CSE) strategy to address the challenge raised by view-inconsistent semantics. Rather than invariably utilizing the 2D inconsistent semantics from CLIP, CSE leverages the 3D consistent semantics generated from the well-trained semantic field itself for semantic field training, aiming to reduce ambiguity and enhance overall semantic consistency across different views. Extensive experiments validate our OV-NeRF outperforms current state-of-the-art methods, achieving a significant improvement of 20.31% and 18.42% in mIoU metric on Replica and Scannet, respectively. Furthermore, our approach exhibits consistent superior results across various CLIP configurations, further verifying its robustness.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
3D Reconstruction and New View Synthesis of Indoor Environments based on a Dual Neural Radiance Field
Authors:
Zhenyu Bao,
Guibiao Liao,
Zhongyuan Zhao,
Kanglin Liu,
Qing Li,
Guoping Qiu
Abstract:
Simultaneously achieving 3D reconstruction and new view synthesis for indoor environments has widespread applications but is technically very challenging. State-of-the-art methods based on implicit neural functions can achieve excellent 3D reconstruction results, but their performances on new view synthesis can be unsatisfactory. The exciting development of neural radiance field (NeRF) has revolut…
▽ More
Simultaneously achieving 3D reconstruction and new view synthesis for indoor environments has widespread applications but is technically very challenging. State-of-the-art methods based on implicit neural functions can achieve excellent 3D reconstruction results, but their performances on new view synthesis can be unsatisfactory. The exciting development of neural radiance field (NeRF) has revolutionized new view synthesis, however, NeRF-based models can fail to reconstruct clean geometric surfaces. We have developed a dual neural radiance field (Du-NeRF) to simultaneously achieve high-quality geometry reconstruction and view rendering. Du-NeRF contains two geometric fields, one derived from the SDF field to facilitate geometric reconstruction and the other derived from the density field to boost new view synthesis. One of the innovative features of Du-NeRF is that it decouples a view-independent component from the density field and uses it as a label to supervise the learning process of the SDF field. This reduces shape-radiance ambiguity and enables geometry and color to benefit from each other during the learning process. Extensive experiments demonstrate that Du-NeRF can significantly improve the performance of novel view synthesis and 3D reconstruction for indoor environments and it is particularly effective in constructing areas containing fine geometries that do not obey multi-view color consistency.
△ Less
Submitted 19 July, 2024; v1 submitted 26 January, 2024;
originally announced January 2024.
-
Flock: A Low-Cost Streaming Query Engine on FaaS Platforms
Authors:
Gang Liao,
Amol Deshpande,
Daniel J. Abadi
Abstract:
Existing serverless data analytics systems rely on external storage services like S3 for data shuffling and communication between cloud functions. While this approach provides the elasticity benefits of serverless computing, it incurs additional latency and cost overheads. We present Flock, a novel cloud-native streaming query engine that leverages the on-demand scalability of FaaS platforms for r…
▽ More
Existing serverless data analytics systems rely on external storage services like S3 for data shuffling and communication between cloud functions. While this approach provides the elasticity benefits of serverless computing, it incurs additional latency and cost overheads. We present Flock, a novel cloud-native streaming query engine that leverages the on-demand scalability of FaaS platforms for real-time data analytics. Flock utilizes function invocation payloads for efficient data exchange, eliminating the need for external storage. This not only reduces latency and cost but also simplifies the architecture by removing the requirement for a centralized coordinator. Flock employs a template-based approach to dynamically create cloud functions for each query stage and a function group mechanism for handling data aggregation and shuffling. It supports both SQL and DataFrame APIs, making it easy to use. Our evaluation shows that Flock provides significant performance gains and cost savings compared to existing serverless and serverful streaming systems. It outperforms Apache Flink by 10-20x in cost while achieving similar latency and throughput.
△ Less
Submitted 21 April, 2024; v1 submitted 27 December, 2023;
originally announced December 2023.
-
Ensemble Interpretation: A Unified Method for Interpretable Machine Learning
Authors:
Chao Min,
Guoyong Liao,
Guoquan Wen,
Yingjun Li,
Xing Guo
Abstract:
To address the issues of stability and fidelity in interpretable learning, a novel interpretable methodology, ensemble interpretation, is presented in this paper which integrates multi-perspective explanation of various interpretation methods. On one hand, we define a unified paradigm to describe the common mechanism of different interpretation methods, and then integrate the multiple interpretati…
▽ More
To address the issues of stability and fidelity in interpretable learning, a novel interpretable methodology, ensemble interpretation, is presented in this paper which integrates multi-perspective explanation of various interpretation methods. On one hand, we define a unified paradigm to describe the common mechanism of different interpretation methods, and then integrate the multiple interpretation results to achieve more stable explanation. On the other hand, a supervised evaluation method based on prior knowledge is proposed to evaluate the explaining performance of an interpretation method. The experiment results show that the ensemble interpretation is more stable and more consistent with human experience and cognition. As an application, we use the ensemble interpretation for feature selection, and then the generalization performance of the corresponding learning model is significantly improved.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative Inference Framework for Deep Learning Classification Tasks
Authors:
Jingyi Li,
Guocheng Liao,
Lin Chen,
Xu Chen
Abstract:
Deep learning classifiers are crucial in the age of artificial intelligence. The device-edge-based collaborative inference has been widely adopted as an efficient framework for promoting its applications in IoT and 5G/6G networks. However, it suffers from accuracy degradation under non-i.i.d. data distribution and privacy disclosure. For accuracy degradation, direct use of transfer learning and sp…
▽ More
Deep learning classifiers are crucial in the age of artificial intelligence. The device-edge-based collaborative inference has been widely adopted as an efficient framework for promoting its applications in IoT and 5G/6G networks. However, it suffers from accuracy degradation under non-i.i.d. data distribution and privacy disclosure. For accuracy degradation, direct use of transfer learning and split learning is high cost and privacy issues remain. For privacy disclosure, cryptography-based approaches lead to a huge overhead. Other lightweight methods assume that the ground truth is non-sensitive and can be exposed. But for many applications, the ground truth is the user's crucial privacy-sensitive information. In this paper, we propose a framework of Roulette, which is a task-oriented semantic privacy-preserving collaborative inference framework for deep learning classifiers. More than input data, we treat the ground truth of the data as private information. We develop a novel paradigm of split learning where the back-end DNN is frozen and the front-end DNN is retrained to be both a feature extractor and an encryptor. Moreover, we provide a differential privacy guarantee and analyze the hardness of ground truth inference attacks. To validate the proposed Roulette, we conduct extensive performance evaluations using realistic datasets, which demonstrate that Roulette can effectively defend against various attacks and meanwhile achieve good model accuracy. In a situation where the non-i.i.d. is very severe, Roulette improves the inference accuracy by 21\% averaged over benchmarks, while making the accuracy of discrimination attacks almost equivalent to random guessing.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
Integrity and Junkiness Failure Handling for Embedding-based Retrieval: A Case Study in Social Network Search
Authors:
Wenping Wang,
Yunxi Guo,
Chiyao Shen,
Shuai Ding,
Guangdeng Liao,
Hao Fu,
Pramodh Karanth Prabhakar
Abstract:
Embedding based retrieval has seen its usage in a variety of search applications like e-commerce, social networking search etc. While the approach has demonstrated its efficacy in tasks like semantic matching and contextual search, it is plagued by the problem of uncontrollable relevance. In this paper, we conduct an analysis of embedding-based retrieval launched in early 2021 on our social networ…
▽ More
Embedding based retrieval has seen its usage in a variety of search applications like e-commerce, social networking search etc. While the approach has demonstrated its efficacy in tasks like semantic matching and contextual search, it is plagued by the problem of uncontrollable relevance. In this paper, we conduct an analysis of embedding-based retrieval launched in early 2021 on our social network search engine, and define two main categories of failures introduced by it, integrity and junkiness. The former refers to issues such as hate speech and offensive content that can severely harm user experience, while the latter includes irrelevant results like fuzzy text matching or language mismatches. Efficient methods during model inference are further proposed to resolve the issue, including indexing treatments and targeted user cohort treatments, etc. Though being simple, we show the methods have good offline NDCG and online A/B tests metrics gain in practice. We analyze the reasons for the improvements, pointing out that our methods are only preliminary attempts to this important but challenging problem. We put forward potential future directions to explore.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
MDDL: A Framework for Reinforcement Learning-based Position Allocation in Multi-Channel Feed
Authors:
Xiaowen Shi,
Ze Wang,
Yuanying Cai,
Xiaoxu Wu,
Fan Yang,
Guogang Liao,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
Nowadays, the mainstream approach in position allocation system is to utilize a reinforcement learning model to allocate appropriate locations for items in various channels and then mix them into the feed. There are two types of data employed to train reinforcement learning (RL) model for position allocation, named strategy data and random data. Strategy data is collected from the current online m…
▽ More
Nowadays, the mainstream approach in position allocation system is to utilize a reinforcement learning model to allocate appropriate locations for items in various channels and then mix them into the feed. There are two types of data employed to train reinforcement learning (RL) model for position allocation, named strategy data and random data. Strategy data is collected from the current online model, it suffers from an imbalanced distribution of state-action pairs, resulting in severe overestimation problems during training. On the other hand, random data offers a more uniform distribution of state-action pairs, but is challenging to obtain in industrial scenarios as it could negatively impact platform revenue and user experience due to random exploration. As the two types of data have different distributions, designing an effective strategy to leverage both types of data to enhance the efficacy of the RL model training has become a highly challenging problem. In this study, we propose a framework named Multi-Distribution Data Learning (MDDL) to address the challenge of effectively utilizing both strategy and random data for training RL models on mixed multi-distribution data. Specifically, MDDL incorporates a novel imitation learning signal to mitigate overestimation problems in strategy data and maximizes the RL signal for random data to facilitate effective learning. In our experiments, we evaluated the proposed MDDL framework in a real-world position allocation system and demonstrated its superior performance compared to the previous baseline. MDDL has been fully deployed on the Meituan food delivery platform and currently serves over 300 million users.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
PIER: Permutation-Level Interest-Based End-to-End Re-ranking Framework in E-commerce
Authors:
Xiaowen Shi,
Fan Yang,
Ze Wang,
Xiaoxu Wu,
Muzhi Guan,
Guogang Liao,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
Re-ranking draws increased attention on both academics and industries, which rearranges the ranking list by modeling the mutual influence among items to better meet users' demands. Many existing re-ranking methods directly take the initial ranking list as input, and generate the optimal permutation through a well-designed context-wise model, which brings the evaluation-before-reranking problem. Me…
▽ More
Re-ranking draws increased attention on both academics and industries, which rearranges the ranking list by modeling the mutual influence among items to better meet users' demands. Many existing re-ranking methods directly take the initial ranking list as input, and generate the optimal permutation through a well-designed context-wise model, which brings the evaluation-before-reranking problem. Meanwhile, evaluating all candidate permutations brings unacceptable computational costs in practice. Thus, to better balance efficiency and effectiveness, online systems usually use a two-stage architecture which uses some heuristic methods such as beam-search to generate a suitable amount of candidate permutations firstly, which are then fed into the evaluation model to get the optimal permutation. However, existing methods in both stages can be improved through the following aspects. As for generation stage, heuristic methods only use point-wise prediction scores and lack an effective judgment. As for evaluation stage, most existing context-wise evaluation models only consider the item context and lack more fine-grained feature context modeling. This paper presents a novel end-to-end re-ranking framework named PIER to tackle the above challenges which still follows the two-stage architecture and contains two mainly modules named FPSM and OCPM. We apply SimHash in FPSM to select top-K candidates from the full permutation based on user's permutation-level interest in an efficient way. Then we design a novel omnidirectional attention mechanism in OCPM to capture the context information in the permutation. Finally, we jointly train these two modules end-to-end by introducing a comparative learning loss. Offline experiment results demonstrate that PIER outperforms baseline models on both public and industrial datasets, and we have successfully deployed PIER on Meituan food delivery platform.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
Hyper-Parameter Auto-Tuning for Sparse Bayesian Learning
Authors:
Dawei Gao,
Qinghua Guo,
Ming Jin,
Guisheng Liao,
Yonina C. Eldar
Abstract:
Choosing the values of hyper-parameters in sparse Bayesian learning (SBL) can significantly impact performance. However, the hyper-parameters are normally tuned manually, which is often a difficult task. Most recently, effective automatic hyper-parameter tuning was achieved by using an empirical auto-tuner. In this work, we address the issue of hyper-parameter auto-tuning using neural network (NN)…
▽ More
Choosing the values of hyper-parameters in sparse Bayesian learning (SBL) can significantly impact performance. However, the hyper-parameters are normally tuned manually, which is often a difficult task. Most recently, effective automatic hyper-parameter tuning was achieved by using an empirical auto-tuner. In this work, we address the issue of hyper-parameter auto-tuning using neural network (NN)-based learning. Inspired by the empirical auto-tuner, we design and learn a NN-based auto-tuner, and show that considerable improvement in convergence rate and recovery performance can be achieved.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Signal Detection in MIMO Systems with Hardware Imperfections: Message Passing on Neural Networks
Authors:
Dawei Gao,
Qinghua Guo,
Guisheng Liao,
Yonina C. Eldar,
Yonghui Li,
Yanguang Yu,
Branka Vucetic
Abstract:
In this paper, we investigate signal detection in multiple-input-multiple-output (MIMO) communication systems with hardware impairments, such as power amplifier nonlinearity and in-phase/quadrature imbalance. To deal with the complex combined effects of hardware imperfections, neural network (NN) techniques, in particular deep neural networks (DNNs), have been studied to directly compensate for th…
▽ More
In this paper, we investigate signal detection in multiple-input-multiple-output (MIMO) communication systems with hardware impairments, such as power amplifier nonlinearity and in-phase/quadrature imbalance. To deal with the complex combined effects of hardware imperfections, neural network (NN) techniques, in particular deep neural networks (DNNs), have been studied to directly compensate for the impact of hardware impairments. However, it is difficult to train a DNN with limited pilot signals, hindering its practical applications. In this work, we investigate how to achieve efficient Bayesian signal detection in MIMO systems with hardware imperfections. Characterizing combined hardware imperfections often leads to complicated signal models, making Bayesian signal detection challenging. To address this issue, we first train an NN to "model" the MIMO system with hardware imperfections and then perform Bayesian inference based on the trained NN. Modelling the MIMO system with NN enables the design of NN architectures based on the signal flow of the MIMO system, minimizing the number of NN layers and parameters, which is crucial to achieving efficient training with limited pilot signals. We then represent the trained NN with a factor graph, and design an efficient message passing based Bayesian signal detector, leveraging the unitary approximate message passing (UAMP) algorithm. The implementation of a turbo receiver with the proposed Bayesian detector is also investigated. Extensive simulation results demonstrate that the proposed technique delivers remarkably better performance than state-of-the-art methods.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
Recent insights on the Uniqueness Problem of Diffeomorphisms determined by Prescribed Jacobian Determinant and Curl
Authors:
Zicong Zhou,
Guojun Liao
Abstract:
Variational Principle (VP) forms diffeomorphisms with prescribed Jacobian determinant (JD) and curl. Examples demonstrate that, (i) JD alone can not uniquely determine a diffeomorphism without curl; and (ii) the solutions by VP seem to satisfy properties of a Lie group. Hence, it is conjectured that a unique diffeomorphism can be assured by its JD and curl (Uniqueness Conjecture). In this paper, (…
▽ More
Variational Principle (VP) forms diffeomorphisms with prescribed Jacobian determinant (JD) and curl. Examples demonstrate that, (i) JD alone can not uniquely determine a diffeomorphism without curl; and (ii) the solutions by VP seem to satisfy properties of a Lie group. Hence, it is conjectured that a unique diffeomorphism can be assured by its JD and curl (Uniqueness Conjecture). In this paper, (1) an observation based on VP is derived that a counter example to the Conjecture, if exists, should satisfy a particular property; (2) from the observation, an experimental strategy is formulated to numerically test whether a given diffeomorphism is a valid counter example to the conjecture; (3) a proof of an intermediate step to the conjecture is provided and referred to as the semi-general case, which argues that, given two diffeomorphisms, $\pmbφ$ and $\pmbψ$, if they are close to the identity map, $\pmb{id}$, then $\pmbφ$ is identical $\pmbψ$.
△ Less
Submitted 13 August, 2022; v1 submitted 26 July, 2022;
originally announced July 2022.
-
NMA: Neural Multi-slot Auctions with Externalities for Online Advertising
Authors:
Guogang Liao,
Xuejian Li,
Ze Wang,
Fan Yang,
Muzhi Guan,
Bingqi Zhu,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
Online advertising driven by auctions brings billions of dollars in revenue for social networking services and e-commerce platforms. GSP auctions, which are simple and easy to understand for advertisers, have almost become the benchmark for ad auction mechanisms in the industry. However, most GSP-based industrial practices assume that the user click only relies on the ad itself, which overlook the…
▽ More
Online advertising driven by auctions brings billions of dollars in revenue for social networking services and e-commerce platforms. GSP auctions, which are simple and easy to understand for advertisers, have almost become the benchmark for ad auction mechanisms in the industry. However, most GSP-based industrial practices assume that the user click only relies on the ad itself, which overlook the effect of external items, referred to as externalities. Recently, DNA has attempted to upgrade GSP with deep neural networks and models local externalities to some extent. However, it only considers set-level contexts from auctions and ignores the order and displayed position of ads, which is still suboptimal. Although VCG-based multi-slot auctions (e.g., VCG, WVCG) make it theoretically possible to model global externalities (e.g., the order and positions of ads and so on), they lack an efficient balance of both revenue and social welfare. In this paper, we propose novel auction mechanisms named Neural Multi-slot Auctions (NMA) to tackle the above-mentioned challenges. Specifically, we model the global externalities effectively with a context-aware list-wise prediction module to achieve better performance. We design a list-wise deep rank module to guarantee incentive compatibility in end-to-end learning. Furthermore, we propose an auxiliary loss for social welfare to effectively reduce the decline of social welfare while maximizing revenue. Experiment results on both offline large-scale datasets and online A/B tests demonstrate that NMA obtains higher revenue with balanced social welfare than other existing auction mechanisms (i.e., GSP, DNA, WVCG) in industrial practice, and we have successfully deployed NMA on Meituan food delivery platform.
△ Less
Submitted 8 September, 2023; v1 submitted 20 May, 2022;
originally announced May 2022.
-
Hybrid Transfer in Deep Reinforcement Learning for Ads Allocation
Authors:
Ze Wang,
Guogang Liao,
Xiaowen Shi,
Xiaoxu Wu,
Chuheng Zhang,
Bingqi Zhu,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
Ads allocation, which involves allocating ads and organic items to limited slots in feed with the purpose of maximizing platform revenue, has become a research hotspot. Notice that, e-commerce platforms usually have multiple entrances for different categories and some entrances have few visits. Data from these entrances has low coverage, which makes it difficult for the agent to learn. To address…
▽ More
Ads allocation, which involves allocating ads and organic items to limited slots in feed with the purpose of maximizing platform revenue, has become a research hotspot. Notice that, e-commerce platforms usually have multiple entrances for different categories and some entrances have few visits. Data from these entrances has low coverage, which makes it difficult for the agent to learn. To address this challenge, we propose Similarity-based Hybrid Transfer for Ads Allocation (SHTAA), which effectively transfers samples as well as knowledge from data-rich entrance to data-poor entrance. Specifically, we define an uncertainty-aware similarity for MDP to estimate the similarity of MDP for different entrances. Based on this similarity, we design a hybrid transfer method, including instance transfer and strategy transfer, to efficiently transfer samples and knowledge from one entrance to another. Both offline and online experiments on Meituan food delivery platform demonstrate that the proposed method could achieve better performance for data-poor entrance and increase the revenue for the platform.
△ Less
Submitted 11 August, 2022; v1 submitted 2 April, 2022;
originally announced April 2022.
-
Learning List-wise Representation in Reinforcement Learning for Ads Allocation with Multiple Auxiliary Tasks
Authors:
Ze Wang,
Guogang Liao,
Xiaowen Shi,
Xiaoxu Wu,
Chuheng Zhang,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
With the recent prevalence of reinforcement learning (RL), there have been tremendous interests in utilizing RL for ads allocation in recommendation platforms (e.g., e-commerce and news feed sites). To achieve better allocation, the input of recent RL-based ads allocation methods is upgraded from point-wise single item to list-wise item arrangement. However, this also results in a high-dimensional…
▽ More
With the recent prevalence of reinforcement learning (RL), there have been tremendous interests in utilizing RL for ads allocation in recommendation platforms (e.g., e-commerce and news feed sites). To achieve better allocation, the input of recent RL-based ads allocation methods is upgraded from point-wise single item to list-wise item arrangement. However, this also results in a high-dimensional space of state-action pairs, making it difficult to learn list-wise representations with good generalization ability. This further hinders the exploration of RL agents and causes poor sample efficiency. To address this problem, we propose a novel RL-based approach for ads allocation which learns better list-wise representations by leveraging task-specific signals on Meituan food delivery platform. Specifically, we propose three different auxiliary tasks based on reconstruction, prediction, and contrastive learning respectively according to prior domain knowledge on ads allocation. We conduct extensive experiments on Meituan food delivery platform to evaluate the effectiveness of the proposed auxiliary tasks. Both offline and online experimental results show that the proposed method can learn better list-wise representations and achieve higher revenue for the platform compared to the state-of-the-art baselines.
△ Less
Submitted 11 August, 2022; v1 submitted 2 April, 2022;
originally announced April 2022.
-
Deep Page-Level Interest Network in Reinforcement Learning for Ads Allocation
Authors:
Guogang Liao,
Xiaowen Shi,
Ze Wang,
Xiaoxu Wu,
Chuheng Zhang,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
A mixed list of ads and organic items is usually displayed in feed and how to allocate the limited slots to maximize the overall revenue is a key problem. Meanwhile, modeling user preference with historical behavior is essential in recommendation and advertising (e.g., CTR prediction and ads allocation). Most previous works for user behavior modeling only model user's historical point-level positi…
▽ More
A mixed list of ads and organic items is usually displayed in feed and how to allocate the limited slots to maximize the overall revenue is a key problem. Meanwhile, modeling user preference with historical behavior is essential in recommendation and advertising (e.g., CTR prediction and ads allocation). Most previous works for user behavior modeling only model user's historical point-level positive feedback (i.e., click), which neglect the page-level information of feedback and other types of feedback. To this end, we propose Deep Page-level Interest Network (DPIN) to model the page-level user preference and exploit multiple types of feedback. Specifically, we introduce four different types of page-level feedback as input, and capture user preference for item arrangement under different receptive fields through the multi-channel interaction module. Through extensive offline and online experiments on Meituan food delivery platform, we demonstrate that DPIN can effectively model the page-level user preference and increase the revenue for the platform.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Cross DQN: Cross Deep Q Network for Ads Allocation in Feed
Authors:
Guogang Liao,
Ze Wang,
Xiaoxu Wu,
Xiaowen Shi,
Chuheng Zhang,
Yongkang Wang,
Xingxing Wang,
Dong Wang
Abstract:
E-commerce platforms usually display a mixed list of ads and organic items in feed. One key problem is to allocate the limited slots in the feed to maximize the overall revenue as well as improve user experience, which requires a good model for user preference. Instead of modeling the influence of individual items on user behaviors, the arrangement signal models the influence of the arrangement of…
▽ More
E-commerce platforms usually display a mixed list of ads and organic items in feed. One key problem is to allocate the limited slots in the feed to maximize the overall revenue as well as improve user experience, which requires a good model for user preference. Instead of modeling the influence of individual items on user behaviors, the arrangement signal models the influence of the arrangement of items and may lead to a better allocation strategy. However, most of previous strategies fail to model such a signal and therefore result in suboptimal performance. In addition, the percentage of ads exposed (PAE) is an important indicator in ads allocation. Excessive PAE hurts user experience while too low PAE reduces platform revenue. Therefore, how to constrain the PAE within a certain range while keeping personalized recommendation under the PAE constraint is a challenge. In this paper, we propose Cross Deep Q Network (Cross DQN) to extract the crucial arrangement signal by crossing the embeddings of different items and modeling the crossed sequence by multi-channel attention. Besides, we propose an auxiliary loss for batch-level constraint on PAE to tackle the above-mentioned challenge. Our model results in higher revenue and better user experience than state-of-the-art baselines in offline experiments. Moreover, our model demonstrates a significant improvement in the online A/B test and has been fully deployed on Meituan feed to serve more than 300 millions of customers.
△ Less
Submitted 20 May, 2022; v1 submitted 9 September, 2021;
originally announced September 2021.
-
The Privacy Paradox and Optimal Bias-Variance Trade-offs in Data Acquisition
Authors:
Guocheng Liao,
Yu Su,
Juba Ziani,
Adam Wierman,
Jianwei Huang
Abstract:
While users claim to be concerned about privacy, often they do little to protect their privacy in their online actions. One prominent explanation for this "privacy paradox" is that when an individual shares her data, it is not just her privacy that is compromised; the privacy of other individuals with correlated data is also compromised. This information leakage encourages oversharing of data and…
▽ More
While users claim to be concerned about privacy, often they do little to protect their privacy in their online actions. One prominent explanation for this "privacy paradox" is that when an individual shares her data, it is not just her privacy that is compromised; the privacy of other individuals with correlated data is also compromised. This information leakage encourages oversharing of data and significantly impacts the incentives of individuals in online platforms. In this paper, we study the design of mechanisms for data acquisition in settings with information leakage and verifiable data. We design an incentive compatible mechanism that optimizes the worst-case trade-off between bias and variance of the estimation subject to a budget constraint, where the worst-case is over the unknown correlation between costs and data. Additionally, we characterize the structure of the optimal mechanism in closed form and study monotonicity and non-monotonicity properties of the marketplace.
△ Less
Submitted 29 May, 2021;
originally announced May 2021.
-
Super-resolving Compressed Images via Parallel and Series Integration of Artifact Reduction and Resolution Enhancement
Authors:
Hongming Luo,
Fei Zhou,
Guangsen Liao,
Guoping Qiu
Abstract:
In real-world applications, such as sharing photos on social media platforms, images are always not only sub-sampled but also heavily compressed thus often containing various artefacts. Simple methods for enhancing the resolution of such images will exacerbate the artefacts, rendering them visually objectionable. In spite of its high practical values, super-resolving compressed images is not well…
▽ More
In real-world applications, such as sharing photos on social media platforms, images are always not only sub-sampled but also heavily compressed thus often containing various artefacts. Simple methods for enhancing the resolution of such images will exacerbate the artefacts, rendering them visually objectionable. In spite of its high practical values, super-resolving compressed images is not well studied in the literature. In this paper, we propose a novel compressed image super resolution (CISR) framework based on parallel and series integration of artefacts removal and resolution enhancement. Based on a mathematical inference model for estimating a clean low-resolution (LR) image and a clean high-resolution (HR) image from a down-sampled and compressed observation, we have designed a CISR architecture consisting of two deep neural network modules: the artefacts removal module (ARM) and the resolution enhancement module (REM). The ARM and the REM work in parallel with both taking the compressed LR image as their inputs, at the same time they also work in series with the REM taking the output of the ARM as one of its inputs and the ARM taking the output of the REM as its other input. A technique called unfolding is introduced to recursively suppress the compression artefacts and restore the image resolution. A unique feature of our CISR system is that it exploits the parallel and series connections between the ARM and the REM, and recursive optimization to reduce the model's dependency on specific types of degradation thus making it possible to train a single model to super-resolve images compressed by different methods to different qualities. Codes and datasets are available at https://github.com/luohongming/CISR_PSI.git
△ Less
Submitted 21 November, 2022; v1 submitted 2 March, 2021;
originally announced March 2021.
-
VHS to HDTV Video Translation using Multi-task Adversarial Learning
Authors:
Hongming Luo,
Guangsen Liao,
Xianxu Hou,
Bozhi Liu,
Fei Zhou,
Guoping Qiu
Abstract:
There are large amount of valuable video archives in Video Home System (VHS) format. However, due to the analog nature, their quality is often poor. Compared to High-definition television (HDTV), VHS video not only has a dull color appearance but also has a lower resolution and often appears blurry. In this paper, we focus on the problem of translating VHS video to HDTV video and have developed a…
▽ More
There are large amount of valuable video archives in Video Home System (VHS) format. However, due to the analog nature, their quality is often poor. Compared to High-definition television (HDTV), VHS video not only has a dull color appearance but also has a lower resolution and often appears blurry. In this paper, we focus on the problem of translating VHS video to HDTV video and have developed a solution based on a novel unsupervised multi-task adversarial learning model. Inspired by the success of generative adversarial network (GAN) and CycleGAN, we employ cycle consistency loss, adversarial loss and perceptual loss together to learn a translation model. An important innovation of our work is the incorporation of super-resolution model and color transfer model that can solve unsupervised multi-task problem. To our knowledge, this is the first work that dedicated to the study of the relation between VHS and HDTV and the first computational solution to translate VHS to HDTV. We present experimental results to demonstrate the effectiveness of our solution qualitatively and quantitatively.
△ Less
Submitted 7 January, 2021;
originally announced January 2021.
-
An Intelligent Group Event Recommendation System in Social networks
Authors:
Guoqiong Liao,
Xiaomei Huang,
Neal N. Xiong,
Changxuan Wan
Abstract:
The importance of contexts has been widely recognized in recommender systems for individuals. However, most existing group recommendation models in Event-Based Social Networks (EBSNs) focus on how to aggregate group members' preferences to form group preferences. In these models, the influence of contexts on groups is considered but simply defined in a manual way, which cannot model the complex an…
▽ More
The importance of contexts has been widely recognized in recommender systems for individuals. However, most existing group recommendation models in Event-Based Social Networks (EBSNs) focus on how to aggregate group members' preferences to form group preferences. In these models, the influence of contexts on groups is considered but simply defined in a manual way, which cannot model the complex and deep interactions between contexts and groups. In this paper, we propose an Attention-based Context-aware Group Event Recommendation model (ACGER) in EBSNs. ACGER models the deep, non-linear influence of contexts on users, groups, and events through multi-layer neural networks. Especially, a novel attention mechanism is designed to enable the influence weights of contexts on users/groups change dynamically with the events concerned. Considering that groups may have completely different behavior patterns from group members, we propose that the preference of a group need to be obtained from indirect and direct perspectives (called indirect preference and direct preference respectively). In order to obtain the indirect preference, we propose a method of aggregating preferences based on attention mechanism. Compared with existing predefined strategies, this method can flexibly adapt the strategy according to the events concerned by the group. In order to obtain the direct preference, we employ neural networks to directly learn it from group-event interactions. Furthermore, to make full use of rich user-event interactions in EBSNs, we integrate the context-aware individual recommendation task into ACGER, which enhances the accuracy of learning of user embeddings and event embeddings. Extensive experiments on two real datasets from Meetup show that our model ACGER significantly outperforms the state-of-the-art models.
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Authors:
Guangxia Lia,
Yulong Shena,
Peilin Zhaob,
Xiao Lu,
Jia Liu,
Yangyang Liu,
Steven C. H. Hoi
Abstract:
Industrial control systems are critical to the operation of industrial facilities, especially for critical infrastructures, such as refineries, power grids, and transportation systems. Similar to other information systems, a significant threat to industrial control systems is the attack from cyberspace---the offensive maneuvers launched by "anonymous" in the digital world that target computer-base…
▽ More
Industrial control systems are critical to the operation of industrial facilities, especially for critical infrastructures, such as refineries, power grids, and transportation systems. Similar to other information systems, a significant threat to industrial control systems is the attack from cyberspace---the offensive maneuvers launched by "anonymous" in the digital world that target computer-based assets with the goal of compromising a system's functions or probing for information. Owing to the importance of industrial control systems, and the possibly devastating consequences of being attacked, significant endeavors have been attempted to secure industrial control systems from cyberattacks. Among them are intrusion detection systems that serve as the first line of defense by monitoring and reporting potentially malicious activities. Classical machine-learning-based intrusion detection methods usually generate prediction models by learning modest-sized training samples all at once. Such approach is not always applicable to industrial control systems, as industrial control systems must process continuous control commands with limited computational resources in a nonstop way. To satisfy such requirements, we propose using online learning to learn prediction models from the controlling data stream. We introduce several state-of-the-art online learning algorithms categorically, and illustrate their efficacies on two typically used testbeds---power system and gas pipeline. Further, we explore a new cost-sensitive online learning algorithm to solve the class-imbalance problem that is pervasive in industrial intrusion detection systems. Our experimental results indicate that the proposed algorithm can achieve an overall improvement in the detection rate of cyberattacks in industrial control systems.
△ Less
Submitted 7 December, 2019;
originally announced December 2019.
-
Prospect Theoretic Analysis of Privacy-Preserving Mechanism
Authors:
Guocheng Liao,
Xu Chen,
Jianwei Huang
Abstract:
We study a problem of privacy-preserving mechanism design. A data collector wants to obtain data from individuals to perform some computations. To relieve the privacy threat to the contributors, the data collector adopts a privacy-preserving mechanism by adding random noise to the computation result, at the cost of reduced accuracy. Individuals decide whether to contribute data when faced with the…
▽ More
We study a problem of privacy-preserving mechanism design. A data collector wants to obtain data from individuals to perform some computations. To relieve the privacy threat to the contributors, the data collector adopts a privacy-preserving mechanism by adding random noise to the computation result, at the cost of reduced accuracy. Individuals decide whether to contribute data when faced with the privacy issue. Due to the intrinsic uncertainty in privacy protection, we model individuals' privacy-related decision using Prospect Theory. Such a theory more accurately models individuals' behavior under uncertainty than the traditional expected utility theory, whose prediction always deviates from practical human behavior. We show that the data collector's utility maximization problem involves a polynomial of high and fractional order, the root of which is difficult to compute analytically. We get around this issue by considering a large population approximation, and obtain a closed-form solution that well approximates the precise solution. We discover that the data collector who considers the more realistic Prospect Theory based individual decision modeling would adopt a more conservative privacy-preserving mechanism, compared with the case based on the expected utility theory modeling. We also study the impact of Prospect Theory parameters, and concludes that more loss-averse or risk-seeking individuals will trigger a more conservative mechanism. When individuals have different Prospect Theory parameters, simulations demonstrate that the privacy protection first becomes stronger and then becomes weaker as the heterogeneity increases from a low value to a high one.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Model-aided Deep Neural Network for Source Number Detection
Authors:
Yuwen Yang,
Feifei Gao,
Cheng Qian,
Guisheng Liao
Abstract:
Source number detection is a critical problem in array signal processing. Conventional model-driven methods e.g., Akaikes information criterion (AIC) and minimum description length (MDL), suffer from severe performance degradation when the number of snapshots is small or the signal-to-noise ratio (SNR) is low. In this paper, we exploit the model-aided based deep neural network (DNN) to estimate th…
▽ More
Source number detection is a critical problem in array signal processing. Conventional model-driven methods e.g., Akaikes information criterion (AIC) and minimum description length (MDL), suffer from severe performance degradation when the number of snapshots is small or the signal-to-noise ratio (SNR) is low. In this paper, we exploit the model-aided based deep neural network (DNN) to estimate the source number. Specifically, we first propose the eigenvalue based regression network (ERNet) and classification network (ECNet) to estimate the number of non-coherent sources, where the eigenvalues of the received signal covariance matrix and the source number are used as the input and the supervise label of the networks, respectively. Then, we extend the ERNet and ECNet for estimating the number of coherent sources, where the forward-backward spatial smoothing (FBSS) scheme is adopted to improve the performance of ERNet and ECNet. Numerical results demonstrate the outstanding performance of ERNet and ECNet over the conventional AIC and MDL methods as well as their excellent generalization capability, which also shows their great potentials for practical applications.
△ Less
Submitted 3 October, 2019; v1 submitted 29 September, 2019;
originally announced September 2019.
-
Deformable Registration Using Average Geometric Transformations for Brain MR Images
Authors:
Yongpei Zhu,
Zicong Zhou,
Guojun Liao,
Kehong Yuan
Abstract:
Accurate registration of medical images is vital for doctor's diagnosis and quantitative analysis. In this paper, we propose a new deformable medical image registration method based on average geometric transformations and VoxelMorph CNN architecture. We compute the differential geometric information including Jacobian determinant(JD) and the curl vector(CV) of diffeomorphic registration field and…
▽ More
Accurate registration of medical images is vital for doctor's diagnosis and quantitative analysis. In this paper, we propose a new deformable medical image registration method based on average geometric transformations and VoxelMorph CNN architecture. We compute the differential geometric information including Jacobian determinant(JD) and the curl vector(CV) of diffeomorphic registration field and use them as multi-channel of VoxelMorph CNN for second train. In addition, we use the average transformation to construct a standard brain MRI atlas which can be used as fixed image. We verify our method on two datasets including ADNI dataset and MRBrainS18 Challenge dataset, and obtain excellent improvement on MR image registration with average Dice scores and non-negative Jacobian locations compared with MIT's original method. The experimental results show the method can achieve better performance in brain MRI diagnosis.
△ Less
Submitted 22 July, 2019;
originally announced July 2019.
-
Multi-Block Grid deformation Method in 3D
Authors:
Guojun G Liao,
Jie Liu
Abstract:
Multi-block grids provide the computational efficiency of structured grids and the flexibility for complex geometry. Thus, Multi-block structured grids are widely used for field simulation on complex domains. In this paper we propose a method which adapts multi-block grids according to a monitor function, which specifies cell volume distribution. The method is an extension of the deformation metho…
▽ More
Multi-block grids provide the computational efficiency of structured grids and the flexibility for complex geometry. Thus, Multi-block structured grids are widely used for field simulation on complex domains. In this paper we propose a method which adapts multi-block grids according to a monitor function, which specifies cell volume distribution. The method is an extension of the deformation method on a single block to multi-blocks.
Key words: multi-block grids, deformation method, adaptive grids
△ Less
Submitted 21 November, 2018;
originally announced November 2018.
-
The Method of Multimodal MRI Brain Image Segmentation Based on Differential Geometric Features
Authors:
Yongpei Zhu,
Zicong Zhou,
Guojun Liao,
Qianxi Yang,
Kehong Yuan
Abstract:
Accurate segmentation of brain tissue in magnetic resonance images (MRI) is a diffcult task due to different types of brain abnormalities. Using information and features from multimodal MRI including T1, T1-weighted inversion recovery (T1-IR) and T2-FLAIR and differential geometric features including the Jacobian determinant(JD) and the curl vector(CV) derived from T1 modality can result in a more…
▽ More
Accurate segmentation of brain tissue in magnetic resonance images (MRI) is a diffcult task due to different types of brain abnormalities. Using information and features from multimodal MRI including T1, T1-weighted inversion recovery (T1-IR) and T2-FLAIR and differential geometric features including the Jacobian determinant(JD) and the curl vector(CV) derived from T1 modality can result in a more accurate analysis of brain images. In this paper, we use the differential geometric information including JD and CV as image characteristics to measure the differences between different MRI images, which represent local size changes and local rotations of the brain image, and we can use them as one CNN channel with other three modalities (T1-weighted, T1-IR and T2-FLAIR) to get more accurate results of brain segmentation. We test this method on two datasets including IBSR dataset and MRBrainS datasets based on the deep voxelwise residual network, namely VoxResNet, and obtain excellent improvement over single modality or three modalities and increases average DSC(Cerebrospinal Fluid (CSF), Gray Matter (GM) and White Matter (WM)) by about 1.5% on the well-known MRBrainS18 dataset and about 2.5% on the IBSR dataset. Moreover, we discuss that one modality combined with its JD or CV information can replace the segmentation effect of three modalities, which can provide medical conveniences for doctor to diagnose because only to extract T1-modality MRI image of patients. Finally, we also compare the segmentation performance of our method in two networks, VoxResNet and U-Net network. The results show VoxResNet has a better performance than U-Net network with our method in brain MRI segmentation. We believe the proposed method can advance the performance in brain segmentation and clinical diagnosis.
△ Less
Submitted 6 March, 2019; v1 submitted 10 November, 2018;
originally announced November 2018.
-
Computational Technologies for Brain Morphometry
Authors:
Zicong Zhou,
Ben Hildebrandt,
Xi Chen,
Guojun Liao
Abstract:
In this paper, we described a set of computational technologies for image analysis with applications in Brain Morphometry. The proposed technologies are based on a new Variational Principle which constructs a transformation with prescribed Jacobian determinant (which models local size changes) and prescribed curl-vector (which models local rotations). The goal of this research is to convince the i…
▽ More
In this paper, we described a set of computational technologies for image analysis with applications in Brain Morphometry. The proposed technologies are based on a new Variational Principle which constructs a transformation with prescribed Jacobian determinant (which models local size changes) and prescribed curl-vector (which models local rotations). The goal of this research is to convince the image research community that Jacobian determinant as well as curl-vector should be used in all steps of image analysis. Specifically, we develop an optimal control method for non-rigid registration; a new concept and construction of average transformation; and a general robust method for construction of unbiased template from a set of images. Computational examples are presented to show the effects of curl-vector and the effectiveness of optimal control methods for non-rigid registration and our method for construction of unbiased template.
△ Less
Submitted 29 October, 2018; v1 submitted 10 October, 2018;
originally announced October 2018.
-
Uniqueness of Transformation based on Jacobian Determinant and curl-Vector
Authors:
Zicong Zhou,
Xi Chen,
Xian Xin Cai,
Guojun Liao
Abstract:
Numerical examples demonstrated that a prescribed positive Jacobian determinant alone can not uniquely determine a diffeomorphism. It is conjectured that the uniqueness of a transformation can be assured by its Jacobian determinant and the curl-vector. In this work, we study the uniqueness problem analytically and propose an approach to the proof of the uniqueness of a transformation with prescrib…
▽ More
Numerical examples demonstrated that a prescribed positive Jacobian determinant alone can not uniquely determine a diffeomorphism. It is conjectured that the uniqueness of a transformation can be assured by its Jacobian determinant and the curl-vector. In this work, we study the uniqueness problem analytically and propose an approach to the proof of the uniqueness of a transformation with prescribed Jacobian determinant and curl-vector.
△ Less
Submitted 29 October, 2018; v1 submitted 9 December, 2017;
originally announced December 2017.
-
A Novel Deformation Method for Higher Order Mesh Generation
Authors:
Zicong Zhou,
Xi Chen,
Guojun Liao
Abstract:
The development of higher order finite elements methods has become an active research area. The deformation method for mesh generation has achieved a prescribed positive Jacobian determinant constraint and it has been a useful method for mesh adaptation. In this work, the deformation method is combined with local refinement to generate higher order meshes. 2D and 3D numerical examples of element o…
▽ More
The development of higher order finite elements methods has become an active research area. The deformation method for mesh generation has achieved a prescribed positive Jacobian determinant constraint and it has been a useful method for mesh adaptation. In this work, the deformation method is combined with local refinement to generate higher order meshes. 2D and 3D numerical examples of element order p=3 are shown to demonstrate the effectiveness of our new algorithm.
△ Less
Submitted 1 October, 2017;
originally announced October 2017.
-
New method of averaging diffeomorphisms based on Jacobian determinant and curl vector
Authors:
Xi Chen,
Guojun Liao
Abstract:
Averaging diffeomorphisms is a challenging problem, and it has great applications in areas like medical image atlases. The simple Euclidean average can neither guarantee the averaged transformation is a diffeomorphism, nor get reasonable result when there is a local rotation. The goal of this paper is to propose a new approach to averaging diffeomorphisms based on the Jacobian determinant and the…
▽ More
Averaging diffeomorphisms is a challenging problem, and it has great applications in areas like medical image atlases. The simple Euclidean average can neither guarantee the averaged transformation is a diffeomorphism, nor get reasonable result when there is a local rotation. The goal of this paper is to propose a new approach to averaging diffeomorphisms based on the Jacobian determinant and the curl vector of the diffeomorphisms. Instead of averaging the diffeomorphisms directly, we average the Jacobian determinants and the curl vectors, and then construct a diffeomorphism based on the averaged Jacobian determinant and averaged curl vector as the average of diffeomorphisms. Numerical examples with convincible results are presented to demonstrate the method.
△ Less
Submitted 11 November, 2016;
originally announced November 2016.
-
New Variational Method of Grid Generation with Prescribed Jacobian Determinant and Prescribed Curl
Authors:
Xi Chen,
Guojun Liao
Abstract:
Adaptive grid generation is an active research topic for numer- ical solution of differential equations. In this paper, we propose a variational method which generates transformations with prescribed Jacobian determinant and curl. Then we use this transformation to achieve adaptive grid generation task, and show the importance of curl in a transformation.
Adaptive grid generation is an active research topic for numer- ical solution of differential equations. In this paper, we propose a variational method which generates transformations with prescribed Jacobian determinant and curl. Then we use this transformation to achieve adaptive grid generation task, and show the importance of curl in a transformation.
△ Less
Submitted 14 July, 2015;
originally announced July 2015.
-
A New Method for Triangular Mesh Generation
Authors:
Guojun G Liao,
Xi Chen,
Xianxin Cai,
Ben Hildebrand,
Dion Fleitas
Abstract:
Computational mathematics plays an increasingly important role in computational fluid dynamics (CFD). The aeronautics and aerospace re- search community is working on next generation of CFD capacity that is accurate, automatic, and fast. A key component of the next generation of CFD is a greatly enhanced capacity for mesh generation and adaptivity of the mesh according to solution and geometry. In…
▽ More
Computational mathematics plays an increasingly important role in computational fluid dynamics (CFD). The aeronautics and aerospace re- search community is working on next generation of CFD capacity that is accurate, automatic, and fast. A key component of the next generation of CFD is a greatly enhanced capacity for mesh generation and adaptivity of the mesh according to solution and geometry. In this paper, we propose a new method that generates triangular meshes on domains of curved boundary. The method deforms a Cartesian mesh that covers the domain to generate a mesh with prescribed boundary nodes. The deformation fields are generated by a system of divergence and curl equations which are solved effectively by the least square finite element method.
△ Less
Submitted 13 July, 2015;
originally announced July 2015.
-
Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks
Authors:
Guoqiong Liao,
Yuchen Zhao,
Sihong Xie,
Philip S. Yu
Abstract:
With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The prim…
▽ More
With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph to infer event attendance probabilities for recommendation. Experiments on an RFID-based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions.
△ Less
Submitted 5 August, 2013;
originally announced August 2013.
-
Ultra-fast Multiple Genome Sequence Matching Using GPU
Authors:
Gang Liao,
Qi Sun,
Longfei Ma,
Sha Ding,
Wen Xie
Abstract:
In this paper, a contrastive evaluation of massively parallel implementations of suffix tree and suffix array to accelerate genome sequence matching are proposed based on Intel Core i7 3770K quad-core and NVIDIA GeForce GTX680 GPU. Besides suffix array only held approximately 20%~30% of the space relative to suffix tree, the coalesced binary search and tile optimization make suffix array clearly o…
▽ More
In this paper, a contrastive evaluation of massively parallel implementations of suffix tree and suffix array to accelerate genome sequence matching are proposed based on Intel Core i7 3770K quad-core and NVIDIA GeForce GTX680 GPU. Besides suffix array only held approximately 20%~30% of the space relative to suffix tree, the coalesced binary search and tile optimization make suffix array clearly outperform suffix tree using GPU. Consequently, the experimental results show that multiple genome sequence matching based on suffix array is more than 99 times speedup than that of CPU serial implementation. There is no doubt that massively parallel matching algorithm based on suffix array is an efficient approach to high-performance bioinformatics applications.
△ Less
Submitted 3 May, 2015; v1 submitted 15 March, 2013;
originally announced March 2013.
-
Optimizing Synchronization Algorithm for Auto-parallelizing Compiler
Authors:
Gang Liao,
Zhi-hui Qin,
Long-fei Ma,
Qi Sun
Abstract:
In this paper, we focus on the need for two approaches to optimize producer and consumer synchronization for auto-parallelizing compiler. Emphasis is placed on the construction of a criterion model by which the compiler reduce the number of synchronization operations needed to synchronize the dependence in a loop and perform optimization reduces the overhead of enforcing all dependence. In accorda…
▽ More
In this paper, we focus on the need for two approaches to optimize producer and consumer synchronization for auto-parallelizing compiler. Emphasis is placed on the construction of a criterion model by which the compiler reduce the number of synchronization operations needed to synchronize the dependence in a loop and perform optimization reduces the overhead of enforcing all dependence. In accordance with our study, we transform to modify and eliminate dependence on iteration space diagram (ISD), and carry out the problems of acyclic and cyclic dependence in detail. we eliminate partial dependence and optimize the synchronize instructions. Some didactic examples are included to illustrate the optimize procedure.
△ Less
Submitted 28 February, 2013; v1 submitted 17 November, 2012;
originally announced November 2012.
-
A New P2N Approach to Software Development Under the Clustering
Authors:
Gang Liao,
Lei Liu,
Lian Luo
Abstract:
In this computer era of rapid development, software development can be seen everywhere, but a lot of softwares are dead in modern development of software. Just as The Mythical Man-Month said, it exists a problem in the software development, and the problem is interflow.A lock of interflow can be said great calamity. Clustering is a environment to breed new life. In this thesis, we elaborate how P2…
▽ More
In this computer era of rapid development, software development can be seen everywhere, but a lot of softwares are dead in modern development of software. Just as The Mythical Man-Month said, it exists a problem in the software development, and the problem is interflow.A lock of interflow can be said great calamity. Clustering is a environment to breed new life. In this thesis, we elaborate how P2N can be used to thinking, planning, developing, collaborating, releasing. And the approach that make your team and organization more perfect.
△ Less
Submitted 23 July, 2012;
originally announced July 2012.
-
An Adaptive XP-based approach to Agile Development
Authors:
Gang Liao,
Lei Liu,
Lian Luo
Abstract:
Software design is gradually becoming open, distributed, pervasive, and connected. It is a sad statistical fact that software projects are scientifically fragile and tend to fail more than other engineering fields. Agile development is a philosophy. And agile methods are processes that support the agile philosophy. XP places a strong emphasis on technical practices in addition to the more common t…
▽ More
Software design is gradually becoming open, distributed, pervasive, and connected. It is a sad statistical fact that software projects are scientifically fragile and tend to fail more than other engineering fields. Agile development is a philosophy. And agile methods are processes that support the agile philosophy. XP places a strong emphasis on technical practices in addition to the more common teamwork and structural practices. In this paper, we elaborate how XP practices can be used to thinking, collaborating, releasing, planning, developing. And the state that make your team and organization more successful.
△ Less
Submitted 23 July, 2012; v1 submitted 24 May, 2012;
originally announced May 2012.
-
Hybrid Parallel Bidirectional Sieve based on SMP Cluster
Authors:
Gang Liao,
Lian Luo,
Lei Liu
Abstract:
In this article, hybrid parallel bidirectional sieve method is implemented by SMP Cluster, the individual computational units joined together by the communication network, are usually shared-memory systems with one or more multicore processor. To high-efficiency optimization, we propose average divide data into nodes, generating double-ended queues (deque) for sieve method that are able to exploit…
▽ More
In this article, hybrid parallel bidirectional sieve method is implemented by SMP Cluster, the individual computational units joined together by the communication network, are usually shared-memory systems with one or more multicore processor. To high-efficiency optimization, we propose average divide data into nodes, generating double-ended queues (deque) for sieve method that are able to exploit dual-cores simultaneously start sifting out primes from the head and tail.And each node create a FIFO queue as dynamic data buffer to ache temporary data from another nodes send to. The approach obtains huge speedup and efficiency on SMP Cluster.
△ Less
Submitted 22 May, 2012;
originally announced May 2012.