Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–30 of 30 results for author: Weng, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18533  [pdf, other

    cs.CV

    On Scaling Up 3D Gaussian Splatting Training

    Authors: Hexu Zhao, Haoyang Weng, Daohan Lu, Ang Li, Jinyang Li, Aurojit Panda, Saining Xie

    Abstract: 3D Gaussian Splatting (3DGS) is increasingly popular for 3D reconstruction due to its superior visual quality and rendering speed. However, 3DGS training currently occurs on a single GPU, limiting its ability to handle high-resolution and large-scale 3D reconstruction tasks due to memory constraints. We introduce Grendel, a distributed system designed to partition 3DGS parameters and parallelize c… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    Comments: Code: https://github.com/nyu-systems/Grendel-GS ; Project page: https://daohanlu.github.io/scaling-up-3dgs

    ACM Class: I.4.5

  2. arXiv:2405.16890  [pdf, other

    cs.CV

    PivotMesh: Generic 3D Mesh Generation via Pivot Vertices Guidance

    Authors: Haohan Weng, Yikai Wang, Tong Zhang, C. L. Philip Chen, Jun Zhu

    Abstract: Generating compact and sharply detailed 3D meshes poses a significant challenge for current 3D generative models. Different from extracting dense meshes from neural representation, some recent works try to model the native mesh distribution (i.e., a set of triangles), which generates more compact results as humans crafted. However, due to the complexity and variety of mesh topology, these methods… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: Project website: https://whaohan.github.io/pivotmesh

  3. arXiv:2405.15189  [pdf, other

    cs.SE cs.CL

    SOAP: Enhancing Efficiency of Generated Code via Self-Optimization

    Authors: Dong Huang, Jianbo Dai, Han Weng, Puzhen Wu, Yuhao Qing, Jie M. Zhang, Heming Cui, Zhijiang Guo

    Abstract: Large language models (LLMs) have shown remarkable progress in code generation, but their generated code often suffers from inefficiency, resulting in longer execution times and higher memory consumption. To address this issue, we propose Self Optimization based on OverheAd Profile (SOAP), a self-optimization framework that utilizes execution overhead profiles to improve the efficiency of LLM-gene… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 31 pages, 18 figures, and 8 tables

  4. arXiv:2404.12699  [pdf, other

    cs.LG

    SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models

    Authors: Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu

    Abstract: Instead of building deep learning models from scratch, developers are more and more relying on adapting pre-trained models to their customized tasks. However, powerful pre-trained models may be misused for unethical or illegal tasks, e.g., privacy inference and unsafe content generation. In this paper, we introduce a pioneering learning paradigm, non-fine-tunable learning, which prevents the pre-t… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted by IEEE Symposium on Security and Privacy 2024

  5. arXiv:2403.09093  [pdf, other

    cs.CV

    Desigen: A Pipeline for Controllable Design Template Generation

    Authors: Haohan Weng, Danqing Huang, Yu Qiao, Zheng Hu, Chin-Yew Lin, Tong Zhang, C. L. Philip Chen

    Abstract: Templates serve as a good starting point to implement a design (e.g., banner, slide) but it takes great effort from designers to manually create. In this paper, we present Desigen, an automatic template creation pipeline which generates background images as well as harmonious layout elements over the background. Different from natural images, a background image should preserve enough non-salient s… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: This paper has been accepted for publication in CVPR2024

  6. arXiv:2402.18830  [pdf, other

    cond-mat.mtrl-sci cs.LG physics.data-an

    Training-set-free two-stage deep learning for spectroscopic data de-noising

    Authors: Dongchen Huang, Junde Liu, Tian Qian, Hongming Weng

    Abstract: De-noising is a prominent step in the spectra post-processing procedure. Previous machine learning-based methods are fast but mostly based on supervised learning and require a training set that may be typically expensive in real experimental measurements. Unsupervised learning-based algorithms are slow and require many iterations to achieve convergence. Here, we bridge this gap by proposing a trai… ▽ More

    Submitted 5 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  7. arXiv:2402.03688  [pdf, other

    cs.CR cs.AI cs.LG

    A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective

    Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson

    Abstract: Vertical Federated Learning (VFL) is a federated learning paradigm where multiple participants, who share the same set of samples but hold different features, jointly train machine learning models. Although VFL enables collaborative machine learning without sharing raw data, it is still susceptible to various privacy threats. In this paper, we conduct the first comprehensive survey of the state-of… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  8. arXiv:2401.02122  [pdf, other

    cs.CL cs.SD eess.AS

    PEFT for Speech: Unveiling Optimal Placement, Merging Strategies, and Ensemble Techniques

    Authors: Tzu-Han Lin, How-Shing Wang, Hao-Yung Weng, Kuang-Chen Peng, Zih-Ching Chen, Hung-yi Lee

    Abstract: Parameter-Efficient Fine-Tuning (PEFT) is increasingly recognized as an effective method in speech processing. However, the optimal approach and the placement of PEFT methods remain inconclusive. Our study conducts extensive experiments to compare different PEFT methods and their layer-wise placement adapting Differentiable Architecture Search (DARTS). We also explore the use of ensemble learning… ▽ More

    Submitted 7 February, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

    Comments: Accepted to ICASSP 2024 Self-supervision in Audio, Speech and Beyond (SASB) workshop

  9. arXiv:2311.06530  [pdf, other

    cs.SE cs.AI cs.CL cs.CR

    Exploring ChatGPT's Capabilities on Vulnerability Management

    Authors: Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang

    Abstract: Recently, ChatGPT has attracted great attention from the code analysis domain. Prior works show that ChatGPT has the capabilities of processing foundational code analysis tasks, such as abstract syntax tree generation, which indicates the potential of using ChatGPT to comprehend code syntax and static behaviors. However, it is unclear whether ChatGPT can complete more complicated real-world vulner… ▽ More

    Submitted 20 June, 2024; v1 submitted 11 November, 2023; originally announced November 2023.

    Comments: Accepted by USENIX Security 2024

  10. arXiv:2310.15330  [pdf, other

    stat.ML cs.LG

    Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms

    Authors: Ye Tian, Haolei Weng, Yang Feng

    Abstract: While supervised federated learning approaches have enjoyed significant success, the domain of unsupervised federated learning remains relatively underexplored. Several federated EM algorithms have gained popularity in practice, however, their theoretical foundations are often lacking. In this paper, we first introduce a federated gradient EM algorithm (FedGrEM) designed for the unsupervised learn… ▽ More

    Submitted 14 June, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

    Comments: 50 pages, 3 figures

  11. arXiv:2310.08092  [pdf, other

    cs.CV

    Consistent123: Improve Consistency for One Image to 3D Object Synthesis

    Authors: Haohan Weng, Tianyu Yang, Jianan Wang, Yu Li, Tong Zhang, C. L. Philip Chen, Lei Zhang

    Abstract: Large image diffusion models enable novel view synthesis with high quality and excellent zero-shot capability. However, such models based on image-to-image translation have no guarantee of view consistency, limiting the performance for downstream tasks like 3D reconstruction and image-to-3D generation. To empower consistency, we propose Consistent123 to synthesize novel views simultaneously by inc… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: For more qualitative results, please see https://consistent-123.github.io/

  12. Slimmed optical neural networks with multiplexed neuron sets and a corresponding backpropagation training algorithm

    Authors: Yi-Feng Liu, Rui-Yao Ren, Dai-Bao Hou, Hai-Zhong Weng, Bo-Wen Wang, Ke-Jie Huang, Xing Lin, Feng Liu, Chen-Hui Li, Chao-Yuan Jin

    Abstract: Due to their intrinsic capabilities on parallel signal processing, optical neural networks (ONNs) have attracted extensive interests recently as a potential alternative to electronic artificial neural networks (ANNs) with reduced power consumption and low latency. Preliminary confirmation of the parallelism in optical computing has been widely done by applying the technology of wavelength division… ▽ More

    Submitted 13 December, 2023; v1 submitted 27 August, 2023; originally announced August 2023.

    Journal ref: Liu YF, Ren RY, Hou DB, Weng HZ, Wang BW, Huang KJ, Lin X, Liu F, Li CH, Jin CY. Slimmed Optical Neural Networks with Multiplexed Neuron Sets and a Corresponding Backpropagation Training Algorithm. Intell. Comput. 2024;3:Article 0070

  13. arXiv:2306.11338  [pdf, other

    cs.CR cs.LG

    FDINet: Protecting against DNN Model Extraction via Feature Distortion Index

    Authors: Hongwei Yao, Zheng Li, Haiqin Weng, Feng Xue, Kui Ren, Zhan Qin

    Abstract: Machine Learning as a Service (MLaaS) platforms have gained popularity due to their accessibility, cost-efficiency, scalability, and rapid development capabilities. However, recent research has highlighted the vulnerability of cloud-based models in MLaaS to model extraction attacks. In this paper, we introduce FDINET, a novel defense mechanism that leverages the feature distribution of deep neural… ▽ More

    Submitted 21 June, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 13 pages, 7 figures

  14. arXiv:2305.06043  [pdf, other

    cs.CV

    Autonomous Stabilization of Retinal Videos for Streamlining Assessment of Spontaneous Venous Pulsations

    Authors: Hongwei Sheng, Xin Yu, Feiyu Wang, MD Wahiduzzaman Khan, Hexuan Weng, Sahar Shariflou, S. Mojtaba Golzan

    Abstract: Spontaneous retinal Venous Pulsations (SVP) are rhythmic changes in the caliber of the central retinal vein and are observed in the optic disc region (ODR) of the retina. Its absence is a critical indicator of various ocular or neurological abnormalities. Recent advances in imaging technology have enabled the development of portable smartphone-based devices for observing the retina and assessment… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: EMBC, 4 pages, 6 figures

  15. arXiv:2209.15224  [pdf, other

    stat.ML cs.LG math.ST stat.ME

    Robust Unsupervised Multi-task and Transfer Learning on Gaussian Mixture Models

    Authors: Ye Tian, Haolei Weng, Yang Feng

    Abstract: Unsupervised learning has been widely used in many real-world applications. One of the simplest and most important unsupervised learning models is the Gaussian mixture model (GMM). In this work, we study the multi-task learning problem on GMMs, which aims to leverage potentially similar GMM parameter structures among tasks to obtain improved learning performance compared to single-task learning. W… ▽ More

    Submitted 28 December, 2023; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: 145 pages, 15 figures, 2 tables

  16. arXiv:2201.05781  [pdf, other

    cs.CV

    OneDConv: Generalized Convolution For Transform-Invariant Representation

    Authors: Tong Zhang, Haohan Weng, Ke Yi, C. L. Philip Chen

    Abstract: Convolutional Neural Networks (CNNs) have exhibited their great power in a variety of vision tasks. However, the lack of transform-invariant property limits their further applications in complicated real-world scenarios. In this work, we proposed a novel generalized one dimension convolutional operator (OneDConv), which dynamically transforms the convolution kernels based on the input features in… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

  17. arXiv:2106.01532  [pdf, other

    cs.CV

    Noise Doesn't Lie: Towards Universal Detection of Deep Inpainting

    Authors: Ang Li, Qiuhong Ke, Xingjun Ma, Haiqin Weng, Zhiyuan Zong, Feng Xue, Rui Zhang

    Abstract: Deep image inpainting aims to restore damaged or missing regions in an image with realistic contents. While having a wide range of applications such as object removal and image recovery, deep inpainting techniques also have the risk of being manipulated for image forgery. A promising countermeasure against such forgeries is deep inpainting detection, which aims to locate the inpainted regions in a… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: Accepted by IJCAI 2021

  18. arXiv:2012.04646  [pdf, other

    stat.ML cs.LG cs.SI math.ST stat.CO

    Spectral clustering via adaptive layer aggregation for multi-layer networks

    Authors: Sihan Huang, Haolei Weng, Yang Feng

    Abstract: One of the fundamental problems in network analysis is detecting community structure in multi-layer networks, of which each layer represents one type of edge information among the nodes. We propose integrative spectral clustering approaches based on effective convex layer aggregations. Our aggregation methods are strongly motivated by a delicate asymptotic analysis of the spectral embedding of wei… ▽ More

    Submitted 6 October, 2022; v1 submitted 7 December, 2020; originally announced December 2020.

    Comments: 74 pages

  19. arXiv:2011.09290  [pdf, other

    cs.CR

    Practical Privacy Attacks on Vertical Federated Learning

    Authors: Haiqin Weng, Juntao Zhang, Xingjun Ma, Feng Xue, Tao Wei, Shouling Ji, Zhiyuan Zong

    Abstract: Federated learning (FL) is a privacy-preserving learning paradigm that allows multiple parities to jointly train a powerful machine learning model without sharing their private data. According to the form of collaboration, FL can be further divided into horizontal federated learning (HFL) and vertical federated learning (VFL). In HFL, participants share the same feature space and collaborate on da… ▽ More

    Submitted 22 July, 2022; v1 submitted 18 November, 2020; originally announced November 2020.

  20. arXiv:2004.14478  [pdf, other

    cs.DB

    KGClean: An Embedding Powered Knowledge Graph Cleaning Framework

    Authors: Congcong Ge, Yunjun Gao, Honghui Weng, Chong Zhang, Xiaoye Miao, Baihua Zheng

    Abstract: The quality assurance of the knowledge graph is a prerequisite for various knowledge-driven applications. We propose KGClean, a novel cleaning framework powered by knowledge graph embedding, to detect and repair the heterogeneous dirty data. In contrast to previous approaches that either focus on filling missing data or clean errors violated limited rules, KGClean enables (i) cleaning both missing… ▽ More

    Submitted 26 April, 2020; originally announced April 2020.

  21. arXiv:2004.11527  [pdf, other

    cs.CR

    A Trend-following Trading Indicator on Homomorphically Encrypted Data

    Authors: Haotian Weng, Artem Lenskiy

    Abstract: Algorithmic trading has proliferated the area of quantitative finance for already over a decade. The decisions are made without human intervention using the data provided by brokerage firms and exchanges. There is an emerging intermediate layer of financial players that are placed in between a broker and algorithmic traders. The role of these players is to aggregate market decisions from the algor… ▽ More

    Submitted 30 April, 2020; v1 submitted 24 April, 2020; originally announced April 2020.

    Comments: Accepted as a short paper by the 17th International Conference on Security and Cryptography (SECRYPT 2020)

  22. arXiv:1909.09345  [pdf, other

    stat.ML cs.LG math.ST

    Does SLOPE outperform bridge regression?

    Authors: Shuaiwen Wang, Haolei Weng, Arian Maleki

    Abstract: A recently proposed SLOPE estimator (arXiv:1407.3824) has been shown to adaptively achieve the minimax $\ell_2$ estimation rate under high-dimensional sparse linear regression models (arXiv:1503.08393). Such minimax optimality holds in the regime where the sparsity level $k$, sample size $n$, and dimension $p$ satisfy $k/p \rightarrow 0$, $k\log p/n \rightarrow 0$. In this paper, we characterize t… ▽ More

    Submitted 22 September, 2021; v1 submitted 20 September, 2019; originally announced September 2019.

    Comments: 50 pages, 18 figures

  23. arXiv:1902.00717  [pdf, other

    cs.CR

    De-Health: All Your Online Health Information Are Belong to Us

    Authors: Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Qinming He, Raheem Beyah, Ting Wang

    Abstract: In this paper, we study the privacy of online health data. We present a novel online health data De-Anonymization (DA) framework, named De-Health. De-Health consists of two phases: Top-K DA, which identifies a candidate set for each anonymized user, and refined DA, which de-anonymizes an anonymized user to a user in its candidate set. By employing both candidate selection and DA verification schem… ▽ More

    Submitted 3 June, 2019; v1 submitted 2 February, 2019; originally announced February 2019.

  24. arXiv:1902.00714  [pdf, other

    cs.CR

    FDI: Quantifying Feature-based Data Inferability

    Authors: Shouling Ji, Haiqin Weng, Yiming Wu, Qinming He, Raheem Beyah, Ting Wang

    Abstract: Motivated by many existing security and privacy applications, e.g., network traffic attribution, linkage attacks, private web search, and feature-based data de-anonymization, in this paper, we study the Feature-based Data Inferability (FDI) quantification problem. First, we conduct the FDI quantification under both naive and general data models from both a feature distance perspective and a featur… ▽ More

    Submitted 3 June, 2019; v1 submitted 2 February, 2019; originally announced February 2019.

  25. arXiv:1810.12130  [pdf, ps, other

    cs.DS

    Challenges, Designs, and Performances of a Distributed Algorithm for Minimum-Latency of Data-Aggregation in Multi-Channel WSNs

    Authors: Ngoc-Tu Nguyen, Bing-Hong Liu, Shao-I Chu, Hao-Zhe Weng

    Abstract: In wireless sensor networks (WSNs), the sensed data by sensors need to be gathered, so that one very important application is periodical data collection. There is much effort which aimed at the data collection scheduling algorithm development to minimize the latency. Most of previous works investigating the minimum latency of data collection issue have an ideal assumption that the network is a cen… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

    Comments: IEEE Transactions on Network and Service Management (accepted with minor revisions)

  26. arXiv:1705.08617  [pdf, other

    math.ST cs.IT

    Which bridge estimator is optimal for variable selection?

    Authors: Shuaiwen Wang, Haolei Weng, Arian Maleki

    Abstract: We study the problem of variable selection for linear models under the high-dimensional asymptotic setting, where the number of observations $n$ grows at the same rate as the number of predictors $p$. We consider two-stage variable selection techniques (TVS) in which the first stage uses bridge estimators to obtain an estimate of the regression coefficients, and the second stage simply thresholds… ▽ More

    Submitted 25 March, 2020; v1 submitted 24 May, 2017; originally announced May 2017.

    Comments: 84 pages, 11 figures

  27. arXiv:1705.03533  [pdf, ps, other

    math.ST cs.IT

    Low noise sensitivity analysis of Lq-minimization in oversampled systems

    Authors: Haolei Weng, Arian Maleki

    Abstract: The class of Lq-regularized least squares (LQLS) are considered for estimating a p-dimensional vector \b{eta} from its n noisy linear observations y = X\b{eta}+w. The performance of these schemes are studied under the high-dimensional asymptotic setting in which p grows linearly with n. In this asymptotic setting, phase transition diagrams (PT) are often used for comparing the performance of diffe… ▽ More

    Submitted 18 February, 2018; v1 submitted 9 May, 2017; originally announced May 2017.

  28. arXiv:1603.07377  [pdf, other

    math.ST cs.IT

    Overcoming The Limitations of Phase Transition by Higher Order Analysis of Regularization Techniques

    Authors: Haolei Weng, Arian Maleki, Le Zheng

    Abstract: We study the problem of estimating $β\in \mathbb{R}^p$ from its noisy linear observations $y= Xβ+ w$, where $w \sim N(0, σ_w^2 I_{n\times n})$, under the following high-dimensional asymptotic regime: given a fixed number $δ$, $p \rightarrow \infty$, while $n/p \rightarrow δ$. We consider the popular class of $\ell_q$-regularized least squares (LQLS) estimators, a.k.a. bridge, given by the optimiza… ▽ More

    Submitted 20 October, 2017; v1 submitted 23 March, 2016; originally announced March 2016.

  29. arXiv:1501.03704  [pdf, other

    cs.IT math.ST

    Does $\ell_p$-minimization outperform $\ell_1$-minimization?

    Authors: Le Zheng, Arian Maleki, Haolei Weng, Xiaodong Wang, Teng Long

    Abstract: In many application areas we are faced with the following question: Can we recover a sparse vector $x_o \in \mathbb{R}^N$ from its undersampled set of noisy observations $y \in \mathbb{R}^n$, $y=A x_o+w$. The last decade has witnessed a surge of algorithms and theoretical results addressing this question. One of the most popular algorithms is the $\ell_p$-regularized least squares (LPLS) given by… ▽ More

    Submitted 10 June, 2016; v1 submitted 15 January, 2015; originally announced January 2015.

  30. arXiv:1407.1549  [pdf, other

    cs.SI physics.soc-ph q-bio.NC

    Resilience of human brain functional coactivation networks under thresholding

    Authors: S. Sarkar, S. Chawla, H. Weng

    Abstract: Recent studies have demonstrated the existence of community structure and rich club nodes, (i.e., highly interconnected, high degree hub nodes), in human brain functional networks. The cognitive relevance of the detected modules and hubs has also been demonstrated, for both task based and default mode networks, suggesting that the brain self-organizes into patterns of co-activated sets of regions… ▽ More

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: 8 pages