Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 106 results for author: Weng, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04016  [pdf, other

    cs.CV

    Mitigating Low-Frequency Bias: Feature Recalibration and Frequency Attention Regularization for Adversarial Robustness

    Authors: Kejia Zhang, Juanjuan Weng, Yuanzheng Cai, Zhiming Luo, Shaozi Li

    Abstract: Ensuring the robustness of computer vision models against adversarial attacks is a significant and long-lasting objective. Motivated by adversarial attacks, researchers have devoted considerable efforts to enhancing model robustness by adversarial training (AT). However, we observe that while AT improves the models' robustness against adversarial perturbations, it fails to improve their ability to… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2406.11576  [pdf, other

    cs.CV

    Harmonizing Feature Maps: A Graph Convolutional Approach for Enhancing Adversarial Robustness

    Authors: Kejia Zhang, Juanjuan Weng, Junwei Wu, Guoqing Yang, Shaozi Li, Zhiming Luo

    Abstract: The vulnerability of Deep Neural Networks to adversarial perturbations presents significant security concerns, as the imperceptible perturbations can contaminate the feature space and lead to incorrect predictions. Recent studies have attempted to calibrate contaminated features by either suppressing or over-activating particular channels. Despite these efforts, we claim that adversarial attacks e… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  3. arXiv:2405.16105  [pdf, other

    cs.CV cs.AI

    MambaLLIE: Implicit Retinex-Aware Low Light Enhancement with Global-then-Local State Space

    Authors: Jiangwei Weng, Zhiqiang Yan, Ying Tai, Jianjun Qian, Jian Yang, Jun Li

    Abstract: Recent advances in low light image enhancement have been dominated by Retinex-based learning framework, leveraging convolutional neural networks (CNNs) and Transformers. However, the vanilla Retinex theory primarily addresses global illumination degradation and neglects local issues such as noise and blur in dark conditions. Moreover, CNNs and Transformers struggle to capture global degradation du… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  4. arXiv:2405.11730  [pdf

    cs.LG q-fin.GN

    Degree of Irrationality: Sentiment and Implied Volatility Surface

    Authors: Jiahao Weng, Yan Xie

    Abstract: In this study, we constructed daily high-frequency sentiment data and used the VAR method to attempt to predict the next day's implied volatility surface. We utilized 630,000 text data entries from the East Money Stock Forum from 2014 to 2023 and employed deep learning methods such as BERT and LSTM to build daily market sentiment indicators. By applying FFT and EMD methods for sentiment decomposit… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 21 pages, 8 figures

  5. arXiv:2405.09996  [pdf, other

    cs.CV

    Driving-Video Dehazing with Non-Aligned Regularization for Safety Assistance

    Authors: Junkai Fan, Jiangwei Weng, Kun Wang, Yijun Yang, Jianjun Qian, Jun Li, Jian Yang

    Abstract: Real driving-video dehazing poses a significant challenge due to the inherent difficulty in acquiring precisely aligned hazy/clear video pairs for effective model training, especially in dynamic driving scenarios with unpredictable weather conditions. In this paper, we propose a pioneering approach that addresses this challenge through a nonaligned regularization strategy. Our core concept involve… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

    Comments: Accepted by CVPR 2024

  6. arXiv:2405.06340  [pdf, other

    cs.CV

    Improving Transferable Targeted Adversarial Attack via Normalized Logit Calibration and Truncated Feature Mixing

    Authors: Juanjuan Weng, Zhiming Luo, Shaozi Li

    Abstract: This paper aims to enhance the transferability of adversarial samples in targeted attacks, where attack success rates remain comparatively low. To achieve this objective, we propose two distinct techniques for improving the targeted transferability from the loss and feature aspects. First, in previous approaches, logit calibrations used in targeted attacks primarily focus on the logit margin betwe… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  7. arXiv:2405.04029  [pdf, other

    cs.CR

    Enabling Privacy-Preserving and Publicly Auditable Federated Learning

    Authors: Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao

    Abstract: Federated learning (FL) has attracted widespread attention because it supports the joint training of models by multiple participants without moving private dataset. However, there are still many security issues in FL that deserve discussion. In this paper, we consider three major issues: 1) how to ensure that the training process can be publicly audited by any third party; 2) how to avoid the infl… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: ICC 2024 - 2024 IEEE International Conference on Communications Conference Program

    ACM Class: C.2.2; C.2.4; E.3

  8. arXiv:2405.03193  [pdf, other

    cs.CV

    Exploring Frequencies via Feature Mixing and Meta-Learning for Improving Adversarial Transferability

    Authors: Juanjuan Weng, Zhiming Luo, Shaozi Li

    Abstract: Recent studies have shown that Deep Neural Networks (DNNs) are susceptible to adversarial attacks, with frequency-domain analysis underscoring the significance of high-frequency components in influencing model predictions. Conversely, targeting low-frequency components has been effective in enhancing attack transferability on black-box models. In this study, we introduce a frequency decomposition-… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  9. arXiv:2404.15789  [pdf, other

    cs.CV

    MotionMaster: Training-free Camera Motion Transfer For Video Generation

    Authors: Teng Hu, Jiangning Zhang, Ran Yi, Yating Wang, Hongrui Huang, Jieyu Weng, Yabiao Wang, Lizhuang Ma

    Abstract: The emergence of diffusion models has greatly propelled the progress in image and video generation. Recently, some efforts have been made in controllable video generation, including text-to-video generation and video motion control, among which camera motion control is an important topic. However, existing camera motion control methods rely on training a temporal camera module, and necessitate sub… ▽ More

    Submitted 30 April, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

  10. arXiv:2403.00773  [pdf, other

    cs.LG

    Misconduct in Post-Selections and Deep Learning

    Authors: Juyang Weng

    Abstract: This is a theoretical paper on "Deep Learning" misconduct in particular and Post-Selection in general. As far as the author knows, the first peer-reviewed papers on Deep Learning misconduct are [32], [37], [36]. Regardless of learning modes, e.g., supervised, reinforcement, adversarial, and evolutional, almost all machine learning methods (except for a few methods that train a sole system) are roo… ▽ More

    Submitted 13 February, 2024; originally announced March 2024.

    Comments: 9 pages, 2 figures, published in peer-viewed conference proceedings, Proc. 2023 the 8th International Conf. on Control, Robotics and Cybernetics (CRC 2023), pp. 1-9, IEEE Press, ISBN: 979-8-3503-3057-1, Changsha, China, Dec. 22-24, 2023

    ACM Class: I.2

  11. arXiv:2403.00239  [pdf, other

    cs.CR

    OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

    Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng

    Abstract: Deep neural network (DNN) typically involves convolutions, pooling, and activation function. Due to the growing concern about privacy, privacy-preserving DNN becomes a hot research topic. Generally, the convolution and pooling operations can be supported by additive homomorphic and secure comparison, but the secure implementation of activation functions is not so straightforward for the requiremen… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

  12. arXiv:2402.16919  [pdf, other

    cs.LG

    Personalized Federated Instruction Tuning via Neural Architecture Search

    Authors: Pengyu Zhang, Yingbo Zhou, Ming Hu, Junxian Feng, Jiawen Weng, Mingsong Chen

    Abstract: Federated Instruction Tuning (FIT) has shown the ability to achieve collaborative model instruction tuning among massive data owners without sharing private data. However, it still faces two key challenges, i.e., data and resource heterogeneity. Due to the varying data distribution and preferences among data owners, FIT cannot adapt to the personalized data of individual owners. Moreover, clients… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  13. arXiv:2402.15430  [pdf, other

    cs.CV cs.LG

    Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

    Authors: Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Xiaochun Cao, Jian Weng

    Abstract: Developing robust and interpretable vision systems is a crucial step towards trustworthy artificial intelligence. In this regard, a promising paradigm considers embedding task-required invariant structures, e.g., geometric invariance, in the fundamental image representation. However, such invariant representations typically exhibit limited discriminability, limiting their applications in larger-sc… ▽ More

    Submitted 11 April, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  14. arXiv:2402.03046  [pdf, other

    cs.LG

    Open RL Benchmark: Comprehensive Tracked Experiments for Reinforcement Learning

    Authors: Shengyi Huang, Quentin Gallouédec, Florian Felten, Antonin Raffin, Rousslan Fernand Julien Dossa, Yanxiao Zhao, Ryan Sullivan, Viktor Makoviychuk, Denys Makoviichuk, Mohamad H. Danesh, Cyril Roumégous, Jiayi Weng, Chufan Chen, Md Masudur Rahman, João G. M. Araújo, Guorui Quan, Daniel Tan, Timo Klein, Rujikorn Charakorn, Mark Towers, Yann Berthelot, Kinal Mehta, Dipam Chakraborty, Arjun KG, Valentin Charraut , et al. (8 additional authors not shown)

    Abstract: In many Reinforcement Learning (RL) papers, learning curves are useful indicators to measure the effectiveness of RL algorithms. However, the complete raw data of the learning curves are rarely available. As a result, it is usually necessary to reproduce the experiments from scratch, which can be time-consuming and error-prone. We present Open RL Benchmark, a set of fully tracked RL experiments, i… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: Under review

  15. arXiv:2312.08027  [pdf, ps, other

    cs.CL cs.AI

    Helping Language Models Learn More: Multi-dimensional Task Prompt for Few-shot Tuning

    Authors: Jinta Weng, Jiarui Zhang, Yue Hu, Daidong Fa, Xiaofeng Xuand, Heyan Huang

    Abstract: Large language models (LLMs) can be used as accessible and intelligent chatbots by constructing natural language queries and directly inputting the prompt into the large language model. However, different prompt' constructions often lead to uncertainty in the answers and thus make it hard to utilize the specific knowledge of LLMs (like ChatGPT). To alleviate this, we use an interpretable structure… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: text overlap with arXiv:2210.16489

  16. arXiv:2311.11384  [pdf, other

    cs.AR

    PIMSAB: A Processing-In-Memory System with Spatially-Aware Communication and Bit-Serial-Aware Computation

    Authors: Aman Arora, Jian Weng, Siyuan Ma, Tony Nowatzki, Lizy K. John

    Abstract: Bit-serial Processing-In-Memory (PIM) is an attractive paradigm for accelerator architectures, for parallel workloads such as Deep Learning (DL), because of its capability to achieve massive data parallelism at a low area overhead and provide orders-of-magnitude data movement savings by moving computational resources closer to the data. While many PIM architectures have been proposed, improvements… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

    Comments: Aman Arora and Jian Weng are co-first authors with equal contribution

  17. arXiv:2311.08425  [pdf

    cs.SD eess.AS math.NA physics.ao-ph physics.app-ph

    Research and experimental verification on low-frequency long-range underwater sound propagation dispersion characteristics under dual-channel sound speed profiles in the Chukchi Plateau

    Authors: Jinbao Weng, Yubo Qi, Yanming Yang, Hongtao Wen, Hongtao Zhou, Ruichao Xue

    Abstract: The dual-channel sound speed profiles of the Chukchi Plateau and the Canadian Basin have become current research hotspots due to their excellent low-frequency sound signal propagation ability. Previous research has mainly focused on using sound propagation theory to explain the changes in sound signal energy. This article is mainly based on the theory of normal modes to study the fine structure of… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 30 pages, 18 figures

  18. arXiv:2311.07175  [pdf

    cs.SD math.NA physics.ao-ph physics.app-ph

    Research and experimental verification on low-frequency long-range sound propagation characteristics under ice-covered and range-dependent marine environment in the Arctic

    Authors: Jinbao Weng, Yubo Qi, Yanming Yang, Hongtao Wen, Hongtao Zhou, Ruichao Xue

    Abstract: At present, research on sound propagation under the Arctic ice mainly focuses on modeling and experimental verification of sound propagation under sea ice cover and unique sound velocity profiles. Among them, the main research object of concern is sound transmission loss, and this article will delve into the time-domain waveform and fine dispersion structure of low-frequency broadband acoustic sig… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 46 pages, 35 figures

  19. arXiv:2310.16186  [pdf, other

    cs.LG hep-ex

    Image Segmentation using U-Net Architecture for Powder X-ray Diffraction Images

    Authors: Howard Yanxon, Eric Roberts, Hannah Parraga, James Weng, Wenqian Xu, Uta Ruett, Alexander Hexemer, Petrus Zwart, Nickolas Schwarz

    Abstract: Scientific researchers frequently use the in situ synchrotron high-energy powder X-ray diffraction (XRD) technique to examine the crystallographic structures of materials in functional devices such as rechargeable battery materials. We propose a method for identifying artifacts in experimental XRD images. The proposed method uses deep learning convolutional neural network architectures, such as tu… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 10 pages, 4 figures, 3 tables

  20. arXiv:2310.00036  [pdf, other

    cs.LG

    Cleanba: A Reproducible and Efficient Distributed Reinforcement Learning Platform

    Authors: Shengyi Huang, Jiayi Weng, Rujikorn Charakorn, Min Lin, Zhongwen Xu, Santiago Ontañón

    Abstract: Distributed Deep Reinforcement Learning (DRL) aims to leverage more computational resources to train autonomous agents with less training time. Despite recent progress in the field, reproducibility issues have not been sufficiently explored. This paper first shows that the typical actor-learner framework can have reproducibility issues even if hyperparameters are controlled. We then introduce Clea… ▽ More

    Submitted 29 September, 2023; originally announced October 2023.

  21. arXiv:2309.14994  [pdf, other

    cs.LG cs.AI

    Measurement Models For Sailboats Price vs. Features And Regional Areas

    Authors: Jiaqi Weng, Chunlin Feng, Yihan Shao

    Abstract: In this study, we investigated the relationship between sailboat technical specifications and their prices, as well as regional pricing influences. Utilizing a dataset encompassing characteristics like length, beam, draft, displacement, sail area, and waterline, we applied multiple machine learning models to predict sailboat prices. The gradient descent model demonstrated superior performance, pro… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 20 pages, 17 figures

  22. arXiv:2309.14250  [pdf, other

    stat.AP cs.AI math.ST

    Prediction Model For Wordle Game Results With High Robustness

    Authors: Jiaqi Weng, Chunlin Feng

    Abstract: In this study, we delve into the dynamics of Wordle using data analysis and machine learning. Our analysis initially focused on the correlation between the date and the number of submitted results. Due to initial popularity bias, we modeled stable data using an ARIMAX model with coefficient values of 9, 0, 2, and weekdays/weekends as the exogenous variable. We found no significant relationship bet… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 25 Pages, 28 Figures

  23. arXiv:2309.11039  [pdf, other

    cs.LG cs.AI cs.DC

    Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

    Authors: Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han

    Abstract: Intelligent transportation systems (ITSs) have been fueled by the rapid development of communication technologies, sensor technologies, and the Internet of Things (IoT). Nonetheless, due to the dynamic characteristics of the vehicle networks, it is rather challenging to make timely and accurate decisions of vehicle behaviors. Moreover, in the presence of mobile wireless communications, the privacy… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  24. arXiv:2309.09435  [pdf, other

    cs.CR

    Security and Privacy on Generative Data in AIGC: A Survey

    Authors: Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng

    Abstract: The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in the evolution of information technology. With AIGC, it can be effortless to generate high-quality data that is challenging for the public to distinguish. Nevertheless, the proliferation of generative data across cyberspace brings security and privacy issues, including privacy leakages of individuals and m… ▽ More

    Submitted 17 December, 2023; v1 submitted 17 September, 2023; originally announced September 2023.

  25. arXiv:2308.05282  [pdf, other

    cs.CR

    Decentralized Finance (DeFi): A Survey

    Authors: Erya Jiang, Bo Qin, Qin Wang, Zhipeng Wang, Qianhong Wu, Jian Weng, Xinyu Li, Chenyang Wang, Yuhang Ding, Yanran Zhang

    Abstract: Decentralized Finance (DeFi) is a new paradigm in the creation, distribution, and utilization of financial services via the integration of blockchain technology. Our research conducts a comprehensive introduction and meticulous classification of various DeFi applications. Beyond that, we thoroughly analyze these risks from both technical and economic perspectives, spanning multiple layers. We poin… ▽ More

    Submitted 30 November, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

  26. arXiv:2306.11261  [pdf, other

    cs.CV

    Comparative Evaluation of Recent Universal Adversarial Perturbations in Image Classification

    Authors: Juanjuan Weng, Zhiming Luo, Dazhen Lin, Shaozi Li

    Abstract: The vulnerability of Convolutional Neural Networks (CNNs) to adversarial samples has recently garnered significant attention in the machine learning community. Furthermore, recent studies have unveiled the existence of universal adversarial perturbations (UAPs) that are image-agnostic and highly transferable across different CNN models. In this survey, our primary focus revolves around the recent… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: 18 pages,8 figures, 7 tables

  27. arXiv:2305.01361  [pdf, other

    cs.CV cs.CR

    Boosting Adversarial Transferability via Fusing Logits of Top-1 Decomposed Feature

    Authors: Juanjuan Weng, Zhiming Luo, Dazhen Lin, Shaozi Li, Zhun Zhong

    Abstract: Recent research has shown that Deep Neural Networks (DNNs) are highly vulnerable to adversarial samples, which are highly transferable and can be used to attack other unknown black-box models. To improve the transferability of adversarial samples, several feature-based adversarial attack methods have been proposed to disrupt neuron activation in the middle layers. However, current state-of-the-art… ▽ More

    Submitted 5 July, 2023; v1 submitted 2 May, 2023; originally announced May 2023.

  28. arXiv:2304.12506  [pdf, other

    cs.HC

    DualSlide: Global-to-Local Sketching Interface for Slide Content and Layout Design

    Authors: Jiahao Weng, Xusheng Du, Haoran Xie

    Abstract: Online learning and academic conferences have become pervasive and essential for education and professional development, especially since the onset of pandemics. Academic presentations usually require well-designed slides that are easily understood. Sketches that visually represent design intentions and are readily accessible to the average users. To assist non-expert users in creating visually ap… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: 8 pages, 16 figures. accepted in NICOGRAPH International 2023

  29. arXiv:2304.00761  [pdf, other

    cs.CV

    Learning Anchor Transformations for 3D Garment Animation

    Authors: Fang Zhao, Zekun Li, Shaoli Huang, Junwu Weng, Tianfei Zhou, Guo-Sen Xie, Jue Wang, Ying Shan

    Abstract: This paper proposes an anchor-based deformation model, namely AnchorDEF, to predict 3D garment animation from a body motion sequence. It deforms a garment mesh template by a mixture of rigid transformations with extra nonlinear displacements. A set of anchors around the mesh surface is introduced to guide the learning of rigid transformation matrices. Once the anchor transformations are found, per… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Comments: Accepted to CVPR 2023. Project page: https://semanticdh.github.io/AnchorDEF

  30. arXiv:2303.08774  [pdf, other

    cs.CL cs.AI

    GPT-4 Technical Report

    Authors: OpenAI, Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, Red Avila, Igor Babuschkin, Suchir Balaji, Valerie Balcom, Paul Baltescu, Haiming Bao, Mohammad Bavarian, Jeff Belgum, Irwan Bello, Jake Berdine, Gabriel Bernadett-Shapiro, Christopher Berner, Lenny Bogdonoff, Oleg Boiko , et al. (256 additional authors not shown)

    Abstract: We report the development of GPT-4, a large-scale, multimodal model which can accept image and text inputs and produce text outputs. While less capable than humans in many real-world scenarios, GPT-4 exhibits human-level performance on various professional and academic benchmarks, including passing a simulated bar exam with a score around the top 10% of test takers. GPT-4 is a Transformer-based mo… ▽ More

    Submitted 4 March, 2024; v1 submitted 15 March, 2023; originally announced March 2023.

    Comments: 100 pages; updated authors list; fixed author names and added citation

  31. arXiv:2303.08658  [pdf, other

    cs.CV cs.GR

    Skinned Motion Retargeting with Residual Perception of Motion Semantics & Geometry

    Authors: Jiaxu Zhang, Junwu Weng, Di Kang, Fang Zhao, Shaoli Huang, Xuefei Zhe, Linchao Bao, Ying Shan, Jue Wang, Zhigang Tu

    Abstract: A good motion retargeting cannot be reached without reasonable consideration of source-target differences on both the skeleton and shape geometry levels. In this work, we propose a novel Residual RETargeting network (R2ET) structure, which relies on two neural modification modules, to adjust the source motions to fit the target skeletons and shapes progressively. In particular, a skeleton-aware mo… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: CVPR 2023

  32. arXiv:2303.03680  [pdf, other

    cs.CV

    Logit Margin Matters: Improving Transferable Targeted Adversarial Attack by Logit Calibration

    Authors: Juanjuan Weng, Zhiming Luo, Zhun Zhong, Shaozi Li, Nicu Sebe

    Abstract: Previous works have extensively studied the transferability of adversarial samples in untargeted black-box scenarios. However, it still remains challenging to craft targeted adversarial examples with higher transferability than non-targeted ones. Recent studies reveal that the traditional Cross-Entropy (CE) loss function is insufficient to learn transferable targeted adversarial examples due to th… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

  33. arXiv:2302.12150  [pdf, other

    cs.CR cs.AI cs.DB

    A Survey of Secure Computation Using Trusted Execution Environments

    Authors: Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng

    Abstract: As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols. We first propose a taxonomy that classifies secure computation protocols into thre… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  34. arXiv:2302.07942  [pdf, other

    cs.CY cs.AI cs.LG

    Enhancing Deep Knowledge Tracing with Auxiliary Tasks

    Authors: Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng

    Abstract: Knowledge tracing (KT) is the problem of predicting students' future performance based on their historical interactions with intelligent tutoring systems. Recent studies have applied multiple types of deep neural networks to solve the KT problem. However, there are two important factors in real-world educational data that are not well represented. First, most existing works augment input represent… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: Accepted at WWW'23: The 2023 ACM Web Conference, 2023

  35. arXiv:2301.07320  [pdf, other

    cs.CV

    Robust Knowledge Adaptation for Federated Unsupervised Person ReID

    Authors: Jianfeng Weng, Kun Hu, Tingting Yao, Jingya Wang, Zhiyong Wang

    Abstract: Person Re-identification (ReID) has been extensively studied in recent years due to the increasing demand in public security. However, collecting and dealing with sensitive personal data raises privacy concerns. Therefore, federated learning has been explored for Person ReID, which aims to share minimal sensitive data between different parties (clients). However, existing federated learning based… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

  36. arXiv:2212.13495  [pdf, other

    cs.CV cs.LG

    Truncate-Split-Contrast: A Framework for Learning from Mislabeled Videos

    Authors: Zixiao Wang, Junwu Weng, Chun Yuan, Jue Wang

    Abstract: Learning with noisy label (LNL) is a classic problem that has been extensively studied for image tasks, but much less for video in the literature. A straightforward migration from images to videos without considering the properties of videos, such as computational cost and redundant information, is not a sound choice. In this paper, we propose two new strategies for video analysis with noisy label… ▽ More

    Submitted 28 December, 2022; v1 submitted 27 December, 2022; originally announced December 2022.

    Comments: Accepted by AAAI 2023

  37. arXiv:2212.12975  [pdf, other

    cs.HC cs.GR

    Interactive Layout Drawing Interface with Shadow Guidance

    Authors: Jiahao Weng, Haoran Xie

    Abstract: It is difficult to design a visually appealing layout for common users, which takes time even for professional designers. In this paper, we present an interactive layout design system with shadow guidance and layout retrieval to help users obtain satisfactory design results. This study focuses in particular on the design of academic presentation slides. The user may refer to the shadow guidance as… ▽ More

    Submitted 25 December, 2022; originally announced December 2022.

    Comments: 6 pages, 7 figures, accepted in IWAIT2023, video is here https://youtu.be/Rddjz5jloJQ

  38. arXiv:2211.16350  [pdf, other

    cs.LG

    On "Deep Learning" Misconduct

    Authors: Juyang Weng

    Abstract: This is a theoretical paper, as a companion paper of the plenary talk for the same conference ISAIC 2022. In contrast to the author's plenary talk in the same conference, conscious learning (Weng, 2022b; Weng, 2022c) which develops a single network for a life (many tasks), "Deep Learning" trains multiple networks for each task. Although "Deep Learning" may use different learning modes, including s… ▽ More

    Submitted 12 January, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: Accepted by ISAIC 2022, 8 pages, three figures. arXiv admin note: text overlap with arXiv:2208.11228

    ACM Class: I.3

  39. arXiv:2211.04118  [pdf, other

    cs.CL cs.AI

    ConsPrompt: Exploiting Contrastive Samples for Fewshot Prompt Learning

    Authors: Jinta Weng, Yifan Deng, d Donghao Li, Hao You, Yue Hu, Heyan Huang

    Abstract: The prompt has become an effective linguistic tool for utilizing pre-trained language models. However, in few-shot scenarios, subtle changes in the prompt design always make the result widely different, and the prompt learning methods also make it easy to overfit the limited samples. To alleviate this, we explore utilizing suitable contrastive samples and multi-degree contrastive learning methods… ▽ More

    Submitted 12 March, 2024; v1 submitted 8 November, 2022; originally announced November 2022.

    Comments: 2 figures

    Journal ref: ICASSP2024

  40. arXiv:2210.16489  [pdf, other

    cs.CL cs.AI

    STPrompt: Semantic-guided and Task-driven prompts for Effective Few-shot Classification

    Authors: Jinta Weng, Yue Hu, Jing Qiu, Heyan Huan

    Abstract: The effectiveness of prompt learning has been demonstrated in different pre-trained language models. By formulating suitable template and choosing representative label mapping, prompt learning can be used as an efficient knowledge probe. However, finding suitable prompt in existing methods requires multiple experimental attempts or appropriate vector initialization on formulating suitable template… ▽ More

    Submitted 29 October, 2022; originally announced October 2022.

  41. arXiv:2210.11334  [pdf, other

    cs.CR

    Proof of Unlearning: Definitions and Instantiation

    Authors: Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang

    Abstract: The "Right to be Forgotten" rule in machine learning (ML) practice enables some individual data to be deleted from a trained model, as pursued by recently developed machine unlearning techniques. To truly comply with the rule, a natural and necessary step is to verify if the individual data are indeed deleted after unlearning. Yet, previous parameter-space verification metrics may be easily evaded… ▽ More

    Submitted 21 October, 2022; v1 submitted 20 October, 2022; originally announced October 2022.

  42. arXiv:2210.01169  [pdf, other

    q-bio.MN cs.LG nlin.AO

    Neural-network solutions to stochastic reaction networks

    Authors: Ying Tang, Jiayu Weng, Pan Zhang

    Abstract: The stochastic reaction network in which chemical species evolve through a set of reactions is widely used to model stochastic processes in physics, chemistry and biology. To characterize the evolving joint probability distribution in the state space of species counts requires solving a system of ordinary differential equations, the chemical master equation, where the size of the counting state sp… ▽ More

    Submitted 7 February, 2023; v1 submitted 29 September, 2022; originally announced October 2022.

  43. arXiv:2209.15490  [pdf, other

    cs.CV

    Learning Second Order Local Anomaly for General Face Forgery Detection

    Authors: Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng

    Abstract: In this work, we propose a novel method to improve the generalization ability of CNN-based face forgery detectors. Our method considers the feature anomalies of forged faces caused by the prevalent blending operations in face forgery algorithms. Specifically, we propose a weakly supervised Second Order Local Anomaly (SOLA) learning module to mine anomalies in local regions using deep feature maps.… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

  44. arXiv:2208.11228  [pdf, other

    cs.LG cs.AI

    Why Deep Learning's Performance Data Are Misleading

    Authors: Juyang Weng

    Abstract: This is a theoretical paper, as a companion paper of the keynote talk at the same conference AIEE 2023. In contrast to conscious learning, many projects in AI have employed so-called "deep learning" many of which seemed to give impressive performance. This paper explains that such performance data are deceptively inflated due to two misconducts: "data deletion" and "test on training set". This pap… ▽ More

    Submitted 1 May, 2023; v1 submitted 23 August, 2022; originally announced August 2022.

    Comments: 8 pages, 2 figures

    ACM Class: I.3

  45. arXiv:2208.06279  [pdf, other

    cs.AI cs.NE

    Developmental Network Two, Its Optimality, and Emergent Turing Machines

    Authors: Juyang Weng, Zejia Zheng, Xiang Wu

    Abstract: Strong AI requires the learning engine to be task non-specific and to automatically construct a dynamic hierarchy of internal features. By hierarchy, we mean, e.g., short road edges and short bush edges amount to intermediate features of landmarks; but intermediate features from tree shadows are distractors that must be disregarded by the high-level landmark concept. By dynamic, we mean the automa… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: US patent application document 81 pages, 17 figures, patent approval pending

    MSC Class: 60-08 ACM Class: I.2

  46. arXiv:2207.14804  [pdf, other

    eess.IV cs.CV cs.LG

    Artifact Identification in X-ray Diffraction Data using Machine Learning Methods

    Authors: Howard Yanxon, James Weng, Hannah Parraga, Wenqian Xu, Uta Ruett, Nicholas Schwarz

    Abstract: The in situ synchrotron high-energy X-ray powder diffraction (XRD) technique is highly utilized by researchers to analyze the crystallographic structures of materials in functional devices (e.g., battery materials) or in complex sample environments (e.g., diamond anvil cells or syntheses reactors). An atomic structure of a material can be identified by its diffraction pattern, along with detailed… ▽ More

    Submitted 29 July, 2022; originally announced July 2022.

    Journal ref: (2023). J. Synchrotron Rad. 30,

  47. Deep Learning for Classification of Thyroid Nodules on Ultrasound: Validation on an Independent Dataset

    Authors: Jingxi Weng, Benjamin Wildman-Tobriner, Mateusz Buda, Jichen Yang, Lisa M. Ho, Brian C. Allen, Wendy L. Ehieli, Chad M. Miller, Jikai Zhang, Maciej A. Mazurowski

    Abstract: Objectives: The purpose is to apply a previously validated deep learning algorithm to a new thyroid nodule ultrasound image dataset and compare its performances with radiologists. Methods: Prior study presented an algorithm which is able to detect thyroid nodules and then make malignancy classifications with two ultrasound images. A multi-task deep convolutional neural network was trained from 127… ▽ More

    Submitted 4 May, 2023; v1 submitted 27 July, 2022; originally announced July 2022.

    Comments: Clinical Imaging (2023)

  48. arXiv:2207.10362  [pdf, other

    cs.CV

    LocVTP: Video-Text Pre-training for Temporal Localization

    Authors: Meng Cao, Tianyu Yang, Junwu Weng, Can Zhang, Jue Wang, Yuexian Zou

    Abstract: Video-Text Pre-training (VTP) aims to learn transferable representations for various downstream tasks from large-scale web videos. To date, almost all existing VTP methods are limited to retrieval-based downstream tasks, e.g., video retrieval, whereas their transfer potentials on localization-based tasks, e.g., temporal grounding, are under-explored. In this paper, we experimentally analyze and de… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: Accepted by ECCV2022

  49. arXiv:2206.10736  [pdf

    cs.LG cs.AI q-fin.CP q-fin.TR

    Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window Denoise PPO

    Authors: Jin Fang, Jiacheng Weng, Yi Xiang, Xinwen Zhang

    Abstract: A novel framework for solving the optimal execution and placement problems using reinforcement learning (RL) with imitation was proposed. The RL agents trained from the proposed framework consistently outperformed the industry benchmark time-weighted average price (TWAP) strategy in execution cost and showed great generalization across out-of-sample trading dates and tickers. The impressive perfor… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

  50. arXiv:2206.10558  [pdf, other

    cs.LG cs.AI cs.DC cs.PF cs.RO

    EnvPool: A Highly Parallel Reinforcement Learning Environment Execution Engine

    Authors: Jiayi Weng, Min Lin, Shengyi Huang, Bo Liu, Denys Makoviichuk, Viktor Makoviychuk, Zichen Liu, Yufan Song, Ting Luo, Yukun Jiang, Zhongwen Xu, Shuicheng Yan

    Abstract: There has been significant progress in developing reinforcement learning (RL) training systems. Past works such as IMPALA, Apex, Seed RL, Sample Factory, and others, aim to improve the system's overall throughput. In this paper, we aim to address a common bottleneck in the RL training system, i.e., parallel environment execution, which is often the slowest part of the whole system but receives lit… ▽ More

    Submitted 12 October, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: NeurIPS'22 camera-ready version