Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 149 results for author: Yuan, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.19845  [pdf, other

    cs.LG cs.CR

    BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning

    Authors: Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Mingli Zhu, Ruotong Wang, Li Liu, Chao Shen

    Abstract: As an emerging approach to explore the vulnerability of deep neural networks (DNNs), backdoor learning has attracted increasing interest in recent years, and many seminal backdoor attack and defense algorithms are being developed successively or concurrently, in the status of a rapid arms race. However, mainly due to the diverse settings, and the difficulties of implementation and reproducibility… ▽ More

    Submitted 29 July, 2024; originally announced July 2024.

    Comments: Substantial extensions based on our previous conference version "Backdoorbench: A comprehensive benchmark of backdoor learning" published at NeurIPS D&B Track 2022. 20 backdoor attack algorithms, 32 backdoor defense algorithms, 11000+ pairs of attack-against-defense evaluations, 10 analyses, 18 analysis tools

  2. arXiv:2407.19430  [pdf, other

    cs.CV

    Progressive Domain Adaptation for Thermal Infrared Object Tracking

    Authors: Qiao Li, Kanlun Tan, Qiao Liu, Di Yuan, Xin Li, Yunpeng Liu

    Abstract: Due to the lack of large-scale labeled Thermal InfraRed (TIR) training datasets, most existing TIR trackers are trained directly on RGB datasets. However, tracking methods trained on RGB datasets suffer a significant drop-off in TIR data due to the domain shift issue. To this end, in this work, we propose a Progressive Domain Adaptation framework for TIR Tracking (PDAT), which transfers useful kno… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: 10 pages, 8 figures

  3. arXiv:2407.19244  [pdf, other

    cs.CV cs.MM

    Radio Frequency Signal based Human Silhouette Segmentation: A Sequential Diffusion Approach

    Authors: Penghui Wen, Kun Hu, Dong Yuan, Zhiyuan Ning, Changyang Li, Zhiyong Wang

    Abstract: Radio frequency (RF) signals have been proved to be flexible for human silhouette segmentation (HSS) under complex environments. Existing studies are mainly based on a one-shot approach, which lacks a coherent projection ability from the RF domain. Additionally, the spatio-temporal patterns have not been fully explored for human motion dynamics in HSS. Therefore, we propose a two-stage Sequential… ▽ More

    Submitted 27 July, 2024; originally announced July 2024.

  4. arXiv:2407.08558  [pdf, other

    cs.AI

    ST-Mamba: Spatial-Temporal Mamba for Traffic Flow Estimation Recovery using Limited Data

    Authors: Doncheng Yuan, Jianzhe Xue, Jinshan Su, Wenchao Xu, Haibo Zhou

    Abstract: Traffic flow estimation (TFE) is crucial for urban intelligent traffic systems. While traditional on-road detectors are hindered by limited coverage and high costs, cloud computing and data mining of vehicular network data, such as driving speeds and GPS coordinates, present a promising and cost-effective alternative. Furthermore, minimizing data collection can significantly reduce overhead. Howev… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Accepted by 2024 IEEE/CIC International Conference on Communications in China (ICCC)

  5. arXiv:2407.08047   

    cs.LG cs.AI

    Spatial-Temporal Attention Model for Traffic State Estimation with Sparse Internet of Vehicles

    Authors: Jianzhe Xue, Dongcheng Yuan, Yu Sun, Tianqi Zhang, Wenchao Xu, Haibo Zhou, Xuemin, Shen

    Abstract: The growing number of connected vehicles offers an opportunity to leverage internet of vehicles (IoV) data for traffic state estimation (TSE) which plays a crucial role in intelligent transportation systems (ITS). By utilizing only a portion of IoV data instead of the entire dataset, the significant overheads associated with collecting and processing large amounts of data can be avoided. In this p… ▽ More

    Submitted 14 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: need further improvement

  6. arXiv:2407.08034  [pdf, other

    cs.AI

    Spatial-Temporal Generative AI for Traffic Flow Estimation with Sparse Data of Connected Vehicles

    Authors: Jianzhe Xue, Yunting Xu, Dongcheng Yuan, Caoyi Zha, Hongyang Du, Haibo Zhou, Dusit Niyato

    Abstract: Traffic flow estimation (TFE) is crucial for intelligent transportation systems. Traditional TFE methods rely on extensive road sensor networks and typically incur significant costs. Sparse mobile crowdsensing enables a cost-effective alternative by utilizing sparsely distributed probe vehicle data (PVD) provided by connected vehicles. However, as pointed out by the central limit theorem, the spar… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  7. arXiv:2407.06754  [pdf, other

    cs.DC cs.AI

    Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges

    Authors: Yanli Li, Zhongliang Guo, Nan Yang, Huaming Chen, Dong Yuan, Weiping Ding

    Abstract: Federated Learning (FL) offers innovative solutions for privacy-preserving collaborative machine learning (ML). Despite its promising potential, FL is vulnerable to various attacks due to its distributed nature, affecting the entire life cycle of FL services. These threats can harm the model's utility or compromise participants' privacy, either directly or indirectly. In response, numerous defense… ▽ More

    Submitted 11 July, 2024; v1 submitted 9 July, 2024; originally announced July 2024.

  8. arXiv:2407.01595  [pdf, other

    cs.LG cs.CY cs.SE

    Fairpriori: Improving Biased Subgroup Discovery for Deep Neural Network Fairness

    Authors: Kacy Zhou, Jiawen Wen, Nan Yang, Dong Yuan, Qinghua Lu, Huaming Chen

    Abstract: While deep learning has become a core functional module of most software systems, concerns regarding the fairness of ML predictions have emerged as a significant issue that affects prediction results due to discrimination. Intersectional bias, which disproportionately affects members of subgroups, is a prime example of this. For instance, a machine learning model might exhibit bias against darker-… ▽ More

    Submitted 24 June, 2024; originally announced July 2024.

    Comments: 11 pages

  9. arXiv:2406.11397  [pdf, other

    cs.LG cs.AI stat.ML

    DistPred: A Distribution-Free Probabilistic Inference Method for Regression and Forecasting

    Authors: Daojun Liang, Haixia Zhang, Dongfeng Yuan

    Abstract: Traditional regression and prediction tasks often only provide deterministic point estimates. To estimate the uncertainty or distribution information of the response variable, methods such as Bayesian inference, model ensembling, or MC Dropout are typically used. These methods either assume that the posterior distribution of samples follows a Gaussian process or require thousands of forward passes… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  10. arXiv:2406.10655  [pdf, ps, other

    cs.CR

    E-SAGE: Explainability-based Defense Against Backdoor Attacks on Graph Neural Networks

    Authors: Dingqiang Yuan, Xiaohua Xu, Lei Yu, Tongchang Han, Rongchang Li, Meng Han

    Abstract: Graph Neural Networks (GNNs) have recently been widely adopted in multiple domains. Yet, they are notably vulnerable to adversarial and backdoor attacks. In particular, backdoor attacks based on subgraph insertion have been shown to be effective in graph classification tasks while being stealthy, successfully circumventing various existing defense methods. In this paper, we propose E-SAGE, a novel… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

  11. arXiv:2406.10391  [pdf, other

    q-bio.QM cs.LG

    BEACON: Benchmark for Comprehensive RNA Tasks and Language Models

    Authors: Yuchen Ren, Zhiyuan Chen, Lifeng Qiao, Hongtai Jing, Yuchen Cai, Sheng Xu, Peng Ye, Xinzhu Ma, Siqi Sun, Hongliang Yan, Dong Yuan, Wanli Ouyang, Xihui Liu

    Abstract: RNA plays a pivotal role in translating genetic instructions into functional outcomes, underscoring its importance in biological processes and disease mechanisms. Despite the emergence of numerous deep learning approaches for RNA, particularly universal RNA language models, there remains a significant lack of standardized benchmarks to assess the effectiveness of these methods. In this study, we i… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  12. arXiv:2406.08688  [pdf, other

    cs.SE cs.AI

    On Security Weaknesses and Vulnerabilities in Deep Learning Systems

    Authors: Zhongzheng Lai, Huaming Chen, Ruoxi Sun, Yu Zhang, Minhui Xue, Dong Yuan

    Abstract: The security guarantee of AI-enabled software systems (particularly using deep learning techniques as a functional core) is pivotal against the adversarial attacks exploiting software vulnerabilities. However, little attention has been paid to a systematic investigation of vulnerabilities in such systems. A common situation learned from the open source software community is that deep learning engi… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  13. arXiv:2405.14251  [pdf, other

    cs.RO eess.SY

    Efficient Navigation of a Robotic Fish Swimming Across the Vortical Flow Field

    Authors: Haodong Feng, Dehan Yuan, Jiale Miao, Jie You, Yue Wang, Yi Zhu, Dixia Fan

    Abstract: Navigating efficiently across vortical flow fields presents a significant challenge in various robotic applications. The dynamic and unsteady nature of vortical flows often disturbs the control of underwater robots, complicating their operation in hydrodynamic environments. Conventional control methods, which depend on accurate modeling, fail in these settings due to the complexity of fluid-struct… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  14. arXiv:2405.12530  [pdf, other

    cs.NI

    Multi-hop Multi-RIS Wireless Communication Systems: Multi-reflection Path Scheduling and Beamforming

    Authors: Xiaoyan Ma, Haixia Zhang, Xianhao Chen, Yuguang Fangmand Dongfeng Yuan

    Abstract: Reconfigurable intelligent surface (RIS) provides a promising way to proactively augment propagation environments for better transmission performance in wireless communications. Existing multi-RIS works mainly focus on link-level optimization with predetermined transmission paths, which cannot be directly extended to system-level management, since they neither consider the interference caused by u… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: Accepted by IEEE Transactions on Wireless Communication

  15. arXiv:2405.10825  [pdf, other

    eess.SY cs.LG

    Large Language Model (LLM) for Telecommunications: A Comprehensive Survey on Principles, Key Techniques, and Opportunities

    Authors: Hao Zhou, Chengming Hu, Ye Yuan, Yufei Cui, Yili Jin, Can Chen, Haolun Wu, Dun Yuan, Li Jiang, Di Wu, Xue Liu, Charlie Zhang, Xianbin Wang, Jiangchuan Liu

    Abstract: Large language models (LLMs) have received considerable attention recently due to their outstanding comprehension and reasoning capabilities, leading to great progress in many fields. The advancement of LLM techniques also offers promising opportunities to automate many tasks in the telecommunication (telecom) field. After pre-training and fine-tuning, LLMs can perform diverse downstream tasks bas… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  16. arXiv:2405.07444  [pdf, other

    cs.CV

    Motion Keyframe Interpolation for Any Human Skeleton via Temporally Consistent Point Cloud Sampling and Reconstruction

    Authors: Clinton Mo, Kun Hu, Chengjiang Long, Dong Yuan, Zhiyong Wang

    Abstract: In the character animation field, modern supervised keyframe interpolation models have demonstrated exceptional performance in constructing natural human motions from sparse pose definitions. As supervised models, large motion datasets are necessary to facilitate the learning process; however, since motion is represented with fixed hierarchical skeletons, such datasets are incompatible for skeleto… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 17 pages, 7 figures

  17. arXiv:2405.02360  [pdf, other

    cs.LG cs.DC

    Holistic Evaluation Metrics: Use Case Sensitive Evaluation Metrics for Federated Learning

    Authors: Yanli Li, Jehad Ibrahim, Huaming Chen, Dong Yuan, Kim-Kwang Raymond Choo

    Abstract: A large number of federated learning (FL) algorithms have been proposed for different applications and from varying perspectives. However, the evaluation of such approaches often relies on a single metric (e.g., accuracy). Such a practice fails to account for the unique demands and diverse requirements of different use cases. Thus, how to comprehensively evaluate an FL algorithm and determine the… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  18. arXiv:2404.19666  [pdf, other

    cs.CV eess.IV

    Beyond MOS: Subjective Image Quality Score Preprocessing Method Based on Perceptual Similarity

    Authors: Lei Wang, Desen Yuan

    Abstract: Image quality assessment often relies on raw opinion scores provided by subjects in subjective experiments, which can be noisy and unreliable. To address this issue, postprocessing procedures such as ITU-R BT.500, ITU-T P.910, and ITU-T P.913 have been standardized to clean up the original opinion scores. These methods use annotator-based statistical priors, but they do not take into account exten… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  19. arXiv:2404.19595  [pdf, other

    cs.CV eess.IV

    Perceptual Constancy Constrained Single Opinion Score Calibration for Image Quality Assessment

    Authors: Lei Wang, Desen Yuan

    Abstract: In this paper, we propose a highly efficient method to estimate an image's mean opinion score (MOS) from a single opinion score (SOS). Assuming that each SOS is the observed sample of a normal distribution and the MOS is its unknown expectation, the MOS inference is formulated as a maximum likelihood estimation problem, where the perceptual correlation of pairwise images is considered in modeling… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  20. arXiv:2404.19567  [pdf, other

    cs.CV eess.IV

    Causal Perception Inspired Representation Learning for Trustworthy Image Quality Assessment

    Authors: Lei Wang, Desen Yuan

    Abstract: Despite great success in modeling visual perception, deep neural network based image quality assessment (IQA) still remains unreliable in real-world applications due to its vulnerability to adversarial perturbations and the inexplicit black-box structure. In this paper, we propose to build a trustworthy IQA model via Causal Perception inspired Representation Learning (CPRL), and a score reflection… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  21. arXiv:2404.01568  [pdf, other

    cs.CV cs.CG

    A Linear Time and Space Local Point Cloud Geometry Encoder via Vectorized Kernel Mixture (VecKM)

    Authors: Dehao Yuan, Cornelia Fermüller, Tahseen Rabbani, Furong Huang, Yiannis Aloimonos

    Abstract: We propose VecKM, a local point cloud geometry encoder that is descriptive and efficient to compute. VecKM leverages a unique approach by vectorizing a kernel mixture to represent the local point cloud. Such representation's descriptiveness is supported by two theorems that validate its ability to reconstruct and preserve the similarity of the local shape. Unlike existing encoders downsampling the… ▽ More

    Submitted 30 June, 2024; v1 submitted 1 April, 2024; originally announced April 2024.

    Comments: ICML2024 Conference Paper

  22. arXiv:2403.15032  [pdf

    cs.CV

    An Integrated Neighborhood and Scale Information Network for Open-Pit Mine Change Detection in High-Resolution Remote Sensing Images

    Authors: Zilin Xie, Kangning Li, Jinbao Jiang, Jinzhong Yang, Xiaojun Qiao, Deshuai Yuan, Cheng Nie

    Abstract: Open-pit mine change detection (CD) in high-resolution (HR) remote sensing images plays a crucial role in mineral development and environmental protection. Significant progress has been made in this field in recent years, largely due to the advancement of deep learning techniques. However, existing deep-learning-based CD methods encounter challenges in effectively integrating neighborhood and scal… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  23. arXiv:2403.09057  [pdf, other

    cs.CL cs.AI

    A Continued Pretrained LLM Approach for Automatic Medical Note Generation

    Authors: Dong Yuan, Eti Rastogi, Gautam Naik, Sree Prasanna Rajagopal, Sagar Goyal, Fen Zhao, Bharath Chintagunta, Jeff Ward

    Abstract: LLMs are revolutionizing NLP tasks. However, the use of the most advanced LLMs, such as GPT-4, is often prohibitively expensive for most specialized fields. We introduce HEAL, the first continuously trained 13B LLaMA2-based LLM that is purpose-built for medical conversations and measured on automated scribing. Our results demonstrate that HEAL outperforms GPT-4 and PMC-LLaMA in PubMedQA, with an a… ▽ More

    Submitted 3 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: Accepted to NAACL 2024

  24. arXiv:2403.01774  [pdf, other

    cs.CL

    WebCiteS: Attributed Query-Focused Summarization on Chinese Web Search Results with Citations

    Authors: Haolin Deng, Chang Wang, Xin Li, Dezhang Yuan, Junlang Zhan, Tianhua Zhou, Jin Ma, Jun Gao, Ruifeng Xu

    Abstract: Enhancing the attribution in large language models (LLMs) is a crucial task. One feasible approach is to enable LLMs to cite external sources that support their generations. However, existing datasets and evaluation methods in this domain still exhibit notable limitations. In this work, we formulate the task of attributed query-focused summarization (AQFS) and present WebCiteS, a Chinese dataset f… ▽ More

    Submitted 28 May, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 20 pages, 7 figures, accepted to ACL 2024 main conference

  25. arXiv:2402.02332  [pdf, other

    cs.LG

    Minusformer: Improving Time Series Forecasting by Progressively Learning Residuals

    Authors: Daojun Liang, Haixia Zhang, Dongfeng Yuan, Bingzheng Zhang, Minggao Zhang

    Abstract: In this paper, we find that ubiquitous time series (TS) forecasting models are prone to severe overfitting. To cope with this problem, we embrace a de-redundancy approach to progressively reinstate the intrinsic values of TS for future intervals. Specifically, we introduce a dual-stream and subtraction mechanism, which is a deep Boosting ensemble learning method. And the vanilla Transformer is ren… ▽ More

    Submitted 17 June, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

  26. arXiv:2401.15002  [pdf, other

    cs.CV

    BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning

    Authors: Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Mingli Zhu, Ruotong Wang, Li Liu, Chao Shen

    Abstract: As an emerging and vital topic for studying deep neural networks' vulnerability (DNNs), backdoor learning has attracted increasing interest in recent years, and many seminal backdoor attack and defense algorithms are being developed successively or concurrently, in the status of a rapid arms race. However, mainly due to the diverse settings, and the difficulties of implementation and reproducibili… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  27. arXiv:2401.13578  [pdf, other

    cs.CR

    WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition

    Authors: Zhengyao Song, Yongqiang Li, Danni Yuan, Li Liu, Shaokui Wei, Baoyuan Wu

    Abstract: This work explores an emerging security threat against deep neural networks (DNNs) based image classification, i.e., backdoor attack. In this scenario, the attacker aims to inject a backdoor into the model by manipulating training data, such that the backdoor could be activated by a particular trigger and bootstraps the model to make a target prediction at inference. Currently, most existing data… ▽ More

    Submitted 24 May, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

    Comments: 15 pages, 15 figures

    ACM Class: I.4.9

  28. arXiv:2401.06031  [pdf, other

    cs.CV

    GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model

    Authors: Zhiyu Zhu, Huaming Chen, Xinyi Wang, Jiayu Zhang, Zhibo Jin, Kim-Kwang Raymond Choo, Jun Shen, Dong Yuan

    Abstract: Adversarial generative models, such as Generative Adversarial Networks (GANs), are widely applied for generating various types of data, i.e., images, text, and audio. Accordingly, its promising performance has led to the GAN-based adversarial attack methods in the white-box and black-box attack scenarios. The importance of transferable black-box attacks lies in their ability to be effective across… ▽ More

    Submitted 29 January, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: Accepted by SIAM International Conference on Data Mining (SDM24)

  29. arXiv:2401.01244  [pdf, other

    cs.CV

    Temporal Adaptive RGBT Tracking with Modality Prompt

    Authors: Hongyu Wang, Xiaotao Liu, Yifan Li, Meng Sun, Dian Yuan, Jing Liu

    Abstract: RGBT tracking has been widely used in various fields such as robotics, surveillance processing, and autonomous driving. Existing RGBT trackers fully explore the spatial information between the template and the search region and locate the target based on the appearance matching results. However, these RGBT trackers have very limited exploitation of temporal information, either ignoring temporal in… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  30. arXiv:2312.10861  [pdf, other

    cs.SE cs.AI

    Code Ownership in Open-Source AI Software Security

    Authors: Jiawen Wen, Dong Yuan, Lei Ma, Huaming Chen

    Abstract: As open-source AI software projects become an integral component in the AI software development, it is critical to develop a novel methods to ensure and measure the security of the open-source projects for developers. Code ownership, pivotal in the evolution of such projects, offers insights into developer engagement and potential vulnerabilities. In this paper, we leverage the code ownership metr… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

    Comments: 8 pages, in submission for review

  31. arXiv:2312.08890  [pdf, other

    cs.CV cs.CR cs.LG

    Defenses in Adversarial Machine Learning: A Survey

    Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu

    Abstract: Adversarial phenomenon has been widely observed in machine learning (ML) systems, especially in those using deep neural networks, describing that ML systems may produce inconsistent and incomprehensible predictions with humans at some particular cases. This phenomenon poses a serious security threat to the practical application of ML systems, and several advanced attack paradigms have been develop… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Comments: 21 pages, 5 figures, 2 tables, 237 reference papers

  32. arXiv:2312.06230  [pdf, other

    cs.CR

    Activation Gradient based Poisoned Sample Detection Against Backdoor Attacks

    Authors: Danni Yuan, Shaokui Wei, Mingda Zhang, Li Liu, Baoyuan Wu

    Abstract: This work studies the task of poisoned sample detection for defending against data poisoning based backdoor attacks. Its core challenge is finding a generalizable and discriminative metric to distinguish between clean and various types of poisoned samples (e.g., various triggers, various poisoning ratios). Inspired by a common phenomenon in backdoor attacks that the backdoored model tend to map si… ▽ More

    Submitted 27 May, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

  33. arXiv:2312.04141  [pdf, ps, other

    cs.IT

    Distributed Approximate Computing with Constant Locality

    Authors: Deheng Yuan, Tao Guo, Zhongyi Huang, Shi Jin

    Abstract: Consider a distributed coding for computing problem with constant decoding locality, i.e., with a vanishing error probability, any single sample of the function can be approximately recovered by probing only constant number of compressed bits. We establish an achievable rate region by designing an efficient layered coding scheme, where the coding rate is reduced by introducing auxiliary random var… ▽ More

    Submitted 29 February, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

  34. arXiv:2311.15846  [pdf, other

    cs.CV eess.IV

    Learning with Noisy Low-Cost MOS for Image Quality Assessment via Dual-Bias Calibration

    Authors: Lei Wang, Qingbo Wu, Desen Yuan, King Ngi Ngan, Hongliang Li, Fanman Meng, Linfeng Xu

    Abstract: Learning based image quality assessment (IQA) models have obtained impressive performance with the help of reliable subjective quality labels, where mean opinion score (MOS) is the most popular choice. However, in view of the subjective bias of individual annotators, the labor-abundant MOS (LA-MOS) typically requires a large collection of opinion scores from multiple annotators for each image, whi… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  35. arXiv:2311.05826  [pdf, other

    cs.CR

    Honest Score Client Selection Scheme: Preventing Federated Learning Label Flipping Attacks in Non-IID Scenarios

    Authors: Yanli Li, Huaming Chen, Wei Bao, Zhengmeng Xu, Dong Yuan

    Abstract: Federated Learning (FL) is a promising technology that enables multiple actors to build a joint model without sharing their raw data. The distributed nature makes FL vulnerable to various poisoning attacks, including model poisoning attacks and data poisoning attacks. Today, many byzantine-resilient FL methods have been introduced to mitigate the model poisoning attack, while the effectiveness whe… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

  36. arXiv:2311.00187  [pdf, other

    cs.CV

    Decodable and Sample Invariant Continuous Object Encoder

    Authors: Dehao Yuan, Furong Huang, Cornelia Fermüller, Yiannis Aloimonos

    Abstract: We propose Hyper-Dimensional Function Encoding (HDFE). Given samples of a continuous object (e.g. a function), HDFE produces an explicit vector representation of the given object, invariant to the sample distribution and density. Sample distribution and density invariance enables HDFE to consistently encode continuous objects regardless of their sampling, and therefore allows neural networks to re… ▽ More

    Submitted 6 May, 2024; v1 submitted 31 October, 2023; originally announced November 2023.

    Comments: ICLR2024 Conference Paper

  37. arXiv:2310.03908  [pdf, other

    cs.NI eess.SP

    Realizing XR Applications Using 5G-Based 3D Holographic Communication and Mobile Edge Computing

    Authors: Dun Yuan, Ekram Hossain, Di Wu, Xue Liu, Gregory Dudek

    Abstract: 3D holographic communication has the potential to revolutionize the way people interact with each other in virtual spaces, offering immersive and realistic experiences. However, demands for high data rates, extremely low latency, and high computations to enable this technology pose a significant challenge. To address this challenge, we propose a novel job scheduling algorithm that leverages Mobile… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  38. arXiv:2309.10249  [pdf, ps, other

    cs.IT

    Distributed Matrix Multiplication with a Smaller Recovery Threshold through Modulo-based Approaches

    Authors: Zhiquan Tan, Dingli Yuan, Zihao Wang, Zhongyi Huang

    Abstract: This paper considers the problem of calculating the matrix multiplication of two massive matrices $\mathbf{A}$ and $\mathbf{B}$ distributedly. We provide a modulo technique that can be applied to coded distributed matrix multiplication problems to reduce the recovery threshold. This technique exploits the special structure of interpolation points and can be applied to many existing coded matrix de… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  39. arXiv:2309.09315  [pdf, ps, other

    cs.CR cs.IT

    Privacy-Preserving Polynomial Computing Over Distributed Data

    Authors: Zhiquan Tan, Dingli Yuan, Zhongyi Huang

    Abstract: In this letter, we delve into a scenario where a user aims to compute polynomial functions using their own data as well as data obtained from distributed sources. To accomplish this, the user enlists the assistance of $N$ distributed workers, thereby defining a problem we refer to as privacy-preserving polynomial computing over distributed data. To address this challenge, we propose an approach fo… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  40. arXiv:2309.06849  [pdf, other

    cs.IT

    Multiplexed Streaming Codes for Messages With Different Decoding Delays in Channel with Burst and Random Erasures

    Authors: Dingli Yuan, Zhiquan Tan, Zhongyi Huang

    Abstract: In a real-time transmission scenario, messages are transmitted through a channel that is subject to packet loss. The destination must recover the messages within the required deadline. In this paper, we consider a setup where two different types of messages with distinct decoding deadlines are transmitted through a channel that can introduce burst erasures of a length at most $B$, or $N$ random er… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  41. arXiv:2309.04204  [pdf, ps, other

    cs.NI eess.SP

    Task Offloading Optimization in Mobile Edge Computing under Uncertain Processing Cycles and Intermittent Communications

    Authors: Tao Deng, Zhanwei Yu, Di Yuan

    Abstract: Mobile edge computing (MEC) has been regarded as a promising approach to deal with explosive computation requirements by enabling cloud computing capabilities at the edge of networks. Existing models of MEC impose some strong assumptions on the known processing cycles and unintermittent communications. However, practical MEC systems are constrained by various uncertainties and intermittent communi… ▽ More

    Submitted 7 October, 2023; v1 submitted 8 September, 2023; originally announced September 2023.

  42. arXiv:2308.16004  [pdf, ps, other

    math.OC cs.GT

    Riemannian Optimistic Algorithms

    Authors: Xi Wang, Deming Yuan, Yiguang Hong, Zihao Hu, Lei Wang, Guodong Shi

    Abstract: In this paper, we consider Riemannian online convex optimization with dynamic regret. First, we propose two novel algorithms, namely the Riemannian Online Optimistic Gradient Descent (R-OOGD) and the Riemannian Adaptive Online Optimistic Gradient Descent (R-AOOGD), which combine the advantages of classical optimistic algorithms with the rich geometric properties of Riemannian manifolds. We analyze… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  43. arXiv:2307.09691  [pdf, other

    cs.NI cs.LG

    Joint Service Caching, Communication and Computing Resource Allocation in Collaborative MEC Systems: A DRL-based Two-timescale Approach

    Authors: Qianqian Liu, Haixia Zhang, Xin Zhang, Dongfeng Yuan

    Abstract: Meeting the strict Quality of Service (QoS) requirements of terminals has imposed a signiffcant challenge on Multiaccess Edge Computing (MEC) systems, due to the limited multidimensional resources. To address this challenge, we propose a collaborative MEC framework that facilitates resource sharing between the edge servers, and with the aim to maximize the long-term QoS and reduce the cache switch… ▽ More

    Submitted 26 April, 2024; v1 submitted 18 July, 2023; originally announced July 2023.

  44. arXiv:2306.13093  [pdf, ps, other

    eess.SP cs.ET

    Robust Divergence Angle for Inter-satellite Laser Communications under Target Deviation Uncertainty

    Authors: Zhanwei Yu, Yi Zhao, Di Yuan

    Abstract: Performance degradation due to target deviation by, for example, drift or jitter, presents a significant issue to inter-satellite laser communications. In particular, with periodic acquisition for positioning the satellite receiver, deviation may arise in the time period between two consecutive acquisition operations. One solution to mitigate the issue is to use a divergence angle at the transmitt… ▽ More

    Submitted 13 May, 2023; originally announced June 2023.

  45. arXiv:2306.08939  [pdf, other

    cs.CV

    Revisiting Stereo Triangulation in UAV Distance Estimation

    Authors: Jiafan Zhuang, Duan Yuan, Rihong Yan, Weixin Huang, Wenji Li, Zhun Fan

    Abstract: Distance estimation plays an important role for path planning and collision avoidance of swarm UAVs. However, the lack of annotated data seriously hinders the related studies. In this work, we build and present a UAVDE dataset for UAV distance estimation, in which distance between two UAVs is obtained by UWB sensors. During experiments, we surprisingly observe that the stereo triangulation cannot… ▽ More

    Submitted 2 December, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  46. arXiv:2306.05035  [pdf, other

    cs.LG

    Does Long-Term Series Forecasting Need Complex Attention and Extra Long Inputs?

    Authors: Daojun Liang, Haixia Zhang, Dongfeng Yuan, Xiaoyan Ma, Dongyang Li, Minggao Zhang

    Abstract: As Transformer-based models have achieved impressive performance on various time series tasks, Long-Term Series Forecasting (LTSF) tasks have also received extensive attention in recent years. However, due to the inherent computational complexity and long sequences demanding of Transformer-based methods, its application on LTSF tasks still has two major issues that need to be further investigated:… ▽ More

    Submitted 3 February, 2024; v1 submitted 8 June, 2023; originally announced June 2023.

    Comments: Under Review

  47. arXiv:2306.04981  [pdf, ps, other

    cs.IT

    Computation of a Unified Graph-Based Rate Optimization Problem

    Authors: Deheng Yuan, Tao Guo, Zhongyi Huang, Shi Jin

    Abstract: We define a graph-based rate optimization problem and consider its computation, which provides a unified approach to the computation of various theoretical limits, such as the (conditional) graph entropy, rate-distortion functions and capacity-cost functions with two-sided information. Our contributions are twofold. On the theoretical side, we simplify the graph-based problem by constructing exp… ▽ More

    Submitted 14 May, 2024; v1 submitted 8 June, 2023; originally announced June 2023.

  48. arXiv:2304.07705  [pdf, other

    cs.CV

    Handling Heavy Occlusion in Dense Crowd Tracking by Focusing on the Heads

    Authors: Yu Zhang, Huaming Chen, Wei Bao, Zhongzheng Lai, Zao Zhang, Dong Yuan

    Abstract: With the rapid development of deep learning, object detection and tracking play a vital role in today's society. Being able to identify and track all the pedestrians in the dense crowd scene with computer vision approaches is a typical challenge in this field, also known as the Multiple Object Tracking (MOT) challenge. Modern trackers are required to operate on more and more complicated scenes. Ac… ▽ More

    Submitted 30 October, 2023; v1 submitted 16 April, 2023; originally announced April 2023.

    Comments: Accepted at AJCAI 2023

  49. arXiv:2303.13686  [pdf, other

    cs.NI eess.SP

    Mixed-Variable PSO with Fairness on Multi-Objective Field Data Replication in Wireless Networks

    Authors: Dun Yuan, Yujin Nam, Amal Feriani, Abhisek Konar, Di Wu, Seowoo Jang, Xue Liu, Greg Dudek

    Abstract: Digital twins have shown a great potential in supporting the development of wireless networks. They are virtual representations of 5G/6G systems enabling the design of machine learning and optimization-based techniques. Field data replication is one of the critical aspects of building a simulation-based twin, where the objective is to calibrate the simulation to match field performance measurement… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: Accepted in International Conference on Communications (ICC) 2023

  50. arXiv:2303.11339  [pdf, other

    cs.LG cs.AI

    FedMAE: Federated Self-Supervised Learning with One-Block Masked Auto-Encoder

    Authors: Nan Yang, Xuanyu Chen, Charles Z. Liu, Dong Yuan, Wei Bao, Lizhen Cui

    Abstract: Latest federated learning (FL) methods started to focus on how to use unlabeled data in clients for training due to users' privacy concerns, high labeling costs, or lack of expertise. However, current Federated Semi-Supervised/Self-Supervised Learning (FSSL) approaches fail to learn large-scale images because of the limited computing resources of local clients. In this paper, we introduce a new fr… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.