Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 283 results for author: Zhu, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.02650  [pdf, other

    cs.CR cs.ET

    SoK: Bitcoin Layer Two (L2)

    Authors: Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono

    Abstract: We present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions \& creating proofs). Notably,… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

  2. arXiv:2409.01931  [pdf, other

    physics.chem-ph cs.AI cs.LG physics.bio-ph physics.comp-ph

    On the design space between molecular mechanics and machine learning force fields

    Authors: Yuanqing Wang, Kenichiro Takaba, Michael S. Chen, Marcus Wieder, Yuzhi Xu, Tong Zhu, John Z. H. Zhang, Arnav Nagle, Kuang Yu, Xinyan Wang, Daniel J. Cole, Joshua A. Rackers, Kyunghyun Cho, Joe G. Greener, Peter Eastman, Stefano Martiniani, Mark E. Tuckerman

    Abstract: A force field as accurate as quantum mechanics (QM) and as fast as molecular mechanics (MM), with which one can simulate a biomolecular system efficiently enough and meaningfully enough to get quantitative insights, is among the most ardent dreams of biophysicists -- a dream, nevertheless, not to be fulfilled any time soon. Machine learning force fields (MLFFs) represent a meaningful endeavor towa… ▽ More

    Submitted 5 September, 2024; v1 submitted 3 September, 2024; originally announced September 2024.

  3. arXiv:2408.12099  [pdf, other

    cs.CV cs.CR

    Query-Efficient Video Adversarial Attack with Stylized Logo

    Authors: Duoxun Tang, Yuxin Cao, Xi Xiao, Derui Wang, Sheng Wen, Tianqing Zhu

    Abstract: Video classification systems based on Deep Neural Networks (DNNs) have demonstrated excellent performance in accurately verifying video content. However, recent studies have shown that DNNs are highly vulnerable to adversarial examples. Therefore, a deep understanding of adversarial attacks can better respond to emergency situations. In order to improve attack performance, many style-transfer-base… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  4. arXiv:2408.12076  [pdf, other

    cs.CL cs.AI

    ConflictBank: A Benchmark for Evaluating the Influence of Knowledge Conflicts in LLM

    Authors: Zhaochen Su, Jun Zhang, Xiaoye Qu, Tong Zhu, Yanshu Li, Jiashuo Sun, Juntao Li, Min Zhang, Yu Cheng

    Abstract: Large language models (LLMs) have achieved impressive advancements across numerous disciplines, yet the critical issue of knowledge conflicts, a major source of hallucinations, has rarely been studied. Only a few research explored the conflicts between the inherent knowledge of LLMs and the retrieved contextual knowledge. However, a thorough assessment of knowledge conflict in LLMs is still missin… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: Under Review

  5. arXiv:2408.10531  [pdf, other

    cs.RO

    Leveraging Temporal Contexts to Enhance Vehicle-Infrastructure Cooperative Perception

    Authors: Jiaru Zhong, Haibao Yu, Tianyi Zhu, Jiahui Xu, Wenxian Yang, Zaiqing Nie, Chao Sun

    Abstract: Infrastructure sensors installed at elevated positions offer a broader perception range and encounter fewer occlusions. Integrating both infrastructure and ego-vehicle data through V2X communication, known as vehicle-infrastructure cooperation, has shown considerable advantages in enhancing perception capabilities and addressing corner cases encountered in single-vehicle autonomous driving. Howeve… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: Accepted by IEEE ITSC 2024

  6. arXiv:2408.09131  [pdf, other

    cs.CV

    Thin-Plate Spline-based Interpolation for Animation Line Inbetweening

    Authors: Tianyi Zhu, Wei Shang, Dongwei Ren, Wangmeng Zuo

    Abstract: Animation line inbetweening is a crucial step in animation production aimed at enhancing animation fluidity by predicting intermediate line arts between two key frames. However, existing methods face challenges in effectively addressing sparse pixels and significant motion in line art key frames. In literature, Chamfer Distance (CD) is commonly adopted for evaluating inbetweening performance. Desp… ▽ More

    Submitted 17 August, 2024; originally announced August 2024.

  7. arXiv:2408.03350  [pdf, other

    cs.AI cs.CL cs.LG

    miniCTX: Neural Theorem Proving with (Long-)Contexts

    Authors: Jiewen Hu, Thomas Zhu, Sean Welleck

    Abstract: We introduce miniCTX, which tests a model's ability to prove formal mathematical theorems that depend on new definitions, lemmas, or other contextual information that was not observed during training. miniCTX contains theorems sourced from real Lean projects and textbooks, each associated with a context that can span tens of thousands of tokens. Models are tasked with proving a theorem given acces… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

  8. arXiv:2407.19354  [pdf, other

    cs.CR

    The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies

    Authors: Feng He, Tianqing Zhu, Dayong Ye, Bo Liu, Wanlei Zhou, Philip S. Yu

    Abstract: Inspired by the rapid development of Large Language Models (LLMs), LLM agents have evolved to perform complex tasks. LLM agents are now extensively applied across various domains, handling vast amounts of data to interact with humans and execute tasks. The widespread applications of LLM agents demonstrate their significant commercial value; however, they also expose security and privacy vulnerabil… ▽ More

    Submitted 27 July, 2024; originally announced July 2024.

  9. arXiv:2407.16988  [pdf, other

    cs.CV

    DreamCar: Leveraging Car-specific Prior for in-the-wild 3D Car Reconstruction

    Authors: Xiaobiao Du, Haiyang Sun, Ming Lu, Tianqing Zhu, Xin Yu

    Abstract: Self-driving industries usually employ professional artists to build exquisite 3D cars. However, it is expensive to craft large-scale digital assets. Since there are already numerous datasets available that contain a vast number of images of cars, we focus on reconstructing high-quality 3D car models from these datasets. However, these datasets only contain one side of cars in the forward-moving s… ▽ More

    Submitted 29 July, 2024; v1 submitted 24 July, 2024; originally announced July 2024.

    Comments: Projet Page: https://xiaobiaodu.github.io/dreamcar-project/

  10. arXiv:2407.10671  [pdf, other

    cs.CL cs.AI

    Qwen2 Technical Report

    Authors: An Yang, Baosong Yang, Binyuan Hui, Bo Zheng, Bowen Yu, Chang Zhou, Chengpeng Li, Chengyuan Li, Dayiheng Liu, Fei Huang, Guanting Dong, Haoran Wei, Huan Lin, Jialong Tang, Jialin Wang, Jian Yang, Jianhong Tu, Jianwei Zhang, Jianxin Ma, Jianxin Yang, Jin Xu, Jingren Zhou, Jinze Bai, Jinzheng He, Junyang Lin , et al. (37 additional authors not shown)

    Abstract: This report introduces the Qwen2 series, the latest addition to our large language models and large multimodal models. We release a comprehensive suite of foundational and instruction-tuned language models, encompassing a parameter range from 0.5 to 72 billion, featuring dense models and a Mixture-of-Experts model. Qwen2 surpasses most prior open-weight models, including its predecessor Qwen1.5, a… ▽ More

    Submitted 17 July, 2024; v1 submitted 15 July, 2024; originally announced July 2024.

    Comments: 25 pages, 1 figure

  11. arXiv:2407.10058  [pdf, other

    cs.CL cs.AI

    Learning to Refuse: Towards Mitigating Privacy Risks in LLMs

    Authors: Zhenhua Liu, Tong Zhu, Chuanyuan Tan, Wenliang Chen

    Abstract: Large language models (LLMs) exhibit remarkable capabilities in understanding and generating natural language. However, these models can inadvertently memorize private information, posing significant privacy risks. This study addresses the challenge of enabling LLMs to protect specific individuals' private data without the need for complete retraining. We propose \return, a Real-world pErsonal daT… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

  12. arXiv:2407.05771  [pdf, other

    cs.CV

    Multi-times Monte Carlo Rendering for Inter-reflection Reconstruction

    Authors: Tengjie Zhu, Zhuo Chen, Jingnan Gao, Yichao Yan, Xiaokang Yang

    Abstract: Inverse rendering methods have achieved remarkable performance in reconstructing high-fidelity 3D objects with disentangled geometries, materials, and environmental light. However, they still face huge challenges in reflective surface reconstruction. Although recent methods model the light trace to learn specularity, the ignorance of indirect illumination makes it hard to handle inter-reflections… ▽ More

    Submitted 7 August, 2024; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: 10 pages,6 figures,NeurIPS 2024 Submitted

  13. arXiv:2407.01955  [pdf, other

    cs.CL

    S2D: Sorted Speculative Decoding For More Efficient Deployment of Nested Large Language Models

    Authors: Parsa Kavehzadeh, Mohammadreza Pourreza, Mojtaba Valipour, Tinashu Zhu, Haoli Bai, Ali Ghodsi, Boxing Chen, Mehdi Rezagholizadeh

    Abstract: Deployment of autoregressive large language models (LLMs) is costly, and as these models increase in size, the associated costs will become even more considerable. Consequently, different methods have been proposed to accelerate the token generation process and reduce costs. Speculative decoding (SD) is among the most promising approaches to speed up the LLM decoding process by verifying multiple… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  14. arXiv:2407.01251  [pdf, other

    cs.CR cs.AI

    QUEEN: Query Unlearning against Model Extraction

    Authors: Huajie Chen, Tianqing Zhu, Lefeng Zhang, Bo Liu, Derui Wang, Wanlei Zhou, Minhui Xue

    Abstract: Model extraction attacks currently pose a non-negligible threat to the security and privacy of deep learning models. By querying the model with a small dataset and usingthe query results as the ground-truth labels, an adversary can steal a piracy model with performance comparable to the original model. Two key issues that cause the threat are, on the one hand, accurate and unlimited queries can be… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  15. arXiv:2406.19644  [pdf, other

    cs.AI

    Beyond Human Preferences: Exploring Reinforcement Learning Trajectory Evaluation and Improvement through LLMs

    Authors: Zichao Shen, Tianchen Zhu, Qingyun Sun, Shiqi Gao, Jianxin Li

    Abstract: Reinforcement learning (RL) faces challenges in evaluating policy trajectories within intricate game tasks due to the difficulty in designing comprehensive and precise reward functions. This inherent difficulty curtails the broader application of RL within game environments characterized by diverse constraints. Preference-based reinforcement learning (PbRL) presents a pioneering framework that cap… ▽ More

    Submitted 30 June, 2024; v1 submitted 28 June, 2024; originally announced June 2024.

    Comments: accepted by IJCAI 2024 GAAMAL

  16. arXiv:2406.18569  [pdf, other

    cs.CV cs.AI

    FLOW: Fusing and Shuffling Global and Local Views for Cross-User Human Activity Recognition with IMUs

    Authors: Qi Qiu, Tao Zhu, Furong Duan, Kevin I-Kai Wang, Liming Chen, Mingxing Nie, Mingxing Nie

    Abstract: Inertial Measurement Unit (IMU) sensors are widely employed for Human Activity Recognition (HAR) due to their portability, energy efficiency, and growing research interest. However, a significant challenge for IMU-HAR models is achieving robust generalization performance across diverse users. This limitation stems from substantial variations in data distribution among individual users. One primary… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  17. arXiv:2406.16963  [pdf, other

    cs.LG cs.AI cs.CR cs.SI

    Large Language Models for Link Stealing Attacks Against Graph Neural Networks

    Authors: Faqian Guan, Tianqing Zhu, Hui Sun, Wanlei Zhou, Philip S. Yu

    Abstract: Graph data contains rich node features and unique edge information, which have been applied across various domains, such as citation networks or recommendation systems. Graph Neural Networks (GNNs) are specialized for handling such data and have shown impressive performance in many applications. However, GNNs may contain of sensitive information and susceptible to privacy attacks. For example, lin… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  18. arXiv:2406.16554  [pdf, other

    cs.CL

    LLaMA-MoE: Building Mixture-of-Experts from LLaMA with Continual Pre-training

    Authors: Tong Zhu, Xiaoye Qu, Daize Dong, Jiacheng Ruan, Jingqi Tong, Conghui He, Yu Cheng

    Abstract: Mixture-of-Experts (MoE) has gained increasing popularity as a promising framework for scaling up large language models (LLMs). However, training MoE from scratch in a large-scale setting still suffers from data-hungry and instability problems. Motivated by this limit, we investigate building MoE models from existing dense large language models. Specifically, based on the well-known LLaMA-2 7B mod… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  19. arXiv:2406.15346  [pdf, other

    cs.LG cs.AI

    Privacy Preserved Blood Glucose Level Cross-Prediction: An Asynchronous Decentralized Federated Learning Approach

    Authors: Chengzhe Piao, Taiyu Zhu, Yu Wang, Stephanie E Baldeweg, Paul Taylor, Pantelis Georgiou, Jiahao Sun, Jun Wang, Kezhi Li

    Abstract: Newly diagnosed Type 1 Diabetes (T1D) patients often struggle to obtain effective Blood Glucose (BG) prediction models due to the lack of sufficient BG data from Continuous Glucose Monitoring (CGM), presenting a significant "cold start" problem in patient care. Utilizing population models to address this challenge is a potential solution, but collecting patient data for training population models… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  20. arXiv:2406.14192  [pdf, other

    cs.CL cs.AI

    Timo: Towards Better Temporal Reasoning for Language Models

    Authors: Zhaochen Su, Jun Zhang, Tong Zhu, Xiaoye Qu, Juntao Li, Min Zhang, Yu Cheng

    Abstract: Reasoning about time is essential for Large Language Models (LLMs) to understand the world. Previous works focus on solving specific tasks, primarily on time-sensitive question answering. While these methods have proven effective, they cannot generalize to a wider spectrum of temporal reasoning tasks. Therefore, we propose a crucial question: Can we build a universal framework to handle a variety… ▽ More

    Submitted 18 August, 2024; v1 submitted 20 June, 2024; originally announced June 2024.

    Comments: This paper has been accepted to the COLM 2024 conference

  21. Unifying Graph Convolution and Contrastive Learning in Collaborative Filtering

    Authors: Yihong Wu, Le Zhang, Fengran Mo, Tianyu Zhu, Weizhi Ma, Jian-Yun Nie

    Abstract: Graph-based models and contrastive learning have emerged as prominent methods in Collaborative Filtering (CF). While many existing models in CF incorporate these methods in their design, there seems to be a limited depth of analysis regarding the foundational principles behind them. This paper bridges graph convolution, a pivotal element of graph-based models, with contrastive learning through a t… ▽ More

    Submitted 21 June, 2024; v1 submitted 20 June, 2024; originally announced June 2024.

    Comments: KDD 2024

  22. arXiv:2406.12516  [pdf, other

    cs.CR cs.DC cs.LG

    Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation

    Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu

    Abstract: Federated learning is a promising privacy-preserving paradigm for distributed machine learning. In this context, there is sometimes a need for a specialized process called machine unlearning, which is required when the effect of some specific training samples needs to be removed from a learning model due to privacy, security, usability, and/or legislative factors. However, problems arise when curr… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted by IEEE Transactions on Big Data

  23. arXiv:2406.11256  [pdf, other

    cs.CL

    Dynamic Data Mixing Maximizes Instruction Tuning for Mixture-of-Experts

    Authors: Tong Zhu, Daize Dong, Xiaoye Qu, Jiacheng Ruan, Wenliang Chen, Yu Cheng

    Abstract: Mixture-of-Experts (MoE) models have shown remarkable capability in instruction tuning, especially when the number of tasks scales. However, previous methods simply merge all training tasks (e.g. creative writing, coding, and mathematics) and apply fixed sampling weights, without considering the importance of different tasks as the model training state changes. In this way, the most helpful data c… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  24. arXiv:2406.10954  [pdf, other

    cs.LG cs.CR

    Towards Efficient Target-Level Machine Unlearning Based on Essential Graph

    Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Wei Zhao

    Abstract: Machine unlearning is an emerging technology that has come to attract widespread attention. A number of factors, including regulations and laws, privacy, and usability concerns, have resulted in this need to allow a trained model to forget some of its training data. Existing studies of machine unlearning mainly focus on unlearning requests that forget a cluster of instances or all instances from o… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  25. arXiv:2406.10953  [pdf, other

    cs.CR

    Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs

    Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou

    Abstract: Machine unlearning enables pre-trained models to eliminate the effects of partial training samples. Previous research has mainly focused on proposing efficient unlearning strategies. However, the verification of machine unlearning, or in other words, how to guarantee that a sample has been successfully unlearned, has been overlooked for a long time. Existing verification schemes typically rely on… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  26. arXiv:2406.10951  [pdf, other

    cs.CR

    Don't Forget Too Much: Towards Machine Unlearning on Feature Level

    Authors: Heng Xu, Tianqing Zhu, Wanlei Zhou, Wei Zhao

    Abstract: Machine unlearning enables pre-trained models to remove the effect of certain portions of training data. Previous machine unlearning schemes have mainly focused on unlearning a cluster of instances or all instances belonging to a specific class. These types of unlearning might have a significant impact on the model utility; and they may be inadequate for situations where we only need to unlearn fe… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  27. arXiv:2406.10884  [pdf, other

    cs.LG cs.CR cs.DC

    Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives

    Authors: Linlin Wang, Tianqing Zhu, Wanlei Zhou, Philip S. Yu

    Abstract: Federated learning is fast becoming a popular paradigm for applications involving mobile devices, banking systems, healthcare, and IoT systems. Hence, over the past five years, researchers have undertaken extensive studies on the privacy leaks, security threats, and fairness associated with these emerging models. For the most part, these three critical concepts have been studied in isolation; howe… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  28. arXiv:2406.10861  [pdf, other

    cs.LG cs.DC

    Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions

    Authors: Laiqiao Qin, Tianqing Zhu, Wanlei Zhou, Philip S. Yu

    Abstract: Federated Learning (FL) is a distributed and privacy-preserving machine learning paradigm that coordinates multiple clients to train a model while keeping the raw data localized. However, this traditional FL poses some challenges, including privacy risks, data heterogeneity, communication bottlenecks, and system heterogeneity issues. To tackle these challenges, knowledge distillation (KD) has been… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  29. arXiv:2406.10303  [pdf, other

    cs.CL cs.AI

    A Survey on Large Language Models from General Purpose to Medical Applications: Datasets, Methodologies, and Evaluations

    Authors: Jinqiang Wang, Huansheng Ning, Yi Peng, Qikai Wei, Daniel Tesfai, Wenwei Mao, Tao Zhu, Runhe Huang

    Abstract: Large Language Models (LLMs) have demonstrated surprising performance across various natural language processing tasks. Recently, medical LLMs enhanced with domain-specific knowledge have exhibited excellent capabilities in medical consultation and diagnosis. These models can smoothly simulate doctor-patient dialogues and provide professional medical advice. Most medical LLMs are developed through… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 20 pages,3 figures

  30. arXiv:2406.09072  [pdf, other

    cs.CL

    Living in the Moment: Can Large Language Models Grasp Co-Temporal Reasoning?

    Authors: Zhaochen Su, Juntao Li, Jun Zhang, Tong Zhu, Xiaoye Qu, Pan Zhou, Yan Bowen, Yu Cheng, Min zhang

    Abstract: Temporal reasoning is fundamental for large language models (LLMs) to comprehend the world. Current temporal reasoning datasets are limited to questions about single or isolated events, falling short in mirroring the realistic temporal characteristics involving concurrent nature and intricate temporal interconnections. In this paper, we introduce CoTempQA, a comprehensive co-temporal Question Answ… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: This paper has been accepted to the ACL 2024 main conference

  31. arXiv:2406.07973  [pdf, other

    cs.CR

    Unique Security and Privacy Threats of Large Language Model: A Comprehensive Survey

    Authors: Shang Wang, Tianqing Zhu, Bo Liu, Ming Ding, Xu Guo, Dayong Ye, Wanlei Zhou, Philip S. Yu

    Abstract: With the rapid development of artificial intelligence, large language models (LLMs) have made remarkable advancements in natural language processing. These models are trained on vast datasets to exhibit powerful language understanding and generation capabilities across various applications, including machine translation, chatbots, and agents. However, LLMs have revealed a variety of privacy and se… ▽ More

    Submitted 18 June, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

  32. arXiv:2406.06186  [pdf, other

    cs.CR

    A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks

    Authors: Hengzhu Liu, Ping Xiong, Tianqing Zhu, Philip S. Yu

    Abstract: The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals' data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of p… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  33. arXiv:2406.04875  [pdf, other

    cs.CV

    3DRealCar: An In-the-wild RGB-D Car Dataset with 360-degree Views

    Authors: Xiaobiao Du, Haiyang Sun, Shuyun Wang, Zhuojie Wu, Hongwei Sheng, Jiaying Ying, Ming Lu, Tianqing Zhu, Kun Zhan, Xin Yu

    Abstract: 3D cars are commonly used in self-driving systems, virtual/augmented reality, and games. However, existing 3D car datasets are either synthetic or low-quality, presenting a significant gap toward the high-quality real-world 3D car datasets and limiting their applications in practical scenarios. In this paper, we propose the first large-scale 3D real car dataset, termed 3DRealCar, offering three di… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Project Page: https://xiaobiaodu.github.io/3drealcar

  34. arXiv:2406.04076  [pdf, other

    cs.CR

    Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning

    Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou

    Abstract: The development of Large Language Models (LLMs) faces a significant challenge: the exhausting of publicly available fresh data. This is because training a LLM needs a large demanding of new data. Federated learning emerges as a promising solution, enabling collaborative model to contribute their private data to LLM global model. However, integrating federated learning with LLMs introduces new chal… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 16 pages, 7 figures,

  35. arXiv:2406.02075  [pdf, other

    cs.LG cs.NE

    ReLU-KAN: New Kolmogorov-Arnold Networks that Only Need Matrix Addition, Dot Multiplication, and ReLU

    Authors: Qi Qiu, Tao Zhu, Helin Gong, Liming Chen, Huansheng Ning

    Abstract: Limited by the complexity of basis function (B-spline) calculations, Kolmogorov-Arnold Networks (KAN) suffer from restricted parallel computing capability on GPUs. This paper proposes a novel ReLU-KAN implementation that inherits the core idea of KAN. By adopting ReLU (Rectified Linear Unit) and point-wise multiplication, we simplify the design of KAN's basis function and optimize the computation… ▽ More

    Submitted 12 August, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

  36. arXiv:2406.01333  [pdf, other

    cs.CL cs.AI

    Probing Language Models for Pre-training Data Detection

    Authors: Zhenhua Liu, Tong Zhu, Chuanyuan Tan, Haonan Lu, Bing Liu, Wenliang Chen

    Abstract: Large Language Models (LLMs) have shown their impressive capabilities, while also raising concerns about the data contamination problems due to privacy issues and leakage of benchmark datasets in the pre-training phase. Therefore, it is vital to detect the contamination by checking whether an LLM has been pre-trained on the target texts. Recent studies focus on the generated texts and compute perp… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: Accepted by ACL-2024 main conference

  37. arXiv:2405.20776  [pdf, other

    cs.CR cs.AI cs.DC cs.LG

    Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach

    Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Shui Yu, Wanlei Zhou

    Abstract: With the growing need to comply with privacy regulations and respond to user data deletion requests, integrating machine unlearning into IoT-based federated learning has become imperative. Traditional unlearning methods, however, often lack verifiable mechanisms, leading to challenges in establishing trust. This paper delves into the innovative integration of blockchain technology with federated l… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: 13 pages, 25 figures

  38. arXiv:2405.18610  [pdf, other

    cs.LG cs.AI

    DTR-Bench: An in silico Environment and Benchmark Platform for Reinforcement Learning Based Dynamic Treatment Regime

    Authors: Zhiyao Luo, Mingcheng Zhu, Fenglin Liu, Jiali Li, Yangchen Pan, Jiandong Zhou, Tingting Zhu

    Abstract: Reinforcement learning (RL) has garnered increasing recognition for its potential to optimise dynamic treatment regimes (DTRs) in personalised medicine, particularly for drug dosage prescriptions and medication recommendations. However, a significant challenge persists: the absence of a unified framework for simulating diverse healthcare scenarios and a comprehensive analysis to benchmark the effe… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 13 pages for main content

  39. arXiv:2405.18556  [pdf, other

    cs.LG cs.AI

    Reinforcement Learning in Dynamic Treatment Regimes Needs Critical Reexamination

    Authors: Zhiyao Luo, Yangchen Pan, Peter Watkinson, Tingting Zhu

    Abstract: In the rapidly changing healthcare landscape, the implementation of offline reinforcement learning (RL) in dynamic treatment regimes (DTRs) presents a mix of unprecedented opportunities and challenges. This position paper offers a critical examination of the current status of offline RL in the context of DTRs. We argue for a reassessment of applying RL in DTRs, citing concerns such as inconsistent… ▽ More

    Submitted 3 June, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: Accepted at ICML 2024. 9 pages for main content, 34 pages in total

  40. arXiv:2405.15662  [pdf, other

    cs.LG

    Class Machine Unlearning for Complex Data via Concepts Inference and Data Poisoning

    Authors: Wenhan Chang, Tianqing Zhu, Heng Xu, Wenjian Liu, Wanlei Zhou

    Abstract: In current AI era, users may request AI companies to delete their data from the training dataset due to the privacy concerns. As a model owner, retraining a model will consume significant computational resources. Therefore, machine unlearning is a new emerged technology to allow model owner to delete requested training data or a class with little affecting on the model performance. However, for la… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  41. arXiv:2405.12408  [pdf, other

    cs.RO eess.SY

    Flexible Active Safety Motion Control for Robotic Obstacle Avoidance: A CBF-Guided MPC Approach

    Authors: Jinhao Liu, Jun Yang, Jianliang Mao, Tianqi Zhu, Qihang Xie, Yimeng Li, Xiangyu Wang, Shihua Li

    Abstract: A flexible active safety motion (FASM) control approach is proposed for the avoidance of dynamic obstacles and the reference tracking in robot manipulators. The distinctive feature of the proposed method lies in its utilization of control barrier functions (CBF) to design flexible CBF-guided safety criteria (CBFSC) with dynamically optimized decay rates, thereby offering flexibility and active saf… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

    Comments: 11 pages, 11 figures

  42. arXiv:2405.08355  [pdf, other

    cs.CL

    Seal-Tools: Self-Instruct Tool Learning Dataset for Agent Tuning and Detailed Benchmark

    Authors: Mengsong Wu, Tong Zhu, Han Han, Chuanyuan Tan, Xiang Zhang, Wenliang Chen

    Abstract: This paper presents a new tool learning dataset Seal-Tools, which contains self-instruct API-like tools. Seal-Tools not only offers a large number of tools, but also includes instances which demonstrate the practical application of tools. Seeking to generate data on a large scale while ensuring reliability, we propose a self-instruct method to generate tools and instances, allowing precise control… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

    Comments: 14 pages, 10 figures

  43. arXiv:2405.08310  [pdf, other

    cs.RO

    Cross-Category Functional Grasp Tansfer

    Authors: Rina Wu, Tianqiang Zhu, Xiangbo Lin, Yi Sun

    Abstract: Generating grasps for a dexterous hand often requires numerous grasping annotations. However, annotating high DoF dexterous hand poses is quite challenging. Especially for functional grasps, the grasp pose must be convenient for subsequent manipulation tasks. This prompt us to explore how people achieve manipulations on new objects based on past grasp experiences. We find that when grasping new it… ▽ More

    Submitted 20 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

  44. arXiv:2405.07250  [pdf

    cs.DC

    Towards Cloud Efficiency with Large-scale Workload Characterization

    Authors: Anjaly Parayil, Jue Zhang, Xiaoting Qin, Íñigo Goiri, Lexiang Huang, Timothy Zhu, Chetan Bansal

    Abstract: Cloud providers introduce features (e.g., Spot VMs, Harvest VMs, and Burstable VMs) and optimizations (e.g., oversubscription, auto-scaling, power harvesting, and overclocking) to improve efficiency and reliability. To effectively utilize these features, it's crucial to understand the characteristics of workloads running in the cloud. However, workload characteristics can be complex and depend on… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 6 figures, 13 Tables

  45. arXiv:2405.02826  [pdf, other

    cs.CR

    Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports

    Authors: Tiantian Zhu, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen

    Abstract: Advanced Persistent Threat (APT) attacks have caused significant damage worldwide. Various Endpoint Detection and Response (EDR) systems are deployed by enterprises to fight against potential threats. However, EDR suffers from high false positives. In order not to affect normal operations, analysts need to investigate and filter detection results before taking countermeasures, in which heavy manua… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  46. arXiv:2405.02629  [pdf, other

    cs.CR

    SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time

    Authors: Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen, Mingqi Lv, Yan Chen

    Abstract: As the complexity and destructiveness of Advanced Persistent Threat (APT) increase, there is a growing tendency to identify a series of actions undertaken to achieve the attacker's target, called attack investigation. Currently, analysts construct the provenance graph to perform causality analysis on Point-Of-Interest (POI) event for capturing critical events (related to the attack). However, due… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  47. arXiv:2405.02485  [pdf, other

    cs.LG cs.AI

    A Survey of Few-Shot Learning for Biomedical Time Series

    Authors: Chenqi Li, Timothy Denison, Tingting Zhu

    Abstract: Advancements in wearable sensor technologies and the digitization of medical records have contributed to the unprecedented ubiquity of biomedical time series data. Data-driven models have tremendous potential to assist clinical diagnosis and improve patient care by improving long-term monitoring capabilities, facilitating early disease detection and intervention, as well as promoting personalized… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  48. arXiv:2404.19143  [pdf, other

    cs.DC

    Workload Intelligence: Punching Holes Through the Cloud Abstraction

    Authors: Lexiang Huang, Anjaly Parayil, Jue Zhang, Xiaoting Qin, Chetan Bansal, Jovan Stojkovic, Pantea Zardoshti, Pulkit Misra, Eli Cortez, Raphael Ghelman, Íñigo Goiri, Saravan Rajmohan, Jim Kleewein, Rodrigo Fonseca, Timothy Zhu, Ricardo Bianchini

    Abstract: Today, cloud workloads are essentially opaque to the cloud platform. Typically, the only information the platform receives is the virtual machine (VM) type and possibly a decoration to the type (e.g., the VM is evictable). Similarly, workloads receive little to no information from the platform; generally, workloads might receive telemetry from their VMs or exceptional signals (e.g., shortly before… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

  49. arXiv:2404.18231  [pdf, other

    cs.CL cs.AI

    From Persona to Personalization: A Survey on Role-Playing Language Agents

    Authors: Jiangjie Chen, Xintao Wang, Rui Xu, Siyu Yuan, Yikai Zhang, Wei Shi, Jian Xie, Shuang Li, Ruihan Yang, Tinghui Zhu, Aili Chen, Nianqi Li, Lida Chen, Caiyu Hu, Siye Wu, Scott Ren, Ziquan Fu, Yanghua Xiao

    Abstract: Recent advancements in large language models (LLMs) have significantly boosted the rise of Role-Playing Language Agents (RPLAs), i.e., specialized AI systems designed to simulate assigned personas. By harnessing multiple advanced abilities of LLMs, including in-context learning, instruction following, and social intelligence, RPLAs achieve a remarkable sense of human likeness and vivid role-playin… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: Preprint

  50. arXiv:2404.13588  [pdf, other

    cs.LG cs.AI

    Machine Unlearning via Null Space Calibration

    Authors: Huiqiang Chen, Tianqing Zhu, Xin Yu, Wanlei Zhou

    Abstract: Machine unlearning aims to enable models to forget specific data instances when receiving deletion requests. Current research centres on efficient unlearning to erase the influence of data from the model and neglects the subsequent impacts on the remaining data. Consequently, existing unlearning algorithms degrade the model's performance after unlearning, known as \textit{over-unlearning}. This pa… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

    Comments: Accepted by IJCAI-2024