Zum Hauptinhalt springen

Showing 201–250 of 460 results for author: Yi, J

.
  1. arXiv:2110.09678  [pdf, ps, other

    math.OC eess.SY

    Convergence Rate of Accelerated Average Consensus with Local Node Memory: Optimization and Analytic Solutions

    Authors: Jing-Wen Yi, Li Chai, Jingxin Zhang

    Abstract: Previous researches have shown that adding local memory can accelerate the consensus. It is natural to ask questions like what is the fastest rate achievable by the $M$-tap memory acceleration, and what are the corresponding control parameters. This paper introduces a set of effective and previously unused techniques to analyze the convergence rate of accelerated consensus with $M$-tap memory of l… ▽ More

    Submitted 10 December, 2021; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: 30 pages, 2 figures

  2. arXiv:2110.07867  [pdf, other

    cs.CL cs.AI

    Exploring Universal Intrinsic Task Subspace via Prompt Tuning

    Authors: Yujia Qin, Xiaozhi Wang, Yusheng Su, Yankai Lin, Ning Ding, Jing Yi, Weize Chen, Zhiyuan Liu, Juanzi Li, Lei Hou, Peng Li, Maosong Sun, Jie Zhou

    Abstract: Why can pre-trained language models (PLMs) learn universal representations and effectively adapt to broad NLP tasks differing a lot superficially? In this work, we empirically find evidence indicating that the adaptations of PLMs to various few-shot tasks can be reparameterized as optimizing only a few free parameters in a unified low-dimensional intrinsic task subspace, which may help us understa… ▽ More

    Submitted 25 November, 2022; v1 submitted 15 October, 2021; originally announced October 2021.

    Comments: Previously accepted by Findings of ACL 2022 and Findings of EMNLP 2022

  3. arXiv:2110.07841  [pdf

    physics.med-ph

    Optimal Needle Placement for Prostate Rotating-Shield Brachytherapy (RSBT)

    Authors: Jirong Yi, Quentin E. Adams, Karolyn M. Hopfensperger, Ryan T. Flynn, Yusung Kim, John M. Buatti, Weiyu Xu, Xiaodong Wu

    Abstract: Purpose: To present an efficient NEEdle Position Optimization (NEEPO) algorithm for prostate rotating shield brachytherapy (RSBT). With RSBT, the increased flexibility beyond conventional high-dose-rate brachytherapy (HDR-BT) due to the partially shielded radiation source has been shown by Adams et al. in 2020 to enable improved urethra sparing (23.1%), enhanced dose escalation (29.9%), or both, w… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 12 pages

  4. arXiv:2110.07718  [pdf, other

    cs.CV

    Adversarial Attack across Datasets

    Authors: Yunxiao Qin, Yuanhao Xiong, Jinfeng Yi, Lihong Cao, Cho-Jui Hsieh

    Abstract: Existing transfer attack methods commonly assume that the attacker knows the training set (e.g., the label set, the input size) of the black-box victim models, which is usually unrealistic because in some cases the attacker cannot know this information. In this paper, we define a Generalized Transferable Attack (GTA) problem where the attacker doesn't know this information and is acquired to attac… ▽ More

    Submitted 25 July, 2022; v1 submitted 12 October, 2021; originally announced October 2021.

  5. arXiv:2110.01167  [pdf, other

    cs.AI cs.LG

    Trustworthy AI: From Principles to Practices

    Authors: Bo Li, Peng Qi, Bo Liu, Shuai Di, Jingen Liu, Jiquan Pei, Jinfeng Yi, Bowen Zhou

    Abstract: The rapid development of Artificial Intelligence (AI) technology has enabled the deployment of various systems based on it. However, many current AI systems are found vulnerable to imperceptible attacks, biased against underrepresented groups, lacking in user privacy protection. These shortcomings degrade user experience and erode people's trust in all AI systems. In this review, we provide AI pra… ▽ More

    Submitted 26 May, 2022; v1 submitted 3 October, 2021; originally announced October 2021.

  6. arXiv:2109.05446  [pdf, other

    cs.IR

    Efficient-FedRec: Efficient Federated Learning Framework for Privacy-Preserving News Recommendation

    Authors: Jingwei Yi, Fangzhao Wu, Chuhan Wu, Ruixuan Liu, Guangzhong Sun, Xing Xie

    Abstract: News recommendation is critical for personalized news access. Most existing news recommendation methods rely on centralized storage of users' historical news click behavior data, which may lead to privacy concerns and hazards. Federated Learning is a privacy-preserving framework for multiple clients to collaboratively train models without sharing their private data. However, the computation and co… ▽ More

    Submitted 30 May, 2023; v1 submitted 12 September, 2021; originally announced September 2021.

    Journal ref: EMNLP 2021;page 2814-2824

  7. arXiv:2109.01983  [pdf, other

    cs.LG cs.AI cs.CR

    Training Meta-Surrogate Model for Transferable Adversarial Attack

    Authors: Yunxiao Qin, Yuanhao Xiong, Jinfeng Yi, Cho-Jui Hsieh

    Abstract: We consider adversarial attacks to a black-box model when no queries are allowed. In this setting, many methods directly attack surrogate models and transfer the obtained adversarial examples to fool the target model. Plenty of previous works investigated what kind of attacks to the surrogate model can generate more transferable adversarial examples, but their performances are still limited due to… ▽ More

    Submitted 7 September, 2021; v1 submitted 4 September, 2021; originally announced September 2021.

    Comments: 15 pages, 7 figures

  8. arXiv:2109.01336  [pdf, ps, other

    cond-mat.supr-con

    Spin-Triplet Superconductivity in K2Cr3As3

    Authors: J. Yang, J. Luo, C. J. Yi, Y. G. Shi, Y. Zhou, Guo-qing Zheng

    Abstract: A spin-triplet superconductor can harbor Majorana bound states that can be used in topological quantum computing. Recently, K2Cr3As3 and its variants with critical temperature Tc as high as 8 K have emerged as a new class of superconductors with ferromagnetic spin fluctuations. Here we report a discovery in K2Cr3As3 single crystal that, the spin susceptibility measured by 75As Knight shift below T… ▽ More

    Submitted 5 January, 2022; v1 submitted 3 September, 2021; originally announced September 2021.

    Journal ref: Sci. Adv. 7, eabl4432 (2021)

  9. Study of $D_{s}^{+} \rightarrow K^{+} K^{-} π^{+}$ decay

    Authors: Zhong-Yu Wang, Jing-Yu Yi, Zhi-Feng Sun, C. W. Xiao

    Abstract: We investigate the $D_{s}^{+} \rightarrow K^{+} K^{-} π^{+}$ decay theoretically with the final state interactions, which is based on the chiral unitary approach and takes into account the external and internal $W$-emission mechanisms at the quark level. Only considering three resonances contributions, the $f_0(980)$ in $S$-wave, the $\bar {K}^{*}(892)^{0}$ and $φ(1020)$ in $P$-wave, one can make… ▽ More

    Submitted 7 September, 2021; v1 submitted 31 August, 2021; originally announced September 2021.

    Comments: More discussions were made. Welcome for comments

  10. arXiv:2108.09898  [pdf, other

    cs.CV cs.LG

    Face Photo-Sketch Recognition Using Bidirectional Collaborative Synthesis Network

    Authors: Seho Bae, Nizam Ud Din, Hyunkyu Park, Juneho Yi

    Abstract: This research features a deep-learning based framework to address the problem of matching a given face sketch image against a face photo database. The problem of photo-sketch matching is challenging because 1) there is large modality gap between photo and sketch, and 2) the number of paired training samples is insufficient to train deep learning based networks. To circumvent the problem of large m… ▽ More

    Submitted 22 August, 2021; originally announced August 2021.

  11. arXiv:2108.03810  [pdf, ps, other

    math.PR math-ph

    Fractal Geometry of the Valleys of the Parabolic Anderson Equation

    Authors: Promit Ghosal, Jaeyun Yi

    Abstract: We study the macroscopic fractal properties of the deep valleys of the solution of the $(1+1)$-dimensional parabolic Anderson equation $${\partial \over \partial t}u(t,x) =\frac{1}{2} {\partial^2 \over \partial x^2} u(t,x) + u(t,x)\dot{W}(t,x),t>0, x\in {\bf R},\quad u(0,x) \equiv u_0(x),x\in {\bf R}, $$ where $\dot{W}$ is the time-space white noise and… ▽ More

    Submitted 10 August, 2021; v1 submitted 9 August, 2021; originally announced August 2021.

    Comments: 19 pages

    MSC Class: 60H15; 35R60; 60K37

  12. arXiv:2108.00230  [pdf, other

    stat.ML cs.LG

    Pure Exploration and Regret Minimization in Matching Bandits

    Authors: Flore Sentenac, Jialin Yi, Clément Calauzènes, Vianney Perchet, Milan Vojnovic

    Abstract: Finding an optimal matching in a weighted graph is a standard combinatorial problem. We consider its semi-bandit version where either a pair or a full matching is sampled sequentially. We prove that it is possible to leverage a rank-1 assumption on the adjacency matrix to reduce the sample complexity and the regret of off-the-shelf algorithms up to reaching a linear dependency in the number of ver… ▽ More

    Submitted 31 July, 2021; originally announced August 2021.

    Journal ref: Proceedings of the 38th International Conference on Machine Learning, PMLR 139, 2021

  13. arXiv:2107.13409  [pdf, ps, other

    cond-mat.stat-mech quant-ph

    Quasistatic work processes: When slowness implies certainty

    Authors: Juyeon Yi, Peter Talkner

    Abstract: Two approaches are outlined to characterize the fluctuation behavior of work applied to a system by a slow change of a parameter. One approach uses the adiabatic theorems of quantum and classical mechanics, the other one is based on the behavior of the correlations of the generalized coordinate that is conjugate to the changed parameter. Criteria are obtained under which the work done on small the… ▽ More

    Submitted 9 January, 2022; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: 5 pages

    Journal ref: Phys. Rev. E 104, L062102 (2021)

  14. arXiv:2107.12635  [pdf, other

    quant-ph cond-mat.quant-gas

    Information retrieval and eigenstates coalescence in a non-Hermitian quantum system with anti-$\mathcal{PT}$ symmetry

    Authors: Liangyu Ding, Kaiye Shi, Yuxin Wang, Qiuxin Zhang, Chenhao Zhu, Ludan Zhang, Jiaqi Yi, Shuaining Zhang, Xiang Zhang, Wei Zhang

    Abstract: Non-Hermitian systems with parity-time reversal ($\mathcal{PT}$) or anti-$\mathcal{PT}$ symmetry have attracted a wide range of interest owing to their unique characteristics and counterintuitive phenomena. One of the most extraordinary features is the presence of an exception point (EP), across which a phase transition with spontaneously broken $\mathcal{PT}$ symmetry takes place. We implement a… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: 6 pages, 5 figures

  15. Study of pion vector form factor and its contribution to the muon $(g-2)$

    Authors: Jing-Yu Yi, Zhong-Yu Wang, C. W. Xiao

    Abstract: In the present work, we investigate several theoretical models of the pion vector form factor and aim at getting the best fit for the two-pion cross sections to reduce the uncertainties of the calculation of two-pion contribution to the muon anomalous magnetic moment. Combined with a polynomial description to the pion vector form factor, we obtain the best fit from the Gounaris-Sakurai (or Kühn-Sa… ▽ More

    Submitted 28 December, 2021; v1 submitted 20 July, 2021; originally announced July 2021.

    Comments: Updated with more references. More discussions can be referred to the published one

  16. Cross-modal Variational Auto-encoder for Content-based Micro-video Background Music Recommendation

    Authors: Jing Yi, Yaochen Zhu, Jiayi Xie, Zhenzhong Chen

    Abstract: In this paper, we propose a cross-modal variational auto-encoder (CMVAE) for content-based micro-video background music recommendation. CMVAE is a hierarchical Bayesian generative model that matches relevant background music to a micro-video by projecting these two multimodal inputs into a shared low-dimensional latent space, where the alignment of two corresponding embeddings of a matched video-m… ▽ More

    Submitted 11 December, 2022; v1 submitted 15 July, 2021; originally announced July 2021.

  17. arXiv:2106.16199  [pdf, other

    cs.SE

    Verifix: Verified Repair of Programming Assignments

    Authors: Umair Z. Ahmed, Zhiyu Fan, Jooyong Yi, Omar I. Al-Bataineh, Abhik Roychoudhury

    Abstract: Automated feedback generation for introductory programming assignments is useful for programming education. Most works try to generate feedback to correct a student program by comparing its behavior with an instructor's reference program on selected tests. In this work, our aim is to generate verifiably correct program repairs as student feedback. The student assignment is aligned and composed wit… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  18. arXiv:2106.13673  [pdf, other

    cs.LG cs.CR cs.DC

    Understanding Clipping for Federated Learning: Convergence and Client-Level Differential Privacy

    Authors: Xinwei Zhang, Xiangyi Chen, Mingyi Hong, Zhiwei Steven Wu, Jinfeng Yi

    Abstract: Providing privacy protection has been one of the primary motivations of Federated Learning (FL). Recently, there has been a line of work on incorporating the formal privacy notion of differential privacy with FL. To guarantee the client-level differential privacy in FL algorithms, the clients' transmitted model updates have to be clipped before adding privacy noise. Such clipping operation is subs… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

  19. arXiv:2106.09433  [pdf, other

    cs.LG cs.AI

    Towards Heterogeneous Clients with Elastic Federated Learning

    Authors: Zichen Ma, Yu Lu, Zihan Lu, Wenye Li, Jinfeng Yi, Shuguang Cui

    Abstract: Federated learning involves training machine learning models over devices or data silos, such as edge processors or data warehouses, while keeping the data local. Training in heterogeneous and potentially massive networks introduces bias into the system, which is originated from the non-IID data and the low participation rate in reality. In this paper, we propose Elastic Federated Learning (EFL),… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

    Comments: Under Review

  20. Object-Guided Instance Segmentation With Auxiliary Feature Refinement for Biological Images

    Authors: Jingru Yi, Pengxiang Wu, Hui Tang, Bo Liu, Qiaoying Huang, Hui Qu, Lianyi Han, Wei Fan, Daniel J. Hoeppner, Dimitris N. Metaxas

    Abstract: Instance segmentation is of great importance for many biological applications, such as study of neural cell interactions, plant phenotyping, and quantitatively measuring how cells react to drug treatment. In this paper, we propose a novel box-based instance segmentation method. Box-based instance segmentation methods capture objects via bounding boxes and then perform individual segmentation withi… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: Accepted in TMI

  21. arXiv:2106.03415  [pdf, other

    cs.IR cs.AI

    Leveraging Tripartite Interaction Information from Live Stream E-Commerce for Improving Product Recommendation

    Authors: Sanshi Yu, Zhuoxuan Jiang, Dong-Dong Chen, Shanshan Feng, Dongsheng Li, Qi Liu, Jinfeng Yi

    Abstract: Recently, a new form of online shopping becomes more and more popular, which combines live streaming with E-Commerce activity. The streamers introduce products and interact with their audiences, and hence greatly improve the performance of selling products. Despite of the successful applications in industries, the live stream E-commerce has not been well studied in the data science community. To f… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

    Comments: To appear in KDD'21 ADS

  22. arXiv:2105.13880  [pdf, other

    cs.CL cs.AI cs.LG

    Knowledge Inheritance for Pre-trained Language Models

    Authors: Yujia Qin, Yankai Lin, Jing Yi, Jiajie Zhang, Xu Han, Zhengyan Zhang, Yusheng Su, Zhiyuan Liu, Peng Li, Maosong Sun, Jie Zhou

    Abstract: Recent explorations of large-scale pre-trained language models (PLMs) have revealed the power of PLMs with huge amounts of parameters, setting off a wave of training ever-larger PLMs. However, it requires tremendous computational resources to train a large-scale PLM, which may be practically unaffordable. In addition, existing large-scale PLMs are mainly trained from scratch individually, ignoring… ▽ More

    Submitted 26 April, 2022; v1 submitted 28 May, 2021; originally announced May 2021.

    Comments: NAACL 2022

  23. arXiv:2105.11046  [pdf, other

    physics.optics physics.bio-ph

    Deep learning in biomedical optics

    Authors: Lei Tian, Brady Hunt, Muyinatu A. Lediju Bell, Ji Yi, Jason T. Smith, Marien Ochoa, Xavier Intes, Nicholas J. Durr

    Abstract: This article reviews deep learning applications in biomedical optics with a particular emphasis on image formation. The review is organized by imaging domains within biomedical optics and includes microscopy, fluorescence lifetime imaging, in vivo microscopy, widefield endoscopy, optical coherence tomography, photoacoustic imaging, diffuse tomography, and functional optical brain imaging. For each… ▽ More

    Submitted 23 May, 2021; originally announced May 2021.

  24. arXiv:2105.03681  [pdf, ps, other

    cs.LG math.OC

    A Simple yet Universal Strategy for Online Convex Optimization

    Authors: Lijun Zhang, Guanghui Wang, Jinfeng Yi, Tianbao Yang

    Abstract: Recently, several universal methods have been proposed for online convex optimization, and attain minimax rates for multiple types of convex functions simultaneously. However, they need to design and optimize one surrogate loss for each type of functions, which makes it difficult to exploit the structure of the problem and utilize the vast amount of existing algorithms. In this paper, we propose a… ▽ More

    Submitted 14 May, 2021; v1 submitted 8 May, 2021; originally announced May 2021.

  25. arXiv:2104.07553  [pdf, other

    cs.LG cs.HC

    Efficient Click-Through Rate Prediction for Developing Countries via Tabular Learning

    Authors: Joonyoung Yi, Buru Chang

    Abstract: Despite the rapid growth of online advertisement in developing countries, existing highly over-parameterized Click-Through Rate (CTR) prediction models are difficult to be deployed due to the limited computing resources. In this paper, by bridging the relationship between CTR prediction task and tabular learning, we present that tabular learning models are more efficient and effective in CTR predi… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop (PML4DC), 8 pages, 2 figures

  26. arXiv:2104.07360  [pdf, other

    cs.IR

    DebiasedRec: Bias-aware User Modeling and Click Prediction for Personalized News Recommendation

    Authors: Jingwei Yi, Fangzhao Wu, Chuhan Wu, Qifei Li, Guangzhong Sun, Xing Xie

    Abstract: News recommendation is critical for personalized news access. Existing news recommendation methods usually infer users' personal interest based on their historical clicked news, and train the news recommendation models by predicting future news clicks. A core assumption behind these methods is that news click behaviors can indicate user interest. However, in practical scenarios, beyond the relevan… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: 10 pages, 10 figures

  27. Continual Learning for Fake Audio Detection

    Authors: Haoxin Ma, Jiangyan Yi, Jianhua Tao, Ye Bai, Zhengkun Tian, Chenglong Wang

    Abstract: Fake audio attack becomes a major threat to the speaker verification system. Although current detection approaches have achieved promising results on dataset-specific scenarios, they encounter difficulties on unseen spoofing data. Fine-tuning and retraining from scratch have been applied to incorporate new data. However, fine-tuning leads to performance degradation on previous data. Retraining tak… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: 5 pages, conference

    Journal ref: Proc. Interspeech 2021, 886-890

  28. arXiv:2104.06375  [pdf, other

    cs.NI cs.AI cs.LG

    Gradient-based Adversarial Deep Modulation Classification with Data-driven Subsampling

    Authors: Jinho Yi, Aly El Gamal

    Abstract: Automatic modulation classification can be a core component for intelligent spectrally efficient wireless communication networks, and deep learning techniques have recently been shown to deliver superior performance to conventional model-based strategies, particularly when distinguishing between a large number of modulation types. However, such deep learning techniques have also been recently show… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

    Comments: 5 pages, 5 figures

  29. arXiv:2104.03617  [pdf, other

    cs.SD cs.AI cs.CL eess.AS

    Half-Truth: A Partially Fake Audio Detection Dataset

    Authors: Jiangyan Yi, Ye Bai, Jianhua Tao, Haoxin Ma, Zhengkun Tian, Chenglong Wang, Tao Wang, Ruibo Fu

    Abstract: Diverse promising datasets have been designed to hold back the development of fake audio detection, such as ASVspoof databases. However, previous datasets ignore an attacking situation, in which the hacker hides some small fake clips in real speech audio. This poses a serious threat since that it is difficult to distinguish the small fake clip from the whole speech utterance. Therefore, this paper… ▽ More

    Submitted 15 December, 2023; v1 submitted 8 April, 2021; originally announced April 2021.

    Comments: accepted by Interspeech 2021

  30. arXiv:2104.02882  [pdf, other

    eess.AS cs.CL cs.SD

    FSR: Accelerating the Inference Process of Transducer-Based Models by Applying Fast-Skip Regularization

    Authors: Zhengkun Tian, Jiangyan Yi, Ye Bai, Jianhua Tao, Shuai Zhang, Zhengqi Wen

    Abstract: Transducer-based models, such as RNN-Transducer and transformer-transducer, have achieved great success in speech recognition. A typical transducer model decodes the output sequence conditioned on the current acoustic state and previously predicted tokens step by step. Statistically, The number of blank tokens in the prediction results accounts for nearly 90\% of all tokens. It takes a lot of comp… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

    Comments: Submitted to INTERSPEECH2021

  31. arXiv:2104.02475  [pdf, other

    math.OC cs.IT cs.LG eess.SP

    Solving Large Scale Quadratic Constrained Basis Pursuit

    Authors: Jirong Yi

    Abstract: Inspired by alternating direction method of multipliers and the idea of operator splitting, we propose a efficient algorithm for solving large-scale quadratically constrained basis pursuit. Experimental results show that the proposed algorithm can achieve 50~~100 times speedup when compared with the baseline interior point algorithm implemented in CVX.

    Submitted 2 April, 2021; originally announced April 2021.

    Comments: 5 pages, 1 figure

  32. TSNAT: Two-Step Non-Autoregressvie Transformer Models for Speech Recognition

    Authors: Zhengkun Tian, Jiangyan Yi, Jianhua Tao, Ye Bai, Shuai Zhang, Zhengqi Wen, Xuefei Liu

    Abstract: The autoregressive (AR) models, such as attention-based encoder-decoder models and RNN-Transducer, have achieved great success in speech recognition. They predict the output sequence conditioned on the previous tokens and acoustic encoded states, which is inefficient on GPUs. The non-autoregressive (NAR) models can get rid of the temporal dependency between the output tokens and predict the entire… ▽ More

    Submitted 3 April, 2021; originally announced April 2021.

    Comments: Submitted to Interspeech2021

  33. arXiv:2103.17268  [pdf, other

    cs.LG cs.AI stat.ML

    Fast Certified Robust Training with Short Warmup

    Authors: Zhouxing Shi, Yihan Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh

    Abstract: Recently, bound propagation based certified robust training methods have been proposed for training neural networks with certifiable robustness guarantees. Despite that state-of-the-art (SOTA) methods including interval bound propagation (IBP) and CROWN-IBP have per-batch training complexity similar to standard neural network training, they usually use a long warmup schedule with hundreds or thous… ▽ More

    Submitted 27 October, 2021; v1 submitted 31 March, 2021; originally announced March 2021.

    Comments: NeurIPS 2021

  34. arXiv:2103.15670  [pdf, other

    cs.CV cs.AI cs.LG

    On the Adversarial Robustness of Vision Transformers

    Authors: Rulin Shao, Zhouxing Shi, Jinfeng Yi, Pin-Yu Chen, Cho-Jui Hsieh

    Abstract: Following the success in advancing natural language processing and understanding, transformers are expected to bring revolutionary changes to computer vision. This work provides a comprehensive study on the robustness of vision transformers (ViTs) against adversarial perturbations. Tested on various white-box and transfer attack settings, we find that ViTs possess better adversarial robustness whe… ▽ More

    Submitted 2 November, 2022; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: Published in Transactions on Machine Learning Research (TMLR). Codes available at https://github.com/RulinShao/on-the-adversarial-robustness-of-visual-transformer

  35. arXiv:2103.08907  [pdf, other

    cs.CV

    BBAM: Bounding Box Attribution Map for Weakly Supervised Semantic and Instance Segmentation

    Authors: Jungbeom Lee, Jihun Yi, Chaehun Shin, Sungroh Yoon

    Abstract: Weakly supervised segmentation methods using bounding box annotations focus on obtaining a pixel-level mask from each box containing an object. Existing methods typically depend on a class-agnostic mask generator, which operates on the low-level information intrinsic to an image. In this work, we utilize higher-level information from the behavior of a trained object detector, by seeking the smalle… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

    Comments: CVPR 2021

  36. arXiv:2103.03091  [pdf, other

    cond-mat.mes-hall physics.optics

    Femtosecond field-driven on-chip unidirectional electronic currents in nonadiabatic tunnelling regime

    Authors: Liping Shi, Ihar Babushkin, Anton Husakou, Oliver Melchert, Bettina Frank, Juemin Yi, Gustav Wetzel, Ayhan Demircan, Christoph Lienau, Harald Giessen, Misha Ivanov, Uwe Morgner, Milutin Kovacev

    Abstract: Recently, asymmetric plasmonic nanojunctions [Karnetzky et. al., Nature Comm. 2471, 9 (2018)] have shown promise as on-chip electronic devices to convert femtosecond optical pulses to current bursts, with a bandwidth of multi-terahertz scale, although yet at low temperatures and pressures. Such nanoscale devices are of great interest for novel ultrafast electronics and opto-electronic applications… ▽ More

    Submitted 8 March, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: references updated

  37. arXiv:2102.07594  [pdf, other

    cs.CL cs.AI eess.AS

    Fast End-to-End Speech Recognition via Non-Autoregressive Models and Cross-Modal Knowledge Transferring from BERT

    Authors: Ye Bai, Jiangyan Yi, Jianhua Tao, Zhengkun Tian, Zhengqi Wen, Shuai Zhang

    Abstract: Attention-based encoder-decoder (AED) models have achieved promising performance in speech recognition. However, because the decoder predicts text tokens (such as characters or words) in an autoregressive manner, it is difficult for an AED model to predict all tokens in parallel. This makes the inference speed relatively slow. We believe that because the encoder already captures the whole speech u… ▽ More

    Submitted 29 August, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

    Comments: 14 pages, 7 figures

  38. arXiv:2102.04716  [pdf, other

    cs.LG

    Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training

    Authors: Lue Tao, Lei Feng, Jinfeng Yi, Sheng-Jun Huang, Songcan Chen

    Abstract: Delusive attacks aim to substantially deteriorate the test accuracy of the learning model by slightly perturbing the features of correctly labeled training examples. By formalizing this malicious attack as finding the worst-case training data within a specific $\infty$-Wasserstein ball, we show that minimizing adversarial risk on the perturbed data is equivalent to optimizing an upper bound of nat… ▽ More

    Submitted 13 December, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021

  39. arXiv:2102.02003  [pdf

    cond-mat.supr-con

    Superconductivity in centrosymmetric topological superconductor candidate TaC

    Authors: D. Yu. Yan, M. Yang, C. X. Wang, P. B. Song, C. J. Yi, Y. G. Shi

    Abstract: We report the synthesis and physical properties of the single crystals of TaC, which are proposed to hold topological band structure as a topological superconductor (TSC) candidate. Magnetization, resistivity and specific heat measurements are performed and indicate that TaC is bulk superconductor with critical temperature of 10.3 K. TaC is a strongly coupled type-II superconductor and the superco… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: 23 pages, 5 figures, 2 tables

  40. arXiv:2101.09450  [pdf, ps, other

    math.PR

    Macroscopic multi-fractality of Gaussian random fields and linear SPDEs with colored noise

    Authors: Jaeyun Yi

    Abstract: We consider the linear stochastic heat and wave equations with generalized Gaussian noise that is white in time and spatially correlated. Under the assumption that the homogeneous spatial correlation $f$ satisfies some mild conditions, we show that the solutions to the linear stochastic heat and wave equations exhibit tall peaks in macroscopic scales, which means they are macroscopically multi-fra… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

    Comments: 19pages

    MSC Class: 60H15; 60G15; 60K37; 35R60

  41. arXiv:2101.06639  [pdf, other

    cs.LG cs.CV

    Removing Undesirable Feature Contributions Using Out-of-Distribution Data

    Authors: Saehyung Lee, Changhwa Park, Hyungyu Lee, Jihun Yi, Jonghyun Lee, Sungroh Yoon

    Abstract: Several data augmentation methods deploy unlabeled-in-distribution (UID) data to bridge the gap between the training and inference of neural networks. However, these methods have clear limitations in terms of availability of UID data and dependence of algorithms on pseudo-labels. Herein, we propose a data augmentation method to improve generalization in both adversarial and standard learning by us… ▽ More

    Submitted 20 November, 2021; v1 submitted 17 January, 2021; originally announced January 2021.

    Comments: Published as a conference paper at ICLR 2021

  42. arXiv:2101.02877  [pdf, other

    cs.CV

    HIVE-Net: Centerline-Aware HIerarchical View-Ensemble Convolutional Network for Mitochondria Segmentation in EM Images

    Authors: Zhimin Yuan, Xiaofen Ma, Jiajin Yi, Zhengrong Luo, Jialin Peng

    Abstract: Semantic segmentation of electron microscopy (EM) is an essential step to efficiently obtain reliable morphological statistics. Despite the great success achieved using deep convolutional neural networks (CNNs), they still produce coarse segmentations with lots of discontinuities and false positives for mitochondria segmentation. In this study, we introduce a centerline-aware multitask network by… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    Comments: Accepted by CPMB

  43. arXiv:2101.02483  [pdf, other

    cs.LG cs.CV

    Robust Text CAPTCHAs Using Adversarial Examples

    Authors: Rulin Shao, Zhouxing Shi, Jinfeng Yi, Pin-Yu Chen, Cho-Jui Hsieh

    Abstract: CAPTCHA (Completely Automated Public Truing test to tell Computers and Humans Apart) is a widely used technology to distinguish real users and automated users such as bots. However, the advance of AI technologies weakens many CAPTCHA tests and can induce security concerns. In this paper, we propose a user-friendly text-based CAPTCHA generation method named Robust Text CAPTCHA (RTC). At the first s… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

  44. arXiv:2012.14738  [pdf, other

    cs.LG cs.CR

    With False Friends Like These, Who Can Notice Mistakes?

    Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen

    Abstract: Adversarial examples crafted by an explicit adversary have attracted significant attention in machine learning. However, the security risk posed by a potential false friend has been largely overlooked. In this paper, we unveil the threat of hypocritical examples -- inputs that are originally misclassified yet perturbed by a false friend to force correct predictions. While such perturbed examples s… ▽ More

    Submitted 13 December, 2021; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: AAAI 2022

  45. arXiv:2012.09384  [pdf, other

    cs.LG cs.CV

    On the Limitations of Denoising Strategies as Adversarial Defenses

    Authors: Zhonghan Niu, Zhaoxi Chen, Linyi Li, Yubin Yang, Bo Li, Jinfeng Yi

    Abstract: As adversarial attacks against machine learning models have raised increasing concerns, many denoising-based defense approaches have been proposed. In this paper, we summarize and analyze the defense strategies in the form of symmetric transformation via data denoising and reconstruction (denoted as $F+$ inverse $F$, $F-IF$ Framework). In particular, we categorize these denoising strategies from t… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

  46. Gate-controlled magnetic phase transition in a van der Waals magnet Fe$_5$GeTe$_2$

    Authors: Cheng Tan, Wen-Qiang Xie, Guolin Zheng, Nuriyah Aloufi, Sultan Albarakati, Meri Algarni, Jiangpeng Song, James Partridge, Dimitrie Culcer, Xiaolin Wang, Jiabao Yi, Yimin Xiong, Mingliang Tian, Yu-Jun Zhao, Lan Wang

    Abstract: Magnetic van der Waals (vdW) materials, including ferromagnets (FM) and antiferromagnets (AFM), have given access to the investigation of magnetism in two-dimensional (2D) limit and attracted broad interests recently. However, most of them are semiconducting or insulating and the vdW itinerant magnets, especially vdW itinerant AFM, are very rare. Here, we studied the anomalous Hall effect of a vdW… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 27 pages

  47. arXiv:2011.13106  [pdf

    cond-mat.str-el cond-mat.mes-hall cond-mat.mtrl-sci physics.app-ph physics.optics

    A two-dimensional electron gas based on a 5s oxide with high room-temperature mobility and strain sensitivity

    Authors: Zexin Feng, Peixin Qin, Yali Yang, Han Yan, Huixin Guo, Xiaoning Wang, Xiaorong Zhou, Yuyan Han, Jiabao Yi, Dongchen Qi, Xiaojiang Yu, Mark B. H. Breese, Xin Zhang, Haojiang Wu, Hongyu Chen, Hongjun Xiangb, Chengbao Jiang, Zhiqi Liu

    Abstract: The coupling of optical and electronic degrees of freedom together with quantum confinement in low-dimensional electron systems is particularly interesting for achieving exotic functionalities in strongly correlated oxide electronics. Recently, high room-temperature mobility has been achieved for a large bandgap transparent oxide - BaSnO$_3$ upon extrinsic La or Sb doping, which has excited signif… ▽ More

    Submitted 1 January, 2021; v1 submitted 25 November, 2020; originally announced November 2020.

    Comments: 28 pages, 7 figures

    Journal ref: Acta Materialia 204, 116516 (2021)

  48. arXiv:2011.05591  [pdf, other

    cs.SD cs.LG eess.AS

    Deep Time Delay Neural Network for Speech Enhancement with Full Data Learning

    Authors: Cunhang Fan, Bin Liu, Jianhua Tao, Jiangyan Yi, Zhengqi Wen, Leichao Song

    Abstract: Recurrent neural networks (RNNs) have shown significant improvements in recent years for speech enhancement. However, the model complexity and inference time cost of RNNs are much higher than deep feed-forward neural networks (DNNs). Therefore, these limit the applications of speech enhancement. This paper proposes a deep time delay neural network (TDNN) for speech enhancement with full data learn… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: Accepted by ISCSLP 2021

  49. arXiv:2011.04249  [pdf, other

    cs.SD cs.CL eess.AS

    Gated Recurrent Fusion with Joint Training Framework for Robust End-to-End Speech Recognition

    Authors: Cunhang Fan, Jiangyan Yi, Jianhua Tao, Zhengkun Tian, Bin Liu, Zhengqi Wen

    Abstract: The joint training framework for speech enhancement and recognition methods have obtained quite good performances for robust end-to-end automatic speech recognition (ASR). However, these methods only utilize the enhanced feature as the input of the speech recognition component, which are affected by the speech distortion problem. In order to address this problem, this paper proposes a gated recurr… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: Accepted by IEEE/ACM Transactions on Audio, Speech, and Language Processing

  50. Model-Agnostic Counterfactual Reasoning for Eliminating Popularity Bias in Recommender System

    Authors: Tianxin Wei, Fuli Feng, Jiawei Chen, Ziwei Wu, Jinfeng Yi, Xiangnan He

    Abstract: The general aim of the recommender system is to provide personalized suggestions to users, which is opposed to suggesting popular items. However, the normal training paradigm, i.e., fitting a recommender model to recover the user behavior data with pointwise or pairwise loss, makes the model biased towards popular items. This results in the terrible Matthew effect, making popular items be more fre… ▽ More

    Submitted 7 June, 2021; v1 submitted 29 October, 2020; originally announced October 2020.

    Comments: To Appear in SIGKDD 2021