Zum Hauptinhalt springen

Showing 1–27 of 27 results for author: Hao, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.18613  [pdf

    cs.CV eess.IV

    Dilated Strip Attention Network for Image Restoration

    Authors: Fangwei Hao, Jiesheng Wu, Ji Du, Yinjie Wang, Jing Xu

    Abstract: Image restoration is a long-standing task that seeks to recover the latent sharp image from its deteriorated counterpart. Due to the robust capacity of self-attention to capture long-range dependencies, transformer-based methods or some attention-based convolutional neural networks have demonstrated promising results on many image restoration tasks in recent years. However, existing attention modu… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

  2. arXiv:2407.14812  [pdf, other

    cs.CV

    GaitMA: Pose-guided Multi-modal Feature Fusion for Gait Recognition

    Authors: Fanxu Min, Shaoxiang Guo, Fan Hao, Junyu Dong

    Abstract: Gait recognition is a biometric technology that recognizes the identity of humans through their walking patterns. Existing appearance-based methods utilize CNN or Transformer to extract spatial and temporal features from silhouettes, while model-based methods employ GCN to focus on the special topological structure of skeleton points. However, the quality of silhouettes is limited by complex occlu… ▽ More

    Submitted 20 July, 2024; originally announced July 2024.

    Comments: Accepted to ICME 2024

  3. arXiv:2405.09353  [pdf, other

    eess.IV cs.CV

    Large coordinate kernel attention network for lightweight image super-resolution

    Authors: Fangwei Hao, Jiesheng Wu, Haotian Lu, Ji Du, Jing Xu, Xiaoxuan Xu

    Abstract: The multi-scale receptive field and large kernel attention (LKA) module have been shown to significantly improve performance in the lightweight image super-resolution task. However, existing lightweight super-resolution (SR) methods seldom pay attention to designing efficient building block with multi-scale receptive field for local modeling, and their LKA modules face a quadratic increase in comp… ▽ More

    Submitted 30 August, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: 13 pages

  4. arXiv:2403.12370  [pdf, other

    cs.CV

    XPose: eXplainable Human Pose Estimation

    Authors: Luyu Qiu, Jianing Li, Lei Wen, Chi Su, Fei Hao, Chen Jason Zhang, Lei Chen

    Abstract: Current approaches in pose estimation primarily concentrate on enhancing model architectures, often overlooking the importance of comprehensively understanding the rationale behind model decisions. In this paper, we propose XPose, a novel framework that incorporates Explainable AI (XAI) principles into pose estimation. This integration aims to elucidate the individual contribution of each keypoint… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  5. BoostER: Leveraging Large Language Models for Enhancing Entity Resolution

    Authors: Huahang Li, Shuangyin Li, Fei Hao, Chen Jason Zhang, Yuanfeng Song, Lei Chen

    Abstract: Entity resolution, which involves identifying and merging records that refer to the same real-world entity, is a crucial task in areas like Web data integration. This importance is underscored by the presence of numerous duplicated and multi-version data resources on the Web. However, achieving high-quality entity resolution typically demands significant effort. The advent of Large Language Models… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 4 pages, 3 figures, The Web Conf 2024 - WWW'24

  6. arXiv:2402.12175  [pdf, other

    cs.LG cs.NE

    Learning Discretized Bayesian Networks with GOMEA

    Authors: Damy M. F. Ha, Tanja Alderliesten, Peter A. N. Bosman

    Abstract: Bayesian networks model relationships between random variables under uncertainty and can be used to predict the likelihood of events and outcomes while incorporating observed evidence. From an eXplainable AI (XAI) perspective, such models are interesting as they tend to be compact. Moreover, captured relations can be directly inspected by domain experts. In practice, data is often real-valued. Unl… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: The code is available at: https://github.com/damyha/dbn_gomea

  7. arXiv:2401.03426  [pdf, other

    cs.CL cs.AI

    On Leveraging Large Language Models for Enhancing Entity Resolution

    Authors: Huahang Li, Longyu Feng, Shuangyin Li, Fei Hao, Chen Jason Zhang, Yuanfeng Song, Lei Chen

    Abstract: Entity resolution, the task of identifying and consolidating records that pertain to the same real-world entity, plays a pivotal role in various sectors such as e-commerce, healthcare, and law enforcement. The emergence of Large Language Models (LLMs) like GPT-4 has introduced a new dimension to this task, leveraging their advanced linguistic capabilities. This paper explores the potential of LLMs… ▽ More

    Submitted 7 January, 2024; originally announced January 2024.

    Comments: 12 pages,6 figures, ICDE 2024

  8. arXiv:2306.06198  [pdf

    cs.CR

    Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems

    Authors: Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao

    Abstract: Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling u… ▽ More

    Submitted 24 September, 2023; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: 25 pages, 12 figures, 2 tables

  9. arXiv:2306.03679  [pdf, other

    cs.CV cs.AI cs.CR cs.LG stat.ML

    Human-imperceptible, Machine-recognizable Images

    Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao

    Abstract: Massive human-related data is collected to train neural networks for computer vision tasks. A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data. To reconcile this conflict, this paper proposes an efficient privacy-preserving learning paradigm, where images are first encrypted to become ``human-imperceptible… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  10. arXiv:2306.00610  [pdf, other

    cs.CR

    Spying on the Spy: Security Analysis of Hidden Cameras

    Authors: Samuel Herodotou, Feng Hao

    Abstract: Hidden cameras, also called spy cameras, are surveillance tools commonly used to spy on people without their knowledge. Whilst previous studies largely focused on investigating the detection of such a camera and the privacy implications, the security of the camera itself has received limited attention. Compared with ordinary IP cameras, spy cameras are normally sold in bulk at cheap prices and are… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 19 pages. Conference: NSS 2023: 17th International Conference on Network and System Security

  11. Can You See Me Now? A Measurement Study of Zoom, Webex, and Meet

    Authors: Hyunseok Chang, Matteo Varvello, Fang Hao, Sarit Mukherjee

    Abstract: Since the outbreak of the COVID-19 pandemic, videoconferencing has become the default mode of communication in our daily lives at homes, workplaces and schools, and it is likely to remain an important part of our lives in the post-pandemic world. Despite its significance, there has not been any systematic study characterizing the user-perceived performance of existing videoconferencing systems oth… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Accepted to ACM Internet Measurement Conference 2021, 13 pages, 19 figures

  12. arXiv:2109.02868  [pdf, other

    cs.AI cs.LG cs.SI

    HMSG: Heterogeneous Graph Neural Network based on Metapath Subgraph Learning

    Authors: Xinjun Cai, Jiaxing Shang, Fei Hao, Dajiang Liu, Linjiang Zheng

    Abstract: Many real-world data can be represented as heterogeneous graphs with different types of nodes and connections. Heterogeneous graph neural network model aims to embed nodes or subgraphs into low-dimensional vector space for various downstream tasks such as node classification, link prediction, etc. Although several models were proposed recently, they either only aggregate information from the same… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 12 pages, 3 figures, 6 tables

    MSC Class: 68T07 ACM Class: I.2.6

  13. Formal Modelling and Security Analysis of Bitcoin's Payment Protocol

    Authors: Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao

    Abstract: The Payment Protocol standard BIP70, specifying how payments in Bitcoin are performed by merchants and customers, is supported by the largest payment processors and most widely-used wallets. The protocol has been shown to be vulnerable to refund attacks due to lack of authentication of the refund addresses. In this paper, we give the first formal model of the protocol and formalise the refund addr… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 30 pages, 6 figures. This is an accepted manuscript to appear in Computers & Security. Please cite as: Modesti, Shahandashti, McCorry, and Hao. "Formal Modelling and Security Analysis of Bitcoin's Payment Protocol". To appear in Computer & Security, Elsevier, 2021

  14. Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting

    Authors: Shen Wang, Ehsan Toreini, Feng Hao

    Abstract: Polymer banknotes are the trend for printed currency and have been adopted by more than fifty countries worldwide. However, over the past years, the quantity of polymer counterfeits has been increasing, so has the quality of counterfeits. This shows that the initial advantage of bringing a new polymer technology to fight against counterfeiting is reducing. To maintain one step ahead of counterfeit… ▽ More

    Submitted 23 March, 2021; v1 submitted 10 March, 2021; originally announced March 2021.

    Comments: 13 pages, 11 figures, 6 tables. This manuscript has been accepted for publication in IEEE Transactions on Information Forensics & Security in 2021

  15. arXiv:2007.00858  [pdf, other

    cs.CV eess.IV q-bio.QM

    MSA-MIL: A deep residual multiple instance learning model based on multi-scale annotation for classification and visualization of glomerular spikes

    Authors: Yilin Chen, Ming Li, Yongfei Wu, Xueyu Liu, Fang Hao, Daoxiang Zhou, Xiaoshuang Zhou, Chen Wang

    Abstract: Membranous nephropathy (MN) is a frequent type of adult nephrotic syndrome, which has a high clinical incidence and can cause various complications. In the biopsy microscope slide of membranous nephropathy, spikelike projections on the glomerular basement membrane is a prominent feature of the MN. However, due to the whole biopsy slide contains large number of glomeruli, and each glomerulus includ… ▽ More

    Submitted 18 July, 2020; v1 submitted 1 July, 2020; originally announced July 2020.

  16. arXiv:1909.02909  [pdf, ps, other

    eess.SY cs.GT eess.SP

    Game Theoretical Approach to Sequential Hypothesis Test with Byzantine Sensors

    Authors: Zishuo Li, Yilin Mo, Fei Hao

    Abstract: In this paper, we consider the problem of sequential binary hypothesis test in adversary environment based on observations from s sensors, with the caveat that a subset of c sensors is compromised by an adversary, whose observations can be manipulated arbitrarily. We choose the asymptotic Average Sample Number (ASN) required to reach a certain level of error probability as the performance metric o… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

    Comments: conference paper for CDC2019, 9 pages with appendix, 1 figure

    MSC Class: 60G40 ACM Class: G.3

    Journal ref: 2019 IEEE 58th Conference on Decision and Control (CDC), 2019, pp. 2654-2659

  17. arXiv:1905.12951  [pdf, other

    cs.CR cs.NI

    DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

    Authors: Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the `integrity' of the we… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  18. arXiv:1812.04054  [pdf, other

    cs.CR

    On legitimate mining of cryptocurrency in the browser - a feasibility study

    Authors: Saulius Venskutonis, Feng Hao, Matthew Collison

    Abstract: Cryptocurrency mining in the browser has the potential to provide a new pay-as-you-go monetisation mechanism for consuming digital media over the Web. However, browser mining has recently received strong criticism due to illegitimate use of mining scripts in several popular websites (a practice called cryptojacking). Here we provide the first feasibility study of browser mining as a legitimate mea… ▽ More

    Submitted 4 January, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

  19. arXiv:1804.08087  [pdf, other

    cs.CV

    Anchor-based Nearest Class Mean Loss for Convolutional Neural Networks

    Authors: Fusheng Hao, Jun Cheng, Lei Wang, Xinchao Wang, Jianzhong Cao, Xiping Hu, Dapeng Tao

    Abstract: Discriminative features are critical for machine learning applications. Most existing deep learning approaches, however, rely on convolutional neural networks (CNNs) for learning features, whose discriminant power is not explicitly enforced. In this paper, we propose a novel approach to train deep CNNs by imposing the intra-class compactness and the inter-class separability, so as to enhance the l… ▽ More

    Submitted 22 April, 2018; originally announced April 2018.

  20. Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy

    Authors: Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lü, Feng Hao

    Abstract: Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insec… ▽ More

    Submitted 25 November, 2018; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 9 pages, 6 figures, IEEE Access, 2018

    MSC Class: 65P20

  21. arXiv:1802.04900  [pdf, ps, other

    cs.CR

    Analysing and Patching SPEKE in ISO/IEC

    Authors: Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong

    Abstract: Simple Password Exponential Key Exchange (SPEKE) is a well-known Password Authenticated Key Exchange (PAKE) protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyse the SPEKE protocol as specified in the ISO/IEC and… ▽ More

    Submitted 4 April, 2018; v1 submitted 13 February, 2018; originally announced February 2018.

  22. arXiv:1711.01858  [pdf, other

    cs.CR

    Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

    Authors: Chengqing Li, Dongdong Lin, Jinhu Lü, Feng Hao

    Abstract: This paper analyzes the security of an image encryption algorithm proposed by Ye and Huang [\textit{IEEE MultiMedia}, vol. 23, pp. 64-71, 2016]. The Ye-Huang algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable for subsequent encryption. The designers claime… ▽ More

    Submitted 8 June, 2018; v1 submitted 6 November, 2017; originally announced November 2017.

    Comments: 8 pages, 6 figures

    MSC Class: 94A60

    Journal ref: IEEE MultiMedia, 2018

  23. arXiv:1709.09577  [pdf, other

    cs.CR

    Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions

    Authors: Raffaello Perrotta, Feng Hao

    Abstract: Browser extensions have been established as a common feature present in modern browsers. However, some extension systems risk exposing APIs which are too permissive and cohesive with the browser's internal structure, thus leaving a hole for malicious developers to exploit security critical functionality within the browser itself. In this paper, we raise the awareness of the threats caused by brows… ▽ More

    Submitted 27 September, 2017; originally announced September 2017.

  24. An Algorithm of Parking Planning for Smart Parking System

    Authors: Xuejian Zhao, Kui Zhao, Feng Ha

    Abstract: There are so many vehicles in the world and the number of vehicles is increasing rapidly. To alleviate the parking problems caused by that, the smart parking system has been developed. The parking planning is one of the most important parts of it. An effective parking planning strategy makes the better use of parking resources possible. In this paper, we present a feasible method to do parking pla… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Comments: Proceeding of the 11th World Congress on Intelligent Control and Automation (WCICA)

  25. arXiv:1705.02510  [pdf, other

    cs.CR

    Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns

    Authors: Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show these patterns can be easily captured by a commodity camera and condensed into to a… ▽ More

    Submitted 7 May, 2019; v1 submitted 6 May, 2017; originally announced May 2017.

    Comments: This manuscript has been accepted for publication in the ACM Transactions on Privacy and Security (TOPS, formerly TISSEC) in 2017

    ACM Class: K.6.5; D.4.6

  26. Stealing PINs via Mobile Sensors: Actual Risk versus User Perception

    Authors: Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js which is a JavaScript-based side channel attack revealing user PINs on an Android mobile phone. In this attack, once the user visits a website controlled by an attacker, the JavaScript code embedded in the web page starts listening to the moti… ▽ More

    Submitted 18 April, 2017; v1 submitted 18 May, 2016; originally announced May 2016.

    Journal ref: International Journal of Information Security, P1-23, April 2017

  27. TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript

    Authors: Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao

    Abstract: Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user security and privacy are however not considered in W3C specifications. In this work, for the first time, we show how user security can be compromised using these sensor data via browser, despite that the d… ▽ More

    Submitted 12 February, 2016; originally announced February 2016.