Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Ke, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11261  [pdf, other

    cs.AI cs.CL

    Towards Analyzing and Mitigating Sycophancy in Large Vision-Language Models

    Authors: Yunpu Zhao, Rui Zhang, Junbin Xiao, Changxin Ke, Ruibo Hou, Yifan Hao, Qi Guo, Yunji Chen

    Abstract: Large Vision-Language Models (LVLMs) have shown significant capability in vision-language understanding. However, one critical issue that persists in these models is sycophancy, which means models are unduly influenced by leading or deceptive prompts, resulting in biased outputs and hallucinations. Despite the progress in LVLMs, evaluating and mitigating sycophancy is yet much under-explored. In t… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

  2. arXiv:2306.05672  [pdf, other

    cs.CL

    I run as fast as a rabbit, can you? A Multilingual Simile Dialogue Dataset

    Authors: Longxuan Ma, Weinan Zhang, Shuhan Zhou, Churui Sun, Changxin Ke, Ting Liu

    Abstract: A simile is a figure of speech that compares two different things (called the tenor and the vehicle) via shared properties. The tenor and the vehicle are usually connected with comparator words such as "like" or "as". The simile phenomena are unique and complex in a real-life dialogue scene where the tenor and the vehicle can be verbal phrases or sentences, mentioned by different speakers, exist i… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Comments: 13 Pages, 1 Figure, 12 Tables, ACL 2023 findings

    ACM Class: I.2.7

  3. arXiv:2306.03949  [pdf, other

    cs.LG stat.ML

    Partial Inference in Structured Prediction

    Authors: Chuyang Ke, Jean Honorio

    Abstract: In this paper, we examine the problem of partial inference in the context of structured prediction. Using a generative model approach, we consider the task of maximizing a score function with unary and pairwise potentials in the space of labels on graphs. Employing a two-stage convex optimization algorithm for label recovery, we analyze the conditions under which a majority of the labels can be re… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

  4. arXiv:2302.03236  [pdf, other

    cs.LG stat.ML

    Exact Inference in High-order Structured Prediction

    Authors: Chuyang Ke, Jean Honorio

    Abstract: In this paper, we study the problem of inference in high-order structured prediction tasks. In the context of Markov random fields, the goal of a high-order inference task is to maximize a score function on the space of labels, and the score function can be decomposed into sum of unary and high-order potentials. We apply a generative model approach to study the problem of high-order inference, and… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Journal ref: International Conference on Machine Learning (ICML), 2023

  5. arXiv:2301.03790  [pdf, other

    cs.CR cs.NI

    A Practical Runtime Security Policy Transformation Framework for Software Defined Networks

    Authors: Yunfei Meng, Changbo Ke, Zhiqiu Huang, Guohua Shen, Chunming Liu, Xiaojie Feng

    Abstract: Software-defined networking (SDN) has been widely utilized to enforce the security of traditional networks, thereby promoting the process of transforming traditional networks into SDN networks. However, SDN-based security enforcement mechanisms rely heavily on the security policies containing the underlying information of data plane. With increasing the scale of underlying network, the current sec… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

  6. Uniform Passive Fault-Tolerant Control of a Quadcopter with One, Two, or Three Rotor Failure

    Authors: Chenxu Ke, Kai-Yuan Cai, Quan Quan

    Abstract: This study proposes a uniform passive fault-tolerant control (FTC) method for a quadcopter that does not rely on fault information subject to one, two adjacent, two opposite, or three rotors failure. The uniform control implies that the passive FTC is able to cover the condition from quadcopter fault-free to rotor failure without controller switching. To achieve the purpose of the passive FTC, the… ▽ More

    Submitted 25 December, 2022; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: We found some important errors in the paper that need to be corrected

    Journal ref: 2023

  7. arXiv:2206.04893  [pdf, other

    cs.LG stat.ML

    Provable Guarantees for Sparsity Recovery with Deterministic Missing Data Patterns

    Authors: Chuyang Ke, Jean Honorio

    Abstract: We study the problem of consistently recovering the sparsity pattern of a regression parameter vector from correlated observations governed by deterministic missing data patterns using Lasso. We consider the case in which the observed dataset is censored by a deterministic, non-uniform filter. Recovering the sparsity pattern in datasets with deterministic missing structure can be arguably more cha… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

  8. arXiv:2205.14056  [pdf, other

    cs.LG stat.ML

    Dual Convexified Convolutional Neural Networks

    Authors: Site Bai, Chuyang Ke, Jean Honorio

    Abstract: We propose the framework of dual convexified convolutional neural networks (DCCNNs). In this framework, we first introduce a primal learning problem motivated by convexified convolutional neural networks (CCNNs), and then construct the dual convex training program through careful analysis of the Karush-Kuhn-Tucker (KKT) conditions and Fenchel conjugates. Our approach reduces the computational over… ▽ More

    Submitted 7 December, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

  9. Design and Implementation of MIMO Transmission Based on Dual-Polarized Reconfigurable Intelligent Surface

    Authors: Xiangyu Chen, Jun Chen Ke, Wankai Tang, Ming Zheng Chen, Jun Yan Dai, Ertugrul Basar, Shi Jin, Qiang Cheng, Tie Jun Cui

    Abstract: Multiple-input multiple-output (MIMO) signaling is one of the key technologies of current mobile communication systems. However, the complex and expensive radio frequency (RF) chains have always limited the increase of MIMO scale. In this paper, we propose a MIMO transmission architecture based on a dual-polarized reconfigurable intelligent surface (RIS), which can directly achieve modulation and… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: This work has been accepted by IEEE WCL

  10. arXiv:2106.07255  [pdf, other

    cs.LG stat.ML

    Federated Myopic Community Detection with One-shot Communication

    Authors: Chuyang Ke, Jean Honorio

    Abstract: In this paper, we study the problem of recovering the community structure of a network under federated myopic learning. Under this paradigm, we have several clients, each of them having a myopic view, i.e., observing a small subgraph of the network. Each client sends a censored evidence graph to a central server. We provide an efficient algorithm, which computes a consensus signed weighted graph f… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Journal ref: Artificial Intelligence and Statistics (AISTATS), 2022

  11. arXiv:2105.12935  [pdf, other

    cs.CR

    SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition

    Authors: Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke

    Abstract: Aiming at the privacy preservation of dynamic Web service composition, this paper proposes a SDN-based runtime security enforcement approach for privacy preservation of dynamic Web service composition. The main idea of this approach is that the owner of service composition leverages the security policy model (SPM) to define the access control relationships that service composition must comply with… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  12. arXiv:2102.08019  [pdf, other

    cs.LG cs.AI stat.ML

    A Thorough View of Exact Inference in Graphs from the Degree-4 Sum-of-Squares Hierarchy

    Authors: Kevin Bello, Chuyang Ke, Jean Honorio

    Abstract: Performing inference in graphs is a common task within several machine learning problems, e.g., image segmentation, community detection, among others. For a given undirected connected graph, we tackle the statistical problem of exactly recovering an unknown ground-truth binary labeling of the nodes from a single corrupted observation of each edge. Such problem can be formulated as a quadratic comb… ▽ More

    Submitted 1 June, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: 17 pages, 5 figures

    Journal ref: Artificial Intelligence and Statistics (AISTATS), 2022

  13. arXiv:2101.12369  [pdf, ps, other

    stat.ML cs.LG

    Information Theoretic Limits of Exact Recovery in Sub-hypergraph Models for Community Detection

    Authors: Jiajun Liang, Chuyang Ke, Jean Honorio

    Abstract: In this paper, we study the information theoretic bounds for exact recovery in sub-hypergraph models for community detection. We define a general model called the $m-$uniform sub-hypergraph stochastic block model ($m-$ShSBM). Under the $m-$ShSBM, we use Fano's inequality to identify the region of model parameters where any algorithm fails to exactly recover the planted communities with a large pro… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

    Journal ref: IEEE International Symposium on Information Theory (ISIT), 2021

  14. arXiv:2006.11666  [pdf, ps, other

    cs.LG stat.ML

    Exact Partitioning of High-order Planted Models with a Tensor Nuclear Norm Constraint

    Authors: Chuyang Ke, Jean Honorio

    Abstract: We study the problem of efficient exact partitioning of the hypergraphs generated by high-order planted models. A high-order planted model assumes some underlying cluster structures, and simulates high-order interactions by placing hyperedges among nodes. Example models include the disjoint hypercliques, the densest subhypergraphs, and the hypergraph stochastic block models. We show that exact par… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

    Journal ref: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022

  15. arXiv:2005.13206  [pdf, other

    cs.CR cs.SE

    A Security Policy Model Transformation and Verification Approach for Software Defined Networking

    Authors: Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke

    Abstract: Software defined networking (SDN) has been adopted to enforce the security of large-scale and complex networks because of its programmable, abstract, centralized intelligent control and global and real-time traffic view. However, the current SDN-based security enforcement mechanisms require network managers to fully understand the underlying configurations of network. Facing the increasingly compl… ▽ More

    Submitted 28 May, 2020; v1 submitted 27 May, 2020; originally announced May 2020.

  16. arXiv:2003.06834  [pdf, other

    cs.NI cs.NE

    SOM-based DDoS Defense Mechanism using SDN for the Internet of Things

    Authors: Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Guohua Shen, Changbo Ke

    Abstract: To effectively tackle the security threats towards the Internet of things, we propose a SOM-based DDoS defense mechanism using software-defined networking (SDN) in this paper. The main idea of the mechanism is to deploy a SDN-based gateway to protect the device services in the Internet of things. The gateway provides DDoS defense mechanism based on SOM neural network. By means of SOM-based DDoS de… ▽ More

    Submitted 17 March, 2020; v1 submitted 15 March, 2020; originally announced March 2020.

  17. arXiv:1911.02161  [pdf, other

    cs.LG stat.ML

    Exact Partitioning of High-order Models with a Novel Convex Tensor Cone Relaxation

    Authors: Chuyang Ke, Jean Honorio

    Abstract: In this paper we propose an algorithm for exact partitioning of high-order models. We define a general class of $m$-degree Homogeneous Polynomial Models, which subsumes several examples motivated from prior literature. Exact partitioning can be formulated as a tensor optimization problem. We relax this high-order combinatorial problem to a convex conic form problem. To this end, we carefully defin… ▽ More

    Submitted 15 July, 2021; v1 submitted 5 November, 2019; originally announced November 2019.

    Journal ref: Journal of Machine Learning Research (JMLR), 23(284): pp. 1-28, 2022

  18. arXiv:1908.10201  [pdf, ps, other

    cs.CR

    Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems

    Authors: Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Yu Zhou, Guohua Shen, Changbo Ke

    Abstract: Service-oriented architecture (SOA) system has been widely utilized at many present business areas. However, SOA system is loosely coupled with multiple services and lacks the relevant security protection mechanisms, thus it can easily be attacked by unauthorized access and information theft. The existed access control mechanism can only prevent unauthorized users from accessing the system, but th… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

  19. arXiv:1908.02704  [pdf, other

    eess.SY cs.RO

    Unified Simulation and Test Platform for Control Systems of Unmanned Vehicles

    Authors: Xunhua Dai, Chenxu Ke, Quan Quan, Kai-Yuan Cai

    Abstract: Control systems on unmanned vehicles are safety-critical systems whose requirements on reliability and safety are ever-increasing. Currently, testing a complex autonomous control system is an expensive and time-consuming process, which requires massive repeated experimental testing during the whole development stage. This paper presents a unified simulation and test platform for vehicle autonomous… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  20. arXiv:1904.00717  [pdf, other

    cs.NI

    Smart Routing: Towards Proactive Fault-Handling in Software-Defined Networks

    Authors: Ali Malik, Benjamin Aziz, Mo Adda, Chih-Heng Ke

    Abstract: Software-defined networking offers numerous benefits against the legacy networking systems through simplifying the process of network management and reducing the cost of network configuration. Currently, the management of failures in the data plane is limited to two mechanisms: proactive and reactive. Such failure recovery techniques are activated after occurrences of failures. Therefore, packet l… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  21. arXiv:1902.03099  [pdf, other

    cs.SI cs.LG stat.ML

    Exact Inference with Latent Variables in an Arbitrary Domain

    Authors: Chuyang Ke, Jean Honorio

    Abstract: We analyze the necessary and sufficient conditions for exact inference of a latent model. In latent models, each entity is associated with a latent variable following some probability distribution. The challenging question we try to solve is: can we perform exact inference without observing the latent variables, even without knowing what the domain of the latent variables is? We show that exact in… ▽ More

    Submitted 27 June, 2020; v1 submitted 28 January, 2019; originally announced February 2019.

  22. arXiv:1806.04414  [pdf

    physics.app-ph cs.IT

    Controlling spectral energies of all harmonics in programmable way using time-domain digital coding metasurface

    Authors: Jie Zhao, Xi Yang, Jun Yan Dai, Qiang Cheng, Xiang Li, Ning Hua Qi, Jun Chen Ke, Guo Dong Bai, Shuo Liu, Shi Jin, Tie Jun Cui

    Abstract: Modern wireless communication is one of the most important information technologies, but its system architecture has been unchanged for many years. Here, we propose a much simpler architecture for wireless communication systems based on metasurface. We firstly propose a time-domain digital coding metasurface to reach a simple but efficient method to manipulate spectral distributions of harmonics.… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

  23. arXiv:1805.10583  [pdf, other

    cs.CV

    Dual Swap Disentangling

    Authors: Zunlei Feng, Xinchao Wang, Chenglong Ke, Anxiang Zeng, Dacheng Tao, Mingli Song

    Abstract: Learning interpretable disentangled representations is a crucial yet challenging task. In this paper, we propose a weakly semi-supervised method, termed as Dual Swap Disentangling (DSD), for disentangling using both labeled and unlabeled data. Unlike conventional weakly supervised methods that rely on full annotations on the group of samples, we require only limited annotations on paired samples t… ▽ More

    Submitted 1 January, 2020; v1 submitted 27 May, 2018; originally announced May 2018.

    Comments: Accepted by NeurIPS 2018; Adding the theoretical proof for the disentanglement of labeled pairs

  24. arXiv:1802.06104  [pdf, ps, other

    cs.LG cs.SI physics.soc-ph stat.ML

    Information-theoretic Limits for Community Detection in Network Models

    Authors: Chuyang Ke, Jean Honorio

    Abstract: We analyze the information-theoretic limits for the recovery of node labels in several network models. This includes the Stochastic Block Model, the Exponential Random Graph Model, the Latent Space Model, the Directed Preferential Attachment Model, and the Directed Small-world Model. For the Stochastic Block Model, the non-recoverability condition depends on the probabilities of having edges insid… ▽ More

    Submitted 21 May, 2018; v1 submitted 16 February, 2018; originally announced February 2018.

    Journal ref: Neural Information Processing Systems (NeurIPS), 2018

  25. arXiv:1703.07345  [pdf, other

    cs.LG stat.ML

    On The Projection Operator to A Three-view Cardinality Constrained Set

    Authors: Haichuan Yang, Shupeng Gui, Chuyang Ke, Daniel Stefankovic, Ryohei Fujimaki, Ji Liu

    Abstract: The cardinality constraint is an intrinsic way to restrict the solution structure in many domains, for example, sparse learning, feature selection, and compressed sensing. To solve a cardinality constrained problem, the key challenge is to solve the projection onto the cardinality constraint set, which is NP-hard in general when there exist multiple overlapped cardinality constraints. In this pape… ▽ More

    Submitted 14 June, 2017; v1 submitted 21 March, 2017; originally announced March 2017.

  26. arXiv:1612.09062  [pdf

    cs.IR

    Condensedly: comprehending article contents through condensed texts

    Authors: Chao-Hsuan Ke, Tsung-Lu Michael Lee, Jung-Hsien Chiang

    Abstract: Summary: Abstracts in biomedical articles can provide a quick overview of the articles but detailed information cannot be obtained without reading full-text contents. Full-text articles certainly generate more information and contents; however, accessing full-text documents is usually time consuming. Condensedly is a web-based application, which provides readers an easy and efficient way to access… ▽ More

    Submitted 29 December, 2016; originally announced December 2016.

  27. arXiv:1612.08669  [pdf

    cs.LG

    A Hybrid Both Filter and Wrapper Feature Selection Method for Microarray Classification

    Authors: Li-Yeh Chuang, Chao-Hsuan Ke, Cheng-Hong Yang

    Abstract: Gene expression data is widely used in disease analysis and cancer diagnosis. However, since gene expression data could contain thousands of genes simultaneously, successful microarray classification is rather difficult. Feature selection is an important pre-treatment for any classification process. Selecting a useful gene subset as a classifier not only decreases the computational time and cost,… ▽ More

    Submitted 27 December, 2016; originally announced December 2016.

    Comments: 5 pages, 2 figures, 4tables

    Journal ref: IMECS2008_pp146-150

  28. arXiv:1611.04049  [pdf, ps, other

    cs.LG

    Prognostics of Surgical Site Infections using Dynamic Health Data

    Authors: Chuyang Ke, Yan Jin, Heather Evans, Bill Lober, Xiaoning Qian, Ji Liu, Shuai Huang

    Abstract: Surgical Site Infection (SSI) is a national priority in healthcare research. Much research attention has been attracted to develop better SSI risk prediction models. However, most of the existing SSI risk prediction models are built on static risk factors such as comorbidities and operative factors. In this paper, we investigate the use of the dynamic wound data for SSI risk prediction. There have… ▽ More

    Submitted 12 November, 2016; originally announced November 2016.

    Comments: 23 pages, 8 figures