Zum Hauptinhalt springen

Showing 1–19 of 19 results for author: Liu, A X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.02954  [pdf, other

    cs.CL cs.AI cs.LG

    DeepSeek LLM: Scaling Open-Source Language Models with Longtermism

    Authors: DeepSeek-AI, :, Xiao Bi, Deli Chen, Guanting Chen, Shanhuang Chen, Damai Dai, Chengqi Deng, Honghui Ding, Kai Dong, Qiushi Du, Zhe Fu, Huazuo Gao, Kaige Gao, Wenjun Gao, Ruiqi Ge, Kang Guan, Daya Guo, Jianzhong Guo, Guangbo Hao, Zhewen Hao, Ying He, Wenjie Hu, Panpan Huang, Erhang Li , et al. (63 additional authors not shown)

    Abstract: The rapid development of open-source large language models (LLMs) has been truly remarkable. However, the scaling law described in previous literature presents varying conclusions, which casts a dark cloud over scaling LLMs. We delve into the study of scaling laws and present our distinctive findings that facilitate scaling of large scale models in two commonly used open-source configurations, 7B… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

  2. arXiv:2208.08751  [pdf, other

    cs.CR

    MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols

    Authors: Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah

    Abstract: Facilitated by messaging protocols (MP), many home devices are connected to the Internet, bringing convenience and accessibility to customers. However, most deployed MPs on IoT platforms are fragmented and are not implemented carefully to support secure communication. To the best of our knowledge, there is no systematic solution to perform automatic security checks on MP implementations yet. To… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: Accepted as a full paper at USENIX Security '21

  3. arXiv:2204.04063  [pdf, other

    cs.CV cs.AI cs.CR cs.CY cs.LG

    Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

    Authors: Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang

    Abstract: One intriguing property of adversarial attacks is their "transferability" -- an adversarial example crafted with respect to one deep neural network (DNN) model is often found effective against other DNNs as well. Intensive research has been conducted on this phenomenon under simplistic controlled conditions. Yet, thus far, there is still a lack of comprehensive understanding about transferability-… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted to IEEE Security & Privacy 2022

  4. arXiv:2010.12908  [pdf, other

    cs.AI cs.IR cs.SE

    Deep Graph Matching and Searching for Semantic Code Retrieval

    Authors: Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji

    Abstract: Code retrieval is to find the code snippet from a large corpus of source code repositories that highly matches the query of natural language description. Recent work mainly uses natural language processing techniques to process both query texts (i.e., human natural language) and code snippets (i.e., machine programming language), however neglecting the deep structured features of query texts and s… ▽ More

    Submitted 22 January, 2021; v1 submitted 24 October, 2020; originally announced October 2020.

    Comments: Accepted by ACM Transactions on Knowledge Discovery from Data (ACM TKDD)

    Journal ref: ACM Trans. Knowl. Discov. Data 15, 5 (2021), 1-21

  5. arXiv:2008.08753  [pdf, other

    cs.CR cs.LG

    When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control

    Authors: Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong

    Abstract: Logistic Regression (LR) is the most widely used machine learning model in industry for its efficiency, robustness, and interpretability. Due to the problem of data isolation and the requirement of high model performance, many applications in industry call for building a secure and efficient LR model for multiple parties. Most existing work uses either Homomorphic Encryption (HE) or Secret Sharing… ▽ More

    Submitted 31 May, 2021; v1 submitted 19 August, 2020; originally announced August 2020.

    Comments: Accepted by KDD'21

  6. arXiv:2007.04395  [pdf, other

    cs.LG cs.AI stat.ML

    Multilevel Graph Matching Networks for Deep Graph Similarity Learning

    Authors: Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji

    Abstract: While the celebrated graph neural networks yield effective representations for individual nodes of a graph, there has been relatively less success in extending to the task of graph similarity learning. Recent work on graph similarity learning has considered either global-level graph-graph interactions or low-level node-node interactions, however ignoring the rich cross-level interactions (e.g., be… ▽ More

    Submitted 7 August, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Comments: Accepted by IEEE Transactions on Neural Networks and Learning Systems (IEEE TNNLS)

  7. arXiv:2007.03874  [pdf, other

    eess.SP cs.CV cs.HC

    Fine-grained Vibration Based Sensing Using a Smartphone

    Authors: Kamran Ali, Alex X. Liu

    Abstract: Recognizing surfaces based on their vibration signatures is useful as it can enable tagging of different locations without requiring any additional hardware such as Near Field Communication (NFC) tags. However, previous vibration based surface recognition schemes either use custom hardware for creating and sensing vibration, which makes them difficult to adopt, or use inertial (IMU) sensors in com… ▽ More

    Submitted 27 August, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

  8. arXiv:2007.03600  [pdf, other

    eess.SP cs.CV cs.HC cs.LG

    Monitoring Browsing Behavior of Customers in Retail Stores via RFID Imaging

    Authors: Kamran Ali, Alex X. Liu, Eugene Chai, Karthik Sundaresan

    Abstract: In this paper, we propose to use commercial off-the-shelf (COTS) monostatic RFID devices (i.e. which use a single antenna at a time for both transmitting and receiving RFID signals to and from the tags) to monitor browsing activity of customers in front of display items in places such as retail stores. To this end, we propose TagSee, a multi-person imaging system based on monostatic RFID imaging.… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  9. arXiv:1912.09150  [pdf, other

    cs.CR cs.LG

    An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning

    Authors: Zhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao, Lin Chen

    Abstract: With the advent of the era of big data, deep learning has become a prevalent building block in a variety of machine learning or data mining tasks, such as signal processing, network modeling and traffic analysis, to name a few. The massive user data crowdsourced plays a crucial role in the success of deep learning models. However, it has been shown that user data may be inferred from trained neura… ▽ More

    Submitted 19 December, 2019; originally announced December 2019.

    Comments: This full paper appears in the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), held in April 2020

  10. arXiv:1912.08098  [pdf

    cs.NI

    The Network-based Candidate Forwarding Set Optimization Approach for Opportunistic Routing in Wireless Sensor Network

    Authors: Ning Li, Alex X. Liu, Jose-Fernan Martinez-Ortega, Vicente Hernandez Diaz, Xin Yuan

    Abstract: In wireless sensor networks (WSNs), the opportunistic routing has better performances on packet delivery probability than the deterministic routing. For reducing the transmission delay and duplicate transmission in opportunistic routing, the candidate forwarding set optimization technology is proposed. This technology is crucial to opportunistic routing. The prior arts have limitations on improvin… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1709.08540

  11. arXiv:1912.07599  [pdf

    cs.NI cs.DS

    Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing

    Authors: Jianen Yan, Ning Li, Zhaoxin Zhang, Alex X. Liu, Jose Fernan Martinez, Xin Yuan

    Abstract: Mobile edge computing (MEC) has emerged for reducing energy consumption and latency by allowing mobile users to offload computationally intensive tasks to the MEC server. Due to the spectrum reuse in small cell network, the inter-cell interference has a great effect on MEC performances. In this paper, for reducing the energy consumption and latency of MEC, we propose a game theory based approach t… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1805.02182

  12. arXiv:1912.07235  [pdf

    cs.NI

    Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network

    Authors: Ning Li, Jianen Yan, Zhaoxin Zhang, Alex X. Liu, Xin Yuan

    Abstract: In the wireless network applications, such as routing decision, network selection, etc., the Multi-Attribute Decision Making (MADM) has been widely used. The MADM approach can address the multi-objective decision making issues effectively.However, when the parameters vary greatly, the traditionalMADM algorithm is not effective anymore. To solve this problem,in this paper, we propose the pairwise-b… ▽ More

    Submitted 23 December, 2019; v1 submitted 16 December, 2019; originally announced December 2019.

  13. arXiv:1909.10066  [pdf, ps, other

    cs.SI

    Trust Assessment in Online Social Networks

    Authors: Guangchi Liu, Qing Yang, Honggang Wang, Alex X. Liu

    Abstract: Assessing trust in online social networks (OSNs) is critical for many applications such as online marketing and network security. It is a challenging problem, however, due to the difficulties of handling complex social network topologies and conducting accurate assessment in these topologies. To address these challenges, we model trust by proposing the three-valued subjective logic (3VSL) model. 3… ▽ More

    Submitted 22 September, 2019; originally announced September 2019.

  14. arXiv:1712.03327  [pdf, other

    cs.CR

    The Insecurity of Home Digital Voice Assistants -- Amazon Alexa as a Case Study

    Authors: Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Kamran Ali, Chi-Yu Li, Tian Xie

    Abstract: Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can control smart devices and get living assistance through those HDVAs (e.g., Amazon Alexa, Google Home) using voice. In this work, we study the insecurity of HDVA service by using Amazon Alexa as a case study. We disclose three security vulnerabilities which root in the insecure access control of Alexa services. We… ▽ More

    Submitted 12 November, 2019; v1 submitted 8 December, 2017; originally announced December 2017.

  15. arXiv:1608.06574  [pdf, other

    cs.NI

    Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises

    Authors: Kamran Ali, Ioannis Pefkianakis, Alex X. Liu, Kyu-Han Kim

    Abstract: Powerline communication (PLC) provides inexpensive, secure and high speed network connectivity, by leveraging the existing power distribution networks inside the buildings. While PLC technology has the potential to improve connectivity and is considered a key enabler for sensing, control, and automation applications in enterprises, it has been mainly deployed for improving connectivity in homes. D… ▽ More

    Submitted 30 August, 2016; v1 submitted 23 August, 2016; originally announced August 2016.

    Comments: PLCs, Powerline Communications, Spectrum Sharing, Effect of Breakers, Enterprises, IoTs, Large Scale Indoor PLC Networks

  16. arXiv:1603.05353  [pdf, ps, other

    cs.NI

    OpenFunction: Data Plane Abstraction for Software-Defined Middleboxes

    Authors: Chen Tian, Alex X. Liu, Ali Munir, Jie Yang, Yangming Zhao

    Abstract: The state-of-the-art OpenFlow technology only partially realized SDN vision of abstraction and centralization for packet forwarding in switches. OpenFlow/P4 falls short in implementing middlebox functionalities due to the fundamental limitation in its match-action abstraction. In this paper, we advocate the vision of Software-Defined Middleboxes (SDM) to realize abstraction and centralization for… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.

    Comments: 15 pages

  17. arXiv:1510.03019  [pdf, other

    cs.DS

    A Shifting Bloom Filter Framework for Set Queries

    Authors: Tong Yang, Alex X. Liu, Muhammad Shahzad, Yuankun Zhong, Qiaobin Fu, Zi Li, Gaogang Xie, Xiaoming Li

    Abstract: Set queries are fundamental operations in computer systems and applications.This paper addresses the fundamental problem of designing a probabilistic data structure that can quickly process set queries using a small amount of memory. We propose a Shifting Bloom Filter (ShBF) framework for representing and querying sets. We demonstrate the effectiveness of ShBF using three types of popular set quer… ▽ More

    Submitted 22 March, 2016; v1 submitted 11 October, 2015; originally announced October 2015.

  18. arXiv:1307.0475  [pdf, other

    cs.CR cs.SI physics.soc-ph

    A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing

    Authors: Faraz Ahmed, Rong Jin, Alex X. Liu

    Abstract: Online social networks are being increasingly used for analyzing various societal phenomena such as epidemiology, information dissemination, marketing and sentiment flow. Popular analysis techniques such as clustering and influential node analysis, require the computation of eigenvectors of the real graph's adjacency matrix. Recent de-anonymization attacks on Netflix and AOL datasets show that an… ▽ More

    Submitted 1 July, 2013; originally announced July 2013.

  19. arXiv:1302.2376  [pdf, other

    cs.SI physics.soc-ph

    Modeling Morphology of Social Network Cascades

    Authors: M. Zubair Shafiq, Alex X. Liu

    Abstract: Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphology has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-orde… ▽ More

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 12 pages, technical report