Zum Hauptinhalt springen

Showing 1–40 of 40 results for author: Shan, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.04963  [pdf, other

    cs.LG

    LiD-FL: Towards List-Decodable Federated Learning

    Authors: Hong Liu, Liren Shan, Han Bao, Ronghui You, Yuhao Yi, Jiancheng Lv

    Abstract: Federated learning is often used in environments with many unverified participants. Therefore, federated learning under adversarial attacks receives significant attention. This paper proposes an algorithmic framework for list-decodable federated learning, where a central server maintains a list of models, with at least one guaranteed to perform well. The framework has no strict restriction on the… ▽ More

    Submitted 15 August, 2024; v1 submitted 9 August, 2024; originally announced August 2024.

    Comments: 26 pages, 5 figures

  2. arXiv:2405.19568  [pdf, other

    cs.CV

    Organizing Background to Explore Latent Classes for Incremental Few-shot Semantic Segmentation

    Authors: Lianlei Shan, Wenzhang Zhou, Wei Li, Xingyu Ding

    Abstract: The goal of incremental Few-shot Semantic Segmentation (iFSS) is to extend pre-trained segmentation models to new classes via few annotated images without access to old training data. During incrementally learning novel classes, the data distribution of old classes will be destroyed, leading to catastrophic forgetting. Meanwhile, the novel classes have only few samples, making models impossible to… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 10 pages, 5 figures

  3. arXiv:2405.18663  [pdf, other

    cs.AI

    Lifelong Learning and Selective Forgetting via Contrastive Strategy

    Authors: Lianlei Shan, Wenzhang Zhou, Wei Li, Xingyu Ding

    Abstract: Lifelong learning aims to train a model with good performance for new tasks while retaining the capacity of previous tasks. However, some practical scenarios require the system to forget undesirable knowledge due to privacy issues, which is called selective forgetting. The joint task of the two is dubbed Learning with Selective Forgetting (LSF). In this paper, we propose a new framework based on c… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 10 pages, 5 figure

  4. arXiv:2405.18078  [pdf, other

    cs.CV

    Edge-guided and Class-balanced Active Learning for Semantic Segmentation of Aerial Images

    Authors: Lianlei Shan, Weiqiang Wang, Ke Lv, Bin Luo

    Abstract: Semantic segmentation requires pixel-level annotation, which is time-consuming. Active Learning (AL) is a promising method for reducing data annotation costs. Due to the gap between aerial and natural images, the previous AL methods are not ideal, mainly caused by unreasonable labeling units and the neglect of class imbalance. Previous labeling units are based on images or regions, which does not… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 15 pages, 9 figures

  5. arXiv:2405.17776  [pdf, other

    cs.LG

    The Binary Quantized Neural Network for Dense Prediction via Specially Designed Upsampling and Attention

    Authors: Xingyu Ding, Lianlei Shan, Guiqin Zhao, Meiqi Wu, Wenzhang Zhou, Wei Li

    Abstract: Deep learning-based information processing consumes long time and requires huge computing resources, especially for dense prediction tasks which require an output for each pixel, like semantic segmentation and salient object detection. There are mainly two challenges for quantization of dense prediction tasks. Firstly, directly applying the upsampling operation that dense prediction tasks require… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Comments: 30 pages, 6 figures

  6. arXiv:2402.14540  [pdf, other

    cs.GT

    On Truthful Item-Acquiring Mechanisms for Reward Maximization

    Authors: Liang Shan, Shuo Zhang, Jie Zhang, Zihe Wang

    Abstract: In this research, we study the problem that a collector acquires items from the owner based on the item qualities the owner declares and an independent appraiser's assessments. The owner is interested in maximizing the probability that the collector acquires the items and is the only one who knows the items' factual quality. The appraiser performs her duties with impartiality, but her assessment m… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  7. arXiv:2402.11769  [pdf, other

    eess.SY cs.GT math.OC

    Connection-Aware P2P Trading: Simultaneous Trading and Peer Selection

    Authors: Cheng Feng, Kedi Zheng, Lanqing Shan, Hani Alers, Lampros Stergioulas, Hongye Guo, Qixin Chen

    Abstract: Peer-to-peer (P2P) trading is seen as a viable solution to handle the growing number of distributed energy resources in distribution networks. However, when dealing with large-scale consumers, there are several challenges that must be addressed. One of these challenges is limited communication capabilities. Additionally, prosumers may have specific preferences when it comes to trading. Both can re… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: Submitted to IEEE PES Transactions

  8. arXiv:2401.17952  [pdf, ps, other

    cs.CY cs.DS cs.IR

    Error-Tolerant E-Discovery Protocols

    Authors: Jinshuo Dong, Jason D. Hartline, Liren Shan, Aravindan Vijayaraghavan

    Abstract: We consider the multi-party classification problem introduced by Dong, Hartline, and Vijayaraghavan (2022) in the context of electronic discovery (e-discovery). Based on a request for production from the requesting party, the responding party is required to provide documents that are responsive to the request except for those that are legally privileged. Our goal is to find a protocol that verifie… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: 28 pages, 6 figures, CSLAW 2024

  9. arXiv:2401.00973  [pdf, other

    cs.LG cs.CR

    Facebook Report on Privacy of fNIRS data

    Authors: Md Imran Hossen, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Xiali Hei

    Abstract: The primary goal of this project is to develop privacy-preserving machine learning model training techniques for fNIRS data. This project will build a local model in a centralized setting with both differential privacy (DP) and certified robustness. It will also explore collaborative federated learning to train a shared model between multiple clients without sharing local fNIRS datasets. To preven… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Comments: 15 pages, 5 figures, 3 tables

    MSC Class: I.2.0

  10. arXiv:2312.02400  [pdf, other

    cs.LG cs.CR

    Auto DP-SGD: Dual Improvements of Privacy and Accuracy via Automatic Clipping Threshold and Noise Multiplier Estimation

    Authors: Sai Venkatesh Chilukoti, Md Imran Hossen, Liqun Shan, Vijay Srinivas Tida, Xiai Hei

    Abstract: DP-SGD has emerged as a popular method to protect personally identifiable information in deep learning applications. Unfortunately, DP-SGD's per-sample gradient clipping and uniform noise addition during training can significantly degrade model utility. To enhance the model's utility, researchers proposed various adaptive DP-SGD methods. However, we examine and discover that these techniques resul… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: 25 pages single column, 2 figures

    MSC Class: 26; 40

  11. arXiv:2311.17450  [pdf, other

    cs.CV

    Continual Learning for Image Segmentation with Dynamic Query

    Authors: Weijia Wu, Yuzhong Zhao, Zhuang Li, Lianlei Shan, Hong Zhou, Mike Zheng Shou

    Abstract: Image segmentation based on continual learning exhibits a critical drop of performance, mainly due to catastrophic forgetting and background shift, as they are required to incorporate new classes continually. In this paper, we propose a simple, yet effective Continual Image Segmentation method with incremental Dynamic Query (CISDQ), which decouples the representation learning of both old and new k… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: Code: https://github.com/weijiawu/CisDQ

    Journal ref: TCSVT 2023

  12. A General Approach to Proving Properties of Fibonacci Representations via Automata Theory

    Authors: Jeffrey Shallit, Sonja Linghui Shan

    Abstract: We provide a method, based on automata theory, to mechanically prove the correctness of many numeration systems based on Fibonacci numbers. With it, long case-based and induction-based proofs of correctness can be replaced by simply constructing a regular expression (or finite automaton) specifying the rules for valid representations, followed by a short computation. Examples of the systems that c… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: In Proceedings AFL 2023, arXiv:2309.01126

    Journal ref: EPTCS 386, 2023, pp. 228-242

  13. arXiv:2308.10160  [pdf, other

    cs.DS

    Higher-Order Cheeger Inequality for Partitioning with Buffers

    Authors: Konstantin Makarychev, Yury Makarychev, Liren Shan, Aravindan Vijayaraghavan

    Abstract: We prove a new generalization of the higher-order Cheeger inequality for partitioning with buffers. Consider a graph $G=(V,E)$. The buffered expansion of a set $S \subseteq V$ with a buffer $B \subseteq V \setminus S$ is the edge expansion of $S$ after removing all the edges from set $S$ to its buffer $B$. An $\varepsilon$-buffered $k$-partitioning is a partitioning of a graph into disjoint compon… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

    Comments: 45 pages

  14. arXiv:2308.08373  [pdf, ps, other

    cs.DS

    Approximation Algorithms for Norm Multiway Cut

    Authors: Charlie Carlson, Jafar Jafarov, Konstantin Makarychev, Yury Makarychev, Liren Shan

    Abstract: We consider variants of the classic Multiway Cut problem. Multiway Cut asks to partition a graph $G$ into $k$ parts so as to separate $k$ given terminals. Recently, Chandrasekaran and Wang (ESA 2021) introduced $\ell_p$-norm Multiway, a generalization of the problem, in which the goal is to minimize the $\ell_p$ norm of the edge boundaries of $k$ parts. We provide an… ▽ More

    Submitted 16 August, 2023; originally announced August 2023.

    Comments: 25 pages, ESA 2023

  15. arXiv:2307.15128  [pdf, other

    cs.CV

    End-to-end Remote Sensing Change Detection of Unregistered Bi-temporal Images for Natural Disasters

    Authors: Guiqin Zhao, Lianlei Shan, Weiqiang Wang

    Abstract: Change detection based on remote sensing images has been a prominent area of interest in the field of remote sensing. Deep networks have demonstrated significant success in detecting changes in bi-temporal remote sensing images and have found applications in various fields. Given the degradation of natural environments and the frequent occurrence of natural disasters, accurately and swiftly identi… ▽ More

    Submitted 16 August, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

  16. arXiv:2305.15033  [pdf, other

    cs.CL

    SmartTrim: Adaptive Tokens and Attention Pruning for Efficient Vision-Language Models

    Authors: Zekun Wang, Jingchang Chen, Wangchunshu Zhou, Haichao Zhu, Jiafeng Liang, Liping Shan, Ming Liu, Dongliang Xu, Qing Yang, Bing Qin

    Abstract: Despite achieving remarkable performance on various vision-language tasks, Transformer-based Vision-Language Models (VLMs) suffer from redundancy in inputs and parameters, significantly hampering their efficiency in real-world applications. Moreover, the degree of redundancy in token representations and model parameters, such as attention heads, varies significantly for different inputs. In light… ▽ More

    Submitted 26 February, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: COLING-LREC 2024

  17. arXiv:2304.12584  [pdf, other

    physics.optics cs.LG

    Learning imaging mechanism directly from optical microscopy observations

    Authors: Ze-Hao Wang, Long-Kun Shan, Tong-Tian Weng, Tian-Long Chen, Qi-Yu Wang, Xiang-Dong Chen, Zhang-Yang Wang, Guang-Can Guo, Fang-Wen Sun

    Abstract: Optical microscopy image plays an important role in scientific research through the direct visualization of the nanoworld, where the imaging mechanism is described as the convolution of the point spread function (PSF) and emitters. Based on a priori knowledge of the PSF or equivalent PSF, it is possible to achieve more precise exploration of the nanoworld. However, it is an outstanding challenge t… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

  18. arXiv:2304.09113  [pdf, ps, other

    cs.DS

    Random Cuts are Optimal for Explainable k-Medians

    Authors: Konstantin Makarychev, Liren Shan

    Abstract: We show that the RandomCoordinateCut algorithm gives the optimal competitive ratio for explainable k-medians in l1. The problem of explainable k-medians was introduced by Dasgupta, Frost, Moshkovitz, and Rashtchian in 2020. Several groups of authors independently proposed a simple polynomial-time randomized algorithm for the problem and showed that this algorithm is O(log k loglog k) competitive.… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: 14 pages, 2 figures

  19. Optimal Pricing Schemes for Identical Items with Time-Sensitive Buyers

    Authors: Zhengyang Liu, Liang Shan, Zihe Wang

    Abstract: Time or money? That is a question! In this paper, we consider this dilemma in the pricing regime, in which we try to find the optimal pricing scheme for identical items with heterogenous time-sensitive buyers. We characterize the revenue-optimal solution and propose an efficient algorithm to find it in a Bayesian setting. Our results also demonstrate the tight ratio between the value of wasted tim… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: 11pages, 2 figures

  20. arXiv:2211.06028  [pdf, ps, other

    cs.DS cs.SI math.OC

    Dynamic Curing and Network Design in SIS Epidemic Processes

    Authors: Yuhao Yi, Liren Shan, Shijie Wang, Philip E. Paré, Karl H. Johansson

    Abstract: This paper studies efficient algorithms for dynamic curing policies and the corresponding network design problems to guarantee the fast extinction of epidemic spread in a susceptible-infected-susceptible (SIS) model. We consider a Markov process-based SIS epidemic model. We provide a computationally efficient curing algorithm based on the curing policy proposed by Drakopoulos, Ozdaglar, and Tsitsi… ▽ More

    Submitted 14 August, 2024; v1 submitted 11 November, 2022; originally announced November 2022.

    Comments: 24 pages, 3 figure

  21. arXiv:2211.03302  [pdf, ps, other

    cs.GT econ.TH

    Optimal Scoring Rules for Multi-dimensional Effort

    Authors: Jason D. Hartline, Liren Shan, Yingkai Li, Yifan Wu

    Abstract: This paper develops a framework for the design of scoring rules to optimally incentivize an agent to exert a multi-dimensional effort. This framework is a generalization to strategic agents of the classical knapsack problem (cf. Briest, Krysta, and Vöcking, 2005, Singer, 2010) and it is foundational to applying algorithmic mechanism design to the classroom. The paper identifies two simple families… ▽ More

    Submitted 29 June, 2023; v1 submitted 6 November, 2022; originally announced November 2022.

  22. arXiv:2209.02866  [pdf, ps, other

    cs.CY

    Algorithmic Learning Foundations for Common Law

    Authors: Jason D. Hartline, Daniel W. Linna Jr., Liren Shan, Alex Tang

    Abstract: This paper looks at a common law legal system as a learning algorithm, models specific features of legal proceedings, and asks whether this system learns efficiently. A particular feature of our model is explicitly viewing various aspects of court proceedings as learning algorithms. This viewpoint enables directly pointing out that when the costs of going to court are not commensurate with the ben… ▽ More

    Submitted 8 September, 2022; v1 submitted 6 September, 2022; originally announced September 2022.

  23. arXiv:2208.06025  [pdf, other

    cs.FL cs.DM math.CO

    Automatic Sequences in Negative Bases and Proofs of Some Conjectures of Shevelev

    Authors: Jeffrey Shallit, Sonja Linghui Shan, Kai Hsiang Yang

    Abstract: We discuss the use of negative bases in automatic sequences. Recently the theorem-prover Walnut has been extended to allow the use of base (-k) to express variables, thus permitting quantification over Z instead of N. This enables us to prove results about two-sided (bi-infinite) automatic sequences. We first explain the theory behind negative bases in Walnut. Next, we use this new version of Waln… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  24. arXiv:2207.10171  [pdf, other

    math.CO cs.DM cs.FL

    Pseudoperiodic Words and a Question of Shevelev

    Authors: Joseph Meleshko, Pascal Ochem, Jeffrey Shallit, Sonja Linghui Shan

    Abstract: We generalize the familiar notion of periodicity in sequences to a new kind of pseudoperiodicity, and we prove some basic results about it. We revisit the results of a 2012 paper of Shevelev and reprove his results in a simpler and more unified manner, and provide a complete answer to one of his previously unresolved questions. We consider finding words with specific pseudoperiod and having the sm… ▽ More

    Submitted 12 October, 2023; v1 submitted 20 July, 2022; originally announced July 2022.

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 25:2, Automata, Logic and Semantics (October 16, 2023) dmtcs:9919

  25. arXiv:2111.03193  [pdf, ps, other

    cs.LG cs.DS

    Explainable k-means. Don't be greedy, plant bigger trees!

    Authors: Konstantin Makarychev, Liren Shan

    Abstract: We provide a new bi-criteria $\tilde{O}(\log^2 k)$ competitive algorithm for explainable $k$-means clustering. Explainable $k$-means was recently introduced by Dasgupta, Frost, Moshkovitz, and Rashtchian (ICML 2020). It is described by an easy to interpret and understand (threshold) decision tree or diagram. The cost of the explainable $k$-means clustering equals to the sum of costs of its cluster… ▽ More

    Submitted 27 April, 2022; v1 submitted 4 November, 2021; originally announced November 2021.

    Comments: 29 pages, 4 figures

  26. arXiv:2110.11391  [pdf, other

    cs.CV

    DEX: Domain Embedding Expansion for Generalized Person Re-identification

    Authors: Eugene P. W. Ang, Lin Shan, Alex C. Kot

    Abstract: In recent years, supervised Person Re-identification (Person ReID) approaches have demonstrated excellent performance. However, when these methods are applied to inputs from a different camera network, they typically suffer from significant performance degradation. Different from most domain adaptation (DA) approaches addressing this issue, we focus on developing a domain generalization (DG) Perso… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: Accepted into BMVC 2021

  27. arXiv:2107.00798  [pdf, ps, other

    cs.DS cs.LG

    Near-optimal Algorithms for Explainable k-Medians and k-Means

    Authors: Konstantin Makarychev, Liren Shan

    Abstract: We consider the problem of explainable $k$-medians and $k$-means introduced by Dasgupta, Frost, Moshkovitz, and Rashtchian~(ICML 2020). In this problem, our goal is to find a threshold decision tree that partitions data into $k$ clusters and minimizes the $k$-medians or $k$-means objective. The obtained clustering is easy to interpret because every decision node of a threshold tree splits data bas… ▽ More

    Submitted 2 August, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

    Comments: 29 pages, 4 figures, ICML 2021

  28. arXiv:2012.03734  [pdf, other

    cs.NI

    Sequential Resource Access: Theory and Algorithm

    Authors: Lin Chen, Anastasios Giovanidis, Wei Wang, Lin Shan

    Abstract: We formulate and analyze a generic sequential resource access problem arising in a variety of engineering fields, where a user disposes a number of heterogeneous computing, communication, or storage resources, each characterized by the probability of successfully executing the user's task and the related access delay and cost, and seeks an optimal access strategy to maximize her utility within a g… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: 10 pages double column, accepted paper at IEEE INFOCOM 2021. This is the author-submitted version

  29. arXiv:2011.11087  [pdf, ps, other

    math.OC cs.SI

    Edge Deletion Algorithms for Minimizing Spread in SIR Epidemic Models

    Authors: Yuhao Yi, Liren Shan, Philip E. Paré, Karl H. Johansson

    Abstract: This paper studies algorithmic strategies to effectively reduce the number of infections in susceptible-infected-recovered (SIR) epidemic models. We consider a Markov chain SIR model and its two instantiations in the deterministic SIR (D-SIR) model and the independent cascade SIR (IC-SIR) model. We investigate the problem of minimizing the number of infections by restricting contacts under realist… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

    Comments: 29 pages, 4 figures

  30. arXiv:2010.14487  [pdf, ps, other

    cs.LG cs.DS

    Improved Guarantees for k-means++ and k-means++ Parallel

    Authors: Konstantin Makarychev, Aravind Reddy, Liren Shan

    Abstract: In this paper, we study k-means++ and k-means++ parallel, the two most popular algorithms for the classic k-means clustering problem. We provide novel analyses and show improved approximation and bi-criteria approximation guarantees for k-means++ and k-means++ parallel. Our results give a better theoretical justification for why these algorithms perform extremely well in practice. We also propose… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Journal ref: NeurIPS 2020

  31. arXiv:2007.02905  [pdf, ps, other

    cs.GT

    Optimization of Scoring Rules

    Authors: Jason D. Hartline, Yingkai Li, Liren Shan, Yifan Wu

    Abstract: This paper introduces an objective for optimizing proper scoring rules. The objective is to maximize the increase in payoff of a forecaster who exerts a binary level of effort to refine a posterior belief from a prior belief. In this framework we characterize optimal scoring rules in simple settings, give efficient algorithms for computing optimal scoring rules in complex settings, and identify si… ▽ More

    Submitted 17 April, 2022; v1 submitted 6 July, 2020; originally announced July 2020.

  32. On the existence and non-existence of improper homomorphisms of oriented and $2$-edge-coloured graphs to reflexive targets

    Authors: Christopher Duffy, Sonja Linghui Shan

    Abstract: We consider non-trivial homomorphisms to reflexive oriented graphs in which some pair of adjacent vertices have the same image. Using a notion of convexity for oriented graphs, we study those oriented graphs that do not admit such homomorphisms. We fully classify those oriented graphs with tree-width $2$ that do not admit such homomorphisms and show that it is NP-complete to decide if a graph admi… ▽ More

    Submitted 18 March, 2021; v1 submitted 18 April, 2020; originally announced April 2020.

    MSC Class: 05C60

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 23 no. 1, Graph Theory (March 29, 2021) dmtcs:6773

  33. arXiv:1909.02109  [pdf, ps, other

    cs.LG stat.ML

    Stochastic Linear Optimization with Adversarial Corruption

    Authors: Yingkai Li, Edmund Y. Lou, Liren Shan

    Abstract: We extend the model of stochastic bandits with adversarial corruption (Lykouriset al., 2018) to the stochastic linear optimization problem (Dani et al., 2008). Our algorithm is agnostic to the amount of corruption chosen by the adaptive adversary. The regret of the algorithm only increases linearly in the amount of corruption. Our algorithm involves using Löwner-John's ellipsoid for exploration an… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

  34. arXiv:1804.06540  [pdf, ps, other

    cs.SI cs.DS

    Improving information centrality of a node in complex networks by adding edges

    Authors: Liren Shan, Yuhao Yi, Zhongzhi Zhang

    Abstract: The problem of increasing the centrality of a network node arises in many practical applications. In this paper, we study the optimization problem of maximizing the information centrality $I_v$ of a given node $v$ in a network with $n$ nodes and $m$ edges, by creating $k$ new edges incident to $v$. Since $I_v$ is the reciprocal of the sum of resistance distance $\mathcal{R}_v$ between $v$ and all… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

    Comments: 7 pages, 2 figures, ijcai-2018

  35. arXiv:1803.00829  [pdf, ps, other

    cs.DS cs.SI

    Independence number and the number of maximum independent sets in pseudofractal scale-free web and Sierpiński gasket

    Authors: Liren Shan, Huan Li, Zhongzhi Zhang

    Abstract: As a fundamental subject of theoretical computer science, the maximum independent set (MIS) problem not only is of purely theoretical interest, but also has found wide applications in various fields. However, for a general graph determining the size of a MIS is NP-hard, and exact computation of the number of all MISs is even more difficult. It is thus of significant interest to seek special graphs… ▽ More

    Submitted 2 March, 2018; originally announced March 2018.

    Comments: 15 pages, 10 figures

  36. Current Flow Group Closeness Centrality for Complex Networks

    Authors: Huan Li, Richard Peng, Liren Shan, Yuhao Yi, Zhongzhi Zhang

    Abstract: Current flow closeness centrality (CFCC) has a better discriminating ability than the ordinary closeness centrality based on shortest paths. In this paper, we extend this notion to a group of vertices in a weighted graph, and then study the problem of finding a subset $S$ of $k$ vertices to maximize its CFCC $C(S)$, both theoretically and experimentally. We show that the problem is NP-hard, but pr… ▽ More

    Submitted 11 February, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: 31 pages, 4 figures

    Journal ref: WWW'2019

  37. Domination number and minimum dominating sets in pseudofractal scale-free web and Sierpiński graph

    Authors: Liren Shan, Huan Li, Zhongzhi Zhang

    Abstract: The minimum dominating set (MDS) problem is a fundamental subject of theoretical computer science, and has found vast applications in different areas, including sensor networks, protein interaction networks, and structural controllability. However, the determination of the size of a MDS and the number of all MDSs in a general network is NP-hard, and it thus makes sense to seek particular graphs fo… ▽ More

    Submitted 27 March, 2017; originally announced March 2017.

  38. arXiv:1407.6085  [pdf

    cs.IT

    Block Bayesian Sparse Learning Algorithms With Application to Estimating Channels in OFDM Systems

    Authors: Guan Gui, Li Xu, Lin Shan

    Abstract: Cluster-sparse channels often exist in frequencyselective fading broadband communication systems. The main reason is received scattered waveform exhibits cluster structure which is caused by a few reflectors near the receiver. Conventional sparse channel estimation methods have been proposed for general sparse channel model which without considering the potential cluster-sparse structure informati… ▽ More

    Submitted 22 July, 2014; originally announced July 2014.

    Comments: 5 pages, 6 figures, will be presented in WPMC2014@Sydney, Australia

  39. arXiv:1407.6081  [pdf

    cs.IT

    Adaptive MIMO Channel Estimation using Sparse Variable Step-Size NLMS Algorithms

    Authors: Guan Gui, Li Xu, Lin Shan, Fumiyuki Adachi

    Abstract: To estimate multiple-input multiple-output (MIMO) channels, invariable step-size normalized least mean square (ISSNLMS) algorithm was applied to adaptive channel estimation (ACE). Since the MIMO channel is often described by sparse channel model due to broadband signal transmission, such sparsity can be exploited by adaptive sparse channel estimation (ASCE) methods using sparse ISS-NLMS algorithms… ▽ More

    Submitted 22 July, 2014; originally announced July 2014.

    Comments: 5 papges, 6 figures, submitted for ICCS2014@Macau. arXiv admin note: substantial text overlap with arXiv:1311.1314

  40. arXiv:1403.0192  [pdf

    cs.IT

    Compressive sensing based Bayesian sparse channel estimation for OFDM communication systems: high performance and low complexity

    Authors: Guan Gui, Li Xu, Lin Shan, Fumiyuki Adachi

    Abstract: In orthogonal frequency division modulation (OFDM) communication systems, channel state information (CSI) is required at receiver due to the fact that frequency-selective fading channel leads to disgusting inter-symbol interference (ISI) over data transmission. Broadband channel model is often described by very few dominant channel taps and they can be probed by compressive sensing based sparse ch… ▽ More

    Submitted 20 April, 2015; v1 submitted 2 March, 2014; originally announced March 2014.

    Comments: 24 pages,16 figures, submitted for a journal