Skip to main content

Showing 1–26 of 26 results for author: Tong, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17531  [pdf, other

    cs.RO

    Design and Preliminary Evaluation of a Torso Stabiliser for Individuals with Spinal Cord Injury

    Authors: Rejin John Varghese, Man-Yan Tong, Isabella Szczech, Peter Bryan, Dario Farina, Etienne Burdet

    Abstract: Spinal cord injuries (SCIs) generally result in sensory and mobility impairments, with torso instability being particularly debilitating. Existing torso stabilisers are often rigid and restrictive. This paper presents an early investigation into a non-restrictive 1 degree-of-freedom (DoF) mechanical torso stabiliser inspired by devices such as centrifugal clutches and seat-belt mechanisms. Firstly… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: 4 pages, 4 figures, 10 references. Submitted to IEEE EMBC 2024 conference

  2. arXiv:2402.03315  [pdf, other

    cs.CV

    RTHDet: Rotate Table Area and Head Detection in images

    Authors: Wenxing Hu, Minglei Tong

    Abstract: Traditional models focus on horizontal table detection but struggle in rotating contexts, limiting progress in table recognition. This paper introduces a new task: detecting table regions and localizing head-tail parts in rotation scenarios. We propose corresponding datasets, evaluation metrics, and methods. Our novel method, 'Adaptively Bounded Rotation,' addresses dataset scarcity in detecting r… ▽ More

    Submitted 31 December, 2023; originally announced February 2024.

  3. arXiv:2401.05566  [pdf, other

    cs.CR cs.AI cs.CL cs.LG cs.SE

    Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training

    Authors: Evan Hubinger, Carson Denison, Jesse Mu, Mike Lambert, Meg Tong, Monte MacDiarmid, Tamera Lanham, Daniel M. Ziegler, Tim Maxwell, Newton Cheng, Adam Jermyn, Amanda Askell, Ansh Radhakrishnan, Cem Anil, David Duvenaud, Deep Ganguli, Fazl Barez, Jack Clark, Kamal Ndousse, Kshitij Sachan, Michael Sellitto, Mrinank Sharma, Nova DasSarma, Roger Grosse, Shauna Kravec , et al. (14 additional authors not shown)

    Abstract: Humans are capable of strategically deceptive behavior: behaving helpfully in most situations, but then behaving very differently in order to pursue alternative objectives when given the opportunity. If an AI system learned such a deceptive strategy, could we detect it and remove it using current state-of-the-art safety training techniques? To study this question, we construct proof-of-concept exa… ▽ More

    Submitted 17 January, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: updated to add missing acknowledgements

  4. arXiv:2312.06681  [pdf, other

    cs.CL cs.AI cs.LG

    Steering Llama 2 via Contrastive Activation Addition

    Authors: Nina Panickssery, Nick Gabrieli, Julian Schulz, Meg Tong, Evan Hubinger, Alexander Matt Turner

    Abstract: We introduce Contrastive Activation Addition (CAA), an innovative method for steering language models by modifying their activations during forward passes. CAA computes "steering vectors" by averaging the difference in residual stream activations between pairs of positive and negative examples of a particular behavior, such as factual versus hallucinatory responses. During inference, these steerin… ▽ More

    Submitted 5 July, 2024; v1 submitted 8 December, 2023; originally announced December 2023.

  5. arXiv:2310.13548  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    Towards Understanding Sycophancy in Language Models

    Authors: Mrinank Sharma, Meg Tong, Tomasz Korbak, David Duvenaud, Amanda Askell, Samuel R. Bowman, Newton Cheng, Esin Durmus, Zac Hatfield-Dodds, Scott R. Johnston, Shauna Kravec, Timothy Maxwell, Sam McCandlish, Kamal Ndousse, Oliver Rausch, Nicholas Schiefer, Da Yan, Miranda Zhang, Ethan Perez

    Abstract: Human feedback is commonly utilized to finetune AI assistants. But human feedback may also encourage model responses that match user beliefs over truthful ones, a behaviour known as sycophancy. We investigate the prevalence of sycophancy in models whose finetuning procedure made use of human feedback, and the potential role of human preference judgments in such behavior. We first demonstrate that… ▽ More

    Submitted 27 October, 2023; v1 submitted 20 October, 2023; originally announced October 2023.

    Comments: 32 pages, 20 figures

    ACM Class: I.2.6

  6. arXiv:2310.12214  [pdf, other

    cs.CR

    InferDPT: Privacy-Preserving Inference for Black-box Large Language Model

    Authors: Meng Tong, Kejiang Chen, Jie Zhang, Yuang Qi, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Zhikun Zhang

    Abstract: Large language models (LLMs), like ChatGPT, have greatly simplified text generation tasks. However, they have also raised concerns about privacy risks such as data leakage and unauthorized data collection. Existing solutions for privacy-preserving inference face practical challenges related to computation time and communication costs. In this paper, we propose InferDPT, the first practical framewo… ▽ More

    Submitted 27 March, 2024; v1 submitted 18 October, 2023; originally announced October 2023.

  7. arXiv:2309.12288  [pdf, other

    cs.CL cs.AI cs.LG

    The Reversal Curse: LLMs trained on "A is B" fail to learn "B is A"

    Authors: Lukas Berglund, Meg Tong, Max Kaufmann, Mikita Balesni, Asa Cooper Stickland, Tomasz Korbak, Owain Evans

    Abstract: We expose a surprising failure of generalization in auto-regressive large language models (LLMs). If a model is trained on a sentence of the form "A is B", it will not automatically generalize to the reverse direction "B is A". This is the Reversal Curse. For instance, if a model is trained on "Valentina Tereshkova was the first woman to travel to space", it will not automatically be able to answe… ▽ More

    Submitted 26 May, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: 21 pages, 11 figures

  8. arXiv:2309.01458  [pdf, other

    cs.LG

    Leveraging Reward Consistency for Interpretable Feature Discovery in Reinforcement Learning

    Authors: Qisen Yang, Huanqian Wang, Mukun Tong, Wenjie Shi, Gao Huang, Shiji Song

    Abstract: The black-box nature of deep reinforcement learning (RL) hinders them from real-world applications. Therefore, interpreting and explaining RL agents have been active research topics in recent years. Existing methods for post-hoc explanations usually adopt the action matching principle to enable an easy understanding of vision-based RL agents. In this paper, it is argued that the commonly used acti… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

  9. arXiv:2309.00667  [pdf, other

    cs.CL cs.LG

    Taken out of context: On measuring situational awareness in LLMs

    Authors: Lukas Berglund, Asa Cooper Stickland, Mikita Balesni, Max Kaufmann, Meg Tong, Tomasz Korbak, Daniel Kokotajlo, Owain Evans

    Abstract: We aim to better understand the emergence of `situational awareness' in large language models (LLMs). A model is situationally aware if it's aware that it's a model and can recognize whether it's currently in testing or deployment. Today's LLMs are tested for safety and alignment before they are deployed. An LLM could exploit situational awareness to achieve a high score on safety tests, while tak… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

  10. arXiv:2307.09728  [pdf, other

    cs.CV eess.IV

    Uncertainty-Driven Multi-Scale Feature Fusion Network for Real-time Image Deraining

    Authors: Ming Tong, Xuefeng Yan, Yongzhen Wang

    Abstract: Visual-based measurement systems are frequently affected by rainy weather due to the degradation caused by rain streaks in captured images, and existing imaging devices struggle to address this issue in real-time. While most efforts leverage deep networks for image deraining and have made progress, their large parameter sizes hinder deployment on resource-constrained devices. Additionally, these d… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

  11. arXiv:2305.04161  [pdf, other

    cs.CV

    PhysBench: A Benchmark Framework for rPPG with a New Dataset and Baseline

    Authors: Kegang Wang, Yantao Wei, Mingwen Tong, Jie Gao, Yi Tian, YuJian Ma, ZhongJin Zhao

    Abstract: In recent years, due to the widespread use of internet videos, physiological remote sensing has gained more and more attention in the fields of affective computing and telemedicine. Recovering physiological signals from facial videos is a challenging task that involves a series of preprocessing, image algorithms, and post-processing to finally restore waveforms. We propose a complete and efficient… ▽ More

    Submitted 3 September, 2023; v1 submitted 6 May, 2023; originally announced May 2023.

  12. arXiv:2303.01894  [pdf, other

    cs.CV

    TRR360D: A dataset for 360 degree rotated rectangular box table detection

    Authors: Wenxing Hu, Minglei Tong

    Abstract: To address the problem of scarcity and high annotation costs of rotated image table detection datasets, this paper proposes a method for building a rotated image table detection dataset. Based on the ICDAR2019MTD modern table detection dataset, we refer to the annotation format of the DOTA dataset to create the TRR360D rotated table detection dataset. The training set contains 600 rotated images a… ▽ More

    Submitted 8 March, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

  13. arXiv:2303.01012  [pdf, other

    cs.CR

    Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering

    Authors: Kai Wang, Maike Tong, Changhao Wu, Jun Pang, Chen Chen, Xiapu Luo, Weili Han

    Abstract: The development of clustering heuristics has demonstrated that Bitcoin is not completely anonymous. Currently, existing clustering heuristics only consider confirmed transactions recorded in the Bitcoin blockchain. However, unconfirmed transactions in the mempool have yet to be utilized to improve the performance of the clustering heuristics. In this paper, we bridge this gap by combining unconf… ▽ More

    Submitted 3 March, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

    Comments: 15 pages, 13 figures, 4 tables. typos corrected

  14. arXiv:2210.16057  [pdf, other

    cs.CV

    Semi-UFormer: Semi-supervised Uncertainty-aware Transformer for Image Dehazing

    Authors: Ming Tong, Yongzhen Wang, Peng Cui, Xuefeng Yan, Mingqiang Wei

    Abstract: Image dehazing is fundamental yet not well-solved in computer vision. Most cutting-edge models are trained in synthetic data, leading to the poor performance on real-world hazy scenarios. Besides, they commonly give deterministic dehazed images while neglecting to mine their uncertainty. To bridge the domain gap and enhance the dehazing performance, we propose a novel semi-supervised uncertainty-a… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

  15. arXiv:2209.12266  [pdf, other

    cs.RO eess.SY

    Enforcing safety for vision-based controllers via Control Barrier Functions and Neural Radiance Fields

    Authors: Mukun Tong, Charles Dawson, Chuchu Fan

    Abstract: To navigate complex environments, robots must increasingly use high-dimensional visual feedback (e.g. images) for control. However, relying on high-dimensional image data to make control decisions raises important questions; particularly, how might we prove the safety of a visual-feedback controller? Control barrier functions (CBFs) are powerful tools for certifying the safety of feedback controll… ▽ More

    Submitted 28 February, 2023; v1 submitted 25 September, 2022; originally announced September 2022.

    Comments: Accepted to ICRA 2023

  16. arXiv:2207.01208  [pdf, other

    cs.CV cs.CL

    Attributed Abnormality Graph Embedding for Clinically Accurate X-Ray Report Generation

    Authors: Sixing Yan, William K. Cheung, Keith Chiu, Terence M. Tong, Charles K. Cheung, Simon See

    Abstract: Automatic generation of medical reports from X-ray images can assist radiologists to perform the time-consuming and yet important reporting task. Yet, achieving clinically accurate generated reports remains challenging. Modeling the underlying abnormalities using the knowledge graph approach has been found promising in enhancing the clinical accuracy. In this paper, we introduce a novel fined-grai… ▽ More

    Submitted 5 July, 2022; v1 submitted 4 July, 2022; originally announced July 2022.

    Comments: 14 pages, 7 figures

  17. arXiv:2109.09403  [pdf, other

    cs.RO cs.CY

    Tele-Operated Oropharyngeal Swab (TOOS) RobotEnabled by TSS Soft Hand for Safe and EffectiveCOVID-19 OP Sampling

    Authors: Wei Chen, Jianshu Zhou, Shing Shin Cheng, Yiang Lu, Fangxun Zhong, Yuan Gao, Yaqing Wang, Lingbin Xue, Michael C. F. Tong, Yun-Hui Liu

    Abstract: The COVID-19 pandemic has imposed serious challenges in multiple perspectives of human life. To diagnose COVID-19, oropharyngeal swab (OP SWAB) sampling is generally applied for viral nucleic acid (VNA) specimen collection. However, manual sampling exposes medical staff to a high risk of infection. Robotic sampling is promising to mitigate this risk to the minimum level, but traditional robot suff… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  18. arXiv:2106.15167  [pdf, other

    cs.CL

    Learning from Miscellaneous Other-Class Words for Few-shot Named Entity Recognition

    Authors: Meihan Tong, Shuai Wang, Bin Xu, Yixin Cao, Minghui Liu, Lei Hou, Juanzi Li

    Abstract: Few-shot Named Entity Recognition (NER) exploits only a handful of annotations to identify and classify named entity mentions. Prototypical network shows superior performance on few-shot NER. However, existing prototypical methods fail to differentiate rich semantics in other-class words, which will aggravate overfitting under few shot scenario. To address the issue, we propose a novel model, Mini… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

  19. arXiv:2009.07386  [pdf, other

    cs.CV

    Creation and Validation of a Chest X-Ray Dataset with Eye-tracking and Report Dictation for AI Development

    Authors: Alexandros Karargyris, Satyananda Kashyap, Ismini Lourentzou, Joy Wu, Arjun Sharma, Matthew Tong, Shafiq Abedin, David Beymer, Vandana Mukherjee, Elizabeth A Krupinski, Mehdi Moradi

    Abstract: We developed a rich dataset of Chest X-Ray (CXR) images to assist investigators in artificial intelligence. The data were collected using an eye tracking system while a radiologist reviewed and reported on 1,083 CXR images. The dataset contains the following aligned data: CXR image, transcribed radiology report text, radiologist's dictation audio and eye gaze coordinates data. We hope this dataset… ▽ More

    Submitted 8 October, 2020; v1 submitted 15 September, 2020; originally announced September 2020.

  20. arXiv:2008.03188  [pdf, other

    eess.AS cs.SD

    CUCHILD: A Large-Scale Cantonese Corpus of Child Speech for Phonology and Articulation Assessment

    Authors: Si-Ioi Ng, Cymie Wing-Yee Ng, Jiarui Wang, Tan Lee, Kathy Yuet-Sheung Lee, Michael Chi-Fai Tong

    Abstract: This paper describes the design and development of CUCHILD, a large-scale Cantonese corpus of child speech. The corpus contains spoken words collected from 1,986 child speakers aged from 3 to 6 years old. The speech materials include 130 words of 1 to 4 syllables in length. The speakers cover both typically developing (TD) children and children with speech disorder. The intended use of the corpus… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: Accepted to INTERSPEECH 2020, Shanghai, China

  21. arXiv:1909.01590  [pdf, other

    cs.CR cs.LG cs.NI

    HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

    Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang

    Abstract: Domain name system (DNS) is a crucial part of the Internet, yet has been widely exploited by cyber attackers. Apart from making static methods like blacklists or sinkholes infeasible, some weasel attackers can even bypass detection systems with machine learning based classifiers. As a solution to this problem, we propose a robust domain detection system named HinDom. Instead of relying on manually… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: RAID2019

  22. arXiv:1902.00592  [pdf, other

    cs.IR

    An end-to-end Generative Retrieval Method for Sponsored Search Engine --Decoding Efficiently into a Closed Target Domain

    Authors: Yijiang Lian, Zhijie Chen, Jinlong Hu, Kefeng Zhang, Chunwei Yan, Muchenxuan Tong, Wenying Han, Hanju Guan, Ying Li, Ying Cao, Yang Yu, Zhigang Li, Xiaochun Liu, Yue Wang

    Abstract: In this paper, we present a generative retrieval method for sponsored search engine, which uses neural machine translation (NMT) to generate keywords directly from query. This method is completely end-to-end, which skips query rewriting and relevance judging phases in traditional retrieval systems. Different from standard machine translation, the target space in the retrieval setting is a constrai… ▽ More

    Submitted 18 March, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: 8 pages, 8 figures, conference

  23. arXiv:1602.08486  [pdf, other

    q-bio.NC cs.CV cs.LG cs.NE

    A Single Model Explains both Visual and Auditory Precortical Coding

    Authors: Honghao Shan, Matthew H. Tong, Garrison W. Cottrell

    Abstract: Precortical neural systems encode information collected by the senses, but the driving principles of the encoding used have remained a subject of debate. We present a model of retinal coding that is based on three constraints: information preservation, minimization of the neural wiring, and response equalization. The resulting novel version of sparse principal components analysis successfully capt… ▽ More

    Submitted 7 April, 2016; v1 submitted 26 February, 2016; originally announced February 2016.

  24. arXiv:1304.3113  [pdf

    cs.AI

    A General Purpose Inference Engine for Evidential Reasoning Research

    Authors: Richard M. Tong, Lee A. Appelbaum, D. G. Shapiro

    Abstract: The purpose of this paper is to report on the most recent developments in our ongoing investigation of the representation and manipulation of uncertainty in automated reasoning systems. In our earlier studies (Tong and Shapiro, 1985) we described a series of experiments with RUBRIC (Tong et al., 1985), a system for full-text document retrieval, that generated some interesting insights into the eff… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Second Conference on Uncertainty in Artificial Intelligence (UAI1986)

    Report number: UAI-P-1986-PG-297-302

  25. arXiv:1304.2746  [pdf

    cs.AI

    Problem Structure and Evidential Reasoning

    Authors: Richard M. Tong, Lee A. Appelbaum

    Abstract: In our previous series of studies to investigate the role of evidential reasoning in the RUBRIC system for full-text document retrieval (Tong et al., 1985; Tong and Shapiro, 1985; Tong and Appelbaum, 1987), we identified the important role that problem structure plays in the overall performance of the system. In this paper, we focus on these structural elements (which we now call "semantic structu… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Third Conference on Uncertainty in Artificial Intelligence (UAI1987)

    Report number: UAI-P-1987-PG-313-320

  26. arXiv:1304.1128  [pdf

    cs.AI

    An Architecture for Probabilistic Concept-Based Information Retrieval

    Authors: Robert Fung, S. L. Crawford, Lee A. Appelbaum, Richard M. Tong

    Abstract: While concept-based methods for information retrieval can provide improved performance over more conventional techniques, they require large amounts of effort to acquire the concepts and their qualitative and quantitative relationships. This paper discusses an architecture for probabilistic concept-based information retrieval which addresses the knowledge acquisition problem. The architecture make… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)

    Report number: UAI-P-1990-PG-392-404