Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Wan, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.15293  [pdf, other

    cs.LG cs.AI cs.CL

    Learning Granularity Representation for Temporal Knowledge Graph Completion

    Authors: Jinchuan Zhang, Tianqi Wan, Chong Mu, Guangxi Lu, Ling Tian

    Abstract: Temporal Knowledge Graphs (TKGs) incorporate temporal information to reflect the dynamic structural knowledge and evolutionary patterns of real-world facts. Nevertheless, TKGs are still limited in downstream applications due to the problem of incompleteness. Consequently, TKG completion (also known as link prediction) has been widely studied, with recent research focusing on incorporating independ… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

    Comments: 15 pages. Accepted at ICONIP 2024

  2. arXiv:2408.07470  [pdf, other

    cs.HC

    Enhancement of Co-located Shared VR Experiences: Representing Non-HMD Observers on Both HMD and 2D Screen

    Authors: Zixuan Guo, Wenge Xu, Hongyu Wang, Tingjie Wan, Nilufar Baghaei, Cheng-Hung Lo, Hai-Ning Liang

    Abstract: Virtual reality (VR) not only allows head-mounted display (HMD) users to immerse themselves in virtual worlds but also to share them with others. When designed correctly, this shared experience can be enjoyable. However, in typical scenarios, HMD users are isolated by their devices, and non-HMD observers lack connection with the virtual world. To address this, our research investigates visually re… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  3. arXiv:2405.00527  [pdf, other

    cs.DB

    ChatBI: Towards Natural Language to Complex Business Intelligence SQL

    Authors: Jinqing Lian, Xinyi Liu, Yingxia Shao, Yang Dong, Ming Wang, Zhang Wei, Tianqi Wan, Ming Dong, Hailin Yan

    Abstract: The Natural Language to SQL (NL2SQL) technology provides non-expert users who are unfamiliar with databases the opportunity to use SQL for data analysis.Converting Natural Language to Business Intelligence (NL2BI) is a popular practical scenario for NL2SQL in actual production systems. Compared to NL2SQL, NL2BI introduces more challenges. In this paper, we propose ChatBI, a comprehensive and eff… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  4. arXiv:2404.15714  [pdf, other

    cs.CV cs.AI

    Ada-DF: An Adaptive Label Distribution Fusion Network For Facial Expression Recognition

    Authors: Shu Liu, Yan Xu, Tongming Wan, Xiaoyan Kui

    Abstract: Facial expression recognition (FER) plays a significant role in our daily life. However, annotation ambiguity in the datasets could greatly hinder the performance. In this paper, we address FER task via label distribution learning paradigm, and develop a dual-branch Adaptive Distribution Fusion (Ada-DF) framework. One auxiliary branch is constructed to obtain the label distributions of samples. Th… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  5. arXiv:2310.00877  [pdf, other

    cs.DB

    QCFE: An efficient Feature engineering for query cost estimation

    Authors: Yu Yan, Hongzhi Wang, Junfang Huang, Dake Zhong, Man Yang, Kaixin Zhang, Tao Yu, Tianqing Wan

    Abstract: Query cost estimation is a classical task for database management. Recently, researchers apply the AI-driven model to implement query cost estimation for achieving high accuracy. However, two defects of feature design lead to poor cost estimation accuracy-time efficiency. On the one hand, existing works only encode the query plan and data statistics while ignoring some other important variables, l… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

  6. arXiv:2307.01740  [pdf, ps, other

    cs.CV

    Synchronous Image-Label Diffusion Probability Model with Application to Stroke Lesion Segmentation on Non-contrast CT

    Authors: Jianhai Zhang, Tonghua Wan, Ethan MacDonald, Bijoy Menon, Aravind Ganesh, Qiu Wu

    Abstract: Stroke lesion volume is a key radiologic measurement for assessing the prognosis of Acute Ischemic Stroke (AIS) patients, which is challenging to be automatically measured on Non-Contrast CT (NCCT) scans. Recent diffusion probabilistic models have shown potentials of being used for image segmentation. In this paper, a novel Synchronous image-label Diffusion Probability Model (SDPM) is proposed for… ▽ More

    Submitted 18 July, 2023; v1 submitted 4 July, 2023; originally announced July 2023.

  7. arXiv:2306.05437  [pdf, other

    cs.LG cs.AI

    One-step Multi-view Clustering with Diverse Representation

    Authors: Xinhang Wan, Jiyuan Liu, Xinwang Liu, Siwei Wang, Yi Wen, Tianjiao Wan, Li Shen, En Zhu

    Abstract: Multi-view clustering has attracted broad attention due to its capacity to utilize consistent and complementary information among views. Although tremendous progress has been made recently, most existing methods undergo high complexity, preventing them from being applied to large-scale tasks. Multi-view clustering via matrix factorization is a representative to address this issue. However, most of… ▽ More

    Submitted 27 June, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

  8. arXiv:2306.02776  [pdf, other

    cs.CV

    Cheap-fake Detection with LLM using Prompt Engineering

    Authors: Guangyang Wu, Weijie Wu, Xiaohong Liu, Kele Xu, Tianjiao Wan, Wenyi Wang

    Abstract: The misuse of real photographs with conflicting image captions in news items is an example of the out-of-context (OOC) misuse of media. In order to detect OOC media, individuals must determine the accuracy of the statement and evaluate whether the triplet (~\textit{i.e.}, the image and two captions) relates to the same event. This paper presents a novel learnable approach for detecting OOC media i… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: ICME2023 Workshop

  9. arXiv:2303.06879  [pdf, other

    cs.LG cs.CV

    Spacecraft Anomaly Detection with Attention Temporal Convolution Network

    Authors: Liang Liu, Ling Tian, Zhao Kang, Tianqi Wan

    Abstract: Spacecraft faces various situations when carrying out exploration missions in complex space, thus monitoring the anomaly status of spacecraft is crucial to the development of \textcolor{blue}{the} aerospace industry. The time series telemetry data generated by on-orbit spacecraft \textcolor{blue}{contains} important information about the status of spacecraft. However, traditional domain knowledge-… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  10. arXiv:2205.13384  [pdf, other

    cs.CV

    Continual Learning for Visual Search with Backward Consistent Feature Embedding

    Authors: Timmy S. T. Wan, Jun-Cheng Chen, Tzer-Yi Wu, Chu-Song Chen

    Abstract: In visual search, the gallery set could be incrementally growing and added to the database in practice. However, existing methods rely on the model trained on the entire dataset, ignoring the continual updating of the model. Besides, as the model updates, the new model must re-extract features for the entire gallery set to maintain compatible feature space, imposing a high computational cost for a… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

    Comments: 15 pages with supplementary material; accepted to CVPR 2022

  11. arXiv:2204.04680  [pdf, other

    cs.CV cs.MM

    Reasoning with Multi-Structure Commonsense Knowledge in Visual Dialog

    Authors: Shunyu Zhang, Xiaoze Jiang, Zequn Yang, Tao Wan, Zengchang Qin

    Abstract: Visual Dialog requires an agent to engage in a conversation with humans grounded in an image. Many studies on Visual Dialog focus on the understanding of the dialog history or the content of an image, while a considerable amount of commonsense-required questions are ignored. Handling these scenarios depends on logical reasoning that requires commonsense priors. How to capture relevant commonsense… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: MULA Workshop, CVPR 2022

  12. arXiv:2201.05868  [pdf, other

    math.OC cs.LG

    Large-Scale Inventory Optimization: A Recurrent-Neural-Networks-Inspired Simulation Approach

    Authors: Tan Wan, L. Jeff Hong

    Abstract: Many large-scale production networks include thousands types of final products and tens to hundreds thousands types of raw materials and intermediate products. These networks face complicated inventory management decisions, which are often too complicated for inventory models and too large for simulation models. In this paper, by combing efficient computational tools of recurrent neural networks (… ▽ More

    Submitted 15 January, 2022; originally announced January 2022.

  13. arXiv:2011.00717  [pdf, other

    cs.LG stat.ML

    Noise-Contrastive Estimation for Multivariate Point Processes

    Authors: Hongyuan Mei, Tom Wan, Jason Eisner

    Abstract: The log-likelihood of a generative model often involves both positive and negative terms. For a temporal multivariate point process, the negative term sums over all the possible event types at each time and also integrates over all the possible times. As a result, maximum likelihood estimation is expensive. We show how to instead apply a version of noise-contrastive estimation---a general paramete… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Comments: NeurIPS 2020 camera-ready

  14. arXiv:1811.08257  [pdf, other

    cs.CR

    FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

    Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu

    Abstract: Machine learning as a service has been widely deployed to utilize deep neural network models to provide prediction services. However, this raises privacy concerns since clients need to send sensitive information to servers. In this paper, we focus on the scenario where clients want to classify private images with a convolutional neural network model hosted in the server, while both parties keep th… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

  15. arXiv:1811.00228  [pdf, other

    cs.CV cs.CL

    A sequential guiding network with attention for image captioning

    Authors: Daouda Sow, Zengchang Qin, Mouhamed Niasse, Tao Wan

    Abstract: The recent advances of deep learning in both computer vision (CV) and natural language processing (NLP) provide us a new way of understanding semantics, by which we can deal with more challenging tasks such as automatic description generation from natural images. In this challenge, the encoder-decoder framework has achieved promising performance when a convolutional neural network (CNN) is used as… ▽ More

    Submitted 8 February, 2019; v1 submitted 1 November, 2018; originally announced November 2018.

    Comments: 5 pages, 2 figures, 1 table, IEEE ICASSP 2019

  16. arXiv:1811.00174  [pdf, other

    cs.CV

    Pixel Level Data Augmentation for Semantic Image Segmentation using Generative Adversarial Networks

    Authors: Shuangting Liu, Jiaqi Zhang, Yuxin Chen, Yifan Liu, Zengchang Qin, Tao Wan

    Abstract: Semantic segmentation is one of the basic topics in computer vision, it aims to assign semantic labels to every pixel of an image. Unbalanced semantic label distribution could have a negative influence on segmentation accuracy. In this paper, we investigate using data augmentation approach to balance the semantic label distribution in order to improve segmentation performance. We propose using gen… ▽ More

    Submitted 26 November, 2019; v1 submitted 31 October, 2018; originally announced November 2018.

    Comments: 5 pages

  17. arXiv:1805.05536  [pdf, other

    cs.LG stat.ML

    Advances in Experience Replay

    Authors: Tracy Wan, Neil Xu

    Abstract: This project combines recent advances in experience replay techniques, namely, Combined Experience Replay (CER), Prioritized Experience Replay (PER), and Hindsight Experience Replay (HER). We show the results of combinations of these techniques with DDPG and DQN methods. CER always adds the most recent experience to the batch. PER chooses which experiences should be replayed based on how beneficia… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

  18. arXiv:1803.05541  [pdf, other

    cs.CV

    Context-Aware Mixed Reality: A Framework for Ubiquitous Interaction

    Authors: Long Chen, Wen Tang, Nigel John, Tao Ruan Wan, Jian Jun Zhang

    Abstract: Mixed Reality (MR) is a powerful interactive technology that yields new types of user experience. We present a semantic based interactive MR framework that exceeds the current geometry level approaches, a step change in generating high-level context-aware interactions. Our key insight is to build semantic understanding in MR that not only can greatly enhance user experience through object-specific… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

  19. arXiv:1712.00170  [pdf, other

    cs.CL

    Text Generation Based on Generative Adversarial Nets with Latent Variable

    Authors: Heng Wang, Zengchang Qin, Tao Wan

    Abstract: In this paper, we propose a model using generative adversarial net (GAN) to generate realistic text. Instead of using standard GAN, we combine variational autoencoder (VAE) with generative adversarial net. The use of high-level latent random variables is helpful to learn the data distribution and solve the problem that generative adversarial net always emits the similar data. We propose the VGAN m… ▽ More

    Submitted 7 November, 2018; v1 submitted 30 November, 2017; originally announced December 2017.

  20. arXiv:1710.00644  [pdf, ps, other

    cs.SI

    Motif Iteration Model for Network Representation

    Authors: Lintao Lv, Zengchang Qin, Tao Wan

    Abstract: Social media mining has become one of the most popular research areas in Big Data with the explosion of social networking information from Facebook, Twitter, LinkedIn, Weibo and so on. Understanding and representing the structure of a social network is a key in social media mining. In this paper, we propose the Motif Iteration Model (MIM) to represent the structure of a social network. As the name… ▽ More

    Submitted 3 October, 2017; v1 submitted 2 October, 2017; originally announced October 2017.

    Comments: 10 pages, 3 figures and it is an extended vision of our conference paper in ICONIP 2017

  21. arXiv:1705.03389  [pdf, ps, other

    cs.CL

    Logical Parsing from Natural Language Based on a Neural Translation Model

    Authors: Liang Li, Pengyu Li, Yifan Liu, Tao Wan, Zengchang Qin

    Abstract: Semantic parsing has emerged as a significant and powerful paradigm for natural language interface and question answering systems. Traditional methods of building a semantic parser rely on high-quality lexicons, hand-crafted grammars and linguistic features which are limited by applied domain or representation. In this paper, we propose a general approach to learn from denotations based on Seq2Seq… ▽ More

    Submitted 9 May, 2017; originally announced May 2017.

  22. arXiv:1705.02887  [pdf, other

    cs.CV

    Generative Cooperative Net for Image Generation and Data Augmentation

    Authors: Qiangeng Xu, Zengchang Qin, Tao Wan

    Abstract: How to build a good model for image generation given an abstract concept is a fundamental problem in computer vision. In this paper, we explore a generative model for the task of generating unseen images with desired features. We propose the Generative Cooperative Net (GCN) for image generation. The idea is similar to generative adversarial networks except that the generators and discriminators ar… ▽ More

    Submitted 8 February, 2018; v1 submitted 8 May, 2017; originally announced May 2017.

    Comments: 12 pages, 8 figures

    Journal ref: The International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making (IUKM) 2019

  23. arXiv:1705.02447  [pdf, ps, other

    cs.SI

    Stock Volatility Prediction Using Recurrent Neural Networks with Sentiment Analysis

    Authors: Yifan Liu, Zengchang Qin, Pengyu Li, Tao Wan

    Abstract: In this paper, we propose a model to analyze sentiment of online stock forum and use the information to predict the stock volatility in the Chinese market. We have labeled the sentiment of the online financial posts and make the dataset public available for research. By generating a sentimental dictionary based on financial terms, we develop a model to compute the sentimental score of each online… ▽ More

    Submitted 6 May, 2017; originally announced May 2017.

    Comments: 10 pages, 5 figures and it is an extended vision of our conference paper in IEA/AIE 2017

    ACM Class: G.3

  24. arXiv:1703.06992  [pdf, other

    cs.NI cs.CR

    A Framework and Comparative Analysis of Control Plane Security of SDN and Conventional Networks

    Authors: AbdelRahman Abdou, Paul C. van Oorschot, Tao Wan

    Abstract: Software defined networking implements the network control plane in an external entity, rather than in each individual device as in conventional networks. This architectural difference implies a different design for control functions necessary for essential network properties, e.g., loop prevention and link redundancy. We explore how such differences redefine the security weaknesses in the SDN con… ▽ More

    Submitted 6 December, 2017; v1 submitted 20 March, 2017; originally announced March 2017.

  25. arXiv:1703.01243  [pdf, other

    cs.CV

    Augmented Reality for Depth Cues in Monocular Minimally Invasive Surgery

    Authors: Long Chen, Wen Tang, Nigel W. John, Tao Ruan Wan, Jian Jun Zhang

    Abstract: One of the major challenges in Minimally Invasive Surgery (MIS) such as laparoscopy is the lack of depth perception. In recent years, laparoscopic scene tracking and surface reconstruction has been a focus of investigation to provide rich additional information to aid the surgical process and compensate for the depth perception issue. However, robust 3D surface reconstruction and augmented reality… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.

    Comments: 15 pages

  26. arXiv:1510.07342  [pdf, ps, other

    cs.GT cs.SI physics.soc-ph

    Stable Matching with Incomplete Information in Structured Networks

    Authors: Ying Ling, Tao Wan, Zengchang Qin

    Abstract: In this paper, we investigate stable matching in structured networks. Consider case of matching in social networks where candidates are not fully connected. A candidate on one side of the market gets acquaintance with which one on the heterogeneous side depends on the structured network. We explore four well-used structures of networks and define the social circle by the distance between each cand… ▽ More

    Submitted 25 October, 2015; originally announced October 2015.

    Comments: 13 pages; 6 figures

  27. arXiv:1302.0629  [pdf

    cs.CR

    Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email

    Authors: Ammar ALmomani, B. B. Gupta, Tat-Chee Wan, Altyeb Altaher, Selvakumar Manickam

    Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information.

    Submitted 4 February, 2013; originally announced February 2013.

  28. arXiv:1001.2280  [pdf

    cs.NI cs.MM

    Comparative Evaluation and Analysis of IAX and RSW

    Authors: Manjur S Kolhar, Mosleh M. Abu-Alhaj, Omar Abouabdalla, Tat Chee Wan, Ahmad M. Manasrah

    Abstract: Voice over IP (VoIP) is a technology to transport media over IP networks such as the Internet. VoIP has the capability of connecting people over packet switched networks instead of traditional circuit switched networks. Recently, the InterAsterisk Exchange Protocol (IAX) has emerged as a new VoIP which is gaining popularity among VoIP products. IAX is known for its simplicity, NAT friendliness,… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

    Comments: 3 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Volume 6, No. 3, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 250-252, December 2009, USA