Zum Hauptinhalt springen

Showing 1–30 of 30 results for author: Xi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05808  [pdf, other

    cs.RO cs.MA

    Fast and Communication-Efficient Multi-UAV Exploration Via Voronoi Partition on Dynamic Topological Graph

    Authors: Qianli Dong, Haobo Xi, Shiyong Zhang, Qingchen Bi, Tianyi Li, Ziyu Wang, Xuebo Zhang

    Abstract: Efficient data transmission and reasonable task allocation are important to improve multi-robot exploration efficiency. However, most communication data types typically contain redundant information and thus require massive communication volume. Moreover, exploration-oriented task allocation is far from trivial and becomes even more challenging for resource-limited unmanned aerial vehicles (UAVs).… ▽ More

    Submitted 11 August, 2024; originally announced August 2024.

    Comments: 8 pages, 8 figures, accepted by IEEE IROS2024, code see https://github.com/NKU-MobFly-Robotics/GVP-MREP

  2. arXiv:2408.02153  [pdf, other

    cs.CR cs.AI cs.LG

    ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software

    Authors: Xiang Mei, Pulkit Singh Singaria, Jordi Del Castillo, Haoran Xi, Abdelouahab, Benchikh, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Hammond Pearce, Brendan Dolan-Gavitt

    Abstract: High-quality datasets of real-world vulnerabilities are enormously valuable for downstream research in software security, but existing datasets are typically small, require extensive manual effort to update, and are missing crucial features that such research needs. In this paper, we introduce ARVO: an Atlas of Reproducible Vulnerabilities in Open-source software. By sourcing vulnerabilities from… ▽ More

    Submitted 4 August, 2024; originally announced August 2024.

    Comments: 14 pages, 9 figures

  3. arXiv:2406.05590  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    NYU CTF Dataset: A Scalable Open-Source Benchmark Dataset for Evaluating LLMs in Offensive Security

    Authors: Minghao Shao, Sofija Jancheska, Meet Udeshi, Brendan Dolan-Gavitt, Haoran Xi, Kimberly Milner, Boyuan Chen, Max Yin, Siddharth Garg, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Muhammad Shafique

    Abstract: Large Language Models (LLMs) are being deployed across various domains today. However, their capacity to solve Capture the Flag (CTF) challenges in cybersecurity has not been thoroughly evaluated. To address this, we develop a novel method to assess LLMs in solving CTF challenges by creating a scalable, open-source benchmark database specifically designed for these applications. This database incl… ▽ More

    Submitted 21 August, 2024; v1 submitted 8 June, 2024; originally announced June 2024.

  4. arXiv:2404.13257  [pdf, other

    cs.LG

    ST-Mamba: Spatial-Temporal Selective State Space Model for Traffic Flow Prediction

    Authors: Zhiqi Shao, Michael G. H. Bell, Ze Wang, D. Glenn Geers, Haoning Xi, Junbin Gao

    Abstract: Traffic flow prediction, a critical aspect of intelligent transportation systems, has been increasingly popular in the field of artificial intelligence, driven by the availability of extensive traffic data. The current challenges of traffic flow prediction lie in integrating diverse factors while balancing the trade-off between computational complexity and the precision necessary for effective lon… ▽ More

    Submitted 18 May, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

    Comments: 25 pages, 6 figures

    MSC Class: 53A45 ACM Class: I.2.0

  5. arXiv:2403.12422  [pdf, other

    cs.LG

    Jetfire: Efficient and Accurate Transformer Pretraining with INT8 Data Flow and Per-Block Quantization

    Authors: Haocheng Xi, Yuxiang Chen, Kang Zhao, Kai Jun Teh, Jianfei Chen, Jun Zhu

    Abstract: Pretraining transformers are generally time-consuming. Fully quantized training (FQT) is a promising approach to speed up pretraining. However, most FQT methods adopt a quantize-compute-dequantize procedure, which often leads to suboptimal speedup and significant performance degradation when used in transformers due to the high memory access overheads and low-precision computations. In this work,… ▽ More

    Submitted 20 July, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: 15 pages, 8 figures, 11 tables

  6. arXiv:2402.04344  [pdf, other

    cs.LG

    Does Confidence Calibration Help Conformal Prediction?

    Authors: Huajun Xi, Jianguo Huang, Lei Feng, Hongxin Wei

    Abstract: Conformal prediction, as an emerging uncertainty qualification technique, constructs prediction sets that are guaranteed to contain the true label with high probability. Previous works usually employ temperature scaling to calibrate the classifier, assuming that confidence calibration can benefit conformal prediction. In this work, we first show that post-hoc calibration methods surprisingly lead… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  7. arXiv:2401.14637  [pdf, other

    cs.CL

    T-Rex: Text-assisted Retrosynthesis Prediction

    Authors: Yifeng Liu, Hanwen Xu, Tangqi Fang, Haocheng Xi, Zixuan Liu, Sheng Zhang, Hoifung Poon, Sheng Wang

    Abstract: As a fundamental task in computational chemistry, retrosynthesis prediction aims to identify a set of reactants to synthesize a target molecule. Existing template-free approaches only consider the graph structures of the target molecule, which often cannot generalize well to rare reaction types and large molecules. Here, we propose T-Rex, a text-assisted retrosynthesis prediction approach that exp… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  8. arXiv:2310.18562  [pdf, other

    cs.CV cs.AI cs.LG

    Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition

    Authors: Shuoyuan Wang, Jindong Wang, HuaJun Xi, Bob Zhang, Lei Zhang, Hongxin Wei

    Abstract: Human Activity Recognition (HAR) models often suffer from performance degradation in real-world applications due to distribution shifts in activity patterns across individuals. Test-Time Adaptation (TTA) is an emerging learning paradigm that aims to utilize the test stream to adjust predictions in real-time inference, which has not been explored in HAR before. However, the high computational cost… ▽ More

    Submitted 7 February, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

    Comments: To be presented at UbiComp 2024; Accepted by Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

  9. arXiv:2310.06430  [pdf, other

    cs.LG cs.CV math.ST

    Conformal Prediction for Deep Classifier via Label Ranking

    Authors: Jianguo Huang, Huajun Xi, Linjun Zhang, Huaxiu Yao, Yue Qiu, Hongxin Wei

    Abstract: Conformal prediction is a statistical framework that generates prediction sets containing ground-truth labels with a desired coverage guarantee. The predicted probabilities produced by machine learning models are generally miscalibrated, leading to large prediction sets in conformal prediction. To address this issue, we propose a novel algorithm named $\textit{Sorted Adaptive Prediction Sets}$ (SA… ▽ More

    Submitted 6 June, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: Accepted by ICML 2024

  10. arXiv:2309.08673  [pdf, ps, other

    cs.PL

    A Two-Level Linear Dependent Type Theory

    Authors: Qiancheng Fu, Hongwei Xi

    Abstract: We present a type theory combining both linearity and dependency by stratifying typing rules into a level for logics and a level for programs. The distinction between logics and programs decouples their semantics, allowing the type system to assume tight resource bounds. A natural notion of irrelevancy is established where all proofs and types occurring inside programs are fully erasable without c… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  11. arXiv:2309.01317  [pdf, ps, other

    cs.LO cs.DC cs.PL

    Multirole Logic and Multiparty Channels

    Authors: Hongwei Xi, Hanwen Wu

    Abstract: We identify multirole logic as a new form of logic in which conjunction/disjunction is interpreted as an ultrafilter on some underlying set of roles and the notion of negation is generalized to endomorphisms on this set. We formulate both multirole logic (MRL) and linear multirole logic (LMRL) as natural generalizations of classical logic (CL) and classical linear logic (CLL), respectively. Among… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:1604.03020

    ACM Class: D.3; F.4

  12. arXiv:2306.11987  [pdf, other

    cs.LG cs.NE

    Training Transformers with 4-bit Integers

    Authors: Haocheng Xi, Changhao Li, Jianfei Chen, Jun Zhu

    Abstract: Quantizing the activation, weight, and gradient to 4-bit is promising to accelerate neural network training. However, existing 4-bit training methods require custom numerical formats which are not supported by contemporary hardware. In this work, we propose a training method for transformers with all matrix multiplications implemented with the INT4 arithmetic. Training with an ultra-low INT4 preci… ▽ More

    Submitted 22 June, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 9 pages, 8 figures

  13. arXiv:2112.12328  [pdf, other

    cs.CV

    Robust and Precise Facial Landmark Detection by Self-Calibrated Pose Attention Network

    Authors: Jun Wan, Hui Xi, Jie Zhou, Zhihui Lai, Witold Pedrycz, Xu Wang, Hang Sun

    Abstract: Current fully-supervised facial landmark detection methods have progressed rapidly and achieved remarkable performance. However, they still suffer when coping with faces under large poses and heavy occlusions for inaccurate facial shape constraints and insufficient labeled training samples. In this paper, we propose a semi-supervised framework, i.e., a Self-Calibrated Pose Attention Network (SCPAN… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Comments: Accept by IEEE Transactions on Cybernetics, December 2021

  14. arXiv:2110.04921  [pdf, other

    cs.CV eess.IV physics.optics q-bio.CB

    Increasing a microscope's effective field of view via overlapped imaging and machine learning

    Authors: Xing Yao, Vinayak Pathak, Haoran Xi, Amey Chaware, Colin Cooke, Kanghyun Kim, Shiqi Xu, Yuting Li, Timothy Dunn, Pavan Chandra Konda, Kevin C. Zhou, Roarke Horstmeyer

    Abstract: This work demonstrates a multi-lens microscopic imaging system that overlaps multiple independent fields of view on a single sensor for high-efficiency automated specimen analysis. Automatic detection, classification and counting of various morphological features of interest is now a crucial component of both biomedical research and disease diagnosis. While convolutional neural networks (CNNs) hav… ▽ More

    Submitted 10 October, 2021; originally announced October 2021.

  15. arXiv:2107.14345  [pdf, other

    cs.RO cs.HC cs.LG

    Modeling User Empathy Elicited by a Robot Storyteller

    Authors: Leena Mathur, Micol Spitale, Hao Xi, Jieyun Li, Maja J Matarić

    Abstract: Virtual and robotic agents capable of perceiving human empathy have the potential to participate in engaging and meaningful human-machine interactions that support human well-being. Prior research in computational empathy has focused on designing empathic agents that use verbal and nonverbal behaviors to simulate empathy and attempt to elicit empathic responses from humans. The challenge of develo… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

    Comments: Accepted for publication and oral presentation at the International Conference on Affective Computing and Intelligent Interaction (ACII 2021)

  16. arXiv:2106.02151  [pdf, other

    math.OC cs.GT

    Single-leader multi-follower games for the regulation of two-sided Mobility-as-a-Service markets

    Authors: Haoning Xi, Didier Aussel, Wei Liu, S Travis Waller, David Rey

    Abstract: Mobility-as-a-Service (MaaS) is an emerging business model driven by the concept of "Everything-as-a-Service" and enabled through mobile internet technologies. In the context of economic deregulation, a MaaS system consists of a typical two-sided market, where travelers and transportation service providers (TSPs) are two groups of agents interacting with each other through a MaaS platform. In this… ▽ More

    Submitted 17 September, 2021; v1 submitted 3 June, 2021; originally announced June 2021.

  17. arXiv:2104.09979   

    cs.CR

    Bitcoin Address Clustering Method Based on Multiple Heuristic Conditions

    Authors: He Xi, He Ketai, Lin Shenwen, Yang Jinglin, Mao Hongliang

    Abstract: We analyzed the associations between Bitcoin transactions and addresses to cluster address and further find groups of addresses controlled by the same entity. It revealed the vulnerabilities of Bitcoin anonymity mechanism, which could be used by the law enforcement agencies to track and crack down illegal transactions. However, single heuristic method and incomplete heuristic conditions were diffi… ▽ More

    Submitted 11 May, 2022; v1 submitted 18 April, 2021; originally announced April 2021.

    Comments: References are incompletely marked, and some references in the article lack citations. The related work part has been revised later. The experimental results have been supplemented later

  18. arXiv:2009.09168  [pdf

    cs.SE eess.SY

    Dynamic Scheduling and Workforce Assignment in Open Source Software Development

    Authors: Hui Xi, Dong Xu, Young-Jun Son

    Abstract: A novel modeling framework is proposed for dynamic scheduling of projects and workforce assignment in open source software development (OSSD). The goal is to help project managers in OSSD distribute workforce to multiple projects to achieve high efficiency in software development (e.g. high workforce utilization and short development time) while ensuring the quality of deliverables (e.g. code modu… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.

    Comments: 8 pages, 8 figures; In Proceedings of the 2011 Industrial Engineering Research Conference

  19. arXiv:2009.06806  [pdf, other

    math.OC cs.GT

    Incentive-compatible mechanisms for online resource allocation in mobility-as-a-service systems

    Authors: Haoning Xi, Wei Liu, David Rey, S. Travis Waller, Philip Kilby

    Abstract: In the context of `Everything-as-a-Service', the transportation sector has been evolving towards user-centric business models in which customized services and mode-agnostic mobility resources are priced in a unified framework. Yet, in the vast majority of studies on Mobility as a Service (MaaS) systems, mobility resource pricing is based on segmented travel modes, e.g. private vehicle, public tran… ▽ More

    Submitted 28 March, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

  20. arXiv:1810.12190  [pdf, ps, other

    cs.PL

    To Memory Safety through Proofs

    Authors: Hongwei Xi, Dengping Zhu

    Abstract: We present a type system capable of guaranteeing the memory safety of programs that may involve (sophisticated) pointer manipulation such as pointer arithmetic. With its root in a recently developed framework Applied Type System (ATS), the type system imposes a level of abstraction on program states through a novel notion of recursive stateful views and then relies on a form of linear logic to rea… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

  21. arXiv:1810.12146  [pdf, ps, other

    cs.PL

    Implementing Linking in Multiparty Sessions (Extended Abstract)

    Authors: Hanwen Wu, Hongwei Xi

    Abstract: The fast growth of service-oriented programming (SOP) is evident in this day and age of the Internet, and handling communication is of paramount importance in SOP. Session types are a formalism that is proposed to specify interactions between communicating processes. In essence, a session type system is a kind of type system designed to enforce (through type-checking) that the involved processes c… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

    Comments: AGERE! 2018, Boston, MA, USA

  22. arXiv:1808.00077  [pdf, ps, other

    cs.PL

    Multiparty Dependent Session Types (Extended Abstract)

    Authors: Hanwen Wu, Hongwei Xi

    Abstract: Programs are more distributed and concurrent today than ever before, and structural communications are at the core. Constructing and debugging such programs are hard due to the lack of formal specification/verification of concurrency. This work formalizes the first multiparty dependent session types as an expressive and practical type discipline for enforcing communication protocols. The type syst… ▽ More

    Submitted 31 July, 2018; originally announced August 2018.

  23. arXiv:1704.07004  [pdf, other

    cs.PL cs.DC

    Dependent Session Types

    Authors: Hanwen Wu, Hongwei Xi

    Abstract: Session types offer a type-based discipline for enforcing communication protocols in distributed programming. We have previously formalized simple session types in the setting of multi-threaded $λ$-calculus with linear types. In this work, we build upon our earlier work by presenting a form of dependent session types (of DML-style). The type system we formulate provides linearity and duality guara… ▽ More

    Submitted 23 April, 2017; originally announced April 2017.

    ACM Class: F.1.2; F.4.1

  24. arXiv:1703.08683  [pdf, ps, other

    cs.PL cs.LO

    Applied Type System: An Approach to Practical Programming with Theorem-Proving

    Authors: Hongwei Xi

    Abstract: The framework Pure Type System (PTS) offers a simple and general approach to designing and formalizing type systems. However, in the presence of dependent types, there often exist certain acute problems that make it difficult for PTS to directly accommodate many common realistic programming features such as general recursion, recursive types, effects (e.g., exceptions, references, input/output), e… ▽ More

    Submitted 25 March, 2017; originally announced March 2017.

  25. arXiv:1703.06391  [pdf, ps, other

    math.LO cs.DC cs.LO cs.PL

    Multirole Logic (Extended Abstract)

    Authors: Hongwei Xi, Hanwen Wu

    Abstract: We identify multirole logic as a new form of logic in which conjunction/disjunction is interpreted as an ultrafilter on the power set of some underlying set (of roles) and the notion of negation is generalized to endomorphisms on this underlying set. We formalize both multirole logic (MRL) and linear multirole logic (LMRL) as natural generalizations of classical logic (CL) and classical linear log… ▽ More

    Submitted 19 March, 2017; originally announced March 2017.

  26. Dependent Types for Multi-Rate Flows in Synchronous Programming

    Authors: William Blair, Hongwei Xi

    Abstract: Synchronous programming languages emerged in the 1980s as tools for implementing reactive systems, which interact with events from physical environments and often must do so under strict timing constraints. In this report, we encode inside ATS various real-time primitives in an experimental synchronous language called Prelude, where ATS is a statically typed language with an ML-like functional cor… ▽ More

    Submitted 7 February, 2017; originally announced February 2017.

    Comments: In Proceedings ML/OCaml 2015, arXiv:1702.01872

    ACM Class: D.3.3; D.4.7; F.3.1; F.3.3

    Journal ref: EPTCS 241, 2017, pp. 36-44

  27. arXiv:1611.08888  [pdf, other

    cs.PL cs.LO

    Propositions in Linear Multirole Logic as Multiparty Session Types

    Authors: Hongwei Xi, Hanwen Wu

    Abstract: We identify multirole logic as a new form of logic and formalize linear multirole logic (LMRL) as a natural generalization of classical linear logic (CLL). Among various meta-properties established for LMRL, we obtain one named multi-cut elimination stating that every cut between three (or more) sequents (as a generalization of a cut between two sequents) can be eliminated, thus extending the cele… ▽ More

    Submitted 27 November, 2016; originally announced November 2016.

    ACM Class: D.3.1; F.3.2; F.4.1

  28. arXiv:1604.03020  [pdf, other

    cs.PL

    Linearly Typed Dyadic Group Sessions for Building Multiparty Sessions

    Authors: Hongwei Xi, Hanwen Wu

    Abstract: Traditionally, each party in a (dyadic or multiparty) session implements exactly one role specified in the type of the session. We refer to this kind of session as an individual session (i-session). As a generalization of i-session, a group session (g-session) is one in which each party may implement a group of roles based on one channel. In particular, each of the two parties involved in a dyadic… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: This paper can be seen as the pre-sequel to classical linear multirole logic (CLML). arXiv admin note: substantial text overlap with arXiv:1603.03727

  29. arXiv:1603.03727  [pdf, ps, other

    cs.PL cs.LO

    Session Types in a Linearly Typed Multi-Threaded Lambda-Calculus

    Authors: Hongwei Xi, Zhiqiang Ren, Hanwen Wu, William Blair

    Abstract: We present a formalization of session types in a multi-threaded lambda-calculus (MTLC) equipped with a linear type system, establishing for the MTLC both type preservation and global progress. The latter (global progress) implies that the evaluation of a well-typed program in the MTLC can never reach a deadlock. As this formulated MTLC can be readily embedded into ATS, a full-fledged language with… ▽ More

    Submitted 11 March, 2016; originally announced March 2016.

    Comments: This is the original version of the paper on supporting programming with dyadic session types in ATS

  30. arXiv:1203.6102  [pdf, ps, other

    cs.PL cs.SE

    A Programmer-Centric Approach to Program Verification in ATS

    Authors: Zhiqiang Ren, Hongwei Xi

    Abstract: Formal specification is widely employed in the construction of high-quality software. However, there is often a huge gap between formal specification and actual implementation. While there is already a vast body of work on software testing and verification, the task to ensure that an implementation indeed meets its specification is still undeniably of great difficulty. ATS is a programming languag… ▽ More

    Submitted 27 March, 2012; originally announced March 2012.

    Comments: 15 pages, 11 figures. Examples available on-line http://www.ats-lang.org/EXAMPLE/PCPV

    ACM Class: D.2.4; D.3.3