Zum Hauptinhalt springen

Showing 1–17 of 17 results for author: Xin, C

Searching in archive cs. Search in all archives.
.
  1. DART: An Automated End-to-End Object Detection Pipeline with Data Diversification, Open-Vocabulary Bounding Box Annotation, Pseudo-Label Review, and Model Training

    Authors: Chen Xin, Andreas Hartel, Enkelejda Kasneci

    Abstract: Accurate real-time object detection is vital across numerous industrial applications, from safety monitoring to quality control. Traditional approaches, however, are hindered by arduous manual annotation and data collection, struggling to adapt to ever-changing environments and novel target objects. To address these limitations, this paper presents DART, an innovative automated end-to-end pipeline… ▽ More

    Submitted 29 July, 2024; v1 submitted 12 July, 2024; originally announced July 2024.

  2. arXiv:2406.07100  [pdf, other

    cs.LG cs.AI math.AT

    D-GRIL: End-to-End Topological Learning with 2-parameter Persistence

    Authors: Soham Mukherjee, Shreyas N. Samaga, Cheng Xin, Steve Oudot, Tamal K. Dey

    Abstract: End-to-end topological learning using 1-parameter persistence is well-known. We show that the framework can be enhanced using 2-parameter persistence by adopting a recently introduced 2-parameter persistence based vectorization technique called GRIL. We establish a theoretical foundation of differentiating GRIL producing D-GRIL. We show that D-GRIL can be used to learn a bifiltration function on s… ▽ More

    Submitted 27 June, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  3. arXiv:2405.20808  [pdf, other

    cs.DS cs.LG cs.MA

    Optimally Improving Cooperative Learning in a Social Setting

    Authors: Shahrzad Haddadan, Cheng Xin, Jie Gao

    Abstract: We consider a cooperative learning scenario where a collection of networked agents with individually owned classifiers dynamically update their predictions, for the same classification task, through communication or observations of each other's predictions. Clearly if highly influential vertices use erroneous classifiers, there will be a negative effect on the accuracy of all the agents in the net… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  4. arXiv:2405.17485  [pdf, other

    cs.LG cs.AI cs.CR

    $\textit{Comet:}$ A $\underline{Com}$munication-$\underline{e}$fficient and Performant Approxima$\underline{t}$ion for Private Transformer Inference

    Authors: Xiangrui Xu, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu

    Abstract: The prevalent use of Transformer-like models, exemplified by ChatGPT in modern language processing applications, underscores the critical need for enabling private inference essential for many cloud-based services reliant on such models. However, current privacy-preserving frameworks impose significant communication burden, especially for non-linear computation in Transformer model. In this paper,… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2403.08110  [pdf, other

    math.AT cs.CG

    Computing Generalized Ranks of Persistence Modules via Unfolding to Zigzag Modules

    Authors: Tamal K. Dey, Cheng Xin

    Abstract: For a $P$-indexed persistence module ${\sf M}$, the (generalized) rank of ${\sf M}$ is defined as the rank of the limit-to-colimit map for the diagram of vector spaces of ${\sf M}$ over the poset $P$. For $2$-parameter persistence modules, recently a zigzag persistence based algorithm has been proposed that takes advantage of the fact that generalized rank for $2$-parameter modules is equal to the… ▽ More

    Submitted 4 April, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  6. arXiv:2402.11339  [pdf, other

    cs.LG stat.ML

    Expressive Higher-Order Link Prediction through Hypergraph Symmetry Breaking

    Authors: Simon Zhang, Cheng Xin, Tamal K. Dey

    Abstract: A hypergraph consists of a set of nodes along with a collection of subsets of the nodes called hyperedges. Higher-order link prediction is the task of predicting the existence of a missing hyperedge in a hypergraph. A hyperedge representation learned for higher order link prediction is fully expressive when it does not lose distinguishing power up to an isomorphism. Many existing hypergraph repres… ▽ More

    Submitted 17 February, 2024; originally announced February 2024.

    Comments: 46 pages, 4 figures

  7. arXiv:2312.16256  [pdf, other

    cs.CV cs.AI

    DL3DV-10K: A Large-Scale Scene Dataset for Deep Learning-based 3D Vision

    Authors: Lu Ling, Yichen Sheng, Zhi Tu, Wentian Zhao, Cheng Xin, Kun Wan, Lantao Yu, Qianyu Guo, Zixun Yu, Yawen Lu, Xuanmao Li, Xingpeng Sun, Rohan Ashok, Aniruddha Mukherjee, Hao Kang, Xiangrui Kong, Gang Hua, Tianyi Zhang, Bedrich Benes, Aniket Bera

    Abstract: We have witnessed significant progress in deep learning-based 3D vision, ranging from neural radiance field (NeRF) based 3D representation learning to applications in novel view synthesis (NVS). However, existing scene-level datasets for deep learning-based 3D vision, limited to either synthetic environments or a narrow selection of real-world scenes, are quite insufficient. This insufficiency not… ▽ More

    Submitted 29 December, 2023; v1 submitted 25 December, 2023; originally announced December 2023.

  8. arXiv:2304.04970  [pdf, other

    cs.LG cs.AI cs.CG math.AT

    GRIL: A $2$-parameter Persistence Based Vectorization for Machine Learning

    Authors: Cheng Xin, Soham Mukherjee, Shreyas N. Samaga, Tamal K. Dey

    Abstract: $1$-parameter persistent homology, a cornerstone in Topological Data Analysis (TDA), studies the evolution of topological features such as connected components and cycles hidden in data. It has been applied to enhance the representation power of deep learning models, such as Graph Neural Networks (GNNs). To enrich the representations of topological features, here we propose to study $2… ▽ More

    Submitted 30 June, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  9. arXiv:2301.07919  [pdf, other

    cs.CL

    Semantic-aware Contrastive Learning for More Accurate Semantic Parsing

    Authors: Shan Wu, Chunlei Xin, Bo Chen, Xianpei Han, Le Sun

    Abstract: Since the meaning representations are detailed and accurate annotations which express fine-grained sequence-level semtantics, it is usually hard to train discriminative semantic parsers via Maximum Likelihood Estimation (MLE) in an autoregressive fashion. In this paper, we propose a semantic-aware contrastive learning algorithm, which can learn to distinguish fine-grained meaning representations a… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

    Comments: Accepted by EMNLP 2022

  10. arXiv:2209.01637  [pdf, other

    cs.CR

    Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference

    Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu

    Abstract: While it is encouraging to witness the recent development in privacy-preserving Machine Learning as a Service (MLaaS), there still exists a significant performance gap for its deployment in real-world applications. We observe the state-of-the-art frameworks follow a compute-and-share principle for every function output where the summing in linear functions, which is the last of two steps for funct… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

  11. arXiv:2108.07429  [pdf, other

    cs.CG math.AT

    Rectangular Approximation and Stability of $2$-parameter Persistence Modules

    Authors: Tamal K. Dey, Cheng Xin

    Abstract: One of the main reasons for topological persistence being useful in data analysis is that it is backed up by a stability (isometry) property: persistence diagrams of $1$-parameter persistence modules are stable in the sense that the bottleneck distance between two diagrams equals the interleaving distance between their generating modules. However, in multi-parameter setting this property breaks do… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  12. arXiv:2106.12753  [pdf, other

    cs.CR cs.LG

    DeepAuditor: Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing

    Authors: Woosub Jung, Yizhou Feng, Sabbir Ahmed Khan, Chunsheng Xin, Danella Zhao, Gang Zhou

    Abstract: As the number of IoT devices has increased rapidly, IoT botnets have exploited the vulnerabilities of IoT devices. However, it is still challenging to detect the initial intrusion on IoT devices prior to massive attacks. Recent studies have utilized power side-channel information to identify this intrusion behavior on IoT devices but still lack accurate models in real-time for ubiquitous botnet de… ▽ More

    Submitted 9 May, 2022; v1 submitted 23 June, 2021; originally announced June 2021.

    Comments: The 21st ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN'22)

    ACM Class: C.2.4; I.2.11

  13. arXiv:2106.06228  [pdf, other

    cs.CL

    From Paraphrasing to Semantic Parsing: Unsupervised Semantic Parsing via Synchronous Semantic Decoding

    Authors: Shan Wu, Bo Chen, Chunlei Xin, Xianpei Han, Le Sun, Weipeng Zhang, Jiansong Chen, Fan Yang, Xunliang Cai

    Abstract: Semantic parsing is challenging due to the structure gap and the semantic gap between utterances and logical forms. In this paper, we propose an unsupervised semantic parsing method - Synchronous Semantic Decoding (SSD), which can simultaneously resolve the semantic gap and the structure gap by jointly leveraging paraphrasing and grammar constrained decoding. Specifically, we reformulate semantic… ▽ More

    Submitted 11 June, 2021; originally announced June 2021.

    Comments: Accepted by ACL 2021

  14. arXiv:2105.01827  [pdf, other

    cs.CR

    GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

    Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu

    Abstract: Machine Learning as a Service (MLaaS) is enabling a wide range of smart applications on end devices. However, privacy-preserved computation is still expensive. Our investigation has found that the most time-consuming component of the HE-based linear computation is a series of Permutation (Perm) operations that are imperative for dot product and convolution in privacy-preserved MLaaS. To this end,… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

  15. arXiv:1911.05184  [pdf, ps, other

    cs.LG cs.CR stat.ML

    CHEETAH: An Ultra-Fast, Approximation-Free, and Privacy-Preserved Neural Network Framework based on Joint Obscure Linear and Nonlinear Computations

    Authors: Qiao Zhang, Cong Wang, Chunsheng Xin, Hongyi Wu

    Abstract: Machine Learning as a Service (MLaaS) is enabling a wide range of smart applications on end devices. However, such convenience comes with a cost of privacy because users have to upload their private data to the cloud. This research aims to provide effective and efficient MLaaS such that the cloud server learns nothing about user data and the users cannot infer the proprietary model parameters owne… ▽ More

    Submitted 11 February, 2021; v1 submitted 12 November, 2019; originally announced November 2019.

  16. arXiv:1904.03766  [pdf, other

    math.AT cs.CG

    Generalized Persistence Algorithm for Decomposing Multi-parameter Persistence Modules

    Authors: Tamal K. Dey, Cheng Xin

    Abstract: The classical persistence algorithm computes the unique decomposition of a persistence module implicitly given by an input simplicial filtration. Based on matrix reduction, this algorithm is a cornerstone of the emergent area of topological data analysis. Its input is a simplicial filtration defined over the integers $\mathbb{Z}$ giving rise to a $1$-parameter persistence module. It has been recog… ▽ More

    Submitted 6 December, 2021; v1 submitted 7 April, 2019; originally announced April 2019.

  17. arXiv:1803.02869  [pdf, other

    cs.CG

    Computing Bottleneck Distance for Multi-parameter Interval Decomposable Persistence Modules

    Authors: Tamal K. Dey, Cheng Xin

    Abstract: Computation of the interleaving distance between persistence modules is a central task in topological data analysis. For $1$-parameter persistence modules, thanks to the isometry theorem, this can be done by computing the bottleneck distance with known efficient algorithms. The question is open for most $n$-parameter persistence modules, $n>1$, because of the well recognized complications of the i… ▽ More

    Submitted 3 October, 2019; v1 submitted 7 March, 2018; originally announced March 2018.

    Comments: This is the n-parameter extension of the conference paper that appeared in SoCG 2018 (which was only for 2-parameter case)