Skip to main content

Showing 1–50 of 1,219 results for author: Yu, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13519  [pdf, other

    cs.CV

    GPSFormer: A Global Perception and Local Structure Fitting-based Transformer for Point Cloud Understanding

    Authors: Changshuo Wang, Meiqing Wu, Siew-Kei Lam, Xin Ning, Shangshu Yu, Ruiping Wang, Weijun Li, Thambipillai Srikanthan

    Abstract: Despite the significant advancements in pre-training methods for point cloud understanding, directly capturing intricate shape information from irregular point clouds without reliance on external data remains a formidable challenge. To address this problem, we propose GPSFormer, an innovative Global Perception and Local Structure Fitting-based Transformer, which learns detailed shape information f… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2407.11798  [pdf, other

    cs.CL cs.DC cs.LG

    PipeInfer: Accelerating LLM Inference using Asynchronous Pipelined Speculation

    Authors: Branden Butler, Sixing Yu, Arya Mazaheri, Ali Jannesari

    Abstract: Inference of Large Language Models (LLMs) across computer clusters has become a focal point of research in recent times, with many acceleration techniques taking inspiration from CPU speculative execution. These techniques reduce bottlenecks associated with memory bandwidth, but also increase end-to-end latency per inference run, requiring high speculation acceptance rates to improve performance.… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 11 pages, submitted to SC24 conference

  3. arXiv:2407.10446  [pdf, other

    cs.SD cs.AI eess.AS

    DDFAD: Dataset Distillation Framework for Audio Data

    Authors: Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu

    Abstract: Deep neural networks (DNNs) have achieved significant success in numerous applications. The remarkable performance of DNNs is largely attributed to the availability of massive, high-quality training datasets. However, processing such massive training data requires huge computational and storage resources. Dataset distillation is a promising solution to this problem, offering the capability to comp… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  4. arXiv:2407.09777  [pdf, other

    cs.LG cs.AI

    Graph Transformers: A Survey

    Authors: Ahsan Shehzad, Feng Xia, Shagufta Abid, Ciyuan Peng, Shuo Yu, Dongyu Zhang, Karin Verspoor

    Abstract: Graph transformers are a recent advancement in machine learning, offering a new class of neural network models for graph-structured data. The synergy between transformers and graph learning demonstrates strong performance and versatility across various graph-related tasks. This survey provides an in-depth review of recent progress and challenges in graph transformer research. We begin with foundat… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

    Comments: 23 pages, 4 figures

    MSC Class: 68T07; 68T05; 68U01 ACM Class: I.2.6

  5. arXiv:2407.07412  [pdf, other

    cs.CV cs.AI

    Pseudo-RIS: Distinctive Pseudo-supervision Generation for Referring Image Segmentation

    Authors: Seonghoon Yu, Paul Hongsuck Seo, Jeany Son

    Abstract: We propose a new framework that automatically generates high-quality segmentation masks with their referring expressions as pseudo supervisions for referring image segmentation (RIS). These pseudo supervisions allow the training of any supervised RIS methods without the cost of manual labeling. To achieve this, we incorporate existing segmentation and image captioning foundation models, leveraging… ▽ More

    Submitted 17 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: Accepted to ECCV 2024

  6. arXiv:2407.05726  [pdf, other

    cs.CV eess.IV

    Gait Patterns as Biomarkers: A Video-Based Approach for Classifying Scoliosis

    Authors: Zirui Zhou, Junhao Liang, Zizhao Peng, Chao Fan, Fengwei An, Shiqi Yu

    Abstract: Scoliosis poses significant diagnostic challenges, particularly in adolescents, where early detection is crucial for effective treatment. Traditional diagnostic and follow-up methods, which rely on physical examinations and radiography, face limitations due to the need for clinical expertise and the risk of radiation exposure, thus restricting their use for widespread early screening. In response,… ▽ More

    Submitted 9 July, 2024; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: Accepted to MICCAI 2024

  7. arXiv:2407.05268  [pdf, other

    cs.LG cs.AI cs.CV

    Federated Knowledge Transfer Fine-tuning Large Server Model with Resource-Constrained IoT Clients

    Authors: Shaoyuan Chen, Linlin You, Rui Liu, Shuo Yu, Ahmed M. Abdelmoniem

    Abstract: The training of large models, involving fine-tuning, faces the scarcity of high-quality data. Compared to the solutions based on centralized data centers, updating large models in the Internet of Things (IoT) faces challenges in coordinating knowledge from distributed clients by using their private and heterogeneous data. To tackle such a challenge, we propose KOALA (Federated Knowledge Transfer F… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  8. arXiv:2407.05239  [pdf, other

    cs.DS cs.NI

    Competitive Analysis of Online Path Selection: Impacts of Path Length, Topology, and System-Level Costs

    Authors: Ying Cao, Siyuan Yu, Xiaoqi Tan, Danny H. K. Tsang

    Abstract: Consider a communication network to which a sequence of self-interested users come and send requests for data transmission between nodes. This work studies the question of how to guide the path selection choices made by those online-arriving users and maximize the social welfare. Competitive analysis is the main technical tool. Specifically, the impacts of path length bounds and topology on the co… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  9. arXiv:2407.05083  [pdf, other

    cs.SI

    Exploring agent interaction patterns in the comment sections of fake and real news

    Authors: Kailun Zhu, Songtao Peng, Jiaqi Nie, Zhongyuan Ruan, Shanqing Yu, Qi Xuan

    Abstract: User comments on social media have been recognized as a crucial factor in distinguishing between fake and real news, with many studies focusing on the textual content of user reactions. However, the interactions among agents in the comment sections for fake and real news have not been fully explored. In this study, we analyze a dataset comprising both fake and real news from Reddit to investigate… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  10. arXiv:2407.03605  [pdf, other

    math.OC cs.CV

    Orthogonal Constrained Minimization with Tensor $\ell_{2,p}$ Regularization for HSI Denoising and Destriping

    Authors: Xiaoxia Liu, Shijie Yu, Jian Lu, Xiaojun Chen

    Abstract: Hyperspectral images (HSIs) are often contaminated by a mixture of noises such as Gaussian noise, dead lines, stripes, and so on. In this paper, we propose a novel approach for HSI denoising and destriping, called NLTL2p, which consists of an orthogonal constrained minimization model and an iterative algorithm with convergence guarantees. The model of the proposed NLTL2p approach is built based on… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    MSC Class: 68U10; 90C26; 15A18; 65F22

  11. arXiv:2407.02333  [pdf, other

    cs.CL cs.CV

    Why do LLaVA Vision-Language Models Reply to Images in English?

    Authors: Musashi Hinck, Carolin Holtermann, Matthew Lyle Olson, Florian Schneider, Sungduk Yu, Anahita Bhiwandiwalla, Anne Lauscher, Shaoyen Tseng, Vasudev Lal

    Abstract: We uncover a surprising multilingual bias occurring in a popular class of multimodal vision-language models (VLMs). Including an image in the query to a LLaVA-style VLM significantly increases the likelihood of the model returning an English response, regardless of the language of the query. This paper investigates the causes of this loss with a two-pronged approach that combines extensive ablatio… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: Pre-print

  12. arXiv:2407.01552  [pdf

    cs.NI physics.optics

    High Spectral-Efficiency, Ultra-low MIMO SDM Transmission over a Field-Deployed Multi-Core OAM Fiber

    Authors: Junyi Liu, Zengquan Xu, Shuqi Mo, Yuming Huang, Yining Huang, Zhenhua Li, Yuying Guo, Lei Shen, Shuo Xu, Ran Gao, Cheng Du, Qian Feng, Jie Luo, Jie Liu, Siyuan Yu

    Abstract: Few-mode multi-core fiber (FM-MCF) based Space-Division Multiplexing (SDM) systems possess the potential to maximize the number of multiplexed spatial channels per fiber by harnessing both the space (fiber cores) and mode (optical mode per core) dimensions. However, to date, no SDM transmissions over field-deployed FM-MCFs in realistic outdoor settings have been reported, which contrasts with SDM… ▽ More

    Submitted 29 April, 2024; originally announced July 2024.

    Comments: 17 pages, 8 figures

  13. arXiv:2407.00984  [pdf

    q-bio.NC cs.AI

    Individual brain parcellation: Review of methods, validations and applications

    Authors: Chengyi Li, Shan Yu, Yue Cui

    Abstract: Individual brains vary greatly in morphology, connectivity and organization. The applicability of group-level parcellations is limited by the rapid development of precision medicine today because they do not take into account the variation of parcels at the individual level. Accurate mapping of brain functional regions at the individual level is pivotal for a comprehensive understanding of the var… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 15 pages, 2 figures

  14. arXiv:2407.00615  [pdf, other

    cs.LG

    GC-Bench: An Open and Unified Benchmark for Graph Condensation

    Authors: Qingyun Sun, Ziying Chen, Beining Yang, Cheng Ji, Xingcheng Fu, Sheng Zhou, Hao Peng, Jianxin Li, Philip S. Yu

    Abstract: Graph condensation (GC) has recently garnered considerable attention due to its ability to reduce large-scale graph datasets while preserving their essential properties. The core concept of GC is to create a smaller, more manageable graph that retains the characteristics of the original graph. Despite the proliferation of graph condensation methods developed in recent years, there is no comprehens… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: The Thirty-eight Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Preprint, under review)

  15. arXiv:2407.00336  [pdf, other

    cs.CR cs.LG

    Dual-view Aware Smart Contract Vulnerability Detection for Ethereum

    Authors: Jiacheng Yao, Maolin Wang, Wanqi Chen, Chengxiang Jin, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: The wide application of Ethereum technology has brought technological innovation to traditional industries. As one of Ethereum's core applications, smart contracts utilize diverse contract codes to meet various functional needs and have gained widespread use. However, the non-tamperability of smart contracts, coupled with vulnerabilities caused by natural flaws or human errors, has brought unprece… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: Accepted by International Conference on Blockchain and Trustworthy Systems 2024

  16. arXiv:2406.16963  [pdf, other

    cs.LG cs.AI cs.CR cs.SI

    Large Language Models for Link Stealing Attacks Against Graph Neural Networks

    Authors: Faqian Guan, Tianqing Zhu, Hui Sun, Wanlei Zhou, Philip S. Yu

    Abstract: Graph data contains rich node features and unique edge information, which have been applied across various domains, such as citation networks or recommendation systems. Graph Neural Networks (GNNs) are specialized for handling such data and have shown impressive performance in many applications. However, GNNs may contain of sensitive information and susceptible to privacy attacks. For example, lin… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  17. arXiv:2406.16253  [pdf, other

    cs.CL

    LLMs Assist NLP Researchers: Critique Paper (Meta-)Reviewing

    Authors: Jiangshu Du, Yibo Wang, Wenting Zhao, Zhongfen Deng, Shuaiqi Liu, Renze Lou, Henry Peng Zou, Pranav Narayanan Venkit, Nan Zhang, Mukund Srinath, Haoran Ranran Zhang, Vipul Gupta, Yinghui Li, Tao Li, Fei Wang, Qin Liu, Tianlin Liu, Pengzhi Gao, Congying Xia, Chen Xing, Jiayang Cheng, Zhaowei Wang, Ying Su, Raj Sanjay Shah, Ruohao Guo , et al. (15 additional authors not shown)

    Abstract: This work is motivated by two key trends. On one hand, large language models (LLMs) have shown remarkable versatility in various generative tasks such as writing, drawing, and question answering, significantly reducing the time required for many routine tasks. On the other hand, researchers, whose work is not only time-consuming but also highly expertise-demanding, face increasing challenges as th… ▽ More

    Submitted 25 June, 2024; v1 submitted 23 June, 2024; originally announced June 2024.

  18. arXiv:2406.15501  [pdf

    cs.CR

    Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory

    Authors: Yang Li, Yujie Luo, Yichen Zhang, Ao Sun, Wei Huang, Shuai Zhang, Tao Zhang, Chuang Zhou, Li Ma, Jie Yang, Mei Wu, Heng Wang, Yan Pan, Yun Shao, Xing Chen, Ziyang Chen, Song Yu, Hong Guo, Bingjie Xu

    Abstract: Secure precision time synchronization is important for applications of Cyber-Physical Systems. However, several attacks, especially the Time Delay Attack (TDA), deteriorates the performance of time synchronization system seriously. Multiple paths scheme is thought as an effective security countermeasure to decrease the influence of TDA. However, the effective secure combination algorithm is still… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  19. arXiv:2406.15043  [pdf, other

    cs.LG

    Discovering Common Information in Multi-view Data

    Authors: Qi Zhang, Mingfei Lu, Shujian Yu, Jingmin Xin, Badong Chen

    Abstract: We introduce an innovative and mathematically rigorous definition for computing common information from multi-view data, drawing inspiration from Gács-Körner common information in information theory. Leveraging this definition, we develop a novel supervised multi-view learning framework to capture both common and unique information. By explicitly minimizing a total correlation term, the extracted… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Manuscript accepted by Information Fusion (\url{https://www.sciencedirect.com/science/article/pii/S1566253524001787}). We have updated a few descriptions for clarity. Code is available at \url{https://github.com/archy666/CUMI}

  20. arXiv:2406.14090  [pdf, other

    cs.AI

    Personalized Music Recommendation with a Heterogeneity-aware Deep Bayesian Network

    Authors: Erkang Jing, Yezheng Liu, Yidong Chai, Shuo Yu, Longshun Liu, Yuanchun Jiang, Yang Wang

    Abstract: Music recommender systems are crucial in music streaming platforms, providing users with music they would enjoy. Recent studies have shown that user emotions can affect users' music mood preferences. However, existing emotion-aware music recommender systems (EMRSs) explicitly or implicitly assume that users' actual emotional states expressed by an identical emotion word are homogeneous. They also… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: 34 pages, 19 figures

  21. arXiv:2406.14043  [pdf, other

    cs.IR cs.CL

    Taxonomy-Guided Zero-Shot Recommendations with LLMs

    Authors: Yueqing Liang, Liangwei Yang, Chen Wang, Xiongxiao Xu, Philip S. Yu, Kai Shu

    Abstract: With the emergence of large language models (LLMs) and their ability to perform a variety of tasks, their application in recommender systems (RecSys) has shown promise. However, we are facing significant challenges when deploying LLMs into RecSys, such as limited prompt length, unstructured item information, and un-constrained generation of recommendations, leading to sub-optimal performance. To a… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  22. arXiv:2406.13929  [pdf, other

    cs.CL cs.AI cs.LG

    Large Language Models are Skeptics: False Negative Problem of Input-conflicting Hallucination

    Authors: Jongyoon Song, Sangwon Yu, Sungroh Yoon

    Abstract: In this paper, we identify a new category of bias that induces input-conflicting hallucinations, where large language models (LLMs) generate responses inconsistent with the content of the input context. This issue we have termed the false negative problem refers to the phenomenon where LLMs are predisposed to return negative judgments when assessing the correctness of a statement given the context… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 12 pages, 9 figures

  23. arXiv:2406.13920  [pdf, other

    cs.LG cs.SI

    Explainable AI Security: Exploring Robustness of Graph Neural Networks to Adversarial Attacks

    Authors: Tao Wu, Canyixing Cui, Xingping Xian, Shaojie Qiao, Chao Wang, Lin Yuan, Shui Yu

    Abstract: Graph neural networks (GNNs) have achieved tremendous success, but recent studies have shown that GNNs are vulnerable to adversarial attacks, which significantly hinders their use in safety-critical scenarios. Therefore, the design of robust GNNs has attracted increasing attention. However, existing research has mainly been conducted via experimental trial and error, and thus far, there remains a… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  24. arXiv:2406.12822  [pdf, other

    cs.CL cs.AI

    Is It Good Data for Multilingual Instruction Tuning or Just Bad Multilingual Evaluation for Large Language Models?

    Authors: Pinzhen Chen, Simon Yu, Zhicheng Guo, Barry Haddow

    Abstract: Large language models, particularly multilingual ones, are designed, claimed, and expected to cater to native speakers of varied languages. We hypothesise that the current practices of fine-tuning and evaluating these models may not perfectly align with this objective owing to a heavy reliance on translation, which can introduce translation artefacts and defects. It remains unknown whether the nat… ▽ More

    Submitted 11 July, 2024; v1 submitted 18 June, 2024; originally announced June 2024.

  25. arXiv:2406.12516  [pdf, other

    cs.CR cs.DC cs.LG

    Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation

    Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu

    Abstract: Federated learning is a promising privacy-preserving paradigm for distributed machine learning. In this context, there is sometimes a need for a specialized process called machine unlearning, which is required when the effect of some specific training samples needs to be removed from a learning model due to privacy, security, usability, and/or legislative factors. However, problems arise when curr… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted by IEEE Transactions on Big Data

  26. arXiv:2406.12208  [pdf, other

    cs.CL cs.AI cs.CV cs.NE

    Knowledge Fusion By Evolving Weights of Language Models

    Authors: Guodong Du, Jing Li, Hanting Liu, Runhua Jiang, Shuyang Yu, Yifei Guo, Sim Kuan Goh, Ho-Kin Tang

    Abstract: Fine-tuning pre-trained language models, particularly large language models, demands extensive computing resources and can result in varying performance outcomes across different domains and datasets. This paper examines the approach of integrating multiple models from diverse training scenarios into a unified model. This unified model excels across various data domains and exhibits the ability to… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Accepted by ACL2024 Findings

  27. arXiv:2406.11608  [pdf, other

    cs.CV

    Learning Hierarchical Semantic Classification by Grounding on Consistent Image Segmentations

    Authors: Seulki Park, Youren Zhang, Stella X. Yu, Sara Beery, Jonathan Huang

    Abstract: Hierarchical semantic classification requires the prediction of a taxonomy tree instead of a single flat level of the tree, where both accuracies at individual levels and consistency across levels matter. We can train classifiers for individual levels, which has accuracy but not consistency, or we can train only the finest level classification and infer higher levels, which has consistency but not… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 34 pages

  28. arXiv:2406.11289  [pdf, other

    cs.CL

    A Systematic Survey of Text Summarization: From Statistical Methods to Large Language Models

    Authors: Haopeng Zhang, Philip S. Yu, Jiawei Zhang

    Abstract: Text summarization research has undergone several significant transformations with the advent of deep neural networks, pre-trained language models (PLMs), and recent large language models (LLMs). This survey thus provides a comprehensive review of the research progress and evolution in text summarization through the lens of these paradigm shifts. It is organized into two main parts: (1) a detailed… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 30 pages, 8 figures, 6 tables

  29. arXiv:2406.11213  [pdf, other

    cs.SE

    A Survey of AIOps for Failure Management in the Era of Large Language Models

    Authors: Lingzhe Zhang, Tong Jia, Mengxi Jia, Yifan Wu, Aiwei Liu, Yong Yang, Zhonghai Wu, Xuming Hu, Philip S. Yu, Ying Li

    Abstract: As software systems grow increasingly intricate, Artificial Intelligence for IT Operations (AIOps) methods have been widely used in software system failure management to ensure the high availability and reliability of large-scale distributed software systems. However, these methods still face several challenges, such as lack of cross-platform generality and cross-task flexibility. Fortunately, rec… ▽ More

    Submitted 23 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 35 pages

  30. arXiv:2406.11189  [pdf, other

    cs.CV

    Frozen CLIP: A Strong Backbone for Weakly Supervised Semantic Segmentation

    Authors: Bingfeng Zhang, Siyue Yu, Yunchao Wei, Yao Zhao, Jimin Xiao

    Abstract: Weakly supervised semantic segmentation has witnessed great achievements with image-level labels. Several recent approaches use the CLIP model to generate pseudo labels for training an individual segmentation model, while there is no attempt to apply the CLIP model as the backbone to directly segment objects with image-level labels. In this paper, we propose WeCLIP, a CLIP-based single-stage pipel… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: CVPR 2024 Highlight

    Journal ref: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 3796-3806) 2024

  31. arXiv:2406.11159  [pdf, other

    cs.LG cs.DC

    Distributed Stochastic Gradient Descent with Staleness: A Stochastic Delay Differential Equation Based Framework

    Authors: Siyuan Yu, Wei Chen, H. Vincent Poor

    Abstract: Distributed stochastic gradient descent (SGD) has attracted considerable recent attention due to its potential for scaling computational resources, reducing training time, and helping protect user privacy in machine learning. However, the staggers and limited bandwidth may induce random computational/communication delays, thereby severely hindering the learning process. Therefore, how to accelerat… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: 13 pages, 9 figures

  32. arXiv:2406.10884  [pdf, other

    cs.LG cs.CR cs.DC

    Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives

    Authors: Linlin Wang, Tianqing Zhu, Wanlei Zhou, Philip S. Yu

    Abstract: Federated learning is fast becoming a popular paradigm for applications involving mobile devices, banking systems, healthcare, and IoT systems. Hence, over the past five years, researchers have undertaken extensive studies on the privacy leaks, security threats, and fairness associated with these emerging models. For the most part, these three critical concepts have been studied in isolation; howe… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  33. arXiv:2406.10861  [pdf, other

    cs.LG cs.DC

    Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions

    Authors: Laiqiao Qin, Tianqing Zhu, Wanlei Zhou, Philip S. Yu

    Abstract: Federated Learning (FL) is a distributed and privacy-preserving machine learning paradigm that coordinates multiple clients to train a model while keeping the raw data localized. However, this traditional FL poses some challenges, including privacy risks, data heterogeneity, communication bottlenecks, and system heterogeneity issues. To tackle these challenges, knowledge distillation (KD) has been… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  34. arXiv:2406.10215  [pdf, other

    cs.CL cs.LG

    DevBench: A multimodal developmental benchmark for language learning

    Authors: Alvin Wei Ming Tan, Sunny Yu, Bria Long, Wanjing Anya Ma, Tonya Murray, Rebecca D. Silverman, Jason D. Yeatman, Michael C. Frank

    Abstract: How (dis)similar are the learning trajectories of vision-language models and children? Recent modeling work has attempted to understand the gap between models' and humans' data efficiency by constructing models trained on less data, especially multimodal naturalistic data. However, such models are often evaluated on adult-level benchmarks, with limited breadth in language abilities tested, and wit… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  35. arXiv:2406.09870  [pdf, other

    cs.LG cs.AI

    IGL-Bench: Establishing the Comprehensive Benchmark for Imbalanced Graph Learning

    Authors: Jiawen Qin, Haonan Yuan, Qingyun Sun, Lyujin Xu, Jiaqi Yuan, Pengfeng Huang, Zhaonan Wang, Xingcheng Fu, Hao Peng, Jianxin Li, Philip S. Yu

    Abstract: Deep graph learning has gained grand popularity over the past years due to its versatility and success in representing graph data across a wide range of domains. However, the pervasive issue of imbalanced graph data distributions, where certain parts exhibit disproportionally abundant data while others remain sparse, undermines the efficacy of conventional graph learning algorithms, leading to bia… ▽ More

    Submitted 19 June, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    Comments: The Thirty-eight Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Preprint, under review)

  36. Practical, Automated Scenario-based Mobile App Testing

    Authors: Shengcheng Yu, Chunrong Fang, Mingzhe Du, Zimin Ding, Zhenyu Chen, Zhendong Su

    Abstract: The importance of mobile application (app) quality insurance is increasing with the rapid development of the mobile Internet. Automated test generation approaches, as a dominant direction of app quality insurance, follow specific models or strategies, targeting at optimizing the code coverage. Such approaches lead to a huge gap between testing execution and app business logic. Test scripts develop… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Accepted by IEEE Transaction on Software Engineering in 2024

  37. arXiv:2406.07973  [pdf, other

    cs.CR

    Unique Security and Privacy Threats of Large Language Model: A Comprehensive Survey

    Authors: Shang Wang, Tianqing Zhu, Bo Liu, Ming Ding, Xu Guo, Dayong Ye, Wanlei Zhou, Philip S. Yu

    Abstract: With the rapid development of artificial intelligence, large language models (LLMs) have made remarkable advancements in natural language processing. These models are trained on vast datasets to exhibit powerful language understanding and generation capabilities across various applications, including machine translation, chatbots, and agents. However, LLMs have revealed a variety of privacy and se… ▽ More

    Submitted 18 June, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

  38. arXiv:2406.07687  [pdf, other

    cs.LG cs.CR

    Adversarial Machine Unlearning

    Authors: Zonglin Di, Sixie Yu, Yevgeniy Vorobeychik, Yang Liu

    Abstract: This paper focuses on the challenge of machine unlearning, aiming to remove the influence of specific training data on machine learning models. Traditionally, the development of unlearning algorithms runs parallel with that of membership inference attacks (MIA), a type of privacy threat to determine whether a data instance was used for training. However, the two strands are intimately connected: o… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  39. arXiv:2406.06618  [pdf, other

    cs.SI cs.AI cs.CY cs.LG physics.soc-ph

    PANDORA: Deep graph learning based COVID-19 infection risk level forecasting

    Authors: Shuo Yu, Feng Xia, Yueru Wang, Shihao Li, Falih Febrinanto, Madhu Chetty

    Abstract: COVID-19 as a global pandemic causes a massive disruption to social stability that threatens human life and the economy. Policymakers and all elements of society must deliver measurable actions based on the pandemic's severity to minimize the detrimental impact of COVID-19. A proper forecasting system is arguably important to provide an early signal of the risk of COVID-19 infection so that the au… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  40. arXiv:2406.06617  [pdf, other

    cs.SI cs.LG

    Collaborative Team Recognition: A Core Plus Extension Structure

    Authors: Shuo Yu, Fayez Alqahtani, Amr Tolba, Ivan Lee, Tao Jia, Feng Xia

    Abstract: Scientific collaboration is a significant behavior in knowledge creation and idea exchange. To tackle large and complex research questions, a trend of team formation has been observed in recent decades. In this study, we focus on recognizing collaborative teams and exploring inner patterns using scholarly big graph data. We propose a collaborative team recognition (CORE) model with a "core + exten… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  41. arXiv:2406.06186  [pdf, other

    cs.CR

    A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks

    Authors: Hengzhu Liu, Ping Xiong, Tianqing Zhu, Philip S. Yu

    Abstract: The explosive growth of machine learning has made it a critical infrastructure in the era of artificial intelligence. The extensive use of data poses a significant threat to individual privacy. Various countries have implemented corresponding laws, such as GDPR, to protect individuals' data privacy and the right to be forgotten. This has made machine unlearning a research hotspot in the field of p… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  42. arXiv:2406.05874  [pdf, other

    cs.CR

    Stealthy Targeted Backdoor Attacks against Image Captioning

    Authors: Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang

    Abstract: In recent years, there has been an explosive growth in multimodal learning. Image captioning, a classical multimodal task, has demonstrated promising applications and attracted extensive research attention. However, recent studies have shown that image caption models are vulnerable to some security threats such as backdoor attacks. Existing backdoor attacks against image captioning typically pair… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  43. arXiv:2406.05687  [pdf, other

    cs.RO

    FlightBench: A Comprehensive Benchmark of Spatial Planning Methods for Quadrotors

    Authors: Shu-Ang Yu, Chao Yu, Feng Gao, Yi Wu, Yu Wang

    Abstract: Spatial planning in cluttered environments is crucial for mobile systems, particularly agile quadrotors. Existing methods, both optimization-based and learning-based, often focus only on success rates in specific environments and lack a unified platform with tasks of varying difficulty. To address this, we introduce FlightBench, the first comprehensive open-source benchmark for 3D spatial planning… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: The first three authors contribute equally

  44. arXiv:2406.05070  [pdf, other

    cs.DB

    Targeted Mining Precise-positioning Episode Rules

    Authors: Jian Zhu, Xiaoye Chen, Wensheng Gan, Zefeng Chen, Philip S. Yu

    Abstract: The era characterized by an exponential increase in data has led to the widespread adoption of data intelligence as a crucial task. Within the field of data mining, frequent episode mining has emerged as an effective tool for extracting valuable and essential information from event sequences. Various algorithms have been developed to discover frequent episodes and subsequently derive episode rules… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: IEEE TETCI, 14 pages

  45. arXiv:2406.04702  [pdf, other

    cs.LG

    Marking the Pace: A Blockchain-Enhanced Privacy-Traceable Strategy for Federated Recommender Systems

    Authors: Zhen Cai, Tao Tang, Shuo Yu, Yunpeng Xiao, Feng Xia

    Abstract: Federated recommender systems have been crucially enhanced through data sharing and continuous model updates, attributed to the pervasive connectivity and distributed computing capabilities of Internet of Things (IoT) devices. Given the sensitivity of IoT data, transparent data processing in data sharing and model updates is paramount. However, existing methods fall short in tracing the flow of sh… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  46. arXiv:2406.04690  [pdf, other

    cs.LG stat.ML

    Higher-order Structure Based Anomaly Detection on Attributed Networks

    Authors: Xu Yuan, Na Zhou, Shuo Yu, Huafei Huang, Zhikui Chen, Feng Xia

    Abstract: Anomaly detection (such as telecom fraud detection and medical image detection) has attracted the increasing attention of people. The complex interaction between multiple entities widely exists in the network, which can reflect specific human behavior patterns. Such patterns can be modeled by higher-order network structures, thus benefiting anomaly detection on attributed networks. However, due to… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  47. arXiv:2406.04076  [pdf, other

    cs.CR

    Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning

    Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou

    Abstract: The development of Large Language Models (LLMs) faces a significant challenge: the exhausting of publicly available fresh data. This is because training a LLM needs a large demanding of new data. Federated learning emerges as a promising solution, enabling collaborative model to contribute their private data to LLM global model. However, integrating federated learning with LLMs introduces new chal… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 16 pages, 7 figures,

  48. arXiv:2406.03411  [pdf, other

    cs.CV

    Interactive Text-to-Image Retrieval with Large Language Models: A Plug-and-Play Approach

    Authors: Saehyung Lee, Sangwon Yu, Junsung Park, Jihun Yi, Sungroh Yoon

    Abstract: In this paper, we primarily address the issue of dialogue-form context query within the interactive text-to-image retrieval task. Our methodology, PlugIR, actively utilizes the general instruction-following capability of LLMs in two ways. First, by reformulating the dialogue-form context, we eliminate the necessity of fine-tuning a retrieval model on existing visual dialogue data, thereby enabling… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: To appear in ACL 2024 Main

  49. arXiv:2406.03376  [pdf, other

    cs.SE

    Log Parsing with Self-Generated In-Context Learning and Self-Correction

    Authors: Yifan Wu, Siyu Yu, Ying Li

    Abstract: Log parsing transforms log messages into structured formats, serving as a crucial step for log analysis. Despite a variety of log parsing methods that have been proposed, their performance on evolving log data remains unsatisfactory due to reliance on human-crafted rules or learning-based models with limited training data. The recent emergence of large language models (LLMs) has demonstrated stron… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  50. Floorplanning with I/O assignment via feasibility-seeking and superiorization methods

    Authors: Shan Yu, Yair Censor, Guojie Luo

    Abstract: The feasibility-seeking approach offers a systematic framework for managing and resolving intricate constraints in continuous problems, making it a promising avenue to explore in the context of floorplanning problems with increasingly heterogeneous constraints. The classic legality constraints can be expressed as the union of convex sets. In implementation, we introduce a resetting strategy aimed… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Journal ref: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2024)