Skip to main content

Showing 1–50 of 545 results for author: Jiang, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.10702  [pdf

    cs.HC cs.AI cs.CL cs.LG

    Model-in-the-Loop (MILO): Accelerating Multimodal AI Data Annotation with LLMs

    Authors: Yifan Wang, David Stevens, Pranay Shah, Wenwen Jiang, Miao Liu, Xu Chen, Robert Kuo, Na Li, Boying Gong, Daniel Lee, Jiabo Hu, Ning Zhang, Bob Kamma

    Abstract: The growing demand for AI training data has transformed data annotation into a global industry, but traditional approaches relying on human annotators are often time-consuming, labor-intensive, and prone to inconsistent quality. We propose the Model-in-the-Loop (MILO) framework, which integrates AI/ML models into the annotation process. Our research introduces a collaborative paradigm that leverag… ▽ More

    Submitted 16 September, 2024; originally announced September 2024.

  2. arXiv:2409.02430  [pdf, other

    eess.SP cs.CR cs.LG

    Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep Receviers

    Authors: Kunze Wu, Weiheng Jiang, Dusit Niyato, Yinghuan Li, Chuang Luo

    Abstract: Recently, the design of wireless receivers using deep neural networks (DNNs), known as deep receivers, has attracted extensive attention for ensuring reliable communication in complex channel environments. To adapt quickly to dynamic channels, online learning has been adopted to update the weights of deep receivers with over-the-air data (e.g., pilots). However, the fragility of neural models and… ▽ More

    Submitted 4 September, 2024; v1 submitted 4 September, 2024; originally announced September 2024.

    Comments: 15 pages, 14 figures

  3. ESP-PCT: Enhanced VR Semantic Performance through Efficient Compression of Temporal and Spatial Redundancies in Point Cloud Transformers

    Authors: Luoyu Mei, Shuai Wang, Yun Cheng, Ruofeng Liu, Zhimeng Yin, Wenchao Jiang, Shuai Wang, Wei Gong

    Abstract: Semantic recognition is pivotal in virtual reality (VR) applications, enabling immersive and interactive experiences. A promising approach is utilizing millimeter-wave (mmWave) signals to generate point clouds. However, the high computational and memory demands of current mmWave point cloud models hinder their efficiency and reliability. To address this limitation, our paper introduces ESP-PCT, a… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

    Journal ref: Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, IJCAI 2024

  4. arXiv:2409.00670  [pdf, other

    cs.LG cs.SI

    Towards Faster Graph Partitioning via Pre-training and Inductive Inference

    Authors: Meng Qin, Chaorui Zhang, Yu Gao, Yibin Ding, Weipeng Jiang, Weixi Zhang, Wei Han, Bo Bai

    Abstract: Graph partitioning (GP) is a classic problem that divides the node set of a graph into densely-connected blocks. Following the IEEE HPEC Graph Challenge and recent advances in pre-training techniques (e.g., large-language models), we propose PR-GPT (Pre-trained & Refined Graph ParTitioning) based on a novel pre-training & refinement paradigm. We first conduct the offline pre-training of a deep gra… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

    Comments: Champion winner of IEEE HPEC 2024 Graph Challenge (https://graphchallenge.mit.edu/champions)

  5. arXiv:2409.00461  [pdf, other

    cs.IT

    Interference-Cancellation-Based Channel Knowledge Map Construction and Its Applications to Channel Estimation

    Authors: Wenjun Jiang, Xiaojun Yuan, Boyu Teng, Hao Wang, Jing Qian

    Abstract: Channel knowledge map (CKM) is viewed as a digital twin of wireless channels, providing location-specific channel knowledge for environment-aware communications. A fundamental problem in CKM-assisted communications is how to construct the CKM efficiently. Current research focuses on interpolating or predicting channel knowledge based on error-free channel knowledge from measured regions, ignoring… ▽ More

    Submitted 31 August, 2024; originally announced September 2024.

  6. arXiv:2409.00101  [pdf, other

    eess.SP cs.HC cs.LG

    NeuroLM: A Universal Multi-task Foundation Model for Bridging the Gap between Language and EEG Signals

    Authors: Wei-Bang Jiang, Yansen Wang, Bao-Liang Lu, Dongsheng Li

    Abstract: Recent advancements for large-scale pre-training with neural signals such as electroencephalogram (EEG) have shown promising results, significantly boosting the development of brain-computer interfaces (BCIs) and healthcare. However, these pre-trained models often require full fine-tuning on each downstream task to achieve substantial improvements, limiting their versatility and usability, and lea… ▽ More

    Submitted 27 August, 2024; originally announced September 2024.

    Comments: 22 pages, 11 figures

  7. arXiv:2408.16866  [pdf, other

    cs.CV

    GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content

    Authors: Lebin Zhou, Kun Han, Nam Ling, Wei Wang, Wei Jiang

    Abstract: Image restoration methods like super-resolution and image synthesis have been successfully used in commercial cloud gaming products like NVIDIA's DLSS. However, restoration over gaming content is not well studied by the general public. The discrepancy is mainly caused by the lack of ground-truth gaming training data that match the test cases. Due to the unique characteristics of gaming content, th… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

  8. arXiv:2408.15903  [pdf, other

    cs.CL

    LLM-Based Multi-Hop Question Answering with Knowledge Graph Integration in Evolving Environments

    Authors: Ruirui Chen, Weifeng Jiang, Chengwei Qin, Ishaan Singh Rawal, Cheston Tan, Dongkyu Choi, Bo Xiong, Bo Ai

    Abstract: The rapid obsolescence of information in Large Language Models (LLMs) has driven the development of various techniques to incorporate new facts. However, existing methods for knowledge editing still face difficulties with multi-hop questions that require accurate fact identification and sequential logical reasoning, particularly among numerous fact updates. To tackle these challenges, this paper i… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

  9. arXiv:2408.15101  [pdf, other

    cs.CV cs.AI

    MTMamba++: Enhancing Multi-Task Dense Scene Understanding via Mamba-Based Decoders

    Authors: Baijiong Lin, Weisen Jiang, Pengguang Chen, Shu Liu, Ying-Cong Chen

    Abstract: Multi-task dense scene understanding, which trains a model for multiple dense prediction tasks, has a wide range of application scenarios. Capturing long-range dependency and enhancing cross-task interactions are crucial to multi-task dense prediction. In this paper, we propose MTMamba++, a novel architecture for multi-task scene understanding featuring with a Mamba-based decoder. It contains two… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

    Comments: arXiv admin note: text overlap with arXiv:2407.02228

  10. arXiv:2408.12935  [pdf, other

    cs.AI

    Trustworthy, Responsible, and Safe AI: A Comprehensive Architectural Framework for AI Safety with Challenges and Mitigations

    Authors: Chen Chen, Ziyao Liu, Weifeng Jiang, Si Qi Goh, Kwok-Yan Lam

    Abstract: AI Safety is an emerging area of critical importance to the safe adoption and deployment of AI systems. With the rapid proliferation of AI and especially with the recent advancement of Generative AI (or GAI), the technology ecosystem behind the design, development, adoption, and deployment of AI systems has drastically changed, broadening the scope of AI Safety to address impacts on public safety… ▽ More

    Submitted 12 September, 2024; v1 submitted 23 August, 2024; originally announced August 2024.

  11. arXiv:2408.12068  [pdf, other

    cs.LG

    Simplified Mamba with Disentangled Dependency Encoding for Long-Term Time Series Forecasting

    Authors: Zixuan Weng, Jindong Han, Wenzhao Jiang, Hao Liu

    Abstract: Recently many deep learning models have been proposed for Long-term Time Series Forecasting (LTSF). Based on previous literature, we identify three critical patterns that can improve forecasting accuracy: the order and semantic dependencies in time dimension as well as cross-variate dependency. However, little effort has been made to simultaneously consider order and semantic dependencies when dev… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  12. arXiv:2408.11313  [pdf, other

    cs.AI

    Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer

    Authors: Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen

    Abstract: Despite prior safety alignment efforts, mainstream LLMs can still generate harmful and unethical content when subjected to jailbreaking attacks. Existing jailbreaking methods fall into two main categories: template-based and optimization-based methods. The former requires significant manual effort and domain knowledge, while the latter, exemplified by Greedy Coordinate Gradient (GCG), which seeks… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

  13. arXiv:2408.10484  [pdf, other

    quant-ph cs.ET

    Dependable Classical-Quantum Computer Systems Engineering

    Authors: Edoardo Giusto, Santiago Nuñez-Corrales, Phuong Cao, Alessandro Cilardo, Ravishankar K. Iyer, Weiwen Jiang, Paolo Rech, Flavio Vella, Bartolomeo Montrucchio, Samudra Dasgupta, Travis S. Humble

    Abstract: Quantum Computing (QC) offers the potential to enhance traditional High-Performance Computing (HPC) workloads by leveraging the unique properties of quantum computers, leading to the emergence of a new paradigm: HPC-QC. While this integration presents new opportunities, it also brings novel challenges, particularly in ensuring the dependability of such hybrid systems. This paper aims to identify i… ▽ More

    Submitted 19 August, 2024; originally announced August 2024.

  14. arXiv:2408.08920  [pdf, other

    cs.CR cs.CV

    A Survey of Trojan Attacks and Defenses to Deep Neural Networks

    Authors: Lingxin Jin, Xianyu Wen, Wei Jiang, Jinyu Zhan

    Abstract: Deep Neural Networks (DNNs) have found extensive applications in safety-critical artificial intelligence systems, such as autonomous driving and facial recognition systems. However, recent research has revealed their susceptibility to Neural Network Trojans (NN Trojans) maliciously injected by adversaries. This vulnerability arises due to the intricate architecture and opacity of DNNs, resulting i… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

  15. arXiv:2408.08222  [pdf, other

    cs.LG

    Enhancing Sharpness-Aware Minimization by Learning Perturbation Radius

    Authors: Xuehao Wang, Weisen Jiang, Shuai Fu, Yu Zhang

    Abstract: Sharpness-aware minimization (SAM) is to improve model generalization by searching for flat minima in the loss landscape. The SAM update consists of one step for computing the perturbation and the other for computing the update gradient. Within the two steps, the choice of the perturbation radius is crucial to the performance of SAM, but finding an appropriate perturbation radius is challenging. I… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: Accepted by ECML PKDD 2024

  16. arXiv:2408.08132  [pdf, other

    cs.IT eess.SP

    Heterogeneous System Design for Cell-Free Massive MIMO in Wideband Communications

    Authors: Wei Jiang, Hans D. Schotten

    Abstract: Cell-free massive multi-input multi-output (CFmMIMO) offers uniform service quality through distributed access points (APs), yet unresolved issues remain. This paper proposes a heterogeneous system design that goes beyond the original CFmMIMO architecture by exploiting the synergy of a base station (BS) and distributed APs. Users are categorized as near users (NUs) and far users (FUs) depending on… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: IEEE Globecom 2024

  17. arXiv:2408.07264  [pdf

    eess.IV cs.CV

    Lesion-aware network for diabetic retinopathy diagnosis

    Authors: Xue Xia, Kun Zhan, Yuming Fang, Wenhui Jiang, Fei Shen

    Abstract: Deep learning brought boosts to auto diabetic retinopathy (DR) diagnosis, thus, greatly helping ophthalmologists for early disease detection, which contributes to preventing disease deterioration that may eventually lead to blindness. It has been proved that convolutional neural network (CNN)-aided lesion identifying or segmentation benefits auto DR screening. The key to fine-grained lesion tasks… ▽ More

    Submitted 13 August, 2024; originally announced August 2024.

    Comments: This is submitted version wihout improvements by reviewers. The final version is published on International Journal of Imaging Systems and Techonology (https://onlinelibrary.wiley.com/doi/10.1002/ima.22933)

  18. arXiv:2408.05435  [pdf, other

    quant-ph cs.LG

    SuperEncoder: Towards Universal Neural Approximate Quantum State Preparation

    Authors: Yilun Zhao, Bingmeng Wang, Wenle Jiang, Xiwei Pan, Bing Li, Yinhe Han, Ying Wang

    Abstract: Numerous quantum algorithms operate under the assumption that classical data has already been converted into quantum states, a process termed Quantum State Preparation (QSP). However, achieving precise QSP requires a circuit depth that scales exponentially with the number of qubits, making it a substantial obstacle in harnessing quantum advantage. Recent research suggests using a Parameterized Qua… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

  19. arXiv:2408.03091  [pdf, other

    cs.IR

    Modeling User Intent Beyond Trigger: Incorporating Uncertainty for Trigger-Induced Recommendation

    Authors: Jianxing Ma, Zhibo Xiao, Luwei Yang, Hansheng Xue, Xuanzhou Liu, Wen Jiang, Wei Ning, Guannan Zhang

    Abstract: To cater to users' desire for an immersive browsing experience, numerous e-commerce platforms provide various recommendation scenarios, with a focus on Trigger-Induced Recommendation (TIR) tasks. However, the majority of current TIR methods heavily rely on the trigger item to understand user intent, lacking a higher-level exploration and exploitation of user intent (e.g., popular items and complem… ▽ More

    Submitted 7 August, 2024; v1 submitted 6 August, 2024; originally announced August 2024.

    Comments: Accepted at CIKM 2024

  20. arXiv:2408.02980  [pdf, other

    cs.CV

    Sample-agnostic Adversarial Perturbation for Vision-Language Pre-training Models

    Authors: Haonan Zheng, Wen Jiang, Xinyang Deng, Wenrui Li

    Abstract: Recent studies on AI security have highlighted the vulnerability of Vision-Language Pre-training (VLP) models to subtle yet intentionally designed perturbations in images and texts. Investigating multimodal systems' robustness via adversarial attacks is crucial in this field. Most multimodal attacks are sample-specific, generating a unique perturbation for each sample to construct adversarial samp… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: 13 pages, 8 figures, published in ACMMM2024

  21. arXiv:2408.02936  [pdf, other

    cs.LG

    Achieving More with Less: A Tensor-Optimization-Powered Ensemble Method

    Authors: Jinghui Yuan, Weijin Jiang, Zhe Cao, Fangyuan Xie, Rong Wang, Feiping Nie, Yuan Yuan

    Abstract: Ensemble learning is a method that leverages weak learners to produce a strong learner. However, obtaining a large number of base learners requires substantial time and computational resources. Therefore, it is meaningful to study how to achieve the performance typically obtained with many base learners using only a few. We argue that to achieve this, it is essential to enhance both classification… ▽ More

    Submitted 12 August, 2024; v1 submitted 5 August, 2024; originally announced August 2024.

  22. arXiv:2408.01604  [pdf, other

    cs.RO eess.SY

    Efficient Data-driven Joint-level Calibration of Cable-driven Surgical Robots

    Authors: Haonan Peng, Andrew Lewis, Yun-Hsuan Su, Shan Lin, Dun-Tin Chiang, Wenfan Jiang, Helen Lai, Blake Hannaford

    Abstract: Knowing accurate joint positions is crucial for safe and precise control of laparoscopic surgical robots, especially for the automation of surgical sub-tasks. These robots have often been designed with cable-driven arms and tools because cables allow for larger motors to be placed at the base of the robot, further from the operating area where space is at a premium. However, by connecting the join… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

  23. arXiv:2408.01427  [pdf, other

    cs.CV cs.AI

    Siamese Transformer Networks for Few-shot Image Classification

    Authors: Weihao Jiang, Shuoxi Zhang, Kun He

    Abstract: Humans exhibit remarkable proficiency in visual classification tasks, accurately recognizing and classifying new images with minimal examples. This ability is attributed to their capacity to focus on details and identify common features between previously seen and new images. In contrast, existing few-shot image classification methods often emphasize either global features or local features, with… ▽ More

    Submitted 16 July, 2024; originally announced August 2024.

    Comments: 12 pages

  24. arXiv:2407.21783  [pdf, other

    cs.AI cs.CL cs.CV

    The Llama 3 Herd of Models

    Authors: Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Abhishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava Spataru, Baptiste Roziere, Bethany Biron, Binh Tang , et al. (510 additional authors not shown)

    Abstract: Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical… ▽ More

    Submitted 15 August, 2024; v1 submitted 31 July, 2024; originally announced July 2024.

  25. arXiv:2407.17797  [pdf, other

    cs.CV cs.AI

    A Unified Understanding of Adversarial Vulnerability Regarding Unimodal Models and Vision-Language Pre-training Models

    Authors: Haonan Zheng, Xinyang Deng, Wen Jiang, Wenrui Li

    Abstract: With Vision-Language Pre-training (VLP) models demonstrating powerful multimodal interaction capabilities, the application scenarios of neural networks are no longer confined to unimodal domains but have expanded to more complex multimodal V+L downstream tasks. The security vulnerabilities of unimodal models have been extensively examined, whereas those of VLP models remain challenging. We note th… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: 14 pages, 9 figures, published in ACMMM2024(oral)

  26. arXiv:2407.16985  [pdf, other

    cs.LG

    Sparse Tensor PCA via Tensor Decomposition for Unsupervised Feature Selection

    Authors: Junjing Zheng, Xinyu Zhang, Weidong Jiang

    Abstract: Recently, introducing Tensor Decomposition (TD) methods into unsupervised feature selection (UFS) has been a rising research point. A tensor structure is beneficial for mining the relations between different modes and helps relieve the computation burden. However, while existing methods exploit TD to minimize the reconstruction error of a data tensor, they don't fully utilize the interpretable and… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

  27. arXiv:2407.16273  [pdf, other

    cs.CR

    Backdoor Attacks against Hybrid Classical-Quantum Neural Networks

    Authors: Ji Guo, Wenbo Jiang, Rui Zhang, Wenshu Fan, Jiachen Li, Guoming Lu

    Abstract: Hybrid Quantum Neural Networks (HQNNs) represent a promising advancement in Quantum Machine Learning (QML), yet their security has been rarely explored. In this paper, we present the first systematic study of backdoor attacks on HQNNs. We begin by proposing an attack framework and providing a theoretical analysis of the generalization bounds and minimum perturbation requirements for backdoor attac… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  28. arXiv:2407.14564  [pdf, ps, other

    eess.IV cs.AI cs.CV cs.LG

    APS-USCT: Ultrasound Computed Tomography on Sparse Data via AI-Physic Synergy

    Authors: Yi Sheng, Hanchen Wang, Yipei Liu, Junhuan Yang, Weiwen Jiang, Youzuo Lin, Lei Yang

    Abstract: Ultrasound computed tomography (USCT) is a promising technique that achieves superior medical imaging reconstruction resolution by fully leveraging waveform information, outperforming conventional ultrasound methods. Despite its advantages, high-quality USCT reconstruction relies on extensive data acquisition by a large number of transducers, leading to increased costs, computational demands, exte… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: MICCAI

  29. arXiv:2407.13896  [pdf, ps, other

    cs.LG cs.AI

    Data-Algorithm-Architecture Co-Optimization for Fair Neural Networks on Skin Lesion Dataset

    Authors: Yi Sheng, Junhuan Yang, Jinyang Li, James Alaina, Xiaowei Xu, Yiyu Shi, Jingtong Hu, Weiwen Jiang, Lei Yang

    Abstract: As Artificial Intelligence (AI) increasingly integrates into our daily lives, fairness has emerged as a critical concern, particularly in medical AI, where datasets often reflect inherent biases due to social factors like the underrepresentation of marginalized communities and socioeconomic barriers to data collection. Traditional approaches to mitigating these biases have focused on data augmenta… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

    Comments: MICCAI

  30. arXiv:2407.13605  [pdf, other

    cs.LG

    Physics-guided Active Sample Reweighting for Urban Flow Prediction

    Authors: Wei Jiang, Tong Chen, Guanhua Ye, Wentao Zhang, Lizhen Cui, Zi Huang, Hongzhi Yin

    Abstract: Urban flow prediction is a spatio-temporal modeling task that estimates the throughput of transportation services like buses, taxis, and ride-sharing, where data-driven models have become the most popular solution in the past decade. Meanwhile, the implicitly learned mapping between historical observations to the prediction targets tend to over-simplify the dynamics of real-world urban flows, lead… ▽ More

    Submitted 6 August, 2024; v1 submitted 18 July, 2024; originally announced July 2024.

    Comments: This paper is accepted by Proceedings of the 33nd ACM International Conference on Information and Knowledge Management (CIKM '24)

  31. Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering

    Authors: Jiahao Cui, Wei Jiang, Zhan Peng, Zhiyu Pan, Zhiguo Cao

    Abstract: High dynamic range (HDR) video rendering from low dynamic range (LDR) videos where frames are of alternate exposure encounters significant challenges, due to the exposure change and absence at each time stamp. The exposure change and absence make existing methods generate flickering HDR results. In this paper, we propose a novel paradigm to render HDR frames via completing the absent exposure info… ▽ More

    Submitted 4 August, 2024; v1 submitted 18 July, 2024; originally announced July 2024.

    Comments: 9 pages, 6 figures, accepted by ACM-MM 2024 (poster)

  32. arXiv:2407.11921  [pdf, other

    cs.CV cs.CR

    IPA-NeRF: Illusory Poisoning Attack Against Neural Radiance Fields

    Authors: Wenxiang Jiang, Hanwei Zhang, Shuo Zhao, Zhongwen Guo, Hao Wang

    Abstract: Neural Radiance Field (NeRF) represents a significant advancement in computer vision, offering implicit neural network-based scene representation and novel view synthesis capabilities. Its applications span diverse fields including robotics, urban mapping, autonomous navigation, virtual reality/augmented reality, etc., some of which are considered high-risk AI applications. However, despite its wi… ▽ More

    Submitted 18 July, 2024; v1 submitted 16 July, 2024; originally announced July 2024.

  33. arXiv:2407.10987  [pdf, ps, other

    cs.NI cs.AI eess.SP

    Adaptive Digital Twin and Communication-Efficient Federated Learning Network Slicing for 5G-enabled Internet of Things

    Authors: Daniel Ayepah-Mensah, Guolin Sun, Yu Pang, Wei Jiang

    Abstract: Network slicing enables industrial Internet of Things (IIoT) networks with multiservice and differentiated resource requirements to meet increasing demands through efficient use and management of network resources. Typically, the network slice orchestrator relies on demand forecasts for each slice to make informed decisions and maximize resource utilization. The new generation of Industry 4.0 has… ▽ More

    Submitted 22 June, 2024; originally announced July 2024.

    Comments: 8 pages, 7 figures, conference

  34. arXiv:2407.10446  [pdf, other

    cs.SD cs.AI cs.DB eess.AS

    DDFAD: Dataset Distillation Framework for Audio Data

    Authors: Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu

    Abstract: Deep neural networks (DNNs) have achieved significant success in numerous applications. The remarkable performance of DNNs is largely attributed to the availability of massive, high-quality training datasets. However, processing such massive training data requires huge computational and storage resources. Dataset distillation is a promising solution to this problem, offering the capability to comp… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  35. arXiv:2407.10445  [pdf, other

    cs.CV cs.AI

    Backdoor Attacks against Image-to-Image Networks

    Authors: Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu

    Abstract: Recently, deep learning-based Image-to-Image (I2I) networks have become the predominant choice for I2I tasks such as image super-resolution and denoising. Despite their remarkable performance, the backdoor vulnerability of I2I networks has not been explored. To fill this research gap, we conduct a comprehensive investigation on the susceptibility of I2I networks to backdoor attacks. Specifically,… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  36. arXiv:2407.10440  [pdf, other

    cs.DB

    A novel multi-threaded web crawling model

    Authors: Weijie. Jiang

    Abstract: This paper proposes a novel model for web crawling suitable for large-scale web data acquisition. This model first divides web data into several sub-data, with each sub-data corresponding to a thread task. In each thread task, web crawling tasks are concurrently executed, and the crawled data are stored in a buffer queue, awaiting further parsing. The parsing process is also divided into several t… ▽ More

    Submitted 9 May, 2024; originally announced July 2024.

  37. arXiv:2407.04206  [pdf, other

    math.NA cs.CE

    Computational Graph Representation of Equations System Constructors in Hierarchical Circuit Simulation

    Authors: Zichao Long, Lin Li, Lei Han, Xianglong Meng, Chongjun Ding, Ruiyan Li, Wu Jiang, Fuchen Ding, Jiaqing Yue, Zhichao Li, Yisheng Hu, Ding Li, Heng Liao

    Abstract: Equations system constructors of hierarchical circuits play a central role in device modeling, nonlinear equations solving, and circuit design automation. However, existing constructors present limitations in applications to different extents. For example, the costs of developing and reusing device models -- especially coarse-grained equivalent models of circuit modules -- remain high while parame… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  38. arXiv:2407.03641  [pdf, other

    cs.LG

    Learning Scalable Model Soup on a Single GPU: An Efficient Subspace Training Strategy

    Authors: Tao Li, Weisen Jiang, Fanghui Liu, Xiaolin Huang, James T. Kwok

    Abstract: Pre-training followed by fine-tuning is widely adopted among practitioners. The performance can be improved by "model soups"~\cite{wortsman2022model} via exploring various hyperparameter configurations.The Learned-Soup, a variant of model soups, significantly improves the performance but suffers from substantial memory and time costs due to the requirements of (i) having to load all fine-tuned mod… ▽ More

    Submitted 23 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

    Comments: ECCV 2024

  39. arXiv:2407.02805  [pdf, other

    cs.SE cs.AI

    Efficient DNN-Powered Software with Fair Sparse Models

    Authors: Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen

    Abstract: With the emergence of the Software 3.0 era, there is a growing trend of compressing and integrating large models into software systems, with significant societal implications. Regrettably, in numerous instances, model compression techniques impact the fairness performance of these models and thus the ethical behavior of DNN-powered software. One of the most notable example is the Lottery Ticket Hy… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  40. arXiv:2407.02228  [pdf, other

    cs.CV cs.AI

    MTMamba: Enhancing Multi-Task Dense Scene Understanding by Mamba-Based Decoders

    Authors: Baijiong Lin, Weisen Jiang, Pengguang Chen, Yu Zhang, Shu Liu, Ying-Cong Chen

    Abstract: Multi-task dense scene understanding, which learns a model for multiple dense prediction tasks, has a wide range of application scenarios. Modeling long-range dependency and enhancing cross-task interactions are crucial to multi-task dense prediction. In this paper, we propose MTMamba, a novel Mamba-based architecture for multi-task scene understanding. It contains two types of core blocks: self-t… ▽ More

    Submitted 14 July, 2024; v1 submitted 2 July, 2024; originally announced July 2024.

    Comments: ECCV 2024

  41. arXiv:2407.00955  [pdf, other

    cs.IT cs.AI eess.SP

    Task-oriented Over-the-air Computation for Edge-device Co-inference with Balanced Classification Accuracy

    Authors: Xiang Jiao, Dingzhu Wen, Guangxu Zhu, Wei Jiang, Wu Luo, Yuanming Shi

    Abstract: Edge-device co-inference, which concerns the cooperation between edge devices and an edge server for completing inference tasks over wireless networks, has been a promising technique for enabling various kinds of intelligent services at the network edge, e.g., auto-driving. In this paradigm, the concerned design objective of the network shifts from the traditional communication throughput to the e… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: This paper was accepted by IEEE Transactions on Vehicular Technology on June 30, 2024

  42. arXiv:2406.17841  [pdf, other

    quant-ph cs.AI

    Probing many-body Bell correlation depth with superconducting qubits

    Authors: Ke Wang, Weikang Li, Shibo Xu, Mengyao Hu, Jiachen Chen, Yaozu Wu, Chuanyu Zhang, Feitong Jin, Xuhao Zhu, Yu Gao, Ziqi Tan, Aosai Zhang, Ning Wang, Yiren Zou, Tingting Li, Fanhao Shen, Jiarun Zhong, Zehang Bao, Zitian Zhu, Zixuan Song, Jinfeng Deng, Hang Dong, Xu Zhang, Pengfei Zhang, Wenjie Jiang , et al. (10 additional authors not shown)

    Abstract: Quantum nonlocality describes a stronger form of quantum correlation than that of entanglement. It refutes Einstein's belief of local realism and is among the most distinctive and enigmatic features of quantum mechanics. It is a crucial resource for achieving quantum advantages in a variety of practical applications, ranging from cryptography and certified random number generation via self-testing… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: 11 pages,6 figures + 14 pages, 6 figures

  43. arXiv:2406.12923  [pdf, other

    cs.LG cs.MA

    Interpretable Cascading Mixture-of-Experts for Urban Traffic Congestion Prediction

    Authors: Wenzhao Jiang, Jindong Han, Hao Liu, Tao Tao, Naiqiang Tan, Hui Xiong

    Abstract: Rapid urbanization has significantly escalated traffic congestion, underscoring the need for advanced congestion prediction services to bolster intelligent transportation systems. As one of the world's largest ride-hailing platforms, DiDi places great emphasis on the accuracy of congestion prediction to enhance the effectiveness and reliability of their real-time services, such as travel time esti… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  44. arXiv:2406.12385  [pdf, other

    cs.AR

    Accelerating Graph-based Vector Search via Delayed-Synchronization Traversal

    Authors: Wenqi Jiang, Hang Hu, Torsten Hoefler, Gustavo Alonso

    Abstract: Vector search systems are indispensable in large language model (LLM) serving, search engines, and recommender systems, where minimizing online search latency is essential. Among various algorithms, graph-based vector search (GVS) is particularly popular due to its high search performance and quality. To efficiently serve low-latency GVS, we propose a hardware-algorithm co-design solution includin… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  45. arXiv:2406.12019  [pdf

    eess.SY cs.CR cs.ET eess.SP

    Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging

    Authors: Hui Wang, Nima Tashakor, Wei Jiang, Wei Liu, C. Q. Jiang, Stefan M. Goetz

    Abstract: Recently, energy encryption for wireless power transfer has been developed for energy safety, which is important in public places to suppress unauthorized energy extraction. Most techniques vary the frequency so that unauthorized receivers cannot extract energy because of non-resonance. However, this strategy is unreliable. To stimulate the progress of energy encryption technology and point out se… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 10 pages, 17 figures

  46. arXiv:2406.08205  [pdf, other

    cs.SE cs.LG

    What do we know about Hugging Face? A systematic literature review and quantitative validation of qualitative claims

    Authors: Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

    Abstract: Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep… ▽ More

    Submitted 3 September, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    Comments: [ESEM'24] Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) 2024

  47. arXiv:2406.08100  [pdf, other

    cs.CL cs.AI

    Multimodal Table Understanding

    Authors: Mingyu Zheng, Xinwei Feng, Qingyi Si, Qiaoqiao She, Zheng Lin, Wenbin Jiang, Weiping Wang

    Abstract: Although great progress has been made by previous table understanding methods including recent approaches based on large language models (LLMs), they rely heavily on the premise that given tables must be converted into a certain text sequence (such as Markdown or HTML) to serve as model input. However, it is difficult to access such high-quality textual table representations in some real-world sce… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: 23 pages, 16 figures, ACL 2024 main conference, camera-ready version

  48. arXiv:2406.05874  [pdf, other

    cs.CR

    Stealthy Targeted Backdoor Attacks against Image Captioning

    Authors: Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang

    Abstract: In recent years, there has been an explosive growth in multimodal learning. Image captioning, a classical multimodal task, has demonstrated promising applications and attracted extensive research attention. However, recent studies have shown that image caption models are vulnerable to some security threats such as backdoor attacks. Existing backdoor attacks against image captioning typically pair… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  49. arXiv:2406.04744  [pdf, other

    cs.CL

    CRAG -- Comprehensive RAG Benchmark

    Authors: Xiao Yang, Kai Sun, Hao Xin, Yushi Sun, Nikita Bhalla, Xiangsen Chen, Sajal Choudhary, Rongze Daniel Gui, Ziran Will Jiang, Ziyu Jiang, Lingkun Kong, Brian Moran, Jiaqi Wang, Yifan Ethan Xu, An Yan, Chenyu Yang, Eting Yuan, Hanwen Zha, Nan Tang, Lei Chen, Nicolas Scheffer, Yue Liu, Nirav Shah, Rakesh Wanga, Anuj Kumar , et al. (2 additional authors not shown)

    Abstract: Retrieval-Augmented Generation (RAG) has recently emerged as a promising solution to alleviate Large Language Model (LLM)'s deficiency in lack of knowledge. Existing RAG datasets, however, do not adequately represent the diverse and dynamic nature of real-world Question Answering (QA) tasks. To bridge this gap, we introduce the Comprehensive RAG Benchmark (CRAG), a factual question answering bench… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  50. arXiv:2406.03787  [pdf, other

    math.OC cs.LG

    Projection-Free Variance Reduction Methods for Stochastic Constrained Multi-Level Compositional Optimization

    Authors: Wei Jiang, Sifan Yang, Wenhao Yang, Yibo Wang, Yuanyu Wan, Lijun Zhang

    Abstract: This paper investigates projection-free algorithms for stochastic constrained multi-level optimization. In this context, the objective function is a nested composition of several smooth functions, and the decision set is closed and convex. Existing projection-free algorithms for solving this problem suffer from two limitations: 1) they solely focus on the gradient mapping criterion and fail to mat… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.