-
A Unified Image Preprocessing Framework For Image Compression
Authors:
Moqi Zhang,
Weihui Deng,
Xiaocheng Li
Abstract:
With the development of streaming media technology, increasing communication relies on sound and visual information, which puts a massive burden on online media. Data compression becomes increasingly important to reduce the volume of data transmission and storage. To further improve the efficiency of image compression, researchers utilize various image processing methods to compensate for the limi…
▽ More
With the development of streaming media technology, increasing communication relies on sound and visual information, which puts a massive burden on online media. Data compression becomes increasingly important to reduce the volume of data transmission and storage. To further improve the efficiency of image compression, researchers utilize various image processing methods to compensate for the limitations of conventional codecs and advanced learning-based compression methods. Instead of modifying the image compression oriented approaches, we propose a unified image compression preprocessing framework, called Kuchen, which aims to further improve the performance of existing codecs. The framework consists of a hybrid data labeling system along with a learning-based backbone to simulate personalized preprocessing. As far as we know, this is the first exploration of setting a unified preprocessing benchmark in image compression tasks. Results demonstrate that the modern codecs optimized by our unified preprocessing framework constantly improve the efficiency of the state-of-the-art compression.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Combining deep learning and crowdsourcing geo-images to predict housing quality in rural China
Authors:
Weipan Xu,
Yu Gu,
Yifan Chen,
Yongtian Wang,
Weihuan Deng,
Xun Li
Abstract:
Housing quality is an essential proxy for regional wealth, security and health. Understanding the distribution of housing quality is crucial for unveiling rural development status and providing political proposals. However,present rural house quality data highly depends on a top-down, time-consuming survey at the national or provincial level but fails to unpack the housing quality at the village l…
▽ More
Housing quality is an essential proxy for regional wealth, security and health. Understanding the distribution of housing quality is crucial for unveiling rural development status and providing political proposals. However,present rural house quality data highly depends on a top-down, time-consuming survey at the national or provincial level but fails to unpack the housing quality at the village level. To fill the gap between accurately depicting rural housing quality conditions and deficient data,we collect massive rural images and invite users to assess their housing quality at scale. Furthermore, a deep learning framework is proposed to automatically and efficiently predict housing quality based on crowd-sourcing rural images.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
New self-consistent effective one-body theory for spinless binaries based on the post-Minkowskian approximation
Authors:
Jiliang Jing,
Sheng Long,
Weike Deng,
Mengjie Wang,
Jieci Wang
Abstract:
The effective one-body theories, introduced by Buonanno and Damour, are novel approaches to constructing a gravitational waveform template. By taking a gauge in which $ψ_{1}^{B}$ and $ψ_{3}^{B}$ vanish, we find a decoupled equation with separable variables for $ψ^{B}_{4}$ for gravitational perturbation in the effective metric obtained in the post-Minkowskian approximation. Furthermore, we set up a…
▽ More
The effective one-body theories, introduced by Buonanno and Damour, are novel approaches to constructing a gravitational waveform template. By taking a gauge in which $ψ_{1}^{B}$ and $ψ_{3}^{B}$ vanish, we find a decoupled equation with separable variables for $ψ^{B}_{4}$ for gravitational perturbation in the effective metric obtained in the post-Minkowskian approximation. Furthermore, we set up a new self-consistent effective one-body theory for spinless binaries, which can be applicable to any post-Minkowskian orders. This theory not only releases the assumption that $v/c$ should be a small quantity but also resolves the contradiction that the Hamiltonian, radiation-reaction force, and waveform are constructed from different physical models in the effective one-body theory with the post-Newtonian approximation. Compared with our previous theory (Science China, 65, 260411, (2022)), the computational effort for the radiation-reaction force and waveform in this new theory will be tremendously reduced.
△ Less
Submitted 10 August, 2022; v1 submitted 3 August, 2022;
originally announced August 2022.
-
Learn From All: Erasing Attention Consistency for Noisy Label Facial Expression Recognition
Authors:
Yuhang Zhang,
Chengrui Wang,
Xu Ling,
Weihong Deng
Abstract:
Noisy label Facial Expression Recognition (FER) is more challenging than traditional noisy label classification tasks due to the inter-class similarity and the annotation ambiguity. Recent works mainly tackle this problem by filtering out large-loss samples. In this paper, we explore dealing with noisy labels from a new feature-learning perspective. We find that FER models remember noisy samples b…
▽ More
Noisy label Facial Expression Recognition (FER) is more challenging than traditional noisy label classification tasks due to the inter-class similarity and the annotation ambiguity. Recent works mainly tackle this problem by filtering out large-loss samples. In this paper, we explore dealing with noisy labels from a new feature-learning perspective. We find that FER models remember noisy samples by focusing on a part of the features that can be considered related to the noisy labels instead of learning from the whole features that lead to the latent truth. Inspired by that, we propose a novel Erasing Attention Consistency (EAC) method to suppress the noisy samples during the training process automatically. Specifically, we first utilize the flip semantic consistency of facial images to design an imbalanced framework. We then randomly erase input images and use flip attention consistency to prevent the model from focusing on a part of the features. EAC significantly outperforms state-of-the-art noisy label FER methods and generalizes well to other tasks with a large number of classes like CIFAR100 and Tiny-ImageNet. The code is available at https://github.com/zyh-uaiaaaa/Erasing-Attention-Consistency.
△ Less
Submitted 20 September, 2022; v1 submitted 21 July, 2022;
originally announced July 2022.
-
DH-AUG: DH Forward Kinematics Model Driven Augmentation for 3D Human Pose Estimation
Authors:
Linzhi Huang,
Jiahao Liang,
Weihong Deng
Abstract:
Due to the lack of diversity of datasets, the generalization ability of the pose estimator is poor. To solve this problem, we propose a pose augmentation solution via DH forward kinematics model, which we call DH-AUG. We observe that the previous work is all based on single-frame pose augmentation, if it is directly applied to video pose estimator, there will be several previously ignored problems…
▽ More
Due to the lack of diversity of datasets, the generalization ability of the pose estimator is poor. To solve this problem, we propose a pose augmentation solution via DH forward kinematics model, which we call DH-AUG. We observe that the previous work is all based on single-frame pose augmentation, if it is directly applied to video pose estimator, there will be several previously ignored problems: (i) angle ambiguity in bone rotation (multiple solutions); (ii) the generated skeleton video lacks movement continuity. To solve these problems, we propose a special generator based on DH forward kinematics model, which is called DH-generator. Extensive experiments demonstrate that DH-AUG can greatly increase the generalization ability of the video pose estimator. In addition, when applied to a single-frame 3D pose estimator, our method outperforms the previous best pose augmentation method. The source code has been released at https://github.com/hlz0606/DH-AUG-DH-Forward-Kinematics-Model-Driven-Augmentation-for-3D-Human-Pose-Estimation.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
Exploring Disentangled Content Information for Face Forgery Detection
Authors:
Jiahao Liang,
Huafeng Shi,
Weihong Deng
Abstract:
Convolutional neural network based face forgery detection methods have achieved remarkable results during training, but struggled to maintain comparable performance during testing. We observe that the detector is prone to focus more on content information than artifact traces, suggesting that the detector is sensitive to the intrinsic bias of the dataset, which leads to severe overfitting. Motivat…
▽ More
Convolutional neural network based face forgery detection methods have achieved remarkable results during training, but struggled to maintain comparable performance during testing. We observe that the detector is prone to focus more on content information than artifact traces, suggesting that the detector is sensitive to the intrinsic bias of the dataset, which leads to severe overfitting. Motivated by this key observation, we design an easily embeddable disentanglement framework for content information removal, and further propose a Content Consistency Constraint (C2C) and a Global Representation Contrastive Constraint (GRCC) to enhance the independence of disentangled features. Furthermore, we cleverly construct two unbalanced datasets to investigate the impact of the content bias. Extensive visualizations and experiments demonstrate that our framework can not only ignore the interference of content information, but also guide the detector to mine suspicious artifact traces and achieve competitive performance.
△ Less
Submitted 19 July, 2022;
originally announced July 2022.
-
On the Strong Correlation Between Model Invariance and Generalization
Authors:
Weijian Deng,
Stephen Gould,
Liang Zheng
Abstract:
Generalization and invariance are two essential properties of any machine learning model. Generalization captures a model's ability to classify unseen data while invariance measures consistency of model predictions on transformations of the data. Existing research suggests a positive relationship: a model generalizing well should be invariant to certain visual factors. Building on this qualitative…
▽ More
Generalization and invariance are two essential properties of any machine learning model. Generalization captures a model's ability to classify unseen data while invariance measures consistency of model predictions on transformations of the data. Existing research suggests a positive relationship: a model generalizing well should be invariant to certain visual factors. Building on this qualitative implication we make two contributions. First, we introduce effective invariance (EI), a simple and reasonable measure of model invariance which does not rely on image labels. Given predictions on a test image and its transformed version, EI measures how well the predictions agree and with what level of confidence. Second, using invariance scores computed by EI, we perform large-scale quantitative correlation studies between generalization and invariance, focusing on rotation and grayscale transformations. From a model-centric view, we observe generalization and invariance of different models exhibit a strong linear relationship, on both in-distribution and out-of-distribution datasets. From a dataset-centric view, we find a certain model's accuracy and invariance linearly correlated on different test sets. Apart from these major findings, other minor but interesting insights are also discussed.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Deep Learning for Finger Vein Recognition: A Brief Survey of Recent Trend
Authors:
Renye Zhang,
Yimin Yin,
Wanxia Deng,
Chen Li,
Jinghua Zhang
Abstract:
Finger vein image recognition technology plays an important role in biometric recognition and has been successfully applied in many fields. Because veins are buried beneath the skin tissue, finger vein image recognition has an unparalleled advantage, which is not easily disturbed by external factors. This review summarizes 46 papers about deep learning for finger vein image recognition from 2017 t…
▽ More
Finger vein image recognition technology plays an important role in biometric recognition and has been successfully applied in many fields. Because veins are buried beneath the skin tissue, finger vein image recognition has an unparalleled advantage, which is not easily disturbed by external factors. This review summarizes 46 papers about deep learning for finger vein image recognition from 2017 to 2021. These papers are summarized according to the tasks of deep neural networks. Besides, we present the challenges and potential development directions of finger vein image recognition.
△ Less
Submitted 5 July, 2022;
originally announced July 2022.
-
Identifying Rhythmic Patterns for Face Forgery Detection and Categorization
Authors:
Jiahao Liang,
Weihong Deng
Abstract:
With the emergence of GAN, face forgery technologies have been heavily abused. Achieving accurate face forgery detection is imminent. Inspired by remote photoplethysmography (rPPG) that PPG signal corresponds to the periodic change of skin color caused by heartbeat in face videos, we observe that despite the inevitable loss of PPG signal during the forgery process, there is still a mixture of PPG…
▽ More
With the emergence of GAN, face forgery technologies have been heavily abused. Achieving accurate face forgery detection is imminent. Inspired by remote photoplethysmography (rPPG) that PPG signal corresponds to the periodic change of skin color caused by heartbeat in face videos, we observe that despite the inevitable loss of PPG signal during the forgery process, there is still a mixture of PPG signals in the forgery video with a unique rhythmic pattern depending on its generation method. Motivated by this key observation, we propose a framework for face forgery detection and categorization consisting of: 1) a Spatial-Temporal Filtering Network (STFNet) for PPG signals filtering, and 2) a Spatial-Temporal Interaction Network (STINet) for constraint and interaction of PPG signals. Moreover, with insight into the generation of forgery methods, we further propose intra-source and inter-source blending to boost the performance of the framework. Overall, extensive experiments have proved the superiority of our method.
△ Less
Submitted 4 July, 2022;
originally announced July 2022.
-
Global existence and optimal decay rate of weak solutions to the co-rotation Hooke dumbbell model
Authors:
Wenjie Deng,
Zhaonan Luo,
Zhaoyang Yin
Abstract:
In this paper, we mainly study global existence and optimal $L^2$ decay rate of weak solutions to the co-rotation Hooke dumbbell model. This micro-macro model is a coupling of the Navier-Stokes equation with a nonlinear Fokker-Planck equation. Based on the defect measure propagation method, we prove that the co-rotation Hooke dumbbell model admits a global weak solution provided the initial data u…
▽ More
In this paper, we mainly study global existence and optimal $L^2$ decay rate of weak solutions to the co-rotation Hooke dumbbell model. This micro-macro model is a coupling of the Navier-Stokes equation with a nonlinear Fokker-Planck equation. Based on the defect measure propagation method, we prove that the co-rotation Hooke dumbbell model admits a global weak solution provided the initial data under different integrable conditions. Moreover, we obtain optimal time decay rate in $L^2$ for the weak solutions obtained by the Fourier splitting method.
△ Less
Submitted 20 December, 2023; v1 submitted 22 June, 2022;
originally announced June 2022.
-
I^2R-Net: Intra- and Inter-Human Relation Network for Multi-Person Pose Estimation
Authors:
Yiwei Ding,
Wenjin Deng,
Yinglin Zheng,
Pengfei Liu,
Meihong Wang,
Xuan Cheng,
Jianmin Bao,
Dong Chen,
Ming Zeng
Abstract:
In this paper, we present the Intra- and Inter-Human Relation Networks (I^2R-Net) for Multi-Person Pose Estimation. It involves two basic modules. First, the Intra-Human Relation Module operates on a single person and aims to capture Intra-Human dependencies. Second, the Inter-Human Relation Module considers the relation between multiple instances and focuses on capturing Inter-Human interactions.…
▽ More
In this paper, we present the Intra- and Inter-Human Relation Networks (I^2R-Net) for Multi-Person Pose Estimation. It involves two basic modules. First, the Intra-Human Relation Module operates on a single person and aims to capture Intra-Human dependencies. Second, the Inter-Human Relation Module considers the relation between multiple instances and focuses on capturing Inter-Human interactions. The Inter-Human Relation Module can be designed very lightweight by reducing the resolution of feature map, yet learn useful relation information to significantly boost the performance of the Intra-Human Relation Module. Even without bells and whistles, our method can compete or outperform current competition winners. We conduct extensive experiments on COCO, CrowdPose, and OCHuman datasets. The results demonstrate that the proposed model surpasses all the state-of-the-art methods. Concretely, the proposed method achieves 77.4% AP on CrowPose dataset and 67.8% AP on OCHuman dataset respectively, outperforming existing methods by a large margin. Additionally, the ablation study and visualization analysis also prove the effectiveness of our model.
△ Less
Submitted 27 June, 2022; v1 submitted 22 June, 2022;
originally announced June 2022.
-
A Neural Corpus Indexer for Document Retrieval
Authors:
Yujing Wang,
Yingyan Hou,
Haonan Wang,
Ziming Miao,
Shibin Wu,
Hao Sun,
Qi Chen,
Yuqing Xia,
Chengmin Chi,
Guoshuai Zhao,
Zheng Liu,
Xing Xie,
Hao Allen Sun,
Weiwei Deng,
Qi Zhang,
Mao Yang
Abstract:
Current state-of-the-art document retrieval solutions mainly follow an index-retrieve paradigm, where the index is hard to be directly optimized for the final retrieval target. In this paper, we aim to show that an end-to-end deep neural network unifying training and indexing stages can significantly improve the recall performance of traditional methods. To this end, we propose Neural Corpus Index…
▽ More
Current state-of-the-art document retrieval solutions mainly follow an index-retrieve paradigm, where the index is hard to be directly optimized for the final retrieval target. In this paper, we aim to show that an end-to-end deep neural network unifying training and indexing stages can significantly improve the recall performance of traditional methods. To this end, we propose Neural Corpus Indexer (NCI), a sequence-to-sequence network that generates relevant document identifiers directly for a designated query. To optimize the recall performance of NCI, we invent a prefix-aware weight-adaptive decoder architecture, and leverage tailored techniques including query generation, semantic document identifiers, and consistency-based regularization. Empirical studies demonstrated the superiority of NCI on two commonly used academic benchmarks, achieving +21.4% and +16.8% relative enhancement for Recall@1 on NQ320k dataset and R-Precision on TriviaQA dataset, respectively, compared to the best baseline method.
△ Less
Submitted 12 February, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
A sharp $α$-robust $L1$ scheme on graded meshes for two-dimensional time tempered fractional Fokker-Planck equation
Authors:
Can Wang,
Weihua Deng,
Xiangong Tang
Abstract:
In this paper, we are concerned with the numerical solution for the two-dimensional time fractional Fokker-Planck equation with tempered fractional derivative of order $α$. Although some of its variants are considered in many recent numerical analysis papers, there are still some significant differences. Here we first provide the regularity estimates of the solution. And then a modified $L$1 schem…
▽ More
In this paper, we are concerned with the numerical solution for the two-dimensional time fractional Fokker-Planck equation with tempered fractional derivative of order $α$. Although some of its variants are considered in many recent numerical analysis papers, there are still some significant differences. Here we first provide the regularity estimates of the solution. And then a modified $L$1 scheme inspired by the middle rectangle quadrature formula on graded meshes is employed to compensate for the singularity of the solution at $t\rightarrow 0^{+}$, while the five-point difference scheme is used in space. Stability and convergence are proved in the sence of $L^{\infty}$ norm, then a sharp error estimate $\mathscr{O}(τ^{\min\{2-α, rα\}})$ is derived on graded meshes. Furthermore, unlike the bounds proved in the previous works, the constant multipliers in our analysis do not blow up as the Caputo fractional derivative $α$ approaches the classical value of 1. Finally, we perform the numerical experiments to verify the effectiveness and convergence order of the presented algorithms.
△ Less
Submitted 7 June, 2022; v1 submitted 31 May, 2022;
originally announced May 2022.
-
Local discontinuous Galerkin method for the Backward Feynman-Kac Equation
Authors:
Dong Liu,
Weihua Deng
Abstract:
Anomalous diffusions are ubiquitous in nature, whose functional distributions are governed by the backward Feynman-Kac equation. In this paper, the local discontinuous Galerkin (LDG) method is used to solve the 2D backward Feynman-Kac equation in a rectangular domain. The spatial semi-discrete LDG scheme of the equivalent form (obtained by Laplace transform) of the original equation is established…
▽ More
Anomalous diffusions are ubiquitous in nature, whose functional distributions are governed by the backward Feynman-Kac equation. In this paper, the local discontinuous Galerkin (LDG) method is used to solve the 2D backward Feynman-Kac equation in a rectangular domain. The spatial semi-discrete LDG scheme of the equivalent form (obtained by Laplace transform) of the original equation is established. After discussing the properties of the fractional substantial calculus, the stability and optimal convergence rates $O(h^{k+1})$ of the semi-discrete scheme are proved by choosing an appropriate generalized numerical flux. The $L1$ scheme on the graded meshes is used to deal with the weak singularity of the solution near the initial time. Based on the theoretical results of a semi-discrete scheme, we investigate the stability and convergence of the fully discrete scheme, which shows the optimal convergence rates $O(h^{k+1}+τ^{\min\{2-α,γδ\}})$. Numerical experiments are carried out to show the efficiency and accuracy of the proposed scheme. In addition, we also verify the effect of the central numerical flux on the convergence rates and the condition number of the coefficient matrix.
△ Less
Submitted 31 May, 2022;
originally announced May 2022.
-
Boosting Facial Expression Recognition by A Semi-Supervised Progressive Teacher
Authors:
Jing Jiang,
Weihong Deng
Abstract:
In this paper, we aim to improve the performance of in-the-wild Facial Expression Recognition (FER) by exploiting semi-supervised learning. Large-scale labeled data and deep learning methods have greatly improved the performance of image recognition. However, the performance of FER is still not ideal due to the lack of training data and incorrect annotations (e.g., label noises). Among existing in…
▽ More
In this paper, we aim to improve the performance of in-the-wild Facial Expression Recognition (FER) by exploiting semi-supervised learning. Large-scale labeled data and deep learning methods have greatly improved the performance of image recognition. However, the performance of FER is still not ideal due to the lack of training data and incorrect annotations (e.g., label noises). Among existing in-the-wild FER datasets, reliable ones contain insufficient data to train robust deep models while large-scale ones are annotated in lower quality. To address this problem, we propose a semi-supervised learning algorithm named Progressive Teacher (PT) to utilize reliable FER datasets as well as large-scale unlabeled expression images for effective training. On the one hand, PT introduces semi-supervised learning method to relieve the shortage of data in FER. On the other hand, it selects useful labeled training samples automatically and progressively to alleviate label noise. PT uses selected clean labeled data for computing the supervised classification loss and unlabeled data for unsupervised consistency loss. Experiments on widely-used databases RAF-DB and FERPlus validate the effectiveness of our method, which achieves state-of-the-art performance with accuracy of 89.57% on RAF-DB. Additionally, when the synthetic noise rate reaches even 30%, the performance of our PT algorithm only degrades by 4.37%.
△ Less
Submitted 28 May, 2022;
originally announced May 2022.
-
Cycle Label-Consistent Networks for Unsupervised Domain Adaptation
Authors:
Mei Wang,
Weihong Deng
Abstract:
Domain adaptation aims to leverage a labeled source domain to learn a classifier for the unlabeled target domain with a different distribution. Previous methods mostly match the distribution between two domains by global or class alignment. However, global alignment methods cannot achieve a fine-grained class-to-class overlap; class alignment methods supervised by pseudo-labels cannot guarantee th…
▽ More
Domain adaptation aims to leverage a labeled source domain to learn a classifier for the unlabeled target domain with a different distribution. Previous methods mostly match the distribution between two domains by global or class alignment. However, global alignment methods cannot achieve a fine-grained class-to-class overlap; class alignment methods supervised by pseudo-labels cannot guarantee their reliability. In this paper, we propose a simple yet efficient domain adaptation method, i.e. Cycle Label-Consistent Network (CLCN), by exploiting the cycle consistency of classification label, which applies dual cross-domain nearest centroid classification procedures to generate a reliable self-supervised signal for the discrimination in the target domain. The cycle label-consistent loss reinforces the consistency between ground-truth labels and pseudo-labels of source samples leading to statistically similar latent representations between source and target domains. This new loss can easily be added to any existing classification network with almost no computational overhead. We demonstrate the effectiveness of our approach on MNIST-USPS-SVHN, Office-31, Office-Home and Image CLEF-DA benchmarks. Results validate that the proposed method can alleviate the negative influence of falsely-labeled samples and learn more discriminative features, leading to the absolute improvement over source-only model by 9.4% on Office-31 and 6.3% on Image CLEF-DA.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
Deep face recognition with clustering based domain adaptation
Authors:
Mei Wang,
Weihong Deng
Abstract:
Despite great progress in face recognition tasks achieved by deep convolution neural networks (CNNs), these models often face challenges in real world tasks where training images gathered from Internet are different from test images because of different lighting condition, pose and image quality. These factors increase domain discrepancy between training (source domain) and testing (target domain)…
▽ More
Despite great progress in face recognition tasks achieved by deep convolution neural networks (CNNs), these models often face challenges in real world tasks where training images gathered from Internet are different from test images because of different lighting condition, pose and image quality. These factors increase domain discrepancy between training (source domain) and testing (target domain) database and make the learnt models degenerate in application. Meanwhile, due to lack of labeled target data, directly fine-tuning the pre-learnt models becomes intractable and impractical. In this paper, we propose a new clustering-based domain adaptation method designed for face recognition task in which the source and target domain do not share any classes. Our method effectively learns the discriminative target feature by aligning the feature domain globally, and, at the meantime, distinguishing the target clusters locally. Specifically, it first learns a more reliable representation for clustering by minimizing global domain discrepancy to reduce domain gaps, and then applies simplified spectral clustering method to generate pseudo-labels in the domain-invariant feature space, and finally learns discriminative target representation. Comprehensive experiments on widely-used GBU, IJB-A/B/C and RFW databases clearly demonstrate the effectiveness of our newly proposed approach. State-of-the-art performance of GBU data set is achieved by only unsupervised adaptation from the target training data.
△ Less
Submitted 27 May, 2022;
originally announced May 2022.
-
SFace: Sigmoid-Constrained Hypersphere Loss for Robust Face Recognition
Authors:
Yaoyao Zhong,
Weihong Deng,
Jiani Hu,
Dongyue Zhao,
Xian Li,
Dongchao Wen
Abstract:
Deep face recognition has achieved great success due to large-scale training databases and rapidly developing loss functions. The existing algorithms devote to realizing an ideal idea: minimizing the intra-class distance and maximizing the inter-class distance. However, they may neglect that there are also low quality training images which should not be optimized in this strict way. Considering th…
▽ More
Deep face recognition has achieved great success due to large-scale training databases and rapidly developing loss functions. The existing algorithms devote to realizing an ideal idea: minimizing the intra-class distance and maximizing the inter-class distance. However, they may neglect that there are also low quality training images which should not be optimized in this strict way. Considering the imperfection of training databases, we propose that intra-class and inter-class objectives can be optimized in a moderate way to mitigate overfitting problem, and further propose a novel loss function, named sigmoid-constrained hypersphere loss (SFace). Specifically, SFace imposes intra-class and inter-class constraints on a hypersphere manifold, which are controlled by two sigmoid gradient re-scale functions respectively. The sigmoid curves precisely re-scale the intra-class and inter-class gradients so that training samples can be optimized to some degree. Therefore, SFace can make a better balance between decreasing the intra-class distances for clean examples and preventing overfitting to the label noise, and contributes more robust deep face recognition models. Extensive experiments of models trained on CASIA-WebFace, VGGFace2, and MS-Celeb-1M databases, and evaluated on several face recognition benchmarks, such as LFW, MegaFace and IJB-C databases, have demonstrated the superiority of SFace.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
OPOM: Customized Invisible Cloak towards Face Privacy Protection
Authors:
Yaoyao Zhong,
Weihong Deng
Abstract:
While convenient in daily life, face recognition technologies also raise privacy concerns for regular users on the social media since they could be used to analyze face images and videos, efficiently and surreptitiously without any security restrictions. In this paper, we investigate the face privacy protection from a technology standpoint based on a new type of customized cloak, which can be appl…
▽ More
While convenient in daily life, face recognition technologies also raise privacy concerns for regular users on the social media since they could be used to analyze face images and videos, efficiently and surreptitiously without any security restrictions. In this paper, we investigate the face privacy protection from a technology standpoint based on a new type of customized cloak, which can be applied to all the images of a regular user, to prevent malicious face recognition systems from uncovering their identity. Specifically, we propose a new method, named one person one mask (OPOM), to generate person-specific (class-wise) universal masks by optimizing each training sample in the direction away from the feature subspace of the source identity. To make full use of the limited training images, we investigate several modeling methods, including affine hulls, class centers, and convex hulls, to obtain a better description of the feature subspace of source identities. The effectiveness of the proposed method is evaluated on both common and celebrity datasets against black-box face recognition models with different loss functions and network architectures. In addition, we discuss the advantages and potential problems of the proposed method. In particular, we conduct an application study on the privacy protection of a video dataset, Sherlock, to demonstrate the potential practical usage of the proposed method. Datasets and code are available at https://github.com/zhongyy/OPOM.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Numerical method for the Fokker-Planck equation of Brownian motion subordinated by inverse tempered stable subordinator with drift
Authors:
Xiangong Tang,
Can Wang,
Weihua Deng
Abstract:
In this work, based on the complete Bernstein function, we propose a generalized regularity analysis including maximal $\mathrm{L}^p$ regularity for the Fokker--Planck equation, which governs the subordinated Brownian motion with the inverse tempered stable subordinator that has a drift. We derive a generalized time--stepping finite element scheme based on the backward Euler convolution quadrature…
▽ More
In this work, based on the complete Bernstein function, we propose a generalized regularity analysis including maximal $\mathrm{L}^p$ regularity for the Fokker--Planck equation, which governs the subordinated Brownian motion with the inverse tempered stable subordinator that has a drift. We derive a generalized time--stepping finite element scheme based on the backward Euler convolution quadrature, and the optimal-order convergence of the numerical solutions is established using the proven solution regularity. Further, the analysis is generalized to more general diffusion equations. Numerical experiments are provided to support the theoretical results.
△ Less
Submitted 7 June, 2022; v1 submitted 22 May, 2022;
originally announced May 2022.
-
Oracle-MNIST: a Dataset of Oracle Characters for Benchmarking Machine Learning Algorithms
Authors:
Mei Wang,
Weihong Deng
Abstract:
We introduce the Oracle-MNIST dataset, comprising of 28$\times $28 grayscale images of 30,222 ancient characters from 10 categories, for benchmarking pattern classification, with particular challenges on image noise and distortion. The training set totally consists of 27,222 images, and the test set contains 300 images per class. Oracle-MNIST shares the same data format with the original MNIST dat…
▽ More
We introduce the Oracle-MNIST dataset, comprising of 28$\times $28 grayscale images of 30,222 ancient characters from 10 categories, for benchmarking pattern classification, with particular challenges on image noise and distortion. The training set totally consists of 27,222 images, and the test set contains 300 images per class. Oracle-MNIST shares the same data format with the original MNIST dataset, allowing for direct compatibility with all existing classifiers and systems, but it constitutes a more challenging classification task than MNIST. The images of ancient characters suffer from 1) extremely serious and unique noises caused by three-thousand years of burial and aging and 2) dramatically variant writing styles by ancient Chinese, which all make them realistic for machine learning research. The dataset is freely available at https://github.com/wm-bupt/oracle-mnist.
△ Less
Submitted 21 January, 2024; v1 submitted 19 May, 2022;
originally announced May 2022.
-
Exploring How Machine Learning Practitioners (Try To) Use Fairness Toolkits
Authors:
Wesley Hanwen Deng,
Manish Nagireddy,
Michelle Seng Ah Lee,
Jatinder Singh,
Zhiwei Steven Wu,
Kenneth Holstein,
Haiyi Zhu
Abstract:
Recent years have seen the development of many open-source ML fairness toolkits aimed at helping ML practitioners assess and address unfairness in their systems. However, there has been little research investigating how ML practitioners actually use these toolkits in practice. In this paper, we conducted the first in-depth empirical exploration of how industry practitioners (try to) work with exis…
▽ More
Recent years have seen the development of many open-source ML fairness toolkits aimed at helping ML practitioners assess and address unfairness in their systems. However, there has been little research investigating how ML practitioners actually use these toolkits in practice. In this paper, we conducted the first in-depth empirical exploration of how industry practitioners (try to) work with existing fairness toolkits. In particular, we conducted think-aloud interviews to understand how participants learn about and use fairness toolkits, and explored the generality of our findings through an anonymous online survey. We identified several opportunities for fairness toolkits to better address practitioner needs and scaffold them in using toolkits effectively and responsibly. Based on these findings, we highlight implications for the design of future open-source fairness toolkits that can support practitioners in better contextualizing, communicating, and collaborating around ML fairness efforts.
△ Less
Submitted 10 January, 2023; v1 submitted 13 May, 2022;
originally announced May 2022.
-
Beyond General Purpose Machine Translation: The Need for Context-specific Empirical Research to Design for Appropriate User Trust
Authors:
Wesley Hanwen Deng,
Nikita Mehandru,
Samantha Robertson,
Niloufar Salehi
Abstract:
Machine Translation (MT) has the potential to help people overcome language barriers and is widely used in high-stakes scenarios, such as in hospitals. However, in order to use MT reliably and safely, users need to understand when to trust MT outputs and how to assess the quality of often imperfect translation results. In this paper, we discuss research directions to support users to calibrate tru…
▽ More
Machine Translation (MT) has the potential to help people overcome language barriers and is widely used in high-stakes scenarios, such as in hospitals. However, in order to use MT reliably and safely, users need to understand when to trust MT outputs and how to assess the quality of often imperfect translation results. In this paper, we discuss research directions to support users to calibrate trust in MT systems. We share findings from an empirical study in which we conducted semi-structured interviews with 20 clinicians to understand how they communicate with patients across language barriers, and if and how they use MT systems. Based on our findings, we advocate for empirical research on how MT systems are used in practice as an important first step to addressing the challenges in building appropriate trust between users and MT tools.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Unsupervised Structure-Texture Separation Network for Oracle Character Recognition
Authors:
Mei Wang,
Weihong Deng,
Cheng-Lin Liu
Abstract:
Oracle bone script is the earliest-known Chinese writing system of the Shang dynasty and is precious to archeology and philology. However, real-world scanned oracle data are rare and few experts are available for annotation which make the automatic recognition of scanned oracle characters become a challenging task. Therefore, we aim to explore unsupervised domain adaptation to transfer knowledge f…
▽ More
Oracle bone script is the earliest-known Chinese writing system of the Shang dynasty and is precious to archeology and philology. However, real-world scanned oracle data are rare and few experts are available for annotation which make the automatic recognition of scanned oracle characters become a challenging task. Therefore, we aim to explore unsupervised domain adaptation to transfer knowledge from handprinted oracle data, which are easy to acquire, to scanned domain. We propose a structure-texture separation network (STSN), which is an end-to-end learning framework for joint disentanglement, transformation, adaptation and recognition. First, STSN disentangles features into structure (glyph) and texture (noise) components by generative models, and then aligns handprinted and scanned data in structure feature space such that the negative influence caused by serious noises can be avoided when adapting. Second, transformation is achieved via swapping the learned textures across domains and a classifier for final classification is trained to predict the labels of the transformed scanned characters. This not only guarantees the absolute separation, but also enhances the discriminative ability of the learned features. Extensive experiments on Oracle-241 dataset show that STSN outperforms other adaptation methods and successfully improves recognition performance on scanned data even when they are contaminated by long burial and careless excavation.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Meta Balanced Network for Fair Face Recognition
Authors:
Mei Wang,
Yaobin Zhang,
Weihong Deng
Abstract:
Although deep face recognition has achieved impressive progress in recent years, controversy has arisen regarding discrimination based on skin tone, questioning their deployment into real-world scenarios. In this paper, we aim to systematically and scientifically study this bias from both data and algorithm aspects. First, using the dermatologist approved Fitzpatrick Skin Type classification syste…
▽ More
Although deep face recognition has achieved impressive progress in recent years, controversy has arisen regarding discrimination based on skin tone, questioning their deployment into real-world scenarios. In this paper, we aim to systematically and scientifically study this bias from both data and algorithm aspects. First, using the dermatologist approved Fitzpatrick Skin Type classification system and Individual Typology Angle, we contribute a benchmark called Identity Shades (IDS) database, which effectively quantifies the degree of the bias with respect to skin tone in existing face recognition algorithms and commercial APIs. Further, we provide two skin-tone aware training datasets, called BUPT-Globalface dataset and BUPT-Balancedface dataset, to remove bias in training data. Finally, to mitigate the algorithmic bias, we propose a novel meta-learning algorithm, called Meta Balanced Network (MBN), which learns adaptive margins in large margin loss such that the model optimized by this loss can perform fairly across people with different skin tones. To determine the margins, our method optimizes a meta skewness loss on a clean and unbiased meta set and utilizes backward-on-backward automatic differentiation to perform a second order gradient descent step on the current margins. Extensive experiments show that MBN successfully mitigates bias and learns more balanced performance for people with different skin tones in face recognition. The proposed datasets are available at http://www.whdeng.cn/RFW/index.html.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Towards a Unified Framework for Uncertainty-aware Nonlinear Variable Selection with Theoretical Guarantees
Authors:
Wenying Deng,
Beau Coker,
Rajarshi Mukherjee,
Jeremiah Zhe Liu,
Brent A. Coull
Abstract:
We develop a simple and unified framework for nonlinear variable selection that incorporates uncertainty in the prediction function and is compatible with a wide range of machine learning models (e.g., tree ensembles, kernel methods, neural networks, etc). In particular, for a learned nonlinear model $f(\mathbf{x})$, we consider quantifying the importance of an input variable $\mathbf{x}^j$ using…
▽ More
We develop a simple and unified framework for nonlinear variable selection that incorporates uncertainty in the prediction function and is compatible with a wide range of machine learning models (e.g., tree ensembles, kernel methods, neural networks, etc). In particular, for a learned nonlinear model $f(\mathbf{x})$, we consider quantifying the importance of an input variable $\mathbf{x}^j$ using the integrated partial derivative $Ψ_j = \Vert \frac{\partial}{\partial \mathbf{x}^j} f(\mathbf{x})\Vert^2_{P_\mathcal{X}}$. We then (1) provide a principled approach for quantifying variable selection uncertainty by deriving its posterior distribution, and (2) show that the approach is generalizable even to non-differentiable models such as tree ensembles. Rigorous Bayesian nonparametric theorems are derived to guarantee the posterior consistency and asymptotic uncertainty of the proposed approach. Extensive simulations and experiments on healthcare benchmark datasets confirm that the proposed algorithm outperforms existing classic and recent variable selection methods.
△ Less
Submitted 27 May, 2022; v1 submitted 14 April, 2022;
originally announced April 2022.
-
Nth power root topological phases in Hermitian and non-Hermitian systems
Authors:
Wenyuan Deng,
Tian Chen,
Xiangdong Zhang
Abstract:
Constructing new topological phases is very important in both Hermitian and non-Hermitian systems because of their potential applications. Here we propose theoretically and demonstrate a general scheme experimentally to construct Nth power root (NPR) topological phases. Such a scheme is not only suitable for Hermitian systems, but also non-Hermitian systems. It is found that the robust degree of e…
▽ More
Constructing new topological phases is very important in both Hermitian and non-Hermitian systems because of their potential applications. Here we propose theoretically and demonstrate a general scheme experimentally to construct Nth power root (NPR) topological phases. Such a scheme is not only suitable for Hermitian systems, but also non-Hermitian systems. It is found that the robust degree of edge state in the Hermitian system becomes stronger and stronger with the increase of N. It tends to be a strongly surface localized form when N is large enough. In the non-Hermitian system, the skin effect becomes more apparent, and it approaches the ideal situation with the increase of N. This means that edge states and skin effects can be observed by taking different N. This scheme has been proved experimentally by designing circuits. Our work opens up a new way to engineer topological states according to the requirements, which is very important for developing topologically protected devices, such as topology sensing, switches, and so on.
△ Less
Submitted 12 April, 2022;
originally announced April 2022.
-
Observation of quadruple Weyl point in hybrid-Weyl phononic crystals
Authors:
Li Luo,
Weiyin Deng,
Yating Yang,
Mou Yan,
Jiuyang Lu,
Xueqin Huang,
Zhengyou Liu
Abstract:
The discovery of Weyl semimetals opens the door for searching topological semimetals in physical science. The Weyl points are generally recognized as conventional, quadratic, spin-1, and those of high topological charges. Here we report the observation of the quadruple Weyl point of charge 4, the highest topological charge a twofold degenerate node can carry. Besides the quadruple Weyl point, the…
▽ More
The discovery of Weyl semimetals opens the door for searching topological semimetals in physical science. The Weyl points are generally recognized as conventional, quadratic, spin-1, and those of high topological charges. Here we report the observation of the quadruple Weyl point of charge 4, the highest topological charge a twofold degenerate node can carry. Besides the quadruple Weyl point, the phononic semimetal also hosts conventional, quadratic, and spin-1 Weyl points, which stands as a system with yet the richest types of Weyl points. The quadruple-helicoid surface states, specific to the quadruple Weyl point, are demonstrated. The finding of the high-charge Weyl point enriches the knowledge of Weyl semimetals and may stimulate related researches in other systems, such as photonic, mechanical and cold atom systems.
△ Less
Submitted 28 March, 2022;
originally announced March 2022.
-
Measuring the severity of multi-collinearity in high dimensions
Authors:
Wei Q. Deng,
Radu V. Craiu,
Lei Sun
Abstract:
Multi-collinearity is a wide-spread phenomenon in modern statistical applications and when ignored, can negatively impact model selection and statistical inference. Classic tools and measures that were developed for "$n>p$" data are not applicable nor interpretable in the high-dimensional regime. Here we propose 1) new individualized measures that can be used to visualize patterns of multi-colline…
▽ More
Multi-collinearity is a wide-spread phenomenon in modern statistical applications and when ignored, can negatively impact model selection and statistical inference. Classic tools and measures that were developed for "$n>p$" data are not applicable nor interpretable in the high-dimensional regime. Here we propose 1) new individualized measures that can be used to visualize patterns of multi-collinearity, and subsequently 2) global measures to assess the overall burden of multi-collinearity without limiting the observed data dimensions. We applied these measures to genomic applications to investigate patterns of multi-collinearity in genetic variations across individuals with diverse ancestral backgrounds. The measures were able to visually distinguish genomic regions of excessive multi-collinearity and contrast the level of multi-collinearity between different continental populations.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
Domain Generalization via Shuffled Style Assembly for Face Anti-Spoofing
Authors:
Zhuo Wang,
Zezheng Wang,
Zitong Yu,
Weihong Deng,
Jiahong Li,
Tingting Gao,
Zhongyuan Wang
Abstract:
With diverse presentation attacks emerging continually, generalizable face anti-spoofing (FAS) has drawn growing attention. Most existing methods implement domain generalization (DG) on the complete representations. However, different image statistics may have unique properties for the FAS tasks. In this work, we separate the complete representation into content and style ones. A novel Shuffled St…
▽ More
With diverse presentation attacks emerging continually, generalizable face anti-spoofing (FAS) has drawn growing attention. Most existing methods implement domain generalization (DG) on the complete representations. However, different image statistics may have unique properties for the FAS tasks. In this work, we separate the complete representation into content and style ones. A novel Shuffled Style Assembly Network (SSAN) is proposed to extract and reassemble different content and style features for a stylized feature space. Then, to obtain a generalized representation, a contrastive learning strategy is developed to emphasize liveness-related style information while suppress the domain-specific one. Finally, the representations of the correct assemblies are used to distinguish between living and spoofing during the inferring. On the other hand, despite the decent performance, there still exists a gap between academia and industry, due to the difference in data quantity and distribution. Thus, a new large-scale benchmark for FAS is built up to further evaluate the performance of algorithms in reality. Both qualitative and quantitative results on existing and proposed benchmarks demonstrate the effectiveness of our methods. The codes will be available at https://github.com/wangzhuo2019/SSAN.
△ Less
Submitted 18 March, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.
-
Video Question Answering: Datasets, Algorithms and Challenges
Authors:
Yaoyao Zhong,
Junbin Xiao,
Wei Ji,
Yicong Li,
Weihong Deng,
Tat-Seng Chua
Abstract:
Video Question Answering (VideoQA) aims to answer natural language questions according to the given videos. It has earned increasing attention with recent research trends in joint vision and language understanding. Yet, compared with ImageQA, VideoQA is largely underexplored and progresses slowly. Although different algorithms have continually been proposed and shown success on different VideoQA d…
▽ More
Video Question Answering (VideoQA) aims to answer natural language questions according to the given videos. It has earned increasing attention with recent research trends in joint vision and language understanding. Yet, compared with ImageQA, VideoQA is largely underexplored and progresses slowly. Although different algorithms have continually been proposed and shown success on different VideoQA datasets, we find that there lacks a meaningful survey to categorize them, which seriously impedes its advancements. This paper thus provides a clear taxonomy and comprehensive analyses to VideoQA, focusing on the datasets, algorithms, and unique challenges. We then point out the research trend of studying beyond factoid QA to inference QA towards the cognition of video contents, Finally, we conclude some promising directions for future exploration.
△ Less
Submitted 2 November, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
A combined multiscale finite element method based on the LOD technique for the multiscale elliptic problems with singularities
Authors:
Kuokuo Zhang,
Weibing Deng,
Haijun Wu
Abstract:
In this paper, we construct a combined multiscale finite element method (MsFEM) using the Local Orthogonal Decomposition (LOD) technique to solve the multiscale problems which may have singularities in some special portions of the computational domain. For example, in the simulation of steady flow transporting through highly heterogeneous porous media driven by extraction wells, the singularities…
▽ More
In this paper, we construct a combined multiscale finite element method (MsFEM) using the Local Orthogonal Decomposition (LOD) technique to solve the multiscale problems which may have singularities in some special portions of the computational domain. For example, in the simulation of steady flow transporting through highly heterogeneous porous media driven by extraction wells, the singularities lie in the near-well regions. The basic idea of the combined method is to utilize the traditional finite element method (FEM) directly on a fine mesh of the problematic part of the domain and using the LOD-based MsFEM on a coarse mesh of the other part. The key point is how to define local correctors for the basis functions of the elements near the coarse and fine mesh interface, which require meticulous treatment. The proposed method takes advantages of the traditional FEM and the LOD-based MsFEM, which uses much less DOFs than the standard FEM and may be more accurate than the LOD-based MsFEM for problems with singularities. The error analysis is carried out for highly varying coefficients, without any assumptions on scale separation or periodicity. {Numerical examples with periodic and random highly oscillating coefficients}, as well as the multiscale problems on the L-shaped domain, and multiscale problems with high-contrast channels or well-singularities are presented to demonstrate the efficiency and accuracy of the proposed method.
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Interacting Contour Stochastic Gradient Langevin Dynamics
Authors:
Wei Deng,
Siqi Liang,
Botao Hao,
Guang Lin,
Faming Liang
Abstract:
We propose an interacting contour stochastic gradient Langevin dynamics (ICSGLD) sampler, an embarrassingly parallel multiple-chain contour stochastic gradient Langevin dynamics (CSGLD) sampler with efficient interactions. We show that ICSGLD can be theoretically more efficient than a single-chain CSGLD with an equivalent computational budget. We also present a novel random-field function, which f…
▽ More
We propose an interacting contour stochastic gradient Langevin dynamics (ICSGLD) sampler, an embarrassingly parallel multiple-chain contour stochastic gradient Langevin dynamics (CSGLD) sampler with efficient interactions. We show that ICSGLD can be theoretically more efficient than a single-chain CSGLD with an equivalent computational budget. We also present a novel random-field function, which facilitates the estimation of self-adapting parameters in big data and obtains free mode explorations. Empirically, we compare the proposed algorithm with popular benchmark methods for posterior sampling. The numerical results show a great potential of ICSGLD for large-scale uncertainty estimation tasks.
△ Less
Submitted 20 February, 2022;
originally announced February 2022.
-
HousE: Knowledge Graph Embedding with Householder Parameterization
Authors:
Rui Li,
Jianan Zhao,
Chaozhuo Li,
Di He,
Yiqi Wang,
Yuming Liu,
Hao Sun,
Senzhang Wang,
Weiwei Deng,
Yanming Shen,
Xing Xie,
Qi Zhang
Abstract:
The effectiveness of knowledge graph embedding (KGE) largely depends on the ability to model intrinsic relation patterns and mapping properties. However, existing approaches can only capture some of them with insufficient modeling capacity. In this work, we propose a more powerful KGE framework named HousE, which involves a novel parameterization based on two kinds of Householder transformations:…
▽ More
The effectiveness of knowledge graph embedding (KGE) largely depends on the ability to model intrinsic relation patterns and mapping properties. However, existing approaches can only capture some of them with insufficient modeling capacity. In this work, we propose a more powerful KGE framework named HousE, which involves a novel parameterization based on two kinds of Householder transformations: (1) Householder rotations to achieve superior capacity of modeling relation patterns; (2) Householder projections to handle sophisticated relation mapping properties. Theoretically, HousE is capable of modeling crucial relation patterns and mapping properties simultaneously. Besides, HousE is a generalization of existing rotation-based models while extending the rotations to high-dimensional spaces. Empirically, HousE achieves new state-of-the-art performance on five benchmark datasets. Our code is available at https://github.com/anrep/HousE.
△ Less
Submitted 19 June, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
Trinomials and Deterministic Complexity Limits for Real Solving
Authors:
Erick Boniface,
Weixun Deng,
J. Maurice Rojas
Abstract:
Consider a univariate polynomial f in Z[x] with degree d, exactly t monomial terms, and coefficients in {-H,...,H}. Solving f over the reals, R, in polynomial-time can be defined as counting the exact number of real roots of f and then finding (for each such root z) an approximation w of logarithmic height (log(dH))^{O(1)} such that the Newton iterates of w have error decaying at a rate of O((1/2)…
▽ More
Consider a univariate polynomial f in Z[x] with degree d, exactly t monomial terms, and coefficients in {-H,...,H}. Solving f over the reals, R, in polynomial-time can be defined as counting the exact number of real roots of f and then finding (for each such root z) an approximation w of logarithmic height (log(dH))^{O(1)} such that the Newton iterates of w have error decaying at a rate of O((1/2)^{2^i}). Solving efficiently in this sense, using (log(dH))^{O(1)} deterministic bit operations, is arguably the most honest formulation of solving a polynomial equation over R in time polynomial in the input size. Unfortunately, deterministic algorithms this fast are known only for t=2, unknown for t=3, and provably impossible for t=4. (One can of course resort to older techniques with complexity (d\log H)^{O(1)} for t>=4.)
We give evidence that polynomial-time real-solving in the strong sense above is possible for t=3: We give a polynomial-time algorithm employing A-hypergeometric series that works for all but a fraction of 1/Omega(log(dH)) of the input f. We also show an equivalence between fast trinomial solving and sign evaluation at rational points of small height. As a consequence, we show that for "most" trinomials f, we can compute the sign of f at a rational point r in time polynomial in log(dH) and the logarithmic height of r. (This was known only for binomials before.) We also mention a related family of polynomial systems that should admit a similar speed-up for solving.
△ Less
Submitted 12 February, 2022;
originally announced February 2022.
-
Dynamic wavefront transformer based on a two-degree-of-freedom control system for 6-kHz mechanically actuated beam steering
Authors:
Wenjun Deng,
Weiming Zhu,
Yuzhi Shi,
Zhijun Liu,
Guanxing Zang,
Jin Qin,
Shiyu Zhu
Abstract:
Vast tunable optical components are realized based on dynamic reconfigurations of the incident wavefronts, such as beam steering and tunable lens. However, the dominant paradigm of current wavefront reconfiguration technologies relies on complex control systems with degrees of freedom much larger than output wavefronts, e.g. beam steering based on spatial light modulator or phased array antennas.…
▽ More
Vast tunable optical components are realized based on dynamic reconfigurations of the incident wavefronts, such as beam steering and tunable lens. However, the dominant paradigm of current wavefront reconfiguration technologies relies on complex control systems with degrees of freedom much larger than output wavefronts, e.g. beam steering based on spatial light modulator or phased array antennas. Here, we propose a new paradigm for dynamic reconfiguration of arbitrary output wavefronts using control systems with the same degrees of freedom. As an example, a wavefront transformer is demonstrated using an in-plane two-degree-of-freedom (2DOF) mechanical actuation system of metasurface doublet for semi-omnidirectional beam steering, which measured a 6-kHz modulation speed and a "+-65.6 degree" field of view. This paradigm can be applied to metasurface transformers for dynamic wavefront reconfiguration with any control system for vast applications, such as tunable lens, beam steering, and dynamic beam profiler, just to name a few.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Numerical Approximation for Stochastic Nonlinear Fractional Diffusion Equation Driven by Rough Noise
Authors:
Daxin Nie,
Jing Sun,
Weihua Deng
Abstract:
In this work, we are interested in building the fully discrete scheme for stochastic fractional diffusion equation driven by fractional Brownian sheet which is temporally and spatially fractional with Hurst parameters $H_{1}, H_{2} \in(0,\frac{1}{2}]$. We first provide the regularity of the solution. Then we employ the Wong-Zakai approximation to regularize the rough noise and discuss the converge…
▽ More
In this work, we are interested in building the fully discrete scheme for stochastic fractional diffusion equation driven by fractional Brownian sheet which is temporally and spatially fractional with Hurst parameters $H_{1}, H_{2} \in(0,\frac{1}{2}]$. We first provide the regularity of the solution. Then we employ the Wong-Zakai approximation to regularize the rough noise and discuss the convergence of the approximation. Next, the finite element and backward Euler convolution quadrature methods are used to discretize spatial and temporal operators for the obtained regularized equation, and the detailed error analyses are developed. Finally, some numerical examples are presented to confirm the theory.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Global strong solutions and large time behavior to a micro-macro model for compressible polymeric fluids near equilibrium
Authors:
Wenjie Deng,
Wei Luo,
Zhaoyang Yin
Abstract:
In this paper, we mainly study the global strong solutions and its long time decay rates of all order spatial derivatives to a micro-macro model for compressible polymeric fluids with small initial data. This model is a coupling of isentropic compressible Navier-Stokes equations with a nonlinear Fokker-Planck equation. We first prove that the micro-macro model admits a unique global strong solutio…
▽ More
In this paper, we mainly study the global strong solutions and its long time decay rates of all order spatial derivatives to a micro-macro model for compressible polymeric fluids with small initial data. This model is a coupling of isentropic compressible Navier-Stokes equations with a nonlinear Fokker-Planck equation. We first prove that the micro-macro model admits a unique global strong solution provided the initial data are close to equilibrium state for $d\geq2$. Moreover, for $d\geq3$, we also show a new critical Fourier estimation that allow us to give the long time decay rates of $L^2$ norm for all order spatial derivatives.
△ Less
Submitted 28 October, 2022; v1 submitted 21 January, 2022;
originally announced January 2022.
-
Human-Level Control through Directly-Trained Deep Spiking Q-Networks
Authors:
Guisong Liu,
Wenjie Deng,
Xiurui Xie,
Li Huang,
Huajin Tang
Abstract:
As the third-generation neural networks, Spiking Neural Networks (SNNs) have great potential on neuromorphic hardware because of their high energy-efficiency. However, Deep Spiking Reinforcement Learning (DSRL), i.e., the Reinforcement Learning (RL) based on SNNs, is still in its preliminary stage due to the binary output and the non-differentiable property of the spiking function. To address thes…
▽ More
As the third-generation neural networks, Spiking Neural Networks (SNNs) have great potential on neuromorphic hardware because of their high energy-efficiency. However, Deep Spiking Reinforcement Learning (DSRL), i.e., the Reinforcement Learning (RL) based on SNNs, is still in its preliminary stage due to the binary output and the non-differentiable property of the spiking function. To address these issues, we propose a Deep Spiking Q-Network (DSQN) in this paper. Specifically, we propose a directly-trained deep spiking reinforcement learning architecture based on the Leaky Integrate-and-Fire (LIF) neurons and Deep Q-Network (DQN). Then, we adapt a direct spiking learning algorithm for the Deep Spiking Q-Network. We further demonstrate the advantages of using LIF neurons in DSQN theoretically. Comprehensive experiments have been conducted on 17 top-performing Atari games to compare our method with the state-of-the-art conversion method. The experimental results demonstrate the superiority of our method in terms of performance, stability, robustness and energy-efficiency. To the best of our knowledge, our work is the first one to achieve state-of-the-art performance on multiple Atari games with the directly-trained SNN.
△ Less
Submitted 10 April, 2023; v1 submitted 13 December, 2021;
originally announced January 2022.
-
Topological materials for full-vector elastic waves
Authors:
Ying Wu,
Jiuyang Lu,
Xueqin Huang,
Yating Yang,
Li Luo,
Linyun Yang,
Feng Li,
Weiyin Deng,
Zhengyou Liu
Abstract:
Elastic wave manipulation is important in a wide variety of scales in applications including information processing in tiny elastic devices and noise control in big solid structures. The recent emergence of topological materials opens a new avenue toward modulating elastic waves in solids. However, because of the full-vector feature, and the complicated couplings of the longitudinal and transverse…
▽ More
Elastic wave manipulation is important in a wide variety of scales in applications including information processing in tiny elastic devices and noise control in big solid structures. The recent emergence of topological materials opens a new avenue toward modulating elastic waves in solids. However, because of the full-vector feature, and the complicated couplings of the longitudinal and transverse components of elastic waves, manipulating elastic waves is generally difficult, compared with manipulating acoustic waves (scalar waves) and electromagnetic waves (vectorial waves but transverse only). Up to date, topological materials, including insulators and semimetals, have been realized for acoustic and electromagnetic waves. Although topological materials of elastic waves have also been reported, the topological edge modes observed all lie on the domain wall. A natural question can be asked: whether there exists an elastic metamaterial with the topological edge modes on its own boundary only? Here, we report a 3D metal-printed bilayer metamaterial, insulating topologically the elastic waves. By introducing the chiral interlayer couplings, the spin-orbit couplings for elastic waves are induced, which give rise to nontrivial topological properties. The helical edge states with the vortex feature are demonstrated on the boundary of the single topological phase. We further show a heterostructure of the metamaterial, which exhibits tunable edge transport. Our work may have potential in devices based on elastic waves in solids.
△ Less
Submitted 29 December, 2021;
originally announced January 2022.
-
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art
Authors:
Xiang Ling,
Lingfei Wu,
Jiangyu Zhang,
Zhenqing Qu,
Wei Deng,
Xiang Chen,
Yaguan Qian,
Chunming Wu,
Shouling Ji,
Tianyue Luo,
Jingzheng Wu,
Yanjun Wu
Abstract:
Malware has been one of the most damaging threats to computers that span across multiple operating systems and various file formats. To defend against ever-increasing and ever-evolving malware, tremendous efforts have been made to propose a variety of malware detection that attempt to effectively and efficiently detect malware so as to mitigate possible damages as early as possible. Recent studies…
▽ More
Malware has been one of the most damaging threats to computers that span across multiple operating systems and various file formats. To defend against ever-increasing and ever-evolving malware, tremendous efforts have been made to propose a variety of malware detection that attempt to effectively and efficiently detect malware so as to mitigate possible damages as early as possible. Recent studies have shown that, on the one hand, existing ML and DL techniques enable superior solutions in detecting newly emerging and previously unseen malware. However, on the other hand, ML and DL models are inherently vulnerable to adversarial attacks in the form of adversarial examples. In this paper, we focus on malware with the file format of portable executable (PE) in the family of Windows operating systems, namely Windows PE malware, as a representative case to study the adversarial attack methods in such adversarial settings. To be specific, we start by first outlining the general learning framework of Windows PE malware detection based on ML/DL and subsequently highlighting three unique challenges of performing adversarial attacks in the context of Windows PE malware. Then, we conduct a comprehensive and systematic review to categorize the state-of-the-art adversarial attacks against PE malware detection, as well as corresponding defenses to increase the robustness of Windows PE malware detection. Finally, we conclude the paper by first presenting other related attacks against Windows PE malware detection beyond the adversarial attacks and then shedding light on future research directions and opportunities. In addition, a curated resource list of adversarial attacks and defenses for Windows PE malware detection is also available at https://github.com/ryderling/adversarial-attacks-and-defenses-for-windows-pe-malware-detection.
△ Less
Submitted 16 February, 2023; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Federated Learning for Face Recognition with Gradient Correction
Authors:
Yifan Niu,
Weihong Deng
Abstract:
With increasing appealing to privacy issues in face recognition, federated learning has emerged as one of the most prevalent approaches to study the unconstrained face recognition problem with private decentralized data. However, conventional decentralized federated algorithm sharing whole parameters of networks among clients suffers from privacy leakage in face recognition scene. In this work, we…
▽ More
With increasing appealing to privacy issues in face recognition, federated learning has emerged as one of the most prevalent approaches to study the unconstrained face recognition problem with private decentralized data. However, conventional decentralized federated algorithm sharing whole parameters of networks among clients suffers from privacy leakage in face recognition scene. In this work, we introduce a framework, FedGC, to tackle federated learning for face recognition and guarantees higher privacy. We explore a novel idea of correcting gradients from the perspective of backward propagation and propose a softmax-based regularizer to correct gradients of class embeddings by precisely injecting a cross-client gradient term. Theoretically, we show that FedGC constitutes a valid loss function similar to standard softmax. Extensive experiments have been conducted to validate the superiority of FedGC which can match the performance of conventional centralized methods utilizing full training dataset on several popular benchmark datasets.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
Regularity theory and numerical algorithm for the fractional Klein-Kramers equation
Authors:
Jing Sun,
Daxin Nie,
Weihua Deng
Abstract:
Fractional Klein-Kramers equation can well describe subdiffusion in phase space. In this paper, we develop the fully discrete scheme for fractional Klein-Kramers equation based on the backward Euler convolution quadrature and local discontinuous Galerkin methods. Thanks to the obtained sharp regularity estimates in temporal and spatial directions after overcoming the hypocoercivity of the operator…
▽ More
Fractional Klein-Kramers equation can well describe subdiffusion in phase space. In this paper, we develop the fully discrete scheme for fractional Klein-Kramers equation based on the backward Euler convolution quadrature and local discontinuous Galerkin methods. Thanks to the obtained sharp regularity estimates in temporal and spatial directions after overcoming the hypocoercivity of the operator, the complete error analyses of the fully discrete scheme are built. % , the main challenge of which comes from the hypocoercivity of the operator. It's worth mentioning that the convergence of the provided scheme is independent of the temporal regularity of the exact solution. Finally, numerical results are proposed to verify the correctness of the theoretical results.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
On Convergence of Federated Averaging Langevin Dynamics
Authors:
Wei Deng,
Qian Zhang,
Yi-An Ma,
Zhao Song,
Guang Lin
Abstract:
We propose a federated averaging Langevin algorithm (FA-LD) for uncertainty quantification and mean predictions with distributed clients. In particular, we generalize beyond normal posterior distributions and consider a general class of models. We develop theoretical guarantees for FA-LD for strongly log-concave distributions with non-i.i.d data and study how the injected noise and the stochastic-…
▽ More
We propose a federated averaging Langevin algorithm (FA-LD) for uncertainty quantification and mean predictions with distributed clients. In particular, we generalize beyond normal posterior distributions and consider a general class of models. We develop theoretical guarantees for FA-LD for strongly log-concave distributions with non-i.i.d data and study how the injected noise and the stochastic-gradient noise, the heterogeneity of data, and the varying learning rates affect the convergence. Such an analysis sheds light on the optimal choice of local updates to minimize communication costs. Important to our approach is that the communication efficiency does not deteriorate with the injected noise in the Langevin algorithms. In addition, we examine in our FA-LD algorithm both independent and correlated noise used over different clients. We observe there is a trade-off between the pairs among communication, accuracy, and data privacy. As local devices may become inactive in federated networks, we also show convergence results based on different averaging schemes where only partial device updates are available. In such a case, we discover an additional bias that does not decay to zero.
△ Less
Submitted 5 October, 2023; v1 submitted 9 December, 2021;
originally announced December 2021.
-
Insulator-to-superconductor transition in quasi-one-dimensional HfS3 under pressure
Authors:
Binbin Yue,
Wei Zhong,
Wen Deng,
Ting Wen,
Yonggang Wang,
Yunyu Yin,
Pengfei Shan,
Xiaohui Yu,
Fang Hong
Abstract:
Various transition metal trichalcogenides (TMTC) show the charge-density-wave and superconductivity, which provide an ideal platform to study the correlation between these two orderings and the mechanism of superconductivity. Currently, almost all metallic TMTC compounds can show superconductivity either at ambient pressure or at high pressure. However, most TMTC compounds are semiconductors and e…
▽ More
Various transition metal trichalcogenides (TMTC) show the charge-density-wave and superconductivity, which provide an ideal platform to study the correlation between these two orderings and the mechanism of superconductivity. Currently, almost all metallic TMTC compounds can show superconductivity either at ambient pressure or at high pressure. However, most TMTC compounds are semiconductors and even insulators. Does the superconductivity exist in any non-metal TMTC compound? In this work, we managed to manipulate the electronic behavior of highly insulating HfS3 in term of pressure. HfS3 underwent an insulator-semiconductor transition near 17 GPa with a band gap reduce of ~1 eV. The optical absorption and Raman measurement provide the consistent results, suggesting the structural origin of the electronic transition. Upon further compression, HfS3 becomes a superconductor. The superconducting transition was initialized as early as 50.6 GPa and the zero-resistance is reached above 91.2 GPa. The superconducting behavior is further confirmed by both the magnetic field effect and current effect. This work sheds the light that all TMTC may be superconductors, and opens a new avenue to explore the abundant emergence phenomena in TMTC material family.
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Distributed Multi-Area Optimal Power Flow via Rotated Coordinate Descent Critical Region Exploration
Authors:
Haitian Liu,
Ye Guo,
Hongbin Sun,
Weisi Deng
Abstract:
We consider the problem of distributed optimal power flow (OPF) for multi-area electric power systems. A novel distributed algorithm is proposed, referred to as the rotated coordinate descent critical region exploration (RCDCRE). It allows each entity to independently update its boundary information and optimally solve its local OPF in an asynchronous fashion. RCDCRE method stitches coordinate des…
▽ More
We consider the problem of distributed optimal power flow (OPF) for multi-area electric power systems. A novel distributed algorithm is proposed, referred to as the rotated coordinate descent critical region exploration (RCDCRE). It allows each entity to independently update its boundary information and optimally solve its local OPF in an asynchronous fashion. RCDCRE method stitches coordinate descent and parametric programming using coordinate system rotation to reduce coordination, keep privacy and ensure convergence. The solution process does not require warm starts and can iterate from infeasible initial points using penalty-based formulations. The effectiveness of RCDCRE is verified based on IEEE 2-area 44-bus and 4-area 472-bus systems.
△ Less
Submitted 16 June, 2022; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Lévy walk dynamics in non-static media
Authors:
Tian Zhou,
Pengbo Xu,
Weihua Deng
Abstract:
Almost all the media the particles move in are non-static. Depending on the expected resolution of the studied dynamics and the amplitude of the displacement of the media, sometimes the non-static behaviours of the media can not be ignored. In this paper, we build the model describing Lévy walks in non-static media, where the physical and comoving coordinates are connected by scale factor. We deri…
▽ More
Almost all the media the particles move in are non-static. Depending on the expected resolution of the studied dynamics and the amplitude of the displacement of the media, sometimes the non-static behaviours of the media can not be ignored. In this paper, we build the model describing Lévy walks in non-static media, where the physical and comoving coordinates are connected by scale factor. We derive the equation governing the probability density function of the position of the particles in comoving coordinate. Using the Hermite orthogonal polynomial expansions, some statistical properties are obtained, such as mean squared displacements (MSDs) in both coordinates and kurtosis. For some representative non-static media and Lévy walks, the asymptotic behaviors of MSDs in both coordinates are analyzed in detail. The stationary distributions and mean first passage time for some cases are also discussed through numerical simulations.
△ Less
Submitted 13 October, 2021;
originally announced October 2021.
-
MLFW: A Database for Face Recognition on Masked Faces
Authors:
Chengrui Wang,
Han Fang,
Yaoyao Zhong,
Weihong Deng
Abstract:
As more and more people begin to wear masks due to current COVID-19 pandemic, existing face recognition systems may encounter severe performance degradation when recognizing masked faces. To figure out the impact of masks on face recognition model, we build a simple but effective tool to generate masked faces from unmasked faces automatically, and construct a new database called Masked LFW (MLFW)…
▽ More
As more and more people begin to wear masks due to current COVID-19 pandemic, existing face recognition systems may encounter severe performance degradation when recognizing masked faces. To figure out the impact of masks on face recognition model, we build a simple but effective tool to generate masked faces from unmasked faces automatically, and construct a new database called Masked LFW (MLFW) based on Cross-Age LFW (CALFW) database. The mask on the masked face generated by our method has good visual consistency with the original face. Moreover, we collect various mask templates, covering most of the common styles appeared in the daily life, to achieve diverse generation effects. Considering realistic scenarios, we design three kinds of combinations of face pairs. The recognition accuracy of SOTA models declines 5%-16% on MLFW database compared with the accuracy on the original images. MLFW database can be viewed and downloaded at \url{http://whdeng.cn/mlfw}.
△ Less
Submitted 15 September, 2021; v1 submitted 13 September, 2021;
originally announced September 2021.
-
Triply heavy tetraquark states
Authors:
Xin-Zhen Weng,
Wei-Zhen Deng,
Shi-Lin Zhu
Abstract:
In the framework of an extended chromomagnetic model, we systematically study the mass spectrum of the $S$-wave $qQ\bar{Q}\bar{Q}$ tetraquarks. Their mass spectra are mainly determined by the color interaction. For the $qc\bar{c}\bar{c}$, $qb\bar{c}\bar{c}$ and $qb\bar{b}\bar{b}$ tetraquarks, the color interaction favors the color-sextet $\ket{(qQ)^{6_{c}}(\bar{Q}\bar{Q})^{\bar{6}_{c}}}$ configura…
▽ More
In the framework of an extended chromomagnetic model, we systematically study the mass spectrum of the $S$-wave $qQ\bar{Q}\bar{Q}$ tetraquarks. Their mass spectra are mainly determined by the color interaction. For the $qc\bar{c}\bar{c}$, $qb\bar{c}\bar{c}$ and $qb\bar{b}\bar{b}$ tetraquarks, the color interaction favors the color-sextet $\ket{(qQ)^{6_{c}}(\bar{Q}\bar{Q})^{\bar{6}_{c}}}$ configuration over the color-triplet $\ket{(qQ)^{\bar{3}_{c}}(\bar{Q}\bar{Q})^{3_{c}}}$ one. But for the $qc\bar{b}\bar{b}$ tetraquarks, the color-triplet configuration is favored. We find no stable states which lie below the thresholds of two pseudoscalar mesons. The lowest axial-vector states with the $qQ\bar{b}\bar{b}$ flavor configuration may be narrow. They lie just above the thresholds of two pseudoscalar mesons, but cannot decay into these channels because of the conservation of the angular momentum and parity.
△ Less
Submitted 24 February, 2022; v1 submitted 11 September, 2021;
originally announced September 2021.
-
Numerical approximations for the fractional Fokker-Planck equation with two-scale diffusion
Authors:
Jing Sun,
Weihua Deng,
Daxin Nie
Abstract:
Fractional Fokker-Planck equation plays an important role in describing anomalous dynamics. To the best of our knowledge, the existing discussions mainly focus on this kind of equation involving one diffusion operator. In this paper, we first derive the fractional Fokker-Planck equation with two-scale diffusion from the Lévy process framework, and then the fully discrete scheme is built by using t…
▽ More
Fractional Fokker-Planck equation plays an important role in describing anomalous dynamics. To the best of our knowledge, the existing discussions mainly focus on this kind of equation involving one diffusion operator. In this paper, we first derive the fractional Fokker-Planck equation with two-scale diffusion from the Lévy process framework, and then the fully discrete scheme is built by using the $L_{1}$ scheme for time discretization and finite element method for space. With the help of the sharp regularity estimate of the solution, we optimally get the spatial and temporal error estimates. Finally, we validate the effectiveness of the provided algorithm by extensive numerical experiments.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.