Skip to main content

Showing 1–50 of 683 results for author: Hong, Y

  1. arXiv:2407.08991  [pdf

    eess.AS cs.AI cs.CC

    Optimization of DNN-based speaker verification model through efficient quantization technique

    Authors: Yeona Hong, Woo-Jin Chung, Hong-Goo Kang

    Abstract: As Deep Neural Networks (DNNs) rapidly advance in various fields, including speech verification, they typically involve high computational costs and substantial memory consumption, which can be challenging to manage on mobile systems. Quantization of deep models offers a means to reduce both computational and memory expenses. Our research proposes an optimization framework for the quantization of… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: in Korean language, Accepted at Society of Electronic Engineers of Korea Conference 2024

  2. arXiv:2407.08935  [pdf, other

    cs.CR

    Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses

    Authors: Yuxin Yang, Qiang Li, Jinyuan Jia, Yuan Hong, Binghui Wang

    Abstract: Federated graph learning (FedGL) is an emerging federated learning (FL) framework that extends FL to learn graph data from diverse sources. FL for non-graph data has shown to be vulnerable to backdoor attacks, which inject a shared backdoor trigger into the training data such that the trained backdoored FL model can predict the testing data containing the trigger as the attacker desires. However,… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: This paper is accepted to CCS2024

  3. arXiv:2407.05744  [pdf, other

    eess.AS cs.SD

    Automating Urban Soundscape Enhancements with AI: In-situ Assessment of Quality and Restorativeness in Traffic-Exposed Residential Areas

    Authors: Bhan Lam, Zhen-Ting Ong, Kenneth Ooi, Wen-Hui Ong, Trevor Wong, Karn N. Watcharasupat, Vanessa Boey, Irene Lee, Joo Young Hong, Jian Kang, Kar Fye Alvin Lee, Georgios Christopoulos, Woon-Seng Gan

    Abstract: Formalized in ISO 12913, the "soundscape" approach is a paradigmatic shift towards perception-based urban sound management, aiming to alleviate the substantial socioeconomic costs of noise pollution to advance the United Nations Sustainable Development Goals. Focusing on traffic-exposed outdoor residential sites, we implemented an automatic masker selection system (AMSS) utilizing natural sounds t… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

    Comments: 41 pages, 4 figures. Preprint submitted to an Elsevier journal

  4. arXiv:2407.04608  [pdf, other

    math.OC cs.GT cs.MA

    A Multi-Player Potential Game Approach for Sensor Network Localization with Noisy Measurements

    Authors: Gehui Xu, Guanpu Chen, Baris Fidan, Yiguang Hong, Hongsheng Qi, Thomas Parisini, Karl H. Johansson

    Abstract: Sensor network localization (SNL) is a challenging problem due to its inherent non-convexity and the effects of noise in inter-node ranging measurements and anchor node position. We formulate a non-convex SNL problem as a multi-player non-convex potential game and investigate the existence and uniqueness of a Nash equilibrium (NE) in both the ideal setting without measurement noise and the practic… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2311.03326, arXiv:2401.02471

  5. arXiv:2407.02450  [pdf, other

    q-bio.QM cs.IT q-bio.NC

    Message-Relevant Dimension Reduction of Neural Populations

    Authors: Amanda Merkley, Alice Y. Nam, Y. Kate Hong, Pulkit Grover

    Abstract: Quantifying relevant interactions between neural populations is a prominent question in the analysis of high-dimensional neural recordings. However, existing dimension reduction methods often discuss communication in the absence of a formal framework, while frameworks proposed to address this gap are impractical in data analysis. This work bridges the formal framework of M-Information Flow with pr… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  6. arXiv:2407.01358  [pdf, other

    cs.CL

    Evaluating Knowledge-based Cross-lingual Inconsistency in Large Language Models

    Authors: Xiaolin Xing, Zhiwei He, Haoyu Xu, Xing Wang, Rui Wang, Yu Hong

    Abstract: This paper investigates the cross-lingual inconsistencies observed in Large Language Models (LLMs), such as ChatGPT, Llama, and Baichuan, which have shown exceptional performance in various Natural Language Processing (NLP) tasks. Despite their successes, these models often exhibit significant inconsistencies when processing the same concepts across different languages. This study focuses on three… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  7. arXiv:2406.16710  [pdf, other

    cs.CV

    Portrait3D: 3D Head Generation from Single In-the-wild Portrait Image

    Authors: Jinkun Hao, Junshu Tang, Jiangning Zhang, Ran Yi, Yijia Hong, Moran Li, Weijian Cao, Yating Wang, Lizhuang Ma

    Abstract: While recent works have achieved great success on one-shot 3D common object generation, high quality and fidelity 3D head generation from a single image remains a great challenge. Previous text-based methods for generating 3D heads were limited by text descriptions and image-based methods struggled to produce high-quality head geometry. To handle this challenging problem, we propose a novel framew… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

    Comments: https://jinkun-hao.github.io/Portrait3D/

  8. arXiv:2406.11614  [pdf, other

    cs.CL cs.AI

    Intrinsic Evaluation of Unlearning Using Parametric Knowledge Traces

    Authors: Yihuai Hong, Lei Yu, Shauli Ravfogel, Haiqin Yang, Mor Geva

    Abstract: The task of "unlearning" certain concepts in large language models (LLMs) has attracted immense attention recently, due to its importance for mitigating undesirable model behaviours, such as the generation of harmful, private, or incorrect information. Current protocols to evaluate unlearning methods largely rely on behavioral tests, without monitoring the presence of unlearned knowledge within th… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  9. arXiv:2406.11165  [pdf, other

    cond-mat.mes-hall

    Tunable Fano and Dicke resonant tunneling of double quantum dots sandwiched between topological insulators

    Authors: Yuan Hong, Zhen-Guo Fu, Zhou-Wei-Yu Chen, Feng Chi, Zhigang Wang, Wei Zhang, Ping Zhang

    Abstract: We study the resonant tunneling in double quantum dots (DQD) sandwiched between surfaces of topological insulator (TI) Bi$_2$Te$_3$, which possess strong spin-orbit coupling (SOC) and $^{d}C_{3v}$ double group symmetry. Distinct from the spin-conserved case with two-dimensional electron gas (2DEG) electrodes, the conductance displays an asymmetrical double-peak Fano-type lineshape rather than Dick… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: 6 pages, 4 figures

  10. arXiv:2406.10137  [pdf, ps, other

    cs.IT cs.LG eess.SP

    Compressed Sensor Caching and Collaborative Sparse Data Recovery with Anchor Alignment

    Authors: Yi-Jen Yang, Ming-Hsun Yang, Jwo-Yuh Wu, Y. -W. Peter Hong

    Abstract: This work examines the compressed sensor caching problem in wireless sensor networks and devises efficient distributed sparse data recovery algorithms to enable collaboration among multiple caches. In this problem, each cache is only allowed to access measurements from a small subset of sensors within its vicinity to reduce both cache size and data acquisition overhead. To enable reliable data rec… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: v1 was submitted to IEEE Transactions on Signal Processing on Sept. 18, 2023

  11. arXiv:2406.06822  [pdf, other

    cs.CR cs.AI cs.SE

    An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection

    Authors: Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong

    Abstract: Large Language Models (LLMs) have transformed code completion tasks, providing context-based suggestions to boost developer productivity in software engineering. As users often fine-tune these models for specific applications, poisoning and backdoor attacks can covertly alter the model outputs. To address this critical security challenge, we introduce CodeBreaker, a pioneering LLM-assisted backdoo… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: To appear in USENIX Security '24

  12. arXiv:2406.05677  [pdf, other

    cs.CV

    Evolution-aware VAriance (EVA) Coreset Selection for Medical Image Classification

    Authors: Yuxin Hong, Xiao Zhang, Xin Zhang, Joey Tianyi Zhou

    Abstract: In the medical field, managing high-dimensional massive medical imaging data and performing reliable medical analysis from it is a critical challenge, especially in resource-limited environments such as remote medical facilities and mobile devices. This necessitates effective dataset compression techniques to reduce storage, transmission, and computational cost. However, existing coreset selection… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  13. arXiv:2406.05336  [pdf, other

    cs.RO

    Multi-Vehicle Trajectory Planning at V2I-enabled Intersections based on Correlated Equilibrium

    Authors: Wenyuan Wang, Peng Yi, Yiguang Hong

    Abstract: Generating trajectories that ensure both vehicle safety and improve traffic efficiency remains a challenging task at intersections. Many existing works utilize Nash equilibrium (NE) for the trajectory planning at intersections. However, NE-based planning can hardly guarantee that all vehicles are in the same equilibrium, leading to a risk of collision. In this work, we propose a framework for traj… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 8 pages,12 figures,Submission to IEEE Robotics and Automation Letters

  14. arXiv:2406.04470  [pdf, other

    cs.CV cs.AI

    DiffuSyn Bench: Evaluating Vision-Language Models on Real-World Complexities with Diffusion-Generated Synthetic Benchmarks

    Authors: Haokun Zhou, Yipeng Hong

    Abstract: This study assesses the ability of Large Vision-Language Models (LVLMs) to differentiate between AI-generated and human-generated images. It introduces a new automated benchmark construction method for this evaluation. The experiment compared common LVLMs with human participants using a mixed dataset of AI and human-created images. Results showed that LVLMs could distinguish between the image type… ▽ More

    Submitted 13 June, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  15. arXiv:2406.02666  [pdf, other

    quant-ph

    Entangling four logical qubits beyond break-even in a nonlocal code

    Authors: Yifan Hong, Elijah Durso-Sabina, David Hayes, Andrew Lucas

    Abstract: Quantum error correction protects logical quantum information against environmental decoherence by encoding logical qubits into entangled states of physical qubits. One of the most important near-term challenges in building a scalable quantum computer is to reach the break-even point, where logical quantum circuits on error-corrected qubits achieve higher fidelity than equivalent circuits on uncor… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 6 pages, 2 figures, 1 table

  16. arXiv:2406.01256  [pdf, other

    cs.CV cs.AI

    Augmented Commonsense Knowledge for Remote Object Grounding

    Authors: Bahram Mohammadi, Yicong Hong, Yuankai Qi, Qi Wu, Shirui Pan, Javen Qinfeng Shi

    Abstract: The vision-and-language navigation (VLN) task necessitates an agent to perceive the surroundings, follow natural language instructions, and act in photo-realistic unseen environments. Most of the existing methods employ the entire image or object features to represent navigable viewpoints. However, these representations are insufficient for proper action prediction, especially for the REVERIE task… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  17. arXiv:2406.00959  [pdf, other

    cond-mat.mtrl-sci

    Ta2Pd3Te5 topological thermometer

    Authors: Yupeng Li, Anqi Wang, Senyang Pan, Dayu Yan, Guang Yang, Xingchen Guo, Yu Hong, Guangtong Liu, Fanming Qu, Zhijun Wang, Tian Qian, Jinglei Zhang, Youguo Shi, Li Lu, Jie Shen

    Abstract: In recent decades, there has been a persistent pursuit of applications for surface/edge states in topological systems, driven by their dissipationless transport effects. However, there have been limited tangible breakthroughs in this field. This work demonstrates the remarkable properties of the topological insulator Ta2Pd3Te5, as a thermometer. This material exhibits a power-law correlation in te… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: 15 pages, 9 figures

  18. arXiv:2405.19707  [pdf, other

    cs.CV

    DeMamba: AI-Generated Video Detection on Million-Scale GenVideo Benchmark

    Authors: Haoxing Chen, Yan Hong, Zizheng Huang, Zhuoer Xu, Zhangxuan Gu, Yaohui Li, Jun Lan, Huijia Zhu, Jianfu Zhang, Weiqiang Wang, Huaxiong Li

    Abstract: Recently, video generation techniques have advanced rapidly. Given the popularity of video content on social media platforms, these models intensify concerns about the spread of fake information. Therefore, there is a growing demand for detectors capable of distinguishing between fake AI-generated videos and mitigating the potential harm caused by fake information. However, the lack of large-scale… ▽ More

    Submitted 16 July, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

  19. arXiv:2405.18853  [pdf, other

    cs.CV

    Supervised Contrastive Learning for Snapshot Spectral Imaging Face Anti-Spoofing

    Authors: Chuanbiao Song, Yan Hong, Jun Lan, Huijia Zhu, Weiqiang Wang, Jianfu Zhang

    Abstract: This study reveals a cutting-edge re-balanced contrastive learning strategy aimed at strengthening face anti-spoofing capabilities within facial recognition systems, with a focus on countering the challenges posed by printed photos, and highly realistic silicone or latex masks. Leveraging the HySpeFAS dataset, which benefits from Snapshot Spectral Imaging technology to provide hyperspectral images… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: We rank first at the Chalearn Snapshot Spectral Imaging Face Anti-spoofing Challenge on CVPR 2024; the paper is accepted by CVPR 2024 workshop;

  20. arXiv:2405.18776  [pdf, other

    cs.CR cs.CL cs.LG

    LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models

    Authors: Qin Yang, Meisam Mohammad, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong

    Abstract: Differentially Private Stochastic Gradient Descent (DP-SGD) and its variants have been proposed to ensure rigorous privacy for fine-tuning large-scale pre-trained language models. However, they rely heavily on the Gaussian mechanism, which may overly perturb the gradients and degrade the accuracy, especially in stronger privacy regimes (e.g., the privacy budget $ε< 3$). To address such limitations… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 18 pages, 15 figures

  21. arXiv:2405.17882  [pdf, ps, other

    cs.LG math.OC math.PR

    When is exponential asymptotic optimality achievable in average-reward restless bandits?

    Authors: Yige Hong, Qiaomin Xie, Yudong Chen, Weina Wang

    Abstract: We consider the discrete-time infinite-horizon average-reward restless bandit problem. We propose a novel policy that maintains two dynamic subsets of arms: one subset of arms has a nearly optimal state distribution and takes actions according to an Optimal Local Control routine; the other subset of arms is driven towards the optimal state distribution and gradually merged into the first subset. W… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 46 pages, 1 figure

    MSC Class: 90C40 ACM Class: G.3; I.6

  22. arXiv:2405.16501  [pdf, other

    cs.CV

    User-Friendly Customized Generation with Multi-Modal Prompts

    Authors: Linhao Zhong, Yan Hong, Wentao Chen, Binglin Zhou, Yiyi Zhang, Jianfu Zhang, Liqing Zhang

    Abstract: Text-to-image generation models have seen considerable advancement, catering to the increasing interest in personalized image creation. Current customization techniques often necessitate users to provide multiple images (typically 3-5) for each customized object, along with the classification of these objects and descriptive textual prompts for scenes. This paper questions whether the process can… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: 11 pages, 8 figures

  23. arXiv:2405.16263  [pdf, other

    cs.CV cs.AI

    Assessing Image Inpainting via Re-Inpainting Self-Consistency Evaluation

    Authors: Tianyi Chen, Jianfu Zhang, Yan Hong, Yiyi Zhang, Liqing Zhang

    Abstract: Image inpainting, the task of reconstructing missing segments in corrupted images using available data, faces challenges in ensuring consistency and fidelity, especially under information-scarce conditions. Traditional evaluation methods, heavily dependent on the existence of unmasked reference images, inherently favor certain inpainting outcomes, introducing biases. Addressing this issue, we intr… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  24. arXiv:2405.16036  [pdf, other

    cs.LG cs.CR cs.CV

    Certifying Adapters: Enabling and Enhancing the Certification of Classifier Adversarial Robustness

    Authors: Jieren Deng, Hanbin Hong, Aaron Palmer, Xin Zhou, Jinbo Bi, Kaleel Mahmood, Yuan Hong, Derek Aguiar

    Abstract: Randomized smoothing has become a leading method for achieving certified robustness in deep classifiers against l_{p}-norm adversarial perturbations. Current approaches for achieving certified robustness, such as data augmentation with Gaussian noise and adversarial training, require expensive training procedures that tune large models for different Gaussian noise levels and thus cannot leverage h… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  25. arXiv:2405.12610  [pdf

    cond-mat.mes-hall

    Quantifying the local mechanical properties of twisted double bilayer graphene

    Authors: Alessandra Canetta, Sergio Gonzalez-Munoz, Viet-Hung Nguyen, Khushboo Agarwal, Pauline de Crombrugghe de Picquendaele, Yuanzhuo Hong, Sambit Mohapatra, Kenji Watanabe, Takashi Taniguchi, Bernard Nysten, Benoît Hackens, Rebeca Ribeiro-Palau, Jean-Christophe Charlier, Oleg Kolosov, Jean Spièce, Pascal Gehring

    Abstract: Nanomechanical measurements of minimally twisted van der Waals materials remained elusive despite their fundamental importance for device realisation. Here, we use Ultrasonic Force Microscopy (UFM) to locally quantify the variation of out-of-plane Young's modulus in minimally twisted double bilayer graphene (TDBG). We reveal a softening of the Young's modulus by 7\% and 17\% along single and doubl… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Journal ref: Nanoscale, 2023,15, 8134-8140

  26. arXiv:2405.08573  [pdf, other

    cs.HC

    ViSTooth: A Visualization Framework for Tooth Segmentation on Panoramic Radiograph

    Authors: Shenji Zhu, Miaoxin Hu, Tianya Pan, Yue Hong, Bin Li, Zhiguang Zhou, Ting Xu

    Abstract: Tooth segmentation is a key step for computer aided diagnosis of dental diseases. Numerous machine learning models have been employed for tooth segmentation on dental panoramic radiograph. However, it is a difficult task to achieve accurate tooth segmentation due to complex tooth shapes, diverse tooth categories and incomplete sample set for machine learning. In this paper, we propose ViSTooth, a… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  27. arXiv:2405.08299  [pdf, other

    cs.CR cs.LG

    Differentially Private Federated Learning: A Systematic Review

    Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao

    Abstract: In recent years, privacy and security concerns in machine learning have promoted trusted federated learning to the forefront of research. Differential privacy has emerged as the de facto standard for privacy protection in federated learning due to its rigorous mathematical foundation and provable guarantee. Despite extensive research on algorithms that incorporate differential privacy within feder… ▽ More

    Submitted 19 May, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: 36pages

  28. arXiv:2405.08172  [pdf, other

    cs.CL cs.AI

    CANTONMT: Investigating Back-Translation and Model-Switch Mechanisms for Cantonese-English Neural Machine Translation

    Authors: Kung Yin Hong, Lifeng Han, Riza Batista-Navarro, Goran Nenadic

    Abstract: This paper investigates the development and evaluation of machine translation models from Cantonese to English, where we propose a novel approach to tackle low-resource language translations. The main objectives of the study are to develop a model that can effectively translate Cantonese to English and evaluate it against state-of-the-art commercial models. To achieve this, a new parallel corpus h… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: on-going work, 30 pages

  29. arXiv:2405.04102  [pdf, ps, other

    cs.PF math.PR

    Analysis of Markovian Arrivals and Service with Applications to Intermittent Overload

    Authors: Isaac Grosof, Yige Hong, Mor Harchol-Balter

    Abstract: Almost all queueing analysis assumes i.i.d. arrivals and service. In reality, arrival and service rates fluctuate over time. In particular, it is common for real systems to intermittently experience overload, where the arrival rate temporarily exceeds the service rate, which an i.i.d. model cannot capture. We consider the MAMS system, where the arrival and service rates each vary according to an a… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 27 pages

  30. arXiv:2405.03526  [pdf, other

    cs.NI cs.LG

    ReinWiFi: A Reinforcement-Learning-Based Framework for the Application-Layer QoS Optimization of WiFi Networks

    Authors: Qianren Li, Bojie Lv, Yuncong Hong, Rui Wang

    Abstract: In this paper, a reinforcement-learning-based scheduling framework is proposed and implemented to optimize the application-layer quality-of-service (QoS) of a practical wireless local area network (WLAN) suffering from unknown interference. Particularly, application-layer tasks of file delivery and delay-sensitive communication, e.g., screen projection, in a WLAN with enhanced distributed channel… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  31. arXiv:2404.17868  [pdf, other

    math.NA cs.LG

    Error analysis for finite element operator learning methods for solving parametric second-order elliptic PDEs

    Authors: Youngjoon Hong, Seungchan Ko, Jaeyong Lee

    Abstract: In this paper, we provide a theoretical analysis of a type of operator learning method without data reliance based on the classical finite element approximation, which is called the finite element operator network (FEONet). We first establish the convergence of this method for general second-order linear elliptic PDEs with respect to the parameters for neural network approximation. In this regard,… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  32. arXiv:2404.16012  [pdf, other

    cs.CV cs.MM

    GaussianTalker: Real-Time High-Fidelity Talking Head Synthesis with Audio-Driven 3D Gaussian Splatting

    Authors: Kyusun Cho, Joungbin Lee, Heeji Yoon, Yeobin Hong, Jaehoon Ko, Sangjun Ahn, Seungryong Kim

    Abstract: We propose GaussianTalker, a novel framework for real-time generation of pose-controllable talking heads. It leverages the fast rendering capabilities of 3D Gaussian Splatting (3DGS) while addressing the challenges of directly controlling 3DGS with speech audio. GaussianTalker constructs a canonical 3DGS representation of the head and deforms it in sync with the audio. A key insight is to encode t… ▽ More

    Submitted 25 April, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

    Comments: Project Page: https://ku-cvlab.github.io/GaussianTalker

  33. arXiv:2404.14646  [pdf, other

    cs.SE cs.AI

    Exploring and Unleashing the Power of Large Language Models in Automated Code Translation

    Authors: Zhen Yang, Fang Liu, Zhongxing Yu, Jacky Wai Keung, Jia Li, Shuo Liu, Yifan Hong, Xiaoxue Ma, Zhi Jin, Ge Li

    Abstract: Code translation tools (transpilers) are developed for automatic source-to-source translation. Although learning-based transpilers have shown impressive enhancement against rule-based counterparts, owing to their task-specific pre-training on extensive monolingual corpora. Their current performance still remains unsatisfactory for practical deployment, and the associated training resources are als… ▽ More

    Submitted 11 May, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: 23 pages, 7 figures, accepted by FSE'24 (2024 ACM International Conference on the Foundations of Software Engineering)

  34. arXiv:2404.13383  [pdf, ps, other

    math.RA math.RT

    Quasi-Frobenius Novikov algebras and pre-Novikov bialgebras

    Authors: Yue Li, Yanyong Hong

    Abstract: Pre-Novikov algebras and quasi-Frobenius Novikov algebras naturally appear in the theory of Novikov bialgebras. In this paper, we show that there is a natural pre-Novikov algebra structure associated to a quasi-Frobenius Novikov algebra. Then we introduce the definition of double constructions of quasi-Frobenius Novikov algebras associated to two pre-Novikov algebras and show that it is characteri… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  35. arXiv:2404.12903  [pdf, other

    cs.MM

    ConCLVD: Controllable Chinese Landscape Video Generation via Diffusion Model

    Authors: Dingming Liu, Shaowei Li, Ruoyan Zhou, Lili Liang, Yongguan Hong, Fei Chao, Rongrong Ji

    Abstract: Chinese landscape painting is a gem of Chinese cultural and artistic heritage that showcases the splendor of nature through the deep observations and imaginations of its painters. Limited by traditional techniques, these artworks were confined to static imagery in ancient times, leaving the dynamism of landscapes and the subtleties of artistic sentiment to the viewer's imagination. Recently, emerg… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  36. arXiv:2404.12693  [pdf, other

    cs.CV cs.LG

    Improving Chinese Character Representation with Formation Tree

    Authors: Yang Hong, Yinfei Li, Xiaojun Qiao, Rui Li, Junsong Zhang

    Abstract: Learning effective representations for Chinese characters presents unique challenges, primarily due to the vast number of characters and their continuous growth, which requires models to handle an expanding category space. Additionally, the inherent sparsity of character usage complicates the generalization of learned representations. Prior research has explored radical-based sequences to overcome… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  37. arXiv:2404.11354  [pdf, other

    math.OC cs.DC cs.LG cs.MA

    Distributed Fractional Bayesian Learning for Adaptive Optimization

    Authors: Yaqun Yang, Jinlong Lei, Guanghui Wen, Yiguang Hong

    Abstract: This paper considers a distributed adaptive optimization problem, where all agents only have access to their local cost functions with a common unknown parameter, whereas they mean to collaboratively estimate the true parameter and find the optimal solution over a connected network. A general mathematical framework for such a problem has not been studied yet. We aim to provide valuable insights fo… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 16 pages, 6 figures

  38. arXiv:2404.10343  [pdf, other

    cs.CV eess.IV

    The Ninth NTIRE 2024 Efficient Super-Resolution Challenge Report

    Authors: Bin Ren, Yawei Li, Nancy Mehta, Radu Timofte, Hongyuan Yu, Cheng Wan, Yuxin Hong, Bingnan Han, Zhuoyuan Wu, Yajun Zou, Yuqing Liu, Jizhe Li, Keji He, Chao Fan, Heng Zhang, Xiaolin Zhang, Xuanwu Yin, Kunlong Zuo, Bohao Liao, Peizhe Xia, Long Peng, Zhibo Du, Xin Di, Wangkai Li, Yang Wang , et al. (109 additional authors not shown)

    Abstract: This paper provides a comprehensive review of the NTIRE 2024 challenge, focusing on efficient single-image super-resolution (ESR) solutions and their outcomes. The task of this challenge is to super-resolve an input image with a magnification factor of x4 based on pairs of low and corresponding high-resolution images. The primary objective is to develop networks that optimize various aspects such… ▽ More

    Submitted 25 June, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

    Comments: The report paper of NTIRE2024 Efficient Super-resolution, accepted by CVPRW2024

  39. arXiv:2404.09872  [pdf, other

    cs.CV

    Conditional Prototype Rectification Prompt Learning

    Authors: Haoxing Chen, Yaohui Li, Zizheng Huang, Yan Hong, Zhuoer Xu, Zhangxuan Gu, Jun Lan, Huijia Zhu, Weiqiang Wang

    Abstract: Pre-trained large-scale vision-language models (VLMs) have acquired profound understanding of general visual concepts. Recent advancements in efficient transfer learning (ETL) have shown remarkable success in fine-tuning VLMs within the scenario of limited data, introducing only a few parameters to harness task-specific insights from VLMs. Despite significant progress, current leading ETL methods… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  40. arXiv:2404.09790  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Image Super-Resolution ($\times$4): Methods and Results

    Authors: Zheng Chen, Zongwei Wu, Eduard Zamfir, Kai Zhang, Yulun Zhang, Radu Timofte, Xiaokang Yang, Hongyuan Yu, Cheng Wan, Yuxin Hong, Zhijuan Huang, Yajun Zou, Yuan Huang, Jiamin Lin, Bingnan Han, Xianyu Guan, Yongsheng Yu, Daoan Zhang, Xuanwu Yin, Kunlong Zuo, Jinhua Hao, Kai Zhao, Kun Yuan, Ming Sun, Chao Zhou , et al. (63 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 challenge on image super-resolution ($\times$4), highlighting the solutions proposed and the outcomes obtained. The challenge involves generating corresponding high-resolution (HR) images, magnified by a factor of four, from low-resolution (LR) inputs using prior information. The LR images originate from bicubic downsampling degradation. The aim of the challenge i… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 webpage: https://cvlai.net/ntire/2024. Code: https://github.com/zhengchen1999/NTIRE2024_ImageSR_x4

  41. OTFS Channel Estimation and Detection for Channels with Very Large Delay Spread

    Authors: Preety Priya, Yi Hong, Emanuele Viterbo

    Abstract: In low latency applications and in general, for overspread channels, channel delay spread is a large percentage of the transmission frame duration. In this paper, we consider OTFS in an overspread channel exhibiting a delay spread that exceeds the block duration in a frame, where traditional channel estimation (CE) fails. We propose a two-stage CE method based on a delay-Doppler (DD) training fram… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  42. arXiv:2404.07009  [pdf, other

    cs.CL cs.IT cs.LG

    A Mathematical Theory for Learning Semantic Languages by Abstract Learners

    Authors: Kuo-Yu Liao, Cheng-Shang Chang, Y. -W. Peter Hong

    Abstract: Recent advances in Large Language Models (LLMs) have demonstrated the emergence of capabilities (learned skills) when the number of system parameters and the size of training data surpass certain thresholds. The exact mechanisms behind such phenomena are not fully understood and remain a topic of active research. Inspired by the skill-text bipartite graph model proposed by Arora and Goyal for mode… ▽ More

    Submitted 15 May, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

    Comments: V1 was submitted to ISIT 2024 on Jan. 28, 2024. V2 was uploaded to ArXiv on April 13, 2024. V3 was uploaded to ArXiv on May 16, 2024

  43. arXiv:2404.06730  [pdf, ps, other

    math.AP math-ph

    Global well-posedness of the nonlinear Hartree equation for infinitely many particles with singular interaction

    Authors: Sonae Hadama, Younghun Hong

    Abstract: The nonlinear Hartree equation (NLH) in the Heisenberg picture admits steady states of the form $γ_f=f(-Δ)$ representing quantum states of infinitely many particles. In this article, we consider the time evolution of perturbations from a large class of such steady states via the three-dimensional NLH. We prove that if the interaction potential $w$ has finite measure and initial states have finite… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 31 pages

  44. arXiv:2404.06671  [pdf

    physics.app-ph

    Simple arithmetic operation in latent space can generate a novel three dimensional graph metamaterials

    Authors: Namjung Kim, Dongseok Lee, Chanyoung Kim, Dosung Lee, Youngjoon Hong

    Abstract: Recent advancements in artificial intelligence (AI)-based design strategies for metamaterials have revolutionized the creation of customizable architectures spanning nano- to macro-scale dimensions, achieving unprecedented mechanical behaviors that surpass the inherent properties of the constituent materials. However, the growing complexity of these methods poses challenges in generating diverse m… ▽ More

    Submitted 21 May, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

  45. arXiv:2404.03305  [pdf

    nlin.AO

    Evolutionary game on any hypergraph

    Authors: Dini Wang, Peng Yi, Yiguang Hong, Jie Chen, Gang Yan

    Abstract: Cooperation plays a fundamental role in societal and biological domains, and the population structure profoundly shapes the dynamics of evolution. Practically, individuals behave either altruistically or egoistically in multiple groups, such as relatives, friends and colleagues, and feedbacks from these groupwise interactions will contribute to one's cognition and behavior. Due to the intricacy wi… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

  46. Multi-Level Label Correction by Distilling Proximate Patterns for Semi-supervised Semantic Segmentation

    Authors: Hui Xiao, Yuting Hong, Li Dong, Diqun Yan, Jiayan Zhuang, Junjie Xiong, Dongtai Liang, Chengbin Peng

    Abstract: Semi-supervised semantic segmentation relieves the reliance on large-scale labeled data by leveraging unlabeled data. Recent semi-supervised semantic segmentation approaches mainly resort to pseudo-labeling methods to exploit unlabeled data. However, unreliable pseudo-labeling can undermine the semi-supervision processes. In this paper, we propose an algorithm called Multi-Level Label Correction (… ▽ More

    Submitted 9 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 12 pages, 8 figures. IEEE Transactions on Multimedia, 2024

  47. arXiv:2404.01954  [pdf, other

    cs.CL cs.AI

    HyperCLOVA X Technical Report

    Authors: Kang Min Yoo, Jaegeun Han, Sookyo In, Heewon Jeon, Jisu Jeong, Jaewook Kang, Hyunwook Kim, Kyung-Min Kim, Munhyong Kim, Sungju Kim, Donghyun Kwak, Hanock Kwak, Se Jung Kwon, Bado Lee, Dongsoo Lee, Gichang Lee, Jooho Lee, Baeseong Park, Seongjin Shin, Joonsang Yu, Seolki Baek, Sumin Byeon, Eungsup Cho, Dooseok Choe, Jeesung Han , et al. (371 additional authors not shown)

    Abstract: We introduce HyperCLOVA X, a family of large language models (LLMs) tailored to the Korean language and culture, along with competitive capabilities in English, math, and coding. HyperCLOVA X was trained on a balanced mix of Korean, English, and code data, followed by instruction-tuning with high-quality human-annotated datasets while abiding by strict safety guidelines reflecting our commitment t… ▽ More

    Submitted 13 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: 44 pages; updated authors list and fixed author names

  48. arXiv:2404.01415  [pdf, other

    cs.CV

    On the Faithfulness of Vision Transformer Explanations

    Authors: Junyi Wu, Weitai Kang, Hao Tang, Yuan Hong, Yan Yan

    Abstract: To interpret Vision Transformers, post-hoc explanations assign salience scores to input pixels, providing human-understandable heatmaps. However, whether these interpretations reflect true rationales behind the model's output is still underexplored. To address this gap, we study the faithfulness criterion of explanations: the assigned salience scores should represent the influence of the correspon… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: CVPR 2024

  49. arXiv:2404.00712  [pdf, other

    cs.LG cs.AI cs.CY cs.IR

    Survey of Computerized Adaptive Testing: A Machine Learning Perspective

    Authors: Qi Liu, Yan Zhuang, Haoyang Bi, Zhenya Huang, Weizhe Huang, Jiatong Li, Junhao Yu, Zirui Liu, Zirui Hu, Yuting Hong, Zachary A. Pardos, Haiping Ma, Mengxiao Zhu, Shijin Wang, Enhong Chen

    Abstract: Computerized Adaptive Testing (CAT) provides an efficient and tailored method for assessing the proficiency of examinees, by dynamically adjusting test questions based on their performance. Widely adopted across diverse fields like education, healthcare, sports, and sociology, CAT has revolutionized testing practices. While traditional methods rely on psychometrics and statistics, the increasing c… ▽ More

    Submitted 4 April, 2024; v1 submitted 31 March, 2024; originally announced April 2024.

  50. arXiv:2403.16648  [pdf, ps, other

    math.AP

    On the Korteweg-de Vries limit for the Boussinesq equation

    Authors: Younghun Hong, Changhun Yang

    Abstract: The Korteweg-de Vries (KdV) equation is known as a universal equation describing various long waves in dispersive systems. In this article, we prove that in a certain scaling regime, a large class of rough solutions to the Boussinesq equation are approximated by the sums of two counter-propagating waves solving the KdV equations. It extends the earlier result by \cite{Schneider1998} to slightly mo… ▽ More

    Submitted 11 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    Comments: 17 pages, V1:Minor typos are corrected

    MSC Class: 35Q53; 76B15