Skip to main content

Showing 51–100 of 703 results for author: Ji, S

  1. arXiv:2403.00762  [pdf, other

    cs.CV

    Point Cloud Mamba: Point Cloud Learning via State Space Model

    Authors: Tao Zhang, Xiangtai Li, Haobo Yuan, Shunping Ji, Shuicheng Yan

    Abstract: Recently, state space models have exhibited strong global modeling capabilities and linear computational complexity in contrast to transformers. This research focuses on applying such architecture in point cloud analysis. In particular, for the first time, we demonstrate that Mamba-based point cloud methods can outperform previous methods based on transformer or multi-layer perceptrons (MLPs). To… ▽ More

    Submitted 29 May, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Comments: Update more results on S3DIS dataset

  2. arXiv:2403.00479  [pdf, other

    astro-ph.HE astro-ph.GA

    Observational Evidence for Hot Wind Impact on pc-scale in Low-luminosity Active Galactic Nucleus

    Authors: Fangzheng Shi, Feng Yuan, Zhiyuan Li, Zhao Su, Suoqing Ji

    Abstract: Supermassive black holes in galaxies spend majority of their lifetime in the low-luminosity regime, powered by hot accretion flow. Strong winds launched from the hot accretion flow have the potential to play an important role in active galactic nuclei (AGN) feedback. Direct observational evidence for these hot winds with temperature around 10 keV, has been obtained through the detection of highly… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: 19 pages, 9 figures, submitted to ApJ

  3. arXiv:2402.19267  [pdf, other

    cs.CL cs.AI

    Robust Guidance for Unsupervised Data Selection: Capturing Perplexing Named Entities for Domain-Specific Machine Translation

    Authors: Seunghyun Ji, Hagai Raja Sinulingga, Darongsae Kwon

    Abstract: Low-resourced data presents a significant challenge for neural machine translation. In most cases, the low-resourced environment is caused by high costs due to the need for domain experts or the lack of language experts. Therefore, identifying the most training-efficient data within an unsupervised setting emerges as a practical strategy. Recent research suggests that such effective data can be id… ▽ More

    Submitted 21 May, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: 11 pages, 3 figures, 5 tables. Oral presentation was given in SIGUL 2024, a satellite workshop of LREC-COLING 2024 (https://sigul-2024.ilc.cnr.it/wp-content/uploads/2024/05/Ji-et-al.pdf)

  4. arXiv:2402.19200  [pdf, other

    cs.CR cs.CL

    PRSA: PRompt Stealing Attacks against Large Language Models

    Authors: Yong Yang, Changjiang Li, Yi Jiang, Xi Chen, Haoyu Wang, Xuhong Zhang, Zonghui Wang, Shouling Ji

    Abstract: In recent years, "prompt as a service" has greatly enhanced the utility of large language models (LLMs) by enabling them to perform various downstream tasks efficiently without fine-tuning. This has also increased the commercial value of prompts. However, the potential risk of leakage in these commercialized prompts remains largely underexplored. In this paper, we introduce a novel attack framewor… ▽ More

    Submitted 7 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

  5. arXiv:2402.13518  [pdf, other

    cs.SE cs.CL

    RITFIS: Robust input testing framework for LLMs-based intelligent software

    Authors: Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang

    Abstract: The dependence of Natural Language Processing (NLP) intelligent software on Large Language Models (LLMs) is increasingly prominent, underscoring the necessity for robustness testing. Current testing methods focus solely on the robustness of LLM-based software to prompts. Given the complexity and diversity of real-world inputs, studying the robustness of LLMbased software in handling comprehensive… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  6. arXiv:2402.12208  [pdf, other

    eess.AS cs.SD

    Language-Codec: Reducing the Gaps Between Discrete Codec Representation and Speech Language Models

    Authors: Shengpeng Ji, Minghui Fang, Ziyue Jiang, Siqi Zheng, Qian Chen, Rongjie Huang, Jialung Zuo, Shulei Wang, Zhou Zhao

    Abstract: In recent years, large language models have achieved significant success in generative tasks (e.g., speech cloning and audio generation) related to speech, audio, music, and other signal domains. A crucial element of these models is the discrete acoustic codecs, which serves as an intermediate representation replacing the mel-spectrogram. However, there exist several gaps between discrete codecs a… ▽ More

    Submitted 27 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: We release a more powerful checkpoint in Language-Codec v3

  7. arXiv:2402.09378  [pdf, other

    eess.AS cs.SD

    MobileSpeech: A Fast and High-Fidelity Framework for Mobile Zero-Shot Text-to-Speech

    Authors: Shengpeng Ji, Ziyue Jiang, Hanting Wang, Jialong Zuo, Zhou Zhao

    Abstract: Zero-shot text-to-speech (TTS) has gained significant attention due to its powerful voice cloning capabilities, requiring only a few seconds of unseen speaker voice prompts. However, all previous work has been developed for cloud-based systems. Taking autoregressive models as an example, although these approaches achieve high-fidelity voice cloning, they fall short in terms of inference speed, mod… ▽ More

    Submitted 2 June, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

    Comments: Accepted by ACL 2024 (Main Conference)

  8. arXiv:2402.03741  [pdf, other

    cs.LG cs.AI cs.CR

    SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems

    Authors: Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji

    Abstract: Recent advancements in multi-agent reinforcement learning (MARL) have opened up vast application prospects, such as swarm control of drones, collaborative manipulation by robotic arms, and multi-target encirclement. However, potential security threats during the MARL deployment need more attention and thorough investigation. Recent research reveals that attackers can rapidly exploit the victim's v… ▽ More

    Submitted 26 June, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

    Comments: To appear in the ACM Conference on Computer and Communications Security (CCS'24), October 14-18, 2024, Salt Lake City, UT, USA

  9. arXiv:2401.14027  [pdf, other

    cs.LG

    The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness

    Authors: Mengyao Du, Miao Zhang, Yuwen Pu, Kai Xu, Shouling Ji, Quanjun Yin

    Abstract: To tackle the scarcity and privacy issues associated with domain-specific datasets, the integration of federated learning in conjunction with fine-tuning has emerged as a practical solution. However, our findings reveal that federated learning has the risk of skewing fine-tuning features and compromising the out-of-distribution robustness of the model. By introducing three robustness indicators an… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 12 pages, 10 figures

  10. arXiv:2401.13303  [pdf, other

    cs.CL

    MaLA-500: Massive Language Adaptation of Large Language Models

    Authors: Peiqin Lin, Shaoxiong Ji, Jörg Tiedemann, André F. T. Martins, Hinrich Schütze

    Abstract: Large language models (LLMs) have advanced the state of the art in natural language processing. However, their predominant design for English or a limited set of languages creates a substantial gap in their effectiveness for low-resource languages. To bridge this gap, we introduce MaLA-500, a novel large language model designed to cover an extensive range of 534 languages. To train MaLA-500, we em… ▽ More

    Submitted 3 April, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

  11. arXiv:2401.13281  [pdf, ps, other

    math.FA

    On the metric of the jet bundle and similarity on Dirichlet spaces

    Authors: Kui Ji, Shanshan Ji, Hyun-Kyoung Kwon, Xiaoceng Liu, Jing Xu

    Abstract: In general, it is more difficult to formulate a sufficient condition for similarity than a necessary condition. We give a sufficient condition for a Cowen-Douglas operator with a positivity condition to be similar to the backward shift operator on weighted Dirichlet space. This condition involves the holomorphic jet bundle of the eigenvector bundle of the operator.

    Submitted 24 January, 2024; originally announced January 2024.

  12. SSR: Spatial Sequential Hybrid Architecture for Latency Throughput Tradeoff in Transformer Acceleration

    Authors: Jinming Zhuang, Zhuoping Yang, Shixin Ji, Heng Huang, Alex K. Jones, Jingtong Hu, Yiyu Shi, Peipei Zhou

    Abstract: With the increase in the computation intensity of the chip, the mismatch between computation layer shapes and the available computation resource significantly limits the utilization of the chip. Driven by this observation, prior works discuss spatial accelerators or dataflow architecture to maximize the throughput. However, using spatial accelerators could potentially increase the execution latenc… ▽ More

    Submitted 18 February, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

    Journal ref: 2024 ACM/SIGDA International Symposium on Field Programmable Gate Arrays (FPGA '24)

  13. arXiv:2401.06270  [pdf, other

    cs.DC

    SCARIF: Towards Carbon Modeling of Cloud Servers with Accelerators

    Authors: Shixin Ji, Zhuoping Yang, Xingzhen Chen, Stephen Cahoon, Jingtong Hu, Yiyu Shi, Alex K. Jones, Peipei Zhou

    Abstract: Embodied carbon has been widely reported as a significant component in the full system lifecycle of various computing systems' green house gas emissions. Many efforts have been undertaken to quantify the elements that comprise this embodied carbon, from tools that evaluate semiconductor manufacturing to those that can quantify different elements of the computing system from commercial and academic… ▽ More

    Submitted 22 May, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: 6 pages; 6 figures; 3 tables. Accepted by ISVLSI' 24

  14. arXiv:2401.05561  [pdf, other

    cs.CL

    TrustLLM: Trustworthiness in Large Language Models

    Authors: Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang , et al. (45 additional authors not shown)

    Abstract: Large language models (LLMs), exemplified by ChatGPT, have gained considerable attention for their excellent natural language processing capabilities. Nonetheless, these LLMs present many challenges, particularly in the realm of trustworthiness. Therefore, ensuring the trustworthiness of LLMs emerges as an important topic. This paper introduces TrustLLM, a comprehensive study of trustworthiness in… ▽ More

    Submitted 17 March, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: This work is still under work and we welcome your contribution

  15. arXiv:2401.03690  [pdf

    physics.med-ph eess.IV q-bio.QM

    So You Want to Image Myelin Using MRI: Magnetic Susceptibility Source Separation for Myelin Imaging

    Authors: Jongho Lee, Sooyeon Ji, Se-Hong Oh

    Abstract: In MRI, researchers have long endeavored to effectively visualize myelin distribution in the brain, a pursuit with significant implications for both scientific research and clinical applications. Over time, various methods such as myelin water imaging, magnetization transfer imaging, and relaxometric imaging have been developed, each carrying distinct advantages and limitations. Recently, an innov… ▽ More

    Submitted 28 March, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: Accepted to Magnetic Resonance in Medical Sciences

  16. AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service

    Authors: Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu

    Abstract: As the first defensive layer that attacks would hit, the web application firewall (WAF) plays an indispensable role in defending against malicious web attacks like SQL injection (SQLi). With the development of cloud computing, WAF-as-a-service, as one kind of Security-as-a-service, has been proposed to facilitate the deployment, configuration, and update of WAFs in the cloud. Despite its tremendou… ▽ More

    Submitted 9 January, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

    Comments: Accepted by IEEE Transactions on Information Forensics and Security (IEEE TIFS)

  17. Construct 3D Hand Skeleton with Commercial WiFi

    Authors: Sijie Ji, Xuanye Zhang, Yuanqing Zheng, Mo Li

    Abstract: This paper presents HandFi, which constructs hand skeletons with practical WiFi devices. Unlike previous WiFi hand sensing systems that primarily employ predefined gestures for pattern matching, by constructing the hand skeleton, HandFi can enable a variety of downstream WiFi-based hand sensing applications in gaming, healthcare, and smart homes. Deriving the skeleton from WiFi signals is challeng… ▽ More

    Submitted 24 December, 2023; originally announced December 2023.

    Journal ref: ACM SenSys 2023

  18. arXiv:2312.14677  [pdf, other

    cs.CR cs.AI

    MEAOD: Model Extraction Attack against Object Detectors

    Authors: Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji

    Abstract: The widespread use of deep learning technology across various industries has made deep neural network models highly valuable and, as a result, attractive targets for potential attackers. Model extraction attacks, particularly query-based model extraction attacks, allow attackers to replicate a substitute model with comparable functionality to the victim model and present a significant threat to th… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

  19. arXiv:2312.14181  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci quant-ph

    Reversal of Orbital Hall Conductivity and Emergence of Tunable Topological Quantum States in Orbital Hall Insulator

    Authors: Shilei Ji, Chuye Quan, Ruijia Yao, Jianping Yang, Xing'ao Li

    Abstract: Recent findings indicate that orbital angular momentum (OAM) has the capability to induce the intrinsic orbital Hall effect (OHE), which is characterized by orbital Chern number in the orbital Hall insulator. Unlike the spin-polarized channel in Quantum anomalous Hall insulator, the OAM is valley-locked, posing challenges in manipulating the corresponding edge state. Here we demonstrate the sign-r… ▽ More

    Submitted 21 February, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  20. arXiv:2312.13305  [pdf, other

    cs.CV

    DVIS++: Improved Decoupled Framework for Universal Video Segmentation

    Authors: Tao Zhang, Xingye Tian, Yikang Zhou, Shunping Ji, Xuebo Wang, Xin Tao, Yuan Zhang, Pengfei Wan, Zhongyuan Wang, Yu Wu

    Abstract: We present the \textbf{D}ecoupled \textbf{VI}deo \textbf{S}egmentation (DVIS) framework, a novel approach for the challenging task of universal video segmentation, including video instance segmentation (VIS), video semantic segmentation (VSS), and video panoptic segmentation (VPS). Unlike previous methods that model video segmentation in an end-to-end manner, our approach decouples video segmentat… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  21. arXiv:2312.10307  [pdf, other

    cs.SD cs.AI cs.MM eess.AS

    MusER: Musical Element-Based Regularization for Generating Symbolic Music with Emotion

    Authors: Shulei Ji, Xinyu Yang

    Abstract: Generating music with emotion is an important task in automatic music generation, in which emotion is evoked through a variety of musical elements (such as pitch and duration) that change over time and collaborate with each other. However, prior research on deep learning-based emotional music generation has rarely explored the contribution of different musical elements to emotions, let alone the d… ▽ More

    Submitted 1 January, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: Accepted by AAAI 2024

  22. arXiv:2312.09716  [pdf, other

    cs.CV

    Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval

    Authors: Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang

    Abstract: Visual retrieval aims to search for the most relevant visual items, e.g., images and videos, from a candidate gallery with a given query item. Accuracy and efficiency are two competing objectives in retrieval tasks. Instead of crafting a new method pursuing further improvement on accuracy, in this paper we propose a multi-teacher distillation framework Whiten-MTD, which is able to transfer knowled… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: Accepted by AAAI 2024

  23. arXiv:2312.09057  [pdf, other

    cs.CR cs.AI cs.CV

    On the Difficulty of Defending Contrastive Learning against Backdoor Attacks

    Authors: Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang

    Abstract: Recent studies have shown that contrastive learning, like supervised learning, is highly vulnerable to backdoor attacks wherein malicious functions are injected into target models, only to be activated by specific triggers. However, thus far it remains under-explored how contrastive backdoor attacks fundamentally differ from their supervised counterparts, which impedes the development of effective… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: USENIX Security 24

  24. arXiv:2312.09030  [pdf, other

    cs.CV

    Dual Branch Network Towards Accurate Printed Mathematical Expression Recognition

    Authors: Yuqing Wang, Zhenyu Weng, Zhaokun Zhou, Shuaijian Ji, Zhongjie Ye, Yuesheng Zhu

    Abstract: Over the past years, Printed Mathematical Expression Recognition (PMER) has progressed rapidly. However, due to the insufficient context information captured by Convolutional Neural Networks, some mathematical symbols might be incorrectly recognized or missed. To tackle this problem, in this paper, a Dual Branch transformer-based Network (DBN) is proposed to learn both local and global context inf… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: Published at ICANN 2022

  25. Robust Target Detection of Intelligent Integrated Optical Camera and mmWave Radar System

    Authors: Chen Zhu, Zhouxiang Zhao, Zejing Shan, Lijie Yang, Sijie Ji, Zhaohui Yang, Zhaoyang Zhang

    Abstract: Target detection is pivotal for modern urban computing applications. While image-based techniques are widely adopted, they falter under challenging environmental conditions such as adverse weather, poor lighting, and occlusion. To improve the target detection performance under complex real-world scenarios, this paper proposes an intelligent integrated optical camera and millimeter-wave (mmWave) ra… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

  26. arXiv:2312.03378  [pdf, other

    cs.CV

    Riemannian Complex Matrix Convolution Network for PolSAR Image Classification

    Authors: Junfei Shi, Wei Wang, Haiyan Jin, Mengmeng Nie, Shanshan Ji

    Abstract: Recently, deep learning methods have achieved superior performance for Polarimetric Synthetic Aperture Radar(PolSAR) image classification. Existing deep learning methods learn PolSAR data by converting the covariance matrix into a feature vector or complex-valued vector as the input. However, all these methods cannot learn the structure of complex matrix directly and destroy the channel correlatio… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  27. arXiv:2311.17400  [pdf, other

    cs.CL cs.CR cs.LG

    Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention

    Authors: Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang

    Abstract: Transformer-based models, such as BERT and GPT, have been widely adopted in natural language processing (NLP) due to their exceptional performance. However, recent studies show their vulnerability to textual adversarial attacks where the model's output can be misled by intentionally manipulating the text inputs. Despite various methods that have been proposed to enhance the model's robustness and… ▽ More

    Submitted 29 November, 2023; v1 submitted 29 November, 2023; originally announced November 2023.

  28. arXiv:2311.16417  [pdf, other

    cs.AR

    Challenges and Opportunities to Enable Large-Scale Computing via Heterogeneous Chiplets

    Authors: Zhuoping Yang, Shixin Ji, Xingzhen Chen, Jinming Zhuang, Weifeng Zhang, Dharmesh Jani, Peipei Zhou

    Abstract: Fast-evolving artificial intelligence (AI) algorithms such as large language models have been driving the ever-increasing computing demands in today's data centers. Heterogeneous computing with domain-specific architectures (DSAs) brings many opportunities when scaling up and scaling out the computing system. In particular, heterogeneous chiplet architecture is favored to keep scaling up and scali… ▽ More

    Submitted 4 March, 2024; v1 submitted 27 November, 2023; originally announced November 2023.

  29. arXiv:2311.11267  [pdf, other

    cs.CL

    Rethinking Large Language Models in Mental Health Applications

    Authors: Shaoxiong Ji, Tianlin Zhang, Kailai Yang, Sophia Ananiadou, Erik Cambria

    Abstract: Large Language Models (LLMs) have become valuable assets in mental health, showing promise in both classification tasks and counseling applications. This paper offers a perspective on using LLMs in mental health applications. It discusses the instability of generative models for prediction and the potential for generating hallucinatory outputs, underscoring the need for ongoing audits and evaluati… ▽ More

    Submitted 17 December, 2023; v1 submitted 19 November, 2023; originally announced November 2023.

  30. arXiv:2311.07277  [pdf, other

    cs.SE cs.CL

    AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection

    Authors: Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji

    Abstract: Code Clone Detection, which aims to retrieve functionally similar programs from large code bases, has been attracting increasing attention. Modern software often involves a diverse range of programming languages. However, current code clone detection methods are generally limited to only a few popular programming languages due to insufficient annotated data as well as their own model design constr… ▽ More

    Submitted 6 March, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  31. arXiv:2311.06530  [pdf, other

    cs.SE cs.AI cs.CL cs.CR

    Exploring ChatGPT's Capabilities on Vulnerability Management

    Authors: Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang

    Abstract: Recently, ChatGPT has attracted great attention from the code analysis domain. Prior works show that ChatGPT has the capabilities of processing foundational code analysis tasks, such as abstract syntax tree generation, which indicates the potential of using ChatGPT to comprehend code syntax and static behaviors. However, it is unclear whether ChatGPT can complete more complicated real-world vulner… ▽ More

    Submitted 20 June, 2024; v1 submitted 11 November, 2023; originally announced November 2023.

    Comments: Accepted by USENIX Security 2024

  32. arXiv:2311.02295  [pdf, ps, other

    math.FA

    On the irreducibility and weakly homogeneity of a class of operators

    Authors: Shanshan Ji, Xiaomeng Wei

    Abstract: To construct more homogeneous operators, B. Bagchi and G. Misra in \cite{d} introduced the operator $\left(\begin{smallmatrix} T_0 & T_0-T_1 \\ 0 & T_1\\ \end{smallmatrix}\right)$ and proved that when $T_0$ and $T_1$ are homogeneous operators with the same unitary representation $U(g)$, it is homogeneous with associated representation $U(g)\oplus U(g)$. At the same time, they asked an open questio… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  33. arXiv:2310.17304  [pdf, other

    cs.CR cs.SE

    Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

    Authors: Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang

    Abstract: The emergence of WebAssembly allows attackers to hide the malicious functionalities of JavaScript malware in cross-language interoperations, termed JavaScript-WebAssembly multilingual malware (JWMM). However, existing anti-virus solutions based on static program analysis are still limited to monolingual code. As a result, their detection effectiveness decreases significantly against JWMM. The dete… ▽ More

    Submitted 19 April, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted to ESORICS 2023

  34. arXiv:2310.16853  [pdf, other

    cs.PL cs.AI

    CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

    Authors: Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang

    Abstract: Automatically generating function summaries for binaries is an extremely valuable but challenging task, since it involves translating the execution behavior and semantics of the low-level language (assembly code) into human-readable natural language. However, most current works on understanding assembly code are oriented towards generating function names, which involve numerous abbreviations that… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 Main Conference

  35. arXiv:2310.15590  [pdf, other

    cs.CR cs.CV

    Facial Data Minimization: Shallow Model as Your Privacy Filter

    Authors: Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao li, Diqun Yan, Xuhong Zhang, Shouling Ji

    Abstract: Face recognition service has been used in many fields and brings much convenience to people. However, once the user's facial data is transmitted to a service provider, the user will lose control of his/her private data. In recent years, there exist various security and privacy issues due to the leakage of facial data. Although many privacy-preserving methods have been proposed, they usually fail w… ▽ More

    Submitted 12 November, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 14 pages, 11 figures

  36. arXiv:2310.14561  [pdf, other

    cs.CV

    F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

    Authors: Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou

    Abstract: Deep neural networks (DNNs) are vulnerable to adversarial examples crafted by well-designed perturbations. This could lead to disastrous results on critical applications such as self-driving cars, surveillance security, and medical diagnosis. At present, adversarial training is one of the most effective defenses against adversarial examples. However, traditional adversarial training makes it diffi… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  37. arXiv:2310.11092  [pdf, other

    cs.CV

    DORec: Decomposed Object Reconstruction Utilizing 2D Self-Supervised Features

    Authors: Jun Wu, Sicheng Li, Sihui Ji, Yue Wang, Rong Xiong, Yiyi Liao

    Abstract: Decomposing a target object from a complex background while reconstructing is challenging. Most approaches acquire the perception for object instances through the use of manual labels, but the annotation procedure is costly. The recent advancements in 2D self-supervised learning have brought new prospects to object-aware representation, yet it remains unclear how to leverage such noisy 2D features… ▽ More

    Submitted 19 October, 2023; v1 submitted 17 October, 2023; originally announced October 2023.

  38. arXiv:2310.04722  [pdf, other

    cs.SD cs.AI eess.AS

    A Holistic Evaluation of Piano Sound Quality

    Authors: Monan Zhou, Shangda Wu, Shaohua Ji, Zijin Li, Wei Li

    Abstract: This paper aims to develop a holistic evaluation method for piano sound quality to assist in purchasing decisions. Unlike previous studies that focused on the effect of piano performance techniques on sound quality, this study evaluates the inherent sound quality of different pianos. To derive quality evaluation systems, the study uses subjective questionnaires based on a piano sound quality datas… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

  39. arXiv:2310.01580  [pdf, other

    cs.HC cs.AI

    Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation

    Authors: Dong H. Jeong, Jin-Hee Cho, Feng Chen, Audun Josang, Soo-Yeon Ji

    Abstract: Artificial neural networks (ANNs) have been broadly utilized to analyze various data and solve different domain problems. However, neural networks (NNs) have been considered a black box operation for years because their underlying computation and meaning are hidden. Due to this nature, users often face difficulties in interpreting the underlying mechanism of the NNs and the benefits of using them.… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  40. arXiv:2309.15132  [pdf, other

    q-bio.QM cs.LG

    Genetic InfoMax: Exploring Mutual Information Maximization in High-Dimensional Imaging Genetics Studies

    Authors: Yaochen Xie, Ziqian Xie, Sheikh Muhammad Saiful Islam, Degui Zhi, Shuiwang Ji

    Abstract: Genome-wide association studies (GWAS) are used to identify relationships between genetic variations and specific traits. When applied to high-dimensional medical imaging data, a key step is to extract lower-dimensional, yet informative representations of the data as traits. Representation learning for imaging genetics is largely under-explored due to the unique challenges posed by GWAS in compari… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 17 pages, 7 figures

  41. arXiv:2309.14742  [pdf, other

    cs.CR

    SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices

    Authors: Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah

    Abstract: Trusted Execution Environments (TEEs) embedded in IoT devices provide a deployable solution to secure IoT applications at the hardware level. By design, in TEEs, the Trusted Operating System (Trusted OS) is the primary component. It enables the TEE to use security-based design techniques, such as data encryption and identity authentication. Once a Trusted OS has been exploited, the TEE can no long… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: To appear in the IEEE Symposium on Security and Privacy (IEEE S&P) 2024, San Francisco, CA, USA

  42. arXiv:2309.13446  [pdf, other

    cs.CV

    Video Timeline Modeling For News Story Understanding

    Authors: Meng Liu, Mingda Zhang, Jialu Liu, Hanjun Dai, Ming-Hsuan Yang, Shuiwang Ji, Zheyun Feng, Boqing Gong

    Abstract: In this paper, we present a novel problem, namely video timeline modeling. Our objective is to create a video-associated timeline from a set of videos related to a specific topic, thereby facilitating the content and structure understanding of the story being told. This problem has significant potential in various real-world applications, for instance, news story summarization. To bootstrap resear… ▽ More

    Submitted 27 October, 2023; v1 submitted 23 September, 2023; originally announced September 2023.

    Comments: Accepted as a spotlight by NeurIPS 2023, Track on Datasets and Benchmarks

  43. arXiv:2309.13256  [pdf, other

    cs.LG cs.AI

    Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks

    Authors: Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang

    Abstract: Pre-trained language models (PLMs) have demonstrated remarkable performance as few-shot learners. However, their security risks under such settings are largely unexplored. In this work, we conduct a pilot study showing that PLMs as few-shot learners are highly vulnerable to backdoor attacks while existing defenses are inadequate due to the unique challenges of few-shot scenarios. To address such c… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: Accepted by NeurIPS'23

  44. arXiv:2309.08958  [pdf, other

    cs.CL cs.AI

    Monolingual or Multilingual Instruction Tuning: Which Makes a Better Alpaca

    Authors: Pinzhen Chen, Shaoxiong Ji, Nikolay Bogoychev, Andrey Kutuzov, Barry Haddow, Kenneth Heafield

    Abstract: Foundational large language models (LLMs) can be instruction-tuned to perform open-domain question answering, facilitating applications like chat assistants. While such efforts are often carried out in a single language, we empirically analyze cost-efficient strategies for multilingual scenarios. Our study employs the Alpaca dataset and machine translations of it to form multilingual data, which i… ▽ More

    Submitted 30 January, 2024; v1 submitted 16 September, 2023; originally announced September 2023.

    Comments: Accepted to Findings of ACL: EACL 2024. Added human evaluation and shortened writing

  45. arXiv:2309.06009  [pdf, other

    cs.CL

    Content Reduction, Surprisal and Information Density Estimation for Long Documents

    Authors: Shaoxiong Ji, Wei Sun, Pekka Marttinen

    Abstract: Many computational linguistic methods have been proposed to study the information content of languages. We consider two interesting research questions: 1) how is information distributed over long documents, and 2) how does content reduction, such as token selection and text summarization, affect the information density in long documents. We present four criteria for information density estimation… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  46. arXiv:2309.04225  [pdf

    cs.CV

    Long-Range Correlation Supervision for Land-Cover Classification from Remote Sensing Images

    Authors: Dawen Yu, Shunping Ji

    Abstract: Long-range dependency modeling has been widely considered in modern deep learning based semantic segmentation methods, especially those designed for large-size remote sensing images, to compensate the intrinsic locality of standard convolutions. However, in previous studies, the long-range dependency, modeled with an attention mechanism or transformer model, has been based on unsupervised learning… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

    Comments: 14 pages, 11 figures

  47. arXiv:2309.03463  [pdf, ps, other

    math.DS

    Lower dimensional invariant tori for multi-scale Hamiltonian systems

    Authors: Weichao Qian, Shuguan Ji, Yong Li

    Abstract: The ``Fundamental Theorem" given by Arnold in [2] asserts the persistence of full dimensional invariant tori for 2-scale Hamiltonian systems. However, persistence in multi-scale systems is much more complicated and difficult. In this paper, we explore the persistence of lower dimensional invariant tori for multi-scale Hamiltonian systems, which play an important role in dynamics of resonant Hamilt… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  48. ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

    Authors: Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang

    Abstract: Data is a critical asset in AI, as high-quality datasets can significantly improve the performance of machine learning models. In safety-critical domains such as autonomous vehicles, offline deep reinforcement learning (offline DRL) is frequently used to train models on pre-collected datasets, as opposed to training these models by interacting with the real-world environment as the online DRL. To… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: To appear in the Network and Distributed System Security Symposium (NDSS) 2024, San Diego, CA, USA

  49. arXiv:2309.01866  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

    Authors: Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji

    Abstract: The widespread adoption of the Android operating system has made malicious Android applications an appealing target for attackers. Machine learning-based (ML-based) Android malware detection (AMD) methods are crucial in addressing this problem; however, their vulnerability to adversarial examples raises concerns. Current attacks against ML-based AMD methods demonstrate remarkable performance but r… ▽ More

    Submitted 6 September, 2023; v1 submitted 4 September, 2023; originally announced September 2023.

    Comments: To Appear in the ACM Conference on Computer and Communications Security, November, 2023

  50. arXiv:2309.01182  [pdf, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Direct visualization of electric current induced dipoles of atomic impurities

    Authors: Yaowu Liu, Zichun Zhang, Sidan Chen, Shengnan Xu, Lichen Ji, Wei Chen, Xinyu Zhou, Jiaxin Luo, Xiaopen Hu, Wenhui Duan, Xi Chen, Qi-Kun Xue, Shuai-Hua Ji

    Abstract: Learning the electron scattering around atomic impurities is a fundamental step to fully understand the basic electronic transport properties of realistic conducting materials. Although many efforts have been made in this field for several decades, atomic scale transport around single point-like impurities has yet been achieved. Here, we report the direct visualization of the electric current indu… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.