Skip to main content

Showing 1–31 of 31 results for author: Bao, T

  1. arXiv:2407.10614  [pdf, other

    cs.SI

    Investigating shocking events in the Ethereum stablecoin ecosystem through temporal multilayer graph structure

    Authors: Cheick Tidiane Ba, Richard G. Clegg, Ben A. Steer, Matteo Zignani

    Abstract: In the dynamic landscape of the Web, we are witnessing the emergence of the Web3 paradigm, which dictates that platforms should rely on blockchain technology and cryptocurrencies to sustain themselves and their profitability. Cryptocurrencies are characterised by high market volatility and susceptibility to substantial crashes, issues that require temporal analysis methodologies able to tackle the… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  2. arXiv:2406.02624  [pdf, other

    cs.CR cs.SE

    Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation

    Authors: Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing

    Abstract: Recently, a novel method known as Page Spray emerges, focusing on page-level exploitation for kernel vulnerabilities. Despite the advantages it offers in terms of exploitability, stability, and compatibility, comprehensive research on Page Spray remains scarce. Questions regarding its root causes, exploitation model, comparative benefits over other exploitation techniques, and possible mitigation… ▽ More

    Submitted 6 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  3. arXiv:2402.11494  [pdf, other

    cs.LG cs.SI

    Graph Out-of-Distribution Generalization via Causal Intervention

    Authors: Qitian Wu, Fan Nie, Chenxiao Yang, Tianyi Bao, Junchi Yan

    Abstract: Out-of-distribution (OOD) generalization has gained increasing attentions for learning on graphs, as graph neural networks (GNNs) often exhibit performance degradation with distribution shifts. The challenge is that distribution shifts on graphs involve intricate interconnections between nodes, and the environment labels are often absent in data. In this paper, we adopt a bottom-up data-generative… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: Accepted by the research paper track of The Web Conference (WWW) 2024. The codes are available at https://github.com/fannie1208/CaNet

  4. arXiv:2402.09272  [pdf, other

    cs.SI

    Insights and caveats from mining local and global temporal motifs in cryptocurrency transaction networks

    Authors: Naomi A. Arnold, Peijie Zhong, Cheick Tidiane Ba, Ben Steer, Raul Mondragon, Felix Cuadrado, Renaud Lambiotte, Richard G. Clegg

    Abstract: Distributed ledger technologies have opened up a wealth of fine-grained transaction data from cryptocurrencies like Bitcoin and Ethereum. This allows research into problems like anomaly detection, anti-money laundering, pattern mining and activity clustering (where data from traditional currencies is rarely available). The formalism of temporal networks offers a natural way of representing this da… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  5. arXiv:2312.05275  [pdf, other

    cs.CR cs.AI

    Exploring the Limits of ChatGPT in Software Security Applications

    Authors: Fangzhou Wu, Qingzhao Zhang, Ati Priya Bajaj, Tiffany Bao, Ning Zhang, Ruoyu "Fish" Wang, Chaowei Xiao

    Abstract: Large language models (LLMs) have undergone rapid evolution and achieved remarkable results in recent times. OpenAI's ChatGPT, backed by GPT-3.5 or GPT-4, has gained instant popularity due to its strong capability across a wide range of tasks, including natural language tasks, coding, mathematics, and engaging conversations. However, the impacts and limits of such LLMs in system security domain ar… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  6. arXiv:2311.18149  [pdf, other

    cs.CV

    STF: Spatial Temporal Fusion for Trajectory Prediction

    Authors: Pengqian Han, Partha Roop, Jiamou Liu, Tianzhe Bao, Yifei Wang

    Abstract: Trajectory prediction is a challenging task that aims to predict the future trajectory of vehicles or pedestrians over a short time horizon based on their historical positions. The main reason is that the trajectory is a kind of complex data, including spatial and temporal information, which is crucial for accurate prediction. Intuitively, the more information the model can capture, the more preci… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: 6 pages, 6 figures

  7. arXiv:2311.11315  [pdf, other

    cs.AI

    TPTU-v2: Boosting Task Planning and Tool Usage of Large Language Model-based Agents in Real-world Systems

    Authors: Yilun Kong, Jingqing Ruan, Yihong Chen, Bin Zhang, Tianpeng Bao, Shiwei Shi, Guoqing Du, Xiaoru Hu, Hangyu Mao, Ziyue Li, Xingyu Zeng, Rui Zhao

    Abstract: Large Language Models (LLMs) have demonstrated proficiency in addressing tasks that necessitate a combination of task planning and the usage of external tools that require a blend of task planning and the utilization of external tools, such as APIs. However, real-world complex systems present three prevalent challenges concerning task planning and tool usage: (1) The real system usually has a vast… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

  8. arXiv:2308.03427  [pdf, other

    cs.AI

    TPTU: Large Language Model-based AI Agents for Task Planning and Tool Usage

    Authors: Jingqing Ruan, Yihong Chen, Bin Zhang, Zhiwei Xu, Tianpeng Bao, Guoqing Du, Shiwei Shi, Hangyu Mao, Ziyue Li, Xingyu Zeng, Rui Zhao

    Abstract: With recent advancements in natural language processing, Large Language Models (LLMs) have emerged as powerful tools for various real-world applications. Despite their prowess, the intrinsic generative abilities of LLMs may prove insufficient for handling complex tasks which necessitate a combination of task planning and the usage of external tools. In this paper, we first propose a structured fra… ▽ More

    Submitted 7 November, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

    Comments: Accepted in NeurIPS-2023 Workshop on Foundation Models for Decision Making

  9. arXiv:2306.16309  [pdf, other

    cs.SI

    Raphtory: The temporal graph engine for Rust and Python

    Authors: Ben Steer, Naomi Arnold, Cheick Tidiane Ba, Renaud Lambiotte, Haaroon Yousaf, Lucas Jeub, Fabian Murariu, Shivam Kapoor, Pedro Rico, Rachel Chan, Louis Chan, James Alford, Richard G. Clegg, Felix Cuadrado, Matthew Russell Barnes, Peijie Zhong, John N. Pougué Biyong, Alhamza Alnaimi

    Abstract: Raphtory is a platform for building and analysing temporal networks. The library includes methods for creating networks from a variety of data sources; algorithms to explore their structure and evolution; and an extensible GraphQL server for deployment of applications built on top. Raphtory's core engine is built in Rust, for efficiency, with Python interfaces, for ease of use. Raphtory is develop… ▽ More

    Submitted 3 January, 2024; v1 submitted 28 June, 2023; originally announced June 2023.

  10. arXiv:2306.02061  [pdf, other

    cs.CV

    Balancing Logit Variation for Long-tailed Semantic Segmentation

    Authors: Yuchao Wang, Jingjing Fei, Haochen Wang, Wei Li, Tianpeng Bao, Liwei Wu, Rui Zhao, Yujun Shen

    Abstract: Semantic segmentation usually suffers from a long-tail data distribution. Due to the imbalanced number of samples across categories, the features of those tail classes may get squeezed into a narrow area in the feature space. Towards a balanced feature distribution, we introduce category-wise variation into the network predictions in the training phase such that an instance is no longer projected… ▽ More

    Submitted 3 June, 2023; originally announced June 2023.

  11. arXiv:2305.17934  [pdf, other

    cs.CV

    ZeroPose: CAD-Model-based Zero-Shot Pose Estimation

    Authors: Jianqiu Chen, Mingshan Sun, Tianpeng Bao, Rui Zhao, Liwei Wu, Zhenyu He

    Abstract: In this paper, we present a CAD model-based zero-shot pose estimation pipeline called ZeroPose. Existing pose estimation methods remain to require expensive training when applied to an unseen object, which greatly hinders their scalability in the practical application of industry. In contrast, the proposed method enables the accurate estimation of pose parameters for previously unseen objects with… ▽ More

    Submitted 21 August, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  12. arXiv:2305.09953  [pdf, other

    cs.IT eess.SP

    Low Complexity Detection of Spatial Modulation Aided OTFS in Doubly-Selective Channels

    Authors: Zeping Sui, Hongming Zhang, Yu Xin, Tong Bao, Lie-Liang Yang, Lajos Hanzo

    Abstract: A spatial modulation-aided orthogonal time frequency space (SM-OTFS) scheme is proposed for high-Doppler scenarios, which relies on a low-complexity distance-based detection algorithm. We first derive the delay-Doppler (DD) domain input-output relationship of our SM-OTFS system by exploiting an SM mapper, followed by characterizing the doubly-selective channels considered. Then we propose a distan… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  13. arXiv:2304.12130  [pdf, other

    physics.flu-dyn cs.LG

    Reconstructing Turbulent Flows Using Physics-Aware Spatio-Temporal Dynamics and Test-Time Refinement

    Authors: Shengyu Chen, Tianshu Bao, Peyman Givi, Can Zheng, Xiaowei Jia

    Abstract: Simulating turbulence is critical for many societally important applications in aerospace engineering, environmental science, the energy industry, and biomedicine. Large eddy simulation (LES) has been widely used as an alternative to direct numerical simulation (DNS) for simulating turbulent flows due to its reduced computational cost. However, LES is unable to capture all of the scales of turbule… ▽ More

    Submitted 12 December, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

    Comments: 19 pages

  14. arXiv:2303.08481  [pdf, other

    cs.CV

    SeqCo-DETR: Sequence Consistency Training for Self-Supervised Object Detection with Transformers

    Authors: Guoqiang Jin, Fan Yang, Mingshan Sun, Ruyi Zhao, Yakun Liu, Wei Li, Tianpeng Bao, Liwei Wu, Xingyu Zeng, Rui Zhao

    Abstract: Self-supervised pre-training and transformer-based networks have significantly improved the performance of object detection. However, most of the current self-supervised object detection methods are built on convolutional-based architectures. We believe that the transformers' sequence characteristics should be considered when designing a transformer-based self-supervised method for the object dete… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

  15. arXiv:2211.13968  [pdf, other

    cs.CV

    MIAD: A Maintenance Inspection Dataset for Unsupervised Anomaly Detection

    Authors: Tianpeng Bao, Jiadong Chen, Wei Li, Xiang Wang, Jingjing Fei, Liwei Wu, Rui Zhao, Ye Zheng

    Abstract: Visual anomaly detection plays a crucial role in not only manufacturing inspection to find defects of products during manufacturing processes, but also maintenance inspection to keep equipment in optimum working condition particularly outdoors. Due to the scarcity of the defective samples, unsupervised anomaly detection has attracted great attention in recent years. However, existing datasets for… ▽ More

    Submitted 28 November, 2022; v1 submitted 25 November, 2022; originally announced November 2022.

  16. arXiv:2210.10959  [pdf, other

    cs.CV

    Geo6D: Geometric Constraints Learning for 6D Pose Estimation

    Authors: Jianqiu Chen, Mingshan Sun, Ye Zheng, Tianpeng Bao, Zhenyu He, Donghai Li, Guoqiang Jin, Rui Zhao, Liwei Wu, Xiaoke Jiang

    Abstract: Numerous 6D pose estimation methods have been proposed that employ end-to-end regression to directly estimate the target pose parameters. Since the visible features of objects are implicitly influenced by their poses, the network allows inferring the pose by analyzing the differences in features in the visible region. However, due to the unpredictable and unrestricted range of pose variations, the… ▽ More

    Submitted 21 August, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

  17. arXiv:2208.06416  [pdf, other

    cs.CV

    Uni6Dv2: Noise Elimination for 6D Pose Estimation

    Authors: Mingshan Sun, Ye Zheng, Tianpeng Bao, Jianqiu Chen, Guoqiang Jin, Liwei Wu, Rui Zhao, Xiaoke Jiang

    Abstract: Uni6D is the first 6D pose estimation approach to employ a unified backbone network to extract features from both RGB and depth images. We discover that the principal reasons of Uni6D performance limitations are Instance-Outside and Instance-Inside noise. Uni6D's simple pipeline design inherently introduces Instance-Outside noise from background pixels in the receptive field, while ignoring Instan… ▽ More

    Submitted 16 March, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

  18. arXiv:2204.08592  [pdf

    cs.CR

    Context-Auditor: Context-sensitive Content Injection Mitigation

    Authors: Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé

    Abstract: Cross-site scripting (XSS) is the most common vulnerability class in web applications over the last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection in the face of advanced attacks. One technique that bypasses XSS mitigations is the scriptless attack: a content injection technique that uses (among ot… ▽ More

    Submitted 28 April, 2022; v1 submitted 18 April, 2022; originally announced April 2022.

  19. arXiv:2201.13180  [pdf, other

    cs.LG

    Learning on Arbitrary Graph Topologies via Predictive Coding

    Authors: Tommaso Salvatori, Luca Pinchetti, Beren Millidge, Yuhang Song, Tianyi Bao, Rafal Bogacz, Thomas Lukasiewicz

    Abstract: Training with backpropagation (BP) in standard deep learning consists of two main steps: a forward pass that maps a data point to its prediction, and a backward pass that propagates the error of this prediction back through the network. This process is highly effective when the goal is to minimize a specific objective function. However, it does not allow training on networks with cyclic or backwar… ▽ More

    Submitted 12 October, 2022; v1 submitted 31 January, 2022; originally announced January 2022.

    Comments: 15 pages, 11 figures

  20. arXiv:2110.04538  [pdf, other

    cs.CV cs.AI

    Focus Your Distribution: Coarse-to-Fine Non-Contrastive Learning for Anomaly Detection and Localization

    Authors: Ye Zheng, Xiang Wang, Rui Deng, Tianpeng Bao, Rui Zhao, Liwei Wu

    Abstract: The essence of unsupervised anomaly detection is to learn the compact distribution of normal samples and detect outliers as anomalies in testing. Meanwhile, the anomalies in real-world are usually subtle and fine-grained in a high-resolution image especially for industrial applications. Towards this end, we propose a novel framework for unsupervised anomaly detection and localization. Our method a… ▽ More

    Submitted 18 July, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

    Comments: ICME2022 oral

  21. Understanding Data Storage and Ingestion for Large-Scale Deep Recommendation Model Training

    Authors: Mark Zhao, Niket Agarwal, Aarti Basant, Bugra Gedik, Satadru Pan, Mustafa Ozdal, Rakesh Komuravelli, Jerry Pan, Tianshu Bao, Haowei Lu, Sundaram Narayanan, Jack Langman, Kevin Wilfong, Harsha Rastogi, Carole-Jean Wu, Christos Kozyrakis, Parik Pol

    Abstract: Datacenter-scale AI training clusters consisting of thousands of domain-specific accelerators (DSA) are used to train increasingly-complex deep learning models. These clusters rely on a data storage and ingestion (DSI) pipeline, responsible for storing exabytes of training data and serving it at tens of terabytes per second. As DSAs continue to push training efficiency and throughput, the DSI pipe… ▽ More

    Submitted 22 April, 2022; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: In The 49th Annual International Symposium on Computer Architecture (ISCA 2022)

  22. arXiv:2103.12843  [pdf, other

    cs.CR

    Scam Pandemic: How Attackers Exploit Public Fear through Phishing

    Authors: Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn

    Abstract: As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measurement study of online social engineering attacks in the early months of the pandemic. By collecting, synthesizing, and analyzing DNS records, TLS cer… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 10 pages, Accepted to eCrime 2020

  23. arXiv:2102.07869  [pdf, other

    cs.CR

    Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits

    Authors: Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras

    Abstract: Assessing the exploitability of software vulnerabilities at the time of disclosure is difficult and error-prone, as features extracted via technical analysis by existing metrics are poor predictors for exploit development. Moreover, exploitability assessments suffer from a class bias because "not exploitable" labels could be inaccurate. To overcome these challenges, we propose a new metric, called… ▽ More

    Submitted 3 February, 2022; v1 submitted 15 February, 2021; originally announced February 2021.

  24. arXiv:2004.12852  [pdf, other

    cs.CV cs.LG eess.IV physics.med-ph q-bio.QM

    AI-Driven CT-based quantification, staging and short-term outcome prediction of COVID-19 pneumonia

    Authors: Guillaume Chassagnon, Maria Vakalopoulou, Enzo Battistella, Stergios Christodoulidis, Trieu-Nghi Hoang-Thi, Severine Dangeard, Eric Deutsch, Fabrice Andre, Enora Guillo, Nara Halm, Stefany El Hajj, Florian Bompard, Sophie Neveu, Chahinez Hani, Ines Saab, Alienor Campredon, Hasmik Koulakian, Souhail Bennani, Gael Freche, Aurelien Lombard, Laure Fournier, Hippolyte Monnier, Teodor Grand, Jules Gregory, Antoine Khalil , et al. (6 additional authors not shown)

    Abstract: Chest computed tomography (CT) is widely used for the management of Coronavirus disease 2019 (COVID-19) pneumonia because of its availability and rapidity. The standard of reference for confirming COVID-19 relies on microbiological tests but these tests might not be available in an emergency setting and their results are not immediately available, contrary to CT. In addition to its role for early… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  25. arXiv:1909.02977  [pdf, other

    cs.LG cs.SI stat.ML

    Parallel Computation of Graph Embeddings

    Authors: Chi Thang Duong, Hongzhi Yin, Thanh Dat Hoang, Truong Giang Le Ba, Matthias Weidlich, Quoc Viet Hung Nguyen, Karl Aberer

    Abstract: Graph embedding aims at learning a vector-based representation of vertices that incorporates the structure of the graph. This representation then enables inference of graph properties. Existing graph embedding techniques, however, do not scale well to large graphs. We therefore propose a framework for parallel computation of a graph embedding using a cluster of compute nodes with resource constrai… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  26. arXiv:1906.08902  [pdf, other

    cs.LG cs.CC quant-ph stat.ML

    Quantum-Inspired Support Vector Machine

    Authors: Chen Ding, Tian-Yi Bao, He-Liang Huang

    Abstract: Support vector machine (SVM) is a particularly powerful and flexible supervised learning model that analyzes data for both classification and regression, whose usual algorithm complexity scales polynomially with the dimension of data space and the number of data points. To tackle the big data challenge, a quantum SVM algorithm was proposed, which is claimed to achieve exponential speedup for least… ▽ More

    Submitted 15 March, 2021; v1 submitted 20 June, 2019; originally announced June 2019.

    Journal ref: IEEE Transactions on Neural Networks and Learning Systems, 33(12), 7210-7222 (2022)

  27. arXiv:1906.05657  [pdf

    cs.CY cs.LG stat.ML

    Automatically Evaluating Balance: A Machine Learning Approach

    Authors: Tian Bao, Brooke N. Klatt, Susan L. Whitney, Kathleen H. Sienko, Jenna Wiens

    Abstract: Compared to in-clinic balance training, in-home training is not as effective. This is, in part, due to the lack of feedback from physical therapists (PTs). Here, we analyze the feasibility of using trunk sway data and machine learning (ML) techniques to automatically evaluate balance, providing accurate assessments outside of the clinic. We recruited sixteen participants to perform standing balanc… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: 8 pages, 4 figures, 5 tables

    Journal ref: IEEE Transactions on Neural Systems and Rehabilitation Engineering 2019

  28. ASMCNN: An Efficient Brain Extraction Using Active Shape Model and Convolutional Neural Networks

    Authors: Duy H. M. Nguyen, Duy M. Nguyen, Mai T. N. Truong, Thu Nguyen, Khanh T. Tran, Nguyen A. Triet, Pham T. Bao, Binh T. Nguyen

    Abstract: Brain extraction (skull stripping) is a challenging problem in neuroimaging. It is due to the variability in conditions from data acquisition or abnormalities in images, making brain morphology and intensity characteristics changeable and complicated. In this paper, we propose an algorithm for skull stripping in Magnetic Resonance Imaging (MRI) scans, namely ASMCNN, by combining the Active Shape M… ▽ More

    Submitted 27 January, 2022; v1 submitted 5 February, 2018; originally announced February 2018.

    Comments: 47 pages, 20 figures

    MSC Class: 68T10

  29. arXiv:1712.06682  [pdf, other

    cs.CV cs.CL cs.LG

    Synthesizing Novel Pairs of Image and Text

    Authors: Jason Xie, Tingwen Bao

    Abstract: Generating novel pairs of image and text is a problem that combines computer vision and natural language processing. In this paper, we present strategies for generating novel image and caption pairs based on existing captioning datasets. The model takes advantage of recent advances in generative adversarial networks and sequence-to-sequence modeling. We make generalizations to generate paired samp… ▽ More

    Submitted 18 December, 2017; originally announced December 2017.

  30. arXiv:1612.02513  [pdf

    cs.CV

    Complex Matrix Factorization for Face Recognition

    Authors: Viet-Hang Duong, Yuan-Shan Lee, Bach-Tung Pham, Seksan Mathulaprangsan, Pham The Bao, Jia-Ching Wang

    Abstract: This work developed novel complex matrix factorization methods for face recognition; the methods were complex matrix factorization (CMF), sparse complex matrix factorization (SpaCMF), and graph complex matrix factorization (GraCMF). After real-valued data are transformed into a complex field, the complex-valued matrix will be decomposed into two matrices of bases and coefficients, which are derive… ▽ More

    Submitted 7 December, 2016; originally announced December 2016.

    Comments: 4 pages,3 figures,4 tables

  31. arXiv:1206.5795  [pdf

    cs.NI

    Cell Oscillation Resolution in Mobility Profile Building

    Authors: Shafqat Ali Shad, Enhong Chen, Tengfei Bao

    Abstract: This paper has been withdrawn by the authors. Mobility profile building became extensively examined area in Location based services (LBS) through extraction of significant locations. Mobility traces are recorded under three reference positioning systems that are Satellite based i.e. GPS, Network based i.e. GSM and Local positioning i.e. WLAN, RFID, IrDA. Satellite based and local positioning due t… ▽ More

    Submitted 24 October, 2013; v1 submitted 25 June, 2012; originally announced June 2012.

    Journal ref: International Journal of Computer Science Issues, vol. 9, no. 3, pp. 205-213, 2012