Skip to main content

Showing 1–50 of 112 results for author: Fang, W

  1. arXiv:2407.00870  [pdf, other

    cs.CL cs.HC

    Roleplay-doh: Enabling Domain-Experts to Create LLM-simulated Patients via Eliciting and Adhering to Principles

    Authors: Ryan Louie, Ananjan Nandi, William Fang, Cheng Chang, Emma Brunskill, Diyi Yang

    Abstract: Recent works leverage LLMs to roleplay realistic social scenarios, aiding novices in practicing their social skills. However, simulating sensitive interactions, such as in mental health, is challenging. Privacy concerns restrict data access, and collecting expert feedback, although vital, is laborious. To address this, we develop Roleplay-doh, a novel human-LLM collaboration pipeline that elicits… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: 34 pages, 24 figures, 11 Tables

  2. arXiv:2406.04568  [pdf, other

    cs.SE cs.AI cs.LG

    StackSight: Unveiling WebAssembly through Large Language Models and Neurosymbolic Chain-of-Thought Decompilation

    Authors: Weike Fang, Zhejian Zhou, Junzhou He, Weihang Wang

    Abstract: WebAssembly enables near-native execution in web applications and is increasingly adopted for tasks that demand high performance and robust security. However, its assembly-like syntax, implicit stack machine, and low-level data types make it extremely difficult for human developers to understand, spurring the need for effective WebAssembly reverse engineering techniques. In this paper, we propose… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 9 pages. In the Proceedings of the 41st International Conference on Machine Learning (ICML' 24)

  3. arXiv:2406.02971  [pdf, other

    math.CO cs.DM

    Maximal number of subword occurrences in a word

    Authors: Wenjie Fang

    Abstract: We consider the number of occurrences of subwords (non-consecutive sub-sequences) in a given word. We first define the notion of subword entropy of a given word that measures the maximal number of occurrences among all possible subwords. We then give upper and lower bounds of minimal subword entropy for words of fixed length in a fixed alphabet, and also showing that minimal subword entropy per le… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: Extended abstract accepted by 35th International Conference on Probabilistic, Combinatorial and Asymptotic Methods for the Analysis of Algorithms (AofA 2024). Comments are welcome

  4. arXiv:2405.13515  [pdf, other

    quant-ph cs.AI cs.LG

    Multi-Scale Feature Fusion Quantum Depthwise Convolutional Neural Networks for Text Classification

    Authors: Yixiong Chen, Weichuan Fang

    Abstract: In recent years, with the development of quantum machine learning, quantum neural networks (QNNs) have gained increasing attention in the field of natural language processing (NLP) and have achieved a series of promising results. However, most existing QNN models focus on the architectures of quantum recurrent neural network (QRNN) and self-attention mechanism (QSAM). In this work, we propose a no… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  5. arXiv:2405.05525  [pdf, other

    cs.CR cs.LG

    Ditto: Quantization-aware Secure Inference of Transformers upon MPC

    Authors: Haoqi Wu, Wenjing Fang, Yancheng Zheng, Junming Ma, Jin Tan, Yinggui Wang, Lei Wang

    Abstract: Due to the rising privacy concerns on sensitive client data and trained models like Transformers, secure multi-party computation (MPC) techniques are employed to enable secure inference despite attendant overhead. Existing works attempt to reduce the overhead using more MPC-friendly non-linear function approximations. However, the integration of quantization widely used in plaintext inference into… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

    Comments: to be published in ICML 2024

  6. arXiv:2405.03197  [pdf, other

    cs.CV

    StyleSeg V2: Towards Robust One-shot Segmentation of Brain Tissue via Optimization-free Registration Error Perception

    Authors: Zhiwei Wang, Xiaoyu Zeng, Chongwei Wu, Jinxin lv, Xu Zhang, Wei Fang, Qiang Li

    Abstract: One-shot segmentation of brain tissue requires training registration-segmentation (reg-seg) dual-model iteratively, where reg-model aims to provide pseudo masks of unlabeled images for seg-model by warping a carefully-labeled atlas. However, the imperfect reg-model induces image-mask misalignment, poisoning the seg-model subsequently. Recent StyleSeg bypasses this bottleneck by replacing the unlab… ▽ More

    Submitted 18 May, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

    Comments: 10 pages, 11 figures, 2 tables

  7. arXiv:2404.04878  [pdf, other

    eess.IV cs.CV

    CycleINR: Cycle Implicit Neural Representation for Arbitrary-Scale Volumetric Super-Resolution of Medical Data

    Authors: Wei Fang, Yuxing Tang, Heng Guo, Mingze Yuan, Tony C. W. Mok, Ke Yan, Jiawen Yao, Xin Chen, Zaiyi Liu, Le Lu, Ling Zhang, Minfeng Xu

    Abstract: In the realm of medical 3D data, such as CT and MRI images, prevalent anisotropic resolution is characterized by high intra-slice but diminished inter-slice resolution. The lowered resolution between adjacent slices poses challenges, hindering optimal viewing experiences and impeding the development of robust downstream analysis algorithms. Various volumetric super-resolution algorithms aim to sur… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: CVPR accepted paper

  8. arXiv:2403.18453  [pdf, other

    cs.AR

    Annotating Slack Directly on Your Verilog: Fine-Grained RTL Timing Evaluation for Early Optimization

    Authors: Wenji Fang, Shang Liu, Hongce Zhang, Zhiyao Xie

    Abstract: In digital IC design, compared with post-synthesis netlists or layouts, the early register-transfer level (RTL) stage offers greater optimization flexibility for both designers and EDA tools. However, timing information is typically unavailable at this early stage. Some recent machine learning (ML) solutions propose to predict the total negative slack (TNS) and worst negative slack (WNS) of an ent… ▽ More

    Submitted 6 May, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

    Comments: Published as a conference paper at Design Automation Conference (DAC) 2024

  9. arXiv:2403.17751  [pdf, other

    cs.IT eess.SP

    Robust Analysis of Full-Duplex Two-Way Space Shift Keying With RIS Systems

    Authors: Xusheng Zhu, Wen Chen, Qingqing Wu, Wen Fang, Chaoying Huang, Jun Li

    Abstract: Reconfigurable intelligent surface (RIS)-assisted index modulation system schemes are considered a promising technology for sixth-generation (6G) wireless communication systems, which can enhance various system capabilities such as coverage and reliability. However, obtaining perfect channel state information (CSI) is challenging due to the lack of a radio frequency chain in RIS. In this paper, we… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  10. arXiv:2403.14690  [pdf

    cs.CY cs.AI cs.CL cs.LG

    Incorporating Graph Attention Mechanism into Geometric Problem Solving Based on Deep Reinforcement Learning

    Authors: Xiuqin Zhong, Shengyuan Yan, Gongqi Lin, Hongguang Fu, Liang Xu, Siwen Jiang, Lei Huang, Wei Fang

    Abstract: In the context of online education, designing an automatic solver for geometric problems has been considered a crucial step towards general math Artificial Intelligence (AI), empowered by natural language understanding and traditional logical inference. In most instances, problems are addressed by adding auxiliary components such as lines or points. However, adding auxiliary components automatical… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  11. arXiv:2403.11436  [pdf, ps, other

    cs.IT

    Deep Holes of Twisted Reed-Solomon Codes

    Authors: Weijun Fang, Jingke Xu, Ruiqi Zhu

    Abstract: The deep holes of a linear code are the vectors that achieve the maximum error distance to the code. There has been extensive research on the topic of deep holes in Reed-Solomon codes. As a generalization of Reed-Solomon codes, we investigate the problem of deep holes of a class of twisted Reed-Solomon codes in this paper. The covering radius and a standard class of deep holes of twisted Reed-Solo… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: This work has been submitted to the IEEE for possible publication

  12. arXiv:2403.07257  [pdf, other

    cs.AR cs.ET

    The Dawn of AI-Native EDA: Opportunities and Challenges of Large Circuit Models

    Authors: Lei Chen, Yiqi Chen, Zhufei Chu, Wenji Fang, Tsung-Yi Ho, Ru Huang, Yu Huang, Sadaf Khan, Min Li, Xingquan Li, Yu Li, Yun Liang, Jinwei Liu, Yi Liu, Yibo Lin, Guojie Luo, Zhengyuan Shi, Guangyu Sun, Dimitrios Tsaras, Runsheng Wang, Ziyi Wang, Xinming Wei, Zhiyao Xie, Qiang Xu, Chenhao Xue , et al. (14 additional authors not shown)

    Abstract: Within the Electronic Design Automation (EDA) domain, AI-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutions often repurpose deep learning models from other domains, such as vision, text, and graph analytics, applying them to circuit design without tailoring to the unique complexities of electronic circuits. Suc… ▽ More

    Submitted 1 May, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: The authors are ordered alphabetically. Contact: qxu@cse[dot]cuhk[dot]edu[dot]hk, gluo@pku[dot]edu[dot]cn, yuan.mingxuan@huawei[dot]com

  13. arXiv:2403.05832  [pdf, other

    cs.CE

    Research progress on intelligent optimization techniques for energy-efficient design of ship hull forms

    Authors: Shuwei Zhu, Siying Lv, Kaifeng Chen, Wei Fang, Leilei Cao

    Abstract: The design optimization of ship hull form based on hydrodynamics theory and simulation-based design (SBD) technologies generally considers ship performance and energy efficiency performance as the design objective, which plays an important role in smart design and manufacturing of green ship. An optimal design of sustainable energy system requires multidisciplinary tools to build ships with the le… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: 30 pages, 8 figures

    MSC Class: 41C99 ACM Class: J.6; I.2.8

  14. arXiv:2402.19061  [pdf, other

    cs.NE

    Optimal ANN-SNN Conversion with Group Neurons

    Authors: Liuzhenghao Lv, Wei Fang, Li Yuan, Yonghong Tian

    Abstract: Spiking Neural Networks (SNNs) have emerged as a promising third generation of neural networks, offering unique characteristics such as binary outputs, high sparsity, and biological plausibility. However, the lack of effective learning algorithms remains a challenge for SNNs. For instance, while converting artificial neural networks (ANNs) to SNNs circumvents the need for direct training of SNNs,… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: Accepted by International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2024

  15. arXiv:2402.14600  [pdf, other

    cs.AI

    Diffusion Model-Based Multiobjective Optimization for Gasoline Blending Scheduling

    Authors: Wenxuan Fang, Wei Du, Renchu He, Yang Tang, Yaochu Jin, Gary G. Yen

    Abstract: Gasoline blending scheduling uses resource allocation and operation sequencing to meet a refinery's production requirements. The presence of nonlinearity, integer constraints, and a large number of decision variables adds complexity to this problem, posing challenges for traditional and evolutionary algorithms. This paper introduces a novel multiobjective optimization approach driven by a diffusio… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

  16. WEFix: Intelligent Automatic Generation of Explicit Waits for Efficient Web End-to-End Flaky Tests

    Authors: Xinyue Liu, Zihe Song, Weike Fang, Wei Yang, Weihang Wang

    Abstract: Web end-to-end (e2e) testing evaluates the workflow of a web application. It simulates real-world user scenarios to ensure the application flows behave as expected. However, web e2e tests are notorious for being flaky, i.e., the tests can produce inconsistent results despite no changes to the code. One common type of flakiness is caused by nondeterministic execution orders between the test code an… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Comments: 8 pages. Accepted for publication in the proceedings of the ACM Web Conference 2024 (WWW 24)

  17. arXiv:2402.00386  [pdf, other

    cs.AR

    AssertLLM: Generating and Evaluating Hardware Verification Assertions from Design Specifications via Multi-LLMs

    Authors: Wenji Fang, Mengming Li, Min Li, Zhiyuan Yan, Shang Liu, Hongce Zhang, Zhiyao Xie

    Abstract: Assertion-based verification (ABV) is a critical method for ensuring design circuits comply with their architectural specifications, which are typically described in natural language. This process often requires significant interpretation by engineers to convert these specifications into functional verification assertions. Existing methods for generating assertions from natural language specificat… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  18. arXiv:2401.13266  [pdf, other

    cs.AR

    SpecLLM: Exploring Generation and Review of VLSI Design Specification with Large Language Model

    Authors: Mengming Li, Wenji Fang, Qijun Zhang, Zhiyao Xie

    Abstract: The development of architecture specifications is an initial and fundamental stage of the integrated circuit (IC) design process. Traditionally, architecture specifications are crafted by experienced chip architects, a process that is not only time-consuming but also error-prone. Mistakes in these specifications may significantly affect subsequent stages of chip design. Despite the presence of adv… ▽ More

    Submitted 24 January, 2024; originally announced January 2024.

  19. arXiv:2401.02020  [pdf, other

    cs.NE cs.CV cs.LG

    Spikformer V2: Join the High Accuracy Club on ImageNet with an SNN Ticket

    Authors: Zhaokun Zhou, Kaiwei Che, Wei Fang, Keyu Tian, Yuesheng Zhu, Shuicheng Yan, Yonghong Tian, Li Yuan

    Abstract: Spiking Neural Networks (SNNs), known for their biologically plausible architecture, face the challenge of limited performance. The self-attention mechanism, which is the cornerstone of the high-performance Transformer and also a biologically inspired structure, is absent in existing SNNs. To this end, we explore the potential of leveraging both self-attention capability and biological properties… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  20. arXiv:2401.01070  [pdf, other

    cs.NE

    A Novel Dual-Stage Evolutionary Algorithm for Finding Robust Solutions

    Authors: Wei Du, Wenxuan Fang, Chen Liang, Yang Tang, Yaochu Jin

    Abstract: In robust optimization problems, the magnitude of perturbations is relatively small. Consequently, solutions within certain regions are less likely to represent the robust optima when perturbations are introduced. Hence, a more efficient search process would benefit from increased opportunities to explore promising regions where global optima or good local optima are situated. In this paper, we in… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  21. arXiv:2312.08617  [pdf, other

    cs.PL cs.AR

    RTLCoder: Outperforming GPT-3.5 in Design RTL Generation with Our Open-Source Dataset and Lightweight Solution

    Authors: Shang Liu, Wenji Fang, Yao Lu, Qijun Zhang, Hongce Zhang, Zhiyao Xie

    Abstract: The automatic generation of RTL code (e.g., Verilog) using natural language instructions and large language models (LLMs) has attracted significant research interest recently. However, most existing approaches heavily rely on commercial LLMs such as ChatGPT, while open-source LLMs tailored for this specific design generation task exhibit notably inferior performance. The absence of high-quality op… ▽ More

    Submitted 20 February, 2024; v1 submitted 13 December, 2023; originally announced December 2023.

  22. arXiv:2311.11313  [pdf, other

    quant-ph cs.PL

    Symbolic Execution for Quantum Error Correction Programs

    Authors: Wang Fang, Mingsheng Ying

    Abstract: We define QSE, a symbolic execution framework for quantum programs by integrating symbolic variables into quantum states and the outcomes of quantum measurements. The soundness of QSE is established through a theorem that ensures the correctness of symbolic execution within operational semantics. We further introduce symbolic stabilizer states, which symbolize the phases of stabilizer generators,… ▽ More

    Submitted 28 April, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

    Comments: 41pages, 11 figures. v2: fix inappropriate use of Stim. v3: Extended version of PLDI 2024 publication

  23. arXiv:2311.08441  [pdf, other

    cs.AR

    MasterRTL: A Pre-Synthesis PPA Estimation Framework for Any RTL Design

    Authors: Wenji Fang, Yao Lu, Shang Liu, Qijun Zhang, Ceyu Xu, Lisa Wu Wills, Hongce Zhang, Zhiyao Xie

    Abstract: In modern VLSI design flow, the register-transfer level (RTL) stage is a critical point, where designers define precise design behavior with hardware description languages (HDLs) like Verilog. Since the RTL design is in the format of HDL code, the standard way to evaluate its quality requires time-consuming subsequent synthesis steps with EDA tools. This time-consuming process significantly impede… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

    Comments: To be published in the Proceedings of 42nd IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2023

  24. arXiv:2311.03906  [pdf, other

    quant-ph cs.ET

    SymPhase: Phase Symbolization for Fast Simulation of Stabilizer Circuits

    Authors: Wang Fang, Mingsheng Ying

    Abstract: This paper proposes an efficient stabilizer circuit simulation algorithm that only traverses the circuit forward once. We introduce phase symbolization into stabilizer generators, which allows possible Pauli faults in the circuit to be accumulated explicitly as symbolic expressions in the phases of stabilizer generators. This way, the measurement outcomes are also symbolic expressions, and we can… ▽ More

    Submitted 21 November, 2023; v1 submitted 7 November, 2023; originally announced November 2023.

    Comments: 7 pages, 3 figures; v2: fix inappropriate use of Stim

  25. arXiv:2310.17890  [pdf, other

    cs.LG cs.IT eess.SP

    Submodel Partitioning in Hierarchical Federated Learning: Algorithm Design and Convergence Analysis

    Authors: Wenzhi Fang, Dong-Jun Han, Christopher G. Brinton

    Abstract: Hierarchical federated learning (HFL) has demonstrated promising scalability advantages over the traditional "star-topology" architecture-based federated learning (FL). However, HFL still imposes significant computation, communication, and storage burdens on the edge, especially when training a large-scale model over resource-constrained Internet of Things (IoT) devices. In this paper, we propose… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

    Comments: 14 pages, 4 figures

  26. arXiv:2310.16620  [pdf, other

    cs.NE cs.LG cs.SE

    SpikingJelly: An open-source machine learning infrastructure platform for spike-based intelligence

    Authors: Wei Fang, Yanqi Chen, Jianhao Ding, Zhaofei Yu, Timothée Masquelier, Ding Chen, Liwei Huang, Huihui Zhou, Guoqi Li, Yonghong Tian

    Abstract: Spiking neural networks (SNNs) aim to realize brain-inspired intelligence on neuromorphic chips with high energy efficiency by introducing neural dynamics and spike properties. As the emerging spiking deep learning paradigm attracts increasing interest, traditional programming frameworks cannot meet the demands of the automatic differentiation, parallel computation acceleration, and high integrati… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted in Science Advances (https://www.science.org/doi/10.1126/sciadv.adi1480)

  27. arXiv:2310.07524  [pdf, ps, other

    cs.IT

    New Lower Bounds for the Minimum Distance of Cyclic Codes and Applications to Locally Repairable Codes

    Authors: Jing Qiu, Weijun Fang, Fang-Wei Fu

    Abstract: Cyclic codes are an important class of linear codes. Bounding the minimum distance of cyclic codes is a long-standing research topic in coding theory, and several well-known and basic results have been developed on this topic. Recently, locally repairable codes (LRCs) have attracted much attention due to their repair efficiency in large-scale distributed storage systems. In this paper, by employin… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: 35 pages

  28. arXiv:2309.04819  [pdf, other

    quant-ph cs.CR cs.LG

    Detecting Violations of Differential Privacy for Quantum Algorithms

    Authors: Ji Guan, Wang Fang, Mingyu Huang, Mingsheng Ying

    Abstract: Quantum algorithms for solving a wide range of practical problems have been proposed in the last ten years, such as data search and analysis, product recommendation, and credit scoring. The concern about privacy and other ethical issues in quantum computing naturally rises up. In this paper, we define a formal framework for detecting violations of differential privacy for quantum algorithms. A det… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

    Journal ref: In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS 2023)

  29. arXiv:2308.13904  [pdf, other

    cs.CL cs.CR cs.LG

    LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

    Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen

    Abstract: Prompt-tuning has emerged as an attractive paradigm for deploying large-scale language models due to its strong downstream task performance and efficient multitask serving ability. Despite its wide adoption, we empirically show that prompt-tuning is vulnerable to downstream task-agnostic backdoors, which reside in the pretrained models and can affect arbitrary downstream tasks. The state-of-the-ar… ▽ More

    Submitted 14 October, 2023; v1 submitted 26 August, 2023; originally announced August 2023.

    Comments: To Appear in the Network and Distributed System Security (NDSS) Symposium 2024, 26 February - 1 March 2024, San Diego, CA, USA; typos corrected

  30. arXiv:2308.04840  [pdf

    cs.NE

    Analyzing and controlling diversity in quantum-behaved particle swarm optimization

    Authors: Li-Wei Li, Jun Sun, Chao Li, Wei Fang, Vasile Palade, Xiao-Jun Wu

    Abstract: This paper addresses the issues of controlling and analyzing the population diversity in quantum-behaved particle swarm optimization (QPSO), which is an optimization approach motivated by concepts in quantum mechanics and PSO. In order to gain an in-depth understanding of the role the diversity plays in the evolving process, we first define the genotype diversity by the distance to the average poi… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  31. arXiv:2307.07138  [pdf, ps, other

    cs.PF

    Reconfigurable Intelligent Surface Assisted Free Space Optical Information and Power Transfer

    Authors: Wen Fang, Wen Chen, Qingqing Wu, Kunlun Wang, Shunqing Zhang, Qingwen Liu, Jun Li

    Abstract: Free space optical (FSO) transmission has emerged as a key candidate technology for 6G to expand new spectrum and improve network capacity due to its advantages of large bandwidth, low electromagnetic interference, and high energy efficiency. Resonant beam operating in the infrared band utilizes spatially separated laser cavities to enable safe and mobile high-power energy and high-rate informatio… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

  32. arXiv:2307.04323  [pdf, ps, other

    cs.IT

    Optimal $(2,δ)$ Locally Repairable Codes via Punctured Simplex Codes

    Authors: Yuan Gao, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu

    Abstract: Locally repairable codes (LRCs) have attracted a lot of attention due to their applications in distributed storage systems. In this paper, we provide new constructions of optimal $(2, δ)$-LRCs over $\mathbb{F}_q$ with flexible parameters. Firstly, employing techniques from finite geometry, we introduce a simple yet useful condition to ensure that a punctured simplex code becomes a $(2, δ)$-LRC. It… ▽ More

    Submitted 18 June, 2024; v1 submitted 9 July, 2023; originally announced July 2023.

    MSC Class: 94B60; 11T71

  33. arXiv:2306.00807  [pdf, other

    cs.NE

    Auto-Spikformer: Spikformer Architecture Search

    Authors: Kaiwei Che, Zhaokun Zhou, Zhengyu Ma, Wei Fang, Yanqi Chen, Shuaijie Shen, Li Yuan, Yonghong Tian

    Abstract: The integration of self-attention mechanisms into Spiking Neural Networks (SNNs) has garnered considerable interest in the realm of advanced deep learning, primarily due to their biological properties. Recent advancements in SNN architecture, such as Spikformer, have demonstrated promising outcomes by leveraging Spiking Self-Attention (SSA) and Spiking Patch Splitting (SPS) modules. However, we ob… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  34. arXiv:2305.17080  [pdf, other

    cs.CL

    Expand, Rerank, and Retrieve: Query Reranking for Open-Domain Question Answering

    Authors: Yung-Sung Chuang, Wei Fang, Shang-Wen Li, Wen-tau Yih, James Glass

    Abstract: We propose EAR, a query Expansion And Reranking approach for improving passage retrieval, with the application to open-domain question answering. EAR first applies a query expansion model to generate a diverse set of queries, and then uses a query reranker to select the ones that could lead to better retrieval results. Motivated by the observation that the best query expansion often is not picked… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: ACL 2023 long paper (Findings)

  35. arXiv:2305.13909  [pdf, other

    cs.CV

    Temporal Contrastive Learning for Spiking Neural Networks

    Authors: Haonan Qiu, Zeyin Song, Yanqi Chen, Munan Ning, Wei Fang, Tao Sun, Zhengyu Ma, Li Yuan, Yonghong Tian

    Abstract: Biologically inspired spiking neural networks (SNNs) have garnered considerable attention due to their low-energy consumption and spatio-temporal information processing capabilities. Most existing SNNs training methods first integrate output information across time steps, then adopt the cross-entropy (CE) loss to supervise the prediction of the average representations. However, in this work, we fi… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  36. A Deep Registration Method for Accurate Quantification of Joint Space Narrowing Progression in Rheumatoid Arthritis

    Authors: Haolin Wang, Yafei Ou, Wanxuan Fang, Prasoon Ambalathankandy, Naoto Goto, Gen Ota, Masayuki Ikebe, Tamotsu Kamishima

    Abstract: Rheumatoid arthritis (RA) is a chronic autoimmune inflammatory disease that results in progressive articular destruction and severe disability. Joint space narrowing (JSN) progression has been regarded as an important indicator for RA progression and has received sustained attention. In the diagnosis and monitoring of RA, radiology plays a crucial role to monitor joint space. A new framework for m… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 11 pages, 9 figures, 7 tables

    MSC Class: 68T45 ACM Class: I.4

  37. arXiv:2304.13398  [pdf, other

    cs.DS cs.AR cs.DC

    Acceleration for Timing-Aware Gate-Level Logic Simulation with One-Pass GPU Parallelism

    Authors: Weijie Fang, Yanggeng Fu, Jiaquan Gao, Longkun Guo, Gregory Gutin, Xiaoyan Zhang

    Abstract: Witnessing the advancing scale and complexity of chip design and benefiting from high-performance computation technologies, the simulation of Very Large Scale Integration (VLSI) Circuits imposes an increasing requirement for acceleration through parallel computing with GPU devices. However, the conventional parallel strategies do not fully align with modern GPU abilities, leading to new challenges… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  38. arXiv:2304.12760  [pdf, other

    cs.NE cs.CV

    Parallel Spiking Neurons with High Efficiency and Ability to Learn Long-term Dependencies

    Authors: Wei Fang, Zhaofei Yu, Zhaokun Zhou, Ding Chen, Yanqi Chen, Zhengyu Ma, Timothée Masquelier, Yonghong Tian

    Abstract: Vanilla spiking neurons in Spiking Neural Networks (SNNs) use charge-fire-reset neuronal dynamics, which can only be simulated serially and can hardly learn long-time dependencies. We find that when removing reset, the neuronal dynamics can be reformulated in a non-iterative form and parallelized. By rewriting neuronal dynamics without reset to a general formulation, we propose the Parallel Spikin… ▽ More

    Submitted 9 January, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

    Comments: Accepted in NeurIPS 2023

  39. arXiv:2304.03728  [pdf, other

    cs.CL

    Interpretable Unified Language Checking

    Authors: Tianhua Zhang, Hongyin Luo, Yung-Sung Chuang, Wei Fang, Luc Gaitskell, Thomas Hartvigsen, Xixin Wu, Danny Fox, Helen Meng, James Glass

    Abstract: Despite recent concerns about undesirable behaviors generated by large language models (LLMs), including non-factual, biased, and hateful language, we find LLMs are inherent multi-task language checkers based on their latent representations of natural and social knowledge. We present an interpretable, unified, language checking (UniLC) method for both human and machine-generated language that aims… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Comments: 10 + 5 pages

  40. arXiv:2303.17895  [pdf, other

    cs.CV

    EA-LSS: Edge-aware Lift-splat-shot Framework for 3D BEV Object Detection

    Authors: Haotian Hu, Fanyi Wang, Jingwen Su, Yaonong Wang, Laifeng Hu, Weiye Fang, Jingwei Xu, Zhiwang Zhang

    Abstract: In recent years, great progress has been made in the Lift-Splat-Shot-based (LSS-based) 3D object detection method. However, inaccurate depth estimation remains an important constraint to the accuracy of camera-only and multi-model 3D object detection models, especially in regions where the depth changes significantly (i.e., the "depth jump" problem). In this paper, we proposed a novel Edge-aware L… ▽ More

    Submitted 29 August, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

  41. arXiv:2303.06287  [pdf, ps, other

    cs.IT

    Singleton-Optimal LRCs and Perfect LRCs via Cyclic and Constacyclic Codes

    Authors: Weijun Fang, Fang-Wei Fu, Bin Chen, Shu-Tao Xia

    Abstract: Locally repairable codes (LRCs) have emerged as an important coding scheme in distributed storage systems (DSSs) with relatively low repair cost by accessing fewer non-failure nodes. Theoretical bounds and optimal constructions of LRCs have been widely investigated. Optimal LRCs via cyclic and constacyclic codes provide significant benefit of elegant algebraic structure and efficient encoding proc… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  42. arXiv:2303.04347  [pdf, ps, other

    cs.NE

    Optimal ANN-SNN Conversion for High-accuracy and Ultra-low-latency Spiking Neural Networks

    Authors: Tong Bu, Wei Fang, Jianhao Ding, PengLin Dai, Zhaofei Yu, Tiejun Huang

    Abstract: Spiking Neural Networks (SNNs) have gained great attraction due to their distinctive properties of low power consumption and fast inference on neuromorphic hardware. As the most effective method to get deep SNNs, ANN-SNN conversion has achieved comparable performance as ANNs on large-scale datasets. Despite this, it requires long time-steps to match the firing rates of SNNs to the activation of AN… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Journal ref: International Conference on Learning Representations (2022)

  43. arXiv:2302.13019  [pdf, other

    cs.LG cs.AI cs.CV cs.NE

    A Unified Framework for Soft Threshold Pruning

    Authors: Yanqi Chen, Zhengyu Ma, Wei Fang, Xiawu Zheng, Zhaofei Yu, Yonghong Tian

    Abstract: Soft threshold pruning is among the cutting-edge pruning methods with state-of-the-art performance. However, previous methods either perform aimless searching on the threshold scheduler or simply set the threshold trainable, lacking theoretical explanation from a unified perspective. In this work, we reformulate soft threshold pruning as an implicit optimization problem solved using the Iterative… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

    Comments: To appear in the 11th International Conference on Learning Representations (ICLR 2023)

  44. arXiv:2301.12291  [pdf, other

    eess.IV cs.CV

    CancerUniT: Towards a Single Unified Model for Effective Detection, Segmentation, and Diagnosis of Eight Major Cancers Using a Large Collection of CT Scans

    Authors: Jieneng Chen, Yingda Xia, Jiawen Yao, Ke Yan, Jianpeng Zhang, Le Lu, Fakai Wang, Bo Zhou, Mingyan Qiu, Qihang Yu, Mingze Yuan, Wei Fang, Yuxing Tang, Minfeng Xu, Jian Zhou, Yuqian Zhao, Qifeng Wang, Xianghua Ye, Xiaoli Yin, Yu Shi, Xin Chen, Jingren Zhou, Alan Yuille, Zaiyi Liu, Ling Zhang

    Abstract: Human readers or radiologists routinely perform full-body multi-organ multi-disease detection and diagnosis in clinical practice, while most medical AI systems are built to focus on single organs with a narrow list of a few diseases. This might severely limit AI's clinical adoption. A certain number of AI models need to be assembled non-trivially to match the diagnostic process of a human reading… ▽ More

    Submitted 6 October, 2023; v1 submitted 28 January, 2023; originally announced January 2023.

    Comments: ICCV 2023 Camera Ready Version

  45. arXiv:2211.06579  [pdf

    cs.AI

    Explainable Artificial Intelligence: Precepts, Methods, and Opportunities for Research in Construction

    Authors: Peter ED Love, Weili Fang, Jane Matthews, Stuart Porter, Hanbin Luo, Lieyun Ding

    Abstract: Explainable artificial intelligence has received limited attention in construction despite its growing importance in various other industrial sectors. In this paper, we provide a narrative review of XAI to raise awareness about its potential in construction. Our review develops a taxonomy of the XAI literature comprising its precepts and approaches. Opportunities for future XAI research focusing o… ▽ More

    Submitted 10 February, 2023; v1 submitted 12 November, 2022; originally announced November 2022.

    Comments: 56 pages, 3 figures. arXiv admin note: text overlap with arXiv:1910.10045 by other authors

    ACM Class: H.0; H.4; J.0

  46. arXiv:2211.06561  [pdf

    cs.AI

    Explainable Artificial Intelligence in Construction: The Content, Context, Process, Outcome Evaluation Framework

    Authors: Peter ED Love, Jane Matthews, Weili Fang, Stuart Porter, Hanbin Luo, Lieyun Ding

    Abstract: Explainable artificial intelligence is an emerging and evolving concept. Its impact on construction, though yet to be realised, will be profound in the foreseeable future. Still, XAI has received limited attention in construction. As a result, no evaluation frameworks have been propagated to enable construction organisations to understand the what, why, how, and when of XAI. Our paper aims to fill… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: 43 pages, 5 figures

    ACM Class: H.0; H.4; J.0

  47. arXiv:2211.04507  [pdf, other

    quant-ph cs.LG cs.PL

    Differentiable Quantum Programming with Unbounded Loops

    Authors: Wang Fang, Mingsheng Ying, Xiaodi Wu

    Abstract: The emergence of variational quantum applications has led to the development of automatic differentiation techniques in quantum computing. Recently, Zhu et al. (PLDI 2020) have formulated differentiable quantum programming with bounded loops, providing a framework for scalable gradient calculation by quantum means for training quantum variational applications. However, promising parameterized quan… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: Codes are available at https://github.com/njuwfang/DifferentiableQPL

  48. arXiv:2211.02895  [pdf, other

    cs.CV

    Simple Primitives with Feasibility- and Contextuality-Dependence for Open-World Compositional Zero-shot Learning

    Authors: Zhe Liu, Yun Li, Lina Yao, Xiaojun Chang, Wei Fang, Xiaojun Wu, Yi Yang

    Abstract: The task of Compositional Zero-Shot Learning (CZSL) is to recognize images of novel state-object compositions that are absent during the training stage. Previous methods of learning compositional embedding have shown effectiveness in closed-world CZSL. However, in Open-World CZSL (OW-CZSL), their performance tends to degrade significantly due to the large cardinality of possible compositions. Some… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

  49. arXiv:2208.08662  [pdf, other

    cs.CR cs.LG

    Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

    Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han

    Abstract: Secure multi-party computation-based machine learning, referred to as MPL, has become an important technology to utilize data from multiple parties with privacy preservation. While MPL provides rigorous security guarantees for the computation process, the models trained by MPL are still vulnerable to attacks that solely depend on access to the models. Differential privacy could help to defend agai… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: This paper has been accepted for publication at IEEE S&P 2023. Please cite this paper as "Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han. Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. In Proceedings of The 44th IEEE Symposium on Security and Privacy, San Francisco, May 22-26, 2023."

  50. arXiv:2207.12906  [pdf, ps, other

    math.NT cs.DM

    Searching on the boundary of abundance for odd weird numbers

    Authors: Wenjie Fang

    Abstract: Weird numbers are abundant numbers that are not pseudoperfect. Since their introduction, the existence of odd weird numbers has been an open problem. In this work, we describe our computational effort to search for odd weird numbers, which shows their non-existence up to $10^{21}$. We also searched up to $10^{28}$ for numbers with an abundance below $10^{14}$, to no avail. Our approach to speed up… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: 8 pages