Skip to main content

Showing 1–50 of 132 results for author: Fu, F

  1. Chromosomal Structural Abnormality Diagnosis by Homologous Similarity

    Authors: Juren Li, Fanzhe Fu, Ran Wei, Yifei Sun, Zeyu Lai, Ning Song, Xin Chen, Yang Yang

    Abstract: Pathogenic chromosome abnormalities are very common among the general population. While numerical chromosome abnormalities can be quickly and precisely detected, structural chromosome abnormalities are far more complex and typically require considerable efforts by human experts for identification. This paper focuses on investigating the modeling of chromosome features and the identification of chr… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  2. arXiv:2405.19565  [pdf, other

    physics.soc-ph cs.GT q-bio.PE

    Unbending strategies shepherd cooperation and suppress extortion in spatial populations

    Authors: Zijie Chen, Yuxin Geng, Xingru Chen, Feng Fu

    Abstract: Evolutionary game dynamics on networks typically consider the competition among simple strategies such as cooperation and defection in the Prisoner's Dilemma and summarize the effect of population structure as network reciprocity. However, it remains largely unknown regarding the evolutionary dynamics involving multiple powerful strategies typically considered in repeated games, such as the zero-d… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 21 pages, 6 figures

  3. arXiv:2404.17082  [pdf, other

    physics.soc-ph cs.SI math.DS q-bio.PE

    Evolutionary game dynamics with environmental feedback in a network with two communities

    Authors: Katherine Betz, Feng Fu, Naoki Masuda

    Abstract: Recent developments of eco-evolutionary models have shown that evolving feedbacks between behavioral strategies and the environment of game interactions, leading to changes in the underlying payoff matrix, can impact the underlying population dynamics in various manners. We propose and analyze an eco-evolutionary game dynamics model on a network with two communities such that players interact with… ▽ More

    Submitted 7 June, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

    Comments: 8 figures, 2 tables

    Journal ref: Bull Math Biol 86, 84 (2024)

  4. arXiv:2404.12782  [pdf, other

    cs.CV cs.AI

    Sentiment-oriented Transformer-based Variational Autoencoder Network for Live Video Commenting

    Authors: Fengyi Fu, Shancheng Fang, Weidong Chen, Zhendong Mao

    Abstract: Automatic live video commenting is with increasing attention due to its significance in narration generation, topic explanation, etc. However, the diverse sentiment consideration of the generated comments is missing from the current methods. Sentimental factors are critical in interactive commenting, and lack of research so far. Thus, in this paper, we propose a Sentiment-oriented Transformer-base… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: 27 pages, 10 figures, ACM Transactions on Multimedia Computing, Communications and Applications, 2024

  5. arXiv:2404.05251  [pdf, ps, other

    math.CO cs.IT

    Association schemes arising from non-weakly regular bent functions

    Authors: Yadi Wei, Jiaxin Wang, Fang-Wei Fu

    Abstract: Association schemes play an important role in algebraic combinatorics and have important applications in coding theory, graph theory and design theory. The methods to construct association schemes by using bent functions have been extensively studied. Recently, in [13], {Ö}zbudak and Pelen constructed infinite families of symmetric association schemes of classes $5$ and $6$ by using ternary non-we… ▽ More

    Submitted 13 June, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2403.12578  [pdf, ps, other

    cs.IT

    Self-Orthogonal Codes from Vectorial Dual-Bent Functions

    Authors: Jiaxin Wang, Yadi Wei, Fang-Wei Fu, Juan Li

    Abstract: Self-orthogonal codes are a significant class of linear codes in coding theory and have attracted a lot of attention. In \cite{HLL2023Te,LH2023Se}, $p$-ary self-orthogonal codes were constructed by using $p$-ary weakly regular bent functions, where $p$ is an odd prime. In \cite{WH2023Se}, two classes of non-degenerate quadratic forms were used to construct $q$-ary self-orthogonal codes, where $q$… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  7. arXiv:2403.07017  [pdf, other

    physics.soc-ph cs.AI cs.GT cs.MA

    Mathematics of multi-agent learning systems at the interface of game theory and artificial intelligence

    Authors: Long Wang, Feng Fu, Xingru Chen

    Abstract: Evolutionary Game Theory (EGT) and Artificial Intelligence (AI) are two fields that, at first glance, might seem distinct, but they have notable connections and intersections. The former focuses on the evolution of behaviors (or strategies) in a population, where individuals interact with others and update their strategies based on imitation (or social learning). The more successful a strategy is,… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

    Comments: 8 pages, 1 figure

  8. arXiv:2403.06877  [pdf, other

    cs.RO cs.CV

    SiLVR: Scalable Lidar-Visual Reconstruction with Neural Radiance Fields for Robotic Inspection

    Authors: Yifu Tao, Yash Bhalgat, Lanke Frank Tarimo Fu, Matias Mattamala, Nived Chebrolu, Maurice Fallon

    Abstract: We present a neural-field-based large-scale reconstruction system that fuses lidar and vision data to generate high-quality reconstructions that are geometrically accurate and capture photo-realistic textures. This system adapts the state-of-the-art neural radiance field (NeRF) representation to also incorporate lidar data which adds strong geometric constraints on the depth and surface normals. W… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: Accepted at ICRA 2024; Website: https://ori-drs.github.io/projects/silvr/

  9. arXiv:2403.03224  [pdf, other

    physics.soc-ph cs.AI cs.LG cs.SD eess.AS

    Reinforcement Learning Jazz Improvisation: When Music Meets Game Theory

    Authors: Vedant Tapiavala, Joshua Piesner, Sourjyamoy Barman, Feng Fu

    Abstract: Live performances of music are always charming, with the unpredictability of improvisation due to the dynamic between musicians and interactions with the audience. Jazz improvisation is a particularly noteworthy example for further investigation from a theoretical perspective. Here, we introduce a novel mathematical game theory model for jazz improvisation, providing a framework for studying music… ▽ More

    Submitted 25 February, 2024; originally announced March 2024.

    Comments: 16 pages, 4 figures

  10. arXiv:2403.01505  [pdf, other

    cs.CV

    SCott: Accelerating Diffusion Models with Stochastic Consistency Distillation

    Authors: Hongjian Liu, Qingsong Xie, Zhijie Deng, Chen Chen, Shixiang Tang, Fueyang Fu, Zheng-jun Zha, Haonan Lu

    Abstract: The iterative sampling procedure employed by diffusion models (DMs) often leads to significant inference latency. To address this, we propose Stochastic Consistency Distillation (SCott) to enable accelerated text-to-image generation, where high-quality generations can be achieved with just 1-2 sampling steps, and further improvements can be obtained by adding additional steps. In contrast to vanil… ▽ More

    Submitted 15 April, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

    Comments: 22 pages, 16 figures

  11. arXiv:2402.19473  [pdf, other

    cs.CV

    Retrieval-Augmented Generation for AI-Generated Content: A Survey

    Authors: Penghao Zhao, Hailin Zhang, Qinhan Yu, Zhengren Wang, Yunteng Geng, Fangcheng Fu, Ling Yang, Wentao Zhang, Jie Jiang, Bin Cui

    Abstract: Advancements in model algorithms, the growth of foundational models, and access to high-quality datasets have propelled the evolution of Artificial Intelligence Generated Content (AIGC). Despite its notable successes, AIGC still faces hurdles such as updating knowledge, handling long-tail data, mitigating data leakage, and managing high training and inference costs. Retrieval-Augmented Generation… ▽ More

    Submitted 21 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: Citing 353 papers, 22 pages, 1 table, 12 figures. Project: https://github.com/PKU-DAIR/RAG-Survey

  12. arXiv:2402.00607  [pdf, other

    cs.LG cs.AI

    Are Synthetic Time-series Data Really not as Good as Real Data?

    Authors: Fanzhe Fu, Junru Chen, Jing Zhang, Carl Yang, Lvbin Ma, Yang Yang

    Abstract: Time-series data presents limitations stemming from data quality issues, bias and vulnerabilities, and generalization problem. Integrating universal data synthesis methods holds promise in improving generalization. However, current methods cannot guarantee that the generator's output covers all unseen real data. In this paper, we introduce InfoBoost -- a highly versatile cross-domain data synthesi… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  13. arXiv:2312.04831  [pdf, other

    cs.CV

    Towards Context-Stable and Visual-Consistent Image Inpainting

    Authors: Yikai Wang, Chenjie Cao, Ke Fan Xiangyang Xue Yanwei Fu

    Abstract: Recent progress in inpainting increasingly relies on generative models, leveraging their strong generation capabilities for addressing large irregular masks. However, this enhanced generation often introduces context-instability, leading to arbitrary object generation within masked regions. This paper proposes a balanced solution, emphasizing the importance of unmasked regions in guiding inpaintin… ▽ More

    Submitted 17 March, 2024; v1 submitted 8 December, 2023; originally announced December 2023.

    Comments: Project page: https://yikai-wang.github.io/asuka/ where full-size PDF with appendix is available. Dataset: https://github.com/Yikai-Wang/asuka-misato. Yikai Wang and Chenjie Cao contribute equally

  14. arXiv:2311.15868  [pdf, ps, other

    cs.CR cs.IT

    Learning with Errors over Group Rings Constructed by Semi-direct Product

    Authors: Jiaqi Liu, Fang-Wei Fu

    Abstract: The Learning with Errors (LWE) problem has been widely utilized as a foundation for numerous cryptographic tools over the years. In this study, we focus on an algebraic variant of the LWE problem called Group ring LWE (GR-LWE). We select group rings (or their direct summands) that underlie specific families of finite groups constructed by taking the semi-direct product of two cyclic groups. Unlike… ▽ More

    Submitted 1 December, 2023; v1 submitted 27 November, 2023; originally announced November 2023.

    Comments: 45 pages

  15. arXiv:2311.15016  [pdf, other

    cs.CL cs.AI

    E-CORE: Emotion Correlation Enhanced Empathetic Dialogue Generation

    Authors: Fengyi Fu, Lei Zhang, Quan Wang, Zhendong Mao

    Abstract: Achieving empathy is a crucial step toward humanized dialogue systems. Current approaches for empathetic dialogue generation mainly perceive an emotional label to generate an empathetic response conditioned on it, which simply treat emotions independently, but ignore the intrinsic emotion correlation in dialogues, resulting in inaccurate emotion perception and unsuitable response generation. In th… ▽ More

    Submitted 25 November, 2023; originally announced November 2023.

    Comments: 19 pages, 6 figures

    ACM Class: I.2.7

    Journal ref: Conference on Empirical Methods in Natural Language Processing, EMNLP 2023

  16. arXiv:2310.20132  [pdf, ps, other

    cs.IT

    Linear codes with few weights from non-weakly regular plateaued functions

    Authors: Yadi Wei, Jiaxin Wang, Fang-Wei Fu

    Abstract: Linear codes with few weights have significant applications in secret sharing schemes, authentication codes, association schemes, and strongly regular graphs. There are a number of methods to construct linear codes, one of which is based on functions. Furthermore, two generic constructions of linear codes from functions called the first and the second generic constructions, have aroused the resear… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 52 pages, 34 tables

  17. arXiv:2310.15523  [pdf, other

    cs.LG cs.AI

    Generative and Contrastive Paradigms Are Complementary for Graph Self-Supervised Learning

    Authors: Yuxiang Wang, Xiao Yan, Chuang Hu, Fangcheng Fu, Wentao Zhang, Hao Wang, Shuo Shang, Jiawei Jiang

    Abstract: For graph self-supervised learning (GSSL), masked autoencoder (MAE) follows the generative paradigm and learns to reconstruct masked graph edges or node features. Contrastive Learning (CL) maximizes the similarity between augmented views of the same graph and is widely used for GSSL. However, MAE and CL are considered separately in existing works for GSSL. We observe that the MAE and CL paradigms… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  18. arXiv:2310.07524  [pdf, ps, other

    cs.IT

    New Lower Bounds for the Minimum Distance of Cyclic Codes and Applications to Locally Repairable Codes

    Authors: Jing Qiu, Weijun Fang, Fang-Wei Fu

    Abstract: Cyclic codes are an important class of linear codes. Bounding the minimum distance of cyclic codes is a long-standing research topic in coding theory, and several well-known and basic results have been developed on this topic. Recently, locally repairable codes (LRCs) have attracted much attention due to their repair efficiency in large-scale distributed storage systems. In this paper, by employin… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Comments: 35 pages

  19. arXiv:2309.13395  [pdf, ps, other

    cs.IT

    A Further Study of Vectorial Dual-Bent Functions

    Authors: Jiaxin Wang, Fang-Wei Fu, Yadi Wei, Jing Yang

    Abstract: Vectorial dual-bent functions have recently attracted some researchers' interest as they play a significant role in constructing partial difference sets, association schemes, bent partitions and linear codes. In this paper, we further study vectorial dual-bent functions $F: V_{n}^{(p)}\rightarrow V_{m}^{(p)}$, where $2\leq m \leq \frac{n}{2}$, $V_{n}^{(p)}$ denotes an $n$-dimensional vector space… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

  20. arXiv:2307.04193  [pdf, ps, other

    cs.IT

    Some new constructions of optimal linear codes and alphabet-optimal $(r,δ)$-locally repairable codes

    Authors: Jing Qiu, Fang-Wei Fu

    Abstract: In distributed storage systems, locally repairable codes (LRCs) are designed to reduce disk I/O and repair costs by enabling recovery of each code symbol from a small number of other symbols. To handle multiple node failures, $(r,δ)$-LRCs are introduced to enable local recovery in the event of up to $δ-1$ failed nodes. Constructing optimal $(r,δ)$-LRCs has been a significant research topic over th… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Comments: 25 pages

  21. arXiv:2307.02031  [pdf, other

    cs.LG cs.DB cs.DC

    Improving Automatic Parallel Training via Balanced Memory Workload Optimization

    Authors: Yujie Wang, Youhe Jiang, Xupeng Miao, Fangcheng Fu, Shenhan Zhu, Xiaonan Nie, Yaofeng Tu, Bin Cui

    Abstract: Transformer models have emerged as the leading approach for achieving state-of-the-art performance across various application domains, serving as the foundation for advanced large-scale deep learning (DL) models. However, efficiently training these models across multiple GPUs remains a complex challenge due to the abundance of parallelism options. Existing DL systems either require manual efforts… ▽ More

    Submitted 24 February, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2211.13878

  22. arXiv:2306.13215  [pdf, other

    cs.CR cs.LG

    OVLA: Neural Network Ownership Verification using Latent Watermarks

    Authors: Feisi Fu, Wenchao Li

    Abstract: Ownership verification for neural networks is important for protecting these models from illegal copying, free-riding, re-distribution and other intellectual property misuse. We present a novel methodology for neural network ownership verification based on the notion of latent watermarks. Existing ownership verification methods either modify or introduce constraints to the neural network parameter… ▽ More

    Submitted 25 June, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

  23. arXiv:2305.18720  [pdf, other

    physics.soc-ph cs.GT

    Steering control of payoff-maximizing players in adaptive learning dynamics

    Authors: Xingru Chen, Feng Fu

    Abstract: Evolutionary game theory provides a mathematical foundation for cross-disciplinary fertilization, especially for integrating ideas from artificial intelligence and game theory. Such integration offers a transparent and rigorous approach to complex decision-making problems in a variety of important contexts, ranging from evolutionary computation to machine behavior. Despite the astronomically huge… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: 8 pages, 3 figures, 2 tables

  24. arXiv:2305.17423  [pdf, other

    cs.CV

    Accelerating Text-to-Image Editing via Cache-Enabled Sparse Diffusion Inference

    Authors: Zihao Yu, Haoyang Li, Fangcheng Fu, Xupeng Miao, Bin Cui

    Abstract: Due to the recent success of diffusion models, text-to-image generation is becoming increasingly popular and achieves a wide range of applications. Among them, text-to-image editing, or continuous text-to-image generation, attracts lots of attention and can potentially improve the quality of generated images. It's common to see that users may want to slightly edit the generated image by making min… ▽ More

    Submitted 4 January, 2024; v1 submitted 27 May, 2023; originally announced May 2023.

    Comments: AAAI 2024

  25. arXiv:2305.09940   

    cs.DC

    OSDP: Optimal Sharded Data Parallel for Distributed Deep Learning

    Authors: Youhe Jiang, Fangcheng Fu, Xupeng Miao, Xiaonan Nie, Bin Cui

    Abstract: Large-scale deep learning models contribute to significant performance improvements on varieties of downstream tasks. Current data and model parallelism approaches utilize model replication and partition techniques to support the distributed training of ultra-large models. However, directly deploying these systems often leads to sub-optimal training efficiency due to the complex model architecture… ▽ More

    Submitted 17 May, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: An older version is in existence, and the article has been updated there. The URL for the updated version is arXiv:2209.13258

  26. arXiv:2303.06287  [pdf, ps, other

    cs.IT

    Singleton-Optimal LRCs and Perfect LRCs via Cyclic and Constacyclic Codes

    Authors: Weijun Fang, Fang-Wei Fu, Bin Chen, Shu-Tao Xia

    Abstract: Locally repairable codes (LRCs) have emerged as an important coding scheme in distributed storage systems (DSSs) with relatively low repair cost by accessing fewer non-failure nodes. Theoretical bounds and optimal constructions of LRCs have been widely investigated. Optimal LRCs via cyclic and constacyclic codes provide significant benefit of elegant algebraic structure and efficient encoding proc… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  27. arXiv:2303.03371  [pdf, other

    cs.SI econ.GN physics.soc-ph

    Complex Systems of Secrecy: The Offshore Networks of Oligarchs

    Authors: Ho-Chun Herbert Chang, Brooke Harrington, Feng Fu, Daniel Rockmore

    Abstract: Following the invasion of Ukraine, the US, UK, and EU governments--among others--sanctioned oligarchs close to Putin. This approach has come under scrutiny, as evidence has emerged of the oligarchs' successful evasion of these punishments. To address this problem, we analyze the role of an overlooked but highly influential group: the secretive professional intermediaries who create and administer… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

  28. arXiv:2303.02868  [pdf, other

    cs.LG cs.DC

    Angel-PTM: A Scalable and Economical Large-scale Pre-training System in Tencent

    Authors: Xiaonan Nie, Yi Liu, Fangcheng Fu, Jinbao Xue, Dian Jiao, Xupeng Miao, Yangyu Tao, Bin Cui

    Abstract: Recent years have witnessed the unprecedented achievements of large-scale pre-trained models, especially the Transformer models. Many products and services in Tencent Inc., such as WeChat, QQ, and Tencent Advertisement, have been opted in to gain the power of pre-trained models. In this work, we present Angel-PTM, a productive deep learning system designed for pre-training and fine-tuning Transfor… ▽ More

    Submitted 5 March, 2023; originally announced March 2023.

  29. arXiv:2301.00581  [pdf, ps, other

    cs.IT math.CO

    Bent Partitions, Vectorial Dual-Bent Functions and Partial Difference Sets

    Authors: Jiaxin Wang, Fang-Wei Fu, Yadi Wei

    Abstract: It is known that partial spreads is a class of bent partitions. In \cite{AM2022Be,MP2021Be}, two classes of bent partitions whose forms are similar to partial spreads were presented. In \cite{AKM2022Ge}, more bent partitions $Γ_{1}, Γ_{2}, Γ_{1}^{\bullet}, Γ_{2}^{\bullet}, Θ_{1}, Θ_{2}$ were presented from (pre)semifields, including the bent partitions given in \cite{AM2022Be,MP2021Be}. In this pa… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

  30. arXiv:2211.01808  [pdf, ps, other

    cs.CR cs.LG

    Dormant Neural Trojans

    Authors: Feisi Fu, Panagiota Kiourti, Wenchao Li

    Abstract: We present a novel methodology for neural network backdoor attacks. Unlike existing training-time attacks where the Trojaned network would respond to the Trojan trigger after training, our approach inserts a Trojan that will remain dormant until it is activated. The activation is realized through a specific perturbation to the network's weight parameters only known to the attacker. Our analysis an… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

  31. arXiv:2210.16196  [pdf, other

    math.NA cs.LG

    Convergence analysis of a quasi-Monte Carlo-based deep learning algorithm for solving partial differential equations

    Authors: Fengjiang Fu, Xiaoqun Wang

    Abstract: Deep learning methods have achieved great success in solving partial differential equations (PDEs), where the loss is often defined as an integral. The accuracy and efficiency of these algorithms depend greatly on the quadrature method. We propose to apply quasi-Monte Carlo (QMC) methods to the Deep Ritz Method (DRM) for solving the Neumann problems for the Poisson equation and the static Schrödin… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: 27 pages, 4 figures, 2 tables

    MSC Class: 35J20; 35Q68; 65D30; 65N15; 68T07

  32. arXiv:2209.13258  [pdf, other

    cs.DC

    OSDP: Optimal Sharded Data Parallel for Distributed Deep Learning

    Authors: Youhe Jiang, Fangcheng Fu, Xupeng Miao, Xiaonan Nie, Bin Cui

    Abstract: Large-scale deep learning models contribute to significant performance improvements on varieties of downstream tasks. Current data and model parallelism approaches utilize model replication and partition techniques to support the distributed training of ultra-large models. However, directly deploying these systems often leads to sub-optimal training efficiency due to the complex model architecture… ▽ More

    Submitted 18 May, 2023; v1 submitted 27 September, 2022; originally announced September 2022.

    Comments: Accepted by IJCAI 2023

  33. arXiv:2209.02974  [pdf, other

    cs.NI

    A multi-chain synchronization protocol that leverage zero knowledge proof to minimize communication trust base

    Authors: Sinka Gao, Guo Qiang Li, Hong Fei Fu, Heng Zhang

    Abstract: Delphinus cross-chain aggregator is a universal firmware which synchronise states between different smart contracts on different block-chains. In the world of block-chains, synchronization challenges are two-folded. Firstly, contracts from different main block-chain can not communicate with each other which makes it hard to establish a trustworthy communication channel for them to share and mainta… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  34. Hilti-Oxford Dataset: A Millimetre-Accurate Benchmark for Simultaneous Localization and Mapping

    Authors: Lintong Zhang, Michael Helmberger, Lanke Frank Tarimo Fu, David Wisth, Marco Camurri, Davide Scaramuzza, Maurice Fallon

    Abstract: Simultaneous Localization and Mapping (SLAM) is being deployed in real-world applications, however many state-of-the-art solutions still struggle in many common scenarios. A key necessity in progressing SLAM research is the availability of high-quality datasets and fair and transparent benchmarking. To this end, we have created the Hilti-Oxford Dataset, to push state-of-the-art SLAM systems to the… ▽ More

    Submitted 15 May, 2023; v1 submitted 21 August, 2022; originally announced August 2022.

    Comments: Presented at IEEE Robotics and Automation (ICRA), 2023

    Journal ref: IEEE Robotics and Automation Letters ( Volume: 8, Issue: 1, January 2023)

  35. arXiv:2208.07289  [pdf, other

    cs.LG

    A Tool for Neural Network Global Robustness Certification and Training

    Authors: Zhilu Wang, Yixuan Wang, Feisi Fu, Ruochen Jiao, Chao Huang, Wenchao Li, Qi Zhu

    Abstract: With the increment of interest in leveraging machine learning technology in safety-critical systems, the robustness of neural networks under external disturbance receives more and more concerns. Global robustness is a robustness property defined on the entire input domain. And a certified globally robust network can ensure its robustness on any possible network input. However, the state-of-the-art… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

  36. Towards Communication-efficient Vertical Federated Learning Training via Cache-enabled Local Updates

    Authors: Fangcheng Fu, Xupeng Miao, Jiawei Jiang, Huanran Xue, Bin Cui

    Abstract: Vertical federated learning (VFL) is an emerging paradigm that allows different parties (e.g., organizations or enterprises) to collaboratively build machine learning models with privacy protection. In the training phase, VFL only exchanges the intermediate statistics, i.e., forward activations and backward derivatives, across parties to compute model gradients. Nevertheless, due to its geo-distri… ▽ More

    Submitted 29 July, 2022; originally announced July 2022.

    Comments: VLDB 2022

  37. arXiv:2207.11668  [pdf, ps, other

    cs.IT

    Constructions of linear codes with two or three weights from vectorial dual-bent functions

    Authors: Jiaxin Wang, Zexia Shi, Yadi Wei, Fang-Wei Fu

    Abstract: Linear codes with a few weights are an important class of codes in coding theory and have attracted a lot of attention. In this paper, we present several constructions of $q$-ary linear codes with two or three weights from vectorial dual-bent functions, where $q$ is a power of an odd prime $p$. The weight distributions of the constructed $q$-ary linear codes are completely determined. We illustrat… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

  38. arXiv:2207.05479  [pdf, ps, other

    cs.IT

    Bounds and Constructions of Singleton-Optimal Locally Repairable Codes with Small Localities

    Authors: Weijun Fang, Bin Chen, Shu-Tao Xia, Fang-Wei Fu

    Abstract: Constructions of optimal locally repairable codes (LRCs) achieving Singleton-type bound have been exhaustively investigated in recent years. In this paper, we consider new bounds and constructions of Singleton-optimal LRCs with minmum distance $d=6$, locality $r=3$ and minimum distance $d=7$ and locality $r=2$, respectively. Firstly, we establish equivalent connections between the existence of the… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  39. BlindFL: Vertical Federated Machine Learning without Peeking into Your Data

    Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui

    Abstract: Due to the rising concerns on privacy protection, how to build machine learning (ML) models over different data sources with security guarantees is gaining more popularity. Vertical federated learning (VFL) describes such a case where ML models are built upon the private data of different participated parties that own disjoint features for the same set of instances, which fits many real-world coll… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

    Comments: SIGMOD 2022

  40. arXiv:2206.04118  [pdf, other

    physics.soc-ph cs.SI

    Spatial Games of Fake News

    Authors: Matthew I Jones, Scott D. Pauls, Feng Fu

    Abstract: To curb the spread of fake news on social media platforms, recent studies have considered an online crowdsourcing fact-checking approach as one possible intervention method to reduce misinformation. However, it remains unclear under what conditions crowdsourcing fact-checking efforts deter the spread of misinformation. To address this issue, we model such distributed fact-checking as `peer policin… ▽ More

    Submitted 8 June, 2022; originally announced June 2022.

    Comments: 18 pages, 5 figures

  41. arXiv:2203.12149  [pdf, ps, other

    math.RA cs.IT

    On generalized quasi-cyclic codes over $\mathbb{Z}_4$

    Authors: Jian Gao, Xiangrui Meng, Fang-Wei Fu

    Abstract: Based on good algebraic structures and practicabilities, generalized quasi-cyclic (GQC) codes play important role in coding theory. In this paper, we study some results on GQC codes over $\mathbb{Z}_4$ including the normalized generating set, the minimum generating set and the normalized generating set of their dual codes. As an application, new $\mathbb{Z}_4$-linear codes and good nonlinear binar… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

  42. arXiv:2202.09026  [pdf, other

    cs.CR

    Post-quantum Multi-stage Secret Sharing Schemes using Inhomogeneous Linear Recursion and Ajtai's Function

    Authors: Jing Yang, Fang-Wei Fu

    Abstract: Secret sharing was firstly proposed in 1979 by Shamir and Blakley respectively. To avoid deficiencies of original schemes, researchers presented improvement schemes, among which the multi-secret sharing scheme (MSS) is significant. There are three categories of MSSs, however, we focus on multi-stage secret sharing scheme (MSSS) recovering secrets with any order in this work. By observing inhomogen… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: 36 pages,1 figure, 3 tables

    MSC Class: 11T71; 68R01; 94A60; 94A62

  43. arXiv:2202.03817  [pdf, ps, other

    cs.IT

    New results on vectorial dual-bent functions and partial difference sets

    Authors: Jiaxin Wang, Fang-Wei Fu

    Abstract: Bent functions $f: V_{n}\rightarrow \mathbb{F}_{p}$ with certain additional properties play an important role in constructing partial difference sets, where $V_{n}$ denotes an $n$-dimensional vector space over $\mathbb{F}_{p}$, $p$ is an odd prime. In \cite{Cesmelioglu1,Cesmelioglu2}, the so-called vectorial dual-bent functions are considered to construct partial difference sets. In \cite{Cesmelio… ▽ More

    Submitted 28 April, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

  44. arXiv:2202.03301  [pdf, other

    cs.IT

    Some Results on the Improved Bound and Construction of Optimal $(r,δ)$ LRCs

    Authors: Bin Chen, Weijun Fang, Yueqi Chen, Shu-Tao Xia, Fang-Wei Fu, Xiangyu Chen

    Abstract: Locally repairable codes (LRCs) with $(r,δ)$ locality were introduced by Prakash \emph{et al.} into distributed storage systems (DSSs) due to their benefit of locally repairing at least $δ-1$ erasures via other $r$ survival nodes among the same local group. An LRC achieving the $(r,δ)$ Singleton-type bound is called an optimal $(r,δ)$ LRC. Constructions of optimal $(r,δ)$ LRCs with longer code len… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Comments: Submitted to the 2022 IEEE International Symposium on Information Theory (ISIT)

  45. arXiv:2112.15466  [pdf, ps, other

    cs.IT cs.CR

    Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes

    Authors: Wenshuo Guo, Fang-Wei Fu

    Abstract: This paper presents a key recovery attack on the cryptosystem proposed by Lau and Tan in a talk at ACISP 2018. The Lau-Tan cryptosystem uses Gabidulin codes as the underlying decodable code. To hide the algebraic structure of Gabidulin codes, the authors chose a matrix of column rank $n$ to mix with a generator matrix of the secret Gabidulin code. The other part of the public key, however, reveals… ▽ More

    Submitted 5 January, 2022; v1 submitted 31 December, 2021; originally announced December 2021.

  46. arXiv:2112.14840  [pdf, other

    cs.DC cs.LG

    K-Core Decomposition on Super Large Graphs with Limited Resources

    Authors: Shicheng Gao, Jie Xu, Xiaosen Li, Fangcheng Fu, Wentao Zhang, Wen Ouyang, Yangyu Tao, Bin Cui

    Abstract: K-core decomposition is a commonly used metric to analyze graph structure or study the relative importance of nodes in complex graphs. Recent years have seen rapid growth in the scale of the graph, especially in industrial settings. For example, our industrial partner runs popular social applications with billions of users and is able to gather a rich set of user data. As a result, applying K-core… ▽ More

    Submitted 25 December, 2021; originally announced December 2021.

    Comments: 10 pages, 11 figures

  47. arXiv:2110.07682  [pdf, other

    cs.LG

    Sound and Complete Neural Network Repair with Minimality and Locality Guarantees

    Authors: Feisi Fu, Wenchao Li

    Abstract: We present a novel methodology for repairing neural networks that use ReLU activation functions. Unlike existing methods that rely on modifying the weights of a neural network which can induce a global change in the function space, our approach applies only a localized change in the function space while still guaranteeing the removal of the buggy behavior. By leveraging the piecewise linear nature… ▽ More

    Submitted 21 July, 2022; v1 submitted 14 October, 2021; originally announced October 2021.

    Comments: 17 pages, 3 figures

    Journal ref: International Conference on Learning Representations, 2022

  48. arXiv:2108.09989  [pdf, other

    cs.IT

    Decoding Error Probability of the Random Matrix Ensemble over the Erasure Channel

    Authors: Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong

    Abstract: Using tools developed in a recent work by Shen and the second author, in this paper we carry out an in-depth study on the average decoding error probability of the random matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the… ▽ More

    Submitted 22 April, 2024; v1 submitted 23 August, 2021; originally announced August 2021.

    Comments: 4 figures

    MSC Class: 94A40; 94B70

  49. arXiv:2107.04166  [pdf, ps, other

    cs.IT

    On pure MDS asymmetric entanglement-assisted quantum error-correcting codes

    Authors: Ziteng Huang, Weijun Fang, Fang-Wei Fu

    Abstract: Recently, Galindo et al. introduced the concept of asymmetric entanglement-assisted quantum error-correcting codes (AEAQECCs) from Calderbank-Shor-Steane (CSS) construction. In general, it's difficult to determine the required number of maximally entangled states of an AEAQECC, which is associated with the dimension of the intersection of the two corresponding linear codes. Two linear codes are sa… ▽ More

    Submitted 8 July, 2021; originally announced July 2021.

  50. arXiv:2107.03157  [pdf, ps, other

    cs.IT

    Semilinear Transformations in Coding Theory: A New Technique in Code-Based Cryptography

    Authors: Wenshuo Guo, Fang-Wei Fu

    Abstract: This paper presents a new technique for disturbing the algebraic structure of linear codes in code-based cryptography. This is a new attempt to exploit Gabidulin codes in the McEliece setting and almost all the previous cryptosystems of this type have been completely or partially broken. To be specific, we introduce the so-called semilinear transformation in coding theory, which is defined through… ▽ More

    Submitted 6 May, 2022; v1 submitted 7 July, 2021; originally announced July 2021.