Skip to main content

Showing 1–36 of 36 results for author: Hua, Z

  1. arXiv:2406.12059  [pdf, other

    cs.LG cs.SI

    A Scalable and Effective Alternative to Graph Transformers

    Authors: Kaan Sancak, Zhigang Hua, Jin Fang, Yan Xie, Andrey Malevich, Bo Long, Muhammed Fatih Balin, Ümit V. Çatalyürek

    Abstract: Graph Neural Networks (GNNs) have shown impressive performance in graph representation learning, but they face challenges in capturing long-range dependencies due to their limited expressive power. To address this, Graph Transformers (GTs) were introduced, utilizing self-attention mechanism to effectively model pairwise node relationships. Despite their advantages, GTs suffer from quadratic comple… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Under submission

  2. arXiv:2406.11217  [pdf, other

    cs.AI cs.CL cs.CV physics.ao-ph

    WeatherQA: Can Multimodal Language Models Reason about Severe Weather?

    Authors: Chengqian Ma, Zhanxiang Hua, Alexandra Anderson-Frey, Vikram Iyer, Xin Liu, Lianhui Qin

    Abstract: Severe convective weather events, such as hail, tornadoes, and thunderstorms, often occur quickly yet cause significant damage, costing billions of dollars every year. This highlights the importance of forecasting severe weather threats hours in advance to better prepare meteorologists and residents in at-risk areas. Can modern large foundation models perform such forecasting? Existing weather ben… ▽ More

    Submitted 23 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 26 pages, 9 figures

  3. arXiv:2406.09881  [pdf, other

    cs.CL

    A Unified Data Augmentation Framework for Low-Resource Multi-Domain Dialogue Generation

    Authors: Yongkang Liu, Ercong Nie, Shi Feng, Zheng Hua, Zifeng Ding, Daling Wang, Yifei Zhang, Hinrich Schütze

    Abstract: Current state-of-the-art dialogue systems heavily rely on extensive training datasets. However, challenges arise in domains where domain-specific training datasets are insufficient or entirely absent. To tackle this challenge, we propose a novel data \textbf{A}ugmentation framework for \textbf{M}ulti-\textbf{D}omain \textbf{D}ialogue \textbf{G}eneration, referred to as \textbf{AMD$^2$G}. The AMD… ▽ More

    Submitted 28 June, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    Comments: 17pages,ECML-PKDD

    Journal ref: 2024 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases

  4. arXiv:2405.20815  [pdf, other

    cs.DC cs.NI

    Distributed Simulation for Digital Twins of Large-Scale Real-World DiffServ-Based Networks

    Authors: Zhuoyao Huang, Nan Zhang, Jingran Shen, Georgios Diamantopoulos, Zhengchang Hua, Nikos Tziritas, Georgios Theodoropoulos

    Abstract: Digital Twin technology facilitates the monitoring and online analysis of large-scale communication networks. Faster predictions of network performance thus become imperative, especially for analysing Quality of Service (QoS) parameters in large-scale city networks. Discrete Event Simulation (DES) is a standard network analysis technology, and can be further optimised with parallel and distributed… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

    Comments: 15 pages, 6 figures, accepted by Euro-Par 2024: 30th International European Conference on Parallel and Distributed Computing

  5. arXiv:2405.09786  [pdf, other

    cs.LG cs.CR

    IBD-PSC: Input-level Backdoor Detection via Parameter-oriented Scaling Consistency

    Authors: Linshan Hou, Ruili Feng, Zhongyun Hua, Wei Luo, Leo Yu Zhang, Yiming Li

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries can maliciously trigger model misclassifications by implanting a hidden backdoor during model training. This paper proposes a simple yet effective input-level backdoor detection (dubbed IBD-PSC) as a `firewall' to filter out malicious testing images. Our method is motivated by an intriguing phenomenon, i.e., paramete… ▽ More

    Submitted 2 June, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted to ICML 2024, 31 pages

  6. arXiv:2404.19330  [pdf, other

    cs.CV cs.AI

    G2LTraj: A Global-to-Local Generation Approach for Trajectory Prediction

    Authors: Zhanwei Zhang, Zishuo Hua, Minghao Chen, Wei Lu, Binbin Lin, Deng Cai, Wenxiao Wang

    Abstract: Predicting future trajectories of traffic agents accurately holds substantial importance in various applications such as autonomous driving. Previous methods commonly infer all future steps of an agent either recursively or simultaneously. However, the recursive strategy suffers from the accumulated error, while the simultaneous strategy overlooks the constraints among future steps, resulting in k… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: Accepted by IJCAI 2024

  7. arXiv:2404.07940  [pdf, other

    cs.SE cs.LG

    InfiBench: Evaluating the Question-Answering Capabilities of Code Large Language Models

    Authors: Linyi Li, Shijie Geng, Zhenwen Li, Yibo He, Hao Yu, Ziyue Hua, Guanghan Ning, Siwei Wang, Tao Xie, Hongxia Yang

    Abstract: Large Language Models for code (code LLMs) have witnessed tremendous progress in recent years. With the rapid development of code LLMs, many popular evaluation benchmarks, such as HumanEval, DS-1000, and MBPP, have emerged to measure the performance of code LLMs with a particular focus on code generation tasks. However, they are insufficient to cover the full range of expected capabilities of code… ▽ More

    Submitted 27 June, 2024; v1 submitted 10 March, 2024; originally announced April 2024.

    Comments: 30 pages, 10 pages for main content, work in progress

  8. arXiv:2404.01828  [pdf, other

    cs.LG cs.AI

    Defense without Forgetting: Continual Adversarial Defense with Anisotropic & Isotropic Pseudo Replay

    Authors: Yuhang Zhou, Zhongyun Hua

    Abstract: Deep neural networks have demonstrated susceptibility to adversarial attacks. Adversarial defense techniques often focus on one-shot setting to maintain robustness against attack. However, new attacks can emerge in sequences in real-world deployment scenarios. As a result, it is crucial for a defense model to constantly adapt to new attacks, but the adaptation process can lead to catastrophic forg… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

  9. arXiv:2403.16030  [pdf, other

    cs.LG

    VCR-Graphormer: A Mini-batch Graph Transformer via Virtual Connections

    Authors: Dongqi Fu, Zhigang Hua, Yan Xie, Jin Fang, Si Zhang, Kaan Sancak, Hao Wu, Andrey Malevich, Jingrui He, Bo Long

    Abstract: Graph transformer has been proven as an effective graph learning method for its adoption of attention mechanism that is capable of capturing expressive representations from complex topological and feature information of graphs. Graph transformer conventionally performs dense attention (or global attention) for every pair of nodes to learn node representation vectors, resulting in quadratic computa… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  10. arXiv:2402.06666  [pdf, other

    physics.ao-ph cs.AI cs.LG

    Weather Prediction with Diffusion Guided by Realistic Forecast Processes

    Authors: Zhanxiang Hua, Yutong He, Chengqian Ma, Alexandra Anderson-Frey

    Abstract: Weather forecasting remains a crucial yet challenging domain, where recently developed models based on deep learning (DL) have approached the performance of traditional numerical weather prediction (NWP) models. However, these DL models, often complex and resource-intensive, face limitations in flexibility post-training and in incorporating NWP predictions, leading to reliability concerns due to p… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  11. arXiv:2402.04623  [pdf, other

    cs.SE

    Validity-Preserving Delta Debugging via Generator

    Authors: Luyao Ren, Xing Zhang, Ziyue Hua, Yanyan Jiang, Xiao He, Tao Xie

    Abstract: Reducing test inputs that trigger bugs is crucial for efficient debugging. Delta debugging is the most popular approach for this purpose. When test inputs need to conform to certain specifications, existing delta debugging practice encounters a validity problem: it blindly applies reduction rules, producing a large number of invalid test inputs that do not satisfy the required specifications. This… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  12. arXiv:2401.03749  [pdf, other

    cs.CV

    The Method of Detecting Flying Birds in Surveillance Video Based on Their Characteristics

    Authors: Ziwei Sun, Zexi Hua, Hengchao Li, Yan Li

    Abstract: Aiming at the characteristics of the flying bird object in surveillance video, such as the single frame image feature is not obvious, the size is small in most cases, and asymmetric, this paper proposes a Flying Bird Object Detection method in Surveillance Video (FBOD-SV). Firstly, a new feature aggregation module, the Correlation Attention Feature Aggregation (Co-Attention-FA) module, is designed… ▽ More

    Submitted 13 April, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

  13. arXiv:2311.07822  [pdf, other

    cs.RO cs.AI

    A Central Motor System Inspired Pre-training Reinforcement Learning for Robotic Control

    Authors: Pei Zhang, Zhaobo Hua, Jinliang Ding

    Abstract: Designing controllers to achieve natural motor capabilities for multi-joint robots is a significant challenge. However, animals in nature are naturally with basic motor abilities and can master various complex motor skills through acquired learning. On the basis of analyzing the mechanism of the central motor system in mammals, we propose a novel pre-training reinforcement learning algorithm that… ▽ More

    Submitted 16 July, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  14. arXiv:2310.07148  [pdf, other

    cs.CR

    ObliuSky: Oblivious User-Defined Skyline Query Processing in the Cloud

    Authors: Yifeng Zheng, Weibo Wang, Songlei Wang, Zhongyun Hua, Yansong Gao

    Abstract: The proliferation of cloud computing has greatly spurred the popularity of outsourced database storage and management, in which the cloud holding outsourced databases can process database queries on demand. Among others, skyline queries play an important role in the database field due to its prominent usefulness in multi-criteria decision support systems. To accommodate the tailored needs of users… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: Under review by a journal

  15. arXiv:2307.00481  [pdf, other

    cs.CV

    Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection

    Authors: Tao Wang, Yushu Zhang, Zixuan Yang, Hua Zhang, Zhongyun Hua

    Abstract: Massive captured face images are stored in the database for the identification of individuals. However, these images can be observed intentionally or unintentionally by data managers, which is not at the will of individuals and may cause privacy violations. Existing protection schemes can maintain identifiability but slightly change the facial appearance, rendering it still susceptible to the visu… ▽ More

    Submitted 3 October, 2023; v1 submitted 2 July, 2023; originally announced July 2023.

  16. arXiv:2305.12652  [pdf, other

    cs.CR

    Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables

    Authors: Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, Zhongyun Hua

    Abstract: Vertical federated learning (VFL) has recently emerged as an appealing distributed paradigm empowering multi-party collaboration for training high-quality models over vertically partitioned datasets. Gradient boosting has been popularly adopted in VFL, which builds an ensemble of weak learners (typically decision trees) to achieve promising prediction performance. Recently there have been growing… ▽ More

    Submitted 2 June, 2023; v1 submitted 21 May, 2023; originally announced May 2023.

    Comments: Accepted in IEEE Transactions on Services Computing (TSC)

  17. arXiv:2305.04031  [pdf, other

    cs.RO

    Proxy-based Super Twisting Control Algorithm for Aerial Manipulators

    Authors: Zhengyu Hua, Bowen Xu, Li Xing, Fengyu Quan, Xiaogang Xiong, Haoyao Chen

    Abstract: Aerial manipulators are composed of an aerial multi-rotor that is equipped with a 6-DOF servo robot arm. To achieve precise position and attitude control during the arm's motion, it is critical for the system to have high performance control capabilities. However, the coupling effect between the multi-rotor UAVs' movement poses a challenge to the entire system's control capability. We have propose… ▽ More

    Submitted 6 May, 2023; originally announced May 2023.

    Comments: Accepted as regular paper in IEEE International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER) 2023

  18. arXiv:2301.01917  [pdf, other

    cs.CV

    Flying Bird Object Detection Algorithm in Surveillance Video Based on Motion Information

    Authors: Ziwei Sun, Zexi Hua, Hengcao Li, Haiyan Zhong

    Abstract: A Flying Bird Object Detection algorithm Based on Motion Information (FBOD-BMI) is proposed to solve the problem that the features of the object are not obvious in a single frame, and the size of the object is small (low Signal-to-Noise Ratio (SNR)) in surveillance video. Firstly, a ConvLSTM-PAN model structure is designed to capture suspicious flying bird objects, in which the Convolutional Long… ▽ More

    Submitted 26 August, 2023; v1 submitted 5 January, 2023; originally announced January 2023.

  19. arXiv:2212.13535  [pdf, other

    cs.CV cs.AI

    From Single-Visit to Multi-Visit Image-Based Models: Single-Visit Models are Enough to Predict Obstructive Hydronephrosis

    Authors: Stanley Bryan Z. Hua, Mandy Rickard, John Weaver, Alice Xiang, Daniel Alvarez, Kyla N. Velear, Kunj Sheth, Gregory E. Tasian, Armando J. Lorenzo, Anna Goldenberg, Lauren Erdman

    Abstract: Previous work has shown the potential of deep learning to predict renal obstruction using kidney ultrasound images. However, these image-based classifiers have been trained with the goal of single-visit inference in mind. We compare methods from video action recognition (i.e. convolutional pooling, LSTM, TSM) to adapt single-visit convolutional models to handle multiple visit inference. We demonst… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

    Comments: Paper accepted to SIPAIM 2022 (in Valparaiso, Chile)

  20. arXiv:2211.02256  [pdf

    eess.IV cs.CV

    ISA-Net: Improved spatial attention network for PET-CT tumor segmentation

    Authors: Zhengyong Huang, Sijuan Zou, Guoshuai Wang, Zixiang Chen, Hao Shen, Haiyan Wang, Na Zhang, Lu Zhang, Fan Yang, Haining Wangg, Dong Liang, Tianye Niu, Xiaohua Zhuc, Zhanli Hua

    Abstract: Achieving accurate and automated tumor segmentation plays an important role in both clinical practice and radiomics research. Segmentation in medicine is now often performed manually by experts, which is a laborious, expensive and error-prone task. Manual annotation relies heavily on the experience and knowledge of these experts. In addition, there is much intra- and interobserver variation. There… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  21. M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models

    Authors: Linshan Hou, Zhongyun Hua, Yuhong Li, Yifeng Zheng, Leo Yu Zhang

    Abstract: Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the inputs containing triggers. Most previous backdoor attacks mainly focus on either the all-to-one or all-to-all paradigm, allowing attackers to manipulate an input to attack a single target class. Besides, the two paradigms re… ▽ More

    Submitted 1 July, 2024; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: 14 pages; Accepted to IEEE Transactions on Circuits and Systems for Video Technology (2024)

  22. arXiv:2210.16986  [pdf, other

    cs.DS

    A Practical Distributed ADMM Solver for Billion-Scale Generalized Assignment Problems

    Authors: Jun Zhou, Feng Qi, Zhigang Hua, Daohong Jian, Ziqi Liu, Hua Wu, Xingwen Zhang, Shuang Yang

    Abstract: Assigning items to owners is a common problem found in various real-world applications, for example, audience-channel matching in marketing campaigns, borrower-lender matching in loan management, and shopper-merchant matching in e-commerce. Given an objective and multiple constraints, an assignment problem can be formulated as a constrained optimization problem. Such assignment problems are usuall… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  23. arXiv:2209.01763  [pdf, other

    eess.IV cs.CR cs.CV

    Uformer-ICS: A U-Shaped Transformer for Image Compressive Sensing Service

    Authors: Kuiyuan Zhang, Zhongyun Hua, Yuanman Li, Yushu Zhang, Yicong Zhou

    Abstract: Many service computing applications require real-time dataset collection from multiple devices, necessitating efficient sampling techniques to reduce bandwidth and storage pressure. Compressive sensing (CS) has found wide-ranging applications in image acquisition and reconstruction. Recently, numerous deep-learning methods have been introduced for CS tasks. However, the accurate reconstruction of… ▽ More

    Submitted 1 July, 2024; v1 submitted 5 September, 2022; originally announced September 2022.

  24. arXiv:2208.08014  [pdf, other

    cs.SE

    AUGER: Automatically Generating Review Comments with Pre-training Models

    Authors: Lingwei Li, Li Yang, Huaxi Jiang, Jun Yan, Tiejian Luo, Zihan Hua, Geng Liang, Chun Zuo

    Abstract: Code review is one of the best practices as a powerful safeguard for software quality. In practice, senior or highly skilled reviewers inspect source code and provide constructive comments, considering what authors may ignore, for example, some special cases. The collaborative validation between contributors results in code being highly qualified and less chance of bugs. However, since personal kn… ▽ More

    Submitted 31 August, 2022; v1 submitted 16 August, 2022; originally announced August 2022.

    Comments: Accepted by ESEC/FSE-2022

  25. arXiv:2206.08530  [pdf, other

    cs.DB cs.SE

    GDsmith: Detecting Bugs in Graph Database Engines

    Authors: Wei Lin, Ziyue Hua, Luyao Ren, Zongyang Li, Lu Zhang, Tao Xie

    Abstract: Graph database engines stand out in the era of big data for their efficiency of modeling and processing linked data. There is a strong need of testing graph database engines. However, random testing, the most practical way of automated test generation, faces the challenges of semantic validity, non-empty result, and behavior diversity to detect bugs in graph database engines. To address these chal… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  26. Metaverse: Security and Privacy Concerns

    Authors: Ruoyu Zhao, Yushu Zhang, Youwen Zhu, Rushi Lan, Zhongyun Hua

    Abstract: The term "metaverse", a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s. Recently, it is possible to realize the metaverse with the continuous emergence and progress of various technologies, and thus it has attracted extensive attention again. It may bring a lot of benefits to human society such as reducing dis… ▽ More

    Submitted 18 June, 2023; v1 submitted 8 March, 2022; originally announced March 2022.

    Comments: This work has been accepted by Journal of Metaverse

  27. HelixMO: Sample-Efficient Molecular Optimization in Scene-Sensitive Latent Space

    Authors: Zhiyuan Chen, Xiaomin Fang, Zixu Hua, Yueyang Huang, Fan Wang, Hua Wu

    Abstract: Efficient exploration of the chemical space to search the candidate drugs that satisfy various constraints is a fundamental task of drug discovery. Advanced deep generative methods attempt to optimize the molecules in the compact latent space instead of the discrete original space, but the mapping between the original and latent spaces is always kept unchanged during the entire optimization proces… ▽ More

    Submitted 16 November, 2022; v1 submitted 30 November, 2021; originally announced December 2021.

    Journal ref: 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)

  28. arXiv:2111.11646  [pdf, other

    cs.CV cs.AI q-bio.QM

    CytoImageNet: A large-scale pretraining dataset for bioimage transfer learning

    Authors: Stanley Bryan Z. Hua, Alex X. Lu, Alan M. Moses

    Abstract: Motivation: In recent years, image-based biological assays have steadily become high-throughput, sparking a need for fast automated methods to extract biologically-meaningful information from hundreds of thousands of images. Taking inspiration from the success of ImageNet, we curate CytoImageNet, a large-scale dataset of openly-sourced and weakly-labeled microscopy images (890K images, 894 classes… ▽ More

    Submitted 23 November, 2021; v1 submitted 22 November, 2021; originally announced November 2021.

    Comments: Accepted paper at NeurIPS 2021 Learning Meaningful Representations for Life (LMRL) Workshop

  29. arXiv:2106.14139  [pdf, other

    cs.CR

    Secure Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

    Authors: Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yicong Zhou, Xiaohua Jia

    Abstract: Reversible data hiding in encrypted images (RDH-EI) has attracted increasing attention, since it can protect the privacy of original images while the embedded data can be exactly extracted. Recently, some RDH-EI schemes with multiple data hiders have been proposed using secret sharing technique. However, these schemes protect the contents of the original images with lightweight security level. In… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

    Comments: 14 pages

  30. arXiv:2106.04927  [pdf, other

    cs.LG math.CO

    A Bi-Level Framework for Learning to Solve Combinatorial Optimization on Graphs

    Authors: Runzhong Wang, Zhigang Hua, Gan Liu, Jiayi Zhang, Junchi Yan, Feng Qi, Shuang Yang, Jun Zhou, Xiaokang Yang

    Abstract: Combinatorial Optimization (CO) has been a long-standing challenging research topic featured by its NP-hard nature. Traditionally such problems are approximately solved with heuristic algorithms which are usually fast but may sacrifice the solution quality. Currently, machine learning for combinatorial optimization (MLCO) has become a trending research topic, but most existing MLCO methods treat C… ▽ More

    Submitted 25 October, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2021. Code at https://github.com/Thinklab-SJTU/PPO-BiHyb

  31. FairCMS: Cloud Media Sharing with Fair Copyright Protection

    Authors: Xiangli Xiao, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang

    Abstract: The onerous media sharing task prompts resource-constrained media owners to seek help from a cloud platform, i.e., storing media contents in the cloud and letting the cloud do the sharing. There are three key security/privacy problems that need to be solved in the cloud media sharing scenario, including data privacy leakage and access control in the cloud, infringement on the owner's copyright, an… ▽ More

    Submitted 25 April, 2024; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted by IEEE Transactions on Computational Social Systems

  32. arXiv:2104.04480  [pdf, ps, other

    cs.CV

    Improving the Efficiency and Robustness of Deepfakes Detection through Precise Geometric Features

    Authors: Zekun Sun, Yujie Han, Zeyu Hua, Na Ruan, Weijia Jia

    Abstract: Deepfakes is a branch of malicious techniques that transplant a target face to the original one in videos, resulting in serious problems such as infringement of copyright, confusion of information, or even public panic. Previous efforts for Deepfakes videos detection mainly focused on appearance features, which have a risk of being bypassed by sophisticated manipulation, also resulting in high mod… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition 2021 (CVPR 2021)

  33. arXiv:2103.03412  [pdf, other

    cs.LG cs.AI

    Learning to Schedule DAG Tasks

    Authors: Zhigang Hua, Feng Qi, Gan Liu, Shuang Yang

    Abstract: Scheduling computational tasks represented by directed acyclic graphs (DAGs) is challenging because of its complexity. Conventional scheduling algorithms rely heavily on simple heuristics such as shortest job first (SJF) and critical path (CP), and are often lacking in scheduling quality. In this paper, we present a novel learning-based approach to scheduling DAG tasks. The algorithm employs a rei… ▽ More

    Submitted 4 March, 2021; originally announced March 2021.

  34. arXiv:2006.05583  [pdf, other

    cs.LG cs.CE stat.ML

    Variational Optimization for the Submodular Maximum Coverage Problem

    Authors: Jian Du, Zhigang Hua, Shuang Yang

    Abstract: We examine the \emph{submodular maximum coverage problem} (SMCP), which is related to a wide range of applications. We provide the first variational approximation for this problem based on the Nemhauser divergence, and show that it can be solved efficiently using variational optimization. The algorithm alternates between two steps: (1) an E step that estimates a variational parameter to maximize a… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

    Comments: 9 pages, 7 Figures

  35. arXiv:2002.00352  [pdf, other

    cs.DC cs.AI cs.DS

    Solving Billion-Scale Knapsack Problems

    Authors: Xingwen Zhang, Feng Qi, Zhigang Hua, Shuang Yang

    Abstract: Knapsack problems (KPs) are common in industry, but solving KPs is known to be NP-hard and has been tractable only at a relatively small scale. This paper examines KPs in a slightly generalized form and shows that they can be solved nearly optimally at scale via distributed algorithms. The proposed approach can be implemented fairly easily with off-the-shelf distributed computing frameworks (e.g.… ▽ More

    Submitted 2 February, 2020; originally announced February 2020.

  36. arXiv:1612.05154  [pdf, other

    nlin.CD cs.CR

    Nonlinear Chaotic Processing Model

    Authors: Zhongyun Hua, Yicong Zhou

    Abstract: Designing chaotic maps with complex dynamics is a challenging topic. This paper introduces the nonlinear chaotic processing (NCP) model, which contains six basic nonlinear operations. Each operation is a general framework that can use existing chaotic maps as seed maps to generate a huge number of new chaotic maps. The proposed NCP model can be easily extended by introducing new nonlinear operatio… ▽ More

    Submitted 14 December, 2016; originally announced December 2016.

    Comments: The manuscript is 11 pages