Skip to main content

Showing 1–50 of 58 results for author: Ke, Y

  1. arXiv:2407.11034  [pdf

    cs.LG

    Bridging Data Gaps in Healthcare: A Scoping Review of Transfer Learning in Biomedical Data Analysis

    Authors: Siqi Li, Xin Li, Kunyu Yu, Di Miao, Mingcheng Zhu, Mengying Yan, Yuhe Ke, Danny D'Agostino, Yilin Ning, Qiming Wu, Ziwen Wang, Yuqing Shang, Molei Liu, Chuan Hong, Nan Liu

    Abstract: Clinical and biomedical research in low-resource settings often faces significant challenges due to the need for high-quality data with sufficient sample sizes to construct effective models. These constraints hinder robust model training and prompt researchers to seek methods for leveraging existing knowledge from related studies to support new research efforts. Transfer learning (TL), a machine l… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2406.09385  [pdf, other

    cs.CV

    Towards Vision-Language Geo-Foundation Model: A Survey

    Authors: Yue Zhou, Litong Feng, Yiping Ke, Xue Jiang, Junchi Yan, Xue Yang, Wayne Zhang

    Abstract: Vision-Language Foundation Models (VLFMs) have made remarkable progress on various multimodal tasks, such as image captioning, image-text retrieval, visual question answering, and visual grounding. However, most methods rely on training with general image datasets, and the lack of geospatial data leads to poor performance on earth observation. Numerous geospatial image-text pair datasets and VLFMs… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 18 pages, 4 figures

  3. arXiv:2406.05130  [pdf, other

    cs.CL

    An Empirical Study on Parameter-Efficient Fine-Tuning for MultiModal Large Language Models

    Authors: Xiongtao Zhou, Jie He, Yuhua Ke, Guangyao Zhu, Víctor Gutiérrez-Basulto, Jeff Z. Pan

    Abstract: Multimodal large language models (MLLMs) fine-tuned with multimodal instruction datasets have demonstrated remarkable capabilities in multimodal tasks. However, fine-tuning all parameters of MLLMs has become challenging as they usually contain billions of parameters. To address this issue, we study parameter-efficient fine-tuning (PEFT) methods for MLLMs. We aim to identify effective methods for e… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: ACL finding 2024

  4. arXiv:2404.01804  [pdf, other

    cs.LG cs.IT cs.NE

    Neuromorphic Wireless Device-Edge Co-Inference via the Directed Information Bottleneck

    Authors: Yuzhen Ke, Zoran Utkovski, Mehdi Heshmati, Osvaldo Simeone, Johannes Dommel, Slawomir Stanczak

    Abstract: An important use case of next-generation wireless systems is device-edge co-inference, where a semantic task is partitioned between a device and an edge server. The device carries out data collection and partial processing of the data, while the remote server completes the given task based on information received from the device. It is often required that processing and communication be run as eff… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: 8 pages

  5. arXiv:2403.05881  [pdf, other

    cs.CL

    KG-Rank: Enhancing Large Language Models for Medical QA with Knowledge Graphs and Ranking Techniques

    Authors: Rui Yang, Haoran Liu, Edison Marrese-Taylor, Qingcheng Zeng, Yu He Ke, Wanxin Li, Lechao Cheng, Qingyu Chen, James Caverlee, Yutaka Matsuo, Irene Li

    Abstract: Large language models (LLMs) have demonstrated impressive generative capabilities with the potential to innovate in medicine. However, the application of LLMs in real clinical settings remains challenging due to the lack of factual consistency in the generated content. In this work, we develop an augmented LLM framework, KG-Rank, which leverages a medical knowledge graph (KG) along with ranking an… ▽ More

    Submitted 4 July, 2024; v1 submitted 9 March, 2024; originally announced March 2024.

    Comments: 12 pages, 9 figures, 8 tables

  6. arXiv:2403.05235  [pdf

    cs.LG cs.AI cs.CY

    Fairness-Aware Interpretable Modeling (FAIM) for Trustworthy Machine Learning in Healthcare

    Authors: Mingxuan Liu, Yilin Ning, Yuhe Ke, Yuqing Shang, Bibhas Chakraborty, Marcus Eng Hock Ong, Roger Vaughan, Nan Liu

    Abstract: The escalating integration of machine learning in high-stakes fields such as healthcare raises substantial concerns about model fairness. We propose an interpretable framework - Fairness-Aware Interpretable Modeling (FAIM), to improve model fairness without compromising performance, featuring an interactive interface to identify a "fairer" model from a set of high-performing models and promoting t… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  7. arXiv:2402.11273  [pdf, other

    cs.CV cs.AI

    Semi-supervised Medical Image Segmentation Method Based on Cross-pseudo Labeling Leveraging Strong and Weak Data Augmentation Strategies

    Authors: Yifei Chen, Chenyan Zhang, Yifan Ke, Yiyu Huang, Xuezhou Dai, Feiwei Qin, Yongquan Zhang, Xiaodong Zhang, Changmiao Wang

    Abstract: Traditional supervised learning methods have historically encountered certain constraints in medical image segmentation due to the challenging collection process, high labeling cost, low signal-to-noise ratio, and complex features characterizing biomedical images. This paper proposes a semi-supervised model, DFCPS, which innovatively incorporates the Fixmatch concept. This significantly enhances t… ▽ More

    Submitted 17 February, 2024; originally announced February 2024.

    Comments: 5 pages, 2 figures, accept ISBI2024

    Journal ref: ISBI 2024

  8. arXiv:2402.10083  [pdf

    cs.AI

    Fine-tuning Large Language Model (LLM) Artificial Intelligence Chatbots in Ophthalmology and LLM-based evaluation using GPT-4

    Authors: Ting Fang Tan, Kabilan Elangovan, Liyuan Jin, Yao Jie, Li Yong, Joshua Lim, Stanley Poh, Wei Yan Ng, Daniel Lim, Yuhe Ke, Nan Liu, Daniel Shu Wei Ting

    Abstract: Purpose: To assess the alignment of GPT-4-based evaluation to human clinician experts, for the evaluation of responses to ophthalmology-related patient queries generated by fine-tuned LLM chatbots. Methods: 400 ophthalmology questions and paired answers were created by ophthalmologists to represent commonly asked patient questions, divided into fine-tuning (368; 92%), and testing (40; 8%). We find… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Comments: 13 Pages, 1 Figure, 8 Tables

  9. arXiv:2402.01741  [pdf

    cs.CL cs.AI

    Development and Testing of a Novel Large Language Model-Based Clinical Decision Support Systems for Medication Safety in 12 Clinical Specialties

    Authors: Jasmine Chiat Ling Ong, Liyuan Jin, Kabilan Elangovan, Gilbert Yong San Lim, Daniel Yan Zheng Lim, Gerald Gui Ren Sng, Yuhe Ke, Joshua Yi Min Tung, Ryan Jian Zhong, Christopher Ming Yao Koh, Keane Zhi Hao Lee, Xiang Chen, Jack Kian Chng, Aung Than, Ken Junyang Goh, Daniel Shu Wei Ting

    Abstract: Importance: We introduce a novel Retrieval Augmented Generation (RAG)-Large Language Model (LLM) framework as a Clinical Decision Support Systems (CDSS) to support safe medication prescription. Objective: To evaluate the efficacy of LLM-based CDSS in correctly identifying medication errors in different patient case vignettes from diverse medical and surgical sub-disciplines, against a human expe… ▽ More

    Submitted 17 February, 2024; v1 submitted 29 January, 2024; originally announced February 2024.

  10. arXiv:2402.01733  [pdf

    cs.CL cs.AI

    Development and Testing of Retrieval Augmented Generation in Large Language Models -- A Case Study Report

    Authors: YuHe Ke, Liyuan Jin, Kabilan Elangovan, Hairil Rizal Abdullah, Nan Liu, Alex Tiong Heng Sia, Chai Rick Soh, Joshua Yi Min Tung, Jasmine Chiat Ling Ong, Daniel Shu Wei Ting

    Abstract: Purpose: Large Language Models (LLMs) hold significant promise for medical applications. Retrieval Augmented Generation (RAG) emerges as a promising approach for customizing domain knowledge in LLMs. This case study presents the development and evaluation of an LLM-RAG pipeline tailored for healthcare, focusing specifically on preoperative medicine. Methods: We developed an LLM-RAG model using 3… ▽ More

    Submitted 29 January, 2024; originally announced February 2024.

    Comments: NA

  11. arXiv:2401.14589  [pdf

    cs.CL cs.AI

    Enhancing Diagnostic Accuracy through Multi-Agent Conversations: Using Large Language Models to Mitigate Cognitive Bias

    Authors: Yu He Ke, Rui Yang, Sui An Lie, Taylor Xin Yi Lim, Hairil Rizal Abdullah, Daniel Shu Wei Ting, Nan Liu

    Abstract: Background: Cognitive biases in clinical decision-making significantly contribute to errors in diagnosis and suboptimal patient outcomes. Addressing these biases presents a formidable challenge in the medical field. Objective: This study explores the role of large language models (LLMs) in mitigating these biases through the utilization of a multi-agent framework. We simulate the clinical decisi… ▽ More

    Submitted 12 May, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 21 pages, 3 figures

  12. arXiv:2312.04743  [pdf, other

    cs.CR

    Hiding Functions within Functions: Steganography by Implicit Neural Representations

    Authors: Jia Liu, Peng Luo, Yan Ke

    Abstract: Deep steganography utilizes the powerful capabilities of deep neural networks to embed and extract messages, but its reliance on an additional message extractor limits its practical use due to the added suspicion it can raise from steganalyzers. To address this problem, we propose StegaINR, which utilizes Implicit Neural Representation (INR) to implement steganography. StegaINR embeds a secret fun… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  13. arXiv:2311.17066  [pdf

    q-bio.QM cs.AI

    Cluster trajectory of SOFA score in predicting mortality in sepsis

    Authors: Yuhe Ke, Matilda Swee Sun Tang, Celestine Jia Ling Loh, Hairil Rizal Abdullah, Nicholas Brian Shannon

    Abstract: Objective: Sepsis is a life-threatening condition. Sequential Organ Failure Assessment (SOFA) score is commonly used to assess organ dysfunction and predict ICU mortality, but it is taken as a static measurement and fails to capture dynamic changes. This study aims to investigate the relationship between dynamic changes in SOFA scores over the first 72 hours of ICU admission and patient outcomes.… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

    Comments: 26 pages, 4 figures, 2 tables

  14. arXiv:2310.17874  [pdf, other

    cs.CV

    SmooSeg: Smoothness Prior for Unsupervised Semantic Segmentation

    Authors: Mengcheng Lan, Xinjiang Wang, Yiping Ke, Jiaxing Xu, Litong Feng, Wayne Zhang

    Abstract: Unsupervised semantic segmentation is a challenging task that segments images into semantic groups without manual annotation. Prior works have primarily focused on leveraging prior knowledge of semantic consistency or priori concepts from self-supervised learning methods, which often overlook the coherence property of image segments. In this paper, we demonstrate that the smoothness prior, asserti… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted by NeurIPS 2023. Code available: https://github.com/mc-lan/SmooSeg

  15. arXiv:2310.06437  [pdf, other

    cs.CV cs.LG

    Skeleton Ground Truth Extraction: Methodology, Annotation Tool and Benchmarks

    Authors: Cong Yang, Bipin Indurkhya, John See, Bo Gao, Yan Ke, Zeyd Boukhers, Zhenyu Yang, Marcin Grzegorzek

    Abstract: Skeleton Ground Truth (GT) is critical to the success of supervised skeleton extraction methods, especially with the popularity of deep learning techniques. Furthermore, we see skeleton GTs used not only for training skeleton detectors with Convolutional Neural Networks (CNN) but also for evaluating skeleton-related pruning and matching algorithms. However, most existing shape and image datasets s… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

    Comments: Accepted for publication in the International Journal of Computer Vision (IJCV)

  16. arXiv:2310.02778  [pdf, other

    cs.CL cs.AI

    Integrating UMLS Knowledge into Large Language Models for Medical Question Answering

    Authors: Rui Yang, Edison Marrese-Taylor, Yuhe Ke, Lechao Cheng, Qingyu Chen, Irene Li

    Abstract: Large language models (LLMs) have demonstrated powerful text generation capabilities, bringing unprecedented innovation to the healthcare field. While LLMs hold immense promise for applications in healthcare, applying them to real clinical scenarios presents significant challenges, as these models may generate content that deviates from established medical facts and even exhibit potential biases.… ▽ More

    Submitted 13 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    Comments: 12 pages, 3 figures

  17. arXiv:2309.11747  [pdf, other

    cs.CR

    MarkNerf:Watermarking for Neural Radiance Field

    Authors: Lifeng Chen, Jia Liu, Yan Ke, Wenquan Sun, Weina Dong, Xiaozhong Pan

    Abstract: A watermarking algorithm is proposed in this paper to address the copyright protection issue of implicit 3D models. The algorithm involves embedding watermarks into the images in the training set through an embedding network, and subsequently utilizing the NeRF model for 3D modeling. A copyright verifier is employed to generate a backdoor image by providing a secret perspective as input to the neu… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  18. arXiv:2309.10503  [pdf, other

    cs.CR

    Steganography for Neural Radiance Fields by Backdooring

    Authors: Weina Dong, Jia Liu, Yan Ke, Lifeng Chen, Wenquan Sun, Xiaozhong Pan

    Abstract: The utilization of implicit representation for visual data (such as images, videos, and 3D models) has recently gained significant attention in computer vision research. In this letter, we propose a novel model steganography scheme with implicit neural representation. The message sender leverages Neural Radiance Fields (NeRF) and its viewpoint synthesis capabilities by introducing a viewpoint as a… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Comments: 6 pages, 7 figures

  19. CPMR: Context-Aware Incremental Sequential Recommendation with Pseudo-Multi-Task Learning

    Authors: Qingtian Bian, Jiaxing Xu, Hui Fang, Yiping Ke

    Abstract: The motivations of users to make interactions can be divided into static preference and dynamic interest. To accurately model user representations over time, recent studies in sequential recommendation utilize information propagation and evolution to mine from batches of arriving interactions. However, they ignore the fact that people are easily influenced by the recent actions of other users in t… ▽ More

    Submitted 16 September, 2023; v1 submitted 9 September, 2023; originally announced September 2023.

    Comments: Accepted by CIKM 2023. Alias: "Modeling Context-Aware Temporal Dynamics via Pseudo-Multi-Task Learning"

    Journal ref: ACM International Conference on Information and Knowledge Management(CIKM '23), October 21-25,2023,Birmingham,United Kingdom

  20. arXiv:2307.11133  [pdf, other

    q-bio.NC cs.AI cs.LG

    Contrastive Graph Pooling for Explainable Classification of Brain Networks

    Authors: Jiaxing Xu, Qingtian Bian, Xinhang Li, Aihu Zhang, Yiping Ke, Miao Qiao, Wei Zhang, Wei Khang Jeremy Sim, Balázs Gulyás

    Abstract: Functional magnetic resonance imaging (fMRI) is a commonly used technique to measure neural activation. Its application has been particularly important in identifying underlying neurodegenerative conditions such as Parkinson's, Alzheimer's, and Autism. Recent analysis of fMRI data models the brain as a graph and extracts features by graph neural networks (GNNs). However, the unique characteristics… ▽ More

    Submitted 12 April, 2024; v1 submitted 7 July, 2023; originally announced July 2023.

  21. arXiv:2307.08979  [pdf, ps, other

    cs.DS

    Scalable Auction Algorithms for Bipartite Maximum Matching Problems

    Authors: Quanquan C. Liu, Yiduo Ke, Samir Khuller

    Abstract: In this paper, we give new auction algorithms for maximum weighted bipartite matching (MWM) and maximum cardinality bipartite $b$-matching (MCbM). Our algorithms run in $O\left(\log n/\varepsilon^8\right)$ and $O\left(\log n/\varepsilon^2\right)$ rounds, respectively, in the blackboard distributed setting. We show that our MWM algorithm can be implemented in the distributed, interactive setting us… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: To appear in APPROX 2023

  22. arXiv:2305.15747  [pdf, other

    cs.LG

    Union Subgraph Neural Networks

    Authors: Jiaxing Xu, Aihu Zhang, Qingtian Bian, Vijay Prakash Dwivedi, Yiping Ke

    Abstract: Graph Neural Networks (GNNs) are widely used for graph representation learning in many application domains. The expressiveness of vanilla GNNs is upper-bounded by 1-dimensional Weisfeiler-Leman (1-WL) test as they operate on rooted subtrees through iterative message passing. In this paper, we empower GNNs by injecting neighbor-connectivity information extracted from a new type of substructure. We… ▽ More

    Submitted 9 January, 2024; v1 submitted 25 May, 2023; originally announced May 2023.

  23. arXiv:2304.07982  [pdf, other

    cs.DS

    An Algorithmic Approach to Address Course Enrollment Challenges

    Authors: Arpita Biswas, Yiduo Ke, Samir Khuller, Quanquan C. Liu

    Abstract: Massive surges of enrollments in courses have led to a crisis in several computer science departments - not only is the demand for certain courses extremely high from majors, but the demand from non-majors is also very high. Much of the time, this leads to significant frustration on the part of the students, and getting seats in desired courses is a rather ad-hoc process. One approach is to first… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: Abstract truncated per arXiv limits

  24. arXiv:2304.02614  [pdf

    cs.CR

    The Realizations of Steganography in Encrypted Domain

    Authors: Yan Ke, Minqing Zhang, Jia Liu, Xiaoyuan Yang

    Abstract: With the popularization and application of privacy protection technologies in cloud service and social network, ciphertext has been gradually becoming a common platform for public to exchange data. Under the cover of such a plat-form, we propose steganography in encrypted domain (SIED) in this paper to re-alize a novel method to realize secret communication Based on Simmons' model of prisoners' pr… ▽ More

    Submitted 13 March, 2023; originally announced April 2023.

  25. arXiv:2303.10136  [pdf, other

    cs.HC cs.CV cs.LG

    MassNet: A Deep Learning Approach for Body Weight Extraction from A Single Pressure Image

    Authors: Ziyu Wu, Quan Wan, Mingjie Zhao, Yi Ke, Yiran Fang, Zhen Liang, Fangting Xie, Jingyuan Cheng

    Abstract: Body weight, as an essential physiological trait, is of considerable significance in many applications like body management, rehabilitation, and drug dosing for patient-specific treatments. Previous works on the body weight estimation task are mainly vision-based, using 2D/3D, depth, or infrared images, facing problems in illumination, occlusions, and especially privacy issues. The pressure mappin… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Journal ref: PerCom 2023

  26. arXiv:2211.16739  [pdf, other

    cs.CV math.NA math.OC

    Quasi Non-Negative Quaternion Matrix Factorization with Application to Color Face Recognition

    Authors: Yifen Ke, Changfeng Ma, Zhigang Jia, Yajun Xie, Riwei Liao

    Abstract: To address the non-negativity dropout problem of quaternion models, a novel quasi non-negative quaternion matrix factorization (QNQMF) model is presented for color image processing. To implement QNQMF, the quaternion projected gradient algorithm and the quaternion alternating direction method of multipliers are proposed via formulating QNQMF as the non-convex constraint quaternion optimization pro… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 35 pages, 8 figures

  27. arXiv:2211.12421  [pdf, other

    q-bio.NC cs.LG eess.IV

    Data-Driven Network Neuroscience: On Data Collection and Benchmark

    Authors: Jiaxing Xu, Yunhan Yang, David Tse Jung Huang, Sophi Shilpa Gururajapathy, Yiping Ke, Miao Qiao, Alan Wang, Haribalan Kumar, Josh McGeown, Eryn Kwon

    Abstract: This paper presents a comprehensive and quality collection of functional human brain network data for potential research in the intersection of neuroscience, machine learning, and graph analytics. Anatomical and functional MRI images have been used to understand the functional connectivity of the human brain and are particularly important in identifying underlying neurodegenerative conditions such… ▽ More

    Submitted 29 October, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

    Journal ref: Advances in Neural Information Processing Systems, 2023

  28. arXiv:2209.00936  [pdf, other

    cs.LG cs.AI

    A Class-Aware Representation Refinement Framework for Graph Classification

    Authors: Jiaxing Xu, Jinjie Ni, Yiping Ke

    Abstract: Graph Neural Networks (GNNs) are widely used for graph representation learning. Despite its prevalence, GNN suffers from two drawbacks in the graph classification task, the neglect of graph-level relationships, and the generalization issue. Each graph is treated separately in GNN message passing/graph pooling, and existing methods to address overfitting operate on each individual graph. This makes… ▽ More

    Submitted 6 June, 2024; v1 submitted 2 September, 2022; originally announced September 2022.

  29. arXiv:2208.14510  [pdf

    cs.CR

    Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism

    Authors: Yan Ke, Minqing Zhang, Xinpeng Zhang, Yiliang Han, Jia Liu

    Abstract: Considering the prospects of public key embedding (PKE) mechanism in active forensics on the integrity or identity of ciphertext for distributed deep learning security, two reversible data hiding in encrypted domain (RDH-ED) algorithms with PKE mechanism are proposed, in which all the elements of the embedding function shall be open to the public, while the extraction function could be performed o… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

  30. arXiv:2202.07931  [pdf, other

    cs.SD eess.AS

    DBT-Net: Dual-branch federative magnitude and phase estimation with attention-in-attention transformer for monaural speech enhancement

    Authors: Guochen Yu, Andong Li, Hui Wang, Yutian Wang, Yuxuan Ke, Chengshi Zheng

    Abstract: The decoupling-style concept begins to ignite in the speech enhancement area, which decouples the original complex spectrum estimation task into multiple easier sub-tasks i.e., magnitude-only recovery and the residual complex spectrum estimation)}, resulting in better performance and easier interpretability. In this paper, we propose a dual-branch federative magnitude and phase estimation framewor… ▽ More

    Submitted 30 July, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: 15 pages;Accepted by IEEE/ACM Trans. Audio. Speech, Lang. Process

  31. arXiv:2202.06764  [pdf, other

    eess.AS cs.SD eess.SP

    Low-latency Monaural Speech Enhancement with Deep Filter-bank Equalizer

    Authors: Chengshi Zheng, Wenzhe Liu, Andong Li, Yuxuan Ke, Xiaodong Li

    Abstract: It is highly desirable that speech enhancement algorithms can achieve good performance while keeping low latency for many applications, such as digital hearing aids, acoustically transparent hearing devices, and public address systems. To improve the performance of traditional low-latency speech enhancement algorithms, a deep filter-bank equalizer (FBE) framework was proposed, which integrated a d… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

    Comments: 35 pages, 8 figures

  32. arXiv:2107.10397  [pdf, other

    cs.LG stat.ME

    Improving COVID-19 Forecasting using eXogenous Variables

    Authors: Mohammadhossein Toutiaee, Xiaochuan Li, Yogesh Chaudhari, Shophine Sivaraja, Aishwarya Venkataraj, Indrajeet Javeri, Yuan Ke, Ismailcem Arpinar, Nicole Lazar, John Miller

    Abstract: In this work, we study the pandemic course in the United States by considering national and state levels data. We propose and compare multiple time-series prediction techniques which incorporate auxiliary variables. One type of approach is based on spatio-temporal graph neural networks which forecast the pandemic course by utilizing a hybrid deep learning architecture and human mobility data. Node… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

  33. arXiv:2107.03354  [pdf, other

    cs.LG cs.AI stat.ML

    Mitigating Performance Saturation in Neural Marked Point Processes: Architectures and Loss Functions

    Authors: Tianbo Li, Tianze Luo, Yiping Ke, Sinno Jialin Pan

    Abstract: Attributed event sequences are commonly encountered in practice. A recent research line focuses on incorporating neural networks with the statistical model -- marked point processes, which is the conventional tool for dealing with attributed event sequences. Neural marked point processes possess good interpretability of probabilistic models as well as the representational power of neural networks.… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: 9 pages, 4 figures, accepted by KDD-21 research track. The source code is available at https://github.com/ltz0120/Graph-Convolutional- Hawkes-Processes-GCHP

  34. arXiv:2106.05838  [pdf, other

    stat.ML cs.LG math.ST stat.ME

    Large-scale optimal transport map estimation using projection pursuit

    Authors: Cheng Meng, Yuan Ke, Jingyi Zhang, Mengrui Zhang, Wenxuan Zhong, Ping Ma

    Abstract: This paper studies the estimation of large-scale optimal transport maps (OTM), which is a well-known challenging problem owing to the curse of dimensionality. Existing literature approximates the large-scale OTM by a series of one-dimensional OTM problems through iterative random projection. Such methods, however, suffer from slow or none convergence in practice due to the nature of randomly selec… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

    Journal ref: Meng, C. "Large-scale optimal transport map estimation using projection pursuit." NeurIPS 2019 (2019); Ke, Y. "Large-scale optimal transport map estimation using projection pursuit." NeurIPS 2019 (2019)

  35. arXiv:2104.14510  [pdf, other

    cs.DS

    Improved Kernels for Edge Modification Problems

    Authors: Yixin Cao, Yuping Ke

    Abstract: In an edge modification problem, we are asked to modify at most $k$ edges to a given graph to make the graph satisfy a certain property. Depending on the operations allowed, we have the completion problems and the edge deletion problems. A great amount of efforts have been devoted to understanding the kernelization complexity of these problems. We revisit several well-studied edge modification pro… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

  36. arXiv:2010.08502  [pdf

    cs.CR

    A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

    Authors: Yan Ke, Minqing Zhang, Xinpeng Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang

    Abstract: Reversible data hiding in encrypted domain (RDH-ED) schemes based on symmetric or public key encryption are mainly applied to the security of end-to-end communication. Aimed at providing reliable technical supports for multi-party security scenarios, a separable RDH-ED scheme for secret image sharing based on Chinese remainder theorem (CRT) is presented. In the application of (t, n) secret image s… ▽ More

    Submitted 25 September, 2020; originally announced October 2020.

  37. arXiv:2007.09584  [pdf, other

    cs.CV

    PIoU Loss: Towards Accurate Oriented Object Detection in Complex Environments

    Authors: Zhiming Chen, Kean Chen, Weiyao Lin, John See, Hui Yu, Yan Ke, Cong Yang

    Abstract: Object detection using an oriented bounding box (OBB) can better target rotated objects by reducing the overlap with background areas. Existing OBB approaches are mostly built on horizontal bounding box detectors by introducing an additional angle dimension optimized by a distance loss. However, as the distance loss only minimizes the angle error of the OBB and that it loosely correlates to the Io… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

    Journal ref: European Conference on Computer Vision, 2020

  38. arXiv:2005.03229  [pdf, other

    cs.LG cs.CV stat.ML

    Subdomain Adaptation with Manifolds Discrepancy Alignment

    Authors: Pengfei Wei, Yiping Ke, Xinghua Qu, Tze-Yun Leong

    Abstract: Reducing domain divergence is a key step in transfer learning problems. Existing works focus on the minimization of global domain divergence. However, two domains may consist of several shared subdomains, and differ from each other in each subdomain. In this paper, we take the local divergence of subdomains into account in transfer. Specifically, we propose to use low-dimensional manifold to repre… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

  39. arXiv:2003.11273  [pdf, other

    cs.DS math.CO

    Polynomial Kernels for Paw-free Edge Modification Problems

    Authors: Yixin Cao, Yuping Ke, Hanchun Yuan

    Abstract: Let $H$ be a fixed graph. Given a graph $G$ and an integer $k$, the $H$-free edge modification problem asks whether it is possible to modify at most $k$ edges in $G$ to make it $H$-free. Sandeep and Sivadasan (IPEC 2015) asks whether the paw-free completion problem and the paw-free edge deletion problem admit polynomial kernels. We answer both questions affirmatively by presenting, respectively,… ▽ More

    Submitted 25 March, 2020; originally announced March 2020.

    Comments: To appear in the proceedings of the 16th Annual Conference on Theory and Applications of Models of Computation (TAMC 2020)

  40. arXiv:2002.01096  [pdf, other

    cs.CV

    Aesthetic Quality Assessment for Group photograph

    Authors: Yaoting Wang, Yongzhen Ke, Kai Wang, Cuijiao Zhang, Fan Qin

    Abstract: Image aesthetic quality assessment has got much attention in recent years, but not many works have been done on a specific genre of photos: Group photograph. In this work, we designed a set of high-level features based on the experience and principles of group photography: Opened-eye, Gaze, Smile, Occluded faces, Face Orientation, Facial blur, Character center. Then we combined them and 83 generic… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  41. arXiv:1907.01886  [pdf

    cs.CR cs.MM eess.IV

    Recent Advances of Image Steganography with Generative Adversarial Networks

    Authors: Jia Liu, Yan Ke, Yu Lei, Zhuo Zhang, Jun Li, Peng Luo, Minqing Zhang, Xiaoyuan Yang

    Abstract: In the past few years, the Generative Adversarial Network (GAN) which proposed in 2014 has achieved great success. GAN has achieved many research results in the field of computer vision and natural language processing. Image steganography is dedicated to hiding secret messages in digital images, and has achieved the purpose of covert communication. Recently, research on image steganography has dem… ▽ More

    Submitted 18 June, 2019; originally announced July 2019.

    Comments: 39 pages, 26 figures

  42. arXiv:1904.12792  [pdf

    cs.CR

    Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain

    Authors: Yan Ke, Min-qing Zhang, Jia Liu, Ting-ting Su, Xiao-yuan Yang

    Abstract: This paper proposes a fully homomorphic encryption encapsulated difference expansion (FHEE-DE) scheme for reversible data hiding in encrypted domain (RDH-ED). In the proposed scheme, we use key-switching and bootstrapping techniques to control the ciphertext extension and decryption failure. To realize the data extraction directly from the encrypted domain without the private key, a key-switching… ▽ More

    Submitted 29 April, 2019; originally announced April 2019.

  43. arXiv:1806.03618  [pdf

    cs.MM cs.CR

    Steganography Security: Principle and Practice

    Authors: Yan Ke, Jia Liu, Min-qing Zhang, Ting-ting Su, Xiao-yuan Yang

    Abstract: This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security. The two necessary conditions for the steganography security are obtained. Under the current technology situati… ▽ More

    Submitted 16 October, 2018; v1 submitted 10 June, 2018; originally announced June 2018.

  44. arXiv:1804.10531  [pdf

    cs.MM cs.CR

    Generative Steganography by Sampling

    Authors: Zhuo Zhang, Jia Liu, Yan Ke, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang

    Abstract: In this paper, a novel data-driven information hiding scheme called generative steganography by sampling (GSS) is proposed. Unlike in traditional modification-based steganography, in our method the stego image is directly sampled by a powerful generator: no explicit cover is used. Both parties share a secret key used for message embedding and extraction. The Jensen-Shannon divergence is introduced… ▽ More

    Submitted 20 July, 2019; v1 submitted 26 April, 2018; originally announced April 2018.

  45. arXiv:1804.06514  [pdf, ps, other

    cs.CR

    The Reincarnation of Grille Cipher: A Generative Approach

    Authors: Jia Liu, Yan Ke, Yu Lei, Jun Li, Yaojie Wang, Yiliang Han, Minqing Zhang, Xiaoyuan Yang

    Abstract: In order to keep the data secret, various techniques have been implemented to encrypt and decrypt the secret data. Cryptography is committed to the security of content, i.e. it cannot be restored with a given ciphertext. Steganography is to hiding the existence of a communication channel within a stego. However, it has been difficult to construct a cipher (cypher) that simultaneously satisfy both… ▽ More

    Submitted 14 May, 2018; v1 submitted 17 April, 2018; originally announced April 2018.

  46. arXiv:1803.09219  [pdf

    cs.MM cs.CR

    Digital Cardan Grille: A Modern Approach for Information Hiding

    Authors: Jia Liu, Tanping Zhou, Zhuo Zhang, Yan Ke, Yu Lei, Minqing Zhang, Xiaoyuan Yang

    Abstract: In this paper, a new framework for construction of Cardan grille for information hiding is proposed. Based on the semantic image inpainting technique, the stego image are driven by secret messages directly. A mask called Digital Cardan Grille (DCG) for determining the hidden location is introduced to hide the message. The message is written to the corrupted region that needs to be filled in the co… ▽ More

    Submitted 10 May, 2018; v1 submitted 25 March, 2018; originally announced March 2018.

  47. arXiv:1712.06951  [pdf

    cs.CR cs.MM

    Coverless Information Hiding Based on Generative adversarial networks

    Authors: Ming-ming Liu, Min-qing Zhang, Jia Liu, Ying-nan Zhang, Yan Ke

    Abstract: Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. To address this problem, a novel method named generative coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is repla… ▽ More

    Submitted 18 December, 2017; originally announced December 2017.

    Comments: arXiv admin note: text overlap with arXiv:1703.05502 by other authors

  48. arXiv:1711.04916  [pdf

    cs.MM

    Generative Steganography with Kerckhoffs' Principle

    Authors: Yan Ke, Minqing Zhang, Jia Liu, Tingting Su, Xiaoyuan Yang

    Abstract: The distortion in steganography that usually comes from the modification or recoding on the cover image during the embedding process leaves the steganalyzer with possibility of discriminating. Faced with such a risk, we propose generative steganography with Kerckhoffs' principle (GSK) in this letter. In GSK, the secret messages are generated by a cover image using a generator rather than embedded… ▽ More

    Submitted 4 July, 2021; v1 submitted 13 November, 2017; originally announced November 2017.

  49. arXiv:1708.03312  [pdf, other

    cs.CL

    Radical-level Ideograph Encoder for RNN-based Sentiment Analysis of Chinese and Japanese

    Authors: Yuanzhi Ke, Masafumi Hagiwara

    Abstract: The character vocabulary can be very large in non-alphabetic languages such as Chinese and Japanese, which makes neural network models huge to process such languages. We explored a model for sentiment classification that takes the embeddings of the radicals of the Chinese characters, i.e, hanzi of Chinese and kanji of Japanese. Our model is composed of a CNN word feature encoder and a bi-direction… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

    Comments: 12 pages, 4 figures

  50. arXiv:1707.08690  [pdf, other

    cs.DS

    Vertex Deletion Problems on Chordal Graphs

    Authors: Yixin Cao, Yuping Ke, Yota Otachi, Jie You

    Abstract: Containing many classic optimization problems, the family of vertex deletion problems has an important position in algorithm and complexity study. The celebrated result of Lewis and Yannakakis gives a complete dichotomy of their complexity. It however has nothing to say about the case when the input graph is also special. This paper initiates a systematic study of vertex deletion problems from one… ▽ More

    Submitted 1 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    ACM Class: F.1.3; G.2.2; F.2.2