Skip to main content

Showing 1–27 of 27 results for author: Kong, B

  1. arXiv:2402.03366  [pdf, other

    cs.IR cs.AI cs.CL cs.LG

    Uncertainty-Aware Explainable Recommendation with Large Language Models

    Authors: Yicui Peng, Hao Chen, Chingsheng Lin, Guo Huang, Jinrong Hu, Hui Guo, Bin Kong, Shu Hu, Xi Wu, Xin Wang

    Abstract: Providing explanations within the recommendation system would boost user satisfaction and foster trust, especially by elaborating on the reasons for selecting recommended items tailored to the user. The predominant approach in this domain revolves around generating text-based explanations, with a notable emphasis on applying large language models (LLMs). However, refining LLMs for explainable reco… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

  2. arXiv:2402.03167  [pdf, other

    math.OC cs.LG stat.ML

    Decentralized Bilevel Optimization over Graphs: Loopless Algorithmic Update and Transient Iteration Complexity

    Authors: Boao Kong, Shuchen Zhu, Songtao Lu, Xinmeng Huang, Kun Yuan

    Abstract: Stochastic bilevel optimization (SBO) is becoming increasingly essential in machine learning due to its versatility in handling nested structures. To address large-scale SBO, decentralized approaches have emerged as effective paradigms in which nodes communicate with immediate neighbors without a central server, thereby improving communication efficiency and enhancing algorithmic robustness. Howev… ▽ More

    Submitted 26 February, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: 37 pages, 6 figures

  3. arXiv:2305.16334  [pdf, other

    cs.CL cs.AI

    OlaGPT: Empowering LLMs With Human-like Problem-Solving Abilities

    Authors: Yuanzhen Xie, Tao Xie, Mingxiong Lin, WenTao Wei, Chenglin Li, Beibei Kong, Lei Chen, Chengxiang Zhuo, Bo Hu, Zang Li

    Abstract: In most current research, large language models (LLMs) are able to perform reasoning tasks by generating chains of thought through the guidance of specific prompts. However, there still exists a significant discrepancy between their capability in solving complex reasoning problems and that of humans. At present, most approaches focus on chains of thought (COT) and tool use, without considering the… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  4. arXiv:2210.10629  [pdf, other

    cs.IR

    Tenrec: A Large-scale Multipurpose Benchmark Dataset for Recommender Systems

    Authors: Guanghu Yuan, Fajie Yuan, Yudong Li, Beibei Kong, Shujie Li, Lei Chen, Min Yang, Chenyun Yu, Bo Hu, Zang Li, Yu Xu, Xiaohu Qie

    Abstract: Existing benchmark datasets for recommender systems (RS) either are created at a small scale or involve very limited forms of user feedback. RS models evaluated on such datasets often lack practical values for large-scale real-world applications. In this paper, we describe Tenrec, a novel and publicly available data collection for RS that records various user feedback from four different recommend… ▽ More

    Submitted 4 June, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

  5. arXiv:2206.06190  [pdf, other

    cs.IR

    TransRec: Learning Transferable Recommendation from Mixture-of-Modality Feedback

    Authors: Jie Wang, Fajie Yuan, Mingyue Cheng, Joemon M. Jose, Chenyun Yu, Beibei Kong, Xiangnan He, Zhijin Wang, Bo Hu, Zang Li

    Abstract: Learning large-scale pre-trained models on broad-ranging data and then transfer to a wide range of target tasks has become the de facto paradigm in many machine learning (ML) communities. Such big models are not only strong performers in practice but also offer a promising way to break out of the task-specific modeling restrictions, thereby enabling task-agnostic and unified ML systems. However, s… ▽ More

    Submitted 3 November, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

  6. arXiv:2205.02361  [pdf, other

    cs.CV

    Creating a Forensic Database of Shoeprints from Online Shoe Tread Photos

    Authors: Samia Shafique, Bailey Kong, Shu Kong, Charless C. Fowlkes

    Abstract: Shoe tread impressions are one of the most common types of evidence left at crime scenes. However, the utility of such evidence is limited by the lack of databases of footwear prints that cover the large and growing number of distinct shoe models. Moreover, the database is preferred to contain the 3D shape, or depth, of shoe-tread photos so as to allow for extracting shoeprints to match a query (c… ▽ More

    Submitted 20 October, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: published in WACV 2023; 8 pages including 11 figures and 3 tables; contains reference and appendix

  7. arXiv:2112.07415  [pdf, ps, other

    eess.IV cs.AI cs.CV

    Stochastic Planner-Actor-Critic for Unsupervised Deformable Image Registration

    Authors: Ziwei Luo, Jing Hu, Xin Wang, Shu Hu, Bin Kong, Youbing Yin, Qi Song, Xi Wu, Siwei Lyu

    Abstract: Large deformations of organs, caused by diverse shapes and nonlinear shape changes, pose a significant challenge for medical image registration. Traditional registration methods need to iteratively optimize an objective function via a specific deformation model along with meticulous parameter tuning, but which have limited capabilities in registering images with large deformations. While deep lear… ▽ More

    Submitted 30 April, 2022; v1 submitted 14 December, 2021; originally announced December 2021.

    Comments: Accepted by AAAI 2022

  8. arXiv:2112.07403  [pdf, ps, other

    cs.CV

    Stochastic Actor-Executor-Critic for Image-to-Image Translation

    Authors: Ziwei Luo, Jing Hu, Xin Wang, Siwei Lyu, Bin Kong, Youbing Yin, Qi Song, Xi Wu

    Abstract: Training a model-free deep reinforcement learning model to solve image-to-image translation is difficult since it involves high-dimensional continuous state and action spaces. In this paper, we draw inspiration from the recent success of the maximum entropy reinforcement learning framework designed for challenging continuous control problems to develop stochastic policies over high dimensional con… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

    Journal ref: IJCAI 2021

  9. RecGURU: Adversarial Learning of Generalized User Representations for Cross-Domain Recommendation

    Authors: Chenglin Li, Mingjun Zhao, Huanming Zhang, Chenyun Yu, Lei Cheng, Guoqiang Shu, Beibei Kong, Di Niu

    Abstract: Cross-domain recommendation can help alleviate the data sparsity issue in traditional sequential recommender systems. In this paper, we propose the RecGURU algorithm framework to generate a Generalized User Representation (GUR) incorporating user information across domains in sequential recommendation, even when there is minimum or no common users in the two domains. We propose a self-attentive au… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

    Comments: 11 pages, 2 figures, 4 tables, Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining

  10. arXiv:2110.02417  [pdf, other

    eess.IV cs.CV cs.LG

    CADA: Multi-scale Collaborative Adversarial Domain Adaptation for Unsupervised Optic Disc and Cup Segmentation

    Authors: Peng Liu, Charlie T. Tran, Bin Kong, Ruogu Fang

    Abstract: The diversity of retinal imaging devices poses a significant challenge: domain shift, which leads to performance degradation when applying the deep learning models trained on one domain to new testing domains. In this paper, we propose a multi-scale input along with multiple domain adaptors applied hierarchically in both feature and output spaces. The proposed training strategy and novel unsupervi… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: text overlap with arXiv:1910.07638

  11. arXiv:2106.01618  [pdf, other

    cs.CV

    Transferable Adversarial Examples for Anchor Free Object Detection

    Authors: Quanyu Liao, Xin Wang, Bin Kong, Siwei Lyu, Bin Zhu, Youbing Yin, Qi Song, Xi Wu

    Abstract: Deep neural networks have been demonstrated to be vulnerable to adversarial attacks: subtle perturbation can completely change prediction result. The vulnerability has led to a surge of research in this direction, including adversarial attacks on object detection networks. However, previous studies are dedicated to attacking anchor-based object detectors. In this paper, we present the first advers… ▽ More

    Submitted 3 June, 2021; v1 submitted 3 June, 2021; originally announced June 2021.

    Comments: Accepted as oral in ICME 2021

  12. arXiv:2106.01615  [pdf, other

    cs.CV cs.AI

    Imperceptible Adversarial Examples for Fake Image Detection

    Authors: Quanyu Liao, Yuezun Li, Xin Wang, Bin Kong, Bin Zhu, Siwei Lyu, Youbing Yin, Qi Song, Xi Wu

    Abstract: Fooling people with highly realistic fake images generated with Deepfake or GANs brings a great social disturbance to our society. Many methods have been proposed to detect fake images, but they are vulnerable to adversarial perturbations -- intentionally designed noises that can lead to the wrong prediction. Existing methods of attacking fake image detectors usually generate adversarial perturbat… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: Accepted by ICIP 2021

  13. arXiv:2010.14291  [pdf, other

    cs.CV

    Fast Local Attack: Generating Local Adversarial Examples for Object Detectors

    Authors: Quanyu Liao, Xin Wang, Bin Kong, Siwei Lyu, Youbing Yin, Qi Song, Xi Wu

    Abstract: The deep neural network is vulnerable to adversarial examples. Adding imperceptible adversarial perturbations to images is enough to make them fail. Most existing research focuses on attacking image classifiers or anchor-based object detectors, but they generate globally perturbation on the whole image, which is unnecessary. In our work, we leverage higher-level semantic information to generate hi… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: Published in: 2020 International Joint Conference on Neural Networks (IJCNN)

  14. arXiv:2009.13724  [pdf, other

    cs.IR

    One Person, One Model, One World: Learning Continual User Representation without Forgetting

    Authors: Fajie Yuan, Guoxiao Zhang, Alexandros Karatzoglou, Joemon Jose, Beibei Kong, Yudong Li

    Abstract: Learning user representations is a vital technique toward effective user modeling and personalized recommender systems. Existing approaches often derive an individual set of model parameters for each task by training on separate data. However, the representation of the same user potentially has some commonalities, such as preference and personality, even in different tasks. As such, these separate… ▽ More

    Submitted 9 May, 2021; v1 submitted 28 September, 2020; originally announced September 2020.

  15. arXiv:2008.09304  [pdf, other

    cs.CV

    Graph Neural Networks for UnsupervisedDomain Adaptation of Histopathological ImageAnalytics

    Authors: Dou Xu, Chang Cai, Chaowei Fang, Bin Kong, Jihua Zhu, Zhongyu Li

    Abstract: Annotating histopathological images is a time-consuming andlabor-intensive process, which requires broad-certificated pathologistscarefully examining large-scale whole-slide images from cells to tissues.Recent frontiers of transfer learning techniques have been widely investi-gated for image understanding tasks with limited annotations. However,when applied for the analytics of histology images, f… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

  16. arXiv:2003.04367  [pdf, other

    cs.CV cs.CR cs.LG

    Category-wise Attack: Transferable Adversarial Examples for Anchor Free Object Detection

    Authors: Quanyu Liao, Xin Wang, Bin Kong, Siwei Lyu, Youbing Yin, Qi Song, Xi Wu

    Abstract: Deep neural networks have been demonstrated to be vulnerable to adversarial attacks: subtle perturbations can completely change the classification results. Their vulnerability has led to a surge of research in this direction. However, most works dedicated to attacking anchor-based object detection models. In this work, we aim to present an effective and efficient algorithm to generate adversarial… ▽ More

    Submitted 22 June, 2020; v1 submitted 9 February, 2020; originally announced March 2020.

  17. arXiv:2002.02909  [pdf, other

    cs.CV cs.LG eess.IV

    Domain Embedded Multi-model Generative Adversarial Networks for Image-based Face Inpainting

    Authors: Xian Zhang, Xin Wang, Bin Kong, Canghong Shi, Youbing Yin, Qi Song, Siwei Lyu, Jiancheng Lv, Canghong Shi, Xiaojie Li

    Abstract: Prior knowledge of face shape and structure plays an important role in face inpainting. However, traditional face inpainting methods mainly focus on the generated image resolution of the missing portion without consideration of the special particularities of the human face explicitly and generally produce discordant facial parts. To solve this problem, we present a domain embedded multi-model gene… ▽ More

    Submitted 20 June, 2020; v1 submitted 5 February, 2020; originally announced February 2020.

  18. arXiv:1911.11067  [pdf, other

    cs.IR cs.CY

    Analysing Russian Trolls via NLP tools

    Authors: Bokun Kong

    Abstract: The fifty-eighth American presidential election in 2016 still arouse fierce controversyat present. A portion of politicians as well as medium and voters believe that theRussian government interfered with the election of 2016 by controlling malicioussocial media accounts on twitter, such as trolls and bots accounts. Both of them willbroadcast fake news, derail the conversations about election, and… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

    Comments: 53 pages, 8 figures, 16 tables

  19. arXiv:1910.07638  [pdf, other

    eess.IV cs.CV cs.LG

    CFEA: Collaborative Feature Ensembling Adaptation for Domain Adaptation in Unsupervised Optic Disc and Cup Segmentation

    Authors: Peng Liu, Bin Kong, Zhongyu Li, Shaoting Zhang, Ruogu Fang

    Abstract: Recently, deep neural networks have demonstrated comparable and even better performance with board-certified ophthalmologists in well-annotated datasets. However, the diversity of retinal imaging devices poses a significant challenge: domain shift, which leads to performance degradation when applying the deep learning models to new testing domains. In this paper, we propose a novel unsupervised do… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Journal ref: the 22nd International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI 2019)

  20. arXiv:1909.13568  [pdf, other

    cs.CL cs.LG

    A Hybrid Persian Sentiment Analysis Framework: Integrating Dependency Grammar Based Rules and Deep Neural Networks

    Authors: Kia Dashtipour, Mandar Gogate, Jingpeng Li, Fengling Jiang, Bin Kong, Amir Hussain

    Abstract: Social media hold valuable, vast and unstructured information on public opinion that can be utilized to improve products and services. The automatic analysis of such data, however, requires a deep understanding of natural language. Current sentiment analysis approaches are mainly based on word co-occurrence frequencies, which are inadequate in most practical cases. In this work, we propose a novel… ▽ More

    Submitted 30 September, 2019; originally announced September 2019.

    Comments: Accepted in Neurocomputing, Demo available at: https://cogbid.napier.ac.uk/demo/persian-sentiment-analysis/

  21. arXiv:1902.10053  [pdf, other

    cs.CV

    Attention-driven Tree-structured Convolutional LSTM for High Dimensional Data Understanding

    Authors: Bin Kong, Xin Wang, Junjie Bai, Yi Lu, Feng Gao, Kunlin Cao, Qi Song, Shaoting Zhang, Siwei Lyu, Youbing Yin

    Abstract: Modeling the sequential information of image sequences has been a vital step of various vision tasks and convolutional long short-term memory (ConvLSTM) has demonstrated its superb performance in such spatiotemporal problems. Nevertheless, the hierarchical data structures in a significant amount of tasks (e.g., human body parts and vessel/airway tree in biomedical images) cannot be properly modele… ▽ More

    Submitted 29 January, 2019; originally announced February 2019.

  22. arXiv:1901.05876  [pdf, other

    cs.CV cs.LG

    Residual Attention based Network for Hand Bone Age Assessment

    Authors: Eric Wu, Bin Kong, Xin Wang, Junjie Bai, Yi Lu, Feng Gao, Shaoting Zhang, Kunlin Cao, Qi Song, Siwei Lyu, Youbing Yin

    Abstract: Computerized automatic methods have been employed to boost the productivity as well as objectiveness of hand bone age assessment. These approaches make predictions according to the whole X-ray images, which include other objects that may introduce distractions. Instead, our framework is inspired by the clinical workflow (Tanner-Whitehouse) of hand bone age assessment, which focuses on the key comp… ▽ More

    Submitted 21 December, 2018; originally announced January 2019.

  23. arXiv:1808.08393  [pdf, other

    cs.CV

    Saliency Detection via Bidirectional Absorbing Markov Chain

    Authors: Fengling Jiang, Bin Kong, Ahsan Adeel, Yun Xiao, Amir Hussain

    Abstract: Traditional saliency detection via Markov chain only considers boundaries nodes. However, in addition to boundaries cues, background prior and foreground prior cues play a complementary role to enhance saliency detection. In this paper, we propose an absorbing Markov chain based saliency detection method considering both boundary information and foreground prior cues. The proposed approach combine… ▽ More

    Submitted 25 August, 2018; originally announced August 2018.

    Comments: To appear in the 9th International Conference on Brain Inspired Cognitive Systems (BICS 2018)

    ACM Class: I.2.10; I.4.0; I.4.8

  24. Cross-Domain Image Matching with Deep Feature Maps

    Authors: Bailey Kong, James Supancic, Deva Ramanan, Charless C. Fowlkes

    Abstract: We investigate the problem of automatically determining what type of shoe left an impression found at a crime scene. This recognition problem is made difficult by the variability in types of crime scene evidence (ranging from traces of dust or oil on hard surfaces to impressions made in soil) and the lack of comprehensive databases of shoe outsole tread patterns. We find that mid-level features ex… ▽ More

    Submitted 1 October, 2018; v1 submitted 6 April, 2018; originally announced April 2018.

  25. arXiv:1801.05299  [pdf, other

    cs.CV

    Autonomous Driving in Reality with Reinforcement Learning and Image Translation

    Authors: Nayun Xu, Bowen Tan, Bingyu Kong

    Abstract: Supervised learning is widely used in training autonomous driving vehicle. However, it is trained with large amount of supervised labeled data. Reinforcement learning can be trained without abundant labeled data, but we cannot train it in reality because it would involve many unpredictable accidents. Nevertheless, training an agent with good performance in virtual environment is relatively much ea… ▽ More

    Submitted 25 April, 2019; v1 submitted 13 January, 2018; originally announced January 2018.

  26. arXiv:1712.08550  [pdf, other

    cs.IR

    DancingLines: An Analytical Scheme to Depict Cross-Platform Event Popularity

    Authors: Tianxiang Gao, Weiming Bao, Jinning Li, Xiaofeng Gao, Boyuan Kong, Yan Tang, Guihai Chen, Xuan Li

    Abstract: Nowadays, events usually burst and are propagated online through multiple modern media like social networks and search engines. There exists various research discussing the event dissemination trends on individual medium, while few studies focus on event popularity analysis from a cross-platform perspective. Challenges come from the vast diversity of events and media, limited access to aligned dat… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

  27. arXiv:1710.01820  [pdf, other

    cs.CV

    Energy-Based Spherical Sparse Coding

    Authors: Bailey Kong, Charless C. Fowlkes

    Abstract: In this paper, we explore an efficient variant of convolutional sparse coding with unit norm code vectors where reconstruction quality is evaluated using an inner product (cosine distance). To use these codes for discriminative classification, we describe a model we term Energy-Based Spherical Sparse Coding (EB-SSC) in which the hypothesized class label introduces a learned linear bias into the co… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.