Skip to main content

Showing 1–50 of 50 results for author: Lu, N

  1. arXiv:2407.11025  [pdf, other

    cs.LG cs.AI cs.CR

    Backdoor Graph Condensation

    Authors: Jiahao Wu, Ning Lu, Zeiyu Dai, Wenqi Fan, Shengcai Liu, Qing Li, Ke Tang

    Abstract: Recently, graph condensation has emerged as a prevalent technique to improve the training efficiency for graph neural networks (GNNs). It condenses a large graph into a small one such that a GNN trained on this small synthetic graph can achieve comparable performance to a GNN trained on a large graph. However, while existing graph condensation studies mainly focus on the best trade-off between gra… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2407.05246  [pdf, other

    cs.LG cs.CV

    Deep Online Probability Aggregation Clustering

    Authors: Yuxuan Yan, Na Lu, Ruofan Yan

    Abstract: Combining machine clustering with deep models has shown remarkable superiority in deep clustering. It modifies the data processing pipeline into two alternating phases: feature clustering and model training. However, such alternating schedule may lead to instability and computational burden issues. We propose a centerless clustering algorithm called Probability Aggregation Clustering (PAC) to proa… ▽ More

    Submitted 13 July, 2024; v1 submitted 6 July, 2024; originally announced July 2024.

    Comments: 19 pages,2 figures, conference

  3. arXiv:2406.06744  [pdf

    cs.LG cs.CR eess.SY

    A Multi-module Robust Method for Transient Stability Assessment against False Label Injection Cyberattacks

    Authors: Hanxuan Wang, Na Lu, Yinhong Liu, Zhuqing Wang, Zixuan Wang

    Abstract: The success of deep learning in transient stability assessment (TSA) heavily relies on high-quality training data. However, the label information in TSA datasets is vulnerable to contamination through false label injection (FLI) cyberattacks, resulting in degraded performance of deep TSA models. To address this challenge, a Multi-Module Robust TSA method (MMR) is proposed to rectify the supervised… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  4. arXiv:2406.02479  [pdf

    cs.LG eess.SP eess.SY

    Applying Fine-Tuned LLMs for Reducing Data Needs in Load Profile Analysis

    Authors: Yi Hu, Hyeonjin Kim, Kai Ye, Ning Lu

    Abstract: This paper presents a novel method for utilizing fine-tuned Large Language Models (LLMs) to minimize data requirements in load profile analysis, demonstrated through the restoration of missing data in power system load profiles. A two-stage fine-tuning strategy is proposed to adapt a pre-trained LLMs, i.e., GPT-3.5, for missing data restoration tasks. Through empirical evaluation, we demonstrate t… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  5. arXiv:2404.02555  [pdf

    eess.SY cs.LG

    An Interpretable Power System Transient Stability Assessment Method with Expert Guiding Neural-Regression-Tree

    Authors: Hanxuan Wang, Na Lu, Zixuan Wang, Jiacheng Liu, Jun Liu

    Abstract: Deep learning based transient stability assessment (TSA) has achieved great success, yet the lack of interpretability hinders its industrial application. Although a great number of studies have tried to explore the interpretability of network solutions, many problems still remain unsolved: (1) the difference between the widely accepted power system knowledge and the generated interpretive rules is… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  6. arXiv:2403.17270  [pdf, other

    cs.RO cs.HC

    Human Stress Response and Perceived Safety during Encounters with Quadruped Robots

    Authors: Ryan Gupta, Hyonyoung Shin, Emily Norman, Keri K. Stephens, Nanshu Lu, Luis Sentis

    Abstract: Despite the rise of mobile robot deployments in home and work settings, perceived safety of users and bystanders is understudied in the human-robot interaction (HRI) literature. To address this, we present a study designed to identify elements of a human-robot encounter that correlate with observed stress response. Stress is a key component of perceived safety and is strongly associated with human… ▽ More

    Submitted 6 June, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

    Comments: 8 pages, 7 figs, 5 tables

  7. arXiv:2311.16519  [pdf, other

    cs.LG math.NA

    B-LSTM-MIONet: Bayesian LSTM-based Neural Operators for Learning the Response of Complex Dynamical Systems to Length-Variant Multiple Input Functions

    Authors: Zhihao Kong, Amirhossein Mollaali, Christian Moya, Na Lu, Guang Lin

    Abstract: Deep Operator Network (DeepONet) is a neural network framework for learning nonlinear operators such as those from ordinary differential equations (ODEs) describing complex systems. Multiple-input deep neural operators (MIONet) extended DeepONet to allow multiple input functions in different Banach spaces. MIONet offers flexibility in training dataset grid spacing, without constraints on output lo… ▽ More

    Submitted 29 November, 2023; v1 submitted 27 November, 2023; originally announced November 2023.

  8. arXiv:2310.17742  [pdf

    eess.AS cs.LG eess.SP

    BERT-PIN: A BERT-based Framework for Recovering Missing Data Segments in Time-series Load Profiles

    Authors: Yi Hu, Kai Ye, Hyeonjin Kim, Ning Lu

    Abstract: Inspired by the success of the Transformer model in natural language processing and computer vision, this paper introduces BERT-PIN, a Bidirectional Encoder Representations from Transformers (BERT) powered Profile Inpainting Network. BERT-PIN recovers multiple missing data segments (MDSs) using load and temperature time-series profiles as inputs. To adopt a standard Transformer model structure for… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

  9. arXiv:2310.16302  [pdf, other

    cs.LG eess.SY

    Imperfect Digital Twin Assisted Low Cost Reinforcement Training for Multi-UAV Networks

    Authors: Xiucheng Wang, Nan Cheng, Longfei Ma, Zhisheng Yin, Tom. Luan, Ning Lu

    Abstract: Deep Reinforcement Learning (DRL) is widely used to optimize the performance of multi-UAV networks. However, the training of DRL relies on the frequent interactions between the UAVs and the environment, which consumes lots of energy due to the flying and communication of UAVs in practical experiments. Inspired by the growing digital twin (DT) technology, which can simulate the performance of algor… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  10. arXiv:2310.03748  [pdf

    eess.SP cs.HC cs.LG

    Phase Synchrony Component Self-Organization in Brain Computer Interface

    Authors: Xu Niu, Na Lu, Huan Luo, Ruofan Yan

    Abstract: Phase synchrony information plays a crucial role in analyzing functional brain connectivity and identifying brain activities. A widely adopted feature extraction pipeline, composed of preprocessing, selection of EEG acquisition channels, and phase locking value (PLV) calculation, has achieved success in motor imagery classification (MI). However, this pipeline is manual and reliant on expert knowl… ▽ More

    Submitted 11 October, 2023; v1 submitted 21 September, 2023; originally announced October 2023.

  11. PBFormer: Capturing Complex Scene Text Shape with Polynomial Band Transformer

    Authors: Ruijin Liu, Ning Lu, Dapeng Chen, Cheng Li, Zejian Yuan, Wei Peng

    Abstract: We present PBFormer, an efficient yet powerful scene text detector that unifies the transformer with a novel text shape representation Polynomial Band (PB). The representation has four polynomial curves to fit a text's top, bottom, left, and right sides, which can capture a text with a complex shape by varying polynomial coefficients. PB has appealing features compared with conventional representa… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 9 pages, 8 figures, accepted by ACM MM 2023

    ACM Class: I.4.9

  12. arXiv:2308.08806  [pdf, other

    cs.CV

    Self-distillation Regularized Connectionist Temporal Classification Loss for Text Recognition: A Simple Yet Effective Approach

    Authors: Ziyin Zhang, Ning Lu, Minghui Liao, Yongshuai Huang, Cheng Li, Min Wang, Wei Peng

    Abstract: Text recognition methods are gaining rapid development. Some advanced techniques, e.g., powerful modules, language models, and un- and semi-supervised learning schemes, consecutively push the performance on public benchmarks forward. However, the problem of how to better optimize a text recognition model from the perspective of loss functions is largely overlooked. CTC-based methods, widely used i… ▽ More

    Submitted 29 December, 2023; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: Ziyin Zhang and Ning Lu are co-first authors. Accepted by AAAI2024. Repo: https://github.com/zzyhlyoko/DCTC

  13. arXiv:2307.08643  [pdf, other

    cs.LG stat.ML

    Corruptions of Supervised Learning Problems: Typology and Mitigations

    Authors: Laura Iacovissi, Nan Lu, Robert C. Williamson

    Abstract: Corruption is notoriously widespread in data collection. Despite extensive research, the existing literature on corruption predominantly focuses on specific settings and learning scenarios, lacking a unified view. There is still a limited understanding of how to effectively model and mitigate corruption in machine learning problems. In this work, we develop a general theory of corruption from an i… ▽ More

    Submitted 2 May, 2024; v1 submitted 17 July, 2023; originally announced July 2023.

    Comments: 56 pages

  14. arXiv:2306.10368  [pdf, other

    cs.DS

    Algorithms for Multiple Drone-Delivery Scheduling Problem (MDSP)

    Authors: Sagnik Anupam, Nicole Lu, John Sragow

    Abstract: The Multiple Drone-Delivery Scheduling Problem (MDSP) is a scheduling problem that optimizes the maximum reward earned by a set of $m$ drones executing a sequence of deliveries on a truck delivery route. The current best-known approximation algorithm for the problem is a $\frac{1}{4}$-approximation algorithm developed by Jana and Mandal (2022). In this paper, we propose exact and approximation alg… ▽ More

    Submitted 17 June, 2023; originally announced June 2023.

  15. arXiv:2305.14690  [pdf, other

    cs.LG

    Generalizing Importance Weighting to A Universal Solver for Distribution Shift Problems

    Authors: Tongtong Fang, Nan Lu, Gang Niu, Masashi Sugiyama

    Abstract: Distribution shift (DS) may have two levels: the distribution itself changes, and the support (i.e., the set where the probability density is non-zero) also changes. When considering the support change between the training and test distributions, there can be four cases: (i) they exactly match; (ii) the training support is wider (and thus covers the test support); (iii) the test support is wider;… ▽ More

    Submitted 1 November, 2023; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023 camera-ready version (this paper was selected for spotlight presentation)

  16. arXiv:2305.10847  [pdf, other

    cs.CL cs.AI

    Large Language Models can be Guided to Evade AI-Generated Text Detection

    Authors: Ning Lu, Shengcai Liu, Rui He, Qi Wang, Yew-Soon Ong, Ke Tang

    Abstract: Large language models (LLMs) have shown remarkable performance in various tasks and have been extensively utilized by the public. However, the increasing concerns regarding the misuse of LLMs, such as plagiarism and spamming, have led to the development of multiple detectors, including fine-tuned classifiers and statistical methods. In this study, we equip LLMs with prompts, rather than relying on… ▽ More

    Submitted 15 May, 2024; v1 submitted 18 May, 2023; originally announced May 2023.

    Comments: TMLR camera ready

  17. arXiv:2304.11966  [pdf, other

    cs.CV

    ICDAR 2023 Competition on Reading the Seal Title

    Authors: Wenwen Yu, Mingyu Liu, Mingrui Chen, Ning Lu, Yinlong Wen, Yuliang Liu, Dimosthenis Karatzas, Xiang Bai

    Abstract: Reading seal title text is a challenging task due to the variable shapes of seals, curved text, background noise, and overlapped text. However, this important element is commonly found in official and financial scenarios, and has not received the attention it deserves in the field of OCR technology. To promote research in this area, we organized ICDAR 2023 competition on reading the seal title (Re… ▽ More

    Submitted 5 June, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

    Comments: ICDAR2023 Competition on ReST report (To be appear in ICDAR 2023)

  18. arXiv:2303.06949  [pdf, other

    cs.CV

    Improving Table Structure Recognition with Visual-Alignment Sequential Coordinate Modeling

    Authors: Yongshuai Huang, Ning Lu, Dapeng Chen, Yibo Li, Zecheng Xie, Shenggao Zhu, Liangcai Gao, Wei Peng

    Abstract: Table structure recognition aims to extract the logical and physical structure of unstructured table images into a machine-readable format. The latest end-to-end image-to-text approaches simultaneously predict the two structures by two decoders, where the prediction of the physical structure (the bounding boxes of the cells) is based on the representation of the logical structure. However, the pre… ▽ More

    Submitted 19 March, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: CVPR2023

  19. arXiv:2303.06155  [pdf, other

    cs.LG cs.AI cs.DC eess.SY

    Digital Twin-Assisted Knowledge Distillation Framework for Heterogeneous Federated Learning

    Authors: Xiucheng Wang, Nan Cheng, Longfei Ma, Ruijin Sun, Rong Chai, Ning Lu

    Abstract: In this paper, to deal with the heterogeneity in federated learning (FL) systems, a knowledge distillation (KD) driven training framework for FL is proposed, where each user can select its neural network model on demand and distill knowledge from a big teacher model using its own private dataset. To overcome the challenge of train the big teacher model in resource limited user devices, the digital… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  20. arXiv:2302.02568  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Less is More: Understanding Word-level Textual Adversarial Attack via n-gram Frequency Descend

    Authors: Ning Lu, Shengcai Liu, Zhirui Zhang, Qi Wang, Haifeng Liu, Ke Tang

    Abstract: Word-level textual adversarial attacks have demonstrated notable efficacy in misleading Natural Language Processing (NLP) models. Despite their success, the underlying reasons for their effectiveness and the fundamental characteristics of adversarial examples (AEs) remain obscure. This work aims to interpret word-level attacks by examining their $n$-gram frequency patterns. Our comprehensive exper… ▽ More

    Submitted 15 April, 2024; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: To be published in: 2024 IEEE Conference on Artificial Intelligence (CAI 2024)

  21. arXiv:2211.09712  [pdf, other

    cs.NI cs.AI cs.LG eess.SP

    SigT: An Efficient End-to-End MIMO-OFDM Receiver Framework Based on Transformer

    Authors: Ziyou Ren, Nan Cheng, Ruijin Sun, Xiucheng Wang, Ning Lu, Wenchao Xu

    Abstract: Multiple-input multiple-output and orthogonal frequency-division multiplexing (MIMO-OFDM) are the key technologies in 4G and subsequent wireless communication systems. Conventionally, the MIMO-OFDM receiver is performed by multiple cascaded blocks with different functions and the algorithm in each block is designed based on ideal assumptions of wireless channel distributions. However, these assump… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

  22. arXiv:2208.01785  [pdf, other

    eess.SY cs.LG

    On-Demand Resource Management for 6G Wireless Networks Using Knowledge-Assisted Dynamic Neural Networks

    Authors: Longfei Ma, Nan Cheng, Xiucheng Wang, Ruijin Sun, Ning Lu

    Abstract: On-demand service provisioning is a critical yet challenging issue in 6G wireless communication networks, since emerging services have significantly diverse requirements and the network resources become increasingly heterogeneous and dynamic. In this paper, we study the on-demand wireless resource orchestration problem with the focus on the computing delay in orchestration decision-making process.… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Report number: unic-01

  23. arXiv:2207.01555  [pdf, other

    cs.LG

    Multi-class Classification from Multiple Unlabeled Datasets with Partial Risk Regularization

    Authors: Yuting Tang, Nan Lu, Tianyi Zhang, Masashi Sugiyama

    Abstract: Recent years have witnessed a great success of supervised deep learning, where predictive models were trained from a large amount of fully labeled data. However, in practice, labeling such big data can be very costly and may not even be possible for privacy reasons. Therefore, in this paper, we aim to learn an accurate classifier without any class labels. More specifically, we consider the case wh… ▽ More

    Submitted 15 October, 2022; v1 submitted 4 July, 2022; originally announced July 2022.

    Comments: ACML 2022 camera-ready version

  24. arXiv:2204.03304  [pdf, other

    cs.LG

    Federated Learning from Only Unlabeled Data with Class-Conditional-Sharing Clients

    Authors: Nan Lu, Zhao Wang, Xiaoxiao Li, Gang Niu, Qi Dou, Masashi Sugiyama

    Abstract: Supervised federated learning (FL) enables multiple clients to share the trained model without sharing their labeled data. However, potential clients might even be reluctant to label their own data, which could limit the applicability of FL in practice. In this paper, we show the possibility of unsupervised FL whose model is still a classifier for predicting class labels, if the class-prior probab… ▽ More

    Submitted 11 May, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: ICLR 2022 camera-ready version

  25. arXiv:2202.10505  [pdf, other

    cs.CV cs.AI

    Self-Evolutionary Clustering

    Authors: Hanxuan Wang, Na Lu, Qinyang Liu

    Abstract: Deep clustering outperforms conventional clustering by mutually promoting representation learning and cluster assignment. However, most existing deep clustering methods suffer from two major drawbacks. First, most cluster assignment methods are based on simple distance comparison and highly dependent on the target distribution generated by a handcrafted nonlinear mapping. These facts largely limit… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  26. arXiv:2112.14834  [pdf, other

    cs.NE cs.AI cs.LG

    Training Quantized Deep Neural Networks via Cooperative Coevolution

    Authors: Fu Peng, Shengcai Liu, Ning Lu, Ke Tang

    Abstract: This work considers a challenging Deep Neural Network(DNN) quantization task that seeks to train quantized DNNs without involving any full-precision operations. Most previous quantization approaches are not applicable to this task since they rely on full-precision gradients to update network weights. To fill this gap, in this work we advocate using Evolutionary Algorithms (EAs) to search for the o… ▽ More

    Submitted 23 May, 2022; v1 submitted 23 December, 2021; originally announced December 2021.

    Comments: 13 pages, 4 figures, accepted for publication of ICSI

  27. arXiv:2112.10157  [pdf, other

    cs.LG stat.ML

    Rethinking Importance Weighting for Transfer Learning

    Authors: Nan Lu, Tianyi Zhang, Tongtong Fang, Takeshi Teshima, Masashi Sugiyama

    Abstract: A key assumption in supervised learning is that training and test data follow the same probability distribution. However, this fundamental assumption is not always satisfied in practice, e.g., due to changing environments, sample selection bias, privacy concerns, or high labeling costs. Transfer learning (TL) relaxes this assumption and allows us to learn under distribution shift. Classical TL met… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

  28. arXiv:2111.01528  [pdf, other

    cs.CL cs.NE

    Effective and Imperceptible Adversarial Textual Attack via Multi-objectivization

    Authors: Shengcai Liu, Ning Lu, Wenjing Hong, Chao Qian, Ke Tang

    Abstract: The field of adversarial textual attack has significantly grown over the last few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. However, the imperceptibility of attacks, which is also essential for practical attackers, is often left out by previous studies. In consequence, the crafted AEs tend to have obvious stru… ▽ More

    Submitted 14 December, 2023; v1 submitted 2 November, 2021; originally announced November 2021.

  29. arXiv:2109.02229  [pdf, other

    cs.CL cs.NE

    Efficient Combinatorial Optimization for Word-level Adversarial Textual Attack

    Authors: Shengcai Liu, Ning Lu, Cheng Chen, Ke Tang

    Abstract: Over the past few years, various word-level textual attack approaches have been proposed to reveal the vulnerability of deep neural networks used in natural language processing. Typically, these approaches involve an important optimization step to determine which substitute to be used for each word in the original input. However, current research on this step is still rather limited, from the pers… ▽ More

    Submitted 22 November, 2021; v1 submitted 5 September, 2021; originally announced September 2021.

  30. arXiv:2102.00678  [pdf, other

    cs.LG stat.ML

    Binary Classification from Multiple Unlabeled Datasets via Surrogate Set Classification

    Authors: Nan Lu, Shida Lei, Gang Niu, Issei Sato, Masashi Sugiyama

    Abstract: To cope with high annotation costs, training a classifier only from weakly supervised data has attracted a great deal of attention these days. Among various approaches, strengthening supervision from completely unsupervised classification is a promising direction, which typically employs class priors as the only supervision and trains a binary classifier from unlabeled (U) datasets. While existing… ▽ More

    Submitted 11 June, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

    Comments: ICML2021 camera-ready version

  31. arXiv:2011.08027  [pdf, other

    cs.RO cs.AI

    ACDER: Augmented Curiosity-Driven Experience Replay

    Authors: Boyao Li, Tao Lu, Jiayi Li, Ning Lu, Yinghao Cai, Shuo Wang

    Abstract: Exploration in environments with sparse feedback remains a challenging research problem in reinforcement learning (RL). When the RL agent explores the environment randomly, it results in low exploration efficiency, especially in robotic manipulation tasks with high dimensional continuous state and action space. In this paper, we propose a novel method, called Augmented Curiosity-Driven Experience… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Journal ref: 2020 IEEE International Conference on Robotics and Automation (ICRA2020)

  32. arXiv:2010.01875  [pdf, other

    cs.LG stat.ML

    Pointwise Binary Classification with Pairwise Confidence Comparisons

    Authors: Lei Feng, Senlin Shu, Nan Lu, Bo Han, Miao Xu, Gang Niu, Bo An, Masashi Sugiyama

    Abstract: To alleviate the data requirement for training effective binary classifiers in binary classification, many weakly supervised learning settings have been proposed. Among them, some consider using pairwise but not pointwise labels, when pointwise labels are not accessible due to privacy, confidentiality, or security reasons. However, as a pairwise label denotes whether or not two data points share a… ▽ More

    Submitted 13 January, 2022; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: Accepted to ICML 2021

  33. arXiv:2009.12001  [pdf

    eess.SY cs.LG eess.SP

    A Meta-learning based Distribution System Load Forecasting Model Selection Framework

    Authors: Yiyan Li, Si Zhang, Rongxing Hu, Ning Lu

    Abstract: This paper presents a meta-learning based, automatic distribution system load forecasting model selection framework. The framework includes the following processes: feature extraction, candidate model labeling, offline training, and online model recommendation. Using user load forecasting needs as input features, multiple meta-learners are used to rank the available load forecast models based on t… ▽ More

    Submitted 15 April, 2021; v1 submitted 24 September, 2020; originally announced September 2020.

    Comments: accepted by Applied Energy

  34. arXiv:2009.01766  [pdf, other

    cs.CV cs.AI

    Synthetic-to-Real Unsupervised Domain Adaptation for Scene Text Detection in the Wild

    Authors: Weijia Wu, Ning Lu, Enze Xie

    Abstract: Deep learning-based scene text detection can achieve preferable performance, powered with sufficient labeled training data. However, manual labeling is time consuming and laborious. At the extreme, the corresponding annotated data are unavailable. Exploiting synthetic data is a very promising solution except for domain distribution mismatches between synthetic datasets and real datasets. To addres… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

  35. arXiv:2007.04043  [pdf, ps, other

    cs.LG stat.ML

    A One-step Approach to Covariate Shift Adaptation

    Authors: Tianyi Zhang, Ikko Yamane, Nan Lu, Masashi Sugiyama

    Abstract: A default assumption in many machine learning scenarios is that the training and test samples are drawn from the same probability distribution. However, such an assumption is often violated in the real world due to non-stationarity of the environment or bias in sample selection. In this work, we consider a prevalent setting called covariate shift, where the input distribution differs between the t… ▽ More

    Submitted 3 May, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

  36. arXiv:2006.04662  [pdf, other

    cs.LG stat.ML

    Rethinking Importance Weighting for Deep Learning under Distribution Shift

    Authors: Tongtong Fang, Nan Lu, Gang Niu, Masashi Sugiyama

    Abstract: Under distribution shift (DS) where the training data distribution differs from the test one, a powerful technique is importance weighting (IW) which handles DS in two separate steps: weight estimation (WE) estimates the test-over-training density ratio and weighted classification (WC) trains the classifier from weighted training data. However, IW cannot work well on complex data, since WE is inco… ▽ More

    Submitted 5 November, 2020; v1 submitted 8 June, 2020; originally announced June 2020.

    Comments: NeurIPS 2020 camera-ready version (this paper was selected for spotlight presentation)

  37. arXiv:2004.07464  [pdf, other

    cs.CV

    PICK: Processing Key Information Extraction from Documents using Improved Graph Learning-Convolutional Networks

    Authors: Wenwen Yu, Ning Lu, Xianbiao Qi, Ping Gong, Rong Xiao

    Abstract: Computer vision with state-of-the-art deep learning models has achieved huge success in the field of Optical Character Recognition (OCR) including text detection and recognition tasks recently. However, Key Information Extraction (KIE) from documents as the downstream task of OCR, having a large number of use scenarios in real-world, remains a challenge because documents not only have textual feat… ▽ More

    Submitted 18 July, 2020; v1 submitted 16 April, 2020; originally announced April 2020.

    Comments: Accepted by ICPR2020. Code at https://github.com/wenwenyu/PICK-pytorch

  38. FeederGAN: Synthetic Feeder Generation via Deep Graph Adversarial Nets

    Authors: Ming Liang, Yao Meng, Jiyu Wang, David Lubkeman, Ning Lu

    Abstract: This paper presents a novel, automated, generative adversarial networks (GAN) based synthetic feeder generation mechanism, abbreviated as FeederGAN. FeederGAN digests real feeder models represented by directed graphs via a deep learning framework powered by GAN and graph convolutional networks (GCN). Information of a distribution feeder circuit is extracted from its model input files so that the d… ▽ More

    Submitted 16 September, 2020; v1 submitted 3 April, 2020; originally announced April 2020.

    Comments: Accepted by IEEE Trans. on Smart Grid

  39. arXiv:1910.08974  [pdf, other

    cs.LG stat.ML

    Mitigating Overfitting in Supervised Classification from Two Unlabeled Datasets: A Consistent Risk Correction Approach

    Authors: Nan Lu, Tianyi Zhang, Gang Niu, Masashi Sugiyama

    Abstract: The recently proposed unlabeled-unlabeled (UU) classification method allows us to train a binary classifier only from two unlabeled datasets with different class priors. Since this method is based on the empirical risk minimization, it works as if it is a supervised classification method, compatible with any model and optimizer. However, this method sometimes suffers from severe overfitting, which… ▽ More

    Submitted 31 March, 2020; v1 submitted 20 October, 2019; originally announced October 2019.

  40. MASTER: Multi-Aspect Non-local Network for Scene Text Recognition

    Authors: Ning Lu, Wenwen Yu, Xianbiao Qi, Yihao Chen, Ping Gong, Rong Xiao, Xiang Bai

    Abstract: Attention-based scene text recognizers have gained huge success, which leverages a more compact intermediate representation to learn 1d- or 2d- attention by a RNN-based encoder-decoder architecture. However, such methods suffer from attention-drift problem because high similarity among encoded features leads to attention confusion under the RNN-based local attention mechanism. Moreover, RNN-based… ▽ More

    Submitted 11 April, 2021; v1 submitted 6 October, 2019; originally announced October 2019.

    Comments: Accepted by Pattern Recognition. Ning Lu and Wenwen Yu are co-first authors

  41. arXiv:1811.08564  [pdf, other

    cs.CV

    Feature Selection Convolutional Neural Networks for Visual Tracking

    Authors: Zhiyan Cui, Na Lu

    Abstract: Most of the existing tracking methods based on CNN(convolutional neural networks) are too slow for real-time application despite the excellent tracking precision compared with the traditional ones. Moreover, neural networks are memory intensive which will take up lots of hardware resources. In this paper, a feature selection visual tracking algorithm combining CNN based MDNet(Multi-Domain Network)… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1807.03132

  42. arXiv:1808.10585  [pdf, other

    stat.ML cs.LG

    On the Minimal Supervision for Training Any Binary Classifier from Only Unlabeled Data

    Authors: Nan Lu, Gang Niu, Aditya Krishna Menon, Masashi Sugiyama

    Abstract: Empirical risk minimization (ERM), with proper loss function and regularization, is the common practice of supervised classification. In this paper, we study training arbitrary (from linear to deep) binary classifier from only unlabeled (U) data by ERM. We prove that it is impossible to estimate the risk of an arbitrary binary classifier in an unbiased manner given a single set of U data, but it b… ▽ More

    Submitted 12 March, 2019; v1 submitted 30 August, 2018; originally announced August 2018.

  43. arXiv:1807.03132  [pdf, other

    cs.CV cs.LG

    Fast Dynamic Convolutional Neural Networks for Visual Tracking

    Authors: Zhiyan Cui, Na Lu

    Abstract: Most of the existing tracking methods based on CNN(convolutional neural networks) are too slow for real-time application despite the excellent tracking precision compared with the traditional ones. In this paper, a fast dynamic visual tracking algorithm combining CNN based MDNet(Multi-Domain Network) and RoIAlign was developed. The major problem of MDNet also lies in the time efficiency. Consideri… ▽ More

    Submitted 25 July, 2018; v1 submitted 29 June, 2018; originally announced July 2018.

  44. arXiv:1704.08125  [pdf, other

    cs.NI

    Connected Vehicular Transportation: Data Analytics and Traffic-dependent Networking

    Authors: Cailian Chen, Tom Hao Luan, Xinping Guan, Ning Lu, Yunshu Liu

    Abstract: With onboard operating systems becoming increasingly common in vehicles, the real-time broadband infotainment and Intelligent Transportation System (ITS) service applications in fast-motion vehicles become ever demanding, which are highly expected to significantly improve the efficiency and safety of our daily on-road lives. The emerging ITS and vehicular applications, e.g., trip planning, however… ▽ More

    Submitted 26 April, 2017; originally announced April 2017.

  45. arXiv:1703.07043  [pdf, other

    cs.NI cs.GT cs.IT

    Energy Efficient Power Control for the Two-tier Networks with Small Cells and Massive MIMO

    Authors: Ningning Lu, Yanxiang Jiang, Fuchun Zheng, Xiaohu You

    Abstract: In this paper, energy efficient power control for the uplink two-tier networks where a macrocell tier with a massive multiple-input multiple-output (MIMO) base station is overlaid with a small cell tier is investigated. We propose a distributed energy efficient power control algorithm which allows each user in the two-tier network taking individual decisions to optimize its own energy efficiency (… ▽ More

    Submitted 20 March, 2017; originally announced March 2017.

    Comments: 6 pages, 4 figures, IEEE Wireless Communications and Networking Conference Workshops (WCNCW'16)

    Journal ref: IEEE Wireless Communications and Networking Conference Workshops (WCNCW'16), April 2016

  46. Energy Efficient Non-Cooperative Power Control in Small Cell Networks

    Authors: Yanxiang Jiang, Ningning Lu, Yan Chen, Mehdi Bennis, Fuchun Zheng, Xiqi Gao, Xiaohu You

    Abstract: In this paper, energy efficient power control for small cells underlaying a macro cellular network is investigated. We formulate the power control problem in self-organizing small cell networks as a non-cooperative game, and propose a distributed energy efficient power control scheme, which allows the small base stations (SBSs) to take individual decisions for attaining the Nash equilibrium (NE) w… ▽ More

    Submitted 5 March, 2017; originally announced March 2017.

    Comments: 8 pages, 10 figures. This paper has been accepted by IEEE Transactions on Vehicular Technology

    Journal ref: IEEE Transactions on Vehicular Technology, 2017

  47. arXiv:1610.07515  [pdf, ps, other

    math.GR cs.CR

    Cryptosystems using subgroup distortion

    Authors: Indira Chatterji, Delaram Kahrobaei, Ni Yen Lu

    Abstract: In this paper we propose cryptosystems based on subgroup distortion in hyperbolic groups. We also include concrete examples of hyperbolic groups as possible platforms.

    Submitted 24 October, 2016; originally announced October 2016.

  48. arXiv:1510.06579  [pdf, ps, other

    cs.NI

    Soft-Defined Heterogeneous Vehicular Network: Architecture and Challenges

    Authors: Kan Zheng, Lu Hou, Hanlin Meng, Qiang Zheng, Ning Lu, Lei Lei

    Abstract: Heterogeneous Vehicular NETworks (HetVNETs) can meet various quality-of-service (QoS) requirements for intelligent transport system (ITS) services by integrating different access networks coherently. However, the current network architecture for HetVNET cannot efficiently deal with the increasing demands of rapidly changing network landscape. Thanks to the centralization and flexibility of the clo… ▽ More

    Submitted 22 October, 2015; originally announced October 2015.

  49. arXiv:1507.05532  [pdf

    cs.CV cs.LG

    Clustering Tree-structured Data on Manifold

    Authors: Na Lu, Hongyu Miao

    Abstract: Tree-structured data usually contain both topological and geometrical information, and are necessarily considered on manifold instead of Euclidean space for appropriate data parameterization and analysis. In this study, we propose a novel tree-structured data parameterization, called Topology-Attribute matrix (T-A matrix), so the data clustering task can be conducted on matrix manifold. We incorpo… ▽ More

    Submitted 9 September, 2015; v1 submitted 20 July, 2015; originally announced July 2015.

    Comments: 14 pages, 7 figures, 7 tables

    MSC Class: 68T10; 62H30

  50. arXiv:cs/0409035  [pdf

    cs.DC cs.CE cs.MA cs.PF

    Parallel Computing Environments and Methods for Power Distribution System Simulation

    Authors: Ning Lu, Z. Todd Taylor, David P. Chassin, Ross T. Guttromson, R. Scott Studham

    Abstract: The development of cost-effective highperformance parallel computing on multi-processor supercomputers makes it attractive to port excessively time consuming simulation software from personal computers (PC) to super computes. The power distribution system simulator (PDSS) takes a bottom-up approach and simulates load at the appliance level, where detailed thermal models for appliances are used.… ▽ More

    Submitted 18 September, 2004; originally announced September 2004.

    Comments: 7 pages, 4 figures, 6 tables, submitted to HICSS-38