Skip to main content

Showing 1–50 of 66 results for author: Ming, Z

  1. arXiv:2406.00335  [pdf, other

    cs.LG

    Benchmarking for Deep Uplift Modeling in Online Marketing

    Authors: Dugang Liu, Xing Tang, Yang Qiao, Miao Liu, Zexu Sun, Xiuqiang He, Zhong Ming

    Abstract: Online marketing is critical for many industrial platforms and business applications, aiming to increase user engagement and platform revenue by identifying corresponding delivery-sensitive groups for specific incentives, such as coupons and bonuses. As the scale and complexity of features in industrial scenarios increase, deep uplift modeling (DUM) as a promising technique has attracted increased… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  2. arXiv:2406.00333  [pdf, other

    cs.IR

    A Practice-Friendly Two-Stage LLM-Enhanced Paradigm in Sequential Recommendation

    Authors: Dugang Liu, Shenxian Xian, Xiaolin Lin, Xiaolian Zhang, Hong Zhu, Yuan Fang, Zhen Chen, Zhong Ming

    Abstract: The training paradigm integrating large language models (LLM) is gradually reshaping sequential recommender systems (SRS) and has shown promising results. However, most existing LLM-enhanced methods rely on rich textual information on the item side and instance-level supervised fine-tuning (SFT) to inject collaborative information into LLM, which is inefficient and limited in many applications. To… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  3. arXiv:2404.10225  [pdf

    cs.SE cs.AI

    Rethinking Software Engineering in the Foundation Model Era: From Task-Driven AI Copilots to Goal-Driven AI Pair Programmers

    Authors: Ahmed E. Hassan, Gustavo A. Oliva, Dayi Lin, Boyuan Chen, Zhen Ming, Jiang

    Abstract: The advent of Foundation Models (FMs) and AI-powered copilots has transformed the landscape of software development, offering unprecedented code completion capabilities and enhancing developer productivity. However, the current task-driven nature of these copilots falls short in addressing the broader goals and complexities inherent in software engineering (SE). In this paper, we propose a paradig… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  4. arXiv:2403.01644  [pdf, other

    cs.CV cs.RO

    OccFusion: Multi-Sensor Fusion Framework for 3D Semantic Occupancy Prediction

    Authors: Zhenxing Ming, Julie Stephany Berrio, Mao Shan, Stewart Worrall

    Abstract: A comprehensive understanding of 3D scenes is crucial in autonomous vehicles (AVs), and recent models for 3D semantic occupancy prediction have successfully addressed the challenge of describing real-world objects with varied shapes and classes. However, existing methods for 3D occupancy prediction heavily rely on surround-view camera images, making them susceptible to changes in lighting and weat… ▽ More

    Submitted 9 May, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

  5. arXiv:2402.12733  [pdf, other

    cs.IR cs.AI

    BMLP: Behavior-aware MLP for Heterogeneous Sequential Recommendation

    Authors: Weixin Li, Yuhao Wu, Yang Liu, Weike Pan, Zhong Ming

    Abstract: In real recommendation scenarios, users often have different types of behaviors, such as clicking and buying. Existing research methods show that it is possible to capture the heterogeneous interests of users through different types of behaviors. However, most multi-behavior approaches have limitations in learning the relationship between different behaviors. In this paper, we propose a novel mult… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  6. arXiv:2401.15369  [pdf, other

    cs.IR

    Privacy-Preserving Cross-Domain Sequential Recommendation

    Authors: Zhaohao Lin, Weike Pan, Zhong Ming

    Abstract: Cross-domain sequential recommendation is an important development direction of recommender systems. It combines the characteristics of sequential recommender systems and cross-domain recommender systems, which can capture the dynamic preferences of users and alleviate the problem of cold-start users. However, in recent years, people pay more and more attention to their privacy. They do not want o… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

  7. arXiv:2401.12422  [pdf, other

    cs.CV cs.RO

    InverseMatrixVT3D: An Efficient Projection Matrix-Based Approach for 3D Occupancy Prediction

    Authors: Zhenxing Ming, Julie Stephany Berrio, Mao Shan, Stewart Worrall

    Abstract: This paper introduces InverseMatrixVT3D, an efficient method for transforming multi-view image features into 3D feature volumes for 3D semantic occupancy prediction. Existing methods for constructing 3D volumes often rely on depth estimation, device-specific operators, or transformer queries, which hinders the widespread adoption of 3D occupancy models. In contrast, our approach leverages two proj… ▽ More

    Submitted 29 April, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

  8. Keeping Deep Learning Models in Check: A History-Based Approach to Mitigate Overfitting

    Authors: Hao Li, Gopi Krishnan Rajbahadur, Dayi Lin, Cor-Paul Bezemer, Zhen Ming, Jiang

    Abstract: In software engineering, deep learning models are increasingly deployed for critical tasks such as bug detection and code review. However, overfitting remains a challenge that affects the quality, reliability, and trustworthiness of software systems that utilize deep learning models. Overfitting can be (1) prevented (e.g., using dropout or early stopping) or (2) detected in a trained model (e.g.,… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  9. arXiv:2401.09895  [pdf

    cs.CV

    Skeleton-Guided Instance Separation for Fine-Grained Segmentation in Microscopy

    Authors: Jun Wang, Chengfeng Zhou, Zhaoyan Ming, Lina Wei, Xudong Jiang, Dahong Qian

    Abstract: One of the fundamental challenges in microscopy (MS) image analysis is instance segmentation (IS), particularly when segmenting cluster regions where multiple objects of varying sizes and shapes may be connected or even overlapped in arbitrary orientations. Existing IS methods usually fail in handling such scenarios, as they rely on coarse instance representations such as keypoints and horizontal… ▽ More

    Submitted 19 January, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  10. arXiv:2401.04971  [pdf, other

    cs.IR

    A Survey on Cross-Domain Sequential Recommendation

    Authors: Shu Chen, Zitao Xu, Weike Pan, Qiang Yang, Zhong Ming

    Abstract: Cross-domain sequential recommendation (CDSR) shifts the modeling of user preferences from flat to stereoscopic by integrating and learning interaction information from multiple domains at different granularities (ranging from inter-sequence to intra-sequence and from single-domain to cross-domain). In this survey, we first define the CDSR problem using a four-dimensional tensor and then analyze i… ▽ More

    Submitted 17 May, 2024; v1 submitted 10 January, 2024; originally announced January 2024.

    Comments: Accepted to the IJCAI 2024 Survey Track

  11. arXiv:2312.12604  [pdf

    cs.SE cs.LG

    An empirical study of testing machine learning in the wild

    Authors: Moses Openja, Foutse Khomh, Armstrong Foundjem, Zhen Ming, Jiang, Mouna Abidi, Ahmed E. Hassan

    Abstract: Recently, machine and deep learning (ML/DL) algorithms have been increasingly adopted in many software systems. Due to their inductive nature, ensuring the quality of these systems remains a significant challenge for the research community. Unlike traditional software built deductively by writing explicit rules, ML/DL systems infer rules from training data. Recent research in ML/DL quality assuran… ▽ More

    Submitted 13 July, 2024; v1 submitted 19 December, 2023; originally announced December 2023.

    Comments: Accepted paper at TOSEM journal

  12. arXiv:2311.03213  [pdf, other

    cs.SE

    On the Model Update Strategies for Supervised Learning in AIOps Solutions

    Authors: Yingzhe Lyu, Heng Li, Zhen Ming, Jiang, Ahmed E. Hassan

    Abstract: AIOps (Artificial Intelligence for IT Operations) solutions leverage the massive data produced during the operation of large-scale systems and machine learning models to assist software engineers in their system operations. As operation data produced in the field are constantly evolving due to factors such as the changing operational environment and user base, the models in AIOps solutions need to… ▽ More

    Submitted 11 April, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

  13. arXiv:2310.13876  [pdf, other

    cs.CV

    Multimodal Transformer Using Cross-Channel attention for Object Detection in Remote Sensing Images

    Authors: Bissmella Bahaduri, Zuheng Ming, Fangchen Feng, Anissa Mokraou

    Abstract: Object detection in Remote Sensing Images (RSI) is a critical task for numerous applications in Earth Observation (EO). Differing from object detection in natural images, object detection in remote sensing images faces challenges of scarcity of annotated data and the presence of small objects represented by only a few pixels. Multi-modal fusion has been determined to enhance the accuracy by fusing… ▽ More

    Submitted 17 June, 2024; v1 submitted 20 October, 2023; originally announced October 2023.

    Comments: Accepted by ICIP2024

  14. arXiv:2309.05756  [pdf, other

    cs.CV

    TransferDoc: A Self-Supervised Transferable Document Representation Learning Model Unifying Vision and Language

    Authors: Souhail Bakkali, Sanket Biswas, Zuheng Ming, Mickael Coustaty, Marçal Rusiñol, Oriol Ramos Terrades, Josep Lladós

    Abstract: The field of visual document understanding has witnessed a rapid growth in emerging challenges and powerful multi-modal strategies. However, they rely on an extensive amount of document data to learn their pretext objectives in a ``pre-train-then-fine-tune'' paradigm and thus, suffer a significant performance drop in real-world online industrial settings. One major reason is the over-reliance on O… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: Preprint to Pattern Recognition

  15. arXiv:2308.15701  [pdf, other

    cs.IR

    A Survey on Multi-Behavior Sequential Recommendation

    Authors: Xiaoqing Chen, Zhitao Li, Weike Pan, Zhong Ming

    Abstract: Recommender systems is set up to address the issue of information overload in traditional information retrieval systems, which is focused on recommending information that is of most interest to users from massive information. Generally, there is a sequential nature and heterogeneity to the behavior of a person interacting with a system, leading to the proposal of multi-behavior sequential recommen… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

  16. arXiv:2308.01197  [pdf, other

    cs.IR cs.CR cs.LG

    GNN4FR: A Lossless GNN-based Federated Recommendation Framework

    Authors: Guowei Wu, Weike Pan, Zhong Ming

    Abstract: Graph neural networks (GNNs) have gained wide popularity in recommender systems due to their capability to capture higher-order structure information among the nodes of users and items. However, these methods need to collect personal interaction data between a user and the corresponding items and then model them in a central server, which would break the privacy laws such as GDPR. So far, no exist… ▽ More

    Submitted 25 July, 2023; originally announced August 2023.

  17. arXiv:2307.14512  [pdf, other

    cs.SE cs.LG

    Bug Characterization in Machine Learning-based Systems

    Authors: Mohammad Mehdi Morovati, Amin Nikanjam, Florian Tambon, Foutse Khomh, Zhen Ming, Jiang

    Abstract: Rapid growth of applying Machine Learning (ML) in different domains, especially in safety-critical areas, increases the need for reliable ML components, i.e., a software component operating based on ML. Understanding the bugs characteristics and maintenance challenges in ML-based systems can help developers of these systems to identify where to focus maintenance and testing efforts, by giving insi… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  18. arXiv:2307.11298  [pdf, ps, other

    cs.SE

    A First Look at Fairness of Machine Learning Based Code Reviewer Recommendation

    Authors: Mohammad Mahdi Mohajer, Alvine Boaye Belle, Nima Shiri harzevili, Junjie Wang, Hadi Hemmati, Song Wang, Zhen Ming, Jiang

    Abstract: The fairness of machine learning (ML) approaches is critical to the reliability of modern artificial intelligence systems. Despite extensive study on this topic, the fairness of ML models in the software engineering (SE) domain has not been well explored yet. As a result, many ML-powered software systems, particularly those utilized in the software engineering community, continue to be prone to fa… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  19. arXiv:2307.07196  [pdf, other

    cs.CV cs.RO

    LightFormer: An End-to-End Model for Intersection Right-of-Way Recognition Using Traffic Light Signals and an Attention Mechanism

    Authors: Zhenxing Ming, Julie Stephany Berrio, Mao Shan, Eduardo Nebot, Stewart Worrall

    Abstract: For smart vehicles driving through signalised intersections, it is crucial to determine whether the vehicle has right of way given the state of the traffic lights. To address this issue, camera based sensors can be used to determine whether the vehicle has permission to proceed straight, turn left or turn right. This paper proposes a novel end to end intersection right of way recognition model cal… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  20. arXiv:2306.11673  [pdf, other

    cs.SE

    A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning

    Authors: Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang, Song Wang, Zhen Ming, Jiang, Nachiappan Nagappan

    Abstract: Software vulnerability detection is critical in software security because it identifies potential bugs in software systems, enabling immediate remediation and mitigation measures to be implemented before they may be exploited. Automatic vulnerability identification is important because it can evaluate large codebases more efficiently than manual code auditing. Many Machine Learning (ML) and Deep L… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

  21. arXiv:2305.06923  [pdf, other

    cs.CV

    EAML: Ensemble Self-Attention-based Mutual Learning Network for Document Image Classification

    Authors: Souhail Bakkali, Ziheng Ming, Mickael Coustaty, Marçal Rusiñol

    Abstract: In the recent past, complex deep neural networks have received huge interest in various document understanding tasks such as document image classification and document retrieval. As many document types have a distinct visual style, learning only visual features with deep CNNs to classify document images have encountered the problem of low inter-class discrimination, and high intra-class structural… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: Accepted at IJDAR 2021

  22. arXiv:2303.13101  [pdf, other

    cs.CV

    MMFormer: Multimodal Transformer Using Multiscale Self-Attention for Remote Sensing Image Classification

    Authors: Bo Zhang, Zuheng Ming, Wei Feng, Yaqian Liu, Liang He, Kaixing Zhao

    Abstract: To benefit the complementary information between heterogeneous data, we introduce a new Multimodal Transformer (MMFormer) for Remote Sensing (RS) image classification using Hyperspectral Image (HSI) accompanied by another source of data such as Light Detection and Ranging (LiDAR). Compared with traditional Vision Transformer (ViT) lacking inductive biases of convolutions, we first introduce convol… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  23. arXiv:2303.11574  [pdf, ps, other

    cs.IR

    Bounding System-Induced Biases in Recommender Systems with A Randomized Dataset

    Authors: Dugang Liu, Pengxiang Cheng, Zinan Lin, Xiaolian Zhang, Zhenhua Dong, Rui Zhang, Xiuqiang He, Weike Pan, Zhong Ming

    Abstract: Debiased recommendation with a randomized dataset has shown very promising results in mitigating the system-induced biases. However, it still lacks more theoretical insights or an ideal optimization objective function compared with the other more well studied route without a randomized dataset. To bridge this gap, we study the debiasing problem from a new perspective and propose to directly minimi… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: Accepted by ACM TOIS

  24. arXiv:2302.03419  [pdf, other

    cs.IR

    Self-Sampling Training and Evaluation for the Accuracy-Bias Tradeoff in Recommendation

    Authors: Dugang Liu, Yang Qiao, Xing Tang, Liang Chen, Xiuqiang He, Weike Pan, Zhong Ming

    Abstract: Research on debiased recommendation has shown promising results. However, some issues still need to be handled for its application in industrial recommendation. For example, most of the existing methods require some specific data, architectures and training methods. In this paper, we first argue through an online study that arbitrarily removing all the biases in industrial recommendation may not c… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: Accepted by DASFAA 2023 Industry Track

  25. arXiv:2212.08854  [pdf

    cs.NE

    An Evolutionary Multitasking Algorithm with Multiple Filtering for High-Dimensional Feature Selection

    Authors: Lingjie Li, Manlin Xuan, Qiuzhen Lin, Min Jiang, Zhong Ming, Kay Chen Tan

    Abstract: Recently, evolutionary multitasking (EMT) has been successfully used in the field of high-dimensional classification. However, the generation of multiple tasks in the existing EMT-based feature selection (FS) methods is relatively simple, using only the Relief-F method to collect related features with similar importance into one task, which cannot provide more diversified tasks for knowledge trans… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

  26. arXiv:2210.12808  [pdf, other

    cs.NI

    Flow-Level Packet Loss Detection via Sketch Decomposition and Matrix Optimization

    Authors: Zhenyu Ming, Wei Zhang, Yanwei Xu

    Abstract: For cloud service providers, fine-grained packet loss detection across data centers is crucial in improving their service level and increasing business income. However, the inability to obtain sufficient measurements makes it difficult owing to the fundamental limit that the wide-area network links responsible for communication are not under their management. Moreover, millisecond-level delay jitt… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

  27. arXiv:2207.02773  [pdf, other

    cs.LG

    DIWIFT: Discovering Instance-wise Influential Features for Tabular Data

    Authors: Dugang Liu, Pengxiang Cheng, Hong Zhu, Xing Tang, Yanyu Chen, Xiaoting Wang, Weike Pan, Zhong Ming, Xiuqiang He

    Abstract: Tabular data is one of the most common data storage formats behind many real-world web applications such as retail, banking, and e-commerce. The success of these web applications largely depends on the ability of the employed machine learning model to accurately distinguish influential features from all the predetermined features in tabular data. Intuitively, in practical business scenarios, diffe… ▽ More

    Submitted 10 February, 2023; v1 submitted 6 July, 2022; originally announced July 2022.

    Comments: Accepted by TheWebConf 2023 Research Tracks

  28. arXiv:2207.00759  [pdf, other

    cs.SE cs.LG

    Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks

    Authors: Jiaxiang Liu, Yunhan Xing, Xiaomu Shi, Fu Song, Zhiwu Xu, Zhong Ming

    Abstract: As a new programming paradigm, deep neural networks (DNNs) have been increasingly deployed in practice, but the lack of robustness hinders their applications in safety-critical domains. While there are techniques for verifying DNNs with formal guarantees, they are limited in scalability and accuracy. In this paper, we present a novel abstraction-refinement approach for scalable and exact DNN verif… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.

  29. arXiv:2206.15331  [pdf, other

    cs.SE cs.LG

    GitHub Copilot AI pair programmer: Asset or Liability?

    Authors: Arghavan Moradi Dakhel, Vahid Majdinasab, Amin Nikanjam, Foutse Khomh, Michel C. Desmarais, Zhen Ming, Jiang

    Abstract: Automatic program synthesis is a long-lasting dream in software engineering. Recently, a promising Deep Learning (DL) based solution, called Copilot, has been proposed by OpenAI and Microsoft as an industrial product. Although some studies evaluate the correctness of Copilot solutions and report its issues, more empirical evaluations are necessary to understand how developers can benefit from it e… ▽ More

    Submitted 14 April, 2023; v1 submitted 30 June, 2022; originally announced June 2022.

    Comments: 27 pages, 8 figures

  30. arXiv:2206.14322  [pdf, other

    cs.LG

    An Empirical Study of Challenges in Converting Deep Learning Models

    Authors: Moses Openja, Amin Nikanjam, Ahmed Haj Yahmed, Foutse Khomh, Zhen Ming, Jiang

    Abstract: There is an increase in deploying Deep Learning (DL)-based software systems in real-world applications. Usually DL models are developed and trained using DL frameworks that have their own internal mechanisms/formats to represent and train DL models, and usually those formats cannot be recognized by other frameworks. Moreover, trained models are usually deployed in environments different from where… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: Accepted for publication in ICSME 2022

  31. arXiv:2206.12311  [pdf, other

    cs.SE cs.LG

    Bugs in Machine Learning-based Systems: A Faultload Benchmark

    Authors: Mohammad Mehdi Morovati, Amin Nikanjam, Foutse Khomh, Zhen Ming, Jiang

    Abstract: The rapid escalation of applying Machine Learning (ML) in various domains has led to paying more attention to the quality of ML components. There is then a growth of techniques and tools aiming at improving the quality of ML components and integrating them into the ML-based system safely. Although most of these tools use bugs' lifecycle, there is no standard benchmark of bugs to assess their perfo… ▽ More

    Submitted 16 January, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

  32. arXiv:2206.10989  [pdf, other

    cs.CV cs.CR

    Identity Documents Authentication based on Forgery Detection of Guilloche Pattern

    Authors: Musab Al-Ghadi, Zuheng Ming, Petra Gomez-Krämer, Jean-Christophe Burie

    Abstract: In cases such as digital enrolment via mobile and online services, identity document verification is critical in order to efficiently detect forgery and therefore build user trust in the digital world. In this paper, an authentication model for identity documents based on forgery detection of guilloche patterns is proposed. The proposed approach is made up of two steps: feature extraction and simi… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

  33. arXiv:2205.12029  [pdf, other

    cs.CV

    VLCDoC: Vision-Language Contrastive Pre-Training Model for Cross-Modal Document Classification

    Authors: Souhail Bakkali, Zuheng Ming, Mickael Coustaty, Marçal Rusiñol, Oriol Ramos Terrades

    Abstract: Multimodal learning from document data has achieved great success lately as it allows to pre-train semantically meaningful features as a prior into a learnable downstream task. In this paper, we approach the document classification problem by learning cross-modal representations through language and vision cues, considering intra- and inter-modality relationships. Instead of merging features from… ▽ More

    Submitted 11 May, 2023; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: Accepted at PR

  34. PAS: A Position-Aware Similarity Measurement for Sequential Recommendation

    Authors: Zijie Zeng, Jing Lin, Weike Pan, Zhong Ming, Zhongqi Lu

    Abstract: The common item-based collaborative filtering framework becomes a typical recommendation method when equipped with a certain item-to-item similarity measurement. On one hand, we realize that a well-designed similarity measurement is the key to providing satisfactory recommendation services. On the other hand, similarity measurements designed for sequential recommendation are rarely studied by the… ▽ More

    Submitted 19 May, 2022; v1 submitted 14 May, 2022; originally announced May 2022.

    Comments: International Joint Conference on Neural Networks (IJCNN 2022, Padua, Italy), 8 pages, Camera-Ready Version

  35. arXiv:2203.11365  [pdf, other

    cs.SE cs.AI

    Towards a Change Taxonomy for Machine Learning Systems

    Authors: Aaditya Bhatia, Ellis E. Eghan, Manel Grichi, William G. Cavanagh, Zhen Ming, Jiang, Bram Adams

    Abstract: Machine Learning (ML) research publications commonly provide open-source implementations on GitHub, allowing their audience to replicate, validate, or even extend machine learning algorithms, data sets, and metadata. However, thus far little is known about the degree of collaboration activity happening on such ML research repositories, in particular regarding (1) the degree to which such reposit… ▽ More

    Submitted 12 December, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

  36. MIDAS: Multi-sensorial Immersive Dynamic Autonomous System Improves Motivation of Stroke Affected Patients for Hand Rehabilitation

    Authors: Fok-Chi-Seng Fok Kow, Anoop Kumar Sinha, Zhang Jin Ming, Bao Songyu, Jake Tan Jun Kang, Hong Yan Jack Jeffrey, Galina Mihaleva, Nadia Magnenat Thalmann, Yiyu Cai

    Abstract: Majority of stroke survivors are left with poorly functioning paretic hands. Current rehabilitation devices have failed to motivate the patients enough to continue rehabilitation exercises. The objective of this project, MIDAS (Multi-sensorial Immersive Dynamic Autonomous System) is a proof of concept by using an immersive system to improve motivation of stroke patients for hand rehabilitation. MI… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

  37. arXiv:2203.03068  [pdf, other

    cs.AI cs.MA

    Diversifying Agent's Behaviors in Interactive Decision Models

    Authors: Yinghui Pan, Hanyi Zhang, Yifeng Zeng, Biyang Ma, Jing Tang, Zhong Ming

    Abstract: Modelling other agents' behaviors plays an important role in decision models for interactions among multiple agents. To optimise its own decisions, a subject agent needs to model what other agents act simultaneously in an uncertain environment. However, modelling insufficiency occurs when the agents are competitive and the subject agent can not get full knowledge about other agents. Even when the… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: 19 pages, 15 figures

  38. arXiv:2203.01562  [pdf, other

    cs.CV

    ViTransPAD: Video Transformer using convolution and self-attention for Face Presentation Attack Detection

    Authors: Zuheng Ming, Zitong Yu, Musab Al-Ghadi, Muriel Visani, Muhammad MuzzamilLuqman, Jean-Christophe Burie

    Abstract: Face Presentation Attack Detection (PAD) is an important measure to prevent spoof attacks for face biometric systems. Many works based on Convolution Neural Networks (CNNs) for face PAD formulate the problem as an image-level binary classification task without considering the context. Alternatively, Vision Transformers (ViT) using self-attention to attend the context of an image become the mainstr… ▽ More

    Submitted 14 March, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

  39. Towards Build Verifiability for Java-based Systems

    Authors: Jiawen Xiong, Yong Shi, Boyuan Chen, Filipe R. Cogo, Zhen Ming, Jiang

    Abstract: Build verifiability refers to the property that the build of a software system can be verified by independent third parties and it is crucial for the trustworthiness of a software system. Various efforts towards build verifiability have been made to C/C++-based systems, yet the techniques for Java-based systems are not systematic and are often specific to a particular build tool (e.g., Maven). In… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

  40. arXiv:2202.02326  [pdf, other

    cs.LG cs.AI cs.SE

    Towards Training Reproducible Deep Learning Models

    Authors: Boyuan Chen, Mingzhi Wen, Yong Shi, Dayi Lin, Gopi Krishnan Rajbahadur, Zhen Ming, Jiang

    Abstract: Reproducibility is an increasing concern in Artificial Intelligence (AI), particularly in the area of Deep Learning (DL). Being able to reproduce DL models is crucial for AI-based systems, as it is closely tied to various tasks like training, testing, debugging, and auditing. However, DL models are challenging to be reproduced due to issues like randomness in the software (e.g., DL algorithms) and… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

  41. arXiv:2202.02298  [pdf, other

    cs.LG cs.SE

    Towards a consistent interpretation of AIOps models

    Authors: Yingzhe Lyu, Gopi Krishnan Rajbahadur, Dayi Lin, Boyuan Chen, Zhen Ming, Jiang

    Abstract: Artificial Intelligence for IT Operations (AIOps) has been adopted in organizations in various tasks, including interpreting models to identify indicators of service failures. To avoid misleading practitioners, AIOps model interpretations should be consistent (i.e., different AIOps models on the same task agree with one another on feature importance). However, many AIOps studies violate establishe… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Journal ref: ACM Transactions on Software Engineering and Methodology, 31, 2021, 1-38

  42. arXiv:2112.13064   

    cs.CR cs.AI cs.CV

    CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

    Authors: Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming

    Abstract: The success of deep neural networks (DNNs) in real-world applications has benefited from abundant pre-trained models. However, the backdoored pre-trained models can pose a significant trojan threat to the deployment of downstream DNNs. Existing DNN testing methods are mainly designed to find incorrect corner case behaviors in adversarial settings but fail to discover the backdoors crafted by stron… ▽ More

    Submitted 21 February, 2023; v1 submitted 24 December, 2021; originally announced December 2021.

    Comments: There are some problems in the experiment so we need to withdraw this paper. We will upload the new version after revision

  43. arXiv:2112.00281  [pdf, other

    cs.CV

    FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer

    Authors: Liyuan Ma, Kejie Huang, Dongxu Wei, Zhaoyan Ming, Haibin Shen

    Abstract: Human pose transfer aims at transferring the appearance of the source person to the target pose. Existing methods utilizing flow-based warping for non-rigid human image generation have achieved great success. However, they fail to preserve the appearance details in synthesized images since the spatial correlation between the source and target is not fully exploited. To this end, we propose the Flo… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  44. arXiv:2111.02374  [pdf, other

    cs.LG cs.AI cs.SE

    Can I use this publicly available dataset to build commercial AI software? -- A Case Study on Publicly Available Image Datasets

    Authors: Gopi Krishnan Rajbahadur, Erika Tuck, Li Zi, Dayi Lin, Boyuan Chen, Zhen Ming, Jiang, Daniel M. German

    Abstract: Publicly available datasets are one of the key drivers for commercial AI software. The use of publicly available datasets is governed by dataset licenses. These dataset licenses outline the rights one is entitled to on a given dataset and the obligations that one must fulfil to enjoy such rights without any license compliance violations. Unlike standardized Open Source Software (OSS) licenses, exi… ▽ More

    Submitted 11 April, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: This is revised version of the paper with updated co-authors

  45. arXiv:2110.14484  [pdf

    eess.IV cs.CV cs.LG

    PL-Net: Progressive Learning Network for Medical Image Segmentation

    Authors: Junlong Cheng, Chengrui Gao, Hongchun Lu, Zhangqiang Ming, Yong Yang, Min Zhu

    Abstract: In recent years, segmentation methods based on deep convolutional neural networks (CNNs) have made state-of-the-art achievements for many medical analysis tasks. However, most of these approaches improve performance by optimizing the structure or adding new functional modules of the U-Net, which ignoring the complementation and fusion of the coarse-grained and fine-grained semantic information. To… ▽ More

    Submitted 29 August, 2022; v1 submitted 27 October, 2021; originally announced October 2021.

  46. arXiv:2110.04764  [pdf, other

    cs.CV

    Deep learning-based person re-identification methods: A survey and outlook of recent works

    Authors: Zhangqiang Ming, Min Zhu, Xiangkun Wang, Jiamin Zhu, Junlong Cheng, Chengrui Gao, Yong Yang, Xiaoyong Wei

    Abstract: In recent years, with the increasing demand for public safety and the rapid development of intelligent surveillance networks, person re-identification (Re-ID) has become one of the hot research topics in the computer vision field. The main research goal of person Re-ID is to retrieve persons with the same identity from different cameras. However, traditional person Re-ID methods require manual mar… ▽ More

    Submitted 13 January, 2022; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: 23 pages, 7 figures

  47. arXiv:2109.05759  [pdf, other

    cs.CV

    Global-Local Dynamic Feature Alignment Network for Person Re-Identification

    Authors: Zhangqiang Ming, Yong Yang, Xiaoyong Wei, Jianrong Yan, Xiangkun Wang, Fengjie Wang, Min Zhu

    Abstract: The misalignment of human images caused by bounding box detection errors or partial occlusions is one of the main challenges in person Re-Identification (Re-ID) tasks. Previous local-based methods mainly focus on learning local features in predefined semantic regions of pedestrians. These methods usually use local hard alignment methods or introduce auxiliary information such as key human pose poi… ▽ More

    Submitted 3 February, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: 28 pages, 8 figures

  48. arXiv:2108.13382  [pdf, other

    cs.CV

    Exploring Multi-Tasking Learning in Document Attribute Classification

    Authors: Tanmoy Mondal, Abhijit Das, Zuheng Ming

    Abstract: In this work, we adhere to explore a Multi-Tasking learning (MTL) based network to perform document attribute classification such as the font type, font size, font emphasis and scanning resolution classification of a document image. To accomplish these tasks, we operate on either segmented word level or on uniformed size patches randomly cropped out of the document. Furthermore, a hybrid convoluti… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 12 pages, 6 figures, 10 tables

  49. MIDV-2020: A Comprehensive Benchmark Dataset for Identity Document Analysis

    Authors: Konstantin Bulatov, Ekaterina Emelianova, Daniil Tropin, Natalya Skoryukina, Yulia Chernyshova, Alexander Sheshkus, Sergey Usilin, Zuheng Ming, Jean-Christophe Burie, Muhammad Muzzamil Luqman, Vladimir V. Arlazarov

    Abstract: Identity documents recognition is an important sub-field of document analysis, which deals with tasks of robust document detection, type identification, text fields recognition, as well as identity fraud prevention and document authenticity validation given photos, scans, or video frames of an identity document capture. Significant amount of research has been published on this topic in recent year… ▽ More

    Submitted 1 July, 2021; originally announced July 2021.

    MSC Class: 68T10

    Journal ref: Computer Optics, volume 46, issue 2, p. 252-270, 2022

  50. arXiv:2105.06807  [pdf, other

    cs.CV cs.AI cs.CR

    Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

    Authors: Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui

    Abstract: Recent years have witnessed unprecedented success achieved by deep learning models in the field of computer vision. However, their vulnerability towards carefully crafted adversarial examples has also attracted the increasing attention of researchers. Motivated by the observation that adversarial examples are due to the non-robust feature learned from the original dataset by models, we propose the… ▽ More

    Submitted 14 May, 2021; originally announced May 2021.