Skip to main content

Showing 1–27 of 27 results for author: Nie, C

  1. arXiv:2406.10367  [pdf, other

    cs.LG

    Disentangled Hyperbolic Representation Learning for Heterogeneous Graphs

    Authors: Qijie Bai, Changli Nie, Haiwei Zhang, Zhicheng Dou, Xiaojie Yuan

    Abstract: Heterogeneous graphs have attracted a lot of research interests recently due to the success for representing complex real-world systems. However, existing methods have two pain points in embedding them into low-dimensional spaces: the mixing of structural and semantic information, and the distributional mismatch between data and embedding spaces. These two challenges require representation methods… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  2. arXiv:2406.03470  [pdf, other

    cs.NE cs.AI

    SpikeZIP-TF: Conversion is All You Need for Transformer-based SNN

    Authors: Kang You, Zekai Xu, Chen Nie, Zhijie Deng, Qinghai Guo, Xiang Wang, Zhezhi He

    Abstract: Spiking neural network (SNN) has attracted great attention due to its characteristic of high efficiency and accuracy. Currently, the ANN-to-SNN conversion methods can obtain ANN on-par accuracy SNN with ultra-low latency (8 time-steps) in CNN structure on computer vision (CV) tasks. However, as Transformer-based networks have achieved prevailing precision on both CV and natural language processing… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: * These authors contributed equally to this work

  3. arXiv:2405.06856  [pdf, other

    cs.DC

    Aladdin: Joint Placement and Scaling for SLO-Aware LLM Serving

    Authors: Chengyi Nie, Rodrigo Fonseca, Zhenhua Liu

    Abstract: The demand for large language model (LLM) inference is gradually dominating the artificial intelligence workloads. Therefore, there is an urgent need for cost-efficient inference serving. Existing work focuses on single-worker optimization and lacks consideration of cluster-level management for both inference queries and computing resources. However, placing requests and managing resources without… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  4. arXiv:2404.17875  [pdf, other

    cs.LG

    Noisy Node Classification by Bi-level Optimization based Multi-teacher Distillation

    Authors: Yujing Liu, Zongqian Wu, Zhengyu Lu, Ci Nie, Guoqiu Wen, Ping Hu, Xiaofeng Zhu

    Abstract: Previous graph neural networks (GNNs) usually assume that the graph data is with clean labels for representation learning, but it is not true in real applications. In this paper, we propose a new multi-teacher distillation method based on bi-level optimization (namely BO-NNC), to conduct noisy node classification on the graph data. Specifically, we first employ multiple self-supervised learning me… ▽ More

    Submitted 8 May, 2024; v1 submitted 27 April, 2024; originally announced April 2024.

  5. arXiv:2404.12602  [pdf

    cs.CV cs.LG

    A visualization method for data domain changes in CNN networks and the optimization method for selecting thresholds in classification tasks

    Authors: Minzhe Huang, Changwei Nie, Weihong Zhong

    Abstract: In recent years, Face Anti-Spoofing (FAS) has played a crucial role in preserving the security of face recognition technology. With the rise of counterfeit face generation techniques, the challenge posed by digitally edited faces to face anti-spoofing is escalating. Existing FAS technologies primarily focus on intercepting physically forged faces and lack a robust solution for cross-domain FAS cha… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  6. arXiv:2403.15032  [pdf

    cs.CV

    An Integrated Neighborhood and Scale Information Network for Open-Pit Mine Change Detection in High-Resolution Remote Sensing Images

    Authors: Zilin Xie, Kangning Li, Jinbao Jiang, Jinzhong Yang, Xiaojun Qiao, Deshuai Yuan, Cheng Nie

    Abstract: Open-pit mine change detection (CD) in high-resolution (HR) remote sensing images plays a crucial role in mineral development and environmental protection. Significant progress has been made in this field in recent years, largely due to the advancement of deep learning techniques. However, existing deep-learning-based CD methods encounter challenges in effectively integrating neighborhood and scal… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  7. arXiv:2402.05302  [pdf, other

    cs.DC

    Training DNN Models over Heterogeneous Clusters with Optimal Performance

    Authors: Chengyi Nie, Jessica Maghakian, Zhenhua Liu

    Abstract: Adjusting batch sizes and adaptively tuning other hyperparameters can significantly speed up deep neural network (DNN) training. Despite the ubiquity of heterogeneous clusters, existing adaptive DNN training techniques solely consider homogeneous environments. Optimizing distributed DNN training over heterogeneous clusters is technically challenging, and directly adapting existing techniques resul… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  8. arXiv:2312.10983  [pdf, other

    cs.CV

    MatchDet: A Collaborative Framework for Image Matching and Object Detection

    Authors: Jinxiang Lai, Wenlong Wu, Bin-Bin Gao, Jun Liu, Jiawei Zhan, Congchong Nie, Yi Zeng, Chengjie Wang

    Abstract: Image matching and object detection are two fundamental and challenging tasks, while many related applications consider them two individual tasks (i.e. task-individual). In this paper, a collaborative framework called MatchDet (i.e. task-collaborative) is proposed for image matching and object detection to obtain mutual improvements. To achieve the collaborative learning of the two tasks, we propo… ▽ More

    Submitted 4 January, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

    Journal ref: AAAI 2024

  9. arXiv:2311.17339  [pdf, other

    cs.CV cs.CR

    RADAP: A Robust and Adaptive Defense Against Diverse Adversarial Patches on Face Recognition

    Authors: Xiaoliang Liu, Furao Shen, Jian Zhao, Changhai Nie

    Abstract: Face recognition (FR) systems powered by deep learning have become widely used in various applications. However, they are vulnerable to adversarial attacks, especially those based on local adversarial patches that can be physically applied to real-world objects. In this paper, we propose RADAP, a robust and adaptive defense mechanism against diverse adversarial patches in both closed-set and open-… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  10. arXiv:2311.17332  [pdf, other

    cs.CV cs.CR

    NeRFTAP: Enhancing Transferability of Adversarial Patches on Face Recognition using Neural Radiance Fields

    Authors: Xiaoliang Liu, Furao Shen, Feng Han, Jian Zhao, Changhai Nie

    Abstract: Face recognition (FR) technology plays a crucial role in various applications, but its vulnerability to adversarial attacks poses significant security concerns. Existing research primarily focuses on transferability to different FR models, overlooking the direct transferability to victim's face images, which is a practical threat in real-world scenarios. In this study, we propose a novel adversari… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

  11. arXiv:2308.05318  [pdf, other

    cs.CV

    RLSAC: Reinforcement Learning enhanced Sample Consensus for End-to-End Robust Estimation

    Authors: Chang Nie, Guangming Wang, Zhe Liu, Luca Cavalli, Marc Pollefeys, Hesheng Wang

    Abstract: Robust estimation is a crucial and still challenging task, which involves estimating model parameters in noisy environments. Although conventional sampling consensus-based algorithms sample several times to achieve robustness, these algorithms cannot use data features and historical information effectively. In this paper, we propose RLSAC, a novel Reinforcement Learning enhanced SAmple Consensus f… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

    Comments: Accepted by ICCV2023. Codes are released at https://github.com/IRMVLab/RLSAC

  12. HGWaveNet: A Hyperbolic Graph Neural Network for Temporal Link Prediction

    Authors: Qijie Bai, Changli Nie, Haiwei Zhang, Dongming Zhao, Xiaojie Yuan

    Abstract: Temporal link prediction, aiming to predict future edges between paired nodes in a dynamic graph, is of vital importance in diverse applications. However, existing methods are mainly built upon uniform Euclidean space, which has been found to be conflict with the power-law distributions of real-world graphs and unable to represent the hierarchical connections between nodes effectively. With respec… ▽ More

    Submitted 3 May, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: Accepted by Web Conference (WWW) 2023

    Journal ref: WWW '23: Proceedings of the ACM Web Conference 2023 (523-532)

  13. $\text{H}^2\text{TNE}$: Temporal Heterogeneous Information Network Embedding in Hyperbolic Spaces

    Authors: Qijie Bai, Jiawen Guo, Haiwei Zhang, Changli Nie, Lin Zhang, Xiaojie Yuan

    Abstract: Temporal heterogeneous information network (temporal HIN) embedding, aiming to represent various types of nodes of different timestamps into low dimensional spaces while preserving structural and semantic information, is of vital importance in diverse real-life tasks. Researchers have made great efforts on temporal HIN embedding in Euclidean spaces and got some considerable achievements. However,… ▽ More

    Submitted 14 June, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

    Journal ref: The Semantic Web-ISWC 2022: 21st International Semantic Web Conference, Virtual Event, October 23-27, 2022, Proceedings (pp. 179-195)

  14. arXiv:2303.10321  [pdf, other

    cs.CV

    ABC: Attention with Bilinear Correlation for Infrared Small Target Detection

    Authors: Peiwen Pan, Huan Wang, Chenyi Wang, Chang Nie

    Abstract: Infrared small target detection (ISTD) has a wide range of applications in early warning, rescue, and guidance. However, CNN based deep learning methods are not effective at segmenting infrared small target (IRST) that it lack of clear contour and texture features, and transformer based methods also struggle to achieve significant results due to the absence of convolution induction bias. To addres… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

  15. arXiv:2208.10180  [pdf, other

    cs.CV

    TaCo: Textual Attribute Recognition via Contrastive Learning

    Authors: Chang Nie, Yiqing Hu, Yanqiu Qu, Hao Liu, Deqiang Jiang, Bo Ren

    Abstract: As textual attributes like font are core design elements of document format and page style, automatic attributes recognition favor comprehensive practical applications. Existing approaches already yield satisfactory performance in differentiating disparate attributes, but they still suffer in distinguishing similar attributes with only subtle difference. Moreover, their performance drop severely i… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  16. arXiv:2207.10290  [pdf, other

    cs.CV

    AugRmixAT: A Data Processing and Training Method for Improving Multiple Robustness and Generalization Performance

    Authors: Xiaoliang Liu, Furao Shen, Jian Zhao, Changhai Nie

    Abstract: Deep neural networks are powerful, but they also have shortcomings such as their sensitivity to adversarial examples, noise, blur, occlusion, etc. Moreover, ensuring the reliability and robustness of deep neural network models is crucial for their application in safety-critical areas. Much previous work has been proposed to improve specific robustness. However, we find that the specific robustness… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Comments: Accepted by ICME2022

  17. arXiv:2206.12590  [pdf, other

    cs.CV

    RSTAM: An Effective Black-Box Impersonation Attack on Face Recognition using a Mobile and Compact Printer

    Authors: Xiaoliang Liu, Furao Shen, Jian Zhao, Changhai Nie

    Abstract: Face recognition has achieved considerable progress in recent years thanks to the development of deep neural networks, but it has recently been discovered that deep neural networks are vulnerable to adversarial examples. This means that face recognition models or systems based on deep neural networks are also susceptible to adversarial examples. However, the existing methods of attacking face reco… ▽ More

    Submitted 25 June, 2022; originally announced June 2022.

  18. arXiv:2205.15198  [pdf, other

    cs.CV cs.AI

    STN: Scalable Tensorizing Networks via Structure-Aware Training and Adaptive Compression

    Authors: Chang Nie, Huan Wang, Lu Zhao

    Abstract: Deep neural networks (DNNs) have delivered a remarkable performance in many tasks of computer vision. However, over-parameterized representations of popular architectures dramatically increase their computational complexity and storage costs, and hinder their availability in edge devices with constrained resources. Regardless of many tensor decomposition (TD) methods that have been well-studied fo… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  19. arXiv:2205.08728  [pdf, other

    cs.CV

    RandoMix: A mixed sample data augmentation method with multiple mixed modes

    Authors: Xiaoliang Liu, Furao Shen, Jian Zhao, Changhai Nie

    Abstract: Data augmentation plays a crucial role in enhancing the robustness and performance of machine learning models across various domains. In this study, we introduce a novel mixed-sample data augmentation method called RandoMix. RandoMix is specifically designed to simultaneously address robustness and diversity challenges. It leverages a combination of linear and mask-mixed modes, introducing flexibi… ▽ More

    Submitted 30 November, 2023; v1 submitted 18 May, 2022; originally announced May 2022.

  20. arXiv:2111.02668  [pdf, other

    cs.CV

    LVIS Challenge Track Technical Report 1st Place Solution: Distribution Balanced and Boundary Refinement for Large Vocabulary Instance Segmentation

    Authors: WeiFu Fu, CongChong Nie, Ting Sun, Jun Liu, TianLiang Zhang, Yong Liu

    Abstract: This report introduces the technical details of the team FuXi-Fresher for LVIS Challenge 2021. Our method focuses on the problem in following two aspects: the long-tail distribution and the segmentation quality of mask and boundary. Based on the advanced HTC instance segmentation algorithm, we connect transformer backbone(Swin-L) through composite connections inspired by CBNetv2 to enhance the bas… ▽ More

    Submitted 4 November, 2021; v1 submitted 4 November, 2021; originally announced November 2021.

  21. arXiv:2109.04022  [pdf, other

    cs.CV

    Multi-Tensor Network Representation for High-Order Tensor Completion

    Authors: Chang Nie, Huan Wang, Zhihui Lai

    Abstract: This work studies the problem of high-dimensional data (referred to as tensors) completion from partially observed samplings. We consider that a tensor is a superposition of multiple low-rank components. In particular, each component can be represented as multilinear connections over several latent factors and naturally mapped to a specific tensor network (TN) topology. In this paper, we propose a… ▽ More

    Submitted 21 September, 2021; v1 submitted 8 September, 2021; originally announced September 2021.

  22. arXiv:2101.07327  [pdf, other

    cs.NI cs.HC cs.OS

    OpenUVR: an Open-Source System Framework for Untethered Virtual Reality Applications

    Authors: Alec Rohloff, Zackary Allen, Kung-Min Lin, Joshua Okrend, Chengyi Nie, Yu-Chia Liu, Hung-Wei Tseng

    Abstract: Advancements in heterogeneous computing technologies enable the significant potential of virtual reality (VR) applications. To offer the best user experience (UX), a system should adopt an untethered, wireless-network-based architecture to transfer VR content between the user and the content generator. However, modern wireless network technologies make implementing such an architecture challenging… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

  23. arXiv:2010.04962  [pdf, other

    cs.CV

    HCNet: Hierarchical Context Network for Semantic Segmentation

    Authors: Yanwen Chong, Congchong Nie, Yulong Tao, Xiaoshu Chen, Shaoming Pan

    Abstract: Global context information is vital in visual understanding problems, especially in pixel-level semantic segmentation. The mainstream methods adopt the self-attention mechanism to model global context information. However, pixels belonging to different classes usually have weak feature correlation. Modeling the global pixel-level correlation matrix indiscriminately is extremely redundant in the se… ▽ More

    Submitted 19 October, 2020; v1 submitted 10 October, 2020; originally announced October 2020.

  24. arXiv:1908.02480  [pdf, other

    cs.SE

    A Survey of Constrained Combinatorial Testing

    Authors: Huayao Wu, Changhai Nie, Justyna Petke, Yue Jia, Mark Harman

    Abstract: Combinatorial Testing (CT) is a potentially powerful testing technique, whereas its failure revealing ability might be dramatically reduced if it fails to handle constraints in an adequate and efficient manner. To ensure the wider applicability of CT in the presence of constrained problem domains, large and diverse efforts have been invested towards the techniques and applications of constrained c… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

  25. arXiv:1905.01078  [pdf, other

    cs.LG cs.CR stat.ML

    CharBot: A Simple and Effective Method for Evading DGA Classifiers

    Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock

    Abstract: Domain generation algorithms (DGAs) are commonly leveraged by malware to create lists of domain names which can be used for command and control (C&C) purposes. Approaches based on machine learning have recently been developed to automatically detect generated domain names in real-time. In this work, we present a novel DGA called CharBot which is capable of producing large numbers of unregistered d… ▽ More

    Submitted 30 May, 2019; v1 submitted 3 May, 2019; originally announced May 2019.

  26. arXiv:1206.6938  [pdf, ps, other

    cs.IT

    MIMO Physical Layer Network Coding Based on VBLAST Detection

    Authors: Shengli Zhang, Canping Nie, Liya Lu, Gongbin Qian

    Abstract: For MIMO two-way relay channel, this paper proposes a novel scheme, VBLAST-PNC, to transform the two superimposed packets received by the relay to their network coding form. Different from traditional schemes, which tries to detect each packet before network coding them, VBLAST-PNC detects the summation of the two packets before network coding. In particular, after firstly detecting the second lay… ▽ More

    Submitted 29 June, 2012; originally announced June 2012.

  27. STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs

    Authors: Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, Shivendra Panwar, Francesco Verde, Anna Scaglione

    Abstract: Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay based cooperation schemes, utilizing multiple relays further improves the reliability and rate of transmissions. Distributed space-time coding (DSTC), as one of the schemes to utilize multiple relays, requires tight coordinati… ▽ More

    Submitted 21 September, 2011; v1 submitted 19 May, 2011; originally announced May 2011.

    Comments: This paper is a revised version of a paper with the same name submitted to IEEE Transaction on Wireless Communications. STiCMAC protocol with RTS/CTS turned off is presented in the appendix of this draft