Skip to main content

Showing 1–50 of 62 results for author: Qu, G

  1. arXiv:2407.01573  [pdf, other

    cs.RO cs.LG eess.SY math.OC

    Model-Based Diffusion for Trajectory Optimization

    Authors: Chaoyi Pan, Zeji Yi, Guanya Shi, Guannan Qu

    Abstract: Recent advances in diffusion models have demonstrated their strong capabilities in generating high-fidelity samples from complex distributions through an iterative refinement process. Despite the empirical success of diffusion models in motion planning and control, the model-free nature of these methods does not leverage readily available model information and limits their generalization to new sc… ▽ More

    Submitted 28 May, 2024; originally announced July 2024.

    Comments: Website: https://lecar-lab.github.io/mbd/

  2. arXiv:2406.06823  [pdf, other

    cs.LG cs.AI cs.MA math.OC

    Locally Interdependent Multi-Agent MDP: Theoretical Framework for Decentralized Agents with Dynamic Dependencies

    Authors: Alex DeWeese, Guannan Qu

    Abstract: Many multi-agent systems in practice are decentralized and have dynamically varying dependencies. There has been a lack of attempts in the literature to analyze these systems theoretically. In this paper, we propose and theoretically analyze a decentralized model with dynamically varying dependencies called the Locally Interdependent Multi-Agent MDP. This model can represent problems in many dispa… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted to International Conference on Machine Learning 2024

  3. arXiv:2406.00234  [pdf, other

    cs.LG eess.SY

    Learning to Stabilize Unknown LTI Systems on a Single Trajectory under Stochastic Noise

    Authors: Ziyi Zhang, Yorie Nakahira, Guannan Qu

    Abstract: We study the problem of learning to stabilize unknown noisy Linear Time-Invariant (LTI) systems on a single trajectory. It is well known in the literature that the learn-to-stabilize problem suffers from exponential blow-up in which the state norm blows up in the order of $Θ(2^n)$ where $n$ is the state space dimension. This blow-up is due to the open-loop instability when exploring the $n$-dimens… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  4. arXiv:2405.15322  [pdf, other

    cs.CR cs.AR

    Dishonest Approximate Computing: A Coming Crisis for Cloud Clients

    Authors: Ye Wang, Jian Dong, Ming Han, Jin Wu, Gang Qu

    Abstract: Approximate Computing (AC) has emerged as a promising technique for achieving energy-efficient architectures and is expected to become an effective technique for reducing the electricity cost for cloud service providers (CSP). However, the potential misuse of AC has not received adequate attention, which is a coming crisis behind the blueprint of AC. Driven by the pursuit of illegal financial prof… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 12 pages, 9 figures

  5. arXiv:2405.15307  [pdf, other

    cs.CL

    Before Generation, Align it! A Novel and Effective Strategy for Mitigating Hallucinations in Text-to-SQL Generation

    Authors: Ge Qu, Jinyang Li, Bowen Li, Bowen Qin, Nan Huo, Chenhao Ma, Reynold Cheng

    Abstract: Large Language Models (LLMs) driven by In-Context Learning (ICL) have significantly improved the performance of text-to-SQL. Previous methods generally employ a two-stage reasoning framework, namely 1) schema linking and 2) logical synthesis, making the framework not only effective but also interpretable. Despite these advancements, the inherent bad nature of the generalization of LLMs often resul… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: Accepted to ACL Findings 2024

  6. arXiv:2405.07977  [pdf, other

    q-bio.QM cs.LG q-bio.NC

    A Demographic-Conditioned Variational Autoencoder for fMRI Distribution Sampling and Removal of Confounds

    Authors: Anton Orlichenko, Gang Qu, Ziyu Zhou, Anqi Liu, Hong-Wen Deng, Zhengming Ding, Julia M. Stephen, Tony W. Wilson, Vince D. Calhoun, Yu-Ping Wang

    Abstract: Objective: fMRI and derived measures such as functional connectivity (FC) have been used to predict brain age, general fluid intelligence, psychiatric disease status, and preclinical neurodegenerative disease. However, it is not always clear that all demographic confounds, such as age, sex, and race, have been removed from fMRI data. Additionally, many fMRI datasets are restricted to authorized re… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 12 pages

  7. arXiv:2405.03990  [pdf, other

    cs.NI cs.AI

    TrimCaching: Parameter-sharing AI Model Caching in Wireless Edge Networks

    Authors: Guanqiao Qu, Zheng Lin, Fangming Liu, Xianhao Chen, Kaibin Huang

    Abstract: Next-generation mobile networks are expected to facilitate fast AI model downloading to end users. By caching models on edge servers, mobile networks can deliver models to end users with low latency, resulting in a paradigm called edge model caching. In this paper, we develop a novel model placement scheme, called parameter-sharing model caching (TrimCaching). TrimCaching exploits the key observat… ▽ More

    Submitted 19 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 11 pages, 7 figures. This paper has been accepted by ICDCS 2024. The extended version of this paper is at arXiv:2404.14204

  8. arXiv:2404.15819  [pdf, other

    cs.AR

    APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption

    Authors: Lin Ding, Song Bian, Penggao He, Yan Xu, Gang Qu, Jiliang Zhang

    Abstract: Fully Homomorphic Encryption (FHE) allows one to outsource computation over encrypted data to untrusted servers without worrying about data breaching. Since FHE is known to be extremely computationally-intensive, application-specific accelerators emerged as a powerful solution to narrow the performance gap. Nonetheless, due to the increasing complexities in FHE schemes per se and multi-scheme FHE… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  9. arXiv:2404.14204  [pdf, other

    cs.NI

    TrimCaching: Parameter-sharing Edge Caching for AI Model Downloading

    Authors: Guanqiao Qu, Zheng Lin, Qian Chen, Jian Li, Fangming Liu, Xianhao Chen, Kaibin Huang

    Abstract: Next-generation mobile networks are expected to facilitate fast AI model downloading to end users. By caching models on edge servers, mobile networks can deliver models to end users with low latency, resulting in a paradigm called edge model caching. In this paper, we develop a novel model placement scheme, called parameter-sharing model caching (TrimCaching). TrimCaching exploits the key observat… ▽ More

    Submitted 12 May, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: 15 pages, 11 figures. Part of this work has been accepted by ICDCS 2024

  10. arXiv:2404.05001  [pdf, other

    cs.CV

    Dual-Scale Transformer for Large-Scale Single-Pixel Imaging

    Authors: Gang Qu, Ping Wang, Xin Yuan

    Abstract: Single-pixel imaging (SPI) is a potential computational imaging technique which produces image by solving an illposed reconstruction problem from few measurements captured by a single-pixel detector. Deep learning has achieved impressive success on SPI reconstruction. However, previous poor reconstruction performance and impractical imaging model limit its real-world applications. In this paper, w… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: CVPR 2024

  11. arXiv:2404.00144  [pdf, other

    eess.IV cs.CV

    An Interpretable Cross-Attentive Multi-modal MRI Fusion Framework for Schizophrenia Diagnosis

    Authors: Ziyu Zhou, Anton Orlichenko, Gang Qu, Zening Fu, Vince D Calhoun, Zhengming Ding, Yu-Ping Wang

    Abstract: Both functional and structural magnetic resonance imaging (fMRI and sMRI) are widely used for the diagnosis of mental disorder. However, combining complementary information from these two modalities is challenging due to their heterogeneity. Many existing methods fall short of capturing the interaction between these modalities, frequently defaulting to a simple combination of latent features. In t… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

  12. arXiv:2403.13101  [pdf, other

    cs.LG cs.AI cs.DC

    AdaptSFL: Adaptive Split Federated Learning in Resource-constrained Edge Networks

    Authors: Zheng Lin, Guanqiao Qu, Wei Wei, Xianhao Chen, Kin K. Leung

    Abstract: The increasing complexity of deep neural networks poses significant barriers to democratizing them to resource-limited edge devices. To address this challenge, split federated learning (SFL) has emerged as a promising solution by of floading the primary training workload to a server via model partitioning while enabling parallel training among edge devices. However, although system optimization su… ▽ More

    Submitted 22 May, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: 15 pages, 10 figures

  13. arXiv:2403.05307  [pdf, other

    cs.AI

    Tapilot-Crossing: Benchmarking and Evolving LLMs Towards Interactive Data Analysis Agents

    Authors: Jinyang Li, Nan Huo, Yan Gao, Jiayi Shi, Yingxiu Zhao, Ge Qu, Yurong Wu, Chenhao Ma, Jian-Guang Lou, Reynold Cheng

    Abstract: Interactive Data Analysis, the collaboration between humans and LLM agents, enables real-time data exploration for informed decision-making. The challenges and costs of collecting realistic interactive logs for data analysis hinder the quantitative evaluation of Large Language Model (LLM) agents in this task. To mitigate this issue, we introduce Tapilot-Crossing, a new benchmark to evaluate LLM ag… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: 30 pages, 7 figures

  14. arXiv:2403.00222  [pdf, other

    cs.LG cs.MA

    Efficient Reinforcement Learning for Global Decision Making in the Presence of Local Agents at Scale

    Authors: Emile Anand, Guannan Qu

    Abstract: We study reinforcement learning for global decision-making in the presence of many local agents, where the global decision-maker makes decisions affecting all local agents, and the objective is to learn a policy that maximizes the rewards of both the global and the local agents. Such problems find many applications, e.g. demand response, EV charging, queueing, etc. In this setting, scalability has… ▽ More

    Submitted 22 May, 2024; v1 submitted 29 February, 2024; originally announced March 2024.

    Comments: 30 pages, 6 figures

    ACM Class: I.2.6

  15. arXiv:2402.01147  [pdf, other

    cs.LG cs.PF

    Efficient Reinforcement Learning for Routing Jobs in Heterogeneous Queueing Systems

    Authors: Neharika Jali, Guannan Qu, Weina Wang, Gauri Joshi

    Abstract: We consider the problem of efficiently routing jobs that arrive into a central queue to a system of heterogeneous servers. Unlike homogeneous systems, a threshold policy, that routes jobs to the slow server(s) when the queue length exceeds a certain threshold, is known to be optimal for the one-fast-one-slow two-server system. But an optimal policy for the multi-server system is unknown and non-tr… ▽ More

    Submitted 21 April, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: AISTATS 2024; Corrected typos

  16. LLM4SecHW: Leveraging Domain Specific Large Language Model for Hardware Debugging

    Authors: Weimin Fu, Kaichen Yang, Raj Gautam Dutta, Xiaolong Guo, Gang Qu

    Abstract: This paper presents LLM4SecHW, a novel framework for hardware debugging that leverages domain specific Large Language Model (LLM). Despite the success of LLMs in automating various software development tasks, their application in the hardware security domain has been limited due to the constraints of commercial LLMs and the scarcity of domain specific data. To address these challenges, we propose… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

    Comments: 6 pages. 1 figure

    Journal ref: 2023 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Tianjin, China, 2023, pp. 1-6

  17. arXiv:2401.10348  [pdf, other

    q-bio.NC cs.AI

    Exploring General Intelligence via Gated Graph Transformer in Functional Connectivity Studies

    Authors: Gang Qu, Anton Orlichenko, Junqi Wang, Gemeng Zhang, Li Xiao, Aiying Zhang, Zhengming Ding, Yu-Ping Wang

    Abstract: Functional connectivity (FC) as derived from fMRI has emerged as a pivotal tool in elucidating the intricacies of various psychiatric disorders and delineating the neural pathways that underpin cognitive and behavioral dynamics inherent to the human brain. While Graph Neural Networks (GNNs) offer a structured approach to represent neuroimaging data, they are limited by their need for a predefined… ▽ More

    Submitted 18 January, 2024; originally announced January 2024.

  18. arXiv:2401.07369  [pdf, other

    cs.LG cs.RO

    CoVO-MPC: Theoretical Analysis of Sampling-based MPC and Optimal Covariance Design

    Authors: Zeji Yi, Chaoyi Pan, Guanqi He, Guannan Qu, Guanya Shi

    Abstract: Sampling-based Model Predictive Control (MPC) has been a practical and effective approach in many domains, notably model-based reinforcement learning, thanks to its flexibility and parallelizability. Despite its appealing empirical performance, the theoretical understanding, particularly in terms of convergence analysis and hyperparameter tuning, remains absent. In this paper, we characterize the… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: 32 pages, 4 figures

  19. arXiv:2312.11501  [pdf, other

    cs.CR

    SYNC+SYNC: Software Cache Write Covert Channels Exploiting Memory-disk Synchronization

    Authors: Congcong Chen, Jinhua Cui, Gang Qu, Jiliang Zhang

    Abstract: Memory-disk synchronization is a critical technology for ensuring data correctness, integrity, and security, especially in systems that handle sensitive information like financial transactions and medical records. We propose SYNC+SYNC, a group of attacks that exploit the memory-disk synchronization primitives. SYNC+SYNC works by subtly varying the timing of synchronization on the write buffer, off… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

    Comments: This manuscript was first submitted to the 33rd USENIX Security Symposium on June 6, 2023 (Summer Review Cycle)

  20. arXiv:2312.04371  [pdf, other

    math.OC cs.LG cs.MA eess.SY

    A Scalable Network-Aware Multi-Agent Reinforcement Learning Framework for Decentralized Inverter-based Voltage Control

    Authors: Han Xu, Jialin Zheng, Guannan Qu

    Abstract: This paper addresses the challenges associated with decentralized voltage control in power grids due to an increase in distributed generations (DGs). Traditional model-based voltage control methods struggle with the rapid energy fluctuations and uncertainties of these DGs. While multi-agent reinforcement learning (MARL) has shown potential for decentralized secondary control, scalability issues ar… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  21. arXiv:2312.01832  [pdf, other

    cs.AR

    SPECRUN: The Danger of Speculative Runahead Execution in Processors

    Authors: Chaoqun Shen, Gang Qu, Jiliang Zhang

    Abstract: Runahead execution is a continuously evolving microarchitectural technique for processor performance. This paper introduces the first transient execution attack on the runahead execution, called SPECRUN, which exploits the unresolved branch prediction during runahead execution. We show that SPECRUN eliminates the limitation on the number of transient instructions posed by the reorder buffer size,… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  22. arXiv:2309.16739  [pdf, other

    cs.LG cs.AI

    Pushing Large Language Models to the 6G Edge: Vision, Challenges, and Opportunities

    Authors: Zheng Lin, Guanqiao Qu, Qiyuan Chen, Xianhao Chen, Zhe Chen, Kaibin Huang

    Abstract: Large language models (LLMs), which have shown remarkable capabilities, are revolutionizing AI development and potentially shaping our future. However, given their multimodality, the status quo cloud-based deployment faces some critical challenges: 1) long response time; 2) high bandwidth costs; and 3) the violation of data privacy. 6G mobile edge computing (MEC) systems may resolve these pressing… ▽ More

    Submitted 4 March, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: 7 pages, 5 figures

  23. arXiv:2308.08896  [pdf, other

    cs.LG

    Optimal Resource Allocation for U-Shaped Parallel Split Learning

    Authors: Song Lyu, Zheng Lin, Guanqiao Qu, Xianhao Chen, Xiaoxia Huang, Pan Li

    Abstract: Split learning (SL) has emerged as a promising approach for model training without revealing the raw data samples from the data owners. However, traditional SL inevitably leaks label privacy as the tail model (with the last layers) should be placed on the server. To overcome this limitation, one promising solution is to utilize U-shaped architecture to leave both early layers and last layers on th… ▽ More

    Submitted 8 October, 2023; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: 6 pages, 6 figures

  24. arXiv:2307.07291  [pdf, other

    cs.CV eess.IV

    Sampling-Priors-Augmented Deep Unfolding Network for Robust Video Compressive Sensing

    Authors: Yuhao Huang, Gangrong Qu, Youran Ge

    Abstract: Video Compressed Sensing (VCS) aims to reconstruct multiple frames from one single captured measurement, thus achieving high-speed scene recording with a low-frame-rate sensor. Although there have been impressive advances in VCS recently, those state-of-the-art (SOTA) methods also significantly increase model complexity and suffer from poor generality and robustness, which means that those network… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

  25. arXiv:2306.12194  [pdf, ps, other

    cs.LG cs.DC cs.NI

    Split Learning in 6G Edge Networks

    Authors: Zheng Lin, Guanqiao Qu, Xianhao Chen, Kaibin Huang

    Abstract: With the proliferation of distributed edge computing resources, the 6G mobile network will evolve into a network for connected intelligence. Along this line, the proposal to incorporate federated learning into the mobile edge has gained considerable interest in recent years. However, the deployment of federated learning faces substantial challenges as massive resource-limited IoT devices can hardl… ▽ More

    Submitted 24 January, 2024; v1 submitted 21 June, 2023; originally announced June 2023.

    Comments: 7 pages, 6 figures

  26. arXiv:2305.03111  [pdf, other

    cs.CL

    Can LLM Already Serve as A Database Interface? A BIg Bench for Large-Scale Database Grounded Text-to-SQLs

    Authors: Jinyang Li, Binyuan Hui, Ge Qu, Jiaxi Yang, Binhua Li, Bowen Li, Bailin Wang, Bowen Qin, Rongyu Cao, Ruiying Geng, Nan Huo, Xuanhe Zhou, Chenhao Ma, Guoliang Li, Kevin C. C. Chang, Fei Huang, Reynold Cheng, Yongbin Li

    Abstract: Text-to-SQL parsing, which aims at converting natural language instructions into executable SQLs, has gained increasing attention in recent years. In particular, Codex and ChatGPT have shown impressive results in this task. However, most of the prevalent benchmarks, i.e., Spider, and WikiSQL, focus on database schema with few rows of database contents leaving the gap between academic study and rea… ▽ More

    Submitted 14 November, 2023; v1 submitted 4 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023

  27. arXiv:2304.12072  [pdf, other

    cs.CR

    Exploration and Exploitation of Hidden PMU Events

    Authors: Yihao Yang, Pengfei Qiu, Chunlu Wang, Yu Jin, Dongsheng Wang, Gang Qu

    Abstract: Performance Monitoring Unit (PMU) is a common hardware module in Intel CPUs. It can be used to record various CPU behaviors therefore it is often used for performance analysis and optimization. Of the 65536 event spaces, Intel has officially published only 200 or so. In this paper, we design a hidden PMU event collection method. And we found a large number of undocumented PMU events in CPUs of Sky… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

  28. arXiv:2304.11397  [pdf, other

    cs.NI cs.DC

    Vehicle as a Service (VaaS): Leverage Vehicles to Build Service Networks and Capabilities for Smart Cities

    Authors: Xianhao Chen, Yiqin Deng, Haichuan Ding, Guanqiao Qu, Haixia Zhang, Pan Li, Yuguang Fang

    Abstract: Smart cities demand resources for rich immersive sensing, ubiquitous communications, powerful computing, large storage, and high intelligence (SCCSI) to support various kinds of applications, such as public safety, connected and autonomous driving, smart and connected health, and smart living. At the same time, it is widely recognized that vehicles such as autonomous cars, equipped with significan… ▽ More

    Submitted 8 September, 2023; v1 submitted 22 April, 2023; originally announced April 2023.

    Comments: 32 pages, 11 figures

  29. arXiv:2304.10877  [pdf, other

    cs.CR

    Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs

    Authors: Yu Jin, Pengfei Qiu, Chunlu Wang, Yihao Yang, Dongsheng Wang, Gang Qu

    Abstract: The transient execution attack is a type of attack leveraging the vulnerability of modern CPU optimization technologies. New attacks surface rapidly. The side-channel is a key part of transient execution attacks to leak data. In this work, we discover a vulnerability that the change of the EFLAGS register in transient execution may have a side effect on the Jcc (jump on condition code) instruction… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  30. arXiv:2211.17116  [pdf, other

    cs.LG cs.AI cs.MA math.OC

    Global Convergence of Localized Policy Iteration in Networked Multi-Agent Reinforcement Learning

    Authors: Yizhou Zhang, Guannan Qu, Pan Xu, Yiheng Lin, Zaiwei Chen, Adam Wierman

    Abstract: We study a multi-agent reinforcement learning (MARL) problem where the agents interact over a given network. The goal of the agents is to cooperatively maximize the average of their entropy-regularized long-term rewards. To overcome the curse of dimensionality and to reduce communication, we propose a Localized Policy Iteration (LPI) algorithm that provably learns a near-globally-optimal policy us… ▽ More

    Submitted 30 November, 2022; originally announced November 2022.

  31. arXiv:2211.11855  [pdf, other

    cs.AR

    MES-Attacks: Software-Controlled Covert Channels based on Mutual Exclusion and Synchronization

    Authors: Chaoqun Shen, Jiliang Zhang, Gang Qu

    Abstract: Multi-process concurrency is effective in improving program efficiency and maximizing CPU utilization. The correct execution of concurrency is ensured by the mutual exclusion and synchronization mechanism (MESM) that manages the shared hardware and software resources. We propose MES-Attacks, a new set of software-controlled covert channel attacks based on MESM to transmit confidential information.… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  32. arXiv:2207.11689  [pdf, other

    cs.CR

    PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets

    Authors: Pengfei Qiu, Yongqiang Lyu, Haixia Wang, Dongsheng Wang, Chang Liu, Qiang Gao, Chunlu Wang, Rihui Sun, Gang Qu

    Abstract: Performance Monitor Unit (PMU) is a significant hardware module on the current processors, which counts the events launched by processor into a set of PMU counters. Ideally, the events triggered by instructions that are executed but the results are not successfully committed (transient execution) should not be recorded. However, in this study, we discover that some PMU events triggered by the tran… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

  33. arXiv:2206.01704  [pdf, ps, other

    cs.LG eess.SY math.OC stat.ML

    KCRL: Krasovskii-Constrained Reinforcement Learning with Guaranteed Stability in Nonlinear Dynamical Systems

    Authors: Sahin Lale, Yuanyuan Shi, Guannan Qu, Kamyar Azizzadenesheli, Adam Wierman, Anima Anandkumar

    Abstract: Learning a dynamical system requires stabilizing the unknown dynamics to avoid state blow-ups. However, current reinforcement learning (RL) methods lack stabilization guarantees, which limits their applicability for the control of safety-critical systems. We propose a model-based RL framework with formal stability guarantees, Krasovskii Constrained RL (KCRL), that adopts Krasovskii's family of Lya… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  34. arXiv:2206.01341  [pdf, other

    cs.LG eess.SY stat.ML

    Equipping Black-Box Policies with Model-Based Advice for Stable Nonlinear Control

    Authors: Tongxin Li, Ruixiao Yang, Guannan Qu, Yiheng Lin, Steven Low, Adam Wierman

    Abstract: Machine-learned black-box policies are ubiquitous for nonlinear control problems. Meanwhile, crude model information is often available for these problems from, e.g., linear approximations of nonlinear dynamics. We study the problem of equipping a black-box control policy with model-based advice for nonlinear control on a single trajectory. We first show a general negative result that a naive conv… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: 33 pages, 7 figures

  35. arXiv:2204.05551  [pdf, other

    math.OC cs.LG eess.SY math.DS

    Near-Optimal Distributed Linear-Quadratic Regulator for Networked Systems

    Authors: Sungho Shin, Yiheng Lin, Guannan Qu, Adam Wierman, Mihai Anitescu

    Abstract: This paper studies the trade-off between the degree of decentralization and the performance of a distributed controller in a linear-quadratic control setting. We study a system of interconnected agents over a graph and a distributed controller, called $κ$-distributed control, which lets the agents make control decisions based on the state information within distance $κ$ on the underlying graph. Th… ▽ More

    Submitted 11 September, 2022; v1 submitted 12 April, 2022; originally announced April 2022.

  36. arXiv:2201.06192  [pdf, other

    cs.CV cs.AI

    Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems

    Authors: Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, Gang Qu

    Abstract: Adversarial Examples (AEs) can deceive Deep Neural Networks (DNNs) and have received a lot of attention recently. However, majority of the research on AEs is in the digital domain and the adversarial patches are static, which is very different from many real-world DNN applications such as Traffic Sign Recognition (TSR) systems in autonomous vehicles. In TSR systems, object detectors use DNNs to pr… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

    Comments: 17 pages, 15 figures

  37. arXiv:2112.03662  [pdf, other

    cs.CR cs.AR

    Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults

    Authors: Rihui Sun, Pefei Qiu, Yongqiang Lyu, Donsheng Wang, Jiang Dong, Gang Qu

    Abstract: GPU clouds have become a popular computing platform because of the cost of owning and maintaining high-performance computing clusters. Many cloud architectures have also been proposed to ensure a secure execution environment for guest applications by enforcing strong security policies to isolate the untrusted hypervisor from the guest virtual machines (VMs). In this paper, we study the impact of G… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

  38. Triangle Counting Accelerations: From Algorithm to In-Memory Computing Architecture

    Authors: Xueyan Wang, Jianlei Yang, Yinglin Zhao, Xiaotao Jia, Rong Yin, Xuhang Chen, Gang Qu, Weisheng Zhao

    Abstract: Triangles are the basic substructure of networks and triangle counting (TC) has been a fundamental graph computing problem in numerous fields such as social network analysis. Nevertheless, like other graph computing problems, due to the high memory-computation ratio and random memory access pattern, TC involves a large amount of data transfers thus suffers from the bandwidth bottleneck in the trad… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2007.10702

    Journal ref: IEEE Transactions on Computers, 2021

  39. arXiv:2110.00096  [pdf, other

    cs.MA cs.AI

    Decentralized Graph-Based Multi-Agent Reinforcement Learning Using Reward Machines

    Authors: Jueming Hu, Zhe Xu, Weichang Wang, Guannan Qu, Yutian Pang, Yongming Liu

    Abstract: In multi-agent reinforcement learning (MARL), it is challenging for a collection of agents to learn complex temporally extended tasks. The difficulties lie in computational complexity and how to learn the high-level ideas behind reward functions. We study the graph-based Markov Decision Process (MDP) where the dynamics of neighboring agents are coupled. We use a reward machine (RM) to encode each… ▽ More

    Submitted 30 September, 2021; originally announced October 2021.

  40. arXiv:2104.14134  [pdf, other

    math.OC cs.LG eess.SY

    Stable Online Control of Linear Time-Varying Systems

    Authors: Guannan Qu, Yuanyuan Shi, Sahin Lale, Anima Anandkumar, Adam Wierman

    Abstract: Linear time-varying (LTV) systems are widely used for modeling real-world dynamical systems due to their generality and simplicity. Providing stability guarantees for LTV systems is one of the central problems in control theory. However, existing approaches that guarantee stability typically lead to significantly sub-optimal cumulative control cost in online settings where only current or short-te… ▽ More

    Submitted 29 April, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: 3rd Annual Learning for Dynamics & Control Conference (L4DC)

  41. arXiv:2103.03701  [pdf, other

    cs.LG cs.AI

    Don't Forget to Sign the Gradients!

    Authors: Omid Aramoon, Pin-Yu Chen, Gang Qu

    Abstract: Engineering a top-notch deep learning model is an expensive procedure that involves collecting data, hiring human resources with expertise in machine learning, and providing high computational resources. For that reason, deep learning models are considered as valuable Intellectual Properties (IPs) of the model vendors. To ensure reliable commercialization of deep learning models, it is crucial to… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: Accepted to MLSys 2021

  42. arXiv:2102.05561  [pdf, other

    cs.LG cs.CR cs.DC

    Meta Federated Learning

    Authors: Omid Aramoon, Pin-Yu Chen, Gang Qu, Yuan Tian

    Abstract: Due to its distributed methodology alongside its privacy-preserving features, Federated Learning (FL) is vulnerable to training time adversarial attacks. In this study, our focus is on backdoor attacks in which the adversary's goal is to cause targeted misclassifications for inputs embedded with an adversarial trigger while maintaining an acceptable performance on the main learning task at hand. C… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: 11 pages, 5 figures

  43. arXiv:2102.01168  [pdf, other

    cs.LG cs.AI eess.SY

    Reinforcement Learning for Selective Key Applications in Power Systems: Recent Advances and Future Challenges

    Authors: Xin Chen, Guannan Qu, Yujie Tang, Steven Low, Na Li

    Abstract: With large-scale integration of renewable generation and distributed energy resources, modern power systems are confronted with new operational challenges, such as growing complexity, increasing uncertainty, and aggravating volatility. Meanwhile, more and more data are becoming available owing to the widespread deployment of smart meters, smart sensors, and upgraded communication networks. As a re… ▽ More

    Submitted 25 February, 2022; v1 submitted 26 January, 2021; originally announced February 2021.

  44. arXiv:2101.08316  [pdf, other

    cs.LG

    Ensemble manifold based regularized multi-modal graph convolutional network for cognitive ability prediction

    Authors: Gang Qu, Li Xiao, Wenxing Hu, Kun Zhang, Vince D. Calhoun, Yu-Ping Wang

    Abstract: Objective: Multi-modal functional magnetic resonance imaging (fMRI) can be used to make predictions about individual behavioral and cognitive traits based on brain connectivity networks. Methods: To take advantage of complementary information from multi-modal fMRI, we propose an interpretable multi-modal graph convolutional network (MGCN) model, incorporating the fMRI time series and the functiona… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

  45. arXiv:2008.09930  [pdf, other

    cs.DC eess.SP

    DMRO:A Deep Meta Reinforcement Learning-based Task Offloading Framework for Edge-Cloud Computing

    Authors: Guanjin Qu, Huaming Wu

    Abstract: With the continuous growth of mobile data and the unprecedented demand for computing power, resource-constrained edge devices cannot effectively meet the requirements of Internet of Things (IoT) applications and Deep Neural Network (DNN) computing. As a distributed computing paradigm, edge offloading that migrates complex tasks from IoT devices to edge-cloud servers can break through the resource… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

  46. arXiv:2007.15348   

    cs.CR eess.SY

    Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting

    Authors: Zhiyun Wang, Jiayu Zhang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Minjian Zhao

    Abstract: With the increasing popularity of the Internet of Things(IoT) devices, the demand for fast and convenient battery charging services grows rapidly. Wireless charging is a promising technology for such a purpose and its usage has become ubiquitous. However, the close distance between the charger and the device being charged not only makes proximity-based and near field communication attacks possible… ▽ More

    Submitted 4 August, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Comments: Sorry, the content of this paper has to be revised a lot, so we decided to withdraw it first

  47. arXiv:2007.10702  [pdf, other

    cs.AR

    TCIM: Triangle Counting Acceleration With Processing-In-MRAM Architecture

    Authors: Xueyan Wang, Jianlei Yang, Yinglin Zhao, Yingjie Qi, Meichen Liu, Xingzhou Cheng, Xiaotao Jia, Xiaoming Chen, Gang Qu, Weisheng Zhao

    Abstract: Triangle counting (TC) is a fundamental problem in graph analysis and has found numerous applications, which motivates many TC acceleration solutions in the traditional computing platforms like GPU and FPGA. However, these approaches suffer from the bandwidth bottleneck because TC calculation involves a large amount of data transfers. In this paper, we propose to overcome this challenge by designi… ▽ More

    Submitted 21 July, 2020; originally announced July 2020.

    Comments: published on DAC 2020

  48. arXiv:2006.11029  [pdf, ps, other

    cs.AI cs.LG eess.SY math.OC

    Learning Optimal Power Flow: Worst-Case Guarantees for Neural Networks

    Authors: Andreas Venzke, Guannan Qu, Steven Low, Spyros Chatzivasileiadis

    Abstract: This paper introduces for the first time a framework to obtain provable worst-case guarantees for neural network performance, using learning for optimal power flow (OPF) problems as a guiding example. Neural networks have the potential to substantially reduce the computing time of OPF solutions. However, the lack of guarantees for their worst-case performance remains a major barrier for their adop… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: The code to reproduce the simulation results is available https://doi.org/10.5281/zenodo.3871755

  49. arXiv:2006.07476  [pdf, other

    math.OC cs.LG eess.SY

    Combining Model-Based and Model-Free Methods for Nonlinear Control: A Provably Convergent Policy Gradient Approach

    Authors: Guannan Qu, Chenkai Yu, Steven Low, Adam Wierman

    Abstract: Model-free learning-based control methods have seen great success recently. However, such methods typically suffer from poor sample complexity and limited convergence guarantees. This is in sharp contrast to classical model-based control, which has a rich theory but typically requires strong modeling assumptions. In this paper, we combine the two approaches to achieve the best of both worlds. We c… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  50. arXiv:2006.06626  [pdf, other

    math.OC cs.AI cs.LG cs.MA eess.SY

    Scalable Multi-Agent Reinforcement Learning for Networked Systems with Average Reward

    Authors: Guannan Qu, Yiheng Lin, Adam Wierman, Na Li

    Abstract: It has long been recognized that multi-agent reinforcement learning (MARL) faces significant scalability issues due to the fact that the size of the state and action spaces are exponentially large in the number of agents. In this paper, we identify a rich class of networked MARL problems where the model exhibits a local dependence structure that allows it to be solved in a scalable manner. Specifi… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.