Skip to main content

Showing 1–47 of 47 results for author: Wu, O

  1. arXiv:2406.02706  [pdf, other

    cs.CV cs.LG

    Window to Wall Ratio Detection using SegFormer

    Authors: Zoe De Simone, Sayandeep Biswas, Oscar Wu

    Abstract: Window to Wall Ratios (WWR) are key to assessing the energy, daylight and ventilation performance of buildings. Studies have shown that window area has a large impact on building performance and simulation. However, data to set up these environmental models and simulations is typically not available. Instead, a standard 40% WWR is typically assumed for all buildings. This paper leverages existing… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2406.02612  [pdf, other

    cs.LG cs.AI

    Is Data Valuation Learnable and Interpretable?

    Authors: Ou Wu, Weiyao Zhu, Mengyang Li

    Abstract: Measuring the value of individual samples is critical for many data-driven tasks, e.g., the training of a deep learning model. Recent literature witnesses the substantial efforts in developing data valuation methods. The primary data valuation methodology is based on the Shapley value from game theory, and various methods are proposed along this path. {Even though Shapley value-based valuation has… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  3. arXiv:2405.17464  [pdf, other

    cs.LG cs.AI stat.ML

    Data Valuation by Leveraging Global and Local Statistical Information

    Authors: Xiaoling Zhou, Ou Wu, Michael K. Ng, Hao Jiang

    Abstract: Data valuation has garnered increasing attention in recent years, given the critical role of high-quality data in various applications, particularly in machine learning tasks. There are diverse technical avenues to quantify the value of data within a corpus. While Shapley value-based methods are among the most widely used techniques in the literature due to their solid theoretical foundation, the… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 12 pages, 8 figures. arXiv admin note: text overlap with arXiv:2306.10577 by other authors

    ACM Class: I.2

  4. arXiv:2404.01102  [pdf, other

    eess.IV cs.CV cs.LG

    Diffusion based Zero-shot Medical Image-to-Image Translation for Cross Modality Segmentation

    Authors: Zihao Wang, Yingyu Yang, Yuzhou Chen, Tingting Yuan, Maxime Sermesant, Herve Delingette, Ona Wu

    Abstract: Cross-modality image segmentation aims to segment the target modalities using a method designed in the source modality. Deep generative models can translate the target modality images into the source modality, thus enabling cross-modality segmentation. However, a vast body of existing cross-modality image translation methods relies on supervised learning. In this work, we aim to address the challe… ▽ More

    Submitted 9 April, 2024; v1 submitted 1 April, 2024; originally announced April 2024.

    Comments: Neurips 2023 Diffusion Workshop

  5. arXiv:2403.12999  [pdf

    cs.RO cs.AI cs.CL cs.LG

    Prompt Selection and Augmentation for Few Examples Code Generation in Large Language Model and its Application in Robotics Control

    Authors: On Tai Wu, Frodo Kin Sun Chan, Zunhao Zhang, Yan Nei Law, Benny Drescher, Edmond Shiao Bun Lai

    Abstract: Few-shot prompting and step-by-step reasoning have enhanced the capabilities of Large Language Models (LLMs) in tackling complex tasks including code generation. In this paper, we introduce a prompt selection and augmentation algorithm aimed at improving mathematical reasoning and robot arm operations. Our approach incorporates a multi-stage example augmentation scheme combined with an example sel… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: 17 pages, 4 figures

  6. arXiv:2403.02360  [pdf, other

    cs.LG cs.AI

    Towards Optimal Customized Architecture for Heterogeneous Federated Learning with Contrastive Cloud-Edge Model Decoupling

    Authors: Xingyan Chen, Tian Du, Mu Wang, Tiancheng Gu, Yu Zhao, Gang Kou, Changqiao Xu, Dapeng Oliver Wu

    Abstract: Federated learning, as a promising distributed learning paradigm, enables collaborative training of a global model across multiple network edge clients without the need for central data collecting. However, the heterogeneity of edge data distribution drags the model towards the local minima, which can be distant from the global optimum. Such heterogeneity often leads to slow convergence and substa… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  7. arXiv:2401.01589  [pdf, other

    cs.CR

    The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective

    Authors: Cheng Wang, Zenghui Yuan, Pan Zhou, Zichuan Xu, Ruixuan Li, Dapeng Oliver Wu

    Abstract: Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network's edge. By shifting the load of cloud computing to individual local servers, MEC helps meet the requirements of ultralow latency, localized data processing, and extends the potential of Internet of Things (IoT) for end-users. However, the cros… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: Accepted at IEEE IoTJ

  8. arXiv:2310.16499  [pdf, other

    cs.LG

    Data Optimization in Deep Learning: A Survey

    Authors: Ou Wu, Rujing Yao

    Abstract: Large-scale, high-quality data are considered an essential factor for the successful application of many deep learning techniques. Meanwhile, numerous real-world deep learning tasks still have to contend with the lack of sufficient amounts of high-quality data. Additionally, issues such as model robustness, fairness, and trustworthiness are also closely related to training data. Consequently, a hu… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  9. arXiv:2307.12264  [pdf, ps, other

    cs.NI eess.SP

    QoE-Driven Video Transmission: Energy-Efficient Multi-UAV Network Optimization

    Authors: Kesong Wu, Xianbin Cao, Peng Yang, Zongyang Yu, Dapeng Oliver Wu, Tony Q. S. Quek

    Abstract: This paper is concerned with the issue of improving video subscribers' quality of experience (QoE) by deploying a multi-unmanned aerial vehicle (UAV) network. Different from existing works, we characterize subscribers' QoE by video bitrates, latency, and frame freezing and propose to improve their QoE by energy-efficiently and dynamically optimizing the multi-UAV network in terms of serving UAV se… ▽ More

    Submitted 23 July, 2023; originally announced July 2023.

  10. arXiv:2307.04129  [pdf, other

    cs.CV

    Cross-modal Orthogonal High-rank Augmentation for RGB-Event Transformer-trackers

    Authors: Zhiyu Zhu, Junhui Hou, Dapeng Oliver Wu

    Abstract: This paper addresses the problem of cross-modal object tracking from RGB videos and event data. Rather than constructing a complex cross-modal fusion network, we explore the great potential of a pre-trained vision Transformer (ViT). Particularly, we delicately investigate plug-and-play training augmentations that encourage the ViT to bridge the vast distribution gap between the two modalities, ena… ▽ More

    Submitted 4 September, 2023; v1 submitted 9 July, 2023; originally announced July 2023.

    Comments: accepted by ICCV

  11. arXiv:2305.03900  [pdf, other

    cs.LG cs.AI

    Rethinking Class Imbalance in Machine Learning

    Authors: Ou Wu

    Abstract: Imbalance learning is a subfield of machine learning that focuses on learning tasks in the presence of class imbalance. Nearly all existing studies refer to class imbalance as a proportion imbalance, where the proportion of training samples in each class is not balanced. The ignorance of the proportion imbalance will result in unfairness between/among classes and poor generalization capability. Pr… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: 14 pages, 22 figures

  12. arXiv:2304.13431  [pdf, other

    cs.LG

    Implicit Counterfactual Data Augmentation for Deep Neural Networks

    Authors: Xiaoling Zhou, Ou Wu

    Abstract: Machine-learning models are prone to capturing the spurious correlations between non-causal attributes and classes, with counterfactual data augmentation being a promising direction for breaking these spurious associations. However, explicitly generating counterfactual data is challenging, with the training efficiency declining. Therefore, this study proposes an implicit counterfactual data augmen… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 17 pages, 16 figures

  13. arXiv:2304.12550  [pdf, other

    cs.LG cs.AI

    Combining Adversaries with Anti-adversaries in Training

    Authors: Xiaoling Zhou, Nan Yang, Ou Wu

    Abstract: Adversarial training is an effective learning technique to improve the robustness of deep neural networks. In this study, the influence of adversarial training on deep learning models in terms of fairness, robustness, and generalization is theoretically investigated under more general perturbation scope that different samples can have different perturbation directions (the adversarial and anti-adv… ▽ More

    Submitted 18 May, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

    Comments: 8 pages, 5 figures

    Journal ref: AAAI2023

  14. arXiv:2301.13743  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    Zero-shot-Learning Cross-Modality Data Translation Through Mutual Information Guided Stochastic Diffusion

    Authors: Zihao Wang, Yingyu Yang, Maxime Sermesant, Hervé Delingette, Ona Wu

    Abstract: Cross-modality data translation has attracted great interest in image computing. Deep generative models (\textit{e.g.}, GANs) show performance improvement in tackling those problems. Nevertheless, as a fundamental challenge in image translation, the problem of Zero-shot-Learning Cross-Modality Data Translation with fidelity remains unanswered. This paper proposes a new unsupervised zero-shot-learn… ▽ More

    Submitted 31 January, 2023; originally announced January 2023.

  15. arXiv:2301.04850  [pdf, other

    cs.LG cs.AI

    Understanding Difficulty-based Sample Weighting with a Universal Difficulty Measure

    Authors: Xiaoling Zhou, Ou Wu, Weiyao Zhu, Ziyang Liang

    Abstract: Sample weighting is widely used in deep learning. A large number of weighting methods essentially utilize the learning difficulty of training samples to calculate their weights. In this study, this scheme is called difficulty-based weighting. Two important issues arise when explaining this scheme. First, a unified difficulty measure that can be theoretically guaranteed for training samples does no… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: 16 pages, 6 figures; ECML-PKDD 2022

  16. arXiv:2210.16172  [pdf, other

    cs.PF

    Violation Probabilities of AoI and PAoI and Optimal Arrival Rate Allocation for the IoT-based Multi-Source Status Update System

    Authors: Tianci Zhang, Shutong Chen, Zhengchuan Chen, Zhong Tian, Yunjian Jia, Min Wang, Dapeng Oliver Wu

    Abstract: Lots of real-time applications over Internet of things (IoT)-based status update systems have imperative demands on information freshness, which is usually evaluated by age of information (AoI). Compared to the average AoI and peak AoI (PAoI), violation probabilities and distributions of AoI and PAoI characterize the timeliness in more details. This paper studies the timeliness of the IoT-based mu… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

  17. arXiv:2209.05668  [pdf, other

    cs.LG cs.AI

    Class-Level Logit Perturbation

    Authors: Mengyang Li, Fengguang Su, Ou Wu, Ji Zhang

    Abstract: Features, logits, and labels are the three primary data when a sample passes through a deep neural network. Feature perturbation and label perturbation receive increasing attention in recent years. They have been proven to be useful in various deep learning approaches. For example, (adversarial) feature perturbation can improve the robustness or even generalization capability of learned models. Ho… ▽ More

    Submitted 25 September, 2022; v1 submitted 12 September, 2022; originally announced September 2022.

  18. arXiv:2205.07427  [pdf, other

    cs.LG

    Exploring the Learning Difficulty of Data Theory and Measure

    Authors: Weiyao Zhu, Ou Wu, Fengguang Su, Yingjun Deng

    Abstract: As learning difficulty is crucial for machine learning (e.g., difficulty-based weighting learning strategies), previous literature has proposed a number of learning difficulty measures. However, no comprehensive investigation for learning difficulty is available to date, resulting in that nearly all existing measures are heuristically defined without a rigorous theoretical foundation. In addition,… ▽ More

    Submitted 17 September, 2022; v1 submitted 15 May, 2022; originally announced May 2022.

    Comments: Ou Wu is the corresponding author of this work

  19. EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE

    Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello

    Abstract: The classification service over a stream of data is becoming an important offering for cloud providers, but users may encounter obstacles in providing sensitive data due to privacy concerns. While Trusted Execution Environments (TEEs) are promising solutions for protecting private data, they remain vulnerable to side-channel attacks induced by data-dependent access patterns. We propose a Privacy-p… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

    Comments: 15 pages, 12 figures

  20. arXiv:2111.07078  [pdf, ps, other

    cs.NI cs.AI

    Networking of Internet of UAVs: Challenges and Intelligent Approaches

    Authors: Peng Yang, Xianbin Cao, Tony Q. S. Quek, Dapeng Oliver Wu

    Abstract: Internet of unmanned aerial vehicle (I-UAV) networks promise to accomplish sensing and transmission tasks quickly, robustly, and cost-efficiently via effective cooperation among UAVs. To achieve the promising benefits, the crucial I-UAV networking issue should be tackled. This article argues that I-UAV networking can be classified into three categories, quality-of-service (QoS) driven networking,… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

  21. arXiv:2110.08690  [pdf, other

    cs.LG

    Tackling the Imbalance for GNNs

    Authors: Rui Wang, Weixuan Xiong, Qinghu Hou, Ou Wu

    Abstract: Different from deep neural networks for non-graph data classification, graph neural networks (GNNs) leverage the information exchange between nodes (or samples) when representing nodes. The category distribution shows an imbalance or even a highly-skewed trend on nearly all existing benchmark GNN data sets. The imbalanced distribution will cause misclassification of nodes in the minority classes,… ▽ More

    Submitted 16 October, 2021; originally announced October 2021.

  22. arXiv:2110.05481  [pdf, other

    cs.LG stat.ML

    Which Samples Should be Learned First: Easy or Hard?

    Authors: Xiaoling Zhou, Ou Wu

    Abstract: An effective weighting scheme for training samples is essential for learning tasks. Numerous weighting schemes have been proposed. Some schemes take the easy-first mode, whereas some others take the hard-first one. Naturally, an interesting yet realistic question is raised. Which samples should be learned first given a new learning task, easy or hard? To answer this question, both theoretical anal… ▽ More

    Submitted 17 September, 2022; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: 14 pages,10 figures

    ACM Class: I.2.6; K.3.2

  23. arXiv:2109.14180  [pdf, ps, other

    cs.LG

    Efficient Reinforced Feature Selection via Early Stopping Traverse Strategy

    Authors: Kunpeng Liu, Pengfei Wang, Dongjie Wang, Wan Du, Dapeng Oliver Wu, Yanjie Fu

    Abstract: In this paper, we propose a single-agent Monte Carlo based reinforced feature selection (MCRFS) method, as well as two efficiency improvement strategies, i.e., early stopping (ES) strategy and reward-level interactive (RI) strategy. Feature selection is one of the most important technologies in data prepossessing, aiming to find the optimal feature subset for a given downstream machine learning ta… ▽ More

    Submitted 12 October, 2021; v1 submitted 28 September, 2021; originally announced September 2021.

    Comments: ICDM 2021

  24. arXiv:2107.11921  [pdf, other

    cs.LG

    Compensation Learning

    Authors: Rujing Yao, Ou Wu

    Abstract: Weighting strategy prevails in machine learning. For example, a common approach in robust machine learning is to exert lower weights on samples which are likely to be noisy or quite hard. This study reveals another undiscovered strategy, namely, compensating. Various incarnations of compensating have been utilized but it has not been explicitly revealed. Learning with compensating is called compen… ▽ More

    Submitted 4 January, 2022; v1 submitted 25 July, 2021; originally announced July 2021.

  25. arXiv:2106.05522   

    cs.LG

    A Mathematical Foundation for Robust Machine Learning based on Bias-Variance Trade-off

    Authors: Ou Wu, Weiyao Zhu, Yingjun Deng, Haixiang Zhang, Qinghu Hou

    Abstract: A common assumption in machine learning is that samples are independently and identically distributed (i.i.d). However, the contributions of different samples are not identical in training. Some samples are difficult to learn and some samples are noisy. The unequal contributions of samples has a considerable effect on training performances. Studies focusing on unequal sample contributions (e.g., e… ▽ More

    Submitted 21 November, 2021; v1 submitted 10 June, 2021; originally announced June 2021.

    Comments: Withdraw given that several theorem and propositions that are highly-related were not mentioned

  26. arXiv:2105.09900  [pdf, other

    cs.LG

    Online Binary Models are Promising for Distinguishing Temporally Consistent Computer Usage Profiles

    Authors: Luiz Giovanini, Fabrício Ceschin, Mirela Silva, Aokun Chen, Ramchandra Kulkarni, Sanjay Banda, Madison Lysaght, Heng Qiao, Nikolaos Sapountzis, Ruimin Sun, Brandon Matthews, Dapeng Oliver Wu, André Grégio, Daniela Oliveira

    Abstract: This paper investigates whether computer usage profiles comprised of process-, network-, mouse-, and keystroke-related events are unique and consistent over time in a naturalistic setting, discussing challenges and opportunities of using such profiles in applications of continuous authentication. We collected ecologically-valid computer usage profiles from 31 MS Windows 10 computer users over 8 we… ▽ More

    Submitted 2 September, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

  27. arXiv:2104.01848  [pdf, other

    cs.LG

    Improving the Expressive Power of Graph Neural Network with Tinhofer Algorithm

    Authors: Alan J. X. Guo, Qing-Hu Hou, Ou Wu

    Abstract: In recent years, Graph Neural Network (GNN) has bloomly progressed for its power in processing graph-based data. Most GNNs follow a message passing scheme, and their expressive power is mathematically limited by the discriminative ability of the Weisfeiler-Lehman (WL) test. Following Tinhofer's research on compact graphs, we propose a variation of the message passing scheme, called the Weisfeiler-… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

  28. arXiv:2011.11194  [pdf, other

    cs.LG cs.CV cs.NE

    V3H: View Variation and View Heredity for Incomplete Multi-view Clustering

    Authors: Xiang Fang, Yuchong Hu, Pan Zhou, Dapeng Oliver Wu

    Abstract: Real data often appear in the form of multiple incomplete views. Incomplete multi-view clustering is an effective method to integrate these incomplete views. Previous methods only learn the consistent information between different views and ignore the unique information of each view, which limits their clustering performance and generalizations. To overcome this limitation, we propose a novel View… ▽ More

    Submitted 30 April, 2021; v1 submitted 22 November, 2020; originally announced November 2020.

    Comments: Publisheded in IEEE Transactions on Artificial Intelligence

    Report number: vol. 1, no. 3, pp. 233-247, Dec. 2020

    Journal ref: IEEE Transactions on Artificial Intelligence 2020

  29. arXiv:2011.10331  [pdf, other

    cs.CV cs.LG

    ANIMC: A Soft Framework for Auto-weighted Noisy and Incomplete Multi-view Clustering

    Authors: Xiang Fang, Yuchong Hu, Pan Zhou, Dapeng Oliver Wu

    Abstract: Multi-view clustering has wide applications in many image processing scenarios. In these scenarios, original image data often contain missing instances and noises, which is ignored by most multi-view clustering methods. However, missing instances may make these methods difficult to use directly and noises will lead to unreliable clustering results. In this paper, we propose a novel Auto-weighted N… ▽ More

    Submitted 28 September, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

    Comments: Publisheded in IEEE Transactions on Artificial Intelligence

    Journal ref: IEEE Transactions on Artificial Intelligence 2021

  30. arXiv:2011.10254  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Unbalanced Incomplete Multi-view Clustering via the Scheme of View Evolution: Weak Views are Meat; Strong Views do Eat

    Authors: Xiang Fang, Yuchong Hu, Pan Zhou, Dapeng Oliver Wu

    Abstract: Incomplete multi-view clustering is an important technique to deal with real-world incomplete multi-view data. Previous works assume that all views have the same incompleteness, i.e., balanced incompleteness. However, different views often have distinct incompleteness, i.e., unbalanced incompleteness, which results in strong views (low-incompleteness views) and weak views (high-incompleteness view… ▽ More

    Submitted 30 April, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

    Comments: Accepted by IEEE Transactions on Emerging Topics in Computational Intelligence

    Journal ref: IEEE Transactions on Emerging Topics in Computational Intelligence 2021

  31. arXiv:2011.00518  [pdf, other

    cs.IR cs.AI

    AI Marker-based Large-scale AI Literature Mining

    Authors: Rujing Yao, Yingchun Ye, Ji Zhang, Shuxiao Li, Ou Wu

    Abstract: The knowledge contained in academic literature is interesting to mine. Inspired by the idea of molecular markers tracing in the field of biochemistry, three named entities, namely, methods, datasets and metrics are used as AI markers for AI literature. These entities can be used to trace the research process described in the bodies of papers, which opens up new perspectives for seeking and mining… ▽ More

    Submitted 2 November, 2020; v1 submitted 1 November, 2020; originally announced November 2020.

  32. arXiv:2010.13583  [pdf, other

    cs.AI

    Method and Dataset Entity Mining in Scientific Literature: A CNN + Bi-LSTM Model with Self-attention

    Authors: Linlin Hou, Ji Zhang, Ou Wu, Ting Yu, Zhen Wang, Zhao Li, Jianliang Gao, Yingchun Ye, Rujing Yao

    Abstract: Literature analysis facilitates researchers to acquire a good understanding of the development of science and technology. The traditional literature analysis focuses largely on the literature metadata such as topics, authors, abstracts, keywords, references, etc., and little attention was paid to the main content of papers. In many scientific domains such as science, computing, engineering, etc.,… ▽ More

    Submitted 27 January, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

  33. arXiv:1912.00398  [pdf, other

    cs.CL cs.AI cs.LG

    Deep Human Answer Understanding for Natural Reverse QA

    Authors: Rujing Yao, Linlin Hou, Lei Yang, Jie Gui, Qing Yin, Ou Wu

    Abstract: This study focuses on a reverse question answering (QA) procedure, in which machines proactively raise questions and humans supply the answers. This procedure exists in many real human-machine interaction applications. However, a crucial problem in human-machine interaction is answer understanding. The existing solutions have relied on mandatory option term selection to avoid automatic answer unde… ▽ More

    Submitted 28 November, 2020; v1 submitted 1 December, 2019; originally announced December 2019.

  34. arXiv:1911.13096  [pdf

    cs.LG cs.CL cs.IR stat.ML

    Method and Dataset Mining in Scientific Papers

    Authors: Rujing Yao, Linlin Hou, Yingchun Ye, Ou Wu, Ji Zhang, Jian Wu

    Abstract: Literature analysis facilitates researchers better understanding the development of science and technology. The conventional literature analysis focuses on the topics, authors, abstracts, keywords, references, etc., and rarely pays attention to the content of papers. In the field of machine learning, the involved methods (M) and datasets (D) are key information in papers. The extraction and mining… ▽ More

    Submitted 29 November, 2019; originally announced November 2019.

  35. arXiv:1907.00695  [pdf, other

    eess.IV cs.CV

    Multi-atlas image registration of clinical data with automated quality assessment using ventricle segmentation

    Authors: Florian Dubost, Marleen de Bruijne, Marco Nardin, Adrian V. Dalca, Kathleen L. Donahue, Anne-Katrin Giese, Mark R. Etherton, Ona Wu, Marius de Groot, Wiro Niessen, Meike Vernooij, Natalia S. Rost, Markus D. Schirmer

    Abstract: Registration is a core component of many imaging pipelines. In case of clinical scans, with lower resolution and sometimes substantial motion artifacts, registration can produce poor results. Visual assessment of registration quality in large clinical datasets is inefficient. In this work, we propose to automatically assess the quality of registration to an atlas in clinical FLAIR MRI scans of the… ▽ More

    Submitted 26 December, 2019; v1 submitted 1 July, 2019; originally announced July 2019.

  36. arXiv:1901.03788  [pdf, other

    cs.CL

    Semi-interactive Attention Network for Answer Understanding in Reverse-QA

    Authors: Qing Yin, Guan Luo, Xiaodong Zhu, Qinghua Hu, Ou Wu

    Abstract: Question answering (QA) is an important natural language processing (NLP) task and has received much attention in academic research and industry communities. Existing QA studies assume that questions are raised by humans and answers are generated by machines. Nevertheless, in many real applications, machines are also required to determine human needs or perceive human states. In such scenarios, ma… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  37. arXiv:1811.02908  [pdf, ps, other

    cs.IT

    User Fairness Non-orthogonal Multiple Access (NOMA) for 5G Millimeter-Wave Communications with Analog Beamforming

    Authors: Zhenyu Xiao, Lipeng Zhu, Zhen Gao, Dapeng Oliver Wu, Xiang-Gen Xia

    Abstract: The integration of non-orthogonal multiple access in millimeter-Wave communications (mmWave-NOMA) can significantly improve the spectrum efficiency and increase the number of users in the fifth-generation (5G) mobile communication. In this paper we consider a downlink mmWave-NOMA cellular system, where the base station is mounted with an analog beamforming phased array, and multiple users are serv… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: 11pages, 9 figures

  38. arXiv:1811.02904  [pdf, ps, other

    cs.IT

    Joint Tx-Rx Beamforming and Power Allocation for 5G Millimeter-Wave Non-Orthogonal Multiple Access (MmWave-NOMA) Networks

    Authors: Lipeng Zhu, Jun Zhang, Zhenyu Xiao, Xianbin Cao, Dapeng Oliver Wu, Xiang-Gen Xia

    Abstract: In this paper, we investigate the combination of non-orthogonal multiple access and millimeter-Wave communications (mmWave-NOMA). A downlink cellular system is considered, where an analog phased array is equipped at both the base station and users. A joint Tx-Rx beamforming and power allocation problem is formulated to maximize the achievable sum rate (ASR) subject to a minimum rate constraint for… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: 11Pages, 10 figures

  39. arXiv:1807.03326  [pdf, other

    cs.CV cs.CR cs.LG

    Adaptive Adversarial Attack on Scene Text Recognition

    Authors: Xiaoyong Yuan, Pan He, Xiaolin Andy Li, Dapeng Oliver Wu

    Abstract: Recent studies have shown that state-of-the-art deep learning models are vulnerable to the inputs with small perturbations (adversarial examples). We observe two critical obstacles in adversarial examples: (i) Strong adversarial attacks (e.g., C&W attack) require manually tuning hyper-parameters and take a long time to construct an adversarial example, making it impractical to attack real-time sys… ▽ More

    Submitted 1 April, 2020; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: To be appear in INFOCOM 2020, The Eighth International Workshop on Security and Privacy in Big Data

  40. arXiv:1806.00580  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Detecting Adversarial Examples via Key-based Network

    Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang

    Abstract: Though deep neural networks have achieved state-of-the-art performance in visual classification, recent studies have shown that they are all vulnerable to the attack of adversarial examples. Small and often imperceptible perturbations to the input images are sufficient to fool the most powerful deep neural networks. Various defense methods have been proposed to address this issue. However, they ei… ▽ More

    Submitted 2 June, 2018; originally announced June 2018.

    Comments: 6 pages

  41. arXiv:1803.07771  [pdf, ps, other

    cs.CL

    $ρ$-hot Lexicon Embedding-based Two-level LSTM for Sentiment Analysis

    Authors: Ou Wu, Tao Yang, Mengyang Li, Ming Li

    Abstract: Sentiment analysis is a key component in various text mining applications. Numerous sentiment classification techniques, including conventional and deep learning-based methods, have been proposed in the literature. In most existing methods, a high-quality training set is assumed to be given. Nevertheless, constructing a high-quality training set that consists of highly accurate labels is challengi… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

    Comments: 10 pages

  42. arXiv:1711.06162  [pdf, ps, other

    cs.IT

    Joint Power Control and Beamforming for Uplink Non-Orthogonal Multiple Access in 5G Millimeter-Wave Communications

    Authors: Lipeng Zhu, Jun Zhang, Zhenyu Xiao, Xianbin Cao, Dapeng Oliver Wu, Xiang-Gen Xia

    Abstract: In this paper, we investigate the combination of two key enabling technologies for the fifth generation (5G) wireless mobile communication, namely millimeter-wave (mmWave) communications and non-orthogonal multiple access (NOMA). In particular, we consider a typical 2-user uplink mmWave-NOMA system, where the base station (BS) equips an analog beamforming structure with a single RF chain and serve… ▽ More

    Submitted 15 November, 2017; originally announced November 2017.

    Comments: 12 pages, 9 figures. arXiv admin note: substantial text overlap with arXiv:1711.01380

  43. arXiv:1610.03348  [pdf, ps, other

    cs.NI

    Near Optimal Adaptive Shortest Path Routing with Stochastic Links States under Adversarial Attack

    Authors: Pan Zhou, Lin Cheng, Dapeng Oliver Wu

    Abstract: We consider the shortest path routing (SPR) of a network with stochastically time varying link metrics under potential adversarial attacks. Due to potential denial of service attacks, the distributions of link states could be stochastic (benign) or adversarial at different temporal and spatial locations. Without any \emph{a priori}, designing an adaptive SPR protocol to cope with all possible situ… ▽ More

    Submitted 11 October, 2016; originally announced October 2016.

    Comments: arXiv admin note: text overlap with arXiv:1505.06608, arXiv:1507.08438

  44. arXiv:1608.05537  [pdf, ps, other

    cs.GT

    Private and Truthful Aggregative Game for Large-Scale Spectrum Sharing

    Authors: Pan Zhou, Wenqi Wei, Kaigui Bian, Dapeng Oliver Wu, Yuchong Hu, Qian Wang

    Abstract: Thanks to the rapid development of information technology, the size of the wireless network becomes larger and larger, which makes spectrum resources more precious than ever before. To improve the efficiency of spectrum utilization, game theory has been applied to study the spectrum sharing in wireless networks for a long time. However, the scale of wireless network in existing studies is relative… ▽ More

    Submitted 4 November, 2016; v1 submitted 19 August, 2016; originally announced August 2016.

  45. arXiv:1511.01953  [pdf, ps, other

    cs.IT

    Weighted Sum-Throughput Maximization for MIMO Broadcast Channel: Energy Harvesting Under System Imperfection

    Authors: Zhi Chen, Pingyi Fan, Dapeng Oliver Wu, Khaled Ben Letaief

    Abstract: In this work, a MIMO broadcast channel under the energy harvesting (EH) constraint and the peak power constraint is investigated. The transmitter is equipped with a hybrid energy storage system consisting of a perfect super capacitor (SC) and an inefficient battery, where both elements have limited energy storage capacities. In addition, the effect of data processing circuit power consumption is a… ▽ More

    Submitted 5 November, 2015; originally announced November 2015.

    Comments: 30 pages

  46. arXiv:1208.1679  [pdf, ps, other

    cs.HC cs.CV cs.GR

    Color Assessment and Transfer for Web Pages

    Authors: Ou Wu

    Abstract: Colors play a particularly important role in both designing and accessing Web pages. A well-designed color scheme improves Web pages' visual aesthetic and facilitates user interactions. As far as we know, existing color assessment studies focus on images; studies on color assessment and editing for Web pages are rare. This paper investigates color assessment for Web pages based on existing online… ▽ More

    Submitted 6 August, 2012; originally announced August 2012.

    Comments: 10pages

    ACM Class: H.4.m; H.2.8

  47. arXiv:0908.1774  [pdf, other

    math.OC cs.IT

    Energy-Efficient Transmission Scheduling with Strict Underflow Constraints

    Authors: David I Shuman, Mingyan Liu, Owen Q. Wu

    Abstract: We consider a single source transmitting data to one or more receivers/users over a shared wireless channel. Due to random fading, the wireless channel conditions vary with time and from user to user. Each user has a buffer to store received packets before they are drained. At each time step, the source determines how much power to use for transmission to each user. The source's objective is to… ▽ More

    Submitted 15 February, 2010; v1 submitted 12 August, 2009; originally announced August 2009.

    Comments: 109 pages, 11 pdf figures, template.tex is main file. We have significantly revised the paper from version 1. Additions include the case of a single receiver with piecewise-linear convex power-rate curves, the case of two receivers, and the infinite horizon average expected cost problem