Skip to main content

Showing 1–50 of 107 results for author: Xiang, Z

  1. arXiv:2407.11272  [pdf, other

    cs.CV math.DG

    Differentiable Voxelization and Mesh Morphing

    Authors: Yihao Luo, Yikai Wang, Zhengrui Xiang, Yuliang Xiu, Guang Yang, ChoonHwai Yap

    Abstract: In this paper, we propose the differentiable voxelization of 3D meshes via the winding number and solid angles. The proposed approach achieves fast, flexible, and accurate voxelization of 3D meshes, admitting the computation of gradients with respect to the input mesh and GPU acceleration. We further demonstrate the application of the proposed voxelization in mesh morphing, where the voxelized mes… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  2. arXiv:2407.09857  [pdf, other

    cs.CV

    IFTR: An Instance-Level Fusion Transformer for Visual Collaborative Perception

    Authors: Shaohong Wang, Lu Bin, Xinyu Xiao, Zhiyu Xiang, Hangguan Shan, Eryun Liu

    Abstract: Multi-agent collaborative perception has emerged as a widely recognized technology in the field of autonomous driving in recent years. However, current collaborative perception predominantly relies on LiDAR point clouds, with significantly less attention given to methods using camera images. This severely impedes the development of budget-constrained collaborative systems and the exploitation of t… ▽ More

    Submitted 13 July, 2024; originally announced July 2024.

  3. arXiv:2407.08965  [pdf, other

    cs.CV cs.LG

    Lite-SAM Is Actually What You Need for Segment Everything

    Authors: Jianhai Fu, Yuanjie Yu, Ningchuan Li, Yi Zhang, Qichao Chen, Jianping Xiong, Jun Yin, Zhiyu Xiang

    Abstract: This paper introduces Lite-SAM, an efficient end-to-end solution for the SegEvery task designed to reduce computational costs and redundancy. Lite-SAM is composed of four main components: a streamlined CNN-Transformer hybrid encoder (LiteViT), an automated prompt proposal network (AutoPPN), a traditional prompt encoder, and a mask decoder. All these components are integrated within the SAM framewo… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: ECCV 2024 Accepted

  4. Performative Debias with Fair-exposure Optimization Driven by Strategic Agents in Recommender Systems

    Authors: Zhichen Xiang, Hongke Zhao, Chuang Zhao, Ming He, Jianping Fan

    Abstract: Data bias, e.g., popularity impairs the dynamics of two-sided markets within recommender systems. This overshadows the less visible but potentially intriguing long-tail items that could capture user interest. Despite the abundance of research surrounding this issue, it still poses challenges and remains a hot topic in academic circles. Along this line, in this paper, we developed a re-ranking appr… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: SIGKDD 2024 accepted paper

  5. arXiv:2406.16299  [pdf, other

    cs.CL cs.AI

    Compensate Quantization Errors: Make Weights Hierarchical to Compensate Each Other

    Authors: Yifei Gao, Jie Ou, Lei Wang, Yuting Xiao, Zhiyuan Xiang, Ruiting Dai, Jun Cheng

    Abstract: Emergent Large Language Models (LLMs) use their extraordinary performance and powerful deduction capacity to discern from traditional language models. However, the expenses of computational resources and storage for these LLMs are stunning, quantization then arises as a trending conversation. To address accuracy decay caused by quantization, two streams of works in post-training quantization metho… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

    Comments: Efficient quantization method

    MSC Class: F.2.3

  6. arXiv:2406.09187  [pdf, other

    cs.LG

    GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning

    Authors: Zhen Xiang, Linzhi Zheng, Yanjie Li, Junyuan Hong, Qinbin Li, Han Xie, Jiawei Zhang, Zidi Xiong, Chulin Xie, Carl Yang, Dawn Song, Bo Li

    Abstract: The rapid advancement of large language models (LLMs) has catalyzed the deployment of LLM-powered agents across numerous applications, raising new concerns regarding their safety and trustworthiness. Existing methods for enhancing the safety of LLMs are not directly transferable to LLM-powered agents due to their diverse objectives and output modalities. In this paper, we propose GuardAgent, the f… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  7. arXiv:2405.13602  [pdf, other

    cs.AI cs.CL cs.LG

    COTET: Cross-view Optimal Transport for Knowledge Graph Entity Typing

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: Knowledge graph entity typing (KGET) aims to infer missing entity type instances in knowledge graphs. Previous research has predominantly centered around leveraging contextual information associated with entities, which provides valuable clues for inference. However, they have long ignored the dual nature of information inherent in entities, encompassing both high-level coarse-grained cluster know… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  8. arXiv:2405.06117  [pdf, other

    cs.DC

    Deferred Objects to Enhance Smart Contract Programming with Optimistic Parallel Execution

    Authors: George Mitenkov, Igor Kabiljo, Zekun Li, Alexander Spiegelman, Satyanarayana Vusirikala, Zhuolun Xiang, Aleksandar Zlateski, Nuno P. Lopes, Rati Gelashvili

    Abstract: One of the main bottlenecks of blockchains is smart contract execution. To increase throughput, modern blockchains try to execute transactions in parallel. Unfortunately, however, common blockchain use cases introduce read-write conflicts between transactions, forcing sequentiality. We propose RapidLane, an extension for parallel execution engines that allows the engine to capture computations i… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  9. arXiv:2404.17590  [pdf, other

    cs.IR cs.AI

    Leveraging Intra-modal and Inter-modal Interaction for Multi-Modal Entity Alignment

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: Multi-modal entity alignment (MMEA) aims to identify equivalent entity pairs across different multi-modal knowledge graphs (MMKGs). Existing approaches focus on how to better encode and aggregate information from different modalities. However, it is not trivial to leverage multi-modal knowledge in entity alignment due to the modal heterogeneity. In this paper, we propose a Multi-Grained Interactio… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  10. arXiv:2404.12916  [pdf, other

    cs.CR

    Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models

    Authors: Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen

    Abstract: Vision-Large-Language-models(VLMs) have great application prospects in autonomous driving. Despite the ability of VLMs to comprehend and make decisions in complex scenarios, their integration into safety-critical autonomous driving systems poses serious security risks. In this paper, we propose BadVLMDriver, the first backdoor attack against VLMs for autonomous driving that can be launched in prac… ▽ More

    Submitted 22 April, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

  11. arXiv:2404.09848  [pdf, other

    cs.AI cs.LG

    HyperMono: A Monotonicity-aware Approach to Hyper-Relational Knowledge Representation

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: In a hyper-relational knowledge graph (HKG), each fact is composed of a main triple associated with attribute-value qualifiers, which express additional factual knowledge. The hyper-relational knowledge graph completion (HKGC) task aims at inferring plausible missing links in a HKG. Most existing approaches to HKGC focus on enhancing the communication between qualifier pairs and main triples, whil… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  12. arXiv:2403.20097  [pdf, other

    cs.AI cs.HC q-bio.NC

    ITCMA: A Generative Agent Based on a Computational Consciousness Structure

    Authors: Hanzhong Zhang, Jibin Yin, Haoyang Wang, Ziwei Xiang

    Abstract: Large Language Models (LLMs) still face challenges in tasks requiring understanding implicit instructions and applying common-sense knowledge. In such scenarios, LLMs may require multiple attempts to achieve human-level performance, potentially leading to inaccurate responses or inferences in practical environments, affecting their long-term consistency and behavior. This paper introduces the Inte… ▽ More

    Submitted 8 June, 2024; v1 submitted 29 March, 2024; originally announced March 2024.

    Comments: 20 pages, 11 figures

    ACM Class: I.2; J.4

  13. arXiv:2403.17136  [pdf, other

    cs.RO eess.SY

    Adaptive Step Duration for Precise Foot Placement: Achieving Robust Bipedal Locomotion on Terrains with Restricted Footholds

    Authors: Zhaoyang Xiang, Victor Paredes, Ayonga Hereid

    Abstract: This paper introduces a novel multi-step preview foot placement planning algorithm designed to enhance the robustness of bipedal robotic walking across challenging terrains with restricted footholds. Traditional one-step preview planning struggles to maintain stability when stepping areas are severely limited, such as with random stepping stones. In this work, we developed a discrete-time Model Pr… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: 8 pages, 8 figures, submitted to CDC 2024, for associated simulation video, see https://youtu.be/2jhikPlZmbE

  14. arXiv:2403.12830  [pdf, other

    cs.LG cs.CR

    Towards Lifecycle Unlearning Commitment Management: Measuring Sample-level Approximate Unlearning Completeness

    Authors: Cheng-Long Wang, Qi Li, Zihang Xiang, Yinzhi Cao, Di Wang

    Abstract: By adopting a more flexible definition of unlearning and adjusting the model distribution to simulate training without the targeted data, approximate machine unlearning provides a less resource-demanding alternative to the more laborious exact unlearning methods. Yet, the unlearning completeness of target samples-even when the approximate algorithms are executed faithfully without external threats… ▽ More

    Submitted 30 April, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  15. arXiv:2402.14205  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.SP

    Compression Robust Synthetic Speech Detection Using Patched Spectrogram Transformer

    Authors: Amit Kumar Singh Yadav, Ziyue Xiang, Kratika Bhagtani, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Many deep learning synthetic speech generation tools are readily available. The use of synthetic speech has caused financial fraud, impersonation of people, and misinformation to spread. For this reason forensic methods that can detect synthetic speech have been proposed. Existing methods often overfit on one dataset and their performance reduces substantially in practical scenarios such as detect… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted as long oral paper at ICMLA 2023

  16. arXiv:2402.13087  [pdf, other

    cs.LG cs.CR

    Revisiting Differentially Private Hyper-parameter Tuning

    Authors: Zihang Xiang, Tianhao Wang, Chenglong Wang, Di Wang

    Abstract: We study the application of differential privacy in hyper-parameter tuning, a crucial process in machine learning involving selecting the best hyper-parameter from several candidates. Unlike many private learning algorithms, including the prevalent DP-SGD, the privacy implications of tuning remain insufficiently understood or often totally ignored. Recent works propose a generic private selection… ▽ More

    Submitted 4 June, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

  17. arXiv:2402.11753  [pdf, other

    cs.CL cs.AI

    ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

    Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: Safety is critical to the usage of large language models (LLMs). Multiple techniques such as data filtering and supervised fine-tuning have been developed to strengthen LLM safety. However, currently known techniques presume that corpora used for safety alignment of LLMs are solely interpreted by semantics. This assumption, however, does not hold in real-world applications, which leads to severe v… ▽ More

    Submitted 7 June, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

    Comments: To appear in ACL 2024

  18. arXiv:2401.14656  [pdf, other

    cs.CL

    Scientific Large Language Models: A Survey on Biological & Chemical Domains

    Authors: Qiang Zhang, Keyang Ding, Tianwen Lyv, Xinda Wang, Qingyu Yin, Yiwen Zhang, Jing Yu, Yuhao Wang, Xiaotong Li, Zhuoyi Xiang, Xiang Zhuang, Zeyuan Wang, Ming Qin, Mengyao Zhang, Jinlu Zhang, Jiyu Cui, Renjun Xu, Hongyang Chen, Xiaohui Fan, Huabin Xing, Huajun Chen

    Abstract: Large Language Models (LLMs) have emerged as a transformative power in enhancing natural language comprehension, representing a significant stride toward artificial general intelligence. The application of LLMs extends beyond conventional linguistic boundaries, encompassing specialized linguistic systems developed within various scientific disciplines. This growing interest has led to the advent o… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  19. arXiv:2401.12242  [pdf, other

    cs.CR cs.LG

    BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

    Authors: Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li

    Abstract: Large language models (LLMs) are shown to benefit from chain-of-thought (COT) prompting, particularly when tackling tasks that require systematic reasoning processes. On the other hand, COT prompting also poses new vulnerabilities in the form of backdoor attacks, wherein the model will output unintended malicious content under specific backdoor-triggered conditions during inference. Traditional me… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted to ICLR2024

  20. arXiv:2311.06888  [pdf, other

    cs.LG cs.CR

    Preserving Node-level Privacy in Graph Neural Networks

    Authors: Zihang Xiang, Tianhao Wang, Di Wang

    Abstract: Differential privacy (DP) has seen immense applications in learning on tabular, image, and sequential data where instance-level privacy is concerned. In learning on graphs, contrastingly, works on node-level privacy are highly sparse. Challenges arise as existing DP protocols hardly apply to the message-passing mechanism in Graph Neural Networks (GNNs). In this study, we propose a solution that… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

  21. arXiv:2311.06575  [pdf

    cs.PL cs.LG

    Sparse Attention-Based Neural Networks for Code Classification

    Authors: Ziyang Xiang, Zaixi Zhang, Qi Liu

    Abstract: Categorizing source codes accurately and efficiently is a challenging problem in real-world programming education platform management. In recent years, model-based approaches utilizing abstract syntax trees (ASTs) have been widely applied to code classification tasks. We introduce an approach named the Sparse Attention-based neural network for Code Classification (SACC) in this paper. The approach… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: 2023 3rd International Conference on Digital Society and Intelligent Systems (DSInS 2023)

  22. arXiv:2310.18568  [pdf, ps, other

    cs.IT

    On the second-order zero differential spectra of some power functions over finite fields

    Authors: Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng

    Abstract: Boukerrou et al. (IACR Trans. Symmetric Cryptol. 2020(1), 331-362) introduced the notion of Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic). FBCT is a crucial table for the analysis of the resistance of bloc… ▽ More

    Submitted 27 October, 2023; originally announced October 2023.

  23. arXiv:2310.17498  [pdf, other

    cs.LG cs.CR

    CBD: A Certified Backdoor Detector Based on Local Dominant Probability

    Authors: Zhen Xiang, Zidi Xiong, Bo Li

    Abstract: Backdoor attack is a common threat to deep neural networks. During testing, samples embedded with a backdoor trigger will be misclassified as an adversarial target by a backdoored model, while samples without the backdoor trigger will be correctly classified. In this paper, we present the first certified backdoor detector (CBD), which is based on a novel, adjustable conformal prediction scheme bas… ▽ More

    Submitted 3 January, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted to NeurIPS 2023

  24. arXiv:2310.12008  [pdf, other

    cs.CL cs.AI

    Multi-view Contrastive Learning for Entity Typing over Knowledge Graphs

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: Knowledge graph entity typing (KGET) aims at inferring plausible types of entities in knowledge graphs. Existing approaches to KGET focus on how to better encode the knowledge provided by the neighbors and types of an entity into its representation. However, they ignore the semantic knowledge provided by the way in which types can be clustered together. In this paper, we propose a novel method cal… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: Accepted at EMNLP 2023 Main

  25. arXiv:2310.11901  [pdf, other

    cs.CR

    Malicious Agent Detection for Robust Multi-Agent Collaborative Perception

    Authors: Yangheng Zhao, Zhen Xiang, Sheng Yin, Xianghe Pang, Siheng Chen, Yanfeng Wang

    Abstract: Recently, multi-agent collaborative (MAC) perception has been proposed and outperformed the traditional single-agent perception in many applications, such as autonomous driving. However, MAC perception is more vulnerable to adversarial attacks than single-agent perception due to the information exchange. The attacker can easily degrade the performance of a victim agent by sending harmful informati… ▽ More

    Submitted 8 July, 2024; v1 submitted 18 October, 2023; originally announced October 2023.

    Comments: Accepted by IROS 2024

  26. arXiv:2310.08425  [pdf, other

    cs.LG cs.CR stat.ML

    Differentially Private Non-convex Learning for Multi-layer Neural Networks

    Authors: Hanpu Shen, Cheng-Long Wang, Zihang Xiang, Yiming Ying, Di Wang

    Abstract: This paper focuses on the problem of Differentially Private Stochastic Optimization for (multi-layer) fully connected neural networks with a single output node. In the first part, we examine cases with no hidden nodes, specifically focusing on Generalized Linear Models (GLMs). We investigate the well-specific model where the random noise possesses a zero mean, and the link function is both bounded… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  27. arXiv:2308.09850  [pdf, other

    cs.LG cs.CR

    Backdoor Mitigation by Correcting the Distribution of Neural Activations

    Authors: Xi Li, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor (Trojan) attacks are an important type of adversarial exploit against deep neural networks (DNNs), wherein a test instance is (mis)classified to the attacker's target class whenever the attacker's backdoor trigger is present. In this paper, we reveal and analyze an important property of backdoor attacks: a successful attack causes an alteration in the distribution of internal layer activa… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

  28. arXiv:2308.06512  [pdf, other

    cs.AI cs.CL

    HyperFormer: Enhancing Entity and Relation Interaction for Hyper-Relational Knowledge Graph Completion

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: Hyper-relational knowledge graphs (HKGs) extend standard knowledge graphs by associating attribute-value qualifiers to triples, which effectively represent additional fine-grained information about its associated triple. Hyper-relational knowledge graph completion (HKGC) aims at inferring unknown triples while considering its qualifiers. Most existing approaches to HKGC exploit a global-level grap… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

    Comments: Accepted at CIKM'23

  29. arXiv:2308.04617  [pdf, other

    cs.LG cs.CR

    Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Deep neural networks are vulnerable to backdoor attacks (Trojans), where an attacker poisons the training set with backdoor triggers so that the neural network learns to classify test-time triggers to the attacker's designated target class. Recent work shows that backdoor poisoning induces over-fitting (abnormally large activations) in the attacked model, which motivates a general, post-training c… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  30. arXiv:2306.15612  [pdf, other

    cs.CV

    Adaptive Multi-Modal Cross-Entropy Loss for Stereo Matching

    Authors: Peng Xu, Zhiyu Xiang, Chenyu Qiao, Jingyun Fu, Tianyu Pu

    Abstract: Despite the great success of deep learning in stereo matching, recovering accurate disparity maps is still challenging. Currently, L1 and cross-entropy are the two most widely used losses for stereo network training. Compared with the former, the latter usually performs better thanks to its probability modeling and direct supervision to the cost volume. However, how to accurately model the stereo… ▽ More

    Submitted 15 March, 2024; v1 submitted 27 June, 2023; originally announced June 2023.

  31. arXiv:2305.18651  [pdf, other

    cs.LG cs.CR cs.CV

    UMD: Unsupervised Model Detection for X2X Backdoor Attacks

    Authors: Zhen Xiang, Zidi Xiong, Bo Li

    Abstract: Backdoor (Trojan) attack is a common threat to deep neural networks, where samples from one or more source classes embedded with a backdoor trigger will be misclassified to adversarial target classes. Existing methods for detecting whether a classifier is backdoor attacked are mostly designed for attacks with a single adversarial target (e.g., all-to-one attack). To the best of our knowledge, with… ▽ More

    Submitted 15 November, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Proceedings of the 40th International Conference on Machine Learning

    Journal ref: Proceedings of the 40th International Conference on Machine Learning, PMLR 202:38013-38038, 2023

  32. arXiv:2305.13380  [pdf, other

    astro-ph.IM astro-ph.CO astro-ph.EP astro-ph.GA cs.DC

    SWIFT: A modern highly-parallel gravity and smoothed particle hydrodynamics solver for astrophysical and cosmological applications

    Authors: Matthieu Schaller, Josh Borrow, Peter W. Draper, Mladen Ivkovic, Stuart McAlpine, Bert Vandenbroucke, Yannick Bahé, Evgenii Chaikin, Aidan B. G. Chalk, Tsang Keung Chan, Camila Correa, Marcel van Daalen, Willem Elbers, Pedro Gonnet, Loïc Hausammann, John Helly, Filip Huško, Jacob A. Kegerreis, Folkert S. J. Nobels, Sylvia Ploeckinger, Yves Revaz, William J. Roper, Sergio Ruiz-Bonilla, Thomas D. Sandnes, Yolan Uyttenhove , et al. (2 additional authors not shown)

    Abstract: Numerical simulations have become one of the key tools used by theorists in all the fields of astrophysics and cosmology. The development of modern tools that target the largest existing computing systems and exploit state-of-the-art numerical methods and algorithms is thus crucial. In this paper, we introduce the fully open-source highly-parallel, versatile, and modular coupled hydrodynamics, gra… ▽ More

    Submitted 29 March, 2024; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: 43 pages, 20 figures, accepted for publication in MNRAS. Code, documentation, and examples available at www.swiftsim.com

    Journal ref: MNRAS, Volume 530, Issue 2, May 2024, Pages 2378-2419

  33. arXiv:2305.06572  [pdf, other

    cs.DC

    Scheduling Multi-Server Jobs with Sublinear Regrets via Online Learning

    Authors: Hailiang Zhao, Shuiguang Deng, Zhengzhe Xiang, Xueqiang Yan, Jianwei Yin, Schahram Dustdar, Albert Y. Zomaya

    Abstract: Multi-server jobs that request multiple computing resources and hold onto them during their execution dominate modern computing clusters. When allocating the multi-type resources to several co-located multi-server jobs simultaneously in online settings, it is difficult to make the tradeoff between the parallel computation gain and the internal communication overhead, apart from the resource conten… ▽ More

    Submitted 5 August, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

  34. arXiv:2304.09762  [pdf, other

    cs.LG cs.AI cs.CR

    Practical Differentially Private and Byzantine-resilient Federated Learning

    Authors: Zihang Xiang, Tianhao Wang, Wanyu Lin, Di Wang

    Abstract: Privacy and Byzantine resilience are two indispensable requirements for a federated learning (FL) system. Although there have been extensive studies on privacy and Byzantine security in their own track, solutions that consider both remain sparse. This is due to difficulties in reconciling privacy-preserving and Byzantine-resilient algorithms. In this work, we propose a solution to such a two-fol… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

  35. arXiv:2304.03323  [pdf, other

    cs.SD cs.CV cs.MM eess.AS

    DSVAE: Interpretable Disentangled Representation for Synthetic Speech Detection

    Authors: Amit Kumar Singh Yadav, Kratika Bhagtani, Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Tools to generate high quality synthetic speech signal that is perceptually indistinguishable from speech recorded from human speakers are easily available. Several approaches have been proposed for detecting synthetic speech. Many of these approaches use deep learning methods as a black box without providing reasoning for the decisions they make. This limits the interpretability of these approach… ▽ More

    Submitted 28 July, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

  36. arXiv:2212.02861  [pdf, other

    cs.LG

    RBF-MGN:Solving spatiotemporal PDEs with Physics-informed Graph Neural Network

    Authors: Zixue Xiang, Wei Peng, Wen Yao

    Abstract: Physics-informed neural networks (PINNs) have lately received significant attention as a representative deep learning-based technique for solving partial differential equations (PDEs). Most fully connected network-based PINNs use automatic differentiation to construct loss functions that suffer from slow convergence and difficult boundary enforcement. In addition, although convolutional neural net… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: 21 pages,20 figures

  37. H4VDM: H.264 Video Device Matching

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Methods that can determine if two given video sequences are captured by the same device (e.g., mobile telephone or digital camera) can be used in many forensics tasks. In this paper we refer to this as "video device matching". In open-set video forensics scenarios it is easier to determine if two video sequences were captured with the same device than identifying the specific device. In this paper… ▽ More

    Submitted 22 August, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

  38. arXiv:2210.11151  [pdf, other

    cs.AI

    Transformer-based Entity Typing in Knowledge Graphs

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Ru Li, Jeff Z. Pan

    Abstract: We investigate the knowledge graph entity typing task which aims at inferring plausible entity types. In this paper, we propose a novel Transformer-based Entity Typing (TET) approach, effectively encoding the content of neighbors of an entity. More precisely, TET is composed of three different mechanisms: a local transformer allowing to infer missing types of an entity by independently encoding th… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

    Comments: Paper accepted at EMNLP 2022

  39. arXiv:2210.10272  [pdf, other

    cs.LG cs.CR cs.CV

    Training set cleansing of backdoor poisoning by self-supervised representation learning

    Authors: H. Wang, S. Karami, O. Dia, H. Ritter, E. Emamjomeh-Zadeh, J. Chen, Z. Xiang, D. J. Miller, G. Kesidis

    Abstract: A backdoor or Trojan attack is an important type of data poisoning attack against deep neural network (DNN) classifiers, wherein the training dataset is poisoned with a small number of samples that each possess the backdoor pattern (usually a pattern that is either imperceptible or innocuous) and which are mislabeled to the attacker's target class. When trained on a backdoor-poisoned dataset, a DN… ▽ More

    Submitted 14 March, 2023; v1 submitted 18 October, 2022; originally announced October 2022.

  40. arXiv:2207.03539  [pdf, other

    cs.CV

    RWT-SLAM: Robust Visual SLAM for Highly Weak-textured Environments

    Authors: Qihao Peng, Zhiyu Xiang, YuanGang Fan, Tengqi Zhao, Xijun Zhao

    Abstract: As a fundamental task for intelligent robots, visual SLAM has made great progress over the past decades. However, robust SLAM under highly weak-textured environments still remains very challenging. In this paper, we propose a novel visual SLAM system named RWT-SLAM to tackle this problem. We modify LoFTR network which is able to produce dense point matching under low-textured scenes to generate fe… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

    Comments: 8 pages, 7 figures

  41. arXiv:2206.09463  [pdf, other

    cs.RO

    RF-LIO: Removal-First Tightly-coupled Lidar Inertial Odometry in High Dynamic Environments

    Authors: Chenglong Qian, Zhaohong Xiang, Zhuoran Wu, Hongbin Sun

    Abstract: Simultaneous Localization and Mapping (SLAM) is considered to be an essential capability for intelligent vehicles and mobile robots. However, most of the current lidar SLAM approaches are based on the assumption of a static environment. Hence the localization in a dynamic environment with multiple moving objects is actually unreliable. The paper proposes a dynamic SLAM framework RF-LIO, building o… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

  42. arXiv:2205.15202  [pdf, other

    cs.CR

    A Small Leak Will Sink Many Ships: Vulnerabilities Related to Mini Programs Permissions

    Authors: Jianyi Zhang, Leixin Yang, Yuyang Han, Zhi Sun, Zixiao Xiang

    Abstract: As a new format of mobile application, mini programs, which function within a larger app and are built with HTML, CSS, and JavaScript web technology, have become the way to do almost everything in China. This paper presents our research on the permissions of mini programs. We conducted a systematic study on 9 popular mobile app ecosystems, which host over 7 million mini programs, and tested over 2… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  43. arXiv:2205.15170  [pdf, other

    eess.IV cs.CR cs.CV

    GAN-based Medical Image Small Region Forgery Detection via a Two-Stage Cascade Framework

    Authors: Jianyi Zhang, Xuanxi Huang, Yaqi Liu, Yuyang Han, Zixiao Xiang

    Abstract: Using generative adversarial network (GAN)\cite{RN90} for data enhancement of medical images is significantly helpful for many computer-aided diagnosis (CAD) tasks. A new attack called CT-GAN has emerged. It can inject or remove lung cancer lesions to CT scans. Because the tampering region may even account for less than 1\% of the original image, even state-of-the-art methods are challenging to de… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  44. arXiv:2205.13280  [pdf, other

    cs.CV

    Objects Matter: Learning Object Relation Graph for Robust Camera Relocalization

    Authors: Chengyu Qiao, Zhiyu Xiang, Xinglu Wang

    Abstract: Visual relocalization aims to estimate the pose of a camera from one or more images. In recent years deep learning based pose regression methods have attracted many attentions. They feature predicting the absolute poses without relying on any prior built maps or stored images, making the relocalization very efficient. However, robust relocalization under environments with complex appearance change… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  45. arXiv:2205.06900  [pdf, other

    cs.LG cs.CR

    MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic

    Authors: Hang Wang, Zhen Xiang, David J. Miller, George Kesidis

    Abstract: Backdoor attacks are an important type of adversarial threat against deep neural network classifiers, wherein test samples from one or more source classes will be (mis)classified to the attacker's target class when a backdoor pattern is embedded. In this paper, we focus on the post-training backdoor defense scenario commonly considered in the literature, where the defender aims to detect whether a… ▽ More

    Submitted 6 August, 2023; v1 submitted 13 May, 2022; originally announced May 2022.

  46. arXiv:2205.00782  [pdf, other

    cs.AI cs.LG

    Type-aware Embeddings for Multi-Hop Reasoning over Knowledge Graphs

    Authors: Zhiwei Hu, Víctor Gutiérrez-Basulto, Zhiliang Xiang, Xiaoli Li, Ru Li, Jeff Z. Pan

    Abstract: Multi-hop reasoning over real-life knowledge graphs (KGs) is a highly challenging problem as traditional subgraph matching methods are not capable to deal with noise and missing information. To address this problem, it has been recently introduced a promising approach based on jointly embedding logical queries and KGs into a low-dimensional space to identify answer entities. However, existing prop… ▽ More

    Submitted 4 July, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

    Comments: Accepted to IJCAI-ECAI 2022

  47. arXiv:2204.12067  [pdf, other

    cs.CV cs.MM

    An Overview of Recent Work in Media Forensics: Methods and Threats

    Authors: Kratika Bhagtani, Amit Kumar Singh Yadav, Emily R. Bartusiak, Ziyue Xiang, Ruiting Shao, Sriram Baireddy, Edward J. Delp

    Abstract: In this paper, we review recent work in media forensics for digital images, video, audio (specifically speech), and documents. For each data modality, we discuss synthesis and manipulation techniques that can be used to create and modify digital media. We then review technological advancements for detecting and quantifying such manipulations. Finally, we consider open issues and suggest directions… ▽ More

    Submitted 12 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: This is a longer version of a paper accepted to the 2022 IEEE International Conference on Multimedia Information Processing and Retrieval entitled "An Overview of Recent Work in Multimedia Forensics"

  48. arXiv:2204.00754  [pdf, other

    cs.CV

    Homography Loss for Monocular 3D Object Detection

    Authors: Jiaqi Gu, Bojian Wu, Lubin Fan, Jianqiang Huang, Shen Cao, Zhiyu Xiang, Xian-Sheng Hua

    Abstract: Monocular 3D object detection is an essential task in autonomous driving. However, most current methods consider each 3D object in the scene as an independent training sample, while ignoring their inherent geometric relations, thus inevitably resulting in a lack of leveraging spatial constraints. In this paper, we propose a novel method that takes all the objects into consideration and explores th… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages, 5 figures. Accepted to CVPR 2022

  49. Forensic Analysis and Localization of Multiply Compressed MP3 Audio Using Transformers

    Authors: Ziyue Xiang, Paolo Bestagini, Stefano Tubaro, Edward J. Delp

    Abstract: Audio signals are often stored and transmitted in compressed formats. Among the many available audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and widely used. Since MP3 is lossy it leaves characteristic traces in the compressed audio which can be used forensically to expose the past history of an audio file. In this paper, we consider the scenario of audio signal manipulat… ▽ More

    Submitted 28 April, 2022; v1 submitted 30 March, 2022; originally announced March 2022.

  50. arXiv:2203.06871  [pdf, other

    cs.DC cs.PF

    Block-STM: Scaling Blockchain Execution by Turning Ordering Curse to a Performance Blessing

    Authors: Rati Gelashvili, Alexander Spiegelman, Zhuolun Xiang, George Danezis, Zekun Li, Dahlia Malkhi, Yu Xia, Runtian Zhou

    Abstract: Block-STM is a parallel execution engine for smart contracts, built around the principles of Software Transactional Memory. Transactions are grouped in blocks, and every execution of the block must yield the same deterministic outcome. Block-STM further enforces that the outcome is consistent with executing transactions according to a preset order, leveraging this order to dynamically detect depen… ▽ More

    Submitted 25 August, 2022; v1 submitted 14 March, 2022; originally announced March 2022.