Skip to main content

Showing 1–18 of 18 results for author: Xin, B

  1. arXiv:2401.09705  [pdf, other

    cs.RO eess.SY

    Learning Hybrid Policies for MPC with Application to Drone Flight in Unknown Dynamic Environments

    Authors: Zhaohan Feng, Jie Chen, Wei Xiao, Jian Sun, Bin Xin, Gang Wang

    Abstract: In recent years, drones have found increased applications in a wide array of real-world tasks. Model predictive control (MPC) has emerged as a practical method for drone flight control, owing to its robustness against modeling errors/uncertainties and external disturbances. However, MPC's sensitivity to manually tuned parameters can lead to rapid performance degradation when faced with unknown env… ▽ More

    Submitted 25 January, 2024; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: To be published in Unmanned Systems

  2. arXiv:2309.13839  [pdf, other

    eess.IV cs.CV

    Fill the K-Space and Refine the Image: Prompting for Dynamic and Multi-Contrast MRI Reconstruction

    Authors: Bingyu Xin, Meng Ye, Leon Axel, Dimitris N. Metaxas

    Abstract: The key to dynamic or multi-contrast magnetic resonance imaging (MRI) reconstruction lies in exploring inter-frame or inter-contrast information. Currently, the unrolled model, an approach combining iterative MRI reconstruction steps with learnable neural network layers, stands as the best-performing method for MRI reconstruction. However, there are two main limitations to overcome: firstly, the u… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: STACOM 2023; Code is available at https://github.com/hellopipu/PromptMR

  3. arXiv:2304.10985  [pdf, other

    cs.CR cs.AI cs.CV

    RSBA: Robust Statistical Backdoor Attack under Privilege-Constrained Scenarios

    Authors: Xiaolei Liu, Ming Yi, Kangyi Ding, Bangzhou Xin, Yixiao Xu, Li Yan, Chao Shen

    Abstract: Learning-based systems have been demonstrated to be vulnerable to backdoor attacks, wherein malicious users manipulate model performance by injecting backdoors into the target model and activating them with specific triggers. Previous backdoor attack methods primarily focused on two key metrics: attack success rate and stealthiness. However, these methods often necessitate significant privileges o… ▽ More

    Submitted 11 March, 2024; v1 submitted 21 April, 2023; originally announced April 2023.

    Comments: 11 pages, 10 figures

  4. arXiv:2210.11082  [pdf, other

    cs.CL cs.CR

    Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning

    Authors: Xiaoyi Chen, Baisong Xin, Shengfang Zhai, Shiqing Ma, Qingni Shen, Zhonghai Wu

    Abstract: This paper finds that contrastive learning can produce superior sentence embeddings for pre-trained models but is also vulnerable to backdoor attacks. We present the first backdoor attack framework, BadCSE, for state-of-the-art sentence embeddings under supervised and unsupervised learning settings. The attack manipulates the construction of positive and negative pairs so that the backdoored sampl… ▽ More

    Submitted 20 October, 2022; originally announced October 2022.

  5. arXiv:2207.13253  [pdf, other

    cs.CR

    Fine-grained Private Knowledge Distillation

    Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang

    Abstract: Knowledge distillation has emerged as a scalable and effective way for privacy-preserving machine learning. One remaining drawback is that it consumes privacy in a model-level (i.e., client-level) manner, every distillation query incurs privacy loss of one client's all records. In order to attain fine-grained privacy accountant and improve utility, this work proposes a model-free reverse $k$-NN la… ▽ More

    Submitted 6 April, 2023; v1 submitted 26 July, 2022; originally announced July 2022.

  6. arXiv:2112.09760  [pdf, other

    eess.IV cs.CV

    Learned Half-Quadratic Splitting Network for MR Image Reconstruction

    Authors: Bingyu Xin, Timothy S. Phan, Leon Axel, Dimitris N. Metaxas

    Abstract: Magnetic Resonance (MR) image reconstruction from highly undersampled $k$-space data is critical in accelerated MR imaging (MRI) techniques. In recent years, deep learning-based methods have shown great potential in this task. This paper proposes a learned half-quadratic splitting algorithm for MR image reconstruction and implements the algorithm in an unrolled deep learning network architecture.… ▽ More

    Submitted 23 August, 2022; v1 submitted 17 December, 2021; originally announced December 2021.

    Comments: accepted for MIDL2022

  7. arXiv:2105.04934  [pdf, other

    cs.NE cs.AI

    A Hybrid Decomposition-based Multi-objective Evolutionary Algorithm for the Multi-Point Dynamic Aggregation Problem

    Authors: Guanqiang Gao, Bin Xin, Yi Mei, Shuxin Ding, Juan Li

    Abstract: An emerging optimisation problem from the real-world applications, named the multi-point dynamic aggregation (MPDA) problem, has become one of the active research topics of the multi-robot system. This paper focuses on a multi-objective MPDA problem which is to design an execution plan of the robots to minimise the number of robots and the maximal completion time of all the tasks. The strongly-cou… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

  8. Improving Person Re-identification with Iterative Impression Aggregation

    Authors: Dengpan Fu, Bo Xin, Jingdong Wang, Dongdong Chen, Jianmin Bao, Gang Hua, Houqiang Li

    Abstract: Our impression about one person often updates after we see more aspects of him/her and this process keeps iterating given more meetings. We formulate such an intuition into the problem of person re-identification (re-ID), where the representation of a query (probe) image is iteratively updated with new information from the candidates in the gallery. Specifically, we propose a simple attentional ag… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Comments: Accepted by Transactions on Image Processing

  9. arXiv:2005.00925  [pdf, other

    cs.CV eess.IV

    Multi-Modality Generative Adversarial Networks with Tumor Consistency Loss for Brain MR Image Synthesis

    Authors: Bingyu Xin, Yifan Hu, Yefeng Zheng, Hongen Liao

    Abstract: Magnetic Resonance (MR) images of different modalities can provide complementary information for clinical diagnosis, but whole modalities are often costly to access. Most existing methods only focus on synthesizing missing images between two modalities, which limits their robustness and efficiency when multiple modalities are missing. To address this problem, we propose a multi-modality generative… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

    Comments: 5 pages, 3 figures, accepted to IEEE ISBI 2020

  10. arXiv:1904.06513  [pdf

    cs.LG

    An Integrated Autoencoder-Based Filter for Sparse Big Data

    Authors: Baogui Xin, Wei Peng

    Abstract: We propose a novel filter for sparse big data, called an integrated autoencoder (IAE), which utilizes auxiliary information to mitigate data sparsity. The proposed model achieves an appropriate balance between prediction accuracy, convergence speed, and complexity. We implement experiments on a GPS trajectory dataset, and the results demonstrate that the IAE is more accurate and robust than some s… ▽ More

    Submitted 13 June, 2019; v1 submitted 13 April, 2019; originally announced April 2019.

  11. arXiv:1903.04489  [pdf

    cs.IR cs.LG stat.ML

    SPMF: A Social Trust and Preference Segmentation-based Matrix Factorization Recommendation Algorithm

    Authors: Wei Peng, Baogui Xin

    Abstract: The traditional social recommendation algorithm ignores the following fact: the preferences of users with trust relationships are not necessarily similar, and the consideration of user preference similarity should be limited to specific areas. A social trust and preference segmentation-based matrix factorization (SPMF) recommendation system is proposed to solve the above-mentioned problems. Experi… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

  12. arXiv:1712.07305  [pdf, other

    cs.AI

    Revisiting the Master-Slave Architecture in Multi-Agent Deep Reinforcement Learning

    Authors: Xiangyu Kong, Bo Xin, Fangchen Liu, Yizhou Wang

    Abstract: Many tasks in artificial intelligence require the collaboration of multiple agents. We exam deep reinforcement learning for multi-agent domains. Recent research efforts often take the form of two seemingly conflicting perspectives, the decentralized perspective, where each agent is supposed to have its own controller; and the centralized perspective, where one assumes there is a larger model contr… ▽ More

    Submitted 19 December, 2017; originally announced December 2017.

  13. arXiv:1706.02815  [pdf, other

    cs.LG

    From Bayesian Sparsity to Gated Recurrent Nets

    Authors: Hao He, Bo Xin, David Wipf

    Abstract: The iterations of many first-order algorithms, when applied to minimizing common regularized regression functions, often resemble neural network layers with pre-specified weights. This observation has prompted the development of learning-based approaches that purport to replace these iterations with enhanced surrogates forged as DNN models from available training data. For example, important NP-ha… ▽ More

    Submitted 2 August, 2017; v1 submitted 8 June, 2017; originally announced June 2017.

  14. arXiv:1702.05573  [pdf, other

    cs.CV

    Collaborative Deep Reinforcement Learning for Joint Object Search

    Authors: Xiangyu Kong, Bo Xin, Yizhou Wang, Gang Hua

    Abstract: We examine the problem of joint top-down active search of multiple objects under interaction, e.g., person riding a bicycle, cups held by the table, etc.. Such objects under interaction often can provide contextual cues to each other to facilitate more efficient search. By treating each detector as an agent, we present the first collaborative multi-agent deep reinforcement learning algorithm to le… ▽ More

    Submitted 18 February, 2017; originally announced February 2017.

  15. arXiv:1605.01636  [pdf, other

    cs.LG

    Maximal Sparsity with Deep Networks?

    Authors: Bo Xin, Yizhou Wang, Wen Gao, David Wipf

    Abstract: The iterations of many sparse estimation algorithms are comprised of a fixed linear filter cascaded with a thresholding nonlinearity, which collectively resemble a typical neural network layer. Consequently, a lengthy sequence of algorithm iterations can be viewed as a deep network with shared, hand-crafted layer weights. It is therefore quite natural to examine the degree to which a learned netwo… ▽ More

    Submitted 10 May, 2016; v1 submitted 5 May, 2016; originally announced May 2016.

  16. arXiv:1504.03707  [pdf, other

    cs.CV

    Background Subtraction via Generalized Fused Lasso Foreground Modeling

    Authors: Bo Xin, Yuan Tian, Yizhou Wang, Wen Gao

    Abstract: Background Subtraction (BS) is one of the key steps in video analysis. Many background models have been proposed and achieved promising performance on public data sets. However, due to challenges such as illumination change, dynamic background etc. the resulted foreground segmentation often consists of holes as well as background noise. In this regard, we consider generalized fused lasso regulariz… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

  17. arXiv:1503.07508  [pdf, other

    cs.LG stat.ML

    Stable Feature Selection from Brain sMRI

    Authors: Bo Xin, Lingjing Hu, Yizhou Wang, Wen Gao

    Abstract: Neuroimage analysis usually involves learning thousands or even millions of variables using only a limited number of samples. In this regard, sparse models, e.g. the lasso, are applied to select the optimal features and achieve high diagnosis accuracy. The lasso, however, usually results in independent unstable features. Stability, a manifest of reproducibility of statistical results subject to re… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

  18. arXiv:1406.2504  [pdf, ps, other

    cs.LG stat.ML

    Exploring Algorithmic Limits of Matrix Rank Minimization under Affine Constraints

    Authors: Bo Xin, David Wipf

    Abstract: Many applications require recovering a matrix of minimal rank within an affine constraint set, with matrix completion a notable special case. Because the problem is NP-hard in general, it is common to replace the matrix rank with the nuclear norm, which acts as a convenient convex surrogate. While elegant theoretical conditions elucidate when this replacement is likely to be successful, they are h… ▽ More

    Submitted 1 July, 2015; v1 submitted 10 June, 2014; originally announced June 2014.