Skip to main content

Showing 1–23 of 23 results for author: Xiong, Q

  1. arXiv:2406.04777  [pdf, other

    cs.LG

    TDT Loss Takes It All: Integrating Temporal Dependencies among Targets into Non-Autoregressive Time Series Forecasting

    Authors: Qi Xiong, Kai Tang, Minbo Ma, Jie Xu, Tianrui Li

    Abstract: Learning temporal dependencies among targets (TDT) benefits better time series forecasting, where targets refer to the predicted sequence. Although autoregressive methods model TDT recursively, they suffer from inefficient inference and error accumulation. We argue that integrating TDT learning into non-autoregressive methods is essential for pursuing effective and efficient time series forecastin… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  2. arXiv:2403.20091  [pdf, other

    cs.IT eess.SP

    A Signature Based Approach Towards Global Channel Charting with Ultra Low Complexity

    Authors: Longhai Zhao, Yunchuan Yang, Qi Xiong, He Wang, Bin Yu, Feifei Sun, Chengjun Sun

    Abstract: Channel charting, an unsupervised learning method that learns a low-dimensional representation from channel information to preserve geometrical property of physical space of user equipments (UEs), has drawn many attentions from both academic and industrial communities, because it can facilitate many downstream tasks, such as indoor localization, UE handover, beam management, and so on. However, ma… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: accepted by IEEE ICC 2024 Workshops

  3. arXiv:2403.07246  [pdf, other

    cs.CV

    Towards Zero-shot Human-Object Interaction Detection via Vision-Language Integration

    Authors: Weiying Xue, Qi Liu, Qiwei Xiong, Yuxiao Wang, Zhenao Wei, Xiaofen Xing, Xiangmin Xu

    Abstract: Human-object interaction (HOI) detection aims to locate human-object pairs and identify their interaction categories in images. Most existing methods primarily focus on supervised learning, which relies on extensive manual HOI annotations. In this paper, we propose a novel framework, termed Knowledge Integration to HOI (KI2HOI), that effectively integrates the knowledge of visual-language model to… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  4. arXiv:2403.01804  [pdf, other

    cs.CV

    PointCore: Efficient Unsupervised Point Cloud Anomaly Detector Using Local-Global Features

    Authors: Baozhu Zhao, Qiwei Xiong, Xiaohan Zhang, Jingfeng Guo, Qi Liu, Xiaofen Xing, Xiangmin Xu

    Abstract: Three-dimensional point cloud anomaly detection that aims to detect anomaly data points from a training set serves as the foundation for a variety of applications, including industrial inspection and autonomous driving. However, existing point cloud anomaly detection methods often incorporate multiple feature memory banks to fully preserve local and global representations, which comes at the high… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  5. arXiv:2401.13941  [pdf

    cs.RO

    AC-Driven Series Elastic Electrohydraulic Actuator for Stable and Smooth Displacement Output

    Authors: Quan Xiong, Xuanyi Zhou, Dannuo Li, Raye Chen-Hua Yeow

    Abstract: Soft electrohydraulic actuators known as HASEL actuators have attracted widespread research interest due to their outstanding dynamic performance and high output power. However, the displacement of electrohydraulic actuators usually declines with time under constant DC voltage, which hampers its prospective application. A mathematical model is firstly established to not only explain the decrease i… ▽ More

    Submitted 27 February, 2024; v1 submitted 24 January, 2024; originally announced January 2024.

  6. arXiv:2312.04180  [pdf, other

    cs.AI cs.CY econ.GN

    AI and Jobs: Has the Inflection Point Arrived? Evidence from an Online Labor Platform

    Authors: Dandan Qiao, Huaxia Rui, Qian Xiong

    Abstract: Artificial intelligence (AI) refers to the ability of machines or software to mimic or even surpass human intelligence in a given cognitive task. While humans learn by both induction and deduction, the success of current AI is rooted in induction, relying on its ability to detect statistical regularities in task input -- an ability learnt from a vast amount of training data using enormous computat… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 42 pages, 6 figures, 9 tables

    ACM Class: J.4

  7. arXiv:2309.11020  [pdf

    cs.RO

    An Amphibious Fully-Soft Miniature Crawling Robot Powered by Electrohydraulic Fluid Kinetic Energy

    Authors: Quan Xiong, Xuanyi Zhou, Jonathan William Ambrose, Raye Chen-Hua Yeow

    Abstract: Miniature locomotion robots with the ability to navigate confined environments show great promise for a wide range of tasks, including search and rescue operations. Soft miniature locomotion robots, as a burgeoning field, have attracted significant research interest due to their exceptional terrain adaptability and safety features. In this paper, we introduce a fully-soft miniature crawling robot… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  8. arXiv:2305.17654  [pdf, ps, other

    cs.CV

    MixDehazeNet : Mix Structure Block For Image Dehazing Network

    Authors: LiPing Lu, Qian Xiong, DuanFeng Chu, BingRong Xu

    Abstract: Image dehazing is a typical task in the low-level vision field. Previous studies verified the effectiveness of the large convolutional kernel and attention mechanism in dehazing. However, there are two drawbacks: the multi-scale properties of an image are readily ignored when a large convolutional kernel is introduced, and the standard series connection of an attention module does not sufficiently… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  9. arXiv:2304.08128  [pdf, other

    cs.DC

    AICons: An AI-Enabled Consensus Algorithm Driven by Energy Preservation and Fairness

    Authors: Qi Xiong, Nasrin Sohrabi, Hai Dong, Chenhao Xu, Zahir Tari

    Abstract: Blockchain has been used in several domains. However, this technology still has major limitations that are largely related to one of its core components, namely the consensus protocol/algorithm. Several solutions have been proposed in literature and some of them are based on the use of Machine Learning (ML) methods. The ML-based consensus algorithms usually waste the work done by the (contributing… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  10. arXiv:2302.13860  [pdf, other

    cs.CR cs.SE

    Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App

    Authors: Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Qi Xiong, Yuhao Liu, Qinghua Zheng, Ting Liu

    Abstract: Mini-app is an emerging form of mobile application that combines web technology with native capabilities. Its features, e.g., no need to download and no installation, have made it popular rapidly. However, privacy issues that violate the laws or regulations are breeding in the swiftly expanding mini-app ecosystem. The consistency between what the mini-app does about the data in the program code an… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  11. arXiv:2209.05732  [pdf, other

    cs.LG cs.AI

    Rényi Divergence Deep Mutual Learning

    Authors: Weipeng Huang, Junjie Tao, Changbo Deng, Ming Fan, Wenqiang Wan, Qi Xiong, Guangyuan Piao

    Abstract: This paper revisits Deep Mutual Learning (DML), a simple yet effective computing paradigm. We propose using Rényi divergence instead of the KL divergence, which is more flexible and tunable, to improve vanilla DML. This modification is able to consistently improve performance over vanilla DML with limited additional complexity. The convergence properties of the proposed paradigm are analyzed theor… ▽ More

    Submitted 24 July, 2023; v1 submitted 13 September, 2022; originally announced September 2022.

  12. arXiv:2203.03982  [pdf, other

    cs.IR

    Predictive and Contrastive: Dual-Auxiliary Learning for Recommendation

    Authors: Yinghui Tao, Min Gao, Junliang Yu, Zongwei Wang, Qingyu Xiong, Xu Wang

    Abstract: Self-supervised learning (SSL) recently has achieved outstanding success on recommendation. By setting up an auxiliary task (either predictive or contrastive), SSL can discover supervisory signals from the raw data without human annotation, which greatly mitigates the problem of sparse user-item interactions. However, most SSL-based recommendation models rely on general-purpose auxiliary tasks, e.… ▽ More

    Submitted 23 July, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

  13. arXiv:2008.04185  [pdf, other

    cs.IR

    Path-Based Reasoning over Heterogeneous Networks for Recommendation via Bidirectional Modeling

    Authors: Junwei Zhang, Min Gao, Junliang Yu, Linda Yang, Zongwei Wang, Qingyu Xiong

    Abstract: Heterogeneous Information Network (HIN) is a natural and general representation of data in recommender systems. Combining HIN and recommender systems can not only help model user behaviors but also make the recommendation results explainable by aligning the users/items with various types of entities in the network. Over the past few years, path-based reasoning models have shown great capacity in H… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: 11 pages, 5 figures, Neurocomputing

  14. arXiv:2003.02474  [pdf, other

    cs.IR cs.LG

    Recommender Systems Based on Generative Adversarial Networks: A Problem-Driven Perspective

    Authors: Min Gao, Junwei Zhang, Junliang Yu, Jundong Li, Junhao Wen, Qingyu Xiong

    Abstract: Recommender systems (RSs) now play a very important role in the online lives of people as they serve as personalized filters for users to find relevant items from an array of options. Owing to their effectiveness, RSs have been widely employed in consumer-oriented e-commerce platforms. However, despite their empirical successes, these systems still suffer from two limitations: data noise and data… ▽ More

    Submitted 20 September, 2020; v1 submitted 5 March, 2020; originally announced March 2020.

    Comments: 24 pages, 12 figures, 8 tables, the journal of Information Sciences

  15. arXiv:1905.05359  [pdf, other

    cs.DC cs.AR

    Fully Integrated On-FPGA Molecular Dynamics Simulations

    Authors: Chen Yang, Tong Geng, Tianqi Wang, Rushi Patel, Qingqing Xiong, Ahmed Sanaullah, Jiayi Sheng, Charles Lin, Vipin Sachdeva, Woody Sherman, Martin C. Herbordt

    Abstract: The implementation of Molecular Dynamics (MD) on FPGAs has received substantial attention. Previous work, however, has consisted of either proof-of-concept implementations of components, usually the range-limited force; full systems, but with much of the work shared by the host CPU; or prototype demonstrations, e.g., using OpenCL, that neither implement a whole system nor have competitive performa… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Comments: 13 pages, 17 figures;

  16. arXiv:1901.06838  [pdf, other

    cs.MM

    Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram

    Authors: Yanzhen Ren, Dengkai Liu, Qiaochu Xiong, Jianming Fu, Lina Wang

    Abstract: The widespread application of audio and video communication technology make the compressed audio data flowing over the Internet, and make it become an important carrier for covert communication. There are many steganographic schemes emerged in the mainstream audio compression data, such as AAC and MP3, followed by many steganalysis schemes. However, these steganalysis schemes are only effective in… ▽ More

    Submitted 26 February, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: 12 pages, 11 figures, 5 tables

  17. arXiv:1811.01027  [pdf, other

    cs.CR cs.LG

    AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection

    Authors: Yanfang Ye, Shifu Hou, Lingwei Chen, Jingwei Lei, Wenqiang Wan, Jiabin Wang, Qi Xiong, Fudong Shao

    Abstract: The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting mobile users against novel threats. In this paper, we first extract the runtime Application Programming Interface (API) call sequences from Android apps, and then analyze higher-level semantic relations within the ecosystem to comprehensively characterize the apps.… ▽ More

    Submitted 20 May, 2019; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: The revised version will be published in IJCAI'2019 entitled "Out-of-sample Node Representation Learning for Heterogeneous Graph in Real-time Android Malware Detection"

  18. arXiv:1802.03880  [pdf

    cs.IT

    Towards the Standardization of Non-orthogonal Multiple Access for Next Generation Wireless Networks

    Authors: Yan Chen, Alireza Bayesteh, Yiqun Wu, Bin Ren, Shaoli Kang, Shaohui Sun, Qi Xiong, Chen Qian, Bin Yu, Zhiguo Ding, Sen Wang, Shuangfeng Han, Xiaolin Hou, Hao Lin, Raphael Visoz, Razieh Razavi

    Abstract: Non-orthogonal multiple access (NoMA) as an efficient way of radio resource sharing can root back to the network information theory. For generations of wireless communication systems design, orthogonal multiple access (OMA) schemes in time, frequency, or code domain have been the main choices due to the limited processing capability in the transceiver hardware, as well as the modest traffic demand… ▽ More

    Submitted 11 February, 2018; originally announced February 2018.

    Comments: 4500 words, 6 figures, accepted, IEEE Communications Magazine Mar 2018

  19. arXiv:1709.02891  [pdf, ps, other

    cs.CR eess.SY

    Defend against advanced persistent threats: An optimal control approach

    Authors: Pengdeng Li, Lu-Xing Yang, Xiaofan Yang, Qingyu Xiong, Junhao Wen, Yuan Yan Tang

    Abstract: The new cyber attack pattern of advanced persistent threat (APT) has posed a serious threat to modern society. This paper addresses the APT defense problem, i.e., the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control pr… ▽ More

    Submitted 27 December, 2017; v1 submitted 8 September, 2017; originally announced September 2017.

  20. arXiv:1704.06920  [pdf, other

    cs.SI

    Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study

    Authors: Pengdeng Li, Xiaofan Yang, Lu-Xing Yang, Qingyu Xiong, Yingbo Wu, Yuan Yan Tang

    Abstract: As compared to the traditional advertising, the word-of-mouth (WOM) communications have striking advantages such as significantly lower cost and rapid delivery; this is especially the case with the popularity of online social networks. This paper addresses the issue of maximizing the overall profit of a WOM marketing campaign. A marketing process with both positive and negative WOM is modeled as a… ▽ More

    Submitted 23 April, 2017; originally announced April 2017.

  21. arXiv:1505.00058  [pdf, other

    cs.CC

    Transforming NP to P: An Approach to Solve NP Complete Problems

    Authors: Wenhong Tian, GuoZhong Li, Xinyang Wang, Qin Xiong, Yaqiu Jiang

    Abstract: NP complete problem is one of the most challenging issues. The question of whether all problems in NP are also in P is generally considered one of the most important open questions in mathematics and theoretical computer science as it has far-reaching consequences to other problems in mathematics, computer science, biology, philosophy and cryptography. There are intensive research on proving `NP n… ▽ More

    Submitted 28 April, 2015; originally announced May 2015.

    Comments: 10 pages

    ACM Class: F.2.2

  22. arXiv:1502.00447  [pdf, other

    cs.DS

    Obtaining Quality-Proved Near Optimal Results for Traveling Salesman Problem

    Authors: Wenhong Tian, Chaojie Huang, Xinyang Wang, Qin Xiong

    Abstract: The traveling salesman problem (TSP) is one of the most challenging NP-hard problems. It has widely applications in various disciplines such as physics, biology, computer science and so forth. The best known approximation algorithm for Symmetric TSP (STSP) whose cost matrix satisfies the triangle inequality (called $\triangle$STSP) is Christofides algorithm which was proposed in 1976 and is a… ▽ More

    Submitted 11 December, 2016; v1 submitted 2 February, 2015; originally announced February 2015.

    Comments: 10 pages

    Report number: Technical Report 20150129 MSC Class: Algorithm ACM Class: F.2.2

  23. arXiv:1501.05789  [pdf, other

    cs.DC

    FlexCloud: A Flexible and Extendible Simulator for Performance Evaluation of Virtual Machine Allocation

    Authors: Minxian Xu, Wenhong Tian, Xinyang Wang, Qin Xiong

    Abstract: Cloud Data centers aim to provide reliable, sustainable and scalable services for all kinds of applications. Resource scheduling is one of keys to cloud services. To model and evaluate different scheduling policies and algorithms, we propose FlexCloud, a flexible and scalable simulator that enables users to simulate the process of initializing cloud data centers, allocating virtual machine request… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.