Skip to main content

Showing 1–15 of 15 results for author: Yang, L T

  1. arXiv:2406.06039  [pdf, other

    cs.CV

    Diving into Underwater: Segment Anything Model Guided Underwater Salient Instance Segmentation and A Large-scale Dataset

    Authors: Shijie Lian, Ziyi Zhang, Hua Li, Wenjie Li, Laurence Tianruo Yang, Sam Kwong, Runmin Cong

    Abstract: With the breakthrough of large models, Segment Anything Model (SAM) and its extensions have been attempted to apply in diverse tasks of computer vision. Underwater salient instance segmentation is a foundational and vital step for various underwater vision tasks, which often suffer from low segmentation accuracy due to the complex underwater circumstances and the adaptive ability of models. Moreov… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted to ICML 2024, Code released at: https://github.com/LiamLian0727/USIS10K

  2. arXiv:2403.01182  [pdf, other

    cs.CR

    d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases

    Authors: Dongli Liu, Wei Wang, Peng Xu, Laurence T. Yang, Bo Luo, Kaitai Liang

    Abstract: Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently handle and protect large-scale data storage in encrypted databases (EDBs). Volume leakage poses a significant threat, as it enables adversaries to reconstruct search queries and potentially compromise the security and privacy of data. Padding strategies are common countermeasures for the leakage, but they significantly in… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 23pages, 13 figures, will be published in USENIX Security'24

  3. arXiv:2403.01155  [pdf, other

    cs.CR

    Query Recovery from Easy to Hard: Jigsaw Attack against SSE

    Authors: Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang

    Abstract: Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge related to the user's database to recover queries. We find that the effectiveness of query recovery attacks depends on the volume/frequency distribution of keywords. Queries containing ke… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: 21 pages, accepted in USENIX Security 2024

  4. arXiv:2402.02088  [pdf, other

    cs.CV

    DCS-Net: Pioneering Leakage-Free Point Cloud Pretraining Framework with Global Insights

    Authors: Zhe Li, Zhangyang Gao, Cheng Tan, Stan Z. Li, Laurence T. Yang

    Abstract: Masked autoencoding and generative pretraining have achieved remarkable success in computer vision and natural language processing, and more recently, they have been extended to the point cloud domain. Nevertheless, existing point cloud models suffer from the issue of information leakage due to the pre-sampling of center points, which leads to trivial proxy tasks for the models. These approaches p… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  5. arXiv:2402.02045  [pdf, other

    cs.CV

    MLIP: Enhancing Medical Visual Representation with Divergence Encoder and Knowledge-guided Contrastive Learning

    Authors: Zhe Li, Laurence T. Yang, Bocheng Ren, Xin Nie, Zhangyang Gao, Cheng Tan, Stan Z. Li

    Abstract: The scarcity of annotated data has sparked significant interest in unsupervised pre-training methods that leverage medical reports as auxiliary signals for medical visual representation learning. However, existing research overlooks the multi-granularity nature of medical visual representation and lacks suitable contrastive learning techniques to improve the models' generalizability across differe… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  6. arXiv:2310.16861  [pdf, other

    cs.LG cs.CV

    General Point Model with Autoencoding and Autoregressive

    Authors: Zhe Li, Zhangyang Gao, Cheng Tan, Stan Z. Li, Laurence T. Yang

    Abstract: The pre-training architectures of large language models encompass various types, including autoencoding models, autoregressive models, and encoder-decoder models. We posit that any modality can potentially benefit from a large language model, as long as it undergoes vector quantization to become discrete tokens. Inspired by GLM, we propose a General Point Model (GPM) which seamlessly integrates au… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  7. arXiv:2309.07380  [pdf

    cs.SI

    Domain-adaptive Graph Attention-supervised Network for Cross-network Edge Classification

    Authors: Xiao Shen, Mengqiu Shao, Shirui Pan, Laurence T. Yang, Xi Zhou

    Abstract: Graph neural networks (GNNs) have shown great ability in modeling graphs, however, their performance would significantly degrade when there are noisy edges connecting nodes from different classes. To alleviate negative effect of noisy edges on neighborhood aggregation, some recent GNNs propose to predict the label agreement between node pairs within a single network. However, predicting the label… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: IEEE Transactions on Neural Networks and Learning Systems, 2023

  8. arXiv:2302.05628  [pdf, other

    cs.CR

    High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption

    Authors: Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang

    Abstract: Searchable symmetric encryption enables private queries over an encrypted database, but it also yields information leakages. Adversaries can exploit these leakages to launch injection attacks (Zhang et al., USENIX'16) to recover the underlying keywords from queries. The performance of the existing injection attacks is strongly dependent on the amount of leaked information or injection. In this wor… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

    Comments: 22 pages, 19 fugures, will be published in USENIX Security 2023

  9. arXiv:2301.01404  [pdf

    cs.SI

    Neighbor Contrastive Learning on Learnable Graph Augmentation

    Authors: Xiao Shen, Dewang Sun, Shirui Pan, Xi Zhou, Laurence T. Yang

    Abstract: Recent years, graph contrastive learning (GCL), which aims to learn representations from unlabeled graphs, has made great progress. However, the existing GCL methods mostly adopt human-designed graph augmentations, which are sensitive to various graph datasets. In addition, the contrastive losses originally developed in computer vision have been directly applied to graph data, where the neighborin… ▽ More

    Submitted 2 June, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

    Journal ref: Proceedings of AAAI Conference on Artificial Intelligence (AAAI), pp. 9782-9791, 2023

  10. arXiv:2210.06361  [pdf, other

    cs.CV

    MFFN: Multi-view Feature Fusion Network for Camouflaged Object Detection

    Authors: Dehua Zheng, Xiaochen Zheng, Laurence T. Yang, Yuan Gao, Chenlu Zhu, Yiheng Ruan

    Abstract: Recent research about camouflaged object detection (COD) aims to segment highly concealed objects hidden in complex surroundings. The tiny, fuzzy camouflaged objects result in visually indistinguishable properties. However, current single-view COD detectors are sensitive to background distractors. Therefore, blurred boundaries and variable shapes of the camouflaged objects are challenging to be fu… ▽ More

    Submitted 19 October, 2022; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: In Proceedings of the 2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)

  11. arXiv:2206.14368  [pdf, other

    cs.ET

    IMRSim: A Disk Simulator for Interlaced Magnetic Recording Technology

    Authors: Zhimin Zeng, Xinyu Chen, Laurence T Yang, Jinhua Cui

    Abstract: The emerging interlaced magnetic recording (IMR) technology achieves a higher areal density for hard disk drive (HDD) over the conventional magnetic recording (CMR) technology. IMR-based HDD interlaces top tracks and bottom tracks, where each bottom track is overlapped with two neighboring top tracks. Thus, top tracks can be updated without restraint, whereas bottom tracks can be updated by the ti… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 7 pages, 7 figures

  12. arXiv:2109.03220  [pdf, other

    cs.LG

    Revisiting Recursive Least Squares for Training Deep Neural Networks

    Authors: Chunyuan Zhang, Qi Song, Hui Zhou, Yigui Ou, Hongyao Deng, Laurence Tianruo Yang

    Abstract: Recursive least squares (RLS) algorithms were once widely used for training small-scale neural networks, due to their fast convergence. However, previous RLS algorithms are unsuitable for training deep neural networks (DNNs), since they have high computational complexity and too many preconditions. In this paper, to overcome these drawbacks, we propose three novel RLS optimization algorithms for t… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 12 pages,5 figures, IEEE Transactions on Neural Networks and Learning Systems under review

    MSC Class: 68T07 ACM Class: K.3.2

  13. Social-Similarity-aware TCP with Collision Avoidance in Ad-hoc Social Networks

    Authors: Hannan Bin Liaqat, Feng Xia, Jianhua Ma, Laurence Tianruo Yang, Ahmedin Mohammed Ahmed, Nana Yaw Asabere

    Abstract: Ad-hoc Social Network (ASNET), which explores social connectivity between users of mobile devices, is becoming one of the most important forms of today's internet. In this context, maximum bandwidth utilization of intermediate nodes in resource scarce environments is one of the challenging tasks. Traditional Transport Control Protocol (TCP) uses the round trip time mechanism for sharing bandwidth… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

    Comments: 10 pages, 10 figures

    Journal ref: IEEE Systems Journal, vol. 9, no.4, pp: 1273-1284, 2015

  14. Phone2Cloud: Exploiting Computation Offloading for Energy Saving on Smartphones in Mobile Cloud Computing

    Authors: Feng Xia, Fangwei Ding, Jie Li, Xiangjie Kong, Laurence T. Yang, Jianhua Ma

    Abstract: With prosperity of applications on smartphones, energy saving for smartphones has drawn increasing attention. In this paper we devise Phone2Cloud, a computation offloading-based system for energy saving on smartphones in the context of mobile cloud computing. Phone2Cloud offloads computation of an application running on smartphones to the cloud. The objective is to improve energy efficiency of sma… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

    Comments: 16 pages, 13 figures

    Journal ref: Information Systems Frontiers, 16(1): 95-111, 2014

  15. Safety Challenges and Solutions in Mobile Social Networks

    Authors: Yashar Najaflou, Behrouz Jedari, Feng Xia, Laurence T. Yang, Mohammad S. Obaidat

    Abstract: Mobile social networks (MSNs) are specific types of social media which consolidate the ability of omnipresent connection for mobile users/devices to share user-centric data objects among interested users. Taking advantage of the characteristics of both social networks and opportunistic networks, MSNs are capable of providing an efficient and effective mobile environment for users to access, share,… ▽ More

    Submitted 4 November, 2013; v1 submitted 22 October, 2013; originally announced October 2013.

    Comments: accepted, 21 pages, 13 figures, 3 tables. IEEE System Journal, 2013