Skip to main content

Showing 1–31 of 31 results for author: You, W

  1. arXiv:2406.02930  [pdf, other

    cs.CV

    P2PFormer: A Primitive-to-polygon Method for Regular Building Contour Extraction from Remote Sensing Images

    Authors: Tao Zhang, Shiqing Wei, Yikang Zhou, Muying Luo, Wenling You, Shunping Ji

    Abstract: Extracting building contours from remote sensing imagery is a significant challenge due to buildings' complex and diverse shapes, occlusions, and noise. Existing methods often struggle with irregular contours, rounded corners, and redundancy points, necessitating extensive post-processing to produce regular polygonal building contours. To address these challenges, we introduce a novel, streamlined… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2405.19598  [pdf, other

    cs.CR

    Evaluating the Effectiveness and Robustness of Visual Similarity-based Phishing Detection Models

    Authors: Fujiao Ji, Kiho Lee, Hyungjoon Koo, Wenhao You, Euijin Choo, Hyoungshick Kim, Doowon Kim

    Abstract: Phishing attacks pose a significant threat to Internet users, with cybercriminals elaborately replicating the visual appearance of legitimate websites to deceive victims. Visual similarity-based detection systems have emerged as an effective countermeasure, but their effectiveness and robustness in real-world scenarios have been unexplored. In this paper, we comprehensively scrutinize and evaluate… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 12 pages

  3. arXiv:2405.07551  [pdf, other

    cs.CL cs.AI

    MuMath-Code: Combining Tool-Use Large Language Models with Multi-perspective Data Augmentation for Mathematical Reasoning

    Authors: Shuo Yin, Weihao You, Zhilong Ji, Guoqiang Zhong, Jinfeng Bai

    Abstract: The tool-use Large Language Models (LLMs) that integrate with external Python interpreters have significantly enhanced mathematical reasoning capabilities for open-source LLMs, while tool-free methods chose another track: augmenting math reasoning data. However, a great method to integrate the above two research paths and combine their advantages remains to be explored. In this work, we firstly in… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: The state-of-the-art open-source tool-use LLMs for mathematical reasoning

  4. arXiv:2404.06779  [pdf, other

    cs.CV cs.GR

    Efficient and Scalable Chinese Vector Font Generation via Component Composition

    Authors: Jinyu Song, Weitao You, Shuhui Shi, Shuxuan Guo, Lingyun Sun, Wei Wang

    Abstract: Chinese vector font generation is challenging due to the complex structure and huge amount of Chinese characters. Recent advances remain limited to generating a small set of characters with simple structure. In this work, we first observe that most Chinese characters can be disassembled into frequently-reused components. Therefore, we introduce the first efficient and scalable Chinese vector font… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 15 pages, 23 figures

  5. arXiv:2402.00002  [pdf, other

    cs.NI

    Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network

    Authors: Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou

    Abstract: In B5G edge networks, end-to-end low-latency and high-reliability transmissions between edge computing nodes and terminal devices are essential. This paper investigates the queue-aware coding scheduling transmission of randomly arriving data packets, taking into account potential eavesdroppers in edge networks. To address these concerns, we introduce SCLER, a Protocol Data Units (PDU) Raptor-encod… ▽ More

    Submitted 4 October, 2023; originally announced February 2024.

  6. arXiv:2311.11549  [pdf, other

    cs.CV

    Unearthing Common Inconsistency for Generalisable Deepfake Detection

    Authors: Beilin Chu, Xuan Xu, Weike You, Linna Zhou

    Abstract: Deepfake has emerged for several years, yet efficient detection techniques could generalize over different manipulation methods require further research. While current image-level detection method fails to generalize to unseen domains, owing to the domain-shift phenomenon brought by CNN's strong inductive bias towards Deepfake texture, video-level one shows its potential to have both generalizatio… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 9 pages, 2 figures and 5 tables

  7. arXiv:2311.06122  [pdf, other

    cs.CV

    Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches

    Authors: Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang

    Abstract: Object detection has found extensive applications in various tasks, but it is also susceptible to adversarial patch attacks. Existing defense methods often necessitate modifications to the target model or result in unacceptable time overhead. In this paper, we adopt a counterattack approach, following the principle of "fight fire with fire," and propose a novel and general methodology for defendin… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

  8. arXiv:2310.19319  [pdf, other

    stat.ML cs.LG

    Dual-Directed Algorithm Design for Efficient Pure Exploration

    Authors: Chao Qin, Wei You

    Abstract: We consider pure-exploration problems in the context of stochastic sequential adaptive experiments with a finite set of alternative options. The goal of the decision-maker is to accurately answer a query question regarding the alternatives with high confidence with minimal measurement efforts. A typical query question is to identify the alternative with the best performance, leading to ranking and… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: An earlier version of this paper appeared as an extended abstract in the Proceedings of the 36th Annual Conference on Learning Theory, COLT'23, with the title "Information-Directed Selection for Top-Two Algorithms.''

  9. arXiv:2310.18603  [pdf, other

    cs.LG

    Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers

    Authors: Wencong You, Zayd Hammoudeh, Daniel Lowd

    Abstract: Backdoor attacks manipulate model predictions by inserting innocuous triggers into training and test data. We focus on more realistic and more challenging clean-label attacks where the adversarial training examples are correctly labeled. Our attack, LLMBkd, leverages language models to automatically insert diverse style-based triggers into texts. We also propose a poison selection technique to imp… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

    Comments: Accepted at EMNLP 2023 Findings

  10. arXiv:2310.16316  [pdf, other

    cs.LG cs.AI

    Sum-of-Parts Models: Faithful Attributions for Groups of Features

    Authors: Weiqiu You, Helen Qu, Marco Gatti, Bhuvnesh Jain, Eric Wong

    Abstract: An explanation of a machine learning model is considered "faithful" if it accurately reflects the model's decision-making process. However, explanations such as feature attributions for deep learning are not guaranteed to be faithful, and can produce potentially misleading interpretations. In this work, we develop Sum-of-Parts (SOP), a class of models whose predictions come with grouped feature at… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  11. arXiv:2310.12419  [pdf, other

    cs.CR

    Toward Unbiased Multiple-Target Fuzzing with Path Diversity

    Authors: Huanyao Rong, Wei You, Xiaofeng Wang, Tianhao Mao

    Abstract: In this paper, we propose a novel directed fuzzing solution named AFLRun, which features target path-diversity metric and unbiased energy assignment. Firstly, we develop a new coverage metric by maintaining extra virgin map for each covered target to track the coverage status of seeds that hit the target. This approach enables the storage of waypoints into the corpus that hit a target through inte… ▽ More

    Submitted 6 June, 2024; v1 submitted 18 October, 2023; originally announced October 2023.

  12. arXiv:2310.08185  [pdf, other

    cs.CL cs.AI

    EIPE-text: Evaluation-Guided Iterative Plan Extraction for Long-Form Narrative Text Generation

    Authors: Wang You, Wenshan Wu, Yaobo Liang, Shaoguang Mao, Chenfei Wu, Maosong Cao, Yuzhe Cai, Yiduo Guo, Yan Xia, Furu Wei, Nan Duan

    Abstract: Plan-and-Write is a common hierarchical approach in long-form narrative text generation, which first creates a plan to guide the narrative writing. Following this approach, several studies rely on simply prompting large language models for planning, which often yields suboptimal results. In this paper, we propose a new framework called Evaluation-guided Iterative Plan Extraction for long-form narr… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  13. arXiv:2309.10706  [pdf, other

    cs.CL

    OpenBA: An Open-sourced 15B Bilingual Asymmetric seq2seq Model Pre-trained from Scratch

    Authors: Juntao Li, Zecheng Tang, Yuyang Ding, Pinzheng Wang, Pei Guo, Wangjie You, Dan Qiao, Wenliang Chen, Guohong Fu, Qiaoming Zhu, Guodong Zhou, Min Zhang

    Abstract: Large language models (LLMs) with billions of parameters have demonstrated outstanding performance on various natural language processing tasks. This report presents OpenBA, an open-sourced 15B bilingual asymmetric seq2seq model, to contribute an LLM variant to the Chinese-oriented open-source model community. We enhance OpenBA with effective and efficient techniques as well as adopt a three-stage… ▽ More

    Submitted 1 October, 2023; v1 submitted 19 September, 2023; originally announced September 2023.

  14. arXiv:2308.16836  [pdf, other

    cs.SD cs.AI eess.AS

    Towards Improving the Expressiveness of Singing Voice Synthesis with BERT Derived Semantic Information

    Authors: Shaohuan Zhou, Shun Lei, Weiya You, Deyi Tuo, Yuren You, Zhiyong Wu, Shiyin Kang, Helen Meng

    Abstract: This paper presents an end-to-end high-quality singing voice synthesis (SVS) system that uses bidirectional encoder representation from Transformers (BERT) derived semantic embeddings to improve the expressiveness of the synthesized singing voice. Based on the main architecture of recently proposed VISinger, we put forward several specific designs for expressive singing voice synthesis. First, dif… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  15. arXiv:2307.01676  [pdf, other

    cs.AI

    RaidEnv: Exploring New Challenges in Automated Content Balancing for Boss Raid Games

    Authors: Hyeon-Chang Jeon, In-Chang Baek, Cheong-mok Bae, Taehwa Park, Wonsang You, Taegwan Ha, Hoyun Jung, Jinha Noh, Seungwon Oh, Kyung-Joong Kim

    Abstract: The balance of game content significantly impacts the gaming experience. Unbalanced game content diminishes engagement or increases frustration because of repetitive failure. Although game designers intend to adjust the difficulty of game content, this is a repetitive, labor-intensive, and challenging process, especially for commercial-level games with extensive content. To address this issue, the… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 14 pages, 6 figures, 6 tables, 2 algorithms

  16. arXiv:2306.14208   

    cs.HC

    PaRUS: A Virtual Reality Shopping Method Focusing on Context between Products and Real Usage Scenes

    Authors: Weitao You, Yinyu Lu, Ziqing Zheng, Yizhan Shao, Changyuan Yang, Zhibin Zhou, Lingyun Sun

    Abstract: The development of AR and VR technologies is enhancing users' online shopping experiences in various ways. However, in existing VR shopping applications, shopping contexts merely refer to the products and virtual malls or metaphorical scenes where users select products. This leads to the defect that users can only imagine rather than intuitively feel whether the selected products are suitable for… ▽ More

    Submitted 9 October, 2023; v1 submitted 25 June, 2023; originally announced June 2023.

    Comments: a mistake: the participant number of the first user study should be 24 instead of 16

  17. arXiv:2304.08103  [pdf, other

    cs.CL cs.HC

    Low-code LLM: Graphical User Interface over Large Language Models

    Authors: Yuzhe Cai, Shaoguang Mao, Wenshan Wu, Zehua Wang, Yaobo Liang, Tao Ge, Chenfei Wu, Wang You, Ting Song, Yan Xia, Jonathan Tien, Nan Duan, Furu Wei

    Abstract: Utilizing Large Language Models (LLMs) for complex tasks is challenging, often involving a time-consuming and uncontrollable prompt engineering process. This paper introduces a novel human-LLM interaction framework, Low-code LLM. It incorporates six types of simple low-code visual programming interactions to achieve more controllable and stable responses. Through visual interaction with a graphica… ▽ More

    Submitted 1 April, 2024; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: Accepted as a Demo Track paper at NAACL 2024

  18. arXiv:2301.10896  [pdf, other

    cs.CL

    Causal Reasoning of Entities and Events in Procedural Texts

    Authors: Li Zhang, Hainiu Xu, Yue Yang, Shuyan Zhou, Weiqiu You, Manni Arora, Chris Callison-Burch

    Abstract: Entities and events are crucial to natural language reasoning and common in procedural texts. Existing work has focused either exclusively on entity state tracking (e.g., whether a pan is hot) or on event reasoning (e.g., whether one would burn themselves by touching the pan), while these two tasks are often causally related. We propose CREPE, the first benchmark on causal reasoning of event plaus… ▽ More

    Submitted 16 February, 2023; v1 submitted 25 January, 2023; originally announced January 2023.

    Comments: In Findings of EACL 2023

  19. arXiv:2210.12233  [pdf, other

    cs.LG

    TCAB: A Large-Scale Text Classification Attack Benchmark

    Authors: Kalyani Asthana, Zhouhang Xie, Wencong You, Adam Noack, Jonathan Brophy, Sameer Singh, Daniel Lowd

    Abstract: We introduce the Text Classification Attack Benchmark (TCAB), a dataset for analyzing, understanding, detecting, and labeling adversarial attacks against text classifiers. TCAB includes 1.5 million attack instances, generated by twelve adversarial attacks targeting three classifiers trained on six source datasets for sentiment analysis and abuse detection in English. Unlike standard text classific… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 32 pages, 7 figures, and 14 tables

  20. arXiv:2205.12086  [pdf, other

    stat.ML cs.LG

    Information-Directed Selection for Top-Two Algorithms

    Authors: Wei You, Chao Qin, Zihao Wang, Shuoguang Yang

    Abstract: We consider the best-k-arm identification problem for multi-armed bandits, where the objective is to select the exact set of k arms with the highest mean rewards by sequentially allocating measurement effort. We characterize the necessary and sufficient conditions for the optimal allocation using dual variables. Remarkably these optimality conditions lead to the extension of top-two algorithm desi… ▽ More

    Submitted 17 July, 2023; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: Accepted for presentation at the Conference on Learning Theory (COLT) 2023

  21. arXiv:2201.08555  [pdf, other

    cs.CL cs.CR cs.LG

    Identifying Adversarial Attacks on Text Classifiers

    Authors: Zhouhang Xie, Jonathan Brophy, Adam Noack, Wencong You, Kalyani Asthana, Carter Perkins, Sabrina Reis, Sameer Singh, Daniel Lowd

    Abstract: The landscape of adversarial attacks against text classifiers continues to grow, with new attacks developed every year and many of them available in standard toolkits, such as TextAttack and OpenAttack. In response, there is a growing body of work on robust learning, which reduces vulnerability to these attacks, though sometimes at a high cost in compute time or accuracy. In this paper, we take an… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  22. Macro-Average: Rare Types Are Important Too

    Authors: Thamme Gowda, Weiqiu You, Constantine Lignos, Jonathan May

    Abstract: While traditional corpus-level evaluation metrics for machine translation (MT) correlate well with fluency, they struggle to reflect adequacy. Model-based MT metrics trained on segment-level human judgments have emerged as an attractive replacement due to strong correlation results. These models, however, require potentially expensive re-training for new domains and languages. Furthermore, their d… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

    Journal ref: https://aclanthology.org/2021.naacl-main.90

  23. arXiv:2005.00742  [pdf, other

    cs.CL

    Hard-Coded Gaussian Attention for Neural Machine Translation

    Authors: Weiqiu You, Simeng Sun, Mohit Iyyer

    Abstract: Recent work has questioned the importance of the Transformer's multi-headed attention for achieving high translation quality. We push further in this direction by developing a "hard-coded" attention variant without any learned parameters. Surprisingly, replacing all learned self-attention heads in the encoder and decoder with fixed, input-agnostic Gaussian distributions minimally impacts BLEU scor… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

    Comments: ACL 2020 Camera Ready (12 pages)

  24. arXiv:2003.11174  [pdf, ps, other

    math.PR cs.PF

    A Robust Queueing Network Analyzer Based on Indices of Dispersion

    Authors: Ward Whitt, Wei You

    Abstract: We develop a robust queueing network analyzer algorithm to approximate the steady-state performance of a single-class open queueing network of single-server queues with Markovian routing. The algorithm allows non-renewal external arrival processes, general service-time distributions and customer feedback. We focus on the customer flows, defined as the continuous-time processes counting customers f… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: Appendix available at https://cnyouwei.github.io/papers/Whitt_You_RQNA_app.pdf

  25. Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding

    Authors: Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, Zibin Zheng

    Abstract: Recently, blockchain technology has become a topic in the spotlight but also a hotbed of various cybercrimes. Among them, phishing scams on blockchain have been found making a notable amount of money, thus emerging as a serious threat to the trading security of the blockchain ecosystem. In order to create a favorable environment for investment, an effective method for detecting phishing scams is u… ▽ More

    Submitted 17 November, 2020; v1 submitted 20 November, 2019; originally announced November 2019.

    Journal ref: TSMC.2020.3016821

  26. arXiv:1910.04351  [pdf

    cs.CR

    Research on a Hybrid System With Perfect Forward Secrecy

    Authors: Weiqing You, Guozhen Shi, Xiaoming Chen, Jian Qi, Chuang Qing

    Abstract: The rapid development of computer technology will be the whole world as a whole, the widespread application of instant messaging technology to bring great convenience to people's lives, while privacy protection has become a more significant problem. For ordinary it's hard to equip themselves with a cryptograph machine. In this paper, through in-depth study of elliptic curve cryptosystem ECC and ad… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

  27. arXiv:1910.04346  [pdf

    cs.CR

    A New Cryptosystem Based on Positive Braids

    Authors: Xiaoming Chen, Weiqing You, Meng Jiao, Kejun Zhang, Shuang Qing, Zhiqiang Wang

    Abstract: The braid group is an important non commutative group, at the same time, it is an important tool in quantum field theory with better topological structure, and often used as a research carrier for anti-quantum cryptographic algorithms. This paper proposed a difficult problem on a positive braid semi-group, and proved that the difficulty is not lower than the conjugate search problem. Based on this… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

  28. arXiv:1806.03078  [pdf, ps, other

    cs.CR

    The Twin Conjugacy Search Problem and Applications

    Authors: Xiaoming Chen, Weiqing You, Wenxi Li

    Abstract: We propose a new computational problem over the noncommutative group, called the twin conjugacy search problem. This problem is related to the conjugacy search problem and can be used for almost all of the same cryptographic constructions that are based on the conjugacy search problem. However, our new problem is at least hard as the conjugacy search problem. Moreover, the twin conjugacy search pr… ▽ More

    Submitted 8 June, 2018; originally announced June 2018.

  29. arXiv:1806.03075  [pdf, ps, other

    cs.CR

    Provably Secure Integration Cryptosystem on Non-Commutative Group

    Authors: Xiaoming Chen, Weiqing You

    Abstract: Braid group is a very important non-commutative group. It is also an important tool of quantum field theory, and has good topological properties. This paper focuses on the provable security research of cryptosystem over braid group, which consists of two aspects: One, we proved that the Ko's cryptosystem based on braid group is secure against chosen-plaintext-attack(CPA) which proposed in CRYPTO20… ▽ More

    Submitted 6 July, 2018; v1 submitted 8 June, 2018; originally announced June 2018.

    Comments: 15 pages

  30. arXiv:1202.4743  [pdf

    cs.MM cs.CV

    Real-time detection and tracking of multiple objects with partial decoding in H.264/AVC bitstream domain

    Authors: Wonsang You, M. S. Houari Sabirin, Munchurl Kim

    Abstract: In this paper, we show that we can apply probabilistic spatiotemporal macroblock filtering (PSMF) and partial decoding processes to effectively detect and track multiple objects in real time in H.264|AVC bitstreams with stationary background. Our contribution is that our method cannot only show fast processing time but also handle multiple moving objects that are articulated, changing in size or i… ▽ More

    Submitted 21 February, 2012; originally announced February 2012.

    Comments: SPIE Real-Time Image and Video Processing Conference 2009

    Journal ref: Proceedings of SPIE 2009, Volume: 7244, Publisher: SPIE, Pages: 72440D-72440D-12

  31. arXiv:0806.1284  [pdf, ps, other

    cs.CR cs.LO

    The Separation of Duty with Privilege Calculus

    Authors: Chenggong Lv, Jun Wang, Lu Liu, Weijia You

    Abstract: This paper presents Privilege Calculus (PC) as a new approach of knowledge representation for Separation of Duty (SD) in the view of process and intents to improve the reconfigurability and traceability of SD. PC presumes that the structure of SD should be reduced to the structure of privilege and then the regulation of system should be analyzed with the help of forms of privilege.

    Submitted 7 June, 2008; originally announced June 2008.

    Comments: RSKT2008 conference, LNAI 5009, pp.410-417, 2008