Skip to main content

Showing 1–26 of 26 results for author: Zhan, Q

  1. arXiv:2406.18549  [pdf

    eess.IV cs.CV

    Advancements in Feature Extraction Recognition of Medical Imaging Systems Through Deep Learning Technique

    Authors: Qishi Zhan, Dan Sun, Erdi Gao, Yuhan Ma, Yaxin Liang, Haowei Yang

    Abstract: This study introduces a novel unsupervised medical image feature extraction method that employs spatial stratification techniques. An objective function based on weight is proposed to achieve the purpose of fast image recognition. The algorithm divides the pixels of the image into multiple subdomains and uses a quadtree to access the image. A technique for threshold optimization utilizing a simple… ▽ More

    Submitted 23 May, 2024; originally announced June 2024.

    Comments: conference

  2. arXiv:2406.12200  [pdf, other

    cs.LG cs.DC cs.ET cs.MM cs.NE

    SFedCA: Credit Assignment-Based Active Client Selection Strategy for Spiking Federated Learning

    Authors: Qiugang Zhan, Jinbo Cao, Xiurui Xie, Malu Zhang, Huajin Tang, Guisong Liu

    Abstract: Spiking federated learning is an emerging distributed learning paradigm that allows resource-constrained devices to train collaboratively at low power consumption without exchanging local data. It takes advantage of both the privacy computation property in federated learning (FL) and the energy efficiency in spiking neural networks (SNN). Thus, it is highly promising to revolutionize the efficient… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 9 pages

  3. arXiv:2406.08838  [pdf

    cs.CL cs.AI cs.LG

    Research on Optimization of Natural Language Processing Model Based on Multimodal Deep Learning

    Authors: Dan Sun, Yaxin Liang, Yining Yang, Yuhan Ma, Qishi Zhan, Erdi Gao

    Abstract: This project intends to study the image representation based on attention mechanism and multimodal data. By adding multiple pattern layers to the attribute model, the semantic and hidden layers of image content are integrated. The word vector is quantified by the Word2Vec method and then evaluated by a word embedding convolutional neural network. The published experimental results of the two group… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  4. arXiv:2406.01637  [pdf, other

    cs.MA cs.AI

    Teams of LLM Agents can Exploit Zero-Day Vulnerabilities

    Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang

    Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world vulnerabilities when given a description of the vulnerability and toy capture-the-flag problems. However, these agents still perform poorly on real-world vulnerabilities that are unknown to the agent ahead of time (zero-day vulnerabilities). I… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  5. arXiv:2405.01369  [pdf, ps, other

    cs.SE

    Possible Value Analysis based on Symbolic Lattice

    Authors: Qi Zhan

    Abstract: We propose a new static program analysis called program behavior analysis. The analysis aims to calculate possible symbolic expressions for every variable at each program point. We design a new lattice, transfer function, and widening operator to accommodate the analysis. Furthermore, we extend the analysis to interprocedural.

    Submitted 2 May, 2024; originally announced May 2024.

  6. arXiv:2403.02691  [pdf, other

    cs.CL cs.CR

    InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents

    Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang

    Abstract: Recent work has embodied LLMs as agents, allowing them to access tools, perform actions, and interact with external content (e.g., emails or websites). However, external content introduces the risk of indirect prompt injection (IPI) attacks, where malicious instructions are embedded within the content processed by LLMs, aiming to manipulate these agents into executing detrimental actions against u… ▽ More

    Submitted 25 March, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: 28 pages, 5 figures, 9 tables

  7. arXiv:2402.06664  [pdf, other

    cs.CR cs.AI

    LLM Agents can Autonomously Hack Websites

    Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang

    Abstract: In recent years, large language models (LLMs) have become increasingly capable and can now interact with tools (i.e., call functions), read documents, and recursively call themselves. As a result, these LLMs can now function autonomously as agents. With the rise in capabilities of these agents, recent work has speculated on how LLM agents would affect cybersecurity. However, not much is known abou… ▽ More

    Submitted 15 February, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

  8. arXiv:2312.03393  [pdf, other

    cs.SE

    PS$^3$: Precise Patch Presence Test based on Semantic Symbolic Signature

    Authors: Qi Zhan, Xing Hu, Zhiyang Li, Xin Xia, David Lo, Shanping Li

    Abstract: During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security patch in every affected binary is crucial to ensure system security. Identifying whether a binary has been patched for a known vulnerability is challenging, as there may only be smal… ▽ More

    Submitted 12 January, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: Accepted to ICSE 2024; Camera-ready version

  9. arXiv:2311.05553  [pdf, other

    cs.CL cs.AI

    Removing RLHF Protections in GPT-4 via Fine-Tuning

    Authors: Qiusi Zhan, Richard Fang, Rohan Bindu, Akul Gupta, Tatsunori Hashimoto, Daniel Kang

    Abstract: As large language models (LLMs) have increased in their capabilities, so does their potential for dual use. To reduce harmful outputs, produces and vendors of LLMs have used reinforcement learning with human feedback (RLHF). In tandem, LLM vendors have been increasingly enabling fine-tuning of their most powerful models. However, concurrent work has shown that fine-tuning can remove RLHF protectio… ▽ More

    Submitted 5 April, 2024; v1 submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted to NAACL 2024. (7 pages)

  10. arXiv:2310.14839  [pdf, other

    cs.CV cs.AI cs.NE

    ESVAE: An Efficient Spiking Variational Autoencoder with Reparameterizable Poisson Spiking Sampling

    Authors: Qiugang Zhan, Xiurui Xie, Guisong Liu, Malu Zhang

    Abstract: In recent years, studies on image generation models of spiking neural networks (SNNs) have gained the attention of many researchers. Variational autoencoders (VAEs), as one of the most popular image generation models, have attracted a lot of work exploring their SNN implementation. Due to the constrained binary representation in SNNs, existing SNN VAE methods implicitly construct the latent space… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: 11 pages, 13 figures

  11. arXiv:2309.07449  [pdf

    physics.soc-ph cs.MA math.DS nlin.AO

    Rate-Induced Transitions in Networked Complex Adaptive Systems: Exploring Dynamics and Management Implications Across Ecological, Social, and Socioecological Systems

    Authors: Vítor V. Vasconcelos, Flávia M. D. Marquitti, Theresa Ong, Lisa C. McManus, Marcus Aguiar, Amanda B. Campos, Partha S. Dutta, Kristen Jovanelly, Victoria Junquera, Jude Kong, Elisabeth H. Krueger, Simon A. Levin, Wenying Liao, Mingzhen Lu, Dhruv Mittal, Mercedes Pascual, Flávio L. Pinheiro, Juan Rocha, Fernando P. Santos, Peter Sloot, Chenyang, Su, Benton Taylor, Eden Tekwa, Sjoerd Terpstra , et al. (5 additional authors not shown)

    Abstract: Complex adaptive systems (CASs), from ecosystems to economies, are open systems and inherently dependent on external conditions. While a system can transition from one state to another based on the magnitude of change in external conditions, the rate of change -- irrespective of magnitude -- may also lead to system state changes due to a phenomenon known as a rate-induced transition (RIT). This st… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

    Comments: 25 pages, 4 figures, 1 box, supplementary information

    MSC Class: 37G; 37N; 91B; 91C; 91D; 91E; 92D; 92D25; 92D40; 92F; 93A; 93A14; 93A16 ACM Class: I.6.3; I.6.m; J.3; J.4; J.m; K.4.2

  12. arXiv:2305.07741  [pdf, other

    cs.LG

    To transfer or not transfer: Unified transferability metric and analysis

    Authors: Qianshan Zhan, Xiao-Jun Zeng

    Abstract: In transfer learning, transferability is one of the most fundamental problems, which aims to evaluate the effectiveness of arbitrary transfer tasks. Existing research focuses on classification tasks and neglects domain or task differences. More importantly, there is a lack of research to determine whether to transfer or not. To address these, we propose a new analytical approach and metric, Wasser… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

  13. arXiv:2303.09093  [pdf, other

    cs.CL

    GLEN: General-Purpose Event Detection for Thousands of Types

    Authors: Qiusi Zhan, Sha Li, Kathryn Conger, Martha Palmer, Heng Ji, Jiawei Han

    Abstract: The progress of event extraction research has been hindered by the absence of wide-coverage, large-scale datasets. To make event extraction systems more accessible, we build a general-purpose event detection dataset GLEN, which covers 205K event mentions with 3,465 different types, making it more than 20x larger in ontology than today's largest event dataset. GLEN is created by utilizing the DWD O… ▽ More

    Submitted 31 October, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: Accepted to EMNLP 2023. The first two authors contributed equally. (16 pages)

  14. arXiv:2209.07678  [pdf, other

    cs.CL cs.AI

    ConFiguRe: Exploring Discourse-level Chinese Figures of Speech

    Authors: Dawei Zhu, Qiusi Zhan, Zhejian Zhou, Yifan Song, Jiebin Zhang, Sujian Li

    Abstract: Figures of speech, such as metaphor and irony, are ubiquitous in literature works and colloquial conversations. This poses great challenge for natural language understanding since figures of speech usually deviate from their ostensible meanings to express deeper semantic implications. Previous research lays emphasis on the literary aspect of figures and seldom provide a comprehensive exploration f… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: Accepted to Coling 2022

  15. arXiv:2207.11518  [pdf, other

    cs.CV cs.AI

    Online Knowledge Distillation via Mutual Contrastive Learning for Visual Recognition

    Authors: Chuanguang Yang, Zhulin An, Helong Zhou, Fuzhen Zhuang, Yongjun Xu, Qian Zhan

    Abstract: The teacher-free online Knowledge Distillation (KD) aims to train an ensemble of multiple student models collaboratively and distill knowledge from each other. Although existing online KD methods achieve desirable performance, they often focus on class probabilities as the core knowledge type, ignoring the valuable feature representational information. We present a Mutual Contrastive Learning (MCL… ▽ More

    Submitted 27 March, 2023; v1 submitted 23 July, 2022; originally announced July 2022.

    Comments: 18 pages, accepted by IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI-2023)

  16. arXiv:2205.14847  [pdf, other

    cs.CL

    EA$^2$E: Improving Consistency with Event Awareness for Document-Level Argument Extraction

    Authors: Qi Zeng, Qiusi Zhan, Heng Ji

    Abstract: Events are inter-related in documents. Motivated by the one-sense-per-discourse theory, we hypothesize that a participant tends to play consistent roles across multiple events in the same document. However recent work on document-level event argument extraction models each individual event in isolation and therefore causes inconsistency among extracted arguments across events, which will further c… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: NAACL 2022 Findings

  17. arXiv:2203.16822  [pdf, other

    eess.AS cs.CL cs.LG

    How Does Pre-trained Wav2Vec 2.0 Perform on Domain Shifted ASR? An Extensive Benchmark on Air Traffic Control Communications

    Authors: Juan Zuluaga-Gomez, Amrutha Prasad, Iuliia Nigmatulina, Saeed Sarfjoo, Petr Motlicek, Matthias Kleinert, Hartmut Helmke, Oliver Ohneiser, Qingran Zhan

    Abstract: Recent work on self-supervised pre-training focus on leveraging large-scale unlabeled speech data to build robust end-to-end (E2E) acoustic models (AM) that can be later fine-tuned on downstream tasks e.g., automatic speech recognition (ASR). Yet, few works investigated the impact on performance when the data properties substantially differ between the pre-training and fine-tuning phases, termed d… ▽ More

    Submitted 17 October, 2022; v1 submitted 31 March, 2022; originally announced March 2022.

    Comments: To be published in the 2022 IEEE Spoken Language Technology Workshop (SLT) (SLT 2022)

  18. arXiv:2111.10810  [pdf, other

    cs.LG cs.AI

    Vulcan: Solving the Steiner Tree Problem with Graph Neural Networks and Deep Reinforcement Learning

    Authors: Haizhou Du, Zong Yan, Qiao Xiang, Qinqing Zhan

    Abstract: Steiner Tree Problem (STP) in graphs aims to find a tree of minimum weight in the graph that connects a given set of vertices. It is a classic NP-hard combinatorial optimization problem and has many real-world applications (e.g., VLSI chip design, transportation network planning and wireless sensor networks). Many exact and approximate algorithms have been developed for STP, but they suffer from h… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

    Comments: 12 pages, 7 figures

    ACM Class: I.2.8

  19. arXiv:2110.13656  [pdf, other

    cs.LG cs.AI

    CLLD: Contrastive Learning with Label Distance for Text Classification

    Authors: Jinhe Lan, Qingyuan Zhan, Chenhao Jiang, Kunping Yuan, Desheng Wang

    Abstract: Existed pre-trained models have achieved state-of-the-art performance on various text classification tasks. These models have proven to be useful in learning universal language representations. However, the semantic discrepancy between similar texts cannot be effectively distinguished by advanced pre-trained models, which have a great influence on the performance of hard-to-distinguish classes. To… ▽ More

    Submitted 5 January, 2022; v1 submitted 25 October, 2021; originally announced October 2021.

  20. arXiv:2010.07726  [pdf, other

    eess.IV cs.CV

    LiteDepthwiseNet: An Extreme Lightweight Network for Hyperspectral Image Classification

    Authors: Benlei Cui, XueMei Dong, Qiaoqiao Zhan, Jiangtao Peng, Weiwei Sun

    Abstract: Deep learning methods have shown considerable potential for hyperspectral image (HSI) classification, which can achieve high accuracy compared with traditional methods. However, they often need a large number of training samples and have a lot of parameters and high computational overhead. To solve these problems, this paper proposes a new network architecture, LiteDepthwiseNet, for HSI classifica… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

  21. arXiv:2006.10304  [pdf, ps, other

    cs.CL cs.CV cs.LG cs.SD eess.AS

    Automatic Speech Recognition Benchmark for Air-Traffic Communications

    Authors: Juan Zuluaga-Gomez, Petr Motlicek, Qingran Zhan, Karel Vesely, Rudolf Braun

    Abstract: Advances in Automatic Speech Recognition (ASR) over the last decade opened new areas of speech-based automation such as in Air-Traffic Control (ATC) environment. Currently, voice communication and data links communications are the only way of contact between pilots and Air-Traffic Controllers (ATCo), where the former is the most widely used and the latter is a non-spoken method mandatory for ocean… ▽ More

    Submitted 13 August, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

    Comments: Accepted to: 21st INTERSPEECH conference (Shanghai, October 25-29)

  22. arXiv:1911.02736  [pdf, ps, other

    cs.CV

    Analysis of CNN-based remote-PPG to understand limitations and sensitivities

    Authors: Qi Zhan, Wenjin Wang, Gerard de Haan

    Abstract: Deep learning based on Convolutional Neural Network (CNN) has shown promising results in various vision-based applications, recently also in camera-based vital signs monitoring. The CNN-based Photoplethysmography (PPG) extraction has, so far, been focused on performance rather than understanding. In this paper, we try to answer four questions with experiments aiming at improving our understanding… ▽ More

    Submitted 5 February, 2020; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: Biomedical Optics Express journal submission. 15 pages,11 figures

  23. arXiv:1902.00838  [pdf, other

    cs.IT

    A New Codebook Design for Analog Beamforming in Millimeter-wave Communication

    Authors: Mehdi Ganji, Hongbing Cheng, Qi Zhan, Kee-Bong Song

    Abstract: In this study, we analyze the codebook design used for analog beamforming. Analog beamforming and combining suffer from a subspace sampling limitation, that is, the receiver cannot directly observe the channel coefficients; instead, the receiver observes a noisy version of their weighted combination. To resolve this, the transmitter and the receiver usually collaborate to determine the best beamfo… ▽ More

    Submitted 10 February, 2020; v1 submitted 2 February, 2019; originally announced February 2019.

  24. arXiv:1806.07349  [pdf, ps, other

    cs.RO

    Motion Planning for a Humanoid Mobile Manipulator System

    Authors: Yan Wei, Wei Jiang, Ahmed Rahmani, Qiang Zhan

    Abstract: A high redundant non-holonomic humanoid mobile dual-arm manipulator system is presented in this paper where the motion planning to realize "human-like" autonomous navigation and manipulation tasks is studied. Firstly, an improved MaxiMin NSGA-II algorithm, which optimizes five objective functions to solve the problems of singularity, redundancy, and coupling between mobile base and manipulator sim… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

    Comments: 26 pages, 9 figures

  25. arXiv:1607.00542  [pdf, other

    cs.SI cs.DB

    Intertwined Viral Marketing through Online Social Networks

    Authors: Jiawei Zhang, Senzhang Wang, Qianyi Zhan, Philip S. Yu

    Abstract: Traditional viral marketing problems aim at selecting a subset of seed users for one single product to maximize its awareness in social networks. However, in real scenarios, multiple products can be promoted in social networks at the same time. At the product level, the relationships among these products can be quite intertwined, e.g., competing, complementary and independent. In this paper, we wi… ▽ More

    Submitted 2 July, 2016; originally announced July 2016.

    Comments: 11 pages, 5 figures, Accepted by ASONAM 2016

  26. arXiv:1508.01476  [pdf

    cs.CL

    Hyponymy extraction of domain ontology concept based on ccrfs and hierarchy clustering

    Authors: Qiang Zhan, Chunhong Wang

    Abstract: Concept hierarchy is the backbone of ontology, and the concept hierarchy acquisition has been a hot topic in the field of ontology learning. this paper proposes a hyponymy extraction method of domain ontology concept based on cascaded conditional random field(CCRFs) and hierarchy clustering. It takes free text as extracting object, adopts CCRFs identifying the domain concepts. First the low layer… ▽ More

    Submitted 6 August, 2015; originally announced August 2015.