Skip to main content

Showing 1–50 of 164 results for author: Fang, M

  1. arXiv:2407.09721  [pdf, other

    cs.HC

    Purrfect Pitch: Exploring Musical Interval Learning through Multisensory Interfaces

    Authors: Sam Chin, Cathy Mengying Fang, Nikhil Singh, Ibrahim Ibrahim, Joe Paradiso, Pattie Maes

    Abstract: We introduce Purrfect Pitch, a system consisting of a wearable haptic device and a custom-designed learning interface for musical ear training. We focus on the ability to identify musical intervals (sequences of two musical notes), which is a perceptually ambiguous task that usually requires strenuous rote training. With our system, the user would hear a sequence of two tones while simultaneously… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  2. arXiv:2407.07930  [pdf

    q-bio.BM cs.LG

    Token-Mol 1.0: Tokenized drug design with large language model

    Authors: Jike Wang, Rui Qin, Mingyang Wang, Meijing Fang, Yangyang Zhang, Yuchen Zhu, Qun Su, Qiaolin Gou, Chao Shen, Odin Zhang, Zhenxing Wu, Dejun Jiang, Xujun Zhang, Huifeng Zhao, Xiaozhe Wan, Zhourui Wu, Liwei Liu, Yu Kang, Chang-Yu Hsieh, Tingjun Hou

    Abstract: Significant interests have recently risen in leveraging sequence-based large language models (LLMs) for drug design. However, most current applications of LLMs in drug discovery lack the ability to comprehend three-dimensional (3D) structures, thereby limiting their effectiveness in tasks that explicitly involve molecular conformations. In this study, we introduced Token-Mol, a token-only 3D drug… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  3. arXiv:2407.07221  [pdf, other

    cs.CV cs.CR

    Tracing Back the Malicious Clients in Poisoning Attacks to Federated Learning

    Authors: Yuqi Jia, Minghong Fang, Hongbin Liu, Jinghuai Zhang, Neil Zhenqiang Gong

    Abstract: Poisoning attacks compromise the training phase of federated learning (FL) such that the learned global model misclassifies attacker-chosen inputs called target inputs. Existing defenses mainly focus on protecting the training phase of FL such that the learnt global model is poison free. However, these defenses often achieve limited effectiveness when the clients' local training data is highly non… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  4. arXiv:2407.04285  [pdf, other

    cs.LG cs.AI

    Robust Decision Transformer: Tackling Data Corruption in Offline RL via Sequence Modeling

    Authors: Jiawei Xu, Rui Yang, Feng Luo, Meng Fang, Baoxiang Wang, Lei Han

    Abstract: Learning policies from offline datasets through offline reinforcement learning (RL) holds promise for scaling data-driven decision-making and avoiding unsafe and costly online interactions. However, real-world data collected from sensors or humans often contains noise and errors, posing a significant challenge for existing offline RL methods. Our study indicates that traditional offline RL methods… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  5. arXiv:2407.01917  [pdf, other

    cs.NI cs.CR cs.DC

    Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks

    Authors: Zifan Zhang, Minghong Fang, Mingzhe Chen, Gaolei Li, Xi Lin, Yuchen Liu

    Abstract: In the era of 5G and beyond, the increasing complexity of wireless networks necessitates innovative frameworks for efficient management and deployment. Digital twins (DTs), embodying real-time monitoring, predictive configurations, and enhanced decision-making capabilities, stand out as a promising solution in this context. Within a time-series data-driven framework that effectively maps wireless… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: Accepted by Internet of Things Journal (IoT-J). arXiv admin note: substantial text overlap with arXiv:2404.14389

  6. arXiv:2406.19283  [pdf, other

    cs.HC

    PhysioLLM: Supporting Personalized Health Insights with Wearables and Large Language Models

    Authors: Cathy Mengying Fang, Valdemar Danry, Nathan Whitmore, Andria Bao, Andrew Hutchison, Cayden Pierce, Pattie Maes

    Abstract: We present PhysioLLM, an interactive system that leverages large language models (LLMs) to provide personalized health understanding and exploration by integrating physiological data from wearables with contextual information. Unlike commercial health apps for wearables, our system offers a comprehensive statistical analysis component that discovers correlations and trends in user data, allowing u… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  7. arXiv:2406.18984  [pdf, other

    cs.IR

    Amplify Graph Learning for Recommendation via Sparsity Completion

    Authors: Peng Yuan, Haojie Li, Minying Fang, Xu Yu, Yongjing Hao, Junwei Du

    Abstract: Graph learning models have been widely deployed in collaborative filtering (CF) based recommendation systems. Due to the issue of data sparsity, the graph structure of the original input lacks potential positive preference edges, which significantly reduces the performance of recommendations. In this paper, we study how to enhance the graph structure for CF more effectively, thereby optimizing the… ▽ More

    Submitted 1 July, 2024; v1 submitted 27 June, 2024; originally announced June 2024.

  8. arXiv:2406.18321  [pdf, other

    cs.CL cs.AI

    MathOdyssey: Benchmarking Mathematical Problem-Solving Skills in Large Language Models Using Odyssey Math Data

    Authors: Meng Fang, Xiangpeng Wan, Fei Lu, Fei Xing, Kai Zou

    Abstract: Large language models (LLMs) have significantly advanced natural language understanding and demonstrated strong problem-solving abilities. Despite these successes, most LLMs still struggle with solving mathematical problems due to the intricate reasoning required. This paper investigates the mathematical problem-solving capabilities of LLMs using the newly developed "MathOdyssey" dataset. The data… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  9. arXiv:2406.17507  [pdf, other

    cs.IR

    ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling

    Authors: Minghui Fang, Shengpeng Ji, Jialong Zuo, Hai Huang, Yan Xia, Jieming Zhu, Xize Cheng, Xiaoda Yang, Wenrui Liu, Gang Wang, Zhenhua Dong, Zhou Zhao

    Abstract: Generative retrieval, which has demonstrated effectiveness in text-to-text retrieval, utilizes a sequence-to-sequence model to directly generate candidate identifiers based on natural language queries. Without explicitly computing the similarity between queries and candidates, generative retrieval surpasses dual-tower models in both speed and accuracy on large-scale corpora, providing new insights… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  10. arXiv:2406.16253  [pdf, other

    cs.CL

    LLMs Assist NLP Researchers: Critique Paper (Meta-)Reviewing

    Authors: Jiangshu Du, Yibo Wang, Wenting Zhao, Zhongfen Deng, Shuaiqi Liu, Renze Lou, Henry Peng Zou, Pranav Narayanan Venkit, Nan Zhang, Mukund Srinath, Haoran Ranran Zhang, Vipul Gupta, Yinghui Li, Tao Li, Fei Wang, Qin Liu, Tianlin Liu, Pengzhi Gao, Congying Xia, Chen Xing, Jiayang Cheng, Zhaowei Wang, Ying Su, Raj Sanjay Shah, Ruohao Guo , et al. (15 additional authors not shown)

    Abstract: This work is motivated by two key trends. On one hand, large language models (LLMs) have shown remarkable versatility in various generative tasks such as writing, drawing, and question answering, significantly reducing the time required for many routine tasks. On the other hand, researchers, whose work is not only time-consuming but also highly expertise-demanding, face increasing challenges as th… ▽ More

    Submitted 25 June, 2024; v1 submitted 23 June, 2024; originally announced June 2024.

  11. arXiv:2406.12844  [pdf, other

    cs.LG cs.AI

    Synergizing Foundation Models and Federated Learning: A Survey

    Authors: Shenghui Li, Fanghua Ye, Meng Fang, Jiaxu Zhao, Yun-Hin Chan, Edith C. -H. Ngai, Thiemo Voigt

    Abstract: The recent development of Foundation Models (FMs), represented by large language models, vision transformers, and multimodal models, has been making a significant impact on both academia and industry. Compared with small-scale models, FMs have a much stronger demand for high-volume data during the pre-training phase. Although general FMs can be pre-trained on data collected from open sources such… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  12. arXiv:2406.10671  [pdf

    cs.CL

    Augmenting Biomedical Named Entity Recognition with General-domain Resources

    Authors: Yu Yin, Hyunjae Kim, Xiao Xiao, Chih Hsuan Wei, Jaewoo Kang, Zhiyong Lu, Hua Xu, Meng Fang, Qingyu Chen

    Abstract: Training a neural network-based biomedical named entity recognition (BioNER) model usually requires extensive and costly human annotations. While several studies have employed multi-task learning with multiple BioNER datasets to reduce human effort, this approach does not consistently yield performance improvements and may introduce label ambiguity in different biomedical corpora. We aim to tackle… ▽ More

    Submitted 18 June, 2024; v1 submitted 15 June, 2024; originally announced June 2024.

    Comments: We make data, codes, and models publicly available via https://github.com/qingyu-qc/bioner_gerbera

  13. arXiv:2406.10416  [pdf, other

    cs.CR cs.DC cs.LG

    Byzantine-Robust Decentralized Federated Learning

    Authors: Minghong Fang, Zifan Zhang, Hairi, Prashant Khanduri, Jia Liu, Songtao Lu, Yuchen Liu, Neil Gong

    Abstract: Federated learning (FL) enables multiple clients to collaboratively train machine learning models without revealing their private training data. In conventional FL, the system follows the server-assisted architecture (server-assisted FL), where the training process is coordinated by a central server. However, the server-assisted FL framework suffers from poor scalability due to a communication bot… ▽ More

    Submitted 13 July, 2024; v1 submitted 14 June, 2024; originally announced June 2024.

    Comments: To appear in ACM Conference on Computer and Communications Security 2024 (CCS '24)

  14. arXiv:2406.08835  [pdf, other

    cs.SD eess.AS

    A Single-Step Non-Autoregressive Automatic Speech Recognition Architecture with High Accuracy and Inference Speed

    Authors: Ziyang Zhuang, Chenfeng Miao, Kun Zou, Shuai Gong, Ming Fang, Tao Wei, Zijian Li, Wei Hu, Shaojun Wang, Jing Xiao

    Abstract: Non-autoregressive (NAR) automatic speech recognition (ASR) models predict tokens independently and simultaneously, bringing high inference speed. However, there is still a gap in the accuracy of the NAR models compared to the autoregressive (AR) models. To further narrow the gap between the NAR and AR models, we propose a single-step NAR ASR architecture with high accuracy and inference speed, ca… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  15. arXiv:2406.04836  [pdf, other

    cs.CL cs.AI

    Revisiting Catastrophic Forgetting in Large Language Model Tuning

    Authors: Hongyu Li, Liang Ding, Meng Fang, Dacheng Tao

    Abstract: Catastrophic Forgetting (CF) means models forgetting previously acquired knowledge when learning new data. It compromises the effectiveness of large language models (LLMs) during fine-tuning, yet the underlying causes have not been thoroughly investigated. This paper takes the first step to reveal the direct link between the flatness of the model loss landscape and the extent of CF in the field of… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  16. arXiv:2406.01205  [pdf, other

    eess.AS cs.LG cs.SD

    ControlSpeech: Towards Simultaneous Zero-shot Speaker Cloning and Zero-shot Language Style Control With Decoupled Codec

    Authors: Shengpeng Ji, Jialong Zuo, Minghui Fang, Siqi Zheng, Qian Chen, Wen Wang, Ziyue Jiang, Hai Huang, Xize Cheng, Rongjie Huang, Zhou Zhao

    Abstract: In this paper, we present ControlSpeech, a text-to-speech (TTS) system capable of fully cloning the speaker's voice and enabling arbitrary control and adjustment of speaking style, merely based on a few seconds of audio prompt and a simple textual style description prompt. Prior zero-shot TTS models and controllable TTS models either could only mimic the speaker's voice without further control and… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  17. arXiv:2405.20018  [pdf, other

    cs.MA cs.CL cs.LG

    Safe Multi-agent Reinforcement Learning with Natural Language Constraints

    Authors: Ziyan Wang, Meng Fang, Tristan Tomilin, Fei Fang, Yali Du

    Abstract: The role of natural language constraints in Safe Multi-agent Reinforcement Learning (MARL) is crucial, yet often overlooked. While Safe MARL has vast potential, especially in fields like robotics and autonomous vehicles, its full potential is limited by the need to define constraints in pre-designed mathematical terms, which requires extensive domain expertise and reinforcement learning knowledge,… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 23 pages, 6 figures

  18. arXiv:2405.19946  [pdf, other

    cs.AI

    Learning to Discuss Strategically: A Case Study on One Night Ultimate Werewolf

    Authors: Xuanfa Jin, Ziyan Wang, Yali Du, Meng Fang, Haifeng Zhang, Jun Wang

    Abstract: Communication is a fundamental aspect of human society, facilitating the exchange of information and beliefs among people. Despite the advancements in large language models (LLMs), recent agents built with these often neglect the control over discussion tactics, which are essential in communication scenarios and games. As a variant of the famous communication game Werewolf, One Night Ultimate Were… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 27 pages, 5 figures

  19. arXiv:2405.12604  [pdf, other

    cs.CL cs.AI

    Tiny Refinements Elicit Resilience: Toward Efficient Prefix-Model Against LLM Red-Teaming

    Authors: Jiaxu Liu, Xiangyu Yin, Sihao Wu, Jianhong Wang, Meng Fang, Xinping Yi, Xiaowei Huang

    Abstract: With the proliferation of red-teaming strategies for Large Language Models (LLMs), the deficiency in the literature about improving the safety and robustness of LLM defense strategies is becoming increasingly pronounced. This paper introduces the LLM-based \textbf{sentinel} model as a plug-and-play prefix module designed to reconstruct the input prompt with just a few ($<30$) additional tokens, ef… ▽ More

    Submitted 17 June, 2024; v1 submitted 21 May, 2024; originally announced May 2024.

    Comments: Preprint, 10 pages main with 10 pages appendix

  20. arXiv:2405.11286  [pdf, other

    cs.CV

    Motion Avatar: Generate Human and Animal Avatars with Arbitrary Motion

    Authors: Zeyu Zhang, Yiran Wang, Biao Wu, Shuo Chen, Zhiyuan Zhang, Shiya Huang, Wenbo Zhang, Meng Fang, Ling Chen, Yang Zhao

    Abstract: In recent years, there has been significant interest in creating 3D avatars and motions, driven by their diverse applications in areas like film-making, video games, AR/VR, and human-robot interaction. However, current efforts primarily concentrate on either generating the 3D avatar mesh alone or producing motion sequences, with integrating these two aspects proving to be a persistent challenge. A… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

  21. arXiv:2405.02745  [pdf, other

    cs.LG cs.DC

    Understanding Server-Assisted Federated Learning in the Presence of Incomplete Client Participation

    Authors: Haibo Yang, Peiwen Qiu, Prashant Khanduri, Minghong Fang, Jia Liu

    Abstract: Existing works in federated learning (FL) often assume an ideal system with either full client or uniformly distributed client participation. However, in practice, it has been observed that some clients may never participate in FL training (aka incomplete client participation) due to a myriad of system heterogeneity factors. A popular approach to mitigate impacts of incomplete client participation… ▽ More

    Submitted 25 May, 2024; v1 submitted 4 May, 2024; originally announced May 2024.

    Comments: Accepted in ICML2024

  22. arXiv:2404.18074  [pdf, other

    cs.AI cs.HC

    MMAC-Copilot: Multi-modal Agent Collaboration Operating System Copilot

    Authors: Zirui Song, Yaohang Li, Meng Fang, Zhenhao Chen, Zecheng Shi, Yuan Huang, Ling Chen

    Abstract: Autonomous virtual agents are often limited by their singular mode of interaction with real-world environments, restricting their versatility. To address this, we propose the Multi-Modal Agent Collaboration framework (MMAC-Copilot), a framework utilizes the collective expertise of diverse agents to enhance interaction ability with operating systems. The framework introduces a team collaboration ch… ▽ More

    Submitted 4 May, 2024; v1 submitted 28 April, 2024; originally announced April 2024.

    Comments: In processing

  23. arXiv:2404.15611  [pdf, other

    cs.CR

    Model Poisoning Attacks to Federated Learning via Multi-Round Consistency

    Authors: Yueqi Xie, Minghong Fang, Neil Zhenqiang Gong

    Abstract: Model poisoning attacks are critical security threats to Federated Learning (FL). Existing model poisoning attacks suffer from two key limitations: 1) they achieve suboptimal effectiveness when defenses are deployed, and/or 2) they require knowledge of the model updates or local training data on genuine clients. In this work, we make a key observation that their suboptimal effectiveness arises fro… ▽ More

    Submitted 6 June, 2024; v1 submitted 23 April, 2024; originally announced April 2024.

  24. arXiv:2404.14389  [pdf, other

    cs.NI cs.CR cs.LG

    Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction

    Authors: Zifan Zhang, Minghong Fang, Jiayuan Huang, Yuchen Liu

    Abstract: Federated Learning (FL) offers a distributed framework to train a global control model across multiple base stations without compromising the privacy of their local network data. This makes it ideal for applications like wireless traffic prediction (WTP), which plays a crucial role in optimizing network resources, enabling proactive traffic flow management, and enhancing the reliability of downstr… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: Accepted by IFIP/IEEE Networking 2024

    ACM Class: C.2.1

  25. arXiv:2404.12754  [pdf, other

    cs.LG cs.AI

    Adaptive Regularization of Representation Rank as an Implicit Constraint of Bellman Equation

    Authors: Qiang He, Tianyi Zhou, Meng Fang, Setareh Maghsudi

    Abstract: Representation rank is an important concept for understanding the role of Neural Networks (NNs) in Deep Reinforcement learning (DRL), which measures the expressive capacity of value networks. Existing studies focus on unboundedly maximizing this rank; nevertheless, that approach would introduce overly complex models in the learning, thus undermining performance. Hence, fine-tuning representation r… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted to CVPR23; Code: https://github.com/sweetice/BEER-ICLR2024

  26. arXiv:2403.09308  [pdf, other

    cs.HC cs.RO

    Enabling Waypoint Generation for Collaborative Robots using LLMs and Mixed Reality

    Authors: Cathy Mengying Fang, Krzysztof Zieliński, Pattie Maes, Joe Paradiso, Bruce Blumberg, Mikkel Baun Kjærgaard

    Abstract: Programming a robotic is a complex task, as it demands the user to have a good command of specific programming languages and awareness of the robot's physical constraints. We propose a framework that simplifies robot deployment by allowing direct communication using natural language. It uses large language models (LLM) for prompt processing, workspace understanding, and waypoint generation. It als… ▽ More

    Submitted 17 July, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Published in VLMNM 2024 - Workshop, ICRA 2024

  27. arXiv:2403.03149  [pdf, other

    cs.CR cs.DC cs.LG

    Robust Federated Learning Mitigates Client-side Training Data Distribution Inference Attacks

    Authors: Yichang Xu, Ming Yin, Minghong Fang, Neil Zhenqiang Gong

    Abstract: Recent studies have revealed that federated learning (FL), once considered secure due to clients not sharing their private data with the server, is vulnerable to attacks such as client-side training data distribution inference, where a malicious client can recreate the victim's data. While various countermeasures exist, they are not practical, often assuming server access to some training data or… ▽ More

    Submitted 4 April, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: To appear in The Web Conference 2024 (WWW '24)

  28. arXiv:2402.17333  [pdf, other

    cs.CL

    Unsupervised multiple choices question answering via universal corpus

    Authors: Qin Zhang, Hao Ge, Xiaojun Chen, Meng Fang

    Abstract: Unsupervised question answering is a promising yet challenging task, which alleviates the burden of building large-scale annotated data in a new domain. It motivates us to study the unsupervised multiple-choice question answering (MCQA) problem. In this paper, we propose a novel framework designed to generate synthetic MCQA data barely based on contexts from the universal domain without relying on… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 5 pages, 1 figures, published to ICASSP 2024

  29. arXiv:2402.16457  [pdf, other

    cs.CL

    RetrievalQA: Assessing Adaptive Retrieval-Augmented Generation for Short-form Open-Domain Question Answering

    Authors: Zihan Zhang, Meng Fang, Ling Chen

    Abstract: Adaptive retrieval-augmented generation (ARAG) aims to dynamically determine the necessity of retrieval for queries instead of retrieving indiscriminately to enhance the efficiency and relevance of the sourced information. However, previous works largely overlook the evaluation of ARAG approaches, leading to their effectiveness being understudied. This work presents a benchmark, RetrievalQA, compr… ▽ More

    Submitted 5 June, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: Findings of ACL 2024

  30. arXiv:2402.14849  [pdf

    cs.CL cs.AI cs.LG

    Asynchronous and Segmented Bidirectional Encoding for NMT

    Authors: Jingpu Yang, Zehua Han, Mengyu Xiang, Helin Wang, Yuxiao Huang, Miao Fang

    Abstract: With the rapid advancement of Neural Machine Translation (NMT), enhancing translation efficiency and quality has become a focal point of research. Despite the commendable performance of general models such as the Transformer in various aspects, they still fall short in processing long sentences and fully leveraging bidirectional contextual information. This paper introduces an improved model based… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  31. arXiv:2402.13740  [pdf, other

    cs.CL

    From Text to CQL: Bridging Natural Language and Corpus Search Engine

    Authors: Luming Lu, Jiyuan An, Yujie Wang, Liner yang, Cunliang Kong, Zhenghao Liu, Shuo Wang, Haozhe Lin, Mingwei Fang, Yaping Huang, Erhong Yang

    Abstract: Natural Language Processing (NLP) technologies have revolutionized the way we interact with information systems, with a significant focus on converting natural language queries into formal query languages such as SQL. However, less emphasis has been placed on the Corpus Query Language (CQL), a critical tool for linguistic research and detailed analysis within text corpora. The manual construction… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  32. arXiv:2402.13494  [pdf, other

    cs.CL cs.CR

    GradSafe: Detecting Jailbreak Prompts for LLMs via Safety-Critical Gradient Analysis

    Authors: Yueqi Xie, Minghong Fang, Renjie Pi, Neil Gong

    Abstract: Large Language Models (LLMs) face threats from jailbreak prompts. Existing methods for detecting jailbreak prompts are primarily online moderation APIs or finetuned LLMs. These strategies, however, often require extensive and resource-intensive data collection and training processes. In this study, we propose GradSafe, which effectively detects jailbreak prompts by scrutinizing the gradients of sa… ▽ More

    Submitted 29 May, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

    Comments: Accepted to ACL 2024 Main

  33. arXiv:2402.12208  [pdf, other

    eess.AS cs.SD

    Language-Codec: Reducing the Gaps Between Discrete Codec Representation and Speech Language Models

    Authors: Shengpeng Ji, Minghui Fang, Ziyue Jiang, Siqi Zheng, Qian Chen, Rongjie Huang, Jialung Zuo, Shulei Wang, Zhou Zhao

    Abstract: In recent years, large language models have achieved significant success in generative tasks (e.g., speech cloning and audio generation) related to speech, audio, music, and other signal domains. A crucial element of these models is the discrete acoustic codecs, which serves as an intermediate representation replacing the mel-spectrogram. However, there exist several gaps between discrete codecs a… ▽ More

    Submitted 27 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: We release a more powerful checkpoint in Language-Codec v3

  34. arXiv:2402.11637  [pdf, other

    cs.CR cs.IR cs.LG

    Poisoning Federated Recommender Systems with Fake Users

    Authors: Ming Yin, Yichang Xu, Minghong Fang, Neil Zhenqiang Gong

    Abstract: Federated recommendation is a prominent use case within federated learning, yet it remains susceptible to various attacks, from user to server-side vulnerabilities. Poisoning attacks are particularly notable among user-side attacks, as participants upload malicious model updates to deceive the global model, often intending to promote or demote specific targeted items. This study investigates strat… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

    Comments: To appear in The Web Conference 2024 (WWW '24)

  35. arXiv:2401.14665  [pdf, other

    q-bio.BM cs.AI

    PepGB: Facilitating peptide drug discovery via graph neural networks

    Authors: Yipin Lei, Xu Wang, Meng Fang, Han Li, Xiang Li, Jianyang Zeng

    Abstract: Peptides offer great biomedical potential and serve as promising drug candidates. Currently, the majority of approved peptide drugs are directly derived from well-explored natural human peptides. It is quite necessary to utilize advanced deep learning techniques to identify novel peptide drugs in the vast, unexplored biochemical space. Despite various in silico methods having been developed to acc… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

  36. arXiv:2401.09334  [pdf, other

    cs.CL cs.AI

    Large Language Models Are Neurosymbolic Reasoners

    Authors: Meng Fang, Shilong Deng, Yudi Zhang, Zijing Shi, Ling Chen, Mykola Pechenizkiy, Jun Wang

    Abstract: A wide range of real-world applications is characterized by their symbolic nature, necessitating a strong capability for symbolic reasoning. This paper investigates the potential application of Large Language Models (LLMs) as symbolic reasoners. We focus on text-based games, significant benchmarks for agents with natural language capabilities, particularly in symbolic tasks like math, map reading,… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

    Comments: Accepted by AAAI 2024

  37. arXiv:2312.17515  [pdf, other

    cs.CL

    Cooperation on the Fly: Exploring Language Agents for Ad Hoc Teamwork in the Avalon Game

    Authors: Zijing Shi, Meng Fang, Shunfeng Zheng, Shilong Deng, Ling Chen, Yali Du

    Abstract: Multi-agent collaboration with Large Language Models (LLMs) demonstrates proficiency in basic tasks, yet its efficiency in more complex scenarios remains unexplored. In gaming environments, these agents often face situations without established coordination protocols, requiring them to make intelligent inferences about teammates from limited data. This problem motivates the area of ad hoc teamwork… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

    Comments: Code will release soon

  38. arXiv:2312.15965  [pdf, other

    cs.LG

    Efficient Reinforcement Learning via Decoupling Exploration and Utilization

    Authors: Jingpu Yang, Helin Wang, Qirui Zhao, Zhecheng Shi, Zirui Song, Miao Fang

    Abstract: Reinforcement Learning (RL), recognized as an efficient learning approach, has achieved remarkable success across multiple fields and applications, including gaming, robotics, and autonomous vehicles. Classical single-agent reinforcement learning grapples with the imbalance of exploration and exploitation as well as limited generalization abilities. This methodology frequently leads to algorithms… ▽ More

    Submitted 10 May, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

    Comments: Accepted by ICIC 2024 (Oral)

    Journal ref: 2024 International Conference on Intelligent Computing

  39. arXiv:2312.15339  [pdf, other

    cs.LG cs.AI cs.CV cs.RO

    MaDi: Learning to Mask Distractions for Generalization in Visual Deep Reinforcement Learning

    Authors: Bram Grooten, Tristan Tomilin, Gautham Vasan, Matthew E. Taylor, A. Rupam Mahmood, Meng Fang, Mykola Pechenizkiy, Decebal Constantin Mocanu

    Abstract: The visual world provides an abundance of information, but many input pixels received by agents often contain distracting stimuli. Autonomous agents need the ability to distinguish useful information from task-irrelevant perceptions, enabling them to generalize to unseen environments with new distractions. Existing works approach this problem using data augmentation or large auxiliary networks wit… ▽ More

    Submitted 23 December, 2023; originally announced December 2023.

    Comments: Accepted as full-paper (oral) at AAMAS 2024. Code is available at https://github.com/bramgrooten/mask-distractions and see our 40-second video at https://youtu.be/2oImF0h1k48

  40. arXiv:2312.07392  [pdf, other

    cs.LG cs.AI

    ReRoGCRL: Representation-based Robustness in Goal-Conditioned Reinforcement Learning

    Authors: Xiangyu Yin, Sihao Wu, Jiaxu Liu, Meng Fang, Xingyu Zhao, Xiaowei Huang, Wenjie Ruan

    Abstract: While Goal-Conditioned Reinforcement Learning (GCRL) has gained attention, its algorithmic robustness against adversarial perturbations remains unexplored. The attacks and robust representation training methods that are designed for traditional RL become less effective when applied to GCRL. To address this challenge, we first propose the Semi-Contrastive Representation attack, a novel approach ins… ▽ More

    Submitted 19 December, 2023; v1 submitted 12 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted in AAAI24 (https://aaai.org/aaai-conference/)

  41. arXiv:2312.06315  [pdf, other

    cs.CL cs.CY cs.LG

    GPTBIAS: A Comprehensive Framework for Evaluating Bias in Large Language Models

    Authors: Jiaxu Zhao, Meng Fang, Shirui Pan, Wenpeng Yin, Mykola Pechenizkiy

    Abstract: Warning: This paper contains content that may be offensive or upsetting. There has been a significant increase in the usage of large language models (LLMs) in various applications, both in their original form and through fine-tuned adaptations. As a result, LLMs have gained popularity and are being widely adopted by a large user community. However, one of the concerns with LLMs is the potential ge… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  42. arXiv:2312.03644  [pdf, other

    cs.LG cs.MA

    MACCA: Offline Multi-agent Reinforcement Learning with Causal Credit Assignment

    Authors: Ziyan Wang, Yali Du, Yudi Zhang, Meng Fang, Biwei Huang

    Abstract: Offline Multi-agent Reinforcement Learning (MARL) is valuable in scenarios where online interaction is impractical or risky. While independent learning in MARL offers flexibility and scalability, accurately assigning credit to individual agents in offline settings poses challenges because interactions with an environment are prohibited. In this paper, we propose a new framework, namely Multi-Agent… ▽ More

    Submitted 28 December, 2023; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: 16 pages, 4 figures

  43. arXiv:2312.03044  [pdf, other

    cs.LG

    REST: Enhancing Group Robustness in DNNs through Reweighted Sparse Training

    Authors: Jiaxu Zhao, Lu Yin, Shiwei Liu, Meng Fang, Mykola Pechenizkiy

    Abstract: The deep neural network (DNN) has been proven effective in various domains. However, they often struggle to perform well on certain minority groups during inference, despite showing strong performance on the majority of data groups. This is because over-parameterized models learned \textit{bias attributes} from a large number of \textit{bias-aligned} training samples. These bias attributes are str… ▽ More

    Submitted 8 December, 2023; v1 submitted 5 December, 2023; originally announced December 2023.

  44. arXiv:2311.16478  [pdf, other

    cs.CV

    RetouchUAA: Unconstrained Adversarial Attack via Image Retouching

    Authors: Mengda Xie, Yiling He, Meie Fang

    Abstract: Deep Neural Networks (DNNs) are susceptible to adversarial examples. Conventional attacks generate controlled noise-like perturbations that fail to reflect real-world scenarios and hard to interpretable. In contrast, recent unconstrained attacks mimic natural image transformations occurring in the real world for perceptible but inconspicuous attacks, yet compromise realism due to neglect of image… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

  45. arXiv:2311.05336  [pdf, other

    cs.CV

    SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data

    Authors: Meiling Fang, Marco Huber, Julian Fierrez, Raghavendra Ramachandra, Naser Damer, Alhasan Alkhaddour, Maksim Kasantcev, Vasiliy Pryadchenko, Ziyuan Yang, Huijie Huangfu, Yingyu Chen, Yi Zhang, Yuchen Pan, Junjun Jiang, Xianming Liu, Xianyun Sun, Caiyong Wang, Xingyu Liu, Zhaohua Chang, Guangzhe Zhao, Juan Tapia, Lazaro Gonzalez-Soler, Carlos Aravena, Daniel Schulz

    Abstract: This paper presents a summary of the Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data (SynFacePAD 2023) held at the 2023 International Joint Conference on Biometrics (IJCB 2023). The competition attracted a total of 8 participating teams with valid submissions from academia and industry. The competition aimed to motivate and attract solutions that ta… ▽ More

    Submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted at IJCB2 023

  46. arXiv:2310.20025  [pdf, other

    cs.LG cs.AI

    GOPlan: Goal-conditioned Offline Reinforcement Learning by Planning with Learned Models

    Authors: Mianchu Wang, Rui Yang, Xi Chen, Hao Sun, Meng Fang, Giovanni Montana

    Abstract: Offline Goal-Conditioned RL (GCRL) offers a feasible paradigm for learning general-purpose policies from diverse and multi-task offline datasets. Despite notable recent progress, the predominant offline GCRL methods, mainly model-free, face constraints in handling limited data and generalizing to unseen goals. In this work, we propose Goal-conditioned Offline Planning (GOPlan), a novel model-based… ▽ More

    Submitted 16 May, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: Spotlight Presentation at Goal-conditioned Reinforcement Learning Workshop at NeurIPS 2023

    Journal ref: Transactions on Machine Learning Research (05/2024)

  47. arXiv:2310.17838  [pdf, other

    cs.GR cs.AI

    Real-time Animation Generation and Control on Rigged Models via Large Language Models

    Authors: Han Huang, Fernanda De La Torre, Cathy Mengying Fang, Andrzej Banburski-Fahey, Judith Amores, Jaron Lanier

    Abstract: We introduce a novel method for real-time animation control and generation on rigged models using natural language input. First, we embed a large language model (LLM) in Unity to output structured texts that can be parsed into diverse and realistic animations. Second, we illustrate LLM's potential to enable flexible state transition between existing animations. We showcase the robustness of our ap… ▽ More

    Submitted 15 February, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted to NeurIPS Workshop on ML for Creativity and Design 2023

  48. arXiv:2310.14513  [pdf, other

    cs.CL

    Turn-Level Active Learning for Dialogue State Tracking

    Authors: Zihan Zhang, Meng Fang, Fanghua Ye, Ling Chen, Mohammad-Reza Namazi-Rad

    Abstract: Dialogue state tracking (DST) plays an important role in task-oriented dialogue systems. However, collecting a large amount of turn-by-turn annotated dialogue data is costly and inefficient. In this paper, we propose a novel turn-level active learning framework for DST to actively select turns in dialogues to annotate. Given the limited labelling budget, experimental results demonstrate the effect… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 Main Conference

  49. arXiv:2310.14510  [pdf, other

    cs.CL

    CITB: A Benchmark for Continual Instruction Tuning

    Authors: Zihan Zhang, Meng Fang, Ling Chen, Mohammad-Reza Namazi-Rad

    Abstract: Continual learning (CL) is a paradigm that aims to replicate the human ability to learn and accumulate knowledge continually without forgetting previous knowledge and transferring it to new tasks. Recent instruction tuning (IT) involves fine-tuning models to make them more adaptable to solving NLP tasks in general. However, it is still uncertain how instruction tuning works in the context of CL ta… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: EMNLP 2023 Findings

  50. arXiv:2310.13862  [pdf, other

    cs.LG cs.CR

    Competitive Advantage Attacks to Decentralized Federated Learning

    Authors: Yuqi Jia, Minghong Fang, Neil Zhenqiang Gong

    Abstract: Decentralized federated learning (DFL) enables clients (e.g., hospitals and banks) to jointly train machine learning models without a central orchestration server. In each global training round, each client trains a local model on its own training data and then they exchange local models for aggregation. In this work, we propose SelfishAttack, a new family of attacks to DFL. In SelfishAttack, a se… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.