Skip to main content

Showing 1–50 of 269 results for author: Liang, S

  1. arXiv:2407.12575  [pdf, other

    cs.AR

    Graphitron: A Domain Specific Language for FPGA-based Graph Processing Accelerator Generation

    Authors: Xinmiao Zhang, Zheng Feng, Shengwen Liang, Xinyu Chen, Cheng Liu, Huawei Li, Xiaowei Li

    Abstract: FPGA-based graph processing accelerators, enabling extensive customization, have demonstrated significant energy efficiency over general computing engines like CPUs and GPUs. Nonetheless, customizing accelerators to diverse graph processing algorithms with distinct computational patterns remains challenging and error-prone for high-level application users. To this end, template-based approaches ha… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

  2. arXiv:2407.12274  [pdf, other

    cs.CV

    MDPE: A Multimodal Deception Dataset with Personality and Emotional Characteristics

    Authors: Cong Cai, Shan Liang, Xuefei Liu, Kang Zhu, Zhengqi Wen, Jianhua Tao, Heng Xie, Jizhou Cui, Yiming Ma, Zhenhua Cheng, Hanzhe Xu, Ruibo Fu, Bin Liu, Yongwei Li

    Abstract: Deception detection has garnered increasing attention in recent years due to the significant growth of digital media and heightened ethical and security concerns. It has been extensively studied using multimodal methods, including video, audio, and text. In addition, individual differences in deception production and detection are believed to play a crucial role.Although some studies have utilized… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: Code and data are available; Submitted to NeurIPS 2024 Datasets and Benchmarks Track

  3. arXiv:2407.12168  [pdf, other

    cs.LG math.DS physics.ao-ph

    A Scalable Real-Time Data Assimilation Framework for Predicting Turbulent Atmosphere Dynamics

    Authors: Junqi Yin, Siming Liang, Siyan Liu, Feng Bao, Hristo G. Chipilski, Dan Lu, Guannan Zhang

    Abstract: The weather and climate domains are undergoing a significant transformation thanks to advances in AI-based foundation models such as FourCastNet, GraphCast, ClimaX and Pangu-Weather. While these models show considerable potential, they are not ready yet for operational use in weather forecasting or climate prediction. This is due to the lack of a data assimilation method as part of their workflow… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  4. arXiv:2407.08473  [pdf, other

    cs.AR cs.AI

    Natural language is not enough: Benchmarking multi-modal generative AI for Verilog generation

    Authors: Kaiyan Chang, Zhirong Chen, Yunhao Zhou, Wenlong Zhu, kun wang, Haobo Xu, Cangyuan Li, Mengdi Wang, Shengwen Liang, Huawei Li, Yinhe Han, Ying Wang

    Abstract: Natural language interfaces have exhibited considerable potential in the automation of Verilog generation derived from high-level specifications through the utilization of large language models, garnering significant attention. Nevertheless, this paper elucidates that visual representations contribute essential contextual information critical to design intent for hardware architectures possessing… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Accepted by ICCAD 2024

  5. arXiv:2407.08239  [pdf, other

    cs.SD cs.LG eess.AS

    An Unsupervised Domain Adaptation Method for Locating Manipulated Region in partially fake Audio

    Authors: Siding Zeng, Jiangyan Yi, Jianhua Tao, Yujie Chen, Shan Liang, Yong Ren, Xiaohui Zhang

    Abstract: When the task of locating manipulation regions in partially-fake audio (PFA) involves cross-domain datasets, the performance of deep learning models drops significantly due to the shift between the source and target domains. To address this issue, existing approaches often employ data augmentation before training. However, they overlook the characteristics in target domain that are absent in sourc… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

  6. arXiv:2407.02922  [pdf, other

    cs.IT

    Fair Resource Allocation for Probabilistic Semantic Communication in IIoT

    Authors: Siyun Liang, Zhouxiang Zhao, Chen Zhu, Zhaohui Yang, Yinchao Yang, Mohammad Shikh-Bahaei, Zhaoyang Zhang

    Abstract: In this paper, the problem of minimum rate maximization for probabilistic semantic communication (PSCom) in industrial Internet of Things (IIoT) is investigated. In the considered model, users employ semantic information extraction techniques to compress the original data before sending it to the base station (BS). During this semantic compression process, knowledge graphs are employed to represen… ▽ More

    Submitted 8 July, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

  7. arXiv:2407.00600  [pdf, other

    cs.CV cs.AI

    GenderBias-\emph{VL}: Benchmarking Gender Bias in Vision Language Models via Counterfactual Probing

    Authors: Yisong Xiao, Aishan Liu, QianJia Cheng, Zhenfei Yin, Siyuan Liang, Jiapeng Li, Jing Shao, Xianglong Liu, Dacheng Tao

    Abstract: Large Vision-Language Models (LVLMs) have been widely adopted in various applications; however, they exhibit significant gender biases. Existing benchmarks primarily evaluate gender bias at the demographic group level, neglecting individual fairness, which emphasizes equal treatment of similar individuals. This research gap limits the detection of discriminatory behaviors, as individual fairness o… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

    Comments: 9 pages, 4 figures

  8. Improving the Expressiveness of $K$-hop Message-Passing GNNs by Injecting Contextualized Substructure Information

    Authors: Tianjun Yao, Yiongxu Wang, Kun Zhang, Shangsong Liang

    Abstract: Graph neural networks (GNNs) have become the \textit{de facto} standard for representational learning in graphs, and have achieved state-of-the-art performance in many graph-related tasks; however, it has been shown that the expressive power of standard GNNs are equivalent maximally to 1-dimensional Weisfeiler-Lehman (1-WL) Test. Recently, there is a line of works aiming to enhance the expressive… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 13 pages, published in Research track of KDD2023

    ACM Class: I.2.6

  9. arXiv:2406.18844  [pdf, other

    cs.CV

    Revisiting Backdoor Attacks against Large Vision-Language Models

    Authors: Siyuan Liang, Jiawei Liang, Tianyu Pang, Chao Du, Aishan Liu, Ee-Chien Chang, Xiaochun Cao

    Abstract: Instruction tuning enhances large vision-language models (LVLMs) but raises security risks through potential backdoor attacks due to their openness. Previous backdoor studies focus on enclosed scenarios with consistent training and testing instructions, neglecting the practical domain gaps that could affect attack effectiveness. This paper empirically examines the generalizability of backdoor atta… ▽ More

    Submitted 1 July, 2024; v1 submitted 26 June, 2024; originally announced June 2024.

    Comments: 24 pages, 8 figures

  10. arXiv:2406.14434  [pdf, other

    cs.CL

    Towards Truthful Multilingual Large Language Models: Benchmarking and Alignment Strategies

    Authors: Weihao Liu, Ning Wu, Wenbiao Ding, Shining Liang, Ming Gong, Dongmei Zhang

    Abstract: In the era of large language models (LLMs), building multilingual large language models (MLLMs) that can serve users worldwide holds great significance. However, existing research seldom focuses on the truthfulness of MLLMs. Meanwhile, contemporary multilingual aligning technologies struggle to balance massive languages and often exhibit serious truthfulness gaps across different languages, especi… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: 15 pages

  11. arXiv:2406.12072  [pdf, other

    cs.AI cs.LG

    DTGB: A Comprehensive Benchmark for Dynamic Text-Attributed Graphs

    Authors: Jiasheng Zhang, Jialin Chen, Menglin Yang, Aosong Feng, Shuang Liang, Jie Shao, Rex Ying

    Abstract: Dynamic text-attributed graphs (DyTAGs) are prevalent in various real-world scenarios, where each node and edge are associated with text descriptions, and both the graph structure and text descriptions evolve over time. Despite their broad applicability, there is a notable scarcity of benchmark datasets tailored to DyTAGs, which hinders the potential advancement in many research fields. To address… ▽ More

    Submitted 18 June, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: 28 pages, 13 figures

  12. arXiv:2406.04031  [pdf, other

    cs.CV cs.CR

    Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt

    Authors: Zonghao Ying, Aishan Liu, Tianyuan Zhang, Zhengmin Yu, Siyuan Liang, Xianglong Liu, Dacheng Tao

    Abstract: In the realm of large vision language models (LVLMs), jailbreak attacks serve as a red-teaming approach to bypass guardrails and uncover safety implications. Existing jailbreaks predominantly focus on the visual modality, perturbing solely visual inputs in the prompt for attacks. However, they fall short when confronted with aligned models that fuse visual and textual features simultaneously for g… ▽ More

    Submitted 1 July, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  13. arXiv:2406.00934  [pdf, other

    cs.CV

    LanEvil: Benchmarking the Robustness of Lane Detection to Environmental Illusions

    Authors: Tianyuan Zhang, Lu Wang, Hainan Li, Yisong Xiao, Siyuan Liang, Aishan Liu, Xianglong Liu, Dacheng Tao

    Abstract: Lane detection (LD) is an essential component of autonomous driving systems, providing fundamental functionalities like adaptive cruise control and automated lane centering. Existing LD benchmarks primarily focus on evaluating common cases, neglecting the robustness of LD models against environmental illusions such as shadows and tire marks on the road. This research gap poses significant safety c… ▽ More

    Submitted 16 July, 2024; v1 submitted 2 June, 2024; originally announced June 2024.

    Comments: Accepted by ACM MM 2024

  14. arXiv:2406.00629  [pdf, other

    cs.CV

    Correlation Matching Transformation Transformers for UHD Image Restoration

    Authors: Cong Wang, Jinshan Pan, Wei Wang, Gang Fu, Siyuan Liang, Mengzhu Wang, Xiao-Ming Wu, Jun Liu

    Abstract: This paper proposes UHDformer, a general Transformer for Ultra-High-Definition (UHD) image restoration. UHDformer contains two learning spaces: (a) learning in high-resolution space and (b) learning in low-resolution space. The former learns multi-level high-resolution features and fuses low-high features and reconstructs the residual images, while the latter explores more representative features… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

    Comments: AAAI-24; Source codes, datasets, visual results, and pre-trained models are: https://github.com/supersupercong/UHDformer

  15. arXiv:2406.00009  [pdf, other

    cs.RO

    ULTra-AV: A Unified Longitudinal Trajectory Dataset for Automated Vehicle

    Authors: Hang Zhou, Ke Ma, Shixiao Liang, Xiaopeng Li, Xiaobo Qu

    Abstract: Automated Vehicles (AVs) promise significant advances in transportation. Critical to these improvements is understanding AVs' longitudinal behavior, relying heavily on real-world trajectory data. Existing open-source trajectory datasets of AV, however, often fall short in refinement, reliability, and completeness, hindering effective performance metrics analysis and model development. This study a… ▽ More

    Submitted 16 May, 2024; originally announced June 2024.

    Comments: NA

  16. arXiv:2405.20358  [pdf, other

    cs.LG q-bio.QM

    Medication Recommendation via Dual Molecular Modalities and Multi-Substructure Enhancement

    Authors: Shi Mu, Shunpan Liang, Xiang Li

    Abstract: Medication recommendation combines patient medical history with biomedical knowledge to assist doctors in determining medication combinations more accurately and safely. Existing works based on molecular knowledge neglect the 3D geometric structure of molecules and fail to learn the high-dimensional information of medications, leading to structural confusion. Additionally, it does not extract key… ▽ More

    Submitted 8 July, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: 14 pages, 9 figures

  17. arXiv:2405.16134  [pdf, other

    cs.CV

    Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack

    Authors: Mingli Zhu, Siyuan Liang, Baoyuan Wu

    Abstract: Deep neural networks face persistent challenges in defending against backdoor attacks, leading to an ongoing battle between attacks and defenses. While existing backdoor defense strategies have shown promising performance on reducing attack success rates, can we confidently claim that the backdoor threat has truly been eliminated from the model? To address it, we re-investigate the characteristics… ▽ More

    Submitted 30 May, 2024; v1 submitted 25 May, 2024; originally announced May 2024.

  18. arXiv:2405.15627  [pdf, other

    physics.class-ph cs.CE

    Scattering-Based Characteristic Mode Theory for Structures in Arbitrary Background: Computation, Benchmarks, and Applications

    Authors: Chenbo Shi, Jin Pan, Xin Gu, Shichen Liang, Le Zuo

    Abstract: This paper presents a novel approach for computing substructure characteristic modes. This method leverages electromagnetic scattering matrices and spherical wave expansion to directly decompose electromagnetic fields. Unlike conventional methods that rely on the impedance matrix generated by the method of moments (MoM), our technique simplifies the problem into a small-scale ordinary eigenvalue p… ▽ More

    Submitted 10 July, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

  19. arXiv:2405.15414  [pdf, other

    cs.AI

    Luban: Building Open-Ended Creative Agents via Autonomous Embodied Verification

    Authors: Yuxuan Guo, Shaohui Peng, Jiaming Guo, Di Huang, Xishan Zhang, Rui Zhang, Yifan Hao, Ling Li, Zikang Tian, Mingju Gao, Yutai Li, Yiming Gan, Shuai Liang, Zihao Zhang, Zidong Du, Qi Guo, Xing Hu, Yunji Chen

    Abstract: Building open agents has always been the ultimate goal in AI research, and creative agents are the more enticing. Existing LLM agents excel at long-horizon tasks with well-defined goals (e.g., `mine diamonds' in Minecraft). However, they encounter difficulties on creative tasks with open goals and abstract criteria due to the inability to bridge the gap between them, thus lacking feedback for self… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  20. Distributed Harmonization: Federated Clustered Batch Effect Adjustment and Generalization

    Authors: Bao Hoang, Yijiang Pang, Siqi Liang, Liang Zhan, Paul Thompson, Jiayu Zhou

    Abstract: Independent and identically distributed (i.i.d.) data is essential to many data analysis and modeling techniques. In the medical domain, collecting data from multiple sites or institutions is a common strategy that guarantees sufficient clinical diversity, determined by the decentralized nature of medical data. However, data from various sites are easily biased by the local environment or faciliti… ▽ More

    Submitted 16 June, 2024; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: 11 pages, 7 figures, accepted to KDD2024-ADS

  21. arXiv:2405.14932  [pdf, other

    cs.LG hep-ph stat.ML

    Fast Inference Using Automatic Differentiation and Neural Transport in Astroparticle Physics

    Authors: Dorian W. P. Amaral, Shixiao Liang, Juehang Qin, Christopher Tunnell

    Abstract: Multi-dimensional parameter spaces are commonly encountered in astroparticle physics theories that attempt to capture novel phenomena. However, they often possess complicated posterior geometries that are expensive to traverse using techniques traditional to this community. Effectively sampling these spaces is crucial to bridge the gap between experiment and theory. Several recent innovations, whi… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 20 pages, 7 figures, 4 tables, 6 appendices

  22. arXiv:2405.14077  [pdf, other

    cs.CV cs.AI

    Learning to Transform Dynamically for Better Adversarial Transferability

    Authors: Rongyi Zhu, Zeliang Zhang, Susan Liang, Zhuo Liu, Chenliang Xu

    Abstract: Adversarial examples, crafted by adding perturbations imperceptible to humans, can deceive neural networks. Recent studies identify the adversarial transferability across various models, \textit{i.e.}, the cross-model attack ability of adversarial samples. To enhance such adversarial transferability, existing input transformation-based methods diversify input data with transformation augmentation.… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: accepted as a poster in CVPR 2024

  23. arXiv:2405.11412  [pdf, other

    cs.AI cs.SC

    Simulating Petri nets with Boolean Matrix Logic Programming

    Authors: Lun Ai, Stephen H. Muggleton, Shi-Shun Liang, Geoff S. Baldwin

    Abstract: Recent attention to relational knowledge bases has sparked a demand for understanding how relations change between entities. Petri nets can represent knowledge structure and dynamically simulate interactions between entities, and thus they are well suited for achieving this goal. However, logic programs struggle to deal with extensive Petri nets due to the limitations of high-level symbol manipula… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2405.06724

  24. arXiv:2405.10558  [pdf, other

    cs.SI

    CACL: Community-Aware Heterogeneous Graph Contrastive Learning for Social Media Bot Detection

    Authors: Sirry Chen, Shuo Feng, Songsong Liang, Chen-Chen Zong, Jing Li, Piji Li

    Abstract: Social media bot detection is increasingly crucial with the rise of social media platforms. Existing methods predominantly construct social networks as graph and utilize graph neural networks (GNNs) for bot detection. However, most of these methods focus on how to improve the performance of GNNs while neglecting the community structure within social networks. Moreover, GNNs based methods still fac… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: Accepted by ACL 2024 findings

  25. arXiv:2405.07595  [pdf, other

    cs.CV cs.AI

    Environmental Matching Attack Against Unmanned Aerial Vehicles Object Detection

    Authors: Dehong Kong, Siyuan Liang, Wenqi Ren

    Abstract: Object detection techniques for Unmanned Aerial Vehicles (UAVs) rely on Deep Neural Networks (DNNs), which are vulnerable to adversarial attacks. Nonetheless, adversarial patches generated by existing algorithms in the UAV domain pay very little attention to the naturalness of adversarial patches. Moreover, imposing constraints directly on adversarial patches makes it difficult to generate patches… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  26. arXiv:2405.06724  [pdf, other

    q-bio.MN cs.AI cs.LG

    Boolean matrix logic programming for active learning of gene functions in genome-scale metabolic network models

    Authors: Lun Ai, Stephen H. Muggleton, Shi-Shun Liang, Geoff S. Baldwin

    Abstract: Techniques to autonomously drive research have been prominent in Computational Scientific Discovery, while Synthetic Biology is a field of science that focuses on designing and constructing new biological systems for useful purposes. Here we seek to apply logic-based machine learning techniques to facilitate cellular engineering and drive biological discovery. Comprehensive databases of metabolic… ▽ More

    Submitted 20 May, 2024; v1 submitted 10 May, 2024; originally announced May 2024.

  27. arXiv:2405.05616  [pdf, other

    cs.CL cs.AI

    G-SAP: Graph-based Structure-Aware Prompt Learning over Heterogeneous Knowledge for Commonsense Reasoning

    Authors: Ruiting Dai, Yuqiao Tan, Lisi Mo, Shuang Liang, Guohao Huo, Jiayi Luo, Yao Cheng

    Abstract: Commonsense question answering has demonstrated considerable potential across various applications like assistants and social robots. Although fully fine-tuned pre-trained Language Models(LM) have achieved remarkable performance in commonsense reasoning, their tendency to excessively prioritize textual information hampers the precise transfer of structural knowledge and undermines interpretability… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  28. arXiv:2405.05553  [pdf, other

    cs.CV cs.AI

    Towards Robust Physical-world Backdoor Attacks on Lane Detection

    Authors: Xinwei Zhang, Aishan Liu, Tianyuan Zhang, Siyuan Liang, Xianglong Liu

    Abstract: Deep learning-based lane detection (LD) plays a critical role in autonomous driving systems, such as adaptive cruise control. However, it is vulnerable to backdoor attacks. Existing backdoor attack methods on LD exhibit limited effectiveness in dynamic real-world scenarios, primarily because they fail to consider dynamic scene factors, including changes in driving perspectives (e.g., viewpoint tra… ▽ More

    Submitted 1 July, 2024; v1 submitted 9 May, 2024; originally announced May 2024.

  29. arXiv:2404.15354  [pdf, other

    eess.SP cs.AI cs.LG math.NA

    Elevating Spectral GNNs through Enhanced Band-pass Filter Approximation

    Authors: Guoming Li, Jian Yang, Shangsong Liang, Dongsheng Luo

    Abstract: Spectral Graph Neural Networks (GNNs) have attracted great attention due to their capacity to capture patterns in the frequency domains with essential graph filters. Polynomial-based ones (namely poly-GNNs), which approximately construct graph filters with conventional or rational polynomials, are routinely adopted in practice for their substantial performances on graph learning tasks. However, pr… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: Preprint

  30. arXiv:2404.13518  [pdf, other

    cs.CR cs.AI

    Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion

    Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang

    Abstract: With the rise of Machine Learning as a Service (MLaaS) platforms,safeguarding the intellectual property of deep learning models is becoming paramount. Among various protective measures, trigger set watermarking has emerged as a flexible and effective strategy for preventing unauthorized model distribution. However, this paper identifies an inherent flaw in the current paradigm of trigger set water… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  31. arXiv:2404.12228  [pdf, other

    cs.AI cs.LG

    CausalMed: Causality-Based Personalized Medication Recommendation Centered on Patient health state

    Authors: Xiang Li, Shunpan Liang, Yu Lei, Chen Li, Yulei Hou, Tengfei Ma

    Abstract: Medication recommendation systems are developed to recommend suitable medications tailored to specific patient. Previous researches primarily focus on learning medication representations, which have yielded notable advances. However, these methods are limited to capturing personalized patient representations due to the following primary limitations: (i) unable to capture the differences in the imp… ▽ More

    Submitted 17 July, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

    Comments: CIKM 2024 Full Research Paper

  32. arXiv:2404.11993  [pdf, other

    cs.IR cs.LG

    Knowledge-Aware Multi-Intent Contrastive Learning for Multi-Behavior Recommendation

    Authors: Shunpan Liang, Junjie Zhao, Chen Li, Yu Lei

    Abstract: Multi-behavioral recommendation optimizes user experiences by providing users with more accurate choices based on their diverse behaviors, such as view, add to cart, and purchase. Current studies on multi-behavioral recommendation mainly explore the connections and differences between multi-behaviors from an implicit perspective. Specifically, they directly model those relations using black-box ne… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  33. arXiv:2404.07453  [pdf, other

    cs.NI cs.NE

    UAV-enabled Collaborative Beamforming via Multi-Agent Deep Reinforcement Learning

    Authors: Saichao Liu, Geng Sun, Jiahui Li, Shuang Liang, Qingqing Wu, Pengfei Wang, Dusit Niyato

    Abstract: In this paper, we investigate an unmanned aerial vehicle (UAV)-assistant air-to-ground communication system, where multiple UAVs form a UAV-enabled virtual antenna array (UVAA) to communicate with remote base stations by utilizing collaborative beamforming. To improve the work efficiency of the UVAA, we formulate a UAV-enabled collaborative beamforming multi-objective optimization problem (UCBMOP)… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: This paper has been submitted to IEEE Transactions on Mobile Computing

  34. arXiv:2404.07444  [pdf, other

    cs.NI eess.SP

    Two-Way Aerial Secure Communications via Distributed Collaborative Beamforming under Eavesdropper Collusion

    Authors: Jiahui Li, Geng Sun, Qingqing Wu, Shuang Liang, Pengfei Wang, Dusit Niyato

    Abstract: Unmanned aerial vehicles (UAVs)-enabled aerial communication provides a flexible, reliable, and cost-effective solution for a range of wireless applications. However, due to the high line-of-sight (LoS) probability, aerial communications between UAVs are vulnerable to eavesdropping attacks, particularly when multiple eavesdroppers collude. In this work, we aim to introduce distributed collaborativ… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by IEEE INFOCOM 2024

  35. arXiv:2404.04998  [pdf, other

    cs.CV cs.AI cs.IR

    Weakly Supervised Deep Hyperspherical Quantization for Image Retrieval

    Authors: Jinpeng Wang, Bin Chen, Qiang Zhang, Zaiqiao Meng, Shangsong Liang, Shu-Tao Xia

    Abstract: Deep quantization methods have shown high efficiency on large-scale image retrieval. However, current models heavily rely on ground-truth information, hindering the application of quantization in label-hungry scenarios. A more realistic demand is to learn from inexhaustible uploaded images that are associated with informal tags provided by amateur users. Though such sketchy tags do not obviously r… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: In proceedings of AAAI 2021. Code and data are available

  36. arXiv:2404.04969  [pdf, other

    cs.LG cs.AI

    Temporal Generalization Estimation in Evolving Graphs

    Authors: Bin Lu, Tingyan Ma, Xiaoying Gan, Xinbing Wang, Yunqiang Zhu, Chenghu Zhou, Shiyu Liang

    Abstract: Graph Neural Networks (GNNs) are widely deployed in vast fields, but they often struggle to maintain accurate representations as graphs evolve. We theoretically establish a lower bound, proving that under mild conditions, representation distortion inevitably occurs over time. To estimate the temporal distortion without human annotation after deployment, one naive approach is to pre-train a recurre… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: Published as a conference paper at ICLR 2024

  37. arXiv:2404.04559  [pdf, ps, other

    cs.LG eess.SP math.NA

    Spectral GNN via Two-dimensional (2-D) Graph Convolution

    Authors: Guoming Li, Jian Yang, Shangsong Liang, Dongsheng Luo

    Abstract: Spectral Graph Neural Networks (GNNs) have achieved tremendous success in graph learning. As an essential part of spectral GNNs, spectral graph convolution extracts crucial frequency information in graph data, leading to superior performance of spectral GNNs in downstream tasks. However, in this paper, we show that existing spectral GNNs remain critical drawbacks in performing the spectral graph c… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Preprint

  38. arXiv:2404.02166  [pdf, other

    cs.IT

    An Online Joint Optimization Approach for QoE Maximization in UAV-Enabled Mobile Edge Computing

    Authors: Long He, Geng Sun, Zemin Sun, Pengfei Wang, Jiahui Li, Shuang Liang, Dusit Niyato

    Abstract: Given flexible mobility, rapid deployment, and low cost, unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) shows great potential to compensate for the lack of terrestrial edge computing coverage. However, limited battery capacity, computing and spectrum resources also pose serious challenges for UAV-enabled MEC, which shorten the service time of UAVs and degrade the quality of expe… ▽ More

    Submitted 23 March, 2024; originally announced April 2024.

  39. arXiv:2403.18980  [pdf, other

    math.CO cs.CG

    A census of graph-drawing algorithms based on generalized transversal structures

    Authors: Olivier Bernardi, Éric Fusy, Shizhe Liang

    Abstract: We present two graph drawing algorithms based on the recently defined "grand-Schnyder woods", which are a far-reaching generalization of the classical Schnyder woods. The first is a straight-line drawing algorithm for plane graphs with faces of degree 3 and 4 with no separating 3-cycle, while the second is a rectangular drawing algorithm for the dual of such plane graphs. In our algorithms, the… ▽ More

    Submitted 31 May, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

  40. arXiv:2403.17336  [pdf, other

    cs.CR cs.CL

    Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models

    Authors: Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, Ning Zhang

    Abstract: Recent advancements in generative AI have enabled ubiquitous access to large language models (LLMs). Empowered by their exceptional capabilities to understand and generate human-like text, these models are being increasingly integrated into our society. At the same time, there are also concerns on the potential misuse of this powerful technology, prompting defensive measures from service providers… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Accepted by USENIX Security 2024

  41. arXiv:2403.16271  [pdf, other

    cs.CV

    Object Detectors in the Open Environment: Challenges, Solutions, and Outlook

    Authors: Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao

    Abstract: With the emergence of foundation models, deep learning-based object detectors have shown practical usability in closed set scenarios. However, for real-world tasks, object detectors often operate in open environments, where crucial factors (e.g., data distribution, objective) that influence model learning are often changing. The dynamic and intricate nature of the open environment poses novel and… ▽ More

    Submitted 9 April, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: 37 pages, 17 figures

  42. arXiv:2403.16257  [pdf, other

    cs.CV

    Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning

    Authors: Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao

    Abstract: Multimodal contrastive learning has emerged as a powerful paradigm for building high-quality features using the complementary strengths of various data modalities. However, the open nature of such systems inadvertently increases the possibility of backdoor attacks. These attacks subtly embed malicious behaviors within the model during training, which can be activated by specific triggers in the in… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 6 pages, 2 figures

  43. arXiv:2403.12320  [pdf, other

    cs.LG cs.AI

    Approximated Likelihood Ratio: A Forward-Only and Parallel Framework for Boosting Neural Network Training

    Authors: Zeliang Zhang, Jinyang Jiang, Zhuo Liu, Susan Liang, Yijie Peng, Chenliang Xu

    Abstract: Efficient and biologically plausible alternatives to backpropagation in neural network training remain a challenge due to issues such as high computational complexity and additional assumptions about neural networks, which limit scalability to deeper networks. The likelihood ratio method offers a promising gradient estimation strategy but is constrained by significant memory consumption, especiall… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  44. arXiv:2403.11202  [pdf, other

    cs.AR cs.AI cs.PL

    Data is all you need: Finetuning LLMs for Chip Design via an Automated design-data augmentation framework

    Authors: Kaiyan Chang, Kun Wang, Nan Yang, Ying Wang, Dantong Jin, Wenlong Zhu, Zhirong Chen, Cangyuan Li, Hao Yan, Yunhao Zhou, Zhuoliang Zhao, Yuan Cheng, Yudong Pan, Yiqi Liu, Mengdi Wang, Shengwen Liang, Yinhe Han, Huawei Li, Xiaowei Li

    Abstract: Recent advances in large language models have demonstrated their potential for automated generation of hardware description language (HDL) code from high-level prompts. Researchers have utilized fine-tuning to enhance the ability of these large language models (LLMs) in the field of Chip Design. However, the lack of Verilog data hinders further improvement in the quality of Verilog generation by L… ▽ More

    Submitted 10 July, 2024; v1 submitted 17 March, 2024; originally announced March 2024.

    Comments: DAC 2024

  45. arXiv:2403.07714  [pdf, other

    cs.CL

    StableToolBench: Towards Stable Large-Scale Benchmarking on Tool Learning of Large Language Models

    Authors: Zhicheng Guo, Sijie Cheng, Hao Wang, Shihao Liang, Yujia Qin, Peng Li, Zhiyuan Liu, Maosong Sun, Yang Liu

    Abstract: Large Language Models (LLMs) have witnessed remarkable advancements in recent years, prompting the exploration of tool learning, which integrates LLMs with external tools to address diverse real-world challenges. Assessing the capability of LLMs to utilise tools necessitates large-scale and stable benchmarks. However, previous works relied on either hand-crafted online tools with limited scale, or… ▽ More

    Submitted 19 June, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  46. arXiv:2403.05247  [pdf, other

    cs.CV eess.IV

    Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

    Authors: Tianrui Lou, Xiaojun Jia, Jindong Gu, Li Liu, Siyuan Liang, Bangyan He, Xiaochun Cao

    Abstract: Adversarial attack methods based on point manipulation for 3D point cloud classification have revealed the fragility of 3D models, yet the adversarial examples they produce are easily perceived or defended against. The trade-off between the imperceptibility and adversarial strength leads most point attack methods to inevitably introduce easily detectable outlier points upon a successful attack. An… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: Accepted by CVPR 2024

  47. arXiv:2403.04599  [pdf, other

    cs.LG

    Contrastive Continual Learning with Importance Sampling and Prototype-Instance Relation Distillation

    Authors: Jiyong Li, Dilshod Azizov, Yang Li, Shangsong Liang

    Abstract: Recently, because of the high-quality representations of contrastive learning methods, rehearsal-based contrastive continual learning has been proposed to explore how to continually learn transferable representation embeddings to avoid the catastrophic forgetting issue in traditional continual settings. Based on this framework, we propose Contrastive Continual Learning via Importance Sampling (CCL… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

    Comments: Accepted by AAAI 2024

  48. arXiv:2403.02576  [pdf, other

    cs.DL cs.LG cs.SI

    AceMap: Knowledge Discovery through Academic Graph

    Authors: Xinbing Wang, Luoyi Fu, Xiaoying Gan, Ying Wen, Guanjie Zheng, Jiaxin Ding, Liyao Xiang, Nanyang Ye, Meng Jin, Shiyu Liang, Bin Lu, Haiwen Wang, Yi Xu, Cheng Deng, Shao Zhang, Huquan Kang, Xingli Wang, Qi Li, Zhixin Guo, Jiexing Qi, Pan Liu, Yuyang Ren, Lyuwen Wu, Jungang Yang, Jianping Zhou , et al. (1 additional authors not shown)

    Abstract: The exponential growth of scientific literature requires effective management and extraction of valuable insights. While existing scientific search engines excel at delivering search results based on relational databases, they often neglect the analysis of collaborations between scientific entities and the evolution of ideas, as well as the in-depth analysis of content within scientific publicatio… ▽ More

    Submitted 14 April, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: Technical Report for AceMap (https://www.acemap.info)

  49. arXiv:2403.00880  [pdf, other

    cs.IR cs.AI

    Dual-Granularity Medication Recommendation Based on Causal Inference

    Authors: Shunpan Liang, Xiang Li, Xiang Li, Chen Li, Yu Lei, Yulei Hou, Tengfei Ma

    Abstract: As medical demands grow and machine learning technology advances, AI-based diagnostic and treatment systems are garnering increasing attention. Medication recommendation aims to integrate patients' long-term health records with medical knowledge, recommending accuracy and safe medication combinations for specific conditions. However, most existing researches treat medication recommendation systems… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  50. arXiv:2402.16667  [pdf, other

    cs.CL cs.AI

    RepoAgent: An LLM-Powered Open-Source Framework for Repository-level Code Documentation Generation

    Authors: Qinyu Luo, Yining Ye, Shihao Liang, Zhong Zhang, Yujia Qin, Yaxi Lu, Yesai Wu, Xin Cong, Yankai Lin, Yingli Zhang, Xiaoyin Che, Zhiyuan Liu, Maosong Sun

    Abstract: Generative models have demonstrated considerable potential in software engineering, particularly in tasks such as code generation and debugging. However, their utilization in the domain of code documentation generation remains underexplored. To this end, we introduce RepoAgent, a large language model powered open-source framework aimed at proactively generating, maintaining, and updating code docu… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    ACM Class: I.2.7; F.2.2