Skip to main content

Showing 1–50 of 411 results for author: Xu, G

  1. arXiv:2407.12248  [pdf, other

    cs.DC

    Mitigating Interference of Microservices with a Scoring Mechanism in Large-scale Clusters

    Authors: Dingyu Yang, Kangpeng Zheng, Shiyou Qian, Jian Cao, Guangtao Xue

    Abstract: Co-locating latency-critical services (LCSs) and best-effort jobs (BEJs) constitute the principal approach for enhancing resource utilization in production. Nevertheless, the co-location practice hurts the performance of LCSs due to resource competition, even when employing isolation technology. Through an extensive analysis of voluminous real trace data derived from two production clusters, we ob… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  2. arXiv:2407.11494  [pdf, other

    cs.CV

    Learning Semantic Latent Directions for Accurate and Controllable Human Motion Prediction

    Authors: Guowei Xu, Jiale Tao, Wen Li, Lixin Duan

    Abstract: In the realm of stochastic human motion prediction (SHMP), researchers have often turned to generative models like GANS, VAEs and diffusion models. However, most previous approaches have struggled to accurately predict motions that are both realistic and coherent with past motion due to a lack of guidance on the latent distribution. In this paper, we introduce Semantic Latent Directions (SLD) as a… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: Accepted to ECCV 2024

  3. arXiv:2407.10445  [pdf, other

    cs.CV cs.AI

    Backdoor Attacks against Image-to-Image Networks

    Authors: Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu

    Abstract: Recently, deep learning-based Image-to-Image (I2I) networks have become the predominant choice for I2I tasks such as image super-resolution and denoising. Despite their remarkable performance, the backdoor vulnerability of I2I networks has not been explored. To fill this research gap, we conduct a comprehensive investigation on the susceptibility of I2I networks to backdoor attacks. Specifically,… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

  4. HAFormer: Unleashing the Power of Hierarchy-Aware Features for Lightweight Semantic Segmentation

    Authors: Guoan Xu, Wenjing Jia, Tao Wu, Ligeng Chen, Guangwei Gao

    Abstract: Both Convolutional Neural Networks (CNNs) and Transformers have shown great success in semantic segmentation tasks. Efforts have been made to integrate CNNs with Transformer models to capture both local and global context interactions. However, there is still room for enhancement, particularly when considering constraints on computational resources. In this paper, we introduce HAFormer, a model th… ▽ More

    Submitted 10 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 13 pages, 10 figures, 8 tables, IEEE Transactions on Image Processing

  5. arXiv:2407.04608  [pdf, other

    math.OC cs.GT cs.MA

    A Multi-Player Potential Game Approach for Sensor Network Localization with Noisy Measurements

    Authors: Gehui Xu, Guanpu Chen, Baris Fidan, Yiguang Hong, Hongsheng Qi, Thomas Parisini, Karl H. Johansson

    Abstract: Sensor network localization (SNL) is a challenging problem due to its inherent non-convexity and the effects of noise in inter-node ranging measurements and anchor node position. We formulate a non-convex SNL problem as a multi-player non-convex potential game and investigate the existence and uniqueness of a Nash equilibrium (NE) in both the ideal setting without measurement noise and the practic… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2311.03326, arXiv:2401.02471

  6. arXiv:2407.02340  [pdf, other

    cs.CL cs.AI

    RVISA: Reasoning and Verification for Implicit Sentiment Analysis

    Authors: Wenna Lai, Haoran Xie, Guandong Xu, Qing Li

    Abstract: With an increasing social demand for fine-grained sentiment analysis (SA), implicit sentiment analysis (ISA) poses a significant challenge with the absence of salient cue words in expressions. It necessitates reliable reasoning to understand how the sentiment is aroused and thus determine implicit sentiments. In the era of Large Language Models (LLMs), Encoder-Decoder (ED) LLMs have gained popular… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 11 pages, 6 figures, and 4 tables

  7. arXiv:2407.01886  [pdf, other

    cs.LG cs.AI

    Core Knowledge Learning Framework for Graph Adaptation and Scalability Learning

    Authors: Bowen Zhang, Zhichao Huang, Genan Dai, Guangning Xu, Xiaomao Fan, Hu Huang

    Abstract: Graph classification is a pivotal challenge in machine learning, especially within the realm of graph-based data, given its importance in numerous real-world applications such as social network analysis, recommendation systems, and bioinformatics. Despite its significance, graph classification faces several hurdles, including adapting to diverse prediction tasks, training across multiple target do… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  8. arXiv:2407.00322  [pdf

    cs.CL

    LLM-Generated Natural Language Meets Scaling Laws: New Explorations and Data Augmentation Methods

    Authors: Zhenhua Wang, Guang Xu, Ming Ren

    Abstract: With the ascent of large language models (LLM), natural language processing has witnessed enhancements, such as LLM-based data augmentation. Nonetheless, prior research harbors two primary concerns: firstly, a lack of contemplation regarding whether the natural language generated by LLM (LLMNL) truly aligns with human natural language (HNL), a critical foundational question; secondly, an oversight… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  9. arXiv:2406.15769  [pdf, other

    cs.DC

    Humas: A Heterogeneity- and Upgrade-aware Microservice Auto-scaling Framework in Large-scale Data Centers

    Authors: Qin Hua, Dingyu Yang, Shiyou Qian, Jian Cao, Guangtao Xue, Minglu Li

    Abstract: An effective auto-scaling framework is essential for microservices to ensure performance stability and resource efficiency under dynamic workloads. As revealed by many prior studies, the key to efficient auto-scaling lies in accurately learning performance patterns, i.e., the relationship between performance metrics and workloads in data-driven schemes. However, we notice that there are two signif… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    Comments: 14 pages; 27 figures

  10. arXiv:2406.13201  [pdf, other

    cs.LG cs.SI

    Toward Structure Fairness in Dynamic Graph Embedding: A Trend-aware Dual Debiasing Approach

    Authors: Yicong Li, Yu Yang, Jiannong Cao, Shuaiqi Liu, Haoran Tang, Guandong Xu

    Abstract: Recent studies successfully learned static graph embeddings that are structurally fair by preventing the effectiveness disparity of high- and low-degree vertex groups in downstream graph mining tasks. However, achieving structure fairness in dynamic graph embedding remains an open problem. Neglecting degree changes in dynamic graphs will significantly impair embedding effectiveness without notably… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  11. arXiv:2406.12671  [pdf, other

    cs.CV

    GeoBench: Benchmarking and Analyzing Monocular Geometry Estimation Models

    Authors: Yongtao Ge, Guangkai Xu, Zhiyue Zhao, Libo Sun, Zheng Huang, Yanlong Sun, Hao Chen, Chunhua Shen

    Abstract: Recent advances in discriminative and generative pretraining have yielded geometry estimation models with strong generalization capabilities. While discriminative monocular geometry estimation methods rely on large-scale fine-tuning data to achieve zero-shot generalization, several generative-based paradigms show the potential of achieving impressive generalization performance on unseen scenes by… ▽ More

    Submitted 20 June, 2024; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: Code and Benchmark are available at: https://github.com/aim-uofa/GeoBench

  12. arXiv:2406.12304  [pdf, other

    cs.CL

    COT: A Generative Approach for Hate Speech Counter-Narratives via Contrastive Optimal Transport

    Authors: Linhao Zhang, Li Jin, Guangluan Xu, Xiaoyu Li, Xian Sun

    Abstract: Counter-narratives, which are direct responses consisting of non-aggressive fact-based arguments, have emerged as a highly effective approach to combat the proliferation of hate speech. Previous methodologies have primarily focused on fine-tuning and post-editing techniques to ensure the fluency of generated contents, while overlooking the critical aspects of individualization and relevance concer… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: IEEE jounrnals

    MSC Class: 68U15 ACM Class: I.2.7

  13. arXiv:2406.09807  [pdf, other

    cs.SE

    Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps

    Authors: Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Haoyu Wang

    Abstract: The Android ecosystem faces a notable challenge known as fragmentation, which denotes the extensive diversity within the system. This issue is mainly related to differences in system versions, device hardware specifications, and customizations introduced by manufacturers. The growing divergence among devices leads to marked variations in how a given app behaves across diverse devices. This is refe… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  14. arXiv:2406.06207  [pdf, other

    cs.LG cs.CR

    Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning

    Authors: Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang

    Abstract: Federated Learning (FL) is a collaborative machine learning technique where multiple clients work together with a central server to train a global model without sharing their private data. However, the distribution shift across non-IID datasets of clients poses a challenge to this one-model-fits-all method hindering the ability of the global model to effectively adapt to each client's unique local… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted by Usenix Security 2024

  15. arXiv:2405.20790  [pdf, other

    cs.LG cs.CY

    Intersectional Unfairness Discovery

    Authors: Gezheng Xu, Qi Chen, Charles Ling, Boyu Wang, Changjian Shui

    Abstract: AI systems have been shown to produce unfair results for certain subgroups of population, highlighting the need to understand bias on certain sensitive attributes. Current research often falls short, primarily focusing on the subgroups characterized by a single sensitive attribute, while neglecting the nature of intersectional fairness of multiple sensitive attributes. This paper focuses on its on… ▽ More

    Submitted 6 June, 2024; v1 submitted 31 May, 2024; originally announced May 2024.

    Comments: ICML-2024 camera-ready

  16. arXiv:2405.19299  [pdf, other

    cs.CL

    Expert-Guided Extinction of Toxic Tokens for Debiased Generation

    Authors: Xueyao Sun, Kaize Shi, Haoran Tang, Guandong Xu, Qing Li

    Abstract: Large language models (LLMs) can elicit social bias during generations, especially when inference with toxic prompts. Controlling the sensitive attributes in generation encounters challenges in data distribution, generalizability, and efficiency. Specifically, fine-tuning and retrieval demand extensive unbiased corpus, while direct prompting requires meticulously curated instructions for correctin… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  17. arXiv:2405.16113  [pdf, other

    cs.LG

    Enabling On-Device Learning via Experience Replay with Efficient Dataset Condensation

    Authors: Gelei Xu, Ningzhi Tang, Jun Xia, Wei Jin, Yiyu Shi

    Abstract: Upon deployment to edge devices, it is often desirable for a model to further learn from streaming data to improve accuracy. However, extracting representative features from such data is challenging because it is typically unlabeled, non-independent and identically distributed (non-i.i.d), and is seen only once. To mitigate this issue, a common strategy is to maintain a small data buffer on the ed… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

    Comments: 9 pages, 10 figures

  18. arXiv:2405.15619  [pdf, other

    cs.CV

    DiffCalib: Reformulating Monocular Camera Calibration as Diffusion-Based Dense Incident Map Generation

    Authors: Xiankang He, Guangkai Xu, Bo Zhang, Hao Chen, Ying Cui, Dongyan Guo

    Abstract: Monocular camera calibration is a key precondition for numerous 3D vision applications. Despite considerable advancements, existing methods often hinge on specific assumptions and struggle to generalize across varied real-world scenarios, and the performance is limited by insufficient training data. Recently, diffusion models trained on expansive datasets have been confirmed to maintain the capabi… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  19. arXiv:2405.13380  [pdf, other

    cs.CR

    The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems

    Authors: Bin Wang, Tianjian Liu, Wenqi Wang, Yuan Weng, Chao Li, Guangquan Xu, Meng Shen, Sencun Zhu, Wei Wang

    Abstract: The rise of Web3 social ecosystems signifies the dawn of a new chapter in digital interaction, offering significant prospects for user engagement and financial advancement. Nonetheless, this progress is shadowed by potential privacy concessions, especially as these platforms frequently merge with existing Web2.0 social media accounts, amplifying data privacy risks for users. In this study, we in… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  20. arXiv:2405.10758  [pdf, other

    cs.CR

    Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards

    Authors: Wangchenlu Huang, Shenao Wang, Yanjie Zhao, Guosheng Xu, Haoyu Wang

    Abstract: In the digital era, Online Social Networks (OSNs) play a crucial role in information dissemination, with sharing cards for link previews emerging as a key feature. These cards offer snapshots of shared content, including titles, descriptions, and images. In this study, we investigate the construction and dissemination mechanisms of these cards, focusing on two primary server-side generation method… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  21. arXiv:2405.04332  [pdf, other

    cs.CR

    WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets

    Authors: Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang

    Abstract: Cryptocurrency wallets, acting as fundamental infrastructure to the blockchain ecosystem, have seen significant user growth, particularly among browser-based wallets (i.e., browser extensions). However, this expansion accompanies security challenges, making these wallets prime targets for malicious activities. Despite a substantial user base, there is not only a significant gap in comprehensive se… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: Just accepted by the Automated Software Engineering Journal

  22. arXiv:2405.03085  [pdf, other

    cs.CL

    Compressing Long Context for Enhancing RAG with AMR-based Concept Distillation

    Authors: Kaize Shi, Xueyao Sun, Qing Li, Guandong Xu

    Abstract: Large Language Models (LLMs) have made significant strides in information acquisition. However, their overreliance on potentially flawed parametric knowledge leads to hallucinations and inaccuracies, particularly when handling long-tail, domain-specific queries. Retrieval Augmented Generation (RAG) addresses this limitation by incorporating external, non-parametric knowledge. Nevertheless, the ret… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  23. arXiv:2405.01725  [pdf, other

    eess.IV cs.CV cs.LG

    Development of Skip Connection in Deep Neural Networks for Computer Vision and Medical Image Analysis: A Survey

    Authors: Guoping Xu, Xiaxia Wang, Xinglong Wu, Xuesong Leng, Yongchao Xu

    Abstract: Deep learning has made significant progress in computer vision, specifically in image classification, object detection, and semantic segmentation. The skip connection has played an essential role in the architecture of deep neural networks,enabling easier optimization through residual learning during the training stage and improving accuracy during testing. Many neural networks have inherited the… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  24. arXiv:2404.18135  [pdf, other

    cs.RO

    Dexterous Grasp Transformer

    Authors: Guo-Hao Xu, Yi-Lin Wei, Dian Zheng, Xiao-Ming Wu, Wei-Shi Zheng

    Abstract: In this work, we propose a novel discriminative framework for dexterous grasp generation, named Dexterous Grasp TRansformer (DGTR), capable of predicting a diverse set of feasible grasp poses by processing the object point cloud with only one forward pass. We formulate dexterous grasp generation as a set prediction task and design a transformer-based grasping model for it. However, we identify tha… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: Accepted to CVPR 2024

  25. arXiv:2404.17136  [pdf, other

    cs.DB cs.AI cs.CL

    Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

    Authors: Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin

    Abstract: The Natural Language to Visualization (NL2Vis) task aims to transform natural-language descriptions into visual representations for a grounded table, enabling users to gain insights from vast amounts of data. Recently, many deep learning-based approaches have been developed for NL2Vis. Despite the considerable efforts made by these approaches, challenges persist in visualizing data sourced from un… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  26. arXiv:2404.15854  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning

    Authors: Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu

    Abstract: The increasing prevalence of audio deepfakes poses significant security threats, necessitating robust detection methods. While existing detection systems exhibit promise, their robustness against malicious audio manipulations remains underexplored. To bridge the gap, we undertake the first comprehensive study of the susceptibility of the most widely adopted audio deepfake detectors to manipulation… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE TDSC

  27. arXiv:2404.15687  [pdf, other

    cs.SE cs.AI cs.CR

    Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

    Authors: Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

    Abstract: Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection, owing to their ability to capture the underlying semantic structure of source code. However, GNNs face significant challenges in explainability due to their inherently black-box natu… ▽ More

    Submitted 15 July, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

    Comments: This paper was accepted in the proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2024)

  28. arXiv:2404.15587  [pdf, other

    cs.CR

    Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks

    Authors: Hangcheng Cao, Wenbin Huang, Guowen Xu, Xianhao Chen, Ziyang He, Jingyang Hu, Hongbo Jiang, Yuguang Fang

    Abstract: Deep learning technologies are pivotal in enhancing the performance of WiFi-based wireless sensing systems. However, they are inherently vulnerable to adversarial perturbation attacks, and regrettably, there is lacking serious attention to this security issue within the WiFi sensing community. In this paper, we elaborate such an attack, called WiIntruder, distinguishing itself with universality, r… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  29. arXiv:2404.13273  [pdf, other

    cs.CV cs.LG

    Multi-feature Reconstruction Network using Crossed-mask Restoration for Unsupervised Anomaly Detection

    Authors: Junpu Wang, Guili Xu, Chunlei Li, Guangshuai Gao, Yuehua Cheng

    Abstract: Unsupervised anomaly detection using only normal samples is of great significance for quality inspection in industrial manufacturing. Although existing reconstruction-based methods have achieved promising results, they still face two problems: poor distinguishable information in image reconstruction and well abnormal regeneration caused by model over-generalization ability. To overcome the above i… ▽ More

    Submitted 20 April, 2024; originally announced April 2024.

  30. arXiv:2404.06756  [pdf, other

    cs.LG cs.AI

    CrimeAlarm: Towards Intensive Intent Dynamics in Fine-grained Crime Prediction

    Authors: Kaixi Hu, Lin Li, Qing Xie, Xiaohui Tao, Guandong Xu

    Abstract: Granularity and accuracy are two crucial factors for crime event prediction. Within fine-grained event classification, multiple criminal intents may alternately exhibit in preceding sequential events, and progress differently in next. Such intensive intent dynamics makes training models hard to capture unobserved intents, and thus leads to sub-optimal generalization performance, especially in the… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: Accepted by DASFAA 2024

  31. arXiv:2404.02445  [pdf, other

    cs.DC

    MOPAR: A Model Partitioning Framework for Deep Learning Inference Services on Serverless Platforms

    Authors: Jiaang Duan, Shiyou Qian, Dingyu Yang, Hanwen Hu, Jian Cao, Guangtao Xue

    Abstract: With its elastic power and a pay-as-you-go cost model, the deployment of deep learning inference services (DLISs) on serverless platforms is emerging as a prevalent trend. However, the varying resource requirements of different layers in DL models hinder resource utilization and increase costs, when DLISs are deployed as a single function on serverless platforms. To tackle this problem, we propose… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  32. arXiv:2403.20296  [pdf, other

    cs.IR

    Aiming at the Target: Filter Collaborative Information for Cross-Domain Recommendation

    Authors: Hanyu Li, Weizhi Ma, Peijie Sun, Jiayu Li, Cunxiang Yin, Yancheng He, Guoqiang Xu, Min Zhang, Shaoping Ma

    Abstract: Cross-domain recommender (CDR) systems aim to enhance the performance of the target domain by utilizing data from other related domains. However, irrelevant information from the source domain may instead degrade target domain performance, which is known as the negative transfer problem. There have been some attempts to address this problem, mostly by designing adaptive representations for overlapp… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: Accepted by SIGIR 2024

  33. arXiv:2403.17288  [pdf, other

    cs.RO

    Sparse-Graph-Enabled Formation Planning for Large-Scale Aerial Swarms

    Authors: Yuan Zhou, Lun Quan, Chao Xu, Guangtong Xu, Fei Gao

    Abstract: The formation trajectory planning using complete graphs to model collaborative constraints becomes computationally intractable as the number of drones increases due to the curse of dimensionality. To tackle this issue, this paper presents a sparse graph construction method for formation planning to realize better efficiency-performance trade-off. Firstly, a sparsification mechanism for complete gr… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

  34. arXiv:2403.15715  [pdf, other

    cs.CL

    EDDA: A Encoder-Decoder Data Augmentation Framework for Zero-Shot Stance Detection

    Authors: Daijun Ding, Li Dong, Zhichao Huang, Guangning Xu, Xu Huang, Bo Liu, Liwen Jing, Bowen Zhang

    Abstract: Stance detection aims to determine the attitude expressed in text towards a given target. Zero-shot stance detection (ZSSD) has emerged to classify stances towards unseen targets during inference. Recent data augmentation techniques for ZSSD increase transferable knowledge between targets through text or target augmentation. However, these methods exhibit limitations. Target augmentation lacks log… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

  35. arXiv:2403.15574  [pdf, other

    cs.AI

    SensoryT5: Infusing Sensorimotor Norms into T5 for Enhanced Fine-grained Emotion Classification

    Authors: Yuhan Xia, Qingqing Zhao, Yunfei Long, Ge Xu, Jia Wang

    Abstract: In traditional research approaches, sensory perception and emotion classification have traditionally been considered separate domains. Yet, the significant influence of sensory experiences on emotional responses is undeniable. The natural language processing (NLP) community has often missed the opportunity to merge sensory knowledge with emotion classification. To address this gap, we propose Sens… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: Accepted by CogALex 2024 conference

  36. arXiv:2403.10980  [pdf, other

    cs.GT eess.SY math.OC

    Inverse learning of black-box aggregator for robust Nash equilibrium

    Authors: Guanpu Chen, Gehui Xu, Fengxiang He, Dacheng Tao, Thomas Parisini, Karl Henrik Johansson

    Abstract: In this note, we investigate the robustness of Nash equilibria (NE) in multi-player aggregative games with coupling constraints. There are many algorithms for computing an NE of an aggregative game given a known aggregator. When the coupling parameters are affected by uncertainty, robust NE need to be computed. We consider a scenario where players' weight in the aggregator is unknown, making the a… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

  37. arXiv:2403.06221  [pdf, other

    cs.AI cs.CL cs.IR

    TRAD: Enhancing LLM Agents with Step-Wise Thought Retrieval and Aligned Decision

    Authors: Ruiwen Zhou, Yingxuan Yang, Muning Wen, Ying Wen, Wenhao Wang, Chunling Xi, Guoqiang Xu, Yong Yu, Weinan Zhang

    Abstract: Numerous large language model (LLM) agents have been built for different tasks like web navigation and online shopping due to LLM's wide knowledge and text-understanding ability. Among these works, many of them utilize in-context examples to achieve generalization without the need for fine-tuning, while few of them have considered the problem of how to select and effectively utilize these examples… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

    Comments: Codes available at: https://github.com/skyriver-2000/TRAD-Official

  38. arXiv:2403.06139  [pdf, other

    cs.CL cs.AI

    Fine-grainedly Synthesize Streaming Data Based On Large Language Models With Graph Structure Understanding For Data Sparsity

    Authors: Xin Zhang, Linhai Zhang, Deyu Zhou, Guoqiang Xu

    Abstract: Due to the sparsity of user data, sentiment analysis on user reviews in e-commerce platforms often suffers from poor performance, especially when faced with extremely sparse user data or long-tail labels. Recently, the emergence of LLMs has introduced new solutions to such problems by leveraging graph structures to generate supplementary user profiles. However, previous approaches have not fully u… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  39. arXiv:2403.06090  [pdf, other

    cs.CV

    Diffusion Models Trained with Large Data Are Transferable Visual Models

    Authors: Guangkai Xu, Yongtao Ge, Mingyu Liu, Chengxiang Fan, Kangyang Xie, Zhiyue Zhao, Hao Chen, Chunhua Shen

    Abstract: We show that, simply initializing image understanding models using a pre-trained UNet (or transformer) of diffusion models, it is possible to achieve remarkable transferable performance on fundamental vision perception tasks using a moderate amount of target data (even synthetic data only), including monocular depth, surface normal, image segmentation, matting, human pose estimation, among virtual… ▽ More

    Submitted 15 March, 2024; v1 submitted 9 March, 2024; originally announced March 2024.

  40. arXiv:2403.03605  [pdf, other

    cs.CE

    Multi-time-step coupling of peridynamics and classical continuum mechanics for dynamic brittle fracture

    Authors: Zhong Jiandong, Han Fei, Du Zongliang, Guo Xu

    Abstract: Peridynamics (PD), as a nonlocal theory, is well-suited for solving problems with discontinuities, such as cracks. However, the nonlocal effect of peridynamics makes it computationally expensive for dynamic fracture problems in large-scale engineering applications. As an alternative, this study proposes a multi-time-step (MTS) coupling model of PD and classical continuum mechanics (CCM) based on t… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 36 pages, 17 figures, 81 conferences

  41. arXiv:2403.03447  [pdf, other

    cs.CV

    HDRFlow: Real-Time HDR Video Reconstruction with Large Motions

    Authors: Gangwei Xu, Yujin Wang, Jinwei Gu, Tianfan Xue, Xin Yang

    Abstract: Reconstructing High Dynamic Range (HDR) video from image sequences captured with alternating exposures is challenging, especially in the presence of large camera or object motion. Existing methods typically align low dynamic range sequences using optical flow or attention mechanism for deghosting. However, they often struggle to handle large complex motions and are computationally expensive. To ad… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: CVPR 2024; Project website: https://openimaginglab.github.io/HDRFlow/

  42. arXiv:2403.01166  [pdf, other

    cs.CL cs.AI

    DINER: Debiasing Aspect-based Sentiment Analysis with Multi-variable Causal Inference

    Authors: Jialong Wu, Linhai Zhang, Deyu Zhou, Guoqiang Xu

    Abstract: Though notable progress has been made, neural-based aspect-based sentiment analysis (ABSA) models are prone to learn spurious correlations from annotation biases, resulting in poor robustness on adversarial data transformations. Among the debiasing solutions, causal inference-based methods have attracted much research attention, which can be mainly categorized into causal intervention methods and… ▽ More

    Submitted 6 June, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

    Comments: Accepted by ACL2024(Findings)

  43. arXiv:2403.01165  [pdf, other

    cs.CL cs.AI

    STAR: Constraint LoRA with Dynamic Active Learning for Data-Efficient Fine-Tuning of Large Language Models

    Authors: Linhai Zhang, Jialong Wu, Deyu Zhou, Guoqiang Xu

    Abstract: Though Large Language Models (LLMs) have demonstrated the powerful capabilities of few-shot learning through prompting methods, supervised training is still necessary for complex reasoning tasks. Because of their extensive parameters and memory consumption, both Parameter-Efficient Fine-Tuning (PEFT) methods and Memory-Efficient Fine-Tuning methods have been proposed for LLMs. Nevertheless, the is… ▽ More

    Submitted 6 June, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

    Comments: Accepted by ACL2024(Findings)

  44. arXiv:2403.00486  [pdf, other

    cs.CV

    Selective-Stereo: Adaptive Frequency Information Selection for Stereo Matching

    Authors: Xianqi Wang, Gangwei Xu, Hao Jia, Xin Yang

    Abstract: Stereo matching methods based on iterative optimization, like RAFT-Stereo and IGEV-Stereo, have evolved into a cornerstone in the field of stereo matching. However, these methods struggle to simultaneously capture high-frequency information in edges and low-frequency information in smooth regions due to the fixed receptive field. As a result, they tend to lose details, blur edges, and produce fals… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024

  45. arXiv:2402.14992  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    tinyBenchmarks: evaluating LLMs with fewer examples

    Authors: Felipe Maia Polo, Lucas Weber, Leshem Choshen, Yuekai Sun, Gongjun Xu, Mikhail Yurochkin

    Abstract: The versatility of large language models (LLMs) led to the creation of diverse benchmarks that thoroughly test a variety of language models' abilities. These benchmarks consist of tens of thousands of examples making evaluation of LLMs very expensive. In this paper, we investigate strategies to reduce the number of evaluations needed to assess the performance of an LLM on several key benchmarks. F… ▽ More

    Submitted 26 May, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: Proceedings of the 41st International Conference on Machine Learning (ICML)

  46. arXiv:2402.14528  [pdf, other

    cs.LG cs.AI

    ACE : Off-Policy Actor-Critic with Causality-Aware Entropy Regularization

    Authors: Tianying Ji, Yongyuan Liang, Yan Zeng, Yu Luo, Guowei Xu, Jiawei Guo, Ruijie Zheng, Furong Huang, Fuchun Sun, Huazhe Xu

    Abstract: The varying significance of distinct primitive behaviors during the policy learning process has been overlooked by prior model-free RL algorithms. Leveraging this insight, we explore the causal relationship between different action dimensions and rewards to evaluate the significance of various primitive behaviors during training. We introduce a causality-aware entropy term that effectively identif… ▽ More

    Submitted 22 May, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: Accepted by ICML 2024

    ACM Class: I.2

  47. arXiv:2402.14480  [pdf, other

    cs.SE

    MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation

    Authors: Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang

    Abstract: Augmented generation techniques such as Retrieval-Augmented Generation (RAG) and Cache-Augmented Generation (CAG) have revolutionized the field by enhancing large language model (LLM) outputs with external knowledge and cached information. However, the integration of vector databases, which serve as a backbone for these augmentations, introduces critical challenges, particularly in ensuring accura… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  48. arXiv:2402.13815  [pdf, other

    cs.SE cs.CR

    An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives

    Authors: Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He

    Abstract: Although Virtual Reality (VR) has accelerated its prevalent adoption in emerging metaverse applications, it is not a fundamentally new technology. On one hand, most VR operating systems (OS) are based on off-the-shelf mobile OS. As a result, VR apps also inherit privacy and security deficiencies from conventional mobile apps. On the other hand, in contrast to conventional mobile apps, VR apps can… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: Accepted by ICSE 2024

  49. arXiv:2402.11558  [pdf, other

    cs.LG

    A Temporally Disentangled Contrastive Diffusion Model for Spatiotemporal Imputation

    Authors: Yakun Chen, Kaize Shi, Zhangkai Wu, Juan Chen, Xianzhi Wang, Julian McAuley, Guandong Xu, Shui Yu

    Abstract: Spatiotemporal data analysis is pivotal across various domains, such as transportation, meteorology, and healthcare. The data collected in real-world scenarios are often incomplete due to device malfunctions and network errors. Spatiotemporal imputation aims to predict missing values by exploiting the spatial and temporal dependencies in the observed data. Traditional imputation approaches based o… ▽ More

    Submitted 22 March, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

  50. arXiv:2402.07834  [pdf, other

    cs.LG

    Generalizing across Temporal Domains with Koopman Operators

    Authors: Qiuhao Zeng, Wei Wang, Fan Zhou, Gezheng Xu, Ruizhi Pu, Changjian Shui, Christian Gagne, Shichun Yang, Boyu Wang, Charles X. Ling

    Abstract: In the field of domain generalization, the task of constructing a predictive model capable of generalizing to a target domain without access to target data remains challenging. This problem becomes further complicated when considering evolving dynamics between domains. While various approaches have been proposed to address this issue, a comprehensive understanding of the underlying generalization… ▽ More

    Submitted 15 February, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: 15 pages, 7 figures, Accepted by AAAI 2024. arXiv admin note: text overlap with arXiv:2206.00047