Skip to main content

Showing 1–50 of 75 results for author: Tao, L

  1. arXiv:2407.06087  [pdf, other

    cs.LG cs.CV

    Analytic Convolutional Layer: A Step to Analytic Neural Network

    Authors: Jingmao Cui, Donglai Tao, Linmi Tao, Ruiyang Liu, Yu Cheng

    Abstract: The prevailing approach to embedding prior knowledge within convolutional layers typically includes the design of steerable kernels or their modulation using designated kernel banks. In this study, we introduce the Analytic Convolutional Layer (ACL), an innovative model-driven convolutional layer, which is a mosaic of analytical convolution kernels (ACKs) and traditional convolution kernels. ACKs… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  2. arXiv:2407.03374  [pdf

    cs.AI cs.SE eess.SP eess.SY

    An Outline of Prognostics and Health Management Large Model: Concepts, Paradigms, and Challenges

    Authors: Laifa Tao, Shangyu Li, Haifei Liu, Qixuan Huang, Liang Ma, Guoao Ning, Yiling Chen, Yunlong Wu, Bin Li, Weiwei Zhang, Zhengduo Zhao, Wenchao Zhan, Wenyan Cao, Chao Wang, Hongmei Liu, Jian Ma, Mingliang Suo, Yujie Cheng, Yu Ding, Dengwei Song, Chen Lu

    Abstract: Prognosis and Health Management (PHM), critical for ensuring task completion by complex systems and preventing unexpected failures, is widely adopted in aerospace, manufacturing, maritime, rail, energy, etc. However, PHM's development is constrained by bottlenecks like generalization, interpretation and verification abilities. Presently, generative artificial intelligence (AI), represented by Larg… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  3. arXiv:2407.03187  [pdf

    cs.CY

    Holistic view of the road transportation system based on real-time data sharing mechanism

    Authors: Li Tao, Dong Xiang, Hao Junfeng, Yin Ping, Xu Xiaoxue, Lai Maokai, Li Yuan, Peng Ting

    Abstract: Traditional manual driving and single-vehicle-based intelligent driving have limitations in real-time and accurate acquisition of the current driving status and intentions of surrounding vehicles, leading to vehicles typically maintaining appropriate safe distances from each other. Yet, accidents still frequently occur, especially in merging areas; meanwhile, it is difficult to comprehensively obt… ▽ More

    Submitted 3 July, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

  4. arXiv:2405.15337  [pdf, other

    stat.ML cs.LG

    Discriminative Estimation of Total Variation Distance: A Fidelity Auditor for Generative Data

    Authors: Lan Tao, Shirong Xu, Chi-Hua Wang, Namjoon Suh, Guang Cheng

    Abstract: With the proliferation of generative AI and the increasing volume of generative data (also called as synthetic data), assessing the fidelity of generative data has become a critical concern. In this paper, we propose a discriminative approach to estimate the total variation (TV) distance between two distributions as an effective measure of generative data fidelity. Our method quantitatively charac… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2403.04261  [pdf

    cs.AI cs.CL cs.LG

    Advancing Biomedical Text Mining with Community Challenges

    Authors: Hui Zong, Rongrong Wu, Jiaxue Cha, Erman Wu, Jiakun Li, Liang Tao, Zuofeng Li, Buzhou Tang, Bairong Shen

    Abstract: The field of biomedical research has witnessed a significant increase in the accumulation of vast amounts of textual data from various sources such as scientific literatures, electronic health records, clinical trial reports, and social media. However, manually processing and analyzing these extensive and complex resources is time-consuming and inefficient. To address this challenge, biomedical te… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  6. arXiv:2402.14213  [pdf

    q-bio.NC cs.LG eess.SP

    Contrastive Learning of Shared Spatiotemporal EEG Representations Across Individuals for Naturalistic Neuroscience

    Authors: Xinke Shen, Lingyi Tao, Xuyang Chen, Sen Song, Quanying Liu, Dan Zhang

    Abstract: Neural representations induced by naturalistic stimuli offer insights into how humans respond to stimuli in daily life. Understanding neural mechanisms underlying naturalistic stimuli processing hinges on the precise identification and extraction of the shared neural patterns that are consistently present across individuals. Targeting the Electroencephalogram (EEG) technique, known for its rich sp… ▽ More

    Submitted 13 July, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

    Comments: 54 pages, 17 figures

  7. arXiv:2401.15287  [pdf, other

    cs.CV cs.DM math.NA

    Applications of Tao General Difference in Discrete Domain

    Authors: Linmi Tao, Ruiyang Liu, Donglai Tao, Wu Xia, Feilong Ma, Yu Cheng, Jingmao Cui

    Abstract: Numerical difference computation is one of the cores and indispensable in the modern digital era. Tao general difference (TGD) is a novel theory and approach to difference computation for discrete sequences and arrays in multidimensional space. Built on the solid theoretical foundation of the general difference in a finite interval, the TGD operators demonstrate exceptional signal processing capab… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: This paper is the application part of the paper "Tao General Differential and Difference: Theory and Application". The theory part of the paper is renamed as "A Theory of General Difference in Continuous and Discrete Domain", which is Arxived in arXiv:2305.08098v2

  8. arXiv:2401.11396  [pdf, other

    cs.LG cs.CV

    Visual Imitation Learning with Calibrated Contrastive Representation

    Authors: Yunke Wang, Linwei Tao, Bo Du, Yutian Lin, Chang Xu

    Abstract: Adversarial Imitation Learning (AIL) allows the agent to reproduce expert behavior with low-dimensional states and actions. However, challenges arise in handling visual states due to their less distinguishable representation compared to low-dimensional proprioceptive features. While existing methods resort to adopt complex network architectures or separate the process of learning representation an… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  9. arXiv:2401.06763  [pdf, other

    cs.CR cs.CC

    Optimally Blending Honeypots into Production Networks: Hardness and Algorithms

    Authors: Md Mahabub Uz Zaman, Liangde Tao, Mark Maldonado, Chang Liu, Ahmed Sunny, Shouhuai Xu, Lin Chen

    Abstract: Honeypot is an important cyber defense technique that can expose attackers new attacks. However, the effectiveness of honeypots has not been systematically investigated, beyond the rule of thumb that their effectiveness depends on how they are deployed. In this paper, we initiate a systematic study on characterizing the cybersecurity effectiveness of a new paradigm of deploying honeypots: blending… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

    Comments: published in 5th International Conference on Science of Cyber Security - SciSec 2023

  10. arXiv:2312.02199  [pdf, other

    cs.CV cs.AI cs.LG eess.IV stat.AP

    USat: A Unified Self-Supervised Encoder for Multi-Sensor Satellite Imagery

    Authors: Jeremy Irvin, Lucas Tao, Joanne Zhou, Yuntao Ma, Langston Nashold, Benjamin Liu, Andrew Y. Ng

    Abstract: Large, self-supervised vision models have led to substantial advancements for automatically interpreting natural images. Recent works have begun tailoring these methods to remote sensing data which has rich structure with multi-sensor, multi-spectral, and temporal information providing massive amounts of self-labeled data that can be used for self-supervised pre-training. In this work, we develop… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

  11. arXiv:2312.01682  [pdf, other

    cs.CV cs.AI

    ResEnsemble-DDPM: Residual Denoising Diffusion Probabilistic Models for Ensemble Learning

    Authors: Shi Zhenning, Dong Changsheng, Xie Xueshuo, Pan Bin, He Along, Li Tao

    Abstract: Nowadays, denoising diffusion probabilistic models have been adapted for many image segmentation tasks. However, existing end-to-end models have already demonstrated remarkable capabilities. Rather than using denoising diffusion probabilistic models alone, integrating the abilities of both denoising diffusion probabilistic models and existing end-to-end models can better improve the performance of… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: text overlap with arXiv:2311.14900

  12. arXiv:2310.07837  [pdf, other

    cs.LG

    Measuring Feature Sparsity in Language Models

    Authors: Mingyang Deng, Lucas Tao, Joe Benton

    Abstract: Recent works have proposed that activations in language models can be modelled as sparse linear combinations of vectors corresponding to features of input text. Under this assumption, these works aimed to reconstruct feature directions using sparse coding. We develop metrics to assess the success of these sparse coding techniques and test the validity of the linearity and sparsity assumptions. We… ▽ More

    Submitted 13 October, 2023; v1 submitted 11 October, 2023; originally announced October 2023.

  13. arXiv:2310.04724  [pdf, other

    cs.CV cs.LG

    Activate and Reject: Towards Safe Domain Generalization under Category Shift

    Authors: Chaoqi Chen, Luyao Tang, Leitian Tao, Hong-Yu Zhou, Yue Huang, Xiaoguang Han, Yizhou Yu

    Abstract: Albeit the notable performance on in-domain test points, it is non-trivial for deep neural networks to attain satisfactory accuracy when deploying in the open world, where novel domains and object classes often occur. In this paper, we study a practical problem of Domain Generalization under Category Shift (DGCS), which aims to simultaneously detect unknown-class samples and classify known-class s… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

    Comments: ICCV 2023

  14. arXiv:2309.07350  [pdf

    cs.RO

    Curriculum-based Sensing Reduction in Simulation to Real-World Transfer for In-hand Manipulation

    Authors: Lingfeng Tao, Jiucai Zhang, Qiaojie Zheng, Xiaoli Zhang

    Abstract: Simulation to Real-World Transfer allows affordable and fast training of learning-based robots for manipulation tasks using Deep Reinforcement Learning methods. Currently, Sim2Real uses Asymmetric Actor-Critic approaches to reduce the rich idealized features in simulation to the accessible ones in the real world. However, the feature reduction from the simulation to the real world is conducted thr… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  15. arXiv:2309.07349  [pdf

    cs.RO

    Stable In-hand Manipulation with Finger Specific Multi-agent Shadow Reward

    Authors: Lingfeng Tao, Jiucai Zhang, Xiaoli Zhang

    Abstract: Deep Reinforcement Learning has shown its capability to solve the high degrees of freedom in control and the complex interaction with the object in the multi-finger dexterous in-hand manipulation tasks. Current DRL approaches prefer sparse rewards to dense rewards for the ease of training but lack behavior constraints during the manipulation process, leading to aggressive and unstable policies tha… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

  16. arXiv:2308.12050  [pdf, other

    cs.CL cs.AI

    Aligning Language Models with Offline Learning from Human Feedback

    Authors: Jian Hu, Li Tao, June Yang, Chandler Zhou

    Abstract: Learning from human preferences is crucial for language models (LMs) to effectively cater to human needs and societal values. Previous research has made notable progress by leveraging human feedback to follow instructions. However, these approaches rely primarily on online learning techniques like Proximal Policy Optimization (PPO), which have been proven unstable and challenging to tune for langu… ▽ More

    Submitted 9 December, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

  17. arXiv:2308.11838  [pdf, other

    cs.LG cs.AI stat.ML

    A Benchmark Study on Calibration

    Authors: Linwei Tao, Younan Zhu, Haolan Guo, Minjing Dong, Chang Xu

    Abstract: Deep neural networks are increasingly utilized in various machine learning tasks. However, as these models grow in complexity, they often face calibration issues, despite enhanced prediction accuracy. Many studies have endeavored to improve calibration performance through the use of specific loss functions, data preprocessing and training frameworks. Yet, investigations into calibration properties… ▽ More

    Submitted 22 March, 2024; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: ICLR 2024 poster

  18. arXiv:2308.10487  [pdf, other

    cs.AI cs.LG

    Deciphering Raw Data in Neuro-Symbolic Learning with Provable Guarantees

    Authors: Lue Tao, Yu-Xuan Huang, Wang-Zhou Dai, Yuan Jiang

    Abstract: Neuro-symbolic hybrid systems are promising for integrating machine learning and symbolic reasoning, where perception models are facilitated with information inferred from a symbolic knowledge base through logical reasoning. Despite empirical evidence showing the ability of hybrid systems to learn accurate perception models, the theoretical understanding of learnability is still lacking. Hence, it… ▽ More

    Submitted 23 January, 2024; v1 submitted 21 August, 2023; originally announced August 2023.

  19. arXiv:2308.02815  [pdf, other

    physics.med-ph cs.AI cs.CV

    The changing rule of human bone density with aging based on a novel definition and mensuration of bone density with computed tomography

    Authors: Linmi Tao, Ruiyang Liu, Yuanbiao Wang, Yuezhi Zhou, Li Huo, Guilan Hu, Xiangsong Zhang, Zuo-Xiang He

    Abstract: Osteoporosis and fragility fractures have emerged as major public health concerns in an aging population. However, measuring age-related changes in bone density using dual-energy X-ray absorptiometry has limited personalized risk assessment due to susceptibility to interference from various factors. In this study, we propose an innovative statistical model of bone pixel distribution in fine-segmen… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  20. arXiv:2306.11307  [pdf, other

    cs.LG cs.AI

    Transforming Graphs for Enhanced Attribute Clustering: An Innovative Graph Transformer-Based Method

    Authors: Shuo Han, Jiacheng Liu, Jiayun Wu, Yinan Chen, Li Tao

    Abstract: Graph Representation Learning (GRL) is an influential methodology, enabling a more profound understanding of graph-structured data and aiding graph clustering, a critical task across various domains. The recent incursion of attention mechanisms, originally an artifact of Natural Language Processing (NLP), into the realm of graph learning has spearheaded a notable shift in research trends. Conseque… ▽ More

    Submitted 12 August, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

  21. arXiv:2305.13665  [pdf, other

    cs.CV cs.AI

    Dual Focal Loss for Calibration

    Authors: Linwei Tao, Minjing Dong, Chang Xu

    Abstract: The use of deep neural networks in real-world applications require well-calibrated networks with confidence scores that accurately reflect the actual probability. However, it has been found that these networks often provide over-confident predictions, which leads to poor calibration. Recent efforts have sought to address this issue by focal loss to reduce over-confidence, but this approach can als… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Comments: ICML 2023 Accept

  22. arXiv:2305.08098  [pdf, other

    cs.DM cs.CV math.NA

    A Theory of General Difference in Continuous and Discrete Domain

    Authors: Linmi Tao, Ruiyang Liu, Donglai Tao, Wu Xia, Feilong Ma, Yu Cheng, Jingmao Cui

    Abstract: Though a core element of the digital age, numerical difference algorithms struggle with noise susceptibility. This stems from a key disconnect between the infinitesimal quantities in continuous differentiation and the finite intervals in its discrete counterpart. This disconnect violates the fundamental definition of differentiation (Leibniz and Cauchy). To bridge this gap, we build a novel genera… ▽ More

    Submitted 25 January, 2024; v1 submitted 14 May, 2023; originally announced May 2023.

  23. arXiv:2303.17482  [pdf

    cs.AI cs.LG stat.ME

    Three-way causal attribute partial order structure analysis

    Authors: Xue Zaifa, Lu Huibin, Zhang Tao, Li Tao, Lu Xin

    Abstract: As an emerging concept cognitive learning model, partial order formal structure analysis (POFSA) has been widely used in the field of knowledge processing. In this paper, we propose the method named three-way causal attribute partial order structure (3WCAPOS) to evolve the POFSA from set coverage to causal coverage in order to increase the interpretability and classification performance of the mod… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  24. arXiv:2303.02966  [pdf, other

    cs.LG cs.AI

    Non-Parametric Outlier Synthesis

    Authors: Leitian Tao, Xuefeng Du, Xiaojin Zhu, Yixuan Li

    Abstract: Out-of-distribution (OOD) detection is indispensable for safely deploying machine learning models in the wild. One of the key challenges is that models lack supervision signals from unknown data, and as a result, can produce overconfident predictions on OOD data. Recent work on outlier synthesis modeled the feature space as parametric Gaussian distribution, a strong and restrictive assumption that… ▽ More

    Submitted 6 March, 2023; originally announced March 2023.

    Comments: ICLR 2023

  25. arXiv:2302.06245  [pdf, other

    cs.LG

    Calibrating a Deep Neural Network with Its Predecessors

    Authors: Linwei Tao, Minjing Dong, Daochang Liu, Changming Sun, Chang Xu

    Abstract: Confidence calibration - the process to calibrate the output probability distribution of neural networks - is essential for safety-critical applications of such networks. Recent works verify the link between mis-calibration and overfitting. However, early stopping, as a well-known technique to mitigate overfitting, fails to calibrate networks. In this work, we study the limitions of early stopping… ▽ More

    Submitted 23 May, 2023; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: IJCAI 2023 Accept

  26. arXiv:2212.07751  [pdf, other

    cs.CV

    Combating Uncertainty and Class Imbalance in Facial Expression Recognition

    Authors: Jiaxiang Fan, Jian Zhou, Xiaoyu Deng, Huabin Wang, Liang Tao, Hon Keung Kwan

    Abstract: Recognition of facial expression is a challenge when it comes to computer vision. The primary reasons are class imbalance due to data collection and uncertainty due to inherent noise such as fuzzy facial expressions and inconsistent labels. However, current research has focused either on the problem of class imbalance or on the problem of uncertainty, ignoring the intersection of how to address th… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  27. arXiv:2212.07163  [pdf, other

    cs.SD eess.AS

    Multi-Scale Feature Fusion Transformer Network for End-to-End Single Channel Speech Separation

    Authors: Yinhao Xu, Jian Zhou, Liang Tao, Hon Keung Kwan

    Abstract: Recently studies on time-domain audio separation networks (TasNets) have made a great stride in speech separation. One of the most representative TasNets is a network with a dual-path segmentation approach. However, the original model called DPRNN used a fixed feature dimension and unchanged segment size throughout all layers of the network. In this paper, we propose a multi-scale feature fusion t… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  28. arXiv:2211.06590  [pdf, other

    cs.SI cs.LG

    Significant Ties Graph Neural Networks for Continuous-Time Temporal Networks Modeling

    Authors: Jiayun Wu, Tao Jia, Yansong Wang, Li Tao

    Abstract: Temporal networks are suitable for modeling complex evolving systems. It has a wide range of applications, such as social network analysis, recommender systems, and epidemiology. Recently, modeling such dynamic systems has drawn great attention in many domains. However, most existing approaches resort to taking discrete snapshots of the temporal networks and modeling all events with equal importan… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

    Comments: 9 pages, 5 figures

  29. arXiv:2210.16423  [pdf

    cs.RO cs.HC

    Transferability-based Chain Motion Mapping from Humans to Humanoids for Teleoperation

    Authors: Matthew Stanley, Yunsik Jung, Michael Bowman, Lingfeng Tao, Xiaoli Zhang

    Abstract: Although data-driven motion mapping methods are promising to allow intuitive robot control and teleoperation that generate human-like robot movement, they normally require tedious pair-wise training for each specific human and robot pair. This paper proposes a transferability-based mapping scheme to allow new robot and human input systems to leverage the mapping of existing trained pairs to form a… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

  30. A Multi-Agent Approach for Adaptive Finger Cooperation in Learning-based In-Hand Manipulation

    Authors: Lingfeng Tao, Jiucai Zhang, Michael Bowman, Xiaoli Zhang

    Abstract: In-hand manipulation is challenging for a multi-finger robotic hand due to its high degrees of freedom and the complex interaction with the object. To enable in-hand manipulation, existing deep reinforcement learning based approaches mainly focus on training a single robot-structure-specific policy through the centralized learning mechanism, lacking adaptability to changes like robot malfunction.… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Submitted to ICRA 2023

  31. arXiv:2210.05406  [pdf, other

    cs.SE cs.AI

    Code Librarian: A Software Package Recommendation System

    Authors: Lili Tao, Alexandru-Petre Cazan, Senad Ibraimoski, Sean Moran

    Abstract: The use of packaged libraries can significantly shorten the software development cycle by improving the quality and readability of code. In this paper, we present a recommendation engine called Librarian for open source libraries. A candidate library package is recommended for a given context if: 1) it has been frequently used with the imported libraries in the program; 2) it has similar functiona… ▽ More

    Submitted 7 February, 2023; v1 submitted 11 October, 2022; originally announced October 2022.

  32. arXiv:2206.08802  [pdf, other

    cs.LG cs.CV

    Open-Sampling: Exploring Out-of-Distribution data for Re-balancing Long-tailed datasets

    Authors: Hongxin Wei, Lue Tao, Renchunzi Xie, Lei Feng, Bo An

    Abstract: Deep neural networks usually perform poorly when the training dataset suffers from extreme class imbalance. Recent studies found that directly training with out-of-distribution data (i.e., open-set samples) in a semi-supervised manner would harm the generalization performance. In this work, we theoretically show that out-of-distribution data can still be leveraged to augment the minority classes f… ▽ More

    Submitted 5 July, 2022; v1 submitted 17 June, 2022; originally announced June 2022.

    Comments: Accepted by ICML 2022

  33. arXiv:2205.13561  [pdf

    cs.RO cs.AI

    Physics-Guided Hierarchical Reward Mechanism for Learning-Based Robotic Grasping

    Authors: Yunsik Jung, Lingfeng Tao, Michael Bowman, Jiucai Zhang, Xiaoli Zhang

    Abstract: Learning-based grasping can afford real-time grasp motion planning of multi-fingered robotics hands thanks to its high computational efficiency. However, learning-based methods are required to explore large search spaces during the learning process. The search space causes low learning efficiency, which has been the main barrier to its practical adoption. In addition, the trained policy lacks a ge… ▽ More

    Submitted 23 July, 2023; v1 submitted 26 May, 2022; originally announced May 2022.

  34. Multi-Phase Multi-Objective Dexterous Manipulation with Adaptive Hierarchical Curriculum

    Authors: Lingfeng Tao, Jiucai Zhang, Xiaoli Zhang

    Abstract: Dexterous manipulation tasks usually have multiple objectives, and the priorities of these objectives may vary at different phases of a manipulation task. Varying priority makes a robot hardly or even failed to learn an optimal policy with a deep reinforcement learning (DRL) method. To solve this problem, we develop a novel Adaptive Hierarchical Reward Mechanism (AHRM) to guide the DRL agent to le… ▽ More

    Submitted 28 July, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: Accepted by the Journal of Intelligent & Robotic Systems

  35. arXiv:2205.08585  [pdf, other

    cs.SE cs.AI cs.CV cs.LG

    CV4Code: Sourcecode Understanding via Visual Code Representations

    Authors: Ruibo Shi, Lili Tao, Rohan Saphal, Fran Silavong, Sean J. Moran

    Abstract: We present CV4Code, a compact and effective computer vision method for sourcecode understanding. Our method leverages the contextual and the structural information available from the code snippet by treating each snippet as a two-dimensional image, which naturally encodes the context and retains the underlying structural information through an explicit spatial representation. To codify snippets as… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

  36. arXiv:2205.00771  [pdf, other

    cs.CY

    Local Differential Privacy Meets Computational Social Choice -- Resilience under Voter Deletion

    Authors: Liangde Tao, Lin Chen, Lei Xu, Weidong Shi

    Abstract: The resilience of a voting system has been a central topic in computational social choice. Many voting rules, like plurality, are shown to be vulnerable as the attacker can target specific voters to manipulate the result. What if a local differential privacy (LDP) mechanism is adopted such that the true preference of a voter is never revealed in pre-election polls? In this case, the attacker can o… ▽ More

    Submitted 3 May, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

  37. arXiv:2203.14556  [pdf, other

    cs.CV

    Pyramid Feature Alignment Network for Video Deblurring

    Authors: Leitian Tao, Zhenzhong Chen

    Abstract: Video deblurring remains a challenging task due to various causes of blurring. Traditional methods have considered how to utilize neighboring frames by the single-scale alignment for restoration. However, they typically suffer from misalignment caused by severe blur. In this work, we aim to better utilize neighboring frames with high efficient feature alignment. We propose a Pyramid Feature Alignm… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

  38. arXiv:2201.13329  [pdf, other

    cs.LG cs.CR

    Can Adversarial Training Be Manipulated By Non-Robust Features?

    Authors: Lue Tao, Lei Feng, Hongxin Wei, Jinfeng Yi, Sheng-Jun Huang, Songcan Chen

    Abstract: Adversarial training, originally designed to resist test-time adversarial examples, has shown to be promising in mitigating training-time availability attacks. This defense ability, however, is challenged in this paper. We identify a novel threat model named stability attack, which aims to hinder robust availability by slightly manipulating the training data. Under this threat, we show that advers… ▽ More

    Submitted 8 October, 2022; v1 submitted 31 January, 2022; originally announced January 2022.

    Comments: NeurIPS 2022

  39. arXiv:2201.03335  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    DeepKE: A Deep Learning Based Knowledge Extraction Toolkit for Knowledge Base Population

    Authors: Ningyu Zhang, Xin Xu, Liankuan Tao, Haiyang Yu, Hongbin Ye, Shuofei Qiao, Xin Xie, Xiang Chen, Zhoubo Li, Lei Li, Xiaozhuan Liang, Yunzhi Yao, Shumin Deng, Peng Wang, Wen Zhang, Zhenru Zhang, Chuanqi Tan, Qiang Chen, Feiyu Xiong, Fei Huang, Guozhou Zheng, Huajun Chen

    Abstract: We present an open-source and extensible knowledge extraction toolkit DeepKE, supporting complicated low-resource, document-level and multimodal scenarios in the knowledge base population. DeepKE implements various information extraction tasks, including named entity recognition, relation extraction and attribute extraction. With a unified framework, DeepKE allows developers and researchers to cus… ▽ More

    Submitted 18 September, 2023; v1 submitted 10 January, 2022; originally announced January 2022.

    Comments: Accepted by EMNLP 2022 System Demonstrations and the project website is http://deepke.zjukg.cn/

  40. arXiv:2111.04060  [pdf, other

    cs.CV

    Are we ready for a new paradigm shift? A Survey on Visual Deep MLP

    Authors: Ruiyang Liu, Yinghui Li, Linmi Tao, Dun Liang, Hai-Tao Zheng

    Abstract: Recently, the proposed deep MLP models have stirred up a lot of interest in the vision community. Historically, the availability of larger datasets combined with increased computing capacity leads to paradigm shifts. This review paper provides detailed discussions on whether MLP can be a new paradigm for computer vision. We compare the intrinsic connections and differences between convolution, sel… ▽ More

    Submitted 25 April, 2022; v1 submitted 7 November, 2021; originally announced November 2021.

    Comments: With the development of MLP, the survey has been updated to the latest version in April

  41. arXiv:2111.01430  [pdf, other

    cs.SD eess.AS

    CycleGAN with Dual Adversarial Loss for Bone-Conducted Speech Enhancement

    Authors: Qing Pan, Teng Gao, Jian Zhou, Huabin Wang, Liang Tao, Hon Keung Kwan

    Abstract: Compared with air-conducted speech, bone-conducted speech has the unique advantage of shielding background noise. Enhancement of bone-conducted speech helps to improve its quality and intelligibility. In this paper, a novel CycleGAN with dual adversarial loss (CycleGAN-DAL) is proposed for bone-conducted speech enhancement. The proposed method uses an adversarial loss and a cycle-consistent loss s… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

  42. arXiv:2111.01342  [pdf, other

    cs.SD cs.HC eess.AS

    Attention-Guided Generative Adversarial Network for Whisper to Normal Speech Conversion

    Authors: Teng Gao, Jian Zhou, Huabin Wang, Liang Tao, Hon Keung Kwan

    Abstract: Whispered speech is a special way of pronunciation without using vocal cord vibration. A whispered speech does not contain a fundamental frequency, and its energy is about 20dB lower than that of a normal speech. Converting a whispered speech into a normal speech can improve speech quality and intelligibility. In this paper, a novel attention-guided generative adversarial network model incorporati… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

  43. arXiv:2107.06261  [pdf, other

    cs.CC

    Tight running times for minimum $\ell_q$-norm load balancing: beyond exponential dependencies on $1/ε$

    Authors: Lin Chen, Liangde Tao, José Verschae

    Abstract: We consider a classical scheduling problem on $m$ identical machines. For an arbitrary constant $q>1$, the aim is to assign jobs to machines such that $\sum_{i=1}^m C_i^q$ is minimized, where $C_i$ is the total processing time of jobs assigned to machine $i$. It is well known that this problem is strongly NP-hard. Under mild assumptions, the running time of an $(1+ε)$-approximation algorithm for… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

  44. Predicate correlation learning for scene graph generation

    Authors: Leitian Tao, Li Mi, Nannan Li, Xianhang Cheng, Yaosi Hu, Zhenzhong Chen

    Abstract: For a typical Scene Graph Generation (SGG) method, there is often a large gap in the performance of the predicates' head classes and tail classes. This phenomenon is mainly caused by the semantic overlap between different predicates as well as the long-tailed data distribution. In this paper, a Predicate Correlation Learning (PCL) method for SGG is proposed to address the above two problems by tak… ▽ More

    Submitted 6 July, 2021; originally announced July 2021.

  45. arXiv:2106.10891  [pdf, other

    cs.LG cs.AI

    Open-set Label Noise Can Improve Robustness Against Inherent Label Noise

    Authors: Hongxin Wei, Lue Tao, Renchunzi Xie, Bo An

    Abstract: Learning with noisy labels is a practically challenging problem in weakly supervised learning. In the existing literature, open-set noises are always considered to be poisonous for generalization, similar to closed-set noises. In this paper, we empirically show that open-set noisy labels can be non-toxic and even benefit the robustness against inherent noisy labels. Inspired by the observations, w… ▽ More

    Submitted 18 November, 2021; v1 submitted 21 June, 2021; originally announced June 2021.

    Comments: Accepted by NeurIPS 2021

  46. arXiv:2106.07030  [pdf, other

    cs.NE cs.AI cs.LG q-bio.NC

    The Backpropagation Algorithm Implemented on Spiking Neuromorphic Hardware

    Authors: Alpha Renner, Forrest Sheldon, Anatoly Zlotnik, Louis Tao, Andrew Sornborger

    Abstract: The capabilities of natural neural systems have inspired new generations of machine learning algorithms as well as neuromorphic very large-scale integrated (VLSI) circuits capable of fast, low-power information processing. However, it has been argued that most modern machine learning algorithms are not neurophysiologically plausible. In particular, the workhorse of modern deep learning, the backpr… ▽ More

    Submitted 26 August, 2021; v1 submitted 13 June, 2021; originally announced June 2021.

    Comments: 21 pages, 5 figures, Changes v1->v2: minor changes of text and formatting, correction of total power in supplementary Table III

    Report number: LA-UR-21-24457 ACM Class: I.2.6

  47. arXiv:2105.12106  [pdf, other

    eess.IV cs.CV

    Adversarial Attack Driven Data Augmentation for Accurate And Robust Medical Image Segmentation

    Authors: Mst. Tasnim Pervin, Linmi Tao, Aminul Huq, Zuoxiang He, Li Huo

    Abstract: Segmentation is considered to be a very crucial task in medical image analysis. This task has been easier since deep learning models have taken over with its high performing behavior. However, deep learning models dependency on large data proves it to be an obstacle in medical image analysis because of insufficient data samples. Several data augmentation techniques have been used to mitigate this… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  48. arXiv:2103.14824  [pdf, other

    cs.LG

    Improving Model Robustness by Adaptively Correcting Perturbation Levels with Active Queries

    Authors: Kun-Peng Ning, Lue Tao, Songcan Chen, Sheng-Jun Huang

    Abstract: In addition to high accuracy, robustness is becoming increasingly important for machine learning models in various applications. Recently, much research has been devoted to improving the model robustness by training with noise perturbations. Most existing studies assume a fixed perturbation level for all training examples, which however hardly holds in real tasks. In fact, excessive perturbations… ▽ More

    Submitted 27 March, 2021; originally announced March 2021.

    Comments: To be published in AAAI-21

  49. arXiv:2102.04716  [pdf, other

    cs.LG

    Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training

    Authors: Lue Tao, Lei Feng, Jinfeng Yi, Sheng-Jun Huang, Songcan Chen

    Abstract: Delusive attacks aim to substantially deteriorate the test accuracy of the learning model by slightly perturbing the features of correctly labeled training examples. By formalizing this malicious attack as finding the worst-case training data within a specific $\infty$-Wasserstein ball, we show that minimizing adversarial risk on the perturbed data is equivalent to optimizing an upper bound of nat… ▽ More

    Submitted 13 December, 2021; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021

  50. arXiv:2012.14738  [pdf, other

    cs.LG cs.CR

    With False Friends Like These, Who Can Notice Mistakes?

    Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen

    Abstract: Adversarial examples crafted by an explicit adversary have attracted significant attention in machine learning. However, the security risk posed by a potential false friend has been largely overlooked. In this paper, we unveil the threat of hypocritical examples -- inputs that are originally misclassified yet perturbed by a false friend to force correct predictions. While such perturbed examples s… ▽ More

    Submitted 13 December, 2021; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: AAAI 2022