Skip to main content

Showing 1–41 of 41 results for author: Lao, Y

.
  1. arXiv:2405.12357  [pdf

    eess.IV cs.CV

    Paired Conditional Generative Adversarial Network for Highly Accelerated Liver 4D MRI

    Authors: Di Xu, Xin Miao, Hengjie Liu, Jessica E. Scholey, Wensha Yang, Mary Feng, Michael Ohliger, Hui Lin, Yi Lao, Yang Yang, Ke Sheng

    Abstract: Purpose: 4D MRI with high spatiotemporal resolution is desired for image-guided liver radiotherapy. Acquiring densely sampling k-space data is time-consuming. Accelerated acquisition with sparse samples is desirable but often causes degraded image quality or long reconstruction time. We propose the Reconstruct Paired Conditional Generative Adversarial Network (Re-Con-GAN) to shorten the 4D MRI rec… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2403.15530  [pdf, other

    cs.CV

    Pixel-GS: Density Control with Pixel-aware Gradient for 3D Gaussian Splatting

    Authors: Zheng Zhang, Wenbo Hu, Yixing Lao, Tong He, Hengshuang Zhao

    Abstract: 3D Gaussian Splatting (3DGS) has demonstrated impressive novel view synthesis results while advancing real-time rendering performance. However, it relies heavily on the quality of the initial point cloud, resulting in blurring and needle-like artifacts in areas with insufficient initializing points. This is mainly attributed to the point cloud growth condition in 3DGS that only considers the avera… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  3. arXiv:2402.17483  [pdf, other

    cs.CV

    AlignMiF: Geometry-Aligned Multimodal Implicit Field for LiDAR-Camera Joint Synthesis

    Authors: Tao Tang, Guangrun Wang, Yixing Lao, Peng Chen, Jie Liu, Liang Lin, Kaicheng Yu, Xiaodan Liang

    Abstract: Neural implicit fields have been a de facto standard in novel view synthesis. Recently, there exist some methods exploring fusing multiple modalities within a single field, aiming to share implicit features from different modalities to enhance reconstruction performance. However, these modalities often exhibit misaligned behaviors: optimizing for one modality, such as LiDAR, can adversely affect a… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: CVPR2024

  4. arXiv:2402.04554  [pdf, other

    cs.CV

    BirdNeRF: Fast Neural Reconstruction of Large-Scale Scenes From Aerial Imagery

    Authors: Huiqing Zhang, Yifei Xue, Ming Liao, Yizhen Lao

    Abstract: In this study, we introduce BirdNeRF, an adaptation of Neural Radiance Fields (NeRF) designed specifically for reconstructing large-scale scenes using aerial imagery. Unlike previous research focused on small-scale and object-centric NeRF reconstruction, our approach addresses multiple challenges, including (1) Addressing the issue of slow training and rendering associated with large models. (2) M… ▽ More

    Submitted 11 February, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

  5. arXiv:2401.09126  [pdf, other

    cs.CV cs.GR

    Objects With Lighting: A Real-World Dataset for Evaluating Reconstruction and Rendering for Object Relighting

    Authors: Benjamin Ummenhofer, Sanskar Agrawal, Rene Sepulveda, Yixing Lao, Kai Zhang, Tianhang Cheng, Stephan Richter, Shenlong Wang, German Ros

    Abstract: Reconstructing an object from photos and placing it virtually in a new environment goes beyond the standard novel view synthesis task as the appearance of the object has to not only adapt to the novel viewpoint but also to the new lighting conditions and yet evaluations of inverse rendering methods rely on novel view synthesis data or simplistic synthetic datasets for quantitative analysis. This w… ▽ More

    Submitted 13 April, 2024; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: Accepted at 3DV 2024, Oral presentation. For the project page see https://github.com/isl-org/objects-with-lighting

  6. arXiv:2401.03844  [pdf, other

    cs.CV

    Fully Attentional Networks with Self-emerging Token Labeling

    Authors: Bingyin Zhao, Zhiding Yu, Shiyi Lan, Yutao Cheng, Anima Anandkumar, Yingjie Lao, Jose M. Alvarez

    Abstract: Recent studies indicate that Vision Transformers (ViTs) are robust against out-of-distribution scenarios. In particular, the Fully Attentional Network (FAN) - a family of ViT backbones, has achieved state-of-the-art robustness. In this paper, we revisit the FAN models and improve their pre-training with a self-emerging token labeling (STL) framework. Our method contains a two-stage training framew… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

    Journal ref: Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), 2023, pp. 5585-5595

  7. arXiv:2312.10657  [pdf, other

    cs.CR

    UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks

    Authors: Bingyin Zhao, Yingjie Lao

    Abstract: Backdoor attacks are emerging threats to deep neural networks, which typically embed malicious behaviors into a victim model by injecting poisoned samples. Adversaries can activate the injected backdoor during inference by presenting the trigger on input images. Prior defensive methods have achieved remarkable success in countering dirty-label backdoor attacks where the labels of poisoned samples… ▽ More

    Submitted 17 December, 2023; originally announced December 2023.

  8. arXiv:2312.06642  [pdf, other

    cs.CV

    CorresNeRF: Image Correspondence Priors for Neural Radiance Fields

    Authors: Yixing Lao, Xiaogang Xu, Zhipeng Cai, Xihui Liu, Hengshuang Zhao

    Abstract: Neural Radiance Fields (NeRFs) have achieved impressive results in novel view synthesis and surface reconstruction tasks. However, their performance suffers under challenging scenarios with sparse input views. We present CorresNeRF, a novel method that leverages image correspondence priors computed by off-the-shelf methods to supervise NeRF training. We design adaptive processes for augmentation a… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Journal ref: NeurIPS 2023

  9. KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition

    Authors: Weihang Tan, Yingjie Lao, Keshab K. Parhi

    Abstract: CRYSTAL-Kyber (Kyber) is one of the post-quantum cryptography (PQC) key-encapsulation mechanism (KEM) schemes selected during the standardization process. This paper addresses optimization for Kyber architecture with respect to latency and throughput constraints. Specifically, matrix-vector multiplication and number theoretic transform (NTT)-based polynomial multiplication are critical operations… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: Proc. 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), San Francisco, CA, Oct. 29 - Nov. 2, 2023

    Journal ref: 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)

  10. arXiv:2310.00567  [pdf, other

    cs.LG cs.AI cs.CV

    Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

    Authors: Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan

    Abstract: Recent works have shown that deep neural networks are vulnerable to adversarial examples that find samples close to the original image but can make the model misclassify. Even with access only to the model's output, an attacker can employ black-box attacks to generate such adversarial examples. In this work, we propose a simple and lightweight defense against black-box attacks by adding random noi… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  11. arXiv:2307.05129  [pdf, other

    cs.CV

    DFR: Depth from Rotation by Uncalibrated Image Rectification with Latitudinal Motion Assumption

    Authors: Yongcong Zhang, Yifei Xue, Ming Liao, Huiqing Zhang, Yizhen Lao

    Abstract: Despite the increasing prevalence of rotating-style capture (e.g., surveillance cameras), conventional stereo rectification techniques frequently fail due to the rotation-dominant motion and small baseline between views. In this paper, we tackle the challenge of performing stereo rectification for uncalibrated rotating cameras. To that end, we propose Depth-from-Rotation (DfR), a novel image recti… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  12. arXiv:2307.03811  [pdf

    cond-mat.mtrl-sci cond-mat.dis-nn cs.LG

    Formulation Graphs for Map** Structure-Composition of Battery Electrolytes to Device Performance

    Authors: Vidushi Sharma, Maxwell Giammona, Dmitry Zubarev, Andy Tek, Khanh Nugyuen, Linda Sundberg, Daniele Congiu, Young-Hye La

    Abstract: Advanced computational methods are being actively sought for addressing the challenges associated with discovery and development of new combinatorial material such as formulations. A widely adopted approach involves domain informed high-throughput screening of individual components that can be combined into a formulation. This manages to accelerate the discovery of new compounds for a target appli… ▽ More

    Submitted 28 September, 2023; v1 submitted 7 July, 2023; originally announced July 2023.

    Comments: 35 pages, 10 figures

  13. arXiv:2304.10406  [pdf, other

    cs.CV

    LiDAR-NeRF: Novel LiDAR View Synthesis via Neural Radiance Fields

    Authors: Tang Tao, Longfei Gao, Guangrun Wang, Yixing Lao, Peng Chen, Hengshuang Zhao, Dayang Hao, Xiaodan Liang, Mathieu Salzmann, Kaicheng Yu

    Abstract: We introduce a new task, novel view synthesis for LiDAR sensors. While traditional model-based LiDAR simulators with style-transfer neural networks can be applied to render novel views, they fall short of producing accurate and realistic LiDAR patterns because the renderers rely on explicit 3D reconstruction and exploit game engines, that ignore important attributes of LiDAR points. We address thi… ▽ More

    Submitted 14 July, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: This paper introduces a new task of novel LiDAR view synthesis, and proposes a differentiable framework called LiDAR-NeRF with a structural regularization, as well as an object-centric multi-view LiDAR dataset called NeRF-MVL

  14. arXiv:2304.09783  [pdf, other

    eess.IV cs.CV

    Application of attention-based Siamese composite neural network in medical image recognition

    Authors: Zihao Huang, Yue Wang, Weixing Xin, Xingtong Lin, Huizhen Li, Haowen Chen, Yizhen Lao, Xia Chen

    Abstract: Medical image recognition often faces the problem of insufficient data in practical applications. Image recognition and processing under few-shot conditions will produce overfitting, low recognition accuracy, low reliability and insufficient robustness. It is often the case that the difference of characteristics is subtle, and the recognition is affected by perspectives, background, occlusion and… ▽ More

    Submitted 15 March, 2024; v1 submitted 19 April, 2023; originally announced April 2023.

  15. arXiv:2303.18125  [pdf, other

    cs.CV

    Towards Nonlinear-Motion-Aware and Occlusion-Robust Rolling Shutter Correction

    Authors: Delin Qu, Yizhen Lao, Zhigang Wang, Dong Wang, Bin Zhao, Xuelong Li

    Abstract: This paper addresses the problem of rolling shutter correction in complex nonlinear and dynamic scenes with extreme occlusion. Existing methods suffer from two main drawbacks. Firstly, they face challenges in estimating the accurate correction field due to the uniform velocity assumption, leading to significant image correction errors under complex motion. Secondly, the drastic occlusion in dynami… ▽ More

    Submitted 15 August, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

    Comments: accepted at ICCV 2023

  16. PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption

    Authors: Weihang Tan, Sin-Wei Chiu, Antian Wang, Yingjie Lao, Keshab K. Parhi

    Abstract: High-speed long polynomial multiplication is important for applications in homomorphic encryption (HE) and lattice-based cryptosystems. This paper addresses low-latency hardware architectures for long polynomial modular multiplication using the number-theoretic transform (NTT) and inverse NTT (iNTT). Chinese remainder theorem (CRT) is used to decompose the modulus into multiple smaller moduli. Our… ▽ More

    Submitted 6 July, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 1646-1659, 2024

  17. arXiv:2302.08505  [pdf, other

    cs.CV cs.AI

    Rapid-Motion-Track: Markerless Tracking of Fast Human Motion with Deeper Learning

    Authors: Renjie Li, Chun Yu Lao, Rebecca St. George, Katherine Lawler, Saurabh Garg, Son N. Tran, Quan Bai, Jane Alty

    Abstract: Objective The coordination of human movement directly reflects function of the central nervous system. Small deficits in movement are often the first sign of an underlying neurological problem. The objective of this research is to develop a new end-to-end, deep learning-based system, Rapid-Motion-Track (RMT) that can track the fastest human movement accurately when webcams or laptop cameras are us… ▽ More

    Submitted 18 January, 2023; originally announced February 2023.

  18. arXiv:2210.09194  [pdf, other

    cs.CR cs.CV

    Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

    Authors: Khoa D. Doan, Yingjie Lao, ** Li

    Abstract: In recent years, machine learning models have been shown to be vulnerable to backdoor attacks. Under such attacks, an adversary embeds a stealthy backdoor into the trained model such that the compromised models will behave normally on clean inputs but will misclassify according to the adversary's control on maliciously constructed input with a trigger. While these existing attacks are very effecti… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Accepted to NeurIPS 2022

  19. arXiv:2210.05666  [pdf, other

    cs.CV

    Point Transformer V2: Grouped Vector Attention and Partition-based Pooling

    Authors: Xiaoyang Wu, Yixing Lao, Li Jiang, Xihui Liu, Hengshuang Zhao

    Abstract: As a pioneering work exploring transformer architecture for 3D point cloud understanding, Point Transformer achieves impressive results on multiple highly competitive benchmarks. In this work, we analyze the limitations of the Point Transformer and propose our powerful and efficient Point Transformer V2 model with novel designs that overcome the limitations of previous work. In particular, we firs… ▽ More

    Submitted 12 October, 2022; v1 submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted at NeurIPS 2022

  20. arXiv:2209.08503  [pdf, other

    cs.CV

    Revisiting Rolling Shutter Bundle Adjustment: Toward Accurate and Fast Solution

    Authors: Bangyan Liao, Delin Qu, Yifei Xue, Huiqing Zhang, Yizhen Lao

    Abstract: We propose a robust and fast bundle adjustment solution that estimates the 6-DoF pose of the camera and the geometry of the environment based on measurements from a rolling shutter (RS) camera. This tackles the challenges in the existing works, namely relying on additional sensors, high frame rate video as input, restrictive assumptions on camera motion, readout direction, and poor efficiency. To… ▽ More

    Submitted 18 April, 2023; v1 submitted 18 September, 2022; originally announced September 2022.

    Comments: Accepted to CVPR 2023

  21. arXiv:2208.14270  [pdf, other

    cs.CR cs.AR

    Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography

    Authors: Antian Wang, Weihang Tan, Keshab K. Parhi, Yingjie Lao

    Abstract: With the surge of the powerful quantum computer, lattice-based cryptography proliferated the latest cryptography hardware implementation due to its resistance against quantum computers. Among the computational blocks of lattice-based cryptography, the random errors produced by the sampler play a key role in ensuring the security of these schemes. This paper proposes an integral architecture for th… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: 6 pages, accepted by 35th IEEE Int. Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems

  22. arXiv:2208.13361  [pdf, other

    cs.CR cs.CL

    NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language

    Authors: Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, ** Li

    Abstract: The recent privacy leakage incidences and the more strict policy regulations demand a much higher standard of compliance for companies and mobile apps. However, such obligations also impose significant challenges on app developers for complying with these regulations that contain various perspectives, activities, and roles, especially for small companies and developers who are less experienced in… ▽ More

    Submitted 29 August, 2022; originally announced August 2022.

    Comments: 37 pages

  23. arXiv:2208.07678  [pdf, other

    cs.CV

    FEC: Fast Euclidean Clustering for Point Cloud Segmentation

    Authors: Yu Cao, Yancheng Wang, Yifei Xue, Huiqing Zhang, Yizhen Lao

    Abstract: Segmentation from point cloud data is essential in many applications such as remote sensing, mobile robots, or autonomous cars. However, the point clouds captured by the 3D range sensor are commonly sparse and unstructured, challenging efficient segmentation. In this paper, we present a fast solution to point cloud instance segmentation with small computational demands. To this end, we propose a n… ▽ More

    Submitted 11 November, 2022; v1 submitted 16 August, 2022; originally announced August 2022.

  24. arXiv:2206.12381  [pdf, other

    cs.CV

    Defending Backdoor Attacks on Vision Transformer via Patch Processing

    Authors: Khoa D. Doan, Yingjie Lao, Peng Yang, ** Li

    Abstract: Vision Transformers (ViTs) have a radically different architecture with significantly less inductive bias than Convolutional Neural Networks. Along with the improvement in performance, security and robustness of ViTs are also of great importance to study. In contrast to many recent works that exploit the robustness of ViTs against adversarial examples, this paper investigates a representative caus… ▽ More

    Submitted 16 January, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

  25. arXiv:2205.15444  [pdf, other

    cs.CR

    Integrity Authentication in Tree Models

    Authors: Weijie Zhao, Yingjie Lao, ** Li

    Abstract: Tree models are very widely used in practice of machine learning and data mining. In this paper, we study the problem of model integrity authentication in tree models. In general, the task of model integrity authentication is the design \& implementation of mechanisms for checking/detecting whether the model deployed for the end-users has been tampered with or compromised, e.g., malicious modifica… ▽ More

    Submitted 23 June, 2022; v1 submitted 30 May, 2022; originally announced May 2022.

  26. arXiv:2202.11010  [pdf

    cond-mat.mes-hall

    Entropy-driven order in an array of nanomagnets

    Authors: Hilal Saglam, Ayhan Duzgun, Aikaterini Kargioti, Nikhil Harle, Xiaoyu Zhang, Nicholas S. Bingham, Yuyang Lao, Ian Gilbert, Joseph Sklenar, Justin D. Watts, Justin Ramberger, Daniel Bromley, Rajesh V. Chopdekar, Liam O'Brien, Chris Leighton, Cristiano Nisoli, Peter Schiffer

    Abstract: Long-range ordering is typically associated with a decrease in entropy. Yet, it can also be driven by increasing entropy in certain special cases. We demonstrate that artificial spin ice arrays of single-domain nanomagnets can be designed to produce entropy-driven order. We focus on the tetris artificial spin ice structure, a highly frustrated array geometry with a zero-point Pauli entropy, which… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

    Comments: 53 pages, 19 figures (including Supplementary Information)

  27. High-Speed VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography

    Authors: Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi

    Abstract: This paper presents a low-latency hardware accelerator for modular polynomial multiplication for lattice-based post-quantum cryptography and homomorphic encryption applications. The proposed novel modular polynomial multiplier exploits the fast finite impulse response (FIR) filter architecture to reduce the computational complexity of the schoolbook modular polynomial multiplication. We also exten… ▽ More

    Submitted 24 February, 2023; v1 submitted 22 October, 2021; originally announced October 2021.

    Journal ref: IEEE Trans. on Computers, 72(9), pp. 2454-2466, Sept. 2023

  28. arXiv:2110.00511  [pdf, other

    cs.CV cs.DC cs.GR cs.RO

    ASH: A Modern Framework for Parallel Spatial Hashing in 3D Perception

    Authors: Wei Dong, Yixing Lao, Michael Kaess, Vladlen Koltun

    Abstract: We present ASH, a modern and high-performance framework for parallel spatial hashing on GPU. Compared to existing GPU hash map implementations, ASH achieves higher performance, supports richer functionality, and requires fewer lines of code (LoC) when used for implementing spatially varying operations from volumetric geometry reconstruction to differentiable appearance reconstruction. Unlike exist… ▽ More

    Submitted 29 January, 2023; v1 submitted 1 October, 2021; originally announced October 2021.

    Comments: 18 pages, 19 figures

  29. arXiv:2010.16325  [pdf

    physics.med-ph

    Identifying the optimal parameters for sprayed and inhaled drug particulates for intranasal targeting of SARS-CoV-2 infection sites

    Authors: Yueying Lao, Diane Joseph-McCarthy, Arijit Chakravarty, Pallavi A. Balivada, Phoebe Ato, Nogaye K. Ka, Saikat Basu

    Abstract: Efficacy for COVID-19 treatments can be enhanced significantly through targeting the nasopharynx, which has been shown to be the dominant preliminary infection site for SARS-CoV-2. Although intranasal drugs can be administered easily through drops or sprays, it is difficult to test whether current protocols will deliver the right amount of the drug to this location consistently. We are interested… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

    Comments: 27 pages, 16 figures

  30. arXiv:2008.07571  [pdf

    cond-mat.mes-hall

    String Phase in an Artificial Spin Ice

    Authors: Xiaoyu Zhang, Ayhan Duzgun, Yuyang Lao, Shayaan Subzwari, Nicholas S. Bingham, Joseph Sklenar, Hilal Saglam, Justin Ramberger, Joseph T. Batley, Justin D. Watts, Daniel Bromley, Rajesh V. Chopdekar, Liam O'Brien, Chris Leighton, Cristiano Nisoli, Peter Schiffer

    Abstract: One-dimensional strings of local excitations are a fascinating feature of the physical behavior of strongly correlated topological quantum matter. Here we study strings of local excitations in a classical system of interacting nanomagnets, the Santa Fe Ice geometry of artificial spin ice. We measured the moment configuration of the nanomagnets, both after annealing near the ferromagnetic Curie poi… ▽ More

    Submitted 20 October, 2021; v1 submitted 17 August, 2020; originally announced August 2020.

    Comments: 46 pages including SI

  31. arXiv:2008.00047  [pdf, other

    cs.LG cs.CR stat.ML

    Towards Class-Oriented Poisoning Attacks Against Neural Networks

    Authors: Bingyin Zhao, Yingjie Lao

    Abstract: Poisoning attacks on machine learning systems compromise the model performance by deliberately injecting malicious samples in the training dataset to influence the training process. Prior works focus on either availability attacks (i.e., lowering the overall model accuracy) or integrity attacks (i.e., enabling specific instance-based backdoor). In this paper, we advance the adversarial objectives… ▽ More

    Submitted 11 October, 2021; v1 submitted 31 July, 2020; originally announced August 2020.

    Comments: 14 pages, 9 figures, accepted by Winter Conference on Applications of Computer Vision (WACV) 2022

  32. arXiv:1910.14158  [pdf, other

    cond-mat.mes-hall

    Understanding Thermal Annealing of Artificial Spin Ice

    Authors: Xiaoyu Zhang, Yuyang Lao, Joseph Sklenar, Nicholas S. Bingham, Joseph T. Batley, Justin D. Watts, Cristiano Nisoli, Chris Leighton, Peter Schiffer

    Abstract: We have performed a detailed study of thermal annealing of the moment configuration in artificial spin ice. Permalloy (Ni$_{80}$Fe$_{20}$) artificial spin ice samples were examined in the prototypical square ice geometry, studying annealing as a function of island thickness, island shape, and annealing temperature and duration. We also measured the Curie temperature as a function of film thickness… ▽ More

    Submitted 30 October, 2019; originally announced October 2019.

    Comments: The following article has been accepted by APL Materials. After it is published, it will be found at Link

  33. arXiv:1903.11688  [pdf, other

    cs.CR cs.LG

    Rallying Adversarial Techniques against Deep Learning for Network Security

    Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao

    Abstract: Recent advances in artificial intelligence and the increasing need for powerful defensive measures in the domain of network security, have led to the adoption of deep learning approaches for use in network intrusion detection systems. These methods have achieved superior performance against conventional network attacks, which enable the deployment of practical security systems to unique and dynami… ▽ More

    Submitted 24 October, 2021; v1 submitted 27 March, 2019; originally announced March 2019.

    Comments: accepted by IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2021)

  34. arXiv:1810.10121  [pdf, other

    cs.CR

    nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data

    Authors: Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski

    Abstract: Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL models that operate on ciphertext is currently labor-intensive and requires simultaneous expertise in DL, cryptography, and software engineering. DL frameworks and recent advances in graph compilers have g… ▽ More

    Submitted 2 April, 2019; v1 submitted 23 October, 2018; originally announced October 2018.

  35. arXiv:1806.05768  [pdf, other

    cs.LG cs.CR stat.ML

    Hardware Trojan Attacks on Neural Networks

    Authors: Joseph Clements, Yingjie Lao

    Abstract: With the rising popularity of machine learning and the ever increasing demand for computational power, there is a growing need for hardware optimized implementations of neural networks and other machine learning models. As the technology evolves, it is also plausible that machine learning or artificial intelligence will soon become consumer electronic products and military equipment, in the form o… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

  36. arXiv:1804.10911  [pdf, ps, other

    cs.CL cs.IR

    A Tree Search Algorithm for Sequence Labeling

    Authors: Yadi Lao, Jun Xu, Yanyan Lan, Jiafeng Guo, Sheng Gao, Xueqi Cheng

    Abstract: In this paper we propose a novel reinforcement learning based model for sequence tagging, referred to as MM-Tag. Inspired by the success and methodology of the AlphaGo Zero, MM-Tag formalizes the problem of sequence tagging with a Monte Carlo tree search (MCTS) enhanced Markov decision process (MDP) model, in which the time steps correspond to the positions of words in a sentence from left to righ… ▽ More

    Submitted 17 May, 2018; v1 submitted 29 April, 2018; originally announced April 2018.

  37. arXiv:1801.08058  [pdf, other

    cs.DC cs.LG

    Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning

    Authors: Scott Cyphers, Arjun K. Bansal, Anahita Bhiwandiwalla, Jayaram Bobba, Matthew Brookhart, Avijit Chakraborty, Will Constable, Christian Convey, Leona Cook, Omar Kanawi, Robert Kimball, Jason Knight, Nikolay Korovaiko, Varun Kumar, Yixing Lao, Christopher R. Lishka, Jaikrishnan Menon, Jennifer Myers, Sandeep Aswath Narayana, Adam Procter, Tristan J. Webb

    Abstract: The Deep Learning (DL) community sees many novel topologies published each year. Achieving high performance on each new topology remains challenging, as each requires some level of manual effort. This issue is compounded by the proliferation of frameworks and hardware platforms. The current approach, which we call "direct optimization", requires deep changes within each framework to improve the tr… ▽ More

    Submitted 29 January, 2018; v1 submitted 24 January, 2018; originally announced January 2018.

  38. arXiv:1508.06330  [pdf

    cond-mat.mes-hall

    Direct Visualization of Memory Effects in Artificial Spin Ice

    Authors: Ian Gilbert, Gia-Wei Chern, Bryce Fore, Yuyang Lao, Sheng Zhang, Cristiano Nisoli, Peter Schiffer

    Abstract: We experimentally demonstrate that arrays of interacting nanoscale ferromagnetic islands, known as artificial spin ice, develop reproducible microstates upon cycling an applied magnetic field. The onset of this memory effect is determined by the strength of the applied field relative to the array coercivity. Specifically, when the applied field strength is almost exactly equal to the array coerciv… ▽ More

    Submitted 25 August, 2015; originally announced August 2015.

    Comments: 19 pages, 8 figures

  39. arXiv:1410.1780  [pdf, ps, other

    cond-mat.supr-con cond-mat.mtrl-sci cond-mat.str-el

    Optimization of a model for the CuO planes in La2CuO4

    Authors: Yoandri Vielza de la Cruz, Alejandro Cabo Montes de Oca

    Abstract: The results of a previous work, where it was considered the effect of hole do** on a simple model of the CuO2 planes in La2CuO4, are extended. The parameters are adjusted with the objective to fix the known values of the gap of 2 eV for this material and its dielectric constant of 21. We find again indications of a "hidden" phase transition beneath the superconductor dome. The transition is a se… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

    Comments: 8 pages, in Spanish, 20 figures

  40. Replica exchange molecular dynamics optimization of tensor network states for quantum many-body systems

    Authors: Wenyuan Liu, Chao Wang, Yanbin Li, Yuyang Lao, Yongjian Han, Guang-Can Guo, Lixin He

    Abstract: The tensor network states (TNS) methods combined with Monte Carlo (MC) techniques have been proved a powerful algorithm for simulating quantum many-body systems. However, because the ground state energy is a highly non-linear function of the tensors, it is easy to get stuck in local minima when optimizing the TNS of the simulated physical systems. To overcome this difficulty, we introduce a replic… ▽ More

    Submitted 1 April, 2014; originally announced April 2014.

  41. arXiv:1311.0676  [pdf, ps, other

    cond-mat.mtrl-sci cond-mat.mes-hall

    Non-reciprocal Oersted field contribution to the current-induced frequency shift of magnetostatic surface waves

    Authors: Mohammad Haidar, Matthieu Bailleul, Mikhail Kostylev, Yuyan Lao

    Abstract: The influence of an electrical current on the propagation of magnetostatic surface waves is investigated in a relatively thick (40 nm) permalloy film both experimentally and theoretically. Contrary to previously studied thinner films where the dominating effect is the current-induced spin-wave Doppler shift, the magnetic field generated by the current (Oersted field) is found to induce a strong no… ▽ More

    Submitted 4 November, 2013; originally announced November 2013.

    Comments: Submitted to Phys. Rev. B