-
An Exploratory Study of COVID-19 Information on Twitter in the Greater Region
Authors:
Ninghan Chen,
Zhiqiang Zhong,
Jun Pang
Abstract:
The outbreak of the COVID-19 leads to a burst of information in major online social networks (OSNs). Facing this constantly changing situation, OSNs have become an essential platform for people expressing opinions and seeking up-to-the-minute information. Thus, discussions on OSNs may become a reflection of reality. This paper aims to figure out the distinctive characteristics of the Greater Regio…
▽ More
The outbreak of the COVID-19 leads to a burst of information in major online social networks (OSNs). Facing this constantly changing situation, OSNs have become an essential platform for people expressing opinions and seeking up-to-the-minute information. Thus, discussions on OSNs may become a reflection of reality. This paper aims to figure out the distinctive characteristics of the Greater Region (GR) through conducting a data-driven exploratory study of Twitter COVID-19 information in the GR and related countries using machine learning and representation learning methods. We find that tweets volume and COVID-19 cases in GR and related countries are correlated, but this correlation only exists in a particular period of the pandemic. Moreover, we plot the changing of topics in each country and region from 2020-01-22 to 2020-06-05, figuring out the main differences between GR and related countries.
△ Less
Submitted 2 December, 2020; v1 submitted 12 August, 2020;
originally announced August 2020.
-
Experimental Analysis of Legendre Decomposition in Machine Learning
Authors:
Jianye Pang,
Kai Yi,
Wanguang Yin,
Min Xu
Abstract:
In this technical report, we analyze Legendre decomposition for non-negative tensor in theory and application. In theory, the properties of dual parameters and dually flat manifold in Legendre decomposition are reviewed, and the process of tensor projection and parameter updating is analyzed. In application, a series of verification experiments and clustering experiments with parameters on submani…
▽ More
In this technical report, we analyze Legendre decomposition for non-negative tensor in theory and application. In theory, the properties of dual parameters and dually flat manifold in Legendre decomposition are reviewed, and the process of tensor projection and parameter updating is analyzed. In application, a series of verification experiments and clustering experiments with parameters on submanifold were carried out, ho** to find an effective lower dimensional representation of the input tensor. The experimental results show that the parameters on submanifold have no ability to be directly used as low-rank representations. Combined with analysis, we connect Legendre decomposition with neural networks and low-rank representation applications, and put forward some promising prospects.
△ Less
Submitted 21 September, 2020; v1 submitted 12 August, 2020;
originally announced August 2020.
-
Graph Signal Processing for Geometric Data and Beyond: Theory and Applications
Authors:
Wei Hu,
Jiahao Pang,
Xianming Liu,
Dong Tian,
Chia-Wen Lin,
Anthony Vetro
Abstract:
Geometric data acquired from real-world scenes, e.g., 2D depth images, 3D point clouds, and 4D dynamic point clouds, have found a wide range of applications including immersive telepresence, autonomous driving, surveillance, etc. Due to irregular sampling patterns of most geometric data, traditional image/video processing methodologies are limited, while Graph Signal Processing (GSP) -- a fast-dev…
▽ More
Geometric data acquired from real-world scenes, e.g., 2D depth images, 3D point clouds, and 4D dynamic point clouds, have found a wide range of applications including immersive telepresence, autonomous driving, surveillance, etc. Due to irregular sampling patterns of most geometric data, traditional image/video processing methodologies are limited, while Graph Signal Processing (GSP) -- a fast-develo** field in the signal processing community -- enables processing signals that reside on irregular domains and plays a critical role in numerous applications of geometric data from low-level processing to high-level analysis. To further advance the research in this field, we provide the first timely and comprehensive overview of GSP methodologies for geometric data in a unified manner by bridging the connections between geometric data and graphs, among the various geometric data modalities, and with spectral/nodal graph filtering techniques. We also discuss the recently developed Graph Neural Networks (GNNs) and interpret the operation of these networks from the perspective of GSP. We conclude with a brief discussion of open problems and challenges.
△ Less
Submitted 4 September, 2021; v1 submitted 4 August, 2020;
originally announced August 2020.
-
TearingNet: Point Cloud Autoencoder to Learn Topology-Friendly Representations
Authors:
Jiahao Pang,
Duanshun Li,
Dong Tian
Abstract:
Topology matters. Despite the recent success of point cloud processing with geometric deep learning, it remains arduous to capture the complex topologies of point cloud data with a learning model. Given a point cloud dataset containing objects with various genera, or scenes with multiple objects, we propose an autoencoder, TearingNet, which tackles the challenging task of representing the point cl…
▽ More
Topology matters. Despite the recent success of point cloud processing with geometric deep learning, it remains arduous to capture the complex topologies of point cloud data with a learning model. Given a point cloud dataset containing objects with various genera, or scenes with multiple objects, we propose an autoencoder, TearingNet, which tackles the challenging task of representing the point clouds using a fixed-length descriptor. Unlike existing works directly deforming predefined primitives of genus zero (e.g., a 2D square patch) to an object-level point cloud, our TearingNet is characterized by a proposed Tearing network module and a Folding network module interacting with each other iteratively. Particularly, the Tearing network module learns the point cloud topology explicitly. By breaking the edges of a primitive graph, it tears the graph into patches or with holes to emulate the topology of a target point cloud, leading to faithful reconstructions. Experimentation shows the superiority of our proposal in terms of reconstructing point clouds as well as generating more topology-friendly representations than benchmarks.
△ Less
Submitted 4 September, 2021; v1 submitted 17 June, 2020;
originally announced June 2020.
-
Quasi-Dense Similarity Learning for Multiple Object Tracking
Authors:
Jiangmiao Pang,
Linlu Qiu,
Xia Li,
Haofeng Chen,
Qi Li,
Trevor Darrell,
Fisher Yu
Abstract:
Similarity learning has been recognized as a crucial step for object tracking. However, existing multiple object tracking methods only use sparse ground truth matching as the training objective, while ignoring the majority of the informative regions on the images. In this paper, we present Quasi-Dense Similarity Learning, which densely samples hundreds of region proposals on a pair of images for c…
▽ More
Similarity learning has been recognized as a crucial step for object tracking. However, existing multiple object tracking methods only use sparse ground truth matching as the training objective, while ignoring the majority of the informative regions on the images. In this paper, we present Quasi-Dense Similarity Learning, which densely samples hundreds of region proposals on a pair of images for contrastive learning. We can directly combine this similarity learning with existing detection methods to build Quasi-Dense Tracking (QDTrack) without turning to displacement regression or motion priors. We also find that the resulting distinctive feature space admits a simple nearest neighbor search at the inference time. Despite its simplicity, QDTrack outperforms all existing methods on MOT, BDD100K, Waymo, and TAO tracking benchmarks. It achieves 68.7 MOTA at 20.3 FPS on MOT17 without using external training data. Compared to methods with similar detectors, it boosts almost 10 points of MOTA and significantly decreases the number of ID switches on BDD100K and Waymo datasets. Our code and trained models are available at http://vis.xyz/pub/qdtrack.
△ Less
Submitted 7 September, 2021; v1 submitted 11 June, 2020;
originally announced June 2020.
-
A Dynamics-based Approach for the Target Control of Boolean Networks
Authors:
Cui Su,
Jun Pang
Abstract:
We study the target control problem of asynchronous Boolean networks, to identify a set of nodes, the perturbation of which can drive the dynamics of the network from any initial state to the desired steady state (or attractor). We are particularly interested in temporary perturbations, which are applied for sufficient time and then released to retrieve the original dynamics. Temporary perturbatio…
▽ More
We study the target control problem of asynchronous Boolean networks, to identify a set of nodes, the perturbation of which can drive the dynamics of the network from any initial state to the desired steady state (or attractor). We are particularly interested in temporary perturbations, which are applied for sufficient time and then released to retrieve the original dynamics. Temporary perturbations have the apparent advantage of averting unforeseen consequences, which might be induced by permanent perturbations. Despite the infamous state-space explosion problem, in this work, we develop an efficient method to compute the temporary target control for a given target attractor of a Boolean network. We apply our method to a number of real-life biological networks and compare its performance with the stable motif-based control method to demonstrate its efficacy and efficiency.
△ Less
Submitted 3 June, 2020;
originally announced June 2020.
-
Solving Nonsmooth Nonconvex Compound Stochastic Programs with Applications to Risk Measure Minimization
Authors:
Junyi Liu,
Ying Cui,
Jong-Shi Pang
Abstract:
This paper studies a structured compound stochastic program (SP) involving multiple expectations coupled by nonconvex and nonsmooth functions. We present a successive convex-programming based sampling algorithm and establish its subsequential convergence. We describe stationarity properties of the limit points for several classes of the compound SP. We further discuss probabilistic stop** rules…
▽ More
This paper studies a structured compound stochastic program (SP) involving multiple expectations coupled by nonconvex and nonsmooth functions. We present a successive convex-programming based sampling algorithm and establish its subsequential convergence. We describe stationarity properties of the limit points for several classes of the compound SP. We further discuss probabilistic stop** rules based on the computable error-bound for the algorithm. We present several risk measure minimization problems that can be formulated as such a compound stochastic program; these include generalized deviation optimization problems based on optimized certainty equivalent and buffered probability of exceedance (bPOE), a distributionally robust bPOE optimization problem, and a multiclass classification problem employing the cost-sensitive error criteria with bPOE risk measure.
△ Less
Submitted 23 May, 2021; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Models Genesis
Authors:
Zongwei Zhou,
Vatsal Sodha,
Jiaxuan Pang,
Michael B. Gotway,
Jianming Liang
Abstract:
Transfer learning from natural images to medical images has been established as one of the most practical paradigms in deep learning for medical image analysis. To fit this paradigm, however, 3D imaging tasks in the most prominent imaging modalities (e.g., CT and MRI) have to be reformulated and solved in 2D, losing rich 3D anatomical information, thereby inevitably compromising its performance. T…
▽ More
Transfer learning from natural images to medical images has been established as one of the most practical paradigms in deep learning for medical image analysis. To fit this paradigm, however, 3D imaging tasks in the most prominent imaging modalities (e.g., CT and MRI) have to be reformulated and solved in 2D, losing rich 3D anatomical information, thereby inevitably compromising its performance. To overcome this limitation, we have built a set of models, called Generic Autodidactic Models, nicknamed Models Genesis, because they are created ex nihilo (with no manual labeling), self-taught (learnt by self-supervision), and generic (served as source models for generating application-specific target models). Our extensive experiments demonstrate that our Models Genesis significantly outperform learning from scratch and existing pre-trained 3D models in all five target 3D applications covering both segmentation and classification. More importantly, learning a model from scratch simply in 3D may not necessarily yield performance better than transfer learning from ImageNet in 2D, but our Models Genesis consistently top any 2D/2.5D approaches including fine-tuning the models pre-trained from ImageNet as well as fine-tuning the 2D versions of our Models Genesis, confirming the importance of 3D anatomical information and significance of Models Genesis for 3D medical imaging. This performance is attributed to our unified self-supervised learning framework, built on a simple yet powerful observation: the sophisticated and recurrent anatomy in medical images can serve as strong yet free supervision signals for deep models to learn common anatomical representation automatically via self-supervision. As open science, all codes and pre-trained Models Genesis are available at https://github.com/MrGiovanni/ModelsGenesis.
△ Less
Submitted 16 December, 2020; v1 submitted 9 April, 2020;
originally announced April 2020.
-
Sequential Control of Boolean Networks with Temporary and Permanent Perturbations
Authors:
Cui Su,
Jun Pang
Abstract:
Direct cell reprogramming makes it feasible to reprogram abundant somatic cells into desired cells. It has great potential for regenerative medicine and tissue engineering. In this work, we study the control of biological networks, modelled as Boolean networks, to identify control paths driving the dynamics of the network from a source attractor (undesired cells) to the target attractor (desired c…
▽ More
Direct cell reprogramming makes it feasible to reprogram abundant somatic cells into desired cells. It has great potential for regenerative medicine and tissue engineering. In this work, we study the control of biological networks, modelled as Boolean networks, to identify control paths driving the dynamics of the network from a source attractor (undesired cells) to the target attractor (desired cells). Instead of achieving control in one step, we develop attractor-based sequential temporary and permanent control methods (AST and ASP) to identify a sequence of interventions that can alter the dynamics in a stepwise manner. To improve their feasibility, both AST and ASP only use biologically observable attractors as intermediates. They can find the shortest sequential paths and guarantee 100% reachability of the target attractor. We apply the two methods to several real-life biological networks and compare their performance with the attractor-based sequential instantaneous control (ASI). The results demonstrate that AST and ASP have the ability to identify a richer set of control paths with fewer perturbations than ASI, which will greatly facilitate practical applications.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
3D Point Cloud Enhancement using Graph-Modelled Multiview Depth Measurements
Authors:
Xue Zhang,
Gene Cheung,
Jiahao Pang,
Dong Tian
Abstract:
A 3D point cloud is often synthesized from depth measurements collected by sensors at different viewpoints. The acquired measurements are typically both coarse in precision and corrupted by noise. To improve quality, previous works denoise a synthesized 3D point cloud a posteriori after projecting the imperfect depth data onto 3D space. Instead, we enhance depth measurements on the sensed images a…
▽ More
A 3D point cloud is often synthesized from depth measurements collected by sensors at different viewpoints. The acquired measurements are typically both coarse in precision and corrupted by noise. To improve quality, previous works denoise a synthesized 3D point cloud a posteriori after projecting the imperfect depth data onto 3D space. Instead, we enhance depth measurements on the sensed images a priori, exploiting inherent 3D geometric correlation across views, before synthesizing a 3D point cloud from the improved measurements. By enhancing closer to the actual sensing process, we benefit from optimization targeting specifically the depth image formation model, before subsequent processing steps that can further obscure measurement errors. Mathematically, for each pixel row in a pair of rectified viewpoint depth images, we first construct a graph reflecting inter-pixel similarities via metric learning using data in previous enhanced rows. To optimize left and right viewpoint images simultaneously, we write a non-linear map** function from left pixel row to the right based on 3D geometry relations. We formulate a MAP optimization problem, which, after suitable linear approximations, results in an unconstrained convex and differentiable objective, solvable using fast gradient method (FGM). Experimental results show that our method noticeably outperforms recent denoising algorithms that enhance after 3D point clouds are synthesized.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
Capacity-achieving Polar-based LDGM Codes with Crowdsourcing Applications
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
In this paper we study codes with sparse generator matrices. More specifically, codes with a certain constraint on the weight of all the columns in the generator matrix are considered. The end result is the following. For any binary-input memoryless symmetric (BMS) channel and any epsilon > 2 epsilon*, where epsilon^* = \frac{1}{6}-\frac{5}{3}\log{\frac{4}{3}} \approx 0.085, we show an explicit se…
▽ More
In this paper we study codes with sparse generator matrices. More specifically, codes with a certain constraint on the weight of all the columns in the generator matrix are considered. The end result is the following. For any binary-input memoryless symmetric (BMS) channel and any epsilon > 2 epsilon*, where epsilon^* = \frac{1}{6}-\frac{5}{3}\log{\frac{4}{3}} \approx 0.085, we show an explicit sequence of capacity-achieving codes with all the column wights of the generator matrix upper bounded by (\log N)^{1+epsilon}, where N is the code block length. The constructions are based on polar codes. Applications to crowdsourcing are also shown.
△ Less
Submitted 31 January, 2020;
originally announced January 2020.
-
Synthesis and temperature-dependent photoluminescence of high density GeSe triangular nanoplate arrays on Si substrates
Authors:
Xueyan Li,
Xi Zhang,
Xiaowei Lv,
Jun Pang,
Li Lei,
Yong Liu,
Yong Peng,
Gang Xiang
Abstract:
We have grown germanium selenide (GeSe) triangular nanoplate arrays (TNAs) with a high density (3.82E+6 / mm2) on the Si (111) substrate using a simple thermal evaporation method. The thickness and trilateral lengths of a single triangular nanoplate were statistically estimated by atomic force microscopy (AFM) as 44 nm, 365 nm, 458 nm and 605 nm, respectively. Transmission electron microscopy (TEM…
▽ More
We have grown germanium selenide (GeSe) triangular nanoplate arrays (TNAs) with a high density (3.82E+6 / mm2) on the Si (111) substrate using a simple thermal evaporation method. The thickness and trilateral lengths of a single triangular nanoplate were statistically estimated by atomic force microscopy (AFM) as 44 nm, 365 nm, 458 nm and 605 nm, respectively. Transmission electron microscopy (TEM) images and X-ray diffraction (XRD) patterns show that the TNAs were composed of single crystalline GeSe phase. The Se-related defects in the lattice were also revealed by TEM images and Raman vibration modes. Unlike previously reported GeSe compounds, the GeSe TNAs exhibited temperature-dependent photoluminescence (PL). In addition, not previously reported PL peak (1.25 eV) of the 44 nm thick TNAs at 5 K was in the gaps between those of GeSe monolayers (1.5 nm) and thin films (400 nm), revealing a close relationship between the PL peak and the thickness of GeSe. The high-density structure and temperature-dependent PL of the TNAs on the Si substrate may be useful for temperature controllable semiconductor nanodevices.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
BDoS: Blockchain Denial of Service
Authors:
Michael Mirkin,
Yan Ji,
Jonathan Pang,
Ariah Klages-Mundt,
Ittay Eyal,
Ari Juels
Abstract:
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive targets for Denial-of-Service (DoS) attacks: There is fierce competition among coins, as well as potential gains from short selling. Classical DoS attack…
▽ More
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive targets for Denial-of-Service (DoS) attacks: There is fierce competition among coins, as well as potential gains from short selling. Classical DoS attacks, however, typically target a few servers and cannot scale to systems with many nodes. There have been no successful DoS attacks to date against prominent cryptocurrencies. We present Blockchain DoS (BDoS), the first incentive-based DoS attack that targets PoW cryptocurrencies. Unlike classical DoS, BDoS targets the system's mechanism design: It exploits the reward mechanism to discourage miner participation. Previous DoS attacks against PoW blockchains require an adversary's mining power to match that of all other miners. In contrast, BDoS can cause a blockchain to grind to a halt with significantly fewer resources, e.g., 21% as of March 2020 in Bitcoin, according to our empirical study. We find that Bitcoin's vulnerability to BDoS increases rapidly as the mining industry matures and profitability drops. BDoS differs from known attacks like Selfish Mining in its aim not to increase an adversary's revenue, but to disrupt the system. Although it bears some algorithmic similarity to those attacks, it introduces a new adversarial model, goals, algorithm, and game-theoretic analysis. Beyond its direct implications for operational blockchains, BDoS introduces the novel idea that an adversary can manipulate miners' incentives by proving the existence of blocks without actually publishing them.
△ Less
Submitted 4 November, 2020; v1 submitted 16 December, 2019;
originally announced December 2019.
-
Side-Aware Boundary Localization for More Precise Object Detection
Authors:
Jiaqi Wang,
Wenwei Zhang,
Yuhang Cao,
Kai Chen,
Jiangmiao Pang,
Tao Gong,
Jian** Shi,
Chen Change Loy,
Dahua Lin
Abstract:
Current object detection frameworks mainly rely on bounding box regression to localize objects. Despite the remarkable progress in recent years, the precision of bounding box regression remains unsatisfactory, hence limiting performance in object detection. We observe that precise localization requires careful placement of each side of the bounding box. However, the mainstream approach, which focu…
▽ More
Current object detection frameworks mainly rely on bounding box regression to localize objects. Despite the remarkable progress in recent years, the precision of bounding box regression remains unsatisfactory, hence limiting performance in object detection. We observe that precise localization requires careful placement of each side of the bounding box. However, the mainstream approach, which focuses on predicting centers and sizes, is not the most effective way to accomplish this task, especially when there exists displacements with large variance between the anchors and the targets. In this paper, we propose an alternative approach, named as Side-Aware Boundary Localization (SABL), where each side of the bounding box is respectively localized with a dedicated network branch. To tackle the difficulty of precise localization in the presence of displacements with large variance, we further propose a two-step localization scheme, which first predicts a range of movement through bucket prediction and then pinpoints the precise position within the predicted bucket. We test the proposed method on both two-stage and single-stage detection frameworks. Replacing the standard bounding box regression branch with the proposed design leads to significant improvements on Faster R-CNN, RetinaNet, and Cascade R-CNN, by 3.0%, 1.7%, and 0.9%, respectively. Code is available at https://github.com/open-mmlab/mmdetection.
△ Less
Submitted 26 August, 2020; v1 submitted 9 December, 2019;
originally announced December 2019.
-
Improving Fictitious Play Reinforcement Learning with Expanding Models
Authors:
Rong-Jun Qin,
**g-Cheng Pang,
Yang Yu
Abstract:
Fictitious play with reinforcement learning is a general and effective framework for zero-sum games. However, using the current deep neural network models, the implementation of fictitious play faces crucial challenges. Neural network model training employs gradient descent approaches to update all connection weights, and thus is easy to forget the old opponents after training to beat the new oppo…
▽ More
Fictitious play with reinforcement learning is a general and effective framework for zero-sum games. However, using the current deep neural network models, the implementation of fictitious play faces crucial challenges. Neural network model training employs gradient descent approaches to update all connection weights, and thus is easy to forget the old opponents after training to beat the new opponents. Existing approaches often maintain a pool of historical policy models to avoid the forgetting. However, learning to beat a pool in stochastic games, i.e., a wide distribution over policy models, is either sample-consuming or insufficient to exploit all models with limited amount of samples. In this paper, we propose a learning process with neural fictitious play to alleviate the above issues. We train a single model as our policy model, which consists of sub-models and a selector. Everytime facing a new opponent, the model is expanded by adding a new sub-model, where only the new sub-model is updated instead of the whole model. At the same time, the selector is also updated to mix up the new sub-model with the previous ones at the state-level, so that the model is maintained as a behavior strategy instead of a wide distribution over policy models. Experiments on Kuhn poker, a grid-world Treasure Hunting game, and Mini-RTS environments show that the proposed approach alleviates the forgetting problem, and consequently improves the learning efficiency and the robustness of neural fictitious play.
△ Less
Submitted 27 November, 2019; v1 submitted 26 November, 2019;
originally announced November 2019.
-
Statistical Analysis of Stationary Solutions of Coupled Nonconvex Nonsmooth Empirical Risk Minimization
Authors:
Zhengling Qi,
Ying Cui,
Yufeng Liu,
Jong-Shi Pang
Abstract:
This paper has two main goals: (a) establish several statistical properties---consistency, asymptotic distributions, and convergence rates---of stationary solutions and values of a class of coupled nonconvex and nonsmoothempirical risk minimization problems, and (b) validate these properties by a noisy amplitude-based phase retrieval problem, the latter being of much topical interest.Derived from…
▽ More
This paper has two main goals: (a) establish several statistical properties---consistency, asymptotic distributions, and convergence rates---of stationary solutions and values of a class of coupled nonconvex and nonsmoothempirical risk minimization problems, and (b) validate these properties by a noisy amplitude-based phase retrieval problem, the latter being of much topical interest.Derived from available data via sampling, these empirical risk minimization problems are the computational workhorse of a population risk model which involves the minimization of an expected value of a random functional. When these minimization problems are nonconvex, the computation of their globally optimal solutions is elusive. Together with the fact that the expectation operator cannot be evaluated for general probability distributions, it becomes necessary to justify whether the stationary solutions of the empirical problems are practical approximations of the stationary solution of the population problem. When these two features, general distribution and nonconvexity, are coupled with nondifferentiability that often renders the problems "non-Clarke regular", the task of the justification becomes challenging. Our work aims to address such a challenge within an algorithm-free setting. The resulting analysis is therefore different from the much of the analysis in the recent literature that is based on local search algorithms. Furthermore, supplementing the classical minimizer-centric analysis, our results offer a first step to close the gap between computational optimization and asymptotic analysis of coupled nonconvex nonsmooth statistical estimation problems, expanding the former with statistical properties of the practically obtained solution and providing the latter with a more practical focus pertaining to computational tractability.
△ Less
Submitted 6 October, 2019;
originally announced October 2019.
-
Tip enhanced IR imaging with sub-10 nm resolution and hypersensitivity
Authors:
Jian Li,
Junghoon Jahng,
Jie Pang,
William Morrison,
** Li,
Eun Seong Lee,
**g-Juan Xu,
Hong-Yuan Chen,
Xing-Hua Xia
Abstract:
IR spectroscopy has been widely used for chemical identification and quantitative analysis of reactions occurring in a specific time and space domains by measuring an average signal of the entire system1. Achieving IR measurements with nanometer-scale spatial resolution is highly desirable to obtain a detailed understanding of the composition, structure and function of interfaces2-5. The challenge…
▽ More
IR spectroscopy has been widely used for chemical identification and quantitative analysis of reactions occurring in a specific time and space domains by measuring an average signal of the entire system1. Achieving IR measurements with nanometer-scale spatial resolution is highly desirable to obtain a detailed understanding of the composition, structure and function of interfaces2-5. The challenges in IR nanoscopy yet exist owing to the small molecular cross section and pristine optical diffraction limit. Although atomic force microscopy (AFM) based techniques, such as scattering-type scanning near-field optical microscopy and photothermal-induced resonance microscopy (PTIR), can acquire IR spectroscopy in a few tens of nanometer scale resolution6-9, IR measurements with monolayer level sensitivity remains elusive and can only be realized under critical conditions10,11. Herein, we demonstrate sub-10 nm spatial resolution sampling a volume of ~360 molecules with a strong field enhancement at the sample-tip junction by implementing noble metal substrates (Au, Ag, Pt) in photo-induced force microscopy (PiFM). This technique shows versatility and robustness of PiFM, and is promising for application in interfacial studies with hypersensitivity and super spatial resolution.
△ Less
Submitted 30 September, 2019;
originally announced September 2019.
-
Deep End-to-End Alignment and Refinement for Time-of-Flight RGB-D Module
Authors:
Di Qiu,
Jiahao Pang,
Wenxiu Sun,
Chengxi Yang
Abstract:
Recently, it is increasingly popular to equip mobile RGB cameras with Time-of-Flight (ToF) sensors for active depth sensing. However, for off-the-shelf ToF sensors, one must tackle two problems in order to obtain high-quality depth with respect to the RGB camera, namely 1) online calibration and alignment; and 2) complicated error correction for ToF depth sensing. In this work, we propose a framew…
▽ More
Recently, it is increasingly popular to equip mobile RGB cameras with Time-of-Flight (ToF) sensors for active depth sensing. However, for off-the-shelf ToF sensors, one must tackle two problems in order to obtain high-quality depth with respect to the RGB camera, namely 1) online calibration and alignment; and 2) complicated error correction for ToF depth sensing. In this work, we propose a framework for jointly alignment and refinement via deep learning. First, a cross-modal optical flow between the RGB image and the ToF amplitude image is estimated for alignment. The aligned depth is then refined via an improved kernel predicting network that performs kernel normalization and applies the bias prior to the dynamic convolution. To enrich our data for end-to-end training, we have also synthesized a dataset using tools from computer graphics. Experimental results demonstrate the effectiveness of our approach, achieving state-of-the-art for ToF refinement.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Estimation of Individualized Decision Rules Based on an Optimized Covariate-Dependent Equivalent of Random Outcomes
Authors:
Zhengling Qi,
Ying Cui,
Yufeng Liu,
Jong-Shi Pang
Abstract:
Recent exploration of optimal individualized decision rules (IDRs) for patients in precision medicine has attracted a lot of attention due to the heterogeneous responses of patients to different treatments. In the existing literature of precision medicine, an optimal IDR is defined as a decision function map** from the patients' covariate space into the treatment space that maximizes the expecte…
▽ More
Recent exploration of optimal individualized decision rules (IDRs) for patients in precision medicine has attracted a lot of attention due to the heterogeneous responses of patients to different treatments. In the existing literature of precision medicine, an optimal IDR is defined as a decision function map** from the patients' covariate space into the treatment space that maximizes the expected outcome of each individual. Motivated by the concept of Optimized Certainty Equivalent (OCE) introduced originally in \cite{ben1986expected} that includes the popular conditional-value-of risk (CVaR) \cite{rockafellar2000optimization}, we propose a decision-rule based optimized covariates dependent equivalent (CDE) for individualized decision making problems. Our proposed IDR-CDE broadens the existing expected-mean outcome framework in precision medicine and enriches the previous concept of the OCE. Numerical experiments demonstrate that our overall approach outperforms existing methods in estimating optimal IDRs under heavy-tail distributions of the data.
△ Less
Submitted 27 August, 2019;
originally announced August 2019.
-
Characterising Probabilistic Alternating Simulation for Concurrent Games
Authors:
Chenyi Zhang,
Jun Pang
Abstract:
Probabilistic game structures combine both nondeterminism and stochasticity, where players repeatedly take actions simultaneously to move to the next state of the concurrent game. Probabilistic alternating simulation is an important tool to compare the behaviour of different probabilistic game structures. In this paper, we present a sound and complete modal characterisation of this simulation rela…
▽ More
Probabilistic game structures combine both nondeterminism and stochasticity, where players repeatedly take actions simultaneously to move to the next state of the concurrent game. Probabilistic alternating simulation is an important tool to compare the behaviour of different probabilistic game structures. In this paper, we present a sound and complete modal characterisation of this simulation relation by proposing a new logic based on probabilistic distributions. The logic enables a player to enforce a property in the next state or distribution. Its extension with fixpoints, which also characterises the simulation relation, can express a lot of interesting properties in practical applications.
△ Less
Submitted 8 July, 2019;
originally announced July 2019.
-
Thermal behaviors of light scalar resonances at low temperatures
Authors:
Rui Gao,
Zhi-Hui Guo,
**-Yi Pang
Abstract:
We study the thermal properties of the lowest multiplet of the QCD light-flavor scalar resonances, including the $f_0(500)/σ$, $K_{0}^{*}(700)/κ$, $f_0(980)$ and $a_0(980)$, in the framework of unitarized $U(3)$ chiral perturbation theory. After the successful fits to the meson-meson scattering inputs, such as the phase shifts and inelasticities, we obtain the unknown parameters and further calcul…
▽ More
We study the thermal properties of the lowest multiplet of the QCD light-flavor scalar resonances, including the $f_0(500)/σ$, $K_{0}^{*}(700)/κ$, $f_0(980)$ and $a_0(980)$, in the framework of unitarized $U(3)$ chiral perturbation theory. After the successful fits to the meson-meson scattering inputs, such as the phase shifts and inelasticities, we obtain the unknown parameters and further calculate the resonance poles and their residues at zero temperature. By including the finite-temperature effects in the unitarized meson-meson scattering amplitudes, the thermal behaviors of the scalar resonance poles in the complex energy plane are studied. The masses of $σ$ and $κ$ are found to considerably decrease when increasing the temperatures, while their widths turn out to be still large when the temperatures reach around $200$ MeV. In contrast, both the masses and widths of the $f_0(980)$ and $a_0(980)$ are only slightly changed.
△ Less
Submitted 3 January, 2020; v1 submitted 3 July, 2019;
originally announced July 2019.
-
Coding for Crowdsourced Classification with XOR Queries
Authors:
James Chin-Jen Pang,
Hessam Mahdavifar,
S. Sandeep Pradhan
Abstract:
This paper models the crowdsourced labeling/classification problem as a sparsely encoded source coding problem, where each query answer, regarded as a code bit, is the XOR of a small number of labels, as source information bits. In this paper we leverage the connections between this problem and well-studied codes with sparse representations for the channel coding problem to provide querying scheme…
▽ More
This paper models the crowdsourced labeling/classification problem as a sparsely encoded source coding problem, where each query answer, regarded as a code bit, is the XOR of a small number of labels, as source information bits. In this paper we leverage the connections between this problem and well-studied codes with sparse representations for the channel coding problem to provide querying schemes with almost optimal number of queries, each of which involving only a constant number of labels. We also extend this scenario to the case where some workers can be unresponsive. For this case, we propose querying schemes where each query involves only log n items, where n is the total number of items to be labeled. Furthermore, we consider classification of two correlated labeling systems and provide two-stage querying schemes with almost optimal number of queries each involving a constant number of labels.
△ Less
Submitted 31 January, 2020; v1 submitted 25 June, 2019;
originally announced June 2019.
-
MMDetection: Open MMLab Detection Toolbox and Benchmark
Authors:
Kai Chen,
Jiaqi Wang,
Jiangmiao Pang,
Yuhang Cao,
Yu Xiong,
Xiaoxiao Li,
Shuyang Sun,
Wansen Feng,
Ziwei Liu,
Jiarui Xu,
Zheng Zhang,
Dazhi Cheng,
Chenchen Zhu,
Tianheng Cheng,
Qijie Zhao,
Buyu Li,
Xin Lu,
Rui Zhu,
Yue Wu,
Jifeng Dai,
**gdong Wang,
Jian** Shi,
Wanli Ouyang,
Chen Change Loy,
Dahua Lin
Abstract:
We present MMDetection, an object detection toolbox that contains a rich set of object detection and instance segmentation methods as well as related components and modules. The toolbox started from a codebase of MMDet team who won the detection track of COCO Challenge 2018. It gradually evolves into a unified platform that covers many popular detection methods and contemporary modules. It not onl…
▽ More
We present MMDetection, an object detection toolbox that contains a rich set of object detection and instance segmentation methods as well as related components and modules. The toolbox started from a codebase of MMDet team who won the detection track of COCO Challenge 2018. It gradually evolves into a unified platform that covers many popular detection methods and contemporary modules. It not only includes training and inference codes, but also provides weights for more than 200 network models. We believe this toolbox is by far the most complete detection toolbox. In this paper, we introduce the various features of this toolbox. In addition, we also conduct a benchmarking study on different methods, components, and their hyper-parameters. We wish that the toolbox and benchmark could serve the growing research community by providing a flexible toolkit to reimplement existing methods and develop their own new detectors. Code and models are available at https://github.com/open-mmlab/mmdetection. The project is under active development and we will keep this document updated.
△ Less
Submitted 17 June, 2019;
originally announced June 2019.
-
Clustering by Orthogonal NMF Model and Non-Convex Penalty Optimization
Authors:
Shuai Wang,
Tsung-Hui Chang,
Ying Cui,
Jong-Shi Pang
Abstract:
The non-negative matrix factorization (NMF) model with an additional orthogonality constraint on one of the factor matrices, called the orthogonal NMF (ONMF), has been found a promising clustering model and can outperform the classical K-means. However, solving the ONMF model is a challenging optimization problem because the coupling of the orthogonality and non-negativity constraints introduces a…
▽ More
The non-negative matrix factorization (NMF) model with an additional orthogonality constraint on one of the factor matrices, called the orthogonal NMF (ONMF), has been found a promising clustering model and can outperform the classical K-means. However, solving the ONMF model is a challenging optimization problem because the coupling of the orthogonality and non-negativity constraints introduces a mixed combinatorial aspect into the problem due to the determination of the correct status of the variables (positive or zero). Most of the existing methods directly deal with the orthogonality constraint in its original form via various optimization techniques, but are not scalable for large-scale problems. In this paper, we propose a new ONMF based clustering formulation that equivalently transforms the orthogonality constraint into a set of norm-based non-convex equality constraints. We then apply a non-convex penalty (NCP) approach to add them to the objective as penalty terms, leading to a problem that is efficiently solvable. One smooth penalty formulation and one non-smooth penalty formulation are respectively studied. We build theoretical conditions for the penalized problems to provide feasible stationary solutions to the ONMF based clustering problem, as well as proposing efficient algorithms for solving the penalized problems of the two NCP methods. Experimental results based on both synthetic and real datasets are presented to show that the proposed NCP methods are computationally time efficient, and either match or outperform the existing K-means and ONMF based methods in terms of the clustering performance.
△ Less
Submitted 28 July, 2021; v1 submitted 3 June, 2019;
originally announced June 2019.
-
The Operator Product Expansions in the ${\cal N}=4$ Orthogonal Wolf Space Coset Model
Authors:
Changhyun Ahn,
Man Hea Kim,
**sub Paeng
Abstract:
Some of the operator product expansions (OPEs) between the lowest $SO(4)$ singlet higher spin-$2$ multiplet of spins $(2, \frac{5}{2}, \frac{5}{2}, \frac{5}{2}, \frac{5}{2}, 3, 3, 3, 3, 3, 3, \frac{7}{2}, \frac{7}{2}, \frac{7}{2}, \frac{7}{2}, 4)$ in an extension of the large ${\cal N}=4$ (non)linear superconformal algebra were constructed in the ${\cal N}=4$ superconformal coset…
▽ More
Some of the operator product expansions (OPEs) between the lowest $SO(4)$ singlet higher spin-$2$ multiplet of spins $(2, \frac{5}{2}, \frac{5}{2}, \frac{5}{2}, \frac{5}{2}, 3, 3, 3, 3, 3, 3, \frac{7}{2}, \frac{7}{2}, \frac{7}{2}, \frac{7}{2}, 4)$ in an extension of the large ${\cal N}=4$ (non)linear superconformal algebra were constructed in the ${\cal N}=4$ superconformal coset $\frac{SO(N+4)}{SO(N) \times SO(4)}$ theory with $N=4$ previously. In this paper, by rewriting the above OPEs with $N=5$, the remaining undetermined OPEs are completely determined. There exist additional $SO(4)$ singlet higher spin-$2$ multiplet, six $SO(4)$ adjoint higher spin-$3$ multiplets, four $SO(4)$ vector higher spin-$\frac{7}{2}$ multiplets, $SO(4)$ singlet higher spin-$4$ multiplet and four $SO(4)$ vector higher spin-$\frac{9}{2}$ multiplets in the right hand side of these OPEs. Furthermore, by introducing the arbitrary coefficients in front of the composite fields in the right hand sides of the above complete 136 OPEs, the complete structures of the above OPEs are obtained by using various Jacobi identities for generic $N$. Finally, we describe them as one single ${\cal N}=4$ super OPE between the above lowest $SO(4)$ singlet higher spin-$2$ multiplet in the ${\cal N}=4$ superspace.
△ Less
Submitted 15 May, 2019; v1 submitted 15 April, 2019;
originally announced April 2019.
-
Libra R-CNN: Towards Balanced Learning for Object Detection
Authors:
Jiangmiao Pang,
Kai Chen,
Jian** Shi,
Huajun Feng,
Wanli Ouyang,
Dahua Lin
Abstract:
Compared with model architectures, the training process, which is also crucial to the success of detectors, has received relatively less attention in object detection. In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels - sample…
▽ More
Compared with model architectures, the training process, which is also crucial to the success of detectors, has received relatively less attention in object detection. In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels - sample level, feature level, and objective level. To mitigate the adverse effects caused thereby, we propose Libra R-CNN, a simple but effective framework towards balanced learning for object detection. It integrates three novel components: IoU-balanced sampling, balanced feature pyramid, and balanced L1 loss, respectively for reducing the imbalance at sample, feature, and objective level. Benefitted from the overall balanced design, Libra R-CNN significantly improves the detection performance. Without bells and whistles, it achieves 2.5 points and 2.0 points higher Average Precision (AP) than FPN Faster R-CNN and RetinaNet respectively on MSCOCO.
△ Less
Submitted 4 April, 2019;
originally announced April 2019.
-
Online Observability of Boolean Control Networks
Authors:
Guisen Wu,
Liyun Dai,
Zhiming Liu,
Taolue Chen,
Jun Pang
Abstract:
Observabililty is an important topic of Boolean control networks (BCNs). In this paper, we propose a new type of observability named online observability to present the sufficient and necessary condition of determining the initial states of BCNs, when their initial states cannot be reset. And we design an algorithm to decide whether a BCN has the online observability. Moreover, we prove that a BCN…
▽ More
Observabililty is an important topic of Boolean control networks (BCNs). In this paper, we propose a new type of observability named online observability to present the sufficient and necessary condition of determining the initial states of BCNs, when their initial states cannot be reset. And we design an algorithm to decide whether a BCN has the online observability. Moreover, we prove that a BCN is identifiable iff it satisfies controllability and the online observability, which reveals the essence of identification problem of BCNs.
△ Less
Submitted 5 December, 2020; v1 submitted 18 March, 2019;
originally announced March 2019.
-
Transparency and Control in Platforms for Networked Markets
Authors:
John Pang,
Weixuan Lin,
Hu Fu,
Jack Kleeman,
Eilyan Bitar,
Adam Wierman
Abstract:
In this paper, we analyze the worst case efficiency loss of online platform designs under a networked Cournot competition model. Inspired by some of the largest platforms in operation today, the platform designs that we consider examine the trade-off between transparency and control. Our results show that open access designs incentivize increased production towards perfectly competitive levels and…
▽ More
In this paper, we analyze the worst case efficiency loss of online platform designs under a networked Cournot competition model. Inspired by some of the largest platforms in operation today, the platform designs that we consider examine the trade-off between transparency and control. Our results show that open access designs incentivize increased production towards perfectly competitive levels and limit efficiency loss, while controlled allocation designs lead to producer-platform incentive misalignment, resulting in low participation and unbounded efficiency loss. We also show that discriminatory access designs balance transparency and control, achieving the best of both worlds by maintaining high participation rates while limiting efficiency loss.
△ Less
Submitted 29 September, 2020; v1 submitted 11 March, 2019;
originally announced March 2019.
-
On Robustness of Individualized Decision Rules
Authors:
Zhengling Qi,
Jong-Shi Pang,
Yufeng Liu
Abstract:
With the emergence of precision medicine, estimating optimal individualized decision rules (IDRs) has attracted tremendous attention in many scientific areas. Most existing literature has focused on finding optimal IDRs that can maximize the expected outcome for each individual. Motivated by complex individualized decision making procedures and the popular conditional value at risk (CVaR) measure,…
▽ More
With the emergence of precision medicine, estimating optimal individualized decision rules (IDRs) has attracted tremendous attention in many scientific areas. Most existing literature has focused on finding optimal IDRs that can maximize the expected outcome for each individual. Motivated by complex individualized decision making procedures and the popular conditional value at risk (CVaR) measure, we propose a new robust criterion to estimate optimal IDRs in order to control the average lower tail of the individuals' outcomes. In addition to improving the individualized expected outcome, our proposed criterion takes risks into consideration, and thus the resulting IDRs can prevent adverse events. The optimal IDR under our criterion can be interpreted as the decision rule that maximizes the ``worst-case" scenario of the individualized outcome when the underlying distribution is perturbed within a constrained set. An efficient non-convex optimization algorithm is proposed with convergence guarantees. We investigate theoretical properties for our estimated optimal IDRs under the proposed criterion such as consistency and finite sample error bounds. Simulation studies and a real data application are used to further demonstrate the robust performance of our methods. Several extensions of the proposed method are also discussed.
△ Less
Submitted 26 June, 2022; v1 submitted 11 March, 2019;
originally announced March 2019.
-
R$^2$-CNN: Fast Tiny Object Detection in Large-Scale Remote Sensing Images
Authors:
Jiangmiao Pang,
Cong Li,
Jian** Shi,
Zhihai Xu,
Huajun Feng
Abstract:
Recently, the convolutional neural network has brought impressive improvements for object detection. However, detecting tiny objects in large-scale remote sensing images still remains challenging. First, the extreme large input size makes the existing object detection solutions too slow for practical use. Second, the massive and complex backgrounds cause serious false alarms. Moreover, the ultrati…
▽ More
Recently, the convolutional neural network has brought impressive improvements for object detection. However, detecting tiny objects in large-scale remote sensing images still remains challenging. First, the extreme large input size makes the existing object detection solutions too slow for practical use. Second, the massive and complex backgrounds cause serious false alarms. Moreover, the ultratiny objects increase the difficulty of accurate detection. To tackle these problems, we propose a unified and self-reinforced network called remote sensing region-based convolutional neural network ($\mathcal{R}^2$-CNN), composing of backbone Tiny-Net, intermediate global attention block, and final classifier and detector. Tiny-Net is a lightweight residual structure, which enables fast and powerful features extraction from inputs. Global attention block is built upon Tiny-Net to inhibit false positives. Classifier is then used to predict the existence of targets in each patch, and detector is followed to locate them accurately if available. The classifier and detector are mutually reinforced with end-to-end training, which further speed up the process and avoid false alarms. Effectiveness of $\mathcal{R}^2$-CNN is validated on hundreds of GF-1 images and GF-2 images that are 18 000 $\times$ 18 192 pixels, 2.0-m resolution, and 27 620 $\times$ 29 200 pixels, 0.8-m resolution, respectively. Specifically, we can process a GF-1 image in 29.4 s on Titian X just with single thread. According to our knowledge, no previous solution can detect the tiny object on such huge remote sensing images gracefully. We believe that it is a significant step toward practical real-time remote sensing systems.
△ Less
Submitted 30 March, 2019; v1 submitted 15 February, 2019;
originally announced February 2019.
-
A Supersymmetric Enhancement of ${\cal N}=1$ Holographic Minimal Model
Authors:
Changhyun Ahn,
**sub Paeng
Abstract:
By studying the ${\cal N}=1$ holographic minimal model at the "critical" level, we obtain the lowest ${\cal N}=2$ higher spin multiplet of spins $(\frac{3}{2}, 2, 2, \frac{5}{2})$ in terms of two adjoint fermion types for generic $N$. We subsequently determine operator product expansions between the lowest and second lowest (${\cal N}=2$) higher spin multiplet of spins…
▽ More
By studying the ${\cal N}=1$ holographic minimal model at the "critical" level, we obtain the lowest ${\cal N}=2$ higher spin multiplet of spins $(\frac{3}{2}, 2, 2, \frac{5}{2})$ in terms of two adjoint fermion types for generic $N$. We subsequently determine operator product expansions between the lowest and second lowest (${\cal N}=2$) higher spin multiplet of spins $(3, \frac{7}{2}, \frac{7}{2}, 4)$, and the corresponding Vasiliev's oscillator formalism with matrix generalization on $AdS_3$ higher spin theory in the extension of $OSp(2|2)$ superconformal algebra. Under the large $N$ limit (equivalent to large central charge) in the extension of ${\cal N}=2$ superconformal algebra in two dimensions, operator product expansions provide asymptotic symmetry algebra in $AdS_3$ higher spin theory.
△ Less
Submitted 23 May, 2019; v1 submitted 10 February, 2019;
originally announced February 2019.
-
Energy shift of the three-particle system in a finite volume
Authors:
**-Yi Pang,
Jia-Jun Wu,
H. -W. Hammer,
Ulf-G. Meißner,
Akaki Rusetsky
Abstract:
Using the three-particle quantization condition recently obtained in the particle-dimer framework, the finite-volume energy shift of the two lowest three-particle scattering states is derived up to and including order $L^{-6}$. Furthermore, assuming that a stable dimer exists in the infinite volume, the shift for the lowest particle-dimer scattering state is obtained up to and including order…
▽ More
Using the three-particle quantization condition recently obtained in the particle-dimer framework, the finite-volume energy shift of the two lowest three-particle scattering states is derived up to and including order $L^{-6}$. Furthermore, assuming that a stable dimer exists in the infinite volume, the shift for the lowest particle-dimer scattering state is obtained up to and including order $L^{-3}$. The result for the lowest three-particle state agrees with the results from the literature, and the result for the lowest particle-dimer state reproduces the one obtained by using the Luescher equation.
△ Less
Submitted 9 August, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Competitive Online Optimization under Inventory Constraints
Authors:
Qiulin Lin,
Hanling Yi,
John Pang,
Minghua Chen,
Adam Wierman,
Michael Honig,
Yuanzhang Xiao
Abstract:
This paper studies online optimization under inventory (budget) constraints. While online optimization is a well-studied topic, versions with inventory constraints have proven difficult. We consider a formulation of inventory-constrained optimization that is a generalization of the classic one-way trading problem and has a wide range of applications. We present a new algorithmic framework, \textsf…
▽ More
This paper studies online optimization under inventory (budget) constraints. While online optimization is a well-studied topic, versions with inventory constraints have proven difficult. We consider a formulation of inventory-constrained optimization that is a generalization of the classic one-way trading problem and has a wide range of applications. We present a new algorithmic framework, \textsf{CR-Pursuit}, and prove that it achieves the minimal competitive ratio among all deterministic algorithms (up to a problem-dependent constant factor) for inventory-constrained online optimization. Our algorithm and its analysis not only simplify and unify the state-of-the-art results for the standard one-way trading problem, but they also establish novel bounds for generalizations including concave revenue functions. For example, for one-way trading with price elasticity, the \textsf{CR-Pursuit} algorithm achieves a competitive ratio that is within a small additive constant (i.e., 1/3) to the lower bound of $\ln θ+1$, where $θ$ is the ratio between the maximum and minimum base prices.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.
-
Hybrid Task Cascade for Instance Segmentation
Authors:
Kai Chen,
Jiangmiao Pang,
Jiaqi Wang,
Yu Xiong,
Xiaoxiao Li,
Shuyang Sun,
Wansen Feng,
Ziwei Liu,
Jian** Shi,
Wanli Ouyang,
Chen Change Loy,
Dahua Lin
Abstract:
Cascade is a classic yet powerful architecture that has boosted performance on various tasks. However, how to introduce cascade to instance segmentation remains an open question. A simple combination of Cascade R-CNN and Mask R-CNN only brings limited gain. In exploring a more effective approach, we find that the key to a successful instance segmentation cascade is to fully leverage the reciprocal…
▽ More
Cascade is a classic yet powerful architecture that has boosted performance on various tasks. However, how to introduce cascade to instance segmentation remains an open question. A simple combination of Cascade R-CNN and Mask R-CNN only brings limited gain. In exploring a more effective approach, we find that the key to a successful instance segmentation cascade is to fully leverage the reciprocal relationship between detection and segmentation. In this work, we propose a new framework, Hybrid Task Cascade (HTC), which differs in two important aspects: (1) instead of performing cascaded refinement on these two tasks separately, it interweaves them for a joint multi-stage processing; (2) it adopts a fully convolutional branch to provide spatial context, which can help distinguishing hard foreground from cluttered background. Overall, this framework can learn more discriminative features progressively while integrating complementary features together in each stage. Without bells and whistles, a single HTC obtains 38.4 and 1.5 improvement over a strong Cascade Mask R-CNN baseline on MSCOCO dataset. Moreover, our overall system achieves 48.6 mask AP on the test-challenge split, ranking 1st in the COCO 2018 Challenge Object Detection Task. Code is available at: https://github.com/open-mmlab/mmdetection.
△ Less
Submitted 9 April, 2019; v1 submitted 22 January, 2019;
originally announced January 2019.
-
FishNet: A Versatile Backbone for Image, Region, and Pixel Level Prediction
Authors:
Shuyang Sun,
Jiangmiao Pang,
Jian** Shi,
Shuai Yi,
Wanli Ouyang
Abstract:
The basic principles in designing convolutional neural network (CNN) structures for predicting objects on different levels, e.g., image-level, region-level, and pixel-level are diverging. Generally, network structures designed specifically for image classification are directly used as default backbone structure for other tasks including detection and segmentation, but there is seldom backbone stru…
▽ More
The basic principles in designing convolutional neural network (CNN) structures for predicting objects on different levels, e.g., image-level, region-level, and pixel-level are diverging. Generally, network structures designed specifically for image classification are directly used as default backbone structure for other tasks including detection and segmentation, but there is seldom backbone structure designed under the consideration of unifying the advantages of networks designed for pixel-level or region-level predicting tasks, which may require very deep features with high resolution. Towards this goal, we design a fish-like network, called FishNet. In FishNet, the information of all resolutions is preserved and refined for the final task. Besides, we observe that existing works still cannot \emph{directly} propagate the gradient information from deep layers to shallow layers. Our design can better handle this problem. Extensive experiments have been conducted to demonstrate the remarkable performance of the FishNet. In particular, on ImageNet-1k, the accuracy of FishNet is able to surpass the performance of DenseNet and ResNet with fewer parameters. FishNet was applied as one of the modules in the winning entry of the COCO Detection 2018 challenge. The code is available at https://github.com/kevin-ssy/FishNet.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
A Unifying Framework of High-Dimensional Sparse Estimation with Difference-of-Convex (DC) Regularizations
Authors:
Shanshan Cao,
Xiaoming Huo,
Jong-Shi Pang
Abstract:
Under the linear regression framework, we study the variable selection problem when the underlying model is assumed to have a small number of nonzero coefficients (i.e., the underlying linear model is sparse). Non-convex penalties in specific forms are well-studied in the literature for sparse estimation. A recent work \cite{ahn2016difference} has pointed out that nearly all existing non-convex pe…
▽ More
Under the linear regression framework, we study the variable selection problem when the underlying model is assumed to have a small number of nonzero coefficients (i.e., the underlying linear model is sparse). Non-convex penalties in specific forms are well-studied in the literature for sparse estimation. A recent work \cite{ahn2016difference} has pointed out that nearly all existing non-convex penalties can be represented as difference-of-convex (DC) functions, which can be expressed as the difference of two convex functions, while itself may not be convex. There is a large existing literature on the optimization problems when their objectives and/or constraints involve DC functions. Efficient numerical solutions have been proposed. Under the DC framework, directional-stationary (d-stationary) solutions are considered, and they are usually not unique. In this paper, we show that under some mild conditions, a certain subset of d-stationary solutions in an optimization problem (with a DC objective) has some ideal statistical properties: namely, asymptotic estimation consistency, asymptotic model selection consistency, asymptotic efficiency. The aforementioned properties are the ones that have been proven by many researchers for a range of proposed non-convex penalties in the sparse estimation. Our assumptions are either weaker than or comparable with those conditions that have been adopted in other existing works. This work shows that DC is a nice framework to offer a unified approach to these existing work where non-convex penalty is involved. Our work bridges the communities of optimization and statistics.
△ Less
Submitted 17 December, 2018;
originally announced December 2018.
-
Linear convergence of distributed Dykstra's algorithm for sets under an intersection property
Authors:
C. H. Jeffrey Pang
Abstract:
We show the linear convergence of Dykstra's algorithm for sets intersecting in a manner slightly stronger than the usual constraint qualifications.
We show the linear convergence of Dykstra's algorithm for sets intersecting in a manner slightly stronger than the usual constraint qualifications.
△ Less
Submitted 21 February, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Linear convergence of a dual optimization formulation for distributed optimization on directed graphs with unreliable communications
Authors:
C. H. Jeffrey Pang
Abstract:
This work builds on our recent work on a distributed optimization algorithm for graphs with directed unreliable communications. We show its linear convergence when we take either the proximal of each function or an affine minorant for when the function is smooth.
This work builds on our recent work on a distributed optimization algorithm for graphs with directed unreliable communications. We show its linear convergence when we take either the proximal of each function or an affine minorant for when the function is smooth.
△ Less
Submitted 27 November, 2018;
originally announced November 2018.
-
Exact Penalization of Generalized Nash Equilibrium Problems
Authors:
Qin Ba,
Jong-Shi Pang
Abstract:
This paper presents an exact penalization theory of the generalized Nash equilibrium problem (GNEP) that has its origin from the renowned Arrow-Debreu general economic equilibrium model. While the latter model is the foundation of much of mathematical economics, the GNEP provides a mathematical model of multi-agent non-cooperative competition that has found many contemporary applications in divers…
▽ More
This paper presents an exact penalization theory of the generalized Nash equilibrium problem (GNEP) that has its origin from the renowned Arrow-Debreu general economic equilibrium model. While the latter model is the foundation of much of mathematical economics, the GNEP provides a mathematical model of multi-agent non-cooperative competition that has found many contemporary applications in diverse engineering domains. The most salient feature of the GNEP that distinguishes it from a standard non-cooperative (Nash) game is that each player's optimization problem contains constraints that couple all players' decision variables. Extending results for stand-alone optimization problems, the penalization theory aims to convert the GNEP into a game of the standard kind without the coupled constraints, which is known to be more readily amenable to solution methods and analysis. Starting with an illustrative example to motivate the development, the paper focuses on two kinds of coupled constraints, shared (i.e., common) and finitely representable. Constraint residual functions and the associated error bound theory play an important role throughout the development.
△ Less
Submitted 1 December, 2018; v1 submitted 26 November, 2018;
originally announced November 2018.
-
Multimodal Machine Learning for Automated ICD Coding
Authors:
Keyang Xu,
Mike Lam,
**gzhi Pang,
Xin Gao,
Charlotte Band,
Piyush Mathur,
Frank Papay,
Ashish K. Khanna,
Jacek B. Cywinski,
Kamal Maheshwari,
Pengtao Xie,
Eric Xing
Abstract:
This study presents a multimodal machine learning model to predict ICD-10 diagnostic codes. We developed separate machine learning models that can handle data from different modalities, including unstructured text, semi-structured text and structured tabular data. We further employed an ensemble method to integrate all modality-specific models to generate ICD-10 codes. Key evidence was also extrac…
▽ More
This study presents a multimodal machine learning model to predict ICD-10 diagnostic codes. We developed separate machine learning models that can handle data from different modalities, including unstructured text, semi-structured text and structured tabular data. We further employed an ensemble method to integrate all modality-specific models to generate ICD-10 codes. Key evidence was also extracted to make our prediction more convincing and explainable. We used the Medical Information Mart for Intensive Care III (MIMIC -III) dataset to validate our approach. For ICD code prediction, our best-performing model (micro-F1 = 0.7633, micro-AUC = 0.9541) significantly outperforms other baseline models including TF-IDF (micro-F1 = 0.6721, micro-AUC = 0.7879) and Text-CNN model (micro-F1 = 0.6569, micro-AUC = 0.9235). For interpretability, our approach achieves a Jaccard Similarity Coefficient (JSC) of 0.1806 on text data and 0.3105 on tabular data, where well-trained physicians achieve 0.2780 and 0.5002 respectively.
△ Less
Submitted 1 September, 2022; v1 submitted 31 October, 2018;
originally announced October 2018.
-
The chiral vortical effect in Wigner function approach
Authors:
Jian-hua Gao,
**-yi Pang,
Qun Wang
Abstract:
It is more subtle to obtain the chiral vortical effect (CVE) than chiral magnetic effect (CME) in quantum transport approach. To investigate the subtlty of the CVE we present two different derivation in the Wigner function approach. The first one is based on the method in our previous work \cite{Gao:2012ix} in which the CVE was derived under static-equilibrium conditions without details. We provid…
▽ More
It is more subtle to obtain the chiral vortical effect (CVE) than chiral magnetic effect (CME) in quantum transport approach. To investigate the subtlty of the CVE we present two different derivation in the Wigner function approach. The first one is based on the method in our previous work \cite{Gao:2012ix} in which the CVE was derived under static-equilibrium conditions without details. We provide a detailed derivation using a more transparent and powerful method, which can be easily generalized to higher order calculation. In this derivation of the CVE current, there is an explicit Lorentz covariance. The second derivation is based on a more general chiral kinetic theory in a semi-classical expansion of the Wigner function without assuming static-equilibrium conditions \cite{Gao:2018wmr}. In this derivation, there is a freedom to choose a reference frame for the CVE current, so the explicit Lorentz covariance seems to be lost. Howerver, under static-equilibrium conditions, we show that the CVE current in this derivation can be decomposed into two parts, identified as the normal and magnetization current. Each part depends on the reference frame, but the sum of two parts does give the total CVE current which is independent of the reference frame. In the comoving frame of the fluid, it can be shown that the normal and magnetization current give one-third and two-thirds of the total CVE current respectively. This gives a natural solution to the 'one-third' puzzle in the CVE current in three-dimensional version of the chiral kinetic theory in the literature.
△ Less
Submitted 16 June, 2019; v1 submitted 3 October, 2018;
originally announced October 2018.
-
DSR: Direct Self-rectification for Uncalibrated Dual-lens Cameras
Authors:
Ruichao Xiao,
Wenxiu Sun,
Jiahao Pang,
Qiong Yan,
Jimmy Ren
Abstract:
With the developments of dual-lens camera modules,depth information representing the third dimension of thecaptured scenes becomes available for smartphones. It isestimated by stereo matching algorithms, taking as input thetwo views captured by dual-lens cameras at slightly differ-ent viewpoints. Depth-of-field rendering (also be referred toas synthetic defocus or bokeh) is one of the trending dep…
▽ More
With the developments of dual-lens camera modules,depth information representing the third dimension of thecaptured scenes becomes available for smartphones. It isestimated by stereo matching algorithms, taking as input thetwo views captured by dual-lens cameras at slightly differ-ent viewpoints. Depth-of-field rendering (also be referred toas synthetic defocus or bokeh) is one of the trending depth-based applications. However, to achieve fast depth estima-tion on smartphones, the stereo pairs need to be rectified inthe first place. In this paper, we propose a cost-effective so-lution to perform stereo rectification for dual-lens camerascalled direct self-rectification, short for DSR1. It removesthe need of individual offline calibration for every pair ofdual-lens cameras. In addition, the proposed solution isrobust to the slight movements, e.g., due to collisions, ofthe dual-lens cameras after fabrication. Different with ex-isting self-rectification approaches, our approach computesthe homography in a novel way with zero geometric distor-tions introduced to the master image. It is achieved by di-rectly minimizing the vertical displacements of correspond-ing points between the original master image and the trans-formed slave image. Our method is evaluated on both real-istic and synthetic stereo image pairs, and produces supe-rior results compared to the calibrated rectification or otherself-rectification approaches
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
A dual ascent algorithm for asynchronous distributed optimization with unreliable directed communications
Authors:
C. H. Jeffrey Pang
Abstract:
We show that the averaged consensus algorithm on directed graphs with unreliable communications by Bof-Carli-Schenato has a dual optimization interpretation, which could be extended to the case of distributed optimization. We report on our numerical simulations for the distributed optimization algorithm for smooth and nonsmooth functions.
We show that the averaged consensus algorithm on directed graphs with unreliable communications by Bof-Carli-Schenato has a dual optimization interpretation, which could be extended to the case of distributed optimization. We report on our numerical simulations for the distributed optimization algorithm for smooth and nonsmooth functions.
△ Less
Submitted 21 February, 2019; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Convergence rate of distributed Dykstra's algorithm with sets defined as level sets of convex functions
Authors:
C. H. Jeffrey Pang
Abstract:
We investigate the convergence rate of the distributed Dykstra's algorithm when some of the sets are defined as the level sets of convex functions. We carry out numerical experiments to compare with the theoretical results obtained.
We investigate the convergence rate of the distributed Dykstra's algorithm when some of the sets are defined as the level sets of convex functions. We carry out numerical experiments to compare with the theoretical results obtained.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
Formal Analysis of an E-Health Protocol
Authors:
Naipeng Dong,
Hugo Jonker,
Jun Pang
Abstract:
Given the sensitive nature of health data, security and privacy in e-health systems is of prime importance. It is crucial that an e-health system must ensure that users remain private - even if they are bribed or coerced to reveal themselves, or others: a pharmaceutical company could, for example, bribe a pharmacist to reveal information which breaks a doctor's privacy. In this paper, we first ide…
▽ More
Given the sensitive nature of health data, security and privacy in e-health systems is of prime importance. It is crucial that an e-health system must ensure that users remain private - even if they are bribed or coerced to reveal themselves, or others: a pharmaceutical company could, for example, bribe a pharmacist to reveal information which breaks a doctor's privacy. In this paper, we first identify and formalise several new but important privacy properties on enforcing doctor privacy. Then we analyse the security and privacy of a complicated and practical e-health protocol (DLV08). Our analysis uncovers ambiguities in the protocol, and shows to what extent these new privacy properties as well as other security properties (such as secrecy and authentication) and privacy properties (such as anonymity and untraceability) are satisfied by the protocol. Finally, we address the found ambiguities which result in both security and privacy flaws, and propose suggestions for fixing them.
△ Less
Submitted 25 August, 2018;
originally announced August 2018.
-
Deep Graph Laplacian Regularization for Robust Denoising of Real Images
Authors:
** Zeng,
Jiahao Pang,
Wenxiu Sun,
Gene Cheung
Abstract:
Recent developments in deep learning have revolutionized the paradigm of image restoration. However, its applications on real image denoising are still limited, due to its sensitivity to training data and the complex nature of real image noise. In this work, we combine the robustness merit of model-based approaches and the learning power of data-driven approaches for real image denoising. Specific…
▽ More
Recent developments in deep learning have revolutionized the paradigm of image restoration. However, its applications on real image denoising are still limited, due to its sensitivity to training data and the complex nature of real image noise. In this work, we combine the robustness merit of model-based approaches and the learning power of data-driven approaches for real image denoising. Specifically, by integrating graph Laplacian regularization as a trainable module into a deep learning framework, we are less susceptible to overfitting than pure CNN-based approaches, achieving higher robustness to small datasets and cross-domain denoising. First, a sparse neighborhood graph is built from the output of a convolutional neural network (CNN). Then the image is restored by solving an unconstrained quadratic programming problem, using a corresponding graph Laplacian regularizer as a prior term. The proposed restoration pipeline is fully differentiable and hence can be end-to-end trained. Experimental results demonstrate that our work is less prone to overfitting given small training data. It is also endowed with strong cross-domain generalization power, outperforming the state-of-the-art approaches by a remarkable margin.
△ Less
Submitted 3 May, 2019; v1 submitted 30 July, 2018;
originally announced July 2018.
-
Linear and sublinear convergence rates for a subdifferentiable distributed deterministic asynchronous Dykstra's algorithm
Authors:
C. H. Jeffrey Pang
Abstract:
In two earlier papers, we designed a distributed deterministic asynchronous algorithm for minimizing the sum of subdifferentiable and proximable functions and a regularizing quadratic on time-varying graphs based on Dykstra's algorithm, or block coordinate dual ascent. Each node in the distributed optimization problem is the sum of a known regularizing quadratic and a function to be minimized. In…
▽ More
In two earlier papers, we designed a distributed deterministic asynchronous algorithm for minimizing the sum of subdifferentiable and proximable functions and a regularizing quadratic on time-varying graphs based on Dykstra's algorithm, or block coordinate dual ascent. Each node in the distributed optimization problem is the sum of a known regularizing quadratic and a function to be minimized. In this paper, we prove sublinear convergence rates for the general algorithm, and a linear rate of convergence if the function on each node is smooth with Lipschitz gradient.
△ Less
Submitted 21 August, 2018; v1 submitted 29 June, 2018;
originally announced July 2018.
-
Towards the Existential Control of Boolean Networks: A Preliminary Report (Extended Abstract)
Authors:
Soumya Paul,
Jun Pang,
Cui Su
Abstract:
Given a Boolean network BN and a subset A of attractors of BN, we study the problem of identifying a minimal subset C of vertices of BN, such that the dynamics of BN can reach from a state s in any attractor As in A to any attractor At in A by controlling or toggling a subset of vertices in C in a single time step. We describe a method based on the decomposition of the network structure into stron…
▽ More
Given a Boolean network BN and a subset A of attractors of BN, we study the problem of identifying a minimal subset C of vertices of BN, such that the dynamics of BN can reach from a state s in any attractor As in A to any attractor At in A by controlling or toggling a subset of vertices in C in a single time step. We describe a method based on the decomposition of the network structure into strongly connected components called blocks. The control subset can be locally computed for each such block and the results then merged to derive the global control subset C. This potentially improves the efficiency for many real-life networks that are large but modular and well-structured. We are currently in the process of implementing our method in software.
△ Less
Submitted 27 June, 2018;
originally announced June 2018.
-
Subdifferentiable functions and partial data communication in a distributed deterministic asynchronous Dykstra's algorithm
Authors:
C. H. Jeffrey Pang
Abstract:
We described a decentralized distributed deterministic asynchronous Dykstra's algorithm that allows for time-varying graphs in an earlier paper. In this paper, we show how to incorporate subdifferentiable functions into the framework using a step similar to the bundle method. We point out that our algorithm also allows for partial data communications. We discuss a standard step for treating the co…
▽ More
We described a decentralized distributed deterministic asynchronous Dykstra's algorithm that allows for time-varying graphs in an earlier paper. In this paper, we show how to incorporate subdifferentiable functions into the framework using a step similar to the bundle method. We point out that our algorithm also allows for partial data communications. We discuss a standard step for treating the composition of a convex and linear function.
△ Less
Submitted 21 August, 2018; v1 submitted 20 June, 2018;
originally announced June 2018.
-
Distributed deterministic asynchronous algorithms in time-varying graphs through Dykstra splitting
Authors:
C. H. Jeffrey Pang
Abstract:
Consider the setting where each vertex of a graph has a function, and communications can only occur between vertices connected by an edge. We wish to minimize the sum of these functions. For the case when each function is the sum of a strongly convex quadratic and a convex function, we propose a distributed version of Dykstra's algorithm. The computations to optimize the dual objective function ca…
▽ More
Consider the setting where each vertex of a graph has a function, and communications can only occur between vertices connected by an edge. We wish to minimize the sum of these functions. For the case when each function is the sum of a strongly convex quadratic and a convex function, we propose a distributed version of Dykstra's algorithm. The computations to optimize the dual objective function can run asynchronously without a global clock, and in a distributed manner without a central controller. Convergence to the primal minimizer is deterministic instead of being probabilistic, and is guaranteed as long as in each cycle, the edges where two-way communications occur connects all vertices. We also look at an accelerated algorithm, and an algorithm for the case when the functions on the nodes are not strongly convex.
△ Less
Submitted 27 November, 2018; v1 submitted 30 April, 2018;
originally announced April 2018.