-
Differentially Private Graph Diffusion with Applications in Personalized PageRanks
Authors:
Rongzhe Wei,
Eli Chien,
Pan Li
Abstract:
Graph diffusion, which iteratively propagates real-valued substances among the graph, is used in numerous graph/network-involved applications. However, releasing diffusion vectors may reveal sensitive linking information in the data such as transaction information in financial network data. However, protecting the privacy of graph data is challenging due to its interconnected nature. This work pro…
▽ More
Graph diffusion, which iteratively propagates real-valued substances among the graph, is used in numerous graph/network-involved applications. However, releasing diffusion vectors may reveal sensitive linking information in the data such as transaction information in financial network data. However, protecting the privacy of graph data is challenging due to its interconnected nature. This work proposes a novel graph diffusion framework with edge-level differential privacy guarantees by using noisy diffusion iterates. The algorithm injects Laplace noise per diffusion iteration and adopts a degree-based thresholding function to mitigate the high sensitivity induced by low-degree nodes. Our privacy loss analysis is based on Privacy Amplification by Iteration (PABI), which to our best knowledge, is the first effort that analyzes PABI with Laplace noise and provides relevant applications. We also introduce a novel Infinity-Wasserstein distance tracking method, which tightens the analysis of privacy leakage and makes PABI more applicable in practice. We evaluate this framework by applying it to Personalized Pagerank computation for ranking tasks. Experiments on real-world network data demonstrate the superiority of our method under stringent privacy conditions.
△ Less
Submitted 1 July, 2024; v1 submitted 22 June, 2024;
originally announced July 2024.
-
Transforming Software Development: Evaluating the Efficiency and Challenges of GitHub Copilot in Real-World Projects
Authors:
Ruchika Pandey,
Prabhat Singh,
Raymond Wei,
Shaila Shankar
Abstract:
Generative AI technologies promise to transform the product development lifecycle. This study evaluates the efficiency gains, areas for improvement, and emerging challenges of using GitHub Copilot, an AI-powered coding assistant. We identified 15 software development tasks and assessed Copilot's benefits through real-world projects on large proprietary code bases. Our findings indicate significant…
▽ More
Generative AI technologies promise to transform the product development lifecycle. This study evaluates the efficiency gains, areas for improvement, and emerging challenges of using GitHub Copilot, an AI-powered coding assistant. We identified 15 software development tasks and assessed Copilot's benefits through real-world projects on large proprietary code bases. Our findings indicate significant reductions in developer toil, with up to 50% time saved in code documentation and autocompletion, and 30-40% in repetitive coding tasks, unit test generation, debugging, and pair programming. However, Copilot struggles with complex tasks, large functions, multiple files, and proprietary contexts, particularly with C/C++ code. We project a 33-36% time reduction for coding-related tasks in a cloud-first software development lifecycle. This study aims to quantify productivity improvements, identify underperforming scenarios, examine practical benefits and challenges, investigate performance variations across programming languages, and discuss emerging issues related to code quality, security, and developer experience.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Scan-to-BIM for As-built Roads: Automatic Road Digital Twinning from Semantically Labeled Point Cloud Data
Authors:
Yuexiong Ding,
Mengtian Yin,
Ran Wei,
Ioannis Brilakis,
Muyang Liu,
Xiaowei Luo
Abstract:
Creating geometric digital twins (gDT) for as-built roads still faces many challenges, such as low automation level and accuracy, limited asset types and shapes, and reliance on engineering experience. A novel scan-to-building information modeling (scan-to-BIM) framework is proposed for automatic road gDT creation based on semantically labeled point cloud data (PCD), which considers six asset type…
▽ More
Creating geometric digital twins (gDT) for as-built roads still faces many challenges, such as low automation level and accuracy, limited asset types and shapes, and reliance on engineering experience. A novel scan-to-building information modeling (scan-to-BIM) framework is proposed for automatic road gDT creation based on semantically labeled point cloud data (PCD), which considers six asset types: Road Surface, Road Side (Slope), Road Lane (Marking), Road Sign, Road Light, and Guardrail. The framework first segments the semantic PCD into spatially independent instances or parts, then extracts the sectional polygon contours as their representative geometric information, stored in JavaScript Object Notation (JSON) files using a new data structure. Primitive gDTs are finally created from JSON files using corresponding conversion algorithms. The proposed method achieves an average distance error of 1.46 centimeters and a processing speed of 6.29 meters per second on six real-world road segments with a total length of 1,200 meters.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Towards an Extensible Model-Based Digital Twin Framework for Space Launch Vehicles
Authors:
Ran Wei,
Ruizhe Yang,
Shijun Liu,
Chongsheng Fan,
Rong Zhou,
Zekun Wu,
Haochi Wang,
Yifan Cai,
Zhe Jiang
Abstract:
The concept of Digital Twin (DT) is increasingly applied to systems on different levels of abstraction across domains, to support monitoring, analysis, diagnosis, decision making and automated control. Whilst the interest in applying DT is growing, the definition of DT is unclear, neither is there a clear pathway to develop DT to fully realise its capacities. In this paper, we revise the concept o…
▽ More
The concept of Digital Twin (DT) is increasingly applied to systems on different levels of abstraction across domains, to support monitoring, analysis, diagnosis, decision making and automated control. Whilst the interest in applying DT is growing, the definition of DT is unclear, neither is there a clear pathway to develop DT to fully realise its capacities. In this paper, we revise the concept of DT and its categorisation. We propose a DT maturity matrix, based on which we propose a model-based DT development methodology. We also discuss how model-based tools can be used to support the methodology and present our own supporting tool. We report our preliminary findings with a discussion on a case study, in which we use our proposed methodology and our supporting tool to develop an extensible DT platform for the assurance of Electrical and Electronics systems of space launch vehicles.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
Cypher4BIM: Releasing the Power of Graph for Building Knowledge Discovery
Authors:
Junxiang Zhu,
Nicholas Nisbet,
Mengtian Yin,
Ran Wei,
Ioannis Brilakis
Abstract:
Graph is considered a promising way for managing building information. A new graphic form of IFC (Industry Foundation Classes) data has just been developed, referred to as IFC-Graph. However, understanding of IFC-Graph is insufficient, especially for information query. This study aims to explore graphic building information query and develop a graph query language tailored for IFC-Graph. A series…
▽ More
Graph is considered a promising way for managing building information. A new graphic form of IFC (Industry Foundation Classes) data has just been developed, referred to as IFC-Graph. However, understanding of IFC-Graph is insufficient, especially for information query. This study aims to explore graphic building information query and develop a graph query language tailored for IFC-Graph. A series of tasks were carried out, including a) investigating the structure of IFC data and the main types of information in IFC, b) investigating the graph query language Cypher, and c) develo** a set of tailored functional query patterns. The developed language is referred to as Cypher4BIM. Five IFC models were used for validation, and the result shows that Cypher4BIM can query individual instances and complex relations from IFC, such as spatial structure, space boundary, and space accessibility. This study contributes to applications that require effective building information query, such as digital twin.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
Guarding Multiple Secrets: Enhanced Summary Statistic Privacy for Data Sharing
Authors:
Shuaiqi Wang,
Rongzhe Wei,
Mohsen Ghassemi,
Eleonora Kreacic,
Vamsi K. Potluru
Abstract:
Data sharing enables critical advances in many research areas and business applications, but it may lead to inadvertent disclosure of sensitive summary statistics (e.g., means or quantiles). Existing literature only focuses on protecting a single confidential quantity, while in practice, data sharing involves multiple sensitive statistics. We propose a novel framework to define, analyze, and prote…
▽ More
Data sharing enables critical advances in many research areas and business applications, but it may lead to inadvertent disclosure of sensitive summary statistics (e.g., means or quantiles). Existing literature only focuses on protecting a single confidential quantity, while in practice, data sharing involves multiple sensitive statistics. We propose a novel framework to define, analyze, and protect multi-secret summary statistics privacy in data sharing. Specifically, we measure the privacy risk of any data release mechanism by the worst-case probability of an attacker successfully inferring summary statistic secrets. Given an attacker's objective spanning from inferring a subset to the entirety of summary statistic secrets, we systematically design and analyze tailored privacy metrics. Defining the distortion as the worst-case distance between the original and released data distribution, we analyze the tradeoff between privacy and distortion. Our contribution also includes designing and analyzing data release mechanisms tailored for different data distributions and secret types. Evaluations on real-world data demonstrate the effectiveness of our mechanisms in practical applications.
△ Less
Submitted 12 June, 2024; v1 submitted 22 May, 2024;
originally announced May 2024.
-
A Rolling Horizon Restoration Framework for Post-disaster Restoration of Electrical Distribution Networks
Authors:
Ran Wei,
Arindam K. Das,
Payman Arabshahi,
Daniel S. Kirschen
Abstract:
Severe weather events such as floods, hurricanes, earthquakes, and large wind or ice storms can cause extensive damage to electrical distribution networks, requiring a multi-day restoration effort. Complicating the recovery process is the lack of complete and accurate information regarding the extent and locations of damages, at least during the initial part of the recovery process. These factors…
▽ More
Severe weather events such as floods, hurricanes, earthquakes, and large wind or ice storms can cause extensive damage to electrical distribution networks, requiring a multi-day restoration effort. Complicating the recovery process is the lack of complete and accurate information regarding the extent and locations of damages, at least during the initial part of the recovery process. These factors make workforce planning challenging. In this paper, we adopt a rolling horizon restoration framework whereby repairs are planned for adjustable finite length restoration windows. Considering both repair times as well as travel times, we show that the optimal scheduling problem with multiple crews, each with their own time budget, can be recast in terms of a cost constrained reward maximizing mTSP (traveling salesman problem) on doubly weighted graphs, where the objective is to maximize the aggregate reward earned during the upcoming restoration window, provided no crew violates its time budget and certain electrical continuity constraints are met. We propose a mixed integer linear programming (MILP) model for solving the above problem which is validated on standard IEEE PES test feeder networks.
△ Less
Submitted 30 May, 2024; v1 submitted 4 April, 2024;
originally announced April 2024.
-
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems
Authors:
Ran Wei,
Simon Foster,
Haitao Mei,
Fang Yan,
Ruizhe Yang,
Ibrahim Habli,
Colin O'Halloran,
Nick Tudor,
Tim Kelly,
Yakoub Nemouchi
Abstract:
Assurance cases are used to communicate and assess confidence in critical system properties such as safety and security. Historically, assurance cases have been manually created documents, which are evaluated by system stakeholders through lengthy and complicated processes. In recent years, model-based system assurance approaches have gained popularity to improve the efficiency and quality of syst…
▽ More
Assurance cases are used to communicate and assess confidence in critical system properties such as safety and security. Historically, assurance cases have been manually created documents, which are evaluated by system stakeholders through lengthy and complicated processes. In recent years, model-based system assurance approaches have gained popularity to improve the efficiency and quality of system assurance activities. This becomes increasingly important, as systems becomes more complex, it is a challenge to manage their development life-cycles, including coordination of development, verification and validation activities, and change impact analysis in inter-connected system assurance artifacts. Moreover, there is a need for assurance cases that support evolution during the operational life of the system, to enable continuous assurance in the face of an uncertain environment, as Robotics and Autonomous Systems (RAS) are adopted into society. In this paper, we contribute ACCESS - Assurance Case Centric Engineering of Safety-critical Systems, an engineering methodology, together with its tool support, for the development of safety critical systems around evolving model-based assurance cases. We show how model-based system assurance cases can trace to heterogeneous engineering artifacts (e.g. system architectural models, system safety analysis, system behaviour models, etc.), and how formal methods can be integrated during the development process. We demonstrate how assurance cases can be automatically evaluated both at development and runtime. We apply our approach to a case study based on an Autonomous Underwater Vehicle (AUV).
△ Less
Submitted 16 April, 2024; v1 submitted 22 March, 2024;
originally announced March 2024.
-
Joint Planning of Charging Stations and Power Systems for Heavy-Duty Drayage Trucks
Authors:
Zuzhao Ye,
Nanpeng Yu,
Ran Wei
Abstract:
As global concerns about climate change intensify, the transition towards zero-emission freight is becoming increasingly vital. Drayage is an important segment of the freight system, typically involving the transport of goods from seaports or intermodal terminals to nearby warehouses. This sector significantly contributes to not only greenhouse gas emissions, but also pollution in densely populate…
▽ More
As global concerns about climate change intensify, the transition towards zero-emission freight is becoming increasingly vital. Drayage is an important segment of the freight system, typically involving the transport of goods from seaports or intermodal terminals to nearby warehouses. This sector significantly contributes to not only greenhouse gas emissions, but also pollution in densely populated areas. This study presents a holistic optimization model designed for an efficient transition to zero-emission drayage, offering cost-effective strategies for the coordinated investment planning for power systems, charging infrastructure, and electric drayage trucks. The model is validated in the Greater Los Angeles area, where regulatory goals are among the most ambitious. Furthermore, the model's design allows for easy adaptation to other regions. By focusing on drayage trucks, this study also paves the way for future research into other freight categories, establishing a foundation for a more extensive exploration in this field.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
The critical disordered pinning measure
Authors:
Ran Wei,
**jiong Yu
Abstract:
In this paper, we study a disordered pinning model induced by a random walk whose increments have a finite fourth moment and vanishing first and third moments. It is known that this model is marginally relevant, and moreover, it undergoes a phase transition in an intermediate disorder regime. We show that, in the critical window, the point-to-point partition functions converge to a unique limiting…
▽ More
In this paper, we study a disordered pinning model induced by a random walk whose increments have a finite fourth moment and vanishing first and third moments. It is known that this model is marginally relevant, and moreover, it undergoes a phase transition in an intermediate disorder regime. We show that, in the critical window, the point-to-point partition functions converge to a unique limiting random measure, which we call the critical disordered pinning measure. We also obtain an analogous result for a continuous counterpart to the pinning model, which is closely related to two other models: one is a critical stochastic Volterra equation that gives rise to a rough volatility model, and the other is a critical stochastic heat equation with multiplicative noise that is white in time and delta in space.
△ Less
Submitted 5 March, 2024; v1 submitted 27 February, 2024;
originally announced February 2024.
-
CodeS: Towards Building Open-source Language Models for Text-to-SQL
Authors:
Haoyang Li,
**g Zhang,
Hanbing Liu,
Ju Fan,
Xiaokang Zhang,
Jun Zhu,
Renjie Wei,
Hongyan Pan,
Cui** Li,
Hong Chen
Abstract:
Language models have shown promising performance on the task of translating natural language questions into SQL queries (Text-to-SQL). However, most of the state-of-the-art (SOTA) approaches rely on powerful yet closed-source large language models (LLMs), such as ChatGPT and GPT-4, which may have the limitations of unclear model architectures, data privacy risks, and expensive inference overheads.…
▽ More
Language models have shown promising performance on the task of translating natural language questions into SQL queries (Text-to-SQL). However, most of the state-of-the-art (SOTA) approaches rely on powerful yet closed-source large language models (LLMs), such as ChatGPT and GPT-4, which may have the limitations of unclear model architectures, data privacy risks, and expensive inference overheads. To address the limitations, we introduce CodeS, a series of pre-trained language models with parameters ranging from 1B to 15B, specifically designed for the text-to-SQL task. CodeS is a fully open-source language model, which achieves superior accuracy with much smaller parameter sizes. This paper studies the research challenges in building CodeS. To enhance the SQL generation abilities of CodeS, we adopt an incremental pre-training approach using a specifically curated SQL-centric corpus. Based on this, we address the challenges of schema linking and rapid domain adaptation through strategic prompt construction and a bi-directional data augmentation technique. We conduct comprehensive evaluations on multiple datasets, including the widely used Spider benchmark, the newly released BIRD benchmark, robustness-diagnostic benchmarks such as Spider-DK, Spider-Syn, Spider-Realistic, and Dr.Spider, as well as two real-world datasets created for financial and academic applications. The experimental results show that our CodeS achieves new SOTA accuracy and robustness on nearly all challenging text-to-SQL benchmarks.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
ASCEND: Accurate yet Efficient End-to-End Stochastic Computing Acceleration of Vision Transformer
Authors:
Tong Xie,
Yixuan Hu,
Renjie Wei,
Meng Li,
Yuan Wang,
Runsheng Wang,
Ru Huang
Abstract:
Stochastic computing (SC) has emerged as a promising computing paradigm for neural acceleration. However, how to accelerate the state-of-the-art Vision Transformer (ViT) with SC remains unclear. Unlike convolutional neural networks, ViTs introduce notable compatibility and efficiency challenges because of their nonlinear functions, e.g., softmax and Gaussian Error Linear Units (GELU). In this pape…
▽ More
Stochastic computing (SC) has emerged as a promising computing paradigm for neural acceleration. However, how to accelerate the state-of-the-art Vision Transformer (ViT) with SC remains unclear. Unlike convolutional neural networks, ViTs introduce notable compatibility and efficiency challenges because of their nonlinear functions, e.g., softmax and Gaussian Error Linear Units (GELU). In this paper, for the first time, a ViT accelerator based on end-to-end SC, dubbed ASCEND, is proposed. ASCEND co-designs the SC circuits and ViT networks to enable accurate yet efficient acceleration. To overcome the compatibility challenges, ASCEND proposes a novel deterministic SC block for GELU and leverages an SC-friendly iterative approximate algorithm to design an accurate and efficient softmax circuit. To improve inference efficiency, ASCEND develops a two-stage training pipeline to produce accurate low-precision ViTs. With extensive experiments, we show the proposed GELU and softmax blocks achieve 56.3% and 22.6% error reduction compared to existing SC designs, respectively and reduce the area-delay product (ADP) by 5.29x and 12.6x, respectively. Moreover, compared to the baseline low-precision ViTs, ASCEND also achieves significant accuracy improvements on CIFAR10 and CIFAR100.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Large Language Models for Forecasting and Anomaly Detection: A Systematic Literature Review
Authors:
**g Su,
Chufeng Jiang,
Xin **,
Yuxin Qiao,
Tingsong Xiao,
Hongda Ma,
Rong Wei,
Zhi **g,
Jiajun Xu,
Junhong Lin
Abstract:
This systematic literature review comprehensively examines the application of Large Language Models (LLMs) in forecasting and anomaly detection, highlighting the current state of research, inherent challenges, and prospective future directions. LLMs have demonstrated significant potential in parsing and analyzing extensive datasets to identify patterns, predict future events, and detect anomalous…
▽ More
This systematic literature review comprehensively examines the application of Large Language Models (LLMs) in forecasting and anomaly detection, highlighting the current state of research, inherent challenges, and prospective future directions. LLMs have demonstrated significant potential in parsing and analyzing extensive datasets to identify patterns, predict future events, and detect anomalous behavior across various domains. However, this review identifies several critical challenges that impede their broader adoption and effectiveness, including the reliance on vast historical datasets, issues with generalizability across different contexts, the phenomenon of model hallucinations, limitations within the models' knowledge boundaries, and the substantial computational resources required. Through detailed analysis, this review discusses potential solutions and strategies to overcome these obstacles, such as integrating multimodal data, advancements in learning methodologies, and emphasizing model explainability and computational efficiency. Moreover, this review outlines critical trends that are likely to shape the evolution of LLMs in these fields, including the push toward real-time processing, the importance of sustainable modeling practices, and the value of interdisciplinary collaboration. Conclusively, this review underscores the transformative impact LLMs could have on forecasting and anomaly detection while emphasizing the need for continuous innovation, ethical considerations, and practical solutions to realize their full potential.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Efficient yet Accurate End-to-End SC Accelerator Design
Authors:
Meng Li,
Yixuan Hu,
Tengyu Zhang,
Renjie Wei,
Yawen Zhang,
Ru Huang,
Runsheng Wang
Abstract:
Providing end-to-end stochastic computing (SC) neural network acceleration for state-of-the-art (SOTA) models has become an increasingly challenging task, requiring the pursuit of accuracy while maintaining efficiency. It also necessitates flexible support for different types and sizes of operations in models by end-to-end SC circuits. In this paper, we summarize our recent research on end-to-end…
▽ More
Providing end-to-end stochastic computing (SC) neural network acceleration for state-of-the-art (SOTA) models has become an increasingly challenging task, requiring the pursuit of accuracy while maintaining efficiency. It also necessitates flexible support for different types and sizes of operations in models by end-to-end SC circuits. In this paper, we summarize our recent research on end-to-end SC neural network acceleration. We introduce an accurate end-to-end SC accelerator based on a deterministic coding and sorting network. In addition, we propose an SC-friendly model that combines low-precision data paths with high-precision residuals. We introduce approximate computing techniques to optimize SC nonlinear adders and provide some new SC designs for arithmetic operations required by SOTA models. Overall, our approach allows for further significant improvements in circuit efficiency, flexibility, and compatibility through circuit design and model co-optimization. The results demonstrate that the proposed end-to-end SC architecture achieves accurate and efficient neural network acceleration while flexibly accommodating model requirements, showcasing the potential of SC in neural network acceleration.
△ Less
Submitted 27 January, 2024;
originally announced January 2024.
-
Spring-block friction model for landslides: Application to Vaiont and Maoxian landslides
Authors:
Rong Qiang Wei,
Qing Li Zeng
Abstract:
It is necessary to study the kinematics of landslide prior to its failure for accurately estimating the time of landslide instability. Based on a spring block model, considering the Dieterich Ruina's friction, the kinematic displacement and velocity of landslide along the slip surface are analyzed under quasistatic approximation. A algebraic relationship including three parameters between the disp…
▽ More
It is necessary to study the kinematics of landslide prior to its failure for accurately estimating the time of landslide instability. Based on a spring block model, considering the Dieterich Ruina's friction, the kinematic displacement and velocity of landslide along the slip surface are analyzed under quasistatic approximation. A algebraic relationship including three parameters between the displacement (or velocity) and time is obtained, and then applied to two typical landslides: Vaiont in Italy, and Maoxian in China. The results show that the proposed spring block friction model can well describe the kinematic data of landslides before their failure. If the effective data of displacement can be obtained to determine the three parameters above, this simple physical model could be used to estimate the time of landslide instability. This spring block friction model also provides clear physical basis for the usual inverse velocity method of the landslide warning, the stick slip of some landslides, and the scaling relationship between the numbers of the landslides and their volume.
△ Less
Submitted 29 January, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Counting and metrology of distributed atomic clocks using metropolitan fiber
Authors:
Jialiang Wang,
Deling Zeng,
Youzhen Gui,
Lian Dong,
Rong Wei
Abstract:
We demonstrate a distributed atomic clocks network between Shanghai Institute of Optics and fine Mechanics (SIOM) and Shanghai Institute of Measurement and Test (SIMT). The frequency signals from three different clocks transfer in one fiber link and four clocks can have comparison in two different labs.By comparing the results of the comparison between the two labs, it was found that the consisten…
▽ More
We demonstrate a distributed atomic clocks network between Shanghai Institute of Optics and fine Mechanics (SIOM) and Shanghai Institute of Measurement and Test (SIMT). The frequency signals from three different clocks transfer in one fiber link and four clocks can have comparison in two different labs.By comparing the results of the comparison between the two labs, it was found that the consistency of the frequency signal is on the order of lower than 1E-15. And we also achieve consistency between two locations at the E-15 level of frequency reporting. This scheme can achieve distributed time counting and frequency dissemination of remote atomic clocks, which is a new exploration of the future time kee** laboratory mode.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Learning Scalable Structural Representations for Link Prediction with Bloom Signatures
Authors:
Tianyi Zhang,
Haoteng Yin,
Rongzhe Wei,
Pan Li,
Anshumali Shrivastava
Abstract:
Graph neural networks (GNNs) have shown great potential in learning on graphs, but they are known to perform sub-optimally on link prediction tasks. Existing GNNs are primarily designed to learn node-wise representations and usually fail to capture pairwise relations between target nodes, which proves to be crucial for link prediction. Recent works resort to learning more expressive edge-wise repr…
▽ More
Graph neural networks (GNNs) have shown great potential in learning on graphs, but they are known to perform sub-optimally on link prediction tasks. Existing GNNs are primarily designed to learn node-wise representations and usually fail to capture pairwise relations between target nodes, which proves to be crucial for link prediction. Recent works resort to learning more expressive edge-wise representations by enhancing vanilla GNNs with structural features such as labeling tricks and link prediction heuristics, but they suffer from high computational overhead and limited scalability. To tackle this issue, we propose to learn structural link representations by augmenting the message-passing framework of GNNs with Bloom signatures. Bloom signatures are hashing-based compact encodings of node neighborhoods, which can be efficiently merged to recover various types of edge-wise structural features. We further show that any type of neighborhood overlap-based heuristic can be estimated by a neural network that takes Bloom signatures as input. GNNs with Bloom signatures are provably more expressive than vanilla GNNs and also more scalable than existing edge-wise models. Experimental results on five standard link prediction benchmarks show that our proposed model achieves comparable or better performance than existing edge-wise GNN models while being 3-200 $\times$ faster and more memory-efficient for online inference.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Combinatorial Analysis of Coded Caching Schemes
Authors:
Ruizhong Wei
Abstract:
Coded caching schemes are used to reduce computer network traffics in peak time. To determine the efficiency of the schemes, \cite{MN} defined the information rate of the schemes and gave a construction of optimal coded caching schemes. However, their construction needs to split the data into a large number of packets which may cause constraints in real applications. Many researchers then construc…
▽ More
Coded caching schemes are used to reduce computer network traffics in peak time. To determine the efficiency of the schemes, \cite{MN} defined the information rate of the schemes and gave a construction of optimal coded caching schemes. However, their construction needs to split the data into a large number of packets which may cause constraints in real applications. Many researchers then constructed new coded caching schemes to reduce the number of packets but that increased the information rate. We define an optimization of coded caching schemes under the limitation of the number of packets which may be used to verify the efficiency of these schemes. We also give some constructions for several infinite classes of optimal coded caching schemes under the new definition.
△ Less
Submitted 6 March, 2024; v1 submitted 25 November, 2023;
originally announced November 2023.
-
Resolving uncertainty on the fly: Modeling adaptive driving behavior as active inference
Authors:
Johan Engström,
Ran Wei,
Anthony McDonald,
Alfredo Garcia,
Matt O'Kelly,
Leif Johnson
Abstract:
Understanding adaptive human driving behavior, in particular how drivers manage uncertainty, is of key importance for develo** simulated human driver models that can be used in the evaluation and development of autonomous vehicles. However, existing traffic psychology models of adaptive driving behavior either lack computational rigor or only address specific scenarios and/or behavioral phenomen…
▽ More
Understanding adaptive human driving behavior, in particular how drivers manage uncertainty, is of key importance for develo** simulated human driver models that can be used in the evaluation and development of autonomous vehicles. However, existing traffic psychology models of adaptive driving behavior either lack computational rigor or only address specific scenarios and/or behavioral phenomena. While models developed in the fields of machine learning and robotics can effectively learn adaptive driving behavior from data, due to their black box nature, they offer little or no explanation of the mechanisms underlying the adaptive behavior. Thus, a generalizable, interpretable, computational model of adaptive human driving behavior is still lacking. This paper proposes such a model based on active inference, a behavioral modeling framework originating in computational neuroscience. The model offers a principled solution to how humans trade progress against caution through policy selection based on the single mandate to minimize expected free energy. This casts goal-seeking and information-seeking (uncertainty-resolving) behavior under a single objective function, allowing the model to seamlessly resolve uncertainty as a means to obtain its goals. We apply the model in two apparently disparate driving scenarios that require managing uncertainty, (1) driving past an occluding object and (2) visual time sharing between driving and a secondary task, and show how human-like adaptive driving behavior emerges from the single principle of expected free energy minimization.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
CHAIN: Exploring Global-Local Spatio-Temporal Information for Improved Self-Supervised Video Hashing
Authors:
Rukai Wei,
Yu Liu,
**gkuan Song,
Heng Cui,
Yanzhao Xie,
Ke Zhou
Abstract:
Compressing videos into binary codes can improve retrieval speed and reduce storage overhead. However, learning accurate hash codes for video retrieval can be challenging due to high local redundancy and complex global dependencies between video frames, especially in the absence of labels. Existing self-supervised video hashing methods have been effective in designing expressive temporal encoders,…
▽ More
Compressing videos into binary codes can improve retrieval speed and reduce storage overhead. However, learning accurate hash codes for video retrieval can be challenging due to high local redundancy and complex global dependencies between video frames, especially in the absence of labels. Existing self-supervised video hashing methods have been effective in designing expressive temporal encoders, but have not fully utilized the temporal dynamics and spatial appearance of videos due to less challenging and unreliable learning tasks. To address these challenges, we begin by utilizing the contrastive learning task to capture global spatio-temporal information of videos for hashing. With the aid of our designed augmentation strategies, which focus on spatial and temporal variations to create positive pairs, the learning framework can generate hash codes that are invariant to motion, scale, and viewpoint. Furthermore, we incorporate two collaborative learning tasks, i.e., frame order verification and scene change regularization, to capture local spatio-temporal details within video frames, thereby enhancing the perception of temporal structure and the modeling of spatio-temporal relationships. Our proposed Contrastive Hashing with Global-Local Spatio-temporal Information (CHAIN) outperforms state-of-the-art self-supervised video hashing methods on four video benchmark datasets. Our codes will be released.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
On the Inherent Privacy Properties of Discrete Denoising Diffusion Models
Authors:
Rongzhe Wei,
Eleonora Kreačić,
Haoyu Wang,
Haoteng Yin,
Eli Chien,
Vamsi K. Potluru,
Pan Li
Abstract:
Privacy concerns have led to a surge in the creation of synthetic datasets, with diffusion models emerging as a promising avenue. Although prior studies have performed empirical evaluations on these models, there has been a gap in providing a mathematical characterization of their privacy-preserving capabilities. To address this, we present the pioneering theoretical exploration of the privacy pre…
▽ More
Privacy concerns have led to a surge in the creation of synthetic datasets, with diffusion models emerging as a promising avenue. Although prior studies have performed empirical evaluations on these models, there has been a gap in providing a mathematical characterization of their privacy-preserving capabilities. To address this, we present the pioneering theoretical exploration of the privacy preservation inherent in discrete diffusion models (DDMs) for discrete dataset generation. Focusing on per-instance differential privacy (pDP), our framework elucidates the potential privacy leakage for each data point in a given training dataset, offering insights into how the privacy loss of each point correlates with the dataset's distribution. Our bounds also show that training with $s$-sized data points leads to a surge in privacy leakage from $(ε, O(\frac{1}{s^2ε}))$-pDP to $(ε, O(\frac{1}{sε}))$-pDP of the DDM during the transition from the pure noise to the synthetic clean data phase, and a faster decay in diffusion coefficients amplifies the privacy guarantee. Finally, we empirically verify our theoretical findings on both synthetic and real-world datasets.
△ Less
Submitted 2 June, 2024; v1 submitted 24 October, 2023;
originally announced October 2023.
-
TpopT: Efficient Trainable Template Optimization on Low-Dimensional Manifolds
Authors:
**gkai Yan,
Shiyu Wang,
Xinyu Rain Wei,
Jimmy Wang,
Zsuzsanna Márka,
Szabolcs Márka,
John Wright
Abstract:
In scientific and engineering scenarios, a recurring task is the detection of low-dimensional families of signals or patterns. A classic family of approaches, exemplified by template matching, aims to cover the search space with a dense template bank. While simple and highly interpretable, it suffers from poor computational efficiency due to unfavorable scaling in the signal space dimensionality.…
▽ More
In scientific and engineering scenarios, a recurring task is the detection of low-dimensional families of signals or patterns. A classic family of approaches, exemplified by template matching, aims to cover the search space with a dense template bank. While simple and highly interpretable, it suffers from poor computational efficiency due to unfavorable scaling in the signal space dimensionality. In this work, we study TpopT (TemPlate OPTimization) as an alternative scalable framework for detecting low-dimensional families of signals which maintains high interpretability. We provide a theoretical analysis of the convergence of Riemannian gradient descent for TpopT, and prove that it has a superior dimension scaling to covering. We also propose a practical TpopT framework for nonparametric signal sets, which incorporates techniques of embedding and kernel interpolation, and is further configurable into a trainable network architecture by unrolled optimization. The proposed trainable TpopT exhibits significantly improved efficiency-accuracy tradeoffs for gravitational wave detection, where matched filtering is currently a method of choice. We further illustrate the general applicability of this approach with experiments on handwritten digit data.
△ Less
Submitted 15 October, 2023;
originally announced October 2023.
-
A Unified View on Solving Objective Mismatch in Model-Based Reinforcement Learning
Authors:
Ran Wei,
Nathan Lambert,
Anthony McDonald,
Alfredo Garcia,
Roberto Calandra
Abstract:
Model-based Reinforcement Learning (MBRL) aims to make agents more sample-efficient, adaptive, and explainable by learning an explicit model of the environment. While the capabilities of MBRL agents have significantly improved in recent years, how to best learn the model is still an unresolved question. The majority of MBRL algorithms aim at training the model to make accurate predictions about th…
▽ More
Model-based Reinforcement Learning (MBRL) aims to make agents more sample-efficient, adaptive, and explainable by learning an explicit model of the environment. While the capabilities of MBRL agents have significantly improved in recent years, how to best learn the model is still an unresolved question. The majority of MBRL algorithms aim at training the model to make accurate predictions about the environment and subsequently using the model to determine the most rewarding actions. However, recent research has shown that model predictive accuracy is often not correlated with action quality, tracing the root cause to the objective mismatch between accurate dynamics model learning and policy optimization of rewards. A number of interrelated solution categories to the objective mismatch problem have emerged as MBRL continues to mature as a research area. In this work, we provide an in-depth survey of these solution categories and propose a taxonomy to foster future research.
△ Less
Submitted 6 April, 2024; v1 submitted 9 October, 2023;
originally announced October 2023.
-
Weakly Supervised YOLO Network for Surgical Instrument Localization in Endoscopic Videos
Authors:
Rongfeng Wei,
**lin Wu,
Xuexue Bai,
Ming Feng,
Zhen Lei,
Hongbin Liu,
Zhen Chen
Abstract:
In minimally invasive surgery, surgical instrument localization is a crucial task for endoscopic videos, which enables various applications for improving surgical outcomes. However, annotating the instrument localization in endoscopic videos is tedious and labor-intensive. In contrast, obtaining the category information is easy and efficient in real-world applications. To fully utilize the categor…
▽ More
In minimally invasive surgery, surgical instrument localization is a crucial task for endoscopic videos, which enables various applications for improving surgical outcomes. However, annotating the instrument localization in endoscopic videos is tedious and labor-intensive. In contrast, obtaining the category information is easy and efficient in real-world applications. To fully utilize the category information and address the localization problem, we propose a weakly supervised localization framework named WS-YOLO for surgical instruments. By leveraging the instrument category information as the weak supervision, our WS-YOLO framework adopts an unsupervised multi-round training strategy for the localization capability training. We validate our WS-YOLO framework on the Endoscopic Vision Challenge 2023 dataset, which achieves remarkable performance in the weakly supervised surgical instrument localization. The source code is available at https://github.com/Breezewrf/WS-YOLO.
△ Less
Submitted 20 June, 2024; v1 submitted 23 September, 2023;
originally announced September 2023.
-
A Bayesian Approach to Robust Inverse Reinforcement Learning
Authors:
Ran Wei,
Siliang Zeng,
Chenliang Li,
Alfredo Garcia,
Anthony McDonald,
Mingyi Hong
Abstract:
We consider a Bayesian approach to offline model-based inverse reinforcement learning (IRL). The proposed framework differs from existing offline model-based IRL approaches by performing simultaneous estimation of the expert's reward function and subjective model of environment dynamics. We make use of a class of prior distributions which parameterizes how accurate the expert's model of the enviro…
▽ More
We consider a Bayesian approach to offline model-based inverse reinforcement learning (IRL). The proposed framework differs from existing offline model-based IRL approaches by performing simultaneous estimation of the expert's reward function and subjective model of environment dynamics. We make use of a class of prior distributions which parameterizes how accurate the expert's model of the environment is to develop efficient algorithms to estimate the expert's reward and subjective dynamics in high-dimensional settings. Our analysis reveals a novel insight that the estimated policy exhibits robust performance when the expert is believed (a priori) to have a highly accurate model of the environment. We verify this observation in the MuJoCo environments and show that our algorithms outperform state-of-the-art offline IRL algorithms.
△ Less
Submitted 6 April, 2024; v1 submitted 15 September, 2023;
originally announced September 2023.
-
READ: Reliability-Enhanced Accelerator Dataflow Optimization using Critical Input Pattern Reduction
Authors:
Zuodong Zhang,
Renjie Wei,
Meng Li,
Yibo Lin,
Runsheng Wang,
Ru Huang
Abstract:
With the rapid advancements of deep learning in recent years, hardware accelerators are continuously deployed in more and more safety-critical applications such as autonomous driving and robotics. While the accelerators are usually fabricated with advanced technology nodes for high performance and energy efficiency, they are also more prone to timing errors under process, voltage, temperature, and…
▽ More
With the rapid advancements of deep learning in recent years, hardware accelerators are continuously deployed in more and more safety-critical applications such as autonomous driving and robotics. While the accelerators are usually fabricated with advanced technology nodes for high performance and energy efficiency, they are also more prone to timing errors under process, voltage, temperature, and aging (PVTA) variations. By revisiting the physical sources of timing errors, we show that most of the timing errors in the accelerator are caused by a specific subset of input patterns, defined as critical input patterns. To improve the timing error resilience of the accelerator, in this paper, we propose READ, a reliability-enhanced accelerator dataflow optimization technique that can effectively reduce timing errors. READ reduces the occurrence of critical input patterns by exploring the optimal computing sequence when map** a trained deep neural network to accelerators. READ only changes the order of multiply-accumulate operations in a convolution, which introduces negligible hardware overhead and no impact on accuracy. The experimental results on VGG and ResNet demonstrate on average 7.8X timing error rate (TER) reduction and up to 37.9X TER reduction for certain layers. The results also show that READ enables the accelerator to maintain accuracy over a wide range of PVTA variations, making it a promising approach for robust deep-learning design
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Exploiting Inductive Bias in Transformer for Point Cloud Classification and Segmentation
Authors:
Zihao Li,
Pan Gao,
Hui Yuan,
Ran Wei,
Manoranjan Paul
Abstract:
Discovering inter-point connection for efficient high-dimensional feature extraction from point coordinate is a key challenge in processing point cloud. Most existing methods focus on designing efficient local feature extractors while ignoring global connection, or vice versa. In this paper, we design a new Inductive Bias-aided Transformer (IBT) method to learn 3D inter-point relations, which cons…
▽ More
Discovering inter-point connection for efficient high-dimensional feature extraction from point coordinate is a key challenge in processing point cloud. Most existing methods focus on designing efficient local feature extractors while ignoring global connection, or vice versa. In this paper, we design a new Inductive Bias-aided Transformer (IBT) method to learn 3D inter-point relations, which considers both local and global attentions. Specifically, considering local spatial coherence, local feature learning is performed through Relative Position Encoding and Attentive Feature Pooling. We incorporate the learned locality into the Transformer module. The local feature affects value component in Transformer to modulate the relationship between channels of each point, which can enhance self-attention mechanism with locality based channel interaction. We demonstrate its superiority experimentally on classification and segmentation tasks. The code is available at: https://github.com/jiamang/IBT
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Large deviations of reflected weakly interacting particle systems
Authors:
** Cheng,
Rong Wei,
Tusheng Zhang
Abstract:
In this paper, we prove a large deviation principle for the empirical measures of a system of weakly interacting diffusion with reflection. We adopt the weak convergence approach. To make this approach work, we show that the sequence of empirical measures of the controlled reflected system will converge to the weak solution of an associated reflected McKean--Vlasov equation.
In this paper, we prove a large deviation principle for the empirical measures of a system of weakly interacting diffusion with reflection. We adopt the weak convergence approach. To make this approach work, we show that the sequence of empirical measures of the controlled reflected system will converge to the weak solution of an associated reflected McKean--Vlasov equation.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
On Cover-Free Families
Authors:
Ruizhong Wei
Abstract:
Cover-free families were considered from different subjects by numerous researchers. Recently, cover-free families are also found useful in cryptography. In this paper, we use an uniform method to survey known results of cover-free families. Many old results are updated or generalized. Some new results are also given.
Cover-free families were considered from different subjects by numerous researchers. Recently, cover-free families are also found useful in cryptography. In this paper, we use an uniform method to survey known results of cover-free families. Many old results are updated or generalized. Some new results are also given.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
An active inference model of car following: Advantages and applications
Authors:
Ran Wei,
Anthony D. McDonald,
Alfredo Garcia,
Gustav Markkula,
Johan Engstrom,
Matthew O'Kelly
Abstract:
Driver process models play a central role in the testing, verification, and development of automated and autonomous vehicle technologies. Prior models developed from control theory and physics-based rules are limited in automated vehicle applications due to their restricted behavioral repertoire. Data-driven machine learning models are more capable than rule-based models but are limited by the nee…
▽ More
Driver process models play a central role in the testing, verification, and development of automated and autonomous vehicle technologies. Prior models developed from control theory and physics-based rules are limited in automated vehicle applications due to their restricted behavioral repertoire. Data-driven machine learning models are more capable than rule-based models but are limited by the need for large training datasets and their lack of interpretability, i.e., an understandable link between input data and output behaviors. We propose a novel car following modeling approach using active inference, which has comparable behavioral flexibility to data-driven models while maintaining interpretability. We assessed the proposed model, the Active Inference Driving Agent (AIDA), through a benchmark analysis against the rule-based Intelligent Driver Model, and two neural network Behavior Cloning models. The models were trained and tested on a real-world driving dataset using a consistent process. The testing results showed that the AIDA predicted driving controls significantly better than the rule-based Intelligent Driver Model and had similar accuracy to the data-driven neural network models in three out of four evaluations. Subsequent interpretability analyses illustrated that the AIDA's learned distributions were consistent with driver behavior theory and that visualizations of the distributions could be used to directly comprehend the model's decision making process and correct model errors attributable to limited training data. The results indicate that the AIDA is a promising alternative to black-box data-driven models and suggest a need for further research focused on modeling driving style and model training with more diverse datasets.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
EBSR: Enhanced Binary Neural Network for Image Super-Resolution
Authors:
Renjie Wei,
Shuwen Zhang,
Zechun Liu,
Meng Li,
Yuchen Fan,
Runsheng Wang,
Ru Huang
Abstract:
While the performance of deep convolutional neural networks for image super-resolution (SR) has improved significantly, the rapid increase of memory and computation requirements hinders their deployment on resource-constrained devices. Quantized networks, especially binary neural networks (BNN) for SR have been proposed to significantly improve the model inference efficiency but suffer from large…
▽ More
While the performance of deep convolutional neural networks for image super-resolution (SR) has improved significantly, the rapid increase of memory and computation requirements hinders their deployment on resource-constrained devices. Quantized networks, especially binary neural networks (BNN) for SR have been proposed to significantly improve the model inference efficiency but suffer from large performance degradation. We observe the activation distribution of SR networks demonstrates very large pixel-to-pixel, channel-to-channel, and image-to-image variation, which is important for high performance SR but gets lost during binarization. To address the problem, we propose two effective methods, including the spatial re-scaling as well as channel-wise shifting and re-scaling, which augments binary convolutions by retaining more spatial and channel-wise information. Our proposed models, dubbed EBSR, demonstrate superior performance over prior art methods both quantitatively and qualitatively across different datasets and different model sizes. Specifically, for x4 SR on Set5 and Urban100, EBSRlight improves the PSNR by 0.31 dB and 0.28 dB compared to SRResNet-E2FIF, respectively, while EBSR outperforms EDSR-E2FIF by 0.29 dB and 0.32 dB PSNR, respectively.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Autonomous Intelligent Navigation for Flexible Endoscopy Using Monocular Depth Guidance and 3-D Shape Planning
Authors:
Yiang Lu,
Ruofeng Wei,
Bin Li,
Wei Chen,
Jianshu Zhou,
Qi Dou,
Dong Sun,
Yun-hui Liu
Abstract:
Recent advancements toward perception and decision-making of flexible endoscopes have shown great potential in computer-aided surgical interventions. However, owing to modeling uncertainty and inter-patient anatomical variation in flexible endoscopy, the challenge remains for efficient and safe navigation in patient-specific scenarios. This paper presents a novel data-driven framework with self-co…
▽ More
Recent advancements toward perception and decision-making of flexible endoscopes have shown great potential in computer-aided surgical interventions. However, owing to modeling uncertainty and inter-patient anatomical variation in flexible endoscopy, the challenge remains for efficient and safe navigation in patient-specific scenarios. This paper presents a novel data-driven framework with self-contained visual-shape fusion for autonomous intelligent navigation of flexible endoscopes requiring no priori knowledge of system models and global environments. A learning-based adaptive visual servoing controller is proposed to online update the eye-in-hand vision-motor configuration and steer the endoscope, which is guided by monocular depth estimation via a vision transformer (ViT). To prevent unnecessary and excessive interactions with surrounding anatomy, an energy-motivated shape planning algorithm is introduced through entire endoscope 3-D proprioception from embedded fiber Bragg grating (FBG) sensors. Furthermore, a model predictive control (MPC) strategy is developed to minimize the elastic potential energy flow and simultaneously optimize the steering policy. Dedicated navigation experiments on a robotic-assisted flexible endoscope with an FBG fiber in several phantom environments demonstrate the effectiveness and adaptability of the proposed framework.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
Visual Watermark Removal Based on Deep Learning
Authors:
Rongfeng Wei
Abstract:
In recent years as the internet age continues to grow, sharing images on social media has become a common occurrence. In certain cases, watermarks are used as protection for the ownership of the image, however, in more cases, one may wish to remove these watermark images to get the original image without obscuring. In this work, we proposed a deep learning method based technique for visual waterma…
▽ More
In recent years as the internet age continues to grow, sharing images on social media has become a common occurrence. In certain cases, watermarks are used as protection for the ownership of the image, however, in more cases, one may wish to remove these watermark images to get the original image without obscuring. In this work, we proposed a deep learning method based technique for visual watermark removal. Inspired by the strong image translation performance of the U-structure, an end-to-end deep neural network model named AdvancedUnet is proposed to extract and remove the visual watermark simultaneously. On the other hand, we embed some effective RSU module instead of the common residual block used in UNet, which increases the depth of the whole architecture without significantly increasing the computational cost. The deep-supervised hybrid loss guides the network to learn the transformation between the input image and the ground truth in a multi-scale and three-level hierarchy. Comparison experiments demonstrate the effectiveness of our method.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
A Light-Weight Communication-Efficient Data Sharing Approach in 5G NR V2X
Authors:
Ran Wei,
Lyutianyang Zhang
Abstract:
Timeliness of information is critical for Basic Safety Messages (BSMs) in Vehicle-to-Everything (V2X) communication to enable highly reliable autonomous driving. However, the current semi-persistent scheduling (SPS) algorithms in the 5th generation New Radio (5G NR) standard can still generate collisions probability, close to 20% with 100 vehicles per kilometer, such that they cannot meet this req…
▽ More
Timeliness of information is critical for Basic Safety Messages (BSMs) in Vehicle-to-Everything (V2X) communication to enable highly reliable autonomous driving. However, the current semi-persistent scheduling (SPS) algorithms in the 5th generation New Radio (5G NR) standard can still generate collisions probability, close to 20% with 100 vehicles per kilometer, such that they cannot meet this requirement for BSMs. This paper proposes a Ledger concept, which can communicate collision information to every vehicle in the network within one Resource Reservation Interval (RRI) through the broadcasting of Ledger information. The colliding vehicle is aware that it has collided with other vehicles and will reselect for the next SPS period. Besides that, other protocols follow the SPS. Although it sacrifices 14.29% of resources by including Ledger, it can eventually reduce the collision probability. In this paper, a Monte Carlo simulator is used to verify and analyze the performance of the Ledger system. Numerical results show that abide by the SPS protocol, the Ledger system can make the collision probability converge to zero after amount of RRIs.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Dynamic Local Feature Aggregation for Learning on Point Clouds
Authors:
Zihao Li,
Pan Gao,
Hui Yuan,
Ran Wei
Abstract:
Existing point cloud learning methods aggregate features from neighbouring points relying on constructing graph in the spatial domain, which results in feature update for each point based on spatially-fixed neighbours throughout layers. In this paper, we propose a dynamic feature aggregation (DFA) method that can transfer information by constructing local graphs in the feature domain without spati…
▽ More
Existing point cloud learning methods aggregate features from neighbouring points relying on constructing graph in the spatial domain, which results in feature update for each point based on spatially-fixed neighbours throughout layers. In this paper, we propose a dynamic feature aggregation (DFA) method that can transfer information by constructing local graphs in the feature domain without spatial constraints. By finding k-nearest neighbors in the feature domain, we perform relative position encoding and semantic feature encoding to explore latent position and feature similarity information, respectively, so that rich local features can be learned. At the same time, we also learn low-dimensional global features from the original point cloud for enhancing feature representation. Between DFA layers, we dynamically update the constructed local graph structure, so that we can learn richer information, which greatly improves adaptability and efficiency. We demonstrate the superiority of our method by conducting extensive experiments on point cloud classification and segmentation tasks. Implementation code is available: https://github.com/jiamang/DFA.
△ Less
Submitted 7 January, 2023;
originally announced January 2023.
-
Hyperbolic Hierarchical Contrastive Hashing
Authors:
Rukai Wei,
Yu Liu,
**gkuan Song,
Yanzhao Xie,
Ke Zhou
Abstract:
Hierarchical semantic structures, naturally existing in real-world datasets, can assist in capturing the latent distribution of data to learn robust hash codes for retrieval systems. Although hierarchical semantic structures can be simply expressed by integrating semantically relevant data into a high-level taxon with coarser-grained semantics, the construction, embedding, and exploitation of the…
▽ More
Hierarchical semantic structures, naturally existing in real-world datasets, can assist in capturing the latent distribution of data to learn robust hash codes for retrieval systems. Although hierarchical semantic structures can be simply expressed by integrating semantically relevant data into a high-level taxon with coarser-grained semantics, the construction, embedding, and exploitation of the structures remain tricky for unsupervised hash learning. To tackle these problems, we propose a novel unsupervised hashing method named Hyperbolic Hierarchical Contrastive Hashing (HHCH). We propose to embed continuous hash codes into hyperbolic space for accurate semantic expression since embedding hierarchies in hyperbolic space generates less distortion than in hyper-sphere space and Euclidean space. In addition, we extend the K-Means algorithm to hyperbolic space and perform the proposed hierarchical hyperbolic K-Means algorithm to construct hierarchical semantic structures adaptively. To exploit the hierarchical semantic structures in hyperbolic space, we designed the hierarchical contrastive learning algorithm, including hierarchical instance-wise and hierarchical prototype-wise contrastive learning. Extensive experiments on four benchmark datasets demonstrate that the proposed method outperforms the state-of-the-art unsupervised hashing methods. Codes will be released.
△ Less
Submitted 17 December, 2022;
originally announced December 2022.
-
Distilled Visual and Robot Kinematics Embeddings for Metric Depth Estimation in Monocular Scene Reconstruction
Authors:
Ruofeng Wei,
Bin Li,
Hangjie Mo,
Fangxun Zhong,
Yonghao Long,
Qi Dou,
Yun-Hui Liu,
Dong Sun
Abstract:
Estimating precise metric depth and scene reconstruction from monocular endoscopy is a fundamental task for surgical navigation in robotic surgery. However, traditional stereo matching adopts binocular images to perceive the depth information, which is difficult to transfer to the soft robotics-based surgical systems due to the use of monocular endoscopy. In this paper, we present a novel framewor…
▽ More
Estimating precise metric depth and scene reconstruction from monocular endoscopy is a fundamental task for surgical navigation in robotic surgery. However, traditional stereo matching adopts binocular images to perceive the depth information, which is difficult to transfer to the soft robotics-based surgical systems due to the use of monocular endoscopy. In this paper, we present a novel framework that combines robot kinematics and monocular endoscope images with deep unsupervised learning into a single network for metric depth estimation and then achieve 3D reconstruction of complex anatomy. Specifically, we first obtain the relative depth maps of surgical scenes by leveraging a brightness-aware monocular depth estimation method. Then, the corresponding endoscope poses are computed based on non-linear optimization of geometric and photometric reprojection residuals. Afterwards, we develop a Depth-driven Sliding Optimization (DDSO) algorithm to extract the scaling coefficient from kinematics and calculated poses offline. By coupling the metric scale and relative depth data, we form a robust ensemble that represents the metric and consistent depth. Next, we treat the ensemble as supervisory labels to train a metric depth estimation network for surgeries (i.e., MetricDepthS-Net) that distills the embeddings from the robot kinematics, endoscopic videos, and poses. With accurate metric depth estimation, we utilize a dense visual reconstruction method to recover the 3D structure of the whole surgical site. We have extensively evaluated the proposed framework on public SCARED and achieved comparable performance with stereo-based depth estimation methods. Our results demonstrate the feasibility of the proposed approach to recover the metric depth and 3D structure with monocular inputs.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
Joint Optimization of Active and Passive Beamforming in Multi-IRS Aided mmWave Communications
Authors:
Renlong Wei,
Qing Xue,
Shaodan Ma,
Yongjun Xu,
Li Yan,
Xuming Fang
Abstract:
Intelligent reflecting surface (IRS) has been considered as a promising technology to alleviate the blockage effect and enhance coverage in millimeter wave (mmWave) communication. To explore the impact of IRS on the performance of mmWave communication, we investigate a multi-IRS assisted mmWave communication network and formulate a sum rate maximization problem by jointly optimizing the active and…
▽ More
Intelligent reflecting surface (IRS) has been considered as a promising technology to alleviate the blockage effect and enhance coverage in millimeter wave (mmWave) communication. To explore the impact of IRS on the performance of mmWave communication, we investigate a multi-IRS assisted mmWave communication network and formulate a sum rate maximization problem by jointly optimizing the active and passive beamforming and the set of IRSs for assistance. The optimization problem is intractable due to the lack of convexity of the objective function and the binary nature of the IRS selection variables. To tackle the complex non-convex problem, an alternating iterative approach is proposed. In particular, utilizing the fractional programming method to optimize the active and passive beamforming and the optimization of IRS selection is solved by enumerating. Simulation results demonstrate the performance gain of our proposed approach.
△ Less
Submitted 3 October, 2022;
originally announced October 2022.
-
Unusual electric polarization behavior in elemental quasi-2D allotropes of selenium
Authors:
Dan Liu,
Lin Han,
Ran Wei,
Shixin Song,
Jie Guan,
Shuai Dong,
David Tomanek
Abstract:
We investigate tunable electric polarization and electronic structure of quasi-two-dimensional (quasi-2D) allotropes of selenium, which are formed from their constituent one-dimensional (1D) structures through an inter-chain interaction facilitated by the multi-valence nature of Se. Our em ab initio calculations reveal that different quasi-2D Se allotropes display different types of electric polar…
▽ More
We investigate tunable electric polarization and electronic structure of quasi-two-dimensional (quasi-2D) allotropes of selenium, which are formed from their constituent one-dimensional (1D) structures through an inter-chain interaction facilitated by the multi-valence nature of Se. Our em ab initio calculations reveal that different quasi-2D Se allotropes display different types of electric polarization, including ferroelectric (FE) polarization normal to the chain direction in alpha and delta allotropes, non-collinear ferrielectric (FiE) polarization along the chain axis in tau-Se, and anti-ferroelectric (AFE) polarization in eta-Se. The magnitude and direction of the polarization can be changed by a previously unexplored rotation of the constituent chains. In that case, an in-plane polarization direction may change to out-of-plane in alpha-Se and delta-Se, flip its direction, and even disappear in tau-Se. Also, the band gap may be reduced and changed from indirect to direct by rotating the constituent chains about their axes in these quasi-2D Se allotropes.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Mckean-Vlasov stochastic differential equations with oblique reflection on non-smooth time dependent domains
Authors:
Rong Wei,
Saisai Yang,
Jianliang Zhai
Abstract:
In this paper, we consider a class of Mckean-Vlasov stochastic differential equation with oblique reflection over an non-smooth time dependent domain. We establish the existence and uniqueness results of this class, address the propagation of chaos and prove a Fredlin-Wentzell type large deviations principle (LDP). One of the main difficulties is raised by the setting of non-smooth time dependent…
▽ More
In this paper, we consider a class of Mckean-Vlasov stochastic differential equation with oblique reflection over an non-smooth time dependent domain. We establish the existence and uniqueness results of this class, address the propagation of chaos and prove a Fredlin-Wentzell type large deviations principle (LDP). One of the main difficulties is raised by the setting of non-smooth time dependent domain. To prove the LDP, a sufficient condition for the weak convergence method, which is suitable for Mckean-Vlasov stochastic differential equation, plays an important role.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Performance Analysis of Semi-Persistent Scheduling Throughput in 5G NR-V2X: A MAC Perspective
Authors:
Ran Wei
Abstract:
The packet throughput in 5th Generation (5G) New Radio (NR) Vehicle-to-Everything (V2X) is highly dependent on the Medium Access Control (MAC) based scheduling algorithm with no base station participation. In particular, the Semi-Persistent Scheduling (SPS) algorithm has been standardized by the 3rd Generation Partnership Project (3GPP) for V2X resource scheduling in the out-of-coverage scenario.…
▽ More
The packet throughput in 5th Generation (5G) New Radio (NR) Vehicle-to-Everything (V2X) is highly dependent on the Medium Access Control (MAC) based scheduling algorithm with no base station participation. In particular, the Semi-Persistent Scheduling (SPS) algorithm has been standardized by the 3rd Generation Partnership Project (3GPP) for V2X resource scheduling in the out-of-coverage scenario. This paper analyzes the NR-V2X SPS throughput from the MAC perspective, where the packet reception ratio (PRR) and half-duplex (HD) effect dominate. We first investigate the average throughput in the fully connected vehicular network, in which all the vehicles share the same throughput. Subsequently, the average throughput as a function of distance in the partially connected vehicular network is analyzed. The Monte Carlo simulation results show that increasing the resource kee** probability can improve the average throughput. Meanwhile, in the partially connected network, the lower resource kee** probability is prone to obtaining the higher throughput gain by increasing the number of subchannels.
△ Less
Submitted 22 August, 2022;
originally announced August 2022.
-
Limiting free energy per particle for Ising Model by approximating its functional integral
Authors:
Rong Qiang Wei
Abstract:
There have been a lot of methods aimed at studying the limiting free energy per particle (LFEPP) for 3D Ising model in absence of an external magnetic field. These methods are elegant, but most of them are complicated and often require specialized knowledge and special skills. Here we approximate the LFEPP for Ising model from its corresponding functional integral. The resulting Ising LFEPP, which…
▽ More
There have been a lot of methods aimed at studying the limiting free energy per particle (LFEPP) for 3D Ising model in absence of an external magnetic field. These methods are elegant, but most of them are complicated and often require specialized knowledge and special skills. Here we approximate the LFEPP for Ising model from its corresponding functional integral. The resulting Ising LFEPP, which includes an integral of a special function, is exact asymptotically. For 1D and 2D Ising model, this LFEPPs in two limiting cases are consistent or formally consistent with those well-known, respectively. Based on these consistences, we infer the LFEPPs for 3D model in these special cases. Additionally, with this LFEPP, we derive a further approximate one for 3D Ising model, from which we infer the critical temperature $z_c\approx 0.21\sim 0.22$. Furthermore, we suggest similar LFEPPs for 1D-3D Ising models with an external magnetic field, although they are too complicated.
△ Less
Submitted 30 June, 2024; v1 submitted 19 August, 2022;
originally announced August 2022.
-
Ferroelectricity induced by the absorption of water molecules on double helix SnIP
Authors:
Dan Liu,
Ran Wei,
Lin Han,
Chen Zhu,
Shuai Dong
Abstract:
We study the ferroelectricity in a one-dimensional system composed of a double helix SnIP with absorbing water molecules. Our ab initio calculations reveal two factors that are critical to the electrical polarization. The first one is the orientation of polarized water molecules staying in the R2 region of SnIP. The second one is the displacement of I atom which roots from subtle interaction with…
▽ More
We study the ferroelectricity in a one-dimensional system composed of a double helix SnIP with absorbing water molecules. Our ab initio calculations reveal two factors that are critical to the electrical polarization. The first one is the orientation of polarized water molecules staying in the R2 region of SnIP. The second one is the displacement of I atom which roots from subtle interaction with absorbed water molecules. A reasonable scenario of polarization flip** is proposed in this study. In the scenario, the water molecule is rolling-up with kee** the magnitude of its electrical dipole and changing its direction, meanwhile, the displacement of I atoms is also reversed. Highly tunable polarization can be achieved by applying strain, with 26.5% of polarization enhancement by applying tensile strain, with only 4% degradation is observed with 4% compressive strain. Finally, the direct band gap is also found to be correlated with strain.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Understanding Non-linearity in Graph Neural Networks from the Bayesian-Inference Perspective
Authors:
Rongzhe Wei,
Haoteng Yin,
Junteng Jia,
Austin R. Benson,
Pan Li
Abstract:
Graph neural networks (GNNs) have shown superiority in many prediction tasks over graphs due to their impressive capability of capturing nonlinear relations in graph-structured data. However, for node classification tasks, often, only marginal improvement of GNNs over their linear counterparts has been observed. Previous works provide very few understandings of this phenomenon. In this work, we re…
▽ More
Graph neural networks (GNNs) have shown superiority in many prediction tasks over graphs due to their impressive capability of capturing nonlinear relations in graph-structured data. However, for node classification tasks, often, only marginal improvement of GNNs over their linear counterparts has been observed. Previous works provide very few understandings of this phenomenon. In this work, we resort to Bayesian learning to deeply investigate the functions of non-linearity in GNNs for node classification tasks. Given a graph generated from the statistical model CSBM, we observe that the max-a-posterior estimation of a node label given its own and neighbors' attributes consists of two types of non-linearity, a possibly non-linear transformation of node attributes and a ReLU-activated feature aggregation from neighbors. The latter surprisingly matches the type of non-linearity used in many GNN models. By further imposing Gaussian assumption on node attributes, we prove that the superiority of those ReLU activations is only significant when the node attributes are far more informative than the graph structure, which nicely matches many previous empirical observations. A similar argument can be achieved when there is a distribution shift of node attributes between the training and testing datasets. Finally, we verify our theory on both synthetic and real-world networks.
△ Less
Submitted 20 October, 2022; v1 submitted 22 July, 2022;
originally announced July 2022.
-
Relative uniformly positive entropy of induced amenable group actions
Authors:
Kairan Liu,
Runju Wei
Abstract:
Let $G$ be a countable infinite discrete amenable group.It should be noted that a $G$-system $(X,G)$ naturally induces a $G$-system $(\mathcal{M}(X),G)$, where $\mathcal{M}(X)$ denotes the space of Borel probability measures on the compact metric space $X$ endowed with the weak*-topology. A factor map $π\colon (X,G)\to(Y,G)$ between two $G$-systems induces a factor map…
▽ More
Let $G$ be a countable infinite discrete amenable group.It should be noted that a $G$-system $(X,G)$ naturally induces a $G$-system $(\mathcal{M}(X),G)$, where $\mathcal{M}(X)$ denotes the space of Borel probability measures on the compact metric space $X$ endowed with the weak*-topology. A factor map $π\colon (X,G)\to(Y,G)$ between two $G$-systems induces a factor map $\widetildeπ\colon(\mathcal{M}(X),G)\to(\mathcal{M}(Y),G)$. It turns out that $\widetildeπ$ is open if and only if $π$ is open. When $Y$ is fully supported, it is shown that $π$ has relative uniformly positive entropy if and only if $\widetildeπ$ has relative uniformly positive entropy.
△ Less
Submitted 3 March, 2023; v1 submitted 10 June, 2022;
originally announced June 2022.
-
A closed solution to a special polynomial trinomial equation and semi-analytical roots for a general algebraic equation
Authors:
Rong Qiang Wei
Abstract:
We suggest a closed solution for the roots of polynomial trinomial algebraic equation $$z^n+xz^{n-1}-1=0$$ with an appropriate $x$. This solution is a minor modification to the work of Mikhalkin (Mikhalkin E N, 2006. On solving general algebraic equations by integrals of elementary functions, Siberian Mathematical Jounral, 47(2), 301-306). This modification, together with Mikhalkin's integral form…
▽ More
We suggest a closed solution for the roots of polynomial trinomial algebraic equation $$z^n+xz^{n-1}-1=0$$ with an appropriate $x$. This solution is a minor modification to the work of Mikhalkin (Mikhalkin E N, 2006. On solving general algebraic equations by integrals of elementary functions, Siberian Mathematical Jounral, 47(2), 301-306). This modification, together with Mikhalkin's integral formula, provides a relatively simple analytical expression for the solution to a general algebraic equation when the polynomial coefficients are over the corresponding convergent domain. Numerical examples show that this expression can be another alternative to finding numerically the roots of a general polynomial algebraic equation when the integral involved exists and is calculated correctly.
△ Less
Submitted 19 August, 2022; v1 submitted 4 May, 2022;
originally announced May 2022.
-
3D Perception based Imitation Learning under Limited Demonstration for Laparoscope Control in Robotic Surgery
Authors:
Bin Li,
Ruofeng Wei,
Jiaqi Xu,
Bo Lu,
Chi-Hang Yee,
Chi-Fai Ng,
Pheng-Ann Heng,
Qi Dou,
Yun-Hui Liu
Abstract:
Automatic laparoscope motion control is fundamentally important for surgeons to efficiently perform operations. However, its traditional control methods based on tool tracking without considering information hidden in surgical scenes are not intelligent enough, while the latest supervised imitation learning (IL)-based methods require expensive sensor data and suffer from distribution mismatch issu…
▽ More
Automatic laparoscope motion control is fundamentally important for surgeons to efficiently perform operations. However, its traditional control methods based on tool tracking without considering information hidden in surgical scenes are not intelligent enough, while the latest supervised imitation learning (IL)-based methods require expensive sensor data and suffer from distribution mismatch issues caused by limited demonstrations. In this paper, we propose a novel Imitation Learning framework for Laparoscope Control (ILLC) with reinforcement learning (RL), which can efficiently learn the control policy from limited surgical video clips. Specially, we first extract surgical laparoscope trajectories from unlabeled videos as the demonstrations and reconstruct the corresponding surgical scenes. To fully learn from limited motion trajectory demonstrations, we propose Shape Preserving Trajectory Augmentation (SPTA) to augment these data, and build a simulation environment that supports parallel RGB-D rendering to reinforce the RL policy for interacting with the environment efficiently. With adversarial training for IL, we obtain the laparoscope control policy based on the generated rollouts and surgical demonstrations. Extensive experiments are conducted in unseen reconstructed surgical scenes, and our method outperforms the previous IL methods, which proves the feasibility of our unified learning-based framework for laparoscope control.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Low-$p_T$ direct-photon production in Au$+$Au collisions at $\sqrt{s_{_{NN}}}=39$ and 62.4 GeV
Authors:
N. J. Abdulameer,
U. Acharya,
A. Adare,
C. Aidala,
N. N. Ajitanand,
Y. Akiba,
R. Akimoto,
H. Al-Ta'ani,
J. Alexander,
M. Alfred,
A. Angerami,
K. Aoki,
N. Apadula,
Y. Aramaki,
H. Asano,
E. C. Aschenauer,
E. T. Atomssa,
T. C. Awes,
B. Azmoun,
V. Babintsev,
M. Bai,
B. Bannier,
K. N. Barish,
B. Bassalleck,
S. Bathe
, et al. (409 additional authors not shown)
Abstract:
The measurement of direct photons from Au$+$Au collisions at $\sqrt{s_{_{NN}}}=39$ and 62.4 GeV in the transverse-momentum range $0.4<p_T<3$ Gev/$c$ is presented by the PHENIX collaboration at the Relativistic Heavy Ion Collider. A significant direct-photon yield is observed in both collision systems. A universal scaling is observed when the direct-photon $p_T$ spectra for different center-of-mass…
▽ More
The measurement of direct photons from Au$+$Au collisions at $\sqrt{s_{_{NN}}}=39$ and 62.4 GeV in the transverse-momentum range $0.4<p_T<3$ Gev/$c$ is presented by the PHENIX collaboration at the Relativistic Heavy Ion Collider. A significant direct-photon yield is observed in both collision systems. A universal scaling is observed when the direct-photon $p_T$ spectra for different center-of-mass energies and for different centrality selections at $\sqrt{s_{_{NN}}}=62.4$ GeV is scaled with $(dN_{\rm ch}/dη)^α$ for $α=1.21{\pm}0.04$. This scaling also holds true for direct-photon spectra from Au$+$Au collisions at $\sqrt{s_{_{NN}}}=200$ GeV measured earlier by PHENIX, as well as the spectra from Pb$+$Pb at $\sqrt{s_{_{NN}}}=2760$ GeV published by ALICE. The scaling power $α$ seems to be independent of $p_T$, center of mass energy, and collision centrality. The spectra from different collision energies have a similar shape up to $p_T$ of 2 GeV/$c$. The spectra have a local inverse slope $T_{\rm eff}$ increasing with $p_T$ of $0.174\pm0.018$ GeV/$c$ in the range $0.4<p_T<1.3$ GeV/$c$ and increasing to $0.289\pm0.024$ GeV/$c$ for $0.9<p_T<2.1$ GeV/$c$. The observed similarity of low-$p_T$ direct-photon production from $\sqrt{s_{_{NN}}}= 39$ to 2760 GeV suggests a common source of direct photons for the different collision energies and event centrality selections, and suggests a comparable space-time evolution of direct-photon emission.
△ Less
Submitted 24 February, 2023; v1 submitted 23 March, 2022;
originally announced March 2022.
-
On maximum parallel classes in packings
Authors:
Douglas R. Stinson,
Ruizhong Wei
Abstract:
The integer $β(ρ, v, k)$ is defined to be the maximum number of blocks in any $(v, k)$-packing in which the maximum partial parallel class (or PPC) has size $ρ$. This problem was introduced and studied by Stinson for the case $k=3$. Here, we mainly consider the case $k = 4$ and we obtain some upper bounds and lower bounds on $β(ρ, v, 4)$. We also provide some explicit constructions of $(v,4)$-pack…
▽ More
The integer $β(ρ, v, k)$ is defined to be the maximum number of blocks in any $(v, k)$-packing in which the maximum partial parallel class (or PPC) has size $ρ$. This problem was introduced and studied by Stinson for the case $k=3$. Here, we mainly consider the case $k = 4$ and we obtain some upper bounds and lower bounds on $β(ρ, v, 4)$. We also provide some explicit constructions of $(v,4)$-packings having a maximum PPC of a given size $ρ$. For small values of $ρ$, the number of blocks of the constructed packings are very close to the upper bounds on $β(ρ, v, 4)$. Some of our methods are extended to the cases $k > 4$.
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Dilated convolutional neural network-based deep reference picture generation for video compression
Authors:
Haoyue Tian,
Pan Gao,
Ran Wei,
Manoranjan Paul
Abstract:
Motion estimation and motion compensation are indispensable parts of inter prediction in video coding. Since the motion vector of objects is mostly in fractional pixel units, original reference pictures may not accurately provide a suitable reference for motion compensation. In this paper, we propose a deep reference picture generator which can create a picture that is more relevant to the current…
▽ More
Motion estimation and motion compensation are indispensable parts of inter prediction in video coding. Since the motion vector of objects is mostly in fractional pixel units, original reference pictures may not accurately provide a suitable reference for motion compensation. In this paper, we propose a deep reference picture generator which can create a picture that is more relevant to the current encoding frame, thereby further reducing temporal redundancy and improving video compression efficiency. Inspired by the recent progress of Convolutional Neural Network(CNN), this paper proposes to use a dilated CNN to build the generator. Moreover, we insert the generated deep picture into Versatile Video Coding(VVC) as a reference picture and perform a comprehensive set of experiments to evaluate the effectiveness of our network on the latest VVC Test Model VTM. The experimental results demonstrate that our proposed method achieves on average 9.7% bit saving compared with VVC under low-delay P configuration.
△ Less
Submitted 11 February, 2022;
originally announced February 2022.