Skip to main content

Showing 1–44 of 44 results for author: Dong, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17951  [pdf, other

    cs.LG cs.DC

    Navigating High-Degree Heterogeneity: Federated Learning in Aerial and Space Networks

    Authors: Fan Dong, Henry Leung, Steve Drew

    Abstract: Federated learning offers a compelling solution to the challenges of networking and data privacy within aerial and space networks by utilizing vast private edge data and computing capabilities accessible through drones, balloons, and satellites. While current research has focused on optimizing the learning process, computing efficiency, and minimizing communication overhead, the issue of heterogen… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2406.02345  [pdf, other

    cs.CV cs.AI cs.LG cs.MM

    Progressive Confident Masking Attention Network for Audio-Visual Segmentation

    Authors: Yuxuan Wang, Feng Dong, **chao Zhu

    Abstract: Audio and visual signals typically occur simultaneously, and humans possess an innate ability to correlate and synchronize information from these two modalities. Recently, a challenging problem known as Audio-Visual Segmentation (AVS) has emerged, intending to produce segmentation maps for sounding objects within a scene. However, the methods proposed so far have not sufficiently integrated audio… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 10 pages, 9 figures, submitted to IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY

  3. arXiv:2405.20281  [pdf, other

    cs.CR quant-ph

    Tight Characterizations for Preprocessing against Cryptographic Salting

    Authors: Fangqi Dong, Qipeng Liu, Kewen Wu

    Abstract: Cryptography often considers the strongest yet plausible attacks in the real world. Preprocessing (a.k.a. non-uniform attack) plays an important role in both theory and practice: an efficient online attacker can take advantage of advice prepared by a time-consuming preprocessing stage. Salting is a heuristic strategy to counter preprocessing attacks by feeding a small amount of randomness to the… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2405.19711  [pdf

    cs.DS

    SimiSketch: Efficiently Estimating Similarity of streaming Multisets

    Authors: Fenghao Dong, Yang He, Yutong Liang, Zirui Liu, Yuhan Wu, Peiqing Chen, Tong Yang

    Abstract: The challenge of estimating similarity between sets has been a significant concern in data science, finding diverse applications across various domains. However, previous approaches, such as MinHash, have predominantly centered around hashing techniques, which are well-suited for sets but less naturally adaptable to multisets, a common occurrence in scenarios like network streams and text data. Mo… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  5. arXiv:2404.15503  [pdf, other

    cs.LG cs.AI cs.DC

    FedGreen: Carbon-aware Federated Learning with Model Size Adaptation

    Authors: Ali Abbasi, Fan Dong, Xin Wang, Henry Leung, Jiayu Zhou, Steve Drew

    Abstract: Federated learning (FL) provides a promising collaborative framework to build a model from distributed clients, and this work investigates the carbon emission of the FL process. Cloud and edge servers hosting FL clients may exhibit diverse carbon footprints influenced by their geographical locations with varying power sources, offering opportunities to reduce carbon emissions by training local mod… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  6. arXiv:2404.08188  [pdf, other

    cs.IT eess.SP

    Fundamental Limits of Communication-Assisted Sensing in ISAC Systems

    Authors: Fuwang Dong, Fan Liu, Shihang Liu, Yifeng Xiong, Weijie Yuan, Yuanhao Cui

    Abstract: In this paper, we introduce a novel communication-assisted sensing (CAS) framework that explores the potential coordination gains offered by the integrated sensing and communication technique. The CAS system endows users with beyond-line-of-the-sight sensing capabilities, supported by a dual-functional base station that enables simultaneous sensing and communication. To delve into the system's fun… ▽ More

    Submitted 23 April, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by ISIT. The updated version will be coming soon

  7. arXiv:2404.04856  [pdf, other

    cs.CV cs.AI

    Msmsfnet: a multi-stream and multi-scale fusion net for edge detection

    Authors: Chenguang Liu, Chisheng Wang, Feifei Dong, Xin Su, Chuanhua Zhu, De** Zhang, Qingquan Li

    Abstract: Edge detection is a long standing problem in computer vision. Recent deep learning based algorithms achieve state of-the-art performance in publicly available datasets. Despite the efficiency of these algorithms, their performance, however, relies heavily on the pretrained weights of the backbone network on the ImageNet dataset. This limits heavily the design space of deep learning based edge dete… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  8. NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation

    Authors: Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li

    Abstract: Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios of APT attacks by using provenance graphs to model system entities and their dependencies. Particularly, to accelerate attack detection and reduce financial losses, online provenance… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

    Comments: The final version of this paper is going to appear in the Conference on Network and Distributed System Security Symposium (NDSS'24), 26 Feb - 1 Mar 2024, San Diego, California

  9. arXiv:2311.01822  [pdf, other

    cs.IT eess.SP

    Random ISAC Signals Deserve Dedicated Precoding

    Authors: Shihang Lu, Fan Liu, Fuwang Dong, Yifeng Xiong, Jie Xu, Ya-Feng Liu, Shi **

    Abstract: Radar systems typically employ well-designed deterministic signals for target sensing, while integrated sensing and communications (ISAC) systems have to adopt random signals to convey useful information. This paper analyzes the sensing and ISAC performance relying on random signaling in a multi-antenna system. Towards this end, we define a new sensing performance metric, namely, ergodic linear mi… ▽ More

    Submitted 31 March, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

    Comments: 15 pages, 12 figures

  10. arXiv:2309.07589  [pdf, other

    cs.MM eess.IV

    MPAI-EEV: Standardization Efforts of Artificial Intelligence based End-to-End Video Coding

    Authors: Chuanmin Jia, Feng Ye, Fanke Dong, Kai Lin, Leonardo Chiariglione, Siwei Ma, Huifang Sun, Wen Gao

    Abstract: The rapid advancement of artificial intelligence (AI) technology has led to the prioritization of standardizing the processing, coding, and transmission of video using neural networks. To address this priority area, the Moving Picture, Audio, and Data Coding by Artificial Intelligence (MPAI) group is develo** a suite of standards called MPAI-EEV for "end-to-end optimized neural video coding." Th… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  11. arXiv:2307.08349  [pdf, other

    cs.CR

    Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

    Authors: Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen

    Abstract: Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is still unclear whether the industry will adopt P-EDR systems and what improvements the industry desires for P-EDR systems. To this end, we conduct the first set of systematic studies… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: The final version of this paper is going to appear in the ACM SIGSAC Conference on Computer and Communications Security (CCS'23), November 26-30, 2023, Copenhagen, Denmark

  12. Federated Learning on Non-iid Data via Local and Global Distillation

    Authors: Xiaolin Zheng, Senci Ying, Fei Zheng, Jianwei Yin, Longfei Zheng, Chaochao Chen, Fengqin Dong

    Abstract: Most existing federated learning algorithms are based on the vanilla FedAvg scheme. However, with the increase of data complexity and the number of model parameters, the amount of communication traffic and the number of iteration rounds for training such algorithms increases significantly, especially in non-independently and homogeneously distributed scenarios, where they do not achieve satisfacto… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: Accpeted in IEEE ICWS 2023

  13. arXiv:2305.16351  [pdf, other

    cs.LG cs.AI cs.DC

    Federated Learning Model Aggregation in Heterogenous Aerial and Space Networks

    Authors: Fan Dong, Ali Abbasi, Henry Leung, Xin Wang, Jiayu Zhou, Steve Drew

    Abstract: Federated learning offers a promising approach under the constraints of networking and data privacy constraints in aerial and space networks (ASNs), utilizing large-scale private edge data from drones, balloons, and satellites. Existing research has extensively studied the optimization of the learning process, computing efficiency, and communication overhead. An important yet often overlooked aspe… ▽ More

    Submitted 16 April, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: 6 pages, 7 figures, accepted by IEEE ICC workshop on emerging technologies in aerial and space networks 2024

    ACM Class: I.2.11; C.2.4

  14. arXiv:2305.00179  [pdf, other

    cs.IT eess.SP

    Integrated Sensing and Communications: Recent Advances and Ten Open Challenges

    Authors: Shihang Lu, Fan Liu, Yunxin Li, Kecheng Zhang, Hongjia Huang, Jiaqi Zou, Xinyu Li, Yuxiang Dong, Fuwang Dong, Jia Zhu, Yifeng Xiong, Weijie Yuan, Yuanhao Cui, Lajos Hanzo

    Abstract: It is anticipated that integrated sensing and communications (ISAC) would be one of the key enablers of next-generation wireless networks (such as beyond 5G (B5G) and 6G) for supporting a variety of emerging applications. In this paper, we provide a comprehensive review of the recent advances in ISAC systems, with a particular focus on their foundations, system design, networking aspects and ISAC… ▽ More

    Submitted 17 December, 2023; v1 submitted 29 April, 2023; originally announced May 2023.

    Comments: 26 pages, 22 figures, resubmitted to IEEE Journal. Appreciation for the outstanding contributions of coauthors in the paper!

  15. arXiv:2304.14660  [pdf, other

    eess.IV cs.CV cs.LG

    Segment Anything Model for Medical Images?

    Authors: Yuhao Huang, Xin Yang, Lian Liu, Han Zhou, Ao Chang, Xinrui Zhou, Rusi Chen, Junxuan Yu, Jiongquan Chen, Chaoyu Chen, Si**g Liu, Haozhe Chi, Xindi Hu, Kejuan Yue, Lei Li, Vicente Grau, Deng-** Fan, Fa** Dong, Dong Ni

    Abstract: The Segment Anything Model (SAM) is the first foundation model for general image segmentation. It has achieved impressive results on various natural image segmentation tasks. However, medical image segmentation (MIS) is more challenging because of the complex modalities, fine anatomical structures, uncertain and complex object boundaries, and wide-range object scales. To fully validate SAM's perfo… ▽ More

    Submitted 17 January, 2024; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: Accepted by Medical Image Analysis. 23 pages, 18 figures, 8 tables

  16. arXiv:2303.12946  [pdf, other

    cs.CV

    Underwater Camouflage Object Detection Dataset

    Authors: Feng Dong, **chao Zhu

    Abstract: We have made a dataset of camouflage object detection mainly for complex seabed scenes, and named it UnderWater RGB&Sonar,or UW-RS for short. The UW-RS dataset contains a total of 1972 image data. The dataset mainly consists of two parts, namely underwater optical data part (UW-R dataset) and underwater sonar data part (UW-S dataset).

    Submitted 1 March, 2023; originally announced March 2023.

  17. Label Information Enhanced Fraud Detection against Low Homophily in Graphs

    Authors: Yuchen Wang, **ghui Zhang, Zhengjie Huang, Weibin Li, Shikun Feng, Ziheng Ma, Yu Sun, Dianhai Yu, Fang Dong, Jiahui **, Beilun Wang, Junzhou Luo

    Abstract: Node classification is a substantial problem in graph-based fraud detection. Many existing works adopt Graph Neural Networks (GNNs) to enhance fraud detectors. While promising, currently most GNN-based fraud detectors fail to generalize to the low homophily setting. Besides, label utilization has been proved to be significant factor for node classification problem. But we find they are less effect… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: Accepted to The ACM Webconf 2023

  18. arXiv:2302.03654  [pdf, other

    cs.LG

    A Privacy-Preserving Hybrid Federated Learning Framework for Financial Crime Detection

    Authors: Haobo Zhang, Junyuan Hong, Fan Dong, Steve Drew, Liangjie Xue, Jiayu Zhou

    Abstract: The recent decade witnessed a surge of increase in financial crimes across the public and private sectors, with an average cost of scams of $102m to financial institutions in 2022. Develo** a mechanism for battling financial crimes is an impending task that requires in-depth collaboration from multiple institutions, and yet such collaboration imposed significant technical challenges due to the p… ▽ More

    Submitted 18 April, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: PETs prize challenge version

  19. arXiv:2302.02573  [pdf, other

    cs.LG cs.DC

    Topology-aware Federated Learning in Edge Computing: A Comprehensive Survey

    Authors: Jiajun Wu, Steve Drew, Fan Dong, Zhuangdi Zhu, Jiayu Zhou

    Abstract: The ultra-low latency requirements of 5G/6G applications and privacy constraints call for distributed machine learning systems to be deployed at the edge. With its simple yet effective approach, federated learning (FL) is a natural solution for massive user-owned devices in edge computing with distributed and private training data. FL methods based on FedAvg typically follow a naive star topology,… ▽ More

    Submitted 17 June, 2024; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: Accepted by ACM Computing Surveys

  20. arXiv:2211.06097  [pdf, other

    cs.CV cs.AI

    Interactive Context-Aware Network for RGB-T Salient Object Detection

    Authors: Yuxuan Wang, Feng Dong, **chao Zhu

    Abstract: Salient object detection (SOD) focuses on distinguishing the most conspicuous objects in the scene. However, most related works are based on RGB images, which lose massive useful information. Accordingly, with the maturity of thermal technology, RGB-T (RGB-Thermal) multi-modality tasks attain more and more attention. Thermal infrared images carry important information which can be used to improve… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

    Comments: 17 pages, 7 figures

    ACM Class: I.2.10; I.4.8; I.4.6

  21. arXiv:2206.01496  [pdf

    cs.LG cs.AI stat.ME

    Causality Learning With Wasserstein Generative Adversarial Networks

    Authors: Hristo Petkov, Colin Hanley, Feng Dong

    Abstract: Conventional methods for causal structure learning from data face significant challenges due to combinatorial search space. Recently, the problem has been formulated into a continuous optimization framework with an acyclicity constraint to learn Directed Acyclic Graphs (DAGs). Such a framework allows the utilization of deep generative models for causal structure learning to better capture the rela… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.00387

  22. arXiv:2205.08231  [pdf, other

    cs.LG

    Hyper-Learning for Gradient-Based Batch Size Adaptation

    Authors: Calum Robert MacLellan, Feng Dong

    Abstract: Scheduling the batch size to increase is an effective strategy to control gradient noise when training deep neural networks. Current approaches implement scheduling heuristics that neglect structure within the optimization procedure, limiting their flexibility to the training dynamics and capacity to discern the impact of their adaptations on generalization. We introduce Arbiter as a new hyperpara… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

  23. DAG-WGAN: Causal Structure Learning With Wasserstein Generative Adversarial Networks

    Authors: Hristo Petkov, Colin Hanley, Feng Dong

    Abstract: The combinatorial search space presents a significant challenge to learning causality from data. Recently, the problem has been formulated into a continuous optimization framework with an acyclicity constraint, allowing for the exploration of deep generative models to better capture data sample distributions and support the discovery of Directed Acyclic Graphs (DAGs) that faithfully represent the… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8th International Conference on Artificial Intelligence and Applications (AIFU 2022)

  24. arXiv:2111.02493  [pdf

    eess.SP cs.AI cs.CV physics.ins-det

    Roadmap on Signal Processing for Next Generation Measurement Systems

    Authors: D. K. Iakovidis, M. Ooi, Y. C. Kuang, S. Demidenko, A. Shestakov, V. Sinitsin, M. Henry, A. Sciacchitano, A. Discetti, S. Donati, M. Norgia, A. Menychtas, I. Maglogiannis, S. C. Wriessnegger, L. A. Barradas Chacon, G. Dimas, D. Filos, A. H. Aletras, J. Töger, F. Dong, S. Ren, A. Uhl, J. Paziewski, J. Geng, F. Fioranelli , et al. (9 additional authors not shown)

    Abstract: Signal processing is a fundamental component of almost any sensor-enabled system, with a wide range of applications across different scientific disciplines. Time series data, images, and video sequences comprise representative forms of signals that can be enhanced and analysed for information extraction and quantification. The recent advances in artificial intelligence and machine learning are shi… ▽ More

    Submitted 28 January, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 48 pages, https://iopscience.iop.org/article/10.1088/1361-6501/ac2dbd

    Journal ref: Measurement Science and Technology 33(1) (2022) 1-48

  25. Modal-Adaptive Gated Recoding Network for RGB-D Salient Object Detection

    Authors: **chao Zhu, Xiaoyu Zhang, Xian Fang, Feng Dong, Qiu Yu

    Abstract: The multi-modal salient object detection model based on RGB-D information has better robustness in the real world. However, it remains nontrivial to better adaptively balance effective multi-modal information in the feature fusion phase. In this letter, we propose a novel gated recoding network (GRNet) to evaluate the information validity of the two modes, and balance their influence. Our framewor… ▽ More

    Submitted 9 November, 2021; v1 submitted 13 August, 2021; originally announced August 2021.

  26. arXiv:2107.12560  [pdf, other

    cs.CV

    Perception-and-Regulation Network for Salient Object Detection

    Authors: **chao Zhu, Xiaoyu Zhang, Xian Fang, Feng Dong, Li Yuehua, Junnan Liu

    Abstract: Effective fusion of different types of features is the key to salient object detection. The majority of existing network structure design is based on the subjective experience of scholars and the process of feature fusion does not consider the relationship between the fused features and highest-level features. In this paper, we focus on the feature relationship and propose a novel global attention… ▽ More

    Submitted 10 February, 2022; v1 submitted 26 July, 2021; originally announced July 2021.

  27. arXiv:2102.08503  [pdf, other

    cs.LG

    Federated Evaluation and Tuning for On-Device Personalization: System Design & Applications

    Authors: Matthias Paulik, Matt Seigel, Henry Mason, Dominic Telaar, Joris Kluivers, Rogier van Dalen, Chi Wai Lau, Luke Carlson, Filip Granqvist, Chris Vandevelde, Sudeep Agarwal, Julien Freudiger, Andrew Byde, Abhishek Bhowmick, Gaurav Kapoor, Si Beaumont, Áine Cahill, Dominic Hughes, Omid Javidbakht, Fei Dong, Rehan Rishi, Stanley Hung

    Abstract: We describe the design of our federated task processing system. Originally, the system was created to support two specific federated tasks: evaluation and tuning of on-device ML systems, primarily for the purpose of personalizing these systems. In recent years, support for an additional federated task has been added: federated learning (FL) of deep neural networks. To our knowledge, only one other… ▽ More

    Submitted 16 February, 2021; originally announced February 2021.

    Comments: 11 pages, 1 figure

  28. arXiv:2101.04979  [pdf, other

    cs.SD eess.AS

    Deep Attention-based Representation Learning for Heart Sound Classification

    Authors: Zhao Ren, Kun Qian, Fengquan Dong, Zhenyu Dai, Yoshiharu Yamamoto, Björn W. Schuller

    Abstract: Cardiovascular diseases are the leading cause of deaths and severely threaten human health in daily life. On the one hand, there have been dramatically increasing demands from both the clinical practice and the smart home application for monitoring the heart status of subjects suffering from chronic cardiovascular diseases. On the other hand, experienced physicians who can perform an efficient aus… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

  29. Learning under Concept Drift: A Review

    Authors: Jie Lu, An** Liu, Fan Dong, Feng Gu, Joao Gama, Guangquan Zhang

    Abstract: Concept drift describes unforeseeable changes in the underlying distribution of streaming data over time. Concept drift research involves the development of methodologies and techniques for drift detection, understanding and adaptation. Data analysis has revealed that machine learning in a concept drift environment will result in poor learning results if the drift is not addressed. To help researc… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

    Journal ref: IEEE Transactions on Knowledge and Data Engineering 31, no. 12 (2018): 2346-2363

  30. arXiv:2003.00359  [pdf, other

    cs.LG cs.AI stat.ML

    Contextual-Bandit Based Personalized Recommendation with Time-Varying User Interests

    Authors: Xiao Xu, Fang Dong, Yanghua Li, Shaojian He, Xin Li

    Abstract: A contextual bandit problem is studied in a highly non-stationary environment, which is ubiquitous in various recommender systems due to the time-varying interests of users. Two models with disjoint and hybrid payoffs are considered to characterize the phenomenon that users' preferences towards different items vary differently over time. In the disjoint payoff model, the reward of playing an arm i… ▽ More

    Submitted 29 February, 2020; originally announced March 2020.

    Comments: Accepted by AAAI 20

  31. MadDroid: Characterising and Detecting Devious Ad Content for Android Apps

    Authors: Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Advertisement drives the economy of the mobile app ecosystem. As a key component in the mobile ad business model, mobile ad content has been overlooked by the research community, which poses a number of threats, e.g., propagating malware and undesirable contents. To understand the practice of these devious ad behaviors, we perform a large-scale study on the app contents harvested through automated… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Comments: To be published in The Web Conference 2020 (WWW'20)

  32. An Action Recognition network for specific target based on rMC and RPN

    Authors: Mingjie Li, Youqian Feng, Zhonghai Yin, Cheng Zhou, Fanghao Dong, Yuan Lin, Yuhao Dong

    Abstract: The traditional methods of action recognition are not specific for the operator, thus results are easy to be disturbed when other actions are operated in videos. The network based on mixed convolutional resnet and RPN is proposed in this paper. The rMC is tested in the data set of UCF-101 to compare with the method of R3D. The result shows that its correct rate reaches 71.07%. Meanwhile, the actio… ▽ More

    Submitted 19 June, 2019; originally announced June 2019.

    Comments: 10 pages, 14 figures

  33. arXiv:1906.07527  [pdf

    cs.CV

    Impoved RPN for Single Targets Detection based on the Anchor Mask Net

    Authors: Mingjie Li, Youqian Feng, Zhonghai Yin, Cheng Zhou, Fanghao Dong

    Abstract: Common target detection is usually based on single frame images, which is vulnerable to affected by the similar targets in the image and not applicable to video images. In this paper , anchor mask is proposed to add the prior knowledge for target detection and an anchor mask net is designed to impove the RPN performance for single target detection. Tested in the VOT2016, the model perform better.

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 10 pages,9 Figure

  34. arXiv:1709.01213  [pdf, other

    cs.CR

    FraudDroid: Automated Ad Fraud Detection for Android Apps

    Authors: Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawende F. Bissyande, Tianming Liu, Guoai Xu, Jacques Klein

    Abstract: Although mobile ad frauds have been widespread, state-of-the-art approaches in the literature have mainly focused on detecting the so-called static placement frauds, where only a single UI state is involved and can be identified based on static information such as the size or location of ad views. Other types of fraud exist that involve multiple UI states and are performed dynamically while users… ▽ More

    Submitted 13 June, 2018; v1 submitted 4 September, 2017; originally announced September 2017.

    Comments: 12 pages, 10 figures

  35. arXiv:1707.05127  [pdf, other

    cs.CL

    Neural Reranking for Named Entity Recognition

    Authors: Jie Yang, Yue Zhang, Fei Dong

    Abstract: We propose a neural reranking system for named entity recognition (NER). The basic idea is to leverage recurrent neural network models to learn sentence-level patterns that involve named entity mentions. In particular, given an output sentence produced by a baseline NER model, we replace all entity mentions, such as \textit{Barack Obama}, into their entity types, such as \textit{PER}. The resultin… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.

    Comments: Accepted as regular paper by RANLP 2017

  36. arXiv:1704.08960  [pdf, other

    cs.CL

    Neural Word Segmentation with Rich Pretraining

    Authors: Jie Yang, Yue Zhang, Fei Dong

    Abstract: Neural word segmentation research has benefited from large-scale raw texts by leveraging them for pretraining character and word embeddings. On the other hand, statistical segmentation research has exploited richer sources of external information, such as punctuation, automatic segmentation and POS. We investigate the effectiveness of a range of external training sources for neural word segmentati… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

    Comments: Accepted by ACL 2017

  37. arXiv:1506.08352  [pdf, ps, other

    cs.SI cs.NI physics.soc-ph

    Threshold for the Outbreak of Cascading Failures in Degree-degree Uncorrelated Networks

    Authors: Junbiao Liu, Xinyu **, Lurong Jiang, Yongxiang Xia, Bo Ouyang, Fang Dong, Yicong Lang, Wen** Zhang

    Abstract: In complex networks, the failure of one or very few nodes may cause cascading failures. When this dynamical process stops in steady state, the size of the giant component formed by remaining un-failed nodes can be used to measure the severity of cascading failures, which is critically important for estimating the robustness of networks. In this paper, we provide a cascade of overload failure model… ▽ More

    Submitted 27 June, 2015; originally announced June 2015.

    Comments: 11 pages, 4 figures

  38. arXiv:1301.3451   

    stat.ME cs.DS math.OC math.ST

    Eigenstructure of Maximum Likelihood from Counts Data

    Authors: Fanghu Dong

    Abstract: The MLE (Maximum Likelihood Estimate) for a multinomial model is proportional to the data. We call such estimate an eigenestimate and the relationship of it to the data as the eigenstructure. When the multinomial model is generalized to deal with data arise from incomplete or censored categorical counts, we would naturally look for this eigenstructure between MLE and data. The paper finds the alge… ▽ More

    Submitted 31 December, 2017; v1 submitted 15 January, 2013; originally announced January 2013.

    Comments: The current article contains premature results which is refined in another published articles. I want to withdraw it in order to reduce the confusion

    MSC Class: 62H05; 62G05; 90C56; 62F07; 26D05; 62H17; 13P25; 90C06

  39. arXiv:1001.4099  [pdf

    cs.NE cs.CG

    Ant Colony Algorithm for the Weighted Item Layout Optimization Problem

    Authors: Yi-Chun Xu, Fang-Min Dong, Yong Liu, Ren-Bin Xiao, Martyn Amos

    Abstract: This paper discusses the problem of placing weighted items in a circular container in two-dimensional space. This problem is of great practical significance in various mechanical engineering domains, such as the design of communication satellites. Two constructive heuristics are proposed, one for packing circular items and the other for packing rectangular items. These work by first optimizing o… ▽ More

    Submitted 24 January, 2010; originally announced January 2010.

    Comments: Submitted. Replaces version with formatting errors due to PDF conversion

  40. arXiv:0904.1631  [pdf

    cs.RO cs.AI cs.HC

    Intent expression using eye robot for mascot robot system

    Authors: Yoichi Yamazaki, Fangyan Dong, Yuta Masuda, Yukiko Uehara, Petar Kormushev, Hai An Vu, Phuc Quang Le, Kaoru Hirota

    Abstract: An intent expression system using eye robots is proposed for a mascot robot system from a viewpoint of humatronics. The eye robot aims at providing a basic interface method for an information terminal robot system. To achieve better understanding of the displayed information, the importance and the degree of certainty of the information should be communicated along with the main content. The pro… ▽ More

    Submitted 9 April, 2009; originally announced April 2009.

    Comments: 5 pages

    Journal ref: 8th International Symposium on Advanced Intelligent Systems (ISIS2007), pp. 576-580, 2007

  41. arXiv:0904.1629  [pdf

    cs.RO cs.AI cs.HC

    Fuzzy inference based mentality estimation for eye robot agent

    Authors: Yoichi Yamazaki, Fangyan Dong, Yuta Masuda, Yukiko Uehara, Petar Kormushev, Hai An Vu, Phuc Quang Le, Kaoru Hirota

    Abstract: Household robots need to communicate with human beings in a friendly fashion. To achieve better understanding of displayed information, an importance and a certainty of the information should be communicated together with the main information. The proposed intent expression system aims to convey this additional information using an eye robot. The eye motions are represented as states in a pleasu… ▽ More

    Submitted 9 April, 2009; originally announced April 2009.

    Comments: 2 pages, in Japanese

    Journal ref: Proceedings of 23rd Fuzzy System Symposium (FSS 2007), pp. 387-388, 2007

  42. arXiv:0904.0546  [pdf

    cs.AI cs.LG cs.RO

    Eligibility Propagation to Speed up Time Hop** for Reinforcement Learning

    Authors: Petar Kormushev, Kohei Nomoto, Fangyan Dong, Kaoru Hirota

    Abstract: A mechanism called Eligibility Propagation is proposed to speed up the Time Hop** technique used for faster Reinforcement Learning in simulations. Eligibility Propagation provides for Time Hop** similar abilities to what eligibility traces provide for conventional Reinforcement Learning. It propagates values from one state to all of its temporal predecessors using a state transitions graph.… ▽ More

    Submitted 3 April, 2009; originally announced April 2009.

    Comments: 7 pages

  43. arXiv:0904.0545   

    cs.AI cs.LG cs.RO

    Time Hop** technique for faster reinforcement learning in simulations

    Authors: Petar Kormushev, Kohei Nomoto, Fangyan Dong, Kaoru Hirota

    Abstract: This preprint has been withdrawn by the author for revision

    Submitted 6 September, 2011; v1 submitted 3 April, 2009; originally announced April 2009.

    Comments: This preprint has been withdrawn by the author for revision

  44. arXiv:0903.4930  [pdf

    cs.AI cs.LG cs.RO

    Time manipulation technique for speeding up reinforcement learning in simulations

    Authors: Petar Kormushev, Kohei Nomoto, Fangyan Dong, Kaoru Hirota

    Abstract: A technique for speeding up reinforcement learning algorithms by using time manipulation is proposed. It is applicable to failure-avoidance control problems running in a computer simulation. Turning the time of the simulation backwards on failure events is shown to speed up the learning by 260% and improve the state space exploration by 12% on the cart-pole balancing task, compared to the conven… ▽ More

    Submitted 27 March, 2009; originally announced March 2009.

    Comments: 12 pages

    Journal ref: International Journal of Cybernetics and Information Technologies, vol. 8, no. 1, pp. 12-24, 2008