Skip to main content

Showing 1–50 of 55 results for author: Fei, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13743  [pdf, other

    cs.CV cs.AI cs.CL cs.LG cs.MM

    GenAI-Bench: Evaluating and Improving Compositional Text-to-Visual Generation

    Authors: Baiqi Li, Zhiqiu Lin, Deepak Pathak, Jiayao Li, Yixin Fei, Kewen Wu, Tiffany Ling, Xide Xia, Pengchuan Zhang, Graham Neubig, Deva Ramanan

    Abstract: While text-to-visual models now produce photo-realistic images and videos, they struggle with compositional text prompts involving attributes, relationships, and higher-order reasoning such as logic and comparison. In this work, we conduct an extensive human study on GenAI-Bench to evaluate the performance of leading image and video generation models in various aspects of compositional text-to-vis… ▽ More

    Submitted 21 June, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

    Comments: We open-source our dataset, model, and code at: https://linzhiqiu.github.io/papers/genai_bench ; Project page: https://linzhiqiu.github.io/papers/genai_bench ; GenAI-Bench was first introduced in arxiv:2404.01291. This article extends it with an additional GenAI-Rank benchmark.

  2. arXiv:2405.20681  [pdf, other

    cs.CR cs.AI

    No Free Lunch Theorem for Privacy-Preserving LLM Inference

    Authors: Xiao** Zhang, Yulin Fei, Yan Kang, Wei Chen, Lixin Fan, Hai **, Qiang Yang

    Abstract: Individuals and businesses have been significantly benefited by Large Language Models (LLMs) including PaLM, Gemini and ChatGPT in various ways. For example, LLMs enhance productivity, reduce costs, and enable us to focus on more valuable tasks. Furthermore, LLMs possess the capacity to sift through extensive datasets, uncover underlying patterns, and furnish critical insights that propel the fron… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  3. arXiv:2405.13930  [pdf, other

    cond-mat.mtrl-sci cs.RO cs.SE

    AlabOS: A Python-based Reconfigurable Workflow Management Framework for Autonomous Laboratories

    Authors: Yuxing Fei, Bernardus Rendy, Rishi Kumar, Olympia Dartsi, Hrushikesh P. Sahasrabuddhe, Matthew J. McDermott, Zheren Wang, Nathan J. Szymanski, Lauren N. Walters, David Milsted, Yan Zeng, Anubhav Jain, Gerbrand Ceder

    Abstract: The recent advent of autonomous laboratories, coupled with algorithms for high-throughput screening and active learning, promises to accelerate materials discovery and innovation. As these autonomous systems grow in complexity, the demand for robust and efficient workflow management software becomes increasingly critical. In this paper, we introduce AlabOS, a general-purpose software framework for… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

    Comments: 30 pages, 5 figures

  4. arXiv:2405.02724  [pdf, ps, other

    cs.LG cs.GT

    Taming Equilibrium Bias in Risk-Sensitive Multi-Agent Reinforcement Learning

    Authors: Yingjie Fei, Ruitu Xu

    Abstract: We study risk-sensitive multi-agent reinforcement learning under general-sum Markov games, where agents optimize the entropic risk measure of rewards with possibly diverse risk preferences. We show that using the regret naively adapted from existing literature as a performance metric could induce policies with equilibrium bias that favor the most risk-sensitive agents and overlook the other agents… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 29 pages

  5. arXiv:2404.11103  [pdf, ps, other

    cs.DS

    Distribution-Free Testing of Decision Lists with a Sublinear Number of Queries

    Authors: Xi Chen, Yumou Fei, Shyamal Patel

    Abstract: We give a distribution-free testing algorithm for decision lists with $\tilde{O}(n^{11/12}/\varepsilon^3)$ queries. This is the first sublinear algorithm for this problem, which shows that, unlike halfspaces, testing is strictly easier than learning for decision lists. Complementing the algorithm, we show that any distribution-free tester for decision lists must make $\tildeΩ(\sqrt{n})$ queries, o… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: To appear in STOC 2024

  6. arXiv:2404.10253  [pdf, other

    cs.DC

    Kilometer-Level Coupled Modeling Using 40 Million Cores: An Eight-Year Journey of Model Development

    Authors: Xiaohui Duan, Yuxuan Li, Zhao Liu, Bin Yang, Juepeng Zheng, Haohuan Fu, Shaoqing Zhang, Shiming Xu, Yang Gao, Wei Xue, Di Wei, Xiao**g Lv, Lifeng Yan, Haopeng Huang, Haitian Lu, Lingfeng Wan, Haoran Lin, Qixin Chang, Chenlin Li, Quanjie He, Zeyu Song, Xuantong Wang, Yangyang Yu, Xilong Fan, Zhaopeng Qu , et al. (16 additional authors not shown)

    Abstract: With current and future leading systems adopting heterogeneous architectures, adapting existing models for heterogeneous supercomputers is of urgent need for improving model resolution and reducing modeling uncertainty. This paper presents our three-week effort on porting a complex earth system model, CESM 2.2, to a 40-million-core Sunway supercomputer. Taking a non-intrusive approach that tries t… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

    Comments: 18 pages, 13 figures

  7. arXiv:2404.01563  [pdf

    eess.IV cs.CV

    Two-Phase Multi-Dose-Level PET Image Reconstruction with Dose Level Awareness

    Authors: Yuchen Fei, Yanmei Luo, Yan Wang, Jiaqi Cui, Yuanyuan Xu, Jiliu Zhou, Dinggang Shen

    Abstract: To obtain high-quality positron emission tomography (PET) while minimizing radiation exposure, a range of methods have been designed to reconstruct standard-dose PET (SPET) from corresponding low-dose PET (LPET) images. However, most current methods merely learn the map** between single-dose-level LPET and SPET images, but omit the dose disparity of LPET images in clinical scenarios. In this pap… ▽ More

    Submitted 10 April, 2024; v1 submitted 1 April, 2024; originally announced April 2024.

    Comments: Accepted by ISBI2024

  8. arXiv:2403.16591  [pdf, other

    cs.LG cs.AI cs.CR

    Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy

    Authors: Xiao** Zhang, Yulin Fei, Wei Chen

    Abstract: The swift evolution of machine learning has led to emergence of various definitions of privacy due to the threats it poses to privacy, including the concept of local differential privacy (LDP). Although widely embraced and utilized across numerous domains, this conventional approach to measure privacy still exhibits certain limitations, spanning from failure to prevent inferential disclosure to la… ▽ More

    Submitted 2 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  9. arXiv:2402.19007  [pdf, other

    cs.CV cs.RO

    DOZE: A Dataset for Open-Vocabulary Zero-Shot Object Navigation in Dynamic Environments

    Authors: Ji Ma, Hongming Dai, Yao Mu, Pengying Wu, Hao Wang, Xiaowei Chi, Yang Fei, Shanghang Zhang, Chang Liu

    Abstract: Zero-Shot Object Navigation (ZSON) requires agents to autonomously locate and approach unseen objects in unfamiliar environments and has emerged as a particularly challenging task within the domain of Embodied AI. Existing datasets for develo** ZSON algorithms lack consideration of dynamic obstacles, object attribute diversity, and scene texts, thus exhibiting noticeable discrepancy from real-wo… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

  10. arXiv:2402.18879  [pdf

    cs.CV

    Dose Prediction Driven Radiotherapy Paramters Regression via Intra- and Inter-Relation Modeling

    Authors: Jiaqi Cui, Yuanyuan Xu, Jianghong Xiao, Yuchen Fei, Jiliu Zhou, Xingcheng Peng, Yan Wang

    Abstract: Deep learning has facilitated the automation of radiotherapy by predicting accurate dose distribution maps. However, existing methods fail to derive the desirable radiotherapy parameters that can be directly input into the treatment planning system (TPS), impeding the full automation of radiotherapy. To enable more thorough automatic radiotherapy, in this paper, we propose a novel two-stage framew… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: Accepted by ISBI 2024

  11. arXiv:2402.18679  [pdf, other

    cs.AI cs.LG

    Data Interpreter: An LLM Agent For Data Science

    Authors: Sirui Hong, Yizhang Lin, Bang Liu, Bangbang Liu, Binhao Wu, Danyang Li, Jiaqi Chen, Jiayi Zhang, **lin Wang, Li Zhang, Lingyao Zhang, Min Yang, Mingchen Zhuge, Taicheng Guo, Tuo Zhou, Wei Tao, Wenyi Wang, Xiangru Tang, Xiangtao Lu, Xiawu Zheng, Xinbing Liang, Yaying Fei, Yuheng Cheng, Zongze Xu, Chenglin Wu

    Abstract: Large Language Model (LLM)-based agents have demonstrated remarkable effectiveness. However, their performance can be compromised in data science scenarios that require real-time data adjustment, expertise in optimization due to complex dependencies among various tasks, and the ability to identify logical errors for precise reasoning. In this study, we introduce the Data Interpreter, a solution de… ▽ More

    Submitted 12 March, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  12. arXiv:2310.19651  [pdf, other

    cs.CL

    Dynamics of Instruction Tuning: Each Ability of Large Language Models Has Its Own Growth Pace

    Authors: Chiyu Song, Zhanchao Zhou, Jianhao Yan, Yuejiao Fei, Zhenzhong Lan, Yue Zhang

    Abstract: Instruction tuning is a burgeoning method to elicit the general intelligence of Large Language Models (LLMs). However, the creation of instruction data is still largely heuristic, leading to significant variation in quantity and quality across existing datasets. While some research advocates for expanding the number of instructions, others suggest that a small set of well-chosen examples is adequa… ▽ More

    Submitted 22 February, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

  13. arXiv:2310.17976  [pdf, other

    cs.CL

    InCharacter: Evaluating Personality Fidelity in Role-Playing Agents through Psychological Interviews

    Authors: Xintao Wang, Yunze Xiao, Jen-tse Huang, Siyu Yuan, Rui Xu, Haoran Guo, Quan Tu, Yaying Fei, Ziang Leng, Wei Wang, Jiangjie Chen, Cheng Li, Yanghua Xiao

    Abstract: Role-playing agents (RPAs), powered by large language models, have emerged as a flourishing field of applications. However, a key challenge lies in assessing whether RPAs accurately reproduce the personas of target characters, namely their character fidelity. Existing methods mainly focus on the knowledge and linguistic patterns of characters. This paper, instead, introduces a novel perspective to… ▽ More

    Submitted 7 June, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

    Comments: ACL 2024

  14. arXiv:2310.14491  [pdf, other

    cs.CL

    Towards a Mechanistic Interpretation of Multi-Step Reasoning Capabilities of Language Models

    Authors: Yifan Hou, Jiaoda Li, Yu Fei, Alessandro Stolfo, Wangchunshu Zhou, Guangtao Zeng, Antoine Bosselut, Mrinmaya Sachan

    Abstract: Recent work has shown that language models (LMs) have strong multi-step (i.e., procedural) reasoning capabilities. However, it is unclear whether LMs perform these tasks by cheating with answers memorized from pretraining corpus, or, via a multi-step reasoning mechanism. In this paper, we try to answer this question by exploring a mechanistic interpretation of LMs for multi-step reasoning tasks. C… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

    Comments: This work is published in EMNLP 2023

  15. arXiv:2310.10441  [pdf, other

    cs.DS math.PR math.ST stat.ML

    Efficiently matching random inhomogeneous graphs via degree profiles

    Authors: Jian Ding, Yumou Fei, Yuanzheng Wang

    Abstract: In this paper, we study the problem of recovering the latent vertex correspondence between two correlated random graphs with vastly inhomogeneous and unknown edge probabilities between different pairs of vertices. Inspired by and extending the matching algorithm via degree profiles by Ding, Ma, Wu and Xu (2021), we obtain an efficient matching algorithm as long as the minimal average degree is at… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: 44 pages, 3 figures

  16. arXiv:2309.04735  [pdf, other

    cs.CC

    Two-State Spin Systems with Negative Interactions

    Authors: Yumou Fei, Leslie Ann Goldberg, Pinyan Lu

    Abstract: We study the approximability of computing the partition functions of two-state spin systems. The problem is parameterized by a $2\times 2$ symmetric matrix. Previous results on this problem were restricted either to the case where the matrix has non-negative entries, or to the case where the diagonal entries are equal, i.e. Ising models. In this paper, we study the generalization to arbitrary… ▽ More

    Submitted 21 November, 2023; v1 submitted 9 September, 2023; originally announced September 2023.

  17. arXiv:2309.04389  [pdf, other

    cs.CL cs.CE

    CSPRD: A Financial Policy Retrieval Dataset for Chinese Stock Market

    Authors: **yuan Wang, Hai Zhao, Zhong Wang, Zeyang Zhu, **hao Xie, Yong Yu, Yongjian Fei, Yue Huang, Dawei Cheng

    Abstract: In recent years, great advances in pre-trained language models (PLMs) have sparked considerable research focus and achieved promising performance on the approach of dense passage retrieval, which aims at retrieving relative passages from massive corpus with given questions. However, most of existing datasets mainly benchmark the models with factoid queries of general commonsense, while specialised… ▽ More

    Submitted 11 September, 2023; v1 submitted 8 September, 2023; originally announced September 2023.

  18. arXiv:2308.09597  [pdf, other

    cs.CL cs.HC

    ChatHaruhi: Reviving Anime Character in Reality via Large Language Model

    Authors: Cheng Li, Ziang Leng, Chenxi Yan, Junyi Shen, Hao Wang, Weishi MI, Yaying Fei, Xiaoyang Feng, Song Yan, HaoSheng Wang, Linkang Zhan, Yaokai Jia, **yu Wu, Haozhen Sun

    Abstract: Role-playing chatbots built on large language models have drawn interest, but better techniques are needed to enable mimicking specific fictional characters. We propose an algorithm that controls language models via an improved prompt and memories of the character extracted from scripts. We construct ChatHaruhi, a dataset covering 32 Chinese / English TV / anime characters with over 54k simulated… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Comments: v1 - First version of techique report

  19. arXiv:2308.04223  [pdf, other

    eess.SY cs.NE

    Real-Time Progressive Learning: Accumulate Knowledge from Control with Neural-Network-Based Selective Memory

    Authors: Yiming Fei, Jiangang Li, Yanan Li

    Abstract: Memory, as the basis of learning, determines the storage, update and forgetting of knowledge and further determines the efficiency of learning. Featured with the mechanism of memory, a radial basis function neural network based learning control scheme named real-time progressive learning (RTPL) is proposed to learn the unknown dynamics of the system with guaranteed stability and closed-loop perfor… ▽ More

    Submitted 24 November, 2023; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: 15 pages, 16 figures

    MSC Class: 93-10

  20. arXiv:2308.01469  [pdf, other

    cs.LG cs.AI cs.CR

    VertexSerum: Poisoning Graph Neural Networks for Link Inference

    Authors: Ruyi Ding, Shi** Duan, Xiaolin Xu, Yunsi Fei

    Abstract: Graph neural networks (GNNs) have brought superb performance to various applications utilizing graph structural data, such as social analysis and fraud detection. The graph links, e.g., social relationships and transaction history, are sensitive and valuable information, which raises privacy concerns when using GNNs. To exploit these vulnerabilities, we propose VertexSerum, a novel graph poisoning… ▽ More

    Submitted 2 August, 2023; originally announced August 2023.

  21. Iterative self-transfer learning: A general methodology for response time-history prediction based on small dataset

    Authors: Yongjia Xu, Xinzheng Lu, Yifan Fei, Yuli Huang

    Abstract: There are numerous advantages of deep neural network surrogate modeling for response time-history prediction. However, due to the high cost of refined numerical simulations and actual experiments, the lack of data has become an unavoidable bottleneck in practical applications. An iterative self-transfer learningmethod for training neural networks based on small datasets is proposed in this study.… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: 14 pages, 8 figures; Published on Journal of Computational Design and Engineering, 9(5), 2089-2102

    Journal ref: Journal of Computational Design and Engineering, 9(5), 2089-2102 (2022)

  22. arXiv:2305.19148  [pdf, other

    cs.CL cs.AI cs.LG

    Mitigating Label Biases for In-context Learning

    Authors: Yu Fei, Yifan Hou, Zeming Chen, Antoine Bosselut

    Abstract: Various design settings for in-context learning (ICL), such as the choice and order of the in-context examples, can bias a model toward a particular prediction without being reflective of an understanding of the task. While many studies discuss these design choices, there have been few systematic investigations into categorizing them and mitigating their impact. In this work, we define a typology… ▽ More

    Submitted 4 August, 2023; v1 submitted 28 May, 2023; originally announced May 2023.

    Comments: Accepted to ACL 2023

  23. arXiv:2305.16444  [pdf, other

    cs.CL

    Don't Retrain, Just Rewrite: Countering Adversarial Perturbations by Rewriting Text

    Authors: Ashim Gupta, Carter Wood Blum, Temma Choji, Yingjie Fei, Shalin Shah, Alakananda Vempala, Vivek Srikumar

    Abstract: Can language models transform inputs to protect text classifiers against adversarial attacks? In this work, we present ATINTER, a model that intercepts and learns to rewrite adversarial inputs to make them non-adversarial for a downstream text classifier. Our experiments on four datasets and five attack mechanisms reveal that ATINTER is effective at providing better adversarial robustness than exi… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

    Comments: Accepted to ACL 2023

  24. arXiv:2305.15676  [pdf, other

    cs.CL

    Enhancing Grammatical Error Correction Systems with Explanations

    Authors: Yuejiao Fei, Leyang Cui, Sen Yang, Wai Lam, Zhenzhong Lan, Shuming Shi

    Abstract: Grammatical error correction systems improve written communication by detecting and correcting language mistakes. To help language learners better understand why the GEC system makes a certain correction, the causes of errors (evidence words) and the corresponding error types are two key factors. To enhance GEC systems with explanations, we introduce EXPECT, a large dataset annotated with evidence… ▽ More

    Submitted 10 June, 2023; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: 9 pages, 7 figures, accepted to the main conference of ACL 2023

  25. arXiv:2303.15571  [pdf, other

    cs.CR cs.AI

    EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

    Authors: Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Ding, Yunsi Fei

    Abstract: Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-small changes crafted deliberately on the input to mislead the model for wrong predictions. Adversarial attacks have disastrous consequences for deep learning-empowered critical applications. Existing defense and detection techniques both require extensive knowledge of the model, testing inputs, and even execution details. They… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  26. arXiv:2302.08210  [pdf, other

    cs.LG

    A Survey of Geometric Optimization for Deep Learning: From Euclidean Space to Riemannian Manifold

    Authors: Yanhong Fei, Xian Wei, Yingjie Liu, Zhengyu Li, Mingsong Chen

    Abstract: Although Deep Learning (DL) has achieved success in complex Artificial Intelligence (AI) tasks, it suffers from various notorious problems (e.g., feature redundancy, and vanishing or exploding gradients), since updating parameters in Euclidean space cannot fully exploit the geometric structure of the solution space. As a promising alternative solution, Riemannian-based DL uses geometric optimizati… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: 41 pages

  27. arXiv:2301.01286  [pdf, other

    cs.LG eess.IV

    Pseudo-Inverted Bottleneck Convolution for DARTS Search Space

    Authors: Arash Ahmadian, Louis S. P. Liu, Yue Fei, Konstantinos N. Plataniotis, Mahdi S. Hosseini

    Abstract: Differentiable Architecture Search (DARTS) has attracted considerable attention as a gradient-based neural architecture search method. Since the introduction of DARTS, there has been little work done on adapting the action space based on state-of-art architecture design principles for CNNs. In this work, we aim to address this gap by incrementally augmenting the DARTS search space with micro-desig… ▽ More

    Submitted 18 March, 2023; v1 submitted 31 December, 2022; originally announced January 2023.

    Comments: 5 pages

  28. arXiv:2211.07909  [pdf, other

    eess.SY cs.LG cs.NE

    Selective Memory Recursive Least Squares: Recast Forgetting into Memory in RBF Neural Network Based Real-Time Learning

    Authors: Yiming Fei, Jiangang Li, Yanan Li

    Abstract: In radial basis function neural network (RBFNN) based real-time learning tasks, forgetting mechanisms are widely used such that the neural network can keep its sensitivity to new data. However, with forgetting mechanisms, some useful knowledge will get lost simply because they are learned a long time ago, which we refer to as the passive knowledge forgetting phenomenon. To address this problem, th… ▽ More

    Submitted 8 August, 2023; v1 submitted 15 November, 2022; originally announced November 2022.

    Comments: 12 pages, 15 figures

    MSC Class: 93-10

  29. arXiv:2210.16637  [pdf, other

    cs.CL cs.LG

    Beyond Prompting: Making Pre-trained Language Models Better Zero-shot Learners by Clustering Representations

    Authors: Yu Fei, ** Nie, Zhao Meng, Roger Wattenhofer, Mrinmaya Sachan

    Abstract: Recent work has demonstrated that pre-trained language models (PLMs) are zero-shot learners. However, most existing zero-shot methods involve heavy human engineering or complicated self-training pipelines, hindering their application to new situations. In this work, we show that zero-shot text classification can be improved simply by clustering texts in the embedding spaces of PLMs. Specifically,… ▽ More

    Submitted 23 November, 2022; v1 submitted 29 October, 2022; originally announced October 2022.

    Comments: Accepted to EMNLP 2022

  30. arXiv:2208.09896  [pdf, other

    cs.CV cs.AI

    SIM2E: Benchmarking the Group Equivariant Capability of Correspondence Matching Algorithms

    Authors: Shuai Su, Zhongkai Zhao, Yixin Fei, Shuda Li, Qijun Chen, Rui Fan

    Abstract: Correspondence matching is a fundamental problem in computer vision and robotics applications. Solving correspondence matching problems using neural networks has been on the rise recently. Rotation-equivariance and scale-equivariance are both critical in correspondence matching applications. Classical correspondence matching approaches are designed to withstand scaling and rotation transformations… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Comments: ECCV2022 Workshop Paper

  31. arXiv:2208.01898  [pdf, other

    cs.CV

    XCon: Learning with Experts for Fine-grained Category Discovery

    Authors: Yixin Fei, Zhongkai Zhao, Siwei Yang, Bingchen Zhao

    Abstract: We address the problem of generalized category discovery (GCD) in this paper, i.e. clustering the unlabeled images leveraging the information from a set of seen classes, where the unlabeled images could contain both seen classes and unseen classes. The seen classes can be seen as an implicit criterion of classes, which makes this setting different from unsupervised clustering where the cluster cri… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

  32. Hysteretic Behavior Simulation Based on Pyramid Neural Network:Principle, Network Architecture, Case Study and Explanation

    Authors: Yongjia Xu, Xinzheng Lu, Yifan Fei, Yuli Huang

    Abstract: An accurate and efficient simulation of the hysteretic behavior of materials and components is essential for structural analysis. The surrogate model based on neural networks shows significant potential in balancing efficiency and accuracy. However, its serial information flow and prediction based on single-level features adversely affect the network performance. Therefore, a weighted stacked pyra… ▽ More

    Submitted 19 June, 2023; v1 submitted 29 April, 2022; originally announced June 2022.

    Comments: 41 pages, 14 figures

    Journal ref: Advances in Structural Engineering. 2023, 1-16

  33. arXiv:2205.00140  [pdf, ps, other

    cs.GT cs.DS econ.TH

    Improved Approximation to First-Best Gains-from-Trade

    Authors: Yumou Fei

    Abstract: We study the two-agent single-item bilateral trade. Ideally, the trade should happen whenever the buyer's value for the item exceeds the seller's cost. However, the classical result of Myerson and Satterthwaite showed that no mechanism can achieve this without violating one of the Bayesian incentive compatibility, individual rationality and weakly balanced budget conditions. This motivates the stu… ▽ More

    Submitted 29 April, 2022; originally announced May 2022.

  34. arXiv:2203.12046  [pdf, other

    cs.CR cs.AR

    NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering

    Authors: Yukui Luo, Shi** Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu

    Abstract: Architecture reverse engineering has become an emerging attack against deep neural network (DNN) implementations. Several prior works have utilized side-channel leakage to recover the model architecture while the target is executing on a hardware acceleration platform. In this work, we target an open-source deep-learning accelerator, Versatile Tensor Accelerator (VTA), and utilize electromagnetic… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: Accepted by FCCM 2022

  35. arXiv:2203.03110  [pdf, ps, other

    cs.LG math.OC stat.ML

    Cascaded Gaps: Towards Gap-Dependent Regret for Risk-Sensitive Reinforcement Learning

    Authors: Yingjie Fei, Ruitu Xu

    Abstract: In this paper, we study gap-dependent regret guarantees for risk-sensitive reinforcement learning based on the entropic risk measure. We propose a novel definition of sub-optimality gaps, which we call cascaded gaps, and we discuss their key components that adapt to the underlying structures of the problem. Based on the cascaded gaps, we derive non-asymptotic and logarithmic regret bounds for two… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

  36. arXiv:2201.12133  [pdf, other

    cs.CV cs.LG

    O-ViT: Orthogonal Vision Transformer

    Authors: Yanhong Fei, Yingjie Liu, Xian Wei, Mingsong Chen

    Abstract: Inspired by the tremendous success of the self-attention mechanism in natural language processing, the Vision Transformer (ViT) creatively applies it to image patch sequences and achieves incredible performance. However, the scaled dot-product self-attention of ViT brings about scale ambiguity to the structure of the original feature space. To address this problem, we propose a novel method named… ▽ More

    Submitted 16 February, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

  37. arXiv:2201.09329  [pdf, other

    cs.LG cond-mat.mtrl-sci

    ULSA: Unified Language of Synthesis Actions for Representation of Synthesis Protocols

    Authors: Zheren Wang, Kevin Cruse, Yuxing Fei, Ann Chia, Yan Zeng, Haoyan Huo, Tan** He, Bowen Deng, Olga Kononova, Gerbrand Ceder

    Abstract: Applying AI power to predict syntheses of novel materials requires high-quality, large-scale datasets. Extraction of synthesis information from scientific publications is still challenging, especially for extracting synthesis actions, because of the lack of a comprehensive labeled dataset using a solid, robust, and well-established ontology for describing synthesis procedures. In this work, we pro… ▽ More

    Submitted 23 January, 2022; originally announced January 2022.

  38. arXiv:2111.03947  [pdf, other

    cs.LG math.OC stat.ML

    Exponential Bellman Equation and Improved Regret Bounds for Risk-Sensitive Reinforcement Learning

    Authors: Yingjie Fei, Zhuoran Yang, Yudong Chen, Zhaoran Wang

    Abstract: We study risk-sensitive reinforcement learning (RL) based on the entropic risk measure. Although existing works have established non-asymptotic regret guarantees for this problem, they leave open an exponential gap between the upper and lower bounds. We identify the deficiencies in existing algorithms and their analysis that result in such a gap. To remedy these deficiencies, we investigate a simp… ▽ More

    Submitted 6 November, 2021; originally announced November 2021.

  39. arXiv:2111.00699  [pdf, other

    cs.GR cs.AR

    Principles towards Real-Time Simulation of Material Point Method on Modern GPUs

    Authors: Yun Fei, Yuhan Huang, Ming Gao

    Abstract: Physics-based simulation has been actively employed in generating offline visual effects in the film and animation industry. However, the computations required for high-quality scenarios are generally immense, deterring its adoption in real-time applications, e.g., virtual production, avatar live-streaming, and cloud gaming. We summarize the principles that can accelerate the computation pipeline… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    ACM Class: I.3.1; I.3.7

  40. Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers

    Authors: Amel Nestor Docena, Thomas Wahl, Trevor Pearce, Yunsi Fei

    Abstract: Neural Networks are used today in numerous security- and safety-relevant domains and are, as such, a popular target of attacks that subvert their classification capabilities, by manipulating the network parameters. Prior work has introduced sensitive samples -- inputs highly sensitive to parameter changes -- to detect such manipulations, and proposed a gradient ascent-based approach to compute the… ▽ More

    Submitted 6 September, 2021; originally announced September 2021.

    Comments: In Proceedings SCSS 2021, arXiv:2109.02501

    Journal ref: EPTCS 342, 2021, pp. 35-48

  41. arXiv:2107.05729  [pdf, other

    cs.AI cs.LG

    Generalization of graph network inferences in higher-order graphical models

    Authors: Yicheng Fei, Xaq Pitkow

    Abstract: Probabilistic graphical models provide a powerful tool to describe complex statistical structure, with many real-world applications in science and engineering from controlling robotic arms to understanding neuronal computations. A major challenge for these graphical models is that inferences such as marginalization are intractable for general graphs. These inferences are often approximated by a di… ▽ More

    Submitted 2 May, 2023; v1 submitted 12 July, 2021; originally announced July 2021.

    Comments: 14 pages, 5 figures

  42. DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA

    Authors: Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu

    Abstract: As Field-programmable gate arrays (FPGAs) are widely adopted in clouds to accelerate Deep Neural Networks (DNN), such virtualization environments have posed many new security issues. This work investigates the integrity of DNN FPGA accelerators in clouds. It proposes DeepStrike, a remotely-guided attack based on power glitching fault injections targeting DNN execution. We characterize the vulnerab… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

    Comments: 6 pages, 6 figures

  43. arXiv:2105.02835  [pdf

    eess.IV cs.CV

    Deep Learning based Multi-modal Computing with Feature Disentanglement for MRI Image Synthesis

    Authors: Yuchen Fei, Bo Zhan, Mei Hong, Xi Wu, Jiliu Zhou, Yan Wang

    Abstract: Purpose: Different Magnetic resonance imaging (MRI) modalities of the same anatomical structure are required to present different pathological information from the physical level for diagnostic needs. However, it is often difficult to obtain full-sequence MRI images of patients owing to limitations such as time consumption and high cost. The purpose of this work is to develop an algorithm for targ… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

  44. arXiv:2012.03891  [pdf, other

    cs.DL cs.LG

    COVIDScholar: An automated COVID-19 research aggregation and analysis platform

    Authors: Amalie Trewartha, John Dagdelen, Haoyan Huo, Kevin Cruse, Zheren Wang, Tan** He, Akshay Subramanian, Yuxing Fei, Benjamin Justus, Kristin Persson, Gerbrand Ceder

    Abstract: The ongoing COVID-19 pandemic has had far-reaching effects throughout society, and science is no exception. The scale, speed, and breadth of the scientific community's COVID-19 response has lead to the emergence of new research literature on a remarkable scale -- as of October 2020, over 81,000 COVID-19 related scientific papers have been released, at a rate of over 250 per day. This has created a… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

  45. arXiv:2007.16175  [pdf, other

    cs.CR cs.AR

    Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU

    Authors: Elmira Karimi, Yunsi Fei, David Kaeli

    Abstract: GPUs are increasingly being used in security applications, especially for accelerating encryption/decryption. While GPUs are an attractive platform in terms of performance, the security of these devices raises a number of concerns. One vulnerability is the data-dependent timing information, which can be exploited by adversary to recover the encryption key. Memory system features are frequently exp… ▽ More

    Submitted 31 July, 2020; originally announced July 2020.

    Comments: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  46. arXiv:2007.00148  [pdf, ps, other

    cs.LG math.OC stat.ML

    Dynamic Regret of Policy Optimization in Non-stationary Environments

    Authors: Yingjie Fei, Zhuoran Yang, Zhaoran Wang, Qiaomin Xie

    Abstract: We consider reinforcement learning (RL) in episodic MDPs with adversarial full-information reward feedback and unknown fixed transition kernels. We propose two model-free policy optimization algorithms, POWER and POWER++, and establish guarantees for their dynamic regret. Compared with the classical notion of static regret, dynamic regret is a stronger notion as it explicitly accounts for the non-… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  47. arXiv:2006.13827  [pdf, other

    cs.LG math.OC stat.ML

    Risk-Sensitive Reinforcement Learning: Near-Optimal Risk-Sample Tradeoff in Regret

    Authors: Yingjie Fei, Zhuoran Yang, Yudong Chen, Zhaoran Wang, Qiaomin Xie

    Abstract: We study risk-sensitive reinforcement learning in episodic Markov decision processes with unknown transition kernels, where the goal is to optimize the total reward under the risk measure of exponential utility. We propose two provably efficient model-free algorithms, Risk-Sensitive Value Iteration (RSVI) and Risk-Sensitive Q-learning (RSQ). These algorithms implement a form of risk-sensitive opti… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  48. Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA

    Authors: Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian

    Abstract: Modern electronic systems become evermore complex, yet remain modular, with integrated circuits (ICs) acting as versatile hardware components at their heart. Electronic design automation (EDA) for ICs has focused traditionally on power, performance, and area. However, given the rise of hardware-centric security threats, we believe that EDA must also adopt related notions like secure by design and… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Comments: To appear in DATE'20

  49. arXiv:1910.06402  [pdf, other

    cs.GR

    Addressing Troubles with Double Bubbles: Convergence and Stability at Multi-Bubble Junctions

    Authors: Yun Fei, Christopher Batty, Eitan Grinspun

    Abstract: In this report we discuss and propose a correction to a convergence and stability issue occurring in the work of Da et al.[2015], in which they proposed a numerical model to simulate soap bubbles.

    Submitted 11 June, 2020; v1 submitted 14 October, 2019; originally announced October 2019.

    Comments: 3 pages, 3 figures, technical report of Columbia University

    ACM Class: I.3.7

  50. arXiv:1909.06585  [pdf, other

    cs.RO cs.CV

    Deep Robotic Prediction with hierarchical RGB-D Fusion

    Authors: Yaoxian Song, Jun Wen, Yuejiao Fei, Changbin Yu

    Abstract: Robotic arm gras** is a fundamental operation in robotic control task goals. Most current methods for robotic gras** focus on RGB-D policy in the table surface scenario or 3D point cloud analysis and inference in the 3D space. Comparing to these methods, we propose a novel real-time multimodal hierarchical encoder-decoder neural network that fuses RGB and depth data to realize robotic humanoid… ▽ More

    Submitted 17 September, 2019; v1 submitted 14 September, 2019; originally announced September 2019.

    Comments: 8 pages, 8 figures, submit to ICRA2020