Skip to main content

Showing 1–30 of 30 results for author: Lo, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.04383  [pdf, other

    cs.CV

    DELFlow: Dense Efficient Learning of Scene Flow for Large-Scale Point Clouds

    Authors: Chensheng Peng, Guangming Wang, Xian Wan Lo, Xinrui Wu, Chenfeng Xu, Masayoshi Tomizuka, Wei Zhan, Hesheng Wang

    Abstract: Point clouds are naturally sparse, while image pixels are dense. The inconsistency limits feature fusion from both modalities for point-wise scene flow estimation. Previous methods rarely predict scene flow from the entire point clouds of the scene with one-time inference due to the memory inefficiency and heavy overhead from distance calculation and sorting involved in commonly used farthest poin… ▽ More

    Submitted 9 August, 2023; v1 submitted 8 August, 2023; originally announced August 2023.

    Comments: Accepted by ICCV2023. Codes will be released at https://github.com/IRMVLab/DELFlow

  2. arXiv:2304.14746  [pdf, other

    cs.CR cs.AI cs.CL cs.NE cs.NI

    FlowTransformer: A Transformer Framework for Flow-based Network Intrusion Detection Systems

    Authors: Liam Daly Manocchio, Siamak Layeghy, Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Marius Portmann

    Abstract: This paper presents the FlowTransformer framework, a novel approach for implementing transformer-based Network Intrusion Detection Systems (NIDSs). FlowTransformer leverages the strengths of transformer models in identifying the long-term behaviour and characteristics of networks, which are often overlooked by most existing NIDSs. By capturing these complex patterns in network traffic, FlowTransfo… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  3. arXiv:2304.02643  [pdf, other

    cs.CV cs.AI cs.LG

    Segment Anything

    Authors: Alexander Kirillov, Eric Mintun, Nikhila Ravi, Hanzi Mao, Chloe Rolland, Laura Gustafson, Tete Xiao, Spencer Whitehead, Alexander C. Berg, Wan-Yen Lo, Piotr Dollár, Ross Girshick

    Abstract: We introduce the Segment Anything (SA) project: a new task, model, and dataset for image segmentation. Using our efficient model in a data collection loop, we built the largest segmentation dataset to date (by far), with over 1 billion masks on 11M licensed and privacy respecting images. The model is designed and trained to be promptable, so it can transfer zero-shot to new image distributions and… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: Project web-page: https://segment-anything.com

  4. arXiv:2302.03860  [pdf, other

    cs.CV

    EVEN: An Event-Based Framework for Monocular Depth Estimation at Adverse Night Conditions

    Authors: Peilun Shi, Jiachuan Peng, Jianing Qiu, Xinwei Ju, Frank Po Wen Lo, Benny Lo

    Abstract: Accurate depth estimation under adverse night conditions has practical impact and applications, such as on autonomous driving and rescue robots. In this work, we studied monocular depth estimation at night time in which various adverse weather, light, and different road conditions exist, with data captured in both RGB and event modalities. Event camera can better capture intensity changes by virtu… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  5. arXiv:2301.03996  [pdf, other

    eess.IV cs.IT

    Collaborative Semantic Communication for Edge Inference

    Authors: Wing Fei Lo, Nitish Mital, Haotian Wu, Deniz Gündüz

    Abstract: We study the collaborative image retrieval problem at the wireless edge, where multiple edge devices capture images of the same object from different angles and locations, which are then used jointly to retrieve similar images at the edge server over a shared multiple access channel (MAC). We propose two novel deep learning-based joint source and channel coding (JSCC) schemes for the task over bot… ▽ More

    Submitted 12 February, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    MSC Class: 94A24 ACM Class: E.4

  6. arXiv:2212.07558  [pdf, other

    cs.CR cs.LG cs.NI

    DOC-NAD: A Hybrid Deep One-class Classifier for Network Anomaly Detection

    Authors: Mohanad Sarhan, Gayan Kulatilleke, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: Machine Learning (ML) approaches have been used to enhance the detection capabilities of Network Intrusion Detection Systems (NIDSs). Recent work has achieved near-perfect performance by following binary- and multi-class network anomaly detection tasks. Such systems depend on the availability of both (benign and malicious) network data classes during the training phase. However, attack data sample… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  7. arXiv:2210.08266  [pdf, other

    cs.IR cs.LG

    MenuAI: Restaurant Food Recommendation System via a Transformer-based Deep Learning Model

    Authors: Xinwei Ju, Frank Po Wen Lo, Jianing Qiu, Peilun Shi, Jiachuan Peng, Benny Lo

    Abstract: Food recommendation system has proven as an effective technology to provide guidance on dietary choices, and this is especially important for patients suffering from chronic diseases. Unlike other multimedia recommendations, such as books and movies, food recommendation task is highly relied on the context at the moment, since users' food preference can be highly dynamic over time. For example, in… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

  8. arXiv:2207.09088  [pdf, other

    cs.CR cs.LG cs.NI

    XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: In this paper, we propose XG-BoT, an explainable deep graph neural network model for botnet node detection. The proposed model comprises a botnet detector and an explainer for automatic forensics. The XG-BoT detector can effectively detect malicious botnet nodes in large-scale networks. Specifically, it utilizes a grouped reversible residual connection with a graph isomorphism network to learn exp… ▽ More

    Submitted 11 March, 2023; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: Accepted by Internet of Things, Elsevier

  9. arXiv:2207.06819  [pdf, other

    cs.LG cs.AI cs.CR cs.NI

    Anomal-E: A Self-Supervised Network Intrusion Detection System based on Graph Neural Networks

    Authors: Evan Caville, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: This paper investigates Graph Neural Networks (GNNs) application for self-supervised network intrusion and anomaly detection. GNNs are a deep learning approach for graph-based data that incorporate graph structures into learning to generalise graph representations and output embeddings. As network flows are naturally graph-based, GNNs are a suitable fit for analysing and learning network behaviour… ▽ More

    Submitted 9 February, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Accepted by Knowledge-Based Systems

  10. arXiv:2204.04254  [pdf, other

    cs.CR cs.LG cs.NI

    HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

    Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann

    Abstract: The continuous strengthening of the security posture of IoT ecosystems is vital due to the increasing number of interconnected devices and the volume of sensitive data shared. The utilisation of Machine Learning (ML) capabilities in the defence against IoT cyber attacks has many potential benefits. However, the currently proposed frameworks do not consider data privacy, secure architectures, and/o… ▽ More

    Submitted 8 April, 2022; originally announced April 2022.

  11. arXiv:2203.10465  [pdf, other

    cs.CR cs.LG q-fin.ST

    Inspection-L: Self-Supervised GNN Node Embeddings for Money Laundering Detection in Bitcoin

    Authors: Wai Weng Lo, Gayan K. Kulatilleke, Mohanad Sarhan, Siamak Layeghy, Marius Portmann

    Abstract: Criminals have become increasingly experienced in using cryptocurrencies, such as Bitcoin, for money laundering. The use of cryptocurrencies can hide criminal identities and transfer hundreds of millions of dollars of dirty funds through their criminal digital wallets. However, this is considered a paradox because cryptocurrencies are goldmines for open-source intelligence, giving law enforcement… ▽ More

    Submitted 9 October, 2022; v1 submitted 20 March, 2022; originally announced March 2022.

  12. arXiv:2201.07537  [pdf, other

    cs.CR cs.LG

    Graph Neural Network-based Android Malware Classification with Jum** Knowledge

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jum**-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jum**-Knowled… ▽ More

    Submitted 13 June, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

    Comments: will be appeared in IEEE Conference on Dependable and Secure Computing 2022

  13. arXiv:2111.09887  [pdf, other

    cs.CV cs.LG

    PyTorchVideo: A Deep Learning Library for Video Understanding

    Authors: Haoqi Fan, Tullie Murrell, Heng Wang, Kalyan Vasudev Alwala, Yanghao Li, Yilei Li, Bo Xiong, Nikhila Ravi, Meng Li, Haichuan Yang, Jitendra Malik, Ross Girshick, Matt Feiszli, Aaron Adcock, Wan-Yen Lo, Christoph Feichtenhofer

    Abstract: We introduce PyTorchVideo, an open-source deep-learning library that provides a rich set of modular, efficient, and reproducible components for a variety of video understanding tasks, including classification, detection, self-supervised learning, and low-level processing. The library covers a full stack of video understanding tools including multimodal data loading, transformations, and models tha… ▽ More

    Submitted 18 November, 2021; originally announced November 2021.

    Comments: Technical report

  14. arXiv:2109.01397  [pdf, other

    cs.CV

    Occlusion-Invariant Rotation-Equivariant Semi-Supervised Depth Based Cross-View Gait Pose Estimation

    Authors: Xiao Gu, Jianxin Yang, Hanxiao Zhang, Jianing Qiu, Frank Po Wen Lo, Yao Guo, Guang-Zhong Yang, Benny Lo

    Abstract: Accurate estimation of three-dimensional human skeletons from depth images can provide important metrics for healthcare applications, especially for biomechanical gait analysis. However, there exist inherent problems associated with depth images captured from a single view. The collected data is greatly affected by occlusions where only partial surface data can be recorded. Furthermore, depth imag… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  15. arXiv:2108.09615  [pdf, other

    cs.DC cs.AI

    Apache Submarine: A Unified Machine Learning Platform Made Simple

    Authors: Kai-Hsun Chen, Huan-** Su, Wei-Chiu Chuang, Hung-Chang Hsiao, Wangda Tan, Zhankun Tang, Xun Liu, Yanbo Liang, Wen-Chih Lo, Wanqiang Ji, Byron Hsu, Keqiu Hu, HuiYang Jian, Quan Zhou, Chien-Min Wang

    Abstract: As machine learning is applied more widely, it is necessary to have a machine learning platform for both infrastructure administrators and users including expert data scientists and citizen data scientists to improve their productivity. However, existing machine learning platforms are ill-equipped to address the "Machine Learning tech debts" such as glue code, reproducibility, and portability. Fur… ▽ More

    Submitted 21 August, 2021; originally announced August 2021.

    Comments: 9 pages

  16. arXiv:2105.03142  [pdf, other

    cs.CV cs.AI

    An Intelligent Passive Food Intake Assessment System with Egocentric Cameras

    Authors: Frank Po Wen Lo, Modou L Jobarteh, Yingnan Sun, Jianing Qiu, Shuo Jiang, Gary Frost, Benny Lo

    Abstract: Malnutrition is a major public health concern in low-and-middle-income countries (LMICs). Understanding food and nutrient intake across communities, households and individuals is critical to the development of health policies and interventions. To ease the procedure in conducting large-scale dietary assessments, we propose to implement an intelligent passive food intake assessment system via egoce… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: 11 pages, 14 figures, submitted for publication

  17. arXiv:2103.16329  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT

    Authors: Wai Weng Lo, Siamak Layeghy, Mohanad Sarhan, Marcus Gallagher, Marius Portmann

    Abstract: This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. In this paper, we propose E-Graph… ▽ More

    Submitted 10 January, 2022; v1 submitted 30 March, 2021; originally announced March 2021.

    Comments: will appear in IEEE/IFIP Network Operations and Management Symposium 2022

  18. arXiv:2007.08501  [pdf, other

    cs.CV cs.GR cs.LG

    Accelerating 3D Deep Learning with PyTorch3D

    Authors: Nikhila Ravi, Jeremy Reizenstein, David Novotny, Taylor Gordon, Wan-Yen Lo, Justin Johnson, Georgia Gkioxari

    Abstract: Deep learning has significantly improved 2D image recognition. Extending into 3D may advance many new applications including autonomous vehicles, virtual and augmented reality, authoring 3D content, and even improving 2D recognition. However despite growing interest, 3D deep learning remains relatively underexplored. We believe that some of this disparity is due to the engineering challenges invol… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: tech report

  19. arXiv:1905.13214  [pdf, other

    cs.CV cs.LG

    On Network Design Spaces for Visual Recognition

    Authors: Ilija Radosavovic, Justin Johnson, Saining Xie, Wan-Yen Lo, Piotr Dollár

    Abstract: Over the past several years progress in designing better neural network architectures for visual recognition has been substantial. To help sustain this rate of progress, in this work we propose to reexamine the methodology for comparing network architectures. In particular, we introduce a new comparison paradigm of distribution estimates, in which network design spaces are compared by applying sta… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

    Comments: tech report

  20. arXiv:1903.11593  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Deep segmentation networks predict survival of non-small cell lung cancer

    Authors: Stephen Baek, Yusen He, Bryan G. Allen, John M. Buatti, Brian J. Smith, Ling Tong, Zhiyu Sun, Jia Wu, Maximilian Diehn, Billy W. Loo, Kristin A. Plichta, Steven N. Seyedin, Maggie Gannon, Katherine R. Cabel, Yusung Kim, Xiaodong Wu

    Abstract: Non-small-cell lung cancer (NSCLC) represents approximately 80-85% of lung cancer diagnoses and is the leading cause of cancer-related death worldwide. Recent studies indicate that image-based radiomics features from positron emission tomography-computed tomography (PET/CT) images have predictive power on NSCLC outcomes. To this end, easily calculated functional features such as the maximum and th… ▽ More

    Submitted 8 November, 2019; v1 submitted 26 March, 2019; originally announced March 2019.

  21. arXiv:1803.07534  [pdf, other

    cs.LG stat.ML

    Stacked Neural Networks for end-to-end ciliary motion analysis

    Authors: Charles Lu, M. Marx, M. Zahid, C. W. Lo, C. Chennubhotla, S. P. Quinn

    Abstract: Cilia are hairlike structures protruding from nearly every cell in the body. Diseases known as ciliopathies, where cilia function is disrupted, can result in a wide spectrum of disorders. However, most techniques for assessing ciliary motion rely on manual identification and tracking of cilia; this process is laborious and error-prone, and does not scale well. Even where automated ciliary motion a… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  22. arXiv:1508.00055  [pdf

    cs.CY cs.SI

    Cultural Anthropology through the Lens of Wikipedia: Historical Leader Networks, Gender Bias, and News-based Sentiment

    Authors: Peter A. Gloor, Joao Marcos, Patrick M. de Boer, Hauke Fuehres, Wei Lo, Keiichi Nemoto

    Abstract: In this paper we study the differences in historical World View between Western and Eastern cultures, represented through the English, the Chinese, Japanese, and German Wikipedia. In particular, we analyze the historical networks of the World's leaders since the beginning of written history, comparing them in the different Wikipedias and assessing cultural chauvinism. We also identify the most inf… ▽ More

    Submitted 31 July, 2015; originally announced August 2015.

  23. arXiv:1503.07199  [pdf, other

    physics.soc-ph cs.SI

    Revisiting Interval Graphs for Network Science

    Authors: Chuan Wen Loe, Henrik Jeldtoft Jensen

    Abstract: The vertices of an interval graph represent intervals over a real line where overlap** intervals denote that their corresponding vertices are adjacent. This implies that the vertices are measurable by a metric and there exists a linear structure in the system. The generalization is an embedding of a graph onto a multi-dimensional Euclidean space and it was used by scientists to study the multi-r… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

  24. arXiv:1503.06584  [pdf, other

    cs.DL physics.data-an physics.soc-ph

    Citation Analysis with Mark-and-Recapture

    Authors: Chuan Wen Loe, Henrik Jeldtoft Jensen

    Abstract: Mark-and-Recapture is a methodology from Population Biology to estimate the number of a species without counting every individual. This is done by multiple samplings of the species using traps and discounting the instances that were caught repeated. In this paper we show that this methodology is applicable for citation analysis as it is also not feasible to count all the relevant publications of a… ▽ More

    Submitted 23 March, 2015; originally announced March 2015.

  25. arXiv:1502.05256  [pdf

    cs.SI

    Cultural Anthropology Through the Lens of Wikipedia - A Comparison of Historical Leadership Networks in the English, Chinese, Japanese and German Wikipedia

    Authors: Peter Gloor, Patrick De Boer, Wei Lo, Stefan Wagner, Keiichi Nemoto, Hauke Fuehres

    Abstract: In this paper we study the differences in historical worldview between Western and Eastern cultures, represented through the English, Chinese, Japanese, and German Wikipedia. In particular, we analyze the historical networks of the World's leaders since the beginning of written history, comparing them in the four different Wikipedias.

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: Proceedings of the 5th International Conference on Collaborative Innovation Networks COINs15, Tokyo, Japan March 12-14, 2015 (arXiv:1502.01142)

    Report number: coins15/2015/04

  26. arXiv:1407.0440  [pdf

    cs.SI physics.soc-ph

    Measuring Team Creativity Through Longitudinal Social Signals

    Authors: Peter A. Gloor, Adam Almozlino, Orr Inbar, Wei Lo, Shannon Provost

    Abstract: Research into human dynamical systems has long sought to identify robust signals for human behavior. We have discovered a series of social network-based indicators that are reliable predictors of team creativity and collaborative innovation. We extract these signals from electronic records of interpersonal interactions, including e-mail, and face-to-face interaction measured via sociometric badges… ▽ More

    Submitted 1 July, 2014; originally announced July 2014.

  27. arXiv:1406.2205  [pdf, other

    physics.soc-ph cs.SI

    Comparison of Communities Detection Algorithms for Multiplex

    Authors: Chuan Wen Loe, Henrik Jeldtoft Jensen

    Abstract: Multiplex is a set of graphs on the same vertex set, i.e. $\{G(V,E_1),\ldots,G(V,E_m)\}$. It is a generalized graph to model multiple relationships with parallel edges between vertices. This paper is a literature review of existing communities detection algorithms for multiplex and a comparative analysis of them.

    Submitted 9 June, 2014; originally announced June 2014.

  28. arXiv:1111.5228  [pdf, other

    q-fin.RM cs.CE cs.CR q-fin.CP

    Privacy-Preserving Methods for Sharing Financial Risk Exposures

    Authors: Emmanuel A. Abbe, Amir E. Khandani, Andrew W. Lo

    Abstract: Unlike other industries in which intellectual property is patentable, the financial industry relies on trade secrecy to protect its business processes and methods, which can obscure critical financial risk exposures from regulators and the public. We develop methods for sharing and aggregating such risk exposures that protect the privacy of all parties involved and without the need for a trusted t… ▽ More

    Submitted 24 November, 2011; v1 submitted 19 November, 2011; originally announced November 2011.

  29. arXiv:1002.4592  [pdf, ps, other

    q-fin.GN cs.CE cs.HC

    Is It Real, or Is It Randomized?: A Financial Turing Test

    Authors: Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola

    Abstract: We construct a financial "Turing test" to determine whether human subjects can differentiate between actual vs. randomized financial returns. The experiment consists of an online video-game (http://arora.ccs.neu.edu) where players are challenged to distinguish actual financial market returns from random temporal permutations of those returns. We find overwhelming statistical evidence (p-values n… ▽ More

    Submitted 24 February, 2010; originally announced February 2010.

    Comments: 12 pages, 6 figures

  30. arXiv:0908.4580  [pdf, ps, other

    cs.CE cs.CC q-fin.TR

    A Computational View of Market Efficiency

    Authors: Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola

    Abstract: We propose to study market efficiency from a computational viewpoint. Borrowing from theoretical computer science, we define a market to be \emph{efficient with respect to resources $S$} (e.g., time, memory) if no strategy using resources $S$ can make a profit. As a first step, we consider memory-$m$ strategies whose action at time $t$ depends only on the $m$ previous observations at times… ▽ More

    Submitted 31 August, 2009; originally announced August 2009.