Skip to main content

Showing 1–47 of 47 results for author: Long, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12479  [pdf, other

    cs.CV cs.AI

    RS-GPT4V: A Unified Multimodal Instruction-Following Dataset for Remote Sensing Image Understanding

    Authors: Linrui Xu, Ling Zhao, Wang Guo, Qiujun Li, Kewang Long, Kaiqi Zou, Yuhan Wang, Haifeng Li

    Abstract: The remote sensing image intelligence understanding model is undergoing a new profound paradigm shift which has been promoted by multi-modal large language model (MLLM), i.e. from the paradigm learning a domain model (LaDM) shifts to paradigm learning a pre-trained general foundation model followed by an adaptive domain model (LaGD). Under the new LaGD paradigm, the old datasets, which have led to… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 14 pages, 6 figures, 4 tables

  2. arXiv:2406.11941  [pdf, other

    cs.LG cs.AI cs.RO

    Crossfusor: A Cross-Attention Transformer Enhanced Conditional Diffusion Model for Car-Following Trajectory Prediction

    Authors: Junwei You, Haotian Shi, Keshu Wu, Keke Long, Sicheng Fu, Sikai Chen, Bin Ran

    Abstract: Vehicle trajectory prediction is crucial for advancing autonomous driving and advanced driver assistance systems (ADAS), enhancing road safety and traffic efficiency. While traditional methods have laid foundational work, modern deep learning techniques, particularly transformer-based models and generative approaches, have significantly improved prediction accuracy by capturing complex and non-lin… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  3. arXiv:2405.18251  [pdf, other

    cs.RO eess.SY math.OC

    Sensor-Based Distributionally Robust Control for Safe Robot Navigation in Dynamic Environments

    Authors: Kehan Long, Yinzhuang Yi, Zhirui Dai, Sylvia Herbert, Jorge Cortés, Nikolay Atanasov

    Abstract: We introduce a novel method for safe mobile robot navigation in dynamic, unknown environments, utilizing onboard sensing to impose safety constraints without the need for accurate map reconstruction. Traditional methods typically rely on detailed map information to synthesize safe stabilizing controls for mobile robots, which can be computationally demanding and less effective, particularly in dyn… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: Submitted to the International Journal of Robotics Research (IJRR). Project page: https://existentialrobotics.org/DR_Safe_Navigation_Webpage

  4. arXiv:2404.10416  [pdf, other

    cs.AI

    Disentangling Instructive Information from Ranked Multiple Candidates for Multi-Document Scientific Summarization

    Authors: Pancheng Wang, Shasha Li, Dong Li, Kehan Long, **tao Tang, Ting Wang

    Abstract: Automatically condensing multiple topic-related scientific papers into a succinct and concise summary is referred to as Multi-Document Scientific Summarization (MDSS). Currently, while commonly used abstractive MDSS methods can generate flexible and coherent summaries, the difficulty in handling global information and the lack of guidance during decoding still make it challenging to generate bette… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: Accepted by SIGIR 2024

  5. arXiv:2404.03017  [pdf, other

    eess.SY cs.LG cs.RO math.OC

    Distributionally Robust Policy and Lyapunov-Certificate Learning

    Authors: Kehan Long, Jorge Cortes, Nikolay Atanasov

    Abstract: This article presents novel methods for synthesizing distributionally robust stabilizing neural controllers and certificates for control systems under model uncertainty. A key challenge in designing controllers with stability guarantees for uncertain systems is the accurate determination of and adaptation to shifts in model parametric uncertainty during online deployment. We tackle this with a nov… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE Open Journal of Control Systems

  6. arXiv:2403.01873  [pdf, other

    cs.IR

    Recommending Missed Citations Identified by Reviewers: A New Task, Dataset and Baselines

    Authors: Kehan Long, Shasha Li, Pancheng Wang, Chenlong Bao, **tao Tang, Ting Wang

    Abstract: Citing comprehensively and appropriately has become a challenging task with the explosive growth of scientific publications. Current citation recommendation systems aim to recommend a list of scientific papers for a given text context or a draft paper. However, none of the existing work focuses on already included citations of full papers, which are imperfect and still have much room for improveme… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: COLING 2024

  7. arXiv:2402.11468  [pdf

    cs.MA

    Online Physical Enhanced Residual Learning for Connected Autonomous Vehicles Platoon Centralized Control

    Authors: Hang Zhou, Heye Huang, Peng Zhang, Haotian Shi, Keke Long, Xiaopeng Li

    Abstract: This paper introduces an online physical enhanced residual learning (PERL) framework for Connected Autonomous Vehicles (CAVs) platoon, aimed at addressing the challenges posed by the dynamic and unpredictable nature of traffic environments. The proposed framework synergistically combines a physical model, represented by Model Predictive Control (MPC), with data-driven online Q-learning. The MPC co… ▽ More

    Submitted 18 February, 2024; originally announced February 2024.

  8. arXiv:2402.01105  [pdf, other

    cs.LG cs.CV cs.RO

    A Survey for Foundation Models in Autonomous Driving

    Authors: Haoxiang Gao, Yaqian Li, Kaiwen Long, Ming Yang, Yiqing Shen

    Abstract: The advent of foundation models has revolutionized the fields of natural language processing and computer vision, paving the way for their application in autonomous driving (AD). This survey presents a comprehensive review of more than 40 research papers, demonstrating the role of foundation models in enhancing AD. Large language models contribute to planning and simulation in AD, particularly thr… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  9. arXiv:2310.00273  [pdf, other

    cs.RO math.OC

    Safe Stabilizing Control for Polygonal Robots in Dynamic Elliptical Environments

    Authors: Kehan Long, Khoa Tran, Melvin Leok, Nikolay Atanasov

    Abstract: This paper addresses the challenge of safe navigation for rigid-body mobile robots in dynamic environments. We introduce an analytic approach to compute the distance between a polygon and an ellipse, and employ it to construct a control barrier function (CBF) for safe control synthesis. Existing CBF design methods for mobile robot obstacle avoidance usually assume point or circular robots, prevent… ▽ More

    Submitted 30 April, 2024; v1 submitted 30 September, 2023; originally announced October 2023.

    Comments: 2024 American Control Conference

  10. arXiv:2309.15284  [pdf

    cs.LG

    A Physics Enhanced Residual Learning (PERL) Framework for Vehicle Trajectory Prediction

    Authors: Keke Long, Zihao Sheng, Haotian Shi, Xiaopeng Li, Sikai Chen, Sue Ahn

    Abstract: In vehicle trajectory prediction, physics models and data-driven models are two predominant methodologies. However, each approach presents its own set of challenges: physics models fall short in predictability, while data-driven models lack interpretability. Addressing these identified shortcomings, this paper proposes a novel framework, the Physics-Enhanced Residual Learning (PERL) model. PERL in… ▽ More

    Submitted 21 March, 2024; v1 submitted 26 September, 2023; originally announced September 2023.

  11. arXiv:2308.06849  [pdf, other

    cs.LG cs.AR

    When Monte-Carlo Dropout Meets Multi-Exit: Optimizing Bayesian Neural Networks on FPGA

    Authors: Hongxiang Fan, Hao Chen, Liam Castelli, Zhiqiang Que, He Li, Kenneth Long, Wayne Luk

    Abstract: Bayesian Neural Networks (BayesNNs) have demonstrated their capability of providing calibrated prediction for safety-critical applications such as medical imaging and autonomous driving. However, the high algorithmic complexity and the poor hardware performance of BayesNNs hinder their deployment in real-life applications. To bridge this gap, this paper proposes a novel multi-exit Monte-Carlo Drop… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  12. arXiv:2305.18737  [pdf, other

    quant-ph cs.AI cs.CR cs.LG eess.SP

    Phase Correction using Deep Learning for Satellite-to-Ground CV-QKD

    Authors: Nathan K. Long, Robert Malaney, Kenneth J. Grant

    Abstract: Coherent measurement of quantum signals used for continuous-variable (CV) quantum key distribution (QKD) across satellite-to-ground channels requires compensation of phase wavefront distortions caused by atmospheric turbulence. One compensation technique involves multiplexing classical reference pulses (RPs) and the quantum signal, with direct phase measurements on the RPs then used to modulate a… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

  13. arXiv:2212.01554  [pdf, other

    math.OC cs.RO

    Distributionally Robust Lyapunov Function Search Under Uncertainty

    Authors: Kehan Long, Yinzhuang Yi, Jorge Cortes, Nikolay Atanasov

    Abstract: This paper develops methods for proving Lyapunov stability of dynamical systems subject to disturbances with an unknown distribution. We assume only a finite set of disturbance samples is available and that the true online disturbance realization may be drawn from a different distribution than the given samples. We formulate an optimization problem to search for a sum-of-squares (SOS) Lyapunov fun… ▽ More

    Submitted 30 April, 2024; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: 5th Annual Learning for Dynamics & Control Conference

  14. arXiv:2210.01341  [pdf, ps, other

    math.OC cs.RO

    Safe and Stable Control Synthesis for Uncertain System Models via Distributionally Robust Optimization

    Authors: Kehan Long, Yinzhuang Yi, Jorge Cortes, Nikolay Atanasov

    Abstract: This paper considers enforcing safety and stability of dynamical systems in the presence of model uncertainty. Safety and stability constraints may be specified using a control barrier function (CBF) and a control Lyapunov function (CLF), respectively. To take model uncertainty into account, robust and chance formulations of the constraints are commonly considered. However, this requires known err… ▽ More

    Submitted 16 March, 2023; v1 submitted 3 October, 2022; originally announced October 2022.

  15. arXiv:2208.14627  [pdf, ps, other

    cs.CR cs.CL

    Application of Data Encryption in Chinese Named Entity Recognition

    Authors: Kaifang Long, Jikun Dong, Shengyu Fan, Yanfang Geng, Yang Cao, Han Zhao, Hui Yu, Weizhi Xu

    Abstract: Recently, with the continuous development of deep learning, the performance of named entity recognition tasks has been dramatically improved. However, the privacy and the confidentiality of data in some specific fields, such as biomedical and military, cause insufficient data to support the training of deep neural networks. In this paper, we propose an encryption learning framework to address the… ▽ More

    Submitted 31 August, 2022; originally announced August 2022.

  16. arXiv:2205.02375  [pdf, other

    cs.LG cs.AI eess.SP

    Response Component Analysis for Sea State Estimation Using Artificial Neural Networks and Vessel Response Spectral Data

    Authors: Nathan K. Long, Daniel Sgarioto, Matthew Garratt, Karl Sammut

    Abstract: The use of the `ship as a wave buoy analogy' (SAWB) provides a novel means to estimate sea states, where relationships are established between causal wave properties and vessel motion response information. This study focuses on a model-free machine learning approach to SAWB-based sea state estimation (SSE), using neural networks (NNs) to map vessel response spectral data to statistical wave proper… ▽ More

    Submitted 12 August, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: Preprint revised

    MSC Class: [2010] 00-01 99-00 37N10

  17. TJ4DRadSet: A 4D Radar Dataset for Autonomous Driving

    Authors: Lianqing Zheng, Zhixiong Ma, Xichan Zhu, Bin Tan, Sen Li, Kai Long, Weiqi Sun, Sihan Chen, Lu Zhang, Mengyue Wan, Libo Huang, Jie Bai

    Abstract: The next-generation high-resolution automotive radar (4D radar) can provide additional elevation measurement and denser point clouds, which has great potential for 3D sensing in autonomous driving. In this paper, we introduce a dataset named TJ4DRadSet with 4D radar points for autonomous driving research. The dataset was collected in various driving scenarios, with a total of 7757 synchronized fra… ▽ More

    Submitted 27 July, 2022; v1 submitted 28 April, 2022; originally announced April 2022.

    Comments: 2022 IEEE International Intelligent Transportation Systems Conference (ITSC 2022)

  18. arXiv:2204.03504   

    cs.NI cs.LG

    AI-aided Traffic Control Scheme for M2M Communications in the Internet of Vehicles

    Authors: Haijun Zhang, Minghui Jiang, Xiangnan Liu, Ke** Long, Victor C. M. Leung

    Abstract: Due to the rapid growth of data transmissions in internet of vehicles (IoV), finding schemes that can effectively alleviate access congestion has become an important issue. Recently, many traffic control schemes have been studied. Nevertheless, the dynamics of traffic and the heterogeneous requirements of different IoV applications are not considered in most existing studies, which is significant… ▽ More

    Submitted 12 April, 2022; v1 submitted 5 March, 2022; originally announced April 2022.

    Comments: There have some mistakes in Section II

  19. arXiv:2204.01681  [pdf, other

    physics.ins-det cs.CV cs.LG hep-ex

    End-to-end multi-particle reconstruction in high occupancy imaging calorimeters with graph neural networks

    Authors: Shah Rukh Qasim, Nadezda Chernyavskaya, Jan Kieseler, Kenneth Long, Oleksandr Viazlo, Maurizio Pierini, Raheel Nawaz

    Abstract: We present an end-to-end reconstruction algorithm to build particle candidates from detector hits in next-generation granular calorimeters similar to that foreseen for the high-luminosity upgrade of the CMS detector. The algorithm exploits a distance-weighted graph neural network, trained with object condensation, a graph segmentation technique. Through a single-shot approach, the reconstruction t… ▽ More

    Submitted 30 September, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Journal ref: Eur. Phys. J. C 82, 753 (2022)

  20. arXiv:2203.16577  [pdf, other

    cs.LG

    Calibrating constitutive models with full-field data via physics informed neural networks

    Authors: Craig M. Hamel, Kevin N. Long, Sharlotte L. B. Kramer

    Abstract: The calibration of solid constitutive models with full-field experimental data is a long-standing challenge, especially in materials which undergo large deformation. In this paper, we propose a physics-informed deep-learning framework for the discovery of constitutive model parameterizations given full-field displacement data and global force-displacement data. Contrary to the majority of recent l… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  21. Proximal Policy Optimization-based Transmit Beamforming and Phase-shift Design in an IRS-aided ISAC System for the THz Band

    Authors: Xiangnan Liu, Haijun Zhang, Ke** Long, Mingyu Zhou, Yonghui Li, H. Vincent Poor

    Abstract: In this paper, an IRS-aided integrated sensing and communications (ISAC) system operating in the terahertz (THz) band is proposed to maximize the system capacity. Transmit beamforming and phase-shift design are transformed into a universal optimization problem with ergodic constraints. Then the joint optimization of transmit beamforming and phase-shift design is achieved by gradient-based, primal-… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

  22. Safe Control Synthesis with Uncertain Dynamics and Constraints

    Authors: Kehan Long, Vikas Dhiman, Melvin Leok, Jorge Cortés, Nikolay Atanasov

    Abstract: This paper considers safe control synthesis for dynamical systems with either probabilistic or worst-case uncertainty in both the dynamics model and the safety constraints. We formulate novel probabilistic and robust (worst-case) control Lyapunov function (CLF) and control barrier function (CBF) constraints that take into account the effect of uncertainty in either case. We show that either the pr… ▽ More

    Submitted 30 September, 2022; v1 submitted 19 February, 2022; originally announced February 2022.

    Comments: Fix typos

  23. arXiv:2106.04514  [pdf

    cs.DC cs.OS

    GearV: A Two-Gear Hypervisor for Mixed-Criticality IoT Systems

    Authors: Kaiwen Long, Chong Xing, Yuebin Qi, Pei Zhang, Changsong Wu, Wenxiao Fang, **g Tan, Jie Chen, Shiming Zhang, Zuosheng Wang, Zuanmin Liu, Cao Liang, Jiaxiang Xu

    Abstract: This paper presents GearV, a two-gear lightweight hypervisor architecture to address the some known challenges. By dividing hypervisor into some partitions, and dividing scheduling policies into Gear1 and Gear2 respectively, GearV creates a consolidated platform to run best-effort system and safety-critical system simultaneously with managed engineering effort. The two-gears architecture also simp… ▽ More

    Submitted 5 June, 2021; originally announced June 2021.

    Comments: 12 pages, 8 figures, 11 tables

  24. arXiv:2104.08845  [pdf, other

    cs.CV cs.AI

    Lesion-Inspired Denoising Network: Connecting Medical Image Denoising and Lesion Detection

    Authors: Kecheng Chen, Kun Long, Yazhou Ren, Jiayu Sun, Xiaorong Pu

    Abstract: Deep learning has achieved notable performance in the denoising task of low-quality medical images and the detection task of lesions, respectively. However, existing low-quality medical image denoising approaches are disconnected from the detection task of lesions. Intuitively, the quality of denoised images will influence the lesion detection accuracy that in turn can be used to affect the denois… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

  25. arXiv:2011.01899  [pdf, other

    cs.RO

    Learning Barrier Functions with Memory for Robust Safe Navigation

    Authors: Kehan Long, Cheng Qian, Jorge Cortés, Nikolay Atanasov

    Abstract: Control barrier functions are widely used to enforce safety properties in robot motion planning and control. However, the problem of constructing barrier functions online and synthesizing safe controllers that can deal with the associated uncertainty has received little attention. This paper investigates safe navigation in unknown environments, using onboard range sensing to construct control barr… ▽ More

    Submitted 10 February, 2021; v1 submitted 3 November, 2020; originally announced November 2020.

  26. arXiv:2009.01632  [pdf, ps, other

    cs.IT

    Optimal Wireless Streaming of Multi-Quality 360 VR Video by Exploiting Natural, Relative Smoothness-enabled and Transcoding-enabled Multicast Opportunities

    Authors: Kaixuan Long, Ying Cui, Chencheng Ye, Zhi Liu

    Abstract: In this paper, we would like to investigate optimal wireless streaming of a multi-quality tiled 360 virtual reality (VR) video from a server to multiple users. To this end, we propose to maximally exploit potential multicast opportunities by effectively utilizing characteristics of multi-quality tiled 360 VR videos and computation resources at the users' side. In particular, we consider two requir… ▽ More

    Submitted 2 September, 2020; originally announced September 2020.

    Comments: 14 pages, 5 figures, major revision, IEEE Transations on Multimedia. arXiv admin note: substantial text overlap with arXiv:2001.01906

  27. arXiv:2007.10571  [pdf, other

    cs.DC cs.PF

    AI Tax: The Hidden Cost of AI Data Center Applications

    Authors: Daniel Richins, Dharmisha Doshi, Matthew Blackmore, Aswathy Thulaseedharan Nair, Neha Pathapati, Ankit Patel, Brainard Daguman, Daniel Dobrijalowski, Ramesh Illikkal, Kevin Long, David Zimmerman, Vijay Janapa Reddi

    Abstract: Artificial intelligence and machine learning are experiencing widespread adoption in industry and academia. This has been driven by rapid advances in the applications and accuracy of AI through increasingly complex algorithms and models; this, in turn, has spurred research into specialized hardware AI accelerators. Given the rapid pace of advances, it is easy to forget that they are often develope… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 32 pages. 16 figures. Submitted to ACM "Transactions on Computer Systems."

    ACM Class: I.2; C.4

  28. arXiv:2006.11513  [pdf, ps, other

    cs.IT eess.SP

    Deep Learning based Radio Resource Management in NOMA Networks: User Association, Subchannel and Power Allocation

    Authors: Haijun Zhang, Haisen Zhang, Ke** Long, George K. Karagiannidis

    Abstract: With the rapid development of future wireless communication, the combination of NOMA technology and millimeter-wave(mmWave) technology has become a research hotspot. The application of NOMA in mmWave heterogeneous networks can meet the diverse needs of users in different applications and scenarios in future communications. In this paper, we propose a machine learning framework to deal with the use… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

    Comments: to appear in IEEE Transactions on Network Science and Engineering

  29. arXiv:2005.02046  [pdf, other

    cs.IT eess.SP

    Energy Efficiency Optimization for NOMA UAV Network with Imperfect CSI

    Authors: Haijun Zhang, Jianmin Zhang, Ke** Long

    Abstract: Unmanned aerial vehicles (UAVs) are develo** rapidly owing to flexible deployment and access services as air base stations. However, the channel errors of low-altitude communication links formed by mobile deployment of UAVs cannot be ignored. And the energy efficiency of the UAVs communication with imperfect channel state information (CSI) hasnt been well studied yet. Therefore, we focus on syst… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: to appear in IEEE Journal on Selected Areas in Communications

  30. arXiv:2001.01906  [pdf, ps, other

    cs.IT

    Optimal Transmission of Multi-Quality Tiled 360 VR Video by Exploiting Multicast Opportunities

    Authors: Kaixuan Long, Ying Cui, Chencheng Ye, Zhi Liu

    Abstract: In this paper, we would like to investigate fundamental impacts of multicast opportunities on efficient transmission of a 360 VR video to multiple users in the cases with and without transcoding at each user. We establish a novel mathematical model that reflects the impacts of multicast opportunities on the average transmission energy in both cases and the transcoding energy in the case with user… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: to be published in GLOBECOM 2019

  31. arXiv:1912.07796  [pdf, other

    cs.RO cs.AI eess.SY

    A Comprehensive Review of Shepherding as a Bio-inspired Swarm-Robotics Guidance Approach

    Authors: Nathan K Long, Karl Sammut, Daniel Sgarioto, Matthew Garratt, Hussein Abbass

    Abstract: The simultaneous control of multiple coordinated robotic agents represents an elaborate problem. If solved, however, the interaction between the agents can lead to solutions to sophisticated problems. The concept of swarming, inspired by nature, can be described as the emergence of complex system-level behaviors from the interactions of relatively elementary agents. Due to the effectiveness of sol… ▽ More

    Submitted 30 April, 2020; v1 submitted 16 December, 2019; originally announced December 2019.

    Comments: Copyright 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  32. arXiv:1910.11376  [pdf, other

    cs.CR

    Neurlux: Dynamic Malware Analysis Without Feature Engineering

    Authors: Chani **dal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna

    Abstract: Malware detection plays a vital role in computer security. Modern machine learning approaches have been centered around domain knowledge for extracting malicious features. However, many potential features can be used, and it is time consuming and difficult to manually identify the best features, especially given the diverse nature of malware. In this paper, we propose Neurlux, a neural network f… ▽ More

    Submitted 24 October, 2019; originally announced October 2019.

  33. arXiv:1904.06925  [pdf, other

    cs.CV

    Deep Comprehensive Correlation Mining for Image Clustering

    Authors: Jianlong Wu, Keyu Long, Fei Wang, Chen Qian, Cheng Li, Zhouchen Lin, Hongbin Zha

    Abstract: Recent developed deep unsupervised methods allow us to jointly learn representation and cluster unlabelled data. These deep clustering methods mainly focus on the correlation among samples, e.g., selecting high precision pairs to gradually tune the feature representation, which neglects other useful correlations. In this paper, we propose a novel clustering framework, named deep comprehensive corr… ▽ More

    Submitted 12 August, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: Accepted to ICCV 2019

  34. arXiv:1901.02203  [pdf, ps, other

    cs.IT

    Optimal Multi-Quality Multicast for 360 Virtual Reality Video

    Authors: Kaixuan Long, Chencheng Ye, Ying Cui, Zhi Liu

    Abstract: A 360 virtual reality (VR) video, recording a scene of interest in every direction, provides VR users with immersive viewing experience. However, transmission of a 360 VR video which is of a much larger size than a traditional video to mobile users brings a heavy burden to a wireless network. In this paper, we consider multi-quality multicast of a 360 VR video from a single server to multiple user… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

    Comments: 7 pages, 7 figures, to be published in IEEE GLOBECOM 2018

  35. arXiv:1812.05256  [pdf, other

    cs.RO cs.AI

    Learning to Communicate: A Machine Learning Framework for Heterogeneous Multi-Agent Robotic Systems

    Authors: Hyung-** Yoon, Huaiyu Chen, Kehan Long, Heling Zhang, Aditya Gahlawat, Donghwan Lee, Naira Hovakimyan

    Abstract: We present a machine learning framework for multi-agent systems to learn both the optimal policy for maximizing the rewards and the encoding of the high dimensional visual observation. The encoding is useful for sharing local visual observations with other agents under communication resource constraints. The actor-encoder encodes the raw images and chooses an action based on local observations and… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    Comments: AIAA SciTech 2019

  36. arXiv:1810.06990  [pdf, other

    cs.CV

    LRW-1000: A Naturally-Distributed Large-Scale Benchmark for Lip Reading in the Wild

    Authors: Shuang Yang, Yuanhang Zhang, Dalu Feng, Mingmin Yang, Chenhao Wang, **gyun Xiao, Keyu Long, Shiguang Shan, Xilin Chen

    Abstract: Large-scale datasets have successively proven their fundamental importance in several research fields, especially for early progress in some emerging topics. In this paper, we focus on the problem of visual speech recognition, also known as lipreading, which has received increasing interest in recent years. We present a naturally-distributed large-scale benchmark for lip reading in the wild, named… ▽ More

    Submitted 23 April, 2019; v1 submitted 16 October, 2018; originally announced October 2018.

    Comments: IEEE FG 2019

  37. Circular-shift Linear Network Codes with Arbitrary Odd Block Lengths

    Authors: Qifu Tyler Sun, Hanqi Tang, Zongpeng Li, Xiaolong Yang, Ke** Long

    Abstract: Circular-shift linear network coding (LNC) is a class of vector LNC with low encoding and decoding complexities, and with local encoding kernels chosen from cyclic permutation matrices. When $L$ is a prime with primitive root $2$, it was recently shown that a scalar linear solution over GF($2^{L-1}$) induces an $L$-dimensional circular-shift linear solution at rate $(L-1)/L$. In this work, we prov… ▽ More

    Submitted 2 January, 2019; v1 submitted 12 June, 2018; originally announced June 2018.

  38. arXiv:1803.05641  [pdf, ps, other

    cs.IT

    Resource Allocation in NOMA based Fog Radio Access Networks

    Authors: H. Zhang, Y. Qiu, K. Long, G. K. Karagiannidis, X. Wang, A. Nallanathan

    Abstract: In the wake of growth in intelligent mobile devices and wide usage of bandwidth-hungry applications of mobile Internet, the demand of wireless data traffic and ubiquitous mobile broadband is rapidly increasing. On account of these developments, the research on fifth generation (5G) networks presents an accelerative tendency on a global scale. Edge computing draw lots of attention for reducing the… ▽ More

    Submitted 15 March, 2018; originally announced March 2018.

    Comments: to appear in IEEE Wireless Communications

  39. arXiv:1801.04552  [pdf, ps, other

    cs.IT

    Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks

    Authors: Haijun Zhang, Fang Fang, Julian Cheng, Ke** Long, Wei Wang, Victor C. M. Leung

    Abstract: Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can satisfy users' explosive data traffic requirements, and NOMA will likely play an important role in the fifth-generation (5G) mobile communication networks. However, NOMA brings new tech… ▽ More

    Submitted 14 January, 2018; originally announced January 2018.

  40. arXiv:1801.04441  [pdf, ps, other

    cs.IT

    Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation

    Authors: Haijun Zhang, Ning Yang, Ke** Long, Miao Pan, George K. Karagiannidis, Victor C. M. Leung

    Abstract: Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple access (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance t… ▽ More

    Submitted 13 January, 2018; originally announced January 2018.

  41. arXiv:1707.06892  [pdf, ps, other

    cs.IT

    Fog Radio Access Networks: Mobility Management, Interference Mitigation and Resource Optimization

    Authors: Haijun Zhang, Yu Qiu, Xiaoli Chu, Ke** Long, Victor C. M. Leung

    Abstract: In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the utilization of radio resources and social information is one of the major research topics in future mobile communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes… ▽ More

    Submitted 20 July, 2017; originally announced July 2017.

    Comments: to be appear in IEEE Wireless Communications. arXiv admin note: text overlap with arXiv:1502.02134 by other authors

  42. Circular-shift Linear Network Coding

    Authors: Hanqi Tang, Qifu Tyler Sun, Zongpeng Li, Xiaolong Yang, Ke** Long

    Abstract: We study a class of linear network coding (LNC) schemes, called circular-shift LNC, whose encoding operations consist of only circular-shifts and bit-wise additions (XOR). Formulated as a special vector linear code over GF($2$), an $L$-dimensional circular-shift linear code of degree $δ$ restricts its local encoding kernels to be the summation of at most $δ$ cyclic permutation matrices of size… ▽ More

    Submitted 25 April, 2018; v1 submitted 7 July, 2017; originally announced July 2017.

    Journal ref: IEEE Transactions on Information Theory, vol. 65, no. 1, pp. 65-80, Jan. 2019

  43. arXiv:1704.07038  [pdf, ps, other

    cs.IT

    Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges

    Authors: H. Zhang, N. Liu, X. Chu, K. Long, A. Aghvami, V. C. M. Leung

    Abstract: The fifth-generation (5G) networks are expected to be able to satisfy users' different quality-of-service (QoS) requirements. Network slicing is a promising technology for 5G networks to provide services tailored for users' specific QoS demands. Driven by the increased massive wireless data traffic from different application scenarios, efficient resource allocation schemes should be exploited to i… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

    Comments: to appear in IEEE Communications Magazine

  44. arXiv:1704.07037  [pdf, ps, other

    cs.IT

    Energy Efficient User Association and Power Allocation in Millimeter Wave Based Ultra Dense Networks with Energy Harvesting Base Stations

    Authors: H. Zhang, S. Huang, C. Jiang, K. Long, V. C. M. Leung, H. Vincent Poor

    Abstract: Millimeter wave (mmWave) communication technologies have recently emerged as an attractive solution to meet the exponentially increasing demand on mobile data traffic. Moreover, ultra dense networks (UDNs) combined with mmWave technology are expected to increase both energy efficiency and spectral efficiency. In this paper, user association and power allocation in mmWave based UDNs is considered w… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

    Comments: to appear, IEEE Journal on Selected Areas in Communications, 2017

  45. On Vector Linear Solvability of Multicast Networks

    Authors: Qifu Tyler Sun, Xiaolong Yang, Ke** Long, Xunrui Yin, Zongpeng Li

    Abstract: Vector linear network coding (LNC) is a generalization of the conventional scalar LNC, such that the data unit transmitted on every edge is an $L$-dimensional vector of data symbols over a base field GF($q$). Vector LNC enriches the choices of coding operations at intermediate nodes, and there is a popular conjecture on the benefit of vector LNC over scalar LNC in terms of alphabet size of data un… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Journal ref: IEEE TRANSACTIONS ON COMMUNICATIONS, vol. 64, no. 12, pp. 5096-5107, 2016

  46. arXiv:1403.2498  [pdf, other

    cs.AI

    Cognitive Internet of Things: A New Paradigm beyond Connection

    Authors: Qihui Wu, Guoru Ding, Yuhua Xu, Shuo Feng, Zhiyong Du, **long Wang, Ke** Long

    Abstract: Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, we argue that only connected is not enough, beyond that, general objects should have the capability to learn, think, and understand both physical and social worlds by themselves. Thi… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

  47. Multicast Network Coding and Field Sizes

    Authors: Qifu, Sun, Xunrui Yin, Zongpeng Li, Ke** Long

    Abstract: In an acyclic multicast network, it is well known that a linear network coding solution over GF($q$) exists when $q$ is sufficiently large. In particular, for each prime power $q$ no smaller than the number of receivers, a linear solution over GF($q$) can be efficiently constructed. In this work, we reveal that a linear solution over a given finite field does \emph{not} necessarily imply the exist… ▽ More

    Submitted 13 February, 2015; v1 submitted 14 January, 2014; originally announced January 2014.