Skip to main content

Showing 1–15 of 15 results for author: Mao, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01349  [pdf, other

    cs.CV

    Unleashing Generalization of End-to-End Autonomous Driving with Controllable Long Video Generation

    Authors: Enhui Ma, Lijun Zhou, Tao Tang, Zhan Zhang, Dong Han, Junpeng Jiang, Kun Zhan, Peng Jia, Xianpeng Lang, Haiyang Sun, Di Lin, Kaicheng Yu

    Abstract: Using generative models to synthesize new data has become a de-facto standard in autonomous driving to address the data scarcity issue. Though existing approaches are able to boost perception models, we discover that these approaches fail to improve the performance of planning of end-to-end autonomous driving models as the generated videos are usually less than 8 frames and the spatial and tempora… ▽ More

    Submitted 6 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Project Page: https://westlake-autolab.github.io/delphi.github.io/, 8 figures

  2. arXiv:2404.05696  [pdf

    cs.DB q-bio.QM

    BOLD v4: A Centralized Bioinformatics Platform for DNA-based Biodiversity Data

    Authors: Sujeevan Ratnasingham, Catherine Wei, Dean Chan, Jireh Agda, Josh Agda, Liliana Ballesteros-Mejia, Hamza Ait Boutou, Zak Mohammad El Bastami, Eddie Ma, Ramya Manjunath, Dana Rea, Chris Ho, Angela Telfer, Jaclyn McKeowan, Miduna Rahulan, Claudia Steinke, Justin Dorsheimer, Megan Milton, Paul D. N. Hebert

    Abstract: BOLD, the Barcode of Life Data System, supports the acquisition, storage, validation, analysis, and publication of DNA barcodes, activities requiring the integration of molecular, morphological, and distributional data. Its pivotal role in curating the reference library of DNA barcodes, coupled with its data management and analysis capabilities, make it a central resource for biodiversity science.… ▽ More

    Submitted 5 May, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  3. arXiv:2403.13213  [pdf, other

    cs.LG cs.CL cs.CY

    From Representational Harms to Quality-of-Service Harms: A Case Study on Llama 2 Safety Safeguards

    Authors: Khaoula Chehbouni, Megha Roshan, Emmanuel Ma, Futian Andrew Wei, Afaf Taik, Jackie CK Cheung, Golnoosh Farnadi

    Abstract: Recent progress in large language models (LLMs) has led to their widespread adoption in various domains. However, these advancements have also introduced additional safety risks and raised concerns regarding their detrimental impact on already marginalized populations. Despite growing mitigation efforts to develop safety safeguards, such as supervised safety-oriented fine-tuning and leveraging saf… ▽ More

    Submitted 7 June, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

    Comments: 9 pages, 4 figures. Accepted to Findings of the Association for Computational Linguistics: ACL 2024

  4. arXiv:2402.17019  [pdf, other

    cs.CL cs.HC

    Leveraging Large Language Models for Learning Complex Legal Concepts through Storytelling

    Authors: Hang Jiang, Xiajie Zhang, Robert Mahari, Daniel Kessler, Eric Ma, Tal August, Irene Li, Alex 'Sandy' Pentland, Yoon Kim, Deb Roy, Jad Kabbara

    Abstract: Making legal knowledge accessible to non-experts is crucial for enhancing general legal literacy and encouraging civic participation in democracy. However, legal documents are often challenging to understand for people without legal backgrounds. In this paper, we present a novel application of large language models (LLMs) in legal education to help non-experts learn intricate legal concepts throug… ▽ More

    Submitted 2 July, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

    Comments: Accepted to ACL 2024

  5. arXiv:2310.09397  [pdf, other

    cs.LG math.AG math.ST

    Identifiability of Product of Experts Models

    Authors: Spencer L. Gordon, Manav Kant, Eric Ma, Leonard J. Schulman, Andrei Staicu

    Abstract: Product of experts (PoE) are layered networks in which the value at each node is an AND (or product) of the values (possibly negated) at its inputs. These were introduced as a neural network architecture that can efficiently learn to generate high-dimensional data which satisfy many low-dimensional constraints -- thereby allowing each individual expert to perform a simple task. PoEs have found a v… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Comments: 24 pages, 2 figures

    MSC Class: 62E10; 62F99; 68T05 ACM Class: I.2.6

  6. arXiv:2308.01661  [pdf, other

    cs.CV

    BEVControl: Accurately Controlling Street-view Elements with Multi-perspective Consistency via BEV Sketch Layout

    Authors: Kairui Yang, Enhui Ma, Jibin Peng, Qing Guo, Di Lin, Kaicheng Yu

    Abstract: Using synthesized images to boost the performance of perception models is a long-standing research challenge in computer vision. It becomes more eminent in visual-centric autonomous driving systems with multi-view cameras as some long-tail scenarios can never be collected. Guided by the BEV segmentation layouts, the existing generative networks seem to synthesize photo-realistic street-view images… ▽ More

    Submitted 23 September, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: 13 pages, 8 figures

  7. arXiv:2307.07938  [pdf, other

    cs.CV

    CVSformer: Cross-View Synthesis Transformer for Semantic Scene Completion

    Authors: Haotian Dong, Enhui Ma, Lubo Wang, Miaohui Wang, Wuyuan Xie, Qing Guo, ** Li, Lingyu Liang, Kairui Yang, Di Lin

    Abstract: Semantic scene completion (SSC) requires an accurate understanding of the geometric and semantic relationships between the objects in the 3D scene for reasoning the occluded objects. The popular SSC methods voxelize the 3D objects, allowing the deep 3D convolutional network (3D CNN) to learn the object relationships from the complex scenes. However, the current networks lack the controllable kerne… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: 10 pages, 6 figures

  8. arXiv:2307.00008  [pdf, other

    cs.CL cs.AI

    Investigating Masking-based Data Generation in Language Models

    Authors: Ed S. Ma

    Abstract: The current era of natural language processing (NLP) has been defined by the prominence of pre-trained language models since the advent of BERT. A feature of BERT and models with similar architecture is the objective of masked language modeling, in which part of the input is intentionally masked and the model is trained to predict this piece of masked information. Data augmentation is a data-drive… ▽ More

    Submitted 16 June, 2023; originally announced July 2023.

    Comments: Work in progress

  9. arXiv:2303.02725  [pdf, other

    cs.LG cs.CR

    Local Environment Poisoning Attacks on Federated Reinforcement Learning

    Authors: Evelyn Ma, Praneet Rathi, S. Rasoul Etesami

    Abstract: Federated learning (FL) has become a popular tool for solving traditional Reinforcement Learning (RL) tasks. The multi-agent structure addresses the major concern of data-hungry in traditional RL, while the federated mechanism protects the data privacy of individual agents. However, the federated mechanism also exposes the system to poisoning by malicious agents that can mislead the trained policy… ▽ More

    Submitted 4 January, 2024; v1 submitted 5 March, 2023; originally announced March 2023.

  10. arXiv:2208.10041  [pdf

    cs.NI

    Mission Apollo: Landing Optical Circuit Switching at Datacenter Scale

    Authors: Ryohei Urata, Hong Liu, Kevin Yasumura, Erji Mao, Jill Berger, Xiang Zhou, Cedric Lam, Roy Bannon, Darren Hutchinson, Daniel Nelson, Leon Poutievski, Arjun Singh, Joon Ong, Amin Vahdat

    Abstract: In this paper, we describe Apollo, to the best of our knowledge, the world's first large-scale production deployment of optical circuit switches (OCSes) for datacenter networking. We will first describe the infrastructure challenges and use cases that motivated optical switching inside datacenters. We then delve into the requirements of OCSes for datacenter applications: balancing cost, port count… ▽ More

    Submitted 21 August, 2022; originally announced August 2022.

    Comments: 13 pages, 14 figures

  11. arXiv:2205.01851  [pdf, ps, other

    cs.HC

    Toward Data-Driven Digital Therapeutics Analytics: Literature Review and Research Directions

    Authors: Uichin Lee, Gyuwon Jung, Eun-Yeol Ma, ** San Kim, Heepyung Kim, Jumabek Alikhanov, Youngtae Noh, Heeyoung Kim

    Abstract: With the advent of Digital Therapeutics (DTx), the development of software as a medical device (SaMD) for mobile and wearable devices has gained significant attention in recent years. Existing DTx evaluations, such as randomized clinical trials, mostly focus on verifying the effectiveness of DTx products. To acquire a deeper understanding of DTx engagement and behavioral adherence, beyond efficacy… ▽ More

    Submitted 18 September, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

    Comments: This paper has been accepted by the IEEE/CAA Journal of Automatica Sinica

  12. arXiv:2202.04361  [pdf

    cs.ET cond-mat.mtrl-sci cond-mat.soft

    Molecular-scale Integration of Multi-modal Sensing and Neuromorphic Computing with Organic Electrochemical Transistors

    Authors: Shijie Wang, Xi Chen, Chao Zhao, Yuxin Kong, Baojun Lin, Yongyi Wu, Zhaozhao Bi, Ziyi Xuan, Tao Li, Yuxiang Li, Wei Zhang, En Ma, Zhongrui Wang, Wei Ma

    Abstract: Abstract: Bionic learning with fused sensing, memory and processing functions outperforms artificial neural networks running on silicon chips in terms of efficiency and footprint. However, digital hardware implementation of bionic learning suffers from device heterogeneity in sensors and processing cores, which incurs large hardware, energy and time overheads. Here, we present a universal solution… ▽ More

    Submitted 19 February, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: 17 pages, 4 figures

  13. arXiv:2202.01832  [pdf, other

    cs.LG

    Adversarially Robust Models may not Transfer Better: Sufficient Conditions for Domain Transferability from the View of Regularization

    Authors: Xiaojun Xu, Jacky Yibo Zhang, Evelyn Ma, Danny Son, Oluwasanmi Koyejo, Bo Li

    Abstract: Machine learning (ML) robustness and domain generalization are fundamentally correlated: they essentially concern data distribution shifts under adversarial and natural settings, respectively. On one hand, recent studies show that more robust (adversarially trained) models are more generalizable. On the other hand, there is a lack of theoretical understanding of their fundamental connections. In t… ▽ More

    Submitted 23 June, 2022; v1 submitted 3 February, 2022; originally announced February 2022.

    Comments: ICML2022

  14. arXiv:2201.01350  [pdf, other

    cs.CR cs.HC

    Prospects for Improving Password Selection

    Authors: Eryn Ma, Summer Hasama, Eshaan Lumba, Eleanor Birrell

    Abstract: User-chosen passwords remain essential to online security, and yet people continue to choose weak, insecure passwords. In this work, we investigate whether prospect theory, a behavioral model of how people evaluate risk, can provide insights into how users choose passwords and whether it can motivate new designs for password selection mechanisms that will nudge users to select stronger passwords.… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

  15. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication

    Authors: Mario Frank, Ralf Biedert, Eugene Ma, Ivan Martinovic, Dawn Song

    Abstract: We investigate whether a classifier can continuously authenticate users based on the way they interact with the touchscreen of a smart phone. We propose a set of 30 behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different users populate distinct subspaces of this feature space. In a systematic experiment designed to test how this behavioral pattern e… ▽ More

    Submitted 8 October, 2012; v1 submitted 26 July, 2012; originally announced July 2012.

    Comments: to appear at IEEE Transactions on Information Forensics & Security; Download data from http://www.mariofrank.net/touchalytics/

    Journal ref: IEEE Transactions on Information Forensics and Security (Vol. 8, No. 1), pages 136-148, 2013