Skip to main content

Showing 1–50 of 80 results for author: Meng, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19633  [pdf, other

    cs.SE

    Combating Missed Recalls in E-commerce Search: A CoT-Prompting Testing Approach

    Authors: Shengnan Wu, Yongxiang Hu, Yingchuan Wang, Jiazhen Gu, ** Meng, Liujie Fan, Zhongshi Luan, Xin Wang, Yangfan Zhou

    Abstract: Search components in e-commerce apps, often complex AI-based systems, are prone to bugs that can lead to missed recalls - situations where items that should be listed in search results aren't. This can frustrate shop owners and harm the app's profitability. However, testing for missed recalls is challenging due to difficulties in generating user-aligned test cases and the absence of oracles. In th… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering (FSE Companion '24), July 15--19, 2024, Porto de Galinhas, Brazil

  2. arXiv:2406.16986  [pdf, ps, other

    cs.LG cs.AI cs.CR

    Machine Unlearning with Minimal Gradient Dependence for High Unlearning Ratios

    Authors: Tao Huang, Ziyang Chen, Jiayang Meng, Qingyu Huang, Xu Yang, Xun Yi, Ibrahim Khalil

    Abstract: In the context of machine unlearning, the primary challenge lies in effectively removing traces of private data from trained models while maintaining model performance and security against privacy attacks like membership inference attacks. Traditional gradient-based unlearning methods often rely on extensive historical gradients, which becomes impractical with high unlearning ratios and may reduce… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

  3. arXiv:2406.14878  [pdf, other

    cs.CV cs.LG eess.IV

    MOS: Model Synergy for Test-Time Adaptation on LiDAR-Based 3D Object Detection

    Authors: Zhuoxiao Chen, Junjie Meng, Mahsa Baktashmotlagh, Zi Huang, Yadan Luo

    Abstract: LiDAR-based 3D object detection is pivotal across many applications, yet the performance of such detection systems often degrades after deployment, especially when faced with unseen test point clouds originating from diverse locations or subjected to corruption. In this work, we introduce a new online adaptation framework for detectors named Model Synergy (MOS). Specifically, MOS dynamically assem… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  4. arXiv:2406.11389  [pdf, other

    cs.LG

    SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask Learning

    Authors: Kaidi Li, Tianmeng Yang, Min Zhou, Jiahao Meng, Shendi Wang, Yihui Wu, Boshuai Tan, Hu Song, Lujia Pan, Fan Yu, Zhenli Sheng, Yunhai Tong

    Abstract: Graph-based fraud detection has widespread application in modern industry scenarios, such as spam review and malicious account detection. While considerable efforts have been devoted to designing adequate fraud detectors, the interpretability of their results has often been overlooked. Previous works have attempted to generate explanations for specific instances using post-hoc explaining methods s… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: Accepted by KDD 2024

  5. arXiv:2406.09484  [pdf, other

    cs.CV cs.CR

    Is Diffusion Model Safe? Severe Data Leakage via Gradient-Guided Diffusion Model

    Authors: Jiayang Meng, Tao Huang, Hong Chen, Cui** Li

    Abstract: Gradient leakage has been identified as a potential source of privacy breaches in modern image processing systems, where the adversary can completely reconstruct the training images from leaked gradients. However, existing methods are restricted to reconstructing low-resolution images where data leakage risks of image processing systems are not sufficiently explored. In this paper, by exploiting d… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  6. arXiv:2406.08877  [pdf, other

    cs.CV

    EgoExo-Fitness: Towards Egocentric and Exocentric Full-Body Action Understanding

    Authors: Yuan-Ming Li, Wei-** Huang, An-Lan Wang, Ling-An Zeng, **g-Ke Meng, Wei-Shi Zheng

    Abstract: We present EgoExo-Fitness, a new full-body action understanding dataset, featuring fitness sequence videos recorded from synchronized egocentric and fixed exocentric (third-person) cameras. Compared with existing full-body action understanding datasets, EgoExo-Fitness not only contains videos from first-person perspectives, but also provides rich annotations. Specifically, two-level temporal bound… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 33 pages, 9 figures

  7. arXiv:2406.02622  [pdf, other

    cs.CR cs.AI

    Safeguarding Large Language Models: A Survey

    Authors: Yi Dong, Ronghui Mu, Yanghao Zhang, Siqi Sun, Tianle Zhang, Changshun Wu, Gaojie **, Yi Qi, **wei Hu, Jie Meng, Saddek Bensalem, Xiaowei Huang

    Abstract: In the burgeoning field of Large Language Models (LLMs), develo** a robust safety mechanism, colloquially known as "safeguards" or "guardrails", has become imperative to ensure the ethical use of LLMs within prescribed boundaries. This article provides a systematic literature review on the current status of this critical mechanism. It discusses its major challenges and how it can be enhanced int… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: under review. arXiv admin note: text overlap with arXiv:2402.01822

  8. arXiv:2406.02058  [pdf, other

    cs.CV cs.RO

    OpenGaussian: Towards Point-Level 3D Gaussian-based Open Vocabulary Understanding

    Authors: Yanmin Wu, Jiarui Meng, Haijie Li, Chenming Wu, Yahao Shi, Xinhua Cheng, Chen Zhao, Haocheng Feng, Errui Ding, **gdong Wang, Jian Zhang

    Abstract: This paper introduces OpenGaussian, a method based on 3D Gaussian Splatting (3DGS) capable of 3D point-level open vocabulary understanding. Our primary motivation stems from observing that existing 3DGS-based open vocabulary methods mainly focus on 2D pixel-level parsing. These methods struggle with 3D point-level tasks due to weak feature expressiveness and inaccurate 2D-3D feature associations.… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: technical report, 15 pages

  9. arXiv:2405.20669  [pdf, other

    cs.CV

    Fourier123: One Image to High-Quality 3D Object Generation with Hybrid Fourier Score Distillation

    Authors: Shuzhou Yang, Yu Wang, Haijie Li, Jiarui Meng, Xiandong Meng, Jian Zhang

    Abstract: Single image-to-3D generation is pivotal for crafting controllable 3D assets. Given its underconstrained nature, we leverage geometric priors from a 3D novel view generation diffusion model and appearance priors from a 2D image generation method to guide the optimization process. We note that a disparity exists between the training datasets of 2D and 3D diffusion models, leading to their outputs s… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  10. arXiv:2405.15118  [pdf, other

    cs.CV

    GS-Hider: Hiding Messages into 3D Gaussian Splatting

    Authors: Xuanyu Zhang, Jiarui Meng, Runyi Li, Zhipei Xu, Yongbing Zhang, Jian Zhang

    Abstract: 3D Gaussian Splatting (3DGS) has already become the emerging research focus in the fields of 3D scene reconstruction and novel view synthesis. Given that training a 3DGS requires a significant amount of time and computational cost, it is crucial to protect the copyright, integrity, and privacy of such 3D assets. Steganography, as a crucial technique for encrypted transmission and copyright protect… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 3DGS steganography

  11. arXiv:2405.06782  [pdf, other

    cs.CV

    GraphRelate3D: Context-Dependent 3D Object Detection with Inter-Object Relationship Graphs

    Authors: Mingyu Liu, Ekim Yurtsever, Marc Brede, Jun Meng, Walter Zimmer, Xingcheng Zhou, Bare Luka Zagar, Yuning Cui, Alois Knoll

    Abstract: Accurate and effective 3D object detection is critical for ensuring the driving safety of autonomous vehicles. Recently, state-of-the-art two-stage 3D object detectors have exhibited promising performance. However, these methods refine proposals individually, ignoring the rich contextual information in the object relationships between the neighbor proposals. In this study, we introduce an object r… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  12. arXiv:2405.01775  [pdf, other

    cs.AR cs.LG

    Torch2Chip: An End-to-end Customizable Deep Neural Network Compression and Deployment Toolkit for Prototype Hardware Accelerator Design

    Authors: Jian Meng, Yuan Liao, Anupreetham Anupreetham, Ahmed Hasssan, Shixing Yu, Han-sok Suh, Xiaofeng Hu, Jae-sun Seo

    Abstract: The development of model compression is continuously motivated by the evolution of various neural network accelerators with ASIC or FPGA. On the algorithm side, the ultimate goal of quantization or pruning is accelerating the expensive DNN computations on low-power hardware. However, such a "design-and-deploy" workflow faces under-explored challenges in the current hardware-algorithm co-design com… ▽ More

    Submitted 6 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

    Comments: Accepted for publication at MLSys 2024

  13. arXiv:2404.01168  [pdf, other

    cs.CV cs.GR

    Mirror-3DGS: Incorporating Mirror Reflections into 3D Gaussian Splatting

    Authors: Jiarui Meng, Haijie Li, Yanmin Wu, Qiankun Gao, Shuzhou Yang, Jian Zhang, Siwei Ma

    Abstract: 3D Gaussian Splatting (3DGS) has marked a significant breakthrough in the realm of 3D scene reconstruction and novel view synthesis. However, 3DGS, much like its predecessor Neural Radiance Fields (NeRF), struggles to accurately model physical reflections, particularly in mirrors that are ubiquitous in real-world scenes. This oversight mistakenly perceives reflections as separate entities that phy… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: 22 pages, 7 figures

  14. arXiv:2402.01822  [pdf, ps, other

    cs.CL cs.AI

    Building Guardrails for Large Language Models

    Authors: Yi Dong, Ronghui Mu, Gaojie **, Yi Qi, **wei Hu, Xingyu Zhao, Jie Meng, Wenjie Ruan, Xiaowei Huang

    Abstract: As Large Language Models (LLMs) become more integrated into our daily lives, it is crucial to identify and mitigate their risks, especially when the risks can have profound impacts on human users and societies. Guardrails, which filter the inputs or outputs of LLMs, have emerged as a core safeguarding technology. This position paper takes a deep look at current open-source solutions (Llama Guard,… ▽ More

    Submitted 29 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Proceedings of the 41st International Conference on Machine Learning, Vienna, Austria. PMLR 235, 2024

  15. arXiv:2401.11644  [pdf, other

    cs.CV cs.RO

    Friends Across Time: Multi-Scale Action Segmentation Transformer for Surgical Phase Recognition

    Authors: Bokai Zhang, Jiayuan Meng, Bin Cheng, Dean Biskup, Svetlana Petculescu, Angela Chapman

    Abstract: Automatic surgical phase recognition is a core technology for modern operating rooms and online surgical video assessment platforms. Current state-of-the-art methods use both spatial and temporal information to tackle the surgical phase recognition task. Building on this idea, we propose the Multi-Scale Action Segmentation Transformer (MS-AST) for offline surgical phase recognition and the Multi-S… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

  16. arXiv:2312.01745  [pdf, other

    cs.CV

    Cross-Modal Adaptive Dual Association for Text-to-Image Person Retrieval

    Authors: Dixuan Lin, Yixing Peng, **gke Meng, Wei-Shi Zheng

    Abstract: Text-to-image person re-identification (ReID) aims to retrieve images of a person based on a given textual description. The key challenge is to learn the relations between detailed information from visual and textual modalities. Existing works focus on learning a latent space to narrow the modality gap and further build local correspondences between two modalities. However, these methods assume th… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  17. arXiv:2311.07634  [pdf, other

    cs.CV

    ActiveDC: Distribution Calibration for Active Finetuning

    Authors: Wenshuai Xu, Zhenghui Hu, Yu Lu, **zhou Meng, Qingjie Liu, Yunhong Wang

    Abstract: The pretraining-finetuning paradigm has gained popularity in various computer vision tasks. In this paradigm, the emergence of active finetuning arises due to the abundance of large-scale data and costly annotation requirements. Active finetuning involves selecting a subset of data from an unlabeled pool for annotation, facilitating subsequent finetuning. However, the use of a limited number of tr… ▽ More

    Submitted 27 February, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: CVPR 2024 Accept

  18. arXiv:2310.13028  [pdf, other

    cs.CL cs.AI

    Reliable Academic Conference Question Answering: A Study Based on Large Language Model

    Authors: Zhiwei Huang, Long **, Junjie Wang, Mingchen Tu, Yin Hua, Zhiqiang Liu, Jiawei Meng, Huajun Chen, Wen Zhang

    Abstract: The rapid growth of computer science has led to a proliferation of research presented at academic conferences, fostering global scholarly communication. Researchers consistently seek accurate, current information about these events at all stages. This data surge necessitates an intelligent question-answering system to efficiently address researchers' queries and ensure awareness of the latest adva… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 10 pages, 4 figures, 2 tables

  19. arXiv:2309.17105  [pdf, other

    cs.CV

    Continual Action Assessment via Task-Consistent Score-Discriminative Feature Distribution Modeling

    Authors: Yuan-Ming Li, Ling-An Zeng, **g-Ke Meng, Wei-Shi Zheng

    Abstract: Action Quality Assessment (AQA) is a task that tries to answer how well an action is carried out. While remarkable progress has been achieved, existing works on AQA assume that all the training data are visible for training at one time, but do not enable continual learning on assessing new technical actions. In this work, we address such a Continual Learning problem in AQA (Continual-AQA), which u… ▽ More

    Submitted 2 May, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

    Comments: 16 pages, 8 figures

  20. arXiv:2309.08854  [pdf, other

    cs.RO

    Intention-Aware Planner for Robust and Safe Aerial Tracking

    Authors: Qiuyu Ren, Huan Yu, Jiajun Dai, Zhi Zheng, Jun Meng, Li Xu, Chao Xu, Fei Gao, Yanjun Cao

    Abstract: Autonomous target tracking with quadrotors has wide applications in many scenarios, such as cinematographic follow-up shooting or suspect chasing. Target motion prediction is necessary when designing the tracking planner. However, the widely used constant velocity or constant rotation assumption can not fully capture the dynamics of the target. The tracker may fail when the target happens to move… ▽ More

    Submitted 20 March, 2024; v1 submitted 15 September, 2023; originally announced September 2023.

    Comments: 8 pages, 10 figures, submitted to 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  21. arXiv:2308.15989  [pdf, other

    cs.CV

    DiffuVolume: Diffusion Model for Volume based Stereo Matching

    Authors: Dian Zheng, Xiao-Ming Wu, Zuhao Liu, **gke Meng, Wei-shi Zheng

    Abstract: Stereo matching is a significant part in many computer vision tasks and driving-based applications. Recently cost volume-based methods have achieved great success benefiting from the rich geometry information in paired images. However, the redundancy of cost volume also interferes with the model training and limits the performance. To construct a more precise cost volume, we pioneeringly apply the… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: 17 pages, 11 figures

  22. arXiv:2308.08885  [pdf, other

    cs.CV

    Event-Guided Procedure Planning from Instructional Videos with Text Supervision

    Authors: An-Lan Wang, Kun-Yu Lin, Jia-Run Du, **gke Meng, Wei-Shi Zheng

    Abstract: In this work, we focus on the task of procedure planning from instructional videos with text supervision, where a model aims to predict an action sequence to transform the initial visual state into the goal visual state. A critical challenge of this task is the large semantic gap between observed visual states and unobserved intermediate actions, which is ignored by previous works. Specifically, t… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: Accepted to ICCV 2023

  23. arXiv:2308.00909  [pdf, other

    cs.DB cs.IR

    Rethinking Similarity Search: Embracing Smarter Mechanisms over Smarter Data

    Authors: Renzhi Wu, **gfan Meng, Jie Jeff Xu, Huayi Wang, Kexin Rong

    Abstract: In this vision paper, we propose a shift in perspective for improving the effectiveness of similarity search. Rather than focusing solely on enhancing the data quality, particularly machine learning-generated embeddings, we advocate for a more comprehensive approach that also enhances the underpinning search mechanisms. We highlight three novel avenues that call for a redefinition of the similarit… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  24. arXiv:2307.05541  [pdf, other

    cs.CV

    High Fidelity 3D Hand Shape Reconstruction via Scalable Graph Frequency Decomposition

    Authors: Tianyu Luan, Yuanhao Zhai, **g**g Meng, Zhong Li, Zhang Chen, Yi Xu, Junsong Yuan

    Abstract: Despite the impressive performance obtained by recent single-image hand modeling techniques, they lack the capability to capture sufficient details of the 3D hand mesh. This deficiency greatly limits their applications when high-fidelity hand modeling is required, e.g., personalized hand modeling. To address this problem, we design a frequency split network to generate 3D hand mesh using different… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: CVPR 2023

    Journal ref: In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 16795-16804. 2023

  25. arXiv:2307.00976  [pdf

    cs.CV

    Autism Spectrum Disorder Classification in Children based on Structural MRI Features Extracted using Contrastive Variational Autoencoder

    Authors: Ruimin Ma, Ruitao Xie, Yanlin Wang, **tao Meng, Yanjie Wei, Wenhui Xi, Yi Pan

    Abstract: Autism spectrum disorder (ASD) is a highly disabling mental disease that brings significant impairments of social interaction ability to the patients, making early screening and intervention of ASD critical. With the development of the machine learning and neuroimaging technology, extensive research has been conducted on machine classification of ASD based on structural MRI (s-MRI). However, most… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  26. arXiv:2307.00464  [pdf, other

    cs.CV cs.AI

    Human-to-Human Interaction Detection

    Authors: Zhenhua Wang, Kaining Ying, Jiajun Meng, Jifeng Ning

    Abstract: A comprehensive understanding of interested human-to-human interactions in video streams, such as queuing, handshaking, fighting and chasing, is of immense importance to the surveillance of public security in regions like campuses, squares and parks. Different from conventional human interaction recognition, which uses choreographed videos as inputs, neglects concurrent interactive groups, and per… ▽ More

    Submitted 11 August, 2023; v1 submitted 1 July, 2023; originally announced July 2023.

  27. arXiv:2306.14097  [pdf, other

    eess.IV cs.CV math.NA

    Interpretable Small Training Set Image Segmentation Network Originated from Multi-Grid Variational Model

    Authors: Junying Meng, Weihong Guo, Jun Liu, Mingrui Yang

    Abstract: The main objective of image segmentation is to divide an image into homogeneous regions for further analysis. This is a significant and crucial task in many applications such as medical imaging. Deep learning (DL) methods have been proposed and widely used for image segmentation. However, these methods usually require a large amount of manually segmented data as training data and suffer from poor… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: 25 pages, 9 figures, 6 tables

    MSC Class: 94A08; 68U10

  28. Exploiting Scratchpad Memory for Deep Temporal Blocking: A case study for 2D Jacobian 5-point iterative stencil kernel (j2d5pt)

    Authors: Lingqi Zhang, Mohamed Wahib, Peng Chen, **tao Meng, Xiao Wang, Toshio Endo, Satoshi Matsuoka

    Abstract: General Purpose Graphics Processing Units (GPGPU) are used in most of the top systems in HPC. The total capacity of scratchpad memory has increased by more than 40 times in the last decade. However, existing optimizations for stencil computations using temporal blocking have not aggressively exploited the large capacity of scratchpad memory. This work uses the 2D Jacobian 5-point iterative stencil… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: This is short paper is published in the 15th workshop on general purpose processing using GPU (GPGPU 2023)

  29. arXiv:2306.01243  [pdf, other

    cs.LG

    Efficient Reinforcement Learning with Impaired Observability: Learning to Act with Delayed and Missing State Observations

    Authors: Minshuo Chen, Jie Meng, Yu Bai, Yinyu Ye, H. Vincent Poor, Mengdi Wang

    Abstract: In real-world reinforcement learning (RL) systems, various forms of {\it impaired observability} can complicate matters. These situations arise when an agent is unable to observe the most recent state of the system due to latency or lossy channels, yet the agent must still make real-time decisions. This paper introduces a theoretical investigation into efficient RL in control systems where agents… ▽ More

    Submitted 26 October, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

  30. arXiv:2305.18240  [pdf, other

    cs.LG cs.AI

    XGrad: Boosting Gradient-Based Optimizers With Weight Prediction

    Authors: Lei Guan, Dongsheng Li, Yanqi Shi, Jian Meng

    Abstract: In this paper, we propose a general deep learning training framework XGrad which introduces weight prediction into the popular gradient-based optimizers to boost their convergence and generalization when training the deep neural network (DNN) models. In particular, ahead of each mini-batch training, the future weights are predicted according to the update rule of the used optimizer and are then ap… ▽ More

    Submitted 7 April, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:2302.00195

  31. Revisiting Temporal Blocking Stencil Optimizations

    Authors: Lingqi Zhang, Mohamed Wahib, Peng Chen, **tao Meng, Xiao Wang, Toshio Endo, Satoshi Matsuoka

    Abstract: Iterative stencils are used widely across the spectrum of High Performance Computing (HPC) applications. Many efforts have been put into optimizing stencil GPU kernels, given the prevalence of GPU-accelerated supercomputers. To improve the data locality, temporal blocking is an optimization that combines a batch of time steps to process them together. Under the observation that GPUs are evolving t… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: This paper will be published in 2023 International Conference on Supercomputing (ICS23)

  32. arXiv:2305.03795  [pdf, ps, other

    cs.IT

    RECIPE: Rateless Erasure Codes Induced by Protocol-Based Encoding

    Authors: **gfan Meng, Ziheng Liu, Yiwei Wang, Jun Xu

    Abstract: LT (Luby transform) codes are a celebrated family of rateless erasure codes (RECs). Most of existing LT codes were designed for applications in which a centralized encoder possesses all message blocks and is solely responsible for encoding them into codewords. Distributed LT codes, in which message blocks are physically scattered across multiple different locations (encoders) that need to collabor… ▽ More

    Submitted 10 May, 2023; v1 submitted 5 May, 2023; originally announced May 2023.

    Comments: Accepted by IEEE ISIT 2023

  33. arXiv:2303.12730  [pdf, other

    cs.CV cs.AI cs.LG

    Toward Data-Driven Glare Classification and Prediction for Marine Megafauna Survey

    Authors: Joshua Power, Derek Jacoby, Marc-Antoine Drouin, Guillaume Durand, Yvonne Coady, Julian Meng

    Abstract: Critically endangered species in Canadian North Atlantic waters are systematically surveyed to estimate species populations which influence governing policies. Due to its impact on policy, population accuracy is important. This paper lays the foundation towards a data-driven glare modelling system, which will allow surveyors to preemptively minimize glare. Surveyors use a detection function to est… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: 15 pages, 4 figures, 5th ICPR Workshop on Computer Vison for Automated Analysis of Underwater Imagery (CVAUI 2022)

  34. arXiv:2303.00668  [pdf, other

    cs.RO

    Roller-Quadrotor: A Novel Hybrid Terrestrial/Aerial Quadrotor with Unicycle-Driven and Rotor-Assisted Turning

    Authors: Zhi Zheng, ** Wang, Yuze Wu, Qifeng Cai, Huan Yu, Ruibin Zhang, Jie Tu, Jun Meng, Guodong Lu, Fei Gao

    Abstract: The Roller-Quadrotor is a novel quadrotor that combines the maneuverability of aerial drones with the endurance of ground vehicles. This work focuses on the design, modeling, and experimental validation of the Roller-Quadrotor. Flight capabilities are achieved through a quadrotor configuration, with four thrust-providing actuators. Additionally, rolling motion is facilitated by a unicycle-driven a… ▽ More

    Submitted 26 June, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 8 pages, 10 figures, accepted by 2023 IEEE/RSJ International Conference on Intelligent Robots(IROS). This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  35. arXiv:2302.10693  [pdf, other

    cs.RO

    Sim2Real$^2$: Actively Building Explicit Physics Model for Precise Articulated Object Manipulation

    Authors: Liqian Ma, Jiaojiao Meng, Shuntao Liu, Weihang Chen, **g Xu, Rui Chen

    Abstract: Accurately manipulating articulated objects is a challenging yet important task for real robot applications. In this paper, we present a novel framework called Sim2Real$^2$ to enable the robot to manipulate an unseen articulated object to the desired state precisely in the real world with no human demonstrations. We leverage recent advances in physics simulation and learning-based perception to bu… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

    Comments: Accepted to IEEE International Conference on Robotics and Automation (ICRA) 2023

  36. arXiv:2302.04387  [pdf, other

    cs.RO

    Catch Planner: Catching High-Speed Targets in the Flight

    Authors: Huan Yu, Pengqin Wang, ** Wang, Jialin Ji, Zhi Zheng, Jie Tu, Guodong Lu, Jun Meng, Meixin Zhu, Shaojie Shen, Fei Gao

    Abstract: Catching high-speed targets in the flight is a complex and typical highly dynamic task. In this paper, we propose Catch Planner, a planning-with-decision scheme for catching. For sequential decision making, we propose a policy search method based on deep reinforcement learning. In order to make catching adaptive and flexible, we propose a trajectory optimization method to jointly optimize the high… ▽ More

    Submitted 26 June, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 11 pages, 8 figures, accepted by IEEE/ASME Transactions on Mechatronics

  37. arXiv:2212.13248  [pdf

    cs.NI

    Characterizing and Modeling Control-Plane Traffic for Mobile Core Network

    Authors: Jiayi Meng, **gqi Huang, Y. Charlie Hu, Yaron Koral, Xiaojun Lin, Muhammad Shahbaz, Abhigyan Sharma

    Abstract: In this paper, we first carry out to our knowledge the first in-depth characterization of control-plane traffic, using a real-world control-plane trace for 37,325 UEs sampled at a real-world LTE Mobile Core Network (MCN). Our analysis shows that control events exhibit significant diversity in device types and time-of-day among UEs. Second, we study whether traditional probability distributions tha… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  38. arXiv:2211.05985  [pdf, other

    cs.CL cs.AI cs.LG

    Using Persuasive Writing Strategies to Explain and Detect Health Misinformation

    Authors: Danial Kamali, Joseph Romain, Huiyi Liu, Wei Peng, **gbo Meng, Parisa Kordjamshidi

    Abstract: Nowadays, the spread of misinformation is a prominent problem in society. Our research focuses on aiding the automatic identification of misinformation by analyzing the persuasive strategies employed in textual documents. We introduce a novel annotation scheme encompassing common persuasive writing tactics to achieve our objective. Additionally, we provide a dataset on health misinformation, thoro… ▽ More

    Submitted 10 April, 2024; v1 submitted 10 November, 2022; originally announced November 2022.

    Comments: Accepted at LREC-CoLING-2024

  39. arXiv:2207.13848  [pdf, other

    cs.DC cs.LG cs.PF math.NA

    Predicting the Output Structure of Sparse Matrix Multiplication with Sampled Compression Ratio

    Authors: Zhaoyang Du, Yi** Guan, Tianchan Guan, Dimin Niu, Nianxiong Tan, Xiaopeng Yu, Hongzhong Zheng, Jianyi Meng, Xiaolang Yan, Yuan Xie

    Abstract: Sparse general matrix multiplication (SpGEMM) is a fundamental building block in numerous scientific applications. One critical task of SpGEMM is to compute or predict the structure of the output matrix (i.e., the number of nonzero elements per output row) for efficient memory allocation and load balance, which impact the overall performance of SpGEMM. Existing work either precisely calculates the… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: This paper has been submitted to the IEEE International Conference on Parallel and Distributed Systems (ICPADS). 8 pages, 2 fgures, 3 tables

    ACM Class: F.2.1; G.3; D.1.3; G.1.3

  40. A Fully-autonomous Framework of Unmanned Surface Vehicles in Maritime Environments using Gaussian Process Motion Planning

    Authors: Jiawei Meng, Ankita Humne, Richard Bucknall, Brendan Englot, Yuanchang Liu

    Abstract: Unmanned surface vehicles (USVs) are of increasing importance to a growing number of sectors in the maritime industry, including offshore exploration, marine transportation and defence operations. A major factor in the growth in use and deployment of USVs is the increased operational flexibility that is offered through use of autonomous navigation systems that generate optimised trajectories. Unli… ▽ More

    Submitted 21 May, 2022; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: 17 pages, 15 figures

  41. arXiv:2204.03775  [pdf, other

    cs.MS

    Massively scalable stencil algorithm

    Authors: Mathias Jacquelin, Mauricio Araya-Polo, Jie Meng

    Abstract: Stencil computations lie at the heart of many scientific and industrial applications. Unfortunately, stencil algorithms perform poorly on machines with cache based memory hierarchy, due to low re-use of memory accesses. This work shows that for stencil computation a novel algorithm that leverages a localized communication strategy effectively exploits the Cerebras WSE-2, which has no cache hierarc… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

    Comments: 10 pages excl. bibliography. Submitted to SuperComputing 2022

  42. PERKS: a Locality-Optimized Execution Model for Iterative Memory-bound GPU Applications

    Authors: Lingqi Zhang, Mohamed Wahib, Peng Chen, **tao Meng, Xiao Wang, Toshio Endo, Satoshi Matsuoka

    Abstract: Iterative memory-bound solvers commonly occur in HPC codes. Typical GPU implementations have a loop on the host side that invokes the GPU kernel as much as time/algorithm steps there are. The termination of each kernel implicitly acts the barrier required after advancing the solution every time step. We propose an execution model for running memory-bound iterative GPU kernels: PERsistent KernelS (… ▽ More

    Submitted 12 May, 2023; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: This paper will be published in 2023 International Conference on Supercomputing (ICS23)

  43. arXiv:2203.03635  [pdf, ps, other

    eess.IV cs.CV

    Stepwise Feature Fusion: Local Guides Global

    Authors: **feng Wang, Qiming Huang, Feilong Tang, Jia Meng, Jionglong Su, Sifan Song

    Abstract: Colonoscopy, currently the most efficient and recognized colon polyp detection technology, is necessary for early screening and prevention of colorectal cancer. However, due to the varying size and complex morphological features of colonic polyps as well as the indistinct boundary between polyps and mucosa, accurate segmentation of polyps is still challenging. Deep learning has become popular for… ▽ More

    Submitted 27 June, 2022; v1 submitted 7 March, 2022; originally announced March 2022.

    Comments: 10 pages, 5 figures

  44. arXiv:2203.02901  [pdf, other

    cs.CV cs.AI

    A Robust Framework of Chromosome Straightening with ViT-Patch GAN

    Authors: Sifan Song, **feng Wang, Fengrui Cheng, Qirui Cao, Yihan Zuo, Yongteng Lei, Ruomai Yang, Chunxiao Yang, Frans Coenen, Jia Meng, Kang Dang, Jionglong Su

    Abstract: Chromosomes carry the genetic information of humans. They exhibit non-rigid and non-articulated nature with varying degrees of curvature. Chromosome straightening is an important step for subsequent karyotype construction, pathological diagnosis and cytogenetic map development. However, robust chromosome straightening remains challenging, due to the unavailability of training images, distorted chr… ▽ More

    Submitted 16 May, 2023; v1 submitted 6 March, 2022; originally announced March 2022.

    Comments: Camera-ready version for IEEE ISBI2023

  45. arXiv:2110.07753  [pdf, other

    cs.DS

    On Efficient Range-Summability of Ideally IID Random Variables in Two or Higher Dimensions

    Authors: **gfan Meng, Huayi Wang, Jun Xu, Mitsunori Ogihara

    Abstract: $d$-dimensional (for $d>1$) efficient range-summability ($d$D-ERS) of random variables (RVs) is a fundamental algorithmic problem that has applications to two important families of database problems, namely, fast approximate wavelet tracking (FAWT) on data streams and approximately answering range-sum queries over a data cube. Whether there are efficient solutions to the $d… ▽ More

    Submitted 23 January, 2023; v1 submitted 14 October, 2021; originally announced October 2021.

  46. arXiv:2109.06366  [pdf, other

    cs.DS

    A Dyadic Simulation Approach to Efficient Range-Summability

    Authors: **gfan Meng, Huayi Wang, Jun Xu, Mitsunori Ogihara

    Abstract: Efficient range-summability (ERS) of a long list of random variables is a fundamental algorithmic problem that has applications to three important database applications, namely, data stream processing, space-efficient histogram maintenance (SEHM), and approximate nearest neighbor searches (ANNS). In this work, we propose a novel dyadic simulation framework and develop three novel ERS solutions, na… ▽ More

    Submitted 23 January, 2023; v1 submitted 13 September, 2021; originally announced September 2021.

  47. arXiv:2106.00090  [pdf, other

    cs.CV

    Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study

    Authors: Zhikun Liu, Yuanpeng Liu, Yuan Hong, **wen Meng, Jianguo Wang, Shusen Zheng, Xiao Xu

    Abstract: This study aimed to develop a classifier of prognosis after resection or liver transplantation (LT) for HCC by directly analysing the ubiquitously available histological images using deep learning based neural networks. Nucleus map set was used to train U-net to capture the nuclear architectural information. Train set included the patients with HCC treated by resection and has a distinct outcome.… ▽ More

    Submitted 31 May, 2021; originally announced June 2021.

  48. arXiv:2103.05864  [pdf, ps, other

    cs.DB

    MP-RW-LSH: An Efficient Multi-Probe LSH Solution to ANNS in $L_1$ Distance

    Authors: Huayi Wang, **gfan Meng, Long Gong, Jun Xu, Mitsunori Ogihara

    Abstract: Approximate Nearest Neighbor Search (ANNS) is a fundamental algorithmic problem, with numerous applications in many areas of computer science. Locality-sensitive hashing (LSH) is one of the most popular solution approaches for ANNS. A common shortcoming of many LSH schemes is that since they probe only a single bucket in a hash table, they need to use a large number of hash tables to achieve a hig… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

  49. arXiv:2103.02835  [pdf, other

    cs.CV cs.AI

    A Novel Application of Image-to-Image Translation: Chromosome Straightening Framework by Learning from a Single Image

    Authors: Sifan Song, Daiyun Huang, Yalun Hu, Chunxiao Yang, Jia Meng, Fei Ma, Frans Coenen, Jiaming Zhang, Jionglong Su

    Abstract: In medical imaging, chromosome straightening plays a significant role in the pathological study of chromosomes and in the development of cytogenetic maps. Whereas different approaches exist for the straightening task, typically geometric algorithms are used whose outputs are characterized by jagged edges or fragments with discontinued banding patterns. To address the flaws in the geometric algorit… ▽ More

    Submitted 19 October, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: This work has been accepted by CISP-BMEI2021

  50. arXiv:2102.00713  [pdf, other

    cs.CV

    Aurora Guard: Reliable Face Anti-Spoofing via Mobile Lighting System

    Authors: Jian Zhang, Ying Tai, Tai** Yao, Jia Meng, Shouhong Ding, Chengjie Wang, Jilin Li, Feiyue Huang, Rongrong Ji

    Abstract: Face authentication on mobile end has been widely applied in various scenarios. Despite the increasing reliability of cutting-edge face authentication/verification systems to variations like blinking eye and subtle facial expression, anti-spoofing against high-resolution rendering replay of paper photos or digital videos retains as an open problem. In this paper, we propose a simple yet effective… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1902.10311