Skip to main content

Showing 1–50 of 70 results for author: Meng, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01896  [pdf, other

    cs.CL cs.IR

    LogEval: A Comprehensive Benchmark Suite for Large Language Models In Log Analysis

    Authors: Tianyu Cui, Shiyu Ma, Ziang Chen, Tong Xiao, Shimin Tao, Yilun Liu, Shenglin Zhang, Duoming Lin, Changchang Liu, Yuzhe Cai, Weibin Meng, Yongqian Sun, Dan Pei

    Abstract: Log analysis is crucial for ensuring the orderly and stable operation of information systems, particularly in the field of Artificial Intelligence for IT Operations (AIOps). Large Language Models (LLMs) have demonstrated significant potential in natural language processing tasks. In the AIOps domain, they excel in tasks such as anomaly detection, root cause analysis of faults, operations and maint… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2406.10558  [pdf, other

    cs.RO

    A Hybrid Controller Design for Human-Assistive Piloting of an Underactuated Blimp

    Authors: Wugang Meng, Tianfu Wu, Qiuyang Tao, Fumin Zhang

    Abstract: This paper introduces a novel solution to the manual control challenge for indoor blimps. The problem's complexity arises from the conflicting demands of executing human commands while maintaining stability through automatic control for underactuated robots. To tackle this challenge, we introduced an assisted piloting hybrid controller with a preemptive mechanism, that seamlessly switches between… ▽ More

    Submitted 15 June, 2024; originally announced June 2024.

  3. arXiv:2406.05078  [pdf, other

    cs.IT

    Enhancing LEO Mega-Constellations with Inter-Satellite Links: Vision and Challenges

    Authors: Chenyu Wu, Shuai Han, Qian Chen, Yu Wang, Weixiao Meng, Abderrahim Benslimane

    Abstract: Low Earth orbit (LEO) satellites have been envisioned as a significant component of the sixth generation (6G) network architecture for achieving ubiquitous coverage and seamless access. However, the implementation of LEO satellites is largely restricted by the deployment of ground stations. Inter-satellite links (ISLs) have been regarded as a promising technique to fully exploit the potentials of… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 7 pages, 4 figures

  4. arXiv:2406.01151  [pdf, other

    cs.AR

    A 0.96pJ/SOP, 30.23K-neuron/mm^2 Heterogeneous Neuromorphic Chip With Fullerene-like Interconnection Topology for Edge-AI Computing

    Authors: P. J. Zhou, Q. Yu, M. Chen, Y. C. Wang, L. W. Meng, Y. Zuo, N. Ning, Y. Liu, S. G. Hu, G. C. Qiao

    Abstract: Edge-AI computing requires high energy efficiency, low power consumption, and relatively high flexibility and compact area, challenging the AI-chip design. This work presents a 0.96 pJ/SOP heterogeneous neuromorphic system-on-chip (SoC) with fullerene-like interconnection topology for edge-AI computing. The neuromorphic core integrates different technologies to augment computing energy efficiency,… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 5 pages, 8 figures

  5. arXiv:2406.00312  [pdf, other

    cs.RO

    NuRF: Nudging the Particle Filter in Radiance Fields for Robot Visual Localization

    Authors: Wugang Meng, Tianfu Wu, Huan Yin, Fumin Zhang

    Abstract: Can we localize a robot in radiance fields only using monocular vision? This study presents NuRF, a nudged particle filter framework for 6-DoF robot visual localization in radiance fields. NuRF sets anchors in SE(3) to leverage visual place recognition, which provides image comparisons to guide the sampling process. This guidance could improve the convergence and robustness of particle filters for… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

    Comments: 11 pages, 14 figures

  6. arXiv:2405.18919  [pdf, other

    cs.IT

    Exploiting Inter-Satellite Links for In-Flight Connectivity Scheme in Space-Air-Ground Integrated Networks

    Authors: Qian Chen, Chenyu Wu, Shuai Han, Weixiao Meng, Tony Q. S. Quek

    Abstract: Space-air-ground integrated networks (SAGIN) are pivotal for achieving uninterrupted in-flight connectivity (IFC). Most existing studies, however, merely treat satellites as transparent forwarding nodes, and overlook their caching capabilities in enhancing the IFC data rate. In this paper, we consider an IFC-oriented SAGIN, where the satellites collaboratively deliver the content to airborne passe… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 6 pages, 4 figures

  7. arXiv:2405.02572  [pdf, other

    cs.LG cs.AI

    Off-OAB: Off-Policy Policy Gradient Method with Optimal Action-Dependent Baseline

    Authors: Wenjia Meng, Qian Zheng, Long Yang, Yilong Yin, Gang Pan

    Abstract: Policy-based methods have achieved remarkable success in solving challenging reinforcement learning problems. Among these methods, off-policy policy gradient methods are particularly important due to that they can benefit from off-policy data. However, these methods suffer from the high variance of the off-policy policy gradient (OPPG) estimator, which results in poor sample efficiency during trai… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 12 pages, 3 figures

  8. arXiv:2404.19154  [pdf, other

    cs.CL

    RTF: Region-based Table Filling Method for Relational Triple Extraction

    Authors: Ning An, Lei Hei, Yong Jiang, Wei** Meng, **g**g Hu, Boran Huang, Feiliang Ren

    Abstract: Relational triple extraction is crucial work for the automatic construction of knowledge graphs. Existing methods only construct shallow representations from a token or token pair-level. However, previous works ignore local spatial dependencies of relational triples, resulting in a weakness of entity pair boundary detection. To tackle this problem, we propose a novel Region-based Table Filling met… ▽ More

    Submitted 13 June, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: Rejected by EMNLP 2023

  9. arXiv:2404.16205  [pdf, other

    cs.CV cs.MM

    AIS 2024 Challenge on Video Quality Assessment of User-Generated Content: Methods and Results

    Authors: Marcos V. Conde, Saman Zadtootaghaj, Nabajeet Barman, Radu Timofte, Chenlong He, Qi Zheng, Ruoxi Zhu, Zhengzhong Tu, Haiqiang Wang, Xiangguang Chen, Wenhui Meng, Xiang Pan, Huiying Shi, Han Zhu, Xiaozhong Xu, Lei Sun, Zhenzhong Chen, Shan Liu, Zicheng Zhang, Haoning Wu, Yingjie Zhou, Chunyi Li, Xiaohong Liu, Weisi Lin, Guangtao Zhai , et al. (11 additional authors not shown)

    Abstract: This paper reviews the AIS 2024 Video Quality Assessment (VQA) Challenge, focused on User-Generated Content (UGC). The aim of this challenge is to gather deep learning-based methods capable of estimating the perceptual quality of UGC videos. The user-generated videos from the YouTube UGC Dataset include diverse content (sports, games, lyrics, anime, etc.), quality and resolutions. The proposed met… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: CVPR 2024 Workshop -- AI for Streaming (AIS) Video Quality Assessment Challenge

  10. arXiv:2404.11313  [pdf, other

    eess.IV cs.AI

    NTIRE 2024 Challenge on Short-form UGC Video Quality Assessment: Methods and Results

    Authors: Xin Li, Kun Yuan, Ya**g Pei, Yiting Lu, Ming Sun, Chao Zhou, Zhibo Chen, Radu Timofte, Wei Sun, Haoning Wu, Zicheng Zhang, Jun Jia, Zhichao Zhang, Linhan Cao, Qiubo Chen, Xiongkuo Min, Weisi Lin, Guangtao Zhai, Jianhui Sun, Tianyi Wang, Lei Li, Han Kong, Wenxuan Wang, Bing Li, Cheng Luo , et al. (43 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 Challenge on Shortform UGC Video Quality Assessment (S-UGC VQA), where various excellent solutions are submitted and evaluated on the collected dataset KVQ from popular short-form video platform, i.e., Kuaishou/Kwai Platform. The KVQ database is divided into three parts, including 2926 videos for training, 420 videos for validation, and 854 videos for testing. The… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: Accepted by CVPR2024 Workshop. The challenge report for CVPR NTIRE2024 Short-form UGC Video Quality Assessment Challenge

  11. arXiv:2403.17400  [pdf, other

    cs.NI cs.DC

    A Survey on Resource Management in Joint Communication and Computing-Embedded SAGIN

    Authors: Qian Chen, Zheng Guo, Weixiao Meng, Shuai Han, Cheng Li, Tony Q. S. Quek

    Abstract: The advent of the 6G era aims for ubiquitous connectivity, with the integration of non-terrestrial networks (NTN) offering extensive coverage and enhanced capacity. As manufacturing advances and user demands evolve, space-air-ground integrated networks (SAGIN) with computational capabilities emerge as a viable solution for services requiring low latency and high computational power. Resource manag… ▽ More

    Submitted 28 June, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: 44 pages, 17 figures. This work has been accepted by IEEE Communications Surveys and Tutorials

  12. arXiv:2403.14118  [pdf, other

    cs.CL

    From Handcrafted Features to LLMs: A Brief Survey for Machine Translation Quality Estimation

    Authors: Haofei Zhao, Yilun Liu, Shimin Tao, Weibin Meng, Yimeng Chen, Xiang Geng, Chang Su, Min Zhang, Hao Yang

    Abstract: Machine Translation Quality Estimation (MTQE) is the task of estimating the quality of machine-translated text in real time without the need for reference translations, which is of great importance for the development of MT. After two decades of evolution, QE has yielded a wealth of results. This article provides a comprehensive overview of QE datasets, annotation methods, shared tasks, methodolog… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: Accepted by IJCNN 2024

  13. arXiv:2403.06261  [pdf, other

    cs.CR

    ABC-Channel: An Advanced Blockchain-based Covert Channel

    Authors: Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan

    Abstract: Establishing efficient and robust covert channels is crucial for secure communication within insecure network environments. With its inherent benefits of decentralization and anonymization, blockchain has gained considerable attention in develo** covert channels. To guarantee a highly secure covert channel, channel negotiation should be contactless before the communication, carrier transaction f… ▽ More

    Submitted 24 March, 2024; v1 submitted 10 March, 2024; originally announced March 2024.

    Comments: 5 pages, section 3.C; Corrected the description

  14. arXiv:2402.18191  [pdf, other

    cs.CL

    Clustering and Ranking: Diversity-preserved Instruction Selection through Expert-aligned Quality Estimation

    Authors: Yuan Ge, Yilun Liu, Chi Hu, Weibin Meng, Shimin Tao, Xiaofeng Zhao, Hongxia Ma, Li Zhang, Hao Yang, Tong Xiao

    Abstract: With contributions from the open-source community, a vast amount of instruction tuning (IT) data has emerged. Given the significant resource allocation required by training and evaluating models, it is advantageous to have an efficient method for selecting high-quality IT data. However, existing methods for instruction data selection have limitations such as relying on fragile external APIs, being… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  15. arXiv:2402.03139  [pdf, other

    cs.LG

    Enhancing Neural Subset Selection: Integrating Background Information into Set Representations

    Authors: Binghui Xie, Yatao Bian, Kaiwen zhou, Yongqiang Chen, Peilin Zhao, Bo Han, Wei Meng, James Cheng

    Abstract: Learning neural subset selection tasks, such as compound selection in AI-aided drug discovery, have become increasingly pivotal across diverse applications. The existing methodologies in the field primarily concentrate on constructing models that capture the relationship between utility function values and subsets within their respective supersets. However, these approaches tend to overlook the va… ▽ More

    Submitted 9 June, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  16. arXiv:2401.15123  [pdf, other

    cs.LG cs.AI

    Large Language Model Guided Knowledge Distillation for Time Series Anomaly Detection

    Authors: Chen Liu, Shibo He, Qihang Zhou, Shizhong Li, Wenchao Meng

    Abstract: Self-supervised methods have gained prominence in time series anomaly detection due to the scarcity of available annotations. Nevertheless, they typically demand extensive training data to acquire a generalizable representation map, which conflicts with scenarios of a few available samples, thereby limiting their performance. To overcome the limitation, we propose \textbf{AnomalyLLM}, a knowledge… ▽ More

    Submitted 26 January, 2024; originally announced January 2024.

    Comments: 12 pages, 5 figures

  17. arXiv:2401.08464  [pdf, other

    cs.LG

    Enhancing Evolving Domain Generalization through Dynamic Latent Representations

    Authors: Binghui Xie, Yongqiang Chen, Jiaqi Wang, Kaiwen Zhou, Bo Han, Wei Meng, James Cheng

    Abstract: Domain generalization is a critical challenge for machine learning systems. Prior domain generalization methods focus on extracting domain-invariant features across several stationary domains to enable generalization to new domains. However, in non-stationary tasks where new domains evolve in an underlying continuous structure, such as time, merely extracting the invariant features is insufficient… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: Accepted By AAAI 2024

  18. arXiv:2312.16954  [pdf, other

    cs.CR

    Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability

    Authors: Yue Han, **guang Han, Weizhi Meng, Jianchang Lai, Ge Wu

    Abstract: Public key searchable encryption (PKSE) scheme allows data users to search over encrypted data. To identify illegal users, many traceable PKSE schemes have been proposed. However, existing schemes cannot trace the keywords which illegal users searched and protect users' privacy simultaneously. In some practical applications, tracing both illegal users' identities and the keywords which they search… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

  19. arXiv:2312.11549  [pdf, other

    cs.LG

    Label-Free Multivariate Time Series Anomaly Detection

    Authors: Qihang Zhou, Shibo He, Haoyu Liu, Jiming Chen, Wenchao Meng

    Abstract: Anomaly detection in multivariate time series (MTS) has been widely studied in one-class classification (OCC) setting. The training samples in OCC are assumed to be normal, which is difficult to guarantee in practical situations. Such a case may degrade the performance of OCC-based anomaly detection methods which fit the training distribution as the normal distribution. In this paper, we propose M… ▽ More

    Submitted 6 February, 2024; v1 submitted 16 December, 2023; originally announced December 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2208.02108

  20. arXiv:2312.00535  [pdf, other

    eess.SP cs.LG

    RIS-Based On-the-Air Semantic Communications -- a Diffractional Deep Neural Network Approach

    Authors: Shuyi Chen, Yingzhe Hui, Yifan Qin, Yueyi Yuan, Weixiao Meng, Xuewen Luo, Hsiao-Hwa Chen

    Abstract: Semantic communication has gained significant attention recently due to its advantages in achieving higher transmission efficiency by focusing on semantic information instead of bit-level information. However, current AI-based semantic communication methods require digital hardware for implementation. With the rapid advancement on reconfigurable intelligence surfaces (RISs), a new approach called… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 17 pages, 5 figures, accepted by IEEE WCM

  21. arXiv:2309.00251  [pdf, other

    cs.GT

    Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks

    Authors: Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng

    Abstract: Advanced persistent threat (APT) is a kind of stealthy, sophisticated, and long-term cyberattack that has brought severe financial losses and critical infrastructure damages. Existing works mainly focus on APT defense under stable network topologies, while the problem under time-varying dynamic networks (e.g., vehicular networks) remains unexplored, which motivates our work. Besides, the spatiotem… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

  22. arXiv:2308.13904  [pdf, other

    cs.CL cs.CR cs.LG

    LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

    Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wen**g Fang, Lei Wang, Zihui Zhang, Wenzhi Chen

    Abstract: Prompt-tuning has emerged as an attractive paradigm for deploying large-scale language models due to its strong downstream task performance and efficient multitask serving ability. Despite its wide adoption, we empirically show that prompt-tuning is vulnerable to downstream task-agnostic backdoors, which reside in the pretrained models and can affect arbitrary downstream tasks. The state-of-the-ar… ▽ More

    Submitted 14 October, 2023; v1 submitted 26 August, 2023; originally announced August 2023.

    Comments: To Appear in the Network and Distributed System Security (NDSS) Symposium 2024, 26 February - 1 March 2024, San Diego, CA, USA; typos corrected

  23. arXiv:2308.07610  [pdf, other

    cs.SE cs.CL

    Interpretable Online Log Analysis Using Large Language Models with Prompt Strategies

    Authors: Yilun Liu, Shimin Tao, Weibin Meng, **gyu Wang, Wenbing Ma, Yanqing Zhao, Yuhang Chen, Hao Yang, Yanfei Jiang, Xun Chen

    Abstract: Automated log analysis is crucial in modern software-intensive systems for facilitating program comprehension throughout software maintenance and engineering life cycles. Existing methods perform tasks such as log parsing and log anomaly detection by providing a single prediction value without interpretation. However, given the increasing volume of system events, the limited interpretability of an… ▽ More

    Submitted 25 January, 2024; v1 submitted 15 August, 2023; originally announced August 2023.

    Comments: Accepted by ICPC 2024

  24. arXiv:2308.06774  [pdf, other

    cs.CV cs.AI

    Dual Meta-Learning with Longitudinally Generalized Regularization for One-Shot Brain Tissue Segmentation Across the Human Lifespan

    Authors: Yongheng Sun, Fan Wang, Jun Shu, Haifeng Wang, Li Wang. Deyu Meng, Chunfeng Lian

    Abstract: Brain tissue segmentation is essential for neuroscience and clinical studies. However, segmentation on longitudinal data is challenging due to dynamic brain changes across the lifespan. Previous researches mainly focus on self-supervision with regularizations and will lose longitudinal generalization when fine-tuning on a specific age group. In this paper, we propose a dual meta-learning paradigm… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: ICCV 2023

  25. arXiv:2308.04972  [pdf, other

    cs.CR

    can-train-and-test: A Curated CAN Dataset for Automotive Intrusion Detection

    Authors: Brooke Lampe, Weizhi Meng

    Abstract: When it comes to in-vehicle networks (IVNs), the controller area network -- CAN -- bus dominates the market; automobiles manufactured and sold around the world depend on the CAN bus for safety-critical communications between various components of the vehicle (e.g., the engine, the transmission, the steering column). Unfortunately, the CAN bus is inherently insecure; in fact, it completely lacks co… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  26. arXiv:2305.05900  [pdf, other

    cs.LG cs.CR cs.CV

    DPMLBench: Holistic Evaluation of Differentially Private Machine Learning

    Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen

    Abstract: Differential privacy (DP), as a rigorous mathematical definition quantifying privacy leakage, has become a well-accepted standard for privacy protection. Combined with powerful machine learning techniques, differentially private machine learning (DPML) is increasingly important. As the most classic DPML algorithm, DP-SGD incurs a significant loss of utility, which hinders DPML's deployment in prac… ▽ More

    Submitted 14 October, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: To appear in the ACM Conference on Computer and Communications Security (CCS), November 2023, Tivoli Congress Center, Copenhagen, Denmark

  27. Learning To Rank Resources with GNN

    Authors: Ulugbek Ergashev, Eduard C. Dragut, Weiyi Meng

    Abstract: As the content on the Internet continues to grow, many new dynamically changing and heterogeneous sources of data constantly emerge. A conventional search engine cannot crawl and index at the same pace as the expansion of the Internet. Moreover, a large portion of the data on the Internet is not accessible to traditional search engines. Distributed Information Retrieval (DIR) is a viable solution… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

  28. arXiv:2304.07937  [pdf, other

    cs.CR

    Decentralized Threshold Signatures with Dynamically Private Accountability

    Authors: Meng Li, Mingwei Zhang, Qing Wang, Hanni Ding, Weizhi Meng, Liehuang Zhu, Zijian Zhang, Xiaodong Lin

    Abstract: Threshold signatures are a fundamental cryptographic primitive used in many practical applications. As proposed by Boneh and Komlo (CRYPTO'22), TAPS is a threshold signature that is a hybrid of privacy and accountability. It enables a combiner to combine t signature shares while revealing nothing about the threshold t or signing quorum to the public and asks a tracer to track a signature to the qu… ▽ More

    Submitted 9 August, 2023; v1 submitted 16 April, 2023; originally announced April 2023.

  29. arXiv:2304.02870  [pdf, other

    cs.CR cs.LG

    Protecting User Privacy in Online Settings via Supervised Learning

    Authors: Alexandru Rusescu, Brooke Lampe, Weizhi Meng

    Abstract: Companies that have an online presence-in particular, companies that are exclusively digital-often subscribe to this business model: collect data from the user base, then expose the data to advertisement agencies in order to turn a profit. Such companies routinely market a service as "free", while obfuscating the fact that they tend to "charge" users in the currency of personal information rather… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  30. arXiv:2303.13272  [pdf, other

    cs.SD cs.AI eess.AS

    Frame-Level Multi-Label Playing Technique Detection Using Multi-Scale Network and Self-Attention Mechanism

    Authors: Dichucheng Li, Ming** Che, Wenwu Meng, Yulun Wu, Yi Yu, Fan Xia, Wei Li

    Abstract: Instrument playing technique (IPT) is a key element of musical presentation. However, most of the existing works for IPT detection only concern monophonic music signals, yet little has been done to detect IPTs in polyphonic instrumental solo pieces with overlap** IPTs or mixed IPTs. In this paper, we formulate it as a frame-level multi-label classification problem and apply it to Guzheng, a Chin… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: Accepted to ICASSP 2023

  31. arXiv:2303.13075  [pdf, ps, other

    cs.CR

    Security Analysis on Social Media Networks via STRIDE Model

    Authors: Kamal Raj Sharma, Wei-Yang Chiu, Weizhi Meng

    Abstract: Security associated threats are often increased for online social media during a pandemic, such as COVID-19, along with changes in a work environment. For example, employees in many companies and organizations have started to work from home due to the COVID-19 pandemic. Such working style has increased many remote activities and further relied on email for communication, thus creating an ideal con… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: The 19th International Conference on Networking and Services (ICNS 2023), pp. 28-33, IARIA, 2023

  32. arXiv:2303.13073  [pdf, other

    cs.CR cs.CY

    BlockFW -- Towards Blockchain-based Rule-Sharing Firewall

    Authors: Wei-Yang Chiu, Weizhi Meng

    Abstract: Central-managed security mechanisms are often utilized in many organizations, but such server is also a security breaking point. This is because the server has the authority for all nodes that share the security protection. Hence if the attackers successfully tamper the server, the organization will be in trouble. Also, the settings and policies saved on the server are usually not cryptographicall… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: The 16th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2022), pp. 70-75, IARIA 2022

  33. arXiv:2302.13765  [pdf, other

    cs.CV

    Self Correspondence Distillation for End-to-End Weakly-Supervised Semantic Segmentation

    Authors: Rongtao Xu, Changwei Wang, Jiaxi Sun, Shibiao Xu, Weiliang Meng, Xiaopeng Zhang

    Abstract: Efficiently training accurate deep models for weakly supervised semantic segmentation (WSSS) with image-level labels is challenging and important. Recently, end-to-end WSSS methods have become the focus of research due to their high training efficiency. However, current methods suffer from insufficient extraction of comprehensive semantic information, resulting in low-quality pseudo-labels and sub… ▽ More

    Submitted 27 February, 2023; originally announced February 2023.

  34. arXiv:2212.10830  [pdf, other

    cs.CR

    A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS

    Authors: Rishikesh Sahay, D. A. Sepulveda Estay, Weizhi Meng, Christian D. Jensen, Michael Bruhn Barfod

    Abstract: The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have bee… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

  35. arXiv:2211.12002  [pdf, other

    cs.LG cs.AI

    Explainability of Traditional and Deep Learning Models on Longitudinal Healthcare Records

    Authors: Lin Lee Cheong, Tesfagabir Meharizghi, Wynona Black, Yang Guang, Weilin Meng

    Abstract: Recent advances in deep learning have led to interest in training deep learning models on longitudinal healthcare records to predict a range of medical events, with models demonstrating high predictive performance. Predictive performance is necessary but insufficient, however, with explanations and reasoning from models required to convince clinicians for sustained use. Rigorous evaluation of expl… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: 21 pages, 10 figures

  36. arXiv:2210.17252  [pdf, other

    cs.CV

    Multi-Camera Calibration Free BEV Representation for 3D Object Detection

    Authors: Hongxiang Jiang, Wenming Meng, Hongmei Zhu, Qian Zhang, Jihao Yin

    Abstract: In advanced paradigms of autonomous driving, learning Bird's Eye View (BEV) representation from surrounding views is crucial for multi-task framework. However, existing methods based on depth estimation or camera-driven attention are not stable to obtain transformation under noisy camera parameters, mainly with two challenges, accurate depth prediction and calibration. In this work, we present a c… ▽ More

    Submitted 31 October, 2022; originally announced October 2022.

    Comments: 15 pages, 7 figures

  37. arXiv:2208.10282  [pdf, other

    cs.SE

    LogStamp: Automatic Online Log Parsing Based on Sequence Labelling

    Authors: Shimin Tao, Weibin Meng, Yimeng Chen, Yichen Zhu, Ying Liu Chunning Du, Tao Han, Yongpeng Zhao, Xiangguang Wang, Hao Yang

    Abstract: Logs are one of the most critical data for service management. It contains rich runtime information for both services and users. Since size of logs are often enormous in size and have free handwritten constructions, a typical log-based analysis needs to parse logs into structured format first. However, we observe that most existing log parsing methods cannot parse logs online, which is essential f… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

  38. arXiv:2208.02108  [pdf, other

    cs.LG cs.AI

    Detecting Multivariate Time Series Anomalies with Zero Known Label

    Authors: Qihang Zhou, Jiming Chen, Haoyu Liu, Shibo He, Wenchao Meng

    Abstract: Multivariate time series anomaly detection has been extensively studied under the semi-supervised setting, where a training dataset with all normal instances is required. However, preparing such a dataset is very laborious since each single data instance should be fully guaranteed to be normal. It is, therefore, desired to explore multivariate time series anomaly detection methods based on the dat… ▽ More

    Submitted 17 June, 2023; v1 submitted 3 August, 2022; originally announced August 2022.

  39. arXiv:2206.04584  [pdf, other

    cs.CV

    Efficient and Robust 2D-to-BEV Representation Learning via Geometry-guided Kernel Transformer

    Authors: Shaoyu Chen, Tianheng Cheng, Xinggang Wang, Wenming Meng, Qian Zhang, Wenyu Liu

    Abstract: Learning Bird's Eye View (BEV) representation from surrounding-view cameras is of great importance for autonomous driving. In this work, we propose a Geometry-guided Kernel Transformer (GKT), a novel 2D-to-BEV representation learning mechanism. GKT leverages the geometric priors to guide the transformer to focus on discriminative regions and unfolds kernel features to generate BEV representation.… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: Tech report. Work in progress

  40. arXiv:2206.02705  [pdf

    eess.SP cs.AI

    Human Behavior Recognition Method Based on CEEMD-ES Radar Selection

    Authors: Zhaolin Zhang, Mingqi Song, Wugang Meng, Yuhan Liu, Fengcong Li, Xiang Feng, Yinan Zhao

    Abstract: In recent years, the millimeter-wave radar to identify human behavior has been widely used in medical,security, and other fields. When multiple radars are performing detection tasks, the validity of the features contained in each radar is difficult to guarantee. In addition, processing multiple radar data also requires a lot of time and computational cost. The Complementary Ensemble Empirical Mode… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Comments: 4 pages, 5 figures

  41. arXiv:2205.02273  [pdf, other

    math.OC cs.LG

    An Adaptive Incremental Gradient Method With Support for Non-Euclidean Norms

    Authors: Binghui Xie, Chenhan **, Kaiwen Zhou, James Cheng, Wei Meng

    Abstract: Stochastic variance reduced methods have shown strong performance in solving finite-sum problems. However, these methods usually require the users to manually tune the step-size, which is time-consuming or even infeasible for some large-scale optimization tasks. To overcome the problem, we propose and analyze several novel adaptive variants of the popular SAGA algorithm. Eventually, we design a va… ▽ More

    Submitted 7 October, 2023; v1 submitted 28 April, 2022; originally announced May 2022.

  42. arXiv:2203.15252  [pdf, other

    cs.CV eess.IV

    Identification and classification of exfoliated graphene flakes from microscopy images using a hierarchical deep convolutional neural network

    Authors: Soroush Mahjoubi, Fan Ye, Yi Bao, Weina Meng, Xian Zhang

    Abstract: Identification of the mechanically exfoliated graphene flakes and classification of the thickness is important in the nanomanufacturing of next-generation materials and devices that overcome the bottleneck of Moore's Law. Currently, identification and classification of exfoliated graphene flakes are conducted by human via inspecting the optical microscope images. The existing state-of-the-art auto… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: 17 pages

  43. arXiv:2203.07003  [pdf, other

    cs.CV cs.AI

    MTLDesc: Looking Wider to Describe Better

    Authors: Changwei Wang, Rongtao Xu, Yuyang Zhang, Shibiao Xu, Weiliang Meng, Bin Fan, Xiaopeng Zhang

    Abstract: Limited by the locality of convolutional neural networks, most existing local features description methods only learn local descriptors with local information and lack awareness of global and surrounding spatial context. In this work, we focus on making local descriptors "look wider to describe better" by learning local Descriptors with More Than just Local information (MTLDesc). Specifically, we… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

  44. arXiv:2203.00472  [pdf, other

    cs.SD eess.AS

    DMF-Net: A decoupling-style multi-band fusion model for full-band speech enhancement

    Authors: Guochen Yu, Yuansheng Guan, Weixin Meng, Chengshi Zheng, Hui Wang

    Abstract: For the difficulty and large computational complexity of modeling more frequency bands, full-band speech enhancement based on deep neural networks is still challenging. Previous studies usually adopt compressed full-band speech features in Bark and ERB scale with relatively low frequency resolution, leading to degraded performance, especially in the high-frequency region. In this paper, we propose… ▽ More

    Submitted 30 July, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

  45. Video-based Facial Micro-Expression Analysis: A Survey of Datasets, Features and Algorithms

    Authors: Xianye Ben, Yi Ren, Jun** Zhang, Su-**g Wang, Kidiyo Kpalma, Weixiao Meng, Yong-** Liu

    Abstract: Unlike the conventional facial expressions, micro-expressions are involuntary and transient facial expressions capable of revealing the genuine emotions that people attempt to hide. Therefore, they can provide important information in a broad range of applications such as lie detection, criminal detection, etc. Since micro-expressions are transient and of low intensity, however, their detection an… ▽ More

    Submitted 15 February, 2022; v1 submitted 30 January, 2022; originally announced January 2022.

  46. arXiv:2201.11885  [pdf, other

    cs.CL

    Boosting Entity Mention Detection for Targetted Twitter Streams with Global Contextual Embeddings

    Authors: Satadisha Saha Bhowmick, Eduard C. Dragut, Weiyi Meng

    Abstract: Microblogging sites, like Twitter, have emerged as ubiquitous sources of information. Two important tasks related to the automatic extraction and analysis of information in Microblogs are Entity Mention Detection (EMD) and Entity Detection (ED). The state-of-the-art EMD systems aim to model the non-literary nature of microblog text by training upon offline static datasets. They extract a combinati… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

  47. arXiv:2112.03159  [pdf, other

    cs.NI cs.AI

    UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks

    Authors: Yichen Zhu, Weibin Meng, Ying Liu, Shenglin Zhang, Tao Han, Shimin Tao, Dan Pei

    Abstract: UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks

    Submitted 6 December, 2021; originally announced December 2021.

    Comments: Technical report

  48. arXiv:2111.00754  [pdf, other

    cs.CV

    Few-shot learning with improved local representations via bias rectify module

    Authors: Chao Dong, Qi Ye, Wenchao Meng, Kaixiang Yang

    Abstract: Recent approaches based on metric learning have achieved great progress in few-shot learning. However, most of them are limited to image-level representation manners, which fail to properly deal with the intra-class variations and spatial knowledge and thus produce undesirable performance. In this paper we propose a Deep Bias Rectify Network (DBRN) to fully exploit the spatial information that exi… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

  49. arXiv:2106.07959  [pdf, other

    cs.CV cs.AI

    Zero-sample surface defect detection and classification based on semantic feedback neural network

    Authors: Yibo Guo, Yiming Fan, Zhiyang Xiang, Haidi Wang, Wenhua Meng, Mingliang Xu

    Abstract: Defect detection and classification technology has changed from traditional artificial visual inspection to current intelligent automated inspection, but most of the current defect detection methods are training related detection models based on a data-driven approach, taking into account the difficulty of collecting some sample data in the industrial field. We apply zero-shot learning technology… ▽ More

    Submitted 15 June, 2021; originally announced June 2021.

    Comments: 28 pages 10 figures

  50. Deep Online Correction for Monocular Visual Odometry

    Authors: Jiaxin Zhang, Wei Sui, Xinggang Wang, Wenming Meng, Hongmei Zhu, Qian Zhang

    Abstract: In this work, we propose a novel deep online correction (DOC) framework for monocular visual odometry. The whole pipeline has two stages: First, depth maps and initial poses are obtained from convolutional neural networks (CNNs) trained in self-supervised manners. Second, the poses predicted by CNNs are further improved by minimizing photometric errors via gradient updates of poses during inferenc… ▽ More

    Submitted 18 March, 2021; originally announced March 2021.

    Comments: Accepted at 2021 IEEE International Conference on Robotics and Automation (ICRA)