Skip to main content

Showing 1–17 of 17 results for author: Miao, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16130  [pdf, ps, other

    cs.LG stat.ME

    Automating the Selection of Proxy Variables of Unmeasured Confounders

    Authors: Feng Xie, Zhengming Chen, Shanshan Luo, Wang Miao, Ruichu Cai, Zhi Geng

    Abstract: Recently, interest has grown in the use of proxy variables of unobserved confounding for inferring the causal effect in the presence of unmeasured confounders from observational data. One difficulty inhibiting the practical use is finding valid proxy variables of unobserved confounding to a target causal effect of interest. These proxy variables are typically justified by background knowledge. In… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  2. arXiv:2404.03248  [pdf, other

    cs.CV

    Learning Transferable Negative Prompts for Out-of-Distribution Detection

    Authors: Tianqi Li, Guansong Pang, Xiao Bai, Wenjun Miao, ** Zheng

    Abstract: Existing prompt learning methods have shown certain capabilities in Out-of-Distribution (OOD) detection, but the lack of OOD images in the target dataset in their training can lead to mismatches between OOD images and In-Distribution (ID) categories, resulting in a high false positive rate. To address this issue, we introduce a novel OOD detection method, named 'NegPrompt', to learn a set of negat… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024

  3. arXiv:2312.10686  [pdf, other

    cs.CV

    Out-of-Distribution Detection in Long-Tailed Recognition with Calibrated Outlier Class Learning

    Authors: Wenjun Miao, Guansong Pang, Tianqi Li, Xiao Bai, ** Zheng

    Abstract: Existing out-of-distribution (OOD) methods have shown great success on balanced datasets but become ineffective in long-tailed recognition (LTR) scenarios where 1) OOD samples are often wrongly classified into head classes and/or 2) tail-class samples are treated as OOD samples. To address these issues, current studies fit a prior distribution of auxiliary/pseudo OOD data to the long-tailed in-dis… ▽ More

    Submitted 19 December, 2023; v1 submitted 17 December, 2023; originally announced December 2023.

    Comments: AAAI2024, with supplementary material

  4. arXiv:2311.10952  [pdf, other

    cs.CV

    NAS-ASDet: An Adaptive Design Method for Surface Defect Detection Network using Neural Architecture Search

    Authors: Zhenrong Wang, Bin Li, Weifeng Li, Shuanlong Niu, Wang Miao, Tongzhi Niu

    Abstract: Deep convolutional neural networks (CNNs) have been widely used in surface defect detection. However, no CNN architecture is suitable for all detection tasks and designing effective task-specific requires considerable effort. The neural architecture search (NAS) technology makes it possible to automatically generate adaptive data-driven networks. Here, we propose a new method called NAS-ASDet to a… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

  5. arXiv:2308.03048  [pdf, other

    cs.CV

    Multi-scale Alternated Attention Transformer for Generalized Stereo Matching

    Authors: Wei Miao, Hong Zhao, Tongjia Chen, Wei Huang, Changyan Xiao

    Abstract: Recent stereo matching networks achieves dramatic performance by introducing epipolar line constraint to limit the matching range of dual-view. However, in complicated real-world scenarios, the feature information based on intra-epipolar line alone is too weak to facilitate stereo matching. In this paper, we present a simple but highly effective network called Alternated Attention U-shaped Transfo… ▽ More

    Submitted 6 August, 2023; originally announced August 2023.

  6. arXiv:2307.05869  [pdf, other

    cs.DC cs.MA

    Autonomous and Ubiquitous In-node Learning Algorithms of Active Directed Graphs and Its Storage Behavior

    Authors: Hui Wei, Weihua Miao, Fushun Li

    Abstract: Memory is an important cognitive function for humans. How a brain with such a small power can complete such a complex memory function, the working mechanism behind this is undoubtedly fascinating. Engram theory views memory as the co-activation of specific neuronal clusters. From the perspective of graph theory, nodes represent neurons, and directed edges represent synapses. Then the memory engram… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  7. arXiv:2306.13380  [pdf, other

    cs.CV

    First Place Solution to the CVPR'2023 AQTC Challenge: A Function-Interaction Centric Approach with Spatiotemporal Visual-Language Alignment

    Authors: Tom Tongjia Chen, Hongshan Yu, Zhengeng Yang, Ming Li, Zechuan Li, **gwen Wang, Wei Miao, Wei Sun, Chen Chen

    Abstract: Affordance-Centric Question-driven Task Completion (AQTC) has been proposed to acquire knowledge from videos to furnish users with comprehensive and systematic instructions. However, existing methods have hitherto neglected the necessity of aligning spatiotemporal visual and linguistic signals, as well as the crucial interactional information between humans and objects. To tackle these limitations… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: Winner of CVPR2023 Long-form Video Understanding and Generation Challenge (Track 3)

  8. arXiv:2306.01260  [pdf, other

    cs.SE

    FREPA: An Automated and Formal Approach to Requirement Modeling and Analysis in Aircraft Control Domain

    Authors: **cao Feng, Weikai Miao, Hanyue Zheng, Yihao Huang, Jianwen Li, Zheng Wang, Ting Su, Bin Gu, Geguang Pu, Mengfei Yang, Jifeng He

    Abstract: Formal methods are promising for modeling and analyzing system requirements. However, applying formal methods to large-scale industrial projects is a remaining challenge. The industrial engineers are suffering from the lack of automated engineering methodologies to effectively conduct precise requirement models, and rigorously validate and verify (V&V) the generated models. To tackle this challeng… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: 12 pages, Published by FSE 2020

  9. arXiv:2203.12903  [pdf, other

    cs.SE cs.FL

    Identifying Boundary Conditions with the Syntax and Semantic Information of Goals

    Authors: Yechuan Xia, Jianwen Li, Weikai Miao, Geguang Pu

    Abstract: In goal-oriented requirement engineering, boundary conditions(BC) are used to capture the divergence of goals, i.e., goals cannot be satisfied as a whole in some circumstances. As the goals are formally described by temporal logic, solving BCs automatically helps engineers judge whether there is negligence in the goal requirements. Several efforts have been devoted to computing the BCs as well as… ▽ More

    Submitted 25 March, 2022; v1 submitted 24 March, 2022; originally announced March 2022.

  10. arXiv:2112.14307  [pdf, ps, other

    cs.LG eess.SY

    Ensemble Recognition in Reproducing Kernel Hilbert Spaces through Aggregated Measurements

    Authors: Wei Miao, Gong Cheng, Jr-Shin Li

    Abstract: In this paper, we study the problem of learning dynamical properties of ensemble systems from their collective behaviors using statistical approaches in reproducing kernel Hilbert space (RKHS). Specifically, we provide a framework to identify and cluster multiple ensemble systems through computing the maximum mean discrepancy (MMD) between their aggregated measurements in an RKHS, without any prio… ▽ More

    Submitted 22 March, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

  11. arXiv:2112.06891  [pdf, ps, other

    cs.LG cs.NE eess.SY

    Interpretable Design of Reservoir Computing Networks using Realization Theory

    Authors: Wei Miao, Vignesh Narayanan, Jr-Shin Li

    Abstract: The reservoir computing networks (RCNs) have been successfully employed as a tool in learning and complex decision-making tasks. Despite their efficiency and low training cost, practical applications of RCNs rely heavily on empirical design. In this paper, we develop an algorithm to design RCNs using the realization theory of linear dynamical systems. In particular, we introduce the notion of $α$-… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  12. arXiv:2107.06501  [pdf, other

    cs.CV cs.LG eess.IV

    AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning

    Authors: Yihao Huang, Qing Guo, Felix Juefei-Xu, Lei Ma, Weikai Miao, Yang Liu, Geguang Pu

    Abstract: High-level representation-guided pixel denoising and adversarial training are independent solutions to enhance the robustness of CNNs against adversarial attacks by pre-processing input data and re-training models, respectively. Most recently, adversarial training techniques have been widely studied and improved while the pixel denoising-based method is getting less attractive. However, it is stil… ▽ More

    Submitted 18 October, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

    Comments: This work has been accepted to ACM-MM 2021

  13. arXiv:2006.07533  [pdf, other

    cs.CV cs.CR cs.LG

    FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

    Authors: Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu

    Abstract: At this moment, GAN-based image generation methods are still imperfect, whose upsampling design has limitations in leaving some certain artifact patterns in the synthesized image. Such artifact patterns can be easily exploited (by recent methods) for difference detection of real and GAN-synthesized images. However, the existing detection methods put much emphasis on the artifact patterns, which ca… ▽ More

    Submitted 17 August, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

    Comments: 9 pages, accepted by ACM MM 2020

  14. arXiv:2001.11565  [pdf, ps, other

    cs.NI cs.NE

    Routing-Led Placement of VNFs in Arbitrary Networks

    Authors: Joseph Billingsley, Ke Li, Wang Miao, Geyong Min, Nektarios Georgalas

    Abstract: The ever increasing demand for computing resources has led to the creation of hyperscale datacentres with tens of thousands of servers. As demand continues to rise, new technologies must be incorporated to ensure high quality services can be provided without the damaging environmental impact of high energy consumption. Virtualisation technology such as network function virtualisation (NFV) allows… ▽ More

    Submitted 30 January, 2020; originally announced January 2020.

  15. arXiv:1912.07817  [pdf, other

    cs.FL cs.SE

    Prema: A Tool for Precise Requirements Editing, Modeling and Analysis

    Authors: Yihao Huang, **cao Feng, Hanyue Zheng, Jiayi Zhu, Shang Wang, Siyuan Jiang, Weikai Miao, Geguang Pu

    Abstract: We present Prema, a tool for Precise Requirement Editing, Modeling and Analysis. It can be used in various fields for describing precise requirements using formal notations and performing rigorous analysis. By parsing the requirements written in formal modeling language, Prema is able to get a model which aptly depicts the requirements. It also provides different rigorous verification and validati… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: accepted by ASE2019 demonstration track

  16. SmartUnit: Empirical Evaluations for Automated Unit Testing of Embedded Software in Industry

    Authors: Chengyu Zhang, Yichen Yan, Hanru Zhou, Yinbo Yao, Ke Wu, Ting Su, Weikai Miao, Geguang Pu

    Abstract: In this paper, we aim at the automated unit coverage-based testing for embedded software. To achieve the goal, by analyzing the industrial requirements and our previous work on automated unit testing tool CAUT, we rebuild a new tool, SmartUnit, to solve the engineering requirements that take place in our partner companies. SmartUnit is a dynamic symbolic execution implementation, which supports st… ▽ More

    Submitted 17 June, 2018; v1 submitted 23 February, 2018; originally announced February 2018.

    Comments: In Proceedings of 40th International Conference on Software Engineering: Software Engineering in Practice Track, Gothenburg, Sweden, May 27-June 3, 2018 (ICSE-SEIP '18), 10 pages

  17. arXiv:1210.3709  [pdf, other

    math.OC cs.IT math.NA stat.ML

    A Rank-Corrected Procedure for Matrix Completion with Fixed Basis Coefficients

    Authors: Weimin Miao, Shaohua Pan, Defeng Sun

    Abstract: For the problems of low-rank matrix completion, the efficiency of the widely-used nuclear norm technique may be challenged under many circumstances, especially when certain basis coefficients are fixed, for example, the low-rank correlation matrix completion in various fields such as the financial market and the low-rank density matrix completion from the quantum state tomography. To seek a soluti… ▽ More

    Submitted 22 June, 2015; v1 submitted 13 October, 2012; originally announced October 2012.

    Comments: 51 pages, 4 figures