Skip to main content

Showing 1–50 of 54 results for author: Ni, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19666  [pdf, other

    cs.CV eess.IV

    CSAKD: Knowledge Distillation with Cross Self-Attention for Hyperspectral and Multispectral Image Fusion

    Authors: Chih-Chung Hsu, Chih-Chien Ni, Chia-Ming Lee, Li-Wei Kang

    Abstract: Hyperspectral imaging, capturing detailed spectral information for each pixel, is pivotal in diverse scientific and industrial applications. Yet, the acquisition of high-resolution (HR) hyperspectral images (HSIs) often needs to be addressed due to the hardware limitations of existing imaging systems. A prevalent workaround involves capturing both a high-resolution multispectral image (HR-MSI) and… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: Submitted to TIP 2024

  2. arXiv:2406.15743  [pdf, other

    cs.SE

    CasModaTest: A Cascaded and Model-agnostic Self-directed Framework for Unit Test Generation

    Authors: Chao Ni, Xiaoya Wang, Liushan Chen, Dehai Zhao, Zhengong Cai, Shaohua Wang, Xiaohu Yang

    Abstract: Though many machine learning (ML)-based unit testing generation approaches have been proposed and indeed achieved remarkable performance, they still have several limitations in effectiveness and practical usage. More precisely, existing ML-based approaches (1) generate partial content of a unit test, mainly focusing on test oracle generation; (2) mismatch the test prefix with the test oracle seman… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    Comments: 14 pages, 7 figures

  3. MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representation

    Authors: Chao Ni, Liyu Shen, Xiaohu Yang, Yan Zhu, Shaohua Wang

    Abstract: We constructed a newly large-scale and comprehensive C/C++ vulnerability dataset named MegaVul by crawling the Common Vulnerabilities and Exposures (CVE) database and CVE-related open-source projects. Specifically, we collected all crawlable descriptive information of the vulnerabilities from the CVE database and extracted all vulnerability-related code changes from 28 Git-based websites. We adopt… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 5 pages, 4figures

  4. arXiv:2406.02609  [pdf, other

    cs.LG cs.AI

    Less is More: Pseudo-Label Filtering for Continual Test-Time Adaptation

    Authors: Jiayao Tan, Fan Lyu, Chenggong Ni, Tingliang Feng, Fuyuan Hu, Zhang Zhang, Shaochuang Zhao, Liang Wang

    Abstract: Continual Test-Time Adaptation (CTTA) aims to adapt a pre-trained model to a sequence of target domains during the test phase without accessing the source data. To adapt to unlabeled data from unknown domains, existing methods rely on constructing pseudo-labels for all samples and updating the model through self-training. However, these pseudo-labels often involve noise, leading to insufficient ad… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2310.03335 by other authors

  5. arXiv:2406.02009  [pdf, other

    eess.AS cs.CL cs.SD

    Phonetic Enhanced Language Modeling for Text-to-Speech Synthesis

    Authors: Kun Zhou, Shengkui Zhao, Yukun Ma, Chong Zhang, Hao Wang, Dianwen Ng, Chongjia Ni, Nguyen Trung Hieu, Jia Qi Yip, Bin Ma

    Abstract: Recent language model-based text-to-speech (TTS) frameworks demonstrate scalability and in-context learning capabilities. However, they suffer from robustness issues due to the accumulation of errors in speech unit predictions during autoregressive language modeling. In this paper, we propose a phonetic enhanced language modeling method to improve the performance of TTS models. We leverage self-su… ▽ More

    Submitted 11 June, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

    Comments: Accepted by Interspeech 2024

  6. arXiv:2405.11196  [pdf, other

    cs.SE

    Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models

    Authors: Yan Wang, Xiaoning Li, Tien Nguyen, Shaohua Wang, Chao Ni, Ling Ding

    Abstract: Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are heavy in computational complexity, and quadratically with the length of the input. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

  7. arXiv:2404.02056  [pdf, other

    cs.SE

    Multitask-based Evaluation of Open-Source LLM on Software Vulnerability

    Authors: Xin Yin, Chao Ni, Shaohua Wang

    Abstract: This paper proposes a pipeline for quantitatively evaluating interactive LLMs using publicly available datasets. We carry out an extensive technical evaluation of LLMs using Big-Vul covering four different common software vulnerability tasks. We evaluate the multitask and multilingual aspects of LLMs based on this dataset. We find that the existing state-of-the-art methods are generally superior t… ▽ More

    Submitted 25 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

  8. arXiv:2403.13219  [pdf, other

    cs.LG math.OC

    Diffusion Model for Data-Driven Black-Box Optimization

    Authors: Zihao Li, Hui Yuan, Kaixuan Huang, Chengzhuo Ni, Yinyu Ye, Minshuo Chen, Mengdi Wang

    Abstract: Generative AI has redefined artificial intelligence, enabling the creation of innovative content and customized solutions that drive business practices into a new era of efficiency and creativity. In this paper, we focus on diffusion models, a powerful generative AI technology, and investigate their potential for black-box optimization over complex structured variables. Consider the practical scen… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2307.07055

  9. arXiv:2403.00807  [pdf

    cs.IR cs.CL cs.DC cs.DL

    Enhancing Cloud-Based Large Language Model Processing with Elasticsearch and Transformer Models

    Authors: Chunhe Ni, Jiang Wu, Hongbo Wang, Wenran Lu, Chenwei Zhang

    Abstract: Large Language Models (LLMs) are a class of generative AI models built using the Transformer network, capable of leveraging vast datasets to identify, summarize, translate, predict, and generate language. LLMs promise to revolutionize society, yet training these foundational models poses immense challenges. Semantic vector search within large language models is a potent technique that can signific… ▽ More

    Submitted 24 February, 2024; originally announced March 2024.

  10. arXiv:2403.00806  [pdf

    cs.IR cs.CE cs.CL cs.CV

    Enhanced User Interaction in Operating Systems through Machine Learning Language Models

    Authors: Chenwei Zhang, Wenran Lu, Chunhe Ni, Hongbo Wang, Jiang Wu

    Abstract: With the large language model showing human-like logical reasoning and understanding ability, whether agents based on the large language model can simulate the interaction behavior of real users, so as to build a reliable virtual recommendation A/B test scene to help the application of recommendation research is an urgent, important and economic value problem. The combination of interaction design… ▽ More

    Submitted 24 February, 2024; originally announced March 2024.

  11. arXiv:2402.12916  [pdf

    cs.LG cs.AI

    Data Pipeline Training: Integrating AutoML to Optimize the Data Flow of Machine Learning Models

    Authors: Jiang Wu, Hongbo Wang, Chunhe Ni, Chenwei Zhang, Wenran Lu

    Abstract: Data Pipeline plays an indispensable role in tasks such as modeling machine learning and develo** data products. With the increasing diversification and complexity of Data sources, as well as the rapid growth of data volumes, building an efficient Data Pipeline has become crucial for improving work efficiency and solving complex problems. This paper focuses on exploring how to optimize data flow… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  12. arXiv:2312.11825  [pdf, other

    cs.SD eess.AS

    MossFormer2: Combining Transformer and RNN-Free Recurrent Network for Enhanced Time-Domain Monaural Speech Separation

    Authors: Shengkui Zhao, Yukun Ma, Chongjia Ni, Chong Zhang, Hao Wang, Trung Hieu Nguyen, Kun Zhou, Jiaqi Yip, Dianwen Ng, Bin Ma

    Abstract: Our previously proposed MossFormer has achieved promising performance in monaural speech separation. However, it predominantly adopts a self-attention-based MossFormer module, which tends to emphasize longer-range, coarser-scale dependencies, with a deficiency in effectively modelling finer-scale recurrent patterns. In this paper, we introduce a novel hybrid model that provides the capabilities to… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 5 pages, 3 figures, accepted by ICASSP 2024

  13. arXiv:2311.10261  [pdf, other

    cs.CV eess.SP

    Vision meets mmWave Radar: 3D Object Perception Benchmark for Autonomous Driving

    Authors: Yizhou Wang, Jen-Hao Cheng, Jui-Te Huang, Sheng-Yao Kuan, Qiqian Fu, Chiming Ni, Shengyu Hao, Gaoang Wang, Guanbin Xing, Hui Liu, Jenq-Neng Hwang

    Abstract: Sensor fusion is crucial for an accurate and robust perception system on autonomous vehicles. Most existing datasets and perception solutions focus on fusing cameras and LiDAR. However, the collaboration between camera and radar is significantly under-exploited. The incorporation of rich semantic information from the camera, and reliable 3D information from the radar can potentially achieve an eff… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  14. arXiv:2309.12608  [pdf, other

    eess.AS cs.SD

    SPGM: Prioritizing Local Features for enhanced speech separation performance

    Authors: Jia Qi Yip, Shengkui Zhao, Yukun Ma, Chongjia Ni, Chong Zhang, Hao Wang, Trung Hieu Nguyen, Kun Zhou, Dianwen Ng, Eng Siong Chng, Bin Ma

    Abstract: Dual-path is a popular architecture for speech separation models (e.g. Sepformer) which splits long sequences into overlap** chunks for its intra- and inter-blocks that separately model intra-chunk local features and inter-chunk global relationships. However, it has been found that inter-blocks, which comprise half a dual-path model's parameters, contribute minimally to performance. Thus, we pro… ▽ More

    Submitted 10 March, 2024; v1 submitted 21 September, 2023; originally announced September 2023.

    Comments: This paper was accepted by ICASSP 2024

  15. arXiv:2309.09413  [pdf, other

    cs.SD eess.AS

    Are Soft Prompts Good Zero-shot Learners for Speech Recognition?

    Authors: Dianwen Ng, Chong Zhang, Ruixi Zhang, Yukun Ma, Fabian Ritter-Gutierrez, Trung Hieu Nguyen, Chongjia Ni, Shengkui Zhao, Eng Siong Chng, Bin Ma

    Abstract: Large self-supervised pre-trained speech models require computationally expensive fine-tuning for downstream tasks. Soft prompt tuning offers a simple parameter-efficient alternative by utilizing minimal soft prompt guidance, enhancing portability while also maintaining competitive performance. However, not many people understand how and why this is so. In this study, we aim to deepen our understa… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

  16. arXiv:2309.00154  [pdf, other

    cs.CY

    Learning From Peers: A Survey of Perception and Utilization of Online Peer Support Among Informal Dementia Caregivers

    Authors: Zhijun Yin, Lauren Stratton, Qingyuan Song, Congning Ni, Lijun Song, Patricia A. Commiskey, Qingxia Chen, Monica Moreno, Sam Fazio, Bradley A. Malin

    Abstract: Informal dementia caregivers are those who care for a person living with dementia (PLWD) without receiving payment (e.g., family members, friends, or other unpaid caregivers). These informal caregivers are subject to substantial mental, physical, and financial burdens. Online communities enable these caregivers to exchange caregiving strategies and communicate experiences with other caregivers who… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

  17. arXiv:2308.11237  [pdf, other

    cs.SE

    Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation

    Authors: Chao Ni, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia

    Abstract: Though many deep learning (DL)-based vulnerability detection approaches have been proposed and indeed achieved remarkable performance, they still have limitations in the generalization as well as the practical usage. More precisely, existing DL-based approaches (1) perform negatively on prediction tasks among functions that are lexically similar but have contrary semantics; (2) provide no intuitiv… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Comments: Accepted By FSE'23

  18. arXiv:2307.07055  [pdf, other

    cs.LG

    Reward-Directed Conditional Diffusion: Provable Distribution Estimation and Reward Improvement

    Authors: Hui Yuan, Kaixuan Huang, Chengzhuo Ni, Minshuo Chen, Mengdi Wang

    Abstract: We explore the methodology and theory of reward-directed generation via conditional diffusion models. Directed generation aims to generate samples with desired properties as measured by a reward function, which has broad applications in generative AI, reinforcement learning, and computational biology. We consider the common learning scenario where the data set consists of unlabeled data along with… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

  19. arXiv:2305.12121  [pdf, other

    cs.SD cs.LG eess.AS

    ACA-Net: Towards Lightweight Speaker Verification using Asymmetric Cross Attention

    Authors: Jia Qi Yip, Tuan Truong, Dianwen Ng, Chong Zhang, Yukun Ma, Trung Hieu Nguyen, Chongjia Ni, Shengkui Zhao, Eng Siong Chng, Bin Ma

    Abstract: In this paper, we propose ACA-Net, a lightweight, global context-aware speaker embedding extractor for Speaker Verification (SV) that improves upon existing work by using Asymmetric Cross Attention (ACA) to replace temporal pooling. ACA is able to distill large, variable-length sequences into small, fixed-sized latents by attending a small query to large key and value matrices. In ACA-Net, we buil… ▽ More

    Submitted 20 May, 2023; originally announced May 2023.

    Comments: Accepted to INTERSPEECH 2023

  20. arXiv:2305.01170  [pdf, other

    cs.SD eess.AS

    Contrastive Speech Mixup for Low-resource Keyword Spotting

    Authors: Dianwen Ng, Ruixi Zhang, Jia Qi Yip, Chong Zhang, Yukun Ma, Trung Hieu Nguyen, Chongjia Ni, Eng Siong Chng, Bin Ma

    Abstract: Most of the existing neural-based models for keyword spotting (KWS) in smart devices require thousands of training samples to learn a decent audio representation. However, with the rising demand for smart devices to become more personalized, KWS models need to adapt quickly to smaller user samples. To tackle this challenge, we propose a contrastive speech mixup (CosMix) learning algorithm for low-… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: Accepted by ICASSP 2023

  21. arXiv:2304.05297  [pdf, other

    q-fin.PM cs.CE q-fin.CP

    Neural Network Approach to Portfolio Optimization with Leverage Constraints:a Case Study on High Inflation Investment

    Authors: Chendi Ni, Yuying Li, Peter A. Forsyth

    Abstract: Motivated by the current global high inflation scenario, we aim to discover a dynamic multi-period allocation strategy to optimally outperform a passive benchmark while adhering to a bounded leverage limit. To this end, we formulate an optimal control problem to outperform a benchmark portfolio throughout the investment horizon. Assuming the asset prices follow the jump-diffusion model during high… ▽ More

    Submitted 24 May, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

  22. arXiv:2303.15124  [pdf, other

    cs.CV cs.LG eess.IV

    Blind Inpainting with Object-aware Discrimination for Artificial Marker Removal

    Authors: Xuechen Guo, Wenhao Hu, Chiming Ni, Wenhao Chai, Shiyan Li, Gaoang Wang

    Abstract: Medical images often contain artificial markers added by doctors, which can negatively affect the accuracy of AI-based diagnosis. To address this issue and recover the missing visual contents, inpainting techniques are highly needed. However, existing inpainting methods require manual mask input, limiting their application scenarios. In this paper, we introduce a novel blind inpainting method that… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  23. arXiv:2303.07610  [pdf, other

    cs.CL

    Exploring ChatGPT's Ability to Rank Content: A Preliminary Study on Consistency with Human Preferences

    Authors: Yunjie Ji, Yan Gong, Yi** Peng, Chao Ni, Peiyan Sun, Dongyu Pan, Baochang Ma, Xiangang Li

    Abstract: As a natural language assistant, ChatGPT is capable of performing various tasks, including but not limited to article generation, code completion, and data analysis. Furthermore, ChatGPT has consistently demonstrated a remarkable level of accuracy and reliability in terms of content evaluation, exhibiting the capability of mimicking human preferences. To further explore ChatGPT's potential in this… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

  24. arXiv:2303.00179  [pdf, other

    cs.LG cs.DC

    A Unified Momentum-based Paradigm of Decentralized SGD for Non-Convex Models and Heterogeneous Data

    Authors: Haizhou Du, Chengdong Ni

    Abstract: Emerging distributed applications recently boosted the development of decentralized machine learning, especially in IoT and edge computing fields. In real-world scenarios, the common problems of non-convexity and data heterogeneity result in inefficiency, performance degradation, and development stagnation. The bulk of studies concentrates on one of the issues mentioned above without having a more… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 24 pages

    ACM Class: I.2.11; I.2.6

  25. arXiv:2302.14597  [pdf, other

    cs.SD eess.AS

    deHuBERT: Disentangling Noise in a Self-supervised Model for Robust Speech Recognition

    Authors: Dianwen Ng, Ruixi Zhang, Jia Qi Yip, Zhao Yang, **jie Ni, Chong Zhang, Yukun Ma, Chongjia Ni, Eng Siong Chng, Bin Ma

    Abstract: Existing self-supervised pre-trained speech models have offered an effective way to leverage massive unannotated corpora to build good automatic speech recognition (ASR). However, many current models are trained on a clean corpus from a single source, which tends to do poorly when noise is present during testing. Nonetheless, it is crucial to overcome the adverse influence of noise for real-world… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: Accepted by ICASSP 2023

  26. arXiv:2210.16976  [pdf, other

    cs.LG stat.ML

    Representation Learning for General-sum Low-rank Markov Games

    Authors: Chengzhuo Ni, Yuda Song, Xuezhou Zhang, Chi **, Mengdi Wang

    Abstract: We study multi-agent general-sum Markov games with nonlinear function approximation. We focus on low-rank Markov games whose transition matrix admits a hidden low-rank structure on top of an unknown non-linear representation. The goal is to design an algorithm that (1) finds an $\varepsilon$-equilibrium policy sample efficiently without prior knowledge of the environment or the representation, and… ▽ More

    Submitted 30 October, 2022; originally announced October 2022.

  27. Cloud-based Automatic Speech Recognition Systems for Southeast Asian Languages

    Authors: Lei Wang, Rong Tong, Cheung Chi Leung, Sunil Sivadas, Chongjia Ni, Bin Ma

    Abstract: This paper provides an overall introduction of our Automatic Speech Recognition (ASR) systems for Southeast Asian languages. As not much existing work has been carried out on such regional languages, a few difficulties should be addressed before building the systems: limitation on speech and text resources, lack of linguistic knowledge, etc. This work takes Bahasa Indonesia and Thai as examples to… ▽ More

    Submitted 7 October, 2022; originally announced October 2022.

    Comments: Published by the 2017 IEEE International Conference on Orange Technologies (ICOT 2017)

    ACM Class: I.2.7

  28. arXiv:2209.06360  [pdf, other

    cs.SD eess.AS

    I2CR: Improving Noise Robustness on Keyword Spotting Using Inter-Intra Contrastive Regularization

    Authors: Dianwen Ng, Jia Qi Yip, Tanmay Surana, Zhao Yang, Chong Zhang, Yukun Ma, Chongjia Ni, Eng Siong Chng, Bin Ma

    Abstract: Noise robustness in keyword spotting remains a challenge as many models fail to overcome the heavy influence of noises, causing the deterioration of the quality of feature embeddings. We proposed a contrastive regularization method called Inter-Intra Contrastive Regularization (I2CR) to improve the feature representations by guiding the model to learn the fundamental speech information specific to… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

  29. arXiv:2206.02092  [pdf, other

    cs.LG stat.ML

    Bandit Theory and Thompson Sampling-Guided Directed Evolution for Sequence Optimization

    Authors: Hui Yuan, Chengzhuo Ni, Huazheng Wang, Xuezhou Zhang, Le Cong, Csaba Szepesvári, Mengdi Wang

    Abstract: Directed Evolution (DE), a landmark wet-lab method originated in 1960s, enables discovery of novel protein designs via evolving a population of candidate sequences. Recent advances in biotechnology has made it possible to collect high-throughput data, allowing the use of machine learning to map out a protein's sequence-to-function relation. There is a growing interest in machine learning-assisted… ▽ More

    Submitted 4 June, 2022; originally announced June 2022.

  30. arXiv:2205.03996  [pdf, other

    cs.AR cs.CV cs.LG eess.IV

    Hardware-Robust In-RRAM-Computing for Object Detection

    Authors: Yu-Hsiang Chiang, Cheng En Ni, Yun Sung, Tuo-Hung Hou, Tian-Sheuan Chang, Shyh Jye Jou

    Abstract: In-memory computing is becoming a popular architecture for deep-learning hardware accelerators recently due to its highly parallel computing, low power, and low area cost. However, in-RRAM computing (IRC) suffered from large device variation and numerous nonideal effects in hardware. Although previous approaches including these effects in model training successfully improved variation tolerance, t… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: 10 pages, 18 figures

  31. arXiv:2204.04856  [pdf, other

    cs.SE

    Defect Identification, Categorization, and Repair: Better Together

    Authors: Chao Ni, Kaiwen Yang, Xin Xia, David Lo, Xiang Chen, Xiaohu Yang

    Abstract: Just-In-Time defect prediction (JIT-DP) models can identify defect-inducing commits at check-in time. Even though previous studies have achieved a great progress, these studies still have the following limitations: 1) useful information (e.g., semantic information and structure information) are not fully used; 2) existing work can only predict a commit as buggy one or clean one without more inform… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: 22 pages, 4 figures

  32. Fast and Compute-efficient Sampling-based Local Exploration Planning via Distribution Learning

    Authors: Lukas Schmid, Chao Ni, Yuliang Zhong, Roland Siegwart, Olov Andersson

    Abstract: Exploration is a fundamental problem in robotics. While sampling-based planners have shown high performance, they are oftentimes compute intensive and can exhibit high variance. To this end, we propose to directly learn the underlying distribution of informative views based on the spatial context in the robot's map. We further explore a variety of methods to also learn the information gain. We sho… ▽ More

    Submitted 22 June, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    Comments: Accepted for IEEE RA-L. Open-source code: https://github.com/ethz-asl/cvae_exploration_planning, 8 pages, 12 figures

    Journal ref: IEEE Robotics and Automation Letters, vol. 7, no. 3, pp. 7810-7817, July 2022

  33. arXiv:2202.04970  [pdf, ps, other

    stat.ML cs.LG

    Off-Policy Fitted Q-Evaluation with Differentiable Function Approximators: Z-Estimation and Inference Theory

    Authors: Ruiqi Zhang, Xuezhou Zhang, Chengzhuo Ni, Mengdi Wang

    Abstract: Off-Policy Evaluation (OPE) serves as one of the cornerstones in Reinforcement Learning (RL). Fitted Q Evaluation (FQE) with various function approximators, especially deep neural networks, has gained practical success. While statistical analysis has proved FQE to be minimax-optimal with tabular, linear and several nonparametric function families, its practical performance with more general functi… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 39 pages

  34. arXiv:2202.00076  [pdf, other

    stat.ML cs.LG

    Optimal Estimation of Off-Policy Policy Gradient via Double Fitted Iteration

    Authors: Chengzhuo Ni, Ruiqi Zhang, Xiang Ji, Xuezhou Zhang, Mengdi Wang

    Abstract: Policy gradient (PG) estimation becomes a challenge when we are not allowed to sample with the target policy but only have access to a dataset generated by some unknown behavior policy. Conventional methods for off-policy PG estimation often suffer from either significant bias or exponentially large variance. In this paper, we propose the double Fitted PG estimation (FPG) algorithm. FPG can work w… ▽ More

    Submitted 19 June, 2022; v1 submitted 31 January, 2022; originally announced February 2022.

  35. arXiv:2110.08545  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    A Unified Speaker Adaptation Approach for ASR

    Authors: Yingzhu Zhao, Chongjia Ni, Cheung-Chi Leung, Shafiq Joty, Eng Siong Chng, Bin Ma

    Abstract: Transformer models have been used in automatic speech recognition (ASR) successfully and yields state-of-the-art results. However, its performance is still affected by speaker mismatch between training and test data. Further finetuning a trained model with target speaker data is the most natural approach for adaptation, but it takes a lot of compute and may cause catastrophic forgetting to the exi… ▽ More

    Submitted 16 October, 2021; originally announced October 2021.

    Comments: Accepted by EMNLP 2021

  36. arXiv:2105.01136  [pdf, other

    stat.ML cs.LG

    Learning Good State and Action Representations via Tensor Decomposition

    Authors: Chengzhuo Ni, Yaqi Duan, Munther Dahleh, Anru Zhang, Mengdi Wang

    Abstract: The transition kernel of a continuous-state-action Markov decision process (MDP) admits a natural tensor structure. This paper proposes a tensor-inspired unsupervised learning method to identify meaningful low-dimensional state and action representations from empirical trajectories. The method exploits the MDP's tensor structure by kernelization, importance sampling and low-Tucker-rank approximati… ▽ More

    Submitted 19 February, 2023; v1 submitted 3 May, 2021; originally announced May 2021.

  37. arXiv:2102.08607  [pdf, other

    cs.LG stat.ML

    On the Convergence and Sample Efficiency of Variance-Reduced Policy Gradient Method

    Authors: Junyu Zhang, Chengzhuo Ni, Zheng Yu, Csaba Szepesvari, Mengdi Wang

    Abstract: Policy gradient (PG) gives rise to a rich class of reinforcement learning (RL) methods. Recently, there has been an emerging trend to accelerate the existing PG methods such as REINFORCE by the \emph{variance reduction} techniques. However, all existing variance-reduced PG methods heavily rely on an uncheckable importance weight assumption made for every single iteration of the algorithms. In this… ▽ More

    Submitted 27 May, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

  38. arXiv:2005.10407  [pdf, other

    eess.AS cs.LG cs.SD

    Leveraging Text Data Using Hybrid Transformer-LSTM Based End-to-End ASR in Transfer Learning

    Authors: Zhi** Zeng, Van Tung Pham, Haihua Xu, Yerbolat Khassanov, Eng Siong Chng, Chongjia Ni, Bin Ma

    Abstract: In this work, we study leveraging extra text data to improve low-resource end-to-end ASR under cross-lingual transfer learning setting. To this end, we extend our prior work [1], and propose a hybrid Transformer-LSTM based architecture. This architecture not only takes advantage of the highly effective encoding capacity of the Transformer network but also benefits from extra text data due to the L… ▽ More

    Submitted 28 May, 2020; v1 submitted 20 May, 2020; originally announced May 2020.

  39. arXiv:2004.06842  [pdf, other

    cs.IR cs.LG cs.SI

    Layered Graph Embedding for Entity Recommendation using Wikipedia in the Yahoo! Knowledge Graph

    Authors: Chien-Chun Ni, Kin Sum Liu, Nicolas Torzec

    Abstract: In this paper, we describe an embedding-based entity recommendation framework for Wikipedia that organizes Wikipedia into a collection of graphs layered on top of each other, learns complementary entity representations from their topology and content, and combines them with a lightweight learning-to-rank approach to recommend related entities on Wikipedia. Through offline and online evaluations, w… ▽ More

    Submitted 14 April, 2020; originally announced April 2020.

    Comments: 8 pages, 4 figures, 8 tables. To be appeared in Wiki Workshop 2020, Companion Proceedings of the Web Conference 2020(WWW 20 Companion), Taipei, Taiwan

    ACM Class: H.3.3

  40. arXiv:1912.00863  [pdf, other

    cs.CL eess.AS

    Independent language modeling architecture for end-to-end ASR

    Authors: Van Tung Pham, Haihua Xu, Yerbolat Khassanov, Zhi** Zeng, Eng Siong Chng, Chongjia Ni, Bin Ma, Haizhou Li

    Abstract: The attention-based end-to-end (E2E) automatic speech recognition (ASR) architecture allows for joint optimization of acoustic and language models within a single network. However, in a vanilla E2E ASR architecture, the decoder sub-network (subnet), which incorporates the role of the language model (LM), is conditioned on the encoder output. This means that the acoustic encoder and the language mo… ▽ More

    Submitted 25 November, 2019; originally announced December 2019.

  41. Revisiting Heterogeneous Defect Prediction: How Far Are We?

    Authors: Xiang Chen, Yanzhou Mu, Chao Ni, Zhanqi Cui

    Abstract: Until now, researchers have proposed several novel heterogeneous defect prediction HDP methods with promising performance. To the best of our knowledge, whether HDP methods can perform significantly better than unsupervised methods has not yet been thoroughly investigated. In this article, we perform a replication study to have a holistic look in this issue. In particular, we compare state-of-the-… ▽ More

    Submitted 18 August, 2019; originally announced August 2019.

    Comments: 40 pages, 13 figures

    Journal ref: Information and Software Technology, 2021, 130: 106441

  42. arXiv:1907.07129  [pdf, other

    cs.LG stat.ML

    Topology Based Scalable Graph Kernels

    Authors: Kin Sum Liu, Chien-Chun Ni, Yu-Yao Lin, Jie Gao

    Abstract: We propose a new graph kernel for graph classification and comparison using Ollivier Ricci curvature. The Ricci curvature of an edge in a graph describes the connectivity in the local neighborhood. An edge in a densely connected neighborhood has positive curvature and an edge serving as a local bridge has negative curvature. We use the edge curvature distribution to form a graph kernel which is th… ▽ More

    Submitted 14 July, 2019; originally announced July 2019.

  43. arXiv:1907.03993  [pdf, other

    cs.SI physics.soc-ph

    Community Detection on Networks with Ricci Flow

    Authors: Chien-Chun Ni, Yu-Yao Lin, Feng Luo, Jie Gao

    Abstract: Many complex networks in the real world have community structures -- groups of well-connected nodes with important functional roles. It has been well recognized that the identification of communities bears numerous practical applications. While existing approaches mainly apply statistical or graph theoretical/combinatorial methods for community detection, in this paper, we present a novel geometri… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: 29 pages, 18 figures, to be appeared on Scientific Reports

  44. arXiv:1905.01576  [pdf, ps, other

    cs.LG cs.AI stat.ML

    Learning to Control in Metric Space with Optimal Regret

    Authors: Lin F. Yang, Chengzhuo Ni, Mengdi Wang

    Abstract: We study online reinforcement learning for finite-horizon deterministic control systems with {\it arbitrary} state and action spaces. Suppose that the transition dynamics and reward function is unknown, but the state and action space is endowed with a metric that characterizes the proximity between different states and actions. We provide a surprisingly simple upper-confidence reinforcement learni… ▽ More

    Submitted 4 May, 2019; originally announced May 2019.

  45. Constrained Output Embeddings for End-to-End Code-Switching Speech Recognition with Only Monolingual Data

    Authors: Yerbolat Khassanov, Haihua Xu, Van Tung Pham, Zhi** Zeng, Eng Siong Chng, Chongjia Ni, Bin Ma

    Abstract: The lack of code-switch training data is one of the major concerns in the development of end-to-end code-switching automatic speech recognition (ASR) models. In this work, we propose a method to train an improved end-to-end code-switching ASR using only monolingual data. Our method encourages the distributions of output token embeddings of monolingual languages to be similar, and hence, promotes t… ▽ More

    Submitted 31 July, 2019; v1 submitted 7 April, 2019; originally announced April 2019.

    Comments: 5 pages, 3 figures, accepted to INTERSPEECH 2019

  46. arXiv:1901.10655  [pdf, other

    stat.ML cs.LG

    On the Calibration of Multiclass Classification with Rejection

    Authors: Chenri Ni, Nontawat Charoenphakdee, Junya Honda, Masashi Sugiyama

    Abstract: We investigate the problem of multiclass classification with rejection, where a classifier can choose not to make a prediction to avoid critical misclassification. First, we consider an approach based on simultaneous training of a classifier and a rejector, which achieves the state-of-the-art performance in the binary case. We analyze this approach for the multiclass case and derive a general cond… ▽ More

    Submitted 29 October, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: NeurIPS2019 camera-ready, 31 pages

  47. arXiv:1809.00320  [pdf, other

    cs.SI cs.CG

    Network Alignment by Discrete Ollivier-Ricci Flow

    Authors: Chien-Chun Ni, Yu-Yao Lin, Jie Gao, Xianfeng David Gu

    Abstract: In this paper, we consider the problem of approximately aligning/matching two graphs. Given two graphs $G_{1}=(V_{1},E_{1})$ and $G_{2}=(V_{2},E_{2})$, the objective is to map nodes $u, v \in G_1$ to nodes $u',v'\in G_2$ such that when $u, v$ have an edge in $G_1$, very likely their corresponding nodes $u', v'$ in $G_2$ are connected as well. This problem with subgraph isomorphism as a special cas… ▽ More

    Submitted 7 September, 2018; v1 submitted 2 September, 2018; originally announced September 2018.

    Comments: Appears in the Proceedings of the 26th International Symposium on Graph Drawing and Network Visualization (GD 2018)

  48. arXiv:1708.09129  [pdf, other

    cs.NI cs.CG

    Decentralized Trajectory Tracking Using Homology and Hodge Decomposition in Sensor Networks

    Authors: Xiaotian Yin, Yu-Yao Lin, Chien-Chun Ni, Jiaxin Ding, Wei Han, Dengpan Zhou, Jie Gao, Xianfeng Gu

    Abstract: With the recent development of localization and tracking systems for both indoor and outdoor settings, we consider the problem of sensing, representing and analyzing human movement trajectories that we expect to gather in the near future. In this paper, we propose to use the topological representation, which records how a target moves around the natural obstacles in the underlying environment. We… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 30 pages, 10 figures, submitted to ACM TSAS

  49. arXiv:1708.04813  [pdf, ps, other

    cs.IT

    Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge Computing

    Authors: Ying Cui, Wen He, Chun Ni, Chengjun Guo, Zhi Liu

    Abstract: In this paper, we jointly consider communication, caching and computation in a multi-user cache-assisted mobile edge computing (MEC) system, consisting of one base station (BS) of caching and computing capabilities and multiple users with computation-intensive and latency-sensitive applications. We propose a joint caching and offloading mechanism which involves task uploading and executing for tas… ▽ More

    Submitted 16 August, 2017; originally announced August 2017.

    Comments: 9 pages, 8 figures, to appear in IEEE LCN 2017, Oct 9-12

  50. arXiv:1701.07549  [pdf, other

    cs.RO

    Robot Coverage Path Planning for General Surfaces Using Quadratic Differentials

    Authors: Yu-Yao Lin, Chien-Chun Ni, Na Lei, Xianfeng David Gu, Jie Gao

    Abstract: Robot Coverage Path planning (i.e., provide full coverage of a given domain by one or multiple robots) is a classical problem in the field of robotics and motion planning. The goal is to provide nearly full coverage while also minimize duplicately visited area. In this paper we focus on the scenario of path planning on general surfaces including planar domains with complex topology, complex terrai… ▽ More

    Submitted 25 January, 2017; originally announced January 2017.

    Comments: 8 pages, 13 figures, IEEE ICRA 2017