Skip to main content

Showing 1–50 of 64 results for author: Niu, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19931  [pdf, other

    cs.LG cs.AI

    Decoupling General and Personalized Knowledge in Federated Learning via Additive and Low-Rank Decomposition

    Authors: Xinghao Wu, Xuefeng Liu, Jianwei Niu, Haolin Wang, Shaojie Tang, Guogang Zhu, Hao Su

    Abstract: To address data heterogeneity, the key strategy of Personalized Federated Learning (PFL) is to decouple general knowledge (shared among clients) and client-specific knowledge, as the latter can have a negative impact on collaboration if not removed. Existing PFL methods primarily adopt a parameter partitioning approach, where the parameters of a model are designated as one of two types: parameters… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 12 pages, 8 figures

  2. Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols

    Authors: Wei Tong, Haoyu Chen, Jiacheng Niu, Sheng Zhong

    Abstract: Local differential privacy (LDP) provides a way for an untrusted data collector to aggregate users' data without violating their privacy. Various privacy-preserving data analysis tasks have been studied under the protection of LDP, such as frequency estimation, frequent itemset mining, and machine learning. Despite its privacy-preserving properties, recent research has demonstrated the vulnerabili… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: To appear in ACM Conference on Computer and Communications Security (ACM CCS 2024)

  3. arXiv:2405.19789  [pdf, other

    cs.LG cs.DC

    Estimating before Debiasing: A Bayesian Approach to Detaching Prior Bias in Federated Semi-Supervised Learning

    Authors: Guogang Zhu, Xuefeng Liu, Xinghao Wu, Shaojie Tang, Chao Tang, Jianwei Niu, Hao Su

    Abstract: Federated Semi-Supervised Learning (FSSL) leverages both labeled and unlabeled data on clients to collaboratively train a model.In FSSL, the heterogeneous data can introduce prediction bias into the model, causing the model's prediction to skew towards some certain classes. Existing FSSL methods primarily tackle this issue by enhancing consistency in model parameters or outputs. However, as the mo… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Accepted by IJCAI 2024

  4. arXiv:2405.19694  [pdf, other

    cs.AI

    Grade Like a Human: Rethinking Automated Assessment with Large Language Models

    Authors: Wen**g Xie, Juxin Niu, Chun Jason Xue, Nan Guan

    Abstract: While large language models (LLMs) have been used for automated grading, they have not yet achieved the same level of performance as humans, especially when it comes to grading complex questions. Existing research on this topic focuses on a particular step in the grading procedure: grading using predefined rubrics. However, grading is a multifaceted procedure that encompasses other crucial steps,… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  5. arXiv:2405.04071  [pdf, other

    cs.RO cs.CV

    IMU-Aided Event-based Stereo Visual Odometry

    Authors: Junkai Niu, Sheng Zhong, Yi Zhou

    Abstract: Direct methods for event-based visual odometry solve the map** and camera pose tracking sub-problems by establishing implicit data association in a way that the generative model of events is exploited. The main bottlenecks faced by state-of-the-art work in this field include the high computational complexity of map** and the limited accuracy of tracking. In this paper, we improve our previous… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 10 pages, 7 figures, ICRA

  6. arXiv:2405.02421  [pdf, other

    cs.CL

    What does the Knowledge Neuron Thesis Have to do with Knowledge?

    Authors: **gcheng Niu, Andrew Liu, Zining Zhu, Gerald Penn

    Abstract: We reassess the Knowledge Neuron (KN) Thesis: an interpretation of the mechanism underlying the ability of large language models to recall facts from a training corpus. This nascent thesis proposes that facts are recalled from the training corpus through the MLP weights in a manner resembling key-value memory, implying in effect that "knowledge" is stored in the network. Furthermore, by modifying… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: ICLR 2024 (Spotlight)

  7. arXiv:2404.17808  [pdf, other

    cs.CL

    Scaffold-BPE: Enhancing Byte Pair Encoding with Simple and Effective Scaffold Token Removal

    Authors: Haoran Lian, Yizhe Xiong, Jianwei Niu, Shasha Mo, Zhenpeng Su, Zijia Lin, Peng Liu, Hui Chen, Guiguang Ding

    Abstract: Byte Pair Encoding (BPE) serves as a foundation method for text tokenization in the Natural Language Processing (NLP) field. Despite its wide adoption, the original BPE algorithm harbors an inherent flaw: it inadvertently introduces a frequency imbalance for tokens in the text corpus. Since BPE iteratively merges the most frequent token pair in the text corpus while kee** all tokens that have be… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  8. arXiv:2404.17785  [pdf, other

    cs.CL

    Temporal Scaling Law for Large Language Models

    Authors: Yizhe Xiong, Xiansheng Chen, Xin Ye, Hui Chen, Zijia Lin, Haoran Lian, Zhenpeng Su, Jianwei Niu, Guiguang Ding

    Abstract: Recently, Large Language Models (LLMs) have been widely adopted in a wide range of tasks, leading to increasing attention towards the research on how scaling LLMs affects their performance. Existing works, termed Scaling Laws, have discovered that the final test loss of LLMs scales as power-laws with model size, computational budget, and dataset size. However, the temporal change of the test loss… ▽ More

    Submitted 16 June, 2024; v1 submitted 27 April, 2024; originally announced April 2024.

    Comments: 8 pages, 3 figures; Under review

  9. arXiv:2403.11506  [pdf, other

    cs.CV cs.AI

    End-To-End Underwater Video Enhancement: Dataset and Model

    Authors: Dazhao Du, Enhan Li, Lingyu Si, Fanjiang Xu, Jianwei Niu

    Abstract: Underwater video enhancement (UVE) aims to improve the visibility and frame quality of underwater videos, which has significant implications for marine research and exploration. However, existing methods primarily focus on develo** image enhancement algorithms to enhance each frame independently. There is a lack of supervised datasets and models specifically tailored for UVE tasks. To fill this… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  10. arXiv:2402.02797  [pdf, other

    cs.CV cs.LG

    Joint Attention-Guided Feature Fusion Network for Saliency Detection of Surface Defects

    Authors: Xiaoheng Jiang, Feng Yan, Yang Lu, Ke Wang, Shuai Guo, Tianzhu Zhang, Yanwei Pang, Jianwei Niu, Mingliang Xu

    Abstract: Surface defect inspection plays an important role in the process of industrial manufacture and production. Though Convolutional Neural Network (CNN) based defect inspection methods have made huge leaps, they still confront a lot of challenges such as defect scale variation, complex background, low contrast, and so on. To address these issues, we propose a joint attention-guided feature fusion netw… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  11. arXiv:2401.01189  [pdf, other

    cs.RO cs.AI

    NID-SLAM: Neural Implicit Representation-based RGB-D SLAM in dynamic environments

    Authors: Ziheng Xu, Jianwei Niu, Qingfeng Li, Tao Ren, Chen Chen

    Abstract: Neural implicit representations have been explored to enhance visual SLAM algorithms, especially in providing high-fidelity dense map. Existing methods operate robustly in static scenes but struggle with the disruption caused by moving objects. In this paper we present NID-SLAM, which significantly improves the performance of neural SLAM in dynamic environments. We propose a new approach to enhanc… ▽ More

    Submitted 16 May, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

  12. arXiv:2312.16470  [pdf, other

    cs.CV cs.AI

    ReSynthDetect: A Fundus Anomaly Detection Network with Reconstruction and Synthetic Features

    Authors: **gqi Niu, Qinji Yu, Shiwen Dong, Zilong Wang, Kang Dang, Xiaowei Ding

    Abstract: Detecting anomalies in fundus images through unsupervised methods is a challenging task due to the similarity between normal and abnormal tissues, as well as their indistinct boundaries. The current methods have limitations in accurately detecting subtle anomalies while avoiding false positives. To address these challenges, we propose the ReSynthDetect network which utilizes a reconstruction netwo… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: Accepted at BMVC2023

  13. arXiv:2312.06240  [pdf, other

    cs.CV

    UIEDP:Underwater Image Enhancement with Diffusion Prior

    Authors: Dazhao Du, Enhan Li, Lingyu Si, Fanjiang Xu, Jianwei Niu, Fuchun Sun

    Abstract: Underwater image enhancement (UIE) aims to generate clear images from low-quality underwater images. Due to the unavailability of clear reference images, researchers often synthesize them to construct paired datasets for training deep models. However, these synthesized images may sometimes lack quality, adversely affecting training outcomes. To address this issue, we propose UIE with Diffusion Pri… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  14. arXiv:2312.00741  [pdf, ps, other

    cs.CR cs.DC

    Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate

    Authors: Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng

    Abstract: Researchers have discovered a series of theoretical attacks against Bitcoin's Nakamoto consensus; the most damaging ones are selfish mining, double-spending, and consistency delay attacks. These attacks have one common cause: block withholding. This paper proposes Crystal, which leverages quorum certificates to resist block withholding misbehavior. Crystal continuously elects committees from miner… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 17 pages, 9 figures

  15. arXiv:2311.18189  [pdf, other

    cs.RO

    Event-based Visual Inertial Velometer

    Authors: Xiuyuan Lu, Yi Zhou, Junkai Niu, Sheng Zhong, Shaojie Shen

    Abstract: Neuromorphic event-based cameras are bio-inspired visual sensors with asynchronous pixels and extremely high temporal resolution. Such favorable properties make them an excellent choice for solving state estimation tasks under aggressive ego motion. However, failures of camera pose tracking are frequently witnessed in state-of-the-art event-based visual odometry systems when the local map cannot b… ▽ More

    Submitted 30 May, 2024; v1 submitted 29 November, 2023; originally announced November 2023.

  16. arXiv:2311.07783  [pdf, other

    cs.DM cs.SI physics.data-an physics.soc-ph

    Size-Aware Hypergraph Motifs

    Authors: Jason Niu, Ilya D. Amburg, Sinan G. Aksoy, Ahmet Erdem Sarıyüce

    Abstract: Complex systems frequently exhibit multi-way, rather than pairwise, interactions. These group interactions cannot be faithfully modeled as collections of pairwise interactions using graphs, and instead require hypergraphs. However, methods that analyze hypergraphs directly, rather than via lossy graph reductions, remain limited. Hypergraph motif mining holds promise in this regard, as motif patter… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  17. arXiv:2309.14755  [pdf, other

    cs.CV

    Image Denoising via Style Disentanglement

    Authors: **gwei Niu, Jun Cheng, Shan Tan

    Abstract: Image denoising is a fundamental task in low-level computer vision. While recent deep learning-based image denoising methods have achieved impressive performance, they are black-box models and the underlying denoising principle remains unclear. In this paper, we propose a novel approach to image denoising that offers both clear denoising mechanism and good performance. We view noise as a type of i… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

  18. arXiv:2309.11103  [pdf, other

    cs.LG

    Bold but Cautious: Unlocking the Potential of Personalized Federated Learning through Cautiously Aggressive Collaboration

    Authors: Xinghao Wu, Xuefeng Liu, Jianwei Niu, Guogang Zhu, Shaojie Tang

    Abstract: Personalized federated learning (PFL) reduces the impact of non-independent and identically distributed (non-IID) data among clients by allowing each client to train a personalized model when collaborating with others. A key question in PFL is to decide which parameters of a client should be localized or shared with others. In current mainstream approaches, all layers that are sensitive to non-IID… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: Accepted by ICCV2023

  19. arXiv:2307.13995  [pdf, other

    cs.LG cs.DC

    Take Your Pick: Enabling Effective Personalized Federated Learning within Low-dimensional Feature Space

    Authors: Guogang Zhu, Xuefeng Liu, Shaojie Tang, Jianwei Niu, Xinghao Wu, Jiaxing Shen

    Abstract: Personalized federated learning (PFL) is a popular framework that allows clients to have different models to address application scenarios where clients' data are in different domains. The typical model of a client in PFL features a global encoder trained by all clients to extract universal features from the raw data and personalized layers (e.g., a classifier) trained using the client's local dat… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

    Comments: 13 pages, 13 figures

  20. arXiv:2307.09892  [pdf, other

    cs.CV

    3Deformer: A Common Framework for Image-Guided Mesh Deformation

    Authors: Hao Su, Xuefeng Liu, Jianwei Niu, Ji Wan, Xinghao Wu

    Abstract: We propose 3Deformer, a general-purpose framework for interactive 3D shape editing. Given a source 3D mesh with semantic materials, and a user-specified semantic image, 3Deformer can accurately edit the source mesh following the shape guidance of the semantic image, while preserving the source topology as rigid as possible. Recent studies of 3D shape editing mostly focus on learning neural network… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  21. arXiv:2307.06123  [pdf, other

    cs.CR cs.LG

    SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark

    Authors: Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang

    Abstract: Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. However, it has been increasingly recognized that the "comparing different MI attacks" methodology used in the existing works has serious limitations. Due to these limitations, we found (through the experiments in this work) that some comparison results reporte… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 21 pages,15 figures

  22. arXiv:2306.02701  [pdf, other

    cs.LG cs.AI

    Unlocking the Potential of Federated Learning for Deeper Models

    Authors: Haolin Wang, Xuefeng Liu, Jianwei Niu, Shaojie Tang, Jiaxing Shen

    Abstract: Federated learning (FL) is a new paradigm for distributed machine learning that allows a global model to be trained across multiple clients without compromising their privacy. Although FL has demonstrated remarkable success in various scenarios, recent studies mainly utilize shallow and small neural networks. In our research, we discover a significant performance decline when applying the existing… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

    Comments: 16 pages, 8 figures

  23. Region and Spatial Aware Anomaly Detection for Fundus Images

    Authors: **gqi Niu, Shiwen Dong, Qinji Yu, Kang Dang, Xiaowei Ding

    Abstract: Recently anomaly detection has drawn much attention in diagnosing ocular diseases. Most existing anomaly detection research in fundus images has relatively large anomaly scores in the salient retinal structures, such as blood vessels, optical cups and discs. In this paper, we propose a Region and Spatial Aware Anomaly Detection (ReSAD) method for fundus images, which obtains local region and long-… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Report number: 2303.03817

    Journal ref: 2023 IEEE 20th International Symposium on Biomedical Imaging (ISBI), Cartagena, Colombia, 2023, pp. 1-5

  24. arXiv:2302.03222  [pdf, other

    cs.CL

    Bringing the State-of-the-Art to Customers: A Neural Agent Assistant Framework for Customer Service Support

    Authors: Stephen Obadinma, Faiza Khan Khattak, Shirley Wang, Tania Sidhom, Elaine Lau, Sean Robertson, **gcheng Niu, Winnie Au, Alif Munim, Karthik Raja K. Bhaskar, Bencheng Wei, Iris Ren, Waqar Muhammad, Erin Li, Bukola Ishola, Michael Wang, Griffin Tanner, Yu-Jia Shiah, Sean X. Zhang, Kwesi P. Apponsah, Kanishk Patel, Jaswinder Narain, Deval Pandya, Xiaodan Zhu, Frank Rudzicz , et al. (1 additional authors not shown)

    Abstract: Building Agent Assistants that can help improve customer service support requires inputs from industry users and their customers, as well as knowledge about state-of-the-art Natural Language Processing (NLP) technology. We combine expertise from academia and industry to bridge the gap and build task/domain-specific Neural Agent Assistants (NAA) with three high-level components for: (1) Intent Iden… ▽ More

    Submitted 6 February, 2023; originally announced February 2023.

    Comments: Camera Ready Version of Paper Published in EMNLP 2022 Industry Track

  25. arXiv:2210.07490  [pdf, other

    eess.IV cs.CV

    Exploring Vanilla U-Net for Lesion Segmentation from Whole-body FDG-PET/CT Scans

    Authors: ** Ye, Haoyu Wang, Ziyan Huang, Zhongying Deng, Yanzhou Su, Can Tu, Qian Wu, Yuncheng Yang, Meng Wei, **gqi Niu, Junjun He

    Abstract: Tumor lesion segmentation is one of the most important tasks in medical image analysis. In clinical practice, Fluorodeoxyglucose Positron-Emission Tomography~(FDG-PET) is a widely used technique to identify and quantify metabolically active tumors. However, since FDG-PET scans only provide metabolic information, healthy tissue or benign disease with irregular glucose consumption may be mistaken fo… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: autoPET 2022, MICCAI 2022 challenge, champion

  26. arXiv:2209.08512  [pdf, other

    cs.DC

    Phalanx: A Practical Byzantine Ordered Consensus Protocol

    Authors: Guangren Wang, Liang Cai, Fangyu Gai, Jianyu Niu

    Abstract: Byzantine fault tolerance (BFT) consensus is a fundamental primitive for distributed computation. However, BFT protocols suffer from the ordering manipulation, in which an adversary can make front-running. Several protocols are proposed to resolve the manipulation problem, but there are some limitations for them. The batch-based protocols such as Themis has significant performance loss because of… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  27. arXiv:2209.02247  [pdf, ps, other

    eess.IV cs.CV cs.LG

    An evaluation of U-Net in Renal Structure Segmentation

    Authors: Haoyu Wang, Ziyan Huang, ** Ye, Can Tu, Yuncheng Yang, Shiyi Du, Zhongying Deng, Chenglong Ma, **gqi Niu, Junjun He

    Abstract: Renal structure segmentation from computed tomography angiography~(CTA) is essential for many computer-assisted renal cancer treatment applications. Kidney PArsing~(KiPA 2022) Challenge aims to build a fine-grained multi-structure dataset and improve the segmentation of multiple renal structures. Recently, U-Net has dominated the medical image segmentation. In the KiPA challenge, we evaluated seve… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

  28. arXiv:2208.02858  [pdf, other

    cs.CR

    An Empirical Study on Ethereum Private Transactions and the Security Implications

    Authors: Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin

    Abstract: Recently, Decentralized Finance (DeFi) platforms on Ethereum are booming, and numerous traders are trying to capitalize on the opportunity for maximizing their benefits by launching front-running attacks and extracting Miner Extractable Values (MEVs) based on information in the public mempool. To protect end users from being harmed and hide transactions from the mempool, private transactions, a sp… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

  29. arXiv:2207.07301  [pdf, other

    eess.IV cs.AI cs.CV

    Robust Deep Compressive Sensing with Recurrent-Residual Structural Constraints

    Authors: Jun Niu

    Abstract: Existing deep compressive sensing (CS) methods either ignore adaptive online optimization or depend on costly iterative optimizer during reconstruction. This work explores a novel image CS framework with recurrent-residual structural constraint, termed as R$^2$CS-NET. The R$^2$CS-NET first progressively optimizes the acquired samplings through a novel recurrent neural network. The cascaded residua… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  30. arXiv:2206.01884  [pdf

    cs.CV cs.AI

    A Superimposed Divide-and-Conquer Image Recognition Method for SEM Images of Nanoparticles on The Surface of Monocrystalline silicon with High Aggregation Degree

    Authors: Ruiling Xiao, Jiayang Niu

    Abstract: The nanoparticle size and distribution information in the SEM images of silicon crystals are generally counted by manual methods. The realization of automatic machine recognition is significant in materials science. This paper proposed a superposition partitioning image recognition method to realize automatic recognition and information statistics of silicon crystal nanoparticle SEM images. Especi… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  31. arXiv:2205.00834  [pdf, other

    math.OC cs.CV

    Convex Augmentation for Total Variation Based Phase Retrieval

    Authors: Jianwei Niu, Hok Shing Wong, Tieyong Zeng

    Abstract: Phase retrieval is an important problem with significant physical and industrial applications. In this paper, we consider the case where the magnitude of the measurement of an underlying signal is corrupted by Gaussian noise. We introduce a convex augmentation approach for phase retrieval based on total variation regularization. In contrast to popular convex relaxation models like PhaseLift, our m… ▽ More

    Submitted 21 April, 2022; originally announced May 2022.

  32. arXiv:2203.15455  [pdf, other

    cs.SD cs.CL eess.AS

    WeNet 2.0: More Productive End-to-End Speech Recognition Toolkit

    Authors: Binbin Zhang, Di Wu, Zhendong Peng, Xingchen Song, Zhuoyuan Yao, Hang Lv, Lei Xie, Chao Yang, Fu** Pan, Jianwei Niu

    Abstract: Recently, we made available WeNet, a production-oriented end-to-end speech recognition toolkit, which introduces a unified two-pass (U2) framework and a built-in runtime to address the streaming and non-streaming decoding modes in a single model. To further improve ASR performance and facilitate various production requirements, in this paper, we present WeNet 2.0 with four important updates. (1) W… ▽ More

    Submitted 5 July, 2022; v1 submitted 29 March, 2022; originally announced March 2022.

  33. arXiv:2203.05158  [pdf, other

    cs.DC

    Scaling Blockchain Consensus via a Robust Shared Mempool

    Authors: Fangyu Gai, Jianyu Niu, Ivan Beschastnikh, Chen Feng, Sheng Wang

    Abstract: There is a resurgence of interest in Byzantine fault-tolerant (BFT) systems due to blockchains. However, leader-based BFT consensus protocols used by permissioned blockchains have limited scalability and robustness. To alleviate the leader bottleneck in BFT consensus, we introduce Stratus, a robust shared mempool protocol that decouples transaction distribution from consensus. Our idea is to have… ▽ More

    Submitted 25 September, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: This work is to appear in ICDE 2023

  34. arXiv:2110.04830  [pdf, other

    cs.CV

    MARVEL: Raster Manga Vectorization via Primitive-wise Deep Reinforcement Learning

    Authors: Hao Su, Jianwei Niu, Xuefeng Liu, Jiahe Cui, Ji Wan

    Abstract: Manga is a fashionable Japanese-style comic form that is composed of black-and-white strokes and is generally displayed as raster images on digital devices. Typical mangas have simple textures, wide lines, and few color gradients, which are vectorizable natures to enjoy the merits of vector graphics, e.g., adaptive resolutions and small file sizes. In this paper, we propose MARVEL (MAnga's Raster… ▽ More

    Submitted 18 July, 2023; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: The name of the previous version paper was: Mang2Vec: Vectorization of raster manga by deep reinforcement learning

  35. arXiv:2107.04947  [pdf, ps, other

    cs.DC

    On the Performance of Pipelined HotStuff

    Authors: Jianyu Niu, Fangyu Gai, Mohammad M. Jalalzai, Chen Feng

    Abstract: HotStuff is a state-of-the-art Byzantine fault-tolerant consensus protocol. It can be pipelined to build large-scale blockchains. One of its variants called LibraBFT is adopted in Facebook's Libra blockchain. Although it is well known that pipelined HotStuff is secure against up to $1/3$ of Byzantine nodes, its performance in terms of throughput and delay is still under-explored. In this paper, we… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

    Comments: IEEE International Conference on Computer Communications (INFOCOM' 21)

  36. arXiv:2106.00666  [pdf, other

    cs.CV cs.AI cs.LG

    You Only Look at One Sequence: Rethinking Transformer in Vision through Object Detection

    Authors: Yuxin Fang, Bencheng Liao, Xinggang Wang, Jiemin Fang, Jiyang Qi, Rui Wu, Jianwei Niu, Wenyu Liu

    Abstract: Can Transformer perform 2D object- and region-level recognition from a pure sequence-to-sequence perspective with minimal knowledge about the 2D spatial structure? To answer this question, we present You Only Look at One Sequence (YOLOS), a series of object detection models based on the vanilla Vision Transformer with the fewest possible modifications, region priors, as well as inductive biases of… ▽ More

    Submitted 26 October, 2021; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2021 Camera Ready

  37. arXiv:2104.12533  [pdf, other

    cs.CV

    Visformer: The Vision-friendly Transformer

    Authors: Zhengsu Chen, Lingxi Xie, Jianwei Niu, Xuefeng Liu, Longhui Wei, Qi Tian

    Abstract: The past year has witnessed the rapid development of applying the Transformer module to vision problems. While some researchers have demonstrated that Transformer-based models enjoy a favorable ability of fitting data, there are still growing number of evidences showing that these models suffer over-fitting especially when the training data is limited. This paper offers an empirical study by perfo… ▽ More

    Submitted 18 December, 2021; v1 submitted 26 April, 2021; originally announced April 2021.

  38. arXiv:2103.12542  [pdf, other

    cs.CR

    EmgAuth: Unlocking Smartphones with EMG Signals

    Authors: Boyu Fan, Xiang Su, Jianwei Niu, Pan Hui

    Abstract: Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although various screen unlocking technologies, including fingerprint and facial recognition, have been widely adopted, they still have some limitations. For example, fingerprints can be stolen by special material stickers and facial recognition systems can be cheated by 3D-printed head models. In this paper… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: 13 pages, 16 figures

  39. arXiv:2103.00777  [pdf, other

    cs.CR cs.DC

    Dissecting the Performance of Chained-BFT

    Authors: Fangyu Gai, Ali Farahbakhsh, Jianyu Niu, Chen Feng, Ivan Beschastnikh, Hao Duan

    Abstract: Permissioned blockchains employ Byzantine fault-tolerant (BFT) state machine replication (SMR) to reach agreement on an ever-growing, linearly ordered log of transactions. A new paradigm, combined with decades of research in BFT SMR and blockchain (namely chained-BFT, or cBFT), has emerged for directly constructing blockchain protocols. Chained-BFT protocols have a unifying propose-vote scheme ins… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Comments: 12 pages

  40. arXiv:2012.15766  [pdf, other

    cs.CV

    SelectScale: Mining More Patterns from Images via Selective and Soft Dropout

    Authors: Zhengsu Chen, Jianwei Niu, Xuefeng Liu, Shaojie Tang

    Abstract: Convolutional neural networks (CNNs) have achieved remarkable success in image recognition. Although the internal patterns of the input images are effectively learned by the CNNs, these patterns only constitute a small proportion of useful patterns contained in the input images. This can be attributed to the fact that the CNNs will stop learning if the learned patterns are enough to make a correct… ▽ More

    Submitted 30 November, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:1810.09849 by other authors

  41. arXiv:2012.14770  [pdf, other

    cs.IR

    Hybrid Interest Modeling for Long-tailed Users

    Authors: Lifang Deng, ** Niu, Angulia Yang, Qidi Xu, Xiang Fu, Jiandong Zhang, Anxiang Zeng

    Abstract: User behavior modeling is a key technique for recommender systems. However, most methods focus on head users with large-scale interactions and hence suffer from data sparsity issues. Several solutions integrate side information such as demographic features and product reviews, another is to transfer knowledge from other rich data sources. We argue that current methods are limited by the strict pri… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

  42. arXiv:2012.01636  [pdf, other

    cs.DC

    EBFT: Simplifying BFT Consensus Through Egalitarianism

    Authors: Jianyu Niu, Runchao Han, Shengqi Liu, Fangyu Gai, Ivan Beschastnikh, Yinqian Zhang, Chen Feng

    Abstract: We present Egalitarian BFT (EBFT), a simple and high-performance framework of BFT consensus protocols for decentralized systems like blockchains. The key innovation in EBFT is egalitarian block generation: nodes randomly and non-interactively propose blocks containing client transactions, rather than relying on a leader to do so. Apart from deterministic safety and liveness guarantees standard in… ▽ More

    Submitted 12 March, 2023; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: 17 page, 12 figures

  43. arXiv:2011.08516  [pdf, other

    cs.CV

    ACSC: Automatic Calibration for Non-repetitive Scanning Solid-State LiDAR and Camera Systems

    Authors: Jiahe Cui, Jianwei Niu, Zhenchao Ouyang, Yunxiang He, Dian Liu

    Abstract: Recently, the rapid development of Solid-State LiDAR (SSL) enables low-cost and efficient obtainment of 3D point clouds from the environment, which has inspired a large quantity of studies and applications. However, the non-uniformity of its scanning pattern, and the inconsistency of the ranging error distribution bring challenges to its calibration task. In this paper, we proposed a fully automat… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: conference

  44. arXiv:2011.07815  [pdf, other

    cs.CV cs.MM

    An End-to-end Method for Producing Scanning-robust Stylized QR Codes

    Authors: Hao Su, Jianwei Niu, Xuefeng Liu, Qingfeng Li, Ji Wan, Mingliang Xu, Tao Ren

    Abstract: Quick Response (QR) code is one of the most worldwide used two-dimensional codes.~Traditional QR codes appear as random collections of black-and-white modules that lack visual semantics and aesthetic elements, which inspires the recent works to beautify the appearances of QR codes. However, these works adopt fixed generation algorithms and therefore can only generate QR codes with a pre-defined st… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

    Comments: 11 pages, 16 figures

  45. Fast-HotStuff: A Fast and Resilient HotStuff Protocol

    Authors: Mohammad M. Jalalzai, Jianyu Niu, Chen Feng, Fangyu Gai

    Abstract: The HotStuff protocol is a breakthrough in Byzantine Fault Tolerant (BFT) consensus that enjoys both responsiveness and linear view change. It creatively adds an additional round to classic BFT protocols (like PBFT) using two rounds. This brings us to an interesting question: Is this additional round really necessary in practice? In this paper, we answer this question by designing a new two-round… ▽ More

    Submitted 3 November, 2022; v1 submitted 22 October, 2020; originally announced October 2020.

    Journal ref: IEEE Transactions on Dependable and Secure Computing ( Early Access ), Page(s): 1 - 17, Date of Publication: 25 August 2023

  46. arXiv:2007.00639  [pdf, other

    eess.IV cs.CV cs.LG

    End-to-End JPEG Decoding and Artifacts Suppression Using Heterogeneous Residual Convolutional Neural Network

    Authors: Jun Niu

    Abstract: Existing deep learning models separate JPEG artifacts suppression from the decoding protocol as independent task. In this work, we take one step forward to design a true end-to-end heterogeneous residual convolutional neural network (HR-CNN) with spectrum decomposition and heterogeneous reconstruction mechanism. Benefitting from the full CNN architecture and GPU acceleration, the proposed model co… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

  47. arXiv:2007.00186  [pdf, other

    cs.DC

    The Hermes BFT for Blockchains

    Authors: Mohammad M. Jalalzai, Chen Feng, Costas Busch, Golden G. Richard III, Jianyu Niu

    Abstract: The performance of partially synchronous BFT-based consensus protocols is highly dependent on the primary node. All participant nodes in the network are blocked until they receive a proposal from the primary node to begin the consensus process.Therefore, an honest but slack node (with limited bandwidth) can adversely affect the performance when selected as primary. Hermes decreases protocol depend… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  48. A Survey on Incorporating Domain Knowledge into Deep Learning for Medical Image Analysis

    Authors: Xiaozheng Xie, Jianwei Niu, Xuefeng Liu, Zhengsu Chen, Shaojie Tang, Shui Yu

    Abstract: Although deep learning models like CNNs have achieved great success in medical image analysis, the small size of medical datasets remains a major bottleneck in this area. To address this problem, researchers have started looking for external information beyond current available medical datasets. Traditional approaches generally leverage the information from natural images via transfer learning. Mo… ▽ More

    Submitted 8 February, 2021; v1 submitted 25 April, 2020; originally announced April 2020.

    Comments: 27 pages, 18 figures

    Journal ref: Medical Image Analysis 2021

  49. arXiv:2004.10634  [pdf, other

    cs.CV

    MangaGAN: Unpaired Photo-to-Manga Translation Based on The Methodology of Manga Drawing

    Authors: Hao Su, Jianwei Niu, Xuefeng Liu, Qingfeng Li, Jiahe Cui, Ji Wan

    Abstract: Manga is a world popular comic form originated in Japan, which typically employs black-and-white stroke lines and geometric exaggeration to describe humans' appearances, poses, and actions. In this paper, we propose MangaGAN, the first method based on Generative Adversarial Network (GAN) for unpaired photo-to-manga translation. Inspired by how experienced manga artists draw manga, MangaGAN generat… ▽ More

    Submitted 17 December, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: 17 pages

  50. arXiv:2004.02767  [pdf, other

    cs.CV

    Network Adjustment: Channel Search Guided by FLOPs Utilization Ratio

    Authors: Zhengsu Chen, Jianwei Niu, Lingxi Xie, Xuefeng Liu, Longhui Wei, Qi Tian

    Abstract: Automatic designing computationally efficient neural networks has received much attention in recent years. Existing approaches either utilize network pruning or leverage the network architecture search methods. This paper presents a new framework named network adjustment, which considers network accuracy as a function of FLOPs, so that under each network configuration, one can estimate the FLOPs u… ▽ More

    Submitted 6 April, 2020; originally announced April 2020.