Skip to main content

Showing 1–50 of 85 results for author: Pang, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19770  [pdf, other

    cs.LG cs.AI

    Self-Supervised Spatial-Temporal Normality Learning for Time Series Anomaly Detection

    Authors: Yutong Chen, Hongzuo Xu, Guansong Pang, Hezhe Qiao, Yuan Zhou, Mingsheng Shang

    Abstract: Time Series Anomaly Detection (TSAD) finds widespread applications across various domains such as financial markets, industrial production, and healthcare. Its primary objective is to learn the normal patterns of time series data, thereby identifying deviations in test samples. Most existing TSAD methods focus on modeling data from the temporal dimension, while ignoring the semantic information in… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 18 pages, 4 figures, accepted in ECML PKDD2024

  2. arXiv:2406.01170  [pdf, other

    cs.CV

    Zero-Shot Out-of-Distribution Detection with Outlier Label Exposure

    Authors: Choubo Ding, Guansong Pang

    Abstract: As vision-language models like CLIP are widely applied to zero-shot tasks and gain remarkable performance on in-distribution (ID) data, detecting and rejecting out-of-distribution (OOD) inputs in the zero-shot setting have become crucial for ensuring the safety of using such models on the fly. Most existing zero-shot OOD detectors rely on ID class label-based prompts to guide CLIP in classifying I… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: Accepted by IJCNN2024, 8 pages

  3. arXiv:2406.01062  [pdf, other

    cs.CV

    SceneTextGen: Layout-Agnostic Scene Text Image Synthesis with Diffusion Models

    Authors: Qilong Zhangli, **dong Jiang, Di Liu, Licheng Yu, Xiaoliang Dai, Ankit Ramchandani, Guan Pang, Dimitris N. Metaxas, Praveen Krishnan

    Abstract: While diffusion models have significantly advanced the quality of image generation, their capability to accurately and coherently render text within these images remains a substantial challenge. Conventional diffusion-based methods for scene text generation are typically limited by their reliance on an intermediate layout output. This dependency often results in a constrained diversity of text sty… ▽ More

    Submitted 10 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  4. arXiv:2405.10633  [pdf, other

    cs.LG

    Harnessing Collective Structure Knowledge in Data Augmentation for Graph Neural Networks

    Authors: Rongrong Ma, Guansong Pang, Ling Chen

    Abstract: Graph neural networks (GNNs) have achieved state-of-the-art performance in graph representation learning. Message passing neural networks, which learn representations through recursively aggregating information from each node and its neighbors, are among the most commonly-used GNNs. However, a wealth of structural information of individual nodes and full graphs is often ignored in such process, wh… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  5. arXiv:2405.04903  [pdf, other

    cs.LG

    Imbalanced Graph Classification with Multi-scale Oversampling Graph Neural Networks

    Authors: Rongrong Ma, Guansong Pang, Ling Chen

    Abstract: One main challenge in imbalanced graph classification is to learn expressive representations of the graphs in under-represented (minority) classes. Existing generic imbalanced learning methods, such as oversampling and imbalanced learning loss functions, can be adopted for enabling graph representation learning models to cope with this challenge. However, these methods often directly operate on th… ▽ More

    Submitted 17 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

  6. arXiv:2404.10984  [pdf, other

    cs.LG

    Graph Continual Learning with Debiased Lossless Memory Replay

    Authors: Chaoxi Niu, Guansong Pang, Ling Chen

    Abstract: Real-life graph data often expands continually, rendering the learning of graph neural networks (GNNs) on static graph data impractical. Graph continual learning (GCL) tackles this problem by continually adapting GNNs to the expanded graph of the current task while maintaining the performance over the graph of previous tasks. Memory replay-based methods, which aim to replay data of previous tasks… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: 12 pages

  7. arXiv:2404.10760  [pdf, other

    cs.CV

    Learning Feature Inversion for Multi-class Anomaly Detection under General-purpose COCO-AD Benchmark

    Authors: Jiangning Zhang, Chengjie Wang, Xiangtai Li, Guanzhong Tian, Zhucun Xue, Yong Liu, Guansong Pang, Dacheng Tao

    Abstract: Anomaly detection (AD) is often focused on detecting anomaly areas for industrial quality inspection and medical lesion examination. However, due to the specific scenario targets, the data scale for AD is relatively small, and evaluation metrics are still deficient compared to classic vision tasks, such as object detection and semantic segmentation. To fill these gaps, this work first constructs a… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  8. arXiv:2404.03248  [pdf, other

    cs.CV

    Learning Transferable Negative Prompts for Out-of-Distribution Detection

    Authors: Tianqi Li, Guansong Pang, Xiao Bai, Wenjun Miao, ** Zheng

    Abstract: Existing prompt learning methods have shown certain capabilities in Out-of-Distribution (OOD) detection, but the lack of OOD images in the target dataset in their training can lead to mismatches between OOD images and In-Distribution (ID) categories, resulting in a high false positive rate. To address this issue, we introduce a novel OOD detection method, named 'NegPrompt', to learn a set of negat… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Accepted at CVPR 2024

  9. arXiv:2403.10245  [pdf, other

    cs.CV

    CoLeCLIP: Open-Domain Continual Learning via Joint Task Prompt and Vocabulary Learning

    Authors: Yukun Li, Guansong Pang, Wei Suo, Chenchen **g, Yuling Xi, Lingqiao Liu, Hao Chen, Guoqiang Liang, Peng Wang

    Abstract: This paper explores the problem of continual learning (CL) of vision-language models (VLMs) in open domains, where the models need to perform continual updating and inference on a streaming of datasets from diverse seen and unseen domains with novel classes. Such a capability is crucial for various applications in open environments, e.g., AI assistants, autonomous driving systems, and robotics. Cu… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  10. arXiv:2403.06495  [pdf, other

    cs.CV

    Toward Generalist Anomaly Detection via In-context Residual Learning with Few-shot Sample Prompts

    Authors: Jiawen Zhu, Guansong Pang

    Abstract: This paper explores the problem of Generalist Anomaly Detection (GAD), aiming to train one single detection model that can generalize to detect anomalies in diverse datasets from different application domains without any further training on the target data. Some recent studies have shown that large pre-trained Visual-Language Models (VLMs) like CLIP have strong generalization capabilities on detec… ▽ More

    Submitted 16 March, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024; 17 pages; 5 figures

  11. arXiv:2402.11887  [pdf, other

    cs.LG

    Generative Semi-supervised Graph Anomaly Detection

    Authors: Hezhe Qiao, Qingsong Wen, Xiaoli Li, Ee-Peng Lim, Guansong Pang

    Abstract: This work considers a practical semi-supervised graph anomaly detection (GAD) scenario, where part of the nodes in a graph are known to be normal, contrasting to the extensively explored unsupervised setting with a fully unlabeled graph. We reveal that having access to the normal nodes, even just a small percentage of normal nodes, helps enhance the detection performance of existing unsupervised G… ▽ More

    Submitted 28 May, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: 20 pages, 11 figures

  12. arXiv:2402.06088  [pdf, other

    cs.CV

    Animated Stickers: Bringing Stickers to Life with Video Diffusion

    Authors: David Yan, Winnie Zhang, Luxin Zhang, Anmol Kalia, Dingkang Wang, Ankit Ramchandani, Miao Liu, Albert Pumarola, Edgar Schoenfeld, Elliot Blanchard, Krishna Narni, Yaqiao Luo, Lawrence Chen, Guan Pang, Ali Thabet, Peter Vajda, Amy Bearman, Licheng Yu

    Abstract: We introduce animated stickers, a video diffusion model which generates an animation conditioned on a text prompt and static sticker image. Our model is built on top of the state-of-the-art Emu text-to-image model, with the addition of temporal layers to model motion. Due to the domain gap, i.e. differences in visual and motion style, a model which performed well on generating natural videos can n… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  13. arXiv:2401.16402  [pdf, other

    cs.CV cs.AI

    A Survey on Visual Anomaly Detection: Challenge, Approach, and Prospect

    Authors: Yunkang Cao, Xiaohao Xu, Jiangning Zhang, Yuqi Cheng, Xiaonan Huang, Guansong Pang, Weiming Shen

    Abstract: Visual Anomaly Detection (VAD) endeavors to pinpoint deviations from the concept of normality in visual data, widely applied across diverse domains, e.g., industrial defect inspection, and medical lesion detection. This survey comprehensively examines recent advancements in VAD by identifying three primary challenges: 1) scarcity of training data, 2) diversity of visual modalities, and 3) complexi… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: Work in progress. Yunkang Cao, Xiaohao Xu, and Jiangning Zhang contribute equally to this work

  14. arXiv:2312.10686  [pdf, other

    cs.CV

    Out-of-Distribution Detection in Long-Tailed Recognition with Calibrated Outlier Class Learning

    Authors: Wenjun Miao, Guansong Pang, Tianqi Li, Xiao Bai, ** Zheng

    Abstract: Existing out-of-distribution (OOD) methods have shown great success on balanced datasets but become ineffective in long-tailed recognition (LTR) scenarios where 1) OOD samples are often wrongly classified into head classes and/or 2) tail-class samples are treated as OOD samples. To address these issues, current studies fit a prior distribution of auxiliary/pseudo OOD data to the long-tailed in-dis… ▽ More

    Submitted 19 December, 2023; v1 submitted 17 December, 2023; originally announced December 2023.

    Comments: AAAI2024, with supplementary material

  15. arXiv:2312.10439  [pdf, other

    cs.CV

    Simple Image-level Classification Improves Open-vocabulary Object Detection

    Authors: Ruohuan Fang, Guansong Pang, Xiao Bai

    Abstract: Open-Vocabulary Object Detection (OVOD) aims to detect novel objects beyond a given set of base categories on which the detection model is trained. Recent OVOD methods focus on adapting the image-level pre-trained vision-language models (VLMs), such as CLIP, to a region-level object detection task via, eg., region-level knowledge distillation, regional prompt learning, or region-text pre-training,… ▽ More

    Submitted 19 December, 2023; v1 submitted 16 December, 2023; originally announced December 2023.

    Comments: Accepted at AAAI 2024

  16. arXiv:2312.03849  [pdf, other

    cs.CV

    LEGO: Learning EGOcentric Action Frame Generation via Visual Instruction Tuning

    Authors: Bolin Lai, Xiaoliang Dai, Lawrence Chen, Guan Pang, James M. Rehg, Miao Liu

    Abstract: Generating instructional images of human daily actions from an egocentric viewpoint serves as a key step towards efficient skill transfer. In this paper, we introduce a novel problem -- egocentric action frame generation. The goal is to synthesize an image depicting an action in the user's context (i.e., action frame) by conditioning on a user prompt and an input egocentric image. Notably, existin… ▽ More

    Submitted 22 March, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: 34 pages

  17. arXiv:2311.11235  [pdf, other

    cs.LG cs.AI

    Unraveling the "Anomaly" in Time Series Anomaly Detection: A Self-supervised Tri-domain Solution

    Authors: Yuting Sun, Guansong Pang, Guanhua Ye, Tong Chen, Xia Hu, Hongzhi Yin

    Abstract: The ongoing challenges in time series anomaly detection (TSAD), notably the scarcity of anomaly labels and the variability in anomaly lengths and shapes, have led to the need for a more efficient solution. As limited anomaly labels hinder traditional supervised models in TSAD, various SOTA deep learning techniques, such as self-supervised learning, have been introduced to tackle this issue. Howeve… ▽ More

    Submitted 26 November, 2023; v1 submitted 19 November, 2023; originally announced November 2023.

    Comments: This work is submitted to IEEE International Conference on Data Engineering (ICDE) 2024

  18. arXiv:2311.07042  [pdf, other

    cs.CV

    Open-Vocabulary Video Anomaly Detection

    Authors: Peng Wu, Xuerong Zhou, Guansong Pang, Yujia Sun, **g Liu, Peng Wang, Yanning Zhang

    Abstract: Video anomaly detection (VAD) with weak supervision has achieved remarkable performance in utilizing video-level labels to discriminate whether a video frame is normal or abnormal. However, current approaches are inherently limited to a closed-set setting and may struggle in open-world applications where there can be anomaly categories in the test data unseen during training. A few recent studies… ▽ More

    Submitted 13 March, 2024; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Accepted to CVPR2024

  19. arXiv:2311.06835  [pdf, other

    cs.LG cs.AI cs.SI

    Open-Set Graph Anomaly Detection via Normal Structure Regularisation

    Authors: Qizhou Wang, Guansong Pang, Mahsa Salehi, Xiaokun Xia, Christopher Leckie

    Abstract: This paper considers an important Graph Anomaly Detection (GAD) task, namely open-set GAD, which aims to train a detection model using a small number of normal and anomaly nodes (referred to as seen anomalies) to detect both seen anomalies and unseen anomalies (i.e., anomalies that cannot be illustrated the training anomalies). The availability of those labelled training data provides crucial prio… ▽ More

    Submitted 2 June, 2024; v1 submitted 12 November, 2023; originally announced November 2023.

  20. arXiv:2310.18961  [pdf, other

    cs.CV

    AnomalyCLIP: Object-agnostic Prompt Learning for Zero-shot Anomaly Detection

    Authors: Qihang Zhou, Guansong Pang, Yu Tian, Shibo He, Jiming Chen

    Abstract: Zero-shot anomaly detection (ZSAD) requires detection models trained using auxiliary data to detect anomalies without any training sample in a target dataset. It is a crucial task when training data is not accessible due to various concerns, eg, data privacy, yet it is challenging since the models need to generalize to anomalies across different domains where the appearance of foreground objects,… ▽ More

    Submitted 16 March, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: ICLR 2024

  21. arXiv:2310.12790  [pdf, other

    cs.CV

    Anomaly Heterogeneity Learning for Open-set Supervised Anomaly Detection

    Authors: Jiawen Zhu, Choubo Ding, Yu Tian, Guansong Pang

    Abstract: Open-set supervised anomaly detection (OSAD) - a recently emerging anomaly detection area - aims at utilizing a few samples of anomaly classes seen during training to detect unseen anomalies (i.e., samples from open-set anomaly classes), while effectively identifying the seen anomalies. Benefiting from the prior knowledge illustrated by the seen anomalies, current OSAD methods can often largely re… ▽ More

    Submitted 17 March, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: Accepted by CVPR2024; 15 pages; 4 figures

  22. arXiv:2310.05668  [pdf, other

    cs.LG

    LARA: A Light and Anti-overfitting Retraining Approach for Unsupervised Time Series Anomaly Detection

    Authors: Feiyi Chen, Zhen Qin, Yingying Zhang, Shuiguang Deng, Yi Xiao, Guansong Pang, Qingsong Wen

    Abstract: Most of current anomaly detection models assume that the normal pattern remains same all the time. However, the normal patterns of Web services change dramatically and frequently. The model trained on old-distribution data is outdated after such changes. Retraining the whole model every time is expensive. Besides, at the beginning of normal pattern changes, there is not enough observation data fro… ▽ More

    Submitted 23 February, 2024; v1 submitted 9 October, 2023; originally announced October 2023.

    Comments: Accepted by ACM Web Conference 2024 (WWW 24)

  23. arXiv:2308.16527  [pdf, other

    cs.CV

    Unsupervised Recognition of Unknown Objects for Open-World Object Detection

    Authors: Ruohuan Fang, Guansong Pang, Lei Zhou, Xiao Bai, ** Zheng

    Abstract: Open-World Object Detection (OWOD) extends object detection problem to a realistic and dynamic scenario, where a detection model is required to be capable of detecting both known and unknown objects and incrementally learning newly introduced knowledge. Current OWOD models, such as ORE and OW-DETR, focus on pseudo-labeling regions with high objectness scores as unknowns, whose performance relies h… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

  24. arXiv:2308.14340  [pdf, other

    cs.LG

    HRGCN: Heterogeneous Graph-level Anomaly Detection with Hierarchical Relation-augmented Graph Neural Networks

    Authors: Jiaxi Li, Guansong Pang, Ling Chen, Mohammad-Reza Namazi-Rad

    Abstract: This work considers the problem of heterogeneous graph-level anomaly detection. Heterogeneous graphs are commonly used to represent behaviours between different types of entities in complex industrial systems for capturing as much information about the system operations as possible. Detecting anomalous heterogeneous graphs from a large set of system behaviour graphs is crucial for many real-world… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 12 pages, 10 figures, 6 tables. Accepted

  25. arXiv:2308.13173  [pdf, other

    cs.CV cs.CL

    DISGO: Automatic End-to-End Evaluation for Scene Text OCR

    Authors: Mei-Yuh Hwang, Yangyang Shi, Ankit Ramchandani, Guan Pang, Praveen Krishnan, Lucas Kabela, Frank Seide, Samyak Datta, Jun Liu

    Abstract: This paper discusses the challenges of optical character recognition (OCR) on natural scenes, which is harder than OCR on documents due to the wild content and various image backgrounds. We propose to uniformly use word error rates (WER) as a new measurement for evaluating scene-text OCR, both end-to-end (e2e) performance and individual system component performances. Particularly for the e2e metri… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 9 pages

  26. arXiv:2308.11681  [pdf, other

    cs.CV cs.MM

    VadCLIP: Adapting Vision-Language Models for Weakly Supervised Video Anomaly Detection

    Authors: Peng Wu, Xuerong Zhou, Guansong Pang, Lingru Zhou, Qingsen Yan, Peng Wang, Yanning Zhang

    Abstract: The recent contrastive language-image pre-training (CLIP) model has shown great success in a wide range of image-level tasks, revealing remarkable ability for learning powerful visual representations with rich semantics. An open and worthwhile problem is efficiently adapting such a strong model to the video domain and designing a robust video anomaly detector. In this work, we propose VadCLIP, a n… ▽ More

    Submitted 15 December, 2023; v1 submitted 22 August, 2023; originally announced August 2023.

    Comments: Accept to AAAI2024

  27. arXiv:2307.13239  [pdf, other

    cs.LG cs.AI

    RoSAS: Deep Semi-Supervised Anomaly Detection with Contamination-Resilient Continuous Supervision

    Authors: Hongzuo Xu, Yijie Wang, Guansong Pang, Songlei Jian, Ning Liu, Yongjun Wang

    Abstract: Semi-supervised anomaly detection methods leverage a few anomaly examples to yield drastically improved performance compared to unsupervised models. However, they still suffer from two limitations: 1) unlabeled anomalies (i.e., anomaly contamination) may mislead the learning process when all the unlabeled data are employed as inliers for model training; 2) only discrete supervision information (su… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Accepted by Information Processing and Management (IP&M)

  28. arXiv:2307.03416  [pdf, other

    cs.CV

    Learning Adversarial Semantic Embeddings for Zero-Shot Recognition in Open Worlds

    Authors: Tianqi Li, Guansong Pang, Xiao Bai, ** Zheng, Lei Zhou, Xin Ning

    Abstract: Zero-Shot Learning (ZSL) focuses on classifying samples of unseen classes with only their side semantic information presented during training. It cannot handle real-life, open-world scenarios where there are test samples of unknown classes for which neither samples (e.g., images) nor their side semantic information is known during training. Open-Set Recognition (OSR) is dedicated to addressing the… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

    ACM Class: I.4; I.5

  29. arXiv:2307.00755  [pdf, other

    cs.LG cs.CV

    Graph-level Anomaly Detection via Hierarchical Memory Networks

    Authors: Chaoxi Niu, Guansong Pang, Ling Chen

    Abstract: Graph-level anomaly detection aims to identify abnormal graphs that exhibit deviant structures and node attributes compared to the majority in a graph set. One primary challenge is to learn normal patterns manifested in both fine-grained and holistic views of graphs for identifying graphs that are abnormal in part or in whole. To tackle this challenge, we propose a novel approach called Hierarchic… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: Accepted to ECML-PKDD 2023

  30. arXiv:2306.10125  [pdf, other

    cs.LG cs.AI eess.SP stat.AP

    Self-Supervised Learning for Time Series Analysis: Taxonomy, Progress, and Prospects

    Authors: Kexin Zhang, Qingsong Wen, Chaoli Zhang, Rongyao Cai, Ming **, Yong Liu, James Zhang, Yuxuan Liang, Guansong Pang, Dong** Song, Shirui Pan

    Abstract: Self-supervised learning (SSL) has recently achieved impressive performance on various time series tasks. The most prominent advantage of SSL is that it reduces the dependence on labeled data. Based on the pre-training and fine-tuning strategy, even a small amount of labeled data can achieve high performance. Compared with many published self-supervised surveys on computer vision and natural langu… ▽ More

    Submitted 8 April, 2024; v1 submitted 16 June, 2023; originally announced June 2023.

    Comments: Accepted by IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI); 26 pages, 200+ references; the first work to comprehensively and systematically summarize self-supervised learning for time series analysis (SSL4TS). The GitHub repository is https://github.com/qingsongedu/Awesome-SSL4TS

  31. arXiv:2306.00006  [pdf, other

    cs.SI cs.AI cs.LG

    Truncated Affinity Maximization: One-class Homophily Modeling for Graph Anomaly Detection

    Authors: Hezhe Qiao, Guansong Pang

    Abstract: We reveal a one-class homophily phenomenon, which is one prevalent property we find empirically in real-world graph anomaly detection (GAD) datasets, i.e., normal nodes tend to have strong connection/affinity with each other, while the homophily in abnormal nodes is significantly weaker than normal nodes. However, this anomaly-discriminative property is ignored by existing GAD methods that are typ… ▽ More

    Submitted 4 April, 2024; v1 submitted 29 May, 2023; originally announced June 2023.

    Comments: Accepted at NeurIPS 2023

  32. arXiv:2304.11855  [pdf, other

    cs.CV

    Glocal Energy-based Learning for Few-Shot Open-Set Recognition

    Authors: Haoyu Wang, Guansong Pang, Peng Wang, Lei Zhang, Wei Wei, Yanning Zhang

    Abstract: Few-shot open-set recognition (FSOR) is a challenging task of great practical value. It aims to categorize a sample to one of the pre-defined, closed-set classes illustrated by few examples while being able to reject the sample from unknown classes. In this work, we approach the FSOR task by proposing a novel energy-based hybrid model. The model is composed of two branches, where a classification… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: Accepted at CVPR 2023

  33. arXiv:2304.07410  [pdf, other

    cs.CV cs.AI

    Text-Conditional Contextualized Avatars For Zero-Shot Personalization

    Authors: Samaneh Azadi, Thomas Hayes, Akbar Shah, Guan Pang, Devi Parikh, Sonal Gupta

    Abstract: Recent large-scale text-to-image generation models have made significant improvements in the quality, realism, and diversity of the synthesized images and enable users to control the created content through language. However, the personalization aspect of these generative models is still challenging and under-explored. In this work, we propose a pipeline that enables personalization of image gener… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

  34. arXiv:2303.13845  [pdf, other

    cs.CV

    Anomaly Detection under Distribution Shift

    Authors: Tri Cao, Jiawen Zhu, Guansong Pang

    Abstract: Anomaly detection (AD) is a crucial machine learning task that aims to learn patterns from a set of normal training samples to identify abnormal samples in test data. Most existing AD studies assume that the training and test data are drawn from the same data distribution, but the test data can have large distribution shifts arising in many real-world applications due to different natural variatio… ▽ More

    Submitted 1 September, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: Accepted at ICCV 2023

  35. arXiv:2303.08727  [pdf, other

    cs.CV

    Background Matters: Enhancing Out-of-distribution Detection with Domain Features

    Authors: Choubo Ding, Guansong Pang, Chunhua Shen

    Abstract: Detecting out-of-distribution (OOD) inputs is a principal task for ensuring the safety of deploying deep-neural-network classifiers in open-world scenarios. OOD samples can be drawn from arbitrary distributions and exhibit deviations from in-distribution (ID) data in various dimensions, such as foreground semantic features (e.g., vehicle images vs. ID samples in fruit classification) and backgroun… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 14 pages

  36. arXiv:2301.13340  [pdf, other

    cs.LG cs.SI

    Affinity Uncertainty-based Hard Negative Mining in Graph Contrastive Learning

    Authors: Chaoxi Niu, Guansong Pang, Ling Chen

    Abstract: Hard negative mining has shown effective in enhancing self-supervised contrastive learning (CL) on diverse data types, including graph CL (GCL). The existing hardness-aware CL methods typically treat negative instances that are most similar to the anchor instance as hard negatives, which helps improve the CL performance, especially on image data. However, this approach often fails to identify the… ▽ More

    Submitted 6 January, 2024; v1 submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to TNNLS

  37. arXiv:2301.06794  [pdf, other

    cs.LG cs.SI

    Subgraph Centralization: A Necessary Step for Graph Anomaly Detection

    Authors: Zhong Zhuang, Kai Ming Ting, Guansong Pang, Shuaibin Song

    Abstract: Graph anomaly detection has attracted a lot of interest recently. Despite their successes, existing detectors have at least two of the three weaknesses: (a) high computational cost which limits them to small-scale networks only; (b) existing treatment of subgraphs produces suboptimal detection accuracy; and (c) unable to provide an explanation as to why a node is anomalous, once it is identified.… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

    Comments: To be published in SDM2023

  38. arXiv:2212.01096  [pdf, other

    cs.LG cs.SI

    Cross-Domain Graph Anomaly Detection via Anomaly-aware Contrastive Alignment

    Authors: Qizhou Wang, Guansong Pang, Mahsa Salehi, Wray Buntine, Christopher Leckie

    Abstract: Cross-domain graph anomaly detection (CD-GAD) describes the problem of detecting anomalous nodes in an unlabelled target graph using auxiliary, related source graphs with labelled anomalous and normal nodes. Although it presents a promising approach to address the notoriously high false positive issue in anomaly detection, little work has been done in this line of research. There are numerous doma… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: AAAI2023, to appear

  39. arXiv:2211.14512  [pdf, other

    cs.CV

    Residual Pattern Learning for Pixel-wise Out-of-Distribution Detection in Semantic Segmentation

    Authors: Yuyuan Liu, Choubo Ding, Yu Tian, Guansong Pang, Vasileios Belagiannis, Ian Reid, Gustavo Carneiro

    Abstract: Semantic segmentation models classify pixels into a set of known (``in-distribution'') visual classes. When deployed in an open world, the reliability of these models depends on their ability not only to classify in-distribution pixels but also to detect out-of-distribution (OoD) pixels. Historically, the poor OoD detection performance of these models has motivated the design of methods based on m… ▽ More

    Submitted 21 August, 2023; v1 submitted 26 November, 2022; originally announced November 2022.

    Comments: The paper contains 16 pages and it is accepted by ICCV'23

  40. arXiv:2207.12201  [pdf, other

    cs.LG cs.AI

    Calibrated One-class Classification for Unsupervised Time Series Anomaly Detection

    Authors: Hongzuo Xu, Yijie Wang, Songlei Jian, Qing Liao, Yongjun Wang, Guansong Pang

    Abstract: Time series anomaly detection is instrumental in maintaining system availability in various domains. Current work in this research line mainly focuses on learning data normality deeply and comprehensively by devising advanced neural network structures and new reconstruction/prediction learning objectives. However, their one-class learning process can be misled by latent anomalies in training data… ▽ More

    Submitted 24 April, 2024; v1 submitted 25 July, 2022; originally announced July 2022.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering (TKDE)

  41. Deep Isolation Forest for Anomaly Detection

    Authors: Hongzuo Xu, Guansong Pang, Yijie Wang, Yongjun Wang

    Abstract: Isolation forest (iForest) has been emerging as arguably the most popular anomaly detector in recent years due to its general effectiveness across different benchmarks and strong scalability. Nevertheless, its linear axis-parallel isolation method often leads to (i) failure in detecting hard anomalies that are difficult to isolate in high-dimensional/non-linear-separable data space, and (ii) notor… ▽ More

    Submitted 8 June, 2023; v1 submitted 14 June, 2022; originally announced June 2022.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering (TKDE)

  42. arXiv:2205.12267  [pdf, other

    eess.SY cs.IT eess.SP

    DRL-based Resource Allocation in Remote State Estimation

    Authors: Gaoyang Pang, Wanchun Liu, Yonghui Li, Branka Vucetic

    Abstract: Remote state estimation, where sensors send their measurements of distributed dynamic plants to a remote estimator over shared wireless resources, is essential for mission-critical applications of Industry 4.0. Existing algorithms on dynamic radio resource allocation for remote estimation systems assumed oversimplified wireless communications models and can only work for small-scale settings. In t… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: Paper submitted to IEEE for possible publication. arXiv admin note: text overlap with arXiv:2205.11861

  43. arXiv:2205.11861  [pdf, other

    cs.IT eess.SP eess.SY

    Deep Reinforcement Learning for Radio Resource Allocation in NOMA-based Remote State Estimation

    Authors: Gaoyang Pang, Wanchun Liu, Yonghui Li, Branka Vucetic

    Abstract: Remote state estimation, where many sensors send their measurements of distributed dynamic plants to a remote estimator over shared wireless resources, is essential for mission-critical applications of Industry 4.0. Most of the existing works on remote state estimation assumed orthogonal multiple access and the proposed dynamic radio resource allocation algorithms can only work for very small-scal… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: Paper submitted to IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  44. arXiv:2204.08058  [pdf, other

    cs.CV cs.AI

    MUGEN: A Playground for Video-Audio-Text Multimodal Understanding and GENeration

    Authors: Thomas Hayes, Songyang Zhang, Xi Yin, Guan Pang, Sasha Sheng, Harry Yang, Songwei Ge, Qiyuan Hu, Devi Parikh

    Abstract: Multimodal video-audio-text understanding and generation can benefit from datasets that are narrow but rich. The narrowness allows bite-sized challenges that the research community can make progress on. The richness ensures we are making progress along the core challenges. To this end, we present a large-scale video-audio-text dataset MUGEN, collected using the open-sourced platform game CoinRun [… ▽ More

    Submitted 28 April, 2022; v1 submitted 17 April, 2022; originally announced April 2022.

  45. arXiv:2204.03638  [pdf, other

    cs.CV cs.AI

    Long Video Generation with Time-Agnostic VQGAN and Time-Sensitive Transformer

    Authors: Songwei Ge, Thomas Hayes, Harry Yang, Xi Yin, Guan Pang, David Jacobs, Jia-Bin Huang, Devi Parikh

    Abstract: Videos are created to express emotion, exchange information, and share experiences. Video synthesis has intrigued researchers for a long time. Despite the rapid progress driven by advances in visual synthesis, most existing studies focus on improving the frames' quality and the transitions between them, while little progress has been made in generating longer videos. In this paper, we present a me… ▽ More

    Submitted 24 September, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: In ECCV 2022

  46. arXiv:2203.14506  [pdf, other

    cs.CV

    Catching Both Gray and Black Swans: Open-set Supervised Anomaly Detection

    Authors: Choubo Ding, Guansong Pang, Chunhua Shen

    Abstract: Despite most existing anomaly detection studies assume the availability of normal training samples only, a few labeled anomaly examples are often available in many real-world applications, such as defect samples identified during random quality inspection, lesion images confirmed by radiologists in daily medical screening, etc. These anomaly examples provide valuable knowledge about the applicatio… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: Accepted by CVPR2022, 16 pages

  47. arXiv:2203.12121  [pdf, other

    cs.CV

    Contrastive Transformer-based Multiple Instance Learning for Weakly Supervised Polyp Frame Detection

    Authors: Yu Tian, Guansong Pang, Fengbei Liu, Yuyuan Liu, Chong Wang, Yuanhong Chen, Johan W Verjans, Gustavo Carneiro

    Abstract: Current polyp detection methods from colonoscopy videos use exclusively normal (i.e., healthy) training images, which i) ignore the importance of temporal information in consecutive video frames, and ii) lack knowledge about the polyps. Consequently, they often have high detection errors, especially on challenging polyp cases (e.g., small, flat, or partially visible polyps). In this work, we formu… ▽ More

    Submitted 18 May, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: MICCAI 2022 Early Accept

  48. arXiv:2203.11725  [pdf, other

    eess.IV cs.CV

    Unsupervised Anomaly Detection in Medical Images with a Memory-augmented Multi-level Cross-attentional Masked Autoencoder

    Authors: Yu Tian, Guansong Pang, Yuyuan Liu, Chong Wang, Yuanhong Chen, Fengbei Liu, Rajvinder Singh, Johan W Verjans, Mengyu Wang, Gustavo Carneiro

    Abstract: Unsupervised anomaly detection (UAD) aims to find anomalous images by optimising a detector using a training set that contains only normal images. UAD approaches can be based on reconstruction methods, self-supervised approaches, and Imagenet pre-trained models. Reconstruction methods, which detect anomalies from image reconstruction errors, are advantageous because they do not rely on the design… ▽ More

    Submitted 21 August, 2023; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: Accepted to MICCAI MLMI2023

  49. arXiv:2202.09517  [pdf, other

    cs.CL cs.AI cs.IR cs.LG

    Deep Learning for Hate Speech Detection: A Comparative Study

    Authors: Jitendra Singh Malik, Hezhe Qiao, Guansong Pang, Anton van den Hengel

    Abstract: Automated hate speech detection is an important tool in combating the spread of hate speech, particularly in social media. Numerous methods have been developed for the task, including a recent proliferation of deep-learning based approaches. A variety of datasets have also been developed, exemplifying various manifestations of the hate-speech detection problem. We present here a large-scale empiri… ▽ More

    Submitted 6 December, 2023; v1 submitted 18 February, 2022; originally announced February 2022.

    Comments: 18 pages, 4 figures, and 6 tables

  50. arXiv:2112.10063  [pdf, other

    cs.CV cs.AI cs.LG

    Deep Graph-level Anomaly Detection by Glocal Knowledge Distillation

    Authors: Rongrong Ma, Guansong Pang, Ling Chen, Anton van den Hengel

    Abstract: Graph-level anomaly detection (GAD) describes the problem of detecting graphs that are abnormal in their structure and/or the features of their nodes, as compared to other graphs. One of the challenges in GAD is to devise graph representations that enable the detection of both locally- and globally-anomalous graphs, i.e., graphs that are abnormal in their fine-grained (node-level) or holistic (gra… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Comments: Accepted to WSDM 2022