Skip to main content

Showing 1–10 of 10 results for author: Pi, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14758  [pdf, ps, other

    cs.AI

    Compliance Cards: Computational Artifacts for Automated AI Regulation Compliance

    Authors: Bill Marino, Preslav Aleksandrov, Carwyn Rahman, Yulu Pi, Bill Shen, Rui-jie Yew, Nicholas D. Lane

    Abstract: As the artificial intelligence (AI) supply chain grows more complex, AI systems and models are increasingly likely to incorporate externally-sourced ingredients such as datasets and other models. In such cases, determining whether or not an AI system or model complies with the EU AI Act will require gathering compliance-related metadata about both the AI system or model at-large as well as those e… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2405.04926  [pdf, other

    cs.NI

    Power-Domain Interference Graph Estimation for Full-Duplex Millimeter-Wave Backhauling

    Authors: Haorui Li, Daqian Ding, Yibo Pi, Xudong Wang

    Abstract: Traditional wisdom for network resource management allocates separate frequency-time resources for measurement and data transmission tasks. As a result, the two types of tasks have to compete for resources, and a heavy measurement task inevitably reduces available resources for data transmission. This prevents interference graph estimation (IGE), a heavy yet important measurement task, from being… ▽ More

    Submitted 9 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

    Comments: Accepted by IEEE Transactions on Wireless Communications,15 pages with 13 figures

  3. arXiv:2401.11231  [pdf, other

    cs.IT

    Two-Insertion/Deletion/Substitution Correcting Codes

    Authors: Yuhang Pi, Zhifang Zhang

    Abstract: In recent years, the emergence of DNA storage systems has led to a widespread focus on the research of codes correcting insertions, deletions, and classic substitutions. During the initial investigation, Levenshtein discovered the VT codes are precisely capable of correcting single insertion/deletion and then extended the VT construction to single-insertion/deletion/substitution ($1$-ins/del/sub)… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  4. arXiv:2401.02799  [pdf

    cs.CY

    Missing Value Chain in Generative AI Governance China as an example

    Authors: Yulu Pi

    Abstract: We examined the world's first regulation on Generative AI, China's Provisional Administrative Measures of Generative Artificial Intelligence Services, which came into effect in August 2023. Our assessment reveals that the Measures, while recognizing the technical advances of generative AI and seeking to govern its full life cycle, presents unclear distinctions regarding different roles in the valu… ▽ More

    Submitted 5 January, 2024; originally announced January 2024.

    Comments: Workshop on Regulatable Machine Learning at the 37th Conference on Neural Information Processing Systems (RegML @ NeurIPS 2023)

  5. arXiv:2312.16807  [pdf, other

    cs.NI eess.SY

    Efficient Interference Graph Estimation via Concurrent Flooding

    Authors: Haifeng Jia, Yichen Wei, Zhan Wang, Jiani **, Haorui Li, Yibo Pi

    Abstract: Traditional wisdom for network management allocates network resources separately for the measurement and data transmission tasks. Heavy measurement tasks may take up resources for data transmission and significantly reduce network performance. It is therefore challenging for interference graphs, deemed as incurring heavy measurement overhead, to be used in practice in wireless networks. To address… ▽ More

    Submitted 27 December, 2023; originally announced December 2023.

    Comments: Accepted by International Conference on Embedded Wireless Systems and Networking 2023 (EWSN'23), 7 pages with 9 figures, equal contribution by Haifeng Jia and Yichen Wei

    ACM Class: C.2

  6. arXiv:2310.19331  [pdf, other

    cs.NI

    AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning

    Authors: Penghui Zhang, Hua Zhang, Yibo Pi, Zijian Cao, **gyu Wang, Jianxin Liao

    Abstract: In-band Network Telemetry (INT) has emerged as a promising network measurement technology. However, existing network telemetry systems lack the flexibility to meet diverse telemetry requirements and are also difficult to adapt to dynamic network environments. In this paper, we propose AdapINT, a versatile and adaptive in-band network telemetry framework assisted by dual-timescale probes, including… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 14 pages, 19 figures

  7. arXiv:2309.03638  [pdf

    cs.AI

    Beyond XAI:Obstacles Towards Responsible AI

    Authors: Yulu Pi

    Abstract: The rapidly advancing domain of Explainable Artificial Intelligence (XAI) has sparked significant interests in develo** techniques to make AI systems more transparent and understandable. Nevertheless, in real-world contexts, the methods of explainability and their evaluation strategies present numerous limitations.Moreover, the scope of responsible AI extends beyond just explainability. In this… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: work in progress

  8. EFLNet: Enhancing Feature Learning for Infrared Small Target Detection

    Authors: Bo Yang, Xinyu Zhang, Jian Zhang, Jun Luo, Mingliang Zhou, Yangjun Pi

    Abstract: Single-frame infrared small target detection is considered to be a challenging task, due to the extreme imbalance between target and background, bounding box regression is extremely sensitive to infrared small target, and target information is easy to lose in the high-level semantic layer. In this article, we propose an enhancing feature learning network (EFLNet) to address these problems. First,… ▽ More

    Submitted 27 February, 2024; v1 submitted 27 July, 2023; originally announced July 2023.

    Journal ref: IEEE Transactions on Geoscience and Remote Sensing 19 February 2024

  9. arXiv:2303.00651  [pdf

    cs.CY

    Algorithmic Governance for Explainability: A Comparative Overview of Progress and Trends

    Authors: Yulu Pi

    Abstract: The explainability of AI has transformed from a purely technical issue to a complex issue closely related to algorithmic governance and algorithmic security. The lack of explainable AI (XAI) brings adverse effects that can cross all economic classes and national borders. Despite efforts in governance, technical, and policy exchange have been made in XAI by multiple stakeholders, including the publ… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  10. Quantitative Method for Security Situation of the Power Information Network Based on the Evolutionary Neural Network

    Authors: Quande Yuan, Yuzhen Pi, Lei Kou, Fangfang Zhang, Bo Ye

    Abstract: Cybersecurity is the security cornerstone of digital transformation of the power grid and construction of new power systems. The traditional network security situation quantification method only analyzes from the perspective of network performance, ignoring the impact of various power application services on the security situation, so the quantification results cannot fully reflect the power infor… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

    Comments: Frontiers in Energy Research

    MSC Class: 68T99 ACM Class: I.2