Skip to main content

Showing 1–39 of 39 results for author: Qi, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13215  [pdf, other

    cs.CV cs.AI

    Neural Residual Diffusion Models for Deep Scalable Vision Generation

    Authors: Zhiyuan Ma, Liangliang Zhao, Biqing Qi, Bowen Zhou

    Abstract: The most advanced diffusion models have recently adopted increasingly deep stacked networks (e.g., U-Net or Transformer) to promote the generative emergence capabilities of vision generation models similar to large language models (LLMs). However, progressively deeper stacked networks will intuitively cause numerical propagation errors and reduce noisy prediction capabilities on generative data, w… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  2. arXiv:2406.12295  [pdf, other

    cs.CL

    Fast and Slow Generating: An Empirical Study on Large and Small Language Models Collaborative Decoding

    Authors: Kaiyan Zhang, Jianyu Wang, Ning Ding, Biqing Qi, Ermo Hua, Xingtai Lv, Bowen Zhou

    Abstract: Large Language Models (LLMs) demonstrate impressive performance in diverse applications, yet they face significant drawbacks, including high inference latency, expensive training cost, and generation of hallucination. Collaborative decoding between large and small language models (SLMs) offers a novel approach to address these challenges. Inspired by dual-process cognitive theory, we integrate the… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  3. arXiv:2406.05666  [pdf, other

    cs.LG cs.IR stat.ML

    General Distribution Learning: A theoretical framework for Deep Learning

    Authors: Binchuan Qi, Li Li, Wei Gong

    Abstract: There remain numerous unanswered research questions on deep learning (DL) within the classical learning theory framework. These include the remarkable generalization capabilities of overparametrized neural networks (NNs), the efficient optimization performance despite non-convexity of objectives, the mechanism of flat minima for generalization, and the exceptional performance of deep architectures… ▽ More

    Submitted 26 June, 2024; v1 submitted 9 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2105.04026 by other authors. arXiv admin note: text overlap with arXiv:2105.04026 by other authors

  4. arXiv:2406.05535  [pdf, other

    cs.LG cs.AI cs.CR

    Perturbation Towards Easy Samples Improves Targeted Adversarial Transferability

    Authors: Junqi Gao, Biqing Qi, Yao Li, Zhichang Guo, Dong Li, Yuming Xing, Dazhi Zhang

    Abstract: The transferability of adversarial perturbations provides an effective shortcut for black-box attacks. Targeted perturbations have greater practicality but are more difficult to transfer between models. In this paper, we experimentally and theoretically demonstrated that neural networks trained on the same dataset have more consistent performance in High-Sample-Density-Regions (HSDR) of each class… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

    Journal ref: Advances in Neural Information Processing Systems 36, 2023

  5. arXiv:2406.05534  [pdf, other

    cs.AI cs.CL cs.LG

    Online DPO: Online Direct Preference Optimization with Fast-Slow Chasing

    Authors: Biqing Qi, Pengfei Li, Fangyuan Li, Junqi Gao, Kaiyan Zhang, Bowen Zhou

    Abstract: Direct Preference Optimization (DPO) improves the alignment of large language models (LLMs) with human values by training directly on human preference datasets, eliminating the need for reward models. However, due to the presence of cross-domain human preferences, direct continual training can lead to catastrophic forgetting, limiting DPO's performance and efficiency. Inspired by intraspecific com… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  6. arXiv:2406.05532  [pdf, other

    cs.LG cs.AI

    Exploring Adversarial Robustness of Deep State Space Models

    Authors: Biqing Qi, Yang Luo, Junqi Gao, Pengfei Li, Kai Tian, Zhiyuan Ma, Bowen Zhou

    Abstract: Deep State Space Models (SSMs) have proven effective in numerous task scenarios but face significant security challenges due to Adversarial Perturbations (APs) in real-world deployments. Adversarial Training (AT) is a mainstream approach to enhancing Adversarial Robustness (AR) and has been validated on various traditional DNN architectures. However, its effectiveness in improving the AR of SSMs r… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  7. arXiv:2406.05531  [pdf, other

    cs.LG cs.AI

    Enhancing Adversarial Transferability via Information Bottleneck Constraints

    Authors: Biqing Qi, Junqi Gao, Jianxing Liu, Ligang Wu, Bowen Zhou

    Abstract: From the perspective of information bottleneck (IB) theory, we propose a novel framework for performing black-box transferable adversarial attacks named IBTA, which leverages advancements in invariant features. Intuitively, diminishing the reliance of adversarial perturbations on the original data, under equivalent attack performance constraints, encourages a greater reliance on invariant features… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

    Journal ref: IEEE Signal Processing Letters, 2024

  8. arXiv:2406.04567  [pdf, other

    cs.LG cs.IR

    Error Bounds of Supervised Classification from Information-Theoretic Perspective

    Authors: Binchuan Qi, Wei Gong, Li Li

    Abstract: There remains a list of unanswered research questions on deep learning (DL), including the remarkable generalization power of overparametrized neural networks, the efficient optimization performance despite the non-convexity, and the mechanisms behind flat minima in generalization. In this paper, we adopt an information-theoretic perspective to explore the theoretical foundations of supervised cla… ▽ More

    Submitted 27 June, 2024; v1 submitted 6 June, 2024; originally announced June 2024.

  9. arXiv:2406.03949  [pdf, other

    cs.CL

    UltraMedical: Building Specialized Generalists in Biomedicine

    Authors: Kaiyan Zhang, Sihang Zeng, Ermo Hua, Ning Ding, Zhang-Ren Chen, Zhiyuan Ma, Haoxin Li, Ganqu Cui, Biqing Qi, Xuekai Zhu, Xingtai Lv, Hu **fang, Zhiyuan Liu, Bowen Zhou

    Abstract: Large Language Models (LLMs) have demonstrated remarkable capabilities across various domains and are moving towards more specialized areas. Recent advanced proprietary models such as GPT-4 and Gemini have achieved significant advancements in biomedicine, which have also raised privacy and security challenges. The construction of specialized generalists hinges largely on high-quality datasets, enh… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: Datasets and models are available at https://github.com/TsinghuaC3I/UltraMedical

  10. arXiv:2405.17534  [pdf, other

    cs.LG

    SMR: State Memory Replay for Long Sequence Modeling

    Authors: Biqing Qi, Junqi Gao, Kaiyan Zhang, Dong Li, Jianxing Liu, Ligang Wu, Bowen Zhou

    Abstract: Despite the promising performance of state space models (SSMs) in long sequence modeling, limitations still exist. Advanced SSMs like S5 and S6 (Mamba) in addressing non-uniform sampling, their recursive structures impede efficient SSM computation via convolution. To overcome compatibility limitations in parallel convolutional computation, this paper proposes a novel non-recursive non-uniform samp… ▽ More

    Submitted 8 June, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

    Journal ref: Findings of the Association for Computational Linguistics, 2024

  11. arXiv:2405.11870  [pdf, other

    cs.CL cs.AI

    Intuitive Fine-Tuning: Towards Simplifying Alignment into a Single Process

    Authors: Ermo Hua, Biqing Qi, Kaiyan Zhang, Yue Yu, Ning Ding, Xingtai Lv, Kai Tian, Bowen Zhou

    Abstract: Supervised Fine-Tuning (SFT) and Preference Optimization (PO) are two fundamental processes for enhancing the capabilities of Language Models (LMs) post pre-training, aligning them better with human preferences. Although SFT advances in training efficiency, PO delivers better alignment, thus they are often combined. However, common practices simply apply them sequentially without integrating their… ▽ More

    Submitted 28 May, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  12. arXiv:2403.20009  [pdf, other

    cs.CL cs.LG

    On Large Language Models' Hallucination with Regard to Known Facts

    Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou

    Abstract: Large language models are successful in answering factoid questions but are also prone to hallucination.We investigate the phenomenon of LLMs possessing correct answer knowledge yet still hallucinating from the perspective of inference dynamics, an area not previously covered in studies on hallucinations.We are able to conduct this analysis via two key ideas.First, we identify the factual question… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

    Comments: Accepted by NAACL 2024 MainConference

  13. arXiv:2403.04140  [pdf, other

    cs.AI

    Contrastive Augmented Graph2Graph Memory Interaction for Few Shot Continual Learning

    Authors: Biqing Qi, Junqi Gao, Xingquan Chen, Dong Li, Jianxing Liu, Ligang Wu, Bowen Zhou

    Abstract: Few-Shot Class-Incremental Learning (FSCIL) has gained considerable attention in recent years for its pivotal role in addressing continuously arriving classes. However, it encounters additional challenges. The scarcity of samples in new sessions intensifies overfitting, causing incompatibility between the output features of new and old classes, thereby escalating catastrophic forgetting. A prevale… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

    Comments: 12 Pages, 5 figures

  14. arXiv:2403.03129  [pdf, other

    cs.CL

    CoGenesis: A Framework Collaborating Large and Small Language Models for Secure Context-Aware Instruction Following

    Authors: Kaiyan Zhang, Jianyu Wang, Ermo Hua, Biqing Qi, Ning Ding, Bowen Zhou

    Abstract: With the advancement of language models (LMs), their exposure to private data is increasingly inevitable, and their deployment (especially for smaller ones) on personal devices, such as PCs and smartphones, has become a prevailing trend. In contexts laden with user information, enabling models to both safeguard user privacy and execute commands efficiently emerges as an essential research imperati… ▽ More

    Submitted 6 June, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted to ACL 2024 (Main Conference)

  15. arXiv:2403.02628  [pdf, other

    cs.CV cs.LG

    Interactive Continual Learning: Fast and Slow Thinking

    Authors: Biqing Qi, Xingquan Chen, Junqi Gao, Dong Li, Jianxing Liu, Ligang Wu, Bowen Zhou

    Abstract: Advanced life forms, sustained by the synergistic interaction of neural cognitive mechanisms, continually acquire and transfer knowledge throughout their lifespan. In contrast, contemporary machine learning paradigms exhibit limitations in emulating the facets of continual learning (CL). Nonetheless, the emergence of large language models (LLMs) presents promising avenues for realizing CL via inte… ▽ More

    Submitted 18 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024

  16. arXiv:2402.16397  [pdf, other

    cs.CR cs.AI

    Investigating Deep Watermark Security: An Adversarial Transferability Perspective

    Authors: Biqing Qi, Junqi Gao, Yiang Luo, Jianxing Liu, Ligang Wu, Bowen Zhou

    Abstract: The rise of generative neural networks has triggered an increased demand for intellectual property (IP) protection in generated content. Deep watermarking techniques, recognized for their flexibility in IP protection, have garnered significant attention. However, the surge in adversarial transferable attacks poses unprecedented challenges to the security of deep watermarking techniques-an area cur… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: 18 pages, 8 figures

  17. arXiv:2311.05965  [pdf, other

    cs.CL

    Large Language Models are Zero Shot Hypothesis Proposers

    Authors: Biqing Qi, Kaiyan Zhang, Haoxiang Li, Kai Tian, Sihang Zeng, Zhang-Ren Chen, Bowen Zhou

    Abstract: Significant scientific discoveries have driven the progress of human civilisation. The explosion of scientific literature and data has created information barriers across disciplines that have slowed the pace of scientific discovery. Large Language Models (LLMs) hold a wealth of global and interdisciplinary knowledge that promises to break down these information barriers and foster a new wave of s… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

    Comments: Instruction Workshop @ NeurIPS 2023

  18. arXiv:2311.04438  [pdf, other

    cs.SE

    Reusing Convolutional Neural Network Models through Modularization and Composition

    Authors: Binhang Qi, Hailong Sun, Hongyu Zhang, Xiang Gao

    Abstract: With the widespread success of deep learning technologies, many trained deep neural network (DNN) models are now publicly available. However, directly reusing the public DNN models for new tasks often fails due to mismatching functionality or performance. Inspired by the notion of modularization and composition in software reuse, we investigate the possibility of improving the reusability of DNN m… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: Accepted by ACM Transactions on Software Engineering and Methodology (TOSEM). arXiv admin note: substantial text overlap with arXiv:2209.06116

  19. arXiv:2310.15477  [pdf, other

    cs.CL

    CRaSh: Clustering, Removing, and Sharing Enhance Fine-tuning without Full Large Language Model

    Authors: Kaiyan Zhang, Ning Ding, Biqing Qi, Xuekai Zhu, Xinwei Long, Bowen Zhou

    Abstract: Instruction tuning has recently been recognized as an effective way of aligning Large Language Models (LLMs) to enhance their generalization ability across various tasks. However, when tuning publicly accessible, centralized LLMs with private instruction data, privacy concerns are inevitable. While direct transfer of parameterized modules between models is a plausible approach to address this, its… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted to EMNLP 2023 (Main Conference)

  20. arXiv:2306.09376  [pdf, other

    cs.LG cs.AI cs.SE

    Modularizing while Training: A New Paradigm for Modularizing DNN Models

    Authors: Binhang Qi, Hailong Sun, Hongyu Zhang, Ruobing Zhao, Xiang Gao

    Abstract: Deep neural network (DNN) models have become increasingly crucial components in intelligent software systems. However, training a DNN model is typically expensive in terms of both time and money. To address this issue, researchers have recently focused on reusing existing DNN models - borrowing the idea of code reuse in software engineering. However, reusing an entire model could cause extra overh… ▽ More

    Submitted 5 October, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: Accepted at ICSE'24

  21. arXiv:2305.13888  [pdf, other

    cs.CL

    PaD: Program-aided Distillation Can Teach Small Models Reasoning Better than Chain-of-thought Fine-tuning

    Authors: Xuekai Zhu, Biqing Qi, Kaiyan Zhang, Xinwei Long, Zhouhan Lin, Bowen Zhou

    Abstract: While large language models (LLMs) excel in various natural language processing tasks, their huge size and the inaccessibility of parameters present challenges for practical deployment. Previous studies try to distill task-specific ability from LLMs to smaller models, using data synthesis and chain-of-thought (CoT) fine-tuning. However, synthetic CoT data often contains faulty reasoning, which det… ▽ More

    Submitted 20 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: NAACL 2024 Long Paper; Code and data are available at https://github.com/Xuekai-Zhu/pad

  22. arXiv:2304.00245  [pdf, other

    cs.SE cs.AI

    Reusing Deep Neural Network Models through Model Re-engineering

    Authors: Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang, Zhaotian Li, Xudong Liu

    Abstract: Training deep neural network (DNN) models, which has become an important task in today's software development, is often costly in terms of computational resources and time. With the inspiration of software reuse, building DNN models through reusing existing ones has gained increasing attention recently. Prior approaches to DNN model reuse have two main limitations: 1) reusing the entire model, whi… ▽ More

    Submitted 29 July, 2023; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: Accepted by ICSE'23

  23. arXiv:2303.06759  [pdf, other

    cs.CG

    New Approximation Algorithms for Touring Regions

    Authors: Benjamin Qi, Richard Qi, Xinyang Chen

    Abstract: We analyze the touring regions problem: find a ($1+ε$)-approximate Euclidean shortest path in $d$-dimensional space that starts at a given starting point, ends at a given ending point, and visits given regions $R_1, R_2, R_3, \dots, R_n$ in that order. Our main result is an $\mathcal O \left(\frac{n}{\sqrtε}\log{\frac{1}ε} + \frac{1}ε \right)$-time algorithm for touring disjoint disks. We also g… ▽ More

    Submitted 13 March, 2023; v1 submitted 12 March, 2023; originally announced March 2023.

    Comments: to appear in SOCG 2023. V2 - fixed figures

  24. arXiv:2302.11838  [pdf, other

    cs.IT cs.DS

    Minimum-Entropy Coupling Approximation Guarantees Beyond the Majorization Barrier

    Authors: Spencer Compton, Dmitriy Katz, Benjamin Qi, Kristjan Greenewald, Murat Kocaoglu

    Abstract: Given a set of discrete probability distributions, the minimum entropy coupling is the minimum entropy joint distribution that has the input distributions as its marginals. This has immediate relevance to tasks such as entropic causal inference for causal graph discovery and bounding mutual information between variables that we observe separately. Since finding the minimum entropy coupling is NP-H… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: AISTATS 2023

  25. Contactless Haptic Display Through Magnetic Field Control

    Authors: Xiong Lu, Yuxing Yan, Beibei Qi, Huang Qian, Junbin Sun, Aaron Quigley

    Abstract: Haptic rendering enables people to touch, perceive, and manipulate virtual objects in a virtual environment. Using six cascaded identical hollow disk electromagnets and a small permanent magnet attached to an operator's finger, this paper proposes and develops an untethered haptic interface through magnetic field control. The concentric hole inside the six cascaded electromagnets provides the work… ▽ More

    Submitted 25 November, 2022; originally announced November 2022.

    Journal ref: in IEEE Transactions on Haptics, vol. 15, no. 2, pp. 328-338, 1 April-June 2022

  26. Patching Weak Convolutional Neural Network Models through Modularization and Composition

    Authors: Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang

    Abstract: Despite great success in many applications, deep neural networks are not always robust in practice. For instance, a convolutional neuron network (CNN) model for classification tasks often performs unsatisfactorily in classifying some particular classes of objects. In this work, we are concerned with patching the weak part of a CNN model instead of improving it through the costly retraining of the… ▽ More

    Submitted 29 July, 2023; v1 submitted 11 September, 2022; originally announced September 2022.

    Comments: Accepted at ASE'22

  27. arXiv:2208.10694  [pdf, other

    cs.CV

    Spiral Contrastive Learning: An Efficient 3D Representation Learning Method for Unannotated CT Lesions

    Authors: Penghua Zhai, Enwei Zhu, Baolian Qi, Xin Wei, **peng Li

    Abstract: Computed tomography (CT) samples with pathological annotations are difficult to obtain. As a result, the computer-aided diagnosis (CAD) algorithms are trained on small datasets (e.g., LIDC-IDRI with 1,018 samples), limiting their accuracies and reliability. In the past five years, several works have tailored for unsupervised representations of CT lesions via two-dimensional (2D) and three-dimensio… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  28. arXiv:2207.00251  [pdf, other

    cs.CV

    Computer-aided Tuberculosis Diagnosis with Attribute Reasoning Assistance

    Authors: Chengwei Pan, Gangming Zhao, Junjie Fang, Baolian Qi, Jiaheng Liu, Chaowei Fang, Dingwen Zhang, **peng Li, Yizhou Yu

    Abstract: Although deep learning algorithms have been intensively developed for computer-aided tuberculosis diagnosis (CTD), they mainly depend on carefully annotated datasets, leading to much time and resource consumption. Weakly supervised learning (WSL), which leverages coarse-grained labels to accomplish fine-grained tasks, has the potential to solve this problem. In this paper, we first propose a new l… ▽ More

    Submitted 1 July, 2022; originally announced July 2022.

    Comments: Provisionally Accepted for Medical Image Computing and Computer Assisted Interventions 2022 (MICCAI 2022). arXiv admin note: text overlap with arXiv:2010.04483

  29. arXiv:2205.15874  [pdf, ps, other

    cs.DS

    On Maximizing Sums of Non-monotone Submodular and Linear Functions

    Authors: Benjamin Qi

    Abstract: We study the problem of Regularized Unconstrained Submodular Maximization (RegularizedUSM) as defined by Bodek and Feldman [BF22]. In this problem, you are given a non-monotone non-negative submodular function $f:2^{\mathcal N}\to \mathbb R_{\ge 0}$ and a linear function $\ell:2^{\mathcal N}\to \mathbb R$ over the same ground set $\mathcal N$, and the objective is to output a set… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: 38 pages, 5 figures

    ACM Class: F.2.2; G.2.1

  30. arXiv:2109.12506  [pdf, other

    cs.CV cs.AR

    A Simple Self-calibration Method for The Internal Time Synchronization of MEMS LiDAR

    Authors: Yu Zhang, Xiaoguang Di, Shiyu Yan, Bin Zhang, Baoling Qi, Chunhui Wang

    Abstract: This paper proposes a simple self-calibration method for the internal time synchronization of MEMS(Micro-electromechanical systems) LiDAR during research and development. Firstly, we introduced the problem of internal time misalignment in MEMS lidar. Then, a robust Minimum Vertical Gradient(MVG) prior is proposed to calibrate the time difference between the laser and MEMS mirror, which can be calc… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.

    Comments: 9 pages, 8 figures,

    ACM Class: I.4.5; J.2

  31. arXiv:2107.06442  [pdf, other

    cs.CV cs.AI

    GREN: Graph-Regularized Embedding Network for Weakly-Supervised Disease Localization in X-ray Images

    Authors: Baolian Qi, Gangming Zhao, Xin Wei, Changde Du, Chengwei Pan, Yizhou Yu, **peng Li

    Abstract: Locating diseases in chest X-ray images with few careful annotations saves large human effort. Recent works approached this task with innovative weakly-supervised algorithms such as multi-instance learning (MIL) and class activation maps (CAM), however, these methods often yield inaccurate or incomplete regions. One of the reasons is the neglection of the pathological implications hidden in the re… ▽ More

    Submitted 4 August, 2022; v1 submitted 13 July, 2021; originally announced July 2021.

    Comments: Accepted in IEEE Journal of Biomedical and Health Informatics (JBHI)

  32. arXiv:2105.00625  [pdf, ps, other

    cs.CR

    Three-Party Integer Comparison and Applications

    Authors: Jie Ma, Bin Qi, Kewei Lv

    Abstract: Secure integer comparison has been a popular research topic in cryptography, both for its simplicity to describe and for its applications. The aim is to enable two parties to compare their inputs without revealing the exact value of those inputs. In this paper, we highlight three-party integer comparison (TPIC), where a \emph{judge}, with no private input, wants to know the comparison result, wh… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  33. arXiv:2101.08992  [pdf, other

    cs.CV

    Cross Chest Graph for Disease Diagnosis with Structural Relational Reasoning

    Authors: Gangming Zhao, Baolian Qi, **peng Li

    Abstract: Locating lesions is important in the computer-aided diagnosis of X-ray images. However, box-level annotation is time-consuming and laborious. How to locate lesions accurately with few, or even without careful annotations is an urgent problem. Although several works have approached this problem with weakly-supervised methods, the performance needs to be improved. One obstacle is that general weakly… ▽ More

    Submitted 1 February, 2021; v1 submitted 22 January, 2021; originally announced January 2021.

  34. arXiv:2011.14206  [pdf, other

    cs.RO

    AdaGrasp: Learning an Adaptive Gripper-Aware Gras** Policy

    Authors: Zhenjia Xu, Beichun Qi, Shubham Agrawal, Shuran Song

    Abstract: This paper aims to improve robots' versatility and adaptability by allowing them to use a large variety of end-effector tools and quickly adapt to new tools. We propose AdaGrasp, a method to learn a single gras** policy that generalizes to novel grippers. By training on a large collection of grippers, our algorithm is able to acquire generalizable knowledge of how different grippers should be us… ▽ More

    Submitted 13 March, 2021; v1 submitted 28 November, 2020; originally announced November 2020.

    Comments: ICRA 2021. Project page: https://adagrasp.cs.columbia.edu

  35. HCIC: Hardware-assisted Control-flow Integrity Checking

    Authors: Jiliang Zhang, Binhang Qi, Gang Qu

    Abstract: Recently, code reuse attacks (CRAs), such as return-oriented programming (ROP) and jump-oriented programming (JOP), have emerged as a new class of ingenious security threatens. Attackers can utilize CRAs to hijack the control flow of programs to perform malicious actions without injecting any codes. Many defenses, classed into software-based and hardware-based, have been proposed. However, softwar… ▽ More

    Submitted 19 September, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

    Comments: 14 pages

    Journal ref: IEEE Internet of Things Journal.(2018) 1-14

  36. Loss-tolerant quantum secure positioning with weak laser sources

    Authors: Charles Ci Wen Lim, Feihu Xu, George Siopsis, Eric Chitambar, Philip G. Evans, Bing Qi

    Abstract: Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swap** QPV protocol (based on measu… ▽ More

    Submitted 27 July, 2016; originally announced July 2016.

    Comments: 11 pages, 3 figures. Partially based on an earlier work in arXiv:1510.04891

    Journal ref: Phys. Rev. A 94, 032315 (2016)

  37. arXiv:1303.6849  [pdf

    physics.ins-det cs.AR

    A Fast Improved Fat Tree Encoder for Wave Union TDC in an FPGA

    Authors: Qi Shen, Lei Zhao, Shubin Liu, Shengkai Liao, Binxiang Qi, Xueye Hu, Chengzhi Peng, Qi An

    Abstract: Up to the present, the wave union method can achieve the best timing performance in FPGA based TDC designs. However, it should be guaranteed in such a structure that the non-thermometer code to binary code (NTH2B) encoding process should be finished within just one system clock cycle. So the implementation of the NTH2B encoder is quite challenging considering the high speed requirement. Besides, t… ▽ More

    Submitted 27 March, 2013; originally announced March 2013.

    Comments: Submitted to "Chinese Physics C"

  38. Postprocessing for quantum random number generators: entropy evaluation and randomness extraction

    Authors: Xiongfeng Ma, Feihu Xu, He Xu, Xiaoqing Tan, Bing Qi, Hoi-Kwong Lo

    Abstract: Quantum random-number generators (QRNGs) can offer a means to generate information-theoretically provable random numbers, in principle. In practice, unfortunately, the quantum randomness is inevitably mixed with classical randomness due to classical noises. To distill this quantum randomness, one needs to quantify the randomness of the source and apply a randomness extractor. Here, we propose a ge… ▽ More

    Submitted 21 June, 2013; v1 submitted 5 July, 2012; originally announced July 2012.

    Comments: 13 pages, 2 figures

    Journal ref: Phys. Rev. A 87, 062327 (2013)

  39. Phase-Remap** Attack in Practical Quantum Key Distribution Systems

    Authors: Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remap** attack targeting two practical… ▽ More

    Submitted 5 March, 2007; v1 submitted 17 January, 2006; originally announced January 2006.

    Comments: 13 pages, 8 figures

    Journal ref: Phys. Rev. A 75, 032314 (2007)