Skip to main content

Showing 1–27 of 27 results for author: Qiao, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11707  [pdf, other

    cs.CR cs.CV cs.LG

    A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving

    Authors: Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, Jian** Wang

    Abstract: Trajectory prediction forecasts nearby agents' moves based on their historical trajectories. Accurate trajectory prediction is crucial for autonomous vehicles. Existing attacks compromise the prediction model of a victim AV by directly manipulating the historical trajectory of an attacker AV, which has limited real-world applicability. This paper, for the first time, explores an indirect attack ap… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: In Proceedings of the 33rd USENIX Security Symposium 2024

  2. arXiv:2406.01151  [pdf, other

    cs.AR

    A 0.96pJ/SOP, 30.23K-neuron/mm^2 Heterogeneous Neuromorphic Chip With Fullerene-like Interconnection Topology for Edge-AI Computing

    Authors: P. J. Zhou, Q. Yu, M. Chen, Y. C. Wang, L. W. Meng, Y. Zuo, N. Ning, Y. Liu, S. G. Hu, G. C. Qiao

    Abstract: Edge-AI computing requires high energy efficiency, low power consumption, and relatively high flexibility and compact area, challenging the AI-chip design. This work presents a 0.96 pJ/SOP heterogeneous neuromorphic system-on-chip (SoC) with fullerene-like interconnection topology for edge-AI computing. The neuromorphic core integrates different technologies to augment computing energy efficiency,… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 5 pages, 8 figures

  3. arXiv:2403.12042  [pdf, other

    cs.CV

    Exploring Pre-trained Text-to-Video Diffusion Models for Referring Video Object Segmentation

    Authors: Zixin Zhu, Xuelu Feng, Dongdong Chen, Junsong Yuan, Chunming Qiao, Gang Hua

    Abstract: In this paper, we explore the visual representations produced from a pre-trained text-to-video (T2V) diffusion model for video understanding tasks. We hypothesize that the latent representation learned from a pretrained generative T2V model encapsulates rich semantics and coherent temporal correspondences, thereby naturally facilitating video understanding. Our hypothesis is validated through the… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: The code will be available at \url{https://github.com/buxiangzhiren/VD-IT}

  4. arXiv:2401.06146  [pdf, other

    cs.CV cs.GR

    AAMDM: Accelerated Auto-regressive Motion Diffusion Model

    Authors: Tianyu Li, Calvin Qiao, Guanqiao Ren, KangKang Yin, Sehoon Ha

    Abstract: Interactive motion synthesis is essential in creating immersive experiences in entertainment applications, such as video games and virtual reality. However, generating animations that are both high-quality and contextually responsive remains a challenge. Traditional techniques in the game industry can produce high-fidelity animations but suffer from high computational costs and poor scalability. T… ▽ More

    Submitted 2 December, 2023; originally announced January 2024.

  5. arXiv:2311.13348  [pdf, other

    cs.LG cs.DC cs.NI

    MergeSFL: Split Federated Learning with Feature Merging and Batch Size Regulation

    Authors: Yunming Liao, Yang Xu, Hongli Xu, Lun Wang, Zhiwei Yao, Chunming Qiao

    Abstract: Recently, federated learning (FL) has emerged as a popular technique for edge AI to mine valuable knowledge in edge computing (EC) systems. To mitigate the computing/communication burden on resource-constrained workers and protect model privacy, split federated learning (SFL) has been released by integrating both data and model parallelism. Despite resource limitations, SFL still faces two other c… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  6. arXiv:2308.00529  [pdf, other

    cs.LG cs.AR

    Variational Label-Correlation Enhancement for Congestion Prediction

    Authors: Biao Liu, Congyu Qiao, Ning Xu, Xin Geng, Ziran Zhu, Jun Yang

    Abstract: The physical design process of large-scale designs is a time-consuming task, often requiring hours to days to complete, with routing being the most critical and complex step. As the the complexity of Integrated Circuits (ICs) increases, there is an increased demand for accurate routing quality prediction. Accurate congestion prediction aids in identifying design flaws early on, thereby acceleratin… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  7. arXiv:2306.15612  [pdf, other

    cs.CV

    Adaptive Multi-Modal Cross-Entropy Loss for Stereo Matching

    Authors: Peng Xu, Zhiyu Xiang, Chenyu Qiao, **gyun Fu, Tianyu Pu

    Abstract: Despite the great success of deep learning in stereo matching, recovering accurate disparity maps is still challenging. Currently, L1 and cross-entropy are the two most widely used losses for stereo network training. Compared with the former, the latter usually performs better thanks to its probability modeling and direct supervision to the cost volume. However, how to accurately model the stereo… ▽ More

    Submitted 15 March, 2024; v1 submitted 27 June, 2023; originally announced June 2023.

  8. arXiv:2209.06971  [pdf, other

    cs.CV cs.AI

    PointACL:Adversarial Contrastive Learning for Robust Point Clouds Representation under Adversarial Attack

    Authors: Junxuan Huang, Yatong An, Lu cheng, Bai Chen, Junsong Yuan, Chunming Qiao

    Abstract: Despite recent success of self-supervised based contrastive learning model for 3D point clouds representation, the adversarial robustness of such pre-trained models raised concerns. Adversarial contrastive learning (ACL) is considered an effective way to improve the robustness of pre-trained models. In contrastive learning, the projector is considered an effective component for removing unnecessar… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: arXiv admin note: text overlap with arXiv:2109.00179 by other authors

  9. arXiv:2206.00830  [pdf, other

    cs.LG

    Progressive Purification for Instance-Dependent Partial Label Learning

    Authors: Ning Xu, Biao Liu, Jiaqi Lv, Congyu Qiao, Xin Geng

    Abstract: Partial label learning (PLL) aims to train multiclass classifiers from the examples each annotated with a set of candidate labels where a fixed but unknown candidate label is correct. In the last few years, the instance-independent generation process of candidate labels has been extensively studied, on the basis of which many theoretical advances have been made in PLL. Nevertheless, the candidate… ▽ More

    Submitted 9 May, 2023; v1 submitted 1 June, 2022; originally announced June 2022.

    Comments: Accepted to International Conference on Machine Learning 2023 (ICML 2023)

  10. arXiv:2206.00517  [pdf, other

    cs.LG

    One Positive Label is Sufficient: Single-Positive Multi-Label Learning with Label Enhancement

    Authors: Ning Xu, Congyu Qiao, Jiaqi Lv, Xin Geng, Min-Ling Zhang

    Abstract: Multi-label learning (MLL) learns from the examples each associated with multiple labels simultaneously, where the high cost of annotating all relevant labels for each training example is challenging for real-world applications. To cope with the challenge, we investigate single-positive multi-label learning (SPMLL) where each example is annotated with only one relevant label, and show that one can… ▽ More

    Submitted 11 October, 2022; v1 submitted 1 June, 2022; originally announced June 2022.

    Comments: Accepted to NeurIPS 2022

  11. arXiv:2205.13280  [pdf, other

    cs.CV

    Objects Matter: Learning Object Relation Graph for Robust Camera Relocalization

    Authors: Chengyu Qiao, Zhiyu Xiang, Xinglu Wang

    Abstract: Visual relocalization aims to estimate the pose of a camera from one or more images. In recent years deep learning based pose regression methods have attracted many attentions. They feature predicting the absolute poses without relying on any prior built maps or stored images, making the relocalization very efficient. However, robust relocalization under environments with complex appearance change… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  12. arXiv:2204.03845  [pdf, other

    cs.LG

    Decompositional Generation Process for Instance-Dependent Partial Label Learning

    Authors: Congyu Qiao, Ning Xu, Xin Geng

    Abstract: Partial label learning (PLL) is a typical weakly supervised learning problem, where each training example is associated with a set of candidate labels among which only one is true. Most existing PLL approaches assume that the incorrect labels in each training example are randomly picked as the candidate labels and model the generation process of the candidate labels in a simple way. However, these… ▽ More

    Submitted 1 February, 2023; v1 submitted 8 April, 2022; originally announced April 2022.

    Comments: ICLR 2023 Spotlight

  13. arXiv:2203.05314  [pdf, other

    cs.CR cs.AI cs.RO

    SoK: On the Semantic AI Security in Autonomous Driving

    Authors: Junjie Shen, Ningfei Wang, Ziwen Wan, Yunpeng Luo, Takami Sato, Zhisheng Hu, Xinyang Zhang, Shengjian Guo, Zhenyu Zhong, Kang Li, Ziming Zhao, Chunming Qiao, Qi Alfred Chen

    Abstract: Autonomous Driving (AD) systems rely on AI components to make safety and correct driving decisions. Unfortunately, today's AI algorithms are known to be generally vulnerable to adversarial attacks. However, for such AI component-level vulnerabilities to be semantically impactful at the system level, it needs to address non-trivial semantic gaps both (1) from the system-level attack input spaces to… ▽ More

    Submitted 26 April, 2024; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: Project website: https://sites.google.com/view/cav-sec/pass

  14. arXiv:2201.00693  [pdf, other

    cs.IR cs.AI cs.CL cs.CV

    Multimodal Entity Tagging with Multimodal Knowledge Base

    Authors: Hao Peng, Hang Li, Lei Hou, Juanzi Li, Chao Qiao

    Abstract: To enhance research on multimodal knowledge base and multimodal information processing, we propose a new task called multimodal entity tagging (MET) with a multimodal knowledge base (MKB). We also develop a dataset for the problem using an existing MKB. In an MKB, there are entities and their associated texts and images. In MET, given a text-image pair, one uses the information in the MKB to autom… ▽ More

    Submitted 28 July, 2022; v1 submitted 21 December, 2021; originally announced January 2022.

    Comments: 11 pages, 4 figures

  15. arXiv:2110.12911  [pdf, other

    cs.LG

    Instance-Dependent Partial Label Learning

    Authors: Ning Xu, Congyu Qiao, Xin Geng, Min-Ling Zhang

    Abstract: Partial label learning (PLL) is a typical weakly supervised learning problem, where each training example is associated with a set of candidate labels among which only one is true. Most existing PLL approaches assume that the incorrect labels in each training example are randomly picked as the candidate labels. However, this assumption is not realistic since the candidate labels are always instanc… ▽ More

    Submitted 25 October, 2021; v1 submitted 25 October, 2021; originally announced October 2021.

    Comments: NeurIPS 2021 Spotlight

  16. arXiv:2106.12204  [pdf, other

    cs.CV

    Real-time Instance Segmentation with Discriminative Orientation Maps

    Authors: Wentao Du, Zhiyu Xiang, Shuya Chen, Chengyu Qiao, Yiman Chen, Tingming Bai

    Abstract: Although instance segmentation has made considerable advancement over recent years, it's still a challenge to design high accuracy algorithms with real-time performance. In this paper, we propose a real-time instance segmentation framework termed OrienMask. Upon the one-stage object detector YOLOv3, a mask head is added to predict some discriminative orientation maps, which are explicitly defined… ▽ More

    Submitted 1 August, 2021; v1 submitted 23 June, 2021; originally announced June 2021.

  17. arXiv:2105.08109  [pdf, ps, other

    cs.NI cs.ET

    Quantum Transport Protocols for Distributed Quantum Computing

    Authors: Yangming Zhao, Chunming Qiao

    Abstract: Quantum computing holds a great promise and this work proposes to use new quantum data networks (QDNs) to connect multiple small quantum computers to form a cluster. Such a QDN differs from existing QKD networks in that the former must deliver data qubits reliably within itself. Two types of QDNs are studied, one using teleportation and the other using tell-and-go (TAG) to exchange quantum data. T… ▽ More

    Submitted 25 May, 2021; v1 submitted 17 May, 2021; originally announced May 2021.

    Comments: 16 pages, 27 figures, will be submitted to an ACM conference

  18. arXiv:2102.07373  [pdf, other

    cs.CV

    Generation For Adaption: A GAN-Based Approach for 3D Domain Adaption with Point Cloud Data

    Authors: Junxuan Huang, Junsong Yuan, Chunming Qiao

    Abstract: Recent deep networks have achieved good performance on a variety of 3d points classification tasks. However, these models often face challenges in "wild tasks".There are considerable differences between the labeled training/source data collected by one Lidar and unseen test/target data collected by a different Lidar. Unsupervised domain adaptation (UDA) seeks to overcome such a problem without tar… ▽ More

    Submitted 10 May, 2021; v1 submitted 15 February, 2021; originally announced February 2021.

  19. arXiv:2011.10947  [pdf, other

    cs.CR eess.SP

    Who is in Control? Practical Physical Layer Attack and Defense for mmWave based Sensing in Autonomous Vehicles

    Authors: Zhi Sun, Sarankumar Balakrishnan, Lu Su, Arupjyoti Bhuyan, Pu Wang, Chunming Qiao

    Abstract: With the wide bandwidths in millimeter wave (mmWave) frequency band that results in unprecedented accuracy, mmWave sensing has become vital for many applications, especially in autonomous vehicles (AVs). In addition, mmWave sensing has superior reliability compared to other sensing counterparts such as camera and LiDAR, which is essential for safety-critical driving. Therefore, it is critical to u… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

  20. arXiv:2011.04988  [pdf, other

    eess.IV cs.CV

    AIM 2020 Challenge on Rendering Realistic Bokeh

    Authors: Andrey Ignatov, Radu Timofte, Ming Qian, Congyu Qiao, Jiamin Lin, Zhenyu Guo, Chenghua Li, Cong Leng, Jian Cheng, Juewen Peng, Xianrui Luo, Ke Xian, Zi** Wu, Zhiguo Cao, Densen Puthussery, Jiji C V, Hrishikesh P S, Melvin Kuriakose, Saikat Dutta, Sourya Dipta Das, Nisarg A. Shah, Kuldeep Purohit, Praveen Kandula, Maitreya Suin, A. N. Rajagopalan , et al. (10 additional authors not shown)

    Abstract: This paper reviews the second AIM realistic bokeh effect rendering challenge and provides the description of the proposed solutions and results. The participating teams were solving a real-world bokeh simulation problem, where the goal was to learn a realistic shallow focus technique using a large-scale EBB! bokeh dataset consisting of 5K shallow / wide depth-of-field image pairs captured using th… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: Published in ECCV 2020 Workshop (Advances in Image Manipulation), https://data.vision.ee.ethz.ch/cvl/aim20/

  21. BGGAN: Bokeh-Glass Generative Adversarial Network for Rendering Realistic Bokeh

    Authors: Ming Qian, Congyu Qiao, Jiamin Lin, Zhenyu Guo, Chenghua Li, Cong Leng, Jian Cheng

    Abstract: A photo captured with bokeh effect often means objects in focus are sharp while the out-of-focus areas are all blurred. DSLR can easily render this kind of effect naturally. However, due to the limitation of sensors, smartphones cannot capture images with depth-of-field effects directly. In this paper, we propose a novel generator called Glass-Net, which generates bokeh images not relying on compl… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: accepted by ECCV workshop 2020

    Report number: 2020: 229-244

    Journal ref: Proceedings of the European Conference on Computer Vision Workshops. 2020: 229-244

  22. Fact-based Text Editing

    Authors: Hayate Iso, Chao Qiao, Hang Li

    Abstract: We propose a novel text editing task, referred to as \textit{fact-based text editing}, in which the goal is to revise a given document to better describe the facts in a knowledge base (e.g., several triples). The task is important in practice because reflecting the truth is a common requirement in text editing. First, we propose a method for automatically generating a dataset for research on fact-… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Comments: ACL 2020

  23. arXiv:1905.02607  [pdf, other

    cs.SI cs.LG

    PocketCare: Tracking the Flu with Mobile Phones using Partial Observations of Proximity and Symptoms

    Authors: Wen Dong, Tong Guan, Bruno Lepri, Chunming Qiao

    Abstract: Mobile phones provide a powerful sensing platform that researchers may adopt to understand proximity interactions among people and the diffusion, through these interactions, of diseases, behaviors, and opinions. However, it remains a challenge to track the proximity-based interactions of a whole community and then model the social diffusion of diseases and behaviors starting from the observations… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

  24. arXiv:1810.10752  [pdf, other

    cs.CL

    Word Embedding based Edit Distance

    Authors: Yilin Niu, Chao Qiao, Hang Li, Minlie Huang

    Abstract: Text similarity calculation is a fundamental problem in natural language processing and related fields. In recent years, deep neural networks have been developed to perform the task and high performances have been achieved. The neural networks are usually trained with labeled data in supervised learning, and creation of labeled data is usually very costly. In this short paper, we address unsupervi… ▽ More

    Submitted 25 October, 2018; originally announced October 2018.

  25. arXiv:1803.11363  [pdf

    cs.CY

    Discovering Student Behavior Patterns from Event Logs: Preliminary Results on A Novel Probabilistic Latent Variable Model

    Authors: Chen Qiao, Xiao Hu

    Abstract: Digital platforms enable the observation of learning behaviors through fine-grained log traces, offering more detailed clues for analysis. In addition to previous descriptive and predictive log analysis, this study aims to simultaneously model learner activities, event time spans, and interaction levels using the proposed Hidden Behavior Traits Model (HBTM). We evaluated model performance and expl… ▽ More

    Submitted 30 March, 2018; originally announced March 2018.

    Comments: 5 pages, accepted as a full paper to 18th IEEE International Conference on Advanced Learning Technologies (ICALT 2018)

  26. arXiv:1607.08025  [pdf, ps, other

    cs.IT

    Mutual Information Optimally Local Private Discrete Distribution Estimation

    Authors: Shaowei Wang, Liusheng Huang, Pengzhan Wang, Yiwen Nie, Hongli Xu, Wei Yang, Xiang-Yang Li, Chunming Qiao

    Abstract: Consider statistical learning (e.g. discrete distribution estimation) with local $ε$-differential privacy, which preserves each data provider's privacy locally, we aim to optimize statistical data utility under the privacy constraints. Specifically, we study maximizing mutual information between a provider's data and its private view, and give the exact mutual information bound along with an attai… ▽ More

    Submitted 27 July, 2016; originally announced July 2016.

    Comments: submitted to NIPS2016

  27. arXiv:1202.5282  [pdf, ps, other

    cs.CR cs.OS

    How to Bypass Verified Boot Security in Chromium OS

    Authors: Mohammad Iftekhar Husain, Lokesh Mandvekar, Chunming Qiao, Ramalingam Sridhar

    Abstract: Verified boot is an interesting feature of Chromium OS that supposedly can detect any modification in the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware or keylogger and still pass the verified boot process. The exploit is… ▽ More

    Submitted 2 June, 2012; v1 submitted 23 February, 2012; originally announced February 2012.

    Comments: Update information about Chromium OS. Added new and advanced exploits. Added mitigation techniques and evaluation