Skip to main content

Showing 1–50 of 53 results for author: Tao, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01065  [pdf, other

    cs.LG

    Improve ROI with Causal Learning and Conformal Prediction

    Authors: Meng Ai, Zhuo Chen, Jibin Wang, **g Shang, Tao Tao, Zhen Li

    Abstract: In the commercial sphere, such as operations and maintenance, advertising, and marketing recommendations, intelligent decision-making utilizing data mining and neural network technologies is crucial, especially in resource allocation to optimize ROI. This study delves into the Cost-aware Binary Treatment Assignment Problem (C-BTAP) across different industries, with a focus on the state-of-the-art… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: Accepted by ICDE 2024; Link: https://icde2024.github.io/papers.html

  2. arXiv:2406.20098  [pdf, other

    cs.CV cs.AI cs.CL

    Web2Code: A Large-scale Webpage-to-Code Dataset and Evaluation Framework for Multimodal LLMs

    Authors: Sukmin Yun, Haokun Lin, Rusiru Thushara, Mohammad Qazim Bhat, Yongxin Wang, Zutao Jiang, Mingkai Deng, **hong Wang, Tianhua Tao, Junbo Li, Haonan Li, Preslav Nakov, Timothy Baldwin, Zhengzhong Liu, Eric P. Xing, Xiaodan Liang, Zhiqiang Shen

    Abstract: Multimodal large language models (MLLMs) have shown impressive success across modalities such as image, video, and audio in a variety of understanding and generation tasks. However, current MLLMs are surprisingly poor at understanding webpage screenshots and generating their corresponding HTML code. To address this problem, we propose Web2Code, a benchmark consisting of a new large-scale webpage-t… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: Website at https://mbzuai-llm.github.io/webpage2code/

  3. arXiv:2406.12923  [pdf, other

    cs.LG cs.MA

    Interpretable Cascading Mixture-of-Experts for Urban Traffic Congestion Prediction

    Authors: Wenzhao Jiang, **dong Han, Hao Liu, Tao Tao, Naiqiang Tan, Hui Xiong

    Abstract: Rapid urbanization has significantly escalated traffic congestion, underscoring the need for advanced congestion prediction services to bolster intelligent transportation systems. As one of the world's largest ride-hailing platforms, DiDi places great emphasis on the accuracy of congestion prediction to enhance the effectiveness and reliability of their real-time services, such as travel time esti… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  4. arXiv:2406.09455  [pdf, other

    cs.CV cs.AI cs.CL

    Pandora: Towards General World Model with Natural Language Actions and Video States

    Authors: Jiannan Xiang, Guangyi Liu, Yi Gu, Qiyue Gao, Yuting Ning, Yuheng Zha, Zeyu Feng, Tianhua Tao, Shibo Hao, Yemin Shi, Zhengzhong Liu, Eric P. Xing, Zhiting Hu

    Abstract: World models simulate future states of the world in response to different actions. They facilitate interactive content creation and provides a foundation for grounded, long-horizon reasoning. Current foundation models do not fully meet the capabilities of general world models: large language models (LLMs) are constrained by their reliance on language modality and their limited understanding of the… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Website: https://world-model.maitrix.org/

  5. arXiv:2405.13899  [pdf, ps, other

    stat.ML cs.LG

    Symmetric Linear Bandits with Hidden Symmetry

    Authors: Nam Phuong Tran, The Anh Ta, Debmalya Mandal, Long Tran-Thanh

    Abstract: High-dimensional linear bandits with low-dimensional structure have received considerable attention in recent studies due to their practical significance. The most common structure in the literature is sparsity. However, it may not be available in practice. Symmetry, where the reward is invariant under certain groups of transformations on the set of arms, is another important inductive bias in the… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  6. arXiv:2405.13349  [pdf, other

    cs.DC

    Building a Verifiable Logical Clock for P2P Networks

    Authors: Guangda Sun, Tianyang Tao, Yanpei Guo, Michael Yiqing Hu, Jialin Li

    Abstract: Logical clocks are a fundamental tool to establish causal ordering of events in a distributed system. They have been applied in weakly consistent storage systems, causally ordered broadcast, distributed snapshots, deadlock detection, and distributed system debugging. However, prior logical clock constructs fail to work in an open network with Byzantine participants. In this work, we present Chrono… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  7. arXiv:2405.10691  [pdf, other

    eess.IV cs.CV

    LoCI-DiffCom: Longitudinal Consistency-Informed Diffusion Model for 3D Infant Brain Image Completion

    Authors: Zihao Zhu, Tianli Tao, Yitian Tao, Haowen Deng, Xinyi Cai, Gaofeng Wu, Kaidong Wang, Haifeng Tang, Lixuan Zhu, Zhuoyang Gu, Jiawei Huang, Dinggang Shen, Han Zhang

    Abstract: The infant brain undergoes rapid development in the first few years after birth.Compared to cross-sectional studies, longitudinal studies can depict the trajectories of infants brain development with higher accuracy, statistical power and flexibility.However, the collection of infant longitudinal magnetic resonance (MR) data suffers a notorious dropout problem, resulting in incomplete datasets wit… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  8. arXiv:2403.14918  [pdf, other

    cs.LG

    Deep learning-based method for weather forecasting: A case study in Itoshima

    Authors: Yuzhong Cheng, Linh Thi Hoai Nguyen, Akinori Ozaki, Ton Viet Ta

    Abstract: Accurate weather forecasting is of paramount importance for a wide range of practical applications, drawing substantial scientific and societal interest. However, the intricacies of weather systems pose substantial challenges to accurate predictions. This research introduces a multilayer perceptron model tailored for weather forecasting in Itoshima, Kyushu, Japan. Our meticulously designed archite… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

  9. arXiv:2402.13776  [pdf, other

    eess.IV cs.CV cs.LG

    Cas-DiffCom: Cascaded diffusion model for infant longitudinal super-resolution 3D medical image completion

    Authors: Lianghu Guo, Tianli Tao, Xinyi Cai, Zihao Zhu, Jiawei Huang, Lixuan Zhu, Zhuoyang Gu, Haifeng Tang, Rui Zhou, Siyan Han, Yan Liang, Qing Yang, Dinggang Shen, Han Zhang

    Abstract: Early infancy is a rapid and dynamic neurodevelopmental period for behavior and neurocognition. Longitudinal magnetic resonance imaging (MRI) is an effective tool to investigate such a crucial stage by capturing the developmental trajectories of the brain structures. However, longitudinal MRI acquisition always meets a serious data-missing problem due to participant dropout and failed scans, makin… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  10. arXiv:2402.07067  [pdf, other

    cs.GT cs.LG

    Learning the Expected Core of Strictly Convex Stochastic Cooperative Games

    Authors: Nam Phuong Tran, The Anh Ta, Shuqing Shi, Debmalya Mandal, Yali Du, Long Tran-Thanh

    Abstract: Reward allocation, also known as the credit assignment problem, has been an important topic in economics, engineering, and machine learning. An important concept in reward allocation is the core, which is the set of stable allocations where no agent has the motivation to deviate from the grand coalition. In previous works, computing the core requires either knowledge of the reward function in dete… ▽ More

    Submitted 22 May, 2024; v1 submitted 10 February, 2024; originally announced February 2024.

  11. arXiv:2401.16820  [pdf, other

    cs.CR

    Provably Robust Multi-bit Watermarking for AI-generated Text via Error Correction Code

    Authors: Wenjie Qu, Dong Yin, Zixin He, Wei Zou, Tianyang Tao, **yuan Jia, Jiaheng Zhang

    Abstract: Large Language Models (LLMs) have been widely deployed for their remarkable capability to generate texts resembling human language. However, they could be misused by criminals to create deceptive content, such as fake news and phishing emails, which raises ethical concerns. Watermarking is a key technique to mitigate the misuse of LLMs, which embeds a watermark (e.g., a bit string) into a text gen… ▽ More

    Submitted 15 April, 2024; v1 submitted 30 January, 2024; originally announced January 2024.

  12. arXiv:2312.10988  [pdf, other

    cs.LG cs.SI

    Graph Invariant Learning with Subgraph Co-mixup for Out-Of-Distribution Generalization

    Authors: Tianrui Jia, Haoyang Li, Cheng Yang, Tao Tao, Chuan Shi

    Abstract: Graph neural networks (GNNs) have been demonstrated to perform well in graph representation learning, but always lacking in generalization capability when tackling out-of-distribution (OOD) data. Graph invariant learning methods, backed by the invariance principle among defined multiple environments, have shown effectiveness in dealing with this issue. However, existing methods heavily rely on wel… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: Has been accepted at the 38th AAAI Conference on Artificial Intelligence (AAAI-24)

  13. arXiv:2312.06550  [pdf, other

    cs.CL cs.AI cs.LG

    LLM360: Towards Fully Transparent Open-Source LLMs

    Authors: Zhengzhong Liu, Aurick Qiao, Willie Neiswanger, Hongyi Wang, Bowen Tan, Tianhua Tao, Junbo Li, Yuqi Wang, Suqi Sun, Omkar Pangarkar, Richard Fan, Yi Gu, Victor Miller, Yonghao Zhuang, Guowei He, Haonan Li, Fajri Koto, Li** Tang, Nikhil Ranjan, Zhiqiang Shen, Xuguang Ren, Roberto Iriondo, Cun Mu, Zhiting Hu, Mark Schulze , et al. (3 additional authors not shown)

    Abstract: The recent surge in open-source Large Language Models (LLMs), such as LLaMA, Falcon, and Mistral, provides diverse options for AI practitioners and researchers. However, most LLMs have only released partial artifacts, such as the final model weights or inference code, and technical reports increasingly limit their scope to high-level design choices and surface statistics. These choices hinder prog… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

  14. arXiv:2310.17189  [pdf, other

    cs.CV

    Exploring Iterative Refinement with Diffusion Models for Video Grounding

    Authors: Xiao Liang, Tao Shi, Yaoyuan Liang, Te Tao, Shao-Lun Huang

    Abstract: Video grounding aims to localize the target moment in an untrimmed video corresponding to a given sentence query. Existing methods typically select the best prediction from a set of predefined proposals or directly regress the target span in a single-shot manner, resulting in the absence of a systematical prediction refinement process. In this paper, we propose DiffusionVG, a novel framework with… ▽ More

    Submitted 29 December, 2023; v1 submitted 26 October, 2023; originally announced October 2023.

  15. arXiv:2309.10818  [pdf, other

    cs.CL cs.AI

    SlimPajama-DC: Understanding Data Combinations for LLM Training

    Authors: Zhiqiang Shen, Tianhua Tao, Liqun Ma, Willie Neiswanger, Zhengzhong Liu, Hongyi Wang, Bowen Tan, Joel Hestness, Natalia Vassilieva, Daria Soboleva, Eric Xing

    Abstract: This paper aims to understand the impacts of various data combinations (e.g., web text, Wikipedia, GitHub, books) on the pretraining of large language models using SlimPajama. SlimPajama is a rigorously deduplicated, multi-source dataset, which has been refined and further deduplicated to 627B tokens from the extensive 1.2T token RedPajama dataset contributed by Together. We have termed our resear… ▽ More

    Submitted 9 May, 2024; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: Technical report. Models at: https://huggingface.co/MBZUAI-LLM/SlimPajama-DC and dataset at: https://huggingface.co/datasets/MBZUAI-LLM/SlimPajama-627B-DC

  16. arXiv:2307.04514  [pdf, other

    cs.LG cs.AI

    Improving Heterogeneous Graph Learning with Weighted Mixed-Curvature Product Manifold

    Authors: Tuc Nguyen-Van, Dung D. Le, The-Anh Ta

    Abstract: In graph representation learning, it is important that the complex geometric structure of the input graph, e.g. hidden relations among nodes, is well captured in embedding space. However, standard Euclidean embedding spaces have a limited capacity in representing graphs of varying structures. A promising candidate for the faithful embedding of data with varying structure is product manifolds of co… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  17. arXiv:2307.00885  [pdf, other

    eess.IV cs.CV

    An Explainable Deep Framework: Towards Task-Specific Fusion for Multi-to-One MRI Synthesis

    Authors: Luyi Han, Tianyu Zhang, Yunzhi Huang, Haoran Dou, Xin Wang, Yuan Gao, Chunyao Lu, Tan Tao, Ritse Mann

    Abstract: Multi-sequence MRI is valuable in clinical settings for reliable diagnosis and treatment prognosis, but some sequences may be unusable or missing for various reasons. To address this issue, MRI synthesis is a potential solution. Recent deep learning-based methods have achieved good performance in combining multiple available sequences for missing sequence synthesis. Despite their success, these me… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  18. arXiv:2306.14920  [pdf, other

    cs.LG

    A Cosine Similarity-based Method for Out-of-Distribution Detection

    Authors: Nguyen Ngoc-Hieu, Nguyen Hung-Quang, The-Anh Ta, Thanh Nguyen-Tang, Khoa D Doan, Hoang Thanh-Tung

    Abstract: The ability to detect OOD data is a crucial aspect of practical machine learning applications. In this work, we show that cosine similarity between the test feature and the typical ID feature is a good indicator of OOD data. We propose Class Typical Matching (CTM), a post hoc OOD detection algorithm that uses a cosine similarity scoring function. Extensive experiments on multiple benchmarks show t… ▽ More

    Submitted 23 June, 2023; originally announced June 2023.

    Comments: Accepted paper at ICML 2023 Workshop on Spurious Correlations, Invariance, and Stability. 10 pages (4 main + appendix)

  19. arXiv:2306.08798  [pdf, other

    cs.CL stat.ML

    MPSA-DenseNet: A novel deep learning model for English accent classification

    Authors: Tianyu Song, Linh Thi Hoai Nguyen, Ton Viet Ta

    Abstract: This paper presents three innovative deep learning models for English accent classification: Multi-DenseNet, PSA-DenseNet, and MPSE-DenseNet, that combine multi-task learning and the PSA module attention mechanism with DenseNet. We applied these models to data collected from six dialects of English across native English speaking regions (Britain, the United States, Scotland) and nonnative English… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  20. arXiv:2305.10626  [pdf, other

    cs.CL cs.AI cs.LG

    Language Models Meet World Models: Embodied Experiences Enhance Language Models

    Authors: Jiannan Xiang, Tianhua Tao, Yi Gu, Tianmin Shu, Zirui Wang, Zichao Yang, Zhiting Hu

    Abstract: While large language models (LMs) have shown remarkable capabilities across numerous tasks, they often struggle with simple reasoning and planning in physical environments, such as understanding object permanence or planning household activities. The limitation arises from the fact that LMs are trained only on written text and miss essential embodied knowledge and skills. In this paper, we propose… ▽ More

    Submitted 28 October, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  21. arXiv:2305.08492  [pdf

    cs.CY cs.CR

    On the conformance of Android applications with children's data protection regulations and safeguarding guidelines

    Authors: Ricardo Lopes, Vinh Thong Ta, Ioannis Korkontzelos

    Abstract: With the rapid development of online technologies and the widespread usage of mobile phones among children, it is crucial to protect their online safety. Some studies reported that online abuse and incidents negatively affect children's mental health and development. In this paper, we examine how Android applications follow the rules related to children's data protection in the EU General Data Pro… ▽ More

    Submitted 17 May, 2023; v1 submitted 15 May, 2023; originally announced May 2023.

    Comments: 24 pages (changed the abstract and updated the related works.)

  22. arXiv:2304.10406  [pdf, other

    cs.CV

    LiDAR-NeRF: Novel LiDAR View Synthesis via Neural Radiance Fields

    Authors: Tang Tao, Longfei Gao, Guangrun Wang, Yixing Lao, Peng Chen, Hengshuang Zhao, Dayang Hao, Xiaodan Liang, Mathieu Salzmann, Kaicheng Yu

    Abstract: We introduce a new task, novel view synthesis for LiDAR sensors. While traditional model-based LiDAR simulators with style-transfer neural networks can be applied to render novel views, they fall short of producing accurate and realistic LiDAR patterns because the renderers rely on explicit 3D reconstruction and exploit game engines, that ignore important attributes of LiDAR points. We address thi… ▽ More

    Submitted 14 July, 2023; v1 submitted 20 April, 2023; originally announced April 2023.

    Comments: This paper introduces a new task of novel LiDAR view synthesis, and proposes a differentiable framework called LiDAR-NeRF with a structural regularization, as well as an object-centric multi-view LiDAR dataset called NeRF-MVL

  23. arXiv:2303.07292   

    cs.CL

    Transformer-based approaches to Sentiment Detection

    Authors: Olumide Ebenezer Ojo, Hoang Thang Ta, Alexander Gelbukh, Hiram Calvo, Olaronke Oluwayemisi Adebanji, Grigori Sidorov

    Abstract: The use of transfer learning methods is largely responsible for the present breakthrough in Natural Learning Processing (NLP) tasks across multiple domains. In order to solve the problem of sentiment detection, we examined the performance of four different types of well-known state-of-the-art transformer models for text classification. Models such as Bidirectional Encoder Representations from Tran… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: This submission has been removed from arXiv because the submitter did not have the authority to grant the license at the time of submission

  24. arXiv:2210.12659  [pdf

    cs.CL cs.AI

    Map** Process for the Task: Wikidata Statements to Text as Wikipedia Sentences

    Authors: Hoang Thang Ta, Alexander Gelbukha, Grigori Sidorov

    Abstract: Acknowledged as one of the most successful online cooperative projects in human society, Wikipedia has obtained rapid growth in recent years and desires continuously to expand content and disseminate knowledge values for everyone globally. The shortage of volunteers brings to Wikipedia many issues, including develo** content for over 300 languages at the present. Therefore, the benefit that mach… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: 29 pages

  25. arXiv:2209.13101  [pdf, other

    cs.CL

    WikiDes: A Wikipedia-Based Dataset for Generating Short Descriptions from Paragraphs

    Authors: Hoang Thang Ta, Abu Bakar Siddiqur Rahman, Navonil Majumder, Amir Hussain, Lotfollah Najjar, Newton Howard, Soujanya Poria, Alexander Gelbukh

    Abstract: As free online encyclopedias with massive volumes of content, Wikipedia and Wikidata are key to many Natural Language Processing (NLP) tasks, such as information retrieval, knowledge base building, machine translation, text classification, and text summarization. In this paper, we introduce WikiDes, a novel dataset to generate short descriptions of Wikipedia articles for the problem of text summar… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

    Comments: 27 pages, 8 figures, 15 tables

  26. arXiv:2206.13144  [pdf

    cs.CR

    An Indirect Social Trust Model for Vehicular Social Networks Using Evolving Graph Theory

    Authors: Max Hashem Eiza, Vinh Thong Ta

    Abstract: The increasing importance and consequent challenges of establishing indirect trusted relationships in highly dynamic social networks such as vehicular social networks (VSNs), are investigated in this paper. VSNs are mobile social networks that aim to create social links among travellers on the roads. Besides matching interests between two users, social trust is essential to successfully establish… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

  27. arXiv:2206.05975  [pdf, other

    cs.CL

    On the Learning of Non-Autoregressive Transformers

    Authors: Fei Huang, Tianhua Tao, Hao Zhou, Lei Li, Minlie Huang

    Abstract: Non-autoregressive Transformer (NAT) is a family of text generation models, which aims to reduce the decoding latency by predicting the whole sentences in parallel. However, such latency reduction sacrifices the ability to capture left-to-right dependencies, thereby making NAT learning very challenging. In this paper, we present theoretical and empirical analyses to reveal the challenges of NAT le… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

    Comments: accepted at ICML2022

  28. Linear Delta Arrays for Compliant Dexterous Distributed Manipulation

    Authors: Sarvesh Patil, Tony Tao, Tess Hellebrekers, Oliver Kroemer, F. Zeynep Temel

    Abstract: This paper presents a new type of distributed dexterous manipulator: delta arrays. Our delta array setup consists of 64 linearly-actuated delta robots with 3D-printed compliant linkages. Through the design of the individual delta robots, the modular array structure, and distributed communication and control, we study a wide range of in-plane and out-of-plane manipulations, as well as prehensile ma… ▽ More

    Submitted 14 August, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: ICRA 2023

  29. arXiv:2205.14951  [pdf, other

    cs.CV

    Benchmarking the Robustness of LiDAR-Camera Fusion for 3D Object Detection

    Authors: Kaicheng Yu, Tang Tao, Hongwei Xie, Zhiwei Lin, Zhongwei Wu, Zhongyu Xia, Tingting Liang, Haiyang Sun, Jiong Deng, Dayang Hao, Yongtao Wang, Xiaodan Liang, Bing Wang

    Abstract: There are two critical sensors for 3D perception in autonomous driving, the camera and the LiDAR. The camera provides rich semantic information such as color, texture, and the LiDAR reflects the 3D shape and locations of surrounding objects. People discover that fusing these two modalities can significantly boost the performance of 3D perception models as each modality has complementary informatio… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: Technical report. The first three authors contribute equally

  30. arXiv:2205.05036  [pdf, other

    cs.NI eess.SP

    Multi-agent Reinforcement Learning for Dynamic Resource Management in 6G in-X Subnetworks

    Authors: Xiao Du, Ting Wang, Qiang Feng, Chenhui Ye, Tao Tao, Yuanming Shi, Mingsong Chen

    Abstract: The 6G network enables a subnetwork-wide evolution, resulting in a "network of subnetworks". However, due to the dynamic mobility of wireless subnetworks, the data transmission of intra-subnetwork and inter-subnetwork will inevitably interfere with each other, which poses a great challenge to radio resource management. Moreover, most of the existing approaches require the instantaneous channel gai… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  31. arXiv:2205.00307  [pdf, other

    cs.GR cs.LG cs.RO

    Learning to Get Up

    Authors: Tianxin Tao, Matthew Wilson, Ruiyu Gou, Michiel van de Panne

    Abstract: Getting up from an arbitrary fallen state is a basic human skill. Existing methods for learning this skill often generate highly dynamic and erratic get-up motions, which do not resemble human get-up strategies, or are based on tracking recorded human get-up motions. In this paper, we present a staged approach using reinforcement learning, without recourse to motion capture data. The method first… ▽ More

    Submitted 27 August, 2022; v1 submitted 30 April, 2022; originally announced May 2022.

    Comments: SIGGRAPH 2022. Project page: https://tianxintao.github.io/get_up_control/

  32. arXiv:2204.04905  [pdf, other

    cs.LG cs.CV cs.RO

    Evaluating Vision Transformer Methods for Deep Reinforcement Learning from Pixels

    Authors: Tianxin Tao, Daniele Reda, Michiel van de Panne

    Abstract: Vision Transformers (ViT) have recently demonstrated the significant potential of transformer architectures for computer vision. To what extent can image-based deep reinforcement learning also benefit from ViT architectures, as compared to standard convolutional neural network (CNN) architectures? To answer this question, we evaluate ViT training methods for image-based reinforcement learning (RL)… ▽ More

    Submitted 15 May, 2022; v1 submitted 11 April, 2022; originally announced April 2022.

  33. arXiv:2203.02574  [pdf, other

    cs.CV cs.LG

    Style-ERD: Responsive and Coherent Online Motion Style Transfer

    Authors: Tianxin Tao, Xiaohang Zhan, Zhongquan Chen, Michiel van de Panne

    Abstract: Motion style transfer is a common method for enriching character animation. Motion style transfer algorithms are often designed for offline settings where motions are processed in segments. However, for online animation applications, such as realtime avatar animation from motion capture, motions need to be processed as a stream with minimal latency. In this work, we realize a flexible, high-qualit… ▽ More

    Submitted 28 March, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

    Comments: CVPR 2022, project page: https://tianxintao.github.io/Online-Motion-Style-Transfer

  34. arXiv:2112.11661  [pdf

    cs.RO eess.SY physics.app-ph physics.chem-ph

    New metal-plastic hybrid additive manufacturing strategy: Fabrication of arbitrary metal-patterns on external and even internal surfaces of 3D plastic structures

    Authors: Kewei Song, Yue Cui, Tiannan Tao, Xiangyi Meng, Michinari Sone, Masahiro Yoshino, Shinjiro Umezu, Hirotaka Sato

    Abstract: Constructing precise micro-nano metal patterns on complex three-dimensional (3D) plastic parts allows the fabrication of functional devices for advanced applications. However, this patterning is currently expensive and requires complex processes with long manufacturing lead time. The present work demonstrates a process for the fabrication of micro-nano 3D metal-plastic composite structures with ar… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

  35. arXiv:2110.02525  [pdf, other

    cs.IT

    User Scheduling and Power Allocation for Precoded Multi-Beam High Throughput Satellite Systems with Individual Quality of Service Constraints

    Authors: Trinh Van Chien, Eva Lagunas, Tung Hai Ta, Symeon Chatzinotas, Björn Ottersten

    Abstract: For extensive coverage areas, multi-beam high throughput satellite (MB-HTS) communication is a promising technology that plays a crucial role in delivering broadband services to many users with diverse Quality of Service (QoS) requirements. This paper focuses on MB-HTS systems where all beams reuse the same spectrum. In particular, we propose a novel user scheduling and power allocation design cap… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: 14 pages, 8 figures, and 1 table. Submitted to the IEEE for publication. arXiv admin note: substantial text overlap with arXiv:2106.12873

  36. arXiv:2108.13599  [pdf, other

    cs.RO

    Through the Looking Glass: Diminishing Occlusions in Robot Vision Systems with Mirror Reflections

    Authors: Kentaro Yoshioka, Hidenori Okuni, Tuan Thanh Ta, Akihide Sai

    Abstract: The quality of robot vision greatly affects the performance of automation systems, where occlusions stand as one of the biggest challenges. If the target is occluded from the sensor, detecting and gras** such objects become very challenging. For example, when multiple robot arms cooperate in a single workplace, occlusions will be created under the robot arm itself and hide objects underneath. Wh… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: Accepted to IROS 2021

  37. arXiv:2106.15078  [pdf, other

    cs.CL cs.AI

    Don't Take It Literally: An Edit-Invariant Sequence Loss for Text Generation

    Authors: Guangyi Liu, Zichao Yang, Tianhua Tao, Xiaodan Liang, Junwei Bao, Zhen Li, Xiaodong He, Shuguang Cui, Zhiting Hu

    Abstract: Neural text generation models are typically trained by maximizing log-likelihood with the sequence cross entropy (CE) loss, which encourages an exact token-by-token match between a target sequence with a generated sequence. Such training objective is sub-optimal when the target sequence is not perfect, e.g., when the target sequence is corrupted with noises, or when only weak sequence supervision… ▽ More

    Submitted 7 May, 2022; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: Camera ready, 2022 NAACL main conference

  38. arXiv:2106.12873  [pdf, other

    cs.IT

    User Scheduling for Precoded Satellite Systems with Individual Quality of Service Constraints

    Authors: Trinh Van Chien, Eva Lagunas, Tung Hai Ta, Symeon Chatzinotas, Björn Ottersten

    Abstract: Multibeam high throughput satellite (MB-HTS) systems will play a key role in delivering broadband services to a large number of users with diverse Quality of Service (QoS) requirements. This paper focuses on MB-HTS where the same spectrum is re-used by all user links and, in particular, we propose a novel user scheduling design capable to provide guarantees in terms of individual QoS requirements… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

    Comments: 6 pages,2 figures, Accepted to present at PIMRC 2021

  39. Augmenting Zero Trust Architecture to Endpoints Using Blockchain: A State-of-The-Art Review

    Authors: Lampis Alevizos, Vinh Thong Ta, Max Hashem Eiza

    Abstract: With the purpose of defending against lateral movement in today's borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. With a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorised session of a compromised endpoint can be leveraged t… ▽ More

    Submitted 15 November, 2021; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: (1) Fixed the reference numbering (2) Fixed syntax errors, improvements (3) document re-structured

    Journal ref: Security and Privacy. 2021;e191

  40. arXiv:2012.14142  [pdf, other

    eess.IV cs.CV

    Perception Consistency Ultrasound Image Super-resolution via Self-supervised CycleGAN

    Authors: Heng Liu, Jianyong Liu, Tao Tao, Shudong Hou, Jungong Han

    Abstract: Due to the limitations of sensors, the transmission medium and the intrinsic properties of ultrasound, the quality of ultrasound imaging is always not ideal, especially its low spatial resolution. To remedy this situation, deep learning networks have been recently developed for ultrasound image super-resolution (SR) because of the powerful approximation capability. However, most current supervised… ▽ More

    Submitted 28 December, 2020; originally announced December 2020.

  41. Learning to Locomote: Understanding How Environment Design Matters for Deep Reinforcement Learning

    Authors: Daniele Reda, Tianxin Tao, Michiel van de Panne

    Abstract: Learning to locomote is one of the most common tasks in physics-based animation and deep reinforcement learning (RL). A learned policy is the product of the problem to be solved, as embodied by the RL environment, and the RL algorithm. While enormous attention has been devoted to RL algorithms, much less is known about the impact of design choices for the RL environment. In this paper, we show tha… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: Presented at The 13th Annual ACM SIGGRAPH Conference on Motion, Interaction and Games

  42. arXiv:2008.08936  [pdf, other

    cs.CR cs.LO cs.SE

    DataProVe: A Data Protection Policy and System Architecture Verification Tool

    Authors: Vinh Thong Ta

    Abstract: In this paper, we propose a tool, called DataProVe, for specifying high-level data protection policies and system architectures, as well as verifying the conformance between them in a fully automated way. The syntax of the policies and the architectures is based on semi-formal languages, and the automated verification engine relies on logic and resolution based proofs. The functionality and operat… ▽ More

    Submitted 17 December, 2020; v1 submitted 20 August, 2020; originally announced August 2020.

    Comments: 65 pages. Improved algorithm description and explanation. Semantics of policy language added. More complete list of properties, and inference rules added. More figures and discussion section added. Finally, we refer to this version in our (shorter) paper under review

  43. arXiv:2007.03152  [pdf, other

    cs.AR

    The gem5 Simulator: Version 20.0+

    Authors: Jason Lowe-Power, Abdul Mutaal Ahmad, Ayaz Akram, Mohammad Alian, Rico Amslinger, Matteo Andreozzi, Adrià Armejach, Nils Asmussen, Brad Beckmann, Srikant Bharadwaj, Gabe Black, Gedare Bloom, Bobby R. Bruce, Daniel Rodrigues Carvalho, Jeronimo Castrillon, Lizhong Chen, Nicolas Derumigny, Stephan Diestelhorst, Wendy Elsasser, Carlos Escuin, Marjan Fariborz, Amin Farmahini-Farahani, Pouya Fotouhi, Ryan Gambord, Jayneel Gandhi , et al. (53 additional authors not shown)

    Abstract: The open-source and community-supported gem5 simulator is one of the most popular tools for computer architecture research. This simulation infrastructure allows researchers to model modern computer hardware at the cycle level, and it has enough fidelity to boot unmodified Linux-based operating systems and run full applications for multiple architectures including x86, Arm, and RISC-V. The gem5 si… ▽ More

    Submitted 29 September, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Source, comments, and feedback: https://github.com/darchr/gem5-20-paper

  44. arXiv:1911.04293  [pdf, ps, other

    math.OC cs.LG stat.ML

    Error bound of critical points and KL property of exponent $1/2$ for squared F-norm regularized factorization

    Authors: Ting Tao, Shaohua Pan, Shujun Bi

    Abstract: This paper is concerned with the squared F(robenius)-norm regularized factorization form for noisy low-rank matrix recovery problems. Under a suitable assumption on the restricted condition number of the Hessian for the loss function, we derive an error bound to the true matrix for the non-strict critical points with rank not more than that of the true matrix. Then, for the squared F-norm regulari… ▽ More

    Submitted 26 June, 2021; v1 submitted 11 November, 2019; originally announced November 2019.

  45. arXiv:1908.09078  [pdf, other

    math.OC cs.LG stat.ML

    KL property of exponent $1/2$ of $\ell_{2,0}$-norm and DC regularized factorizations for low-rank matrix recovery

    Authors: Shujun Bi, Ting Tao, Shaohua Pan

    Abstract: This paper is concerned with the factorization form of the rank regularized loss minimization problem. To cater for the scenario in which only a coarse estimation is available for the rank of the true matrix, an $\ell_{2,0}$-norm regularized term is added to the factored loss function to reduce the rank adaptively; and account for the ambiguities in the factorization, a balanced term is then intro… ▽ More

    Submitted 23 August, 2019; originally announced August 2019.

    Comments: 29 pages, 3 figures

  46. arXiv:1705.10930  [pdf, other

    physics.ins-det cs.CV physics.optics

    Micro Fourier Transform Profilometry ($μ$FTP): 3D shape measurement at 10,000 frames per second

    Authors: Chao Zuo, Tianyang Tao, Shijie Feng, Lei Huang, Anand Asundi, Qian Chen

    Abstract: Recent advances in imaging sensors and digital light projection technology have facilitated a rapid progress in 3D optical sensing, enabling 3D surfaces of complex-shaped objects to be captured with improved resolution and accuracy. However, due to the large number of projection patterns required for phase recovery and disambiguation, the maximum fame rates of current 3D shape measurement techniqu… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

    Comments: This manuscript was originally submitted on 30th January 17

  47. arXiv:1606.01010  [pdf, other

    cs.CR

    Automated Road Traffic Congestion Detection and Alarm Systems: Incorporating V2I communications into ATCSs

    Authors: Vinh Thong Ta

    Abstract: In this position paper, we address the problems of automated road congestion detection and alerting systems and their security properties. We review different theoretical adaptive road traffic control approaches, and three widely deployed adaptive traffic control systems (ATCSs), namely, SCATS, SCOOT and InSync. We then discuss some related research questions, and the corresponding possible approa… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    Comments: 31 pages

    MSC Class: 68-02

  48. arXiv:1511.01249  [pdf, other

    cs.CR

    Privacy by Design: On the Formal Design and Conformance Check of Personal Data Protection Policies and Architectures

    Authors: Vinh Thong Ta

    Abstract: The new General Data Protection Regulation (GDPR) will take effect in May 2018, and hence, designing compliant data protection policies and system architectures became crucial for organizations to avoid penalties. Unfortunately, the regulations given in a textual format can be easily misinterpreted by the policy and system designers, which also making the conformance check error-prone for auditors… ▽ More

    Submitted 14 May, 2018; v1 submitted 4 November, 2015; originally announced November 2015.

    Comments: 41 pages, 2 figures

  49. arXiv:1501.02155  [pdf, ps, other

    math.MG cs.LO

    A formal proof of the Kepler conjecture

    Authors: Thomas Hales, Mark Adams, Gertrud Bauer, Dat Tat Dang, John Harrison, Truong Le Hoang, Cezary Kaliszyk, Victor Magron, Sean McLaughlin, Thang Tat Nguyen, Truong Quang Nguyen, Tobias Nipkow, Steven Obua, Joseph Pleso, Jason Rute, Alexey Solovyev, An Hoai Thi Ta, Trung Nam Tran, Diep Thi Trieu, Josef Urban, Ky Khac Vu, Roland Zumkeller

    Abstract: This article describes a formal proof of the Kepler conjecture on dense sphere packings in a combination of the HOL Light and Isabelle proof assistants. This paper constitutes the official published account of the now completed Flyspeck project.

    Submitted 9 January, 2015; originally announced January 2015.

    Comments: 21 pages

  50. Improving Smartphone Battery Life Utilizing Device-to-device Cooperative Relays Underlaying LTE Networks

    Authors: Tuan Ta, John S. Baras, Chenxi Zhu

    Abstract: The utility of smartphones has been limited to a great extent by their short battery life. In this work, we propose a new approach to prolonging smartphone battery life. We introduce the notions of "valueless" and "valued battery", as being the available battery when the user does or does not have access to a power source, respectively. We propose a cooperative system where users with high battery… ▽ More

    Submitted 22 January, 2014; originally announced January 2014.

    Comments: Accepted at IEEE ICC 2014