Skip to main content

Showing 1–50 of 168 results for author: Xing, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16253  [pdf, other

    cs.CL

    LLMs Assist NLP Researchers: Critique Paper (Meta-)Reviewing

    Authors: Jiangshu Du, Yibo Wang, Wenting Zhao, Zhongfen Deng, Shuaiqi Liu, Renze Lou, Henry Peng Zou, Pranav Narayanan Venkit, Nan Zhang, Mukund Srinath, Haoran Ranran Zhang, Vipul Gupta, Yinghui Li, Tao Li, Fei Wang, Qin Liu, Tianlin Liu, Pengzhi Gao, Congying Xia, Chen Xing, Jiayang Cheng, Zhaowei Wang, Ying Su, Raj Sanjay Shah, Ruohao Guo , et al. (15 additional authors not shown)

    Abstract: This work is motivated by two key trends. On one hand, large language models (LLMs) have shown remarkable versatility in various generative tasks such as writing, drawing, and question answering, significantly reducing the time required for many routine tasks. On the other hand, researchers, whose work is not only time-consuming but also highly expertise-demanding, face increasing challenges as th… ▽ More

    Submitted 25 June, 2024; v1 submitted 23 June, 2024; originally announced June 2024.

  2. arXiv:2406.10158  [pdf, other

    cs.DB cs.DC

    Harnessing GPU Power for Enhanced OLTP: A Study in Concurrency Control Schemes

    Authors: Zihan Sun, Yong Zhang, Chao Li, Chunxiao Xing

    Abstract: GPUs, whose performance has gone through a huge leap over the past decade, have proved their ability to accelerate Online Analytical Processing (OLAP) operations. On the other hand, there is still a huge gap in the field of GPU-accelerated Online Transaction Processing (OLTP) operations since it was generally believed that GPUswere not suitable for OLTP in the past. However, the massive parallelis… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  3. arXiv:2406.06038  [pdf, other

    cs.RO

    Navigation and 3D Surface Reconstruction from Passive Whisker Sensing

    Authors: Michael A. Lin, Hao Li, Chengyi Xing, Mark R. Cutkosky

    Abstract: Whiskers provide a way to sense surfaces in the immediate environment without disturbing it. In this paper we present a method for using highly flexible, curved, passive whiskers mounted along a robot arm to gather sensory data as they brush past objects during normal robot motion. The information is useful both for guiding the robot in cluttered spaces and for reconstructing the exposed faces of… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: arXiv admin note: text overlap with arXiv:2210.12387

  4. arXiv:2406.05462  [pdf, other

    cs.DB

    MatrixGate: A High-performance Data Ingestion Tool for Time-series Databases

    Authors: Shuhui Wang, Zihan Sun, Chaochen Hu, Chao Li, Yong Zhang, Yandong Yao, Hao Wang, Chunxiao Xing

    Abstract: Recent years have seen massive time-series data generated in many areas. This different scenario brings new challenges, particularly in terms of data ingestion, where existing technologies struggle to handle such massive time-series data, leading to low loading speed and poor timeliness. To address these challenges, this paper presents MatrixGate, a new and efficient data ingestion approach for ma… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  5. arXiv:2405.19291  [pdf, other

    cs.RO

    Grasp as You Say: Language-guided Dexterous Grasp Generation

    Authors: Yi-Lin Wei, Jian-Jian Jiang, Chengyi Xing, Xiantuo Tan, Xiao-Ming Wu, Hao Li, Mark Cutkosky, Wei-Shi Zheng

    Abstract: This paper explores a novel task ""Dexterous Grasp as You Say"" (DexGYS), enabling robots to perform dexterous gras** based on human commands expressed in natural language. However, the development of this field is hindered by the lack of datasets with natural human guidance; thus, we propose a language-guided dexterous grasp dataset, named DexGYSNet, offering high-quality dexterous grasp annota… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 9 pages, 7 figures

  6. arXiv:2404.15815  [pdf, other

    cs.CV

    Single-View Scene Point Cloud Human Grasp Generation

    Authors: Yan-Kang Wang, Chengyi Xing, Yi-Lin Wei, Xiao-Ming Wu, Wei-Shi Zheng

    Abstract: In this work, we explore a novel task of generating human grasps based on single-view scene point clouds, which more accurately mirrors the typical real-world situation of observing objects from a single viewpoint. Due to the incompleteness of object point clouds and the presence of numerous scene points, the generated hand is prone to penetrating into the invisible parts of the object and the mod… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  7. arXiv:2404.13230  [pdf, other

    cs.IT math.CO

    Random Gabidulin Codes Achieve List Decoding Capacity in the Rank Metric

    Authors: Zeyu Guo, Chen Yuan, Zihan Zhang

    Abstract: Gabidulin codes, serving as the rank-metric counterpart of Reed-Solomon codes, constitute an important class of maximum rank distance (MRD) codes. However, unlike the fruitful positive results about the list decoding of Reed-Solomon codes, results concerning the list decodability of Gabidulin codes in the rank metric are all negative so far. For example, in contrast to Reed-Solomon codes, which ar… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  8. arXiv:2402.18667  [pdf, other

    cs.CL

    FOFO: A Benchmark to Evaluate LLMs' Format-Following Capability

    Authors: Congying Xia, Chen Xing, Jiangshu Du, Xinyi Yang, Yihao Feng, Ran Xu, Wenpeng Yin, Caiming Xiong

    Abstract: This paper presents FoFo, a pioneering benchmark for evaluating large language models' (LLMs) ability to follow complex, domain-specific formats, a crucial yet underexamined capability for their application as AI agents. Despite LLMs' advancements, existing benchmarks fail to assess their format-following proficiency adequately. FoFo fills this gap with a diverse range of real-world formats and in… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: The first two authors contributed equally

  9. arXiv:2402.09898  [pdf, ps, other

    cs.IT

    Asymptotic construction of locally repairable codes with multiple recovering sets

    Authors: Singsong Li, Shu Liu, Liming Ma, Abstract: Locally repairable codes have been extensively investigated due to practical applications in distributed and cloud storage systems in recent years. However, not much work on asymptotic behavior of locally repairable codes has been done. In particular, there is few result on constructive lower bound of asymptotic behavior of locally repairable codes with multiple recovering sets. In this paper, we… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  10. arXiv:2401.14008  [pdf, other

    cs.IT eess.SP

    Massive Unsourced Random Access for Near-Field Communications

    Authors: Xinyu Xie, Yongpeng Wu, Jian** An, Derrick Wing Kwan Ng, Chengwen Xing, Wenjun Zhang

    Abstract: This paper investigates the unsourced random access (URA) problem with a massive multiple-input multiple-output receiver that serves wireless devices in the near-field of radiation. We employ an uncoupled transmission protocol without appending redundancies to the slot-wise encoded messages. To exploit the channel sparsity for block length reduction while facing the collapsed sparse structure in t… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted by IEEE Transactions on Communications

  11. arXiv:2312.15873  [pdf, other

    cs.NI eess.SY

    Investigating Inter-Satellite Link Spanning Patterns on Networking Performance in Mega-constellations

    Authors: Xiangtong Wang, Xiaodong Han, Menglong Yang, Chuan Xing, Yuqi Wang, Songchen Han, Wei Li

    Abstract: Low Earth orbit (LEO) mega-constellations rely on inter-satellite links (ISLs) to provide global connectivity. We note that in addition to the general constellation parameters, the ISL spanning patterns are also greatly influence the final network structure and thus the network performance. In this work, we formulate the ISL spanning patterns, apply different patterns to mega-constellation and g… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

    Comments: 5pages

  12. arXiv:2312.02443  [pdf, other

    cs.IR cs.AI

    E4SRec: An Elegant Effective Efficient Extensible Solution of Large Language Models for Sequential Recommendation

    Authors: Xinhang Li, Chong Chen, Xiangyu Zhao, Yong Zhang, Chunxiao Xing

    Abstract: The recent advancements in Large Language Models (LLMs) have sparked interest in harnessing their potential within recommender systems. Since LLMs are designed for natural language tasks, existing recommendation approaches have predominantly transformed recommendation tasks into open-domain natural language generation tasks. However, this approach necessitates items to possess rich semantic inform… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

  13. arXiv:2311.11574  [pdf, other

    cs.IT

    A Framework on Complex Matrix Derivatives with Special Structure Constraints for Wireless Systems

    Authors: Xin Ju, Shiqi Gong, Nan Zhao, Chengwen Xing, Arumugam Nallanathan, Dusit Niyato

    Abstract: Matrix-variate optimization plays a central role in advanced wireless system designs. In this paper, we aim to explore optimal solutions of matrix variables under two special structure constraints using complex matrix derivatives, including diagonal structure constraints and constant modulus constraints, both of which are closely related to the state-of-the-art wireless applications. Specifically,… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  14. arXiv:2310.14462  [pdf, ps, other

    cs.CC cs.DM

    Fast Fourier transform via automorphism groups of rational function fields

    Authors: Songsong Li, Abstract: The Fast Fourier Transform (FFT) over a finite field $\mathbb{F}_q$ computes evaluations of a given polynomial of degree less than $n$ at a specifically chosen set of $n$ distinct evaluation points in $\mathbb{F}_q$. If $q$ or $q-1$ is a smooth number, then the divide-and-conquer approach leads to the fastest known FFT algorithms. Depending on the type of group that the set of evaluation points fo… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

  15. arXiv:2310.14219  [pdf, ps, other

    cs.IT

    Nonlinear Codes with Low Redundancy

    Authors: Shu Liu, Abstract: Determining the largest size, or equivalently finding the lowest redundancy, of q-ary codes for given length and minimum distance is one of the central and fundamental problems in coding theory. Inspired by the construction of Varshamov-Tenengolts (VT for short) codes via check-sums, we provide an explicit construction of nonlinear codes with lower redundancy than linear codes under the same lengt… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

  16. arXiv:2310.06830  [pdf, other

    cs.CL

    Lemur: Harmonizing Natural Language and Code for Language Agents

    Authors: Yiheng Xu, Hong** Su, Chen Xing, Boyu Mi, Qian Liu, Weijia Shi, Binyuan Hui, Fan Zhou, Yitao Liu, Tianbao Xie, Zhoujun Cheng, Siheng Zhao, Lingpeng Kong, Bailin Wang, Caiming Xiong, Tao Yu

    Abstract: We introduce Lemur and Lemur-Chat, openly accessible language models optimized for both natural language and coding capabilities to serve as the backbone of versatile language agents. The evolution from language chat models to functional language agents demands that models not only master human interaction, reasoning, and planning but also ensure grounding in the relevant environments. This calls… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  17. arXiv:2310.00615  [pdf, other

    cs.CV

    Scene-aware Human Motion Forecasting via Mutual Distance Prediction

    Authors: Chaoyue Xing, Wei Mao, Miaomiao Liu

    Abstract: In this paper, we tackle the problem of scene-aware 3D human motion forecasting. A key challenge of this task is to predict future human motions that are consistent with the scene by modeling the human-scene interactions. While recent works have demonstrated that explicit constraints on human-scene interactions can prevent the occurrence of ghost motion, they only provide constraints on partial hu… ▽ More

    Submitted 4 April, 2024; v1 submitted 1 October, 2023; originally announced October 2023.

  18. arXiv:2309.09865  [pdf, other

    cs.RO cs.CV

    Contrastive Learning for Enhancing Robust Scene Transfer in Vision-based Agile Flight

    Authors: Jiaxu Xing, Leonard Bauersfeld, Yunlong Song, Chunwei Xing, Davide Scaramuzza

    Abstract: Scene transfer for vision-based mobile robotics applications is a highly relevant and challenging problem. The utility of a robot greatly depends on its ability to perform a task in the real world, outside of a well-controlled lab environment. Existing scene transfer end-to-end policy learning approaches often suffer from poor sample efficiency or limited generalization capabilities, making them u… ▽ More

    Submitted 29 February, 2024; v1 submitted 18 September, 2023; originally announced September 2023.

    Journal ref: IEEE International Conference on Robotics and Automation (ICRA), 2024

  19. arXiv:2309.03450  [pdf, other

    cs.CL cs.AI cs.LG

    XGen-7B Technical Report

    Authors: Erik Nijkamp, Tian Xie, Hiroaki Hayashi, Bo Pang, Congying Xia, Chen Xing, Jesse Vig, Semih Yavuz, Philippe Laban, Ben Krause, Senthil Purushwalkam, Tong Niu, Wojciech Kryściński, Lidiya Murakhovs'ka, Prafulla Kumar Choubey, Alex Fabbri, Ye Liu, Rui Meng, Lifu Tu, Meghana Bhat, Chien-Sheng Wu, Silvio Savarese, Yingbo Zhou, Shafiq Joty, Caiming Xiong

    Abstract: Large Language Models (LLMs) have become ubiquitous across various domains, transforming the way we interact with information and conduct research. However, most high-performing LLMs remain confined behind proprietary walls, hindering scientific progress. Most open-source LLMs, on the other hand, are limited in their ability to support longer sequence lengths, which is a key requirement for many t… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  20. arXiv:2307.14726  [pdf, other

    cs.CV cs.GR

    P2C: Self-Supervised Point Cloud Completion from Single Partial Clouds

    Authors: Ruikai Cui, Shi Qiu, Saeed Anwar, Jiawei Liu, Chaoyue Xing, **g Zhang, Nick Barnes

    Abstract: Point cloud completion aims to recover the complete shape based on a partial observation. Existing methods require either complete point clouds or multiple partial observations of the same object for learning. In contrast to previous approaches, we present Partial2Complete (P2C), the first self-supervised framework that completes point cloud objects using training samples consisting of only a sing… ▽ More

    Submitted 27 July, 2023; originally announced July 2023.

    Comments: Accepted to ICCV 2023

  21. arXiv:2307.08631  [pdf, ps, other

    cs.IT eess.SP

    Dual-Functional MIMO Beamforming Optimization for RIS-Aided Integrated Sensing and Communication

    Authors: Xin Zhao, Heng Liu, Shiqi Gong, Xin Ju, Chengwen Xing, Nan Zhao

    Abstract: Aiming at providing wireless communication systems with environment-perceptive capacity, emerging integrated sensing and communication (ISAC) technologies face multiple difficulties, especially in balancing the performance trade-off between the communication and radar functions. In this paper, we introduce a reconfigurable intelligent surface (RIS) to assist both data transmission and target detec… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: 30 pages, 8 figures, manuscript submitted to IEEE TCOM

  22. arXiv:2307.00856  [pdf, other

    cs.IR cs.AI

    OpenSiteRec: An Open Dataset for Site Recommendation

    Authors: Xinhang Li, Xiangyu Zhao, Ye**g Wang, Yu Liu, Yong Li, Cheng Long, Yong Zhang, Chunxiao Xing

    Abstract: As a representative information retrieval task, site recommendation, which aims at predicting the optimal sites for a brand or an institution to open new branches in an automatic data-driven way, is beneficial and crucial for brand development in modern business. However, there is no publicly available dataset so far and most existing approaches are limited to an extremely small scope of brands, w… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  23. arXiv:2307.00221  [pdf, ps, other

    cs.IT

    Codes with Biochemical Constraints and Single Error Correction for DNA-Based Data Storage

    Authors: Shu Liu, Yaqian Zhang

    Abstract: In DNA-based data storage, DNA codes with biochemical constraints and error correction are designed to protect data reliability. Single-stranded DNA sequences with secondary structure avoidance (SSA) help to avoid undesirable secondary structures which may cause chemical inactivity. Homopolymer run-length limit and GC-balanced limit also help to reduce the error probability of DNA sequences during… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

  24. arXiv:2306.06819  [pdf, other

    cs.CL cs.LG eess.AS

    Multimodal Audio-textual Architecture for Robust Spoken Language Understanding

    Authors: Anderson R. Avila, Mehdi Rezagholizadeh, Chao Xing

    Abstract: Recent voice assistants are usually based on the cascade spoken language understanding (SLU) solution, which consists of an automatic speech recognition (ASR) engine and a natural language understanding (NLU) system. Because such approach relies on the ASR output, it often suffers from the so-called ASR error propagation. In this work, we investigate impacts of this ASR error propagation on state-… ▽ More

    Submitted 13 June, 2023; v1 submitted 11 June, 2023; originally announced June 2023.

  25. arXiv:2306.02868  [pdf, ps, other

    cs.IT

    Explicit Construction of q-ary 2-deletion Correcting Codes with Low Redundancy

    Authors: Shu Liu, Ivan Tjuawinata, Abstract: We consider the problem of efficient construction of q-ary 2-deletion correcting codes with low redundancy. We show that our construction requires less redundancy than any existing efficiently encodable q-ary 2-deletion correcting codes. Precisely speaking, we present an explicit construction of a q-ary 2-deletion correcting code with redundancy 5 log(n)+10log(log(n)) + 3 log(q)+O(1). Using a mino… ▽ More

    Submitted 9 June, 2023; v1 submitted 5 June, 2023; originally announced June 2023.

  26. arXiv:2306.00110  [pdf, other

    cs.SD cs.AI cs.CL cs.LG cs.MM eess.AS

    MuseCoco: Generating Symbolic Music from Text

    Authors: Peiling Lu, Xin Xu, Chenfei Kang, Botao Yu, Chengyi Xing, Xu Tan, Jiang Bian

    Abstract: Generating music from text descriptions is a user-friendly mode since the text is a relatively easy interface for user engagement. While some approaches utilize texts to control music audio generation, editing musical elements in generated audio is challenging for users. In contrast, symbolic music offers ease of editing, making it more accessible for users to manipulate specific musical elements.… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  27. arXiv:2305.12769  [pdf, ps, other

    quant-ph cs.IT

    Constructions of $k$-uniform states in heterogeneous systems

    Authors: Keqin Feng, Lingfei **, Chen Yuan

    Abstract: A pure quantum state of $n$ parties associated with the Hilbert space $\CC^{d_1}\otimes \CC^{d_2}\otimes\cdots\otimes \CC^{d_n}$ is called $k$-uniform if all the reductions to $k$-parties are maximally mixed. The $n$ partite system is called homogenous if the local dimension $d_1=d_2=\cdots=d_n$, while it is called heterogeneous if the local dimension are not all equal. $k$-uniform sates play an i… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

  28. arXiv:2303.16891  [pdf, other

    cs.CV

    Mask-free OVIS: Open-Vocabulary Instance Segmentation without Manual Mask Annotations

    Authors: Vibashan VS, Ning Yu, Chen Xing, Can Qin, Mingfei Gao, Juan Carlos Niebles, Vishal M. Patel, Ran Xu

    Abstract: Existing instance segmentation models learn task-specific information using manual mask annotations from base (training) categories. These mask annotations require tremendous human effort, limiting the scalability to annotate novel (new) categories. To alleviate this problem, Open-Vocabulary (OV) methods leverage large-scale image-caption pairs and vision-language models to learn novel categories.… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023. Project site: https://vibashan.github.io/ovis-web/

  29. IMF: Interactive Multimodal Fusion Model for Link Prediction

    Authors: Xinhang Li, Xiangyu Zhao, Jiaxing Xu, Yong Zhang, Chunxiao Xing

    Abstract: Link prediction aims to identify potential missing triples in knowledge graphs. To get better results, some recent studies have introduced multimodal information to link prediction. However, these methods utilize multimodal information separately and neglect the complicated interaction between different modalities. In this paper, we aim at better modeling the inter-modality information and thus in… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

    Comments: 9 pages, 7 figures, 4 tables, WWW'2023

  30. arXiv:2303.10056  [pdf, other

    cs.CV cs.MM

    GlueGen: Plug and Play Multi-modal Encoders for X-to-image Generation

    Authors: Can Qin, Ning Yu, Chen Xing, Shu Zhang, Zeyuan Chen, Stefano Ermon, Yun Fu, Caiming Xiong, Ran Xu

    Abstract: Text-to-image (T2I) models based on diffusion processes have achieved remarkable success in controllable image generation using user-provided captions. However, the tight coupling between the current text encoder and image decoder in T2I models makes it challenging to replace or upgrade. Such changes often require massive fine-tuning or even training from scratch with the prohibitive expense. To a… ▽ More

    Submitted 2 November, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Comments: ICCV 2023

  31. arXiv:2302.01032  [pdf, other

    cs.SE

    A novel failure indexing approach with run-time values of program variables

    Authors: Yi Song, Xihao Zhang, Xiaoyuan Xie, Quanming Liu, Ruizhi Gao, Chenliang Xing

    Abstract: Failures with different root causes can disturb multi-fault localization significantly, therefore, dividing failures into distinct groups according to the responsible faults is highly important. In such a failure indexing task, the crux lies in the failure proximity, which involves two points, i.e., how to effectively represent failures (e.g., extract the signature of failures) and how to properly… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

  32. arXiv:2212.05171  [pdf, other

    cs.CV

    ULIP: Learning a Unified Representation of Language, Images, and Point Clouds for 3D Understanding

    Authors: Le Xue, Mingfei Gao, Chen Xing, Roberto Martín-Martín, Jiajun Wu, Caiming Xiong, Ran Xu, Juan Carlos Niebles, Silvio Savarese

    Abstract: The recognition capabilities of current state-of-the-art 3D models are limited by datasets with a small number of annotated data and a pre-defined set of categories. In its 2D counterpart, recent advances have shown that similar problems can be significantly alleviated by employing knowledge from other modalities, such as language. Inspired by this, leveraging multimodal information for 3D modalit… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 December, 2022; originally announced December 2022.

    Comments: Accepted by CVPR 2023

  33. arXiv:2211.06606  [pdf, other

    cs.IT

    A Lower Bound on the List-Decodability of Insdel Codes

    Authors: Shu Liu, Ivan Tjuawinata, Abstract: For codes equipped with metrics such as Hamming metric, symbol pair metric or cover metric, the Johnson bound guarantees list-decodability of such codes. That is, the Johnson bound provides a lower bound on the list-decoding radius of a code in terms of its relative minimum distance $δ$, list size $L$ and the alphabet size $q.$ For study of list-decodability of codes with insertion and deletion er… ▽ More

    Submitted 12 August, 2023; v1 submitted 12 November, 2022; originally announced November 2022.

  34. arXiv:2210.12647  [pdf, ps, other

    cs.IT

    Binary sequences with a low correlation via cyclotomic function fields with odd characteristics

    Authors: Lingfei **, Liming Ma, Abstract: Sequences with a low correlation have very important applications in communications, cryptography, and compressed sensing. In the literature, many efforts have been made to construct good sequences with various lengths where binary sequences attracts great attention. As a result, various constructions of good binary sequences have been proposed. However, most of the known constructions made use of… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:2107.11766

  35. arXiv:2210.12587  [pdf, other

    cs.CL

    Model ensemble instead of prompt fusion: a sample-specific knowledge transfer method for few-shot prompt tuning

    Authors: Xiangyu Peng, Chen Xing, Prafulla Kumar Choubey, Chien-Sheng Wu, Caiming Xiong

    Abstract: Prompt tuning approaches, which learn task-specific soft prompts for a downstream task conditioning on frozen pre-trained models, have attracted growing interest due to its parameter efficiency. With large language models and sufficient training data, prompt tuning performs comparably to full-model tuning. However, with limited training samples in few-shot settings, prompt tuning fails to match th… ▽ More

    Submitted 1 March, 2023; v1 submitted 22 October, 2022; originally announced October 2022.

  36. arXiv:2209.10843  [pdf, ps, other

    cs.IT eess.SP

    A Unified Joint Optimization of Training Sequences and Transceivers Based on Matrix-Monotonic Optimization

    Authors: Chengwen Xing, Tao Yu, **peng Song, Zhong Zheng, Lian Zhao, Lajos Hanzo

    Abstract: Channel estimation and data transmission constitute the most fundamental functional modules of multiple-input multiple-output (MIMO) communication systems. The underlying key tasks corresponding to these modules are training sequence optimization and transceiver optimization. Hence, we jointly optimize the linear transmit precoder and the training sequence of MIMO systems using the metrics of thei… ▽ More

    Submitted 17 July, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: 39 pages, 9 figures, 1 table, manuscript accepted in IEEE TVT

  37. arXiv:2208.14569  [pdf, ps, other

    cs.IT

    A new construction of nonlinear codes via algebraic function fields

    Authors: Shu Liu, Liming Ma, Ting-Yi Wu, Abstract: In coding theory, constructing codes with good parameters is one of the most important and fundamental problems. Though a great many of good codes have been produced, most of them are defined over alphabets of sizes equal to prime powers. In this paper, we provide a new explicit construction of $(q+1)$-ary nonlinear codes via algebraic function fields, where $q$ is a prime power. Our codes are con… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

  38. arXiv:2208.09708  [pdf, other

    cs.CV cs.AI cs.LG

    DenseShift: Towards Accurate and Efficient Low-Bit Power-of-Two Quantization

    Authors: Xinlin Li, Bang Liu, Rui Heng Yang, Vanessa Courville, Chao Xing, Vahid Partovi Nia

    Abstract: Efficiently deploying deep neural networks on low-resource edge devices is challenging due to their ever-increasing resource requirements. To address this issue, researchers have proposed multiplication-free neural networks, such as Power-of-Two quantization, or also known as Shift networks, which aim to reduce memory usage and simplify computation. However, existing low-bit Shift networks are not… ▽ More

    Submitted 24 October, 2023; v1 submitted 20 August, 2022; originally announced August 2022.

  39. arXiv:2208.04484  [pdf, other

    cs.IT

    Good locally repairable codes via propagation rules

    Authors: Shu Liu, Liming Ma, Tingyi Wu, Abstract: In classical coding theory, it is common to construct new codes via propagation rules. There are various propagation rules to construct classical block codes. However, propagation rules have not been extensively explored for constructions of locally repairable codes. In this paper, we introduce a few propagation rules to construct good locally repairable codes. To our surprise, these simple propag… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

  40. arXiv:2208.01828  [pdf, other

    cs.IT eess.SP

    LEO Satellite-Enabled Grant-Free Random Access with MIMO-OTFS

    Authors: Boxiao Shen, Yongpeng Wu, Wenjun Zhang, Geoffrey Ye Li, Jian** An, Chengwen Xing

    Abstract: This paper investigates joint channel estimation and device activity detection in the LEO satellite-enabled grant-free random access systems with large differential delay and Doppler shift. In addition, the multiple-input multiple-output (MIMO) with orthogonal time-frequency space modulation (OTFS) is utilized to combat the dynamics of the terrestrial-satellite link. To simplify the computation pr… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Comments: This paper has been accepted for presentation at the IEEE GLOBECOM 2022. arXiv admin note: text overlap with arXiv:2202.13058

  41. arXiv:2207.07497  [pdf, other

    cs.SD cs.LG eess.AS

    Low-bit Shift Network for End-to-End Spoken Language Understanding

    Authors: Anderson R. Avila, Khalil Bibi, Rui Heng Yang, Xinlin Li, Chao Xing, Xiao Chen

    Abstract: Deep neural networks (DNN) have achieved impressive success in multiple domains. Over the years, the accuracy of these models has increased with the proliferation of deeper and more complex architectures. Thus, state-of-the-art solutions are often computationally expensive, which makes them unfit to be deployed on edge computing platforms. In order to mitigate the high computation, memory, and pow… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

    Comments: Accepted at INTERSPEECH 2022

  42. arXiv:2207.05417  [pdf, ps, other

    cs.IT

    Upper bounds on maximum lengths of Singleton-optimal locally repairable codes

    Authors: Shu Liu, Tingyi Wu, Chen Yuan

    Abstract: A locally repairable code is called Singleton-optimal if it achieves the Singleton-type bound. Such codes are of great theoretic interest in the study of locally repairable codes. In the recent years there has been a great amount of work on this topic. One of the main problems in this topic is to determine the largest length of a q-ary Singleton-optimal locally repairable code for given locality a… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  43. arXiv:2205.10687  [pdf, other

    cs.CL

    Revisiting Pre-trained Language Models and their Evaluation for Arabic Natural Language Understanding

    Authors: Abbas Ghaddar, Yimeng Wu, Sunyam Bagga, Ahmad Rashid, Khalil Bibi, Mehdi Rezagholizadeh, Chao Xing, Yasheng Wang, Duan Xinyu, Zhefeng Wang, Baoxing Huai, Xin Jiang, Qun Liu, Philippe Langlais

    Abstract: There is a growing body of work in recent years to develop pre-trained language models (PLMs) for the Arabic language. This work concerns addressing two major problems in existing Arabic PLMs which constraint progress of the Arabic NLU and NLG fields.First, existing Arabic PLMs are not well-explored and their pre-trainig can be improved significantly using a more methodical approach. Second, there… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

  44. arXiv:2204.01975  [pdf, other

    cs.CR cs.LG

    GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning

    Authors: **yin Chen, Shulong Hu, Haibin Zheng, Changyou Xing, Guomin Zhang

    Abstract: Penetration testing (PT) is an efficient network testing and vulnerability mining tool by simulating a hacker's attack for valuable information applied in some areas. Compared with manual PT, intelligent PT has become a dominating mainstream due to less time-consuming and lower labor costs. Unfortunately, RL-based PT is still challenged in real exploitation scenarios because the agent's action spa… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

  45. arXiv:2203.00567  [pdf, other

    cs.RO cs.CV

    Descriptellation: Deep Learned Constellation Descriptors

    Authors: Chunwei Xing, Xinyu Sun, Andrei Cramariuc, Samuel Gull, Jen Jen Chung, Cesar Cadena, Roland Siegwart, Florian Tschopp

    Abstract: Current descriptors for global localization often struggle under vast viewpoint or appearance changes. One possible improvement is the addition of topological information on semantic objects. However, handcrafted topological descriptors are hard to tune and not robust to environmental noise, drastic perspective changes, object occlusion or misdetections. To solve this problem, we formulate a learn… ▽ More

    Submitted 14 September, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

  46. arXiv:2202.13058  [pdf, other

    eess.SP cs.IT

    Random Access with Massive MIMO-OTFS in LEO Satellite Communications

    Authors: Boxiao Shen, Yongpeng Wu, Jian** An, Chengwen Xing, Lian Zhao, Wenjun Zhang

    Abstract: This paper considers the joint channel estimation and device activity detection in the grant-free random access systems, where a large number of Internet-of-Things devices intend to communicate with a low-earth orbit satellite in a sporadic way. In addition, the massive multiple-input multiple-output (MIMO) with orthogonal time-frequency space (OTFS) modulation is adopted to combat the dynamics of… ▽ More

    Submitted 9 August, 2022; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: This paper has been accepted by IEEE JSAC Special Issue on Antenna Array Enabled Space/Air/Ground Communications and Networking

  47. arXiv:2202.08096  [pdf, other

    cs.IT

    Massive Unsourced Random Access: Exploiting Angular Domain Sparsity

    Authors: Xinyu Xie, Yongpeng Wu, Jian** An, Junyuan Gao, Wenjun Zhang, Chengwen Xing, Kai-Kit Wong, Chengshan Xiao

    Abstract: This paper investigates the unsourced random access (URA) scheme to accommodate numerous machine-type users communicating to a base station equipped with multiple antennas. Existing works adopt a slotted transmission strategy to reduce system complexity; they operate under the framework of coupled compressed sensing (CCS) which concatenates an outer tree code to an inner compressed sensing code fo… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: Accepted for publication in IEEE TCOM

  48. arXiv:2201.11249  [pdf, other

    cs.LG cs.AI cs.CL

    Jointly Learning Knowledge Embedding and Neighborhood Consensus with Relational Knowledge Distillation for Entity Alignment

    Authors: Xinhang Li, Yong Zhang, Chunxiao Xing

    Abstract: Entity alignment aims at integrating heterogeneous knowledge from different knowledge graphs. Recent studies employ embedding-based methods by first learning the representation of Knowledge Graphs and then performing entity alignment via measuring the similarity between entity embeddings. However, they failed to make good use of the relation semantic information due to the trade-off problem caused… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

  49. arXiv:2112.13408  [pdf, other

    cs.LG cs.AI

    Perlin Noise Improve Adversarial Robustness

    Authors: Chengjun Tang, Kun Zhang, Chunfang Xing, Yong Ding, Zengmin Xu

    Abstract: Adversarial examples are some special input that can perturb the output of a deep neural network, in order to make produce intentional errors in the learning algorithms in the production environment. Most of the present methods for generating adversarial examples require gradient information. Even universal perturbations that are not relevant to the generative model rely to some extent on gradient… ▽ More

    Submitted 26 December, 2021; originally announced December 2021.

  50. arXiv:2112.09310  [pdf, other

    cs.IT eess.SP

    Joint Device Detection, Channel Estimation, and Data Decoding with Collision Resolution for MIMO Massive Unsourced Random Access

    Authors: Tianya Li, Yongpeng Wu, Mengfan Zheng, Wenjun Zhang, Chengwen Xing, Jian** An, Xiang-Gen Xia, Chengshan Xiao

    Abstract: In this paper, we investigate a joint device activity detection (DAD), channel estimation (CE), and data decoding (DD) algorithm for multiple-input multiple-output (MIMO) massive unsourced random access (URA). Different from the state-of-the-art slotted transmission scheme, the data in the proposed framework is split into only two parts. A portion of the data is coded by compressed sensing (CS) an… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

    Comments: Accepted by IEEE JSAC special issue on Next Generation Multiple Access