Skip to main content

Showing 1–28 of 28 results for author: Ying, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18312  [pdf, other

    cs.CL cs.AI

    AI-native Memory: A Pathway from LLMs Towards AGI

    Authors: **gbo Shang, Zai Zheng, Xiang Ying, Felix Tao, Mindverse Team

    Abstract: Large language models (LLMs) have demonstrated the world with the sparks of artificial general intelligence (AGI). One opinion, especially from some startups working on LLMs, argues that an LLM with nearly unlimited context length can realize AGI. However, they might be too optimistic about the long-context capability of (existing) LLMs -- (1) Recent literature has shown that their effective conte… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2406.14482  [pdf, other

    cs.CV

    Visible-Thermal Tiny Object Detection: A Benchmark Dataset and Baselines

    Authors: Xinyi Ying, Chao Xiao, Ruo**g Li, Xu He, Boyang Li, Zhaoxu Li, Yingqian Wang, Mingyuan Hu, Qingyu Xu, Zai** Lin, Miao Li, Shilin Zhou, Wei An, Weidong Sheng, Li Liu

    Abstract: Small object detection (SOD) has been a longstanding yet challenging task for decades, with numerous datasets and algorithms being developed. However, they mainly focus on either visible or thermal modality, while visible-thermal (RGBT) bimodality is rarely explored. Although some RGBT datasets have been developed recently, the insufficient quantity, limited category, misaligned images and large t… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  3. arXiv:2404.18948  [pdf, other

    cs.LG

    Sub-Adjacent Transformer: Improving Time Series Anomaly Detection with Reconstruction Error from Sub-Adjacent Neighborhoods

    Authors: Wenzhen Yue, Xianghua Ying, Ruohao Guo, DongDong Chen, Ji Shi, Bowei Xing, Yuqing Zhu, Taiyan Chen

    Abstract: In this paper, we present the Sub-Adjacent Transformer with a novel attention mechanism for unsupervised time series anomaly detection. Unlike previous approaches that rely on all the points within some neighborhood for time point reconstruction, our method restricts the attention to regions not immediately adjacent to the target points, termed sub-adjacent neighborhoods. Our key observation is th… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

    Comments: IJCAI 2024

  4. arXiv:2310.18709  [pdf, other

    cs.CV cs.LG cs.MM cs.SD eess.AS

    Audio-Visual Instance Segmentation

    Authors: Ruohao Guo, Yaru Chen, Yanyu Qi, Wenzhen Yue, Dantong Niu, Xianghua Ying

    Abstract: In this paper, we propose a new multi-modal task, namely audio-visual instance segmentation (AVIS), in which the goal is to identify, segment, and track individual sounding object instances in audible videos, simultaneously. To our knowledge, it is the first time that instance segmentation has been extended into the audio-visual domain. To better facilitate this research, we construct the first au… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

  5. arXiv:2304.01484  [pdf, other

    cs.CV

    Map** Degeneration Meets Label Evolution: Learning Infrared Small Target Detection with Single Point Supervision

    Authors: Xinyi Ying, Li Liu, Yingqian Wang, Ruo**g Li, Nuo Chen, Zai** Lin, Weidong Sheng, Shilin Zhou

    Abstract: Training a convolutional neural network (CNN) to detect infrared small targets in a fully supervised manner has gained remarkable research interests in recent years, but is highly labor expensive since a large number of per-pixel annotations are required. To handle this problem, in this paper, we make the first attempt to achieve infrared small target detection with point-level supervision. Intere… ▽ More

    Submitted 3 April, 2023; originally announced April 2023.

    Journal ref: CVPR 2023

  6. arXiv:2303.17594  [pdf, other

    cs.CV

    MobileInst: Video Instance Segmentation on the Mobile

    Authors: Renhong Zhang, Tianheng Cheng, Shusheng Yang, Haoyi Jiang, Shuai Zhang, Jiancheng Lyu, Xin Li, Xiaowen Ying, Dashan Gao, Wenyu Liu, Xinggang Wang

    Abstract: Video instance segmentation on mobile devices is an important yet very challenging edge AI problem. It mainly suffers from (1) heavy computation and memory costs for frame-by-frame pixel-level instance perception and (2) complicated heuristics for tracking objects. To address those issues, we present MobileInst, a lightweight and mobile-friendly framework for video instance segmentation on mobile… ▽ More

    Submitted 18 December, 2023; v1 submitted 30 March, 2023; originally announced March 2023.

    Comments: Accepted by AAAI 2024 Main Track; Code will be released

  7. arXiv:2303.09042  [pdf, other

    cs.LG math.DS

    Embedding Theory of Reservoir Computing and Reducing Reservoir Network Using Time Delays

    Authors: Xing-Yue Duan, Xiong Ying, Si-Yang Leng, Jürgen Kurths, Wei Lin, Huan-Fei Ma

    Abstract: Reservoir computing (RC), a particular form of recurrent neural network, is under explosive development due to its exceptional efficacy and high performance in reconstruction or/and prediction of complex physical systems. However, the mechanism triggering such effective applications of RC is still unclear, awaiting deep and systematic exploration. Here, combining the delayed embedding theory with… ▽ More

    Submitted 8 May, 2023; v1 submitted 15 March, 2023; originally announced March 2023.

  8. arXiv:2210.09884  [pdf

    physics.soc-ph cs.NI

    Is Dogecoin a Viable Investment? Insights from Network and Bubble Effects

    Authors: Ruoxin Xiao, Xinyu Ying, Hengxu Li, Kexin Liu

    Abstract: We find that three factors: Dogecoin network externalities, momentum, and tweet sentiment that capture the time-series expected Dogecoin returns. Dogecoin returns are exposed to Dogecoin network factors. We construct the network factors to capture the user adoption of Dogecoin. Moreover, there is a strong time-series momentum effect, and proxies for investor attention strongly forecast future Doge… ▽ More

    Submitted 19 November, 2022; v1 submitted 18 October, 2022; originally announced October 2022.

  9. arXiv:2201.09045  [pdf, other

    cs.CY cs.HC

    From 996 to 007: Challenges of Working from Home During the Epidemic in China

    Authors: Jie Gao, Pin Sym Foong, Yifan Yang, Weilin Jiang, Yijie Chen, Xiayin Ying, Simon Perrault

    Abstract: During the COVID-19 epidemic in China, millions of workers in tech companies had to start working from home (WFH). The change was sudden, unexpected and companies were not ready for it. Additionally, it was also the first time that WFH was experienced on such a large scale. We used the opportunity to describe the effect of WFH at scale for a sustained period of time. As the lockdown was easing, we… ▽ More

    Submitted 22 January, 2022; originally announced January 2022.

    ACM Class: J.4

  10. arXiv:2201.01014  [pdf, other

    eess.IV cs.CV

    Local Motion and Contrast Priors Driven Deep Network for Infrared Small Target Super-Resolution

    Authors: Xinyi Ying, Yingqian Wang, Longguang Wang, Weidong Sheng, Li Liu, Zai** Lin, Shilin Zhou

    Abstract: Infrared small target super-resolution (SR) aims to recover reliable and detailed high-resolution image with high-contrast targets from its low-resolution counterparts. Since the infrared small target lacks color and fine structure information, it is significant to exploit the supplementary information among sequence images to enhance the target. In this paper, we propose the first infrared small… ▽ More

    Submitted 4 April, 2023; v1 submitted 4 January, 2022; originally announced January 2022.

    Journal ref: JSTARS 2022

  11. arXiv:2011.03802  [pdf, other

    cs.CV

    Symmetric Parallax Attention for Stereo Image Super-Resolution

    Authors: Yingqian Wang, Xinyi Ying, Longguang Wang, Jungang Yang, Wei An, Yulan Guo

    Abstract: Although recent years have witnessed the great advances in stereo image super-resolution (SR), the beneficial information provided by binocular systems has not been fully used. Since stereo images are highly symmetric under epipolar constraint, in this paper, we improve the performance of stereo image SR by exploiting symmetry cues in stereo image pairs. Specifically, we propose a symmetric bi-dir… ▽ More

    Submitted 20 April, 2021; v1 submitted 7 November, 2020; originally announced November 2020.

    Comments: Accepted to NTIRE workshop at CVPR 2021. The first two authors contribute equally to this work

  12. How to Increase Interest in Studying Functional Programming via Interdisciplinary Application

    Authors: Pedro Figueirêdo, Yuri Kim, Nghia Le Minh, Evan Sitt, Xue Ying, Viktória Zsók

    Abstract: Functional programming represents a modern tool for applying and implementing software. The state of the art in functional programming reports an increasing number of methodologies in this paradigm. However, extensive interdisciplinary applications are missing. Our goal is to increase student interest in pursuing further studies in functional programming with the use of an application: the ray tra… ▽ More

    Submitted 24 August, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: In Proceedings TFPIE 2019 and 2020, arXiv:2008.08923

    Journal ref: EPTCS 321, 2020, pp. 37-54

  13. Light Field Image Super-Resolution Using Deformable Convolution

    Authors: Yingqian Wang, Jungang Yang, Longguang Wang, Xinyi Ying, Tianhao Wu, Wei An, Yulan Guo

    Abstract: Light field (LF) cameras can record scenes from multiple perspectives, and thus introduce beneficial angular information for image super-resolution (SR). However, it is challenging to incorporate angular information due to disparities among LF images. In this paper, we propose a deformable convolution network (i.e., LF-DFnet) to handle the disparity problem for LF image SR. Specifically, we design… ▽ More

    Submitted 25 November, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: Accepted by IEEE Transactions on Image Processing

  14. arXiv:2006.09603  [pdf, other

    cs.CV

    Exploring Sparsity in Image Super-Resolution for Efficient Inference

    Authors: Longguang Wang, Xiaoyu Dong, Yingqian Wang, Xinyi Ying, Zai** Lin, Wei An, Yulan Guo

    Abstract: Current CNN-based super-resolution (SR) methods process all locations equally with computational resources being uniformly assigned in space. However, since missing details in low-resolution (LR) images mainly exist in regions of edges and textures, less computational resources are required for those flat regions. Therefore, existing CNN-based methods involve redundant computation in flat regions,… ▽ More

    Submitted 1 April, 2021; v1 submitted 16 June, 2020; originally announced June 2020.

    Comments: Accepted by CVPR 2021

  15. arXiv:2006.06644  [pdf, other

    cs.IT eess.SP

    Relay Aided Intelligent Reconfigurable Surfaces: Achieving the Potential Without So Many Antennas

    Authors: Xiaoyan Ying, Umut Demirhan, Ahmed Alkhateeb

    Abstract: This paper proposes a novel relay-aided intelligent reconfigurable surface (IRS) architecture for future wireless communication systems. The proposed architecture, which consists of two side-by-side intelligent surfaces connected via a full-duplex relay, has the potential of achieving the promising gains of intelligent surfaces while requiring much smaller numbers of reflecting elements. Consequen… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

    Comments: 8 pages; 7 figures

  16. Deformable 3D Convolution for Video Super-Resolution

    Authors: Xinyi Ying, Longguang Wang, Yingqian Wang, Weidong Sheng, Wei An, Yulan Guo

    Abstract: The spatio-temporal information among video sequences is significant for video super-resolution (SR). However, the spatio-temporal information cannot be fully used by existing video SR methods since spatial feature extraction and temporal motion compensation are usually performed sequentially. In this paper, we propose a deformable 3D convolution network (D3Dnet) to incorporate spatio-temporal inf… ▽ More

    Submitted 15 August, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: Accepted by IEEE Signal Processing Letters

  17. arXiv:1912.04735  [pdf, other

    cs.CR

    Covert Channel-Based Transmitter Authentication in Controller Area Networks

    Authors: Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

    Abstract: In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial vehicle functioning. In this scenario, malicious actors can exploit CAN vulnerabilities, such as the la… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

    Comments: Submitted to TDSC (Transactions on Dependable and Secure Computing). arXiv admin note: text overlap with arXiv:1903.05231

  18. arXiv:1907.07792  [pdf, other

    cs.CV cs.RO

    GRIP++: Enhanced Graph-based Interaction-aware Trajectory Prediction for Autonomous Driving

    Authors: Xin Li, Xiaowen Ying, Mooi Choo Chuah

    Abstract: Despite the advancement in the technology of autonomous driving cars, the safety of a self-driving car is still a challenging problem that has not been well studied. Motion prediction is one of the core functions of an autonomous driving car. Previously, we propose a novel scheme called GRIP which is designed to predict trajectories for traffic agents around an autonomous car efficiently. GRIP use… ▽ More

    Submitted 19 May, 2020; v1 submitted 17 July, 2019; originally announced July 2019.

  19. arXiv:1905.06902  [pdf, other

    eess.IV cs.CV

    X2CT-GAN: Reconstructing CT from Biplanar X-Rays with Generative Adversarial Networks

    Authors: Xingde Ying, Heng Guo, Kai Ma, Jian Wu, Zhengxin Weng, Yefeng Zheng

    Abstract: Computed tomography (CT) can provide a 3D view of the patient's internal organs, facilitating disease diagnosis, but it incurs more radiation dose to a patient and a CT scanner is much more cost prohibitive than an X-ray machine too. Traditional CT reconstruction methods require hundreds of X-ray projections through a full rotational scan of the body, which cannot be performed on a typical X-ray m… ▽ More

    Submitted 16 May, 2019; originally announced May 2019.

  20. arXiv:1904.09969  [pdf, other

    cs.CR

    Detecting ADS-B Spoofing Attacks using Deep Neural Networks

    Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

    Abstract: The Automatic Dependent Surveillance-Broadcast (ADS-B) system is a key component of the Next Generation Air Transportation System (NextGen) that manages the increasingly congested airspace. It provides accurate aircraft localization and efficient air traffic management and also improves the safety of billions of current and future passengers. While the benefits of ADS-B are well known, the lack of… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: Accepted to IEEE CNS 2019

  21. arXiv:1903.05231  [pdf, other

    cs.CR

    TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks

    Authors: Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Radha Poovendran

    Abstract: Nowadays, the interconnection of automotive systems with modern digital devices offers advanced user experiences to drivers. Electronic Control Units (ECUs) carry out a multitude of operations using the insecure Controller Area Network (CAN) bus in automotive Cyber-Physical Systems (CPSs). Therefore, dangerous attacks, such as disabling brakes, are possible and the safety of passengers is at risk.… ▽ More

    Submitted 12 March, 2019; originally announced March 2019.

    Comments: To be published in ACM/IEEE ICCPS 2019

  22. arXiv:1807.09432  [pdf, other

    cs.CR

    Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks

    Authors: Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper presents a new masquerade attack called the cloaking attack and provides formal analyses for clock skew-based Intrusion Detection Systems (IDSs) that detect masquerade attacks in the Controller Area Network (CAN) in automobiles. In the cloaking attack, the adversary manipulates the message inter-transmission times of spoofed messages by adding delays so as to emulate a desired clock ske… ▽ More

    Submitted 23 January, 2019; v1 submitted 25 July, 2018; originally announced July 2018.

    Comments: Part of this work was presented at ACM/IEEE ICCPS 2018; to be published in IEEE Transactions on Information Forensics & Security

  23. arXiv:1805.06053  [pdf, other

    cs.NI

    SAS-Assisted Coexistence-Aware Dynamic Channel Assignment in CBRS Band

    Authors: Xuhang Ying, Milind Buddhikot, Sumit Roy

    Abstract: The paradigm of shared spectrum allows secondary devices to opportunistically access spectrum bands underutilized by primary owners. Recently, the FCC has targeted the sharing of the 3.5 GHz (3550-3700 MHz) federal spectrum with commercial systems such as small cells. The rules require a Spectrum Access System (SAS) to accommodate three service tiers: 1) Incumbent Access, 2) Priority Access (PA),… ▽ More

    Submitted 18 July, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

    Comments: Accepted to IEEE TWC

  24. arXiv:1710.02692  [pdf, other

    cs.CR

    Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

    Authors: Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN). These protocols are designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks i… ▽ More

    Submitted 21 March, 2018; v1 submitted 7 October, 2017; originally announced October 2017.

    Comments: 11 pages, 13 figures, This work has been accepted to the 9th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)

    MSC Class: 68W01

  25. arXiv:1710.01705  [pdf, other

    cs.NI

    Detecting LTE-U Duty Cycling Misbehavior for Fair Sharing with Wi-Fi in Shared Bands

    Authors: Xuhang Ying, Radha Poovendran, Sumit Roy

    Abstract: Coexistence of Wi-Fi and LTE Unlicensed (LTE-U) in shared or unlicensed bands has drawn growing attention from both academia and industry. An important consideration is fairness between Wi-Fi and duty cycled LTE-U, which is often defined in terms of channel access time, as adopted by the LTE-U Forum. Despite many studies on duty cycle adaptation design for fair sharing, one crucial fact has often… ▽ More

    Submitted 4 October, 2017; originally announced October 2017.

    Comments: Accepted to IEEE PIMRC 2017

  26. Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Map**

    Authors: Xuhang Ying, Sumit Roy, Radha Poovendran

    Abstract: Networking on white spaces (i.e., locally unused spectrum) relies on active monitoring of spectrum usage. Spectrum databases based on empirical radio propagation models are widely adopted but shown to be error-prone, since they do not account for built environments like trees and man-made buildings. As an economically viable option, crowd-sensed radio map** acquires more accurate local spectrum… ▽ More

    Submitted 22 May, 2017; v1 submitted 22 November, 2016; originally announced November 2016.

    Comments: Part of this work was present at IEEE GLOBECOM 2016

  27. arXiv:1305.1293  [pdf, other

    cs.GR

    Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics

    Authors: Xiang Ying, Shi-Qing Xin, Ying He

    Abstract: In many graphics applications, the computation of exact geodesic distance is very important. However, the high computational cost of the existing geodesic algorithms means that they are not practical for large-scale models or time-critical applications. To tackle this challenge, we propose the parallel Chen-Han (or PCH) algorithm, which extends the classic Chen-Han (CH) discrete geodesic algorithm… ▽ More

    Submitted 7 May, 2013; originally announced May 2013.

    Comments: 10 pages, accepted to ACM Transactions on Graphics with major revision

  28. arXiv:1304.1103  [pdf

    cs.AI

    Minimum Error Tree Decomposition

    Authors: L. Liu, Y. Ma, D. Wilkins, Z. Bian, X. Ying

    Abstract: This paper describes a generalization of previous methods for constructing tree-structured belief network with hidden variables. The major new feature of the described method is the ability to produce a tree decomposition even when there are errors in the correlation data among the input variables. This is an important extension of existing methods since the correlational coefficients usually cann… ▽ More

    Submitted 27 March, 2013; originally announced April 2013.

    Comments: Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)

    Report number: UAI-P-1990-PG-180-185