Skip to main content

Showing 1–9 of 9 results for author: Su, M

Searching in archive stat. Search in all archives.
.
  1. arXiv:2406.03136  [pdf, ps, other

    cs.LG cs.AI cs.CC stat.ML

    Computational Limits of Low-Rank Adaptation (LoRA) for Transformer-Based Models

    Authors: Jerry Yao-Chieh Hu, Maojiang Su, En-Jui Kuo, Zhao Song, Han Liu

    Abstract: We study the computational limits of Low-Rank Adaptation (LoRA) update for finetuning transformer-based models using fine-grained complexity theory. Our key observation is that the existence of low-rank decompositions within the gradient computation of LoRA adaptation leads to possible algorithmic speedup. This allows us to (i) identify a phase transition behavior and (ii) prove the existence of n… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2404.07323  [pdf, other

    stat.ME math.ST

    Surrogate modeling for probability distribution estimation:uniform or adaptive design?

    Authors: Maijia Su, Ziqi Wang, Oreste Salvatore Bursi, Marco Broccardo

    Abstract: The active learning (AL) technique, one of the state-of-the-art methods for constructing surrogate models, has shown high accuracy and efficiency in forward uncertainty quantification (UQ) analysis. This paper provides a comprehensive study on AL-based global surrogates for computing the full distribution function, i.e., the cumulative distribution function (CDF) and the complementary CDF (CCDF).… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  3. arXiv:2401.03747  [pdf, other

    stat.AP

    The Importance of Corner Frequency in Site-Based Stochastic Ground Motion Models

    Authors: Maijia Su, Mayssa Dabaghi, Marco Broccardo

    Abstract: Synthetic ground motions (GMs) play a fundamental role in both deterministic and probabilistic seismic engineering assessments. This paper shows that the family of filtered and modulated white noise stochastic GM models overlooks a key parameter -- the high-pass filter's corner frequency, $f_c$. In the simulated motions, this causes significant distortions in the long-period range of the linear-re… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

    Comments: 16 pages, 10 figures

  4. arXiv:2309.09872  [pdf, other

    stat.ME

    Moment-assisted Subsampling based Maximum Likelihood Estimator

    Authors: Miaomiao Su, Qihua Wang, Ruoyu Wang

    Abstract: This paper proposes a moment-assisted subsampling method which can improve the estimation efficiency of existing subsampling estimators. The motivation behind this approach stems from the fact that sample moments can be efficiently computed even if the sample size of the whole data set is huge. Through the generalized method of moments, this method incorporates informative sample moments of the wh… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  5. arXiv:2304.06292  [pdf, ps, other

    cs.LG stat.AP stat.ME

    Improved Naive Bayes with Mislabeled Data

    Authors: Qianhan Zeng, Yingqiu Zhu, Xuening Zhu, Feifei Wang, Weichen Zhao, Shuning Sun, Meng Su, Hansheng Wang

    Abstract: Labeling mistakes are frequently encountered in real-world applications. If not treated well, the labeling mistakes can deteriorate the classification performances of a model seriously. To address this issue, we propose an improved Naive Bayes method for text classification. It is analytically simple and free of subjective judgements on the correct and incorrect labels. By specifying the generatin… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

  6. arXiv:2112.01215  [pdf

    cs.NE stat.ML

    Adaptive Group Collaborative Artificial Bee Colony Algorithm

    Authors: Haiquan Wang, Hans-DietrichHaasis, Panpan Du, Xiaobin Xu, Menghao Su, Shengjun Wen, Wenxuan Yue, Shanshan Zhang

    Abstract: As an effective algorithm for solving complex optimization problems, artificial bee colony (ABC) algorithm has shown to be competitive, but the same as other population-based algorithms, it is poor at balancing the abilities of global searching in the whole solution space (named as exploration) and quick searching in local solution space which is defined as exploitation. For improving the performa… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  7. arXiv:2106.02475  [pdf, ps, other

    stat.ME

    Distributed nonparametric regression imputation for missing response problems with large-scale data

    Authors: Ruoyu Wang, Miaomiao Su, Qihua Wang

    Abstract: Nonparametric regression imputation is commonly used in missing data analysis. However, it suffers from the ``curse of dimension". The problem can be alleviated by the explosive sample size in the era of big data, while the large-scale data size presents some challenges on the storage of data and the calculation of estimators. These challenges make the classical nonparametric regression impu… ▽ More

    Submitted 8 January, 2023; v1 submitted 4 June, 2021; originally announced June 2021.

    Journal ref: Journal of Machine Learning Research, 2023

  8. arXiv:2012.05677  [pdf, ps, other

    stat.ME

    A Convex Programming Solution Based Debiased Estimator for Quantile with Missing Response and High-dimensional Covariables

    Authors: Miaomiao Su, Qihua Wang

    Abstract: This paper is concerned with the estimating problem of response quantile with high dimensional covariates when response is missing at random. Some existing methods define root-n consistent estimators for the response quantile. But these methods require correct specifications of both the conditional distribution of response given covariates and the selection probability function. In this paper, a d… ▽ More

    Submitted 22 June, 2021; v1 submitted 10 December, 2020; originally announced December 2020.

  9. arXiv:1812.01713  [pdf, other

    cs.CV cs.LG stat.ML

    FineFool: Fine Object Contour Attack via Attention

    Authors: **yin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su

    Abstract: Machine learning models have been shown vulnerable to adversarial attacks launched by adversarial examples which are carefully crafted by attacker to defeat classifiers. Deep learning models cannot escape the attack either. Most of adversarial attack methods are focused on success rate or perturbations size, while we are more interested in the relationship between adversarial perturbation and the… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.