Skip to main content

Showing 1–50 of 68 results for author: Chi, J

.
  1. arXiv:2505.18985  [pdf, ps, other

    cs.LG cs.CL cs.CV

    STRICT: Stress Test of Rendering Images Containing Text

    Authors: Tianyu Zhang, Xinyu Wang, Zhenghan Tai, Lu Li, Jijun Chi, Jingrui Tian, Hailin He, Suyuchen Wang

    Abstract: While diffusion models have revolutionized text-to-image generation with their ability to synthesize realistic and diverse scenes, they continue to struggle to generate consistent and legible text within images. This shortcoming is commonly attributed to the locality bias inherent in diffusion-based generation, which limits their ability to model long-range spatial dependencies. In this paper, we… ▽ More

    Submitted 25 May, 2025; originally announced May 2025.

    Comments: 13 pages

  2. arXiv:2505.17747  [pdf, ps, other

    cs.CL

    Discriminating Form and Meaning in Multilingual Models with Minimal-Pair ABX Tasks

    Authors: Maureen de Seyssel, Jie Chi, Skyler Seto, Maartje ter Hoeve, Masha Fedzechkina, Natalie Schluter

    Abstract: We introduce a set of training-free ABX-style discrimination tasks to evaluate how multilingual language models represent language identity (form) and semantic content (meaning). Inspired from speech processing, these zero-shot tasks measure whether minimal differences in representation can be reliably detected. This offers a flexible and interpretable alternative to probing. Applied to XLM-R (Con… ▽ More

    Submitted 2 June, 2025; v1 submitted 23 May, 2025; originally announced May 2025.

  3. arXiv:2505.17196  [pdf, ps, other

    cs.LG

    Shape it Up! Restoring LLM Safety during Finetuning

    Authors: ShengYun Peng, Pin-Yu Chen, Jianfeng Chi, Seongmin Lee, Duen Horng Chau

    Abstract: Finetuning large language models (LLMs) enables user-specific customization but introduces critical safety risks: even a few harmful examples can compromise safety alignment. A common mitigation strategy is to update the model more strongly on examples deemed safe, while downweighting or excluding those flagged as unsafe. However, because safety context can shift within a single example, updating… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  4. arXiv:2505.16277  [pdf, ps, other

    cs.CL

    Spontaneous Speech Variables for Evaluating LLMs Cognitive Plausibility

    Authors: Sheng-Fu Wang, Laurent Prevot, Jou-an Chi, Ri-Sheng Huang, Shu-Kai Hsieh

    Abstract: The achievements of Large Language Models in Natural Language Processing, especially for high-resource languages, call for a better understanding of their characteristics from a cognitive perspective. Researchers have attempted to evaluate artificial models by testing their ability to predict behavioral (e.g., eye-tracking fixations) and physiological (e.g., brain responses) variables during langu… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

    Comments: The 14th Workshop on Cognitive Modeling and Computational Linguistics (CMCL). May 3, 2025. Collocated with NAACL 2025

  5. arXiv:2505.11909  [pdf, other

    eess.IV cs.CV

    Bridging the Inter-Domain Gap through Low-Level Features for Cross-Modal Medical Image Segmentation

    Authors: Pengfei Lyu, Pak-Hei Yeung, Xiaosheng Yu, Jing Xia, Jianning Chi, Chengdong Wu, Jagath C. Rajapakse

    Abstract: This paper addresses the task of cross-modal medical image segmentation by exploring unsupervised domain adaptation (UDA) approaches. We propose a model-agnostic UDA framework, LowBridge, which builds on a simple observation that cross-modal images share some similar low-level features (e.g., edges) as they are depicting the same structures. Specifically, we first train a generative model to recov… ▽ More

    Submitted 17 May, 2025; originally announced May 2025.

    Comments: 11 pages, 2 figures

  6. arXiv:2504.14493  [pdf, ps, other

    cs.IR cs.AI cs.LG

    FinSage: A Multi-aspect RAG System for Financial Filings Question Answering

    Authors: Xinyu Wang, Jijun Chi, Zhenghan Tai, Tung Sum Thomas Kwok, Muzhi Li, Zhuhong Li, Hailin He, Yuchen Hua, Peng Lu, Suyuchen Wang, Yihong Wu, Jerry Huang, Jingrui Tian, Fengran Mo, Yufei Cui, Ling Zhou

    Abstract: Leveraging large language models in real-world settings often entails a need to utilize domain-specific data and tools in order to follow the complex regulations that need to be followed for acceptable use. Within financial sectors, modern enterprises increasingly rely on Retrieval-Augmented Generation (RAG) systems to address complex compliance requirements in financial document workflows. Howeve… ▽ More

    Submitted 6 June, 2025; v1 submitted 20 April, 2025; originally announced April 2025.

  7. arXiv:2504.13914  [pdf, other

    cs.CL

    Seed1.5-Thinking: Advancing Superb Reasoning Models with Reinforcement Learning

    Authors: ByteDance Seed, :, Jiaze Chen, Tiantian Fan, Xin Liu, Lingjun Liu, Zhiqi Lin, Mingxuan Wang, Chengyi Wang, Xiangpeng Wei, Wenyuan Xu, Yufeng Yuan, Yu Yue, Lin Yan, Qiying Yu, Xiaochen Zuo, Chi Zhang, Ruofei Zhu, Zhecheng An, Zhihao Bai, Yu Bao, Xingyan Bin, Jiangjie Chen, Feng Chen, Hongmin Chen , et al. (249 additional authors not shown)

    Abstract: We introduce Seed1.5-Thinking, capable of reasoning through thinking before responding, resulting in improved performance on a wide range of benchmarks. Seed1.5-Thinking achieves 86.7 on AIME 2024, 55.0 on Codeforces and 77.3 on GPQA, demonstrating excellent reasoning abilities in STEM and coding. Beyond reasoning tasks, the method demonstrates notable generalization across diverse domains. For in… ▽ More

    Submitted 29 April, 2025; v1 submitted 10 April, 2025; originally announced April 2025.

  8. arXiv:2504.11536  [pdf, other

    cs.CL cs.AI

    ReTool: Reinforcement Learning for Strategic Tool Use in LLMs

    Authors: Jiazhan Feng, Shijue Huang, Xingwei Qu, Ge Zhang, Yujia Qin, Baoquan Zhong, Chengquan Jiang, Jinxin Chi, Wanjun Zhong

    Abstract: While reasoning models (e.g., DeepSeek R1) trained with reinforcement learning (RL), excel in textual reasoning, they struggle in scenarios requiring structured problem-solving, such as geometric reasoning, concise computation, or complex equation solving-areas where computational tools like code interpreters (CI) demonstrate distinct advantages. To bridge this gap, we propose ReTool, which enhanc… ▽ More

    Submitted 17 April, 2025; v1 submitted 15 April, 2025; originally announced April 2025.

    Comments: fix typos

  9. arXiv:2504.01956  [pdf, other

    cs.CV

    VideoScene: Distilling Video Diffusion Model to Generate 3D Scenes in One Step

    Authors: Hanyang Wang, Fangfu Liu, Jiawei Chi, Yueqi Duan

    Abstract: Recovering 3D scenes from sparse views is a challenging task due to its inherent ill-posed problem. Conventional methods have developed specialized solutions (e.g., geometry regularization or feed-forward deterministic model) to mitigate the issue. However, they still suffer from performance degradation by minimal overlap across input views with insufficient visual information. Fortunately, recent… ▽ More

    Submitted 3 April, 2025; v1 submitted 2 April, 2025; originally announced April 2025.

    Comments: Accepted by CVPR 2025; Project Page: https://hanyang-21.github.io/VideoScene

  10. arXiv:2502.19707  [pdf, other

    cs.CV

    Weakly Supervised Segmentation Framework for Thyroid Nodule Based on High-confidence Labels and High-rationality Losses

    Authors: Jianning Chi, Zelan Li, Geng Lin, MingYang Sun, Xiaosheng Yu

    Abstract: Weakly supervised segmentation methods can delineate thyroid nodules in ultrasound images efficiently using training data with coarse labels, but suffer from: 1) low-confidence pseudo-labels that follow topological priors, introducing significant label noise, and 2) low-rationality loss functions that rigidly compare segmentation with labels, ignoring discriminative information for nodules with di… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

    Comments: 10 pages, 6 figures

    ACM Class: J.3.3

  11. arXiv:2502.05389  [pdf, other

    cs.CL

    The Role of Prosody in Spoken Question Answering

    Authors: Jie Chi, Maureen de Seyssel, Natalie Schluter

    Abstract: Spoken language understanding research to date has generally carried a heavy text perspective. Most datasets are derived from text, which is then subsequently synthesized into speech, and most models typically rely on automatic transcriptions of speech. This is to the detriment of prosody--additional information carried by the speech signal beyond the phonetics of the words themselves and difficul… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

    Comments: accepted to NAACL 2025 Findings

  12. arXiv:2501.12127  [pdf, ps, other

    math.NT math.AG math.RT

    On the cohomology of simple Shimura varieties with non quasi-split local groups

    Authors: Jingren Chi, Thomas J. Haines

    Abstract: We study the Scholze test functions for bad reduction of simple Shimura varieties at a prime where the underlying local group is any inner form of a product of Weil restrictions of general linear groups. Using global methods, we prove that these test functions satisfy a vanishing property of their twisted orbital integrals, and we prove that the pseudostabilization base changes of such functions e… ▽ More

    Submitted 1 February, 2025; v1 submitted 21 January, 2025; originally announced January 2025.

    Comments: 48 pages

  13. arXiv:2411.17713  [pdf, other

    cs.DC cs.AI

    Llama Guard 3-1B-INT4: Compact and Efficient Safeguard for Human-AI Conversations

    Authors: Igor Fedorov, Kate Plawiak, Lemeng Wu, Tarek Elgamal, Naveen Suda, Eric Smith, Hongyuan Zhan, Jianfeng Chi, Yuriy Hulovatyy, Kimish Patel, Zechun Liu, Changsheng Zhao, Yangyang Shi, Tijmen Blankevoort, Mahesh Pasupuleti, Bilge Soran, Zacharie Delpierre Coudert, Rachad Alao, Raghuraman Krishnamoorthi, Vikas Chandra

    Abstract: This paper presents Llama Guard 3-1B-INT4, a compact and efficient Llama Guard model, which has been open-sourced to the community during Meta Connect 2024. We demonstrate that Llama Guard 3-1B-INT4 can be deployed on resource-constrained devices, achieving a throughput of at least 30 tokens per second and a time-to-first-token of 2.5 seconds or less on a commodity Android mobile CPU. Notably, our… ▽ More

    Submitted 18 November, 2024; originally announced November 2024.

  14. arXiv:2411.11033  [pdf, other

    cs.SE

    REACCEPT: Automated Co-evolution of Production and Test Code Based on Dynamic Validation and Large Language Models

    Authors: Jianlei Chi, Xiaotian Wang, Yuhan Huang, Lechen Yu, Di Cui, Jianguo Sun, Jun Sun

    Abstract: Synchronizing production and test code, known as PT co-evolution, is critical for software quality in the software development lifecycle. Existing methods for automatic PT co-evolution either utilize predefined heuristic rules or rely on simple application of machine learning techniques. Due to the limitations of underlying techniques, existing methods either only partially automate PT co-evolutio… ▽ More

    Submitted 17 November, 2024; originally announced November 2024.

    Comments: 21 pages, 8 figures

  15. arXiv:2411.10414  [pdf, other

    cs.CV cs.CL

    Llama Guard 3 Vision: Safeguarding Human-AI Image Understanding Conversations

    Authors: Jianfeng Chi, Ujjwal Karn, Hongyuan Zhan, Eric Smith, Javier Rando, Yiming Zhang, Kate Plawiak, Zacharie Delpierre Coudert, Kartikeya Upasani, Mahesh Pasupuleti

    Abstract: We introduce Llama Guard 3 Vision, a multimodal LLM-based safeguard for human-AI conversations that involves image understanding: it can be used to safeguard content for both multimodal LLM inputs (prompt classification) and outputs (response classification). Unlike the previous text-only Llama Guard versions (Inan et al., 2023; Llama Team, 2024b,a), it is specifically designed to support image re… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  16. arXiv:2410.19332  [pdf, other

    eess.IV cs.CV

    Beyond Point Annotation: A Weakly Supervised Network Guided by Multi-Level Labels Generated from Four-Point Annotation for Thyroid Nodule Segmentation in Ultrasound Image

    Authors: Jianning Chi, Zelan Li, Huixuan Wu, Wenjun Zhang, Ying Huang

    Abstract: Weakly-supervised methods typically guided the pixel-wise training by comparing the predictions to single-level labels containing diverse segmentation-related information at once, but struggled to represent delicate feature differences between nodule and background regions and confused incorrect information, resulting in underfitting or overfitting in the segmentation predictions. In this work, we… ▽ More

    Submitted 25 October, 2024; originally announced October 2024.

  17. arXiv:2410.18210  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Towards Understanding the Fragility of Multilingual LLMs against Fine-Tuning Attacks

    Authors: Samuele Poppi, Zheng-Xin Yong, Yifei He, Bobbie Chern, Han Zhao, Aobo Yang, Jianfeng Chi

    Abstract: Recent advancements in Large Language Models (LLMs) have sparked widespread concerns about their safety. Recent work demonstrates that safety alignment of LLMs can be easily removed by fine-tuning with a few adversarially chosen instruction-following examples, i.e., fine-tuning attacks. We take a further step to understand fine-tuning attacks in multilingual LLMs. We first discover cross-lingual g… ▽ More

    Submitted 27 February, 2025; v1 submitted 23 October, 2024; originally announced October 2024.

    Comments: 15 pages, 6 figures, 7 tables

  18. arXiv:2410.13722  [pdf, other

    cs.CR cs.AI

    Persistent Pre-Training Poisoning of LLMs

    Authors: Yiming Zhang, Javier Rando, Ivan Evtimov, Jianfeng Chi, Eric Michael Smith, Nicholas Carlini, Florian Tramèr, Daphne Ippolito

    Abstract: Large language models are pre-trained on uncurated text datasets consisting of trillions of tokens scraped from the Web. Prior work has shown that: (1) web-scraped pre-training datasets can be practically poisoned by malicious actors; and (2) adversaries can compromise language models after poisoning fine-tuning datasets. Our work evaluates for the first time whether language models can also be co… ▽ More

    Submitted 17 October, 2024; originally announced October 2024.

  19. arXiv:2409.14586  [pdf, other

    cs.LG cs.AI cs.CL

    Backtracking Improves Generation Safety

    Authors: Yiming Zhang, Jianfeng Chi, Hailey Nguyen, Kartikeya Upasani, Daniel M. Bikel, Jason Weston, Eric Michael Smith

    Abstract: Text generation has a fundamental limitation almost by definition: there is no taking back tokens that have been generated, even when they are clearly problematic. In the context of language model safety, when a partial unsafe generation is produced, language models by their nature tend to happily keep on generating similarly unsafe additional text. This is in fact how safety alignment of frontier… ▽ More

    Submitted 22 September, 2024; originally announced September 2024.

  20. arXiv:2409.08575  [pdf, ps, other

    physics.atom-ph

    A Simple approach for precision calculation of Bethe logarithm

    Authors: San-Jiang Yang, Jing Chi, Wan-Ping Zhou, Li-Yan Tang, Zhen-Xiang Zhong, Ting-Yun Shi, Hao-Xue Qiao

    Abstract: In this article we propose a simple approach for the precision calculation of Bethe logarithm. The leading contributions are obtained using specific operators, while the remaining terms are eliminated by adjusting the parameter $λ$. Through the use of dimensional regularization, singular divergences are algebraically canceled. Compared to the standard form of Bethe logarithm, our approach signific… ▽ More

    Submitted 13 September, 2024; originally announced September 2024.

    Comments: 8 pages, 5 tables

  21. arXiv:2408.12832  [pdf, other

    cs.CL

    LIMP: Large Language Model Enhanced Intent-aware Mobility Prediction

    Authors: Songwei Li, Jie Feng, Jiawei Chi, Xinyuan Hu, Xiaomeng Zhao, Fengli Xu

    Abstract: Human mobility prediction is essential for applications like urban planning and transportation management, yet it remains challenging due to the complex, often implicit, intentions behind human behavior. Existing models predominantly focus on spatiotemporal patterns, paying less attention to the underlying intentions that govern movements. Recent advancements in large language models (LLMs) offer… ▽ More

    Submitted 23 August, 2024; originally announced August 2024.

    Comments: 13 pages

  22. arXiv:2408.07362  [pdf, other

    cs.CR cs.LG

    BadMerging: Backdoor Attacks Against Model Merging

    Authors: Jinghuai Zhang, Jianfeng Chi, Zheng Li, Kunlin Cai, Yang Zhang, Yuan Tian

    Abstract: Fine-tuning pre-trained models for downstream tasks has led to a proliferation of open-sourced task-specific models. Recently, Model Merging (MM) has emerged as an effective approach to facilitate knowledge transfer among these independently fine-tuned models. MM directly combines multiple fine-tuned task-specific models into a merged model without additional training, and the resulting model show… ▽ More

    Submitted 2 September, 2024; v1 submitted 14 August, 2024; originally announced August 2024.

    Comments: To appear in ACM Conference on Computer and Communications Security (CCS), 2024

  23. arXiv:2407.21783  [pdf, other

    cs.AI cs.CL cs.CV

    The Llama 3 Herd of Models

    Authors: Aaron Grattafiori, Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Abhishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Alex Vaughan, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava Spataru, Baptiste Roziere , et al. (536 additional authors not shown)

    Abstract: Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical… ▽ More

    Submitted 23 November, 2024; v1 submitted 31 July, 2024; originally announced July 2024.

  24. arXiv:2406.06839  [pdf, other

    cs.CL

    EAVE: Efficient Product Attribute Value Extraction via Lightweight Sparse-layer Interaction

    Authors: Li Yang, Qifan Wang, Jianfeng Chi, Jiahao Liu, Jingang Wang, Fuli Feng, Zenglin Xu, Yi Fang, Lifu Huang, Dongfang Liu

    Abstract: Product attribute value extraction involves identifying the specific values associated with various attributes from a product profile. While existing methods often prioritize the development of effective models to improve extraction performance, there has been limited emphasis on extraction efficiency. However, in real-world scenarios, products are typically associated with multiple attributes, ne… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  25. arXiv:2404.09945  [pdf, ps, other

    math.AG math.NT

    Witt vector affine Springer fibers

    Authors: Jingren Chi

    Abstract: We establish dimension formulas for the Witt vector affine Springer fibers associated to a reductive group over a mixed characteristic local field, under the assumption that the group is essentially tamely ramified and the residue characteristic is not bad. Besides the discriminant valuations that show up in classical works on the usual affine Springer fibers, our formula also involves the Artin c… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  26. arXiv:2403.01777  [pdf, other

    cs.CL cs.CV

    NPHardEval4V: A Dynamic Reasoning Benchmark of Multimodal Large Language Models

    Authors: Lizhou Fan, Wenyue Hua, Xiang Li, Kaijie Zhu, Mingyu Jin, Lingyao Li, Haoyang Ling, Jinkui Chi, Jindong Wang, Xin Ma, Yongfeng Zhang

    Abstract: Understanding the reasoning capabilities of Multimodal Large Language Models (MLLMs) is an important area of research. In this study, we introduce a dynamic benchmark, NPHardEval4V, aimed at addressing the existing gaps in evaluating the pure reasoning abilities of MLLMs. Our benchmark aims to provide a venue to disentangle the effect of various factors such as image recognition and instruction fo… ▽ More

    Submitted 5 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: 16 pages, 10 figures, 2 tables

  27. arXiv:2401.01773  [pdf, other

    physics.geo-ph physics.data-an physics.space-ph

    A Global Analysis of Pre-Earthquake Ionospheric Anomalies

    Authors: Luke Cullen, Andy W Smith, Asadullah H Galib, Debvrat Varshney, Edward J E Brown, Peter J Chi, Xiangning Chu, Filip Svoboda

    Abstract: Local ionospheric density anomalies have been reported in the days prior to major earthquakes. This global study statistically investigates whether consistent ionospheric anomalies occur in the 24 hours prior to earthquakes across different regions, magnitudes, temporal and spatial scales. We match earthquake data to Total Electron Content (TEC) data from 2000-2020 at a higher resolution and caden… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: 12 pages, 4 figures. Presented at AGU fall meeting 2022 (https://agu.confex.com/agu/fm22/meetingapp.cgi/Paper/1142329)

  28. arXiv:2312.06674  [pdf, other

    cs.CL cs.AI

    Llama Guard: LLM-based Input-Output Safeguard for Human-AI Conversations

    Authors: Hakan Inan, Kartikeya Upasani, Jianfeng Chi, Rashi Rungta, Krithika Iyer, Yuning Mao, Michael Tontchev, Qing Hu, Brian Fuller, Davide Testuggine, Madian Khabsa

    Abstract: We introduce Llama Guard, an LLM-based input-output safeguard model geared towards Human-AI conversation use cases. Our model incorporates a safety risk taxonomy, a valuable tool for categorizing a specific set of safety risks found in LLM prompts (i.e., prompt classification). This taxonomy is also instrumental in classifying the responses generated by LLMs to these prompts, a process we refer to… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  29. Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation

    Authors: Kunlin Cai, Jinghuai Zhang, Zhiqing Hong, Will Shand, Guang Wang, Desheng Zhang, Jianfeng Chi, Yuan Tian

    Abstract: As location-based services (LBS) have grown in popularity, more human mobility data has been collected. The collected data can be used to build machine learning (ML) models for LBS to enhance their performance and improve overall experience for users. However, the convenience comes with the risk of privacy leakage since this type of data might contain sensitive information related to user identiti… ▽ More

    Submitted 5 July, 2024; v1 submitted 28 October, 2023; originally announced October 2023.

    Comments: 18 pages

    Journal ref: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2024)

  30. arXiv:2306.09468  [pdf, other

    cs.LG cs.AI cs.CY

    FFB: A Fair Fairness Benchmark for In-Processing Group Fairness Methods

    Authors: Xiaotian Han, Jianfeng Chi, Yu Chen, Qifan Wang, Han Zhao, Na Zou, Xia Hu

    Abstract: This paper introduces the Fair Fairness Benchmark (\textsf{FFB}), a benchmarking framework for in-processing group fairness methods. Ensuring fairness in machine learning is important for ethical compliance. However, there exist challenges in comparing and developing fairness methods due to inconsistencies in experimental settings, lack of accessible algorithmic implementations, and limited extens… ▽ More

    Submitted 10 June, 2024; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: ICLR2024

  31. arXiv:2212.10011  [pdf, other

    cs.CL

    PLUE: Language Understanding Evaluation Benchmark for Privacy Policies in English

    Authors: Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang

    Abstract: Privacy policies provide individuals with information about their rights and how their personal information is handled. Natural language understanding (NLU) technologies can support individuals and practitioners to understand better privacy practices described in lengthy and complex documents. However, existing efforts that use NLU technologies are limited by processing the language in a way exclu… ▽ More

    Submitted 12 May, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Comments: ACL 2023. Code is released at https://github.com/JFChi/PLUE

  32. arXiv:2211.05749  [pdf, other

    stat.CO stat.ML

    Linear Discriminant Analysis with the Randomized Kaczmarz Method

    Authors: Jocelyn T. Chi, Deanna Needell

    Abstract: We present a randomized Kaczmarz method for linear discriminant analysis (rkLDA), an iterative randomized approach to binary-class Gaussian model linear discriminant analysis (LDA) for very large data. We harness a least squares formulation and mobilize the stochastic gradient descent framework to obtain a randomized classifier with performance that can achieve comparable accuracy to that of full… ▽ More

    Submitted 7 January, 2025; v1 submitted 10 November, 2022; originally announced November 2022.

  33. arXiv:2209.04968  [pdf, other

    stat.CO

    Population-Based Hierarchical Non-negative Matrix Factorization for Survey Data

    Authors: Xiaofu Ding, Xinyu Dong, Olivia McGough, Chenxin Shen, Annie Ulichney, Ruiyao Xu, William Swartworth, Jocelyn T. Chi, Deanna Needell

    Abstract: Motivated by the problem of identifying potential hierarchical population structure on modern survey data containing a wide range of complex data types, we introduce population-based hierarchical non-negative matrix factorization (PHNMF). PHNMF is a variant of hierarchical non-negative matrix factorization based on feature similarity. As such, it enables an automatic and interpretable approach for… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  34. Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN

    Authors: Kuan Li, Yang Liu, Xiang Ao, Jianfeng Chi, Jinghua Feng, Hao Yang, Qing He

    Abstract: Benefiting from the message passing mechanism, Graph Neural Networks (GNNs) have been successful on flourish tasks over graph data. However, recent studies have shown that attackers can catastrophically degrade the performance of GNNs by maliciously modifying the graph structure. A straightforward solution to remedy this issue is to model the edge weights by learning a metric function between pair… ▽ More

    Submitted 21 April, 2023; v1 submitted 30 June, 2022; originally announced July 2022.

    Comments: Accepted in KDD2022

  35. arXiv:2205.11485  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    Conditional Supervised Contrastive Learning for Fair Text Classification

    Authors: Jianfeng Chi, William Shand, Yaodong Yu, Kai-Wei Chang, Han Zhao, Yuan Tian

    Abstract: Contrastive representation learning has gained much attention due to its superior performance in learning representations from both image and sequential data. However, the learned representations could potentially lead to performance disparities in downstream tasks, such as increased silencing of underrepresented groups in toxicity comment classification. In light of this challenge, in this work,… ▽ More

    Submitted 31 October, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: Findings of EMNLP 2022

  36. arXiv:2204.08952  [pdf, other

    cs.CL

    Retrieval Enhanced Data Augmentation for Question Answering on Privacy Policies

    Authors: Md Rizwan Parvez, Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang

    Abstract: Prior studies in privacy policies frame the question answering (QA) task as identifying the most relevant text segment or a list of sentences from a policy document given a user query. Existing labeled datasets are heavily imbalanced (only a few relevant segments), limiting the QA performance in this domain. In this paper, we develop a data augmentation framework based on ensembling retriever mode… ▽ More

    Submitted 22 April, 2023; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: EACL 2023

  37. Behavior-aware Account De-anonymization on Ethereum Interaction Graph

    Authors: Jiajun Zhou, Chenkai Hu, Jianlei Chi, Jiajing Wu, Meng Shen, Qi Xuan

    Abstract: Blockchain technology has the characteristics of decentralization, traceability and tamper-proof, which creates a reliable decentralized trust mechanism, further accelerating the development of blockchain finance. However, the anonymization of blockchain hinders market regulation, resulting in increasing illegal activities such as money laundering, gambling and phishing fraud on blockchain financi… ▽ More

    Submitted 13 September, 2022; v1 submitted 17 March, 2022; originally announced March 2022.

    Comments: Accepted by IEEE Transactions on Information Forensics & Security

    Journal ref: in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3433-3448, 2022

  38. Structural Health Monitoring of a Foot Bridge in Virtual Reality Environment

    Authors: Furkan Luleci, Liangding Li, Jiapeng Chi, Dirk Reiners, Carolina Cruz-Neira, F. Necati Catbas

    Abstract: Ageing civil infrastructure systems require imminent attention before any failure mechanism becomes critical. Structural Health Monitoring (SHM) is employed to track inputs and/or responses of structural systems for decision support. Inspections and structural health monitoring require field visits, and subsequently expert assessment of critical elements at site, which may be both time-consuming a… ▽ More

    Submitted 3 March, 2022; v1 submitted 6 December, 2021; originally announced December 2021.

  39. arXiv:2111.10476  [pdf, other

    cs.LG cs.AI cs.CY stat.ML

    Towards Return Parity in Markov Decision Processes

    Authors: Jianfeng Chi, Jian Shen, Xinyi Dai, Weinan Zhang, Yuan Tian, Han Zhao

    Abstract: Algorithmic decisions made by machine learning models in high-stakes domains may have lasting impacts over time. However, naive applications of standard fairness criterion in static settings over temporal domains may lead to delayed and adverse effects. To understand the dynamics of performance disparity, we study a fairness problem in Markov decision processes (MDPs). Specifically, we propose ret… ▽ More

    Submitted 25 February, 2022; v1 submitted 19 November, 2021; originally announced November 2021.

    Comments: AISTATS 2022. Code is released at https://github.com/JFChi/Return-Parity-MDP

  40. arXiv:2110.11707  [pdf, other

    cs.LG stat.ML

    Variational Wasserstein Barycenters with c-Cyclical Monotonicity

    Authors: Jinjin Chi, Zhiyao Yang, Jihong Ouyang, Ximing Li

    Abstract: Wasserstein barycenter, built on the theory of optimal transport, provides a powerful framework to aggregate probability distributions, and it has increasingly attracted great attention within the machine learning community. However, it suffers from severe computational burden, especially for high dimensional and continuous settings. To this end, we develop a novel continuous approximation method… ▽ More

    Submitted 17 December, 2022; v1 submitted 22 October, 2021; originally announced October 2021.

  41. arXiv:2105.03228  [pdf, other

    stat.CO stat.ME

    SEAGLE: A Scalable Exact Algorithm for Large-Scale Set-Based GxE Tests in Biobank Data

    Authors: Jocelyn T. Chi, Ilse C. F. Ipsen, Tzu-Hung Hsiao, Ching-Heng Lin, Li-San Wang, Wan-Ping Lee, Tzu-Pin Lu, Jung-Ying Tzeng

    Abstract: The explosion of biobank data offers immediate opportunities for gene-environment (GxE) interaction studies of complex diseases because of the large sample sizes and the rich collection in genetic and non-genetic information. However, the extremely large sample size also introduces new computational challenges in GxE assessment, especially for set-based GxE variance component (VC) tests, which are… ▽ More

    Submitted 14 May, 2021; v1 submitted 7 May, 2021; originally announced May 2021.

  42. arXiv:2102.12013  [pdf, other

    cs.LG cs.CY stat.ML

    Understanding and Mitigating Accuracy Disparity in Regression

    Authors: Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon, Han Zhao

    Abstract: With the widespread deployment of large-scale prediction systems in high-stakes domains, e.g., face recognition, criminal justice, etc., disparity in prediction accuracy between different demographic subgroups has called for fundamental understanding on the source of such disparity and algorithmic intervention to mitigate it. In this paper, we study the accuracy disparity problem in regression. To… ▽ More

    Submitted 12 June, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: ICML 2021

  43. arXiv:2101.00123  [pdf, other

    cs.CL

    Intent Classification and Slot Filling for Privacy Policies

    Authors: Wasi Uddin Ahmad, Jianfeng Chi, Tu Le, Thomas Norton, Yuan Tian, Kai-Wei Chang

    Abstract: Understanding privacy policies is crucial for users as it empowers them to learn about the information that matters to them. Sentences written in a privacy policy document explain privacy practices, and the constituent text spans convey further specific information about that practice. We refer to predicting the privacy practice explained in a sentence as intent classification and identifying the… ▽ More

    Submitted 4 June, 2021; v1 submitted 31 December, 2020; originally announced January 2021.

    Comments: ACL 2021 (camera ready)

  44. arXiv:2010.10805  [pdf, other

    cs.CR cs.SE

    SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning

    Authors: Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin

    Abstract: Software vulnerabilities are now reported at an unprecedented speed due to the recent development of automated vulnerability hunting tools. However, fixing vulnerabilities still mainly depends on programmers' manual efforts. Developers need to deeply understand the vulnerability and try to affect the system's functions as little as possible. In this paper, with the advancement of Neural Machine… ▽ More

    Submitted 22 March, 2022; v1 submitted 21 October, 2020; originally announced October 2020.

    Comments: 22 pages, 20 figures, 7 tables

  45. arXiv:2010.08980  [pdf, other

    cs.CL

    Querent Intent in Multi-Sentence Questions

    Authors: Laurie Burchell, Jie Chi, Tom Hosking, Nina Markl, Bonnie Webber

    Abstract: Multi-sentence questions (MSQs) are sequences of questions connected by relations which, unlike sequences of standalone questions, need to be answered as a unit. Following Rhetorical Structure Theory (RST), we recognise that different "question discourse relations" between the subparts of MSQs reflect different speaker intents, and consequently elicit different answering strategies. Correctly iden… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

    Comments: LAW XIV, COLING 2020

  46. arXiv:2010.04133  [pdf, other

    stat.CO

    A User-Friendly Computational Framework for Robust Structured Regression with the L$_2$ Criterion

    Authors: Jocelyn T. Chi, Eric C. Chi

    Abstract: We introduce a user-friendly computational framework for implementing robust versions of a wide variety of structured regression methods with the L$_{2}$ criterion. In addition to introducing an algorithm for performing L$_{2}$E regression, our framework enables robust regression with the L$_{2}$ criterion for additional structural constraints, works without requiring complex tuning procedures on… ▽ More

    Submitted 13 September, 2021; v1 submitted 8 October, 2020; originally announced October 2020.

  47. arXiv:2010.02557  [pdf, other

    cs.CL

    PolicyQA: A Reading Comprehension Dataset for Privacy Policies

    Authors: Wasi Uddin Ahmad, Jianfeng Chi, Yuan Tian, Kai-Wei Chang

    Abstract: Privacy policy documents are long and verbose. A question answering (QA) system can assist users in finding the information that is relevant and important to them. Prior studies in this domain frame the QA task as retrieving the most relevant text segment or a list of sentences from the policy document given a question. On the contrary, we argue that providing users with a short text span from pol… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: EMNLP Findings 2020 (short paper)

  48. arXiv:2007.06099  [pdf, ps, other

    math.NA

    Multiplicative Perturbation Bounds for Multivariate Multiple Linear Regression in Schatten $p$-Norms

    Authors: Jocelyn T. Chi, Ilse C. F. Ipsen

    Abstract: Multivariate multiple linear regression (MMLR), which occurs in a number of practical applications, generalizes traditional least squares (multivariate linear regression) to multiple right-hand sides. We extend recent MLR analyses to sketched MMLR in general Schatten $p$-norms by interpreting the sketched problem as a multiplicative perturbation. Our work represents an extension of Maher's results… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

  49. arXiv:2007.03128  [pdf, other

    astro-ph.HE astro-ph.IM gr-qc

    Neutron Star Extreme Matter Observatory: A kilohertz-band gravitational-wave detector in the global network

    Authors: K. Ackley, V. B. Adya, P. Agrawal, P. Altin, G. Ashton, M. Bailes, E. Baltinas, A. Barbuio, D. Beniwal, C. Blair, D. Blair, G. N. Bolingbroke, V. Bossilkov, S. Shachar Boublil, D. D. Brown, B. J. Burridge, J. Calderon Bustillo, J. Cameron, H. Tuong Cao, J. B. Carlin, S. Chang, P. Charlton, C. Chatterjee, D. Chattopadhyay, X. Chen , et al. (139 additional authors not shown)

    Abstract: Gravitational waves from coalescing neutron stars encode information about nuclear matter at extreme densities, inaccessible by laboratory experiments. The late inspiral is influenced by the presence of tides, which depend on the neutron star equation of state. Neutron star mergers are expected to often produce rapidly-rotating remnant neutron stars that emit gravitational waves. These will provid… ▽ More

    Submitted 5 November, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: Accepted for publication in PASA

    Journal ref: PASA (2020) 37, e047

  50. Systematic investigations of positive-parity doublet bands with three-quasiparticle configurations in $^{125,127,129,131}$Cs

    Authors: Rui Guo, Wu-Ji Sun, Jian Li, Dong Yang, Yonghao Liu, Chengkun Ru, Jihuai Chi

    Abstract: The experimental features of positive-parity doublet bands in the odd-\emph{A} cesium isotopes $^{125,127,129,131}$Cs, including angular momentum alignment, energy staggering, $B(M1)/B(E2)$ etc. are studied systematically and compared to those of the candidate chiral bands in the adjacent odd-odd Cs isotopes. The configuration assignments and the dynamics of these bands are discussed. The self-con… ▽ More

    Submitted 10 October, 2019; originally announced October 2019.

    Comments: 18 pages, 10 figures

    Journal ref: Physical Review C 100, 034328 (2019)