Skip to main content

Showing 1–50 of 92 results for author: Diao, Y

.
  1. arXiv:2507.01428  [pdf, ps, other

    cs.CV eess.IV

    DiffMark: Diffusion-based Robust Watermark Against Deepfakes

    Authors: Chen Sun, Haiyang Sun, Zhiqing Guo, Yunfeng Diao, Liejun Wang, Dan Ma, Gaobo Yang, Keqin Li

    Abstract: Deepfakes pose significant security and privacy threats through malicious facial manipulations. While robust watermarking can aid in authenticity verification and source tracking, existing methods often lack the sufficient robustness against Deepfake manipulations. Diffusion models have demonstrated remarkable performance in image generation, enabling the seamless fusion of watermark with image du… ▽ More

    Submitted 2 July, 2025; originally announced July 2025.

  2. arXiv:2507.00861  [pdf, ps, other

    cs.CV

    SafeMap: Robust HD Map Construction from Incomplete Observations

    Authors: Xiaoshuai Hao, Lingdong Kong, Rong Yin, Pengwei Wang, Jing Zhang, Yunfeng Diao, Shu Zhao

    Abstract: Robust high-definition (HD) map construction is vital for autonomous driving, yet existing methods often struggle with incomplete multi-view camera data. This paper presents SafeMap, a novel framework specifically designed to secure accuracy even when certain camera views are missing. SafeMap integrates two key components: the Gaussian-based Perspective View Reconstruction (G-PVR) module and the D… ▽ More

    Submitted 1 July, 2025; originally announced July 2025.

    Comments: Accepted by ICML 2025

  3. arXiv:2506.23292  [pdf, ps, other

    cs.CV

    DDL: A Dataset for Interpretable Deepfake Detection and Localization in Real-World Scenarios

    Authors: Changtao Miao, Yi Zhang, Weize Gao, Man Luo, Weiwei Feng, Zhiya Tan, Jianshu Li, Ajian Liu, Yunfeng Diao, Qi Chu, Tao Gong, Zhe Li, Weibin Yao, Joey Tianyi Zhou

    Abstract: Recent advances in AIGC have exacerbated the misuse of malicious deepfake content, making the development of reliable deepfake detection methods an essential means to address this challenge. Although existing deepfake detection models demonstrate outstanding performance in detection metrics, most methods only provide simple binary classification results, lacking interpretability. In critical domai… ▽ More

    Submitted 29 June, 2025; originally announced June 2025.

    Comments: This paper is a preliminary version, with an extended and comprehensive version currently under development

  4. arXiv:2506.18065  [pdf, ps, other

    math.NT

    Liouville function, von Mangoldt function and norm forms at random binary forms

    Authors: Yijie Diao

    Abstract: We analyze the average behavior of various arithmetic functions at the values of degree $d$ binary forms ordered by height, with probability $1$. This approach yields averaged versions of the Chowla conjecture and the Bateman-Horn conjecture for random binary forms. Furthermore, we show that the rational Hasse principle holds for almost all Châtelet varieties defined by a fixed norm form of degree… ▽ More

    Submitted 22 June, 2025; originally announced June 2025.

    Comments: 39 pages

    MSC Class: 11N32 (11N37; 11D57; 11G35)

  5. arXiv:2506.12708  [pdf, ps, other

    cs.DC cs.AI cs.AR cs.LG

    Serving Large Language Models on Huawei CloudMatrix384

    Authors: Pengfei Zuo, Huimin Lin, Junbo Deng, Nan Zou, Xingkun Yang, Yingyu Diao, Weifeng Gao, Ke Xu, Zhangyu Chen, Shirui Lu, Zhao Qiu, Peiyang Li, Xianyu Chang, Zhengzhong Yu, Fangzheng Miao, Jia Zheng, Ying Li, Yuan Feng, Bei Wang, Zaijian Zong, Mosong Zhou, Wenli Zhou, Houjiang Chen, Xingyu Liao, Yipeng Li , et al. (21 additional authors not shown)

    Abstract: The rapid evolution of large language models (LLMs), driven by growing parameter scales, adoption of mixture-of-experts (MoE) architectures, and expanding context lengths, imposes unprecedented demands on AI infrastructure. Traditional AI clusters face limitations in compute intensity, memory bandwidth, inter-chip communication, and latency, compounded by variable workloads and strict service-leve… ▽ More

    Submitted 19 June, 2025; v1 submitted 14 June, 2025; originally announced June 2025.

    Comments: 59 pages, 24 figures

  6. arXiv:2505.24586  [pdf, ps, other

    astro-ph.HE

    All-sky search for individual Primordial Black Hole bursts with LHAASO

    Authors: Zhen Cao, F. Aharonian, Y. X. Bai, Y. W. Bao, D. Bastieri, X. J. Bi, Y. J. Bi, W. Bian, A. V. Bukevich, C. M. Cai, W. Y. Cao, Zhe Cao, J. Chang, J. F. Chang, A. M. Chen, E. S. Chen, G. H. Chen, H. X. Chen, Liang Chen, Long Chen, M. J. Chen, M. L. Chen, Q. H. Chen, S. Chen, S. H. Chen , et al. (293 additional authors not shown)

    Abstract: Primordial Black Holes~(PBHs) are hypothetical black holes with a wide range of masses that formed in the early universe. As a result, they may play an important cosmological role and provide a unique probe of the early universe. A PBH with an initial mass of approximately $10^{15}$~g is expected to explode today in a final burst of Hawking radiation. In this work, we conduct an all-sky search for… ▽ More

    Submitted 2 June, 2025; v1 submitted 30 May, 2025; originally announced May 2025.

    Comments: 8 pages, 2 figures

  7. arXiv:2505.22604  [pdf, ps, other

    cs.CV

    Adversarially Robust AI-Generated Image Detection for Free: An Information Theoretic Perspective

    Authors: Ruixuan Zhang, He Wang, Zhengyu Zhao, Zhiqing Guo, Xun Yang, Yunfeng Diao, Meng Wang

    Abstract: Rapid advances in Artificial Intelligence Generated Images (AIGI) have facilitated malicious use, such as forgery and misinformation. Therefore, numerous methods have been proposed to detect fake images. Although such detectors have been proven to be universally vulnerable to adversarial attacks, defenses in this field are scarce. In this paper, we first identify that adversarial training (AT), wi… ▽ More

    Submitted 30 May, 2025; v1 submitted 28 May, 2025; originally announced May 2025.

  8. arXiv:2505.21874  [pdf, ps, other

    eess.IV cs.CV

    MAMBO-NET: Multi-Causal Aware Modeling Backdoor-Intervention Optimization for Medical Image Segmentation Network

    Authors: Ruiguo Yu, Yiyang Zhang, Yuan Tian, Yujie Diao, Di Jin, Witold Pedrycz

    Abstract: Medical image segmentation methods generally assume that the process from medical image to segmentation is unbiased, and use neural networks to establish conditional probability models to complete the segmentation task. This assumption does not consider confusion factors, which can affect medical images, such as complex anatomical variations and imaging modality limitations. Confusion factors obfu… ▽ More

    Submitted 27 May, 2025; originally announced May 2025.

  9. arXiv:2505.19459  [pdf, ps, other

    cs.LG cs.AI

    Your Classifier Can Do More: Towards Bridging the Gaps in Classification, Robustness, and Generation

    Authors: Kaichao Jiang, He Wang, Xiaoshuai Hao, Xiulong Yang, Ajian Liu, Qi Chu, Yunfeng Diao

    Abstract: Joint Energy-based Models (JEMs), a class of hybrid generative-discriminative models, are well known for their ability to achieve both high classification accuracy and generative capability within a single model. However, their robustness still lags significantly behind the classifiers based adversarial training (AT). Conversely, while AT is currently the most effective approach to improving the c… ▽ More

    Submitted 25 May, 2025; originally announced May 2025.

  10. arXiv:2505.14447  [pdf, ps, other

    astro-ph.HE hep-ex

    First Identification and Precise Spectral Measurement of the Proton Component in the Cosmic-Ray `Knee'

    Authors: The LHAASO Collaboration, Zhen Cao, F. Aharonian, Y. X. Bai, Y. W. Bao, D. Bastieri, X. J. Bi, Y. J. Bi, W. Bian, A. V. Bukevich, C. M. Cai, W. Y. Cao, Zhe Cao, J. Chang, J. F. Chang, A. M. Chen, E. S. Chen, G. H. Chen, H. X. Chen, Liang Chen, Long Chen, M. J. Chen, M. L. Chen, Q. H. Chen, S. Chen , et al. (292 additional authors not shown)

    Abstract: We report the first high-purity identification of cosmic-ray (CR) protons and a precise measurement of their energy spectrum from 0.15 to 12 PeV using the Large High Altitude Air Shower Observatory (LHAASO). Abundant event statistics, combined with the simultaneous detection of electrons/photons, muons, and Cherenkov light in air showers, enable spectroscopic measurements with statistical and syst… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  11. arXiv:2505.12565  [pdf, ps, other

    cs.AI cs.CL cs.LG q-bio.QM

    mCLM: A Function-Infused and Synthesis-Friendly Modular Chemical Language Model

    Authors: Carl Edwards, Chi Han, Gawon Lee, Thao Nguyen, Bowen Jin, Chetan Kumar Prasad, Sara Szymkuć, Bartosz A. Grzybowski, Ying Diao, Jiawei Han, Ge Liu, Hao Peng, Martin D. Burke, Heng Ji

    Abstract: Despite their ability to understand chemical knowledge and accurately generate sequential representations, large language models (LLMs) remain limited in their capacity to propose novel molecules with drug-like properties. In addition, the molecules that LLMs propose can often be challenging to make in the lab. To more effectively enable the discovery of functional small molecules, LLMs need to le… ▽ More

    Submitted 18 May, 2025; originally announced May 2025.

  12. arXiv:2505.08614  [pdf, ps, other

    cs.CV

    WaveGuard: Robust Deepfake Detection and Source Tracing via Dual-Tree Complex Wavelet and Graph Neural Networks

    Authors: Ziyuan He, Zhiqing Guo, Liejun Wang, Gaobo Yang, Yunfeng Diao, Dan Ma

    Abstract: Deepfake technology poses increasing risks such as privacy invasion and identity theft. To address these threats, we propose WaveGuard, a proactive watermarking framework that enhances robustness and imperceptibility via frequency-domain embedding and graph-based structural consistency. Specifically, we embed watermarks into high-frequency sub-bands using Dual-Tree Complex Wavelet Transform (DT-CW… ▽ More

    Submitted 25 May, 2025; v1 submitted 13 May, 2025; originally announced May 2025.

    Comments: 12 pages, 6 figures, 5 tables

  13. arXiv:2504.11259  [pdf, ps, other

    cs.DB

    The Cambridge Report on Database Research

    Authors: Anastasia Ailamaki, Samuel Madden, Daniel Abadi, Gustavo Alonso, Sihem Amer-Yahia, Magdalena Balazinska, Philip A. Bernstein, Peter Boncz, Michael Cafarella, Surajit Chaudhuri, Susan Davidson, David DeWitt, Yanlei Diao, Xin Luna Dong, Michael Franklin, Juliana Freire, Johannes Gehrke, Alon Halevy, Joseph M. Hellerstein, Mark D. Hill, Stratos Idreos, Yannis Ioannidis, Christoph Koch, Donald Kossmann, Tim Kraska , et al. (21 additional authors not shown)

    Abstract: On October 19 and 20, 2023, the authors of this report convened in Cambridge, MA, to discuss the state of the database research field, its recent accomplishments and ongoing challenges, and future directions for research and community engagement. This gathering continues a long standing tradition in the database community, dating back to the late 1980s, in which researchers meet roughly every five… ▽ More

    Submitted 15 April, 2025; originally announced April 2025.

  14. arXiv:2504.04818  [pdf, ps, other

    cs.CV

    SUEDE:Shared Unified Experts for Physical-Digital Face Attack Detection Enhancement

    Authors: Zuying Xie, Changtao Miao, Ajian Liu, Jiabao Guo, Feng Li, Dan Guo, Yunfeng Diao

    Abstract: Face recognition systems are vulnerable to physical attacks (e.g., printed photos) and digital threats (e.g., DeepFake), which are currently being studied as independent visual tasks, such as Face Anti-Spoofing and Forgery Detection. The inherent differences among various attack types present significant challenges in identifying a common feature space, making it difficult to develop a unified fra… ▽ More

    Submitted 18 June, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

    Comments: Accepted in ICME 2025 (Oral)

  15. arXiv:2504.04470  [pdf, other

    cs.CV

    Domain Generalization for Face Anti-spoofing via Content-aware Composite Prompt Engineering

    Authors: Jiabao Guo, Ajian Liu, Yunfeng Diao, Jin Zhang, Hui Ma, Bo Zhao, Richang Hong, Meng Wang

    Abstract: The challenge of Domain Generalization (DG) in Face Anti-Spoofing (FAS) is the significant interference of domain-specific signals on subtle spoofing clues. Recently, some CLIP-based algorithms have been developed to alleviate this interference by adjusting the weights of visual classifiers. However, our analysis of this class-wise prompt engineering suffers from two shortcomings for DG FAS: (1) T… ▽ More

    Submitted 6 April, 2025; originally announced April 2025.

  16. arXiv:2503.23060  [pdf, other

    cs.LG

    Unsupervised Anomaly Detection in Multivariate Time Series across Heterogeneous Domains

    Authors: Vincent Jacob, Yanlei Diao

    Abstract: The widespread adoption of digital services, along with the scale and complexity at which they operate, has made incidents in IT operations increasingly more likely, diverse, and impactful. This has led to the rapid development of a central aspect of "Artificial Intelligence for IT Operations" (AIOps), focusing on detecting anomalies in vast amounts of multivariate time series data generated by se… ▽ More

    Submitted 29 March, 2025; originally announced March 2025.

  17. arXiv:2503.08661  [pdf, other

    cs.IT cs.CV eess.IV

    Task-Oriented Co-Design of Communication, Computing, and Control for Edge-Enabled Industrial Cyber-Physical Systems

    Authors: Yufeng Diao, Yichi Zhang, Daniele De Martini, Philip Guodong Zhao, Emma Liying Li

    Abstract: This paper proposes a task-oriented co-design framework that integrates communication, computing, and control to address the key challenges of bandwidth limitations, noise interference, and latency in mission-critical industrial Cyber-Physical Systems (CPS). To improve communication efficiency and robustness, we design a task-oriented Joint Source-Channel Coding (JSCC) using Information Bottleneck… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

    Comments: This paper has been accepted for publication in IEEE Journal on Selected Areas in Communications (JSAC), with publication expected in 2025

  18. Leveraging Large Language Models For Optimized Item Categorization using UNSPSC Taxonomy

    Authors: Anmolika Singh, Yuhang Diao

    Abstract: Effective item categorization is vital for businesses, enabling the transformation of unstructured datasets into organized categories that streamline inventory management. Despite its importance, item categorization remains highly subjective and lacks a uniform standard across industries and businesses. The United Nations Standard Products and Services Code (UNSPSC) provides a standardized system… ▽ More

    Submitted 27 December, 2024; originally announced March 2025.

    Comments: 10 Pages, International Conference on NLP, AI, Computer Science & Engineering (NLAICSE 2024), December 2024, ISBN : 978-1-923107-45-8

    Journal ref: International Journal on Cybernetics & Informatics. 13. (2024)

  19. arXiv:2502.15472  [pdf, other

    cs.IT cs.CV eess.IV

    Aligning Task- and Reconstruction-Oriented Communications for Edge Intelligence

    Authors: Yufeng Diao, Yichi Zhang, Changyang She, Philip Guodong Zhao, Emma Liying Li

    Abstract: Existing communication systems aim to reconstruct the information at the receiver side, and are known as reconstruction-oriented communications. This approach often falls short in meeting the real-time, task-specific demands of modern AI-driven applications such as autonomous driving and semantic segmentation. As a new design principle, task-oriented communications have been developed. However, it… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Communications (JSAC)

  20. arXiv:2502.15447  [pdf, other

    astro-ph.HE hep-ph

    Ultra-high-energy $γ$-ray emission associated with the tail of a bow-shock pulsar wind nebula

    Authors: Zhen Cao, F. Aharonian, Y. X. Bai, Y. W. Bao, D. Bastieri, X. J. Bi, Y. J. Bi, W. Bian, A. V. Bukevich, C. M. Cai, W. Y. Cao, Zhe Cao, J. Chang, J. F. Chang, A. M. Chen, E. S. Chen, H. X. Chen, Liang Chen, Long Chen, M. J. Chen, M. L. Chen, Q. H. Chen, S. Chen, S. H. Chen, S. Z. Chen , et al. (274 additional authors not shown)

    Abstract: In this study, we present a comprehensive analysis of an unidentified point-like ultra-high-energy (UHE) $γ$-ray source, designated as 1LHAASO J1740+0948u, situated in the vicinity of the middle-aged pulsar PSR J1740+1000. The detection significance reached 17.1$σ$ (9.4$σ$) above 25$\,$TeV (100$\,$TeV). The source energy spectrum extended up to 300$\,$TeV, which was well fitted by a log-parabola f… ▽ More

    Submitted 24 February, 2025; v1 submitted 21 February, 2025; originally announced February 2025.

    Comments: Corrected spelling errors in several author names

    Journal ref: The Innovation (2025), 100802

  21. arXiv:2502.04848  [pdf, other

    astro-ph.HE

    Broadband $γ$-ray spectrum of supernova remnant Cassiopeia A

    Authors: Zhen Cao, F. Aharonian, Y. X. Bai, Y. W. Bao, D. Bastieri, X. J. Bi, Y. J. Bi, W. Bian, A. V. Bukevich, C. M. Cai, W. Y. Cao, Zhe Cao, J. Chang, J. F. Chang, A. M. Chen, E. S. Chen, H. X. Chen, Liang Chen, Long Chen, M. J. Chen, M. L. Chen, Q. H. Chen, S. Chen, S. H. Chen, S. Z. Chen , et al. (293 additional authors not shown)

    Abstract: The core-collapse supernova remnant (SNR) Cassiopeia A (Cas A) is one of the brightest galactic radio sources with an angular radius of $\sim$ 2.5 $\arcmin$. Although no extension of this source has been detected in the $γ$-ray band, using more than 1000 days of LHAASO data above $\sim 0.8$ TeV, we find that its spectrum is significantly softer than those obtained with Imaging Air Cherenkov Telesc… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

  22. arXiv:2502.04377  [pdf, other

    cs.CV cs.AI

    MapFusion: A Novel BEV Feature Fusion Network for Multi-modal Map Construction

    Authors: Xiaoshuai Hao, Yunfeng Diao, Mengchuan Wei, Yifan Yang, Peng Hao, Rong Yin, Hui Zhang, Weiming Li, Shu Zhao, Yu Liu

    Abstract: Map construction task plays a vital role in providing precise and comprehensive static environmental information essential for autonomous driving systems. Primary sensors include cameras and LiDAR, with configurations varying between camera-only, LiDAR-only, or camera-LiDAR fusion, based on cost-performance considerations. While fusion-based methods typically perform best, existing approaches ofte… ▽ More

    Submitted 5 February, 2025; originally announced February 2025.

  23. arXiv:2412.20833  [pdf, ps, other

    cs.CV cs.MM

    Inclusion 2024 Global Multimedia Deepfake Detection Challenge: Towards Multi-dimensional Face Forgery Detection

    Authors: Yi Zhang, Weize Gao, Changtao Miao, Man Luo, Jianshu Li, Wenzhong Deng, Zhe Li, Bingyu Hu, Weibin Yao, Yunfeng Diao, Wenbo Zhou, Tao Gong, Qi Chu

    Abstract: In this paper, we present the Global Multimedia Deepfake Detection held concurrently with the Inclusion 2024. Our Multimedia Deepfake Detection aims to detect automatic image and audio-video manipulations including but not limited to editing, synthesis, generation, Photoshop,etc. Our challenge has attracted 1500 teams from all over the world, with about 5000 valid result submission counts. We invi… ▽ More

    Submitted 3 June, 2025; v1 submitted 30 December, 2024; originally announced December 2024.

    Comments: Inclusion 2024 Global Multimedia Deepfake Detection Competition Top Team Technical Report

  24. arXiv:2412.16483  [pdf, other

    cs.LG physics.chem-ph q-bio.BM

    MOL-Mamba: Enhancing Molecular Representation with Structural & Electronic Insights

    Authors: Jingjing Hu, Dan Guo, Zhan Si, Deguang Liu, Yunfeng Diao, Jing Zhang, Jinxing Zhou, Meng Wang

    Abstract: Molecular representation learning plays a crucial role in various downstream tasks, such as molecular property prediction and drug design. To accurately represent molecules, Graph Neural Networks (GNNs) and Graph Transformers (GTs) have shown potential in the realm of self-supervised pretraining. However, existing approaches often overlook the relationship between molecular structure and electroni… ▽ More

    Submitted 5 February, 2025; v1 submitted 20 December, 2024; originally announced December 2024.

    Comments: Accepted by AAAI2025

  25. arXiv:2412.07229  [pdf, ps, other

    cs.LG cs.CV

    Moderating the Generalization of Score-based Generative Model

    Authors: Wan Jiang, He Wang, Xin Zhang, Dan Guo, Zhaoxin Fan, Yunfeng Diao, Richang Hong

    Abstract: Score-based Generative Models (SGMs) have demonstrated remarkable generalization abilities, e.g. generating unseen, but natural data. However, the greater the generalization power, the more likely the unintended generalization, and the more dangerous the abuse. Research on moderated generalization in SGMs remains limited. To fill this gap, we first examine the current 'gold standard' in Machine Un… ▽ More

    Submitted 26 June, 2025; v1 submitted 10 December, 2024; originally announced December 2024.

  26. arXiv:2412.06103  [pdf, other

    math.GT

    The Enumeration of Alternating Pretzel Links

    Authors: Charlotte Aspinwall, Tobias Clark, Yuanan Diao

    Abstract: In this paper, we tabulate the set of alternating pretzel links. Specifically, for any given crossing number $c$, we derive a closed formula that would allow us to compute $\mathcal{P}(c)$, the total number of alternating pretzel links with crossing number $c$. Numerical computation suggests that $\mathcal{P}(c)\approx 0.155e^{0.588c}$. That is, the number of alternating pretzel links with a given… ▽ More

    Submitted 15 February, 2025; v1 submitted 8 December, 2024; originally announced December 2024.

    Comments: 22 pages, 6 figures

    MSC Class: (2020): Primary: 57K10; Secondary: 57K14

  27. arXiv:2410.17986  [pdf, other

    cs.LG cs.AI cs.CR

    Federated Transformer: Multi-Party Vertical Federated Learning on Practical Fuzzily Linked Data

    Authors: Zhaomin Wu, Junyi Hou, Yiqun Diao, Bingsheng He

    Abstract: Federated Learning (FL) is an evolving paradigm that enables multiple parties to collaboratively train models without sharing raw data. Among its variants, Vertical Federated Learning (VFL) is particularly relevant in real-world, cross-organizational collaborations, where distinct features of a shared instance group are contributed by different parties. In these scenarios, parties are often linked… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

    Journal ref: 38th Conference on Neural Information Processing Systems (NeurIPS 2024)

  28. arXiv:2410.02082  [pdf, other

    cs.LG q-bio.QM

    FARM: Functional Group-Aware Representations for Small Molecules

    Authors: Thao Nguyen, Kuan-Hao Huang, Ge Liu, Martin D. Burke, Ying Diao, Heng Ji

    Abstract: We introduce Functional Group-Aware Representations for Small Molecules (FARM), a novel foundation model designed to bridge the gap between SMILES, natural language, and molecular graphs. The key innovation of FARM lies in its functional group-aware tokenization, which directly incorporates functional group information into the representations. This strategic reduction in tokenization granularity… ▽ More

    Submitted 6 October, 2024; v1 submitted 2 October, 2024; originally announced October 2024.

    Comments: Preprint

  29. arXiv:2409.06712  [pdf, other

    cs.CY

    A Meta-analysis of College Students' Intention to Use Generative Artificial Intelligence

    Authors: Yifei Diao, Ziyi Li, Jiateng Zhou, Wei Gao, Xin Gong

    Abstract: It is of critical importance to analyse the factors influencing college students' intention to use generative artificial intelligence (GenAI) to understand and predict learners' learning behaviours and academic outcomes. Nevertheless, a lack of congruity has been shown in extant research results. This study, therefore, conducted a meta-analysis of 27 empirical studies under an integrated theoretic… ▽ More

    Submitted 25 August, 2024; originally announced September 2024.

  30. arXiv:2409.02483  [pdf, other

    cs.CV cs.AI

    TASAR: Transfer-based Attack on Skeletal Action Recognition

    Authors: Yunfeng Diao, Baiqi Wu, Ruixuan Zhang, Ajian Liu, Xiaoshuai Hao, Xingxing Wei, Meng Wang, He Wang

    Abstract: Skeletal sequence data, as a widely employed representation of human actions, are crucial in Human Activity Recognition (HAR). Recently, adversarial attacks have been proposed in this area, which exposes potential security concerns, and more importantly provides a good tool for model robustness test. Within this research, transfer-based attack is an important tool as it mimics the real-world scena… ▽ More

    Submitted 12 February, 2025; v1 submitted 4 September, 2024; originally announced September 2024.

    Comments: Accepted in ICLR 2025

  31. arXiv:2408.03774  [pdf, ps, other

    math.NT

    Class numbers and integer points on some Pellian surfaces

    Authors: Yijie Diao

    Abstract: We provide an estimate for the number of nontrivial integer points on the Pellian surface $t^2 - du^2 = 1$ in a bounded region. We give a lower bound on the size of fundamental solutions for almost all $d$ in a certain class, based on a recent conjecture of Browning and Wilsch about integer points on log K3 surfaces. We also obtain an upper bound on the average of class number in this class, assum… ▽ More

    Submitted 7 August, 2024; originally announced August 2024.

    Comments: 14 pages

    MSC Class: 11D25 (11N56)

  32. arXiv:2407.20836  [pdf, other

    cs.CV cs.CR

    Vulnerabilities in AI-generated Image Detection: The Challenge of Adversarial Attacks

    Authors: Yunfeng Diao, Naixin Zhai, Changtao Miao, Zitong Yu, Xingxing Wei, Xun Yang, Meng Wang

    Abstract: Recent advancements in image synthesis, particularly with the advent of GAN and Diffusion models, have amplified public concerns regarding the dissemination of disinformation. To address such concerns, numerous AI-generated Image (AIGI) Detectors have been proposed and achieved promising performance in identifying fake images. However, there still lacks a systematic understanding of the adversaria… ▽ More

    Submitted 10 March, 2025; v1 submitted 30 July, 2024; originally announced July 2024.

  33. arXiv:2407.08572   

    cs.CV

    Boosting Adversarial Transferability for Skeleton-based Action Recognition via Exploring the Model Posterior Space

    Authors: Yunfeng Diao, Baiqi Wu, Ruixuan Zhang, Xun Yang, Meng Wang, He Wang

    Abstract: Skeletal motion plays a pivotal role in human activity recognition (HAR). Recently, attack methods have been proposed to identify the universal vulnerability of skeleton-based HAR(S-HAR). However, the research of adversarial transferability on S-HAR is largely missing. More importantly, existing attacks all struggle in transfer across unknown S-HAR models. We observed that the key reason is that t… ▽ More

    Submitted 5 September, 2024; v1 submitted 11 July, 2024; originally announced July 2024.

    Comments: We have submitted a new version of our work at arXiv:2409.02483. This version, arXiv:2407.08572, is no longer valid. Any update for this work will be conducted in arXiv:2409.02483

  34. arXiv:2407.00238  [pdf, other

    math.GT math.AT

    The Braid Indices of Pretzel Links: A Comprehensive Study, Part II

    Authors: Yuanan Diao, Claus Ernst, Gabor Hetyei

    Abstract: This paper is the second part of our comprehensive study on the braid index problem of pretzel links. Our ultimate goal is to completely determine the braid indices of all pretzel links, alternating or non alternating. In our approach, we divide the pretzel links into three types as follows. Let $D$ be a standard diagram of an oriented pretzel link $\mathcal{L}$, $S(D)$ be the Seifert circle decom… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

    Comments: 29 pages, 13 figures

    MSC Class: Primary: 5725; Secondary: 5727

  35. arXiv:2405.14203  [pdf, other

    cs.LG cs.AI physics.chem-ph

    GLaD: Synergizing Molecular Graphs and Language Descriptors for Enhanced Power Conversion Efficiency Prediction in Organic Photovoltaic Devices

    Authors: Thao Nguyen, Tiara Torres-Flores, Changhyun Hwang, Carl Edwards, Ying Diao, Heng Ji

    Abstract: This paper presents a novel approach for predicting Power Conversion Efficiency (PCE) of Organic Photovoltaic (OPV) devices, called GLaD: synergizing molecular Graphs and Language Descriptors for enhanced PCE prediction. Due to the lack of high-quality experimental data, we collect a dataset consisting of 500 pairs of OPV donor and acceptor molecules along with their corresponding PCE values, whic… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: In progress

  36. arXiv:2403.14094  [pdf, other

    math.GT math.AT

    The Braid Indices of Pretzel Links: A Comprehensive Study, Part I

    Authors: Yuanan Diao, Claus Ernst, Gabor Hetyei

    Abstract: The determination of the braid index of an oriented link is generally a hard problem. In the case of alternating links, some significant progresses have been made in recent years which made explicit and precise braid index computations possible for links from various families of alternating links, including the family of all alternating Montesinos links. However, much less is known for non-alterna… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: 25 pages, 18 figures

    MSC Class: 2010. Primary: 5725; Secondary: 5727

  37. A Spark Optimizer for Adaptive, Fine-Grained Parameter Tuning

    Authors: Chenghao Lyu, Qi Fan, Philippe Guyard, Yanlei Diao

    Abstract: As Spark becomes a common big data analytics platform, its growing complexity makes automatic tuning of numerous parameters critical for performance. Our work on Spark parameter tuning is particularly motivated by two recent trends: Spark's Adaptive Query Execution (AQE) based on runtime statistics, and the increasingly popular Spark cloud deployments that make cost-performance reasoning crucial f… ▽ More

    Submitted 18 July, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

    Journal ref: PVLDB, 15(11): 3098-3111, 2022

  38. arXiv:2312.06290  [pdf, other

    cs.LG

    Exploiting Label Skews in Federated Learning with Model Concatenation

    Authors: Yiqun Diao, Qinbin Li, Bingsheng He

    Abstract: Federated Learning (FL) has emerged as a promising solution to perform deep learning on different data owners without exchanging raw data. However, non-IID data has been a key challenge in FL, which could significantly degrade the accuracy of the final model. Among different non-IID types, label skews have been challenging and common in image classification and other tasks. Instead of averaging th… ▽ More

    Submitted 16 December, 2023; v1 submitted 11 December, 2023; originally announced December 2023.

  39. arXiv:2310.11791  [pdf, other

    q-bio.QM q-bio.NC

    STW-MD: A Novel Spatio-Temporal Weighting and Multi-Step Decision Tree Method for Considering Spatial Heterogeneity in Brain Gene Expression Data

    Authors: Shanjun Mao, Xiao Huang, Runjiu Chen, Chenyang Zhang, Yizhu Diao, Zongjin Li, Qingzhe Wang, Shan Tang, Shuixia Guo

    Abstract: Motivation: Gene expression during brain development or abnormal development is a biological process that is highly dynamic in spatio and temporal. Due to the lack of comprehensive integration of spatial and temporal dimensions of brain gene expression data, previous studies have mainly focused on individual brain regions or a certain developmental stage. Our motivation is to address this gap by i… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: 11 pages, 6 figures

  40. arXiv:2309.05622  [pdf, other

    cs.RO eess.SY

    Task-Oriented Cross-System Design for Timely and Accurate Modeling in the Metaverse

    Authors: Zhen Meng, Kan Chen, Yufeng Diao, Changyang She, Guodong Zhao, Muhammad Ali Imran, Branka Vucetic

    Abstract: In this paper, we establish a task-oriented cross-system design framework to minimize the required packet rate for timely and accurate modeling of a real-world robotic arm in the Metaverse, where sensing, communication, prediction, control, and rendering are considered. To optimize a scheduling policy and prediction horizons, we design a Constraint Proximal Policy Optimization(C-PPO) algorithm by… ▽ More

    Submitted 11 September, 2023; originally announced September 2023.

    Comments: This paper is accepted by IEEE Journal on Selected Areas in Communications, JSAC-SI-HCM 2024

  41. arXiv:2308.15059  [pdf, other

    cs.LG cs.DB

    OEBench: Investigating Open Environment Challenges in Real-World Relational Data Streams

    Authors: Yiqun Diao, Yutong Yang, Qinbin Li, Bingsheng He, Mian Lu

    Abstract: How to get insights from relational data streams in a timely manner is a hot research topic. Data streams can present unique challenges, such as distribution drifts, outliers, emerging classes, and changing features, which have recently been described as open environment challenges for machine learning. While existing studies have been done on incremental learning for data streams, their evaluatio… ▽ More

    Submitted 15 December, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  42. arXiv:2306.16979  [pdf, other

    cs.CV cs.CR

    Post-train Black-box Defense via Bayesian Boundary Correction

    Authors: He Wang, Yunfeng Diao

    Abstract: Classifiers based on deep neural networks are susceptible to adversarial attack, where the widely existing vulnerability has invoked the research in defending them from potential threats. Given a vulnerable classifier, existing defense methods are mostly white-box and often require re-training the victim under modified loss functions/training regimes. While the model/data/training specifics of the… ▽ More

    Submitted 11 June, 2024; v1 submitted 29 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: text overlap with arXiv:2203.04713

  43. arXiv:2305.09241  [pdf, other

    cs.LG cs.CR cs.CV

    Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples

    Authors: Wan Jiang, Yunfeng Diao, He Wang, Jianxin Sun, Meng Wang, Richang Hong

    Abstract: Safeguarding data from unauthorized exploitation is vital for privacy and security, especially in recent rampant research in security breach such as adversarial/membership attacks. To this end, \textit{unlearnable examples} (UEs) have been recently proposed as a compelling protection, by adding imperceptible perturbation to data so that models trained on them cannot classify them accurately on ori… ▽ More

    Submitted 3 October, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

    Comments: Accepted in MM 2023

  44. The Braid Indices of the Reverse Parallel Links of Alternating Knots

    Authors: Yuanan Diao, Hugh Morton

    Abstract: The braid indices of most links remain unknown as there is no known universal method that can be used to determine the braid index of an arbitrary knot. This is also the case for alternating knots. In this paper, we show that if $K$ is an alternating knot, then the braid index of any reverse parallel link of $K$ can be precisely determined. More precisely, if $D$ is a reduced diagram of $K$,… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

    Comments: 15 pages, 2 figures

    MSC Class: 57K10; 57K31

    Journal ref: Algebr. Geom. Topol. 24 (2024) 2957-2970

  45. arXiv:2211.11312  [pdf, other

    cs.CV

    Understanding the Vulnerability of Skeleton-based Human Activity Recognition via Black-box Attack

    Authors: Yunfeng Diao, He Wang, Tianjia Shao, Yong-Liang Yang, Kun Zhou, David Hogg, Meng Wang

    Abstract: Human Activity Recognition (HAR) has been employed in a wide range of applications, e.g. self-driving cars, where safety and lives are at stake. Recently, the robustness of skeleton-based HAR methods have been questioned due to their vulnerability to adversarial attacks. However, the proposed attacks require the full-knowledge of the attacked classifier, which is overly restrictive. In this paper,… ▽ More

    Submitted 6 May, 2024; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: Accepted in Pattern Recognition. arXiv admin note: substantial text overlap with arXiv:2103.05266

  46. The ropelength conjecture of alternating knots

    Authors: Yuanan Diao

    Abstract: A long standing conjecture states that the ropelength of any alternating knot is at least proportional to its crossing number. In this paper we prove that this conjecture is true. That is, there exists a constant $b_0>0$ such that $R(K)\ge b_0Cr(K)$ for any alternating knot $K$, where $R(K)$ is the ropelength of $K$ and $Cr(K)$ is the crossing number of $K$. In this paper, we prove that this conje… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

    Comments: 4 pages, 1 figure

    MSC Class: Primary: 57K10; 57K31; 57K99

    Journal ref: Math. Proc. Camb. Phil. Soc. 177 (2024) 367-369

  47. Fine-Grained Modeling and Optimization for Intelligent Resource Management in Big Data Processing

    Authors: Chenghao Lyu, Qi Fan, Fei Song, Arnab Sinha, Yanlei Diao, Wei Chen, Li Ma, Yihui Feng, Yaliang Li, Kai Zeng, Jingren Zhou

    Abstract: Big data processing at the production scale presents a highly complex environment for resource optimization (RO), a problem crucial for meeting performance goals and budgetary constraints of analytical users. The RO problem is challenging because it involves a set of decisions (the partition count, placement of parallel instances on machines, and resource allocation to each instance), requires mul… ▽ More

    Submitted 9 July, 2022; v1 submitted 5 July, 2022; originally announced July 2022.

    Journal ref: PVLDB, 17(11): 3565-3579, 2024

  48. arXiv:2204.12538  [pdf, other

    math.GT

    The average genus of oriented rational links with a given crossing number

    Authors: Dawn Ray, Yuanan Diao

    Abstract: In this paper, we enumerate the number of oriented rational knots and the number of oriented rational links with any given crossing number and minimum genus. This allows us to obtain a precise formula for the average minimal genus of oriented rational knots and links with any given crossing number.

    Submitted 26 April, 2022; originally announced April 2022.

    Comments: 11 pages, 9 figures, 3 tables

    MSC Class: Primary: 57K10; Secondary: 57K31

  49. arXiv:2203.04713  [pdf, other

    cs.CV

    Defending Black-box Skeleton-based Human Activity Classifiers

    Authors: He Wang, Yunfeng Diao, Zichang Tan, Guodong Guo

    Abstract: Skeletal motions have been heavily replied upon for human activity recognition (HAR). Recently, a universal vulnerability of skeleton-based HAR has been identified across a variety of classifiers and data, calling for mitigation. To this end, we propose the first black-box defense method for skeleton-based HAR to our best knowledge. Our method is featured by full Bayesian treatments of the clean d… ▽ More

    Submitted 2 December, 2022; v1 submitted 9 March, 2022; originally announced March 2022.

    Comments: Accepted in AAAI 2023

  50. arXiv:2203.00595  [pdf

    physics.med-ph cs.LG physics.bio-ph q-bio.QM

    Parameter estimation for WMTI-Watson model of white matter using encoder-decoder recurrent neural network

    Authors: Yujian Diao, Ileana Ozana Jelescu

    Abstract: Biophysical modelling of the diffusion MRI signal provides estimates of specific microstructural tissue properties. Although nonlinear optimization such as non-linear least squares (NLLS) is the most widespread method for model estimation, it suffers from local minima and high computational cost. Deep Learning approaches are steadily replacing NL fitting, but come with the limitation that the mode… ▽ More

    Submitted 2 March, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Journal ref: Magn Reson Med. 2022;1-14