Skip to main content

Showing 1–50 of 124 results for author: Xuan, Q

.
  1. arXiv:2506.09066  [pdf, other

    cs.CV cs.AI

    ReStNet: A Reusable & Stitchable Network for Dynamic Adaptation on IoT Devices

    Authors: Maoyu Wang, Yao Lu, Jiaqi Nie, Zeyu Wang, Yun Lin, Qi Xuan, Guan Gui

    Abstract: With the rapid development of deep learning, a growing number of pre-trained models have been publicly available. However, deploying these fixed models in real-world IoT applications is challenging because different devices possess heterogeneous computational and memory resources, making it impossible to deploy a single model across all platforms. Although traditional compression methods, such as… ▽ More

    Submitted 8 June, 2025; originally announced June 2025.

  2. arXiv:2506.08429  [pdf, ps, other

    cs.CV

    Better Reasoning with Less Data: Enhancing VLMs Through Unified Modality Scoring

    Authors: Mingjie Xu, Andrew Estornell, Hongzheng Yang, Yuzhi Zhao, Zhaowei Zhu, Qi Xuan, Jiaheng Wei

    Abstract: The application of visual instruction tuning and other post-training techniques has significantly enhanced the capabilities of Large Language Models (LLMs) in visual understanding, enriching Vision-Language Models (VLMs) with more comprehensive visual language datasets. However, the effectiveness of VLMs is highly dependent on large-scale, high-quality datasets that ensure precise recognition and… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  3. arXiv:2505.21571  [pdf, other

    cs.LG cs.AI

    FCOS: A Two-Stage Recoverable Model Pruning Framework for Automatic Modulation Recognition

    Authors: Yao Lu, Tengfei Ma, Zeyu Wang, Zhuangzhi Chen, Dongwei Xu, Yun Lin, Qi Xuan, Guan Gui

    Abstract: With the rapid development of wireless communications and the growing complexity of digital modulation schemes, traditional manual modulation recognition methods struggle to extract reliable signal features and meet real-time requirements in modern scenarios. Recently, deep learning based Automatic Modulation Recognition (AMR) approaches have greatly improved classification accuracy. However, thei… ▽ More

    Submitted 27 May, 2025; originally announced May 2025.

  4. arXiv:2505.13312  [pdf, ps, other

    cs.CL

    GUARD: Generation-time LLM Unlearning via Adaptive Restriction and Detection

    Authors: Zhijie Deng, Chris Yuhao Liu, Zirui Pang, Xinlei He, Lei Feng, Qi Xuan, Zhaowei Zhu, Jiaheng Wei

    Abstract: Large Language Models (LLMs) have demonstrated strong capabilities in memorizing vast amounts of knowledge across diverse domains. However, the ability to selectively forget specific knowledge is critical for ensuring the safety and compliance of deployed models. Existing unlearning efforts typically fine-tune the model with resources such as forget data, retain data, and a calibration model. Thes… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

  5. arXiv:2504.05844  [pdf, other

    cs.LG

    Adaptive Substructure-Aware Expert Model for Molecular Property Prediction

    Authors: Tianyi Jiang, Zeyu Wang, Shanqing Yu, Qi Xuan

    Abstract: Molecular property prediction is essential for applications such as drug discovery and toxicity assessment. While Graph Neural Networks (GNNs) have shown promising results by modeling molecules as molecular graphs, their reliance on data-driven learning limits their ability to generalize, particularly in the presence of data imbalance and diverse molecular substructures. Existing methods often ove… ▽ More

    Submitted 8 April, 2025; originally announced April 2025.

  6. arXiv:2504.03742  [pdf, other

    cs.CR cs.AI cs.LG

    Hierarchical Local-Global Feature Learning for Few-shot Malicious Traffic Detection

    Authors: Songtao Peng, Lei Wang, Wu Shuai, Hao Song, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: With the rapid growth of internet traffic, malicious network attacks have become increasingly frequent and sophisticated, posing significant threats to global cybersecurity. Traditional detection methods, including rule-based and machine learning-based approaches, struggle to accurately identify emerging threats, particularly in scenarios with limited samples. While recent advances in few-shot lea… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

  7. arXiv:2503.21463  [pdf, other

    cs.CR cs.AI

    Unveiling Latent Information in Transaction Hashes: Hypergraph Learning for Ethereum Ponzi Scheme Detection

    Authors: Junhao Wu, Yixin Yang, Chengxiang Jin, Silu Mu, Xiaolei Qian, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: With the widespread adoption of Ethereum, financial frauds such as Ponzi schemes have become increasingly rampant in the blockchain ecosystem, posing significant threats to the security of account assets. Existing Ethereum fraud detection methods typically model account transactions as graphs, but this approach primarily focuses on binary transactional relationships between accounts, failing to ad… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

  8. arXiv:2502.19071  [pdf, other

    cs.LG

    MCLRL: A Multi-Domain Contrastive Learning with Reinforcement Learning Framework for Few-Shot Modulation Recognition

    Authors: Dongwei Xu, Yutao Zhu, Yao Lu, Youpeng Feng, Yun Lin, Qi Xuan

    Abstract: With the rapid advancements in wireless communication technology, automatic modulation recognition (AMR) plays a critical role in ensuring communication security and reliability. However, numerous challenges, including higher performance demands, difficulty in data acquisition under specific scenarios, limited sample size, and low-quality labeled data, hinder its development. Few-shot learning (FS… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  9. arXiv:2502.08083  [pdf, other

    cs.LG cs.SI

    Mixture of Decoupled Message Passing Experts with Entropy Constraint for General Node Classification

    Authors: Xuanze Chen, Jiajun Zhou, Jinsong Chen, Shanqing Yu, Qi Xuan

    Abstract: The varying degrees of homophily and heterophily in real-world graphs persistently constrain the universality of graph neural networks (GNNs) for node classification. Adopting a data-centric perspective, this work reveals an inherent preference of different graphs towards distinct message encoding schemes: homophilous graphs favor local propagation, while heterophilous graphs exhibit preference fo… ▽ More

    Submitted 11 February, 2025; originally announced February 2025.

    Comments: arXiv admin note: text overlap with arXiv:2412.08193

  10. arXiv:2502.07624  [pdf, other

    physics.soc-ph physics.data-an

    An effective method for profiling core-periphery structures in complex networks

    Authors: Jiaqi Nie, Qi Xuan, Dehong Gao, Zhongyuan Ruan

    Abstract: Profiling core-periphery structures in networks has attracted significant attention, leading to the development of various methods. Among these, the rich-core method is distinguished for being entirely parameter-free and scalable to large networks. However, the cores it identifies are not always structurally cohesive, as they may lack high link density. Here, we propose an improved method building… ▽ More

    Submitted 16 April, 2025; v1 submitted 11 February, 2025; originally announced February 2025.

  11. arXiv:2501.08610  [pdf, other

    cs.CR

    Multi-view Correlation-aware Network Traffic Detection on Flow Hypergraph

    Authors: Jiajun Zhou, Wentao Fu, Hao Song, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: As the Internet rapidly expands, the increasing complexity and diversity of network activities pose significant challenges to effective network governance and security regulation. Network traffic, which serves as a crucial data carrier of network activities, has become indispensable in this process. Network traffic detection aims to monitor, analyze, and evaluate the data flows transmitted across… ▽ More

    Submitted 15 January, 2025; originally announced January 2025.

  12. arXiv:2412.20980  [pdf, other

    cs.NE cs.SI

    Efficient Parallel Genetic Algorithm for Perturbed Substructure Optimization in Complex Network

    Authors: Shanqing Yu, Meng Zhou, Jintao Zhou, Minghao Zhao, Yidan Song, Yao Lu, Zeyu Wang, Qi Xuan

    Abstract: Evolutionary computing, particularly genetic algorithm (GA), is a combinatorial optimization method inspired by natural selection and the transmission of genetic information, which is widely used to identify optimal solutions to complex problems through simulated programming and iteration. Due to its strong adaptability, flexibility, and robustness, GA has shown significant performance and potenti… ▽ More

    Submitted 30 December, 2024; originally announced December 2024.

    Comments: Genetic Algorithm, GPU Acceleration, Perturbed Substructure Optimization, Graph Mining

  13. arXiv:2412.16869  [pdf, other

    cs.CV

    CoF: Coarse to Fine-Grained Image Understanding for Multi-modal Large Language Models

    Authors: Yeyuan Wang, Dehong Gao, Bin Li, Rujiao Long, Lei Yi, Xiaoyan Cai, Libin Yang, Jinxia Zhang, Shanqing Yu, Qi Xuan

    Abstract: The impressive performance of Large Language Model (LLM) has prompted researchers to develop Multi-modal LLM (MLLM), which has shown great potential for various multi-modal tasks. However, current MLLM often struggles to effectively address fine-grained multi-modal challenges. We argue that this limitation is closely linked to the models' visual grounding capabilities. The restricted spatial aware… ▽ More

    Submitted 22 December, 2024; originally announced December 2024.

    Comments: 5 pages, Accepted by ICASSP2025, full paper

  14. Mixture of Experts Meets Decoupled Message Passing: Towards General and Adaptive Node Classification

    Authors: Xuanze Chen, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: Graph neural networks excel at graph representation learning but struggle with heterophilous data and long-range dependencies. And graph transformers address these issues through self-attention, yet face scalability and noise challenges on large-scale graphs. To overcome these limitations, we propose GNNMoE, a universal model architecture for node classification. This architecture flexibly combine… ▽ More

    Submitted 11 February, 2025; v1 submitted 11 December, 2024; originally announced December 2024.

    Comments: Accepted by ACM Web Conference 2025 as a short paper

  15. arXiv:2411.15558  [pdf, other

    cs.LG cs.CV

    Reassessing Layer Pruning in LLMs: New Insights and Methods

    Authors: Yao Lu, Hao Cheng, Yujie Fang, Zeyu Wang, Jiaheng Wei, Dongwei Xu, Qi Xuan, Xiaoniu Yang, Zhaowei Zhu

    Abstract: Although large language models (LLMs) have achieved remarkable success across various domains, their considerable scale necessitates substantial computational resources, posing significant challenges for deployment in resource-constrained environments. Layer pruning, as a simple yet effective compression method, removes layers of a model directly, reducing computational overhead. However, what are… ▽ More

    Submitted 23 November, 2024; originally announced November 2024.

  16. arXiv:2411.10507  [pdf, other

    cs.LG cs.CV

    RedTest: Towards Measuring Redundancy in Deep Neural Networks Effectively

    Authors: Yao Lu, Peixin Zhang, Jingyi Wang, Lei Ma, Xiaoniu Yang, Qi Xuan

    Abstract: Deep learning has revolutionized computing in many real-world applications, arguably due to its remarkable performance and extreme convenience as an end-to-end solution. However, deep learning models can be costly to train and to use, especially for those large-scale models, making it necessary to optimize the original overly complicated models into smaller ones in scenarios with limited resources… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  17. arXiv:2411.10279  [pdf, other

    cs.CR cs.AI

    Lateral Movement Detection via Time-aware Subgraph Classification on Authentication Logs

    Authors: Jiajun Zhou, Jiacheng Yao, Xuanze Chen, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: Lateral movement is a crucial component of advanced persistent threat (APT) attacks in networks. Attackers exploit security vulnerabilities in internal networks or IoT devices, expanding their control after initial infiltration to steal sensitive data or carry out other malicious activities, posing a serious threat to system security. Existing research suggests that attackers generally employ seem… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

  18. arXiv:2411.02866  [pdf, other

    cs.SI cs.CY

    Double Whammy: Stealthy Data Manipulation aided Reconstruction Attack on Graph Federated Learning

    Authors: Jinyin Chen, Minying Ma, Haibin Zheng, Qi Xuan

    Abstract: Recent research has constructed successful graph reconstruction attack (GRA) on GFL. But these attacks are still challenged in aspects of effectiveness and stealth. To address the issues, we propose the first Data Manipulation aided Reconstruction attack on GFL, dubbed as DMan4Rec. The malicious client is born to manipulate its locally collected data to enhance graph stealing privacy from benign o… ▽ More

    Submitted 5 November, 2024; originally announced November 2024.

    Comments: The paper is currently being submitted for publication (The submitted journal is TNSE)

  19. arXiv:2410.11189  [pdf, other

    cs.LG

    Rethinking Graph Transformer Architecture Design for Node Classification

    Authors: Jiajun Zhou, Xuanze Chen, Chenxuan Xie, Yu Shanqing, Qi Xuan, Xiaoniu Yang

    Abstract: Graph Transformer (GT), as a special type of Graph Neural Networks (GNNs), utilizes multi-head attention to facilitate high-order message passing. However, this also imposes several limitations in node classification applications: 1) nodes are susceptible to global noise; 2) self-attention computation cannot scale well to large graphs. In this work, we conduct extensive observational experiments t… ▽ More

    Submitted 14 October, 2024; originally announced October 2024.

  20. arXiv:2409.08020  [pdf

    cs.LG

    Network Anomaly Traffic Detection via Multi-view Feature Fusion

    Authors: Song Hao, Wentao Fu, Xuanze Chen, Chengxiang Jin, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: Traditional anomalous traffic detection methods are based on single-view analysis, which has obvious limitations in dealing with complex attacks and encrypted communications. In this regard, we propose a Multi-view Feature Fusion (MuFF) method for network anomaly traffic detection. MuFF models the temporal and interactive relationships of packets in network traffic based on the temporal and intera… ▽ More

    Submitted 12 September, 2024; originally announced September 2024.

    Comments: in Chinese language, Accepted by Journal of Command and Control

  21. arXiv:2408.13476  [pdf

    physics.optics

    Photonic time-delayed reservoir computing based on lithium niobate microring resonators

    Authors: Yuan Wang, Ming Li, Mingyi Gao, Chang-Ling Zou, Chun-Hua Dong, Xiaoniu Yang, Qi Xuan, HongLiang Ren

    Abstract: On-chip micro-ring resonators (MRRs) have been proposed for constructing delay reservoir computing (RC) systems, offering a highly scalable, high-density computational architecture that is easy to manufacture. However, most proposed RC schemes have utilized passive integrated optical components based on silicon-on-insulator (SOI), and RC systems based on lithium niobate on insulator (LNOI) have no… ▽ More

    Submitted 24 August, 2024; originally announced August 2024.

    Comments: 17 pages, 6 figures

  22. arXiv:2408.05050  [pdf, other

    physics.soc-ph

    Social contagion under hybrid interactions

    Authors: Xincheng Shu, Man Yang, Zhongyuan Ruan, Qi Xuan

    Abstract: Threshold-driven models and game theory are two fundamental paradigms for describing human interactions in social systems. However, in mimicking social contagion processes, models that simultaneously incorporate these two mechanisms have been largely overlooked. Here, we study a general model that integrates hybrid interaction forms by assuming that a part of nodes in a network are driven by the t… ▽ More

    Submitted 20 October, 2024; v1 submitted 9 August, 2024; originally announced August 2024.

    Comments: Main text: 7 pages, 6 figures. Supplemental materials: 4 pages

  23. arXiv:2408.02714  [pdf, other

    cs.LG cs.AI

    MDM: Advancing Multi-Domain Distribution Matching for Automatic Modulation Recognition Dataset Synthesis

    Authors: Dongwei Xu, Jiajun Chen, Yao Lu, Tianhao Xia, Qi Xuan, Wei Wang, Yun Lin, Xiaoniu Yang

    Abstract: Recently, deep learning technology has been successfully introduced into Automatic Modulation Recognition (AMR) tasks. However, the success of deep learning is all attributed to the training on large-scale datasets. Such a large amount of data brings huge pressure on storage, transmission and model training. In order to solve the problem of large amount of data, some researchers put forward the me… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

  24. Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-supervision

    Authors: Chenxiang Jin, Jiajun Zhou, Chenxuan Xie, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: The rampant fraudulent activities on Ethereum hinder the healthy development of the blockchain ecosystem, necessitating the reinforcement of regulations. However, multiple imbalances involving account interaction frequencies and interaction types in the Ethereum transaction environment pose significant challenges to data mining-based fraud detection research. To address this, we first propose the… ▽ More

    Submitted 20 December, 2024; v1 submitted 1 August, 2024; originally announced August 2024.

    Comments: Accepted by IEEE Transactions on Information Forensics & Security

  25. arXiv:2407.05083  [pdf, other

    cs.SI

    Exploring agent interaction patterns in the comment sections of fake and real news

    Authors: Kailun Zhu, Songtao Peng, Jiaqi Nie, Zhongyuan Ruan, Shanqing Yu, Qi Xuan

    Abstract: User comments on social media have been recognized as a crucial factor in distinguishing between fake and real news, with many studies focusing on the textual content of user reactions. However, the interactions among agents in the comment sections for fake and real news have not been fully explored. In this study, we analyze a dataset comprising both fake and real news from Reddit to investigate… ▽ More

    Submitted 11 October, 2024; v1 submitted 6 July, 2024; originally announced July 2024.

  26. arXiv:2407.00336  [pdf, other

    cs.CR cs.LG

    Dual-view Aware Smart Contract Vulnerability Detection for Ethereum

    Authors: Jiacheng Yao, Maolin Wang, Wanqi Chen, Chengxiang Jin, Jiajun Zhou, Shanqing Yu, Qi Xuan

    Abstract: The wide application of Ethereum technology has brought technological innovation to traditional industries. As one of Ethereum's core applications, smart contracts utilize diverse contract codes to meet various functional needs and have gained widespread use. However, the non-tamperability of smart contracts, coupled with vulnerabilities caused by natural flaws or human errors, has brought unprece… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: Accepted by International Conference on Blockchain and Trustworthy Systems 2024

  27. arXiv:2406.07929  [pdf, other

    cs.LG cs.AI

    A Generic Layer Pruning Method for Signal Modulation Recognition Deep Learning Models

    Authors: Yao Lu, Yutao Zhu, Yuqi Li, Dongwei Xu, Yun Lin, Qi Xuan, Xiaoniu Yang

    Abstract: With the successful application of deep learning in communications systems, deep neural networks are becoming the preferred method for signal classification. Although these models yield impressive results, they often come with high computational complexity and large model sizes, which hinders their practical deployment in communication systems. To address this challenge, we propose a novel layer p… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  28. Node Injection Attack Based on Label Propagation Against Graph Neural Network

    Authors: Peican Zhu, Zechen Pan, Keke Tang, Xiaodong Cui, Jinhuan Wang, Qi Xuan

    Abstract: Graph Neural Network (GNN) has achieved remarkable success in various graph learning tasks, such as node classification, link prediction and graph classification. The key to the success of GNN lies in its effective structure information representation through neighboring aggregation. However, the attacker can easily perturb the aggregation process through injecting fake nodes, which reveals that G… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: Accepted by TCSS;DOI:10.1109/TCSS.2024.3395794

  29. arXiv:2405.15544  [pdf, other

    q-bio.QM cs.AI cs.LG

    Knowledge-enhanced Relation Graph and Task Sampling for Few-shot Molecular Property Prediction

    Authors: Zeyu Wang, Tianyi Jiang, Yao Lu, Xiaoze Bao, Shanqing Yu, Bin Wei, Qi Xuan

    Abstract: Recently, few-shot molecular property prediction (FSMPP) has garnered increasing attention. Despite impressive breakthroughs achieved by existing methods, they often overlook the inherent many-to-many relationships between molecules and properties, which limits their performance. For instance, similar substructures of molecules can inspire the exploration of new compounds. Additionally, the relati… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  30. arXiv:2405.08278  [pdf, other

    cs.CR cs.SI

    Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection

    Authors: Jiajun Zhou, Xuanze Chen, Shengbo Gong, Chenkai Hu, Chengxiang Jin, Shanqing Yu, Qi Xuan

    Abstract: Ethereum has become one of the primary global platforms for cryptocurrency, playing an important role in promoting the diversification of the financial ecosystem. However, the relative lag in regulation has led to a proliferation of malicious activities in Ethereum, posing a serious threat to fund security. Existing regulatory methods usually detect malicious accounts through feature engineering o… ▽ More

    Submitted 1 July, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: Accepted by International Conference on Blockchain and Trustworthy Systems 2024

  31. arXiv:2404.07779  [pdf, other

    cs.SI physics.soc-ph

    Improving Network Degree Correlation by Degree-preserving Rewiring

    Authors: Shuo Zou, Bo Zhou, Qi Xuan

    Abstract: Degree correlation is a crucial measure in networks, significantly impacting network topology and dynamical behavior. The degree sequence of a network is a significant characteristic, and altering network degree correlation through degree-preserving rewiring poses an interesting problem. In this paper, we define the problem of maximizing network degree correlation through a finite number of rewiri… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

  32. arXiv:2403.16028  [pdf, other

    cs.CV cs.LG

    Exploring the Impact of Dataset Bias on Dataset Distillation

    Authors: Yao Lu, Jianyang Gu, Xuguang Chen, Saeed Vahidian, Qi Xuan

    Abstract: Dataset Distillation (DD) is a promising technique to synthesize a smaller dataset that preserves essential information from the original dataset. This synthetic dataset can serve as a substitute for the original large-scale one, and help alleviate the training workload. However, current DD methods typically operate under the assumption that the dataset is unbiased, overlooking potential bias issu… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  33. arXiv:2403.16004  [pdf, other

    cs.LG cs.AI

    A Federated Parameter Aggregation Method for Node Classification Tasks with Different Graph Network Structures

    Authors: Hao Song, Jiacheng Yao, Zhengxi Li, Shaocong Xu, Shibo Jin, Jiajun Zhou, Chenbo Fu, Qi Xuan, Shanqing Yu

    Abstract: Over the past few years, federated learning has become widely used in various classical machine learning fields because of its collaborative ability to train data from multiple sources without compromising privacy. However, in the area of graph neural networks, the nodes and network structures of graphs held by clients are different in many practical applications, and the aggregation method that d… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  34. arXiv:2403.02708  [pdf, ps, other

    cs.SI

    Backfire Effect Reveals Early Controversy in Online Media

    Authors: Songtao Peng, Tao Jin, Kailun Zhu, Qi Xuan, Yong Min

    Abstract: The rapid development of online media has significantly facilitated the public's information consumption, knowledge acquisition, and opinion exchange. However, it has also led to more violent conflicts in online discussions. Therefore, controversy detection becomes important for computational and social sciences. Previous research on detection methods has primarily focused on larger datasets and m… ▽ More

    Submitted 30 May, 2025; v1 submitted 5 March, 2024; originally announced March 2024.

    Comments: 29 pages, 6 figures

  35. arXiv:2402.11920  [pdf, other

    math.OC

    A Feasible Method for Constrained Derivative-Free Optimization

    Authors: Melody Qiming Xuan, Jorge Nocedal

    Abstract: This paper explores a method for solving constrained optimization problems when the derivatives of the objective function are unavailable, while the derivatives of the constraints are known. We allow the objective and constraint function to be nonconvex. The method constructs a quadratic model of the objective function via interpolation and computes a step by minimizing this model subject to the o… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  36. arXiv:2401.03369  [pdf, other

    q-bio.MN cs.LG q-bio.BM

    Multi-Modal Representation Learning for Molecular Property Prediction: Sequence, Graph, Geometry

    Authors: Zeyu Wang, Tianyi Jiang, Jinhuan Wang, Qi Xuan

    Abstract: Molecular property prediction refers to the task of labeling molecules with some biochemical properties, playing a pivotal role in the drug discovery and design process. Recently, with the advancement of machine learning, deep learning-based molecular property prediction has emerged as a solution to the resource-intensive nature of traditional methods, garnering significant attention. Among them,… ▽ More

    Submitted 8 January, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

    Comments: 8 pages, 3 figures

  37. arXiv:2312.11225  [pdf, other

    cs.CR

    MAD-MulW: A Multi-Window Anomaly Detection Framework for BGP Security Events

    Authors: Songtao Peng, Yiping Chen, Xincheng Shu, Wu Shuai, Shenhao Fang, Zhongyuan Ruan, Qi Xuan

    Abstract: In recent years, various international security events have occurred frequently and interacted between real society and cyberspace. Traditional traffic monitoring mainly focuses on the local anomalous status of events due to a large amount of data. BGP-based event monitoring makes it possible to perform differential analysis of international events. For many existing traffic anomaly detection meth… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 10 pages, 8 figures

  38. arXiv:2311.16155  [pdf, other

    eess.SP cs.LG

    Deep Learning-Based Frequency Offset Estimation

    Authors: Tao Chen, Shilian Zheng, Jiawei Zhu, Qi Xuan, Xiaoniu Yang

    Abstract: In wireless communication systems, the asynchronization of the oscillators in the transmitter and the receiver along with the Doppler shift due to relative movement may lead to the presence of carrier frequency offset (CFO) in the received signals. Estimation of CFO is crucial for subsequent processing such as coherent demodulation. In this brief, we demonstrate the utilization of deep learning fo… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  39. arXiv:2311.03761  [pdf, other

    cs.LG cs.AI eess.SP

    Augmenting Radio Signals with Wavelet Transform for Deep Learning-Based Modulation Recognition

    Authors: Tao Chen, Shilian Zheng, Kunfeng Qiu, Luxin Zhang, Qi Xuan, Xiaoniu Yang

    Abstract: The use of deep learning for radio modulation recognition has become prevalent in recent years. This approach automatically extracts high-dimensional features from large datasets, facilitating the accurate classification of modulation schemes. However, in real-world scenarios, it may not be feasible to gather sufficient training data in advance. Data augmentation is a method used to increase the d… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  40. arXiv:2310.12168  [pdf, other

    cs.LG cs.AI cs.CV

    RK-core: An Established Methodology for Exploring the Hierarchical Structure within Datasets

    Authors: Yao Lu, Yutian Huang, Jiaqi Nie, Zuohui Chen, Qi Xuan

    Abstract: Recently, the field of machine learning has undergone a transition from model-centric to data-centric. The advancements in diverse learning tasks have been propelled by the accumulation of more extensive datasets, subsequently facilitating the training of larger models on these datasets. However, these datasets remain relatively under-explored. To this end, we introduce a pioneering approach known… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  41. arXiv:2310.09652  [pdf, other

    cs.CR

    BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

    Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen

    Abstract: Machine learning security has recently become a prominent topic in the natural language processing (NLP) area. The existing black-box adversarial attack suffers prohibitively from the high model querying complexity, resulting in easily being captured by anti-attack monitors. Meanwhile, how to eliminate redundant model queries is rarely explored. In this paper, we propose a query-efficient approach… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

  42. arXiv:2310.08924  [pdf, other

    cs.SI physics.soc-ph

    Attacking The Assortativity Coefficient Under A Rewiring Strategy

    Authors: Shuo Zou, Bo Zhou, Qi Xuan

    Abstract: Degree correlation is an important characteristic of networks, which is usually quantified by the assortativity coefficient. However, concerns arise about changing the assortativity coefficient of a network when networks suffer from adversarial attacks. In this paper, we analyze the factors that affect the assortativity coefficient and study the optimization problem of maximizing or minimizing the… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

  43. arXiv:2310.03295  [pdf, other

    cs.CV

    Can pre-trained models assist in dataset distillation?

    Authors: Yao Lu, Xuguang Chen, Yuchen Zhang, Jianyang Gu, Tianle Zhang, Yifan Zhang, Xiaoniu Yang, Qi Xuan, Kai Wang, Yang You

    Abstract: Dataset Distillation (DD) is a prominent technique that encapsulates knowledge from a large-scale original dataset into a small synthetic dataset for efficient training. Meanwhile, Pre-trained Models (PTMs) function as knowledge repositories, containing extensive information from the original dataset. This naturally raises a question: Can PTMs effectively transfer knowledge to synthetic datasets,… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  44. arXiv:2310.00856  [pdf, other

    cs.SI

    Multi-triplet Feature Augmentation for Ponzi Scheme Detection in Ethereum

    Authors: Chengxiang Jin, Jiajun Zhou, Shengbo Gong, Chenxuan Xie, Qi Xuan

    Abstract: Blockchain technology revolutionizes the Internet, but also poses increasing risks, particularly in cryptocurrency finance. On the Ethereum platform, Ponzi schemes, phishing scams, and a variety of other frauds emerge. Existing Ponzi scheme detection approaches based on heterogeneous transaction graph modeling leverages semantic information between node (account) pairs to establish connections, ov… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

    Comments: Accepted by 2023 IEEE International Conference on Data Mining Workshops (ICDMW)

  45. arXiv:2308.15902  [pdf

    physics.optics cs.ET

    Photonic time-delayed reservoir computing based on series coupled microring resonators with high memory capacity

    Authors: Yijia Li, Ming Li, MingYi Gao, Chang-Ling Zou, Chun-Hua Dong, Jin Lu, Yali Qin, XiaoNiu Yang, Qi Xuan, Hongliang Ren

    Abstract: On-chip microring resonators (MRRs) have been proposed to construct the time-delayed reservoir computing (RC), which offers promising configurations available for computation with high scalability, high-density computing, and easy fabrication. A single MRR, however, is inadequate to supply enough memory for the computational task with diverse memory requirements. Large memory needs are met by the… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  46. arXiv:2308.09601  [pdf, other

    cs.SI

    MONA: An Efficient and Scalable Strategy for Targeted k-Nodes Collapse

    Authors: Yuqian Lv, Bo Zhou, Jinhuan Wang, Shanqing Yu, Qi Xuan

    Abstract: The concept of k-core plays an important role in measuring the cohesiveness and engagement of a network. And recent studies have shown the vulnerability of k-core under adversarial attacks. However, there are few researchers concentrating on the vulnerability of individual nodes within k-core. Therefore, in this paper, we attempt to study Targeted k-Nodes Collapse Problem (TNsCP), which focuses on… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Comments: 5 pages, 6 figures, 1 table, 5 algorithms

  47. arXiv:2308.02623  [pdf, other

    physics.soc-ph

    Epidemic spreading under game-based self-quarantine behaviors: The different effects of local and global information

    Authors: Zegang Huang, Xincheng Shu, Qi Xuan, Zhongyuan Ruan

    Abstract: During the outbreak of an epidemic, individuals may modify their behaviors in response to external (including local and global) infection-related information. However, the difference between local and global information in influencing the spread of diseases remains inadequately explored. Here we study a simple epidemic model that incorporates the game-based self-quarantine behavior of individuals,… ▽ More

    Submitted 17 July, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: Accepted by Chaos; 7 pages, 6 figures

    Journal ref: Chaos. 34 (1): 013112 (2024)

  48. arXiv:2306.13532  [pdf, other

    cs.LG cs.SI

    PathMLP: Smooth Path Towards High-order Homophily

    Authors: Jiajun Zhou, Chenxuan Xie, Shengbo Gong, Jiaxu Qian, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: Real-world graphs exhibit increasing heterophily, where nodes no longer tend to be connected to nodes with the same label, challenging the homophily assumption of classical graph neural networks (GNNs) and impeding their performance. Intriguingly, from the observation of heterophilous data, we notice that certain high-order information exhibits higher homophily, which motivates us to involve high-… ▽ More

    Submitted 21 August, 2024; v1 submitted 23 June, 2023; originally announced June 2023.

    Comments: Accepted by Neural Networks

  49. arXiv:2306.03506  [pdf, other

    cs.LG cs.AI

    Subgraph Networks Based Contrastive Learning

    Authors: Jinhuan Wang, Jiafei Shao, Zeyu Wang, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: Graph contrastive learning (GCL), as a self-supervised learning method, can solve the problem of annotated data scarcity. It mines explicit features in unannotated graphs to generate favorable graph representations for downstream tasks. Most existing GCL methods focus on the design of graph augmentation strategies and mutual information estimation operations. Graph augmentation produces augmented… ▽ More

    Submitted 30 March, 2024; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: 12 pages, 6 figures

  50. Clarify Confused Nodes via Separated Learning

    Authors: Jiajun Zhou, Shengbo Gong, Xuanze Chen, Chenxuan Xie, Shanqing Yu, Qi Xuan, Xiaoniu Yang

    Abstract: Graph neural networks (GNNs) have achieved remarkable advances in graph-oriented tasks. However, real-world graphs invariably contain a certain proportion of heterophilous nodes, challenging the homophily assumption of traditional GNNs and hindering their performance. Most existing studies continue to design generic models with shared weights between heterophilous and homophilous nodes. Despite th… ▽ More

    Submitted 3 February, 2025; v1 submitted 4 June, 2023; originally announced June 2023.

    Comments: Accepted by IEEE Transactions on Pattern Analysis and Machine Intelligence