Skip to main content

Showing 1–37 of 37 results for author: Hanxi

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.11059  [pdf, ps, other

    cs.SE cs.CL cs.CY cs.LG

    CodeMirage: A Multi-Lingual Benchmark for Detecting AI-Generated and Paraphrased Source Code from Production-Level LLMs

    Authors: Hanxi Guo, Siyuan Cheng, Kaiyuan Zhang, Guangyu Shen, Xiangyu Zhang

    Abstract: Large language models (LLMs) have become integral to modern software development, producing vast amounts of AI-generated source code. While these models boost programming productivity, their misuse introduces critical risks, including code plagiarism, license violations, and the propagation of insecure programs. As a result, robust detection of AI-generated code is essential. To support the develo… ▽ More

    Submitted 26 May, 2025; originally announced June 2025.

  2. arXiv:2506.10424  [pdf, ps, other

    cs.CR cs.AI

    SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks

    Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li

    Abstract: Large language models (LLMs) have achieved remarkable success and are widely adopted for diverse applications. However, fine-tuning these models often involves private or sensitive information, raising critical privacy concerns. In this work, we conduct the first comprehensive study evaluating the vulnerability of fine-tuned LLMs to membership inference attacks (MIAs). Our empirical analysis demon… ▽ More

    Submitted 12 June, 2025; originally announced June 2025.

    Comments: Accepted by the 34th USENIX Security Symposium 2025. Code is available at https://github.com/KaiyuanZh/SOFT

  3. arXiv:2505.22477  [pdf

    cs.HC cs.AI cs.CY

    Human-Centered Human-AI Collaboration (HCHAC)

    Authors: Qi Gao, Wei Xu, Hanxi Pan, Mowei Shen, Zaifeng Gao

    Abstract: In the intelligent era, the interaction between humans and intelligent systems fundamentally involves collaboration with autonomous intelligent agents. Human-AI Collaboration (HAC) represents a novel type of human-machine relationship facilitated by autonomous intelligent machines equipped with AI technologies. In this paradigm, AI agents serve not only as auxiliary tools but also as active teamma… ▽ More

    Submitted 28 May, 2025; originally announced May 2025.

    Comments: This article is a chapter from the upcoming book Handbook of Human-Centered Artificial Intelligence

  4. arXiv:2504.20403  [pdf, other

    cs.GR cs.CV

    Creating Your Editable 3D Photorealistic Avatar with Tetrahedron-constrained Gaussian Splatting

    Authors: Hanxi Liu, Yifang Men, Zhouhui Lian

    Abstract: Personalized 3D avatar editing holds significant promise due to its user-friendliness and availability to applications such as AR/VR and virtual try-ons. Previous studies have explored the feasibility of 3D editing, but often struggle to generate visually pleasing results, possibly due to the unstable representation learning under mixed optimization of geometry and texture in complicated reconstru… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

  5. Large-scale Evaluation of Notebook Checkpointing with AI Agents

    Authors: Hanxi Fang, Supawit Chockchowwat, Hari Sundaram, Yongjoo Park

    Abstract: Saving, or checkpointing, intermediate results during interactive data exploration can potentially boost user productivity. However, existing studies on this topic are limited, as they primarily rely on small-scale experiments with human participants - a fundamental constraint of human subject studies. To address this limitation, we employ AI agents to simulate a large number of complex data explo… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

    Comments: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2025, Yokohama, Japan

  6. Enhancing Computational Notebooks with Code+Data Space Versioning

    Authors: Hanxi Fang, Supawit Chockchowwat, Hari Sundaram, Yongjoo Park

    Abstract: There is a gap between how people explore data and how Jupyter-like computational notebooks are designed. People explore data nonlinearly, using execution undos, branching, and/or complete reverts, whereas notebooks are designed for sequential exploration. Recent works like ForkIt are still insufficient to support these multiple modes of nonlinear exploration in a unified way. In this work, we add… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

    Comments: 17 pages, CHI 2025, Yokohama, Japan

  7. arXiv:2407.15389  [pdf, other

    cs.LG cs.CR cs.DC

    Poisoning with A Pill: Circumventing Detection in Federated Learning

    Authors: Hanxi Guo, Hao Wang, Tao Song, Tianhang Zheng, Yang Hua, Haibing Guan, Xiangyu Zhang

    Abstract: Without direct access to the client's data, federated learning (FL) is well-known for its unique strength in data privacy protection among existing distributed machine learning techniques. However, its distributive and iterative nature makes FL inherently vulnerable to various poisoning attacks. To counteract these threats, extensive defenses have been proposed to filter out malicious clients, usi… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

  8. arXiv:2407.11372  [pdf, other

    cs.CR cs.CV

    UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

    Authors: Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang

    Abstract: Deep neural networks (DNNs) have demonstrated effectiveness in various fields. However, DNNs are vulnerable to backdoor attacks, which inject a unique pattern, called trigger, into the input to cause misclassification to an attack-chosen target label. While existing works have proposed various methods to mitigate backdoor effects in poisoned models, they tend to be less effective against recent ad… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: The 18th European Conference on Computer Vision ECCV 2024

  9. arXiv:2407.03130  [pdf, other

    cs.CV

    Towards Efficient Pixel Labeling for Industrial Anomaly Detection and Localization

    Authors: Hanxi Li, Jingqi Wu, Lin Yuanbo Wu, Hao Chen, Deyin Liu, Chunhua Shen

    Abstract: In the realm of practical Anomaly Detection (AD) tasks, manual labeling of anomalous pixels proves to be a costly endeavor. Consequently, many AD methods are crafted as one-class classifiers, tailored for training sets completely devoid of anomalies, ensuring a more cost-effective approach. While some pioneering work has demonstrated heightened AD accuracy by incorporating real anomaly samples in… ▽ More

    Submitted 4 July, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

    Comments: 18 pages, 5 figures

  10. arXiv:2405.17054  [pdf, other

    cs.LG

    Improving Data-aware and Parameter-aware Robustness for Continual Learning

    Authors: Hanxi Xiao, Fan Lyu

    Abstract: The goal of Continual Learning (CL) task is to continuously learn multiple new tasks sequentially while achieving a balance between the plasticity and stability of new and old knowledge. This paper analyzes that this insufficiency arises from the ineffective handling of outliers, leading to abnormal gradients and unexpected model updates. To address this issue, we enhance the data-aware and parame… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  11. arXiv:2404.19609  [pdf, other

    cs.CV eess.IV

    Seeing Through the Clouds: Cloud Gap Imputation with Prithvi Foundation Model

    Authors: Denys Godwin, Hanxi Li, Michael Cecil, Hamed Alemohammad

    Abstract: Filling cloudy pixels in multispectral satellite imagery is essential for accurate data analysis and downstream applications, especially for tasks which require time series data. To address this issue, we compare the performance of a foundational Vision Transformer (ViT) model with a baseline Conditional Generative Adversarial Network (CGAN) model for missing value imputation in time series of mul… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  12. A Two-Phase Infinite/Finite Low-Level Memory Model

    Authors: Calvin Beck, Irene Yoon, Hanxi Chen, Yannick Zakowski, Steve Zdancewic

    Abstract: This paper provides a novel approach to reconciling complex low-level memory model features, such as pointer--integer casts, with desired refinements that are needed to justify the correctness of program transformations. The idea is to use a "two-phased" memory model, one with and unbounded memory and corresponding unbounded integer type, and one with a finite memory; the connection between the tw… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    ACM Class: D.3.1

    Journal ref: 2024

  13. arXiv:2403.11432  [pdf, other

    cs.RO cs.AI cs.LG

    Demystifying the Physics of Deep Reinforcement Learning-Based Autonomous Vehicle Decision-Making

    Authors: Hanxi Wan, Pei Li, Arpan Kusari

    Abstract: With the advent of universal function approximators in the domain of reinforcement learning, the number of practical applications leveraging deep reinforcement learning (DRL) has exploded. Decision-making in autonomous vehicles (AVs) has emerged as a chief application among them, taking the sensor data or the higher-order kinematic variables as the input and providing a discrete choice or continuo… ▽ More

    Submitted 13 June, 2024; v1 submitted 17 March, 2024; originally announced March 2024.

    Comments: Submitted for peer-review

  14. arXiv:2402.19330  [pdf, other

    cs.CV cs.MM

    A Novel Approach to Industrial Defect Generation through Blended Latent Diffusion Model with Online Adaptation

    Authors: Hanxi Li, Zhengxun Zhang, Hao Chen, Lin Wu, Bo Li, Deyin Liu, Mingwen Wang

    Abstract: Effectively addressing the challenge of industrial Anomaly Detection (AD) necessitates an ample supply of defective samples, a constraint often hindered by their scarcity in industrial contexts. This paper introduces a novel algorithm designed to augment defective samples, thereby enhancing AD performance. The proposed method tailors the blended latent diffusion model for defect sample generation,… ▽ More

    Submitted 26 March, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: 13 pages,7 figures

  15. arXiv:2402.15820  [pdf, other

    cs.CV cs.AI

    DART: Depth-Enhanced Accurate and Real-Time Background Matting

    Authors: Hanxi Li, Guofeng Li, Bo Li, Lin Wu, Yan Cheng

    Abstract: Matting with a static background, often referred to as ``Background Matting" (BGM), has garnered significant attention within the computer vision community due to its pivotal role in various practical applications like webcasting and photo editing. Nevertheless, achieving highly accurate background matting remains a formidable challenge, primarily owing to the limitations inherent in conventional… ▽ More

    Submitted 24 February, 2024; originally announced February 2024.

  16. arXiv:2312.15395  [pdf, other

    cs.CL cs.DB cs.LG

    Prompt Valuation Based on Shapley Values

    Authors: Hanxi Liu, Xiaokai Mao, Haocheng Xia, Jian Lou, Jinfei Liu, Kui Ren

    Abstract: Large language models (LLMs) excel on new tasks without additional training, simply by providing natural language prompts that demonstrate how the task should be performed. Prompt ensemble methods comprehensively harness the knowledge of LLMs while mitigating individual biases and errors and further enhancing performance. However, more prompts do not necessarily lead to better results, and not all… ▽ More

    Submitted 16 December, 2024; v1 submitted 23 December, 2023; originally announced December 2023.

  17. arXiv:2311.11383  [pdf, other

    cs.CV

    A Survey of Emerging Applications of Diffusion Probabilistic Models in MRI

    Authors: Yuheng Fan, Hanxi Liao, Shiqi Huang, Yimin Luo, Huazhu Fu, Haikun Qi

    Abstract: Diffusion probabilistic models (DPMs) which employ explicit likelihood characterization and a gradual sampling process to synthesize data, have gained increasing research interest. Despite their huge computational burdens due to the large number of steps involved during sampling, DPMs are widely appreciated in various medical imaging tasks for their high-quality and diversity of generation. Magnet… ▽ More

    Submitted 7 May, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

  18. arXiv:2310.18660  [pdf, other

    cs.CV cs.LG

    Foundation Models for Generalist Geospatial Artificial Intelligence

    Authors: Johannes Jakubik, Sujit Roy, C. E. Phillips, Paolo Fraccaro, Denys Godwin, Bianca Zadrozny, Daniela Szwarcman, Carlos Gomes, Gabby Nyirjesy, Blair Edwards, Daiki Kimura, Naomi Simumba, Linsong Chu, S. Karthik Mukkavilli, Devyani Lambhate, Kamal Das, Ranjini Bangalore, Dario Oliveira, Michal Muszynski, Kumar Ankur, Muthukumaran Ramasubramanian, Iksha Gurung, Sam Khallaghi, Hanxi, Li , et al. (8 additional authors not shown)

    Abstract: Significant progress in the development of highly adaptable and reusable Artificial Intelligence (AI) models is expected to have a significant impact on Earth science and remote sensing. Foundation models are pre-trained on large unlabeled datasets through self-supervision, and then fine-tuned for various downstream tasks with small labeled datasets. This paper introduces a first-of-a-kind framewo… ▽ More

    Submitted 8 November, 2023; v1 submitted 28 October, 2023; originally announced October 2023.

  19. arXiv:2308.06748  [pdf, other

    cs.CV

    Target before Shooting: Accurate Anomaly Detection and Localization under One Millisecond via Cascade Patch Retrieval

    Authors: Hanxi Li, Jianfei Hu, Bo Li, Hao Chen, Yongbin Zheng, Chunhua Shen

    Abstract: In this work, by re-examining the "matching" nature of Anomaly Detection (AD), we propose a new AD framework that simultaneously enjoys new records of AD accuracy and dramatically high running speed. In this framework, the anomaly detection problem is solved via a cascade patch retrieval procedure that retrieves the nearest neighbors for each test image patch in a coarse-to-fine fashion. Given a t… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

    Comments: 13 pages,8 figures

  20. arXiv:2306.03492  [pdf, other

    cs.CV

    Industrial Anomaly Detection and Localization Using Weakly-Supervised Residual Transformers

    Authors: Hanxi Li, Jingqi Wu, Deyin Liu, Lin Wu, Hao Chen, Mingwen Wang, Chunhua Shen

    Abstract: Recent advancements in industrial anomaly detection (AD) have demonstrated that incorporating a small number of anomalous samples during training can significantly enhance accuracy. However, this improvement often comes at the cost of extensive annotation efforts, which are impractical for many real-world applications. In this paper, we introduce a novel framework, Weak}ly-supervised RESidual Tran… ▽ More

    Submitted 15 January, 2025; v1 submitted 6 June, 2023; originally announced June 2023.

    Comments: 13 pages,7 figures

  21. arXiv:2305.04750  [pdf, other

    cs.RO cs.AI cs.LG

    Sense, Imagine, Act: Multimodal Perception Improves Model-Based Reinforcement Learning for Head-to-Head Autonomous Racing

    Authors: Elena Shrestha, Chetan Reddy, Hanxi Wan, Yulun Zhuang, Ram Vasudevan

    Abstract: Model-based reinforcement learning (MBRL) techniques have recently yielded promising results for real-world autonomous racing using high-dimensional observations. MBRL agents, such as Dreamer, solve long-horizon tasks by building a world model and planning actions by latent imagination. This approach involves explicitly learning a model of the system dynamics and using it to learn the optimal poli… ▽ More

    Submitted 8 May, 2023; originally announced May 2023.

  22. arXiv:2305.03267  [pdf, other

    cs.CY

    Forecasting Inter-Destination Tourism Flow via a Hybrid Deep Learning Model

    Authors: Hanxi Fang, Song Gao, Feng Zhang

    Abstract: Tourists often go to multiple tourism destinations in one trip. The volume of tourism flow between tourism destinations, also referred to as ITF (Inter-Destination Tourism Flow) in this paper, is commonly used for tourism management on tasks like the classification of destinations' roles and visitation pattern mining. However, the ITF is hard to get due to the limitation of data collection techniq… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

  23. arXiv:2303.05012  [pdf, ps, other

    cs.DS

    Spatio-Temporal Trajectory Similarity Measures: A Comprehensive Survey and Quantitative Study

    Authors: Danlei Hu, Lu Chen, Hanxi Fang, Ziquan Fang, Tianyi Li, Yunjun Gao

    Abstract: Spatio-temporal trajectory analytics is at the core of smart mobility solutions, which offers unprecedented information for diversified applications such as urban planning, infrastructure development, and vehicular networks. Trajectory similarity measure, which aims to evaluate the distance between two trajectories, is a fundamental functionality of trajectory analytics. In this paper, we propose… ▽ More

    Submitted 17 March, 2023; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: 20 pages, 21 figures

  24. arXiv:2212.05502  [pdf, ps, other

    cs.LG

    Estimator: An Effective and Scalable Framework for Transportation Mode Classification over Trajectories

    Authors: Danlei Hu, Ziquan Fang, Hanxi Fang, Tianyi Li, Chunhui Shen, Lu Chen, Yunjun Gao

    Abstract: Transportation mode classification, the process of predicting the class labels of moving objects transportation modes, has been widely applied to a variety of real world applications, such as traffic management, urban computing, and behavior study. However, existing studies of transportation mode classification typically extract the explicit features of trajectory data but fail to capture the impl… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

    Comments: 12 pages, 8 figures

  25. arXiv:2211.12030  [pdf, other

    cs.CV

    Knowledge Prompting for Few-shot Action Recognition

    Authors: Yuheng Shi, Xinxiao Wu, Hanxi Lin

    Abstract: Few-shot action recognition in videos is challenging for its lack of supervision and difficulty in generalizing to unseen actions. To address this task, we propose a simple yet effective method, called knowledge prompting, which leverages commonsense knowledge of actions from external resources to prompt a powerful pre-trained vision-language model for few-shot classification. We first collect lar… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  26. arXiv:2107.11813  [pdf, other

    cs.CV

    Adaptive Recursive Circle Framework for Fine-grained Action Recognition

    Authors: Hanxi Lin, Xinxiao Wu, Jiebo Luo

    Abstract: How to model fine-grained spatial-temporal dynamics in videos has been a challenging problem for action recognition. It requires learning deep and rich features with superior distinctiveness for the subtle and abstract motions. Most existing methods generate features of a layer in a pure feedforward manner, where the information moves in one direction from inputs to outputs. And they rely on stack… ▽ More

    Submitted 25 July, 2021; originally announced July 2021.

  27. arXiv:2106.13199  [pdf, other

    cs.LG

    A Deep Learning Approach to Private Data Sharing of Medical Images Using Conditional GANs

    Authors: Hanxi Sun, Jason Plawinski, Sajanth Subramaniam, Amir Jamaludin, Timor Kadir, Aimee Readie, Gregory Ligozio, David Ohlssen, Mark Baillie, Thibaud Coroller

    Abstract: Sharing data from clinical studies can facilitate innovative data-driven research and ultimately lead to better public health. However, sharing biomedical data can put sensitive personal information at risk. This is usually solved by anonymization, which is a slow and expensive process. An alternative to anonymization is sharing a synthetic dataset that bears a behaviour similar to the real data b… ▽ More

    Submitted 19 August, 2021; v1 submitted 24 June, 2021; originally announced June 2021.

    Comments: v2

  28. arXiv:1810.03545  [pdf, other

    stat.ML cs.LG

    Stein Neural Sampler

    Authors: Tianyang Hu, Zixiang Chen, Hanxi Sun, Jincheng Bai, Mao Ye, Guang Cheng

    Abstract: We propose two novel samplers to generate high-quality samples from a given (un-normalized) probability density. Motivated by the success of generative adversarial networks, we construct our samplers using deep neural networks that transform a reference distribution to the target distribution. Training schemes are developed to minimize two variations of the Stein discrepancy, which is designed to… ▽ More

    Submitted 8 February, 2021; v1 submitted 8 October, 2018; originally announced October 2018.

  29. arXiv:1701.00561  [pdf, other

    cs.CV

    Robust and Real-time Deep Tracking Via Multi-Scale Domain Adaptation

    Authors: Xinyu Wang, Hanxi Li, Yi Li, Fumin Shen, Fatih Porikli

    Abstract: Visual tracking is a fundamental problem in computer vision. Recently, some deep-learning-based tracking algorithms have been achieving record-breaking performances. However, due to the high complexity of deep learning, most deep trackers suffer from low tracking speed, and thus are impractical in many real-world applications. Some new deep trackers with smaller network structure achieve high effi… ▽ More

    Submitted 2 January, 2017; originally announced January 2017.

    Comments: 6 pages

  30. arXiv:1511.05659  [pdf, ps, other

    cs.IR

    Learning Discriminative Representations for Semantic Cross Media Retrieval

    Authors: Aiwen Jiang, Hanxi Li, Yi Li, Mingwen Wang

    Abstract: Heterogeneous gap among different modalities emerges as one of the critical issues in modern AI problems. Unlike traditional uni-modal cases, where raw features are extracted and directly measured, the heterogeneous nature of cross modal tasks requires the intrinsic semantic representation to be compared in a unified framework. This paper studies the learning of different representations that can… ▽ More

    Submitted 18 November, 2015; originally announced November 2015.

  31. DeepTrack: Learning Discriminative Feature Representations Online for Robust Visual Tracking

    Authors: Hanxi Li, Yi Li, Fatih Porikli

    Abstract: Deep neural networks, albeit their great success on feature learning in various computer vision tasks, are usually considered as impractical for online visual tracking because they require very long training time and a large number of training samples. In this work, we present an efficient and very robust tracking algorithm using a single Convolutional Neural Network (CNN) for learning effective f… ▽ More

    Submitted 28 February, 2015; originally announced March 2015.

    Comments: 12 pages

  32. arXiv:1110.0264  [pdf, other

    cs.CV

    Face Recognition using Optimal Representation Ensemble

    Authors: Hanxi Li, Chunhua Shen, Yongsheng Gao

    Abstract: Recently, the face recognizers based on linear representations have been shown to deliver state-of-the-art performance. In real-world applications, however, face images usually suffer from expressions, disguises and random occlusions. The problematic facial parts undermine the validity of the linear-subspace assumption and thus the recognition performance deteriorates significantly. In this work,… ▽ More

    Submitted 3 October, 2011; originally announced October 2011.

    Comments: 36-page draft for IEEE Transactions on Image Processing (TIP)

  33. arXiv:1012.2603  [pdf, other

    cs.CV

    Real-time Visual Tracking Using Sparse Representation

    Authors: Hanxi Li, Chunhua Shen, Qinfeng Shi

    Abstract: The $\ell_1$ tracker obtains robustness by seeking a sparse representation of the tracking object via $\ell_1$ norm minimization \cite{Xue_ICCV_09_Track}. However, the high computational complexity involved in the $ \ell_1 $ tracker restricts its further applications in real time processing scenario. Hence we propose a Real Time Compressed Sensing Tracking (RTCST) by exploiting the signal recovery… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 14 pages

  34. arXiv:1008.5188   

    cs.AI

    Totally Corrective Boosting for Regularized Risk Minimization

    Authors: Chunhua Shen, Hanxi Li, Nick Barnes

    Abstract: Consideration of the primal and dual problems together leads to important new insights into the characteristics of boosting algorithms. In this work, we propose a general framework that can be used to design new boosting algorithms. A wide variety of machine learning problems essentially minimize a regularized risk functional. We show that the proposed boosting framework, termed CGBoost, can accom… ▽ More

    Submitted 11 December, 2011; v1 submitted 30 August, 2010; originally announced August 2010.

    Comments: This paper has been withdrawn by the author

  35. arXiv:1005.4103  [pdf, other

    cs.CV

    LACBoost and FisherBoost: Optimally Building Cascade Classifiers

    Authors: Chunhua Shen, Peng Wang, Hanxi Li

    Abstract: Object detection is one of the key tasks in computer vision. The cascade framework of Viola and Jones has become the de facto standard. A classifier in each node of the cascade is required to achieve extremely high detection rates, instead of low overall classification error. Although there are a few reported methods addressing this requirement in the context of object detection, there is no a pri… ▽ More

    Submitted 22 May, 2010; originally announced May 2010.

    Comments: 15 pages

  36. arXiv:0904.2037  [pdf, other

    cs.LG cs.CV

    Boosting through Optimization of Margin Distributions

    Authors: Chunhua Shen, Hanxi Li

    Abstract: Boosting has attracted much research attention in the past decade. The success of boosting algorithms may be interpreted in terms of the margin theory. Recently it has been shown that generalization error of classifiers can be obtained by explicitly taking the margin distribution of the training data into account. Most of the current boosting algorithms in practice usually optimizes a convex los… ▽ More

    Submitted 6 January, 2010; v1 submitted 13 April, 2009; originally announced April 2009.

    Comments: 9 pages. To publish/Published in IEEE Transactions on Neural Networks, 21(7), July 2010

  37. On the Dual Formulation of Boosting Algorithms

    Authors: Chunhua Shen, Hanxi Li

    Abstract: We study boosting algorithms from a new perspective. We show that the Lagrange dual problems of AdaBoost, LogitBoost and soft-margin LPBoost with generalized hinge loss are all entropy maximization problems. By looking at the dual problems of these boosting algorithms, we show that the success of boosting algorithms can be understood in terms of maintaining a better margin distribution by maximizi… ▽ More

    Submitted 27 May, 2023; v1 submitted 22 January, 2009; originally announced January 2009.

    Comments: Fixed typos. 16 pages. Published in IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), Dec. 2010