Skip to main content

Showing 1–16 of 16 results for author: Lang, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.20265  [pdf, other

    cs.SE

    Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software

    Authors: Yiran Cheng, Ting Zhang, Lwin Khin Shar, Zhe Lang, David Lo, Shichao Lv, Dongliang Fang, Zhiqiang Shi, Limin Sun

    Abstract: Open source software vulnerabilities pose significant security risks to downstream applications. While vulnerability databases provide valuable information for mitigation, many security patches are released silently in new commits of OSS repositories without explicit indications of their security impact. This makes it challenging for software maintainers and users to detect and address these vulne… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

  2. arXiv:2502.09490  [pdf, other

    cs.LG eess.SY math.DS math.OC physics.flu-dyn

    Inverse Design with Dynamic Mode Decomposition

    Authors: Yunpeng Zhu, Liangliang Cheng, Anping Jing, Hanyu Huo, Ziqiang Lang, Bo Zhang, J. Nathan Kutz

    Abstract: We introduce a computationally efficient method for the automation of inverse design in science and engineering. Based on simple least-square regression, the underlying dynamic mode decomposition algorithm can be used to construct a low-rank subspace spanning multiple experiments in parameter space. The proposed inverse design dynamic mode composition (ID-DMD) algorithm leverages the computed low-… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 29 pages, 19 figures

    MSC Class: 37M05; 37M10; 37M21 ACM Class: I.2.6; G.1.6; G.1.10

  3. arXiv:2502.09038  [pdf, other

    cs.AI

    AoI-Sensitive Data Forwarding with Distributed Beamforming in UAV-Assisted IoT

    Authors: Zifan Lang, Guixia Liu, Geng Sun, Jiahui Li, Zemin Sun, Jiacheng Wang, Victor C. M. Leung

    Abstract: This paper proposes a UAV-assisted forwarding system based on distributed beamforming to enhance age of information (AoI) in Internet of Things (IoT). Specifically, UAVs collect and relay data between sensor nodes (SNs) and the remote base station (BS). However, flight delays increase the AoI and degrade the network performance. To mitigate this, we adopt distributed beamforming to extend the comm… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 6 pages, 4 figures, ICC2025

  4. arXiv:2411.16475  [pdf, ps, other

    eess.SY cs.LG

    NonSysId: A nonlinear system identification package with improved model term selection for NARMAX models

    Authors: Rajintha Gunawardena, Zi-Qiang Lang, Fei He

    Abstract: System identification involves constructing mathematical models of dynamic systems using input-output data, enabling analysis and prediction of system behaviour in both time and frequency domains. This approach can model the entire system or capture specific dynamics within it. For meaningful analysis, it is essential for the model to accurately reflect the underlying system's behaviour. This pape… ▽ More

    Submitted 25 November, 2024; originally announced November 2024.

    Comments: 14 pages, 7 figures

    ACM Class: I.6; J.2

  5. arXiv:2305.04026  [pdf, other

    cs.SE cs.CR

    LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries

    Authors: Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun

    Abstract: Third-party libraries (TPLs) are extensively utilized by developers to expedite the software development process and incorporate external functionalities. Nevertheless, insecure TPL reuse can lead to significant security risks. Existing methods are employed to determine the presence of TPL code in the target binary. Existing methods, which involve extracting strings or conducting function matching… ▽ More

    Submitted 12 September, 2023; v1 submitted 6 May, 2023; originally announced May 2023.

    Comments: 35 pages, 12 figures

    ACM Class: K.6.3

  6. arXiv:2209.00884  [pdf, other

    physics.ins-det cs.AR cs.LG

    PulseDL-II: A System-on-Chip Neural Network Accelerator for Timing and Energy Extraction of Nuclear Detector Signals

    Authors: Pengcheng Ai, Zhi Deng, Yi Wang, Hui Gong, Xinchi Ran, Zijian Lang

    Abstract: Front-end electronics equipped with high-speed digitizers are being used and proposed for future nuclear detectors. Recent literature reveals that deep learning models, especially one-dimensional convolutional neural networks, are promising when dealing with digital signals from nuclear detectors. Simulations and experiments demonstrate the satisfactory accuracy and additional benefits of neural n… ▽ More

    Submitted 8 February, 2023; v1 submitted 2 September, 2022; originally announced September 2022.

    Comments: Accepted by IEEE Transactions on Nuclear Science

  7. arXiv:2207.06893  [pdf, other

    cs.CV

    E2FIF: Push the limit of Binarized Deep Imagery Super-resolution using End-to-end Full-precision Information Flow

    Authors: Zhiqiang Lang, Chongxing Song, Lei Zhang, Wei Wei

    Abstract: Binary neural network (BNN) provides a promising solution to deploy parameter-intensive deep single image super-resolution (SISR) models onto real devices with limited storage and computational resources. To achieve comparable performance with the full-precision counterpart, most existing BNNs for SISR mainly focus on compensating the information loss incurred by binarizing weights and activations… ▽ More

    Submitted 2 September, 2022; v1 submitted 14 July, 2022; originally announced July 2022.

    Comments: Simple but Stronge baseline for binarized SR networks. Code is available at https://github.com/pppLang/E2FIF

  8. Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection

    Authors: Shouguo Yang, Long Cheng, Yicheng Zeng, Zhe Lang, Hongsong Zhu, Zhiqiang Shi

    Abstract: Binary code similarity detection is a fundamental technique for many security applications such as vulnerability search, patch analysis, and malware detection. There is an increasing need to detect similar code for vulnerability search across architectures with the increase of critical vulnerabilities in IoT devices. The variety of IoT hardware architectures and software platforms requires to capt… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

    Journal ref: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  9. Orthogonal Least Squares Based Fast Feature Selection for Linear Classification

    Authors: Sikai Zhang, Zi-Qiang Lang

    Abstract: An Orthogonal Least Squares (OLS) based feature selection method is proposed for both binomial and multinomial classification. The novel Squared Orthogonal Correlation Coefficient (SOCC) is defined based on Error Reduction Ratio (ERR) in OLS and used as the feature ranking criterion. The equivalence between the canonical correlation coefficient, Fisher's criterion, and the sum of the SOCCs is reve… ▽ More

    Submitted 1 October, 2021; v1 submitted 21 January, 2021; originally announced January 2021.

  10. arXiv:2012.01745  [pdf, other

    eess.IV cs.CV

    Unsupervised Alternating Optimization for Blind Hyperspectral Imagery Super-resolution

    Authors: Jiangtao Nie, Lei Zhang, Wei Wei, Zhiqiang Lang, Yanning Zhang

    Abstract: Despite the great success of deep model on Hyperspectral imagery (HSI) super-resolution(SR) for simulated data, most of them function unsatisfactory when applied to the real data, especially for unsupervised HSI SR methods. One of the main reason comes from the fact that the predefined degeneration models (e.g. blur in spatial domain) utilized by most HSI SR methods often exist great discrepancy w… ▽ More

    Submitted 3 December, 2020; originally announced December 2020.

    Comments: 14 page, 13 figure

  11. arXiv:2009.06943  [pdf, other

    eess.IV cs.CV

    AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results

    Authors: Kai Zhang, Martin Danelljan, Yawei Li, Radu Timofte, Jie Liu, Jie Tang, Gangshan Wu, Yu Zhu, Xiangyu He, Wenjie Xu, Chenghua Li, Cong Leng, Jian Cheng, Guangyang Wu, Wenyi Wang, Xiaohong Liu, Hengyuan Zhao, Xiangtao Kong, Jingwen He, Yu Qiao, Chao Dong, Xiaotong Luo, Liang Chen, Jiangtao Zhang, Maitreya Suin , et al. (60 additional authors not shown)

    Abstract: This paper reviews the AIM 2020 challenge on efficient single image super-resolution with focus on the proposed solutions and results. The challenge task was to super-resolve an input image with a magnification factor x4 based on a set of prior examples of low and corresponding high resolution images. The goal is to devise a network that reduces one or several aspects such as runtime, parameter co… ▽ More

    Submitted 15 September, 2020; originally announced September 2020.

  12. arXiv:1912.03802  [pdf, other

    cs.LG cs.AI stat.ML

    Group Fairness in Bandit Arm Selection

    Authors: Candice Schumann, Zhi Lang, Nicholas Mattei, John P. Dickerson

    Abstract: We propose a novel formulation of group fairness with biased feedback in the contextual multi-armed bandit (CMAB) setting. In the CMAB setting, a sequential decision maker must, at each time step, choose an arm to pull from a finite set of arms after observing some context for each of the potential arm pulls. In our model, arms are partitioned into two or more sensitive groups based on some protec… ▽ More

    Submitted 15 February, 2022; v1 submitted 8 December, 2019; originally announced December 2019.

    Comments: Accepted to AAMAS 2022

  13. arXiv:1911.01249  [pdf, other

    eess.IV cs.CV

    AIM 2019 Challenge on Constrained Super-Resolution: Methods and Results

    Authors: Kai Zhang, Shuhang Gu, Radu Timofte, Zheng Hui, Xiumei Wang, Xinbo Gao, Dongliang Xiong, Shuai Liu, Ruipeng Gang, Nan Nan, Chenghua Li, Xueyi Zou, Ning Kang, Zhan Wang, Hang Xu, Chaofeng Wang, Zheng Li, Linlin Wang, Jun Shi, Wenyu Sun, Zhiqiang Lang, Jiangtao Nie, Wei Wei, Lei Zhang, Yazhe Niu , et al. (4 additional authors not shown)

    Abstract: This paper reviews the AIM 2019 challenge on constrained example-based single image super-resolution with focus on proposed solutions and results. The challenge had 3 tracks. Taking the three main aspects (i.e., number of parameters, inference/running time, fidelity (PSNR)) of MSRResNet as the baseline, Track 1 aims to reduce the amount of parameters while being constrained to maintain or improve… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

  14. arXiv:1906.09621  [pdf, other

    cs.LG cs.AI stat.ML

    Making the Cut: A Bandit-based Approach to Tiered Interviewing

    Authors: Candice Schumann, Zhi Lang, Jeffrey S. Foster, John P. Dickerson

    Abstract: Given a huge set of applicants, how should a firm allocate sequential resume screenings, phone interviews, and in-person site visits? In a tiered interview process, later stages (e.g., in-person visits) are more informative, but also more expensive than earlier stages (e.g., resume screenings). Using accepted hiring models and the concept of structured interviews, a best practice in human resource… ▽ More

    Submitted 14 November, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  15. arXiv:1903.10501  [pdf, other

    cs.CV

    Pixel-aware Deep Function-mixture Network for Spectral Super-Resolution

    Authors: Lei Zhang, Zhiqiang Lang, Peng Wang, Wei Wei, Shengcai Liao, Ling Shao, Yanning Zhang

    Abstract: Spectral super-resolution (SSR) aims at generating a hyperspectral image (HSI) from a given RGB image. Recently, a promising direction for SSR is to learn a complicated mapping function from the RGB image to the HSI counterpart using a deep convolutional neural network. This essentially involves mapping the RGB context within a size-specific receptive field centered at each pixel to its spectrum i… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

  16. arXiv:1108.3206  [pdf, other

    cs.RO

    Modeling and frequency domain analysis of nonlinear compliant joints for a passive dynamic swimmer

    Authors: Juan Pablo Carbajal, Rafael Bayma, Marc Ziegler, Zi-Qiang Lang

    Abstract: In this paper we present the study of the mathematical model of a real life joint used in an underwater robotic fish. Fluid-structure interaction is utterly simplified and the motion of the joint is approximated by Düffing's equation. We compare the quality of analytical harmonic solutions previously reported, with the input-output relation obtained via truncated Volterra series expansion. Compari… ▽ More

    Submitted 22 December, 2011; v1 submitted 16 August, 2011; originally announced August 2011.

    Comments: 12 p, 5 fig, work in progress, collaborative work