Skip to main content

Showing 1–50 of 191 results for author: Leung, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.23347  [pdf, ps, other

    cs.LG

    Sentinel: Scheduling Live Streams with Proactive Anomaly Detection in Crowdsourced Cloud-Edge Platforms

    Authors: Yuting Li, Shaoyuan Huang, Tengwen Zhang, Cheng Zhang, Xiaofei Wang, Victor C. M. Leung

    Abstract: With the rapid growth of live streaming services, Crowdsourced Cloud-edge service Platforms (CCPs) are playing an increasingly important role in meeting the increasing demand. Although stream scheduling plays a critical role in optimizing CCPs' revenue, most optimization strategies struggle to achieve practical results due to various anomalies in unstable CCPs. Additionally, the substantial scale… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: arXiv admin note: text overlap with arXiv:2402.14619

  2. arXiv:2505.01821  [pdf, ps, other

    cs.DC cs.AI cs.LG

    Edge-Cloud Collaborative Computing on Distributed Intelligence and Model Optimization: A Survey

    Authors: Jing Liu, Yao Du, Kun Yang, Yan Wang, Xiping Hu, Zehua Wang, Yang Liu, Peng Sun, Azzedine Boukerche, Victor C. M. Leung

    Abstract: Edge-cloud collaborative computing (ECCC) has emerged as a pivotal paradigm for addressing the computational demands of modern intelligent applications, integrating cloud resources with edge devices to enable efficient, low-latency processing. Recent advancements in AI, particularly deep learning and large language models (LLMs), have dramatically enhanced the capabilities of these distributed sys… ▽ More

    Submitted 17 May, 2025; v1 submitted 3 May, 2025; originally announced May 2025.

    Comments: 30 pages, 10 figures, 6 tables

  3. arXiv:2504.15632  [pdf, other

    cs.SE cs.CR cs.LG

    A Study on Mixup-Inspired Augmentation Methods for Software Vulnerability Detection

    Authors: Seyed Shayan Daneshvar, Da Tan, Shaowei Wang, Carson Leung

    Abstract: Various deep learning (DL) methods have recently been utilized to detect software vulnerabilities. Real-world software vulnerability datasets are rare and hard to acquire, as there is no simple metric for classifying vulnerability. Such datasets are heavily imbalanced, and none of the current datasets are considered huge for DL models. To tackle these problems, a recent work has tried to augment t… ▽ More

    Submitted 26 April, 2025; v1 submitted 22 April, 2025; originally announced April 2025.

    Comments: Accepted at EASE 2025, Istanbul, Turkey

  4. arXiv:2504.03798  [pdf, other

    cs.CY cs.AI

    An Intelligent and Privacy-Preserving Digital Twin Model for Aging-in-Place

    Authors: Yongjie Wang, Jonathan Cyril Leung, Ming Chen, Zhiwei Zeng, Benny Toh Hsiang Tan, Yang Qiu, Zhiqi Shen

    Abstract: The population of older adults is steadily increasing, with a strong preference for aging-in-place rather than moving to care facilities. Consequently, supporting this growing demographic has become a significant global challenge. However, facilitating successful aging-in-place is challenging, requiring consideration of multiple factors such as data privacy, health status monitoring, and living en… ▽ More

    Submitted 4 April, 2025; originally announced April 2025.

    Comments: accepted to IEEE TENSYMP 2025

    MSC Class: 68T05; ACM Class: I.2; J.3

  5. arXiv:2503.18808  [pdf, other

    cs.CV

    CRCL: Causal Representation Consistency Learning for Anomaly Detection in Surveillance Videos

    Authors: Yang Liu, Hongjin Wang, Zepu Wang, Xiaoguang Zhu, Jing Liu, Peng Sun, Rui Tang, Jianwei Du, Victor C. M. Leung, Liang Song

    Abstract: Video Anomaly Detection (VAD) remains a fundamental yet formidable task in the video understanding community, with promising applications in areas such as information forensics and public safety protection. Due to the rarity and diversity of anomalies, existing methods only use easily collected regular events to model the inherent normality of normal spatial-temporal patterns in an unsupervised ma… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

    Comments: Accepted for publication by IEEE Transactions on Image Processing

  6. arXiv:2503.08156  [pdf, other

    cs.CV cs.LG

    Towards Large-scale Chemical Reaction Image Parsing via a Multimodal Large Language Model

    Authors: Yufan Chen, Ching Ting Leung, Jianwei Sun, Yong Huang, Linyan Li, Hao Chen, Hanyu Gao

    Abstract: Artificial intelligence (AI) has demonstrated significant promise in advancing organic chemistry research; however, its effectiveness depends on the availability of high-quality chemical reaction data. Currently, most published chemical reactions are not available in machine-readable form, limiting the broader application of AI in this field. The extraction of published chemical reactions into str… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

  7. arXiv:2502.19450  [pdf, other

    cs.CV

    CLIP-Optimized Multimodal Image Enhancement via ISP-CNN Fusion for Coal Mine IoVT under Uneven Illumination

    Authors: Shuai Wang, Shihao Zhang, Jiaqi Wu, Zijian Tian, Wei Chen, Tongzhu Jin, Miaomiao Xue, Zehua Wang, Fei Richard Yu, Victor C. M. Leung

    Abstract: Clear monitoring images are crucial for the safe operation of coal mine Internet of Video Things (IoVT) systems. However, low illumination and uneven brightness in underground environments significantly degrade image quality, posing challenges for enhancement methods that often rely on difficult-to-obtain paired reference images. Additionally, there is a trade-off between enhancement performance a… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  8. arXiv:2502.16036  [pdf

    physics.ao-ph cs.LG

    AI Models Still Lag Behind Traditional Numerical Models in Predicting Sudden-Turning Typhoons

    Authors: Daosheng Xu, Zebin Lu, Jeremy Cheuk-Hin Leung, Dingchi Zhao, Yi Li, Yang Shi, Bin Chen, Gaozhen Nie, Naigeng Wu, Xiangjun Tian, Yi Yang, Shaoqing Zhang, Banglin Zhang

    Abstract: Given the interpretability, accuracy, and stability of numerical weather prediction (NWP) models, current operational weather forecasting relies heavily on the NWP approach. In the past two years, the rapid development of Artificial Intelligence (AI) has provided an alternative solution for medium-range (1-10 days) weather forecasting. Bi et al. (2023) (hereafter Bi23) introduced the first AI-base… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

  9. arXiv:2502.10687  [pdf, other

    cs.NI

    Multi-objective Aerial IRS-assisted ISAC Optimization via Generative AI-enhanced Deep Reinforcement Learning

    Authors: Wenwen Xie, Geng Sun, Jiacheng Wang, Hongyang Du, Jiawen Kang, Kaibin Huang, Victor C. M. Leung

    Abstract: Integrated sensing and communication (ISAC) has garnered substantial research interest owing to its pivotal role in advancing the development of next-generation (6G) wireless networks. However, achieving a performance balance between communication and sensing in the dual-function radar communication (DFRC)-based ISAC system remains a significant challenge. In this paper, an aerial intelligent refl… ▽ More

    Submitted 15 February, 2025; originally announced February 2025.

  10. arXiv:2502.09038  [pdf, other

    cs.AI

    AoI-Sensitive Data Forwarding with Distributed Beamforming in UAV-Assisted IoT

    Authors: Zifan Lang, Guixia Liu, Geng Sun, Jiahui Li, Zemin Sun, Jiacheng Wang, Victor C. M. Leung

    Abstract: This paper proposes a UAV-assisted forwarding system based on distributed beamforming to enhance age of information (AoI) in Internet of Things (IoT). Specifically, UAVs collect and relay data between sensor nodes (SNs) and the remote base station (BS). However, flight delays increase the AoI and degrade the network performance. To mitigate this, we adopt distributed beamforming to extend the comm… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Comments: 6 pages, 4 figures, ICC2025

  11. arXiv:2501.18439  [pdf, other

    cs.LG q-bio.BM

    MolGraph-xLSTM: A graph-based dual-level xLSTM framework with multi-head mixture-of-experts for enhanced molecular representation and interpretability

    Authors: Yan Sun, Yutong Lu, Yan Yi Li, Zihao Jing, Carson K. Leung, Pingzhao Hu

    Abstract: Predicting molecular properties is essential for drug discovery, and computational methods can greatly enhance this process. Molecular graphs have become a focus for representation learning, with Graph Neural Networks (GNNs) widely used. However, GNNs often struggle with capturing long-range dependencies. To address this, we propose MolGraph-xLSTM, a novel graph-based xLSTM model that enhances fea… ▽ More

    Submitted 30 January, 2025; originally announced January 2025.

  12. arXiv:2501.15468  [pdf, other

    cs.CR eess.SP

    Low-altitude Friendly-Jamming for Satellite-Maritime Communications via Generative AI-enabled Deep Reinforcement Learning

    Authors: Jiawei Huang, Aimin Wang, Geng Sun, Jiahui Li, Jiacheng Wang, Dusit Niyato, Victor C. M. Leung

    Abstract: Low Earth Orbit (LEO) satellites can be used to assist maritime wireless communications for data transmission across wide-ranging areas. However, extensive coverage of LEO satellites, combined with openness of channels, can cause the communication process to suffer from security risks. This paper presents a low-altitude friendly-jamming LEO satellite-maritime communication system enabled by a unma… ▽ More

    Submitted 26 January, 2025; originally announced January 2025.

  13. arXiv:2501.14832  [pdf, other

    cs.DC cs.NI

    Resource Allocation Driven by Large Models in Future Semantic-Aware Networks

    Authors: Haijun Zhang, Jiaxin Ni, Zijun Wu, Xiangnan Liu, V. C. M. Leung

    Abstract: Large model has emerged as a key enabler for the popularity of future networked intelligent applications. However, the surge of data traffic brought by intelligent applications puts pressure on the resource utilization and energy consumption of the future networks. With efficient content understanding capabilities, semantic communication holds significant potential for reducing data transmission i… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  14. arXiv:2501.11430  [pdf, other

    cs.LG cs.AI

    A Survey on Diffusion Models for Anomaly Detection

    Authors: Jing Liu, Zhenchao Ma, Zepu Wang, Chenxuanyin Zou, Jiayang Ren, Zehua Wang, Liang Song, Bo Hu, Yang Liu, Victor C. M. Leung

    Abstract: Diffusion models (DMs) have emerged as a powerful class of generative AI models, showing remarkable potential in anomaly detection (AD) tasks across various domains, such as cybersecurity, fraud detection, healthcare, and manufacturing. The intersection of these two fields, termed diffusion models for anomaly detection (DMAD), offers promising solutions for identifying deviations in increasingly c… ▽ More

    Submitted 26 February, 2025; v1 submitted 20 January, 2025; originally announced January 2025.

  15. arXiv:2501.10693  [pdf, ps, other

    cs.AI cs.LG

    Distributionally Robust Policy Evaluation and Learning for Continuous Treatment with Observational Data

    Authors: Cheuk Hang Leung, Yiyan Huang, Yijun Li, Qi Wu

    Abstract: Using offline observational data for policy evaluation and learning allows decision-makers to evaluate and learn a policy that connects characteristics and interventions. Most existing literature has focused on either discrete treatment spaces or assumed no difference in the distributions between the policy-learning and policy-deployed environments. These restrict applications in many real-world s… ▽ More

    Submitted 18 January, 2025; originally announced January 2025.

  16. arXiv:2501.10408  [pdf, other

    eess.AS cs.CL cs.SD

    Leveraging Cross-Attention Transformer and Multi-Feature Fusion for Cross-Linguistic Speech Emotion Recognition

    Authors: Ruoyu Zhao, Xiantao Jiang, F. Richard Yu, Victor C. M. Leung, Tao Wang, Shaohu Zhang

    Abstract: Speech Emotion Recognition (SER) plays a crucial role in enhancing human-computer interaction. Cross-Linguistic SER (CLSER) has been a challenging research problem due to significant variability in linguistic and acoustic features of different languages. In this study, we propose a novel approach HuMP-CAT, which combines HuBERT, MFCC, and prosodic characteristics. These features are fused using a… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  17. arXiv:2412.18230  [pdf, other

    cs.CV

    Efficient Detection Framework Adaptation for Edge Computing: A Plug-and-play Neural Network Toolbox Enabling Edge Deployment

    Authors: Jiaqi Wu, Shihao Zhang, Simin Chen, Lixu Wang, Zehua Wang, Wei Chen, Fangyuan He, Zijian Tian, F. Richard Yu, Victor C. M. Leung

    Abstract: Edge computing has emerged as a key paradigm for deploying deep learning-based object detection in time-sensitive scenarios. However, existing edge detection methods face challenges: 1) difficulty balancing detection precision with lightweight models, 2) limited adaptability of generalized deployment designs, and 3) insufficient real-world validation. To address these issues, we propose the Edge D… ▽ More

    Submitted 24 December, 2024; originally announced December 2024.

  18. Facial Expression Analysis and Its Potentials in IoT Systems: A Contemporary Survey

    Authors: Zixuan Shangguan, Yanjie Dong, Song Guo, Victor C. M. Leung, M. Jamal Deen, Xiping Hu

    Abstract: Facial expressions convey human emotions and can be categorized into macro-expressions (MaEs) and micro-expressions (MiEs) based on duration and intensity. While MaEs are voluntary and easily recognized, MiEs are involuntary, rapid, and can reveal concealed emotions. The integration of facial expression analysis with Internet-of-Thing (IoT) systems has significant potential across diverse scenario… ▽ More

    Submitted 23 May, 2025; v1 submitted 23 December, 2024; originally announced December 2024.

  19. arXiv:2412.14185  [pdf, other

    cs.HC cs.RO

    Fabric Sensing of Intrinsic Hand Muscle Activity

    Authors: Katelyn Lee, Runsheng Wang, Ava Chen, Lauren Winterbottom, Ho Man Colman Leung, Lisa Maria DiSalvo, Iris Xu, Jingxi Xu, Dawn M. Nilsen, Joel Stein, Xia Zhou, Matei Ciocarlie

    Abstract: Wearable robotics have the capacity to assist stroke survivors in assisting and rehabilitating hand function. Many devices that use surface electromyographic (sEMG) for control rely on extrinsic muscle signals, since sEMG sensors are relatively easy to place on the forearm without interfering with hand activity. In this work, we target the intrinsic muscles of the thumb, which are superficial to t… ▽ More

    Submitted 6 December, 2024; originally announced December 2024.

    Comments: 6 pages, 4 figures, ICORR 2025 submission

  20. arXiv:2412.06456  [pdf, other

    cs.NE cs.NI

    UAV Virtual Antenna Array Deployment for Uplink Interference Mitigation in Data Collection Networks

    Authors: Hongjuan Li, Hui Kang, Geng Sun, Jiahui Li, Jiacheng Wang, Xue Wang, Dusit Niyato, Victor C. M. Leung

    Abstract: Unmanned aerial vehicles (UAVs) have gained considerable attention as a platform for establishing aerial wireless networks and communications. However, the line-of-sight dominance in air-to-ground communications often leads to significant interference with terrestrial networks, reducing communication efficiency among terrestrial terminals. This paper explores a novel uplink interference mitigation… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    Comments: This paper has been accepted by IEEE Internet of Things Journal

  21. arXiv:2412.05641  [pdf, other

    cs.LG cs.AI cs.SI

    Hyperedge Anomaly Detection with Hypergraph Neural Network

    Authors: Md. Tanvir Alam, Chowdhury Farhan Ahmed, Carson K. Leung

    Abstract: Hypergraph is a data structure that enables us to model higher-order associations among data entities. Conventional graph-structured data can represent pairwise relationships only, whereas hypergraph enables us to associate any number of entities, which is essential in many real-life applications. Hypergraph learning algorithms have been well-studied for numerous problem settings, such as node cla… ▽ More

    Submitted 7 December, 2024; originally announced December 2024.

  22. arXiv:2411.09712  [pdf, other

    eess.SY cs.GT

    Digital Twin-Assisted Space-Air-Ground Integrated Multi-Access Edge Computing for Low-Altitude Economy: An Online Decentralized Optimization Approach

    Authors: Long He, Geng Sun, Zemin Sun, Jiacheng Wang, Hongyang Du, Dusit Niyato, Jiangchuan Liu, Victor C. M. Leung

    Abstract: The emergence of space-air-ground integrated multi-access edge computing (SAGIMEC) networks opens a significant opportunity for the rapidly growing low altitude economy (LAE), facilitating the development of various applications by offering efficient communication and computing services. However, the heterogeneous nature of SAGIMEC networks, coupled with the stringent computational and communicati… ▽ More

    Submitted 30 January, 2025; v1 submitted 12 November, 2024; originally announced November 2024.

    Comments: arXiv admin note: text overlap with arXiv:2406.11918

  23. arXiv:2411.00838  [pdf, other

    cs.CV cs.AI

    Task-Oriented Real-time Visual Inference for IoVT Systems: A Co-design Framework of Neural Networks and Edge Deployment

    Authors: Jiaqi Wu, Simin Chen, Zehua Wang, Wei Chen, Zijian Tian, F. Richard Yu, Victor C. M. Leung

    Abstract: As the volume of image data grows, data-oriented cloud computing in Internet of Video Things (IoVT) systems encounters latency issues. Task-oriented edge computing addresses this by shifting data analysis to the edge. However, limited computational power of edge devices poses challenges for executing visual tasks. Existing methods struggle to balance high model performance with low resource consum… ▽ More

    Submitted 29 October, 2024; originally announced November 2024.

  24. arXiv:2410.13901  [pdf, ps, other

    cs.CR cs.AI cs.CL cs.ET

    SoK: Prompt Hacking of Large Language Models

    Authors: Baha Rababah, Shang, Wu, Matthew Kwiatkowski, Carson Leung, Cuneyt Gurcan Akcora

    Abstract: The safety and robustness of large language models (LLMs) based applications remain critical challenges in artificial intelligence. Among the key threats to these applications are prompt hacking attacks, which can significantly undermine the security and reliability of LLM-based systems. In this work, we offer a comprehensive and systematic overview of three distinct types of prompt hacking: jailb… ▽ More

    Submitted 15 October, 2024; originally announced October 2024.

  25. arXiv:2410.03885  [pdf, other

    cs.RO eess.SY math.OC

    Collaborative Safety-Critical Formation Control with Obstacle Avoidance

    Authors: Brooks A. Butler, Chi Ho Leung, Philip E. Paré

    Abstract: This work explores a collaborative method for ensuring safety in multi-agent formation control problems. We formulate a control barrier function (CBF) based safety filter control law for a generic distributed formation controller and extend our previously developed collaborative safety framework to an obstacle avoidance problem for agents with acceleration control inputs. We then incorporate multi… ▽ More

    Submitted 4 October, 2024; originally announced October 2024.

    Comments: This work is under review for publication in Automatica. arXiv admin note: text overlap with arXiv:2311.11156

  26. arXiv:2410.02345  [pdf, other

    cs.RO

    Coastal Underwater Evidence Search System with Surface-Underwater Collaboration

    Authors: Hin Wang Lin, Pengyu Wang, Zhaohua Yang, Ka Chun Leung, Fangming Bao, Ka Yu Kui, Jian Xiang Erik Xu, Ling Shi

    Abstract: The Coastal underwater evidence search system with surface-underwater collaboration is designed to revolutionize the search for artificial objects in coastal underwater environments, overcoming limitations associated with traditional methods such as divers and tethered remotely operated vehicles. Our innovative multi-robot collaborative system consists of three parts, an autonomous surface vehicle… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

    Comments: This paper has been accepted by the 18th International Conference on Control, Automation, Robotics and Vision (ICARCV)

  27. arXiv:2409.17668  [pdf

    cs.DB

    A Database Engineered System for Big Data Analytics on Tornado Climatology

    Authors: Fengfan Bian, Carson K. Leung, Piers Grenier, Harry Pu, Samuel Ning, Alfredo Cuzzocrea

    Abstract: Recognizing the challenges with current tornado warning systems, we investigate alternative approaches. In particular, we present a database engi-neered system that integrates information from heterogeneous rich data sources, including climatology data for tornadoes and data just before a tornado warning. The system aids in predicting tornado occurrences by identifying the data points that form th… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

  28. arXiv:2408.10691  [pdf, other

    cs.AI

    Fine-Tuning and Deploying Large Language Models Over Edges: Issues and Approaches

    Authors: Yanjie Dong, Haijun Zhang, Chengming Li, Song Guo, Victor C. M. Leung, Xiping Hu

    Abstract: Since the invention of GPT2--1.5B in 2019, large language models (LLMs) have transitioned from specialized models to versatile foundation models. The LLMs exhibit impressive zero-shot ability, however, require fine-tuning on local datasets and significant resources for deployment. Traditional fine-tuning techniques with the first-order optimizers require substantial GPU memory that exceeds mainstr… ▽ More

    Submitted 1 October, 2024; v1 submitted 20 August, 2024; originally announced August 2024.

  29. arXiv:2407.18338  [pdf, other

    cs.CV eess.IV q-bio.BM

    SMiCRM: A Benchmark Dataset of Mechanistic Molecular Images

    Authors: Ching Ting Leung, Yufan Chen, Hanyu Gao

    Abstract: Optical chemical structure recognition (OCSR) systems aim to extract the molecular structure information, usually in the form of molecular graph or SMILES, from images of chemical molecules. While many tools have been developed for this purpose, challenges still exist due to different types of noises that might exist in the images. Specifically, we focus on the 'arrow-pushing' diagrams, a typical… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: Under Submission

  30. arXiv:2406.08115  [pdf, other

    cs.DC cs.AI

    Resource Allocation and Workload Scheduling for Large-Scale Distributed Deep Learning: A Survey

    Authors: Feng Liang, Zhen Zhang, Haifeng Lu, Chengming Li, Victor C. M. Leung, Yanyi Guo, Xiping Hu

    Abstract: With rapidly increasing distributed deep learning workloads in large-scale data centers, efficient distributed deep learning framework strategies for resource allocation and workload scheduling have become the key to high-performance deep learning. The large-scale environment with large volumes of datasets, models, and computational and communication resources raises various unique challenges for… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  31. arXiv:2405.10347  [pdf, other

    cs.CV cs.AI cs.CY

    Networking Systems for Video Anomaly Detection: A Tutorial and Survey

    Authors: Jing Liu, Yang Liu, Jieyu Lin, Jielin Li, Liang Cao, Peng Sun, Bo Hu, Liang Song, Azzedine Boukerche, Victor C. M. Leung

    Abstract: The increasing utilization of surveillance cameras in smart cities, coupled with the surge of online video applications, has heightened concerns regarding public security and privacy protection, which propelled automated Video Anomaly Detection (VAD) into a fundamental research task within the Artificial Intelligence (AI) community. With the advancements in deep learning and edge computing, VAD ha… ▽ More

    Submitted 3 April, 2025; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: Accepted to ACM Computing Surveys. For more information and supplementary material, please visit https://github.com/fdjingliu/NSVAD

  32. SambaNova SN40L: Scaling the AI Memory Wall with Dataflow and Composition of Experts

    Authors: Raghu Prabhakar, Ram Sivaramakrishnan, Darshan Gandhi, Yun Du, Mingran Wang, Xiangyu Song, Kejie Zhang, Tianren Gao, Angela Wang, Karen Li, Yongning Sheng, Joshua Brot, Denis Sokolov, Apurv Vivek, Calvin Leung, Arjun Sabnis, Jiayu Bai, Tuowen Zhao, Mark Gottscho, David Jackson, Mark Luttrell, Manish K. Shah, Edison Chen, Kaizhao Liang, Swayambhoo Jain , et al. (5 additional authors not shown)

    Abstract: Monolithic large language models (LLMs) like GPT-4 have paved the way for modern generative AI applications. Training, serving, and maintaining monolithic LLMs at scale, however, remains prohibitively expensive and challenging. The disproportionate increase in compute-to-memory ratio of modern AI accelerators have created a memory wall, necessitating new methods to deploy AI. Composition of Expert… ▽ More

    Submitted 4 November, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO)

    ACM Class: C.1.3; C.0

  33. arXiv:2405.03798  [pdf, other

    cs.IT

    Update Rate, Accuracy, and Age of Information in a Wireless Sensor Network

    Authors: Xinlu Dai, Cyril Leung

    Abstract: Age of Information (AoI), namely the time that has elapsed since the most recently delivered packet was generated, is receiving increasing attention with the emergence of many real-time applications that rely on the exchange of time-sensitive information. AoI captures the freshness of the information from the perspective of the destination. The term "accuracy of information" is used to assess how… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  34. arXiv:2404.15292  [pdf, other

    eess.SP cs.IT

    Multi-objective Optimization for Multi-UAV-assisted Mobile Edge Computing

    Authors: Geng Sun, Yixian Wang, Zemin Sun, Qingqing Wu, Jiawen Kang, Dusit Niyato, Victor C. M. Leung

    Abstract: Recent developments in unmanned aerial vehicles (UAVs) and mobile edge computing (MEC) have provided users with flexible and resilient computing services. However, meeting the computing-intensive and latency-sensitive demands of users poses a significant challenge due to the limited resources of UAVs. To address this challenge, we present a multi-objective optimization approach for multi-UAV-assis… ▽ More

    Submitted 23 March, 2024; originally announced April 2024.

  35. arXiv:2404.13348  [pdf, other

    cs.NI cs.LG

    Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems

    Authors: Xiaofei Wang, Yunfeng Zhao, Chao Qiu, Qinghua Hu, Victor C. M. Leung

    Abstract: Amidst the robust impetus from artificial intelligence (AI) and big data, edge intelligence (EI) has emerged as a nascent computing paradigm, synthesizing AI with edge computing (EC) to become an exemplary solution for unleashing the full potential of AI services. Nonetheless, challenges in communication costs, resource allocation, privacy, and security continue to constrain its proficiency in sup… ▽ More

    Submitted 3 November, 2024; v1 submitted 20 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by IEEE Communications Surveys and Tutorials

  36. arXiv:2404.07450  [pdf, other

    cs.NI cs.NE

    Collaborative Ground-Space Communications via Evolutionary Multi-objective Deep Reinforcement Learning

    Authors: Jiahui Li, Geng Sun, Qingqing Wu, Dusit Niyato, Jiawen Kang, Abbas Jamalipour, Victor C. M. Leung

    Abstract: In this paper, we propose a distributed collaborative beamforming (DCB)-based uplink communication paradigm for enabling ground-space direct communications. Specifically, DCB treats the terminals that are unable to establish efficient direct connections with the low Earth orbit (LEO) satellites as distributed antennas, forming a virtual antenna array to enhance the terminal-to-satellite uplink ach… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: This paper has been submitted to IEEE Journal on Selected Areas in Communications

  37. arXiv:2404.06114  [pdf, other

    cs.DC cs.AI

    Communication-Efficient Large-Scale Distributed Deep Learning: A Comprehensive Survey

    Authors: Feng Liang, Zhen Zhang, Haifeng Lu, Victor C. M. Leung, Yanyi Guo, Xiping Hu

    Abstract: With the rapid growth in the volume of data sets, models, and devices in the domain of deep learning, there is increasing attention on large-scale distributed deep learning. In contrast to traditional distributed deep learning, the large-scale scenario poses new challenges that include fault tolerance, scalability of algorithms and infrastructures, and heterogeneity in data sets, models, and resou… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  38. arXiv:2404.01347  [pdf, other

    cs.DB

    Mining Sequential Patterns in Uncertain Databases Using Hierarchical Index Structure

    Authors: Kashob Kumar Roy, Md Hasibul Haque Moon, Md Mahmudur Rahman, Chowdhury Farhan Ahmed, Carson K. Leung

    Abstract: In this uncertain world, data uncertainty is inherent in many applications and its importance is growing drastically due to the rapid development of modern technologies. Nowadays, researchers have paid more attention to mine patterns in uncertain databases. A few recent works attempt to mine frequent uncertain sequential patterns. Despite their success, they are incompetent to reduce the number of… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted at PAKDD 2021. arXiv admin note: text overlap with arXiv:2404.00746

  39. arXiv:2404.00746  [pdf, other

    cs.DB cs.AI

    Mining Weighted Sequential Patterns in Incremental Uncertain Databases

    Authors: Kashob Kumar Roy, Md Hasibul Haque Moon, Md Mahmudur Rahman, Chowdhury Farhan Ahmed, Carson Kai-Sang Leung

    Abstract: Due to the rapid development of science and technology, the importance of imprecise, noisy, and uncertain data is increasing at an exponential rate. Thus, mining patterns in uncertain databases have drawn the attention of researchers. Moreover, frequent sequences of items from these databases need to be discovered for meaningful knowledge with great impact. In many real cases, weights of items and… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Accepted to Information Science journal

    Journal ref: Information Sciences 582 (2022): 865-896

  40. arXiv:2403.17934  [pdf, other

    cs.CV

    AiOS: All-in-One-Stage Expressive Human Pose and Shape Estimation

    Authors: Qingping Sun, Yanjun Wang, Ailing Zeng, Wanqi Yin, Chen Wei, Wenjia Wang, Haiyi Mei, Chi Sing Leung, Ziwei Liu, Lei Yang, Zhongang Cai

    Abstract: Expressive human pose and shape estimation (a.k.a. 3D whole-body mesh recovery) involves the human body, hand, and expression estimation. Most existing methods have tackled this task in a two-stage manner, first detecting the human body part with an off-the-shelf detection model and inferring the different human body parts individually. Despite the impressive results achieved, these methods suffer… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: Homepage: https://ttxskk.github.io/AiOS/

  41. MolNexTR: A Generalized Deep Learning Model for Molecular Image Recognition

    Authors: Yufan Chen, Ching Ting Leung, Yong Huang, Jianwei Sun, Hao Chen, Hanyu Gao

    Abstract: In the field of chemical structure recognition, the task of converting molecular images into machine-readable data formats such as SMILES string stands as a significant challenge, primarily due to the varied drawing styles and conventions prevalent in chemical literature. To bridge this gap, we proposed MolNexTR, a novel image-to-graph deep learning model that collaborates to fuse the strengths of… ▽ More

    Submitted 27 August, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Journal ref: Journal of Cheminformatics (2024) 16:141

  42. arXiv:2403.00473  [pdf, other

    cs.GR cs.RO eess.SY

    Computer-Controlled 3D Freeform Surface Weaving

    Authors: Xiangjia Chen, Lip M. Lai, Zishun Liu, Chengkai Dai, Isaac C. W. Leung, Charlie C. L. Wang, Yeung Yam

    Abstract: In this paper, we present a new computer-controlled weaving technology that enables the fabrication of woven structures in the shape of given 3D surfaces by using threads in non-traditional materials with high bending-stiffness, allowing for multiple applications with the resultant woven fabrics. A new weaving machine and a new manufacturing process are developed to realize the function of 3D surf… ▽ More

    Submitted 8 May, 2024; v1 submitted 1 March, 2024; originally announced March 2024.

  43. arXiv:2402.18392  [pdf, other

    cs.LG cs.AI econ.EM stat.ML

    Unveiling the Potential of Robustness in Selecting Conditional Average Treatment Effect Estimators

    Authors: Yiyan Huang, Cheuk Hang Leung, Siyi Wang, Yijun Li, Qi Wu

    Abstract: The growing demand for personalized decision-making has led to a surge of interest in estimating the Conditional Average Treatment Effect (CATE). Various types of CATE estimators have been developed with advancements in machine learning and causal inference. However, selecting the desirable CATE estimator through a conventional model validation procedure remains impractical due to the absence of c… ▽ More

    Submitted 31 October, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: This paper was accepted by NeurIPS-2024

  44. arXiv:2402.05396  [pdf, other

    cs.LG cs.AI

    TASER: Temporal Adaptive Sampling for Fast and Accurate Dynamic Graph Representation Learning

    Authors: Gangda Deng, Hongkuan Zhou, Hanqing Zeng, Yinglong Xia, Christopher Leung, Jianbo Li, Rajgopal Kannan, Viktor Prasanna

    Abstract: Recently, Temporal Graph Neural Networks (TGNNs) have demonstrated state-of-the-art performance in various high-impact applications, including fraud detection and content recommendation. Despite the success of TGNNs, they are prone to the prevalent noise found in real-world dynamic graphs like time-deprecated links and skewed interaction distribution. The noise causes two critical issues that sign… ▽ More

    Submitted 23 November, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: IPDPS 2024

  45. arXiv:2402.03317  [pdf, other

    cs.CV cs.LG

    SpecFormer: Guarding Vision Transformer Robustness via Maximum Singular Value Penalization

    Authors: Xixu Hu, Runkai Zheng, Jindong Wang, Cheuk Hang Leung, Qi Wu, Xing Xie

    Abstract: Vision Transformers (ViTs) are increasingly used in computer vision due to their high performance, but their vulnerability to adversarial attacks is a concern. Existing methods lack a solid theoretical basis, focusing mainly on empirical training adjustments. This study introduces SpecFormer, tailored to fortify ViTs against adversarial attacks, with theoretical underpinnings. We establish local L… ▽ More

    Submitted 13 July, 2024; v1 submitted 2 January, 2024; originally announced February 2024.

    Comments: Accepted by ECCV 2024; 27 pages; code is at: https://github.com/microsoft/robustlearn

  46. arXiv:2312.10388  [pdf, other

    stat.ME cs.AI q-fin.GN

    The Causal Impact of Credit Lines on Spending Distributions

    Authors: Yijun Li, Cheuk Hang Leung, Xiangqian Sun, Chaoqun Wang, Yiyan Huang, Xing Yan, Qi Wu, Dongdong Wang, Zhixiang Huang

    Abstract: Consumer credit services offered by e-commerce platforms provide customers with convenient loan access during shopping and have the potential to stimulate sales. To understand the causal impact of credit lines on spending, previous studies have employed causal estimators, based on direct regression (DR), inverse propensity weighting (IPW), and double machine learning (DML) to estimate the treatmen… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

  47. arXiv:2312.07917  [pdf, other

    cs.NI cs.AI

    On Designing Multi-UAV aided Wireless Powered Dynamic Communication via Hierarchical Deep Reinforcement Learning

    Authors: Ze Yu Zhao, Yue Ling Che, Sheng Luo, Gege Luo, Kaishun Wu, Victor C. M. Leung

    Abstract: This paper proposes a novel design on the wireless powered communication network (WPCN) in dynamic environments under the assistance of multiple unmanned aerial vehicles (UAVs). Unlike the existing studies, where the low-power wireless nodes (WNs) often conform to the coherent harvest-then-transmit protocol, under our newly proposed double-threshold based WN type updating rule, each WN can dynamic… ▽ More

    Submitted 6 June, 2024; v1 submitted 13 December, 2023; originally announced December 2023.

    Comments: 13 pages, 10 figures; Submitted for possible journal publishing

  48. arXiv:2311.13233  [pdf, other

    cs.CR cs.AI

    A Survey of Adversarial CAPTCHAs on its History, Classification and Generation

    Authors: Zisheng Xu, Qiao Yan, F. Richard Yu, Victor C. M. Leung

    Abstract: Completely Automated Public Turing test to tell Computers and Humans Apart, short for CAPTCHA, is an essential and relatively easy way to defend against malicious attacks implemented by bots. The security and usability trade-off limits the use of massive geometric transformations to interfere deep model recognition and deep models even outperformed humans in complex CAPTCHAs. The discovery of adve… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

    Comments: Submitted to ACM Computing Surveys (Under Review)

  49. arXiv:2311.11156  [pdf, other

    math.OC cs.MA cs.RO eess.SY math.DS

    Collaborative Safe Formation Control for Coupled Multi-Agent Systems

    Authors: Brooks A. Butler, Chi Ho Leung, Philip E. Paré

    Abstract: The safe control of multi-robot swarms is a challenging and active field of research, where common goals include maintaining group cohesion while simultaneously avoiding obstacles and inter-agent collision. Building off our previously developed theory for distributed collaborative safety-critical control for networked dynamic systems, we propose a distributed algorithm for the formation control of… ▽ More

    Submitted 2 April, 2024; v1 submitted 18 November, 2023; originally announced November 2023.

    Comments: This work has been accepted to be presented at the 2024 European Control Conference

  50. arXiv:2310.01980  [pdf, other

    cs.NI cs.NE

    UAV Swarm-enabled Collaborative Secure Relay Communications with Time-domain Colluding Eavesdropper

    Authors: Chuang Zhang, Geng Sun, Qingqing Wu, Jiahui Li, Shuang Liang, Dusit Niyato, Victor C. M. Leung

    Abstract: Unmanned aerial vehicles (UAVs) as aerial relays are practically appealing for assisting Internet of Things (IoT) network. In this work, we aim to utilize the UAV swarm to assist the secure communication between the micro base station (MBS) equipped with the planar array antenna (PAA) and the IoT terminal devices by collaborative beamforming (CB), so as to counteract the effects of collusive eaves… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: Submitted to IEEE Transactions on Mobile Computing