Skip to main content

Showing 1–50 of 70 results for author: Nie, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.09971  [pdf, ps, other

    cs.CV

    APCoTTA: Continual Test-Time Adaptation for Semantic Segmentation of Airborne LiDAR Point Clouds

    Authors: Yuan Gao, Shaobo Xia, Sheng Nie, Cheng Wang, Xiaohuan Xi, Bisheng Yang

    Abstract: Airborne laser scanning (ALS) point cloud segmentation is a fundamental task for large-scale 3D scene understanding. In real-world applications, models are typically fixed after training. However, domain shifts caused by changes in the environment, sensor types, or sensor degradation often lead to a decline in model performance. Continuous Test-Time Adaptation (CTTA) offers a solution by adapting… ▽ More

    Submitted 15 May, 2025; originally announced May 2025.

    Comments: 18 pages,12 figures

  2. arXiv:2504.10368  [pdf, other

    cs.CL cs.AI

    S1-Bench: A Simple Benchmark for Evaluating System 1 Thinking Capability of Large Reasoning Models

    Authors: Wenyuan Zhang, Shuaiyi Nie, Xinghua Zhang, Zefeng Zhang, Tingwen Liu

    Abstract: We introduce S1-Bench, a novel benchmark designed to evaluate Large Reasoning Models' (LRMs) performance on simple tasks that favor intuitive system 1 thinking rather than deliberative system 2 reasoning. While LRMs have achieved significant breakthroughs in complex reasoning tasks through explicit chains of thought, their reliance on deep analytical thinking may limit their system 1 thinking capa… ▽ More

    Submitted 14 April, 2025; originally announced April 2025.

    Comments: Work in Progress

  3. arXiv:2503.18384  [pdf, other

    cs.CV

    LiDAR Remote Sensing Meets Weak Supervision: Concepts, Methods, and Perspectives

    Authors: Yuan Gao, Shaobo Xia, Pu Wang, Xiaohuan Xi, Sheng Nie, Cheng Wang

    Abstract: LiDAR (Light Detection and Ranging) enables rapid and accurate acquisition of three-dimensional spatial data, widely applied in remote sensing areas such as surface mapping, environmental monitoring, urban modeling, and forestry inventory. LiDAR remote sensing primarily includes data interpretation and LiDAR-based inversion. However, LiDAR interpretation typically relies on dense and precise annot… ▽ More

    Submitted 24 March, 2025; originally announced March 2025.

  4. arXiv:2502.14050  [pdf, other

    cs.CL cs.AI cs.LG

    Diversity-driven Data Selection for Language Model Tuning through Sparse Autoencoder

    Authors: Xianjun Yang, Shaoliang Nie, Lijuan Liu, Suchin Gururangan, Ujjwal Karn, Rui Hou, Madian Khabsa, Yuning Mao

    Abstract: Instruction tuning data are often quantity-saturated due to the large volume of data collection and fast model iteration, leaving data selection important but underexplored. Existing quality-driven data selection methods, such as LIMA (NeurIPS 2023 \citep{zhou2024lima}) and AlpaGasus (ICLR 2024 \citep{chenalpagasus}) generally ignore the equal importance of data diversity and complexity. In this w… ▽ More

    Submitted 31 March, 2025; v1 submitted 19 February, 2025; originally announced February 2025.

    Comments: fix typos

  5. arXiv:2502.10975  [pdf, other

    cs.RO cs.CV eess.IV

    GS-GVINS: A Tightly-integrated GNSS-Visual-Inertial Navigation System Augmented by 3D Gaussian Splatting

    Authors: Zelin Zhou, Saurav Uprety, Shichuang Nie, Hongzhou Yang

    Abstract: Recently, the emergence of 3D Gaussian Splatting (3DGS) has drawn significant attention in the area of 3D map reconstruction and visual SLAM. While extensive research has explored 3DGS for indoor trajectory tracking using visual sensor alone or in combination with Light Detection and Ranging (LiDAR) and Inertial Measurement Unit (IMU), its integration with GNSS for large-scale outdoor navigation r… ▽ More

    Submitted 15 February, 2025; originally announced February 2025.

  6. arXiv:2502.09992  [pdf, other

    cs.CL cs.LG

    Large Language Diffusion Models

    Authors: Shen Nie, Fengqi Zhu, Zebin You, Xiaolu Zhang, Jingyang Ou, Jun Hu, Jun Zhou, Yankai Lin, Ji-Rong Wen, Chongxuan Li

    Abstract: Autoregressive models (ARMs) are widely regarded as the cornerstone of large language models (LLMs). We challenge this notion by introducing LLaDA, a diffusion model trained from scratch under the pre-training and supervised fine-tuning (SFT) paradigm. LLaDA models distributions through a forward data masking process and a reverse process, parameterized by a vanilla Transformer to predict masked t… ▽ More

    Submitted 18 February, 2025; v1 submitted 14 February, 2025; originally announced February 2025.

  7. arXiv:2501.16391  [pdf, other

    cs.LG cs.AI q-bio.BM

    Inductive-Associative Meta-learning Pipeline with Human Cognitive Patterns for Unseen Drug-Target Interaction Prediction

    Authors: Xiaoqing Lian, Jie Zhu, Tianxu Lv, Shiyun Nie, Hang Fan, Guosheng Wu, Yunjun Ge, Lihua Li, Xiangxiang Zeng, Xiang Pan

    Abstract: Significant differences in protein structures hinder the generalization of existing drug-target interaction (DTI) models, which often rely heavily on pre-learned binding principles or detailed annotations. In contrast, BioBridge designs an Inductive-Associative pipeline inspired by the workflow of scientists who base their accumulated expertise on drawing insights into novel drug-target pairs from… ▽ More

    Submitted 27 March, 2025; v1 submitted 26 January, 2025; originally announced January 2025.

  8. arXiv:2501.00865  [pdf, other

    cs.CL cs.LG

    Negative to Positive Co-learning with Aggressive Modality Dropout

    Authors: Nicholas Magal, Minh Tran, Riku Arakawa, Suzanne Nie

    Abstract: This paper aims to document an effective way to improve multimodal co-learning by using aggressive modality dropout. We find that by using aggressive modality dropout we are able to reverse negative co-learning (NCL) to positive co-learning (PCL). Aggressive modality dropout can be used to "prep" a multimodal model for unimodal deployment, and dramatically increases model performance during negati… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

  9. arXiv:2412.20787  [pdf, other

    cs.CR cs.AI

    SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity

    Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo

    Abstract: Evaluating Large Language Models (LLMs) is crucial for understanding their capabilities and limitations across various applications, including natural language processing and code generation. Existing benchmarks like MMLU, C-Eval, and HumanEval assess general LLM performance but lack focus on specific expert domains such as cybersecurity. Previous attempts to create cybersecurity datasets have fac… ▽ More

    Submitted 6 January, 2025; v1 submitted 30 December, 2024; originally announced December 2024.

  10. arXiv:2412.09844  [pdf, other

    cs.CV

    Real-time Identity Defenses against Malicious Personalization of Diffusion Models

    Authors: Hanzhong Guo, Shen Nie, Chao Du, Tianyu Pang, Hao Sun, Chongxuan Li

    Abstract: Personalized generative diffusion models, capable of synthesizing highly realistic images based on a few reference portraits, may pose substantial social, ethical, and legal risks via identity replication. Existing defense mechanisms rely on computationally intensive adversarial perturbations tailored to individual images, rendering them impractical for real-world deployment. This study introduces… ▽ More

    Submitted 19 January, 2025; v1 submitted 12 December, 2024; originally announced December 2024.

    Comments: 21 pages, 7 figures (RID)

  11. arXiv:2412.08195  [pdf, other

    cs.RO cs.AI cs.CV

    Semantic Scene Completion Based 3D Traversability Estimation for Off-Road Terrains

    Authors: Zitong Chen, Chao Sun, Shida Nie, Chen Min, Changjiu Ning, Haoyu Li, Bo Wang

    Abstract: Off-road environments present significant challenges for autonomous ground vehicles due to the absence of structured roads and the presence of complex obstacles, such as uneven terrain, vegetation, and occlusions. Traditional perception algorithms, designed primarily for structured environments, often fail under these conditions, leading to inaccurate traversability estimations. In this paper, ORD… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

    Comments: 12 pages,14 figures

  12. arXiv:2412.00898  [pdf, other

    cs.SE cs.CR

    Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements

    Authors: Huaijin Wang, Zhibo Liu, Yanbo Dai, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu

    Abstract: Software composition analysis (SCA) denotes the process of identifying open-source software components in an input software application. SCA has been extensively developed and adopted by academia and industry. However, we notice that the modern SCA techniques in industry scenarios still need to be improved due to privacy concerns. Overall, SCA requires the users to upload their applications' sourc… ▽ More

    Submitted 1 December, 2024; originally announced December 2024.

    Comments: 14 pages, 9 figures, 47th International Conference on Software Engineering (ICSE 2025), Research Track

  13. arXiv:2411.05349  [pdf, other

    cs.AI cs.DC

    Enhancing Cluster Resilience: LLM-agent Based Autonomous Intelligent Cluster Diagnosis System and Evaluation Framework

    Authors: Honghao Shi, Longkai Cheng, Wenli Wu, Yuhang Wang, Xuan Liu, Shaokai Nie, Weixv Wang, Xuebin Min, Chunlei Men, Yonghua Lin

    Abstract: Recent advancements in Large Language Models (LLMs) and related technologies such as Retrieval-Augmented Generation (RAG) and Diagram of Thought (DoT) have enabled the creation of autonomous intelligent systems capable of performing cluster diagnostics and troubleshooting. By integrating these technologies with self-play methodologies, we have developed an LLM-agent system designed to autonomously… ▽ More

    Submitted 8 November, 2024; originally announced November 2024.

    Comments: 10 pages

    MSC Class: 68T42

  14. arXiv:2410.23683  [pdf, other

    cs.GT cs.IR

    Unveiling User Satisfaction and Creator Productivity Trade-Offs in Recommendation Platforms

    Authors: Fan Yao, Yiming Liao, Jingzhou Liu, Shaoliang Nie, Qifan Wang, Haifeng Xu, Hongning Wang

    Abstract: On User-Generated Content (UGC) platforms, recommendation algorithms significantly impact creators' motivation to produce content as they compete for algorithmically allocated user traffic. This phenomenon subtly shapes the volume and diversity of the content pool, which is crucial for the platform's sustainability. In this work, we demonstrate, both theoretically and empirically, that a purely re… ▽ More

    Submitted 31 October, 2024; v1 submitted 31 October, 2024; originally announced October 2024.

  15. Subgraph Aggregation for Out-of-Distribution Generalization on Graphs

    Authors: Bowen Liu, Haoyang Li, Shuning Wang, Shuo Nie, Shanghang Zhang

    Abstract: Out-of-distribution (OOD) generalization in Graph Neural Networks (GNNs) has gained significant attention due to its critical importance in graph-based predictions in real-world scenarios. Existing methods primarily focus on extracting a single causal subgraph from the input graph to achieve generalizable predictions. However, relying on a single subgraph can lead to susceptibility to spurious cor… ▽ More

    Submitted 18 April, 2025; v1 submitted 29 October, 2024; originally announced October 2024.

    Comments: Accepted by AAAI 2025

  16. arXiv:2410.20713  [pdf, ps, other

    cs.CR

    Detecting Malicious Accounts in Web3 through Transaction Graph

    Authors: Wenkai Li, Zhijie Liu, Xiaoqi Li, Sen Nie

    Abstract: The web3 applications have recently been growing, especially on the Ethereum platform, starting to become the target of scammers. The web3 scams, imitating the services provided by legitimate platforms, mimic regular activity to deceive users. The current phishing account detection tools utilize graph learning or sampling algorithms to obtain graph features. However, large-scale transaction networ… ▽ More

    Submitted 27 October, 2024; originally announced October 2024.

    Comments: This work is accepted by ASE'24

  17. arXiv:2410.18514  [pdf, other

    cs.AI cs.CL cs.LG

    Scaling up Masked Diffusion Models on Text

    Authors: Shen Nie, Fengqi Zhu, Chao Du, Tianyu Pang, Qian Liu, Guangtao Zeng, Min Lin, Chongxuan Li

    Abstract: Masked diffusion models (MDMs) have shown promise in language modeling, yet their scalability and effectiveness in core language tasks, such as text generation and language understanding, remain underexplored. This paper establishes the first scaling law for MDMs, demonstrating a scaling rate comparable to autoregressive models (ARMs) and a relatively small compute gap. Motivated by their scalabil… ▽ More

    Submitted 28 February, 2025; v1 submitted 24 October, 2024; originally announced October 2024.

  18. arXiv:2409.20370  [pdf, other

    cs.LG cs.AI cs.CL

    The Perfect Blend: Redefining RLHF with Mixture of Judges

    Authors: Tengyu Xu, Eryk Helenowski, Karthik Abinav Sankararaman, Di Jin, Kaiyan Peng, Eric Han, Shaoliang Nie, Chen Zhu, Hejia Zhang, Wenxuan Zhou, Zhouhao Zeng, Yun He, Karishma Mandyam, Arya Talabzadeh, Madian Khabsa, Gabriel Cohen, Yuandong Tian, Hao Ma, Sinong Wang, Han Fang

    Abstract: Reinforcement learning from human feedback (RLHF) has become the leading approach for fine-tuning large language models (LLM). However, RLHF has limitations in multi-task learning (MTL) due to challenges of reward hacking and extreme multi-objective optimization (i.e., trade-off of multiple and/or sometimes conflicting objectives). Applying RLHF for MTL currently requires careful tuning of the wei… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

    Comments: submitted to conference

  19. arXiv:2409.15657  [pdf, other

    cs.AI cs.CL cs.LG

    M$^2$PT: Multimodal Prompt Tuning for Zero-shot Instruction Learning

    Authors: Taowen Wang, Yiyang Liu, James Chenhao Liang, junhan zhao, Yiming Cui, Yuning Mao, Shaoliang Nie, Jiahao Liu, Fuli Feng, Zenglin Xu, Cheng Han, Lifu Huang, Qifan Wang, Dongfang Liu

    Abstract: Multimodal Large Language Models (MLLMs) demonstrate remarkable performance across a wide range of domains, with increasing emphasis on enhancing their zero-shot generalization capabilities for unseen tasks across various modalities. Instruction tuning has emerged as an effective strategy for achieving zero-shot generalization by finetuning pretrained models on diverse multimodal tasks. As the sca… ▽ More

    Submitted 30 October, 2024; v1 submitted 23 September, 2024; originally announced September 2024.

    Comments: EMNLP 2024

  20. arXiv:2409.11726  [pdf, other

    cs.CL cs.HC

    Revealing the Challenge of Detecting Character Knowledge Errors in LLM Role-Playing

    Authors: Wenyuan Zhang, Jiawei Sheng, Shuaiyi Nie, Zefeng Zhang, Xinghua Zhang, Yongquan He, Tingwen Liu

    Abstract: Large language model (LLM) role-playing has gained widespread attention, where the authentic character knowledge is crucial for constructing realistic LLM role-playing agents. However, existing works usually overlook the exploration of LLMs' ability to detect characters' known knowledge errors (KKE) and unknown knowledge errors (UKE) while playing roles, which would lead to low-quality automatic c… ▽ More

    Submitted 18 September, 2024; originally announced September 2024.

    Comments: 22 pages, 14 figures

  21. arXiv:2408.02891  [pdf, other

    cs.CV

    Diverse Generation while Maintaining Semantic Coordination: A Diffusion-Based Data Augmentation Method for Object Detection

    Authors: Sen Nie, Zhuo Wang, Xinxin Wang, Kun He

    Abstract: Recent studies emphasize the crucial role of data augmentation in enhancing the performance of object detection models. However,existing methodologies often struggle to effectively harmonize dataset diversity with semantic coordination.To bridge this gap, we introduce an innovative augmentation technique leveraging pre-trained conditional diffusion models to mediate this balance. Our approach enco… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

    Comments: 15 pages, 7 figures, ICPR2024

  22. arXiv:2407.21783  [pdf, other

    cs.AI cs.CL cs.CV

    The Llama 3 Herd of Models

    Authors: Aaron Grattafiori, Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Abhishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Alex Vaughan, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava Spataru, Baptiste Roziere , et al. (536 additional authors not shown)

    Abstract: Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical… ▽ More

    Submitted 23 November, 2024; v1 submitted 31 July, 2024; originally announced July 2024.

  23. arXiv:2407.05740  [pdf, other

    cs.CL

    Do Multilingual Large Language Models Mitigate Stereotype Bias?

    Authors: Shangrui Nie, Michael Fromm, Charles Welch, Rebekka Görge, Akbar Karimi, Joan Plepi, Nazia Afsan Mowmita, Nicolas Flores-Herr, Mehdi Ali, Lucie Flek

    Abstract: While preliminary findings indicate that multilingual LLMs exhibit reduced bias compared to monolingual ones, a comprehensive understanding of the effect of multilingual training on bias mitigation, is lacking. This study addresses this gap by systematically training six LLMs of identical size (2.6B parameters) and architecture: five monolingual models (English, German, French, Italian, and Spanis… ▽ More

    Submitted 9 July, 2024; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: 19 pages, 8 figures, C3NLP 2024

  24. arXiv:2406.03736  [pdf, other

    cs.LG cs.CL

    Your Absorbing Discrete Diffusion Secretly Models the Conditional Distributions of Clean Data

    Authors: Jingyang Ou, Shen Nie, Kaiwen Xue, Fengqi Zhu, Jiacheng Sun, Zhenguo Li, Chongxuan Li

    Abstract: Discrete diffusion models with absorbing processes have shown promise in language modeling. The key quantities to be estimated are the ratios between the marginal probabilities of two transitive states at all timesteps, called the concrete score. In this paper, we reveal that the concrete score in absorbing diffusion can be expressed as conditional probabilities of clean data, multiplied by a time… ▽ More

    Submitted 11 February, 2025; v1 submitted 6 June, 2024; originally announced June 2024.

  25. arXiv:2405.05741  [pdf, ps, other

    cs.CL cs.AI

    Can large language models understand uncommon meanings of common words?

    Authors: Jinyang Wu, Feihu Che, Xinxin Zheng, Shuai Zhang, Ruihan Jin, Shuai Nie, Pengpeng Shao, Jianhua Tao

    Abstract: Large language models (LLMs) like ChatGPT have shown significant advancements across diverse natural language understanding (NLU) tasks, including intelligent dialogue and autonomous agents. Yet, lacking widely acknowledged testing mechanisms, answering `whether LLMs are stochastic parrots or genuinely comprehend the world' remains unclear, fostering numerous studies and sparking heated debates. P… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  26. arXiv:2404.15766  [pdf, other

    cs.LG cs.AI

    Unifying Bayesian Flow Networks and Diffusion Models through Stochastic Differential Equations

    Authors: Kaiwen Xue, Yuhao Zhou, Shen Nie, Xu Min, Xiaolu Zhang, Jun Zhou, Chongxuan Li

    Abstract: Bayesian flow networks (BFNs) iteratively refine the parameters, instead of the samples in diffusion models (DMs), of distributions at various noise levels through Bayesian inference. Owing to its differentiable nature, BFNs are promising in modeling both continuous and discrete data, while simultaneously maintaining fast sampling capabilities. This paper aims to understand and enhance BFNs by con… ▽ More

    Submitted 2 June, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

    Comments: Published as a conference paper at ICML 2024

  27. arXiv:2404.15660  [pdf, other

    cs.CL

    KS-LLM: Knowledge Selection of Large Language Models with Evidence Document for Question Answering

    Authors: Xinxin Zheng, Feihu Che, Jinyang Wu, Shuai Zhang, Shuai Nie, Kang Liu, Jianhua Tao

    Abstract: Large language models (LLMs) suffer from the hallucination problem and face significant challenges when applied to knowledge-intensive tasks. A promising approach is to leverage evidence documents as extra supporting knowledge, which can be obtained through retrieval or generation. However, existing methods directly leverage the entire contents of the evidence document, which may introduce noise i… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

  28. arXiv:2404.12980  [pdf, other

    cs.HC

    Ring-a-Pose: A Ring for Continuous Hand Pose Tracking

    Authors: Tianhong Catherine Yu, Guilin Hu, Ruidong Zhang, Hyunchul Lim, Saif Mahmud, Chi-Jung Lee, Ke Li, Devansh Agarwal, Shuyang Nie, Jinseok Oh, François Guimbretière, Cheng Zhang

    Abstract: We present Ring-a-Pose, a single untethered ring that tracks continuous 3D hand poses. Located in the center of the hand, the ring emits an inaudible acoustic signal that each hand pose reflects differently. Ring-a-Pose imposes minimal obtrusions on the hand, unlike multi-ring or glove systems. It is not affected by the choice of clothing that may cover wrist-worn systems. In a series of three use… ▽ More

    Submitted 11 November, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

  29. arXiv:2401.11161  [pdf, other

    cs.SE

    BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching

    Authors: Ling Jiang, Junwen An, Huihui Huang, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang

    Abstract: While third-party libraries are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. Software composition analysis, proposed to identify reused TPLs for reducing such risks, has become an essential procedure within modern DevSecOps. As one of the mainstream SCA techniques, binary-to-source SCA id… ▽ More

    Submitted 25 August, 2024; v1 submitted 20 January, 2024; originally announced January 2024.

    Comments: In Proceedings of the 46th International Conference on Software Engineering (ICSE'24)

  30. arXiv:2311.01410  [pdf, other

    cs.CV cs.LG

    The Blessing of Randomness: SDE Beats ODE in General Diffusion-based Image Editing

    Authors: Shen Nie, Hanzhong Allan Guo, Cheng Lu, Yuhao Zhou, Chenyu Zheng, Chongxuan Li

    Abstract: We present a unified probabilistic formulation for diffusion-based image editing, where a latent variable is edited in a task-specific manner and generally deviates from the corresponding marginal distribution induced by the original stochastic or ordinary differential equation (SDE or ODE). Instead, it defines a corresponding SDE or ODE for editing. In the formulation, we prove that the Kullback-… ▽ More

    Submitted 29 February, 2024; v1 submitted 2 November, 2023; originally announced November 2023.

  31. arXiv:2310.11738  [pdf, other

    cs.SE

    Unleashing the Power of Clippy in Real-World Rust Projects

    Authors: Chunmiao Li, Yijun Yu, Haitao Wu, Luca Carlig, Shijie Nie, Lingxiao Jiang

    Abstract: Clippy lints are considered as essential tools for Rust developers, as they can be configured as gate-keeping rules for a Rust project during continuous integration. Despite their availability, little was known about practical application and cost-effectiveness of the lints in reducing code quality issues. In this study, we embark on a comprehensive analysis to unveil the true impact of Clippy lin… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  32. arXiv:2310.06530  [pdf, other

    cs.SE

    Refining Decompiled C Code with Large Language Models

    Authors: Wai Kin Wong, Huaijin Wang, Zongjie Li, Zhibo Liu, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu

    Abstract: A C decompiler converts an executable into source code. The recovered C source code, once re-compiled, is expected to produce an executable with the same functionality as the original executable. With over twenty years of development, C decompilers have been widely used in production to support reverse engineering applications. Despite the prosperous development of C decompilers, it is widely ackn… ▽ More

    Submitted 28 November, 2023; v1 submitted 10 October, 2023; originally announced October 2023.

  33. arXiv:2310.00183  [pdf, other

    cs.LG cs.AI

    On the Equivalence of Graph Convolution and Mixup

    Authors: Xiaotian Han, Hanqing Zeng, Yu Chen, Shaoliang Nie, Jingzhou Liu, Kanika Narang, Zahra Shakeri, Karthik Abinav Sankararaman, Song Jiang, Madian Khabsa, Qifan Wang, Xia Hu

    Abstract: This paper investigates the relationship between graph convolution and Mixup techniques. Graph convolution in a graph neural network involves aggregating features from neighboring samples to learn representative features for a specific node or sample. On the other hand, Mixup is a data augmentation technique that generates new examples by averaging features and one-hot labels from multiple samples… ▽ More

    Submitted 11 September, 2024; v1 submitted 29 September, 2023; originally announced October 2023.

    Comments: Accepted by TMLR

  34. arXiv:2305.13774  [pdf, other

    cs.SD eess.AS

    ADD 2023: the Second Audio Deepfake Detection Challenge

    Authors: Jiangyan Yi, Jianhua Tao, Ruibo Fu, Xinrui Yan, Chenglong Wang, Tao Wang, Chu Yuan Zhang, Xiaohui Zhang, Yan Zhao, Yong Ren, Le Xu, Junzuo Zhou, Hao Gu, Zhengqi Wen, Shan Liang, Zheng Lian, Shuai Nie, Haizhou Li

    Abstract: Audio deepfake detection is an emerging topic in the artificial intelligence community. The second Audio Deepfake Detection Challenge (ADD 2023) aims to spur researchers around the world to build new innovative technologies that can further accelerate and foster research on detecting and analyzing deepfake speech utterances. Different from previous challenges (e.g. ADD 2022), ADD 2023 focuses on s… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  35. arXiv:2305.07095  [pdf, other

    cs.CL cs.AI cs.LG

    Are Machine Rationales (Not) Useful to Humans? Measuring and Improving Human Utility of Free-Text Rationales

    Authors: Brihi Joshi, Ziyi Liu, Sahana Ramnath, Aaron Chan, Zhewei Tong, Shaoliang Nie, Qifan Wang, Yejin Choi, Xiang Ren

    Abstract: Among the remarkable emergent capabilities of large language models (LMs) is free-text rationalization; beyond a certain scale, large LMs are capable of generating seemingly useful rationalizations, which in turn, can dramatically enhance their performances on leaderboards. This phenomenon raises a question: can machine generated rationales also be useful for humans, especially when lay humans try… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: Accepted at ACL 2023

  36. arXiv:2304.02838  [pdf, other

    cs.CR cs.AI cs.LG

    TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph

    Authors: Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu

    Abstract: APT detection is difficult to detect due to the long-term latency, covert and slow multistage attack patterns of Advanced Persistent Threat (APT). To tackle these issues, we propose TBDetector, a transformer-based advanced persistent threat detection method for APT attack detection. Considering that provenance graphs provide rich historical information and have the powerful attacks historic correl… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 10 pages, 7 figures

  37. arXiv:2303.06555  [pdf, other

    cs.LG cs.CV

    One Transformer Fits All Distributions in Multi-Modal Diffusion at Scale

    Authors: Fan Bao, Shen Nie, Kaiwen Xue, Chongxuan Li, Shi Pu, Yaole Wang, Gang Yue, Yue Cao, Hang Su, Jun Zhu

    Abstract: This paper proposes a unified diffusion framework (dubbed UniDiffuser) to fit all distributions relevant to a set of multi-modal data in one model. Our key insight is -- learning diffusion models for marginal, conditional, and joint distributions can be unified as predicting the noise in the perturbed data, where the perturbation levels (i.e. timesteps) can be different for different modalities. I… ▽ More

    Submitted 30 May, 2023; v1 submitted 11 March, 2023; originally announced March 2023.

    Comments: Accepted to ICML2023

  38. arXiv:2302.12247  [pdf, other

    cs.LG cs.AI cs.CL cs.CV cs.IT

    Quantifying & Modeling Multimodal Interactions: An Information Decomposition Framework

    Authors: Paul Pu Liang, Yun Cheng, Xiang Fan, Chun Kai Ling, Suzanne Nie, Richard Chen, Zihao Deng, Nicholas Allen, Randy Auerbach, Faisal Mahmood, Ruslan Salakhutdinov, Louis-Philippe Morency

    Abstract: The recent explosion of interest in multimodal applications has resulted in a wide selection of datasets and methods for representing and integrating information from different modalities. Despite these empirical advances, there remain fundamental research questions: How can we quantify the interactions that are necessary to solve a multimodal task? Subsequently, what are the most suitable multimo… ▽ More

    Submitted 10 December, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023. Code available at: https://github.com/pliang279/PID

  39. arXiv:2210.15500  [pdf, other

    cs.CL cs.CY cs.IR cs.LG

    COFFEE: Counterfactual Fairness for Personalized Text Generation in Explainable Recommendation

    Authors: Nan Wang, Qifan Wang, Yi-Chia Wang, Maziar Sanjabi, Jingzhou Liu, Hamed Firooz, Hongning Wang, Shaoliang Nie

    Abstract: As language models become increasingly integrated into our digital lives, Personalized Text Generation (PTG) has emerged as a pivotal component with a wide range of applications. However, the bias inherent in user written text, often used for PTG model training, can inadvertently associate different levels of linguistic quality with users' protected attributes. The model can inherit the bias and p… ▽ More

    Submitted 22 October, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: This is a long paper accepted by the Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing (EMNLP 2023)

  40. arXiv:2210.15159  [pdf, other

    cs.SE

    Comparing One with Many -- Solving Binary2source Function Matching Under Function Inlining

    Authors: Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu

    Abstract: Binary2source function matching is a fundamental task for many security applications, including Software Component Analysis (SCA). The "1-to-1" mechanism has been applied in existing binary2source matching works, in which one binary function is matched against one source function. However, we discovered that such mapping could be "1-to-n" (one query binary function maps multiple source functions),… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

  41. arXiv:2210.05883  [pdf, other

    cs.CL

    AD-DROP: Attribution-Driven Dropout for Robust Language Model Fine-Tuning

    Authors: Tao Yang, Jinghao Deng, Xiaojun Quan, Qifan Wang, Shaoliang Nie

    Abstract: Fine-tuning large pre-trained language models on downstream tasks is apt to suffer from overfitting when limited training data is available. While dropout proves to be an effective antidote by randomly dropping a proportion of units, existing research has not examined its effect on the self-attention mechanism. In this paper, we investigate this problem through self-attention attribution and find… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted to NeurIPS 2022

  42. arXiv:2209.12152  [pdf, other

    cs.CV cs.AI cs.LG

    All are Worth Words: A ViT Backbone for Diffusion Models

    Authors: Fan Bao, Shen Nie, Kaiwen Xue, Yue Cao, Chongxuan Li, Hang Su, Jun Zhu

    Abstract: Vision transformers (ViT) have shown promise in various vision tasks while the U-Net based on a convolutional neural network (CNN) remains dominant in diffusion models. We design a simple and general ViT-based architecture (named U-ViT) for image generation with diffusion models. U-ViT is characterized by treating all inputs including the time, condition and noisy image patches as tokens and emplo… ▽ More

    Submitted 25 March, 2023; v1 submitted 25 September, 2022; originally announced September 2022.

    Comments: Accepted to CVPR 2023

  43. arXiv:2207.00779  [pdf, other

    cs.CL cs.AI cs.LG

    FRAME: Evaluating Rationale-Label Consistency Metrics for Free-Text Rationales

    Authors: Aaron Chan, Shaoliang Nie, Liang Tan, Xiaochang Peng, Hamed Firooz, Maziar Sanjabi, Xiang Ren

    Abstract: Following how humans communicate, free-text rationales aim to use natural language to explain neural language model (LM) behavior. However, free-text rationales' unconstrained nature makes them prone to hallucination, so it is important to have metrics for free-text rationale quality. Existing free-text rationale metrics measure how consistent the rationale is with the LM's predicted label, but th… ▽ More

    Submitted 2 December, 2022; v1 submitted 2 July, 2022; originally announced July 2022.

    Comments: BlackboxNLP Workshop at EMNLP 2022

  44. arXiv:2205.12542  [pdf, other

    cs.CL

    ER-Test: Evaluating Explanation Regularization Methods for Language Models

    Authors: Brihi Joshi, Aaron Chan, Ziyi Liu, Shaoliang Nie, Maziar Sanjabi, Hamed Firooz, Xiang Ren

    Abstract: By explaining how humans would solve a given task, human rationales can provide strong learning signal for neural language models (LMs). Explanation regularization (ER) aims to improve LM generalization by pushing the LM's machine rationales (Which input tokens did the LM focus on?) to align with human rationales (Which input tokens would humans focus on?). Though prior works primarily study ER vi… ▽ More

    Submitted 27 February, 2023; v1 submitted 25 May, 2022; originally announced May 2022.

    Comments: Findings of EMNLP 2022

  45. arXiv:2204.09191  [pdf, other

    cs.SE

    Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings

    Authors: Zongjie Li, Pingchuan Ma, Huaijin Wang, Shuai Wang, Qiyi Tang, Sen Nie, Shi Wu

    Abstract: Neural program embeddings have demonstrated considerable promise in a range of program analysis tasks, including clone identification, program repair, code completion, and program synthesis. However, most existing methods generate neural program embeddings directly from the program source codes, by learning from features such as tokens, abstract syntax trees, and control flow graphs. This paper ta… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  46. arXiv:2204.05990  [pdf, other

    cs.CL

    Detection, Disambiguation, Re-ranking: Autoregressive Entity Linking as a Multi-Task Problem

    Authors: Khalil Mrini, Shaoliang Nie, Jiatao Gu, Sinong Wang, Maziar Sanjabi, Hamed Firooz

    Abstract: We propose an autoregressive entity linking model, that is trained with two auxiliary tasks, and learns to re-rank generated samples at inference time. Our proposed novelties address two weaknesses in the literature. First, a recent method proposes to learn mention detection and then entity candidate selection, but relies on predefined sets of candidates. We use encoder-decoder autoregressive enti… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: Long paper accepted to ACL 2022 Findings

  47. arXiv:2202.08433  [pdf, ps, other

    cs.SD cs.LG eess.AS

    ADD 2022: the First Audio Deep Synthesis Detection Challenge

    Authors: Jiangyan Yi, Ruibo Fu, Jianhua Tao, Shuai Nie, Haoxin Ma, Chenglong Wang, Tao Wang, Zhengkun Tian, Xiaohui Zhang, Ye Bai, Cunhang Fan, Shan Liang, Shiming Wang, Shuai Zhang, Xinrui Yan, Le Xu, Zhengqi Wen, Haizhou Li, Zheng Lian, Bin Liu

    Abstract: Audio deepfake detection is an emerging topic, which was included in the ASVspoof 2021. However, the recent shared tasks have not covered many real-life and challenging scenarios. The first Audio Deep synthesis Detection challenge (ADD) was motivated to fill in the gap. The ADD 2022 includes three tracks: low-quality fake audio detection (LF), partially fake audio detection (PF) and audio fake gam… ▽ More

    Submitted 2 July, 2024; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: Accepted by ICASSP 2022

  48. arXiv:2201.00072  [pdf, other

    cs.LG

    BARACK: Partially Supervised Group Robustness With Guarantees

    Authors: Nimit S. Sohoni, Maziar Sanjabi, Nicolas Ballas, Aditya Grover, Shaoliang Nie, Hamed Firooz, Christopher RĂ©

    Abstract: While neural networks have shown remarkable success on classification tasks in terms of average-case performance, they often fail to perform well on certain groups of the data. Such group information may be expensive to obtain; thus, recent works in robustness and fairness have proposed ways to improve worst-group performance even when group labels are unavailable for the training data. However, t… ▽ More

    Submitted 10 April, 2022; v1 submitted 31 December, 2021; originally announced January 2022.

    Comments: 26 pages

  49. arXiv:2112.12928  [pdf, other

    cs.SE

    1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis

    Authors: Ang Jia, Ming Fan, Wuxia Jin, Xi Xu, Zhaohui Zhou, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu

    Abstract: Binary similarity analysis is critical to many code-reuse-related issues and "1-to-1" mechanism is widely applied, where one function in a binary file is matched against one function in a source file or binary file. However, we discover that function mapping is a more complex problem of "1-to-n" or even "n-to-n" due to the existence of function inlining. In this paper, we investigate the effect… ▽ More

    Submitted 5 May, 2022; v1 submitted 23 December, 2021; originally announced December 2021.

  50. arXiv:2112.08802  [pdf, other

    cs.CL cs.AI cs.LG

    UNIREX: A Unified Learning Framework for Language Model Rationale Extraction

    Authors: Aaron Chan, Maziar Sanjabi, Lambert Mathias, Liang Tan, Shaoliang Nie, Xiaochang Peng, Xiang Ren, Hamed Firooz

    Abstract: An extractive rationale explains a language model's (LM's) prediction on a given task instance by highlighting the text inputs that most influenced the prediction. Ideally, rationale extraction should be faithful (reflective of LM's actual behavior) and plausible (convincing to humans), without compromising the LM's (i.e., task model's) task performance. Although attribution algorithms and select-… ▽ More

    Submitted 26 February, 2023; v1 submitted 16 December, 2021; originally announced December 2021.

    Comments: ICML 2022