Skip to main content

Showing 1–29 of 29 results for author: Niu, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.03519  [pdf, ps, other

    cs.CL

    An Efficient Task-Oriented Dialogue Policy: Evolutionary Reinforcement Learning Injected by Elite Individuals

    Authors: Yangyang Zhao, Ben Niu, Libo Qin, Shihan Wang

    Abstract: Deep Reinforcement Learning (DRL) is widely used in task-oriented dialogue systems to optimize dialogue policy, but it struggles to balance exploration and exploitation due to the high dimensionality of state and action spaces. This challenge often results in local optima or poor convergence. Evolutionary Algorithms (EAs) have been proven to effectively explore the solution space of neural network… ▽ More

    Submitted 5 June, 2025; v1 submitted 3 June, 2025; originally announced June 2025.

    Comments: Accepted to ACL 2025 (Main Track)

  2. arXiv:2505.11833  [pdf, ps, other

    cs.AI

    ToLeaP: Rethinking Development of Tool Learning with Large Language Models

    Authors: Haotian Chen, Zijun Song, Boye Niu, Ke Zhang, Litu Ou, Yaxi Lu, Zhong Zhang, Xin Cong, Yankai Lin, Zhiyuan Liu, Maosong Sun

    Abstract: Tool learning, which enables large language models (LLMs) to utilize external tools effectively, has garnered increasing attention for its potential to revolutionize productivity across industries. Despite rapid development in tool learning, key challenges and opportunities remain understudied, limiting deeper insights and future advancements. In this paper, we investigate the tool learning abilit… ▽ More

    Submitted 17 May, 2025; originally announced May 2025.

  3. Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors

    Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu

    Abstract: Online users often post facial images of themselves and other people on online social networks (OSNs) and other Web 2.0 platforms, which can lead to potential privacy leakage of people whose faces are included in such images. There is limited research on understanding face privacy in social media while considering user behavior. It is crucial to consider privacy of subjects and bystanders separate… ▽ More

    Submitted 20 January, 2025; originally announced January 2025.

  4. arXiv:2501.07834  [pdf, other

    cs.AI cs.LG cs.MA

    Flow: Modularized Agentic Workflow Automation

    Authors: Boye Niu, Yiliao Song, Kai Lian, Yifan Shen, Yu Yao, Kun Zhang, Tongliang Liu

    Abstract: Multi-agent frameworks powered by large language models (LLMs) have demonstrated great success in automated planning and task execution. However, the effective adjustment of agentic workflows during execution has not been well studied. An effective workflow adjustment is crucial in real-world scenarios, as the initial plan must adjust to unforeseen challenges and changing conditions in real time t… ▽ More

    Submitted 23 February, 2025; v1 submitted 13 January, 2025; originally announced January 2025.

  5. arXiv:2412.07214  [pdf, other

    cs.DB cs.AI

    Towards Automated Cross-domain Exploratory Data Analysis through Large Language Models

    Authors: Jun-Peng Zhu, Boyan Niu, Peng Cai, Zheming Ni, Jianwei Wan, Kai Xu, Jiajun Huang, Shengbo Ma, Bing Wang, Xuan Zhou, Guanglei Bao, Donghui Zhang, Liu Tang, Qi Liu

    Abstract: Exploratory data analysis (EDA), coupled with SQL, is essential for data analysts involved in data exploration and analysis. However, data analysts often encounter two primary challenges: (1) the need to craft SQL queries skillfully, and (2) the requirement to generate suitable visualization types that enhance the interpretation of query results. Due to its significance, substantial research effor… ▽ More

    Submitted 13 February, 2025; v1 submitted 10 December, 2024; originally announced December 2024.

    Comments: 14 pages, 10 figures

  6. arXiv:2410.22901  [pdf, other

    cs.CV

    HelloMeme: Integrating Spatial Knitting Attentions to Embed High-Level and Fidelity-Rich Conditions in Diffusion Models

    Authors: Shengkai Zhang, Nianhong Jiao, Tian Li, Chaojie Yang, Chenhui Xue, Boya Niu, Jun Gao

    Abstract: We propose an effective method for inserting adapters into text-to-image foundation models, which enables the execution of complex downstream tasks while preserving the generalization ability of the base model. The core idea of this method is to optimize the attention mechanism related to 2D feature maps, which enhances the performance of the adapter. This approach was validated on the task of mem… ▽ More

    Submitted 30 October, 2024; originally announced October 2024.

    Comments: 11 pages, 7 figures, 2 tables

    MSC Class: 68T07 (Primary) 68T10 ACM Class: I.4.5; I.5.0

  7. arXiv:2410.01707  [pdf, other

    cs.CL cs.AI

    Interpretable Contrastive Monte Carlo Tree Search Reasoning

    Authors: Zitian Gao, Boye Niu, Xuzheng He, Haotian Xu, Hongzhang Liu, Aiwei Liu, Xuming Hu, Lijie Wen

    Abstract: We propose SC-MCTS*: a novel Monte Carlo Tree Search (MCTS) reasoning algorithm for Large Language Models (LLMs), significantly improves both reasoning accuracy and speed. Our motivation comes from: 1. Previous MCTS LLM reasoning works often overlooked its biggest drawback--slower speed compared to CoT; 2. Previous research mainly used MCTS as a tool for LLM reasoning on various tasks with limited… ▽ More

    Submitted 25 December, 2024; v1 submitted 2 October, 2024; originally announced October 2024.

  8. arXiv:2409.15781  [pdf, other

    cs.CV

    Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?

    Authors: Likun Zhang, Hao Wu, Lingcui Zhang, Fengyuan Xu, Jin Cao, Fenghua Li, Ben Niu

    Abstract: The emergence of text-to-image models has recently sparked significant interest, but the attendant is a looming shadow of potential infringement by violating the user terms. Specifically, an adversary may exploit data created by a commercial model to train their own without proper authorization. To address such risk, it is crucial to investigate the attribution of a suspicious model's training dat… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

  9. arXiv:2409.03183  [pdf, other

    cs.CL cs.AI

    Bypassing DARCY Defense: Indistinguishable Universal Adversarial Triggers

    Authors: Zuquan Peng, Yuanyuan He, Jianbing Ni, Ben Niu

    Abstract: Neural networks (NN) classification models for Natural Language Processing (NLP) are vulnerable to the Universal Adversarial Triggers (UAT) attack that triggers a model to produce a specific prediction for any input. DARCY borrows the "honeypot" concept to bait multiple trapdoors, effectively detecting the adversarial examples generated by UAT. Unfortunately, we find a new UAT generation method, c… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

    Comments: 13 pages, 5 figures

    ACM Class: I.2.7

  10. arXiv:2408.17119  [pdf

    cs.HC cs.AI

    Exploring User Acceptance Of Portable Intelligent Personal Assistants: A Hybrid Approach Using PLS-SEM And fsQCA

    Authors: Gustave Florentin Nkoulou Mvondo, Ben Niu

    Abstract: This research explores the factors driving user acceptance of Rabbit R1, a newly developed portable intelligent personal assistant (PIPA) that aims to redefine user interaction and control. The study extends the technology acceptance model (TAM) by incorporating artificial intelligence-specific factors (conversational intelligence, task intelligence, and perceived naturalness), user interface desi… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

    Comments: 36,

    MSC Class: HCC

  11. arXiv:2405.03986  [pdf

    cs.AI cs.HC

    Factors Influencing User Willingness To Use SORA

    Authors: Gustave Florentin Nkoulou Mvondo, Ben Niu

    Abstract: Sora promises to redefine the way visual content is created. Despite its numerous forecasted benefits, the drivers of user willingness to use the text-to-video (T2V) model are unknown. This study extends the extended unified theory of acceptance and use of technology (UTAUT2) with perceived realism and novelty value. Using a purposive sampling method, we collected data from 940 respondents in the… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 27 pages, 3 figures, 7 tables, 2 authors; first author* corresponding author,

    MSC Class: 62P225

  12. arXiv:2306.03833  [pdf

    cs.LG

    Predicting Consultation Success in Online Health Platforms Using Dynamic Knowledge Networks and Multimodal Data Fusion

    Authors: Shuang Geng, Wenli Zhang, Jiaheng Xie, Gemin Liang, Ben Niu, Sudha Ram

    Abstract: Online healthcare consultation in virtual health is an emerging industry marked by innovation and fierce competition. Accurate and timely prediction of healthcare consultation success can proactively help online platforms address patient concerns and improve retention rates. However, predicting online consultation success is challenging due to the partial role of virtual consultations in patients'… ▽ More

    Submitted 14 June, 2024; v1 submitted 6 June, 2023; originally announced June 2023.

    MSC Class: K.5 ACM Class: H.4.m

  13. arXiv:2207.13385  [pdf, other

    cs.IT eess.SP

    Symbol Rate and Carries Estimation in OFDM Framework: A high Accuracy Technique under Low SNR

    Authors: Zetian Qin, Yubai Li, Benye Niu, Qingyao Li, Renhao Xue

    Abstract: Under a low Signal-to-Noise Ratio (SNR), the Orthogonal Frequency-Division Multiplexing (OFDM) signal symbol rate is limited. Existing carrier number estimation algorithms lack adequate methods to deal with low SNR. This paper proposes an algorithm with a low error rate under low SNR by correlating the signal and applying a Fast Fourier Transform (FFT) operation. By improving existing algorithms,… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  14. arXiv:2108.02303  [pdf, other

    cs.RO

    Tolerance-Guided Policy Learning for Adaptable and Transferrable Delicate Industrial Insertion

    Authors: Boshen Niu, Chenxi Wang, Changliu Liu

    Abstract: Policy learning for delicate industrial insertion tasks (e.g., PC board assembly) is challenging. This paper considers two major problems: how to learn a diversified policy (instead of just one average policy) that can efficiently handle different workpieces with minimum amount of training data, and how to handle defects of workpieces during insertion. To address the problems, we propose tolerance… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  15. arXiv:2008.08767  [pdf, other

    eess.IV cs.CV

    Single Image Super-Resolution via a Holistic Attention Network

    Authors: Ben Niu, Weilei Wen, Wenqi Ren, Xiangde Zhang, Lianping Yang, Shuzhen Wang, Kaihao Zhang, Xiaochun Cao, Haifeng Shen

    Abstract: Informative features play a crucial role in the single image super-resolution task. Channel attention has been demonstrated to be effective for preserving information-rich features in each layer. However, channel attention treats each convolution layer as a separate process that misses the correlation among different layers. To address this problem, we propose a new holistic attention network (HAN… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 16 pages, 6 figures, IEEE International Conference on Computer Vision

  16. arXiv:2003.03945  [pdf, ps, other

    math.CO cs.DM

    Complexity of tree-coloring interval graphs equitably

    Authors: Bei Niu, Bi Li, Xin Zhang

    Abstract: An equitable tree-$k$-coloring of a graph is a vertex $k$-coloring such that each color class induces a forest and the size of any two color classes differ by at most one. In this work, we show that every interval graph $G$ has an equitable tree-$k$-coloring for any integer $k\geq \lceil(Δ(G)+1)/2\rceil$, solving a conjecture of Wu, Zhang and Li (2013) for interval graphs, and furthermore, give a… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

  17. arXiv:2002.08570  [pdf, other

    cs.LG stat.ML

    Input Perturbation: A New Paradigm between Central and Local Differential Privacy

    Authors: Yilin Kang, Yong Liu, Ben Niu, Xinyi Tong, Likun Zhang, Weiping Wang

    Abstract: Traditionally, there are two models on differential privacy: the central model and the local model. The central model focuses on the machine learning model and the local model focuses on the training data. In this paper, we study the \textit{input perturbation} method in differentially private empirical risk minimization (DP-ERM), preserving privacy of the central model. By adding noise to the ori… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

  18. arXiv:1908.05075  [pdf, other

    math.CO cs.DM

    Equitable partition of graphs into induced linear forests

    Authors: Xin Zhang, Bei Niu

    Abstract: It is proved that the vertex set of any simple graph $G$ can be equitably partitioned into $k$ subsets for any integer $k\geq\max\{\big\lceil\frac{Δ(G)+1}{2}\big\rceil,\big\lceil\frac{|G|}{4}\big\rceil\}$ so that each of them induces a linear forest.

    Submitted 14 August, 2019; originally announced August 2019.

  19. Light edges in 1-planar graphs of minimum degree 3

    Authors: Bei Niu, Xin Zhang

    Abstract: A graph is 1-planar if it can be drawn in the plane so that each edge is crossed by at most one another edge. In this work we prove that each 1-planar graph of minimum degree at least $3$ contains an edge with degrees of its endvertices of type $(3,\leq23)$ or $(4,\leq11)$ or $(5,\leq9)$ or $(6,\leq8)$ or $(7,7)$. Moreover, the upper bounds $9,8$ and $7$ here are sharp and the upper bounds $23$ an… ▽ More

    Submitted 27 September, 2019; v1 submitted 14 August, 2019; originally announced August 2019.

    Comments: This paper was submitted to Discrete Mathematics on Dec.4, 2018, and will be published there

    Journal ref: Discrete Mathematics 343(2) (2020) #111664

  20. arXiv:1908.05069  [pdf, other

    math.CO cs.DM

    Equitable tree-$O(d)$-coloring of $d$-degenerate graphs

    Authors: Xin Zhang, Bei Niu

    Abstract: An equitable tree-$k$-coloring of a graph is a vertex coloring on $k$ colors so that every color class incudes a forest and the sizes of any two color classes differ by at most one.This kind of coloring was first introduced in 2013 and can be used to formulate the structure decomposition problem on the communication network with some security considerations. In 2015, Esperet, Lemoine and Maffray s… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  21. arXiv:1908.05066  [pdf, ps, other

    math.CO cs.DM

    Equitable vertex arboricity conjecture holds for graphs with low degeneracy

    Authors: Xin Zhang, Bei Niu, Yan Li, Bi Li

    Abstract: The equitable tree-coloring can formulate a structure decomposition problem on the communication network with some security considerations. Namely, an equitable tree-$k$-coloring of a graph is a vertex coloring using $k$ distinct colors such that every color class induces a forest and the sizes of any two color classes differ by at most one. In this paper, we show some theoretical results on the e… ▽ More

    Submitted 12 April, 2021; v1 submitted 14 August, 2019; originally announced August 2019.

    Comments: This is the final version acceptted for publication in Acta Mathematica Sinica, English Series, with an improvement of the lower bound for the maximum degree and with the title changed

  22. arXiv:1903.08337  [pdf, other

    math.CO cs.DM

    Equitable partition of plane graphs with independent crossings into induced forests

    Authors: Bei Niu, Xin Zhang, Yuping Gao

    Abstract: The cluster of a crossing in a graph drawing in the plane is the set of the four end-vertices of its two crossed edges. Two crossings are independent if their clusters do not intersect. In this paper, we prove that every plane graph with independent crossings has an equitable partition into $m$ induced forests for any $m\geq 8$. Moreover, we decrease this lower bound 8 for $m$ to 6, 5, 4 and 3 if… ▽ More

    Submitted 16 December, 2019; v1 submitted 20 March, 2019; originally announced March 2019.

    Comments: 15 Pages

  23. A structure of 1-planar graph and its applications to coloring problems

    Authors: Xin Zhang, Bei Niu, Jiguo Yu

    Abstract: A graph is 1-planar if it can be drawn on a plane so that each edge is crossed by at most one other edge. In this paper, we first give a useful structural theorem for 1-planar graphs, and then apply it to the list edge and list total coloring, the $(p,1)$-total labelling, and the equitable edge coloring of 1-planar graphs. More precisely, we verify the well-known List Edge Coloring Conjecture and… ▽ More

    Submitted 24 February, 2019; originally announced February 2019.

    Comments: 13 pages

    MSC Class: 05C10; 05C15

    Journal ref: Graphs and Combinatorics, 35(3) (2019) 677-688

  24. arXiv:1809.02799  [pdf, other

    math.CO cs.DM

    A note on the edge partition of graphs containing either a light edge or an alternating 2-cycle

    Authors: Xin Zhang, Bei Niu

    Abstract: Let $\mathcal{G}_α$ be a hereditary graph class (i.e, every subgraph of $G_α\in \mathcal{G}_α$ belongs to $\mathcal{G}_α$) such that every graph $G_α$ in $\mathcal{G}_α$ has minimum degree at most 1, or contains either an edge $uv$ such that $d_{G_α}(u)+d_{G_α}(v)\leq α$ or a 2-alternating cycle. It is proved that every graph in $\mathcal{G}_α$ ($α\geq 5$) with maximum degree $Δ$ can be edge-parti… ▽ More

    Submitted 8 September, 2018; originally announced September 2018.

    Comments: This is a very preliminary version! If you find any topes or mistakes, please fell free to let us now. This paper is used for communication, and will not be published as it is in a journal

  25. Research on Solution Space of Bipartite Graph Vertex-Cover by Maximum Matchings

    Authors: Wei Wei, Yunjia Zhang, Ting Wang, Baifeng Li, Baolong Niu, Zhiming Zheng

    Abstract: Some rigorous results and statistics of the solution space of Vertex-Covers on bipartite graphs are given in this paper. Based on the $K\ddot{o}nig$'s theorem, an exact solution space expression algorithm is proposed and statistical analysis of the nodes' states is provided. The statistical results fit well with the algorithmic results until the emergence of the unfrozen core, which makes the fluc… ▽ More

    Submitted 22 May, 2015; originally announced May 2015.

    Comments: 19 pages, 8 figures

  26. Organization mechanism and counting algorithm on Vertex-Cover solutions

    Authors: Wei Wei, Renquan Zhang, Baolong Niu, Binghui Guo, Zhiming Zheng

    Abstract: Counting the solution number of combinational optimization problems is an important topic in the study of computational complexity, especially on the #P-complete complexity class. In this paper, we first investigate some organizations of Vertex-Cover unfrozen subgraphs by the underlying connectivity and connected components of unfrozen vertices. Then, a Vertex-Cover Solution Number Counting Algori… ▽ More

    Submitted 12 January, 2015; v1 submitted 17 March, 2014; originally announced March 2014.

    Comments: 17 pages, 6 figures

  27. arXiv:1401.8064  [pdf, ps, other

    cs.CR

    Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks

    Authors: Ben Niu, Tanran Zhang, Xiaoyan Zhu, Hui Li, Zongqing Lu

    Abstract: The rapid developments of mobile devices and online social networks have resulted in increasing attention to Mobile Social Networking (MSN). The explosive growth of mobile-connected and location-aware devices makes it possible and meaningful to do the Proximity-based Mobile Social Networks (PMSNs). Users can discover and make new social interactions easily with physical-proximate mobile users thro… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.

    Comments: 15 pages, 18 figures

  28. Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors

    Authors: Bo Niu, Mihaela C. Beluri, Zinan Lin, Prabhakar Chitrapu

    Abstract: In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system, where the base station (BS) and the relay station (RS) cooperate and transmit data to the user equipment (UE) in a distributed fashion. We analyze the impact of the SNR imbalance between the BS-UE and RS-UE links, as… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Comments: 5 pages, 3 figures, IEEE 69th Vehicular Technology Conference

  29. arXiv:1001.1478  [pdf, ps, other

    cs.IT

    Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback

    Authors: Bo Niu, Osvaldo Simeone, Oren Somekh, Alexander M. Haimovich

    Abstract: In this paper, the ergodic sum-rate and outage probability of a downlink single-antenna channel with K users are analyzed in the presence of Rayleigh flat fading, where limited channel state information (CSI) feedback is assumed. Specifically, only 1-bit feedback per fading block per user is available at the base station. We first study the ergodic sum-rate of the 1-bit feedback scheme, and cons… ▽ More

    Submitted 10 January, 2010; originally announced January 2010.

    Comments: 11 pages, 5 figures, to appear in IEEE Transactions on Vehicular Technology