Skip to main content

Showing 1–43 of 43 results for author: Pei, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.03113  [pdf, other

    cs.CV

    Image Recognition with Online Lightweight Vision Transformer: A Survey

    Authors: Zherui Zhang, Rongtao Xu, Jie Zhou, Changwei Wang, Xingtian Pei, Wenhao Xu, Jiguang Zhang, Li Guo, Longxiang Gao, Wenbo Xu, Shibiao Xu

    Abstract: The Transformer architecture has achieved significant success in natural language processing, motivating its adaptation to computer vision tasks. Unlike convolutional neural networks, vision transformers inherently capture long-range dependencies and enable parallel processing, yet lack inductive biases and efficiency benefits, facing significant computational and memory challenges that limit its… ▽ More

    Submitted 10 May, 2025; v1 submitted 5 May, 2025; originally announced May 2025.

  2. arXiv:2504.00038  [pdf, other

    cs.LG cs.AI

    Revisiting the Relationship between Adversarial and Clean Training: Why Clean Training Can Make Adversarial Training Better

    Authors: MingWei Zhou, Xiaobing Pei

    Abstract: Adversarial training (AT) is an effective technique for enhancing adversarial robustness, but it usually comes at the cost of a decline in generalization ability. Recent studies have attempted to use clean training to assist adversarial training, yet there are contradictions among the conclusions. We comprehensively summarize the representative strategies and, with a focus on the multi - view hypo… ▽ More

    Submitted 30 March, 2025; originally announced April 2025.

  3. arXiv:2503.17175  [pdf

    cs.CV

    Which2comm: An Efficient Collaborative Perception Framework for 3D Object Detection

    Authors: Duanrui Yu, Jing You, Xin Pei, Anqi Qu, Dingyu Wang, Shaocheng Jia

    Abstract: Collaborative perception allows real-time inter-agent information exchange and thus offers invaluable opportunities to enhance the perception capabilities of individual agents. However, limited communication bandwidth in practical scenarios restricts the inter-agent data transmission volume, consequently resulting in performance declines in collaborative perception systems. This implies a trade-of… ▽ More

    Submitted 25 March, 2025; v1 submitted 21 March, 2025; originally announced March 2025.

  4. arXiv:2412.19227  [pdf

    cs.LG

    Multi-view Fake News Detection Model Based on Dynamic Hypergraph

    Authors: Rongping Ye, Xiaobing Pei

    Abstract: With the rapid development of online social networks and the inadequacies in content moderation mechanisms, the detection of fake news has emerged as a pressing concern for the public. Various methods have been proposed for fake news detection, including text-based approaches as well as a series of graph-based approaches. However, the deceptive nature of fake news renders text-based approaches les… ▽ More

    Submitted 26 December, 2024; originally announced December 2024.

  5. arXiv:2412.07468  [pdf, other

    cs.LG

    AHSG: Adversarial Attack on High-level Semantics in Graph Neural Networks

    Authors: Kai Yuan, Jiahao Zhang, Yidi Wang, Xiaobing Pei

    Abstract: Adversarial attacks on Graph Neural Networks aim to perturb the performance of the learner by carefully modifying the graph topology and node attributes. Existing methods achieve attack stealthiness by constraining the modification budget and differences in graph properties. However, these methods typically disrupt task-relevant primary semantics directly, which results in low defensibility and de… ▽ More

    Submitted 17 April, 2025; v1 submitted 10 December, 2024; originally announced December 2024.

  6. arXiv:2412.04652  [pdf, other

    cs.CV cs.AI

    Cross-Self KV Cache Pruning for Efficient Vision-Language Inference

    Authors: Xiaohuan Pei, Tao Huang, Chang Xu

    Abstract: KV cache pruning has emerged as a promising technique for reducing memory and computation costs in long-context auto-regressive generation. Existing methods for vision-language models (VLMs) typically rely on self-attention scores from large language models (LLMs) to identify and prune irrelevant tokens. However, these approaches overlook the inherent distributional discrepancies between modalitie… ▽ More

    Submitted 5 December, 2024; originally announced December 2024.

  7. arXiv:2410.00132  [pdf, other

    cs.CV

    CVVLSNet: Vehicle Location and Speed Estimation Using Partial Connected Vehicle Trajectory Data

    Authors: Jiachen Ye, Dingyu Wang, Shaocheng Jia, Xin Pei, Zi Yang, Yi Zhang, S. C. Wong

    Abstract: Real-time estimation of vehicle locations and speeds is crucial for developing many beneficial transportation applications in traffic management and control, e.g., adaptive signal control. Recent advances in communication technologies facilitate the emergence of connected vehicles (CVs), which can share traffic information with nearby CVs or infrastructures. At the early stage of connectivity, onl… ▽ More

    Submitted 30 September, 2024; originally announced October 2024.

  8. arXiv:2409.19933  [pdf, other

    cs.CV

    CCDepth: A Lightweight Self-supervised Depth Estimation Network with Enhanced Interpretability

    Authors: Xi Zhang, Yaru Xue, Shaocheng Jia, Xin Pei

    Abstract: Self-supervised depth estimation, which solely requires monocular image sequence as input, has become increasingly popular and promising in recent years. Current research primarily focuses on enhancing the prediction accuracy of the models. However, the excessive number of parameters impedes the universal deployment of the model on edge devices. Moreover, the emerging neural networks, being black-… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

  9. arXiv:2409.04980  [pdf, other

    cs.CV

    Multi-V2X: A Large Scale Multi-modal Multi-penetration-rate Dataset for Cooperative Perception

    Authors: Rongsong Li, Xin Pei

    Abstract: Cooperative perception through vehicle-to-everything (V2X) has garnered significant attention in recent years due to its potential to overcome occlusions and enhance long-distance perception. Great achievements have been made in both datasets and algorithms. However, existing real-world datasets are limited by the presence of few communicable agents, while synthetic datasets typically cover only v… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

    Comments: 9 pages, 4 figures, 5 tables

  10. arXiv:2408.01428  [pdf, other

    cs.CV cs.AI

    Transferable Adversarial Facial Images for Privacy Protection

    Authors: Minghui Li, Jiangxiong Wang, Hao Zhang, Ziqi Zhou, Shengshan Hu, Xiaobing Pei

    Abstract: The success of deep face recognition (FR) systems has raised serious privacy concerns due to their ability to enable unauthorized tracking of users in the digital world. Previous studies proposed introducing imperceptible adversarial noises into face images to deceive those face recognition models, thus achieving the goal of enhancing facial privacy protection. Nevertheless, they heavily rely on u… ▽ More

    Submitted 17 July, 2024; originally announced August 2024.

    Comments: Accepted by ACM MM 2024

  11. arXiv:2406.18540  [pdf, other

    cs.CV cs.CR

    Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing

    Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen

    Abstract: Model stealing (MS) involves querying and observing the output of a machine learning model to steal its capabilities. The quality of queried data is crucial, yet obtaining a large amount of real data for MS is often challenging. Recent works have reduced reliance on real data by using generative models. However, when high-dimensional query data is required, these methods are impractical due to the… ▽ More

    Submitted 18 May, 2024; originally announced June 2024.

    Comments: Accepted to CVPR 2024

  12. arXiv:2406.00764  [pdf, other

    cs.LG

    IENE: Identifying and Extrapolating the Node Environment for Out-of-Distribution Generalization on Graphs

    Authors: Haoran Yang, Xiaobing Pei, Kai Yuan

    Abstract: Due to the performance degradation of graph neural networks (GNNs) under distribution shifts, the work on out-of-distribution (OOD) generalization on graphs has received widespread attention. A novel perspective involves distinguishing potential confounding biases from different environments through environmental identification, enabling the model to escape environmentally-sensitive correlations a… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  13. arXiv:2405.18435  [pdf, other

    eess.IV cs.CV

    QUBIQ: Uncertainty Quantification for Biomedical Image Segmentation Challenge

    Authors: Hongwei Bran Li, Fernando Navarro, Ivan Ezhov, Amirhossein Bayat, Dhritiman Das, Florian Kofler, Suprosanna Shit, Diana Waldmannstetter, Johannes C. Paetzold, Xiaobin Hu, Benedikt Wiestler, Lucas Zimmer, Tamaz Amiranashvili, Chinmay Prabhakar, Christoph Berger, Jonas Weidner, Michelle Alonso-Basant, Arif Rashid, Ujjwal Baid, Wesam Adel, Deniz Ali, Bhakti Baheti, Yingbin Bai, Ishaan Bhatt, Sabri Can Cetindag , et al. (55 additional authors not shown)

    Abstract: Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the de… ▽ More

    Submitted 24 June, 2024; v1 submitted 19 March, 2024; originally announced May 2024.

    Comments: initial technical report

  14. arXiv:2405.16502  [pdf, ps, other

    cs.PF

    AmBC-NOMA-Aided Short-Packet Communication for High Mobility V2X Transmissions

    Authors: Xinyue Pei, Xingwei Wang, Yingyang Chen, Tingrui Pei, Miaowen Wen

    Abstract: In this paper, we investigate the performance of ambient backscatter communication non-orthogonal multiple access (AmBC-NOMA)-assisted short packet communication for high-mobility vehicle-to-everything transmissions. In the proposed system, a roadside unit (RSU) transmits a superimposed signal to a typical NOMA user pair. Simultaneously, the backscatter device (BD) transmits its own signal towards… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

  15. arXiv:2403.09977  [pdf, other

    cs.CV cs.AI

    EfficientVMamba: Atrous Selective Scan for Light Weight Visual Mamba

    Authors: Xiaohuan Pei, Tao Huang, Chang Xu

    Abstract: Prior efforts in light-weight model development mainly centered on CNN and Transformer-based designs yet faced persistent challenges. CNNs adept at local feature extraction compromise resolution while Transformers offer global reach but escalate computational demands $\mathcal{O}(N^2)$. This ongoing trade-off between accuracy and efficiency remains a significant hurdle. Recently, state space model… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  16. arXiv:2403.09338  [pdf, other

    cs.CV cs.AI

    LocalMamba: Visual State Space Model with Windowed Selective Scan

    Authors: Tao Huang, Xiaohuan Pei, Shan You, Fei Wang, Chen Qian, Chang Xu

    Abstract: Recent advancements in state space models, notably Mamba, have demonstrated significant progress in modeling long sequences for tasks like language understanding. Yet, their application in vision tasks has not markedly surpassed the performance of traditional Convolutional Neural Networks (CNNs) and Vision Transformers (ViTs). This paper posits that the key to enhancing Vision Mamba (ViM) lies in… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  17. arXiv:2401.15587  [pdf

    cs.LG cs.SI

    Hyperedge Interaction-aware Hypergraph Neural Network

    Authors: Rongping Ye, Xiaobing Pei, Haoran Yang, Ruiqi Wang

    Abstract: Hypergraphs provide an effective modeling approach for modeling high-order relationships in many real-world datasets. To capture such complex relationships, several hypergraph neural networks have been proposed for learning hypergraph structure, which propagate information from nodes to hyperedges and then from hyperedges back to nodes. However, most existing methods focus on information propagati… ▽ More

    Submitted 5 April, 2024; v1 submitted 28 January, 2024; originally announced January 2024.

  18. arXiv:2401.03151  [pdf, other

    cs.SE cs.LG

    Semi-supervised learning via DQN for log anomaly detection

    Authors: Yingying He, Xiaobing Pei

    Abstract: Log anomaly detection is a critical component in modern software system security and maintenance, serving as a crucial support and basis for system monitoring, operation, and troubleshooting. It aids operations personnel in timely identification and resolution of issues. However, current methods in log anomaly detection still face challenges such as underutilization of unlabeled data, imbalance be… ▽ More

    Submitted 30 July, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

  19. arXiv:2401.00429  [pdf, other

    cs.NI eess.SP

    Deeper and Wider Networks for Performance Metrics Prediction in Communication Networks

    Authors: Aijia Liu, Shiqing Liu, Xiaobing Pei

    Abstract: In today's era, users have increasingly high expectations regarding the performance and efficiency of communication networks. Network operators aspire to achieve efficient network planning, operation, and optimization through Digital Twin Networks (DTN). The effectiveness of DTN heavily relies on the network model, with graph neural networks (GNN) playing a crucial role in network modeling. Howeve… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  20. arXiv:2312.04879  [pdf

    cs.LG

    HC-Ref: Hierarchical Constrained Refinement for Robust Adversarial Training of GNNs

    Authors: Xiaobing Pei, Haoran Yang, Gang Shen

    Abstract: Recent studies have shown that attackers can catastrophically reduce the performance of GNNs by maliciously modifying the graph structure or node features on the graph. Adversarial training, which has been shown to be one of the most effective defense mechanisms against adversarial attacks in computer vision, holds great promise for enhancing the robustness of GNNs. There is limited research on de… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  21. arXiv:2312.04821  [pdf

    cs.CV cs.AI

    Unify Change Point Detection and Segment Classification in a Regression Task for Transportation Mode Identification

    Authors: Rongsong Li, Xin Pei

    Abstract: Identifying travelers' transportation modes is important in transportation science and location-based services. It's appealing for researchers to leverage GPS trajectory data to infer transportation modes with the popularity of GPS-enabled devices, e.g., smart phones. Existing studies frame this problem as classification task. The dominant two-stage studies divide the trip into single-one mode seg… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

  22. arXiv:2307.07919  [pdf, other

    cs.AI

    Neural Architecture Retrieval

    Authors: Xiaohuan Pei, Yanxi Li, Minjing Dong, Chang Xu

    Abstract: With the increasing number of new neural architecture designs and substantial existing neural architectures, it becomes difficult for the researchers to situate their contributions compared with existing neural architectures or establish the connections between their designs and other relevant ones. To discover similar neural architectures in an efficient and automatic manner, we define a new prob… ▽ More

    Submitted 17 March, 2024; v1 submitted 15 July, 2023; originally announced July 2023.

    Comments: ICLR 2024

  23. arXiv:2306.04349  [pdf, other

    cs.CL cs.DB

    GPT Self-Supervision for a Better Data Annotator

    Authors: Xiaohuan Pei, Yanxi Li, Chang Xu

    Abstract: The task of annotating data into concise summaries poses a significant challenge across various domains, frequently requiring the allocation of significant time and specialized knowledge by human experts. Despite existing efforts to use large language models for annotation tasks, significant problems such as limited applicability to unlabeled data, the absence of self-supervised methods, and the l… ▽ More

    Submitted 8 June, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

  24. arXiv:2212.09394  [pdf

    cs.SE cs.AI

    Exploring a multi_stage feedback teaching mode for graduate students of software engineering discipline based on project_driven competition

    Authors: Xiangdong Pei, Rui Zhang

    Abstract: Aiming at the current problems of theory-oriented,practice-light,and lack of innovation ability in the teaching of postgraduate software engineering courses,a multi-stage feedback teaching mode for software engineering postgraduates based on competition project_driven is proposed. The model is driven by the competition project,and implementing suggestions are given in terms of stage allocation of… ▽ More

    Submitted 19 December, 2022; originally announced December 2022.

    Comments: conference

  25. arXiv:2210.08118  [pdf, other

    cs.RO cs.GR

    TraInterSim: Adaptive and Planning-Aware Hybrid-Driven Traffic Intersection Simulation

    Authors: Pei Lv, Xinming Pei, Xinyu Ren, Yuzhen Zhang, Chaochao Li, Mingliang Xu

    Abstract: Traffic intersections are important scenes that can be seen almost everywhere in the traffic system. Currently, most simulation methods perform well at highways and urban traffic networks. In intersection scenarios, the challenge lies in the lack of clearly defined lanes, where agents with various motion plannings converge in the central area from different directions. Traditional model-based meth… ▽ More

    Submitted 5 April, 2023; v1 submitted 3 October, 2022; originally announced October 2022.

    Comments: 13 pages, 12 figures

  26. arXiv:2209.02406  [pdf, other

    cs.CV cs.CR

    Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution

    Authors: MingWei Zhou, Xiaobing Pei

    Abstract: Most current methods generate adversarial examples with the $L_p$ norm specification. As a result, many defense methods utilize this property to eliminate the impact of such attacking algorithms. In this paper,we instead introduce "unrestricted" perturbations that create adversarial samples by using spurious relations which were learned by model training. Specifically, we find feature clusters in… ▽ More

    Submitted 31 August, 2022; originally announced September 2022.

  27. arXiv:2208.13318  [pdf, other

    cs.CY cs.AI cs.SI

    Multi-dimensional Racism Classification during COVID-19: Stigmatization, Offensiveness, Blame, and Exclusion

    Authors: Xin Pei, Deval Mehta

    Abstract: Transcending the binary categorization of racist texts, our study takes cues from social science theories to develop a multi-dimensional model for racism detection, namely stigmatization, offensiveness, blame, and exclusion. With the aid of BERT and topic modeling, this categorical detection enables insights into the underlying subtlety of racist discussion on digital platforms during COVID-19. Ou… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: Social Network Analysis and Mining (accepted, 2022). arXiv admin note: substantial text overlap with arXiv:2107.08347

  28. arXiv:2201.04604  [pdf, other

    cs.LG

    Fine-grained Graph Learning for Multi-view Subspace Clustering

    Authors: Yidi Wang, Xiaobing Pei, Haoxi Zhan

    Abstract: Multi-view subspace clustering (MSC) is a popular unsupervised method by integrating heterogeneous information to reveal the intrinsic clustering structure hidden across views. Usually, MSC methods use graphs (or affinity matrices) fusion to learn a common structure, and further apply graph-based approaches to clustering. Despite progress, most of the methods do not establish the connection betwee… ▽ More

    Submitted 13 August, 2023; v1 submitted 12 January, 2022; originally announced January 2022.

  29. arXiv:2112.04278  [pdf, other

    cs.CV

    DMRVisNet: Deep Multi-head Regression Network for Pixel-wise Visibility Estimation Under Foggy Weather

    Authors: Jing You, Shaocheng Jia, Xin Pei, Danya Yao

    Abstract: Scene perception is essential for driving decision-making and traffic safety. However, fog, as a kind of common weather, frequently appears in the real world, especially in the mountain areas, making it difficult to accurately observe the surrounding environments. Therefore, precisely estimating the visibility under foggy weather can significantly benefit traffic management and safety. To address… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: 8 figures

  30. arXiv:2107.12668  [pdf, ps, other

    cs.IT eess.SP

    Next-Generation Multiple Access Based on NOMA with Power Level Modulation

    Authors: Xinyue Pei, Yingyang Chen, Miaowen Wen, Hua Yu, Erdal Panayirci, H. Vincent Poor

    Abstract: To cope with the explosive traffic growth of next-generation wireless communications, it is necessary to design next-generation multiple access techniques that can provide higher spectral efficiency as well as larger-scale connectivity. As a promising candidate, power-domain non-orthogonal multiple access (NOMA) has been widely studied. In conventional power-domain NOMA, multiple users are multipl… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: 27 pages, 12 figures

  31. arXiv:2107.08347  [pdf, other

    cs.SI cs.CL

    Beyond a binary of (non)racist tweets: A four-dimensional categorical detection and analysis of racist and xenophobic opinions on Twitter in early Covid-19

    Authors: Xin Pei, Deval Mehta

    Abstract: Transcending the binary categorization of racist and xenophobic texts, this research takes cues from social science theories to develop a four dimensional category for racism and xenophobia detection, namely stigmatization, offensiveness, blame, and exclusion. With the aid of deep learning techniques, this categorical detection enables insights into the nuances of emergent topics reflected in raci… ▽ More

    Submitted 17 July, 2021; originally announced July 2021.

  32. arXiv:2106.03505  [pdf, other

    cs.CV

    Self-supervised Depth Estimation Leveraging Global Perception and Geometric Smoothness Using On-board Videos

    Authors: Shaocheng Jia, Xin Pei, Wei Yao, S. C. Wong

    Abstract: Self-supervised depth estimation has drawn much attention in recent years as it does not require labeled data but image sequences. Moreover, it can be conveniently used in various applications, such as autonomous driving, robotics, realistic navigation, and smart cities. However, extracting global contextual information from images and predicting a geometrically natural depth map remain challengin… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

  33. arXiv:2105.06082  [pdf, ps, other

    cs.IT eess.SP

    A Received Power Model for Reconfigurable Intelligent Surface and Measurement-based Validations

    Authors: Zipeng Wang, Li Tan, Haifan Yin, Kai Wang, Xilong Pei, David Gesbert

    Abstract: The idea of using a Reconfigurable Intelligent Surface (RIS) consisting of a large array of passive scattering elements to assist wireless communication systems has recently attracted much attention from academia and industry. A central issue with RIS is how much power they can effectively convey to the target radio nodes. Regarding this question, several power level models exist in the literature… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    Comments: 5 pages, 6 figures, submitted

  34. arXiv:2104.15061  [pdf, other

    cs.LG cs.AI stat.ML

    Black-box Gradient Attack on Graph Neural Networks: Deeper Insights in Graph-based Attack and Defense

    Authors: Haoxi Zhan, Xiaobing Pei

    Abstract: Graph Neural Networks (GNNs) have received significant attention due to their state-of-the-art performance on various graph representation learning tasks. However, recent studies reveal that GNNs are vulnerable to adversarial attacks, i.e. an attacker is able to fool the GNNs by perturbing the graph structure or node features deliberately. While being able to successfully decrease the performance… ▽ More

    Submitted 9 October, 2021; v1 submitted 30 April, 2021; originally announced April 2021.

    Comments: A new version of this work has been submitted to the IEEE for possible publication

  35. RIS-Aided Wireless Communications: Prototyping, Adaptive Beamforming, and Indoor/Outdoor Field Trials

    Authors: Xilong Pei, Haifan Yin, Li Tan, Lin Cao, Zhanpeng Li, Kai Wang, Kun Zhang, Emil Björnson

    Abstract: The prospects of using a Reconfigurable Intelligent Surface (RIS) to aid wireless communication systems have recently received much attention from academia and industry. Most papers make theoretical studies based on elementary models, while the prototyping of RIS-aided wireless communication and real-world field trials are scarce. In this paper, we describe a new RIS prototype consisting of 1100 c… ▽ More

    Submitted 31 July, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    Comments: 13 pages, 18 figures, submitted

  36. arXiv:2012.06110  [pdf, other

    cs.LG cs.SI stat.ML

    I-GCN: Robust Graph Convolutional Network via Influence Mechanism

    Authors: Haoxi Zhan, Xiaobing Pei

    Abstract: Deep learning models for graphs, especially Graph Convolutional Networks (GCNs), have achieved remarkable performance in the task of semi-supervised node classification. However, recent studies show that GCNs suffer from adversarial perturbations. Such vulnerability to adversarial attacks significantly decreases the stability of GCNs when being applied to security-critical applications. Defense me… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

  37. arXiv:2011.03232  [pdf, ps, other

    cs.IT

    Hybrid Multicast/Unicast Design in NOMA-based Vehicular Caching System with Supplementary Material

    Authors: Xinyue Pei, Hua Yu, Yingyang Chen, Miaowen Wen, Gaojie Chen

    Abstract: In this paper, we investigate a hybrid multicast/ unicast scheme for a multiple-input single-output cache-aided non-orthogonal multiple access (NOMA) vehicular scenario in the face of rapidly fluctuating vehicular wireless channels. Considering a more practical situation, imperfect channel state information is taking into account. In this paper, we formulate an optimization problem to maximize the… ▽ More

    Submitted 22 November, 2020; v1 submitted 6 November, 2020; originally announced November 2020.

    Comments: 5 pages, 3 figures

  38. arXiv:2008.02014  [pdf, other

    cs.LG cs.IR stat.ML

    Optimizing AD Pruning of Sponsored Search with Reinforcement Learning

    Authors: Yijiang Lian, Zhijie Chen, Xin Pei, Shuang Li, Yifei Wang, Yuefeng Qiu, Zhiheng Zhang, Zhipeng Tao, Liang Yuan, Hanju Guan, Kefeng Zhang, Zhigang Li, Xiaochun Liu

    Abstract: Industrial sponsored search system (SSS) can be logically divided into three modules: keywords matching, ad retrieving, and ranking. During ad retrieving, the ad candidates grow exponentially. A query with high commercial value might retrieve a great deal of ad candidates such that the ranking module could not afford. Due to limited latency and computing resources, the candidates have to be pruned… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

  39. arXiv:2007.06172  [pdf

    eess.SY cs.AI

    Bottom-up mechanism and improved contract net protocol for the dynamic task planning of heterogeneous Earth observation resources

    Authors: Baoju Liu, Min Deng, Guohua Wu, Xinyu Pei, Haifeng Li, Witold Pedrycz

    Abstract: Earth observation resources are becoming increasingly indispensable in disaster relief, damage assessment and related domains. Many unpredicted factors, such as the change of observation task requirements, to the occurring of bad weather and resource failures, may cause the scheduled observation scheme to become infeasible. Therefore, it is crucial to be able to promptly and maybe frequently devel… ▽ More

    Submitted 9 June, 2021; v1 submitted 12 July, 2020; originally announced July 2020.

    Comments: 14 pages, 11 figures.This work has been submitted to the IEEE for possible publication

  40. arXiv:2005.08224  [pdf

    cs.SI cs.CL

    #Coronavirus or #Chinesevirus?!: Understanding the negative sentiment reflected in Tweets with racist hashtags across the development of COVID-19

    Authors: Xin Pei, Deval Mehta

    Abstract: Situated in the global outbreak of COVID-19, our study enriches the discussion concerning the emergent racism and xenophobia on social media. With big data extracted from Twitter, we focus on the analysis of negative sentiment reflected in tweets marked with racist hashtags, as racism and xenophobia are more likely to be delivered via the negative sentiment. Especially, we propose a stage-based ap… ▽ More

    Submitted 17 May, 2020; originally announced May 2020.

  41. arXiv:2001.04839  [pdf

    physics.med-ph cs.HC

    Conceptual Design and Preliminary Results of a VR-based Radiation Safety Training System for Interventional Radiologists

    Authors: Yi Guo, Li Mao, Gongsen Zhang, Zhi Chen, Xi Pei, X. George Xu

    Abstract: Recent studies have reported an increased risk of developing brain and neck tumors, as well as cataracts, in practitioners in interventional radiology (IR). Occupational radiation protection in IR has been a top concern for regulatory agencies and professional societies. To help minimize occupational radiation exposure in IR, we conceptualized a virtual reality (VR) based radiation safety training… ▽ More

    Submitted 14 January, 2020; originally announced January 2020.

  42. arXiv:1910.09198  [pdf, other

    eess.IV cs.CV

    Automatic Lumbar Spinal CT Image Segmentation with a Dual Densely Connected U-Net

    Authors: He Tang, Xiaobing Pei, Shilong Huang, Xin Li, Chao Liu

    Abstract: The clinical treatment of degenerative and developmental lumbar spinal stenosis (LSS) is different. Computed tomography (CT) is helpful in distinguishing degenerative and developmental LSS due to its advantage in imaging of osseous and calcified tissues. However, boundaries of the vertebral body, spinal canal and dural sac have low contrast and hard to identify in a CT image, so the diagnosis depe… ▽ More

    Submitted 4 February, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

  43. arXiv:1404.6878  [pdf, other

    cs.DB cs.DC

    DualTable: A Hybrid Storage Model for Update Optimization in Hive

    Authors: Songlin Hu, Wantao Liu, Tilmann Rabl, Shuo Huang, Ying Liang, Zheng Xiao, Hans-Arno Jacobsen, Xubin Pei, Jiye Wang

    Abstract: Hive is the most mature and prevalent data warehouse tool providing SQL-like interface in the Hadoop ecosystem. It is successfully used in many Internet companies and shows its value for big data processing in traditional industries. However, enterprise big data processing systems as in Smart Grid applications usually require complicated business logics and involve many data manipulation operation… ▽ More

    Submitted 1 December, 2014; v1 submitted 28 April, 2014; originally announced April 2014.

    Comments: accepted by industry session of ICDE2015