Skip to main content

Showing 1–50 of 98 results for author: Qin, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.18536  [pdf, other

    cs.CL cs.AI cs.CV

    Reinforcement Fine-Tuning Powers Reasoning Capability of Multimodal Large Language Models

    Authors: Haoyuan Sun, Jiaqi Wu, Bo Xia, Yifu Luo, Yifei Zhao, Kai Qin, Xufei Lv, Tiantian Zhang, Yongzhe Chang, Xueqian Wang

    Abstract: Standing in 2025, at a critical juncture in the pursuit of Artificial General Intelligence (AGI), reinforcement fine-tuning (RFT) has demonstrated significant potential in enhancing the reasoning capability of large language models (LLMs) and has led to the development of cutting-edge AI models such as OpenAI-o1 and DeepSeek-R1. Moreover, the efficient application of RFT to enhance the reasoning c… ▽ More

    Submitted 24 May, 2025; originally announced May 2025.

  2. arXiv:2504.13398  [pdf, ps, other

    cs.CR

    Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source Contracts

    Authors: Sen Yang, Kaihua Qin, Aviv Yaish, Fan Zhang

    Abstract: Most blockchains cannot hide the binary code of programs (i.e., smart contracts) running on them. To conceal proprietary business logic and to potentially deter attacks, many smart contracts are closed-source and employ layers of obfuscation. However, we demonstrate that such obfuscation can obscure critical vulnerabilities rather than enhance security, a phenomenon we term insecurity through obsc… ▽ More

    Submitted 8 June, 2025; v1 submitted 17 April, 2025; originally announced April 2025.

  3. arXiv:2504.05284  [pdf, other

    cs.AR

    FERIVer: An FPGA-assisted Emulated Framework for RTL Verification of RISC-V Processors

    Authors: Kun Qin, Xiaorang Guo, Martin Schulz, Carsten Trinitis

    Abstract: Processor design and verification require a synergistic approach that combines instruction-level functional simulations with precise hardware emulations. The trade-off between speed and accuracy in the instruction set simulation poses a significant challenge to the efficiency of processor verification. By tapping the potentials of Field Programmable Gate Arrays (FPGAs), we propose an FPGA-assisted… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

  4. arXiv:2412.16895  [pdf, other

    cs.CV

    Adaptive Dataset Quantization

    Authors: Muquan Li, Dongyang Zhang, Qiang Dong, Xiurui Xie, Ke Qin

    Abstract: Contemporary deep learning, characterized by the training of cumbersome neural networks on massive datasets, confronts substantial computational hurdles. To alleviate heavy data storage burdens on limited hardware resources, numerous dataset compression methods such as dataset distillation (DD) and coreset selection have emerged to obtain a compact but informative dataset through synthesis or sele… ▽ More

    Submitted 22 December, 2024; originally announced December 2024.

  5. arXiv:2412.12152  [pdf, other

    cs.LG cs.AI

    GraphTool-Instruction: Revolutionizing Graph Reasoning in LLMs through Decomposed Subtask Instruction

    Authors: Rongzheng Wang, Shuang Liang, Qizhi Chen, Jiasheng Zhang, Ke Qin

    Abstract: Large language models (LLMs) have been demonstrated to possess the capabilities to understand fundamental graph properties and address various graph reasoning tasks. Existing methods fine-tune LLMs to understand and execute graph reasoning tasks by specially designed task instructions. However, these Text-Instruction methods generally exhibit poor performance. Inspired by tool learning, researcher… ▽ More

    Submitted 11 December, 2024; originally announced December 2024.

    Comments: 22 pages, have been accepted by KDD 2025

  6. arXiv:2412.06233  [pdf, other

    stat.ML cs.LG

    Representational Transfer Learning for Matrix Completion

    Authors: Yong He, Zeyu Li, Dong Liu, Kangxiang Qin, Jiahui Xie

    Abstract: We propose to transfer representational knowledge from multiple sources to a target noisy matrix completion task by aggregating singular subspaces information. Under our representational similarity framework, we first integrate linear representation information by solving a two-way principal component analysis problem based on a properly debiased matrix-valued dataset. After acquiring better colum… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

  7. arXiv:2411.14025  [pdf, other

    cs.CR

    RISecure-PUF: Multipurpose PUF-Driven Security Extensions with Lookaside Buffer in RISC-V

    Authors: Chenghao Chen, Xiaolin Zhang, Kailun Qin, Tengfei Wang, Yipeng Shi, Tianyi Huang, Chi Zhang, Dawu Gu

    Abstract: RISC-V's limited security features hinder its use in confidential computing and heterogeneous platforms. This paper introduces RISecure-PUF, a security extension utilizing existing Physical Unclonable Functions for key generation and secure protocol purposes. A one-way hash function is integrated to ensure provable security against modeling attacks, while a lookaside buffer accelerates batch sampl… ▽ More

    Submitted 21 November, 2024; originally announced November 2024.

  8. arXiv:2411.03588  [pdf, other

    cs.LG cs.AI cs.NE

    An Experimental Study on Decomposition-Based Deep Ensemble Learning for Traffic Flow Forecasting

    Authors: Qiyuan Zhu, A. K. Qin, Hussein Dia, Adriana-Simona Mihaita, Hanna Grzybowska

    Abstract: Traffic flow forecasting is a crucial task in intelligent transport systems. Deep learning offers an effective solution, capturing complex patterns in time-series traffic flow data to enable the accurate prediction. However, deep learning models are prone to overfitting the intricate details of flow data, leading to poor generalisation. Recent studies suggest that decomposition-based deep ensemble… ▽ More

    Submitted 5 November, 2024; originally announced November 2024.

    Comments: This work has been accepted by the 2024 Australasian Joint Conference on Artificial Intelligence (AJCAI 2024)

  9. arXiv:2411.01102  [pdf, other

    cs.SE cs.CR

    BinEnhance: An Enhancement Framework Based on External Environment Semantics for Binary Code Search

    Authors: Yongpan Wang, Hong Li, Xiaojie Zhu, Siyuan Li, Chaopeng Dong, Shouguo Yang, Kangyuan Qin

    Abstract: Binary code search plays a crucial role in applications like software reuse detection. Currently, existing models are typically based on either internal code semantics or a combination of function call graphs (CG) and internal code semantics. However, these models have limitations. Internal code semantic models only consider the semantics within the function, ignoring the inter-function semantics,… ▽ More

    Submitted 25 November, 2024; v1 submitted 1 November, 2024; originally announced November 2024.

    Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2025 fall cycle

  10. Towards Effective Data-Free Knowledge Distillation via Diverse Diffusion Augmentation

    Authors: Muquan Li, Dongyang Zhang, Tao He, Xiurui Xie, Yuan-Fang Li, Ke Qin

    Abstract: Data-free knowledge distillation (DFKD) has emerged as a pivotal technique in the domain of model compression, substantially reducing the dependency on the original training data. Nonetheless, conventional DFKD methods that employ synthesized training data are prone to the limitations of inadequate diversity and discrepancies in distribution between the synthesized and original datasets. To addres… ▽ More

    Submitted 23 October, 2024; originally announced October 2024.

  11. arXiv:2409.04693  [pdf, other

    cs.AI

    MuAP: Multi-step Adaptive Prompt Learning for Vision-Language Model with Missing Modality

    Authors: Ruiting Dai, Yuqiao Tan, Lisi Mo, Tao He, Ke Qin, Shuang Liang

    Abstract: Recently, prompt learning has garnered considerable attention for its success in various Vision-Language (VL) tasks. However, existing prompt-based models are primarily focused on studying prompt generation and prompt strategies with complete modality settings, which does not accurately reflect real-world scenarios where partial modality information may be missing. In this paper, we present the fi… ▽ More

    Submitted 6 September, 2024; originally announced September 2024.

  12. Blockchain Amplification Attack

    Authors: Taro Tsuchiya, Liyi Zhou, Kaihua Qin, Arthur Gervais, Nicolas Christin

    Abstract: Strategies related to the blockchain concept of Extractable Value (MEV/BEV), such as arbitrage, front-, or back-running create strong economic incentives for network nodes to reduce latency. Modified nodes, that minimize transaction validation time and neglect to filter invalid transactions in the Ethereum peer-to-peer (P2P) network, introduce a novel attack vector -- a Blockchain Amplification At… ▽ More

    Submitted 7 February, 2025; v1 submitted 2 August, 2024; originally announced August 2024.

    Comments: To appear in Proceedings of the 2025 ACM SIGMETRICS Conference

  13. arXiv:2405.19730  [pdf

    cs.AI cs.CV cs.LG

    Research on the Spatial Data Intelligent Foundation Model

    Authors: Shaohua Wang, Xing Xie, Yong Li, Danhuai Guo, Zhi Cai, Yu Liu, Yang Yue, Xiao Pan, Feng Lu, Huayi Wu, Zhipeng Gui, Zhiming Ding, Bolong Zheng, Fuzheng Zhang, Jingyuan Wang, Zhengchao Chen, Hao Lu, Jiayi Li, Peng Yue, Wenhao Yu, Yao Yao, Leilei Sun, Yong Zhang, Longbiao Chen, Xiaoping Du , et al. (6 additional authors not shown)

    Abstract: This report focuses on spatial data intelligent large models, delving into the principles, methods, and cutting-edge applications of these models. It provides an in-depth discussion on the definition, development history, current status, and trends of spatial data intelligent large models, as well as the challenges they face. The report systematically elucidates the key technologies of spatial dat… ▽ More

    Submitted 28 August, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: V1 and V2 are in Chinese language, other versions are in English

  14. arXiv:2404.15582  [pdf, other

    cs.CR

    Now Let's Make It Physical: Enabling Physically Trusted Certificate Issuance for Keyless Security in CAs

    Authors: Xiaolin Zhang, Chenghao Chen, Kailun Qin, Yuxuan Wang, Shipei Qu, Tengfei Wang, Chi Zhang, Dawu Gu

    Abstract: The signing key protection of Certificate Authorities (CAs) remains a critical challenge in PKI. Traditional approaches struggle to eliminate the risk of key exposure due to those (un)intentional human errors. This long-standing dilemma motivates us to propose Armored Core, a novel PKI security extension using the trusted binding of Physically Unclonable Function (PUF) for CAs. PUFs leverage manuf… ▽ More

    Submitted 13 January, 2025; v1 submitted 23 April, 2024; originally announced April 2024.

    Comments: Under peer review

  15. FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update

    Authors: Ziru Niu, Hai Dong, A. K. Qin

    Abstract: Personalized Federated Learning (PFL) is widely employed in IoT applications to handle high-volume, non-iid client data while ensuring data privacy. However, heterogeneous edge devices owned by clients may impose varying degrees of resource constraints, causing computation and communication bottlenecks for PFL. Federated Dropout has emerged as a popular strategy to address this challenge, wherein… ▽ More

    Submitted 20 January, 2025; v1 submitted 18 March, 2024; originally announced March 2024.

    Comments: AAAI 2025 Oral

    MSC Class: 68U35 ACM Class: C.2.4; I.2.11

    Journal ref: AAAI 2025

  16. arXiv:2403.11041  [pdf, other

    cs.LG cs.NE

    FAGH: Accelerating Federated Learning with Approximated Global Hessian

    Authors: Mrinmay Sen, A. K. Qin, Krishna Mohan C

    Abstract: In federated learning (FL), the significant communication overhead due to the slow convergence speed of training the global model poses a great challenge. Specifically, a large number of communication rounds are required to achieve the convergence in FL. One potential solution is to employ the Newton-based optimization method for training, known for its quadratic convergence rate. However, the exi… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

  17. arXiv:2403.07431  [pdf, other

    stat.ML cs.LG

    Knowledge Transfer across Multiple Principal Component Analysis Studies

    Authors: Zeyu Li, Kangxiang Qin, Yong He, Wang Zhou, Xinsheng Zhang

    Abstract: Transfer learning has aroused great interest in the statistical community. In this article, we focus on knowledge transfer for unsupervised learning tasks in contrast to the supervised learning tasks in the literature. Given the transferable source populations, we propose a two-step transfer learning algorithm to extract useful information from multiple source principal component analysis (PCA) st… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  18. arXiv:2403.06249  [pdf, other

    cs.CE cs.CL

    No Language is an Island: Unifying Chinese and English in Financial Large Language Models, Instruction Data, and Benchmarks

    Authors: Gang Hu, Ke Qin, Chenhan Yuan, Min Peng, Alejandro Lopez-Lira, Benyou Wang, Sophia Ananiadou, Jimin Huang, Qianqian Xie

    Abstract: While the progression of Large Language Models (LLMs) has notably propelled financial analysis, their application has largely been confined to singular language realms, leaving untapped the potential of bilingual Chinese-English capacity. To bridge this chasm, we introduce ICE-PIXIU, seamlessly amalgamating the ICE-INTENT model and ICE-FLARE benchmark for bilingual financial analysis. ICE-PIXIU un… ▽ More

    Submitted 16 August, 2024; v1 submitted 10 March, 2024; originally announced March 2024.

    Comments: 19 pages, 3 figures, 12 tables, including Appendix

  19. arXiv:2403.02833  [pdf, other

    cs.LG cs.NE

    SOFIM: Stochastic Optimization Using Regularized Fisher Information Matrix

    Authors: Mrinmay Sen, A. K. Qin, Gayathri C, Raghu Kishore N, Yen-Wei Chen, Balasubramanian Raman

    Abstract: This paper introduces a new stochastic optimization method based on the regularized Fisher information matrix (FIM), named SOFIM, which can efficiently utilize the FIM to approximate the Hessian matrix for finding Newton's gradient update in large-scale stochastic optimization of machine learning models. It can be viewed as a variant of natural gradient descent, where the challenge of storing and… ▽ More

    Submitted 1 May, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

  20. arXiv:2402.18167  [pdf, other

    cs.LG

    Decentralised Traffic Incident Detection via Network Lasso

    Authors: Qiyuan Zhu, A. K. Qin, Prabath Abeysekara, Hussein Dia, Hanna Grzybowska

    Abstract: Traffic incident detection plays a key role in intelligent transportation systems, which has gained great attention in transport engineering. In the past, traditional machine learning (ML) based detection methods achieved good performance under a centralised computing paradigm, where all data are transmitted to a central server for building ML models therein. Nowadays, deep neural networks based f… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  21. arXiv:2402.08908  [pdf, other

    cs.CR

    Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust

    Authors: Xiaolin Zhang, Kailun Qin, Shipei Qu, Tengfei Wang, Chi Zhang, Dawu Gu

    Abstract: Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized trust model where they rely on a single provisioned secret key and a centralized verifier to establish trust for remote parties. This model is however brittle and can be untrusted under advanced attacks nowadays. Besides,… ▽ More

    Submitted 9 August, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Comments: 18 pages, 9 figures. Under peer review of some IEEE Transaction Journal

  22. arXiv:2402.07330  [pdf, other

    cs.CV cs.NE

    Expert-Adaptive Medical Image Segmentation

    Authors: Binyan Hu, A. K. Qin

    Abstract: Medical image segmentation (MIS) plays an instrumental role in medical image analysis, where considerable effort has been devoted to automating the process. Currently, mainstream MIS approaches are based on deep neural networks (DNNs), which are typically trained on a dataset with annotations produced by certain medical experts. In the medical domain, the annotations generated by different experts… ▽ More

    Submitted 1 May, 2024; v1 submitted 11 February, 2024; originally announced February 2024.

  23. arXiv:2402.07119  [pdf, other

    cs.CV cs.NE

    Two-Stage Multi-task Self-Supervised Learning for Medical Image Segmentation

    Authors: Binyan Hu, A. K. Qin

    Abstract: Medical image segmentation has been significantly advanced by deep learning (DL) techniques, though the data scarcity inherent in medical applications poses a great challenge to DL-based segmentation methods. Self-supervised learning offers a solution by creating auxiliary learning tasks from the available dataset and then leveraging the knowledge acquired from solving auxiliary tasks to help bett… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

  24. arXiv:2401.14626  [pdf, other

    cs.CV

    Towards Lifelong Scene Graph Generation with Knowledge-ware In-context Prompt Learning

    Authors: Tao He, Tongtong Wu, Dongyang Zhang, Guiduo Duan, Ke Qin, Yuan-Fang Li

    Abstract: Scene graph generation (SGG) endeavors to predict visual relationships between pairs of objects within an image. Prevailing SGG methods traditionally assume a one-off learning process for SGG. This conventional paradigm may necessitate repetitive training on all previously observed samples whenever new relationships emerge, mitigating the risk of forgetting previously acquired knowledge. This work… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

  25. FLrce: Resource-Efficient Federated Learning with Early-Stopping Strategy

    Authors: Ziru Niu, Hai Dong, A. Kai Qin, Tao Gu

    Abstract: Federated Learning (FL) achieves great popularity in the Internet of Things (IoT) as a powerful interface to offer intelligent services to customers while maintaining data privacy. Under the orchestration of a server, edge devices (also called clients in FL) collaboratively train a global deep-learning model without sharing any local data. Nevertheless, the unequal training contributions among cli… ▽ More

    Submitted 22 August, 2024; v1 submitted 15 October, 2023; originally announced October 2023.

    Comments: Preprint, accepted by IEEE Transactions on Mobile Computing

    ACM Class: I.2.6

    Journal ref: IEEE Transactions on Mobile Computing,2024

  26. HiSEP-Q: A Highly Scalable and Efficient Quantum Control Processor for Superconducting Qubits

    Authors: Xiaorang Guo, Kun Qin, Martin Schulz

    Abstract: Quantum computing promises an effective way to solve targeted problems that are classically intractable. Among them, quantum computers built with superconducting qubits are considered one of the most advanced technologies, but they suffer from short coherence times. This can get exaggerated when they are controlled directly by general-purpose host machines, which leads to the loss of quantum infor… ▽ More

    Submitted 31 August, 2023; originally announced August 2023.

    Comments: The paper is accepted by the 41st IEEE International Conference on Computer Design (ICCD), 2023

  27. arXiv:2307.14019  [pdf, other

    cs.CV cs.AI

    One-Nearest Neighborhood Guides Inlier Estimation for Unsupervised Point Cloud Registration

    Authors: Yongzhe Yuan, Yue Wu, Maoguo Gong, Qiguang Miao, A. K. Qin

    Abstract: The precision of unsupervised point cloud registration methods is typically limited by the lack of reliable inlier estimation and self-supervised signal, especially in partially overlapping scenarios. In this paper, we propose an effective inlier estimation method for unsupervised point cloud registration by capturing geometric structure consistency between the source point cloud and its correspon… ▽ More

    Submitted 26 July, 2023; originally announced July 2023.

  28. arXiv:2307.11754  [pdf, other

    cs.GT cs.CR

    What Drives the (In)stability of a Stablecoin?

    Authors: Yujin Kwon, Kornrapat Pongmala, Kaihua Qin, Ariah Klages-Mundt, Philipp Jovanovic, Christine Parlour, Arthur Gervais, Dawn Song

    Abstract: In May 2022, an apparent speculative attack, followed by market panic, led to the precipitous downfall of UST, one of the most popular stablecoins at that time. However, UST is not the only stablecoin to have been depegged in the past. Designing resilient and long-term stable coins, therefore, appears to present a hard challenge. To further scrutinize existing stablecoin designs and ultimately l… ▽ More

    Submitted 25 July, 2023; v1 submitted 14 June, 2023; originally announced July 2023.

  29. arXiv:2307.03920  [pdf

    cs.NE cs.LG

    Training Physics-Informed Neural Networks via Multi-Task Optimization for Traffic Density Prediction

    Authors: Bo Wang, A. K. Qin, Sajjad Shafiei, Hussein Dia, Adriana-Simona Mihaita, Hanna Grzybowska

    Abstract: Physics-informed neural networks (PINNs) are a newly emerging research frontier in machine learning, which incorporate certain physical laws that govern a given data set, e.g., those described by partial differential equations (PDEs), into the training of the neural network (NN) based on such a data set. In PINNs, the NN acts as the solution approximator for the PDE while the PDE acts as the prior… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

    Comments: accepted by the 2023 IEEE International Joint Conference on Neural Networks (IJCNN 2023)

  30. arXiv:2306.12338  [pdf, other

    cs.CR

    Do you still need a manual smart contract audit?

    Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais

    Abstract: We investigate the feasibility of employing large language models (LLMs) for conducting the security audit of smart contracts, a traditionally time-consuming and costly process. Our research focuses on the optimization of prompt engineering for enhanced security analysis, and we evaluate the performance and accuracy of LLMs using a benchmark dataset comprising 52 Decentralized Finance (DeFi) smart… ▽ More

    Submitted 22 June, 2023; v1 submitted 21 June, 2023; originally announced June 2023.

  31. arXiv:2306.11773  [pdf, other

    cs.HC

    A System of Monitoring and Analyzing Human Indoor Mobility and Air Quality

    Authors: Kyle K. Qin, Mohammad S. Rahaman, Yongli Ren, Chi-Tsun Cheng, Ivan Cole, Flora D. Salim

    Abstract: Human movements in the workspace usually have non-negligible relations with air quality parameters (e.g., CO$_2$, PM2.5, and PM10). We establish a system to monitor indoor human mobility with air quality and assess the interrelationship between these two types of time series data. More specifically, a sensor network was designed in indoor environments to observe air quality parameters continuously… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: 7 pages, accepted by the 24th IEEE International Conference on Mobile Data Management

    MSC Class: 68T07 ACM Class: J.0

  32. arXiv:2305.19502  [pdf, other

    cs.LG

    Graph Entropy Minimization for Semi-supervised Node Classification

    Authors: Yi Luo, Guangchun Luo, Ke Qin, Aiguo Chen

    Abstract: Node classifiers are required to comprehensively reduce prediction errors, training resources, and inference latency in the industry. However, most graph neural networks (GNN) concentrate only on one or two of them. The compromised aspects thus are the shortest boards on the bucket, hindering their practical deployments for industrial-level tasks. This work proposes a novel semi-supervised learnin… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 12 pages, 3 figures, 4 tables

  33. arXiv:2305.18545  [pdf, other

    cs.CR cs.NI

    Blockchain Censorship

    Authors: Anton Wahrstätter, Jens Ernstberger, Aviv Yaish, Liyi Zhou, Kaihua Qin, Taro Tsuchiya, Sebastian Steinhorst, Davor Svetinovic, Nicolas Christin, Mikolaj Barczentewicz, Arthur Gervais

    Abstract: Permissionless blockchains promise to be resilient against censorship by a single entity. This suggests that deterministic rules, and not third-party actors, are responsible for deciding if a transaction is appended to the blockchain or not. In 2022, the U.S. Office of Foreign Assets Control (OFAC) sanctioned a Bitcoin mixer and an Ethereum application, putting the neutrality of permissionless blo… ▽ More

    Submitted 2 June, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  34. arXiv:2305.16468  [pdf, other

    cs.NI

    Time to Bribe: Measuring Block Construction Market

    Authors: Anton Wahrstätter, Liyi Zhou, Kaihua Qin, Davor Svetinovic, Arthur Gervais

    Abstract: With the emergence of Miner Extractable Value (MEV), block construction markets on blockchains have evolved into a competitive arena. Following Ethereum's transition from Proof of Work (PoW) to Proof of Stake (PoS), the Proposer Builder Separation (PBS) mechanism has emerged as the dominant force in the Ethereum block construction market. This paper presents an in-depth longitudinal study of the… ▽ More

    Submitted 2 June, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

  35. arXiv:2305.14046  [pdf, other

    cs.CR

    Enhancing Smart Contract Security Analysis with Execution Property Graphs

    Authors: Kaihua Qin, Zhe Ye, Zhun Wang, Weilin Li, Liyi Zhou, Chao Zhang, Dawn Song, Arthur Gervais

    Abstract: Smart contract vulnerabilities have led to significant financial losses, with their increasing complexity rendering outright prevention of hacks increasingly challenging. This trend highlights the crucial need for advanced forensic analysis and real-time intrusion detection, where dynamic analysis plays a key role in dissecting smart contract executions. Therefore, there is a pressing need for a u… ▽ More

    Submitted 14 April, 2025; v1 submitted 23 May, 2023; originally announced May 2023.

  36. arXiv:2304.12749  [pdf, other

    cs.CR cs.LG

    Blockchain Large Language Models

    Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais

    Abstract: This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions. The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System. Unlike traditional methods, BlockGPT is designed to offer an unrestricted search space and does not rely on predefined… ▽ More

    Submitted 29 April, 2023; v1 submitted 25 April, 2023; originally announced April 2023.

  37. The Blockchain Imitation Game

    Authors: Kaihua Qin, Stefanos Chaliasos, Liyi Zhou, Benjamin Livshits, Dawn Song, Arthur Gervais

    Abstract: The use of blockchains for automated and adversarial trading has become commonplace. However, due to the transparent nature of blockchains, an adversary is able to observe any pending, not-yet-mined transactions, along with their execution logic. This transparency further enables a new type of adversary, which copies and front-runs profitable pending transactions in real-time, yielding significant… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

  38. arXiv:2303.15162  [pdf, other

    q-fin.PR cs.CE

    Mitigating Decentralized Finance Liquidations with Reversible Call Options

    Authors: Kaihua Qin, Jens Ernstberger, Liyi Zhou, Philipp Jovanovic, Arthur Gervais

    Abstract: Liquidations in Decentralized Finance (DeFi) are both a blessing and a curse -- whereas liquidations prevent lenders from capital loss, they simultaneously lead to liquidation spirals and system-wide failures. Since most lending and borrowing protocols assume liquidations are indispensable, there is an increased interest in alternative constructions that prevent immediate systemic-failure under un… ▽ More

    Submitted 27 March, 2023; v1 submitted 10 February, 2023; originally announced March 2023.

  39. arXiv:2302.12388  [pdf, other

    cs.LG

    TrafFormer: A Transformer Model for Predicting Long-term Traffic

    Authors: David Alexander Tedjopurnomo, Farhana M. Choudhury, A. K. Qin

    Abstract: Traffic prediction is a flourishing research field due to its importance in human mobility in the urban space. Despite this, existing studies only focus on short-term prediction of up to few hours in advance, with most being up to one hour only. Long-term traffic prediction can enable more comprehensive, informed, and proactive measures against traffic congestion and is therefore an important task… ▽ More

    Submitted 2 March, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

    Comments: 14 pages, 6 figures

    MSC Class: ACM-class: I.2.1

  40. arXiv:2301.04482  [pdf, other

    cs.LG

    Multiple-level Point Embedding for Solving Human Trajectory Imputation with Prediction

    Authors: Kyle K. Qin, Yongli Ren, Wei Shao, Brennan Lake, Filippo Privitera, Flora D. Salim

    Abstract: Sparsity is a common issue in many trajectory datasets, including human mobility data. This issue frequently brings more difficulty to relevant learning tasks, such as trajectory imputation and prediction. Nowadays, little existing work simultaneously deals with imputation and prediction on human trajectories. This work plans to explore whether the learning process of imputation and prediction cou… ▽ More

    Submitted 12 January, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

    Comments: 22 pages; accepted by ACM Transactions on Spatial Algorithms and Systems

    MSC Class: 68T07 ACM Class: H.0

  41. arXiv:2212.13296  [pdf, other

    cs.CV

    VQA and Visual Reasoning: An Overview of Recent Datasets, Methods and Challenges

    Authors: Rufai Yusuf Zakari, Jim Wilson Owusu, Hailin Wang, Ke Qin, Zaharaddeen Karami Lawal, Yuezhou Dong

    Abstract: Artificial Intelligence (AI) and its applications have sparked extraordinary interest in recent years. This achievement can be ascribed in part to advances in AI subfields including Machine Learning (ML), Computer Vision (CV), and Natural Language Processing (NLP). Deep learning, a sub-field of machine learning that employs artificial neural network concepts, has enabled the most rapid growth in t… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  42. arXiv:2210.12944  [pdf, other

    cs.DC cs.AI

    Deep Edge Intelligence: Architecture, Key Features, Enabling Technologies and Challenges

    Authors: Prabath Abeysekara, Hai Dong, A. K. Qin

    Abstract: With the breakthroughs in Deep Learning, recent years have witnessed a massive surge in Artificial Intelligence applications and services. Meanwhile, the rapid advances in Mobile Computing and Internet of Things has also given rise to billions of mobile and smart sensing devices connected to the Internet, generating zettabytes of data at the network edge. The opportunity to combine these two domai… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  43. arXiv:2208.13035  [pdf, other

    cs.CR

    SoK: Decentralized Finance (DeFi) Attacks

    Authors: Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, Arthur Gervais

    Abstract: Within just four years, the blockchain-based Decentralized Finance (DeFi) ecosystem has accumulated a peak total value locked (TVL) of more than 253 billion USD. This surge in DeFi's popularity has, unfortunately, been accompanied by many impactful incidents. According to our data, users, liquidity providers, speculators, and protocol operators suffered a total loss of at least 3.24 billion USD fr… ▽ More

    Submitted 7 April, 2023; v1 submitted 27 August, 2022; originally announced August 2022.

  44. arXiv:2205.15663  [pdf, other

    cs.LG cs.AI cs.NE

    Multi-task Optimization Based Co-training for Electricity Consumption Prediction

    Authors: Hui Song, A. K. Qin, Chenggang Yan

    Abstract: Real-world electricity consumption prediction may involve different tasks, e.g., prediction for different time steps ahead or different geo-locations. These tasks are often solved independently without utilizing some common problem-solving knowledge that could be extracted and shared among these tasks to augment the performance of solving each task. In this work, we propose a multi-task optimizati… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Comments: accepted by the 2022 IEEE International Joint Conference on Neural Networks (IJCNN 2022)

  45. arXiv:2205.15656  [pdf, ps, other

    cs.LG

    Sample-Efficient, Exploration-Based Policy Optimisation for Routing Problems

    Authors: Nasrin Sultana, Jeffrey Chan, Tabinda Sarwar, A. K. Qin

    Abstract: Model-free deep-reinforcement-based learning algorithms have been applied to a range of COPs~\cite{bello2016neural}~\cite{kool2018attention}~\cite{nazari2018reinforcement}. However, these approaches suffer from two key challenges when applied to combinatorial problems: insufficient exploration and the requirement of many training examples of the search space to achieve reasonable performance. Comb… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  46. arXiv:2205.14606  [pdf

    cs.NE cs.CV

    A General Multiple Data Augmentation Based Framework for Training Deep Neural Networks

    Authors: Binyan Hu, Yu Sun, A. K. Qin

    Abstract: Deep neural networks (DNNs) often rely on massive labelled data for training, which is inaccessible in many applications. Data augmentation (DA) tackles data scarcity by creating new labelled data from available ones. Different DA methods have different mechanisms and therefore using their generated labelled data for DNN training may help improving DNN's generalisation to different degrees. Combin… ▽ More

    Submitted 29 May, 2022; originally announced May 2022.

    Comments: accepted by the 2022 IEEE International Joint Conference on Neural Networks (IJCNN 2022)

  47. All Grains, One Scheme (AGOS): Learning Multi-grain Instance Representation for Aerial Scene Classification

    Authors: Qi Bi, Beichen Zhou, Kun Qin, Qinghao Ye, Gui-Song Xia

    Abstract: Aerial scene classification remains challenging as: 1) the size of key objects in determining the scene scheme varies greatly; 2) many objects irrelevant to the scene scheme are often flooded in the image. Hence, how to effectively perceive the region of interests (RoIs) from a variety of sizes and build more discriminative representation from such complicated object distribution is vital to under… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: 16 pages, 9 figures

  48. arXiv:2201.09035  [pdf, other

    cs.CR

    On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy

    Authors: Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, Arthur Gervais

    Abstract: Zero-knowledge proof (ZKP) mixers are one of the most widely-used blockchain privacy solutions, operating on top of smart contract-enabled blockchains. We find that ZKP mixers are tightly intertwined with the growing number of Decentralized Finance (DeFi) attacks and Blockchain Extractable Value (BEV) extractions. Through coin flow tracing, we discover that 205 blockchain attackers and 2,595 BEV e… ▽ More

    Submitted 6 March, 2023; v1 submitted 22 January, 2022; originally announced January 2022.

  49. arXiv:2110.15522  [pdf, ps, other

    cs.LG

    ADDS: Adaptive Differentiable Sampling for Robust Multi-Party Learning

    Authors: Maoguo Gong, Yuan Gao, Yue Wu, A. K. Qin

    Abstract: Distributed multi-party learning provides an effective approach for training a joint model with scattered data under legal and practical constraints. However, due to the quagmire of a skewed distribution of data labels across participants and the computation bottleneck of local devices, how to build smaller customized models for clients in various scenarios while providing updates appliable to the… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  50. arXiv:2109.08345  [pdf, other

    cs.AI cs.LG

    Learning Enhanced Optimisation for Routing Problems

    Authors: Nasrin Sultana, Jeffrey Chan, Tabinda Sarwar, Babak Abbasi, A. K. Qin

    Abstract: Deep learning approaches have shown promising results in solving routing problems. However, there is still a substantial gap in solution quality between machine learning and operations research algorithms. Recently, another line of research has been introduced that fuses the strengths of machine learning and operational research algorithms. In particular, search perturbation operators have been us… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.