Skip to main content

Showing 1–50 of 80 results for author: Shang, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.01987  [pdf, other

    cs.LG cs.AI

    Equally Critical: Samples, Targets, and Their Mappings in Datasets

    Authors: Runkang Yang, Peng Sun, Xinyi Shang, Yi Tang, Tao Lin

    Abstract: Data inherently possesses dual attributes: samples and targets. For targets, knowledge distillation has been widely employed to accelerate model convergence, primarily relying on teacher-generated soft target supervision. Conversely, recent advancements in data-efficient learning have emphasized sample optimization techniques, such as dataset distillation, while neglected the critical role of targ… ▽ More

    Submitted 17 May, 2025; originally announced June 2025.

  2. arXiv:2505.14117  [pdf, ps, other

    cs.LG cs.AI

    Collaborative Unlabeled Data Optimization

    Authors: Xinyi Shang, Peng Sun, Fengyuan Liu, Tao Lin

    Abstract: This paper pioneers a novel data-centric paradigm to maximize the utility of unlabeled data, tackling a critical question: How can we enhance the efficiency and sustainability of deep learning training by optimizing the data itself? We begin by identifying three key limitations in existing model-centric approaches, all rooted in a shared bottleneck: knowledge extracted from data is locked to model… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  3. arXiv:2505.07360  [pdf, ps, other

    cs.SE

    BinMetric: A Comprehensive Binary Analysis Benchmark for Large Language Models

    Authors: Xiuwei Shang, Guoqiang Chen, Shaoyin Cheng, Benlong Wu, Li Hu, Gangyang Li, Weiming Zhang, Nenghai Yu

    Abstract: Binary analysis remains pivotal in software security, offering insights into compiled programs without source code access. As large language models (LLMs) continue to excel in diverse language understanding and generation tasks, their potential in decoding complex binary data structures becomes evident. However, the lack of standardized benchmarks in this domain limits the assessment and compariso… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

    Comments: 23 pages, 5 figures, to be published in IJCAI 2025

  4. arXiv:2505.04254  [pdf, other

    cs.SE

    CompileAgent: Automated Real-World Repo-Level Compilation with Tool-Integrated LLM-based Agent System

    Authors: Li Hu, Guoqiang Chen, Xiuwei Shang, Shaoyin Cheng, Benlong Wu, Gangyang Li, Xu Zhu, Weiming Zhang, Nenghai Yu

    Abstract: With open-source projects growing in size and complexity, manual compilation becomes tedious and error-prone, highlighting the need for automation to improve efficiency and accuracy. However, the complexity of compilation instruction search and error resolution makes automatic compilation challenging. Inspired by the success of LLM-based agents in various fields, we propose CompileAgent, the first… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

    Comments: 12 pages, 4 figures

  5. arXiv:2504.21803  [pdf, other

    cs.SE cs.CR

    An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding

    Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu

    Abstract: Binary code analysis plays a pivotal role in the field of software security and is widely used in tasks such as software maintenance, malware detection, software vulnerability discovery, patch analysis, etc. However, unlike source code, reverse engineers face significant challenges in understanding binary code due to the lack of intuitive semantic information. Although traditional reverse tools ca… ▽ More

    Submitted 30 April, 2025; originally announced April 2025.

    Comments: 38 pages, 9 figures

  6. arXiv:2503.13227  [pdf, other

    cs.LG cs.CV

    Mind the Gap: Confidence Discrepancy Can Guide Federated Semi-Supervised Learning Across Pseudo-Mismatch

    Authors: Yijie Liu, Xinyi Shang, Yiqun Zhang, Yang Lu, Chen Gong, Jing-Hao Xue, Hanzi Wang

    Abstract: Federated Semi-Supervised Learning (FSSL) aims to leverage unlabeled data across clients with limited labeled data to train a global model with strong generalization ability. Most FSSL methods rely on consistency regularization with pseudo-labels, converting predictions from local or global models into hard pseudo-labels as supervisory signals. However, we discover that the quality of pseudo-label… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

    Comments: Accepted by CVPR 2025

  7. arXiv:2503.07243  [pdf, other

    cs.CR

    Beyond the Edge of Function: Unraveling the Patterns of Type Recovery in Binary Code

    Authors: Gangyang Li, Xiuwei Shang, Shaoyin Cheng, Junqi Zhang, Li Hu, Xu Zhu, Weiming Zhang, Nenghai Yu

    Abstract: Type recovery is a crucial step in binary code analysis, holding significant importance for reverse engineering and various security applications. Existing works typically simply target type identifiers within binary code and achieve type recovery by analyzing variable characteristics within functions. However, we find that the types in real-world binary programs are more complex and often follow… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

  8. arXiv:2503.06993  [pdf, other

    cs.LG cs.CV

    CAPT: Class-Aware Prompt Tuning for Federated Long-Tailed Learning with Vision-Language Model

    Authors: Shihao Hou, Xinyi Shang, Shreyank N Gowda, Yang Lu, Chao Wu, Yan Yan, Hanzi Wang

    Abstract: Effectively handling the co-occurrence of non-IID data and long-tailed distributions remains a critical challenge in federated learning. While fine-tuning vision-language models (VLMs) like CLIP has shown to be promising in addressing non-IID data challenges, this approach leads to severe degradation of tail classes in federated long-tailed scenarios. Under the composite effects of strong non-IID… ▽ More

    Submitted 10 March, 2025; originally announced March 2025.

  9. arXiv:2503.04184  [pdf

    cs.NI cs.AI cs.CL

    Large-Scale AI in Telecom: Charting the Roadmap for Innovation, Scalability, and Enhanced Digital Experiences

    Authors: Adnan Shahid, Adrian Kliks, Ahmed Al-Tahmeesschi, Ahmed Elbakary, Alexandros Nikou, Ali Maatouk, Ali Mokh, Amirreza Kazemi, Antonio De Domenico, Athanasios Karapantelakis, Bo Cheng, Bo Yang, Bohao Wang, Carlo Fischione, Chao Zhang, Chaouki Ben Issaid, Chau Yuen, Chenghui Peng, Chongwen Huang, Christina Chaccour, Christo Kurisummoottil Thomas, Dheeraj Sharma, Dimitris Kalogiros, Dusit Niyato, Eli De Poorter , et al. (110 additional authors not shown)

    Abstract: This white paper discusses the role of large-scale AI in the telecommunications industry, with a specific focus on the potential of generative AI to revolutionize network functions and user experiences, especially in the context of 6G systems. It highlights the development and deployment of Large Telecom Models (LTMs), which are tailored AI models designed to address the complex challenges faced b… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

  10. arXiv:2502.11741  [pdf, other

    cs.DB cs.AI

    SQL-o1: A Self-Reward Heuristic Dynamic Search Method for Text-to-SQL

    Authors: Shuai Lyu, Haoran Luo, Ripeng Li, Zhonghong Ou, Jiangfeng Sun, Yang Qin, Xiaoran Shang, Meina Song, Yifan Zhu

    Abstract: Text-to-SQL (Text2SQL) aims to map natural language questions to executable SQL queries. Although large language models (LLMs) have driven significant progress, current approaches struggle with poor transferability to open-source LLMs, limited robustness against logic and function errors in complex queries, and inefficiencies in structured search. We introduce SQL-o1, a self-reward-driven heuristi… ▽ More

    Submitted 22 May, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

    Comments: 28 pages,12 figures

  11. arXiv:2502.01689  [pdf

    q-bio.GN cs.AI

    scGSDR: Harnessing Gene Semantics for Single-Cell Pharmacological Profiling

    Authors: Yu-An Huang, Xiyue Cao, Zhu-Hong You, Yue-Chao Li, Xuequn Shang, Zhi-An Huang

    Abstract: The rise of single-cell sequencing technologies has revolutionized the exploration of drug resistance, revealing the crucial role of cellular heterogeneity in advancing precision medicine. By building computational models from existing single-cell drug response data, we can rapidly annotate cellular responses to drugs in subsequent trials. To this end, we developed scGSDR, a model that integrates… ▽ More

    Submitted 2 February, 2025; originally announced February 2025.

  12. arXiv:2501.02613  [pdf, other

    physics.ao-ph cs.LG

    LWFNet: Coherent Doppler Wind Lidar-Based Network for Wind Field Retrieval

    Authors: Ran Tao, Chong Wang, Hao Chen, Mingjiao Jia, Xiang Shang, Luoyuan Qu, Guoliang Shentu, Yanyu Lu, Yanfeng Huo, Lei Bai, Xianghui Xue, Xiankang Dou

    Abstract: Accurate detection of wind fields within the troposphere is essential for atmospheric dynamics research and plays a crucial role in extreme weather forecasting. Coherent Doppler wind lidar (CDWL) is widely regarded as the most suitable technique for high spatial and temporal resolution wind field detection. However, since coherent detection relies heavily on the concentration of aerosol particles,… ▽ More

    Submitted 5 January, 2025; originally announced January 2025.

    Comments: 13 pages, 7 figures

  13. arXiv:2501.00230  [pdf, other

    cs.LG cs.AI cs.CR

    Federated Deep Subspace Clustering

    Authors: Yupei Zhang, Ruojia Feng, Yifei Wang, Xuequn Shang

    Abstract: This paper introduces FDSC, a private-protected subspace clustering (SC) approach with federated learning (FC) schema. In each client, there is a deep subspace clustering network accounting for grouping the isolated data, composed of a encode network, a self-expressive layer, and a decode network. FDSC is achieved by uploading the encode network to communicate with other clients in the server. Bes… ▽ More

    Submitted 15 January, 2025; v1 submitted 30 December, 2024; originally announced January 2025.

    Comments: 8pages,4 figures, 4 Tables

    MSC Class: 68T07 ACM Class: I.5.3

  14. arXiv:2412.05850  [pdf, other

    cs.CL

    Cooperative SQL Generation for Segmented Databases By Using Multi-functional LLM Agents

    Authors: Zhiguang Wu, Fengbin Zhu, Xuequn Shang, Yupei Zhang, Pan Zhou

    Abstract: Text-to-SQL task aims to automatically yield SQL queries according to user text questions. To address this problem, we propose a Cooperative SQL Generation framework based on Multi-functional Agents (CSMA) through information interaction among large language model (LLM) based agents who own part of the database schema seperately. Inspired by the collaboration in human teamwork, CSMA consists of th… ▽ More

    Submitted 8 December, 2024; originally announced December 2024.

  15. arXiv:2411.01236  [pdf, other

    cs.CR cs.AI

    AutoPT: How Far Are We from the End2End Automated Web Penetration Testing?

    Authors: Benlong Wu, Guoqiang Chen, Kejiang Chen, Xiuwei Shang, Jiapeng Han, Yanru He, Weiming Zhang, Nenghai Yu

    Abstract: Penetration testing is essential to ensure Web security, which can detect and fix vulnerabilities in advance, and prevent data leakage and serious consequences. The powerful inference capabilities of large language models (LLMs) have made significant progress in various fields, and the development potential of LLM-based agents can revolutionize the cybersecurity penetration testing industry. In th… ▽ More

    Submitted 2 November, 2024; originally announced November 2024.

    Comments: 22 pages, 6 figures

  16. arXiv:2410.18561  [pdf, other

    cs.SE

    Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations

    Authors: Xiuwei Shang, Li Hu, Shaoyin Cheng, Guoqiang Chen, Benlong Wu, Weiming Zhang, Nenghai Yu

    Abstract: Binary Code Similarity Detection (BCSD) plays a crucial role in numerous fields, including vulnerability detection, malware analysis, and code reuse identification. As IoT devices proliferate and rapidly evolve, their highly heterogeneous hardware architectures and complex compilation settings, coupled with the demand for large-scale function retrieval in practical applications, put forward higher… ▽ More

    Submitted 24 October, 2024; originally announced October 2024.

    Comments: 13 pages, 10 figures

  17. arXiv:2410.16662  [pdf

    eess.IV cs.AI cs.CV

    Visual Question Answering in Ophthalmology: A Progressive and Practical Perspective

    Authors: Xiaolan Chen, Ruoyu Chen, Pusheng Xu, Weiyi Zhang, Xianwen Shang, Mingguang He, Danli Shi

    Abstract: Accurate diagnosis of ophthalmic diseases relies heavily on the interpretation of multimodal ophthalmic images, a process often time-consuming and expertise-dependent. Visual Question Answering (VQA) presents a potential interdisciplinary solution by merging computer vision and natural language processing to comprehend and respond to queries about medical images. This review article explores the r… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

  18. arXiv:2410.07573  [pdf, other

    cs.CR cs.CL

    RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?

    Authors: Di Cao, Yong Liao, Xiuwei Shang

    Abstract: The latest advancements in large language models (LLMs) have sparked interest in their potential for software vulnerability detection. However, there is currently a lack of research specifically focused on vulnerabilities in the PHP language, and challenges in extracting samples and processing persist, hindering the model's ability to effectively capture the characteristics of specific vulnerabili… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  19. arXiv:2408.02019  [pdf, other

    cs.LG

    Personalized Federated Learning on Heterogeneous and Long-Tailed Data via Expert Collaborative Learning

    Authors: Fengling Lv, Xinyi Shang, Yang Zhou, Yiqun Zhang, Mengke Li, Yang Lu

    Abstract: Personalized Federated Learning (PFL) aims to acquire customized models for each client without disclosing raw data by leveraging the collective knowledge of distributed clients. However, the data collected in real-world scenarios is likely to follow a long-tailed distribution. For example, in the medical domain, it is more common for the number of general health notes to be much larger than those… ▽ More

    Submitted 4 August, 2024; originally announced August 2024.

  20. arXiv:2406.01993  [pdf

    eess.IV cs.CV

    Choroidal Vessel Segmentation on Indocyanine Green Angiography Images via Human-in-the-Loop Labeling

    Authors: Ruoyu Chen, Ziwei Zhao, Mayinuer Yusufu, Xianwen Shang, Danli Shi, Mingguang He

    Abstract: Human-in-the-loop (HITL) strategy has been recently introduced into the field of medical image processing. Indocyanine green angiography (ICGA) stands as a well-established examination for visualizing choroidal vasculature and detecting chorioretinal diseases. However, the intricate nature of choroidal vascular networks makes large-scale manual segmentation of ICGA images challenging. Thus, the st… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 25 pages,4 figures

  21. arXiv:2405.17100  [pdf, other

    cs.CR cs.SD eess.AS

    Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems

    Authors: Haozhe Xu, Cong Wu, Yangyang Gu, Xingcan Shang, Jing Chen, Kun He, Ruiying Du

    Abstract: The integration of Voice Control Systems (VCS) into smart devices and their growing presence in daily life accentuate the importance of their security. Current research has uncovered numerous vulnerabilities in VCS, presenting significant risks to user privacy and security. However, a cohesive and systematic examination of these vulnerabilities and the corresponding solutions is still absent. This… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  22. arXiv:2405.14736  [pdf, other

    cs.CV cs.LG

    GIFT: Unlocking Full Potential of Labels in Distilled Dataset at Near-zero Cost

    Authors: Xinyi Shang, Peng Sun, Tao Lin

    Abstract: Recent advancements in dataset distillation have demonstrated the significant benefits of employing soft labels generated by pre-trained teacher models. In this paper, we introduce a novel perspective by emphasizing the full utilization of labels. We first conduct a comprehensive comparison of various loss functions for soft label utilization in dataset distillation, revealing that the model train… ▽ More

    Submitted 6 March, 2025; v1 submitted 23 May, 2024; originally announced May 2024.

    Comments: https://github.com/LINs-lab/GIFT

    Journal ref: ICLR 2025

  23. arXiv:2404.15854  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning

    Authors: Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu

    Abstract: The increasing prevalence of audio deepfakes poses significant security threats, necessitating robust detection methods. While existing detection systems exhibit promise, their robustness against malicious audio manipulations remains underexplored. To bridge the gap, we undertake the first comprehensive study of the susceptibility of the most widely adopted audio deepfake detectors to manipulation… ▽ More

    Submitted 24 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE TDSC

  24. arXiv:2404.09836  [pdf, other

    cs.SE cs.CR

    How Far Have We Gone in Binary Code Understanding Using Large Language Models

    Authors: Xiuwei Shang, Shaoyin Cheng, Guoqiang Chen, Yanming Zhang, Li Hu, Xiao Yu, Gangyang Li, Weiming Zhang, Nenghai Yu

    Abstract: Binary code analysis plays a pivotal role in various software security applications, such as software maintenance, malware detection, software vulnerability discovery, patch analysis, etc. However, unlike source code, understanding binary code is challenging for reverse engineers due to the absence of semantic information. Therefore, automated tools are needed to assist human players in interpreti… ▽ More

    Submitted 24 October, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

    Comments: 12 pages, 8 figures, to be published in ICSME 2024

  25. arXiv:2403.18403  [pdf, other

    cs.CR

    FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs

    Authors: Xiuwei Shang, Guoqiang Chen, Shaoyin Cheng, Shikai Guo, Yanming Zhang, Weiming Zhang, Nenghai Yu

    Abstract: Analyzing the behavior of cryptographic functions in stripped binaries is a challenging but essential task. Cryptographic algorithms exhibit greater logical complexity compared to typical code, yet their analysis is unavoidable in areas such as virus analysis and legacy code inspection. Existing methods often rely on data or structural pattern matching, leading to suboptimal generalizability and s… ▽ More

    Submitted 25 April, 2025; v1 submitted 27 March, 2024; originally announced March 2024.

    Comments: 38 pages, 10 figures

  26. arXiv:2403.09039  [pdf, other

    cs.LG cs.AI

    Detecting Anomalies in Dynamic Graphs via Memory enhanced Normality

    Authors: Jie Liu, Xuequn Shang, Xiaolin Han, Kai Zheng, Hongzhi Yin

    Abstract: Anomaly detection in dynamic graphs presents a significant challenge due to the temporal evolution of graph structures and attributes. The conventional approaches that tackle this problem typically employ an unsupervised learning framework, capturing normality patterns with exclusive normal data during training and identifying deviations as anomalies during testing. However, these methods face cri… ▽ More

    Submitted 14 August, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  27. Accurate and efficient predictions of keyhole dynamics in laser materials processing using machine learning-aided simulations

    Authors: Jiahui Zhang, Runbo Jiang, Kangming Li, Pengyu Chen, Shengbo Bi, Xiao Shang, Zhiying Liu, Jason Hattrick-Simpers, Brian J. Simonds, Qianglong Wei, Hongze Wang, Tao Sun, Anthony D. Rollett, Yu Zou

    Abstract: The keyhole phenomenon has been widely observed in laser materials processing, including laser welding, remelting, cladding, drilling, and additive manufacturing. Keyhole-induced defects, primarily pores, dramatically affect the performance of final products, impeding the broad use of these laser-based technologies. The formation of these pores is typically associated with the dynamic behavior of… ▽ More

    Submitted 6 June, 2025; v1 submitted 25 February, 2024; originally announced February 2024.

    Journal ref: International Journal of Heat and Mass Transfer 250 (2025): 127279

  28. arXiv:2402.15153  [pdf, other

    cs.CL cs.LG

    Self-Adaptive Reconstruction with Contrastive Learning for Unsupervised Sentence Embeddings

    Authors: Junlong Liu, Xichen Shang, Huawen Feng, Junhao Zheng, Qianli Ma

    Abstract: Unsupervised sentence embeddings task aims to convert sentences to semantic vector representations. Most previous works directly use the sentence representations derived from pretrained language models. However, due to the token bias in pretrained language models, the models can not capture the fine-grained semantics in sentences, which leads to poor predictions. To address this issue, we propose… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

    Comments: 8 pages, 3 figures

  29. Federated learning-outcome prediction with multi-layer privacy protection

    Authors: Yupei Zhang, Yuxin Li, Yifei Wang, Shuangshuang Wei, Yunan Xu, Xuequn Shang

    Abstract: Learning-outcome prediction (LOP) is a long-standing and critical problem in educational routes. Many studies have contributed to developing effective models while often suffering from data shortage and low generalization to various institutions due to the privacy-protection issue. To this end, this study proposes a distributed grade prediction model, dubbed FecMap, by exploiting the federated lea… ▽ More

    Submitted 24 December, 2023; originally announced December 2023.

    Comments: 10 pages, 9 figures, 3 tables. This preprint will be published in Frontiers of Computer Science on Dec 15, 2024

    MSC Class: 68T07 ACM Class: I.2.6

    Journal ref: Frontiers of Computer Science, 2024,18(6):186604

  30. arXiv:2312.09802  [pdf, other

    cs.LG cs.AI

    Concept Prerequisite Relation Prediction by Using Permutation-Equivariant Directed Graph Neural Networks

    Authors: Xiran Qu, Xuequn Shang, Yupei Zhang

    Abstract: This paper studies the problem of CPRP, concept prerequisite relation prediction, which is a fundamental task in using AI for education. CPRP is usually formulated into a link-prediction task on a relationship graph of concepts and solved by training the graph neural network (GNN) model. However, current directed GNNs fail to manage graph isomorphism which refers to the invariance of non-isomorphi… ▽ More

    Submitted 21 June, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 9 pages, 1figure, 1 Table (A perprint version)

    MSC Class: 68T07 ACM Class: I.2.6

  31. arXiv:2310.10237  [pdf, other

    cs.LG cs.AI

    SGOOD: Substructure-enhanced Graph-Level Out-of-Distribution Detection

    Authors: Zhihao Ding, Jieming Shi, Shiqi Shen, Xuequn Shang, Jiannong Cao, Zhipeng Wang, Zhi Gong

    Abstract: Graph-level representation learning is important in a wide range of applications. Existing graph-level models are generally built on i.i.d. assumption for both training and testing graphs. However, in an open world, models can encounter out-of-distribution (OOD) testing graphs that are from different distributions unknown during training. A trustworthy model should be able to detect OOD graphs to… ▽ More

    Submitted 18 July, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: CIKM 2024

  32. arXiv:2309.08709  [pdf, other

    stat.ML cs.LG

    Price of Safety in Linear Best Arm Identification

    Authors: Xuedong Shang, Igor Colin, Merwan Barlier, Hamza Cherkaoui

    Abstract: We introduce the safe best-arm identification framework with linear feedback, where the agent is subject to some stage-wise safety constraint that linearly depends on an unknown parameter vector. The agent must take actions in a conservative way so as to ensure that the safety constraint is not violated with high probability at each round. Ways of leveraging the linear structure for ensuring safet… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

    Comments: 20 pages, 1 figures

  33. arXiv:2309.01183  [pdf, other

    cs.CV

    Holistic Dynamic Frequency Transformer for Image Fusion and Exposure Correction

    Authors: Xiaoke Shang, Gehui Li, Zhiying Jiang, Shaomin Zhang, Nai Ding, Jinyuan Liu

    Abstract: The correction of exposure-related issues is a pivotal component in enhancing the quality of images, offering substantial implications for various computer vision tasks. Historically, most methodologies have predominantly utilized spatial domain recovery, offering limited consideration to the potentialities of the frequency domain. Additionally, there has been a lack of a unified perspective towar… ▽ More

    Submitted 3 August, 2024; v1 submitted 3 September, 2023; originally announced September 2023.

  34. arXiv:2307.15244  [pdf, other

    cs.SI cs.AI

    BOURNE: Bootstrapped Self-supervised Learning Framework for Unified Graph Anomaly Detection

    Authors: Jie Liu, Mengting He, Xuequn Shang, Jieming Shi, Bin Cui, Hongzhi Yin

    Abstract: Graph anomaly detection (GAD) has gained increasing attention in recent years due to its critical application in a wide range of domains, such as social networks, financial risk management, and traffic analysis. Existing GAD methods can be categorized into node and edge anomaly detection models based on the type of graph objects being detected. However, these methods typically treat node and edge… ▽ More

    Submitted 19 November, 2023; v1 submitted 27 July, 2023; originally announced July 2023.

  35. arXiv:2306.10790  [pdf, other

    cs.CL cs.AI

    Preserving Commonsense Knowledge from Pre-trained Language Models via Causal Inference

    Authors: Junhao Zheng, Qianli Ma, Shengjie Qiu, Yue Wu, Peitian Ma, Junlong Liu, Huawen Feng, Xichen Shang, Haibin Chen

    Abstract: Fine-tuning has been proven to be a simple and effective technique to transfer the learned knowledge of Pre-trained Language Models (PLMs) to downstream tasks. However, vanilla fine-tuning easily overfits the target data and degrades the generalization ability. Most existing studies attribute it to catastrophic forgetting, and they retain the pre-trained knowledge indiscriminately without identify… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

    Comments: ACL 2023 (oral paper)

  36. arXiv:2306.04579  [pdf, other

    eess.IV cs.CV

    A Dataset for Deep Learning-based Bone Structure Analyses in Total Hip Arthroplasty

    Authors: Kaidong Zhang, Ziyang Gan, Dong Liu, Xifu Shang

    Abstract: Total hip arthroplasty (THA) is a widely used surgical procedure in orthopedics. For THA, it is of clinical significance to analyze the bone structure from the CT images, especially to observe the structure of the acetabulum and femoral head, before the surgical procedure. For such bone structure analyses, deep learning technologies are promising but require high-quality labeled data for the learn… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

    Comments: 16 pages, 17 figures

  37. arXiv:2305.12519  [pdf, other

    cs.CL cs.AI cs.LG

    DPIC: Decoupling Prompt and Intrinsic Characteristics for LLM Generated Text Detection

    Authors: Xiao Yu, Yuang Qi, Kejiang Chen, Guoqiang Chen, Xi Yang, Pengyuan Zhu, Xiuwei Shang, Weiming Zhang, Nenghai Yu

    Abstract: Large language models (LLMs) have the potential to generate texts that pose risks of misuse, such as plagiarism, planting fake reviews on e-commerce platforms, or creating inflammatory false tweets. Consequently, detecting whether a text is generated by LLMs has become increasingly important. Existing high-quality detection methods usually require access to the interior of the model to extract the… ▽ More

    Submitted 12 June, 2024; v1 submitted 21 May, 2023; originally announced May 2023.

  38. arXiv:2305.03286  [pdf, other

    cs.GR cs.AI cs.LG

    Composite Motion Learning with Task Control

    Authors: Pei Xu, Xiumin Shang, Victor Zordan, Ioannis Karamouzas

    Abstract: We present a deep learning method for composite and task-driven motion control for physically simulated characters. In contrast to existing data-driven approaches using reinforcement learning that imitate full-body motions, we learn decoupled motions for specific body parts from multiple reference motions simultaneously and directly by leveraging the use of multiple discriminators in a GAN-like se… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: SIGGRAPH 2023. Code: https://github.com/xupei0610/CompositeMotion. Video: https://youtu.be/mcRAxwoTh3E

    Journal ref: ACM Transactions on Graphics (August 2023)

  39. arXiv:2304.14635  [pdf, other

    cs.AI

    Imbalanced Node Classification Beyond Homophilic Assumption

    Authors: Jie Liu, Mengting He, Guangtao Wang, Nguyen Quoc Viet Hung, Xuequn Shang, Hongzhi Yin

    Abstract: Imbalanced node classification widely exists in real-world networks where graph neural networks (GNNs) are usually highly inclined to majority classes and suffer from severe performance degradation on classifying minority class nodes. Various imbalanced node classification methods have been proposed recently which construct synthetic nodes and edges w.r.t. minority classes to balance the label and… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

  40. arXiv:2304.04415  [pdf, other

    cs.CV

    Meta Compositional Referring Expression Segmentation

    Authors: Li Xu, Mark He Huang, Xindi Shang, Zehuan Yuan, Ying Sun, Jun Liu

    Abstract: Referring expression segmentation aims to segment an object described by a language expression from an image. Despite the recent progress on this task, existing models tackling this task may not be able to fully capture semantics and visual representations of individual concepts, which limits their generalization capability, especially when handling novel compositions of learned concepts. In this… ▽ More

    Submitted 12 April, 2023; v1 submitted 10 April, 2023; originally announced April 2023.

    Comments: Accepted by CVPR 2023

  41. arXiv:2304.04175  [pdf, other

    cs.CV

    Token Boosting for Robust Self-Supervised Visual Transformer Pre-training

    Authors: Tianjiao Li, Lin Geng Foo, Ping Hu, Xindi Shang, Hossein Rahmani, Zehuan Yuan, Jun Liu

    Abstract: Learning with large-scale unlabeled data has become a powerful tool for pre-training Visual Transformers (VTs). However, prior works tend to overlook that, in real-world scenarios, the input data may be corrupted and unreliable. Pre-training VTs on such corrupted data can be challenging, especially when we pre-train via the masked autoencoding approach, where both the inputs and masked ``ground tr… ▽ More

    Submitted 12 April, 2023; v1 submitted 9 April, 2023; originally announced April 2023.

    Comments: Accepted to CVPR 2023

  42. arXiv:2303.10058  [pdf, other

    cs.LG cs.CV

    No Fear of Classifier Biases: Neural Collapse Inspired Federated Learning with Synthetic and Fixed Classifier

    Authors: Zexi Li, Xinyi Shang, Rui He, Tao Lin, Chao Wu

    Abstract: Data heterogeneity is an inherent challenge that hinders the performance of federated learning (FL). Recent studies have identified the biased classifiers of local models as the key bottleneck. Previous attempts have used classifier calibration after FL training, but this approach falls short in improving the poor feature representations caused by training-time classifier biases. Resolving the cla… ▽ More

    Submitted 28 August, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Comments: Accepted by ICCV 2023

  43. arXiv:2303.02445  [pdf, other

    cs.LG

    Federated Semi-Supervised Learning with Annotation Heterogeneity

    Authors: Xinyi Shang, Gang Huang, Yang Lu, Jian Lou, Bo Han, Yiu-ming Cheung, Hanzi Wang

    Abstract: Federated Semi-Supervised Learning (FSSL) aims to learn a global model from different clients in an environment with both labeled and unlabeled data. Most of the existing FSSL work generally assumes that both types of data are available on each client. In this paper, we study a more general problem setup of FSSL with annotation heterogeneity, where each client can hold an arbitrary percentage (0%-… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  44. arXiv:2302.10911  [pdf, other

    cs.LG

    Revisiting Weighted Aggregation in Federated Learning with Neural Networks

    Authors: Zexi Li, Tao Lin, Xinyi Shang, Chao Wu

    Abstract: In federated learning (FL), weighted aggregation of local models is conducted to generate a global model, and the aggregation weights are normalized (the sum of weights is 1) and proportional to the local data sizes. In this paper, we revisit the weighted aggregation process and gain new insights into the training dynamics of FL. First, we find that the sum of weights can be smaller than 1, causin… ▽ More

    Submitted 12 June, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: Accepted by ICML 2023

  45. arXiv:2212.01844  [pdf, other

    cs.CL cs.AI

    Pair-Based Joint Encoding with Relational Graph Convolutional Networks for Emotion-Cause Pair Extraction

    Authors: Junlong Liu, Xichen Shang, Qianli Ma

    Abstract: Emotion-cause pair extraction (ECPE) aims to extract emotion clauses and corresponding cause clauses, which have recently received growing attention. Previous methods sequentially encode features with a specified order. They first encode the emotion and cause features for clause extraction and then combine them for pair extraction. This lead to an imbalance in inter-task feature interaction where… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted to EMNLP 2022

  46. arXiv:2211.06574  [pdf, other

    cs.RO eess.SY

    Emergency Collision Avoidance and Mitigation Using Model Predictive Control and Artificial Potential Function

    Authors: Xu Shang, Azim Eskandarian

    Abstract: Although extensive research in emergency collision avoidance has been carried out for straight or curved roads in a highway scenario, a general method that could be implemented for all road environments has not been thoroughly explored. Moreover, most current algorithms don't consider collision mitigation in an emergency. This functionality is essential since the problem may have no feasible solut… ▽ More

    Submitted 8 February, 2023; v1 submitted 12 November, 2022; originally announced November 2022.

  47. Camera Adaptation for Fundus-Image-Based CVD Risk Estimation

    Authors: Zhihong Lin, Danli Shi, Donghao Zhang, Xianwen Shang, Mingguang He, Zongyuan Ge

    Abstract: Recent studies have validated the association between cardiovascular disease (CVD) risk and retinal fundus images. Combining deep learning (DL) and portable fundus cameras will enable CVD risk estimation in various scenarios and improve healthcare democratization. However, there are still significant issues to be solved. One of the top priority issues is the different camera differences between th… ▽ More

    Submitted 18 June, 2022; originally announced June 2022.

    Comments: This preprint has not undergone peer review (when applicable) or any post-submission improvements or corrections. The Version of Record of this contribution will be added soon

  48. arXiv:2205.00172  [pdf, other

    cs.LG

    FEDIC: Federated Learning on Non-IID and Long-Tailed Data via Calibrated Distillation

    Authors: Xinyi Shang, Yang Lu, Yiu-ming Cheung, Hanzi Wang

    Abstract: Federated learning provides a privacy guarantee for generating good deep learning models on distributed clients with different kinds of data. Nevertheless, dealing with non-IID data is one of the most challenging problems for federated learning. Researchers have proposed a variety of methods to eliminate the negative influence of non-IIDness. However, they only focus on the non-IID data provided t… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

    Comments: Accepted by ICME 2022, camera-ready version

  49. arXiv:2204.13399  [pdf, other

    cs.LG

    Federated Learning on Heterogeneous and Long-Tailed Data via Classifier Re-Training with Federated Features

    Authors: Xinyi Shang, Yang Lu, Gang Huang, Hanzi Wang

    Abstract: Federated learning (FL) provides a privacy-preserving solution for distributed machine learning tasks. One challenging problem that severely damages the performance of FL models is the co-occurrence of data heterogeneity and long-tail distribution, which frequently appears in real FL applications. In this paper, we reveal an intriguing fact that the biased classifier is the primary factor leading… ▽ More

    Submitted 28 April, 2022; originally announced April 2022.

    Comments: Accepted by IJCAI-ECAI 2022, camera-ready version

  50. arXiv:2203.11383  [pdf, other

    cs.IR cs.CY cs.LG

    DIANES: A DEI Audit Toolkit for News Sources

    Authors: Xiaoxiao Shang, Zhiyuan Peng, Qiming Yuan, Sabiq Khan, Lauren Xie, Yi Fang, Subramaniam Vincent

    Abstract: Professional news media organizations have always touted the importance that they give to multiple perspectives. However, in practice the traditional approach to all-sides has favored people in the dominant culture. Hence it has come under ethical critique under the new norms of diversity, equity, and inclusion (DEI). When DEI is applied to journalism, it goes beyond conventional notions of impart… ▽ More

    Submitted 28 April, 2022; v1 submitted 21 March, 2022; originally announced March 2022.