Skip to main content

Showing 1–18 of 18 results for author: Yiu, S M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.03753  [pdf, ps, other

    cs.CV

    HUMOF: Human Motion Forecasting in Interactive Social Scenes

    Authors: Caiyi Sun, Yujing Sun, Xiao Han, Zemin Yang, Jiawei Liu, Xinge Zhu, Siu Ming Yiu, Yuexin Ma

    Abstract: Complex scenes present significant challenges for predicting human behaviour due to the abundance of interaction information, such as human-human and humanenvironment interactions. These factors complicate the analysis and understanding of human behaviour, thereby increasing the uncertainty in forecasting human motions. Existing motion prediction methods thus struggle in these complex scenarios. I… ▽ More

    Submitted 5 June, 2025; v1 submitted 4 June, 2025; originally announced June 2025.

  2. arXiv:2502.06324  [pdf, other

    cs.CV cs.AI

    UniDemoiré: Towards Universal Image Demoiréing with Data Generation and Synthesis

    Authors: Zemin Yang, Yujing Sun, Xidong Peng, Siu Ming Yiu, Yuexin Ma

    Abstract: Image demoiréing poses one of the most formidable challenges in image restoration, primarily due to the unpredictable and anisotropic nature of moiré patterns. Limited by the quantity and diversity of training data, current methods tend to overfit to a single moiré domain, resulting in performance degradation for new domains and restricting their robustness in real-world applications. In this pape… ▽ More

    Submitted 10 February, 2025; originally announced February 2025.

    Comments: Accepted by AAAI 2025

  3. arXiv:2502.02230  [pdf

    cs.CR

    An Attack-Driven Incident Response and Defense System (ADIRDS)

    Authors: Anthony Cheuk Tung Lai, Siu Ming Yiu, Ping Fan Ke, Alan Ho

    Abstract: One of the major goals of incident response is to help an organization or a system owner to quickly identify and halt the attacks to minimize the damages (and financial loss) to the system being attacked. Typical incident responses rely very much on the log information captured by the system during the attacks and if needed, may need to isolate the victim from the network to avoid further destruct… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

    Comments: 18 pages, 3 figures, 4 tables

  4. arXiv:2411.15860  [pdf, other

    cs.CV

    Generalizable Single-view Object Pose Estimation by Two-side Generating and Matching

    Authors: Yujing Sun, Caiyi Sun, Yuan Liu, Yuexin Ma, Siu Ming Yiu

    Abstract: In this paper, we present a novel generalizable object pose estimation method to determine the object pose using only one RGB image. Unlike traditional approaches that rely on instance-level object pose estimation and necessitate extensive training data, our method offers generalization to unseen objects without extensive training, operates with a single reference image of the object, and eliminat… ▽ More

    Submitted 24 November, 2024; originally announced November 2024.

    Comments: Accepted by WACV 2025, not published yet

  5. arXiv:2411.14937  [pdf, other

    cs.LG cs.AI cs.CR

    Geminio: Language-Guided Gradient Inversion Attacks in Federated Learning

    Authors: Junjie Shan, Ziqi Zhao, Jialin Lu, Rui Zhang, Siu Ming Yiu, Ka-Ho Chow

    Abstract: Foundation models that bridge vision and language have made significant progress, inspiring numerous life-enriching applications. However, their potential for misuse to introduce new threats remains largely unexplored. This paper reveals that vision-language models (VLMs) can be exploited to overcome longstanding limitations in gradient inversion attacks (GIAs) within federated learning (FL), wher… ▽ More

    Submitted 22 November, 2024; originally announced November 2024.

  6. arXiv:2402.11224  [pdf, other

    cs.LG cs.CR

    Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement

    Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu

    Abstract: Replacing non-polynomial functions (e.g., non-linear activation functions such as ReLU) in a neural network with their polynomial approximations is a standard practice in privacy-preserving machine learning. The resulting neural network, called polynomial approximation of neural network (PANN) in this paper, is compatible with advanced cryptosystems to enable privacy-preserving model inference. Us… ▽ More

    Submitted 7 June, 2024; v1 submitted 17 February, 2024; originally announced February 2024.

  7. arXiv:2402.02800  [pdf, other

    cs.CV

    Extreme Two-View Geometry From Object Poses with Diffusion Models

    Authors: Yujing Sun, Caiyi Sun, Yuan Liu, Yuexin Ma, Siu Ming Yiu

    Abstract: Human has an incredible ability to effortlessly perceive the viewpoint difference between two images containing the same object, even when the viewpoint change is astonishingly vast with no co-visible regions in the images. This remarkable skill, however, has proven to be a challenge for existing camera pose estimation methods, which often fail when faced with large viewpoint differences due to th… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  8. arXiv:2401.04336  [pdf, other

    cs.LG cs.AI cs.CR

    Deep Efficient Private Neighbor Generation for Subgraph Federated Learning

    Authors: Ke Zhang, Lichao Sun, Bolin Ding, Siu Ming Yiu, Carl Yang

    Abstract: Behemoth graphs are often fragmented and separately stored by multiple data owners as distributed subgraphs in many realistic applications. Without harming data privacy, it is natural to consider the subgraph federated learning (subgraph FL) scenario, where each local client holds a subgraph of the entire global graph, to obtain globally generalized graph mining models. To overcome the unique chal… ▽ More

    Submitted 18 January, 2024; v1 submitted 8 January, 2024; originally announced January 2024.

    Comments: Accepted to SDM 2024

  9. arXiv:2312.07049  [pdf, other

    cs.CL

    Improving Factual Error Correction by Learning to Inject Factual Errors

    Authors: Xingwei He, Qianru Zhang, A-Long Jin, Jun Ma, Yuan Yuan, Siu Ming Yiu

    Abstract: Factual error correction (FEC) aims to revise factual errors in false claims with minimal editing, making them faithful to the provided evidence. This task is crucial for alleviating the hallucination problem encountered by large language models. Given the lack of paired data (i.e., false claims and their corresponding correct claims), existing methods typically adopt the mask-then-correct paradig… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: Accepted to AAAI 2024

  10. arXiv:2303.16854  [pdf, other

    cs.CL

    AnnoLLM: Making Large Language Models to Be Better Crowdsourced Annotators

    Authors: Xingwei He, Zhenghao Lin, Yeyun Gong, A-Long Jin, Hang Zhang, Chen Lin, Jian Jiao, Siu Ming Yiu, Nan Duan, Weizhu Chen

    Abstract: Many natural language processing (NLP) tasks rely on labeled data to train machine learning models with high performance. However, data annotation is time-consuming and expensive, especially when the task involves a large amount of data or requires specialized domains. Recently, GPT-3.5 series models have demonstrated remarkable few-shot and zero-shot ability across various NLP tasks. In this pape… ▽ More

    Submitted 5 April, 2024; v1 submitted 29 March, 2023; originally announced March 2023.

    Comments: Accepted to NAACL 2024

  11. arXiv:2212.09114  [pdf, other

    cs.CL

    CAPSTONE: Curriculum Sampling for Dense Retrieval with Document Expansion

    Authors: Xingwei He, Yeyun Gong, A-Long Jin, Hang Zhang, Anlei Dong, Jian Jiao, Siu Ming Yiu, Nan Duan

    Abstract: The dual-encoder has become the de facto architecture for dense retrieval. Typically, it computes the latent representations of the query and document independently, thus failing to fully capture the interactions between the query and document. To alleviate this, recent research has focused on obtaining query-informed document representations. During training, it expands the document with a real q… ▽ More

    Submitted 29 October, 2023; v1 submitted 18 December, 2022; originally announced December 2022.

    Comments: Accetpted to EMNLP 2023

  12. arXiv:2206.14452  [pdf

    cs.LG q-fin.CP

    Deep Multiple Instance Learning For Forecasting Stock Trends Using Financial News

    Authors: Yiqi Deng, Siu Ming Yiu

    Abstract: A major source of information can be taken from financial news articles, which have some correlations about the fluctuation of stock trends. In this paper, we investigate the influences of financial news on the stock trends, from a multi-instance view. The intuition behind this is based on the news uncertainty of varying intervals of news occurrences and the lack of annotation in every single fina… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

    Comments: 17 pages, 4 figures

  13. arXiv:2106.13430  [pdf, other

    cs.LG cs.SI

    Subgraph Federated Learning with Missing Neighbor Generation

    Authors: Ke Zhang, Carl Yang, Xiaoxiao Li, Lichao Sun, Siu Ming Yiu

    Abstract: Graphs have been widely used in data mining and machine learning due to their unique representation of real-world objects and their interactions. As graphs are getting bigger and bigger nowadays, it is common to see their subgraphs separately collected and stored in multiple local systems. Therefore, it is natural to consider the subgraph federated learning setting, where each local system holds a… ▽ More

    Submitted 6 November, 2021; v1 submitted 25 June, 2021; originally announced June 2021.

    Comments: Accepted to NeurIPS 2021 (spotlight presentation)

  14. arXiv:2008.06680  [pdf, other

    cs.GT

    A VCG-based Fair Incentive Mechanism for Federated Learning

    Authors: Mingshu Cong, Han Yu, Xi Weng, Jiabao Qu, Yang Liu, Siu Ming Yiu

    Abstract: The enduring value of the Vickrey-Clarke-Groves (VCG) mechanism has been highlighted due to its adoption by Facebook ad auctions. Our research delves into its utility in the collaborative virtual goods production (CVGP) game, which finds application in realms like federated learning and crowdsourcing, in which bidders take on the roles of suppliers rather than consumers. We introduce the Procureme… ▽ More

    Submitted 17 June, 2024; v1 submitted 15 August, 2020; originally announced August 2020.

  15. arXiv:2007.14780  [pdf, other

    cs.GT

    Optimal Procurement Auction for Cooperative Production of Virtual Products: Vickrey-Clarke-Groves Meet Cremer-McLean

    Authors: Mingshu Cong, Xi Weng, Han Yu, Jiabao Qu, Siu Ming Yiu

    Abstract: We set up a supply-side game-theoretic model for the cooperative production of virtual products. In our model, a group of producers collaboratively produce a virtual product by contributing costly input resources to a production coalition. Producers are capacitated, i.e., they cannot contribute more resources than their capacity limits. Our model is an abstraction of emerging internet-based busine… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

  16. arXiv:2002.12543  [pdf

    cs.SE

    Metamorphic Testing: A New Approach for Generating Next Test Cases

    Authors: T. Y. Chen, S. C. Cheung, S. M. Yiu

    Abstract: In software testing, a set of test cases is constructed according to some predefined selection criteria. The software is then examined against these test cases. Three interesting observations have been made on the current artifacts of software testing. Firstly, an error-revealing test case is considered useful while a successful test case which does not reveal software errors is usually not furthe… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: 11 pages, Technical Report HKUST-CS98-01, Department of Computer Science, The Hong Kong University of Science and Technology

    Report number: HKUST-CS98-01

  17. arXiv:1610.05945  [pdf, other

    cs.SD cs.CR cs.LG

    A multi-task learning model for malware classification with useful file access pattern from API call sequence

    Authors: Xin Wang, Siu Ming Yiu

    Abstract: Based on API call sequences, semantic-aware and machine learning (ML) based malware classifiers can be built for malware detection or classification. Previous works concentrate on crafting and extracting various features from malware binaries, disassembled binaries or API calls via static or dynamic analysis and resorting to ML to build classifiers. However, they tend to involve too much feature e… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

  18. arXiv:1004.0591  [pdf

    cs.CR cs.NI

    A new key establishment scheme for wireless sensor networks

    Authors: Eric Ke Wang, Lucas C. K. Hui, S. M. Yiu

    Abstract: Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 11Pages

    Journal ref: International Journal of Network Security & Its Applications 1.2 (2009) 17-27