Skip to main content

Showing 1–47 of 47 results for author: Xia, B

Searching in archive eess. Search in all archives.
.
  1. arXiv:2501.15368  [pdf, other

    cs.CL cs.SD eess.AS

    Baichuan-Omni-1.5 Technical Report

    Authors: Yadong Li, Jun Liu, Tao Zhang, Tao Zhang, Song Chen, Tianpeng Li, Zehuan Li, Lijun Liu, Lingfeng Ming, Guosheng Dong, Da Pan, Chong Li, Yuanbo Fang, Dongdong Kuang, Mingrui Wang, Chenglin Zhu, Youwei Zhang, Hongyu Guo, Fengyu Zhang, Yuran Wang, Bowen Ding, Wei Song, Xu Li, Yuqi Huo, Zheng Liang , et al. (68 additional authors not shown)

    Abstract: We introduce Baichuan-Omni-1.5, an omni-modal model that not only has omni-modal understanding capabilities but also provides end-to-end audio generation capabilities. To achieve fluent and high-quality interaction across modalities without compromising the capabilities of any modality, we prioritized optimizing three key aspects. First, we establish a comprehensive data cleaning and synthesis pip… ▽ More

    Submitted 25 January, 2025; originally announced January 2025.

  2. arXiv:2501.13336  [pdf, other

    cs.CV eess.IV

    Gradient-Free Adversarial Purification with Diffusion Models

    Authors: Xuelong Dai, Dong Wang, Duan Mingxing, Bin Xiao

    Abstract: Adversarial training and adversarial purification are two effective and practical defense methods to enhance a model's robustness against adversarial attacks. However, adversarial training necessitates additional training, while adversarial purification suffers from low time efficiency. More critically, current defenses are designed under the perturbation-based adversarial threat model, which is i… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

  3. arXiv:2407.18988  [pdf, other

    eess.SP

    Fluid-Antenna Enhanced ISAC: Joint Antenna Positioning and Dual-Functional Beamforming Design under Perfect and Imperfect CSI

    Authors: Tian Hao, Changxin Shi, Qingqing Wu, Bin Xia, Yinghong Guo, Lianghui Ding, Feng Yang

    Abstract: Integrated sensing and communication (ISAC) emerges as an essential technique for overcoming spectrum congestion. However, the performance of traditional ISAC systems with fixed-position-antennas (FPA) is limited due to insufficient spatial degree of freedom (DoF) exploration. Recently, fluid antenna (FA) with reconfigurable antenna position is developed to enhance the sensing and communication pe… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2407.05297

  4. arXiv:2407.05297  [pdf, other

    eess.SP

    Fluid-Antenna Enhanced Integrated Sensing and Communication: Joint Antenna Positioning and Beamforming Design

    Authors: Tian Hao, Changxin Shi, Yinghong Guo, Bin Xia, Feng Yang

    Abstract: This paper investigates a fluid antenna (FA) enhanced integrated sensing and communication (ISAC) system consisting of a base station (BS), multiple single-antenna communication users, and one point target, where the BS is equipped with FAs to enhance both the communication and sensing performance. First, we formulate a problem that maximizes the radar signal-to-noise ratio (SNR) by jointly optimi… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: This work has been accepted by 2024 IEEE/CIC International Conference on Communications in China (ICCC)

  5. arXiv:2405.17024  [pdf

    eess.SP

    Beware of Overestimated Decoding Performance Arising from Temporal Autocorrelations in Electroencephalogram Signals

    Authors: Xiran Xu, Bo Wang, Boda Xiao, Yadong Niu, Yiwen Wang, Xihong Wu, Jing Chen

    Abstract: Researchers have reported high decoding accuracy (>95%) using non-invasive Electroencephalogram (EEG) signals for brain-computer interface (BCI) decoding tasks like image decoding, emotion recognition, auditory spatial attention detection, etc. Since these EEG data were usually collected with well-designed paradigms in labs, the reliability and robustness of the corresponding decoding methods were… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  6. arXiv:2404.14811  [pdf, other

    eess.SP cs.LG

    FLARE: A New Federated Learning Framework with Adjustable Learning Rates over Resource-Constrained Wireless Networks

    Authors: Bingnan Xiao, Jingjing Zhang, Wei Ni, Xin Wang

    Abstract: Wireless federated learning (WFL) suffers from heterogeneity prevailing in the data distributions, computing powers, and channel conditions of participating devices. This paper presents a new Federated Learning with Adjusted leaRning ratE (FLARE) framework to mitigate the impact of the heterogeneity. The key idea is to allow the participating devices to adjust their individual learning rates and l… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  7. arXiv:2404.09007  [pdf, other

    eess.SY

    A Framework for Safe Probabilistic Invariance Verification of Stochastic Dynamical Systems

    Authors: Taoran Wu, Yiqing Yu, Bican Xia, Ji Wang, Bai Xue

    Abstract: Ensuring safety through set invariance has proven to be a valuable method in various robotics and control applications. This paper introduces a comprehensive framework for the safe probabilistic invariance verification of both discrete- and continuous-time stochastic dynamical systems over an infinite time horizon. The objective is to ascertain the lower and upper bounds of liveness probabilities… ▽ More

    Submitted 3 August, 2024; v1 submitted 13 April, 2024; originally announced April 2024.

  8. arXiv:2404.01164  [pdf, ps, other

    eess.SY

    Unified Predefined-time Stability Conditions of Nonlinear Systems with Lyapunov Analysis

    Authors: Bing Xiao, Haichao Zhang, Shijie Zhao, Lu Cao

    Abstract: This brief gives a set of unified Lyapunov stability conditions to guarantee the predefined-time/finite-time stability of a dynamical systems. The derived Lyapunov theorem for autonomous systems establishes equivalence with existing theorems on predefined-time/finite-time stability. The findings proposed herein develop a nonsingular sliding mode control framework for an Euler-Lagrange system to an… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  9. arXiv:2403.12382  [pdf, other

    eess.IV cs.CV cs.LG

    Low-Trace Adaptation of Zero-shot Self-supervised Blind Image Denoising

    Authors: Jintong Hu, Bin Xia, Bingchen Li, Wenming Yang

    Abstract: Deep learning-based denoiser has been the focus of recent development on image denoising. In the past few years, there has been increasing interest in developing self-supervised denoising networks that only require noisy images, without the need for clean ground truth for training. However, a performance gap remains between current self-supervised methods and their supervised counterparts. Additio… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 11pages, 6 figures

  10. arXiv:2401.05383  [pdf

    eess.SP

    Multi-frequency antenna for quasi-isotropic radiator and 6G massive IoT

    Authors: Bing Xiao, Hang Wong, Kam Man Shum

    Abstract: An isotropic antenna radiates and receives electromagnetic wave uniformly in magnitude in 3D space. A multi-frequency quasi-isotropic antenna can serve as a practically feasible solution to emulate an ideal multi-frequency isotropic radiator. It is also an essential technology for mobile smart devices for massive IoT in the upcoming 6G. However, ever since the quasi-isotropic antenna was proposed… ▽ More

    Submitted 18 December, 2023; originally announced January 2024.

  11. arXiv:2312.15416  [pdf, other

    eess.SY

    On Completeness of SDP-Based Barrier Certificate Synthesis over Unbounded Domains

    Authors: Hao Wu, Shenghua Feng, Ting Gan, Jie Wang, Bican Xia, Naijun Zhan

    Abstract: Barrier certificates, serving as differential invariants that witness system safety, play a crucial role in the verification of cyber-physical systems (CPS). Prevailing computational methods for synthesizing barrier certificates are based on semidefinite programming (SDP) by exploiting Putinar Positivstellensatz. Consequently, these approaches are limited by the Archimedean condition, which requir… ▽ More

    Submitted 8 July, 2024; v1 submitted 24 December, 2023; originally announced December 2023.

    Comments: Accepted by the 26th international symposium on Formal Methods (FM2024). 18 pages, 1 figure. Updated on 2024.7.9, fix two typos in Lemma 1 and Equation 10

  12. arXiv:2309.12660  [pdf, ps, other

    cs.RO eess.SY

    Disturbance Rejection Control for Autonomous Trolley Collection Robots with Prescribed Performance

    Authors: Rui-Dong Xi, Liang Lu, Xue Zhang, Xiao Xiao, Bingyi Xia, Jiankun Wang, Max Q. -H. Meng

    Abstract: Trajectory tracking control of autonomous trolley collection robots (ATCR) is an ambitious work due to the complex environment, serious noise and external disturbances. This work investigates a control scheme for ATCR subjecting to severe environmental interference. A kinematics model based adaptive sliding mode disturbance observer with fast convergence is first proposed to estimate the lumped di… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

  13. arXiv:2309.07701  [pdf

    cs.HC eess.SP q-bio.NC

    Semantic reconstruction of continuous language from MEG signals

    Authors: Bo Wang, Xiran Xu, Longxiang Zhang, Boda Xiao, Xihong Wu, Jing Chen

    Abstract: Decoding language from neural signals holds considerable theoretical and practical importance. Previous research has indicated the feasibility of decoding text or speech from invasive neural signals. However, when using non-invasive neural signals, significant challenges are encountered due to their low quality. In this study, we proposed a data-driven approach for decoding semantic of language fr… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  14. arXiv:2309.03462  [pdf, other

    eess.SY

    Research on Damage Analysis of Key Parts of UAV Flight Control System

    Authors: Tianshun Li, Huaimin Chen, Ben Xiao, Hao Li, Shiyu Hao, Di Hai, Xuetong Wang

    Abstract: A set of hardware in the loop simulation methods based on the UAV model is proposed to create fault data, which is used to judge the parts where faults happen. Actual flight experimental data is utilized to prove the reliability of Simulink models. Then a series of typical faults with various amplitudes are injected into different channels of UAV parts in hardware in the loop simulation platform.… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  15. arXiv:2308.02295   

    cs.IT eess.SP

    IRS-Enabled Covert and Reliable Communications: How Many Reflection Elements are Required?

    Authors: Manlin Wang, Bin Xia, Yao Yao, Zhiyong Chen, Jiangzhou Wang

    Abstract: Short-packet communications are applied to various scenarios where transmission covertness and reliability are crucial due to the open wireless medium and finite blocklength. Although intelligent reflection surface (IRS) has been widely utilized to enhance transmission covertness and reliability, the question of how many reflection elements at IRS are required remains unanswered, which is vital to… ▽ More

    Submitted 9 September, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: The paper has some shortcomings in the theoretical analysis. And it will not be published at the conference, as clamied in last comments

  16. arXiv:2308.02284  [pdf, ps, other

    cs.IT eess.SP

    Covert and Reliable Short-Packet Communications against A Proactive Warder

    Authors: Manlin Wang, Yao Yao, Bin Xia, Zhiyong Chen, Jiangzhou Wang

    Abstract: Wireless short-packet communications pose challenges to the security and reliability of the transmission. Besides, the proactive warder compounds these challenges, who detects and interferes with the potential transmission. An extra jamming channel is introduced by the proactive warder compared with the passive one, resulting in the inapplicability of analytical methods and results in exsiting wor… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: 6 pages, 4 figures; to appear in 12th IEEE/CIC lnternational Conference on Communications in China (ICCC 2023)

  17. arXiv:2307.00974  [pdf, other

    eess.SP cs.DC cs.LG cs.NI

    Over-The-Air Federated Learning: Status Quo, Open Challenges, and Future Directions

    Authors: Bingnan Xiao, Xichen Yu, Wei Ni, Xin Wang, H. Vincent Poor

    Abstract: The development of applications based on artificial intelligence and implemented over wireless networks is increasingly rapidly and is expected to grow dramatically in the future. The resulting demand for the aggregation of large amounts of data has caused serious communication bottlenecks in wireless networks and particularly at the network edge. Over-the-air federated learning (OTA-FL), leveragi… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  18. arXiv:2306.02011  [pdf

    physics.med-ph eess.IV

    The contribution of T2 relaxation time to diffusion MRI quantification and its clinical implications: a hypothesis

    Authors: Yi Xiang J Wang, Kai-Xuan Zhao, Fu-Zhao Ma, Ben-Heng Xiao

    Abstract: Considering liver as the reference, that both fast diffusion (PF) and slow diffusion (Dslow) of the spleen are much underestimated is likely due to the MRI properties of the spleen such as the much longer T2 relaxation time. It is possible that longer T2 relaxation time partially mitigates the signal decay effect of various gradients on diffusion weighted image. This phenomenon will not be limited… ▽ More

    Submitted 3 June, 2023; originally announced June 2023.

  19. arXiv:2305.12311  [pdf, other

    cs.CL cs.AI cs.CV cs.LG eess.AS

    i-Code V2: An Autoregressive Generation Framework over Vision, Language, and Speech Data

    Authors: Ziyi Yang, Mahmoud Khademi, Yichong Xu, Reid Pryzant, Yuwei Fang, Chenguang Zhu, Dongdong Chen, Yao Qian, Mei Gao, Yi-Ling Chen, Robert Gmyr, Naoyuki Kanda, Noel Codella, Bin Xiao, Yu Shi, Lu Yuan, Takuya Yoshioka, Michael Zeng, Xuedong Huang

    Abstract: The convergence of text, visual, and audio data is a key step towards human-like artificial intelligence, however the current Vision-Language-Speech landscape is dominated by encoder-only models which lack generative abilities. We propose closing this gap with i-Code V2, the first model capable of generating natural language from any combination of Vision, Language, and Speech data. i-Code V2 is a… ▽ More

    Submitted 20 May, 2023; originally announced May 2023.

  20. arXiv:2305.09165  [pdf, other

    cs.IT eess.SP

    Fusion-Based Multi-User Semantic Communications for Wireless Image Transmission over Degraded Broadcast Channels

    Authors: Tong Wu, Zhiyong Chen, Meixia Tao, Bin Xia, Wenjun Zhang

    Abstract: Degraded broadcast channels (DBC) are a typical multi-user communications scenario. There exist classic transmission methods, such as superposition coding with successive interference cancellation, to achieve the DBC capacity region. However, semantic communications method over DBC remains lack of in-depth research. To address this, we design a fusion-based multi-user semantic communications syste… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  21. arXiv:2211.16928  [pdf, other

    eess.IV cs.CV

    Knowledge Distillation based Degradation Estimation for Blind Super-Resolution

    Authors: Bin Xia, Yulun Zhang, Yitong Wang, Yapeng Tian, Wenming Yang, Radu Timofte, Luc Van Gool

    Abstract: Blind image super-resolution (Blind-SR) aims to recover a high-resolution (HR) image from its corresponding low-resolution (LR) input image with unknown degradations. Most of the existing works design an explicit degradation estimator for each degradation to guide SR. However, it is infeasible to provide concrete labels of multiple degradation combinations (e.g., blur, noise, jpeg compression) to… ▽ More

    Submitted 16 February, 2023; v1 submitted 30 November, 2022; originally announced November 2022.

    Comments: ICLR2023, code is available at https://github.com/Zj-BinXia/KDSR

  22. arXiv:2211.10574  [pdf

    eess.SY

    A 2030 United States Macro Grid Unlocking Geographical Diversity to Accomplish Clean Energy Goals

    Authors: Yixing Xu, Daniel Olsen, Bainan Xia, Dan Livengood, Victoria Hunt, Yifan Li, Lane Smith

    Abstract: Some U.S. states have set clean energy goals and targets in an effort to decarbonize their electricity sectors. There are many reasons for such goals and targets, including the increasingly apparent effects of climate change. A handful of states (Washington, California, New York, and Virginia) are aiming for deep decarbonization by 2050 or earlier, a mere 30 years or less from today. The urgency o… ▽ More

    Submitted 18 November, 2022; originally announced November 2022.

  23. arXiv:2210.00405  [pdf, other

    cs.CV eess.IV

    Basic Binary Convolution Unit for Binarized Image Restoration Network

    Authors: Bin Xia, Yulun Zhang, Yitong Wang, Yapeng Tian, Wenming Yang, Radu Timofte, Luc Van Gool

    Abstract: Lighter and faster image restoration (IR) models are crucial for the deployment on resource-limited devices. Binary neural network (BNN), one of the most promising model compression methods, can dramatically reduce the computations and parameters of full-precision convolutional neural networks (CNN). However, there are different properties between BNN and full-precision CNN, and we can hardly use… ▽ More

    Submitted 16 February, 2023; v1 submitted 1 October, 2022; originally announced October 2022.

    Comments: ICLR2023, code is available at https://github.com/Zj-BinXia/BBCU

  24. arXiv:2207.09389  [pdf, other

    eess.IV cs.CV

    Image Synthesis with Disentangled Attributes for Chest X-Ray Nodule Augmentation and Detection

    Authors: Zhenrong Shen, Xi Ouyang, Bin Xiao, Jie-Zhi Cheng, Qian Wang, Dinggang Shen

    Abstract: Lung nodule detection in chest X-ray (CXR) images is common to early screening of lung cancers. Deep-learning-based Computer-Assisted Diagnosis (CAD) systems can support radiologists for nodule screening in CXR. However, it requires large-scale and diverse medical data with high-quality annotations to train such robust and accurate CADs. To alleviate the limited availability of such datasets, lung… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

  25. arXiv:2206.07687  [pdf, other

    cs.CV eess.IV

    Structured Sparsity Learning for Efficient Video Super-Resolution

    Authors: Bin Xia, Jingwen He, Yulun Zhang, Yitong Wang, Yapeng Tian, Wenming Yang, Luc Van Gool

    Abstract: The high computational costs of video super-resolution (VSR) models hinder their deployment on resource-limited devices, (e.g., smartphones and drones). Existing VSR models contain considerable redundant filters, which drag down the inference efficiency. To prune these unimportant filters, we develop a structured pruning scheme called Structured Sparsity Learning (SSL) according to the properties… ▽ More

    Submitted 25 March, 2023; v1 submitted 15 June, 2022; originally announced June 2022.

    Comments: Accepted by CVPR2023, code is available at https://github.com/Zj-BinXia/SSL

  26. arXiv:2206.00184  [pdf, other

    eess.SY

    How Much Demand Flexibility Could Have Spared Texas from the 2021 Outage?

    Authors: Dongqi Wu, Xiangtian Zheng, Ali Menati, Lane Smith, Bainan Xia, Yixing Xu, Chanan Singh, Le Xie

    Abstract: The February 2021 Texas winter power outage has led to hundreds of deaths and billions of dollars in economic losses, largely due to the generation failure and record-breaking electric demand. In this paper, we study the scaling-up of demand flexibility as a means to avoid load shedding during such an extreme weather event. The three mechanisms considered are interruptible load, residential load r… ▽ More

    Submitted 31 May, 2022; originally announced June 2022.

    Comments: This paper has been submitted to a journal for review

  27. arXiv:2205.13412  [pdf, other

    cs.CV cs.CR eess.IV

    Physical-World Optical Adversarial Attacks on 3D Face Recognition

    Authors: Yanjie Li, Yiquan Li, Xuelong Dai, Songtao Guo, Bin Xiao

    Abstract: 2D face recognition has been proven insecure for physical adversarial attacks. However, few studies have investigated the possibility of attacking real-world 3D face recognition systems. 3D-printed attacks recently proposed cannot generate adversarial points in the air. In this paper, we attack 3D face recognition systems through elaborate optical noises. We took structured light 3D scanners as ou… ▽ More

    Submitted 13 November, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

    Comments: Submitted to CVPR 2023

  28. Damage Maximization for Combat Network with Limited Costs

    Authors: Jintao Yu, Bing Xiao, Yuzhu Cui

    Abstract: Maximizing the damage by attacking specific nodes of the combat network can efficiently disrupt enemies' defense capability, protect our critical units, and enhance the resistance to the destruction of system-of-system~(SOS). However, the modeling of the combat network damage is not practical enough. In this paper, we report a more realistic model to study the combat network damage maximization pr… ▽ More

    Submitted 23 December, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  29. arXiv:2205.04099  [pdf, other

    eess.SY

    Robustness of double-layer group-dependent combat network with cascading failure

    Authors: Jintao Yu, Bing Xiao, Yuzhu Cui

    Abstract: The networked combat system-of-system (CSOS) is the trend of combat development with the innovation of technology. The achievement of combat effectiveness requires CSOS to have a good ability to deal with external interference. Here we report a modeling method of CSOS from the perspective of complex networks and explore the robustness of the combat network based on this. Firstly, a more realistic… ▽ More

    Submitted 9 December, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  30. arXiv:2205.01818  [pdf, other

    cs.LG cs.AI cs.CL cs.CV eess.AS

    i-Code: An Integrative and Composable Multimodal Learning Framework

    Authors: Ziyi Yang, Yuwei Fang, Chenguang Zhu, Reid Pryzant, Dongdong Chen, Yu Shi, Yichong Xu, Yao Qian, Mei Gao, Yi-Ling Chen, Liyang Lu, Yujia Xie, Robert Gmyr, Noel Codella, Naoyuki Kanda, Bin Xiao, Lu Yuan, Takuya Yoshioka, Michael Zeng, Xuedong Huang

    Abstract: Human intelligence is multimodal; we integrate visual, linguistic, and acoustic signals to maintain a holistic worldview. Most current pretraining methods, however, are limited to one or two modalities. We present i-Code, a self-supervised pretraining framework where users may flexibly combine the modalities of vision, speech, and language into unified and general-purpose vector representations. I… ▽ More

    Submitted 5 May, 2022; v1 submitted 3 May, 2022; originally announced May 2022.

  31. arXiv:2203.06000  [pdf, other

    cs.CV cs.LG eess.IV

    Polar Transformation Based Multiple Instance Learning Assisting Weakly Supervised Image Segmentation With Loose Bounding Box Annotations

    Authors: Juan Wang, Bin Xia

    Abstract: This study investigates weakly supervised image segmentation using loose bounding box supervision. It presents a multiple instance learning strategy based on polar transformation to assist image segmentation when loose bounding boxes are employed as supervision. In this strategy, weighted smooth maximum approximation is introduced to incorporate the observation that pixels closer to the origin of… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

    Comments: under review

  32. arXiv:2112.06415  [pdf

    cs.RO eess.SY

    Human-like Driving Decision at Unsignalized Intersections Based on Game Theory

    Authors: Daofei Li, Guanming Liu, Bin Xiao

    Abstract: Unsignalized intersection driving is challenging for automated vehicles. For safe and efficient performances, the diverse and dynamic behaviors of interacting vehicles should be considered. Based on a game-theoretic framework, a human-like payoff design methodology is proposed for the automated decision at unsignalized intersections. Prospect Theory is introduced to map the objective collision ris… ▽ More

    Submitted 9 January, 2022; v1 submitted 12 December, 2021; originally announced December 2021.

    Comments: 17 pages, 11 figures, 2 tables

  33. arXiv:2111.08973  [pdf, other

    cs.CV eess.IV

    Generating Unrestricted 3D Adversarial Point Clouds

    Authors: Xuelong Dai, Yanjie Li, Hua Dai, Bin Xiao

    Abstract: Utilizing 3D point cloud data has become an urgent need for the deployment of artificial intelligence in many areas like facial recognition and self-driving. However, deep learning for 3D point clouds is still vulnerable to adversarial attacks, e.g., iterative attacks, point transformation attacks, and generative attacks. These attacks need to restrict perturbations of adversarial examples within… ▽ More

    Submitted 18 November, 2021; v1 submitted 17 November, 2021; originally announced November 2021.

  34. arXiv:2105.08364  [pdf, other

    cs.CR eess.SP

    Deep Learning-based Physical-Layer Secret Key Generation for FDD Systems

    Authors: Xinwei Zhang, Guyue Li, Junqing Zhang, Aiqun Hu, Zongyue Hou, Bin Xiao

    Abstract: Physical-layer key generation (PKG) establishes cryptographic keys from highly correlated measurements of wireless channels, which relies on reciprocal channel characteristics between uplink and downlink, is a promising wireless security technique for Internet of Things (IoT). However, it is challenging to extract common features in frequency division duplexing (FDD) systems as uplink and downlink… ▽ More

    Submitted 30 August, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: Accepted for publication in IEEE Internet of Things Journal

  35. arXiv:2103.15941  [pdf, other

    cs.LG cs.AI eess.SY

    Shaping Advice in Deep Multi-Agent Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Multi-agent reinforcement learning involves multiple agents interacting with each other and a shared environment to complete tasks. When rewards provided by the environment are sparse, agents may not receive immediate feedback on the quality of actions that they take, thereby affecting learning of policies. In this paper, we propose a method called Shaping Advice in deep Multi-agent reinforcement… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  36. arXiv:2103.11565  [pdf, other

    eess.SY

    Switching Controller Synthesis for Delay Hybrid Systems under Perturbations

    Authors: Yunjun Bai, Ting Gan, Li Jiao, Bican Xia, Bai Xue, Naijun Zhan

    Abstract: Delays are ubiquitous in modern hybrid systems, which exhibit both continuous and discrete dynamical behaviors. Induced by signal transmission, conversion, the nature of plants, and so on, delays may appear either in the continuous evolution of a hybrid system such that the evolution depends not only on the present state but also on its execution history, or in the discrete switching between its d… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

  37. arXiv:2011.02028  [pdf

    physics.ins-det eess.SY

    The upgrade of EAST Safety and Interlock system

    Authors: Z. C. Zhang, B. J. Xiao, Z. S. Ji, Y. Wang, F. Xia, Z. H. Xu

    Abstract: The Experimental Advanced Superconducting Tokamak (EAST), a nation-level large-scale scientific project of China, plays a key role for the research of peaceful utilizations of fusion energy. The safety and interlock system (SIS) is in charge of the supervision and control of all the EAST components involved in the protection of human and tokamak from potential accidents. With the development of ph… ▽ More

    Submitted 30 October, 2020; originally announced November 2020.

  38. arXiv:2009.09511  [pdf, other

    eess.SY cs.CR cs.LG math.OC

    Safety-Critical Online Control with Adversarial Disturbances

    Authors: Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: Paper accepted to the Conference on Decision and Control (CDC), 2020

  39. arXiv:2008.09388  [pdf, other

    cs.CV eess.IV

    CDE-GAN: Cooperative Dual Evolution Based Generative Adversarial Network

    Authors: Shiming Chen, Wenjie Wang, Beihao Xia, Xinge You, Zehong Cao, Weiping Ding

    Abstract: Generative adversarial networks (GANs) have been a popular deep generative model for real-world applications. Despite many recent efforts on GANs that have been contributed, mode collapse and instability of GANs are still open problems caused by their adversarial optimization difficulties. In this paper, motivated by the cooperative co-evolutionary algorithm, we propose a Cooperative Dual Evolutio… ▽ More

    Submitted 23 March, 2021; v1 submitted 21 August, 2020; originally announced August 2020.

    Comments: 15 pages,6 figures,4 tables. Accepted by IEEE Transactions on Evolutionary Computation

    Journal ref: IEEE Transactions on Evolutionary Computation, 2021

  40. arXiv:1912.12788  [pdf

    physics.app-ph eess.SP

    Design of Small Multi-band Full-screen Smartwatch Antenna for IoT applications

    Authors: Bing Xiao, Hang Wong, Di Wu, Kwan L. Yeung

    Abstract: Smartwatch is a potential candidate for the Internet of Things (IoT) hub. However, the performance of smartwatch antennas is severely restricted by the smartwatch structure, especially when the antennas are designed by traditional methods. For adapting smartwatches to the role of IoT hub, a novel method of designing multi-band smartwatch antenna is presented in this paper, aiming at increasing the… ▽ More

    Submitted 23 May, 2021; v1 submitted 29 December, 2019; originally announced December 2019.

  41. arXiv:1910.10798  [pdf

    eess.IV cs.LG stat.ML

    Context-endcoding for neural network based skull stripping in magnetic resonance imaging

    Authors: Zhen Liu, Borui Xiao, Yuemeng Li, Yong Fan

    Abstract: Skull stripping is usually the first step for most brain analysisprocess in magnetic resonance images. A lot of deep learn-ing neural network based methods have been developed toachieve higher accuracy. Since the 3D deep learning modelssuffer from high computational cost and are subject to GPUmemory limit challenge, a variety of 2D deep learning meth-ods have been developed. However, existing 2D d… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: draft for skull strip

  42. arXiv:1908.10357  [pdf, other

    cs.CV cs.LG eess.IV

    HigherHRNet: Scale-Aware Representation Learning for Bottom-Up Human Pose Estimation

    Authors: Bowen Cheng, Bin Xiao, Jingdong Wang, Honghui Shi, Thomas S. Huang, Lei Zhang

    Abstract: Bottom-up human pose estimation methods have difficulties in predicting the correct pose for small persons due to challenges in scale variation. In this paper, we present HigherHRNet: a novel bottom-up human pose estimation method for learning scale-aware representations using high-resolution feature pyramids. Equipped with multi-resolution supervision for training and multi-resolution aggregation… ▽ More

    Submitted 12 March, 2020; v1 submitted 27 August, 2019; originally announced August 2019.

    Comments: CVPR 2020

  43. arXiv:1907.08823  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Potential-Based Advice for Stochastic Policy Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran

    Abstract: This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward shaping scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE Conference on Decision and Control, 2019

  44. arXiv:1901.00959  [pdf, other

    cs.LG eess.IV stat.ML

    QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge

    Authors: Rajarshi Bhattacharyya, Archana Bura, Desik Rengarajan, Mason Rumuly, Bainan Xia, Srinivas Shakkottai, Dileep Kalathil, Ricky K. P. Mok, Amogh Dhamdhere

    Abstract: The predominant use of wireless access networks is for media streaming applications, which are only gaining popularity as ever more devices become available for this purpose. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a given time. Software reconfigurability of networking devices has seen wide adopt… ▽ More

    Submitted 13 May, 2020; v1 submitted 3 January, 2019; originally announced January 2019.

    Comments: Submitted to ToN in May, 2020

  45. arXiv:1811.09355  [pdf, other

    cs.SD eess.AS

    Training Multi-Task Adversarial Network for Extracting Noise-Robust Speaker Embedding

    Authors: Jianfeng Zhou, Tao Jiang, Lin Li, Qingyang Hong, Zhe Wang, Bingyin Xia

    Abstract: Under noisy environments, to achieve the robust performance of speaker recognition is still a challenging task. Motivated by the promising performance of multi-task training in a variety of image processing tasks, we explore the potential of multi-task adversarial training for learning a noise-robust speaker embedding. In this paper we present a novel framework which consists of three components:… ▽ More

    Submitted 12 May, 2019; v1 submitted 22 November, 2018; originally announced November 2018.

    Comments: accepted by ICASSP2019

  46. arXiv:1809.07177  [pdf, other

    cs.FL cs.LO eess.SY

    Parameter Synthesis Problems for one parametric clock Timed Automata

    Authors: Liyun Dai, Taolue Chen, Zhiming Liu, Bican Xia, Naijun Zhan, Kim G. Larsen

    Abstract: In this paper, we study the parameter synthesis problem for a class of parametric timed automata. The problem asks to construct the set of valuations of the parameters in the parametric timed automa- ton, referred to as the feasible region, under which the resulting timed automaton satisfies certain properties. We show that the parameter syn- thesis problem of parametric timed automata with only o… ▽ More

    Submitted 15 September, 2018; originally announced September 2018.

    Comments: 20 pages, 1 figure. arXiv admin note: substantial text overlap with arXiv:1808.06792

  47. arXiv:1310.6481  [pdf, ps, other

    eess.SY

    Barrier Certificates Revisited

    Authors: Liyun Dai, Ting Gan, Bican Xia, Naijun Zhan

    Abstract: A barrier certificate can separate the state space of a con- sidered hybrid system (HS) into safe and unsafe parts ac- cording to the safety property to be verified. Therefore this notion has been widely used in the verification of HSs. A stronger condition on barrier certificates means that less expressive barrier certificates can be synthesized. On the other hand, synthesizing more expressive ba… ▽ More

    Submitted 24 October, 2013; originally announced October 2013.

    Comments: 11 pages 5 figures