Skip to main content

Showing 1–16 of 16 results for author: Gu, Z

Searching in archive stat. Search in all archives.
.
  1. arXiv:2501.02994  [pdf, other

    stat.ML cs.LG

    NeuroPMD: Neural Fields for Density Estimation on Product Manifolds

    Authors: William Consagra, Zhiling Gu, Zhengwu Zhang

    Abstract: We propose a novel deep neural network methodology for density estimation on product Riemannian manifold domains. In our approach, the network directly parameterizes the unknown density function and is trained using a penalized maximum likelihood framework, with a penalty term formed using manifold differential operators. The network architecture and estimation algorithm are carefully designed to… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  2. arXiv:2408.12209  [pdf, ps, other

    math.OC cs.LG stat.ML

    Zeroth-Order Stochastic Mirror Descent Algorithms for Minimax Excess Risk Optimization

    Authors: Zhihao Gu, Zi Xu

    Abstract: The minimax excess risk optimization (MERO) problem is a new variation of the traditional distributionally robust optimization (DRO) problem, which achieves uniformly low regret across all test distributions under suitable conditions. In this paper, we propose a zeroth-order stochastic mirror descent (ZO-SMD) algorithm available for both smooth and non-smooth MERO to estimate the minimal risk of e… ▽ More

    Submitted 22 August, 2024; originally announced August 2024.

  3. arXiv:2403.05644  [pdf, other

    stat.ME stat.AP

    TSSS: A Novel Triangulated Spherical Spline Smoothing for Surface-based Data

    Authors: Zhiling Gu, Shan Yu, Guannan Wang, Ming-Jun Lai, Li Wang

    Abstract: Surface-based data is commonly observed in diverse practical applications spanning various fields. In this paper, we introduce a novel nonparametric method to discover the underlying signals from data distributed on complex surface-based domains. Our approach involves a penalized spline estimator defined on a triangulation of surface patches, which enables effective signal extraction and recovery.… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: 56 pages, 16 figures

    MSC Class: 62G05; 62G08

  4. arXiv:2303.17048  [pdf

    stat.AP

    Applying Machine Learning to Understand Water Security and Water Access Inequality in Underserved Colonia Communities

    Authors: Zhining Gu, Wenwen Li, Michael Hanemann, Yushiou Tsai, Amber Wutich, Paul Westerhoff, Laura Landes, Anais D. Roque, Madeleine Zheng, Carmen A. Velasco, Sarah Porter

    Abstract: This paper explores the application of machine learning to enhance our understanding of water accessibility issues in underserved communities called Colonias located along the northern part of the United States - Mexico border. We analyzed more than 2000 such communities using data from the Rural Community Assistance Partnership (RCAP) and applied hierarchical clustering and the adaptive affinity… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: 26 pages, 7 figures, accepted by Computers, Environment and Urban Systems (CEUS)

  5. arXiv:2210.05241  [pdf, other

    cs.NE q-bio.NC stat.ML

    STSC-SNN: Spatio-Temporal Synaptic Connection with Temporal Convolution and Attention for Spiking Neural Networks

    Authors: Chengting Yu, Zheming Gu, Da Li, Gaoang Wang, Aili Wang, Erping Li

    Abstract: Spiking Neural Networks (SNNs), as one of the algorithmic models in neuromorphic computing, have gained a great deal of research attention owing to temporal information processing capability, low power consumption, and high biological plausibility. The potential to efficiently extract spatio-temporal features makes it suitable for processing the event streams. However, existing synaptic structures… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Journal ref: Frontiers in neuroscience, 2022, 12

  6. arXiv:2209.00056  [pdf, other

    stat.ME

    Joint Modeling of An Outcome Variable and Integrated Omic Datasets Using GLM-PO2PLS

    Authors: Zhujie Gu, Said el Bouhaddani, Jeanine Houwing-Duistermaat, Hae-Won Uh

    Abstract: In many studies of human diseases, multiple omic datasets are measured. Typically, these omic datasets are studied one by one with the disease, thus the relationship between omics are overlooked. Modeling the joint part of multiple omics and its association to the outcome disease will provide insights into the complex molecular base of the disease. In this article, we extend dimension reduction me… ▽ More

    Submitted 31 August, 2022; originally announced September 2022.

  7. arXiv:2009.11242  [pdf, other

    stat.AP stat.ME

    Using Undersampling with Ensemble Learning to Identify Factors Contributing to Preterm Birth

    Authors: Shi Dong, Zlatan Feric, Guangyu Li, Chieh Wu, April Z. Gu, Jennifer Dy, John Meeker, Ingrid Y. Padilla, Jose Cordero, Carmen Velez Vega, Zaira Rosario, Akram Alshawabkeh, David Kaeli

    Abstract: In this paper, we propose Ensemble Learning models to identify factors contributing to preterm birth. Our work leverages a rich dataset collected by a NIEHS P42 Center that is trying to identify the dominant factors responsible for the high rate of premature births in northern Puerto Rico. We investigate analytical models addressing two major challenges present in the dataset: 1) the significant a… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

    Journal ref: ICMLA 2020

  8. arXiv:2009.10537  [pdf, other

    cs.CR cs.AI cs.CV cs.LG stat.ML

    EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

    Authors: Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu

    Abstract: With the boom of edge intelligence, its vulnerability to adversarial attacks becomes an urgent problem. The so-called adversarial example can fool a deep learning model on the edge node to misclassify. Due to the property of transferability, the adversary can easily make a black-box attack using a local substitute model. Nevertheless, the limitation of resource of edge nodes cannot afford a compli… ▽ More

    Submitted 24 November, 2020; v1 submitted 19 September, 2020; originally announced September 2020.

  9. arXiv:2007.15836  [pdf, other

    cs.LG stat.ML

    TEAM: We Need More Powerful Adversarial Examples for DNNs

    Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh

    Abstract: Although deep neural networks (DNNs) have achieved success in many application fields, it is still vulnerable to imperceptible adversarial examples that can lead to misclassification of DNNs easily. To overcome this challenge, many defensive methods are proposed. Indeed, a powerful adversarial example is a key benchmark to measure these defensive mechanisms. In this paper, we propose a novel metho… ▽ More

    Submitted 9 August, 2020; v1 submitted 31 July, 2020; originally announced July 2020.

    Comments: 14 pages,13 figures

  10. arXiv:2006.01333  [pdf, other

    stat.AP

    Comparing and Integrating US COVID-19 Data from Multiple Sources with Anomaly Detection and Repairing

    Authors: Guannan Wang, Zhiling Gu, Xinyi Li, Shan Yu, Myungjin Kim, Yueying Wang, Lei Gao, Li Wang

    Abstract: Over the past few months, the outbreak of Coronavirus disease (COVID-19) has been expanding over the world. A reliable and accurate dataset of the cases is vital for scientists to conduct related research and for policy-makers to make better decisions. We collect the United States COVID-19 daily reported data from four open sources: the New York Times, the COVID-19 Data Repository by Johns Hopkins… ▽ More

    Submitted 28 November, 2020; v1 submitted 1 June, 2020; originally announced June 2020.

    Comments: 34 pages, 9 figures

    MSC Class: 62-11

  11. arXiv:2004.14103  [pdf, other

    stat.AP

    Spatiotemporal Dynamics, Nowcasting and Forecasting of COVID-19 in the United States

    Authors: Li Wang, Guannan Wang, Lei Gao, Xinyi Li, Shan Yu, Myungjin Kim, Yueying Wang, Zhiling Gu

    Abstract: Epidemic modeling is an essential tool to understand the spread of the novel coronavirus and ultimately assist in disease prevention, policymaking, and resource allocation. In this article, we establish a state of the art interface between classic mathematical and statistical models and propose a novel space-time epidemic modeling framework to study the spatial-temporal pattern in the spread of in… ▽ More

    Submitted 15 December, 2020; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: 37 pages, 6 figures, 8 tables

    MSC Class: 62G08; 62M30; 62P10

  12. arXiv:2002.11045  [pdf, ps, other

    eess.SP cs.LG cs.NI stat.ML

    Deep Learning for Ultra-Reliable and Low-Latency Communications in 6G Networks

    Authors: Changyang She, Rui Dong, Zhouyou Gu, Zhanwei Hou, Yonghui Li, Wibowo Hardjawana, Chenyang Yang, Lingyang Song, Branka Vucetic

    Abstract: In the future 6th generation networks, ultra-reliable and low-latency communications (URLLC) will lay the foundation for emerging mission-critical applications that have stringent requirements on end-to-end delay and reliability. Existing works on URLLC are mainly based on theoretical models and assumptions. The model-based solutions provide useful insights, but cannot be directly implemented in p… ▽ More

    Submitted 22 February, 2020; originally announced February 2020.

    Comments: The manuscript contains 4 figures 2 tables. It has been submitted to IEEE Network (in the second round of revision)

  13. arXiv:1912.00330  [pdf, other

    cs.LG stat.ML

    Adversary A3C for Robust Reinforcement Learning

    Authors: Zhaoyuan Gu, Zhenzhong Jia, Howie Choset

    Abstract: Asynchronous Advantage Actor Critic (A3C) is an effective Reinforcement Learning (RL) algorithm for a wide range of tasks, such as Atari games and robot control. The agent learns policies and value function through trial-and-error interactions with the environment until converging to an optimal policy. Robustness and stability are critical in RL; however, neural network can be vulnerable to noise… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  14. arXiv:1907.10823  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Enhancing Adversarial Example Transferability with an Intermediate Level Attack

    Authors: Qian Huang, Isay Katsman, Horace He, Zeqi Gu, Serge Belongie, Ser-Nam Lim

    Abstract: Neural networks are vulnerable to adversarial examples, malicious inputs crafted to fool trained models. Adversarial examples often exhibit black-box transfer, meaning that adversarial examples for one model can fool another model. However, adversarial examples are typically overfit to exploit the particular architecture and feature representation of a source model, resulting in sub-optimal black-… ▽ More

    Submitted 27 February, 2020; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: ICCV 2019 camera-ready. Imagenet results are updated after fixing the normalization. arXiv admin note: text overlap with arXiv:1811.08458

  15. arXiv:1902.05413  [pdf, other

    cs.CV cs.LG stat.ML

    Yelp Food Identification via Image Feature Extraction and Classification

    Authors: Fanbo Sun, Zhixiang Gu, Bo Feng

    Abstract: Yelp has been one of the most popular local service search engine in US since 2004. It is powered by crowd-sourced text reviews and photo reviews. Restaurant customers and business owners upload photo images to Yelp, including reviewing or advertising either food, drinks, or inside and outside decorations. It is obviously not so effective that labels for food photos rely on human editors, which is… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

  16. arXiv:1811.08458  [pdf, other

    cs.LG cs.CV stat.ML

    Intermediate Level Adversarial Attack for Enhanced Transferability

    Authors: Qian Huang, Zeqi Gu, Isay Katsman, Horace He, Pian Pawakapan, Zhiqiu Lin, Serge Belongie, Ser-Nam Lim

    Abstract: Neural networks are vulnerable to adversarial examples, malicious inputs crafted to fool trained models. Adversarial examples often exhibit black-box transfer, meaning that adversarial examples for one model can fool another model. However, adversarial examples may be overfit to exploit the particular architecture and feature representation of a source model, resulting in sub-optimal black-box tra… ▽ More

    Submitted 20 November, 2018; originally announced November 2018.

    Comments: Preprint