Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 60 results for author: Meng, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20335  [pdf, other

    cs.CL

    Xwin-LM: Strong and Scalable Alignment Practice for LLMs

    Authors: Bolin Ni, JingCheng Hu, Yixuan Wei, Houwen Peng, Zheng Zhang, Gaofeng Meng, Han Hu

    Abstract: In this work, we present Xwin-LM, a comprehensive suite of alignment methodologies for large language models (LLMs). This suite encompasses several key techniques, including supervised finetuning (SFT), reward modeling (RM), rejection sampling finetuning (RS), and direct preference optimization (DPO). The key components are as follows: (1) Xwin-LM-SFT, models initially finetuned with high-quality… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2405.15426  [pdf, other

    cs.CR

    AuthNet: Neural Network with Integrated Authentication Logic

    Authors: Yuling Cai, Fan Xiang, Guozhu Meng, Yinzhi Cao, Kai Chen

    Abstract: Model stealing, i.e., unauthorized access and exfiltration of deep learning models, has become one of the major threats. Proprietary models may be protected by access controls and encryption. However, in reality, these measures can be compromised due to system breaches, query-based model extraction or a disgruntled insider. Security hardening of neural networks is also suffering from limits, for e… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  3. arXiv:2404.00360  [pdf, other

    cs.CV

    Reusable Architecture Growth for Continual Stereo Matching

    Authors: Chenghao Zhang, Gaofeng Meng, Bin Fan, Kun Tian, Zhaoxiang Zhang, Shiming Xiang, Chunhong Pan

    Abstract: The remarkable performance of recent stereo depth estimation models benefits from the successful use of convolutional neural networks to regress dense disparity. Akin to most tasks, this needs gathering training data that covers a number of heterogeneous scenes at deployment time. However, training samples are typically acquired continuously in practical applications, making the capability to lear… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

    Comments: Extended version of CVPR 2022 paper "Continual Stereo Matching of Continuous Driving Scenes with Growing Architecture" - Accepted to TPAMI in 2024

  4. arXiv:2403.16124  [pdf, other

    cs.CV

    Enhancing Visual Continual Learning with Language-Guided Supervision

    Authors: Bolin Ni, Hongbo Zhao, Chenghao Zhang, Ke Hu, Gaofeng Meng, Zhaoxiang Zhang, Shiming Xiang

    Abstract: Continual learning (CL) aims to empower models to learn new tasks without forgetting previously acquired knowledge. Most prior works concentrate on the techniques of architectures, replay data, regularization, \etc. However, the category name of each class is largely neglected. Existing methods commonly utilize the one-hot labels and randomly initialize the classifier head. We argue that the scarc… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: Accepted by CVPR 2024

  5. arXiv:2403.14910  [pdf, other

    cs.CV

    Defying Imbalanced Forgetting in Class Incremental Learning

    Authors: Shixiong Xu, Gaofeng Meng, Xing Nie, Bolin Ni, Bin Fan, Shiming Xiang

    Abstract: We observe a high level of imbalance in the accuracy of different classes in the same old task for the first time. This intriguing phenomenon, discovered in replay-based Class Incremental Learning (CIL), highlights the imbalanced forgetting of learned classes, as their accuracy is similar before the occurrence of catastrophic forgetting. This discovery remains previously unidentified due to the re… ▽ More

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: AAAI2024

  6. arXiv:2403.11530  [pdf, other

    cs.CV

    Continual Forgetting for Pre-trained Vision Models

    Authors: Hongbo Zhao, Bolin Ni, Haochen Wang, Junsong Fan, Fei Zhu, Yuxi Wang, Yuntao Chen, Gaofeng Meng, Zhaoxiang Zhang

    Abstract: For privacy and security concerns, the need to erase unwanted information from pre-trained vision models is becoming evident nowadays. In real-world scenarios, erasure requests originate at any time from both users and model owners. These requests usually form a sequence. Therefore, under such a setting, selective information is expected to be continuously removed from a pre-trained model while ma… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: Accepted by CVPR 2024

  7. arXiv:2402.18393  [pdf, other

    cs.AI cs.NE cs.RO cs.SE

    Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing

    Authors: Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang

    Abstract: Autonomous Driving System (ADS) testing is crucial in ADS development, with the current primary focus being on safety. However, the evaluation of non-safety-critical performance, particularly the ADS's ability to make optimal decisions and produce optimal paths for autonomous vehicles (AVs), is equally vital to ensure the intelligence and reduce risks of AVs. Currently, there is little work dedica… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  8. arXiv:2402.18104  [pdf, other

    cs.CR cs.AI

    Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction

    Authors: Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen

    Abstract: In recent years, large language models (LLMs) have demonstrated notable success across various tasks, but the trustworthiness of LLMs is still an open problem. One specific threat is the potential to generate toxic or harmful responses. Attackers can craft adversarial prompts that induce harmful responses from LLMs. In this work, we pioneer a theoretical foundation in LLMs security by identifying… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  9. arXiv:2401.07378  [pdf, other

    cs.CV cs.AI

    Efficient approximation of Earth Mover's Distance Based on Nearest Neighbor Search

    Authors: Guangyu Meng, Ruyu Zhou, Liu Liu, Peixian Liang, Fang Liu, Danny Chen, Michael Niemier, X. Sharon Hu

    Abstract: Earth Mover's Distance (EMD) is an important similarity measure between two distributions, used in computer vision and many other application domains. However, its exact calculation is computationally and memory intensive, which hinders its scalability and applicability for large-scale problems. Various approximate EMD algorithms have been proposed to reduce computational costs, but they suffer lo… ▽ More

    Submitted 19 January, 2024; v1 submitted 14 January, 2024; originally announced January 2024.

  10. arXiv:2312.11057  [pdf, other

    cs.CR cs.AI cs.CV

    DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models

    Authors: Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma

    Abstract: Dataset sanitization is a widely adopted proactive defense against poisoning-based backdoor attacks, aimed at filtering out and removing poisoned samples from training datasets. However, existing methods have shown limited efficacy in countering the ever-evolving trigger functions, and often leading to considerable degradation of benign accuracy. In this paper, we propose DataElixir, a novel sanit… ▽ More

    Submitted 19 December, 2023; v1 submitted 18 December, 2023; originally announced December 2023.

    Comments: Accepted by AAAI2024

  11. Leveraging Knowledge Distillation for Efficient Deep Reinforcement Learning in Resource-Constrained Environments

    Authors: Guanlin Meng

    Abstract: This paper aims to explore the potential of combining Deep Reinforcement Learning (DRL) with Knowledge Distillation (KD) by distilling various DRL algorithms and studying their distillation effects. By doing so, the computational burden of deep models could be reduced while maintaining the performance. The primary objective is to provide a benchmark for evaluating the performance of different DRL… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  12. arXiv:2309.05679  [pdf, other

    cs.LG cs.AI cs.CR

    Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing

    Authors: Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li

    Abstract: While enjoying the great achievements brought by deep learning (DL), people are also worried about the decision made by DL models, since the high degree of non-linearity of DL models makes the decision extremely difficult to understand. Consequently, attacks such as adversarial attacks are easy to carry out, but difficult to detect and explain, which has led to a boom in the research on local expl… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

  13. arXiv:2309.02926  [pdf, other

    cs.CR

    Demystifying RCE Vulnerabilities in LLM-Integrated Apps

    Authors: Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen

    Abstract: In recent years, Large Language Models (LLMs) have demonstrated remarkable potential across various downstream tasks. LLM-integrated frameworks, which serve as the essential infrastructure, have given rise to many LLM-integrated web apps. However, some of these frameworks suffer from Remote Code Execution (RCE) vulnerabilities, allowing attackers to execute arbitrary code on apps' servers remotely… ▽ More

    Submitted 8 October, 2023; v1 submitted 6 September, 2023; originally announced September 2023.

  14. arXiv:2308.02770  [pdf, other

    cs.CV

    One-stage Low-resolution Text Recognition with High-resolution Knowledge Transfer

    Authors: Hang Guo, Tao Dai, Mingyan Zhu, Guanghao Meng, Bin Chen, Zhi Wang, Shu-Tao Xia

    Abstract: Recognizing characters from low-resolution (LR) text images poses a significant challenge due to the information deficiency as well as the noise and blur in low-quality images. Current solutions for low-resolution text recognition (LTR) typically rely on a two-stage pipeline that involves super-resolution as the first stage followed by the second-stage recognition. Although this pipeline is straig… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: Accepted as the ACM MM 2023 paper

  15. arXiv:2307.09749  [pdf, other

    cs.CV

    Towards Robust Scene Text Image Super-resolution via Explicit Location Enhancement

    Authors: Hang Guo, Tao Dai, Guanghao Meng, Shu-Tao Xia

    Abstract: Scene text image super-resolution (STISR), aiming to improve image quality while boosting downstream scene text recognition accuracy, has recently achieved great success. However, most existing methods treat the foreground (character regions) and background (non-character regions) equally in the forward process, and neglect the disturbance from the complex background, thus limiting the performance… ▽ More

    Submitted 29 July, 2023; v1 submitted 19 July, 2023; originally announced July 2023.

    Comments: Accepted as IJCAI2023 paper

  16. arXiv:2307.05642  [pdf, other

    cs.SE cs.CR cs.LG

    ConFL: Constraint-guided Fuzzing for Machine Learning Framework

    Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang

    Abstract: As machine learning gains prominence in various sectors of society for automated decision-making, concerns have risen regarding potential vulnerabilities in machine learning (ML) frameworks. Nevertheless, testing these frameworks is a daunting task due to their intricate implementation. Previous research on fuzzing ML frameworks has struggled to effectively extract input constraints and generate v… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

    Comments: 13 pages, 15 figures

  17. arXiv:2306.14392  [pdf, other

    cs.CV

    ContentCTR: Frame-level Live Streaming Click-Through Rate Prediction with Multimodal Transformer

    Authors: Jiaxin Deng, Dong Shen, Shiyao Wang, Xiangyu Wu, Fan Yang, Guorui Zhou, Gaofeng Meng

    Abstract: In recent years, live streaming platforms have gained immense popularity as they allow users to broadcast their videos and interact in real-time with hosts and peers. Due to the dynamic changes of live content, accurate recommendation models are crucial for enhancing user experience. However, most previous works treat the live as a whole item and explore the Click-through-Rate (CTR) prediction fra… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

  18. arXiv:2301.09072  [pdf, other

    cs.SE

    ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning

    Authors: Shangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang Liu

    Abstract: Large-scale pre-trained models such as CodeBERT, GraphCodeBERT have earned widespread attention from both academia and industry. Attributed to the superior ability in code representation, they have been further applied in multiple downstream tasks such as clone detection, code search and code translation. However, it is also observed that these state-of-the-art pre-trained models are susceptible t… ▽ More

    Submitted 22 January, 2023; originally announced January 2023.

  19. arXiv:2301.06657   

    cs.CV

    Free Lunch for Generating Effective Outlier Supervision

    Authors: Sen Pei, Jiaxi Sun, Richard Yi Da Xu, Bin Fan, Shiming Xiang, Gaofeng Meng

    Abstract: When deployed in practical applications, computer vision systems will encounter numerous unexpected images (\emph{i.e.}, out-of-distribution data). Due to the potentially raised safety risks, these aforementioned unseen data should be carefully identified and handled. Generally, existing approaches in dealing with out-of-distribution (OOD) detection mainly focus on the statistical difference betwe… ▽ More

    Submitted 17 January, 2024; v1 submitted 16 January, 2023; originally announced January 2023.

    Comments: We have rewritten this paper, and published as "Image Background Serves as Good Proxy for Out-of-distribution Data" arXiv:2307.00519

  20. arXiv:2212.03854  [pdf, other

    eess.SP cs.HC q-bio.QM

    BiPMAP: A Toolbox for Predictions of Perceived Motion Artifacts on Modern Displays

    Authors: Guanghan Meng, Dekel Galor, Laura Waller, Martin S. Banks

    Abstract: Presenting dynamic scenes without incurring motion artifacts visible to observers requires sustained effort from the display industry. A tool that predicts motion artifacts and simulates artifact elimination through optimizing the display configuration is highly desired to guide the design and manufacture of modern displays. Despite the popular demands, there is no such tool available in the marke… ▽ More

    Submitted 3 January, 2024; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: 11 pages, 9 figures

  21. arXiv:2211.10624  [pdf, other

    cs.CV

    A Unified Model for Video Understanding and Knowledge Embedding with Heterogeneous Knowledge Graph Dataset

    Authors: Jiaxin Deng, Dong Shen, Haojie Pan, Xiangyu Wu, Ximan Liu, Gaofeng Meng, Fan Yang, Size Li, Ruiji Fu, Zhongyuan Wang

    Abstract: Video understanding is an important task in short video business platforms and it has a wide application in video recommendation and classification. Most of the existing video understanding works only focus on the information that appeared within the video content, including the video frames, audio and text. However, introducing common sense knowledge from the external Knowledge Graph (KG) dataset… ▽ More

    Submitted 1 April, 2023; v1 submitted 19 November, 2022; originally announced November 2022.

    Comments: Accepted by ICMR 2023

  22. arXiv:2210.04170  [pdf

    cs.IR cs.AI

    Multi-Objective Personalized Product Retrieval in Taobao Search

    Authors: Yukun Zheng, Jiang Bian, Guanghao Meng, Chao Zhang, Honggang Wang, Zhixuan Zhang, Sen Li, Tao Zhuang, Qingwen Liu, Xiaoyi Zeng

    Abstract: In large-scale e-commerce platforms like Taobao, it is a big challenge to retrieve products that satisfy users from billions of candidates. This has been a common concern of academia and industry. Recently, plenty of works in this domain have achieved significant improvements by enhancing embedding-based retrieval (EBR) methods, including the Multi-Grained Deep Semantic Product Retrieval (MGDSPR)… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

    Comments: 9 pages, 4 figures, submitted to the 28th ACM SIGKDD Conference on Knowledge Discovery & Data Mining

  23. arXiv:2210.03986  [pdf, other

    cs.SE

    TransRepair: Context-aware Program Repair for Compilation Errors

    Authors: Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu

    Abstract: Automatically fixing compilation errors can greatly raise the productivity of software development, by guiding the novice or AI programmers to write and debug code. Recently, learning-based program repair has gained extensive attention and became the state-of-the-art in practice. But it still leaves plenty of space for improvement. In this paper, we propose an end-to-end solution TransRepair to lo… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: 11 pages, accepted to ASE '22

  24. Understanding Real-world Threats to Deep Learning Models in Android Apps

    Authors: Zizhuang Deng, Kai Chen, Guozhu Meng, Xiaodong Zhang, Ke Xu, Yao Cheng

    Abstract: Famous for its superior performance, deep learning (DL) has been popularly used within many applications, which also at the same time attracts various threats to the models. One primary threat is from adversarial attacks. Researchers have intensively studied this threat for several years and proposed dozens of approaches to create adversarial examples (AEs). But most of the approaches are only eva… ▽ More

    Submitted 28 September, 2022; v1 submitted 20 September, 2022; originally announced September 2022.

    Comments: 18 pages, 9 figures, accepted by CCS'22

  25. arXiv:2209.03563  [pdf, other

    cs.CR cs.AI

    SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

    Authors: Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

    Abstract: Recent years have witnessed tremendous success in Self-Supervised Learning (SSL), which has been widely utilized to facilitate various downstream tasks in Computer Vision (CV) and Natural Language Processing (NLP) domains. However, attackers may steal such SSL models and commercialize them for profit, making it crucial to verify the ownership of the SSL models. Most existing ownership protection s… ▽ More

    Submitted 29 January, 2024; v1 submitted 8 September, 2022; originally announced September 2022.

    Comments: To Appear in the Network and Distributed System Security (NDSS) Symposium 2024, 26 February - 1 March 2024, San Diego, CA, USA

  26. arXiv:2208.02816  [pdf, other

    cs.CV

    Expanding Language-Image Pretrained Models for General Video Recognition

    Authors: Bolin Ni, Houwen Peng, Minghao Chen, Songyang Zhang, Gaofeng Meng, Jianlong Fu, Shiming Xiang, Haibin Ling

    Abstract: Contrastive language-image pretraining has shown great success in learning visual-textual joint representation from web-scale data, demonstrating remarkable "zero-shot" generalization ability for various image tasks. However, how to effectively expand such new language-image pretraining methods to video domains is still an open problem. In this work, we present a simple yet effective approach that… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: Accepted by ECCV2022, Oral

  27. arXiv:2207.14381  [pdf, other

    cs.CV

    Pro-tuning: Unified Prompt Tuning for Vision Tasks

    Authors: Xing Nie, Bolin Ni, Jianlong Chang, Gaomeng Meng, Chunlei Huo, Zhaoxiang Zhang, Shiming Xiang, Qi Tian, Chunhong Pan

    Abstract: In computer vision, fine-tuning is the de-facto approach to leverage pre-trained vision models to perform downstream tasks. However, deploying it in practice is quite challenging, due to adopting parameter inefficient global update and heavily relying on high-quality downstream data. Recently, prompt-based learning, which adds a task-relevant prompt to adapt the downstream tasks to pre-trained mod… ▽ More

    Submitted 22 August, 2022; v1 submitted 28 July, 2022; originally announced July 2022.

  28. arXiv:2207.12194  [pdf, other

    cs.CV

    Domain Decorrelation with Potential Energy Ranking

    Authors: Sen Pei, Jiaxi Sun, Richard Yi Da Xu, Shiming Xiang, Gaofeng Meng

    Abstract: Machine learning systems, especially the methods based on deep learning, enjoy great success in modern computer vision tasks under experimental settings. Generally, these classic deep learning methods are built on the \emph{i.i.d.} assumption, supposing the training and test data are drawn from a similar distribution independently and identically. However, the aforementioned \emph{i.i.d.} assumpti… ▽ More

    Submitted 16 December, 2022; v1 submitted 25 July, 2022; originally announced July 2022.

    Comments: 2022 ECCV jury award, accepted by AAAI 2023

    Journal ref: AAAI 2023 Oral

  29. arXiv:2205.10617  [pdf, other

    cs.CV

    Gradient Concealment: Free Lunch for Defending Adversarial Attacks

    Authors: Sen Pei, Jiaxi Sun, Xiaopeng Zhang, Gaofeng Meng

    Abstract: Recent studies show that the deep neural networks (DNNs) have achieved great success in various tasks. However, even the \emph{state-of-the-art} deep learning based classifiers are extremely vulnerable to adversarial examples, resulting in sharp decay of discrimination accuracy in the presence of enormous unknown attacks. Given the fact that neural networks are widely used in the open world scenar… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

  30. arXiv:2203.11790  [pdf, other

    cs.SE cs.LG cs.PL

    Learning Program Semantics with Code Representations: An Empirical Study

    Authors: Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu

    Abstract: Program semantics learning is the core and fundamental for various code intelligent tasks e.g., vulnerability detection, clone detection. A considerable amount of existing works propose diverse approaches to learn the program semantics for different tasks and these works have achieved state-of-the-art performance. However, currently, a comprehensive and systematic study on evaluating different pro… ▽ More

    Submitted 22 March, 2022; originally announced March 2022.

    Comments: Accepted in 29th edition IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022)

  31. arXiv:2112.11648  [pdf, other

    cs.CV

    Out-of-distribution Detection with Boundary Aware Learning

    Authors: Sen Pei, Xin Zhang, Bin Fan, Gaofeng Meng

    Abstract: There is an increasing need to determine whether inputs are out-of-distribution (\emph{OOD}) for safely deploying machine learning models in the open world scenario. Typical neural classifiers are based on the closed world assumption, where the training data and the test data are drawn \emph{i.i.d.} from the same distribution, and as a result, give over-confident predictions even faced with \emph{… ▽ More

    Submitted 8 July, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Journal ref: ECCV 2022 Poster

  32. arXiv:2111.02671  [pdf, other

    cs.SE cs.AI

    GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search

    Authors: Shangqing Liu, Xiaofei Xie, Jingkai Siow, Lei Ma, Guozhu Meng, Yang Liu

    Abstract: Code search aims to retrieve accurate code snippets based on a natural language query to improve software productivity and quality. With the massive amount of available programs such as (on GitHub or Stack Overflow), identifying and localizing the precise code is critical for the software developers. In addition, Deep learning has recently been widely applied to different code-related scenarios, e… ▽ More

    Submitted 13 February, 2023; v1 submitted 4 November, 2021; originally announced November 2021.

  33. arXiv:2108.13003  [pdf, other

    cs.CV

    Embedding Novel Views in a Single JPEG Image

    Authors: Yue Wu, Guotao Meng, Qifeng Chen

    Abstract: We propose a novel approach for embedding novel views in a single JPEG image while preserving the perceptual fidelity of the modified JPEG image and the restored novel views. We adopt the popular novel view synthesis representation of multiplane images (MPIs). Our model first encodes 32 MPI layers (totally 128 channels) into a 3-channel JPEG image that can be decoded for MPIs to render novel views… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: published in ICCV 2021; Supplementary material will be added later

  34. arXiv:2108.12856  [pdf, other

    cs.CV

    Differentiable Convolution Search for Point Cloud Processing

    Authors: Xing Nie, Yongcheng Liu, Shaohong Chen, Jianlong Chang, Chunlei Huo, Gaofeng Meng, Qi Tian, Weiming Hu, Chunhong Pan

    Abstract: Exploiting convolutional neural networks for point cloud processing is quite challenging, due to the inherent irregular distribution and discrete shape representation of point clouds. To address these problems, many handcrafted convolution variants have sprung up in recent years. Though with elaborate design, these variants could be far from optimal in sufficiently capturing diverse shapes formed… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  35. arXiv:2108.02353  [pdf, other

    cs.CV

    Alleviating Mode Collapse in GAN via Diversity Penalty Module

    Authors: Sen Pei, Richard Yi Da Xu, Shiming Xiang, Gaofeng Meng

    Abstract: The vanilla GAN (Goodfellow et al. 2014) suffers from mode collapse deeply, which usually manifests as that the images generated by generators tend to have a high similarity amongst them, even though their corresponding latent vectors have been very different. In this paper, we introduce a pluggable diversity penalty module (DPM) to alleviate mode collapse of GANs. It reduces the similarity of ima… ▽ More

    Submitted 13 September, 2021; v1 submitted 4 August, 2021; originally announced August 2021.

  36. arXiv:2106.12778  [pdf, other

    cs.CV

    Video Super-Resolution with Long-Term Self-Exemplars

    Authors: Guotao Meng, Yue Wu, Sijin Li, Qifeng Chen

    Abstract: Existing video super-resolution methods often utilize a few neighboring frames to generate a higher-resolution image for each frame. However, the redundant information between distant frames has not been fully exploited in these methods: corresponding patches of the same instance appear across distant frames at different scales. Based on this observation, we propose a video super-resolution method… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

  37. arXiv:2105.06209  [pdf, other

    cs.LG cs.AI cs.CR

    DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks

    Authors: Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu

    Abstract: Machine unlearning has great significance in guaranteeing model security and protecting user privacy. Additionally, many legal provisions clearly stipulate that users have the right to demand model providers to delete their own data from training set, that is, the right to be forgotten. The naive way of unlearning data is to retrain the model without it from scratch, which becomes extremely time a… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

    Comments: 16 pages, 10 figures, conference

  38. arXiv:2103.15734  [pdf, other

    cs.CV

    Enhanced Boundary Learning for Glass-like Object Segmentation

    Authors: Hao He, Xiangtai Li, Guangliang Cheng, Jianping Shi, Yunhai Tong, Gaofeng Meng, Véronique Prinet, Lubin Weng

    Abstract: Glass-like objects such as windows, bottles, and mirrors exist widely in the real world. Sensing these objects has many applications, including robot navigation and grasping. However, this task is very challenging due to the arbitrary scenes behind glass-like objects. This paper aims to solve the glass-like object segmentation problem via enhanced boundary learning. In particular, we first propose… ▽ More

    Submitted 12 December, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: ICCV-2021 Code is availabe at https://github.com/hehao13/EBLNet

  39. Density-aware Haze Image Synthesis by Self-Supervised Content-Style Disentanglement

    Authors: Chi Zhang, Zihang Lin, Liheng Xu, Zongliang Li, Wei Tang, Yuehu Liu, Gaofeng Meng, Le Wang, Li Li

    Abstract: The key procedure of haze image translation through adversarial training lies in the disentanglement between the feature only involved in haze synthesis, i.e.style feature, and the feature representing the invariant semantic content, i.e. content feature. Previous methods separate content feature apart by utilizing it to classify haze image during the training process. However, in this paper we re… ▽ More

    Submitted 25 November, 2021; v1 submitted 11 March, 2021; originally announced March 2021.

    Comments: 21 pages, 19 figures, 6 tables

    Journal ref: IEEE Transactions on Circuits and Systems for Video Technology

  40. Omni-swarm: A Decentralized Omnidirectional Visual-Inertial-UWB State Estimation System for Aerial Swarms

    Authors: Hao Xu, Yichen Zhang, Boyu Zhou, Luqi Wang, Xinjie Yao, Guotao Meng, Shaojie Shen

    Abstract: Decentralized state estimation is one of the most fundamental components of autonomous aerial swarm systems in GPS-denied areas yet it still remains a highly challenging research topic. Omni-swarm, a decentralized omnidirectional visual-inertial-UWB state estimation system for aerial swarms, is proposed in this paper to address this research niche. To solve the issues of observability, complicated… ▽ More

    Submitted 11 September, 2022; v1 submitted 6 March, 2021; originally announced March 2021.

    Comments: The paper is accepted by IEEE Transactions on Robotics (T-RO, 2022)

  41. SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization

    Authors: Dongsong Yu, Guangliang Yang, Guozhu Meng, Xiaorui Gong, Xiu Zhang, Xiaobo Xiang, Xiaoyu Wang, Yue Jiang, Kai Chen, Wei Zou, Wenke Lee, Wenchang Shi

    Abstract: To investigate the status quo of SEAndroid policy customization, we propose SEPAL, a universal tool to automatically retrieve and examine the customized policy rules. SEPAL applies the NLP technique and employs and trains a wide&deep model to quickly and precisely predict whether one rule is unregulated or not.Our evaluation shows SEPAL is effective, practical and scalable. We verify SEPAL outperf… ▽ More

    Submitted 19 February, 2021; originally announced February 2021.

    Comments: 12 pages, 9 figures, accepted by WWW'21

  42. arXiv:2008.13768  [pdf, other

    cs.SE cs.CR

    A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

    Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li

    Abstract: Authorship identification is the process of identifying and classifying authors through given codes. Authorship identification can be used in a wide range of software domains, e.g., code authorship disputes, plagiarism detection, exposure of attackers' identity. Besides the inherent challenges from legacy software development, framework programming and crowdsourcing mode in Android raise the diffi… ▽ More

    Submitted 31 August, 2020; originally announced August 2020.

    Comments: 12 pages

    Journal ref: ICSME 2020: 36th IEEE International Conference on Software Maintenance and Evolution

  43. A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices

    Authors: Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu

    Abstract: Currently, Android malware detection is mostly performed on server side against the increasing number of malware. Powerful computing resource provides more exhaustive protection for app markets than maintaining detection by a single user. However, apart from the applications provided by the official market, apps from unofficial markets and third-party resources are always causing serious security… ▽ More

    Submitted 3 September, 2020; v1 submitted 11 May, 2020; originally announced May 2020.

    Comments: 16 Pages

    Journal ref: TIFS 2020

  44. arXiv:1911.12562  [pdf, ps, other

    cs.CR cs.LG

    Towards Security Threats of Deep Learning Systems: A Survey

    Authors: Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He

    Abstract: Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent weaknesses, which can threaten the security of learning models. Deep learning's wide use further magnifies the impact and consequences. To this end, lots of research has been conducted with the purpose of exhaustively identifying intrinsic weaknesses… ▽ More

    Submitted 27 October, 2020; v1 submitted 28 November, 2019; originally announced November 2019.

    Comments: 28 pages, 6 figures

    Journal ref: IEEE Transactions on Software Engineering 2020

  45. arXiv:1910.12604  [pdf, other

    cs.CV

    FontGAN: A Unified Generative Framework for Chinese Character Stylization and De-stylization

    Authors: Xiyan Liu, Gaofeng Meng, Shiming Xiang, Chunhong Pan

    Abstract: Chinese character synthesis involves two related aspects, i.e., style maintenance and content consistency. Although some methods have achieved remarkable success in synthesizing a character with specified style from standard font, how to map characters to a specified style domain without losing their identifiability remains very challenging. In this paper, we propose a novel model named FontGAN, w… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  46. arXiv:1909.03669  [pdf, other

    cs.CV cs.AI cs.GR cs.RO

    DensePoint: Learning Densely Contextual Representation for Efficient Point Cloud Processing

    Authors: Yongcheng Liu, Bin Fan, Gaofeng Meng, Jiwen Lu, Shiming Xiang, Chunhong Pan

    Abstract: Point cloud processing is very challenging, as the diverse shapes formed by irregular points are often indistinguishable. A thorough grasp of the elusive shape requires sufficiently contextual semantic information, yet few works devote to this. Here we propose DensePoint, a general architecture to learn densely contextual representation for point cloud processing. Technically, it extends regular g… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

    Comments: Accepted to ICCV 2019. 15 pages, 8 figures, 16 tables

  47. arXiv:1905.05947  [pdf, other

    cs.CV

    Joint haze image synthesis and dehazing with mmd-vae losses

    Authors: Zongliang Li, Chi Zhang, Gaofeng Meng, Yuehu Liu

    Abstract: Fog and haze are weathers with low visibility which are adversarial to the driving safety of intelligent vehicles equipped with optical sensors like cameras and LiDARs. Therefore image dehazing for perception enhancement and haze image synthesis for testing perception abilities are equivalently important in the development of such autonomous driving systems. From the view of image translation, the… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Preprinted version on arxiv, May-05-2019

  48. arXiv:1905.01786  [pdf, ps, other

    cs.LG cs.CV stat.ML

    Differentiable Architecture Search with Ensemble Gumbel-Softmax

    Authors: Jianlong Chang, Xinbang Zhang, Yiwen Guo, Gaofeng Meng, Shiming Xiang, Chunhong Pan

    Abstract: For network architecture search (NAS), it is crucial but challenging to simultaneously guarantee both effectiveness and efficiency. Towards achieving this goal, we develop a differentiable NAS solution, where the search space includes arbitrary feed-forward network consisting of the predefined number of connections. Benefiting from a proposed ensemble Gumbel-Softmax estimator, our method optimizes… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

  49. arXiv:1905.01681  [pdf, other

    cs.LG cs.CV stat.ML

    Deep Discriminative Clustering Analysis

    Authors: Jianlong Chang, Yiwen Guo, Lingfeng Wang, Gaofeng Meng, Shiming Xiang, Chunhong Pan

    Abstract: Traditional clustering methods often perform clustering with low-level indiscriminative representations and ignore relationships between patterns, resulting in slight achievements in the era of deep learning. To handle this problem, we develop Deep Discriminative Clustering (DDC) that models the clustering task by investigating relationships between patterns with a deep neural network. Technically… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

  50. arXiv:1903.10979  [pdf, other

    cs.CV

    DetNAS: Backbone Search for Object Detection

    Authors: Yukang Chen, Tong Yang, Xiangyu Zhang, Gaofeng Meng, Xinyu Xiao, Jian Sun

    Abstract: Object detectors are usually equipped with backbone networks designed for image classification. It might be sub-optimal because of the gap between the tasks of image classification and object detection. In this work, we present DetNAS to use Neural Architecture Search (NAS) for the design of better backbones for object detection. It is non-trivial because detection training typically needs ImageNe… ▽ More

    Submitted 30 December, 2019; v1 submitted 26 March, 2019; originally announced March 2019.

    Comments: In NeurIPS 2019. Code and models are available at https://github.com/megvii-model/DetNAS