Skip to main content

Showing 1–32 of 32 results for author: Yue, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.16303  [pdf, other

    eess.IV cs.CV

    Enhanced Control for Diffusion Bridge in Image Restoration

    Authors: Conghan Yue, Zhengwei Peng, Junlong Ma, Dongyu Zhang

    Abstract: Image restoration refers to the process of restoring a damaged low-quality image back to its corresponding high-quality image. Typically, we use convolutional neural networks to directly learn the mapping from low-quality images to high-quality images achieving image restoration. Recently, a special type of diffusion bridge model has achieved more advanced results in image restoration. It can tran… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

  2. arXiv:2407.19863  [pdf, other

    cs.DC

    Before and After Blockchain: Development and Principles of Distributed Fault-Tolerant Consensus

    Authors: Huanyu Wu, Chentao Yue, Yixuan Fan, Yonghui Li, Lei Zhang

    Abstract: The concept of distributed consensus gained widespread attention following the publication of "Byzantine Generals Problem" by Leslie Lamport in the 1980s. This research topic has been active and extensively studied over the last four decades, particularly since the advent of blockchain technology in 2009. Blockchain technology employs Proof-of-X (PoX) or Byzantine-fault-tolerant (BFT) systems, whe… ▽ More

    Submitted 3 August, 2024; v1 submitted 29 July, 2024; originally announced July 2024.

  3. arXiv:2407.04168  [pdf, other

    cs.LG

    Learning Interpretable Differentiable Logic Networks

    Authors: Chang Yue, Niraj K. Jha

    Abstract: The ubiquity of neural networks (NNs) in real-world applications, from healthcare to natural language processing, underscores their immense utility in capturing complex relationships within high-dimensional data. However, NNs come with notable disadvantages, such as their "black-box" nature, which hampers interpretability, as well as their tendency to overfit the training data. We introduce a nove… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  4. arXiv:2407.02791  [pdf, other

    cs.SE cs.AI

    Model-Enhanced LLM-Driven VUI Testing of VPA Apps

    Authors: Suwan Li, Lei Bu, Guangdong Bai, Fuman Xie, Kai Chen, Chang Yue

    Abstract: The flourishing ecosystem centered around voice personal assistants (VPA), such as Amazon Alexa, has led to the booming of VPA apps. The largest app market Amazon skills store, for example, hosts over 200,000 apps. Despite their popularity, the open nature of app release and the easy accessibility of apps also raise significant concerns regarding security, privacy and quality. Consequently, variou… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 13 pages, 11 figures

  5. arXiv:2405.03924  [pdf, other

    cs.DB cs.AI cs.LG

    NeurDB: An AI-powered Autonomous Data System

    Authors: Beng Chin Ooi, Shaofeng Cai, Gang Chen, Yanyan Shen, Kian-Lee Tan, Yuncheng Wu, Xiaokui Xiao, Naili Xing, Cong Yue, Lingze Zeng, Meihui Zhang, Zhanhao Zhao

    Abstract: In the wake of rapid advancements in artificial intelligence (AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB (AIxDB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, sel… ▽ More

    Submitted 4 July, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  6. arXiv:2403.18488  [pdf, ps, other

    cs.IT

    The Guesswork of Ordered Statistics Decoding: Complexity and Practical Design

    Authors: Chentao Yue, Changyang She, Branka Vucetic, Yonghui Li

    Abstract: This paper investigates guesswork over ordered statistics and formulates the complexity of ordered statistics decoding (OSD) in binary additive white Gaussian noise (AWGN) channels. It first develops a new upper bound of guesswork for independent sequences, by applying the Holder's inequity to Hamming shell-based subspaces. This upper bound is then extended to the ordered statistics, by constructi… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Submitted for peer review;19 pages;15 figures

  7. arXiv:2312.10299  [pdf, other

    cs.CV cs.AI cs.LG

    Image Restoration Through Generalized Ornstein-Uhlenbeck Bridge

    Authors: Conghan Yue, Zhengwei Peng, Junlong Ma, Shiyan Du, Pengxu Wei, Dongyu Zhang

    Abstract: Diffusion models exhibit powerful generative capabilities enabling noise mapping to data via reverse stochastic differential equations. However, in image restoration, the focus is on the mapping relationship from low-quality to high-quality images. Regarding this issue, we introduce the Generalized Ornstein-Uhlenbeck Bridge (GOUB) model. By leveraging the natural mean-reverting property of the gen… ▽ More

    Submitted 17 May, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: ICML 2024

  8. arXiv:2311.07329  [pdf, other

    cs.NI

    When Distributed Consensus Meets Wireless Connected Autonomous Systems: A Review and A DAG-based Approach

    Authors: Huanyu Wu, Chentao Yue, Lei Zhang, Yonghui Li, Muhammad Ali Imran

    Abstract: The connected and autonomous systems (CAS) and auto-driving era is coming into our life. To support CAS applications such as AI-driven decision-making and blockchain-based smart data management platform, data and message exchange/dissemination is a fundamental element. The distributed message broadcast and forward protocols in CAS, such as vehicular ad hoc networks (VANET), can suffer from signifi… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  9. arXiv:2310.14816  [pdf, other

    cs.RO

    Modular Multi-Level Replanning TAMP Framework for Dynamic Environment

    Authors: Tao Lin, Chengfei Yue, Ziran Liu, Xibin Cao

    Abstract: Task and Motion Planning (TAMP) algorithms can generate plans that combine logic and motion aspects for robots. However, these plans are sensitive to interference and control errors. To make TAMP more applicable in real-world, we propose the modular multi-level replanning TAMP framework(MMRF), blending the probabilistic completeness of sampling-based TAMP algorithm with the robustness of reactive… ▽ More

    Submitted 10 March, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

  10. arXiv:2306.00443  [pdf, other

    cs.IT

    Efficient Near Maximum-Likelihood Reliability-Based Decoding for Short LDPC Codes

    Authors: Weiyang Zhang, Chentao Yue, Yonghui Li, Branka Vucetic

    Abstract: In this paper, we propose an efficient decoding algorithm for short low-density parity check (LDPC) codes by carefully combining the belief propagation (BP) decoding and order statistic decoding (OSD) algorithms. Specifically, a modified BP (mBP) algorithm is applied for a certain number of iterations prior to OSD to enhance the reliability of the received message, where an offset parameter is uti… ▽ More

    Submitted 1 September, 2023; v1 submitted 1 June, 2023; originally announced June 2023.

  11. arXiv:2305.16344  [pdf, other

    cs.CL cs.AI

    Enabling and Analyzing How to Efficiently Extract Information from Hybrid Long Documents with LLMs

    Authors: Chongjian Yue, Xinrun Xu, Xiaojun Ma, Lun Du, Hengyu Liu, Zhiming Ding, Yanbing Jiang, Shi Han, Dongmei Zhang

    Abstract: Large Language Models (LLMs) demonstrate exceptional performance in textual understanding and tabular reasoning tasks. However, their ability to comprehend and analyze hybrid text, containing textual and tabular data, remains underexplored. In this research, we specialize in harnessing the potential of LLMs to comprehend critical information from financial reports, which are hybrid long-documents.… ▽ More

    Submitted 7 March, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  12. arXiv:2304.14670  [pdf, other

    cs.AI

    Prompt Engineering for Healthcare: Methodologies and Applications

    Authors: Jiaqi Wang, Enze Shi, Sigang Yu, Zihao Wu, Chong Ma, Haixing Dai, Qiushi Yang, Yanqing Kang, Jinru Wu, Huawen Hu, Chenxi Yue, Haiyang Zhang, Yiheng Liu, Yi Pan, Zhengliang Liu, Lichao Sun, Xiang Li, Bao Ge, Xi Jiang, Dajiang Zhu, Yixuan Yuan, Dinggang Shen, Tianming Liu, Shu Zhang

    Abstract: Prompt engineering is a critical technique in the field of natural language processing that involves designing and optimizing the prompts used to input information into models, aiming to enhance their performance on specific tasks. With the recent advancements in large language models, prompt engineering has shown significant superiority across various domains and has become increasingly important… ▽ More

    Submitted 23 March, 2024; v1 submitted 28 April, 2023; originally announced April 2023.

  13. arXiv:2303.09248  [pdf, other

    cs.CV eess.IV

    Cross-Dimensional Refined Learning for Real-Time 3D Visual Perception from Monocular Video

    Authors: Ziyang Hong, C. Patrick Yue

    Abstract: We present a novel real-time capable learning method that jointly perceives a 3D scene's geometry structure and semantic labels. Recent approaches to real-time 3D scene reconstruction mostly adopt a volumetric scheme, where a Truncated Signed Distance Function (TSDF) is directly regressed. However, these volumetric approaches tend to focus on the global coherence of their reconstructions, which le… ▽ More

    Submitted 10 September, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: Accpeted to ICCV 2023 Workshops. Project page: https://hafred.github.io/cdrnet/

  14. arXiv:2211.06962  [pdf, other

    cs.IT cs.AI

    A Scalable Graph Neural Network Decoder for Short Block Codes

    Authors: Kou Tian, Chentao Yue, Changyang She, Yonghui Li, Branka Vucetic

    Abstract: In this work, we propose a novel decoding algorithm for short block codes based on an edge-weighted graph neural network (EW-GNN). The EW-GNN decoder operates on the Tanner graph with an iterative message-passing structure, which algorithmically aligns with the conventional belief propagation (BP) decoding method. In each iteration, the "weight" on the message passed along each edge is obtained fr… ▽ More

    Submitted 13 November, 2022; originally announced November 2022.

    Comments: Submitted to IEEE conference for possible publication

  15. arXiv:2209.08285  [pdf, other

    cs.LG cs.CL

    FR: Folded Rationalization with a Unified Encoder

    Authors: Wei Liu, Haozhao Wang, Jun Wang, Ruixuan Li, Chao Yue, Yuankai Zhang

    Abstract: Conventional works generally employ a two-phase model in which a generator selects the most important pieces, followed by a predictor that makes predictions based on the selected pieces. However, such a two-phase model may incur the degeneration problem where the predictor overfits to the noise generated by a not yet well-trained generator and in turn, leads the generator to converge to a sub-opti… ▽ More

    Submitted 20 September, 2022; v1 submitted 17 September, 2022; originally announced September 2022.

    Comments: Accepted at NeurIPS 2022

  16. arXiv:2209.03563  [pdf, other

    cs.CR cs.AI

    SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

    Authors: Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

    Abstract: Recent years have witnessed tremendous success in Self-Supervised Learning (SSL), which has been widely utilized to facilitate various downstream tasks in Computer Vision (CV) and Natural Language Processing (NLP) domains. However, attackers may steal such SSL models and commercialize them for profit, making it crucial to verify the ownership of the SSL models. Most existing ownership protection s… ▽ More

    Submitted 29 January, 2024; v1 submitted 8 September, 2022; originally announced September 2022.

    Comments: To Appear in the Network and Distributed System Security (NDSS) Symposium 2024, 26 February - 1 March 2024, San Diego, CA, USA

  17. arXiv:2208.08464  [pdf, other

    cs.LG

    CTRL: Clustering Training Losses for Label Error Detection

    Authors: Chang Yue, Niraj K. Jha

    Abstract: In supervised machine learning, use of correct labels is extremely important to ensure high accuracy. Unfortunately, most datasets contain corrupted labels. Machine learning models trained on such datasets do not generalize well. Thus, detecting their label errors can significantly increase their efficacy. We propose a novel framework, called CTRL (Clustering TRaining Losses for label error detect… ▽ More

    Submitted 12 September, 2023; v1 submitted 17 August, 2022; originally announced August 2022.

  18. arXiv:2207.04209  [pdf, other

    cs.LG cs.CR

    Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

    Authors: Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen

    Abstract: With the broad application of deep neural networks (DNNs), backdoor attacks have gradually attracted attention. Backdoor attacks are insidious, and poisoned models perform well on benign samples and are only triggered when given specific inputs, which cause the neural network to produce incorrect outputs. The state-of-the-art backdoor attack work is implemented by data poisoning, i.e., the attacke… ▽ More

    Submitted 9 July, 2022; originally announced July 2022.

  19. arXiv:2207.00944  [pdf, other

    cs.DB

    GlassDB: An Efficient Verifiable Ledger Database System Through Transparency

    Authors: Cong Yue, Tien Tuan Anh Dinh, Zhongle Xie, Meihui Zhang, Gang Chen, Beng Chin Ooi, Xiaokui Xiao

    Abstract: Verifiable ledger databases protect data history against malicious tampering. Existing systems, such as blockchains and certificate transparency, are based on transparency logs -- a simple abstraction allowing users to verify that a log maintained by an untrusted server is append-only. They expose a simple key-value interface. Building a practical database from transparency logs, on the other hand… ▽ More

    Submitted 19 February, 2023; v1 submitted 2 July, 2022; originally announced July 2022.

  20. arXiv:2206.10957  [pdf, ps, other

    cs.IT

    Ordered-Statistics Decoding with Adaptive Gaussian Elimination Reduction for Short Codes

    Authors: Chentao Yue, Mahyar Shirvanimoghaddam, Branka Vucetic, Yonghui Li

    Abstract: In this paper, we propose an efficient ordered-statistics decoding (OSD) algorithm with an adaptive Gaussian elimination (GE) reduction technique. The proposed decoder utilizes two decoding conditions to adaptively remove GE in OSD. The first condition determines whether GE could be skipped in the OSD process by estimating the decoding error probability. Then, the second condition is utilized to i… ▽ More

    Submitted 22 December, 2022; v1 submitted 22 June, 2022; originally announced June 2022.

    Comments: 5 figs, 6 pages

  21. arXiv:2206.09572  [pdf, other

    cs.IT

    Efficient Decoders for Short Block Length Codes in 6G URLLC

    Authors: Chentao Yue, Vera Miloslavskaya, Mahyar Shirvanimoghaddam, Branka Vucetic, Yonghui Li

    Abstract: This paper reviews the potential channel decoding techniques for ultra-reliable low-latency communications (URLLC). URLLC is renowned for its stringent requirements including ultra-reliability, low end-to-end transmission latency, and packet-size flexibility. These requirements exacerbate the difficulty of the physical-layer design, particularly for the channel coding and decoding schemes. To sati… ▽ More

    Submitted 22 December, 2022; v1 submitted 20 June, 2022; originally announced June 2022.

    Comments: To appear in IEEE Communications Magazine

  22. arXiv:2202.12713  [pdf, other

    cs.SI cs.AI cs.LG

    HTGN-BTW: Heterogeneous Temporal Graph Network with Bi-Time-Window Training Strategy for Temporal Link Prediction

    Authors: Chongjian Yue, Lun Du, Qiang Fu, Wendong Bi, Hengyu Liu, Yu Gu, Di Yao

    Abstract: With the development of temporal networks such as E-commerce networks and social networks, the issue of temporal link prediction has attracted increasing attention in recent years. The Temporal Link Prediction task of WSDM Cup 2022 expects a single model that can work well on two kinds of temporal graphs simultaneously, which have quite different characteristics and data properties, to predict whe… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 5 pages, Second Winner Award at Temporal Link Prediction task of WSDM Cup 2022

  23. arXiv:2112.12378  [pdf, other

    cs.IT

    Density Evolution Analysis of the Iterative Joint Ordered-Statistics Decoding for NOMA

    Authors: Chentao Yue, Mahyar Shirvanimoghaddam, Alva Kosasih, Giyoon Park, Ok-Sun Park, Wibowo Hardjawana, Branka Vucetic, Yonghui Li

    Abstract: In this paper, we develop a density evolution (DE) framework for analyzing the iterative joint decoding (JD) for non-orthogonal multiple access (NOMA) systems, where the ordered-statistics decoding (OSD) is applied to decode short block codes. We first investigate the density-transform feature of the soft-output OSD (SOSD), by deriving the density of the extrinsic log-likelihood ratio (LLR) with k… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: 30 Pages, 12 Figures

  24. arXiv:2110.15010  [pdf, other

    cs.IT

    NOMA Joint Decoding based on Soft-Output Ordered-Statistics Decoder for Short Block Codes

    Authors: Chentao Yue, Alva Kosasih, Mahyar Shirvanimoghaddam, Giyoon Park, Ok-Sun Park, Wibowo Hardjawana, Branka Vucetic, Yonghui Li

    Abstract: In this paper, we design the joint decoding (JD) of non-orthogonal multiple access (NOMA) systems employing short block length codes. We first proposed a low-complexity soft-output ordered-statistics decoding (LC-SOSD) based on a decoding stopping condition, derived from approximations of the a-posterior probabilities of codeword estimates. Simulation results show that LC-SOSD has the similar mutu… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

    Comments: 6 pages; 5 figures

  25. arXiv:2110.11574  [pdf, ps, other

    cs.IT

    Linear-Equation Ordered-Statistics Decoding

    Authors: Chentao Yue, Mahyar Shirvanimoghaddam, Giyoon Park, Ok-Sun Park, Branka Vucetic, Yonghui Li

    Abstract: In this paper, we propose a new linear-equation ordered-statistics decoding (LE-OSD). Unlike the OSD, LE-OSD uses high reliable parity bits rather than information bits to recover the codeword estimates, which is equivalent to solving a system of linear equations (SLE). Only test error patterns (TEPs) that create feasible SLEs, referred to as the valid TEPs, are used to obtain different codeword e… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 32 Pages, 5 figures

  26. arXiv:2103.02889  [pdf, other

    cs.LG cs.AR cs.NI

    Efficient Training Convolutional Neural Networks on Edge Devices with Gradient-pruned Sign-symmetric Feedback Alignment

    Authors: Ziyang Hong, C. Patrick Yue

    Abstract: With the prosperity of mobile devices, the distributed learning approach enabling model training with decentralized data has attracted wide research. However, the lack of training capability for edge devices significantly limits the energy efficiency of distributed learning in real life. This paper describes a novel approach of training DNNs exploiting the redundancy and the weight asymmetry poten… ▽ More

    Submitted 12 May, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: This work is published in the Proceedings of the 9th International Conference on IT Convergence and Security (ICITCS2021)

  27. arXiv:2008.09268  [pdf, other

    cs.DB cs.CR cs.DC

    Spitz: A Verifiable Database System

    Authors: Meihui Zhang, Zhongle Xie, Cong Yue, Ziyue Zhong

    Abstract: Databases in the past have helped businesses maintain and extract insights from their data. Today, it is common for a business to involve multiple independent, distrustful parties. This trend towards decentralization introduces a new and important requirement to databases: the integrity of the data, the history, and the execution must be protected. In other words, there is a need for a new class o… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

  28. arXiv:2004.05986  [pdf, other

    cs.CL cs.LG

    CLUE: A Chinese Language Understanding Evaluation Benchmark

    Authors: Liang Xu, Hai Hu, Xuanwei Zhang, Lu Li, Chenjie Cao, Yudong Li, Yechen Xu, Kai Sun, Dian Yu, Cong Yu, Yin Tian, Qianqian Dong, Weitang Liu, Bo Shi, Yiming Cui, Junyi Li, Jun Zeng, Rongzhao Wang, Weijian Xie, Yanting Li, Yina Patterson, Zuoyu Tian, Yiwen Zhang, He Zhou, Shaoweihua Liu , et al. (7 additional authors not shown)

    Abstract: The advent of natural language understanding (NLU) benchmarks for English, such as GLUE and SuperGLUE allows new NLU models to be evaluated across a diverse set of tasks. These comprehensive benchmarks have facilitated a broad range of research and applications in natural language processing (NLP). The problem, however, is that most such benchmarks are limited to English, which has made it difficu… ▽ More

    Submitted 5 November, 2020; v1 submitted 13 April, 2020; originally announced April 2020.

    Comments: Accepted by COLING2020; 10 pages, 4 figures

  29. A Revisit to Ordered Statistics Decoding: Distance Distribution and Decoding Rules

    Authors: Chentao Yue, Mahyar Shirvanimoghaddam, Branka Vucetic, Yonghui Li

    Abstract: This paper revisits the ordered statistics decoding (OSD). It provides a comprehensive analysis of the OSD algorithm by characterizing the statistical properties, evolution and the distribution of the Hamming distance and weighted Hamming distance from codeword estimates to the received sequence in the reprocessing stages of the OSD algorithm. We prove that the Hamming distance and weighted Hammin… ▽ More

    Submitted 6 May, 2021; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: accepted by IEEE Transactions on Information Theory

  30. arXiv:2003.02090  [pdf, other

    cs.DB

    Analysis of Indexing Structures for Immutable Data

    Authors: Cong Yue, Zhongle Xie, Meihui Zhang, Gang Chen, Beng Chin Ooi, Sheng Wang, Xiaokui Xiao

    Abstract: In emerging applications such as blockchains and collaborative data analytics, there are strong demands for data immutability, multi-version accesses, and tamper-evident controls. This leads to three new index structures for immutable data, namely Merkle Patricia Trie (MPT), Merkle Bucket Tree (MBT), and Pattern-Oriented-Split Tree (POS-Tree). Although these structures have been adopted in real ap… ▽ More

    Submitted 10 March, 2020; v1 submitted 4 March, 2020; originally announced March 2020.

  31. arXiv:1901.02603  [pdf, other

    cs.IT

    Segmentation-Discarding Ordered-Statistic Decoding for Linear Block Codes

    Authors: Chentao Yue, Mahyar Shirvanimoghaddam, Yonghui Li, Branka Vucetic

    Abstract: In this paper, we propose an efficient reliability based segmentation-discarding decoding (SDD) algorithm for short block-length codes. A novel segmentation-discarding technique is proposed along with the stopping rule to significantly reduce the decoding complexity without a significant performance degradation compared to ordered statistics decoding (OSD). In the proposed decoder, the list of tes… ▽ More

    Submitted 21 January, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: This paper has been submitted to IEEE ICC 2019

  32. arXiv:1802.09166  [pdf, ps, other

    cs.IT

    Short Block-length Codes for Ultra-Reliable Low-Latency Communications

    Authors: Mahyar Shirvanimoghaddam, Mohamad Sadegh Mohamadi, Rana Abbas, Aleksandar Minja, Chentao Yue, Balazs Matuz, Guojun Han, Zihuai Lin, Yonghui Li, Sarah Johnson, Branka Vucetic

    Abstract: This paper reviews the state of the art channel coding techniques for ultra-reliable low latency communication (URLLC). The stringent requirements of URLLC services, such as ultra-high reliability and low latency, have made it the most challenging feature of the fifth generation (5G) mobile systems. The problem is even more challenging for the services beyond the 5G promise, such as tele-surgery a… ▽ More

    Submitted 5 September, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in IEEE Communications Magazine