Skip to main content

Showing 1–45 of 45 results for author: Xian, X

Searching in archive cs. Search in all archives.
.
  1. arXiv:2603.19005  [pdf, ps, other

    cs.LG cs.AI stat.ME

    AgentDS Technical Report: Benchmarking the Future of Human-AI Collaboration in Domain-Specific Data Science

    Authors: An Luo, Jin Du, Xun Xian, Robert Specht, Fangqiao Tian, Ganghua Wang, Xuan Bi, Charles Fleming, Ashish Kundu, Jayanth Srinivasa, Mingyi Hong, Rui Zhang, Tianxi Li, Galin Jones, Jie Ding

    Abstract: Data science plays a critical role in transforming complex data into actionable insights across numerous domains. Recent developments in large language models (LLMs) and artificial intelligence (AI) agents have significantly automated data science workflow. However, it remains unclear to what extent AI agents can match the performance of human experts on domain-specific data science tasks, and in… ▽ More

    Submitted 19 March, 2026; originally announced March 2026.

    MSC Class: 62-07; 62-08; 68T05; 68T07; 68T01; 68T50 ACM Class: I.2.0; I.2.6; I.2.7; I.5.1; I.5.4; H.2.8; G.3

  2. arXiv:2603.07561  [pdf, ps, other

    cs.CV

    PureCC: Pure Learning for Text-to-Image Concept Customization

    Authors: Zhichao Liao, Xiaole Xian, Qingyu Li, Wenyu Qin, Meng Wang, Weicheng Xie, Siyang Song, Pingfa Feng, Long Zeng, Liang Pan

    Abstract: Existing concept customization methods have achieved remarkable outcomes in high-fidelity and multi-concept customization. However, they often neglect the influence on the original model's behavior and capabilities when learning new personalized concepts. To address this issue, we propose PureCC. PureCC introduces a novel decoupled learning objective for concept customization, which combines the i… ▽ More

    Submitted 8 March, 2026; originally announced March 2026.

    Comments: Accepted to CVPR 2026

  3. arXiv:2602.22026  [pdf, ps, other

    cs.CV cs.AI

    RGB-Event HyperGraph Prompt for Kilometer Marker Recognition based on Pre-trained Foundation Models

    Authors: Xiaoyu Xian, Shiao Wang, Xiao Wang, Daxin Tian, Yan Tian

    Abstract: Metro trains often operate in highly complex environments, characterized by illumination variations, high-speed motion, and adverse weather conditions. These factors pose significant challenges for visual perception systems, especially those relying solely on conventional RGB cameras. To tackle these difficulties, we explore the integration of event cameras into the perception system, leveraging t… ▽ More

    Submitted 25 February, 2026; originally announced February 2026.

    Comments: Accepted by IEEE Transactions on Cognitive and Developmental Systems (IEEE TCDS) 2026

  4. arXiv:2512.20959  [pdf, ps, other

    cs.LG cs.AI stat.ME

    Can Agentic AI Match the Performance of Human Data Scientists?

    Authors: An Luo, Jin Du, Fangqiao Tian, Xun Xian, Robert Specht, Ganghua Wang, Xuan Bi, Charles Fleming, Jayanth Srinivasa, Ashish Kundu, Mingyi Hong, Jie Ding

    Abstract: Data science plays a critical role in transforming complex data into actionable insights across numerous domains. Recent developments in large language models (LLMs) have significantly automated data science workflows, but a fundamental question persists: Can these agentic AI systems truly match the performance of human data scientists who routinely leverage domain-specific knowledge? We explore t… ▽ More

    Submitted 24 December, 2025; originally announced December 2025.

    MSC Class: 62-07; 62-08; 68T05; 68T07; 68T01; 68T50 ACM Class: I.2.0; I.2.6; I.2.7; I.5.1; I.5.4; H.2.8; G.3

  5. arXiv:2510.17197  [pdf, ps, other

    cs.CV cs.AI

    ZSPAPrune: Zero-Shot Prompt-Aware Token Pruning for Vision-Language Models

    Authors: Pu Zhang, Yuwei Li, Xingyuan Xian, Guoming Tang

    Abstract: As the capabilities of Vision-Language Models (VLMs) advance, they can process increasingly large inputs, which, unlike in LLMs, generates significant visual token redundancy and leads to prohibitive inference costs. While many methods aim to reduce these costs by pruning visual tokens, existing approaches, whether based on attention or diversity, typically neglect the guidance of the text prompt… ▽ More

    Submitted 20 October, 2025; originally announced October 2025.

  6. arXiv:2509.25624  [pdf, ps, other

    cs.CR cs.AI cs.CL cs.LG

    STAC: When Innocent Tools Form Dangerous Chains to Jailbreak LLM Agents

    Authors: Jing-Jing Li, Jianfeng He, Chao Shang, Devang Kulshreshtha, Xun Xian, Yi Zhang, Hang Su, Sandesh Swamy, Yanjun Qi

    Abstract: As LLMs advance into autonomous agents with tool-use capabilities, they introduce security challenges that extend beyond traditional content-based LLM safety concerns. This paper introduces Sequential Tool Attack Chaining (STAC), a novel multi-turn attack framework that exploits agent tool use. STAC chains together tool calls that each appear harmless in isolation but, when combined, collectively… ▽ More

    Submitted 2 February, 2026; v1 submitted 29 September, 2025; originally announced September 2025.

  7. arXiv:2507.18260  [pdf, ps, other

    cs.CV cs.AI

    Exploiting Gaussian Agnostic Representation Learning with Diffusion Priors for Enhanced Infrared Small Target Detection

    Authors: Junyao Li, Yahao Lu, Xingyuan Guo, Xiaoyu Xian, Tiantian Wang, Yukai Shi

    Abstract: Infrared small target detection (ISTD) plays a vital role in numerous practical applications. In pursuit of determining the performance boundaries, researchers employ large and expensive manual-labeling data for representation learning. Nevertheless, this approach renders the state-of-the-art ISTD methods highly fragile in real-world challenges. In this paper, we first study the variation in detec… ▽ More

    Submitted 24 July, 2025; originally announced July 2025.

    Comments: Submitted to Neural Networks. We propose the Gaussian Group Squeezer, leveraging Gaussian sampling and compression with diffusion models for channel-based data augmentation

  8. arXiv:2506.13992  [pdf, ps, other

    cs.LG cs.AI cs.CL stat.ME

    AssistedDS: Benchmarking How External Domain Knowledge Assists LLMs in Automated Data Science

    Authors: An Luo, Xun Xian, Jin Du, Fangqiao Tian, Ganghua Wang, Ming Zhong, Shengchun Zhao, Xuan Bi, Zirui Liu, Jiawei Zhou, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding

    Abstract: Large language models (LLMs) have advanced the automation of data science workflows. Yet it remains unclear whether they can critically leverage external domain knowledge as human data scientists do in practice. To answer this question, we introduce AssistedDS (Assisted Data Science), a benchmark designed to systematically evaluate how LLMs handle domain knowledge in tabular prediction tasks. Assi… ▽ More

    Submitted 22 October, 2025; v1 submitted 25 May, 2025; originally announced June 2025.

    MSC Class: 62-07; 62-08; 68T05; 68T07; 68T01; 68T50 ACM Class: I.2.0; I.2.6; I.2.7; I.5.1; I.5.4; H.2.8; G.3

  9. arXiv:2505.18397  [pdf, ps, other

    cs.MA cs.AI cs.ET cs.LG

    An Outlook on the Opportunities and Challenges of Multi-Agent AI Systems

    Authors: Fangqiao Tian, An Luo, Jin Du, Xun Xian, Robert Specht, Ganghua Wang, Xuan Bi, Jiawei Zhou, Ashish Kundu, Jayanth Srinivasa, Charles Fleming, Rui Zhang, Zirui Liu, Mingyi Hong, Jie Ding

    Abstract: A multi-agent AI system (MAS) is composed of multiple autonomous agents that interact, exchange information, and make decisions based on internal generative models. Recent advances in large language models and tool-using agents have made MAS increasingly practical in areas like scientific discovery and collaborative automation. However, key questions remain: When are MAS more effective than single… ▽ More

    Submitted 23 August, 2025; v1 submitted 23 May, 2025; originally announced May 2025.

    Comments: Corrected references

    MSC Class: 68T42 (Agent technology and artificial intelligence); 68T01 (General topics in artificial intelligence); 68M14 (Distributed systems) ACM Class: I.2.11; I.2.4; I.2.6

  10. arXiv:2505.13770  [pdf, ps, other

    cs.AI cs.CL cs.LG stat.ME stat.ML

    Ice Cream Doesn't Cause Drowning: Benchmarking LLMs Against Statistical Pitfalls in Causal Inference

    Authors: Jin Du, Li Chen, Xun Xian, An Luo, Fangqiao Tian, Ganghua Wang, Charles Doss, Xiaotong Shen, Jie Ding

    Abstract: Reliable causal inference is essential for making decisions in high-stakes areas like medicine, economics, and public policy. However, it remains unclear whether large language models (LLMs) can handle rigorous and trustworthy statistical causal inference. Current benchmarks usually involve simplified tasks. For example, these tasks might only ask LLMs to identify semantic causal relationships or… ▽ More

    Submitted 4 March, 2026; v1 submitted 19 May, 2025; originally announced May 2025.

    MSC Class: 62-08; 68T50; 68T05; 68T01; 68T07; 62-07; 68U35; 62C99 ACM Class: I.2.7; I.2.6; I.2.0; I.5.1; I.5.4; F.2.2; H.2.8; G.3

  11. arXiv:2505.04526  [pdf, other

    cs.CV cs.AI

    DFVO: Learning Darkness-free Visible and Infrared Image Disentanglement and Fusion All at Once

    Authors: Qi Zhou, Yukai Shi, Xiaojun Yang, Xiaoyu Xian, Lunjia Liao, Ruimao Zhang, Liang Lin

    Abstract: Visible and infrared image fusion is one of the most crucial tasks in the field of image fusion, aiming to generate fused images with clear structural information and high-quality texture features for high-level vision tasks. However, when faced with severe illumination degradation in visible images, the fusion results of existing image fusion methods often exhibit blurry and dim visual effects, p… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

  12. arXiv:2504.16360  [pdf, other

    cs.LG

    Disentangled Graph Representation Based on Substructure-Aware Graph Optimal Matching Kernel Convolutional Networks

    Authors: Mao Wang, Tao Wu, Xingping Xian, Shaojie Qiao, Weina Niu, Canyixing Cui

    Abstract: Graphs effectively characterize relational data, driving graph representation learning methods that uncover underlying predictive information. As state-of-the-art approaches, Graph Neural Networks (GNNs) enable end-to-end learning for diverse tasks. Recent disentangled graph representation learning enhances interpretability by decoupling independent factors in graph data. However, existing methods… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

  13. arXiv:2504.00396  [pdf, other

    cs.CV

    SPF-Portrait: Towards Pure Text-to-Portrait Customization with Semantic Pollution-Free Fine-Tuning

    Authors: Xiaole Xian, Zhichao Liao, Qingyu Li, Wenyu Qin, Pengfei Wan, Weicheng Xie, Long Zeng, Linlin Shen, Pingfa Feng

    Abstract: Fine-tuning a pre-trained Text-to-Image (T2I) model on a tailored portrait dataset is the mainstream method for text-to-portrait customization. However, existing methods often severely impact the original model's behavior (e.g., changes in ID, layout, etc.) while customizing portrait attributes. To address this issue, we propose SPF-Portrait, a pioneering work to purely understand customized targe… ▽ More

    Submitted 27 May, 2025; v1 submitted 31 March, 2025; originally announced April 2025.

  14. arXiv:2502.14493  [pdf, other

    cs.CV cs.LG

    CrossFuse: Learning Infrared and Visible Image Fusion by Cross-Sensor Top-K Vision Alignment and Beyond

    Authors: Yukai Shi, Cidan Shi, Zhipeng Weng, Yin Tian, Xiaoyu Xian, Liang Lin

    Abstract: Infrared and visible image fusion (IVIF) is increasingly applied in critical fields such as video surveillance and autonomous driving systems. Significant progress has been made in deep learning-based fusion methods. However, these models frequently encounter out-of-distribution (OOD) scenes in real-world applications, which severely impact their performance and reliability. Therefore, addressing… ▽ More

    Submitted 20 February, 2025; originally announced February 2025.

    Comments: IEEE T-CSVT. We mainly discuss the out-of-distribution challenges in infrared and visible image fusion

  15. arXiv:2412.20613  [pdf

    cs.CV

    Do Current Video LLMs Have Strong OCR Abilities? A Preliminary Study

    Authors: Yulin Fei, Yuhui Gao, Xingyuan Xian, Xiaojin Zhang, Tao Wu, Wei Chen

    Abstract: With the rise of multimodal large language models, accurately extracting and understanding textual information from video content, referred to as video based optical character recognition (Video OCR), has become a crucial capability. This paper introduces a novel benchmark designed to evaluate the video OCR performance of multi-modal models in videos. Comprising 1,028 videos and 2,961 question-ans… ▽ More

    Submitted 29 December, 2024; originally announced December 2024.

    Comments: Accepted by CoLing 2025 (The 31st International Conference on Computational Linguistics)

  16. arXiv:2412.13565  [pdf, other

    cs.CV cs.AI

    CA-Edit: Causality-Aware Condition Adapter for High-Fidelity Local Facial Attribute Editing

    Authors: Xiaole Xian, Xilin He, Zenghao Niu, Junliang Zhang, Weicheng Xie, Siyang Song, Zitong Yu, Linlin Shen

    Abstract: For efficient and high-fidelity local facial attribute editing, most existing editing methods either require additional fine-tuning for different editing effects or tend to affect beyond the editing regions. Alternatively, inpainting methods can edit the target image region while preserving external areas. However, current inpainting methods still suffer from the generation misalignment with facia… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

    Comments: accepted by aaai

  17. arXiv:2410.09865  [pdf, ps, other

    cs.CV

    SynFER: Towards Boosting Facial Expression Recognition with Synthetic Data

    Authors: Xilin He, Cheng Luo, Xiaole Xian, Bing Li, Muhammad Haris Khan, Zongyuan Ge, Weicheng Xie, Siyang Song, Linlin Shen, Bernard Ghanem, Xiangyu Yue

    Abstract: Facial expression datasets remain limited in scale due to the subjectivity of annotations and the labor-intensive nature of data collection. This limitation poses a significant challenge for developing modern deep learning-based facial expression analysis models, particularly foundation models, that rely on large-scale data for optimal performance. To tackle the overarching and complex challenge,… ▽ More

    Submitted 12 August, 2025; v1 submitted 13 October, 2024; originally announced October 2024.

    Comments: ICCV 2025

  18. arXiv:2409.17275  [pdf, ps, other

    cs.CR cs.AI cs.CL cs.DB cs.ET cs.IR cs.LG

    On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

    Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding

    Abstract: Retrieval-Augmented Generation (RAG) has been empirically shown to enhance the performance of large language models (LLMs) in knowledge-intensive domains such as healthcare, finance, and legal contexts. Given a query, RAG retrieves relevant documents from a corpus and integrates them into the LLMs' generation process. In this study, we investigate the adversarial robustness of RAG, focusing specif… ▽ More

    Submitted 30 May, 2025; v1 submitted 11 September, 2024; originally announced September 2024.

    Comments: Accepted by ICML 2025

    MSC Class: 68T50; 68T05; 94A60 ACM Class: I.2.7; K.6.5; H.3.3; I.2.6

  19. arXiv:2409.15698  [pdf, other

    cs.LG cs.SI

    GISExplainer: On Explainability of Graph Neural Networks via Game-theoretic Interaction Subgraphs

    Authors: Xingping Xian, Jianlu Liu, Chao Wang, Tao Wu, Shaojie Qiao, Xiaochuan Tang, Qun Liu

    Abstract: Explainability is crucial for the application of black-box Graph Neural Networks (GNNs) in critical fields such as healthcare, finance, cybersecurity, and more. Various feature attribution methods, especially the perturbation-based methods, have been proposed to indicate how much each node/edge contributes to the model predictions. However, these methods fail to generate connected explanatory subg… ▽ More

    Submitted 30 December, 2024; v1 submitted 23 September, 2024; originally announced September 2024.

    Comments: 13 pages, 7 figures

  20. arXiv:2409.13997  [pdf, other

    cs.AI q-bio.NC

    Drift to Remember

    Authors: Jin Du, Xinhe Zhang, Hao Shen, Xun Xian, Ganghua Wang, Jiawei Zhang, Yuhong Yang, Na Li, Jia Liu, Jie Ding

    Abstract: Lifelong learning in artificial intelligence (AI) aims to mimic the biological brain's ability to continuously learn and retain knowledge, yet it faces challenges such as catastrophic forgetting. Recent neuroscience research suggests that neural activity in biological systems undergoes representational drift, where neural responses evolve over time, even with consistent inputs and tasks. We hypoth… ▽ More

    Submitted 20 September, 2024; originally announced September 2024.

  21. arXiv:2408.12809  [pdf, other

    cs.AI

    DutyTTE: Deciphering Uncertainty in Origin-Destination Travel Time Estimation

    Authors: Xiaowei Mao, Yan Lin, Shengnan Guo, Yubin Chen, Xingyu Xian, Haomin Wen, Qisen Xu, Youfang Lin, Huaiyu Wan

    Abstract: Uncertainty quantification in travel time estimation (TTE) aims to estimate the confidence interval for travel time, given the origin (O), destination (D), and departure time (T). Accurately quantifying this uncertainty requires generating the most likely path and assessing travel time uncertainty along the path. This involves two main challenges: 1) Predicting a path that aligns with the ground t… ▽ More

    Submitted 20 January, 2025; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: 7 pages

  22. arXiv:2406.13920  [pdf, other

    cs.LG cs.SI

    Understanding the Robustness of Graph Neural Networks against Adversarial Attacks

    Authors: Tao Wu, Canyixing Cui, Xingping Xian, Shaojie Qiao, Chao Wang, Lin Yuan, Shui Yu

    Abstract: Recent studies have shown that graph neural networks (GNNs) are vulnerable to adversarial attacks, posing significant challenges to their deployment in safety-critical scenarios. This vulnerability has spurred a growing focus on designing robust GNNs. Despite this interest, current advancements have predominantly relied on empirical trial and error, resulting in a limited understanding of the robu… ▽ More

    Submitted 25 May, 2025; v1 submitted 19 June, 2024; originally announced June 2024.

  23. arXiv:2406.13499  [pdf, other

    cs.SI cs.LG

    GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning

    Authors: Tao Wu, Xinwen Cao, Chao Wang, Shaojie Qiao, Xingping Xian, Lin Yuan, Canyixing Cui, Yanbing Liu

    Abstract: Graph Neural Networks (GNNs) have demonstrated significant application potential in various fields. However, GNNs are still vulnerable to adversarial attacks. Numerous adversarial defense methods on GNNs are proposed to address the problem of adversarial attacks. However, these methods can only serve as a defense before poisoning, but cannot repair poisoned GNN. Therefore, there is an urgent need… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

  24. arXiv:2406.00632  [pdf, other

    cs.CV

    Diff-Mosaic: Augmenting Realistic Representations in Infrared Small Target Detection via Diffusion Prior

    Authors: Yukai Shi, Yupei Lin, Pengxu Wei, Xiaoyu Xian, Tianshui Chen, Liang Lin

    Abstract: Recently, researchers have proposed various deep learning methods to accurately detect infrared targets with the characteristics of indistinct shape and texture. Due to the limited variety of infrared datasets, training deep learning models with good generalization poses a challenge. To augment the infrared dataset, researchers employ data augmentation techniques, which often involve generating ne… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  25. arXiv:2404.00220  [pdf, other

    stat.ML cs.LG

    Partially-Observable Sequential Change-Point Detection for Autocorrelated Data via Upper Confidence Region

    Authors: Haijie Xu, Xiaochen Xian, Chen Zhang, Kaibo Liu

    Abstract: Sequential change point detection for multivariate autocorrelated data is a very common problem in practice. However, when the sensing resources are limited, only a subset of variables from the multivariate system can be observed at each sensing time point. This raises the problem of partially observable multi-sensor sequential change point detection. For it, we propose a detection scheme called a… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

  26. arXiv:2403.18774  [pdf, other

    cs.CV cs.CR cs.LG

    RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees

    Authors: Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Mingyi Hong, Jie Ding

    Abstract: Safeguarding intellectual property and preventing potential misuse of AI-generated images are of paramount importance. This paper introduces a robust and agile plug-and-play watermark detection framework, dubbed as RAW. As a departure from traditional encoder-decoder methods, which incorporate fixed binary codes as watermarks within latent representations, our approach introduces learnable waterma… ▽ More

    Submitted 23 January, 2024; originally announced March 2024.

  27. IDF-CR: Iterative Diffusion Process for Divide-and-Conquer Cloud Removal in Remote-sensing Images

    Authors: Meilin Wang, Yexing Song, Pengxu Wei, Xiaoyu Xian, Yukai Shi, Liang Lin

    Abstract: Deep learning technologies have demonstrated their effectiveness in removing cloud cover from optical remote-sensing images. Convolutional Neural Networks (CNNs) exert dominance in the cloud removal tasks. However, constrained by the inherent limitations of convolutional operations, CNNs can address only a modest fraction of cloud occlusion. In recent years, diffusion models have achieved state-of… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: Accepted by IEEE TGRS, we first present an iterative diffusion process for cloud removal, the code is available at: https://github.com/SongYxing/IDF-CR

  28. arXiv:2403.05416  [pdf, other

    cs.CV

    SIRST-5K: Exploring Massive Negatives Synthesis with Self-supervised Learning for Robust Infrared Small Target Detection

    Authors: Yahao Lu, Yupei Lin, Han Wu, Xiaoyu Xian, Yukai Shi, Liang Lin

    Abstract: Single-frame infrared small target (SIRST) detection aims to recognize small targets from clutter backgrounds. Recently, convolutional neural networks have achieved significant advantages in general object detection. With the development of Transformer, the scale of SIRST models is constantly increasing. Due to the limited training samples, performance has not been improved accordingly. The qualit… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: We address the quality, quantity, and diversity of the infrared data in SIRST, the dataset is available at: https://github.com/luy0222/SIRST-5K

  29. arXiv:2403.01326  [pdf, other

    cs.CV

    DNA Family: Boosting Weight-Sharing NAS with Block-Wise Supervisions

    Authors: Guangrun Wang, Changlin Li, Liuchun Yuan, Jiefeng Peng, Xiaoyu Xian, Xiaodan Liang, Xiaojun Chang, Liang Lin

    Abstract: Neural Architecture Search (NAS), aiming at automatically designing neural architectures by machines, has been considered a key step toward automatic machine learning. One notable NAS branch is the weight-sharing NAS, which significantly improves search efficiency and allows NAS algorithms to run on ordinary computers. Despite receiving high expectations, this category of methods suffers from low… ▽ More

    Submitted 2 March, 2024; originally announced March 2024.

    Comments: T-PAMI

  30. arXiv:2402.18172  [pdf, other

    cs.CV

    NiteDR: Nighttime Image De-Raining with Cross-View Sensor Cooperative Learning for Dynamic Driving Scenes

    Authors: Cidan Shi, Lihuang Fang, Han Wu, Xiaoyu Xian, Yukai Shi, Liang Lin

    Abstract: In real-world environments, outdoor imaging systems are often affected by disturbances such as rain degradation. Especially, in nighttime driving scenes, insufficient and uneven lighting shrouds the scenes in darkness, resulting degradation of both the image quality and visibility. Particularly, in the field of autonomous driving, the visual perception ability of RGB sensors experiences a sharp de… ▽ More

    Submitted 7 April, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  31. arXiv:2401.03221  [pdf, other

    cs.CV cs.AI

    MirrorDiffusion: Stabilizing Diffusion Process in Zero-shot Image Translation by Prompts Redescription and Beyond

    Authors: Yupei Lin, Xiaoyu Xian, Yukai Shi, Liang Lin

    Abstract: Recently, text-to-image diffusion models become a new paradigm in image processing fields, including content generation, image restoration and image-to-image translation. Given a target prompt, Denoising Diffusion Probabilistic Models (DDPM) are able to generate realistic yet eligible images. With this appealing property, the image translation task has the potential to be free from target image sa… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

    Comments: A prompt re-description strategy is proposed for stabilizing the diffusion model in image-to-image translation. Code and dataset page: https://mirrordiffusion.github.io/

  32. arXiv:2310.10780  [pdf, other

    cs.CR cs.AI cs.LG

    Demystifying Poisoning Backdoor Attacks from a Statistical Perspective

    Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding

    Abstract: The growing dependence on machine learning in real-world applications emphasizes the importance of understanding and ensuring its safety. Backdoor attacks pose a significant security risk due to their stealthy nature and potentially serious consequences. Such attacks involve embedding triggers within a learning model with the intention of causing malicious behavior when an active trigger is presen… ▽ More

    Submitted 17 October, 2023; v1 submitted 16 October, 2023; originally announced October 2023.

  33. arXiv:2310.01537  [pdf, other

    cs.LG

    Adversarial Client Detection via Non-parametric Subspace Monitoring in the Internet of Federated Things

    Authors: Xianjian Xie, Xiaochen Xian, Dan Li, Andi Wang

    Abstract: The Internet of Federated Things (IoFT) represents a network of interconnected systems with federated learning as the backbone, facilitating collaborative knowledge acquisition while ensuring data privacy for individual systems. The wide adoption of IoFT, however, is hindered by security concerns, particularly the susceptibility of federated learning networks to adversarial attacks. In this paper,… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  34. arXiv:2305.14669  [pdf, other

    cs.CV

    NegVSR: Augmenting Negatives for Generalized Noise Modeling in Real-World Video Super-Resolution

    Authors: Yexing Song, Meilin Wang, Zhijing Yang, Xiaoyu Xian, Yukai Shi

    Abstract: The capability of video super-resolution (VSR) to synthesize high-resolution (HR) video from ideal datasets has been demonstrated in many works. However, applying the VSR model to real-world video with unknown and complex degradation remains a challenging task. First, existing degradation metrics in most VSR methods are not able to effectively simulate real-world noise and blur. On the contrary, s… ▽ More

    Submitted 1 January, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: Accepted by AAAI2024, a effective data augmentation framework for real-world video super-resolution, see our demo at: https://negvsr.github.io/

  35. arXiv:2304.11383  [pdf, other

    cs.AI

    Sequential Recommendation with Probabilistic Logical Reasoning

    Authors: Huanhuan Yuan, Pengpeng Zhao, Xuefeng Xian, Guanfeng Liu, Victor S. Sheng, Lei Zhao

    Abstract: Deep learning and symbolic learning are two frequently employed methods in Sequential Recommendation (SR). Recent neural-symbolic SR models demonstrate their potential to enable SR to be equipped with concurrent perception and cognition capacities. However, neural-symbolic SR remains a challenging problem due to open issues like representing users and items in logical reasoning. In this paper, we… ▽ More

    Submitted 15 May, 2023; v1 submitted 22 April, 2023; originally announced April 2023.

  36. arXiv:2303.10945  [pdf, other

    cs.CV

    Open-World Pose Transfer via Sequential Test-Time Adaption

    Authors: Junyang Chen, Xiaoyu Xian, Zhijing Yang, Tianshui Chen, Yongyi Lu, Yukai Shi, Jinshan Pan, Liang Lin

    Abstract: Pose transfer aims to transfer a given person into a specified posture, has recently attracted considerable attention. A typical pose transfer framework usually employs representative datasets to train a discriminative model, which is often violated by out-of-distribution (OOD) instances. Recently, test-time adaption (TTA) offers a feasible solution for OOD data by using a pre-trained model that l… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: We call for a solid pose transfer model that can handle open-world instances beyond a specific dataset

  37. arXiv:2301.00169  [pdf, other

    cs.SI cs.AI

    Generative Graph Neural Networks for Link Prediction

    Authors: Xingping Xian, Tao Wu, Xiaoke Ma, Shaojie Qiao, Yabin Shao, Chao Wang, Lin Yuan, Yu Wu

    Abstract: Inferring missing links or detecting spurious ones based on observed graphs, known as link prediction, is a long-standing challenge in graph data analysis. With the recent advances in deep learning, graph neural networks have been used for link prediction and have achieved state-of-the-art performance. Nevertheless, existing methods developed for this purpose are typically discriminative, computin… ▽ More

    Submitted 31 December, 2022; originally announced January 2023.

    Comments: 13pages

    ACM Class: I.2.4; I.2.8; J.2

  38. Adaptive Learning for the Resource-Constrained Classification Problem

    Authors: Danit Shifman Abukasis, Izack Cohen, Xiaochen Xian, Kejun Huang, Gonen Singer

    Abstract: Resource-constrained classification tasks are common in real-world applications such as allocating tests for disease diagnosis, hiring decisions when filling a limited number of positions, and defect detection in manufacturing settings under a limited inspection budget. Typical classification algorithms treat the learning process and the resource constraints as two separate and sequential tasks. H… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Journal ref: Engineering Applications of Artificial Intelligence, 119, 105741 (2023)

  39. arXiv:2206.11480  [pdf, other

    cs.LG cs.CR

    A Framework for Understanding Model Extraction Attack and Defense

    Authors: Xun Xian, Mingyi Hong, Jie Ding

    Abstract: The privacy of machine learning models has become a significant concern in many emerging Machine-Learning-as-a-Service applications, where prediction services based on well-trained models are offered to users via pay-per-query. The lack of a defense mechanism can impose a high risk on the privacy of the server's model since an adversary could efficiently steal the model by querying only a few `goo… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

  40. arXiv:2204.10128  [pdf, other

    cs.IR cs.LG

    Learnable Model Augmentation Self-Supervised Learning for Sequential Recommendation

    Authors: Yongjing Hao, Pengpeng Zhao, Xuefeng Xian, Guanfeng Liu, Deqing Wang, Lei Zhao, Yanchi Liu, Victor S. Sheng

    Abstract: Sequential Recommendation aims to predict the next item based on user behaviour. Recently, Self-Supervised Learning (SSL) has been proposed to improve recommendation performance. However, most of existing SSL methods use a uniform data augmentation scheme, which loses the sequence correlation of an original sequence. To this end, in this paper, we propose a Learnable Model Augmentation self-superv… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

  41. arXiv:2010.10747  [pdf, other

    cs.LG cs.CR

    ASCII: ASsisted Classification with Ignorance Interchange

    Authors: Jiaying Zhou, Xun Xian, Na Li, Jie Ding

    Abstract: The rapid development in data collecting devices and computation platforms produces an emerging number of agents, each equipped with a unique data modality over a particular population of subjects. While the predictive performance of an agent may be enhanced by transmitting other data to it, this is often unrealistic due to intractable transmission costs and security concerns. While the predictive… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

    Comments: 12 pages, 6 figures

  42. arXiv:2009.00442  [pdf, other

    cs.CR

    Imitation Privacy

    Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan

    Abstract: In recent years, there have been many cloud-based machine learning services, where well-trained models are provided to users on a pay-per-query scheme through a prediction API. The emergence of these services motivates this work, where we will develop a general notion of model privacy named imitation privacy. We show the broad applicability of imitation privacy in classical query-response MLaaS sc… ▽ More

    Submitted 30 August, 2020; originally announced September 2020.

    Comments: 8 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2004.00566

  43. arXiv:2004.00566  [pdf, other

    cs.LG cs.CR stat.ML

    Assisted Learning: A Framework for Multi-Organization Learning

    Authors: Xun Xian, Xinran Wang, Jie Ding, Reza Ghanadan

    Abstract: In an increasing number of AI scenarios, collaborations among different organizations or agents (e.g., human and robots, mobile units) are often essential to accomplish an organization-specific mission. However, to avoid leaking useful and possibly proprietary information, organizations typically enforce stringent security constraints on sharing modeling algorithms and data, which significantly li… ▽ More

    Submitted 6 December, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

  44. arXiv:1805.07746  [pdf, ps, other

    cs.SI physics.data-an stat.ML

    Network Reconstruction and Controlling Based on Structural Regularity Analysis

    Authors: Tao Wu, Shaojie Qiao, Xingping Xian, Xi-Zhao Wang, Wei Wang, Yanbing Liu

    Abstract: From the perspective of network analysis, the ubiquitous networks are comprised of regular and irregular components, which makes uncovering the complexity of network structures to be a fundamental challenge. Exploring the regular information and identifying the roles of microscopic elements in network data can help us recognize the principle of network organization and contribute to network data u… ▽ More

    Submitted 28 August, 2018; v1 submitted 20 May, 2018; originally announced May 2018.

  45. arXiv:1512.08455  [pdf, ps, other

    cs.SI physics.soc-ph

    Full-scale Cascade Dynamics Prediction with a Local-First Approach

    Authors: Tao Wu, Leiting Chen, Xingping Xian, Yuxiao Guo

    Abstract: Information cascades are ubiquitous in various social networking web sites. What mechanisms drive information diffuse in the networks? How does the structure and size of the cascades evolve in time? When and which users will adopt a certain message? Approaching these questions can considerably deepen our understanding about information cascades and facilitate various vital applications, including… ▽ More

    Submitted 28 December, 2015; originally announced December 2015.