467 results
Search Results
2. CONNA: Addressing Name Disambiguation on the Fly.
- Author
-
Chen, Bo, Zhang, Jing, Tang, Jie, Cai, Lingfan, Wang, Zhaoyu, Zhao, Shu, Chen, Hong, and Li, Cuiping
- Subjects
REINFORCEMENT learning ,SOCIAL systems ,ELECTRONIC information resource searching ,COMPUTER science ,SOCIAL networks ,IMAGE registration - Abstract
Name disambiguation is a key and also a very tough problem in many online systems such as social search and academic search. Despite considerable research, a critical issue that has not been systematically studied is disambiguation on the fly — to complete the disambiguation in the real-time. This is very challenging, as the disambiguation algorithm must be accurate, efficient, and error tolerance. In this paper, we propose a novel framework — CONNA — to train a matching component and a decision component jointly via reinforcement learning. The matching component is responsible for finding the top matched candidate for the given paper, and the decision component is responsible for deciding on assigning the top matched person or creating a new person. The two components are intertwined and can be bootstrapped via jointly training. Empirically, we evaluate CONNA on two name disambiguation datasets. Experimental results show that the proposed framework can achieve a 1.21-19.84 percent improvement on F1-score using joint training of the matching and the decision components. The proposed CONNA has been successfully deployed on AMiner — a large online academic search system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. IEEE Computer Society Call for Papers.
- Subjects
ARTIFICIAL intelligence ,MASTER'S degree ,LIFE sciences ,COMPUTER engineering ,COMPUTER science - Published
- 2024
- Full Text
- View/download PDF
4. IEEE Computer Society Call for Papers.
- Subjects
COMPUTERS ,ADAPTIVE computing systems ,COMPUTER science ,INFORMATION science ,ENGINEERS - Abstract
The document titled "IEEE Computer Society Call for Papers" includes a list of references related to heterogeneous high-performance computing (HPC). The references cover topics such as co-design for HPC, hardware accelerator integration, performance models for heterogeneous computing, multi-chip technologies, and the Supercomputer Fugaku CPU A64fx. The document also provides contact information for Bapi Vinnakota, an engineer at Lawrence Berkeley National Laboratory, and John M. Shalf, the department head for computer science at the same laboratory. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
5. Latin American Women and Computer Science: A Systematic Literature Mapping.
- Author
-
Holanda, Maristela and Silva, Dilma Da
- Subjects
SCIENCE in literature ,SCIENTIFIC literature ,LATIN Americans ,WOMEN in science ,COMPUTER science ,QUESTION answering systems - Abstract
Contributions: The underrepresentation of women in computer science (CS) majors has long been a focus of attention in many academic documents, the majority of them from the United States and Europe. There is, however, a lack of information about educational interventions (EIs) for women in computing in Latin America. The contribution of this article is to cover this gap and describe what researchers in Latin American countries have been publishing about the recruitment and retention of women in the CS field. Background: Many EIs targeting female students at different educational levels—K-12, undergraduate, and graduate—have been undertaken to increase the participation of women in computing in Latin America. However, descriptions of these activities rarely are included in international academic databases. Research Questions: This literature mapping addresses two main research questions (RQ) about the topic of women in computing in academic publications in Latin American countries: RQ1) what are the characteristics of the publications about women in computing in Latin America? and RQ2) what are the published interventions to recruit and retain women in computing in Latin America? To answer RQ1, six subquestions were created covering year, language, country of origin, document type, and professional track. Furthermore, for RQ2, two subquestions were created involving educational level and the use of software development with a female theme. Methodology: This investigation used the systematic literature mapping process. To achieve a broad coverage of papers, the following sources were included: Scopus, Web of Science, Google Scholar, EBSCO, the proceedings of the Latin American Women in Computing Conference (LAWCC), and those of the Women in Technology (WIT) workshop colocated with the annual conference of the Brazilian Computer Society (SBC). The included papers were published in the last decade (2010–2020) and written in English, Portuguese, or Spanish. Findings: The literature mapping encompasses 197 academic documents, 48.2% of which were written in Portuguese, 28.7% in English, and 23.1% in Spanish. The papers originated from 15 of the 20 Latin American countries. Brazil and Costa Rica have the highest number of publications overall. The documents describe initiatives to increase the participation of women in computing majors that cover the entire educational spectrum, from K-12 to graduate programs, but papers targeting populations in higher education have started to appear recently. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. VirFace ∞ : A Semi-Supervised Method for Enhancing Face Recognition via Unlabeled Shallow Data.
- Author
-
Li, Wenyu, Li, Pengyu, Guo, Tianchu, Chen, Binghui, Wang, Biao, Zuo, Wangmeng, and Zhang, Lei
- Abstract
The semi-supervised face recognition problem has become a popular research topic in recent years. However, one common and important situation, in which the unlabeled data is shallow, has rarely been considered in most existing works. In this paper, shallow data means there are only few images per identity. In the unlabeled shallow situation, the existing semi-supervised face recognition methods generally do not work well. Thus, how to effectively utilize the unlabeled shallow face data for improving face recognition performance is an important issue. In this paper, we propose a novel semi-supervised face recognition method, namely VirFace $^{\infty} $ , to enhance the face recognition performance effectively with the unlabeled shallow data. VirFace $^{\infty} $ consists of VirClass and VirDistribution components. In VirClass, we inject the unlabeled data as virtual classes into the feature space to enlarge the inter-class distance. In VirDistribution, we predict the distribution of each virtual class, namely virtual distribution, and then enhance the inter-class discriminativeness by enlarging the distances between the labeled features and the virtual distributions. To the best of our knowledge, we are among the first to tackle the face recognition problem on unlabeled shallow face data. Extensive experiments demonstrate the superiority of our proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
7. DFME: A New Benchmark for Dynamic Facial Micro-Expression Recognition.
- Author
-
Zhao, Sirui, Tang, Huaying, Mao, Xinglong, Liu, Shifeng, Zhang, Yiming, Wang, Hao, Xu, Tong, and Chen, Enhong
- Abstract
One of the most important subconscious reactions, micro-expression (ME), is a spontaneous, subtle, and transient facial expression that reveals human beings’ genuine emotion. Therefore, automatically recognizing ME (MER) is becoming increasingly crucial in the field of affective computing, providing essential technical support for lie detection, clinical psychological diagnosis, and public safety. However, the ME data scarcity has severely hindered the development of advanced data-driven MER models. Despite the recent efforts by several spontaneous ME databases to alleviate this problem, there is still a lack of sufficient data. Hence, in this paper, we overcome the ME data scarcity problem by collecting and annotating a dynamic spontaneous ME database with the largest current ME data scale called DFME (Dynamic Facial Micro-expressions). Specifically, the DFME database contains 7,526 well-labeled ME videos spanning multiple high frame rates, elicited by 671 participants and annotated by more than 20 professional annotators over three years. Furthermore, we comprehensively verify the created DFME, including using influential spatiotemporal video feature learning models and MER models as baselines, and conduct emotion classification and ME action unit classification experiments. The experimental results demonstrate that the DFME database can facilitate research in automatic MER, and provide a new benchmark for this field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Rediscovery of Developmental Research Articles in Electrical Engineering and Description of Their Macrostructure.
- Subjects
ELECTRICAL engineering ,LITERARY form ,LITERATURE reviews ,TEST methods ,SOFTWARE engineering - Abstract
Background: More than 30 years ago, Harmon distinguished developmental research articles (RAs), which propose a solution to a problem, from experimental RAs, but the developmental format has received little attention. Literature review: Genre analysis of RAs has been largely restricted to articles following the standard experimental/Introduction, Methods, Results, Discussion (IMRD) format, thereby excluding many developmental engineering articles. Recently, a textbook proposed Introduction, Process, Testing, Conclusion (IPTC) as a prototypical format for electrical engineering RAs, but this format has not yet been demonstrated from a corpus. Research questions: 1. What is the macrostructure of electrical engineering RAs? 2. What are the characteristic features of each division of electrical engineering RAs? Methodology: Section headings, wordcount, and notable features were analyzed for 75 RAs from 15 electrical engineering journals and compared with both IPTC and Harmon's developmental structure. Results: Only one article, a case study, followed IMRD. Sixty-seven developmental RAs followed the IPTC format. These are distinguished by the second division (P), where the new solution is described, written in extended style, comprising several sections with headings specific to the research. A paragraph at the end of the Introduction describing the organization of the paper, the location of the theoretical framework and testing methods, and a ubiquitous Conclusion also differ from IMRD. Seven developmental RAs exhibited a hybrid format with the well-known IMRD section headings superimposed on an IPTC structure. Conclusions: Most electrical engineering articles are developmental and follow IPTC format. This can inform future genre analysis research and has pedagogical implications for teaching engineering writing. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. IEEE Computer Society Call for Papers.
- Subjects
COMPUTERS ,SOFTWARE engineers ,SCIENTIFIC computing ,COMPUTER science ,LICENSE agreements - Published
- 2022
- Full Text
- View/download PDF
10. Constructing Completely Independent Spanning Trees in a Family of Line-Graph-Based Data Center Networks.
- Author
-
Wang, Yifeng, Cheng, Baolei, Qian, Yu, and Wang, Dajin
- Subjects
SPANNING trees ,COMPLETE graphs ,GENEALOGY ,ARCHITECTURAL models ,BIPARTITE graphs ,DATA warehousing ,SERVER farms (Computer network management) - Abstract
The past decade has seen growing importance being attached to the Completely Independent Spanning Trees (CISTs). The CISTs can facilitate many network functionalities, and the existence and construction schemes of CISTs in various networks can be an indicator of the network's robustness. In this paper, we establish the number of CISTs that can be constructed in the line graph of the complete graph $K_n$ K n (denoted $L(K_n)$ L (K n) , for $n\geq 4$ n ≥ 4 ), and present an algorithm to construct the optimal (i.e., maximal) number of CISTs in $L(K_n)$ L (K n) . The $L(K_n)$ L (K n) is a special class of SWCube [13], an architectural model proposed for data center networks. Our construction algorithm is also implemented to verify its validity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Graph-Based Covert Transaction Detection and Protection in Blockchain.
- Author
-
Guo, Zhenyu, Li, Xin, Liu, Jiamou, Zhang, Zijian, Li, Meng, Hu, Jingjing, and Zhu, Liehuang
- Abstract
Covert communication is an method that plays an important role in secure data transmission. The technology embeds covert information into data and propagates it through covert channels. The communication quality depends on the choice of channel and data embedding techniques. Recently, blockchain has emerged to become the preferred channel to carry out covert communication for its decentralization and anonymity features. Existing covert transaction methods are constructed transaction-by-transaction, which makes them immune to text analysis-based detection methods. However, it is easy to expose their features on the transaction graph level. Unfortunately, there is yet no method to detect covert transactions by the features of transaction graph. In this paper, we propose a covert transaction detection method based on graph structure. By analyzing the statistical features of graph structure for addresses, we can infer whether they are the participants of covert transactions. Furthermore, we design a protection method of covert transactions based on graph generation networks. By adjusting the structural features between different addresses, our method enhances the security of multiple interrelated covert transactions. Experimental analysis on the Bitcoin Testnet verifies the security and the efficiency of the proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. AI4VIS: Survey on Artificial Intelligence Approaches for Data Visualization.
- Author
-
Wu, Aoyu, Wang, Yun, Shu, Xinhuan, Moritz, Dominik, Cui, Weiwei, Zhang, Haidong, Zhang, Dongmei, and Qu, Huamin
- Subjects
ARTIFICIAL intelligence ,DATA visualization ,COMPUTER science ,MACHINE learning - Abstract
Visualizations themselves have become a data format. Akin to other data formats such as text and images, visualizations are increasingly created, stored, shared, and (re-)used with artificial intelligence (AI) techniques. In this survey, we probe the underlying vision of formalizing visualizations as an emerging data format and review the recent advance in applying AI techniques to visualization data (AI4VIS). We define visualization data as the digital representations of visualizations in computers and focus on data visualization (e.g., charts and infographics). We build our survey upon a corpus spanning ten different fields in computer science with an eye toward identifying important common interests. Our resulting taxonomy is organized around WHAT is visualization data and its representation, WHY and HOW to apply AI to visualization data. We highlight a set of common tasks that researchers apply to the visualization data and present a detailed discussion of AI approaches developed to accomplish those tasks. Drawing upon our literature review, we discuss several important research questions surrounding the management and exploitation of visualization data, as well as the role of AI in support of those processes. We make the list of surveyed papers and related material available online at. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Training Deep Architectures Without End-to-End Backpropagation: A Survey on the Provably Optimal Methods.
- Author
-
Duan, Shiyu and Principe, Jose C.
- Abstract
This tutorial paper surveys provably optimal alternatives to end-to-end backpropagation (E2EBP) — the de facto standard for training deep architectures. Modular training refers to strictly local training without both the forward and the backward pass, i.e., dividing a deep architecture into several nonoverlapping modules and training them separately without any end-to-end operation. Between the fully global E2EBP and the strictly local modular training, there are weakly modular hybrids performing training without the backward pass only. These alternatives can match or surpass the performance of E2EBP on challenging datasets such as ImageNet, and are gaining increasing attention primarily because they offer practical advantages over E2EBP, which will be enumerated herein. In particular, they allow for greater modularity and transparency in deep learning workflows, aligning deep learning with the mainstream computer science engineering that heavily exploits modularization for scalability. Modular training has also revealed novel insights about learning and has further implications on other important research domains. Specifically, it induces natural and effective solutions to some important practical problems such as data efficiency and transferability estimation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. Lw-Count: An Effective Lightweight Encoding-Decoding Crowd Counting Network.
- Author
-
Liu, Yanbo, Cao, Guo, Shi, Hao, and Hu, Yingxiang
- Subjects
LINEAR network coding ,RUNNING speed ,COUNTING ,CROWDS ,COINCIDENCE - Abstract
Crowd counting is a task of intelligent applications, and its operation efficiency is very important. However, in order to obtain a better counting performance, most of the existing works often design larger and more complex network structures, which will result in them occupying considerable memory, time and other resources at runtime, seriously limiting their deployment scope and making it difficult to be widely used in practical scenarios. In this paper, in order to overcome the above problems, we propose an effective lightweight encoding-decoding crowd counting network, named Lw-Count. Specifically, in the encoding process, we design an efficient and lightweight convolution module (ELCM), which extracts the crowd features in the network through a refined ghost block to reduce the network parameters and computing cost, and solves the problem of inaccurate counting caused by uneven crowd distribution through spatial group normalization (SGN). In the decoding process, we design a scale regression module (SRM) to reduce the error details and chessboard effect caused by linear interpolation and deconvolution. In addition, we design a new loss function, which enhances the spatial correlation of the density map and the sensitivity of the crowd through a regional normalized cross-correlation loss and counting loss, to ensure the counting accuracy. Extensive experiments on five mainstream datasets demonstrate that Lw-Count achieves an optimal trade-off between counting performance and running speed compared with other methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
15. A Galois Connection Approach to Wei-Type Duality Theorems.
- Author
-
Xu, Yang, Kan, Haibin, and Han, Guangyue
- Subjects
LINEAR codes ,HAMMING weight ,MATROIDS - Abstract
In 1991, Wei proved a duality theorem that established an interesting connection between the generalized Hamming weights of a linear code and those of its dual code. Wei’s duality theorem has since been extensively studied from different perspectives and extended to other settings. In this paper, we re-examine Wei’s duality theorem and its various extensions, henceforth referred to as Wei-type duality theorems, from a new Galois connection perspective. Our approach is based on the observation that the generalized Hamming weights and the dimension/length profiles of a linear code form a Galois connection. The central result of this paper is a general Wei-type duality theorem for two Galois connections between finite subsets of $\mathbb {Z}$ , from which all the known Wei-type duality theorems can be recovered. As corollaries of our central result, we prove new Wei-type duality theorems for $w$ -demi-matroids defined over finite sets and $w$ -demi-polymatroids defined over modules with a composition series, which further allows us to unify and generalize all the known Wei-type duality theorems established for codes endowed with various metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. Improved Bounds for (b, k)-Hashing.
- Author
-
Della Fiore, Stefano, Costa, Simone, and Dalai, Marco
- Subjects
DISTRIBUTION (Probability theory) ,INFORMATION theory ,COMPUTER science ,QUADRATIC forms - Abstract
For fixed integers $n$ and $b\geq k$ , let $A(b,k,n)$ the largest size of a subset of $\{1,2,\ldots,b\}^{n}$ such that, for any $k$ distinct elements in the set, there is a coordinate where they all differ. Bounding $A(b,k,n)$ is a problem of relevant interest in information theory and computer science, relating to the zero-error capacity with list decoding and to the study of $(b, k)$ -hash families of functions. It is known that, for fixed $b$ and $k$ , $A(b,k,n)$ grows exponentially in $n$. In this paper, we determine new exponential upper bounds for different values of $b$ and $k$. A first bound on $A(b,k,n)$ for general $b$ and $k$ was derived by Fredman and Komlós in the ’80s and improved for certain $b\neq k$ by Körner and Marton and by Arikan. Only very recently better bounds were derived for general $b$ and $k$ by Guruswami and Riazanov, while stronger results for small values of $b=k$ were obtained by Arikan, by Dalai, Guruswami and Radhakrishnan, and by Costa and Dalai. In this paper, we strengthen the bounds for some specific values of $b$ and $k$. Our contribution is a new computational method for obtaining upper bounds on the values of a quadratic form defined over discrete probability distributions in arbitrary dimensions, which emerged as a central ingredient in recent works. The proposed method reduces an infinite-dimensional problem to a finite one, which we manage to further simplify by means of a series of optimality conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Some Upper Bounds and Exact Values on Linear Complexities Over F M of Sidelnikov Sequences for M = 2 and 3.
- Author
-
Zeng, Min, Luo, Yuan, Hu, Guo-Sheng, and Song, Hong-Yeop
- Subjects
SHIFT registers ,DISCRETE Fourier transforms ,DATA transmission systems ,FINITE fields ,FINITE element method ,COMPLEXITY (Philosophy) - Abstract
Sidelnikov sequences, a kind of cyclotomic sequences with many desired properties such as low correlation and variable alphabet sizes, can be employed to construct a polyphase sequence family that has many applications in high-speed data communications. Recently, cyclotomic numbers have been used to investigate the linear complexity of Sidelnikov sequences, mainly about binary ones, although the limitation on the orders of the available cyclotomic numbers makes it difficult. This paper continues to study the linear complexity over $\mathbb {F}_{M}$ of $M$ -ary Sidelnikov sequence of period $q-1$ using Hasse derivative, which implies $q=p^{m}$ , $m\geq 1$ and $M|(q-1)$. The $t$ th Hasse derivative formulas are presented in terms of cyclotomic numbers, and some upper bounds on the linear complexity for $M=2$ and 3 are obtained only with some additional restrictions on $q$. Furthermore, concrete illustrations for several families of these sequences, such as $q\equiv 1\pmod {2}$ and $q\equiv 1\pmod {3}$ , show these upper bounds are tight and reachable; especially for $q=2\times 3^{\lambda }+1 (1\leq \lambda \leq 20)$ , the exact linear complexities over $\mathbb {F}_{3}$ of the ternary Sidelnikov sequences are determined; and it turns out that all the linear complexities of the sequences considered are very close to their periods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Accidental Translationists: A Perspective From the Trenches.
- Author
-
Parashar, Manish and Abramson, David
- Subjects
TRENCHES ,COMPUTER science - Abstract
Much of computer science research can benefit from the Translational Computing Science paradigm, which bridges foundational, use-inspired, and applied research with the delivery and deployment of its outcomes and supports essential bidirectional interplays. However, its wide adoption continues to face multiple challenges and roadblocks. This paper uses the perspectives and experiences of two accidental translationists to illustrate the translation process, it impacts, as well as the challenges and roadblocks faced. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Three Byte-Based Mutual Authentication Scheme for Autonomous Internet of Vehicles.
- Author
-
Adil, Muhammad, Ali, Jehad, Attique, Muhammad, Jadoon, Muhammad Mohsin, Abbas, Safia, Alotaibi, Sattam Rabia, Menon, Varun G., and Farouk, Ahmed
- Abstract
In this paper, we present a three-byte-based Media Access Control (MAC) protocol to resolve the mutual authentication problem in an Autonomous Internet of Vehicles (AIoV) network. Initially, the network architecture is divided into two chains, i.e. the local and public chain, wherein the local chain the authentication and communication process is controlled by Cluster head (CH), while in the public chain it is controlled by the base station (BS). The proposed paradigm uses the 48-bit MAC address of the vehicle’s embedded sensors for authentication, with the ability to alter the authentication parameters by triggering the last three bytes (24 bits) of the MAC address with a predetermined time interval. Persistent triggering of the last three bytes of an AIoV’s MAC address guarantees its integrity in the network because only legal vehicles are capable of initiating and validating the authentication request with the other vehicles in the network. Initially, the MAC addresses of all AIoVs are registered with the BS in the public chain through the concerned CH. Likewise, the MAC-address triggering of registered AIoVs is carried out in the BS with a defined time period and broadcasted in the public chain, which is further distributed through CHs in the local chain. Most of the computation is supervised by BS and CH in the public and local chains respectively, which minimize the client-side authentication complexity and enhances network efficiency in terms of authentication with 98.3% detection rate, communications, and computing costs, along with 11% improvement in the latency, 15% improvement in packet loss ratio (PLR), and throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Minimizing the Longest Tour Time Among a Fleet of UAVs for Disaster Area Surveillance.
- Author
-
Guo, Qing, Peng, Jian, Xu, Wenzheng, Liang, Weifa, Jia, Xiaohua, Xu, Zichuan, Yang, Yanbin, and Wang, Minghui
- Subjects
DRONE aircraft ,BUILDING failures ,SUPPLEMENTARY employment ,TOURS - Abstract
In this paper, we study the employment of multiple Unmanned Aerial Vehicles (UAVs) to monitor Points of Interests (PoIs) in a disaster area, e.g., collapsed buildings after an earthquake, where the UAVs can take photos and videos for the people trapped at PoIs, because such valuable information is imperative to make rescue decisions. Unlike most existing studies that ignored the monitoring time of PoIs and simply minimized the longest flying distance among the UAVs, we observe that it takes time to monitor the PoIs. Then, it is possible that the flying distance of a UAV in its flying tour may not be too long, the tour however contains many densely-located PoIs. Therefore, it will take a very long time for the UAV to monitor the PoIs in its tour. In this paper, we first formulate a problem of finding flying tours for $K$ K given UAVs to collaboratively monitor PoIs in a disaster area, such that the maximum spent time of the $K$ K UAVs among their tours is minimized, where the spent time of a UAV in its tour consists of the flying time and the PoI monitoring time. We then propose a novel $5\frac{1}{3}$ 5 1 3 -approximation algorithm for the problem, improving the best approximation ratio 6 so far for the problem of minimizing the longest flying distance among the UAVs. In addition, we extend the proposed algorithm to the case that each UAV may not be able to monitor all PoIs assigned to it, due to its limited maximum flying time (e.g., 30 minutes), and the UAV must return to its depot to replace its battery. We finally evaluate the performance of the proposed algorithms via simulation environments, and experimental results show that the proposed algorithms are very promising. Especially, the maximum spent times of the $K$ K UAVs in their tours by the proposed algorithms are up to 30 percent shorter than those by existing algorithms. In addition, the empirical approximation ratios of the proposed algorithms are no more than 2.4, which are much smaller than their theoretical approximation ratios that are at least $5\frac{1}{3}$ 5 1 3 . [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Shortened Linear Codes From APN and PN Functions.
- Author
-
Xiang, Can, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,BINARY codes ,CODING theory ,REED-Muller codes ,GENERATING functions ,NONLINEAR functions - Abstract
Linear codes generated by component functions of perfect nonlinear (PN for short) and almost perfect nonlinear (APN for short) functions and the first-order Reed-Muller codes have been an object of intensive study in coding theory. The objective of this paper is to investigate some binary shortened codes of two families of linear codes from APN functions and some $p$ -ary shortened codes associated with PN functions. The weight distributions of these shortened codes and the parameters of their duals are determined. The parameters of these binary codes and $p$ -ary codes are flexible. Many of the codes presented in this paper are optimal or almost optimal. The results of this paper show that the shortening technique is very promising for constructing good codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. SANet: Statistic Attention Network for Video-Based Person Re-Identification.
- Author
-
Bai, Shutao, Ma, Bingpeng, Chang, Hong, Huang, Rui, Shan, Shiguang, and Chen, Xilin
- Subjects
FEATURE extraction ,SOURCE code ,PEDESTRIANS ,MACHINE learning ,IDENTIFICATION ,POSE estimation (Computer vision) - Abstract
Capturing long-range dependencies during feature extraction is crucial for video-based person re-identification (re-id) since it would help to tackle many challenging problems such as occlusion and dramatic pose variation. Moreover, capturing subtle differences, such as bags and glasses, is indispensable to distinguish similar pedestrians. In this paper, we propose a novel and efficacious Statistic Attention (SA) block which can capture both the long-range dependencies and subtle differences. SA block leverages high-order statistics of feature maps, which contain both long-range and high-order information. By modeling relations with these statistics, SA block can explicitly capture long-range dependencies with less time complexity. In addition, high-order statistics usually concentrate on details of feature maps and can perceive the subtle differences between pedestrians. In this way, SA block is capable of discriminating pedestrians with subtle differences. Furthermore, this lightweight block can be conveniently inserted into existing deep neural networks at any depth to form Statistic Attention Network (SANet). To evaluate its performance, we conduct extensive experiments on two challenging video re-id datasets, showing that our SANet outperforms the state-of-the-art methods. Furthermore, to show the generalizability of SANet, we evaluate it on three image re-id datasets and two more general image classification datasets, including ImageNet. The source code is available at http://vipl.ict.ac.cn/resources/codes/code/SANet_code.zip. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Optimal Caching for Low Latency in Distributed Coded Storage Systems.
- Author
-
Liu, Kaiyang, Peng, Jun, Wang, Jingrong, and Pan, Jianping
- Subjects
INFORMATION retrieval ,WIDE area networks ,STORAGE ,INFORMATION networks ,MARKET prices ,MULTICASTING (Computer networks) - Abstract
Erasure codes have been widely considered as a promising solution to enhance data reliability at low storage costs. However, in modern geo-distributed storage systems, erasure codes may incur high data access latency as they require data retrieval from multiple remote storage nodes. This hinders the extensive application of erasure codes to data-intensive applications. This paper proposes novel caching schemes to achieve low latency in distributed coded storage systems. Assuming that future data popularity and network latency information are available, an offline caching scheme is proposed to explore the optimal caching solution for low latency. The proposed scheme categorizes all feasible caching decisions into a set of cache partitions, and then obtains the optimal caching decision through market clearing price for each cache partition. Furthermore, guided by the optimal scheme, an online caching scheme is proposed according to the measured data popularity and network latency information in real time, without the need to completely override the existing caching decisions. Both theoretical analysis and experiment results demonstrate that the online scheme can approximate the offline optimal scheme well with dramatically reduced computation complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. GFocus: User Focus-Based Graph Query Autocompletion.
- Author
-
Yi, Peipei, Choi, Byron, Zhang, Zhiwei, Bhowmick, Sourav S, and Xu, Jianliang
- Subjects
SUBMODULAR functions ,GENERATING functions ,COMPUTER science ,ALGORITHMS ,SOCIAL interaction ,HUMAN-computer interaction - Abstract
Graph query autocompletion (gQAC) generates a small list of ranked query suggestions during the graph query formulation process in a visual environment. The current state-of-the-art of gQAC provides suggestions that are formed by adding subgraph increments to arbitrary places of an existing (partial) user query. However, according to the research results on human-computer interaction (HCI), humans can only interact with a small number of recent software artifacts in hand. Hence, many of such suggestions could be irrelevant. In this paper, we present the GFocus framework that exploits a novel notion of user focus of graph query formulation (or simply focus). Intuitively, the focus is the subgraph that a user is working on. We formulate locality principles inspired by the HCI research to automatically identify and maintain the focus. We propose novel monotone submodular ranking functions for generating popular and comprehensive query suggestions only at the focus. In particular, the query suggestions of GFocus have high result counts (when they are used as queries) and maximally cover the possible suggestions at the focus. We propose efficient algorithms and an index for ranking the suggestions. Our results show that GFocus saves 12-32 percent more mouse clicks and is 35× more efficient than the state-of-the-art competitor. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches.
- Author
-
Chen, Xiang, Liu, Hongyan, Huang, Qun, Zhang, Dong, Zhou, Haifeng, Wu, Chunming, Liu, Xuan, and Khan, Muhammad Khurram
- Abstract
Due to limited memory usage and provably high accuracy, sketches running on programmable switches have been commonly used by the literature for network measurement. However, their vulnerabilities are still largely unknown and neglected, which is highly concerning given the increasing popularity of network measurement. In this paper, we identify the Stalker attacks, where attackers aim to degrade the accuracy of sketches running on programmable switches. More precisely, attackers tamper with some sketch operations during sketch deployment atop programmable switches. At runtime, the tampered sketch will record highly inaccurate flow data, which degrades measurement accuracy. We implement Stalker attacks on Tofino switches. The results indicate that Stalker attacks significantly drop the accuracy of network management applications, e.g., reducing the F1 score of heavy hitter detection to zero. However, our analysis indicates that none of existing methods can detect Stalker attacks since they can hardly verify the correctness of sketch operations. Finally, we analyze potential defense mechanisms and identify challenges to enable further research in this context. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
- Author
-
Zhang, Shigeng, Chen, Shuxin, Hua, Chengyao, Li, Zhetao, Li, Yanchun, Liu, Xuan, Chen, Kai, Li, Zhankai, and Wang, Weiping
- Abstract
Deep neural network (DNN) models have been widely used in many tasks due to their superior performance. However, DNN models are usually vulnerable to adversarial example attacks, which limits their applications in many safety-critic scenarios. How to effectively detect adversarial examples to enhance the robustness of DNN models has attracted much attention in recent years. Most adversarial example detection methods require modifying or retraining the model, which is impractical and reduces the classification accuracy of normal examples. In this paper, we propose an adversarial example detection approach that does not require modification of the DNN models and meanwhile retains the classification accuracy of normal examples. The key observation is that when we transform the input example with some operations (e.g., masking a pixel with a reference value), feed the transformed example to the target model, and use the output of the intermediate layers to predict the label of the example, the generated label sequences of adversarial examples will be extremely discrepant but the label sequences of normal examples keep nearly unchanged. Motivated by this observation, we design an approach to detect adversarial examples based on the label sequence discrepancy (LSD) of the given examples. The experimental results against five mainstream adversarial attacks on three benchmark datasets demonstrate that LSD outperforms the state-of-the-art solutions in the detection rate of adversarial examples. Moreover, LSD performs well at various confidence levels and exhibits good generalizability between different attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
27. The High Faulty Tolerant Capability of the Alternating Group Graphs.
- Author
-
Zhang, Hui, Hao, Rong-Xia, Qin, Xiao-Wen, Lin, Cheng-Kuan, and Hsieh, Sun-Yuan
- Subjects
FAULT tolerance (Engineering) ,WIRELESS communications - Abstract
The matroidal connectivity and conditional matroidal connectivity are novel indicators to measure the real faulty tolerability. In this paper, for the $n$ n -dimensional alternating group graph $AG_{n}$ A G n , the structure properties and (conditional) matroidal connectivity are studied based on the dimensional partition of $E(AG_{n})$ E (A G n) . We prove that for $S\subseteq E(AG_{n})$ S ⊆ E (A G n) under some limitation on the number of faulty edges in each dimensional edge set, if $|S|\leq (n-1)!-1$ | S | ≤ (n - 1) ! - 1 , then $AG_{n}-S$ A G n - S is connected. We study the value of matroidal connectivity and conditional matroidal connectivity of $AG_{n}$ A G n . Furthermore, simulations have been carried out to compare the matroidal connectivity with other types of conditional connectivity in $AG_{n}$ A G n . The simulation result shows that the matroidal connectivity significantly improves these known fault-tolerant capability of alternating group graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Cross-Session Emotion Recognition by Joint Label-Common and Label-Specific EEG Features Exploration.
- Author
-
Peng, Yong, Liu, Honggang, Li, Junhua, Huang, Jun, Lu, Bao-Liang, and Kong, Wanzeng
- Subjects
EMOTION recognition ,ELECTROENCEPHALOGRAPHY ,EMOTIONAL state ,SPARSE matrices ,AFFECTIVE neuroscience ,WAKEFULNESS - Abstract
Since Electroencephalogram (EEG) is resistant to camouflage, it has been a reliable data source for objective emotion recognition. EEG is naturally multi-rhythm and multi-channel, based on which we can extract multiple features for further processing. In EEG-based emotion recognition, it is important to investigate whether there exist some common features shared by different emotional states, and the specific features associated with each emotional state. However, such fundamental problem is ignored by most of the existing studies. To this end, we propose a Joint label-Common and label-Specific Features Exploration (JCSFE) model for semi-supervised cross-session EEG emotion recognition in this paper. To be specific, JCSFE imposes the $\ell _{\text {2,1}}$ -norm on the projection matrix to explore the label-common EEG features and simultaneously the $\ell _{{1}}$ -norm is used to explore the label-specific EEG features. Besides, a graph regularization term is introduced to enforce the data local invariance property, i.e., similar EEG samples are encouraged to have the same emotional state. Results obtained from the SEED-IV and SEED-V emotional data sets experimentally demonstrate that JCSFE not only achieves superior emotion recognition performance in comparison with the state-of-the-art models but also provides us with a quantitative method to identify the label-common and label-specific EEG features in emotion recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Computational Thinking and User Interfaces: A Systematic Review.
- Author
-
Rijo-Garcia, Sara, Segredo, Eduardo, and Leon, Coromoto
- Subjects
USER interfaces ,SYSTEMS design ,USER experience ,COMPUTER science ,HUMAN behavior - Abstract
Contribution: This document presents a systematic bibliographic review that demonstrates the need to conduct research on how the user experience impacts the development of computational thinking. Background: In the field of computer science, computational thinking is defined as a method that enhances problem-solving skills, system design, and human behavior understanding. Over the last few decades, several tools have been proposed for the development of computational thinking skills; however, there is no area of study that evaluates the implications or the impact that these types of platforms have on users belonging to any knowledge area. Research Question: Do user interfaces influence the development of computational thinking skills? Methodology: To address this issue, a systematic review of the literature was conducted using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) methodology for analyzing and evaluating scientific publications. Findings: The results show that despite the dearth of literature on the subject, the specific design of a user interface has a significant impact on the development of computational thinking. Bearing the above in mind, it is necessary to conduct research that delves more deeply into the effects caused by the technologies that are used to develop computational thinking, this being a line of research that is worthy of consideration. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
30. Automatic Itinerary Planning Using Triple-Agent Deep Reinforcement Learning.
- Author
-
Chen, Bo-Hao, Han, Jin, Chen, Shengxin, Yin, Jia-Li, and Chen, Zhaojiong
- Abstract
Automatic itinerary planning that provides an epic journey for each traveler is a fundamental yet inefficient task. Most existing planning methods apply heuristic guidelines for certain objective, and thereby favor popular preferred point of interests (POIs) with high probability, which ignore the intrinsic correlation between the POIs exploration, traveler’s preferences, and distinctive attractions. To tackle the itinerary planning problem, this paper explores the connections of these three objectives in probabilistic manner based on a Bayesian model and proposes a triple-agent deep reinforcement learning approach, which generates 4-way direction, 4-way distance, and 3-way selection strategy for iteratively determining next POI to visit in the itinerary. Experiments on five real-world cities demonstrate that our triple-agent deep reinforcement learning approach can provide better planning results in comparison with state-of-the-art multiobjective optimization methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Deep Adaptively-Enhanced Hashing With Discriminative Similarity Guidance for Unsupervised Cross-Modal Retrieval.
- Author
-
Shi, Yufeng, Zhao, Yue, Liu, Xin, Zheng, Feng, Ou, Weihua, You, Xinge, and Peng, Qinmu
- Subjects
LABOR costs ,INFORMATION theory ,LEARNING ability ,MODAL logic ,INFORMATION design - Abstract
Cross-modal hashing that leverages hash functions to project high-dimensional data from different modalities into the compact common hamming space, has shown immeasurable potential in cross-modal retrieval. To ease labor costs, unsupervised cross-modal hashing methods are proposed. However, existing unsupervised methods still suffer from two factors in the optimization of hash functions: 1) similarity guidance, they barely give a clear definition of whether is similar or not between data points, leading to the residual of the redundant information; 2) optimization strategy, they ignore the fact that the similarity learning abilities of different hash functions are different, which makes the hash function of one modality weaker than the hash function of the other modality. To alleviate such limitations, this paper proposes an unsupervised cross-modal hashing method to train hash functions with discriminative similarity guidance and adaptively-enhanced optimization strategy, termed Deep Adaptively-Enhanced Hashing (DAEH). Specifically, to estimate the similarity relations with discriminability, Information Mixed Similarity Estimation (IMSE) is designed by integrating information from distance distributions and the similarity ratio. Moreover, Adaptive Teacher Guided Enhancement (ATGE) optimization strategy is also designed, which employs information theory to discover the weaker hash function and utilizes an extra teacher network to enhance it. Extensive experiments on three benchmark datasets demonstrate the superiority of the proposed DAEH against the state-of-the-arts. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
32. JAN: Joint Attention Networks for Automatic ICD Coding.
- Author
-
Wu, Yuzhou, Chen, Zhigang, Yao, Xin, Chen, Xuechen, Zhou, Zeren, and Xue, Jinkai
- Subjects
DEEP learning ,NOSOLOGY ,MACHINE learning ,LINEAR network coding ,MEDICAL coding ,PROBLEM solving - Abstract
The International Classification of Diseases (ICD) code is a disease classification method formulated by the World Health Organization(WHO). ICD coding usually requires clinicians to manually allocate ICD codes to clinical documents, which is labor-intensive, expensive, and error-prone. Therefore, many methods have been introduced for automatic ICD coding. However, most of the methods have ignored or cannot combine two essential features well: long-tailed label distribution and label correlation. In this paper, we propose a novel end-to-end Joint Attention Network (JAN) to solve these two problems. JAN includes Document-based attention and Label-based attention to capture semantic information from clinical document text and label description, respectively, which helps solve the classification of dense and sparse data in long-tailed label distribution. Besides, an Adaptive fusion layer and CorNet block are presented to adaptively adjust the weight of these two attentions and exploit label co-occurrence relations, respectively. Experiments on the MIMIC-III and MIMIC-II datasets demonstrate that our proposed JAN outperformed previous state-of-art methods achieving Micro-F1 of 0.553, Micro-AUC of 0.989 and precision at top 8(P@8) of 0.735. Finally, we also provide attention and label correlation visualization to verify the effectiveness of our model and improve the interpretation of our deep learning-based method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
33. Challenges in KNN Classification.
- Subjects
DATA mining ,COMPUTER science ,CLASSIFICATION ,PARALLEL algorithms - Abstract
The KNN algorithm is one of the most popular data mining algorithms. It has been widely and successfully applied to data analysis applications across a variety of research topics in computer science. This paper illustrates that, despite its success, there remain many challenges in KNN classification, including K computation, nearest neighbor selection, nearest neighbor search and classification rules. Having established these issues, recent approaches to their resolution are examined in more detail, thereby providing a potential roadmap for ongoing KNN-related research, as well as some new classification rules regarding how to tackle the issue of training sample imbalance. To evaluate the proposed approaches, some experiments were conducted with 15 UCI benchmark datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. The Subfield Codes and Subfield Subcodes of a Family of MDS Codes.
- Author
-
Tang, Chunming, Wang, Qi, and Ding, Cunsheng
- Subjects
CYCLIC codes ,LIQUID crystal displays ,LINEAR codes - Abstract
Maximum distance separable (MDS) codes are very important in both theory and practice. There is a classical construction of a family of $[{2^{m}+1, 2u-1, 2^{m}-2u+3}]$ MDS codes for $1 \leq u \leq 2^{m-1}$ , which are cyclic, reversible and BCH codes over ${\mathrm {GF}}(2^{m})$. The objective of this paper is to study the quaternary subfield subcodes and quaternary subfield codes of a subfamily of the MDS codes for even $m$. A family of quaternary cyclic codes is obtained. These quaternary codes are distance-optimal in some cases and very good in general. Furthermore, two infinite families of 3-designs from these quaternary codes and their duals are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
35. Maximizing the Diversity of Exposure in a Social Network.
- Author
-
Matakos, Antonis, Aslay, Cigdem, Galbrun, Esther, and Gionis, Aristides
- Subjects
SOCIAL networks ,SUBMODULAR functions ,APPROXIMATION algorithms ,RANDOM sets ,GREEDY algorithms - Abstract
Social-media platforms have created new ways for citizens to stay informed and participate in public debates. However, to enable a healthy environment for information sharing, social deliberation, and opinion formation, citizens need to be exposed to sufficiently diverse viewpoints that challenge their assumptions, instead of being trapped inside filter bubbles. In this paper, we take a step in this direction and propose a novel approach to maximize the diversity of exposure in a social network. We formulate the problem in the context of information propagation, as a task of recommending a small number of news articles to selected users. In the proposed setting, we take into account content and user leanings, and the probability of further sharing an article. Our model allows to capture the balance between maximizing the spread of information and ensuring the exposure of users to diverse viewpoints. The resulting problem can be cast as maximizing a monotone and submodular function, subject to a matroid constraint on the allocation of articles to users. It is a challenging generalization of the influence-maximization problem. Yet, we are able to devise scalable approximation algorithms by introducing a novel extension to the notion of random reverse-reachable sets. We experimentally demonstrate the efficiency and scalability of our algorithm on several real-world datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
36. Q -Ary Non-Overlapping Codes: A Generating Function Approach.
- Author
-
Wang, Geyang and Wang, Qi
- Subjects
GENERATING functions ,BINARY codes ,QUALITY factor ,HUFFMAN codes ,PROBLEM solving ,PATTERN matching ,GENERALIZATION - Abstract
Non-overlapping codes are a set of codewords in $\bigcup _{n \ge 2} \mathbb {Z}_{q}^{n}$ , where $\mathbb {Z}_{q} = \{0,1, {\dots },q-1\}$ , such that the prefix of each codeword is not a suffix of any codeword in the set, including itself; and for variable-length codes, a codeword does not contain any other codeword as a subword. In this paper, we investigate a generic method to generalize binary codes to $q$ -ary ones for $q > 2$ , and analyze this generalization on the two constructions given by Levenshtein (also by Gilbert; Chee, Kiah, Purkayastha, and Wang) and Bilotta, respectively. The generalization on the former construction gives large non-expandable fixed-length non-overlapping codes whose size can be explicitly determined; the generalization on the latter construction is the first attempt to generate $q$ -ary variable-length non-overlapping codes. More importantly, this generic method allows us to utilize the generating function approach to analyze the cardinality of the underlying $q$ -ary non-overlapping codes. The generating function approach not only enables us to derive new results, e.g., recurrence relations on their cardinalities, new combinatorial interpretations for the constructions, and the superior limit of their cardinalities for some special cases, but also greatly simplifies the arguments for these results. Furthermore, we give an exact formula for the number of fixed-length words that do not contain the codewords in a variable-length non-overlapping code as subwords. This thereby solves an open problem by Bilotta and induces a recursive upper bound on the maximum size of variable-length non-overlapping codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Towards Query Pricing on Incomplete Data.
- Author
-
Miao, Xiaoye, Gao, Yunjun, Chen, Lu, Peng, Huanhuan, Yin, Jianwei, and Li, Qing
- Subjects
SOCIAL values ,FIDDLER crabs ,NETWORK governance - Abstract
Data have significant economic or social value in many application fields including science, business, governance, etc. This naturally leads to the emergence of many data markets such as GBDEx and YoueData. As a result, the data trade through data markets has started to receive attentions from both industry and academia. During the data buying and selling, how to price the data is an indispensable problem. However, pricing incomplete data is more challenging, even though incomplete data exist pervasively in a vast lot of real-life scenarios. In this paper, we attempt to explore the pricing problem for queries over incomplete data. We propose a sophisticated pricing mechanism, termed as ${\sf iDBPricer}$ iDBPricer , which takes a series of essential factors into consideration, including the data contribution/usage, data completeness, and query quality. We present two novel price functions, namely, the usage, and completeness-aware price function (UCA price for short) and the quality, usage, and completeness-aware price function (QUCA price for short). Moreover, we develop efficient algorithms for deriving the query prices. Extensive experiments using both real and benchmark datasets demonstrate ${\sf iDBPricer}$ iDBPricer is of excellent performance in terms of effectiveness and scalability, compared with the state-of-the-art price functions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. A Structure-Aware Storage Optimization for Out-of-Core Concurrent Graph Processing.
- Author
-
Liao, Xiaofei, Zhao, Jin, Zhang, Yu, He, Bingsheng, He, Ligang, Jin, Hai, and Gu, Lin
- Abstract
With the huge demand for graph analytics in many real-world applications, massive iterative graph processing jobs are concurrently performed on the same graphs and suffer from significant high data access cost. To lower the data access cost toward high performance, several out-of-core concurrent graph processing solutions are recently designed to handle concurrent jobs by enabling these jobs to share the accesses of the same graph data. However, the set of active vertices in each partition are usually different for various concurrent jobs and also evolve with time, where some high-degree ones (or called hub-vertices) of these active vertices require more iterations to converge due to the power-law property of real-world graphs. In consequence, existing solutions still suffer from much unnecessary I/O traffic, because they have to entirely load each partition into the memory for concurrent jobs even if most vertices in this partition are inactive and may be shared by a few jobs. In this paper, we propose an efficient structure-aware storage system, called GraphSO, for higher throughput of the execution of concurrent graph processing jobs. It can be integrated into existing out-of-core graph processing systems to promote the execution efficiency of concurrent jobs with lower I/O overhead. The key design of GraphSO is a fine-grained storage management scheme. Specifically, it logically divides the partitions of existing graph processing systems into a series of small same-sized chunks. At runtime, these small chunks with active vertices are judiciously loaded by GraphSO to construct new logical partitions (i.e., each logical partition is a subset of active chunks) for existing graph processing systems to handle, where the most-frequently-used chunks are preferentially loaded to construct the logical partitions and the other ones are delayed to wait to be required by more jobs. In this way, it can effectively spare the cost of loading the graph data associated with the inactive vertices with low repartitioning overhead and can also enable the loaded graph data to be fully shared by concurrent jobs. Moreover, GraphSO also designs a buffering strategy to efficiently cache the most-frequently-used chunks in the main memory to further minimize the I/O traffic by avoiding repeated load of them. Experimental results show that GraphSO improves the throughput of GridGraph, GraphChi, X-Stream, DynamicShards, LUMOS, Graphene, and Wonderland by 1.4-3.5 times, 2.1-4.3 times, 1.9-4.1 times, 1.9-2.9 times, 1.5-3.1 times, 1.3-1.5 times, and 1.3-2.7 times after integrating with them, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
39. Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems.
- Author
-
Wang, Ke, Li, Fengjun, Chen, Chien-Ming, Hassan, Mohammad Mehedi, Long, Jinyi, and Kumar, Neeraj
- Abstract
Deep learning-based auto-driving systems are vulnerable to adversarial examples attacks which may result in wrong decision making and accidents. An adversarial example can fool the well trained neural networks by adding barely imperceptible perturbations to clean data. In this paper, we explore the mechanism of adversarial examples and adversarial robustness from the perspective of statistical mechanics, and propose an statistical mechanics-based interpretation model of adversarial robustness. The state transition caused by adversarial training based on the theory of fluctuation dissipation disequilibrium in statistical mechanics is formally constructed. Besides, we fully study the adversarial example attacks and training process on system robustness, including the influence of different training processes on network robustness. Our work is helpful to understand and explain the adversarial examples problems and improve the robustness of deep learning-based auto-driving systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
40. Locality Filtering for Efficient Ride Sharing Platforms.
- Author
-
Tosoni, Francesco, Ferragina, Paolo, Marino, Andrea, Resta, Giovanni, and Santi, Paolo
- Abstract
Ride sharing has a tremendous potential to reduce the number of vehicles needed to serve a certain mobility demand. However, although ride sourcing services have flourished in recent years and are widely available worldwide (e.g. Uber, Didi, Lyft, Via), known ride sharing techniques still suffer severe scalability limitations, especially if the goal is combining multiple on-demand ride requests into a single trip within a large urban area. In the context of on-demand mobility systems, a complete enumeration of all candidate trip requests is unfortunately not a practical approach to find the optimal ride sharing solution. An efficient filtering approach is therefore needed in order to avoid both the storage of quadratic shortest-path lookup tables, as well as the exhaustive pairwise comparison of all mobility requests, with their GPS coordinates and time constraints. In this paper we present a ride sharing algorithm, which combined with the shareability networks method, is able to substantially speed up known approaches while only minimally impacting on the quality of the computed solution. The key building block is a novel locality filter, which allows to build a pruned version of the shareability network more efficiently in time and space than previous works. We corroborate this novel proposal with a large set of experiments executed over a dataset consisting of one month of trip requests (~106) performed in two different urban areas, namely Manhattan (NYC) and Singapore. Our experiments show that our approach achieves a $5\times $ speed-up, or even more during so-called “rush times”, and it is robust under different traffic conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. Complementary Data Augmentation for Cloth-Changing Person Re-Identification.
- Author
-
Jia, Xuemei, Zhong, Xian, Ye, Mang, Liu, Wenxuan, and Huang, Wenxin
- Subjects
DATA augmentation ,GENERATIVE adversarial networks - Abstract
This paper studies the challenging person re-identification (Re-ID) task under the cloth-changing scenario, where the same identity (ID) suffers from uncertain cloth changes. To learn cloth- and ID-invariant features, it is crucial to collect abundant training data with varying clothes, which is difficult in practice. To alleviate the reliance on rich data collection, we reinforce the feature learning process by designing powerful complementary data augmentation strategies, including positive and negative data augmentation. Specifically, the positive augmentation fulfills the ID space by randomly patching the person images with different clothes, simulating rich appearance to enhance the robustness against clothes variations. For negative augmentation, its basic idea is to randomly generate out-of-distribution synthetic samples by combining various appearance and posture factors from real samples. The designed strategies seamlessly reinforce the feature learning without additional information introduction. Extensive experiments conducted on both cloth-changing and -unchanging tasks demonstrate the superiority of our proposed method, consistently improving the accuracy over various baselines. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. Weakly Supervised Learning for Textbook Question Answering.
- Author
-
Ma, Jie, Chai, Qi, Huang, Jingyue, Liu, Jun, You, Yang, and Zheng, Qinghua
- Subjects
TEXTBOOKS ,MONTE Carlo method ,TASK forces ,UNIFIED modeling language - Abstract
Textbook Question Answering (TQA) is the task of answering diagram and non-diagram questions given large multi-modal contexts consisting of abundant text and diagrams. Deep text understandings and effective learning of diagram semantics are important for this task due to its specificity. In this paper, we propose a Weakly Supervised learning method for TQA (WSTQ), which regards the incompletely accurate results of essential intermediate procedures for this task as supervision to develop Text Matching (TM) and Relation Detection (RD) tasks and then employs the tasks to motivate itself to learn strong text comprehension and excellent diagram semantics respectively. Specifically, we apply the result of text retrieval to build positive as well as negative text pairs. In order to learn deep text understandings, we first pre-train the text understanding module of WSTQ on TM and then fine-tune it on TQA. We build positive as well as negative relation pairs by checking whether there is any overlap between the items/regions detected from diagrams using object detection. The RD task forces our method to learn the relationships between regions, which are crucial to express the diagram semantics. We train WSTQ on RD and TQA simultaneously, i.e., multitask learning, to obtain effective diagram semantics and then improve the TQA performance. Extensive experiments are carried out on CK12-QA and AI2D to verify the effectiveness of WSTQ. Experimental results show that our method achieves significant accuracy improvements of 5.02% and 4.12% on test splits of the above datasets respectively than the current state-of-the-art baseline. We have released our code on https://github.com/dr-majie/WSTQ. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
43. Single Image Super-Resolution Quality Assessment: A Real-World Dataset, Subjective Studies, and an Objective Metric.
- Author
-
Jiang, Qiuping, Liu, Zhentao, Gu, Ke, Shao, Feng, Zhang, Xinfeng, Liu, Hantao, and Lin, Weisi
- Subjects
HIGH resolution imaging ,HUMAN experimentation ,IMAGE segmentation ,ALGORITHMS ,COMPUTER science - Abstract
Numerous single image super-resolution (SISR) algorithms have been proposed during the past years to reconstruct a high-resolution (HR) image from its low-resolution (LR) observation. However, how to fairly compare the performance of different SISR algorithms/results remains a challenging problem. So far, the lack of comprehensive human subjective study on large-scale real-world SISR datasets and accurate objective SISR quality assessment metrics makes it unreliable to truly understand the performance of different SISR algorithms. We in this paper make efforts to tackle these two issues. Firstly, we construct a real-world SISR quality dataset (i.e., RealSRQ) and conduct human subjective studies to compare the performance of the representative SISR algorithms. Secondly, we propose a new objective metric, i.e., KLTSRQA, based on the Karhunen-Loéve Transform (KLT) to evaluate the quality of SISR images in a no-reference (NR) manner. Experiments on our constructed RealSRQ and the latest synthetic SISR quality dataset (i.e., QADS) have demonstrated the superiority of our proposed KLTSRQA metric, achieving higher consistency with human subjective scores than relevant existing NR image quality assessment (NR-IQA) metrics. The dataset and the code will be made available at https://github.com/Zhentao-Liu/RealSRQ-KLTSRQA. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Facial Action Unit Detection Using Attention and Relation Learning.
- Author
-
Shao, Zhiwen, Liu, Zhilei, Cai, Jianfei, Wu, Yunsheng, and Ma, Lizhuang
- Abstract
Attention mechanism has recently attracted increasing attentions in the field of facial action unit (AU) detection. By finding the region of interest of each AU with the attention mechanism, AU-related local features can be captured. Most of the existing attention based AU detection works use prior knowledge to predefine fixed attentions or refine the predefined attentions within a small range, which limits their capacity to model various AUs. In this paper, we propose an end-to-end deep learning based attention and relation learning framework for AU detection with only AU labels, which has not been explored before. In particular, multi-scale features shared by each AU are learned first, and then both channel-wise and spatial attentions are adaptively learned to select and extract AU-related local features. Moreover, pixel-level relations for AUs are further captured to refine spatial attentions so as to extract more relevant local features. Without changing the network architecture, our framework can be easily extended for AU intensity estimation. Extensive experiments show that our framework (i) soundly outperforms the state-of-the-art methods for both AU detection and AU intensity estimation on the challenging BP4D, DISFA, FERA 2015, and BP4D+ benchmarks, (ii) can adaptively capture the correlated regions of each AU, and (iii) also works well under severe occlusions and large poses. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. GAN-Based Enhanced Deep Subspace Clustering Networks.
- Author
-
Yu, Zhiwen, Zhang, Zhongfan, Cao, Wenming, Liu, Cheng, Chen, C. L. Philip, and Wong, Hau-San
- Subjects
GENERATIVE adversarial networks ,LEARNING modules ,SELF-adaptive software - Abstract
In this paper, we propose two GAN-based deep subspace clustering approaches: deep subspace clustering via dual adversarial generative networks (DSC-DAG) and self-supervised deep subspace clustering with adversarial generative networks (S $^2$ 2 DSC-AG). In DSC-DAG, the distributions of both the inputs and corresponding latent representations are learnt via adversarial training simultaneously. Besides, there are two kinds of synthetic representations to facilitate the fine-tuning of the encoder: the combinations of latent representations with random combination coefficients and representations of real-like inputs derived from noise variables. In S $^2$ 2 DSC-AG, a self-supervised information learning module substitutes for adversarial learning in the latent space, since both of them play the same role in learning discriminative latent representations. We analyze connections between these methods and demonstrate their equivalences. We conduct extensive experiments on multiple real-world data sets against state-of-the-art subspace clustering methods in terms of accuracy, normalized mutual information and purity. Experimental results demonstrate the effectiveness and superiority of our proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Preference-Aware Task Assignment in Spatial Crowdsourcing: From Individuals to Groups.
- Author
-
Zhao, Yan, Zheng, Kai, Yin, Hongzhi, Liu, Guanfeng, Fang, Junhua, and Zhou, Xiaofang
- Subjects
CROWDSOURCING ,SMART devices ,TASKS ,PERFORMANCE theory - Abstract
With the ubiquity of smart devices, Spatial Crowdsourcing (SC) has emerged as a new transformative platform that engages mobile users to perform spatio-temporal tasks by physically traveling to specified locations. Thus, various SC techniques have been studied for performance optimization, among which one of the major challenges is how to assign workers the tasks that they are really interested in and willing to perform. In this paper, we propose a novel preference-aware spatial task assignment system based on workers’ temporal preferences, which consists of two components: History-based Context-aware Tensor Decomposition (HCTD) for workers’ temporal preferences modeling and preference-aware task assignment. We model workers’ preferences with a three-dimension tensor (worker-task-time). Supplementing the missing entries of the tensor through HCTD with the assistant of historical data and other two context matrices, we recover workers’ preferences for different categories of tasks in different time slots. Several preference-aware individual task assignment algorithms are then devised, aiming to maximize the total number of task assignments at every time instance, in which we give higher priorities to the workers who are more interested in the tasks. In order to make our proposed framework applicable to more scenarios, we further optimize the original framework by proposing strategies to allow each task to be assigned to a group of workers such that the task can be completed by these workers simultaneously, wherein workers’ tolerable waiting time, consensus, and tasks’ rewards are taken into consideration. We conduct extensive experiments using a real dataset, verifying the practicability of our proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. A Robust Coverless Steganography Scheme Using Camouflage Image.
- Author
-
Liu, Qiang, Xiang, Xuyu, Qin, Jiaohua, Tan, Yun, and Zhang, Qin
- Subjects
CRYPTOGRAPHY ,CONVOLUTIONAL neural networks ,IMAGE transmission - Abstract
Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ability of coverless information hiding. Towards this goal, this paper proposes a robust coverless steganography scheme using camouflage image(CI-CIS). For the sender, CI-CIS introduces an camouflage image as the transmission carrier and establishes the correlation between them by Convolutional Neural Network(CNN) features. For the receiver, the camouflage image can retrieve the corresponding stego-image to recover the secret information. To this end, we designed a reversible retrieval scheme between stego-image and camouflage image by using image clustering. At the same time, since the semantic features represented by CNN are robust to image attacks, our method can increase the capability of the CIS effectively. Besides, we also build an inverted index to improve retrieval efficiency. Experimental results and analysis show that the CI-CIS has higher robustness and more flexible capacity setting compared with the existing CIS methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. Comments on “SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage”.
- Author
-
Yu, Jia and Hao, Rong
- Abstract
Provable Data Possession is viewed as an important technique to check the integrity of the data stored in remote servers. Recently, a new provable data possession scheme [Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage, IEEE Transactions on Services Computing, (2018) Doi: 10.1109/TSC.2018.2820713] was proposed. The authors claimed this scheme can guarantee the storage correction. In this paper, we show this scheme cannot satisfy this fundamental security. Specifically, we demonstrate the malicious cloud can generate a proof to pass the third party auditor's verification even if it does not store the user's whole file. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
49. Efficient Ancilla-Free Reversible and Quantum Circuits for the Hidden Weighted Bit Function.
- Author
-
Bravyi, Sergey, Yoder, Theodore J., and Maslov, Dmitri
- Subjects
CIRCUIT complexity ,QUANTUM computing ,COMPUTER science ,HAMMING weight ,LOGIC circuits - Abstract
The Hidden Weighted Bit function plays an important role in the study of classical models of computation. A common belief is that this function is exponentially hard to implement using reversible ancilla-free circuits, even though introducing a small number of ancillae allows a very efficient implementation. In this paper, we refute the exponential hardness conjecture by developing a polynomial-size reversible ancilla-free circuit computing the Hidden Weighted Bit function. Our circuit has size $O(n^{6.42})$ O (n 6. 42) , where $n$ n is the number of input bits. We also show that the Hidden Weighted Bit function can be computed by a quantum ancilla-free circuit of size $O(n^2)$ O (n 2) . The technical tools employed come from a combination of Theoretical Computer Science (Barrington's theorem) and Physics (simulation of fermionic Hamiltonians) techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
50. Quaternary Linear Codes and Related Binary Subfield Codes.
- Author
-
Wu, Yansheng, Li, Chengju, and Xiao, Fu
- Subjects
BINARY codes ,LINEAR codes ,SPHERE packings ,CODE generators - Abstract
In this paper, we mainly study quaternary linear codes and their binary subfield codes. First we obtain a general explicit relationship between quaternary linear codes and their binary subfield codes in terms of generator matrices and defining sets. Second, we construct quaternary linear codes via simplicial complexes and determine the weight distributions of these codes. Third, the weight distributions of the binary subfield codes of these quaternary codes are also computed by employing the general characterization. Furthermore, we present two infinite families of optimal linear codes with respect to the Griesmer Bound, and a class of binary almost optimal codes with respect to the Sphere Packing Bound. We also need to emphasize that we obtain at least 9 new quaternary linear codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.