Skip to main content

Showing 1–50 of 411 results for author: Xuemin

.
  1. arXiv:2410.20711  [pdf, other

    cs.LG cs.AI q-bio.BM

    Contextual Representation Anchor Network to Alleviate Selection Bias in Few-Shot Drug Discovery

    Authors: Ruifeng Li, Wei Liu, Xiangxin Zhou, Mingqian Li, Qiang Zhang, Hongyang Chen, Xuemin Lin

    Abstract: In the drug discovery process, the low success rate of drug candidate screening often leads to insufficient labeled data, causing the few-shot learning problem in molecular property prediction. Existing methods for few-shot molecular property prediction overlook the sample selection bias, which arises from non-random sample selection in chemical experiments. This bias in data representativeness le… ▽ More

    Submitted 29 October, 2024; v1 submitted 27 October, 2024; originally announced October 2024.

    Comments: 13 pages, 7 figures

    MSC Class: 68U07 ACM Class: I.2.1

  2. arXiv:2410.20151  [pdf, other

    cs.NI

    A Digital Twin-based Intelligent Network Architecture for Underwater Acoustic Sensor Networks

    Authors: Shanshan Song, Bingwen Huangfu, Jiani Guo, Jun Liu, Junhong Cui, Xuemin, Shen

    Abstract: Underwater acoustic sensor networks (UASNs) drive toward strong environmental adaptability, intelligence, and multifunctionality. However, due to unique UASN characteristics, such as long propagation delay, dynamic channel quality, and high attenuation, existing studies present untimeliness, inefficiency, and inflexibility in real practice. Digital twin (DT) technology is promising for UASNs to br… ▽ More

    Submitted 26 October, 2024; originally announced October 2024.

  3. arXiv:2410.19354  [pdf, ps, other

    math.RT

    Characteristic polynomials for classical Lie algebras

    Authors: Chenyue Feng, Shoumin Liu, Xumin Wang

    Abstract: In this paper, we will compute the characteristic polynomials for finite dimensional representations of classical complex Lie algebras and the exceptional Lie algebra of type G2, which can be obtained through the orbits of integral weights under the action of their corresponding Weyl groups and the invariant polynomial theory of the Weyl groups. We show that the characteristic polynomials can be d… ▽ More

    Submitted 25 October, 2024; originally announced October 2024.

    Comments: 26pages

  4. arXiv:2410.06480  [pdf, other

    cs.LG

    TCGU: Data-centric Graph Unlearning based on Transferable Condensation

    Authors: Fan Li, Xiaoyang Wang, Dawei Cheng, Wenjie Zhang, Ying Zhang, Xuemin Lin

    Abstract: With growing demands for data privacy and model robustness, graph unlearning (GU), which erases the influence of specific data on trained GNN models, has gained significant attention. However, existing exact unlearning methods suffer from either low efficiency or poor model performance. While being more utility-preserving and efficient, current approximate unlearning methods are not applicable in… ▽ More

    Submitted 8 October, 2024; originally announced October 2024.

    Comments: 14 pages, 18 figures

  5. arXiv:2410.02688  [pdf, other

    cs.NI cs.AI

    User-centric Immersive Communications in 6G: A Data-oriented Approach via Digital Twin

    Authors: Conghao Zhou, Shisheng Hu, Jie Gao, Xinyu Huang, Weihua Zhuang, Xuemin Shen

    Abstract: In this article, we present a novel user-centric service provision for immersive communications (IC) in 6G to deal with the uncertainty of individual user behaviors while satisfying unique requirements on the quality of multi-sensory experience. To this end, we propose a data-oriented approach for network resource management, featuring personalized data management that can support network modeling… ▽ More

    Submitted 3 October, 2024; originally announced October 2024.

  6. arXiv:2409.18128  [pdf, other

    cs.CV

    FlowTurbo: Towards Real-time Flow-Based Image Generation with Velocity Refiner

    Authors: Wenliang Zhao, Minglei Shi, Xumin Yu, Jie Zhou, Jiwen Lu

    Abstract: Building on the success of diffusion models in visual generation, flow-based models reemerge as another prominent family of generative models that have achieved competitive or better performance in terms of both visual quality and inference speed. By learning the velocity field through flow-matching, flow-based models tend to produce a straighter sampling trajectory, which is advantageous during t… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

    Comments: Accepted to NeurIPS 2024

  7. arXiv:2409.15695  [pdf, other

    cs.NI cs.AI cs.CR

    Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks

    Authors: Jiayi He, Xiaofeng Luo, Jiawen Kang, Hongyang Du, Zehui Xiong, Ci Chen, Dusit Niyato, Xuemin Shen

    Abstract: Semantic Communication (SemCom) plays a pivotal role in 6G networks, offering a viable solution for future efficient communication. Deep Learning (DL)-based semantic codecs further enhance this efficiency. However, the vulnerability of DL models to security threats, such as adversarial attacks, poses significant challenges for practical applications of SemCom systems. These vulnerabilities enable… ▽ More

    Submitted 23 September, 2024; originally announced September 2024.

    Comments: 8 pages, 3 figures

  8. arXiv:2409.00324  [pdf, other

    cs.NI

    User-centric Service Provision for Edge-assisted Mobile AR: A Digital Twin-based Approach

    Authors: Conghao Zhou, Jie Gao, Yixiang Liu, Shisheng Hu, Nan Cheng, Xuemin Shen

    Abstract: Future 6G networks are envisioned to support mobile augmented reality (MAR) applications and provide customized immersive experiences for users via advanced service provision. In this paper, we investigate user-centric service provision for edge-assisted MAR to support the timely camera frame uploading of an MAR device by optimizing the spectrum resource reservation. To address the challenge of no… ▽ More

    Submitted 30 August, 2024; originally announced September 2024.

  9. arXiv:2408.11398  [pdf, other

    eess.SP

    Generative AI based Secure Wireless Sensing for ISAC Networks

    Authors: Jiacheng Wang, Hongyang Du, Yinqiu Liu, Geng Sun, Dusit Niyato, Shiwen Mao, Dong In Kim, Xuemin Shen

    Abstract: Integrated sensing and communications (ISAC) is expected to be a key technology for 6G, and channel state information (CSI) based sensing is a key component of ISAC. However, current research on ISAC focuses mainly on improving sensing performance, overlooking security issues, particularly the unauthorized sensing of users. In this paper, we propose a secure sensing system (DFSS) based on two dist… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  10. arXiv:2408.08593  [pdf, other

    cs.LG eess.SY

    RadioDiff: An Effective Generative Diffusion Model for Sampling-Free Dynamic Radio Map Construction

    Authors: Xiucheng Wang, Keda Tao, Nan Cheng, Zhisheng Yin, Zan Li, Yuan Zhang, Xuemin Shen

    Abstract: Radio map (RM) is a promising technology that can obtain pathloss based on only location, which is significant for 6G network applications to reduce the communication costs for pathloss estimation. However, the construction of RM in traditional is either computationally intensive or depends on costly sampling-based pathloss measurements. Although the neural network (NN)-based method can efficientl… ▽ More

    Submitted 2 November, 2024; v1 submitted 16 August, 2024; originally announced August 2024.

  11. arXiv:2408.05432  [pdf, other

    cs.DB

    Simpler is More: Efficient Top-K Nearest Neighbors Search on Large Road Networks

    Authors: Yiqi Wang, Long Yuan, Wenjie Zhang, Xuemin Lin, Zi Chen, Qing Liu

    Abstract: Top-k Nearest Neighbors (kNN) problem on road network has numerous applications on location-based services. As direct search using the Dijkstra's algorithm results in a large search space, a plethora of complex-index-based approaches have been proposed to speedup the query processing. However, even with the current state-of-the-art approach, long query processing delays persist, along with signifi… ▽ More

    Submitted 10 August, 2024; originally announced August 2024.

    Comments: 15 pages, 15 figures

  12. arXiv:2407.15320  [pdf, other

    cs.DC cs.AI cs.LG cs.NI

    Edge Graph Intelligence: Reciprocally Empowering Edge Networks with Graph Intelligence

    Authors: Liekang Zeng, Shengyuan Ye, Xu Chen, Xiaoxi Zhang, Ju Ren, Jian Tang, Yang Yang, Xuemin, Shen

    Abstract: Recent years have witnessed a thriving growth of computing facilities connected at the network edge, cultivating edge computing networks as a fundamental infrastructure for supporting miscellaneous intelligent services. Meanwhile, Artificial Intelligence frontiers have extrapolated Machine Learning to the graph domain and promoted Graph Intelligence (GI), which unlocks unprecedented ability in lea… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: 38 pages, 14 figures

  13. arXiv:2407.10980  [pdf, ps, other

    cs.NI

    Learning-based Big Data Sharing Incentive in Mobile AIGC Networks

    Authors: Jinbo Wen, Yang Zhang, Yulin Chen, Weifeng Zhong, Xumin Huang, Lei Liu, Dusit Niyato

    Abstract: Rapid advancements in wireless communication have led to a dramatic upsurge in data volumes within mobile edge networks. These substantial data volumes offer opportunities for training Artificial Intelligence-Generated Content (AIGC) models to possess strong prediction and decision-making capabilities. AIGC represents an innovative approach that utilizes sophisticated generative AI algorithms to a… ▽ More

    Submitted 31 July, 2024; v1 submitted 10 June, 2024; originally announced July 2024.

  14. arXiv:2407.08047   

    cs.LG cs.AI

    Spatial-Temporal Attention Model for Traffic State Estimation with Sparse Internet of Vehicles

    Authors: Jianzhe Xue, Dongcheng Yuan, Yu Sun, Tianqi Zhang, Wenchao Xu, Haibo Zhou, Xuemin, Shen

    Abstract: The growing number of connected vehicles offers an opportunity to leverage internet of vehicles (IoV) data for traffic state estimation (TSE) which plays a crucial role in intelligent transportation systems (ITS). By utilizing only a portion of IoV data instead of the entire dataset, the significant overheads associated with collecting and processing large amounts of data can be avoided. In this p… ▽ More

    Submitted 14 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: need further improvement

  15. arXiv:2407.03954  [pdf, other

    cs.DB

    Efficient Maximal Frequent Group Enumeration in Temporal Bipartite Graphs

    Authors: Yanping Wu, Renjie Sun, Xiaoyang Wang, Dong Wen, Ying Zhang, Lu Qin, Xuemin Lin

    Abstract: Cohesive subgraph mining is a fundamental problem in bipartite graph analysis. In reality, relationships between two types of entities often occur at some specific timestamps, which can be modeled as a temporal bipartite graph. However, the temporal information is widely neglected by previous studies. Moreover, directly extending the existing models may fail to find some critical groups in tempora… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  16. arXiv:2406.13964  [pdf, other

    cs.NI

    Hierarchical Micro-Segmentations for Zero-Trust Services via Large Language Model (LLM)-enhanced Graph Diffusion

    Authors: Yinqiu Liu, Guangyuan Liu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim, Xuemin Shen

    Abstract: In the rapidly evolving Next-Generation Networking (NGN) era, the adoption of zero-trust architectures has become increasingly crucial to protect security. However, provisioning zero-trust services in NGNs poses significant challenges, primarily due to the environmental complexity and dynamics. Motivated by these challenges, this paper explores efficient zero-trust service provisioning using hiera… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 13 pages

  17. arXiv:2406.09687  [pdf

    cond-mat.mes-hall cond-mat.str-el

    Interplay between topology and correlations in the second moiré band of twisted bilayer MoTe2

    Authors: Fan Xu, Xumin Chang, Jiayong Xiao, Yixin Zhang, Feng Liu, Zheng Sun, Ning Mao, Nikolai Peshcherenko, Jiayi Li, Kenji Watanabe, Takashi Taniguchi, Bingbing Tong, Li Lu, Jinfeng Jia, Dong Qian, Zhiwen Shi, Yang Zhang, Xiaoxue Liu, Shengwei Jiang, Tingxin Li

    Abstract: Topological flat bands formed in two-dimensional lattice systems offer unique opportunity to study the fractional phases of matter in the absence of an external magnetic field. Celebrated examples include fractional quantum anomalous Hall (FQAH) effects and fractional topological insulators. Recently, FQAH effects have been experimentally realized in both the twisted bilayer MoTe2 (tMoTe2) system… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  18. arXiv:2406.09089  [pdf, other

    cs.LG

    DiffPoGAN: Diffusion Policies with Generative Adversarial Networks for Offline Reinforcement Learning

    Authors: Xuemin Hu, Shen Li, Yingfen Xu, Bo Tang, Long Chen

    Abstract: Offline reinforcement learning (RL) can learn optimal policies from pre-collected offline datasets without interacting with the environment, but the sampled actions of the agent cannot often cover the action distribution under a given state, resulting in the extrapolation error issue. Recent works address this issue by employing generative adversarial networks (GANs). However, these methods often… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  19. arXiv:2406.07857  [pdf, other

    eess.SY cs.LG cs.NI

    Toward Enhanced Reinforcement Learning-Based Resource Management via Digital Twin: Opportunities, Applications, and Challenges

    Authors: Nan Cheng, Xiucheng Wang, Zan Li, Zhisheng Yin, Tom Luan, Xuemin Shen

    Abstract: This article presents a digital twin (DT)-enhanced reinforcement learning (RL) framework aimed at optimizing performance and reliability in network resource management, since the traditional RL methods face several unified challenges when applied to physical networks, including limited exploration efficiency, slow convergence, poor long-term performance, and safety concerns during the exploration… ▽ More

    Submitted 15 June, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    Comments: 7pages, 6figures

  20. arXiv:2406.01137  [pdf, other

    cs.RO

    Configuration Space Distance Fields for Manipulation Planning

    Authors: Yiming Li, Xuemin Chi, Amirreza Razmjoo, Sylvain Calinon

    Abstract: The signed distance field is a popular implicit shape representation in robotics, providing geometric information about objects and obstacles in a form that can easily be combined with control, optimization and learning techniques. Most often, SDFs are used to represent distances in task space, which corresponds to the familiar notion of distances that we perceive in our 3D world. However, SDFs ca… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

    Comments: 13 pages, 10 figures. Accepted to Robotics: Science and Systems(RSS), 2024

  21. Adaptive Device-Edge Collaboration on DNN Inference in AIoT: A Digital Twin-Assisted Approach

    Authors: Shisheng Hu, Mushu Li, Jie Gao, Conghao Zhou, Xuemin Shen

    Abstract: Device-edge collaboration on deep neural network (DNN) inference is a promising approach to efficiently utilizing network resources for supporting artificial intelligence of things (AIoT) applications. In this paper, we propose a novel digital twin (DT)-assisted approach to device-edge collaboration on DNN inference that determines whether and when to stop local inference at a device and upload th… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

    Journal ref: IEEE Internet Things J. (Volume: 11, Issue: 7, 01 April 2024)

  22. arXiv:2405.12871  [pdf, other

    cs.DB

    Efficient Influence Minimization via Node Blocking

    Authors: Jinghao Wang, Yanping Wu, Xiaoyang Wang, Ying Zhang, Lu Qin, Wenjie Zhang, Xuemin Lin

    Abstract: Given a graph G, a budget k and a misinformation seed set S, Influence Minimization (IMIN) via node blocking aims to find a set of k nodes to be blocked such that the expected spread of S is minimized. This problem finds important applications in suppressing the spread of misinformation and has been extensively studied in the literature. However, existing solutions for IMIN still incur significant… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  23. EntropyStop: Unsupervised Deep Outlier Detection with Loss Entropy

    Authors: Yihong Huang, Yuang Zhang, Liping Wang, Fan Zhang, Xuemin Lin

    Abstract: Unsupervised Outlier Detection (UOD) is an important data mining task. With the advance of deep learning, deep Outlier Detection (OD) has received broad interest. Most deep UOD models are trained exclusively on clean datasets to learn the distribution of the normal data, which requires huge manual efforts to clean the real-world data if possible. Instead of relying on clean datasets, some approach… ▽ More

    Submitted 28 June, 2024; v1 submitted 21 May, 2024; originally announced May 2024.

  24. arXiv:2405.11293  [pdf, other

    cs.CV

    InfRS: Incremental Few-Shot Object Detection in Remote Sensing Images

    Authors: Wuzhou Li, Jiawei Zhou, Xiang Li, Yi Cao, Guang Jin, Xuemin Zhang

    Abstract: Recently, the field of few-shot detection within remote sensing imagery has witnessed significant advancements. Despite these progresses, the capacity for continuous conceptual learning still poses a significant challenge to existing methodologies. In this paper, we explore the intricate task of incremental few-shot object detection in remote sensing images. We introduce a pioneering fine-tuningba… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

  25. arXiv:2405.04198  [pdf, other

    cs.CR

    Enhancing Physical Layer Communication Security through Generative AI with Mixture of Experts

    Authors: Changyuan Zhao, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim, Xuemin, Shen, Khaled B. Letaief

    Abstract: AI technologies have become more widely adopted in wireless communications. As an emerging type of AI technologies, the generative artificial intelligence (GAI) gains lots of attention in communication security. Due to its powerful learning ability, GAI models have demonstrated superiority over conventional AI methods. However, GAI still has several limitations, including high computational comple… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 9 pages, 4 figures

  26. arXiv:2405.01221  [pdf, other

    cs.NI

    A Survey on Semantic Communication Networks: Architecture, Security, and Privacy

    Authors: Shaolong Guo, Yuntao Wang, Ning Zhang, Zhou Su, Tom H. Luan, Zhiyi Tian, Xuemin Shen

    Abstract: Semantic communication, emerging as a breakthrough beyond the classical Shannon paradigm, aims to convey the essential meaning of source data rather than merely focusing on precise yet content-agnostic bit transmission. By interconnecting diverse intelligent agents (e.g., autonomous vehicles and VR devices) via semantic communications, the semantic communication networks (SemComNet) supports seman… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  27. arXiv:2404.19449  [pdf, other

    cs.IT

    AoI-aware Sensing Scheduling and Trajectory Optimization for Multi-UAV-assisted Wireless Backscatter Networks

    Authors: Yusi Long, Songhan Zhao, Shimin Gong, Bo Gu, Dusit Niyato, Xuemin, Shen

    Abstract: This paper considers multiple unmanned aerial vehicles (UAVs) to assist sensing data transmissions from the ground users (GUs) to a remote base station (BS). Each UAV collects sensing data from the GUs and then forwards the sensing data to the remote BS. The GUs first backscatter their data to the UAVs and then all UAVs forward data to the BS by the nonorthogonal multiple access (NOMA) transmissio… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted by IEEE TVT

  28. arXiv:2404.16356  [pdf, other

    cs.NI cs.AI cs.LG

    Integration of Mixture of Experts and Multimodal Generative AI in Internet of Vehicles: A Survey

    Authors: Minrui Xu, Dusit Niyato, Jiawen Kang, Zehui Xiong, Abbas Jamalipour, Yuguang Fang, Dong In Kim, Xuemin, Shen

    Abstract: Generative AI (GAI) can enhance the cognitive, reasoning, and planning capabilities of intelligent modules in the Internet of Vehicles (IoV) by synthesizing augmented datasets, completing sensor data, and making sequential decisions. In addition, the mixture of experts (MoE) can enable the distributed and collaborative execution of AI models without performance degradation between connected vehicl… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

  29. arXiv:2404.14692  [pdf, other

    cs.SI cs.DB physics.soc-ph

    Deep Overlapping Community Search via Subspace Embedding

    Authors: Qing Sima, Jianke Yu, Xiaoyang Wang, Wenjie Zhang, Ying Zhang, Xuemin Lin

    Abstract: Community search (CS) aims to identify a set of nodes based on a specified query, leveraging structural cohesiveness and attribute homogeneity. This task enjoys various applications, ranging from fraud detection to recommender systems. In contrast to algorithm-based approaches, graph neural network (GNN) based methods define communities using ground truth labels, leveraging prior knowledge to expl… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  30. arXiv:2404.13898  [pdf, other

    cs.NI

    Cross-Modal Generative Semantic Communications for Mobile AIGC: Joint Semantic Encoding and Prompt Engineering

    Authors: Yinqiu Liu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Shiwen Mao, Ping Zhang, Xuemin Shen

    Abstract: Employing massive Mobile AI-Generated Content (AIGC) Service Providers (MASPs) with powerful models, high-quality AIGC services can become accessible for resource-constrained end users. However, this advancement, referred to as mobile AIGC, also introduces a significant challenge: users should download large AIGC outputs from the MASPs, leading to substantial bandwidth consumption and potential tr… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  31. arXiv:2404.13749  [pdf, other

    cs.NI

    Efficient Digital Twin Data Processing for Low-Latency Multicast Short Video Streaming

    Authors: Xinyu Huang, Shisheng Hu, Mushu Li, Cheng Huang, Xuemin Shen

    Abstract: In this paper, we propose a novel efficient digital twin (DT) data processing scheme to reduce service latency for multicast short video streaming. Particularly, DT is constructed to emulate and analyze user status for multicast group update and swipe feature abstraction. Then, a precise measurement model of DT data processing is developed to characterize the relationship among DT model size, user… ▽ More

    Submitted 21 April, 2024; originally announced April 2024.

    Comments: 6 pages, 6 figures, submitted to ICCC 2024

  32. arXiv:2404.13158  [pdf, other

    cs.NI

    Resource Slicing with Cross-Cell Coordination in Satellite-Terrestrial Integrated Networks

    Authors: Mingcheng He, Huaqing Wu, Conghao Zhou, Xuemin, Shen

    Abstract: Satellite-terrestrial integrated networks (STIN) are envisioned as a promising architecture for ubiquitous network connections to support diversified services. In this paper, we propose a novel resource slicing scheme with cross-cell coordination in STIN to satisfy distinct service delay requirements and efficient resource usage. To address the challenges posed by spatiotemporal dynamics in servic… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

    Comments: Accepted by IEEE ICC 2024

  33. arXiv:2404.12545  [pdf, other

    cs.CL

    Latent Concept-based Explanation of NLP Models

    Authors: Xuemin Yu, Fahim Dalvi, Nadir Durrani, Marzia Nouri, Hassan Sajjad

    Abstract: Interpreting and understanding the predictions made by deep learning models poses a formidable challenge due to their inherently opaque nature. Many previous efforts aimed at explaining these predictions rely on input features, specifically, the words within NLP models. However, such explanations are often less informative due to the discrete nature of these words and their lack of contextual verb… ▽ More

    Submitted 7 October, 2024; v1 submitted 18 April, 2024; originally announced April 2024.

    Comments: Accepted by EMNLP 2024 Main Conference

  34. arXiv:2404.11825  [pdf, other

    cs.LG

    Hypergraph Self-supervised Learning with Sampling-efficient Signals

    Authors: Fan Li, Xiaoyang Wang, Dawei Cheng, Wenjie Zhang, Ying Zhang, Xuemin Lin

    Abstract: Self-supervised learning (SSL) provides a promising alternative for representation learning on hypergraphs without costly labels. However, existing hypergraph SSL models are mostly based on contrastive methods with the instance-level discrimination strategy, suffering from two significant limitations: (1) They select negative samples arbitrarily, which is unreliable in deciding similar and dissimi… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 9 pages,4 figures,4 tables

  35. arXiv:2404.08899  [pdf, other

    cs.NI

    ProSecutor: Protecting Mobile AIGC Services on Two-Layer Blockchain via Reputation and Contract Theoretic Approaches

    Authors: Yinqiu Liu, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Abbas Jamalipour, Xuemin, Shen

    Abstract: Mobile AI-Generated Content (AIGC) has achieved great attention in unleashing the power of generative AI and scaling the AIGC services. By employing numerous Mobile AIGC Service Providers (MASPs), ubiquitous and low-latency AIGC services for clients can be realized. Nonetheless, the interactions between clients and MASPs in public mobile networks, pertaining to three key mechanisms, namely MASP se… ▽ More

    Submitted 13 April, 2024; originally announced April 2024.

    Comments: 17 pages

  36. arXiv:2404.06182  [pdf, other

    cs.NI

    Streamlined Transmission: A Semantic-Aware XR Deployment Framework Enhanced by Generative AI

    Authors: Wanting Yang, Zehui Xiong, Tony Q. S. Quek, Xuemin Shen

    Abstract: In the era of 6G, featuring compelling visions of digital twins and metaverses, Extended Reality (XR) has emerged as a vital conduit connecting the digital and physical realms, garnering widespread interest. Ensuring a fully immersive wireless XR experience stands as a paramount technical necessity, demanding the liberation of XR from the confines of wired connections. In this paper, we first intr… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: Under review with IEEE Network

  37. arXiv:2404.06037  [pdf, other

    cs.DC

    A Survey of Distributed Graph Algorithms on Massive Graphs

    Authors: Lingkai Meng, Yu Shao, Long Yuan, Longbin Lai, Peng Cheng, Xue Li, Wenyuan Yu, Wenjie Zhang, Xuemin Lin, Jingren Zhou

    Abstract: Distributed processing of large-scale graph data has many practical applications and has been widely studied. In recent years, a lot of distributed graph processing frameworks and algorithms have been proposed. While many efforts have been devoted to analyzing these, with most analyzing them based on programming models, less research focuses on understanding their challenges in distributed environ… ▽ More

    Submitted 28 October, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

  38. arXiv:2404.04898  [pdf, other

    cs.IT

    Graph Neural Network Meets Multi-Agent Reinforcement Learning: Fundamentals, Applications, and Future Directions

    Authors: Ziheng Liu, Jiayi Zhang, Enyu Shi, Zhilong Liu, Dusit Niyato, Bo Ai, Xuemin, Shen

    Abstract: Multi-agent reinforcement learning (MARL) has become a fundamental component of next-generation wireless communication systems. Theoretically, although MARL has the advantages of low computational complexity and fast convergence rate, there exist several challenges including partial observability, non-stationary, and scalability. In this article, we investigate a novel MARL with graph neural netwo… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

  39. arXiv:2404.03025  [pdf, other

    cs.NI

    When Digital Twin Meets Generative AI: Intelligent Closed-Loop Network Management

    Authors: Xinyu Huang, Haojun Yang, Conghao Zhou, Mingcheng He, Xuemin Shen, Weihua Zhuang

    Abstract: Generative artificial intelligence (GAI) and digital twin (DT) are advanced data processing and virtualization technologies to revolutionize communication networks. Thanks to the powerful data processing capabilities of GAI, integrating it into DT is a potential approach to construct an intelligent holistic virtualized network for better network management performance. To this end, we propose a GA… ▽ More

    Submitted 8 April, 2024; v1 submitted 3 April, 2024; originally announced April 2024.

    Comments: 8 pages, 5 figures

  40. arXiv:2403.18874  [pdf, other

    cs.SI

    Neural Attributed Community Search at Billion Scale

    Authors: Jianwei Wang, Kai Wang, Xuemin Lin, Wenjie Zhang, Ying Zhang

    Abstract: Community search has been extensively studied in the past decades. In recent years, there is a growing interest in attributed community search that aims to identify a community based on both the query nodes and query attributes. A set of techniques have been investigated. Though the recent methods based on advanced learning models such as graph neural networks (GNNs) can achieve state-of-the-art p… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  41. arXiv:2403.18869  [pdf, other

    cs.SI cs.DB

    Efficient Unsupervised Community Search with Pre-trained Graph Transformer

    Authors: Jianwei Wang, Kai Wang, Xuemin Lin, Wenjie Zhang, Ying Zhang

    Abstract: Community search has aroused widespread interest in the past decades. Among existing solutions, the learning-based models exhibit outstanding performance in terms of accuracy by leveraging labels to 1) train the model for community score learning, and 2) select the optimal threshold for community identification. However, labeled data are not always available in real-world scenarios. To address thi… ▽ More

    Submitted 29 March, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

  42. arXiv:2403.18209  [pdf, other

    cs.LG cs.AI cs.RO

    Long and Short-Term Constraints Driven Safe Reinforcement Learning for Autonomous Driving

    Authors: Xuemin Hu, Pan Chen, Yijun Wen, Bo Tang, Long Chen

    Abstract: Reinforcement learning (RL) has been widely used in decision-making and control tasks, but the risk is very high for the agent in the training process due to the requirements of interaction with the environment, which seriously limits its industrial applications such as autonomous driving systems. Safe RL methods are developed to handle this issue by constraining the expected safety violation cost… ▽ More

    Submitted 12 September, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

  43. arXiv:2403.16408  [pdf, other

    cs.NI eess.SP

    Accuracy-Aware Cooperative Sensing and Computing for Connected Autonomous Vehicles

    Authors: Xuehan Ye, Kaige Qu, Weihua Zhuang, Xuemin Shen

    Abstract: To maintain high perception performance among connected and autonomous vehicles (CAVs), in this paper, we propose an accuracy-aware and resource-efficient raw-level cooperative sensing and computing scheme among CAVs and road-side infrastructure. The scheme enables fined-grained partial raw sensing data selection, transmission, fusion, and processing in per-object granularity, by exploiting the pa… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  44. arXiv:2403.12398  [pdf, other

    cs.NI

    Hierarchical Digital Twin for Efficient 6G Network Orchestration via Adaptive Attribute Selection and Scalable Network Modeling

    Authors: Pengyi Jia, Xianbin Wang, Xuemin Shen

    Abstract: Achieving a holistic and long-term understanding through accurate network modeling is essential for orchestrating future networks with increasing service diversity and infrastructure complexities. However, due to unselective data collection and uniform processing, traditional modeling approaches undermine the efficacy and timeliness of network orchestration. Additionally, temporal disparities aris… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  45. arXiv:2403.11099  [pdf, other

    cs.DB

    Wait to be Faster: a Smart Pooling Framework for Dynamic Ridesharing

    Authors: Xiaoyao Zhong, Jiabao Jin, Peng Cheng, Wangze Ni, Libin Zheng, Lei Chen, Xuemin Lin

    Abstract: Ridesharing services, such as Uber or Didi, have attracted considerable attention in recent years due to their positive impact on environmental protection and the economy. Existing studies require quick responses to orders, which lack the flexibility to accommodate longer wait times for better grouping opportunities. In this paper, we address a NP-hard ridesharing problem, called Minimal Extra Tim… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: IEEE ICDE 2024

  46. arXiv:2403.10043  [pdf, other

    cs.RO

    GeoPro-VO: Dynamic Obstacle Avoidance with Geometric Projector Based on Velocity Obstacle

    Authors: Jihao Huang, Xuemin Chi, Jun Zeng, Zhitao Liu, Hongye Su

    Abstract: Optimization-based approaches are widely employed to generate optimal robot motions while considering various constraints, such as robot dynamics, collision avoidance, and physical limitations. It is crucial to efficiently solve the optimization problems in practice, yet achieving rapid computations remains a great challenge for optimization-based approaches with nonlinear constraints. In this pap… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

  47. arXiv:2403.09263  [pdf, ps, other

    math.FA

    A noncommutative maximal inequality for Fejér means on totally disconnected non-abelian groups

    Authors: Fugui Ding, Guixiang Hong, Xumin Wang

    Abstract: In this paper, we explore Fourier analysis for noncommutative $L_p$ space-valued functions on $G$, where $G$ is a totally disconnected non-abelian compact group. By additionally assuming that the value of these functions remains invariant within each conjugacy class, we establish a noncommutative maximal inequality for Fejér means utilizing the associated character system of $G$. This is an operat… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    MSC Class: 43A75; 42B25; 43A50

  48. arXiv:2402.13667  [pdf, other

    cs.CL

    GCOF: Self-iterative Text Generation for Copywriting Using Large Language Model

    Authors: Jianghui Zhou, Ya Gao, Jie Liu, Xuemin Zhao, Zhaohua Yang, Yue Wu, Lirong Shi

    Abstract: Large language models(LLM) such as ChatGPT have substantially simplified the generation of marketing copy, yet producing content satisfying domain specific requirements, such as effectively engaging customers, remains a significant challenge. In this work, we introduce the Genetic Copy Optimization Framework (GCOF) designed to enhance both efficiency and engagememnt of marketing copy creation. We… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 8 pages, 5 figures, 1 table

  49. arXiv:2402.13553  [pdf, other

    cs.CR

    Generative AI for Secure Physical Layer Communications: A Survey

    Authors: Changyuan Zhao, Hongyang Du, Dusit Niyato, Jiawen Kang, Zehui Xiong, Dong In Kim, Xuemin, Shen, Khaled B. Letaief

    Abstract: Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content. Beyond content creation, GAI has significant analytical abilities to learn complex data distribution, offering numerous opportunities to resolve security issues. In the realm of security from physical layer perspectives, trad… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 22pages, 8figs

  50. arXiv:2402.12304  [pdf, other

    math.NA

    Analysis of the Picard-Newton iteration for the Navier-Stokes equations: global stability and quadratic convergence

    Authors: Sara Pollock, Leo Rebholz, Xuemin Tu, Menyging Xiao

    Abstract: We analyze and test a simple-to-implement two-step iteration for the incompressible Navier-Stokes equations that consists of first applying the Picard iteration and then applying the Newton iteration to the Picard output. We prove that this composition of Picard and Newton converges quadratically, and our analysis (which covers both the unique solution and non-unique solution cases) also suggests… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.