Skip to main content

Showing 1–17 of 17 results for author: Chan, W K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.14114  [pdf

    cs.SE cs.AI

    A3Rank: Augmentation Alignment Analysis for Prioritizing Overconfident Failing Samples for Deep Learning Models

    Authors: Zhengyuan Wei, Haipeng Wang, Qilin Zhou, W. K. Chan

    Abstract: Sharpening deep learning models by training them with examples close to the decision boundary is a well-known best practice. Nonetheless, these models are still error-prone in producing predictions. In practice, the inference of the deep learning models in many application systems is guarded by a rejector, such as a confidence-based rejector, to filter out samples with insufficient prediction conf… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  2. arXiv:2407.07457  [pdf, other

    cs.LG cs.CL

    GLBench: A Comprehensive Benchmark for Graph with Large Language Models

    Authors: Yuhan Li, Peisong Wang, Xiao Zhu, Aochuan Chen, Haiyun Jiang, Deng Cai, Victor Wai Kin Chan, Jia Li

    Abstract: The emergence of large language models (LLMs) has revolutionized the way we interact with graphs, leading to a new paradigm called GraphLLM. Despite the rapid development of GraphLLM methods in recent years, the progress and understanding of this field remain unclear due to the lack of a benchmark with consistent experimental protocols. To bridge this gap, we introduce GLBench, the first comprehen… ▽ More

    Submitted 11 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: text overlap with arXiv:2306.10280 by other authors

  3. arXiv:2405.07668  [pdf, other

    cs.SE cs.AI cs.CR

    CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models

    Authors: Qilin Zhou, Zhengyuan Wei, Haipeng Wang, Bo Jiang, W. K. Chan

    Abstract: Patch robustness certification is an emerging kind of defense technique against adversarial patch attacks with provable guarantees. There are two research lines: certified recovery and certified detection. They aim to label malicious samples with provable guarantees correctly and issue warnings for malicious samples predicted to non-benign labels with provable guarantees, respectively. However, ex… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 23 pages, 2 figures, accepted by FSE 2024 (The ACM International Conference on the Foundations of Software Engineering)

  4. arXiv:2405.01824  [pdf, other

    cs.RO cs.AI

    Creation of Novel Soft Robot Designs using Generative AI

    Authors: Wee Kiat Chan, PengWei Wang, Raye Chen-Hua Yeow

    Abstract: Soft robotics has emerged as a promising field with the potential to revolutionize industries such as healthcare and manufacturing. However, designing effective soft robots presents challenges, particularly in managing the complex interplay of material properties, structural design, and control strategies. Traditional design methods are often time-consuming and may not yield optimal designs. In th… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  5. arXiv:2311.02398  [pdf, other

    cs.IR cs.AI cs.LG cs.SI

    CDR-Adapter: Learning Adapters to Dig Out More Transferring Ability for Cross-Domain Recommendation Models

    Authors: Yanyu Chen, Yao Yao, Wai Kin Victor Chan, Li Xiao, Kai Zhang, Liang Zhang, Yun Ye

    Abstract: Data sparsity and cold-start problems are persistent challenges in recommendation systems. Cross-domain recommendation (CDR) is a promising solution that utilizes knowledge from the source domain to improve the recommendation performance in the target domain. Previous CDR approaches have mainly followed the Embedding and Mapping (EMCDR) framework, which involves learning a mapping function to faci… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

    Comments: 8 pages, 4 figures, 5 tables, Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval Workshop on eCommerce

  6. arXiv:2309.02317  [pdf, other

    cs.SE cs.LG

    A study on the impact of pre-trained model on Just-In-Time defect prediction

    Authors: Yuxiang Guo, Xiaopeng Gao, Zhenyu Zhang, W. K. Chan, Bo Jiang

    Abstract: Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained models as backbones. In this study, we build six models: RoBERTaJIT, CodeBERTJIT, BARTJIT, PLBARTJIT, GPT2JIT, and CodeGPTJIT, each with a distinct pre-trained model as its backbone. W… ▽ More

    Submitted 23 November, 2023; v1 submitted 5 September, 2023; originally announced September 2023.

    Comments: Accepted by QRS2023

  7. arXiv:2308.00452  [pdf, other

    cs.LG cs.CV cs.SE

    A Majority Invariant Approach to Patch Robustness Certification for Deep Learning Models

    Authors: Qilin Zhou, Zhengyuan Wei, Haipeng Wang, W. K. Chan

    Abstract: Patch robustness certification ensures no patch within a given bound on a sample can manipulate a deep learning model to predict a different label. However, existing techniques cannot certify samples that cannot meet their strict bars at the classifier or patch region levels. This paper proposes MajorCert. MajorCert firstly finds all possible label sets manipulatable by the same patch region on th… ▽ More

    Submitted 7 September, 2023; v1 submitted 1 August, 2023; originally announced August 2023.

    Comments: 5 pages, 2 figures, accepted for inclusion in the ASE 2023 NIER track

  8. arXiv:2307.02752  [pdf, other

    cs.LG cs.AI

    Offline Reinforcement Learning with Imbalanced Datasets

    Authors: Li Jiang, Sijie Cheng, Jielin Qiu, Haoran Xu, Wai Kin Chan, Zhao Ding

    Abstract: The prevalent use of benchmarks in current offline reinforcement learning (RL) research has led to a neglect of the imbalance of real-world dataset distributions in the development of models. The real-world offline RL dataset is often imbalanced over the state space due to the challenge of exploration or safety considerations. In this paper, we specify properties of imbalanced datasets in offline… ▽ More

    Submitted 20 May, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

    Journal ref: ICML 2023, workshop on Data-centric Machine Learning Research

  9. arXiv:2303.15810  [pdf, other

    cs.LG cs.AI

    Offline RL with No OOD Actions: In-Sample Learning via Implicit Value Regularization

    Authors: Haoran Xu, Li Jiang, Jianxiong Li, Zhuoran Yang, Zhaoran Wang, Victor Wai Kin Chan, Xianyuan Zhan

    Abstract: Most offline reinforcement learning (RL) methods suffer from the trade-off between improving the policy to surpass the behavior policy and constraining the policy to limit the deviation from the behavior policy as computing $Q$-values using out-of-distribution (OOD) actions will suffer from errors due to distributional shift. The recently proposed \textit{In-sample Learning} paradigm (i.e., IQL),… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: ICLR 2023 notable top 5%

  10. arXiv:2206.15116  [pdf

    cs.CG eess.SY

    A Constructive Heuristic Algorithm for 3D Bin Packing of Irregular Shaped Items

    Authors: Qiruyi Zuo, Xinglu Liu, Wai Kin Victor Chan

    Abstract: The three-dimensional bin packing problem (3D-BPP) plays an important role in city logistics and manufacturing environments, due to its direct relevance to operational cost. Most existing literature have investigated the conventional 3D-BPP, in which the shape of items are typically considered as regular shapes, e.g., rectangular-shaped rigid boxes or cylindrical-shaped containers. However, 3D-BPP… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

  11. arXiv:2202.03424  [pdf, other

    cs.LG cs.AI cs.DM eess.SY math.OC

    Reinforcement learning for multi-item retrieval in the puzzle-based storage system

    Authors: Jing He, Xinglu Liu, Qiyao Duan, Wai Kin Victor Chan, Mingyao Qi

    Abstract: Nowadays, fast delivery services have created the need for high-density warehouses. The puzzle-based storage system is a practical way to enhance the storage density, however, facing difficulties in the retrieval process. In this work, a deep reinforcement learning algorithm, specifically the Double&Dueling Deep Q Network, is developed to solve the multi-item retrieval problem in the system with g… ▽ More

    Submitted 5 February, 2022; originally announced February 2022.

    Comments: 32 pages, 13 figures, 5 tables, journal

  12. CONQUER: Contextual Query-aware Ranking for Video Corpus Moment Retrieval

    Authors: Zhijian Hou, Chong-Wah Ngo, Wing Kwong Chan

    Abstract: This paper tackles a recently proposed Video Corpus Moment Retrieval task. This task is essential because advanced video retrieval applications should enable users to retrieve a precise moment from a large video corpus. We propose a novel CONtextual QUery-awarE Ranking~(CONQUER) model for effective moment localization and ranking. CONQUER explores query context for multi-modal fusion and represent… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: 10 pages, 4 figures, 2021 MultiMedia, code: https://github.com/houzhijian/CONQUER

  13. Learning Large-scale Location Embedding From Human Mobility Trajectories with Graphs

    Authors: Chenyu Tian, Yuchun Zhang, Zefeng Weng, Xiusen Gu, Wai Kin Victor Chan

    Abstract: An increasing amount of location-based service (LBS) data is being accumulated and helps to study urban dynamics and human mobility. GPS coordinates and other location indicators are normally low dimensional and only representing spatial proximity, thus difficult to be effectively utilized by machine learning models in Geo-aware applications. Existing location embedding methods are mostly tailored… ▽ More

    Submitted 12 April, 2021; v1 submitted 23 February, 2021; originally announced March 2021.

    Journal ref: 2022 International Joint Conference on Neural Networks (IJCNN)

  14. arXiv:2007.15510  [pdf

    cs.SE

    WANA: Symbolic Execution of Wasm Bytecode for Cross-Platform Smart Contract Vulnerability Detection

    Authors: Dong Wang, Bo Jiang, W. K. Chan

    Abstract: Many popular blockchain platforms are supporting smart contracts for building decentralized applications. However, the vulnerabilities within smart contracts have led to serious financial loss to their end users. For the EOSIO blockchain platform, effective vulnerability detectors are still limited. Furthermore, existing vulnerability detection tools can only support one blockchain platform. In th… ▽ More

    Submitted 5 August, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Comments: 12pages, 11 figures, 4 tables

    ACM Class: D.2.5

  15. arXiv:2007.14903  [pdf

    cs.SE

    EOSFuzzer: Fuzzing EOSIO Smart Contracts for Vulnerability Detection

    Authors: Yuhe Huang, Bo Jiang, W. K. Chan

    Abstract: EOSIO is one typical public blockchain platform. It is scalable in terms of transaction speeds and has a growing ecosystem supporting smart contracts and decentralized applications. However, the vulnerabilities within the EOSIO smart contracts have led to serious attacks, which caused serious financial loss to its end users. In this work, we systematically analyzed three typical EOSIO smart contra… ▽ More

    Submitted 5 August, 2020; v1 submitted 29 July, 2020; originally announced July 2020.

    Comments: 12 pages, 15 tables, 1 figure

    ACM Class: D.2.5

  16. ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection

    Authors: Bo Jiang, Ye Liu, W. K. Chan

    Abstract: Decentralized cryptocurrencies feature the use of blockchain to transfer values among peers on networks without central agency. Smart contracts are programs running on top of the blockchain consensus protocol to enable people make agreements while minimizing trusts. Millions of smart contracts have been deployed in various decentralized applications. The security vulnerabilities within those smart… ▽ More

    Submitted 2 August, 2018; v1 submitted 10 July, 2018; originally announced July 2018.

    Comments: To appear in ASE 2018, Montpellier, France. 10 pages

  17. To What Extent Is Stress Testing of Android TV Applications Automated in Industrial Environments?

    Authors: Bo Jiang, Peng Chen, W. K. Chan, Xinchao Zhang

    Abstract: An Android-based smart Television (TV) must reliably run its applications in an embedded program environment under diverse hardware resource conditions. Owing to the diverse hardware components used to build numerous TV models, TV simulators are usually not high enough in fidelity to simulate various TV models, and thus are only regarded as unreliable alternatives when stress testing such applicat… ▽ More

    Submitted 23 September, 2015; originally announced September 2015.

    Comments: 17 pages