Skip to main content

Showing 1–50 of 288 results for author: Sun, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.16955  [pdf, other

    cs.CV cs.RO

    DVPE: Divided View Position Embedding for Multi-View 3D Object Detection

    Authors: Jiasen Wang, Zhenglin Li, Ke Sun, Xianyuan Liu, Yang Zhou

    Abstract: Sparse query-based paradigms have achieved significant success in multi-view 3D detection for autonomous vehicles. Current research faces challenges in balancing between enlarging receptive fields and reducing interference when aggregating multi-view features. Moreover, different poses of cameras present challenges in training global attention models. To address these problems, this paper proposes… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  2. arXiv:2407.16337  [pdf, other

    cs.LG

    STATE: A Robust ATE Estimator of Heavy-Tailed Metrics for Variance Reduction in Online Controlled Experiments

    Authors: Hao Zhou, Kun Sun, Shaoming Li, Yangfeng Fan, Guibin Jiang, Jiaqi Zheng, Tao Li

    Abstract: Online controlled experiments play a crucial role in enabling data-driven decisions across a wide range of companies. Variance reduction is an effective technique to improve the sensitivity of experiments, achieving higher statistical power while using fewer samples and shorter experimental periods. However, typical variance reduction methods (e.g., regression-adjusted estimators) are built upon t… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: Accepted by KDD 2024

  3. arXiv:2407.16224  [pdf, other

    cs.CV

    OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

    Authors: Ke Sun, Jian Cao, Qi Wang, Linrui Tian, Xindi Zhang, Lian Zhuo, Bang Zhang, Liefeng Bo, Wenbo Zhou, Weiming Zhang, Daiheng Gao

    Abstract: Virtual Try-On (VTON) has become a transformative technology, empowering users to experiment with fashion without ever having to physically try on clothing. However, existing methods often struggle with generating high-fidelity and detail-consistent results. While diffusion models, such as Stable Diffusion series, have shown their capability in creating high-quality and photorealistic images, they… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: 10 pages, 13 figures

  4. arXiv:2407.15866  [pdf, other

    cs.LG cs.AI cs.AR

    SmartQuant: CXL-based AI Model Store in Support of Runtime Configurable Weight Quantization

    Authors: Rui Xie, Asad Ul Haq, Linsen Ma, Krystal Sun, Sanchari Sen, Swagath Venkataramani, Liu Liu, Tong Zhang

    Abstract: Recent studies have revealed that, during the inference on generative AI models such as transformer, the importance of different weights exhibits substantial context-dependent variations. This naturally manifests a promising potential of adaptively configuring weight quantization to improve the generative AI inference efficiency. Although configurable weight quantization can readily leverage the h… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

  5. arXiv:2407.14505  [pdf, other

    cs.CV

    T2V-CompBench: A Comprehensive Benchmark for Compositional Text-to-video Generation

    Authors: Kaiyue Sun, Kaiyi Huang, Xian Liu, Yue Wu, Zihan Xu, Zhenguo Li, Xihui Liu

    Abstract: Text-to-video (T2V) generation models have advanced significantly, yet their ability to compose different objects, attributes, actions, and motions into a video remains unexplored. Previous text-to-video benchmarks also neglect this important ability for evaluation. In this work, we conduct the first systematic study on compositional text-to-video generation. We propose T2V-CompBench, the first be… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

    Comments: 13 pages (30 in total), project page: https://t2v-compbench.github.io/

  6. arXiv:2407.12473  [pdf, ps, other

    cs.CL cs.LG

    A Novel Dependency Framework for Enhancing Discourse Data Analysis

    Authors: Kun Sun, Rong Wang

    Abstract: The development of different theories of discourse structure has led to the establishment of discourse corpora based on these theories. However, the existence of discourse corpora established on different theoretical bases creates challenges when it comes to exploring them in a consistent and cohesive way. This study has as its primary focus the conversion of PDTB annotations into dependency struc… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

  7. arXiv:2407.05286  [pdf, other

    cs.LG math.OC

    Stability and Generalization for Stochastic Recursive Momentum-based Algorithms for (Strongly-)Convex One to $K$-Level Stochastic Optimizations

    Authors: Xiaokang Pan, Xingyu Li, Jin Liu, Tao Sun, Kai Sun, Lixing Chen, Zhe Qu

    Abstract: STOchastic Recursive Momentum (STORM)-based algorithms have been widely developed to solve one to $K$-level ($K \geq 3$) stochastic optimization problems. Specifically, they use estimators to mitigate the biased gradient issue and achieve near-optimal convergence results. However, there is relatively little work on understanding their generalization performance, particularly evident during the tra… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  8. arXiv:2406.18140  [pdf, other

    cs.CV cs.AI

    Exclusive Style Removal for Cross Domain Novel Class Discovery

    Authors: Yicheng Wang, Feng Liu, Junmin Liu, Zhen Fang, Kai Sun

    Abstract: As a promising field in open-world learning, \textit{Novel Class Discovery} (NCD) is usually a task to cluster unseen novel classes in an unlabeled set based on the prior knowledge of labeled data within the same domain. However, the performance of existing NCD methods could be severely compromised when novel classes are sampled from a different distribution with the labeled ones. In this paper, w… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  9. arXiv:2406.16223  [pdf, ps, other

    cs.CL cs.AI

    Continuous Output Personality Detection Models via Mixed Strategy Training

    Authors: Rong Wang, Kun Sun

    Abstract: The traditional personality models only yield binary results. This paper presents a novel approach for training personality detection models that produce continuous output values, using mixed strategies. By leveraging the PANDORA dataset, which includes extensive personality labeling of Reddit comments, we developed models that predict the Big Five personality traits with high accuracy. Our approa… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

  10. Dye4AI: Assuring Data Boundary on Generative AI Services

    Authors: Shu Wang, Kun Sun, Yan Zhai

    Abstract: Generative artificial intelligence (AI) is versatile for various applications, but security and privacy concerns with third-party AI vendors hinder its broader adoption in sensitive scenarios. Hence, it is essential for users to validate the AI trustworthiness and ensure the security of data boundaries. In this paper, we present a dye testing system named Dye4AI, which injects crafted trigger data… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  11. arXiv:2406.11131  [pdf, other

    cs.CL cs.AI cs.DB

    Are Large Language Models a Good Replacement of Taxonomies?

    Authors: Yushi Sun, Hao Xin, Kai Sun, Yifan Ethan Xu, Xiao Yang, Xin Luna Dong, Nan Tang, Lei Chen

    Abstract: Large language models (LLMs) demonstrate an impressive ability to internalize knowledge and answer natural language questions. Although previous studies validate that LLMs perform well on general knowledge while presenting poor performance on long-tail nuanced knowledge, the community is still doubtful about whether the traditional knowledge graphs should be replaced by LLMs. In this paper, we ask… ▽ More

    Submitted 20 June, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

    Comments: Accepted by VLDB 2024

  12. arXiv:2406.09792  [pdf, other

    cs.CV

    A Two-Stage Masked Autoencoder Based Network for Indoor Depth Completion

    Authors: Kailai Sun, Zhou Yang, Qianchuan Zhao

    Abstract: Depth images have a wide range of applications, such as 3D reconstruction, autonomous driving, augmented reality, robot navigation, and scene understanding. Commodity-grade depth cameras are hard to sense depth for bright, glossy, transparent, and distant surfaces. Although existing depth completion methods have achieved remarkable progress, their performance is limited when applied to complex ind… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: Accepted by 2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshop

  13. arXiv:2406.08657  [pdf, other

    cs.CL

    Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs

    Authors: Chen Zheng, Ke Sun, Xun Zhou

    Abstract: Despite the advances in Large Language Models (LLMs), exemplified by models like GPT-4 and Claude, smaller-scale LLMs such as Llama and Mistral often struggle with generating in-depth and coherent dialogues. This paper presents a novel two-step Coarse-to-Fine Actor model to address the inherent limitations in conversational and analytical capabilities of small-sized LLMs. Our approach begins with… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  14. arXiv:2406.07440  [pdf, other

    cs.CL cs.AI

    Textual Similarity as a Key Metric in Machine Translation Quality Estimation

    Authors: Kun Sun, Rong Wang

    Abstract: Machine Translation (MT) Quality Estimation (QE) assesses translation reliability without reference texts. This study introduces "textual similarity" as a new metric for QE, using sentence transformers and cosine similarity to measure semantic closeness. Analyzing data from the MLQE-PE dataset, we found that textual similarity exhibits stronger correlations with human scores than traditional metri… ▽ More

    Submitted 1 July, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  15. arXiv:2406.05288  [pdf, other

    cs.CV cs.AI cs.LG

    Optimal Eye Surgeon: Finding Image Priors through Sparse Generators at Initialization

    Authors: Avrajit Ghosh, Xitong Zhang, Kenneth K. Sun, Qing Qu, Saiprasad Ravishankar, Rongrong Wang

    Abstract: We introduce Optimal Eye Surgeon (OES), a framework for pruning and training deep image generator networks. Typically, untrained deep convolutional networks, which include image sampling operations, serve as effective image priors (Ulyanov et al., 2018). However, they tend to overfit to noise in image restoration tasks due to being overparameterized. OES addresses this by adaptively pruning networ… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Pruning image generator networks at initialization to alleviate overfitting

    Journal ref: International Conference on Machine Learning (ICML 2024)

  16. arXiv:2406.04744  [pdf, other

    cs.CL

    CRAG -- Comprehensive RAG Benchmark

    Authors: Xiao Yang, Kai Sun, Hao Xin, Yushi Sun, Nikita Bhalla, Xiangsen Chen, Sajal Choudhary, Rongze Daniel Gui, Ziran Will Jiang, Ziyu Jiang, Lingkun Kong, Brian Moran, Jiaqi Wang, Yifan Ethan Xu, An Yan, Chenyu Yang, Eting Yuan, Hanwen Zha, Nan Tang, Lei Chen, Nicolas Scheffer, Yue Liu, Nirav Shah, Rakesh Wanga, Anuj Kumar , et al. (2 additional authors not shown)

    Abstract: Retrieval-Augmented Generation (RAG) has recently emerged as a promising solution to alleviate Large Language Model (LLM)'s deficiency in lack of knowledge. Existing RAG datasets, however, do not adequately represent the diverse and dynamic nature of real-world Question Answering (QA) tasks. To bridge this gap, we introduce the Comprehensive RAG Benchmark (CRAG), a factual question answering bench… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  17. arXiv:2406.02205  [pdf, other

    cs.AI

    Query-Enhanced Adaptive Semantic Path Reasoning for Inductive Knowledge Graph Completion

    Authors: Kai Sun, Jiapu Wang, Huajie Jiang, Yongli Hu, Baocai Yin

    Abstract: Conventional Knowledge graph completion (KGC) methods aim to infer missing information in incomplete Knowledge Graphs (KGs) by leveraging existing information, which struggle to perform effectively in scenarios involving emerging entities. Inductive KGC methods can handle the emerging entities and relations in KGs, offering greater dynamic adaptability. While existing inductive KGC methods have ac… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  18. arXiv:2406.01198  [pdf, ps, other

    cs.CL cs.AI

    Automatic Essay Multi-dimensional Scoring with Fine-tuning and Multiple Regression

    Authors: Kun Sun, Rong Wang

    Abstract: Automated essay scoring (AES) involves predicting a score that reflects the writing quality of an essay. Most existing AES systems produce only a single overall score. However, users and L2 learners expect scores across different dimensions (e.g., vocabulary, grammar, coherence) for English essays in real-world applications. To address this need, we have developed two models that automatically sco… ▽ More

    Submitted 3 June, 2024; originally announced June 2024.

  19. arXiv:2405.18407  [pdf, other

    cs.LG cs.CV

    Phased Consistency Model

    Authors: Fu-Yun Wang, Zhaoyang Huang, Alexander William Bergman, Dazhong Shen, Peng Gao, Michael Lingelbach, Keqiang Sun, Weikang Bian, Guanglu Song, Yu Liu, Hongsheng Li, Xiaogang Wang

    Abstract: The consistency model (CM) has recently made significant progress in accelerating the generation of diffusion models. However, its application to high-resolution, text-conditioned image generation in the latent space (a.k.a., LCM) remains unsatisfactory. In this paper, we identify three key flaws in the current design of LCM. We investigate the reasons behind these limitations and propose the Phas… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  20. arXiv:2405.17987  [pdf, other

    cs.CR

    BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy

    Authors: Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li

    Abstract: Bluetooth Low Energy (BLE) is a short-range wireless communication technology for resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based attacks, where previous packets construct exploitable conditions for subsequent packets to compromise connections. Defending against session-based attacks is challenging because each step in the attack sequence is legitimate when insp… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  21. arXiv:2405.14170  [pdf, other

    cs.AI cs.CL

    Large Language Models-guided Dynamic Adaptation for Temporal Knowledge Graph Reasoning

    Authors: Jiapu Wang, Kai Sun, Linhao Luo, Wei Wei, Yongli Hu, Alan Wee-Chung Liew, Shirui Pan, Baocai Yin

    Abstract: Temporal Knowledge Graph Reasoning (TKGR) is the process of utilizing temporal information to capture complex relations within a Temporal Knowledge Graph (TKG) to infer new knowledge. Conventional methods in TKGR typically depend on deep learning algorithms or temporal logical rules. However, deep learning-based TKGRs often lack interpretability, whereas rule-based TKGRs struggle to effectively le… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  22. arXiv:2405.04032  [pdf, other

    cs.CR cs.AI

    Locally Differentially Private In-Context Learning

    Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou

    Abstract: Large pretrained language models (LLMs) have shown surprising In-Context Learning (ICL) ability. An important application in deploying large language models is to augment LLMs with a private database for some specific task. The main problem with this promising commercial use is that LLMs have been shown to memorize their training data and their prompt data are vulnerable to membership inference at… ▽ More

    Submitted 8 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: This paper was published at LREC-Coling 2024

  23. arXiv:2405.02435  [pdf, other

    cs.CR cs.SE

    Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia

    Authors: Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Kun Sun, Xinda Wang

    Abstract: Recent research advances in Artificial Intelligence (AI) have yielded promising results for automated software vulnerability management. AI-based models are reported to greatly outperform traditional static analysis tools, indicating a substantial workload relief for security engineers. However, the industry remains very cautious and selective about integrating AI-based techniques into their secur… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: Accepted by IEEE/IFIP International Conference on Dependable Systems and Networks, Industry Track, 2024

  24. arXiv:2405.00760  [pdf, other

    cs.CV cs.AI

    Deep Reward Supervisions for Tuning Text-to-Image Diffusion Models

    Authors: Xiaoshi Wu, Yiming Hao, Manyuan Zhang, Keqiang Sun, Zhaoyang Huang, Guanglu Song, Yu Liu, Hongsheng Li

    Abstract: Optimizing a text-to-image diffusion model with a given reward function is an important but underexplored research area. In this study, we propose Deep Reward Tuning (DRTune), an algorithm that directly supervises the final output image of a text-to-image diffusion model and back-propagates through the iterative sampling process to the input noise. We find that training earlier steps in the sampli… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: N/A

  25. Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?

    Authors: Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen

    Abstract: In recent years, the importance of smart contract security has been heightened by the increasing number of attacks against them. To address this issue, a multitude of static application security testing (SAST) tools have been proposed for detecting vulnerabilities in smart contracts. However, objectively comparing these tools to determine their effectiveness remains challenging. Existing studies o… ▽ More

    Submitted 29 June, 2024; v1 submitted 28 April, 2024; originally announced April 2024.

    Comments: to appear at FSE 2024

  26. arXiv:2404.14052  [pdf, other

    cs.CL stat.ME

    Differential contributions of machine learning and statistical analysis to language and cognitive sciences

    Authors: Kun Sun, Rong Wang

    Abstract: Data-driven approaches have revolutionized scientific research. Machine learning and statistical analysis are commonly utilized in this type of research. Despite their widespread use, these methodologies differ significantly in their techniques and objectives. Few studies have utilized a consistent dataset to demonstrate these differences within the social sciences, particularly in language and co… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  27. arXiv:2404.13591  [pdf, other

    cs.CV cs.LG

    MARVEL: Multidimensional Abstraction and Reasoning through Visual Evaluation and Learning

    Authors: Yifan Jiang, Jiarui Zhang, Kexuan Sun, Zhivar Sourati, Kian Ahrabian, Kaixin Ma, Filip Ilievski, Jay Pujara

    Abstract: While multi-modal large language models (MLLMs) have shown significant progress on many popular visual reasoning benchmarks, whether they possess abstract visual reasoning abilities remains an open question. Similar to the Sudoku puzzles, abstract visual reasoning (AVR) problems require finding high-level patterns (e.g., repetition constraints) that control the input shapes (e.g., digits) in a spe… ▽ More

    Submitted 24 April, 2024; v1 submitted 21 April, 2024; originally announced April 2024.

  28. arXiv:2404.12077  [pdf, other

    cs.SD cs.AI cs.CL cs.LG eess.AS

    TIMIT Speaker Profiling: A Comparison of Multi-task learning and Single-task learning Approaches

    Authors: Rong Wang, Kun Sun

    Abstract: This study employs deep learning techniques to explore four speaker profiling tasks on the TIMIT dataset, namely gender classification, accent classification, age estimation, and speaker identification, highlighting the potential and challenges of multi-task learning versus single-task models. The motivation for this research is twofold: firstly, to empirically assess the advantages and drawbacks… ▽ More

    Submitted 18 April, 2024; originally announced April 2024.

  29. arXiv:2404.05091  [pdf, other

    cs.CL

    MM-MATH: Advancing Multimodal Math Evaluation with Process Evaluation and Fine-grained Classification

    Authors: Kai Sun, Yushi Bai, Ji Qi, Lei Hou, Juanzi Li

    Abstract: To advance the evaluation of multimodal math reasoning in large multimodal models (LMMs), this paper introduces a novel benchmark, MM-MATH. MM-MATH consists of 5,929 open-ended middle school math problems with visual contexts, with fine-grained classification across difficulty, grade level, and knowledge points. Unlike existing benchmarks relying on binary answer comparison, MM-MATH incorporates b… ▽ More

    Submitted 2 July, 2024; v1 submitted 7 April, 2024; originally announced April 2024.

  30. Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks

    Authors: Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu

    Abstract: In this paper, we uncover a new side-channel vulnerability in the widely used NAT port preservation strategy and an insufficient reverse path validation strategy of Wi-Fi routers, which allows an off-path attacker to infer if there is one victim client in the same network communicating with another host on the Internet using TCP. After detecting the presence of TCP connections between the victim c… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: Accepted by Network and Distributed System Security (NDSS) Symposium 2024

  31. arXiv:2404.01817  [pdf, other

    cs.NE

    Tensorized NeuroEvolution of Augmenting Topologies for GPU Acceleration

    Authors: Lishuang Wang, Mengfei Zhao, Enyu Liu, Kebin Sun, Ran Cheng

    Abstract: The NeuroEvolution of Augmenting Topologies (NEAT) algorithm has received considerable recognition in the field of neuroevolution. Its effectiveness is derived from initiating with simple networks and incrementally evolving both their topologies and weights. Although its capability across various challenges is evident, the algorithm's computational efficiency remains an impediment, limiting its sc… ▽ More

    Submitted 11 April, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: Genetic and Evolutionary Computation Conference (GECCO '24)

  32. GPU-accelerated Evolutionary Multiobjective Optimization Using Tensorized RVEA

    Authors: Zhenyu Liang, Tao Jiang, Kebin Sun, Ran Cheng

    Abstract: Evolutionary multiobjective optimization has witnessed remarkable progress during the past decades. However, existing algorithms often encounter computational challenges in large-scale scenarios, primarily attributed to the absence of hardware acceleration. In response, we introduce a Tensorized Reference Vector Guided Evolutionary Algorithm (TensorRVEA) for harnessing the advancements of GPU acce… ▽ More

    Submitted 20 July, 2024; v1 submitted 1 April, 2024; originally announced April 2024.

    Comments: Genetic and Evolutionary Computation Conference (GECCO '24)

  33. arXiv:2403.18542  [pdf, other

    cs.CL cs.LG

    Attention-aware semantic relevance predicting Chinese sentence reading

    Authors: Kun Sun

    Abstract: In recent years, several influential computational models and metrics have been proposed to predict how humans comprehend and process sentence. One particularly promising approach is contextual semantic similarity. Inspired by the attention algorithm in Transformer and human memory mechanisms, this study proposes an ``attention-aware'' approach for computing contextual semantic relevance. This new… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  34. arXiv:2403.18471  [pdf, other

    cs.CV

    DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis

    Authors: Zhongxi Chen, Ke Sun, Ziyin Zhou, Xianming Lin, Xiaoshuai Sun, Liujuan Cao, Rongrong Ji

    Abstract: The rapid progress in deep learning has given rise to hyper-realistic facial forgery methods, leading to concerns related to misinformation and security risks. Existing face forgery datasets have limitations in generating high-quality facial images and addressing the challenges posed by evolving generative techniques. To combat this, we present DiffusionFace, the first diffusion-based face forgery… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  35. arXiv:2403.18417  [pdf, other

    cs.CV

    ECNet: Effective Controllable Text-to-Image Diffusion Models

    Authors: Sicheng Li, Keqiang Sun, Zhixin Lai, Xiaoshi Wu, Feng Qiu, Haoran Xie, Kazunori Miyata, Hongsheng Li

    Abstract: The conditional text-to-image diffusion models have garnered significant attention in recent years. However, the precision of these models is often compromised mainly for two reasons, ambiguous condition input and inadequate condition guidance over single denoising loss. To address the challenges, we introduce two innovative solutions. Firstly, we propose a Spatial Guidance Injector (SGI) which en… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  36. arXiv:2403.15822  [pdf, other

    cs.CL stat.ML

    Computational Sentence-level Metrics Predicting Human Sentence Comprehension

    Authors: Kun Sun, Rong Wang

    Abstract: The majority of research in computational psycholinguistics has concentrated on the processing of words. This study introduces innovative methods for computing sentence-level metrics using multilingual large language models. The metrics developed sentence surprisal and sentence relevance and then are tested and compared to validate whether they can predict how humans comprehend sentences as a whol… ▽ More

    Submitted 15 April, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

  37. From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices

    Authors: Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li

    Abstract: The proliferation of consumer IoT products in our daily lives has raised the need for secure device authentication and access control. Unfortunately, these resource-constrained devices typically use token-based authentication, which is vulnerable to token compromise attacks that allow attackers to impersonate the devices and perform malicious operations by stealing the access token. Using hardware… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

  38. arXiv:2403.15250  [pdf, other

    cs.CL cs.AI cs.LG

    Comprehensive Reassessment of Large-Scale Evaluation Outcomes in LLMs: A Multifaceted Statistical Approach

    Authors: Kun Sun, Rong Wang, Anders Søgaard

    Abstract: Amidst the rapid evolution of LLMs, the significance of evaluation in comprehending and propelling these models forward is increasingly paramount. Evaluations have revealed that factors such as scaling, training types, architectures and other factors profoundly impact the performance of LLMs. However, the extent and nature of these impacts continue to be subjects of debate because most assessments… ▽ More

    Submitted 24 June, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

  39. arXiv:2403.06838  [pdf, other

    cs.SE cs.CR

    ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts

    Authors: Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu

    Abstract: Smart contracts are susceptible to various security issues, among which access control (AC) vulnerabilities are particularly critical. While existing research has proposed multiple detection tools, the automatic and appropriate repair of AC vulnerabilities in smart contracts remains a challenge. Unlike commonly supported vulnerability types by existing repair tools, such as reentrancy, which are u… ▽ More

    Submitted 18 March, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: This is a technical report from Nanyang Technological University

  40. arXiv:2403.04346  [pdf

    cs.DL q-bio.NC

    BrainKnow -- Extracting, Linking, and Synthesizing Neuroscience Knowledge

    Authors: Cunqing Huangfu, Kang Sun, Yi Zeng, Yuwei Wang, Dongsheng Wang, Zizhe Ruan

    Abstract: The exponential growth of neuroscience literature presents a significant challenge for researchers seeking to efficiently access and utilize relevant information. To address this issue, we introduce the Brain Knowledge Engine (BrainKnow), an automated system designed to extract, link, and synthesize neuroscience knowledge from scientific publications. BrainKnow constructs a comprehensive knowledge… ▽ More

    Submitted 6 June, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

    Comments: 22 pages, 7 figures

    MSC Class: 92-04 ACM Class: J.3

  41. arXiv:2403.02513  [pdf, other

    cs.CL

    Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF

    Authors: Chen Zheng, Ke Sun, Hang Wu, Chenguang Xi, Xun Zhou

    Abstract: In recent advancements in Conversational Large Language Models (LLMs), a concerning trend has emerged, showing that many new base LLMs experience a knowledge reduction in their foundational capabilities following Supervised Fine-Tuning (SFT). This process often leads to issues such as forgetting or a decrease in the base model's abilities. Moreover, fine-tuned models struggle to align with user pr… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  42. arXiv:2402.14862  [pdf, other

    cs.CR cs.LG cs.NI

    SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic

    Authors: Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu

    Abstract: Scalable service-Oriented Middleware over IP (SOME/IP) is an Ethernet communication standard protocol in the Automotive Open System Architecture (AUTOSAR), promoting ECU-to-ECU communication over the IP stack. However, SOME/IP lacks a robust security architecture, making it susceptible to potential attacks. Besides, random hardware failure of ECU will disrupt SOME/IP communication. In this paper,… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  43. arXiv:2402.12716  [pdf, other

    cs.NI cs.CR

    Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack

    Authors: Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu

    Abstract: In this paper, we unveil a fundamental side channel in Wi-Fi networks, specifically the observable frame size, which can be exploited by attackers to conduct TCP hijacking attacks. Despite the various security mechanisms (e.g., WEP and WPA2/WPA3) implemented to safeguard Wi-Fi networks, our study reveals that an off path attacker can still extract sufficient information from the frame size side ch… ▽ More

    Submitted 17 April, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  44. arXiv:2402.12417  [pdf

    cs.LG cs.AI

    Predicting trucking accidents with truck drivers 'safety climate perception across companies: A transfer learning approach

    Authors: Kailai Sun, Tianxiang Lan, Say Hong Kam, Yang Miang Goh, Yueng-Hsiang Huang

    Abstract: There is a rising interest in using artificial intelligence (AI)-powered safety analytics to predict accidents in the trucking industry. Companies may face the practical challenge, however, of not having enough data to develop good safety analytics models. Although pretrained models may offer a solution for such companies, existing safety research using transfer learning has mostly focused on comp… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

    Comments: submitted to journal: accident analysis and prevention

  45. arXiv:2402.05379  [pdf, other

    cs.LG stat.ML

    Tradeoffs of Diagonal Fisher Information Matrix Estimators

    Authors: Alexander Soen, Ke Sun

    Abstract: The Fisher information matrix characterizes the local geometry in the parameter space of neural networks. It elucidates insightful theories and useful tools to understand and optimize neural networks. Given its high computational cost, practitioners often use random estimators and evaluate only the diagonal entries. We examine two such estimators, whose accuracy and sample complexity depend on the… ▽ More

    Submitted 2 April, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  46. arXiv:2401.12117  [pdf, other

    cs.CL

    The Curious Case of Nonverbal Abstract Reasoning with Multi-Modal Large Language Models

    Authors: Kian Ahrabian, Zhivar Sourati, Kexuan Sun, Jiarui Zhang, Yifan Jiang, Fred Morstatter, Jay Pujara

    Abstract: While large language models (LLMs) are still being adopted to new domains and utilized in novel applications, we are experiencing an influx of the new generation of foundation models, namely multi-modal large language models (MLLMs). These models integrate verbal and visual information, opening new possibilities to demonstrate more complex reasoning abilities at the intersection of the two modalit… ▽ More

    Submitted 13 February, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: Code and datasets are available at https://github.com/kahrabian/mllm-nvar

  47. arXiv:2401.02072  [pdf, other

    cs.CL

    ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers

    Authors: Chen Zheng, Ke Sun, Da Tang, Yukun Ma, Yuyu Zhang, Chenguang Xi, Xun Zhou

    Abstract: The emergence of Large Language Models (LLMs) such as ChatGPT and LLaMA encounter limitations in domain-specific tasks, with these models often lacking depth and accuracy in specialized areas, and exhibiting a decrease in general capabilities when fine-tuned, particularly analysis ability in small sized models. To address these gaps, we introduce ICE-GRT, utilizing Reinforcement Learning from Huma… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  48. arXiv:2312.13604  [pdf, other

    cs.CV

    Ponymation: Learning 3D Animal Motions from Unlabeled Online Videos

    Authors: Keqiang Sun, Dor Litvak, Yunzhi Zhang, Hongsheng Li, Jiajun Wu, Shangzhe Wu

    Abstract: We introduce Ponymation, a new method for learning a generative model of articulated 3D animal motions from raw, unlabeled online videos. Unlike existing approaches for motion synthesis, our model does not require any pose annotations or parametric shape models for training, and is learned purely from a collection of raw video clips obtained from the Internet. We build upon a recent work, MagicPon… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Project page: https://keqiangsun.github.io/projects/ponymation. The first two authors contributed equally to this work. The last two authors contributed equally

  49. arXiv:2312.07921  [pdf, other

    cs.CR cs.SE

    BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

    Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun

    Abstract: A timely software update is vital to combat the increasing security vulnerabilities. However, some software vendors may secretly patch their vulnerabilities without creating CVE entries or even describing the security issue in their change log. Thus, it is critical to identify these hidden security patches and defeat potential N-day attacks. Researchers have employed various machine learning techn… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Comments: accepted by ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2024

  50. arXiv:2312.07625  [pdf, other

    cs.NE cs.AI

    Astrocyte-Enabled Advancements in Spiking Neural Networks for Large Language Modeling

    Authors: Guobin Shen, Dongcheng Zhao, Yiting Dong, Yang Li, Jindong Li, Kang Sun, Yi Zeng

    Abstract: Within the complex neuroarchitecture of the brain, astrocytes play crucial roles in development, structure, and metabolism. These cells regulate neural activity through tripartite synapses, directly impacting cognitive processes such as learning and memory. Despite the growing recognition of astrocytes' significance, traditional Spiking Neural Network (SNN) models remain predominantly neuron-centr… ▽ More

    Submitted 25 December, 2023; v1 submitted 12 December, 2023; originally announced December 2023.