Skip to main content

Showing 1–50 of 50 results for author: Sun, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.17655  [pdf, other

    cs.RO cs.AI cs.MA

    AssistantX: An LLM-Powered Proactive Assistant in Collaborative Human-Populated Environment

    Authors: Nan Sun, Bo Mao, Yongchang Li, Lumeng Ma, Di Guo, Huaping Liu

    Abstract: The increasing demand for intelligent assistants in human-populated environments has motivated significant research in autonomous robotic systems. Traditional service robots and virtual assistants, however, struggle with real-world task execution due to their limited capacity for dynamic reasoning and interaction, particularly when human collaboration is required. Recent developments in Large Lang… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

    Comments: 6 pages, 8 figures, 4 tables

  2. arXiv:2409.16730  [pdf, ps, other

    cs.AI cs.CV

    Non-stationary BERT: Exploring Augmented IMU Data For Robust Human Activity Recognition

    Authors: Ning Sun, Yufei Wang, Yuwei Zhang, Jixiang Wan, Shenyue Wang, Ping Liu, Xudong Zhang

    Abstract: Human Activity Recognition (HAR) has gained great attention from researchers due to the popularity of mobile devices and the need to observe users' daily activity data for better human-computer interaction. In this work, we collect a human activity recognition dataset called OPPOHAR consisting of phone IMU data. To facilitate the employment of HAR system in mobile phone and to achieve user-specifi… ▽ More

    Submitted 25 September, 2024; originally announced September 2024.

  3. arXiv:2407.02763  [pdf, other

    cs.CV

    ADFQ-ViT: Activation-Distribution-Friendly Post-Training Quantization for Vision Transformers

    Authors: Yanfeng Jiang, Ning Sun, Xueshuo Xie, Fei Yang, Tao Li

    Abstract: Vision Transformers (ViTs) have exhibited exceptional performance across diverse computer vision tasks, while their substantial parameter size incurs significantly increased memory and computational demands, impeding effective inference on resource-constrained devices. Quantization has emerged as a promising solution to mitigate these challenges, yet existing methods still suffer from significant… ▽ More

    Submitted 14 October, 2024; v1 submitted 2 July, 2024; originally announced July 2024.

    Comments: 29 pages,9 figures

  4. arXiv:2406.17565  [pdf, other

    cs.DC

    MemServe: Context Caching for Disaggregated LLM Serving with Elastic Memory Pool

    Authors: Cunchen Hu, Heyang Huang, Junhao Hu, Jiang Xu, Xusheng Chen, Tao Xie, Chenxi Wang, Sa Wang, Yungang Bao, Ninghui Sun, Yizhou Shan

    Abstract: Large language model (LLM) serving has transformed from stateless to stateful systems, utilizing techniques like context caching and disaggregated inference. These optimizations extend the lifespan and domain of the KV cache, necessitating a new architectural approach. We present MemServe, a unified system that integrates both inter-request and intra-request optimizations. MemServe introduces MemP… ▽ More

    Submitted 26 June, 2024; v1 submitted 25 June, 2024; originally announced June 2024.

  5. arXiv:2406.15192  [pdf, ps, other

    cs.DS cs.GT

    Setting Targets is All You Need:Improved Order Competitive Ratio for Online Selection

    Authors: Liyan Chen, Nuozhou Sun, Zhihao Gavin Tang

    Abstract: There is a rising interest for studying the online benchmark as an alternative of the classical offline benchmark in online stochastic settings. Ezra, Feldman, Gravin, and Tang (SODA 2023) introduced the notion of order-competitive ratio, defined as the worst-case ratio between the performance of the best order-unaware algorithm and the best order-aware algorithm, to quantify the loss incurred by… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  6. arXiv:2405.07608  [pdf, other

    cs.NI

    FNCC: Fast Notification Congestion Control in Data Center Networks

    Authors: Jing Xu, Zhan Wang, Fan Yang, Ning Kang, Zhenlong Ma, Guojun Yuan, Guangming Tan, Ninghui Sun

    Abstract: Congestion control plays a pivotal role in large-scale data centers, facilitating ultra-low latency, high bandwidth, and optimal utilization. Even with the deployment of data center congestion control mechanisms such as DCQCN and HPCC, these algorithms often respond to congestion sluggishly. This sluggishness is primarily due to the slow notification of congestion. It takes almost one round-trip t… ▽ More

    Submitted 26 May, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

  7. arXiv:2405.05170  [pdf, other

    cs.MM cs.CV eess.IV

    Picking watermarks from noise (PWFN): an improved robust watermarking model against intensive distortions

    Authors: Sijing Xie, Chengxin Zhao, Nan Sun, Wei Li, Hefei Ling

    Abstract: Digital watermarking is the process of embedding secret information by altering images in an undetectable way to the human eye. To increase the robustness of the model, many deep learning-based watermarking methods use the encoder-noise-decoder architecture by adding different noises to the noise layer. The decoder then extracts the watermarked information from the distorted image. However, this m… ▽ More

    Submitted 17 May, 2024; v1 submitted 8 May, 2024; originally announced May 2024.

  8. arXiv:2405.03458  [pdf, other

    cs.CV

    SSyncOA: Self-synchronizing Object-aligned Watermarking to Resist Cropping-paste Attacks

    Authors: Chengxin Zhao, Hefei Ling, Sijing Xie, Han Fang, Yaokun Fang, Nan Sun

    Abstract: Modern image processing tools have made it easy for attackers to crop the region or object of interest in images and paste it into other images. The challenge this cropping-paste attack poses to the watermarking technology is that it breaks the synchronization of the image watermark, introducing multiple superimposed desynchronization distortions, such as rotation, scaling, and translation. Howeve… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 7 pages, 5 figures (Have been accepted by ICME 2024)

  9. arXiv:2405.03436  [pdf, other

    cs.CV cs.MM

    DBDH: A Dual-Branch Dual-Head Neural Network for Invisible Embedded Regions Localization

    Authors: Chengxin Zhao, Hefei Ling, Sijing Xie, Nan Sun, Zongyi Li, Yuxuan Shi, Jiazhong Chen

    Abstract: Embedding invisible hyperlinks or hidden codes in images to replace QR codes has become a hot topic recently. This technology requires first localizing the embedded region in the captured photos before decoding. Existing methods that train models to find the invisible embedded region struggle to obtain accurate localization results, leading to degraded decoding accuracy. This limitation is primari… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 7 pages, 6 figures (Have been accepted by IJCNN 2024)

  10. arXiv:2404.17174  [pdf, other

    cs.LG

    Optimizing Cycle Life Prediction of Lithium-ion Batteries via a Physics-Informed Model

    Authors: Constantin-Daniel Nicolae, Sara Sameer, Nathan Sun, Karena Yan

    Abstract: Accurately measuring the cycle lifetime of commercial lithium-ion batteries is crucial for performance and technology development. We introduce a novel hybrid approach combining a physics-based equation with a self-attention model to predict the cycle lifetimes of commercial lithium iron phosphate graphite cells via early-cycle data. After fitting capacity loss curves to this physics-based equatio… ▽ More

    Submitted 26 April, 2024; originally announced April 2024.

  11. arXiv:2404.12674  [pdf, other

    cs.DC cs.LG cs.PF

    Towards Universal Performance Modeling for Machine Learning Training on Multi-GPU Platforms

    Authors: Zhongyi Lin, Ning Sun, Pallab Bhattacharya, Xizhou Feng, Louis Feng, John D. Owens

    Abstract: Characterizing and predicting the training performance of modern machine learning (ML) workloads on compute systems with compute and communication spread between CPUs, GPUs, and network devices is not only the key to optimization and planning but also a complex goal to achieve. The primary challenges include the complexity of synchronization and load balancing between CPUs and GPUs, the variance i… ▽ More

    Submitted 27 April, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

    Comments: 12 pages, 11 figures, 4 tables

  12. arXiv:2404.00904  [pdf

    cs.NI

    A Fast Percolation-Dijkstra Routing Method for Mega-Constellation Backbone Network

    Authors: Shenshen Luan, Luyuan Wang, Yepeng Liu, Ninghan Sun, Ran Zhang

    Abstract: The real-time routing for satellite communication of the mega-constellations is being challenged due to the large-scale of network nodes, especially on devices with limited computation such as onboard embedded systems. In this paper, a fast routing method is proposed for mega-constellation backbone networks. Firstly, inspired by the regularity and sparse characteristics of mega-constellations, the… ▽ More

    Submitted 2 April, 2024; v1 submitted 1 April, 2024; originally announced April 2024.

  13. arXiv:2403.15779  [pdf, other

    cs.AI

    The Frontier of Data Erasure: Machine Unlearning for Large Language Models

    Authors: Youyang Qu, Ming Ding, Nan Sun, Kanchana Thilakarathna, Tianqing Zhu, Dusit Niyato

    Abstract: Large Language Models (LLMs) are foundational to AI advancements, facilitating applications like predictive text generation. Nonetheless, they pose risks by potentially memorizing and disseminating sensitive, biased, or copyrighted information from their vast datasets. Machine unlearning emerges as a cutting-edge solution to mitigate these concerns, offering techniques for LLMs to selectively disc… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

  14. arXiv:2401.11181  [pdf, other

    cs.DC

    Inference without Interference: Disaggregate LLM Inference for Mixed Downstream Workloads

    Authors: Cunchen Hu, Heyang Huang, Liangliang Xu, Xusheng Chen, Jiang Xu, Shuang Chen, Hao Feng, Chenxi Wang, Sa Wang, Yungang Bao, Ninghui Sun, Yizhou Shan

    Abstract: Transformer-based large language model (LLM) inference serving is now the backbone of many cloud services. LLM inference consists of a prefill phase and a decode phase. However, existing LLM deployment practices often overlook the distinct characteristics of these phases, leading to significant interference. To mitigate interference, our insight is to carefully schedule and group inference request… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  15. arXiv:2312.03549  [pdf, other

    cs.CL cs.DC

    Holmes: Towards Distributed Training Across Clusters with Heterogeneous NIC Environment

    Authors: Fei Yang, Shuang Peng, Ning Sun, Fangyu Wang, Yuanyuan Wang, Fu Wu, Jiezhong Qiu, Aimin Pan

    Abstract: Large language models (LLMs) such as GPT-3, OPT, and LLaMA have demonstrated remarkable accuracy in a wide range of tasks. However, training these models can incur significant expenses, often requiring tens of thousands of GPUs for months of continuous operation. Typically, this training is carried out in specialized GPU clusters equipped with homogeneous high-speed Remote Direct Memory Access (RD… ▽ More

    Submitted 29 April, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: 12 pages

  16. arXiv:2312.02673  [pdf, other

    cs.CR

    Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics

    Authors: Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang

    Abstract: A backdoor attack in deep learning inserts a hidden backdoor in the model to trigger malicious behavior upon specific input patterns. Existing detection approaches assume a metric space (for either the original inputs or their latent representations) in which normal samples and malicious samples are separable. We show that this assumption has a severe limitation by introducing a novel SSDT (Source… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    Comments: 18 pages. To appear in IEEE Symposium on Security and Privacy 2024

  17. arXiv:2310.19624  [pdf, other

    cs.LG cs.AI q-bio.QM

    Exploring Post-Training Quantization of Protein Language Models

    Authors: Shuang Peng, Fei Yang, Ning Sun, Sheng Chen, Yanfeng Jiang, Aimin Pan

    Abstract: Recent advancements in unsupervised protein language models (ProteinLMs), like ESM-1b and ESM-2, have shown promise in different protein prediction tasks. However, these models face challenges due to their high computational demands, significant memory needs, and latency, restricting their usage on devices with limited resources. To tackle this, we explore post-training quantization (PTQ) for Prot… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 8 pages, 4 figures

  18. arXiv:2309.07581  [pdf, ps, other

    cs.AR

    A Survey of Graph Pre-processing Methods: From Algorithmic to Hardware Perspectives

    Authors: Zhengyang Lv, Mingyu Yan, Xin Liu, Mengyao Dong, Xiaochun Ye, Dongrui Fan, Ninghui Sun

    Abstract: Graph-related applications have experienced significant growth in academia and industry, driven by the powerful representation capabilities of graph. However, efficiently executing these applications faces various challenges, such as load imbalance, random memory access, etc. To address these challenges, researchers have proposed various acceleration systems, including software frameworks and hard… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  19. arXiv:2309.05630  [pdf, other

    stat.ML cs.LG stat.ME

    Boundary Peeling: Outlier Detection Method Using One-Class Peeling

    Authors: Sheikh Arafat, Na Sun, Maria L. Weese, Waldyn G. Martinez

    Abstract: Unsupervised outlier detection constitutes a crucial phase within data analysis and remains a dynamic realm of research. A good outlier detection algorithm should be computationally efficient, robust to tuning parameter selection, and perform consistently well across diverse underlying data distributions. We introduce One-Class Boundary Peeling, an unsupervised outlier detection algorithm. One-cla… ▽ More

    Submitted 20 September, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

  20. arXiv:2308.11138  [pdf, ps, other

    stat.ME cs.CL q-fin.RM stat.ML

    NLP-based detection of systematic anomalies among the narratives of consumer complaints

    Authors: Peiheng Gao, Ning Sun, Xuefeng Wang, Chen Yang, Ričardas Zitikis

    Abstract: We develop an NLP-based procedure for detecting systematic nonmeritorious consumer complaints, simply called systematic anomalies, among complaint narratives. While classification algorithms are used to detect pronounced anomalies, in the case of smaller and frequent systematic anomalies, the algorithms may falter due to a variety of reasons, including technical ones as well as natural limitations… ▽ More

    Submitted 26 March, 2024; v1 submitted 21 August, 2023; originally announced August 2023.

  21. arXiv:2305.05938  [pdf, other

    cs.CV cs.AI

    V2X-Seq: A Large-Scale Sequential Dataset for Vehicle-Infrastructure Cooperative Perception and Forecasting

    Authors: Haibao Yu, Wenxian Yang, Hongzhi Ruan, Zhenwei Yang, Yingjuan Tang, Xu Gao, Xin Hao, Yifeng Shi, Yifeng Pan, Ning Sun, Juan Song, Jirui Yuan, Ping Luo, Zaiqing Nie

    Abstract: Utilizing infrastructure and vehicle-side information to track and forecast the behaviors of surrounding traffic participants can significantly improve decision-making and safety in autonomous driving. However, the lack of real-world sequential datasets limits research in this area. To address this issue, we introduce V2X-Seq, the first large-scale sequential V2X dataset, which includes data frame… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: CVPR2023

  22. arXiv:2302.14830  [pdf, other

    math.ST cs.DM cs.IT math.PR

    Sharp thresholds in inference of planted subgraphs

    Authors: Elchanan Mossel, Jonathan Niles-Weed, Youngtak Sohn, Nike Sun, Ilias Zadik

    Abstract: A major question in the study of the Erdős--Rényi random graph is to understand the probability that it contains a given subgraph. This study originated in classical work of Erdős and Rényi (1960). More recent work studies this question both in building a general theory of sharp versus coarse transitions (Friedgut and Bourgain 1999; Hatami, 2012) and in results on the location of the transition (K… ▽ More

    Submitted 28 February, 2023; originally announced February 2023.

    Comments: 41 pages

  23. arXiv:2212.10432  [pdf, other

    cs.DC cs.PF

    AlphaSparse: Generating High Performance SpMV Codes Directly from Sparse Matrices

    Authors: Zhen Du, Jiajia Li, Yinshan Wang, Xueqi Li, Guangming Tan, Ninghui Sun

    Abstract: Sparse Matrix-Vector multiplication (SpMV) is an essential computational kernel in many application scenarios. Tens of sparse matrix formats and implementations have been proposed to compress the memory storage and speed up SpMV performance. We develop AlphaSparse, a superset of all existing works that goes beyond the scope of human-designed format(s) and implementation(s). AlphaSparse automatical… ▽ More

    Submitted 21 December, 2022; v1 submitted 7 November, 2022; originally announced December 2022.

  24. arXiv:2212.06385  [pdf, other

    cs.CL

    TencentPretrain: A Scalable and Flexible Toolkit for Pre-training Models of Different Modalities

    Authors: Zhe Zhao, Yudong Li, Cheng Hou, Jing Zhao, Rong Tian, Weijie Liu, Yiren Chen, Ningyuan Sun, Haoyan Liu, Weiquan Mao, Han Guo, Weigang Guo, Taiqiang Wu, Tao Zhu, Wenhang Shi, Chen Chen, Shan Huang, Sihong Chen, Liqun Liu, Feifei Li, Xiaoshuai Chen, Xingwu Sun, Zhanhui Kang, Xiaoyong Du, Linlin Shen , et al. (1 additional authors not shown)

    Abstract: Recently, the success of pre-training in text domain has been fully extended to vision, audio, and cross-modal scenarios. The proposed pre-training models of different modalities are showing a rising trend of homogeneity in their model structures, which brings the opportunity to implement different pre-training models within a uniform framework. In this paper, we present TencentPretrain, a toolkit… ▽ More

    Submitted 11 July, 2023; v1 submitted 13 December, 2022; originally announced December 2022.

  25. arXiv:2210.17411  [pdf, other

    cs.CV

    Offset-Guided Attention Network for Room-Level Aware Floor Plan Segmentation

    Authors: Zhangyu Wang, Ningyuan Sun

    Abstract: Recognition of floor plans has been a challenging and popular task. Despite that many recent approaches have been proposed for this task, they typically fail to make the room-level unified prediction. Specifically, multiple semantic categories can be assigned in a single room, which seriously limits their visual quality and applicability. In this paper, we propose a novel approach to recognize the… ▽ More

    Submitted 22 October, 2022; originally announced October 2022.

    Comments: Under review of IEEE Access(3 accepts and 1 reject)

  26. Linker Code Size Optimization for Native Mobile Applications

    Authors: Gai Liu, Umar Farooq, Chengyan Zhao, Xia Liu, Nian Sun

    Abstract: Modern mobile applications have grown rapidly in binary size, which restricts user growth and hinders updates for existing users. Thus, reducing the binary size is important for application developers. Recent studies have shown the possibility of using link-time code size optimizations by re-invoking certain compiler optimizations on the linked intermediate representation of the program. However,… ▽ More

    Submitted 18 January, 2023; v1 submitted 13 September, 2022; originally announced October 2022.

    Journal ref: In Proceedings of the 32nd ACM SIGPLAN International Conference on Compiler Construction, 2023

  27. arXiv:2209.11347  [pdf, ps, other

    math.CO cs.DM math.PR math.ST

    A second moment proof of the spread lemma

    Authors: Elchanan Mossel, Jonathan Niles-Weed, Nike Sun, Ilias Zadik

    Abstract: This note concerns a well-known result which we term the ``spread lemma,'' which establishes the existence (with high probability) of a desired structure in a random set. The spread lemma was central to two recent celebrated results: (a) the improved bounds of Alweiss, Lovett, Wu, and Zhang (2019) on the Erdős-Rado sunflower conjecture; and (b) the proof of the fractional Kahn--Kalai conjecture by… ▽ More

    Submitted 10 October, 2022; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: Corrected a mistake in the proof of Theorem 2.1. and updated the literature review

  28. arXiv:2209.03326  [pdf, ps, other

    math.CO cs.DM math.PR

    On the Second Kahn--Kalai Conjecture

    Authors: Elchanan Mossel, Jonathan Niles-Weed, Nike Sun, Ilias Zadik

    Abstract: For any given graph $H$, we are interested in $p_\mathrm{crit}(H)$, the minimal $p$ such that the Erdős-Rényi graph $G(n,p)$ contains a copy of $H$ with probability at least $1/2$. Kahn and Kalai (2007) conjectured that $p_\mathrm{crit}(H)$ is given up to a logarithmic factor by a simpler "subgraph expectation threshold" $p_\mathrm{E}(H)$, which is the minimal $p$ such that for every subgraph… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 4 pages

  29. arXiv:2207.06412  [pdf

    cs.ET cs.AI cs.LG

    RobustAnalog: Fast Variation-Aware Analog Circuit Design Via Multi-task RL

    Authors: Wei Shi, Hanrui Wang, Jiaqi Gu, Mingjie Liu, David Pan, Song Han, Nan Sun

    Abstract: Analog/mixed-signal circuit design is one of the most complex and time-consuming stages in the whole chip design process. Due to various process, voltage, and temperature (PVT) variations from chip manufacturing, analog circuits inevitably suffer from performance degradation. Although there has been plenty of work on automating analog circuit design under the typical condition, limited research ha… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  30. How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond

    Authors: Nan Sun, Chang-Tsun Li, Hin Chan, Md Zahidul Islam, Md Rafiqul Islam, Warren Armstrong

    Abstract: Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifications can provide guidance for vendors to design a… ▽ More

    Submitted 5 March, 2022; v1 submitted 3 March, 2022; originally announced March 2022.

  31. Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

    Authors: Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong

    Abstract: Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether the assurance measures applied to these products m… ▽ More

    Submitted 2 April, 2022; v1 submitted 19 January, 2022; originally announced January 2022.

  32. Extending the limit of molecular dynamics with ab initio accuracy to 10 billion atoms

    Authors: Zhuoqiang Guo, Denghui Lu, Yujin Yan, Siyu Hu, Rongrong Liu, Guangming Tan, Ninghui Sun, Wanrun Jiang, Lijun Liu, Yixiao Chen, Linfeng Zhang, Mohan Chen, Han Wang, Weile Jia

    Abstract: High-performance computing, together with a neural network model trained from data generated with first-principles methods, has greatly boosted applications of \textit{ab initio} molecular dynamics in terms of spatial and temporal scales on modern supercomputers. Previous state-of-the-art can achieve $1-2$ nanoseconds molecular dynamics simulation per day for 100-million atoms on the entire Summit… ▽ More

    Submitted 4 January, 2022; originally announced January 2022.

    Comments: 13 pages, 11 figures, conference : Principles and Practice of Parallel Programming 2022

  33. arXiv:2110.00211  [pdf, other

    cs.LG eess.SP

    DNN-Opt: An RL Inspired Optimization for Analog Circuit Sizing using Deep Neural Networks

    Authors: Ahmet F. Budak, Prateek Bhansali, Bo Liu, Nan Sun, David Z. Pan, Chandramouli V. Kashyap

    Abstract: Analog circuit sizing takes a significant amount of manual effort in a typical design cycle. With rapidly developing technology and tight schedules, bringing automated solutions for sizing has attracted great attention. This paper presents DNN-Opt, a Reinforcement Learning (RL) inspired Deep Neural Network (DNN) based black-box optimization framework for analog circuit sizing. The key contribution… ▽ More

    Submitted 1 October, 2021; originally announced October 2021.

    Comments: Accepted to 58th Design Automation Conference (DAC 2021), 6 pages, 5 figures

  34. arXiv:2107.02283  [pdf, other

    q-fin.ST cs.LG stat.ME

    Clustering Structure of Microstructure Measures

    Authors: Liao Zhu, Ningning Sun, Martin T. Wells

    Abstract: This paper builds the clustering model of measures of market microstructure features which are popular in predicting stock returns. In a 10-second time-frequency, we study the clustering structure of different measures to find out the best ones for predicting. In this way, we can predict more accurately with a limited number of predictors, which removes the noise and makes the model more interpret… ▽ More

    Submitted 25 December, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

  35. arXiv:2104.10415  [pdf, other

    cs.AR cs.LG

    Tackling Variabilities in Autonomous Driving

    Authors: Yuqiong Qi, Yang Hu, Haibin Wu, Shen Li, Haiyu Mao, Xiaochun Ye, Dongrui Fan, Ninghui Sun

    Abstract: The state-of-the-art driving automation system demands extreme computational resources to meet rigorous accuracy and latency requirements. Though emerging driving automation computing platforms are based on ASIC to provide better performance and power guarantee, building such an accelerator-based computing platform for driving automation still present challenges. First, the workloads mix and perfo… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

  36. arXiv:2103.12393  [pdf, other

    cs.AR

    RISC-NN: Use RISC, NOT CISC as Neural Network Hardware Infrastructure

    Authors: Taoran Xiang, Lunkai Zhang, Shuqian An, Xiaochun Ye, Mingzhe Zhang, Yanhuan Liu, Mingyu Yan, Da Wang, Hao Zhang, Wenming Li, Ninghui Sun, Dongrui Fan

    Abstract: Neural Networks (NN) have been proven to be powerful tools to analyze Big Data. However, traditional CPUs cannot achieve the desired performance and/or energy efficiency for NN applications. Therefore, numerous NN accelerators have been used or designed to meet these goals. These accelerators all fall into three categories: GPGPUs, ASIC NN Accelerators and CISC NN Accelerators. Though CISC NN Acce… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

  37. arXiv:2011.01022   

    cs.RO cs.CV

    Depth Ranging Performance Evaluation and Improvement for RGB-D Cameras on Field-Based High-Throughput Phenotyping Robots

    Authors: Zhengqiang Fan, Na Sun, Quan Qiu, Chunjiang Zhao

    Abstract: RGB-D cameras have been successfully used for indoor High-ThroughpuT Phenotyping (HTTP). However, their capability and feasibility for in-field HTTP still need to be evaluated, due to the noise and disturbances generated by unstable illumination, specular reflection, and diffuse reflection, etc. To solve these problems, we evaluated the depth-ranging performances of two consumer-level RGB-D camera… ▽ More

    Submitted 27 April, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: We want to improve the work of this paper before publishing it publicly

  38. arXiv:2006.06434  [pdf, other

    cs.DB cs.AI cs.LG

    TableQA: a Large-Scale Chinese Text-to-SQL Dataset for Table-Aware SQL Generation

    Authors: Ningyuan Sun, Xuefeng Yang, Yunfeng Liu

    Abstract: Parsing natural language to corresponding SQL (NL2SQL) with data driven approaches like deep neural networks attracts much attention in recent years. Existing NL2SQL datasets assume that condition values should appear exactly in natural language questions and the queries are answerable given the table. However, these assumptions may fail in practical scenarios, because user may use different expre… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

  39. GCN-RL Circuit Designer: Transferable Transistor Sizing with Graph Neural Networks and Reinforcement Learning

    Authors: Hanrui Wang, Kuan Wang, Jiacheng Yang, Linxiao Shen, Nan Sun, Hae-Seung Lee, Song Han

    Abstract: Automatic transistor sizing is a challenging problem in circuit design due to the large design space, complex performance trade-offs, and fast technological advancements. Although there has been plenty of work on transistor sizing targeting on one circuit, limited research has been done on transferring the knowledge from one circuit to another to reduce the re-design overhead. In this paper, we pr… ▽ More

    Submitted 30 April, 2020; originally announced May 2020.

    Comments: Accepted to the 57th Design Automation Conference (DAC 2020); 6 pages, 8 figures

  40. arXiv:1805.10503  [pdf, other

    cond-mat.str-el cs.AI cs.LG physics.comp-ph

    Deep Learning Topological Invariants of Band Insulators

    Authors: Ning Sun, Jinmin Yi, Pengfei Zhang, Huitao Shen, Hui Zhai

    Abstract: In this work we design and train deep neural networks to predict topological invariants for one-dimensional four-band insulators in AIII class whose topological invariant is the winding number, and two-dimensional two-band insulators in A class whose topological invariant is the Chern number. Given Hamiltonians in the momentum space as the input, neural networks can predict topological invariants… ▽ More

    Submitted 9 June, 2018; v1 submitted 26 May, 2018; originally announced May 2018.

    Comments: 8 pages, 5 figures

    Journal ref: Phys. Rev. B 98, 085402 (2018)

  41. arXiv:1707.00323  [pdf, other

    math.NA cs.CG

    An improved isogeometric analysis method for trimmed geometries

    Authors: Jinlan Xu, Ningning Sun, Laixin Shu, Timon Rabczuk, Gang Xu

    Abstract: Trimming techniques are efficient ways to generate complex geometries in Computer-Aided Design(CAD). In this paper, an improved isogeometric analysis(IGA) method for trimmed geometries is proposed. We will show that the proposed method reduces the numerical error of physical solution by 50% for simple trimmed geometries, and the condition number of stiffness matrix is also decreased. Furthermore,… ▽ More

    Submitted 2 July, 2017; originally announced July 2017.

  42. arXiv:1612.07866  [pdf, other

    cs.DS math.ST stat.ML

    Spectral algorithms for tensor completion

    Authors: Andrea Montanari, Nike Sun

    Abstract: In the tensor completion problem, one seeks to estimate a low-rank tensor based on a random sample of revealed entries. In terms of the required sample size, earlier work revealed a large gap between estimation with unbounded computational resources (using, for instance, tensor nuclear norm minimization) and polynomial-time algorithms. Among the latter, the best statistical guarantees have been pr… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

  43. arXiv:1602.01428  [pdf

    cs.CL cs.IR

    "Draw My Topics": Find Desired Topics fast from large scale of Corpus

    Authors: Jason Dou, Ni Sun, Xiaojun Zou

    Abstract: We develop the "Draw My Topics" toolkit, which provides a fast way to incorporate social scientists' interest into standard topic modelling. Instead of using raw corpus with primitive processing as input, an algorithm based on Vector Space Model and Conditional Entropy are used to connect social scientists' willingness and unsupervised topic models' output. Space for users' adjustment on specific… ▽ More

    Submitted 3 February, 2016; originally announced February 2016.

  44. arXiv:1504.04974  [pdf, other

    cs.DC cs.PF

    Understanding Big Data Analytic Workloads on Modern Processors

    Authors: Zhen Jia, Lei Wang, Jianfeng Zhan, Lixin Zhang, Chunjie Luo, Ninghui Sun

    Abstract: Big data analytics applications play a significant role in data centers, and hence it has become increasingly important to understand their behaviors in order to further improve the performance of data center computer systems, in which characterizing representative workloads is a key practical problem. In this paper, after investigating three most impor- tant application domains in terms of page v… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1307.8013

  45. arXiv:1411.0650  [pdf, other

    math.PR cs.DM math-ph

    Proof of the satisfiability conjecture for large k

    Authors: Jian Ding, Allan Sly, Nike Sun

    Abstract: We establish the satisfiability threshold for random $k$-SAT for all $k\ge k_0$, with $k_0$ an absolute constant. That is, there exists a limiting density $α_*(k)$ such that a random $k$-SAT formula of clause density $α$ is with high probability satisfiable for $α<α_*$, and unsatisfiable for $α>α_*$. We show that the threshold $α_*(k)$ is given explicitly by the one-step replica symmetry breaking… ▽ More

    Submitted 15 April, 2021; v1 submitted 3 November, 2014; originally announced November 2014.

  46. arXiv:1310.5603  [pdf, other

    cs.DC

    GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel Applications

    Authors: Jie Yan, Guangming Tan, Ninghui Sun

    Abstract: Large-scale distributed graph-parallel computing is challenging. On one hand, due to the irregular computation pattern and lack of locality, it is hard to express parallelism efficiently. On the other hand, due to the scale-free nature, real-world graphs are hard to partition in balance with low cut. To address these challenges, several graph-parallel frameworks including Pregel and GraphLab (Powe… ▽ More

    Submitted 21 October, 2013; originally announced October 2013.

    Comments: 12 pages, also submitted to PVLDB

  47. arXiv:1208.5542  [pdf, ps, other

    cs.DC cs.DS

    Compression and Sieve: Reducing Communication in Parallel Breadth First Search on Distributed Memory Systems

    Authors: Huiwei Lv, Guangming Tan, Mingyu Chen, Ninghui Sun

    Abstract: For parallel breadth first search (BFS) algorithm on large-scale distributed memory systems, communication often costs significantly more than arithmetic and limits the scalability of the algorithm. In this paper we sufficiently reduce the communication cost in distributed BFS by compressing and sieving the messages. First, we leverage a bitmap compression algorithm to reduce the size of messages… ▽ More

    Submitted 27 August, 2012; originally announced August 2012.

    Comments: 10 pages, 10 figures

  48. arXiv:1203.2602  [pdf, ps, other

    math.PR cs.CC math-ph

    The computational hardness of counting in two-spin models on d-regular graphs

    Authors: Allan Sly, Nike Sun

    Abstract: The class of two-spin systems contains several important models, including random independent sets and the Ising model of statistical physics. We show that for both the hard-core (independent set) model and the anti-ferromagnetic Ising model with arbitrary external field, it is NP-hard to approximate the partition function or approximately sample from the model on d-regular graphs when the model h… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Comments: 23 pages

  49. High Volume Computing: Identifying and Characterizing Throughput Oriented Workloads in Data Centers

    Authors: Jianfeng Zhan, Lixin Zhang, Ninghui Sun, Lei Wang, Zhen Jia, Chunjie Luo

    Abstract: For the first time, this paper systematically identifies three categories of throughput oriented workloads in data centers: services, data processing applications, and interactive real-time applications, whose targets are to increase the volume of throughput in terms of processed requests or data, or supported maximum number of simultaneous subscribers, respectively, and we coin a new term high vo… ▽ More

    Submitted 14 January, 2013; v1 submitted 28 February, 2012; originally announced February 2012.

    Comments: 10 pages

    Journal ref: Workshop on Large-Scale Parallel Processing in conjunction with 26th IEEE International Parallel and Distributed Processing Symposium, 2012, Shanghai, China

  50. arXiv:1110.4821  [pdf, ps, other

    math.PR cs.DM

    Factor models on locally tree-like graphs

    Authors: Amir Dembo, Andrea Montanari, Nike Sun

    Abstract: We consider homogeneous factor models on uniformly sparse graph sequences converging locally to a (unimodular) random tree $T$, and study the existence of the free energy density $φ$, the limit of the log-partition function divided by the number of vertices $n$ as $n$ tends to infinity. We provide a new interpolation scheme and use it to prove existence of, and to explicitly compute, the quantity… ▽ More

    Submitted 16 December, 2013; v1 submitted 21 October, 2011; originally announced October 2011.

    Comments: Published in at http://dx.doi.org/10.1214/12-AOP828 the Annals of Probability (http://www.imstat.org/aop/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOP-AOP828

    Journal ref: Annals of Probability 2013, Vol. 41, No. 6, 4162-4213