Liusheng Huang
YOU?
Author Swipe
View article: FedQuad: Adaptive Layer-wise LoRA Deployment and Activation Quantization for Federated Fine-Tuning
FedQuad: Adaptive Layer-wise LoRA Deployment and Activation Quantization for Federated Fine-Tuning Open
Federated fine-tuning (FedFT) provides an effective paradigm for fine-tuning large language models (LLMs) in privacy-sensitive scenarios. However, practical deployment remains challenging due to the limited resources on end devices. Existi…
View article: Cross-region Model Training with Communication-Computation Overlapping and Delay Compensation
Cross-region Model Training with Communication-Computation Overlapping and Delay Compensation Open
Training large language models (LLMs) requires massive computational resources, often necessitating the aggregation of geographically distributed data centers (\ie, cross-region training). However, the high communication latency in wide-ar…
View article: Stop Diverse OOD Attacks: Knowledge Ensemble for Reliable Defense
Stop Diverse OOD Attacks: Knowledge Ensemble for Reliable Defense Open
Enhancing defense through model ensemble is an emerging trend, where the challenge lies in how to use ensemble knowledge to counter Out-of-Distribution (OOD) attacks. In this paper, we propose the Reliable Defense Ensemble (REE) to address…
View article: Collaborative Speculative Inference for Efficient LLM Inference Serving
Collaborative Speculative Inference for Efficient LLM Inference Serving Open
Speculative inference is a promising paradigm employing small speculative models (SSMs) as drafters to generate draft tokens, which are subsequently verified in parallel by the target large language model (LLM). This approach enhances the …
View article: Top-n𝜎: Eliminating Noise in Logit Space for Robust Token Sampling of LLM
Top-n𝜎: Eliminating Noise in Logit Space for Robust Token Sampling of LLM Open
View article: Enhancing Federated Graph Learning via Adaptive Fusion of Structural and Node Characteristics
Enhancing Federated Graph Learning via Adaptive Fusion of Structural and Node Characteristics Open
Federated Graph Learning (FGL) has demonstrated the advantage of training a global Graph Neural Network (GNN) model across distributed clients using their local graph data. Unlike Euclidean data (\eg, images), graph data is composed of nod…
View article: Accelerating End-Cloud Collaborative Inference via Near Bubble-free Pipeline Optimization
Accelerating End-Cloud Collaborative Inference via Near Bubble-free Pipeline Optimization Open
End-cloud collaboration offers a promising strategy to enhance the Quality of Service (QoS) in DNN inference by offloading portions of the inference workload from end devices to cloud servers. Despite the potential, the complex model archi…
View article: Many Hands Make Light Work: Accelerating Edge Inference via Multi-Client Collaborative Caching
Many Hands Make Light Work: Accelerating Edge Inference via Multi-Client Collaborative Caching Open
Edge inference is a technology that enables real-time data processing and analysis on clients near the data source. To ensure compliance with the Service-Level Objectives (SLOs), such as a 30% latency reduction target, caching is usually a…
View article: ParallelSFL: A Novel Split Federated Learning Framework Tackling Heterogeneity Issues
ParallelSFL: A Novel Split Federated Learning Framework Tackling Heterogeneity Issues Open
Mobile devices contribute more than half of the world's web traffic, providing massive and diverse data for powering various federated learning (FL) applications. In order to avoid the communication bottleneck on the parameter server (PS) …
View article: Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization
Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization Open
Graph data are widely collected and exploited by organizations, providing convenient services from policy formation and market decisions to medical care and social interactions. Yet, recent exposures of private data abuses have caused huge…
View article: Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds
Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds Open
Deep neural networks are extremely vulnerable to malicious input data. As 3D data is increasingly used in vision tasks such as robots, autonomous driving and drones, the internal robustness of the classification models for 3D point cloud h…
View article: F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network Open
Traditional machine learning-based steganalysis methods on compressed speech have achieved great success in the field of communication security. However, previous studies lacked mathematical modeling of the correlation between codewords, a…
View article: F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network Open
Traditional machine learning-based steganalysis methods on compressed speech have achieved great success in the field of communication security. However, previous studies lacked mathematical description and modeling of the correlation betw…
View article: PointTrack++ for Effective Online Multi-Object Tracking and Segmentation
PointTrack++ for Effective Online Multi-Object Tracking and Segmentation Open
Multiple-object tracking and segmentation (MOTS) is a novel computer vision task that aims to jointly perform multiple object tracking (MOT) and instance segmentation. In this work, we present PointTrack++, an effective on-line framework f…
View article: Segment as Points for Efficient Online Multi-Object Tracking and Segmentation
Segment as Points for Efficient Online Multi-Object Tracking and Segmentation Open
Current multi-object tracking and segmentation (MOTS) methods follow the tracking-by-detection paradigm and adopt convolutions for feature extraction. However, as affected by the inherent receptive field, convolution based feature extracti…
View article: ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection
ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection Open
3D object detection is an essential task in autonomous driving and robotics. Though great progress has been made, challenges remain in estimating 3D pose for distant and occluded objects. In this paper, we present a novel framework named Z…
View article: ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection
ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection Open
3D object detection is an essential task in autonomous driving and robotics. Though great progress has been made, challenges remain in estimating 3D pose for distant and occluded objects. In this paper, we present a novel framework named Z…
View article: Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability
Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability Open
Voting plays a central role in bringing crowd wisdom to collective decision making, meanwhile data privacy has been a common ethical/legal issue in eliciting preferences from individuals. This work studies the problem of aggregating indivi…
View article: How Bob in Quantum Private Query Protocol Gets the Element?
How Bob in Quantum Private Query Protocol Gets the Element? Open
Quantum private query (QPQ) requires that the database holder Bob knows nothing about his client Alice, including the index she provides and the element she obtains. However, on some occasion, Bob wants to know which element he has reveale…
View article: Attention-based Walking Gait and Direction Recognition in Wi-Fi Networks
Attention-based Walking Gait and Direction Recognition in Wi-Fi Networks Open
The study of human gait recognition has been becoming an active research field. In this paper, we propose to adopt the attention-based Recurrent Neural Network (RNN) encoder-decoder framework to implement a cycle-independent human gait and…
View article: COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds
COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds Open
With the emerging technologies of Internet of Things (IOTs), the capabilities of mobile devices have increased tremendously. However, in the big data era, to complete tasks on one device is still challenging. As an emerging technology, cro…
View article: Hybrid routing by joint optimization of per-flow routing and tag-based routing in software-defined networks
Hybrid routing by joint optimization of per-flow routing and tag-based routing in software-defined networks Open
In recent years, Software-Defined Networks (SDNs) have become a promising technology to improve network utilization. However, limited flow table size and long deployment delays may result in low network performance in large-scale networks …
View article: Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings
Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings Open
Traditional word embedding approaches learn semantic information at word level while ignoring the meaningful internal structures of words like morphemes. Furthermore, existing morphology-based models directly incorporate morphemes to train…
View article: Cost-Effective Seed Selection in Online Social Networks
Cost-Effective Seed Selection in Online Social Networks Open
We study the min-cost seed selection problem in online social networks, where the goal is to select a set of seed nodes with the minimum total cost such that the expected number of influenced nodes in the network exceeds a predefined thres…
View article: Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing
Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing Open
Ensemble learning has been widely employed by mobile applications, ranging from environmental sensing to activity recognitions. One of the fundamental issue in ensemble learning is the trade-off between classification accuracy and computat…
View article: Optimizing virtual machine placement in distributed clouds with M/M/1 servers
Optimizing virtual machine placement in distributed clouds with M/M/1 servers Open
View article: Personalized Differential Privacy Preserving Data Aggregation for Smart Homes
Personalized Differential Privacy Preserving Data Aggregation for Smart Homes Open
The aggregation of residents' private data drives improvements in the smart homes, however it comes with compromising on privacy.Hence, privacy preservation has become an increasing requirement for residents.Since users might have differen…
View article: A Hybrid Covert Channel Over LTE-A System
A Hybrid Covert Channel Over LTE-A System Open
In this paper, we have analyzed the sub-protocol stack of Long Term Evolution Advanced (LTE-A) System, and proposed a hybrid covert channel, called HyLTEsteg, designed for LTE-A System.The HyLTEsteg uses covert timing channels (CTC), which…
View article: DYPSOKM: A Dynamic Union Of PSO And K-Means, A Better Cluster
DYPSOKM: A Dynamic Union Of PSO And K-Means, A Better Cluster Open
As one of the most famous clustering algorithms, K-means is simple and effective but easily falls into local optimal solution.Aimed at this flaw, many methods including PSO had been applied to optimize K-means.As a typical swarm intelligen…
View article: Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones
Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones Open
As the size of smartphone touchscreens has become larger and larger in recent years, operability with a single hand is getting worse, especially for female users. We envision that user experience can be significantly improved if smartphone…