Skip to main content

Showing 1–34 of 34 results for author: Ying, J

  1. arXiv:2410.11209  [pdf, other

    cs.CR

    CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports

    Authors: Wenrui Cheng, Tiantian Zhu, Tieming Chen, Qixuan Yuan, Jie Ying, Hongmei Li, Chunlin Xiong, Mingda Li, Mingqi Lv, Yan Chen

    Abstract: Cyber Threat Intelligence (CTI) reports are factual records compiled by security analysts through their observations of threat events or their own practical experience with attacks. In order to utilize CTI reports for attack detection, existing methods have attempted to map the content of reports onto system-level attack provenance graphs to clearly depict attack procedures. However, existing stud… ▽ More

    Submitted 14 October, 2024; originally announced October 2024.

  2. arXiv:2408.11431  [pdf, other

    cs.CL cs.AI

    Diagnosing and Remedying Knowledge Deficiencies in LLMs via Label-free Curricular Meaningful Learning

    Authors: Kai Xiong, Xiao Ding, Li Du, Jiahao Ying, Ting Liu, Bing Qin, Yixin Cao

    Abstract: Large Language Models (LLMs) are versatile and demonstrate impressive generalization ability by mining and learning information from extensive unlabeled text. However, they still exhibit reasoning mistakes, often stemming from knowledge deficiencies, which can affect their trustworthiness and reliability. Although users can provide diverse and comprehensive queries, obtaining sufficient and effect… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

    Comments: Under Review

  3. arXiv:2408.04535  [pdf, other

    eess.IV cs.AI

    Synchronous Multi-modal Semantic Communication System with Packet-level Coding

    Authors: Yun Tian, Jingkai Ying, Zhijin Qin, Ye Jin, Xiaoming Tao

    Abstract: Although the semantic communication with joint semantic-channel coding design has shown promising performance in transmitting data of different modalities over physical layer channels, the synchronization and packet-level forward error correction of multimodal semantics have not been well studied. Due to the independent design of semantic encoders, synchronizing multimodal features in both the sem… ▽ More

    Submitted 10 August, 2024; v1 submitted 8 August, 2024; originally announced August 2024.

    Comments: 12 pages, 9 figures

  4. arXiv:2407.00497  [pdf, other

    cs.CL

    LLMs-as-Instructors: Learning from Errors Toward Automating Model Improvement

    Authors: Jiahao Ying, Mingbao Lin, Yixin Cao, Wei Tang, Bo Wang, Qianru Sun, Xuanjing Huang, Shuicheng Yan

    Abstract: This paper introduces the innovative "LLMs-as-Instructors" framework, which leverages the advanced Large Language Models (LLMs) to autonomously enhance the training of smaller target models. Inspired by the theory of "Learning from Errors", this framework employs an instructor LLM to meticulously analyze the specific errors within a target model, facilitating targeted and efficient training cycles… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  5. arXiv:2406.13167  [pdf, other

    cs.CL

    QRMeM: Unleash the Length Limitation through Question then Reflection Memory Mechanism

    Authors: Bo Wang, Heyan Huang, Yixin Cao, Jiahao Ying, Wei Tang, Chong Feng

    Abstract: While large language models (LLMs) have made notable advancements in natural language processing, they continue to struggle with processing extensive text. Memory mechanism offers a flexible solution for managing long contexts, utilizing techniques such as compression, summarization, and structuring to facilitate nuanced and efficient handling of large volumes of text. However, existing techniques… ▽ More

    Submitted 26 September, 2024; v1 submitted 18 June, 2024; originally announced June 2024.

    Comments: EMNLP 2024 Findings

  6. arXiv:2406.04875  [pdf, other

    cs.CV

    3DRealCar: An In-the-wild RGB-D Car Dataset with 360-degree Views

    Authors: Xiaobiao Du, Haiyang Sun, Shuyun Wang, Zhuojie Wu, Hongwei Sheng, Jiaying Ying, Ming Lu, Tianqing Zhu, Kun Zhan, Xin Yu

    Abstract: 3D cars are commonly used in self-driving systems, virtual/augmented reality, and games. However, existing 3D car datasets are either synthetic or low-quality, presenting a significant gap toward the high-quality real-world 3D car datasets and limiting their applications in practical scenarios. In this paper, we propose the first large-scale 3D real car dataset, termed 3DRealCar, offering three di… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: Project Page: https://xiaobiaodu.github.io/3drealcar

  7. arXiv:2406.03963  [pdf, other

    cs.CL

    A + B: A General Generator-Reader Framework for Optimizing LLMs to Unleash Synergy Potential

    Authors: Wei Tang, Yixin Cao, Jiahao Ying, Bo Wang, Yuyue Zhao, Yong Liao, Pengyuan Zhou

    Abstract: Retrieval-Augmented Generation (RAG) is an effective solution to supplement necessary knowledge to large language models (LLMs). Targeting its bottleneck of retriever performance, "generate-then-read" pipeline is proposed to replace the retrieval stage with generation from the LLM itself. Although promising, this research direction is underexplored and still cannot work in the scenario when source… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: Accepted to ACL'24 (Findings)

  8. arXiv:2405.13675  [pdf, other

    cs.CV

    Context and Geometry Aware Voxel Transformer for Semantic Scene Completion

    Authors: Zhu Yu, Runmin Zhang, Jiacheng Ying, Junchen Yu, Xiaohai Hu, Lun Luo, Si-Yuan Cao, Hui-Liang Shen

    Abstract: Vision-based Semantic Scene Completion (SSC) has gained much attention due to its widespread applications in various 3D perception tasks. Existing sparse-to-dense approaches typically employ shared context-independent queries across various input images, which fails to capture distinctions among them as the focal regions of different inputs vary and may result in undirected feature aggregation of… ▽ More

    Submitted 3 October, 2024; v1 submitted 22 May, 2024; originally announced May 2024.

    Comments: NIPS 2024 Spotlight

  9. arXiv:2405.02826  [pdf, other

    cs.CR

    Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports

    Authors: Tiantian Zhu, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen

    Abstract: Advanced Persistent Threat (APT) attacks have caused significant damage worldwide. Various Endpoint Detection and Response (EDR) systems are deployed by enterprises to fight against potential threats. However, EDR suffers from high false positives. In order not to affect normal operations, analysts need to investigate and filter detection results before taking countermeasures, in which heavy manua… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

  10. arXiv:2405.02629  [pdf, other

    cs.CR

    SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time

    Authors: Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen, Mingqi Lv, Yan Chen

    Abstract: As the complexity and destructiveness of Advanced Persistent Threat (APT) increase, there is a growing tendency to identify a series of actions undertaken to achieve the attacker's target, called attack investigation. Currently, analysts construct the provenance graph to perform causality analysis on Point-Of-Interest (POI) event for capturing critical events (related to the attack). However, due… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

  11. arXiv:2404.02621  [pdf, other

    eess.SP cs.LG

    Polynomial Graphical Lasso: Learning Edges from Gaussian Graph-Stationary Signals

    Authors: Andrei Buciulea, Jiaxi Ying, Antonio G. Marques, Daniel P. Palomar

    Abstract: This paper introduces Polynomial Graphical Lasso (PGL), a new approach to learning graph structures from nodal signals. Our key contribution lies in modeling the signals as Gaussian and stationary on the graph, enabling the development of a graph-learning formulation that combines the strengths of graphical lasso with a more encompassing model. Specifically, we assume that the precision matrix can… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  12. arXiv:2404.00349  [pdf, other

    cs.CV

    SGDFormer: One-stage Transformer-based Architecture for Cross-Spectral Stereo Image Guided Denoising

    Authors: Runmin Zhang, Zhu Yu, Zehua Sheng, Jiacheng Ying, Si-Yuan Cao, Shu-Jie Chen, Bailin Yang, Junwei Li, Hui-Liang Shen

    Abstract: Cross-spectral image guided denoising has shown its great potential in recovering clean images with rich details, such as using the near-infrared image to guide the denoising process of the visible one. To obtain such image pairs, a feasible and economical way is to employ a stereo system, which is widely used on mobile devices. Current works attempt to generate an aligned guidance image to handle… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

  13. arXiv:2403.12541  [pdf, other

    cs.CR

    Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks

    Authors: Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang, Liang Hou, Wenmao Liu, Xuhong Zhang, Jianwei Ying

    Abstract: Recent research in both academia and industry has validated the effectiveness of provenance graph-based detection for advanced cyber attack detection and investigation. However, analyzing large-scale provenance graphs often results in substantial overhead. To improve performance, existing detection systems implement various optimization strategies. Yet, as several recent studies suggest, these str… ▽ More

    Submitted 10 July, 2024; v1 submitted 19 March, 2024; originally announced March 2024.

  14. arXiv:2402.11894  [pdf, other

    cs.CL

    Automating Dataset Updates Towards Reliable and Timely Evaluation of Large Language Models

    Authors: Jiahao Ying, Yixin Cao, Yushi Bai, Qianru Sun, Bo Wang, Wei Tang, Zhaojun Ding, Yizhe Yang, Xuanjing Huang, Shuicheng Yan

    Abstract: Large language models (LLMs) have achieved impressive performance across various natural language benchmarks, prompting a continual need to curate more difficult datasets for larger LLMs, which is costly and time-consuming. In this paper, we propose to automate dataset updating and provide systematic analysis regarding its effectiveness in dealing with benchmark leakage issue, difficulty control,… ▽ More

    Submitted 6 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

  15. arXiv:2401.07762  [pdf

    cs.CE

    Auto-Regressive Model with Exogenous Input--ARX--based traffic-flow prediction

    Authors: Jun Ying, Xin Dong, Bowei Li, Zihan Tian

    Abstract: Traffic flow prediction is widely used in travel decision making, traffic control, roadway system planning, business sectors, and government agencies. ARX models have proved to be highly effective and versatile. In this research, we investigated the applications of ARX models in prediction for real traffic flow in New York City. The ARX models were constructed by linear/polynomial or neural networ… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  16. arXiv:2312.00740  [pdf, ps, other

    cs.IT

    Computing Networks Enabled Semantic Communications

    Authors: Zhijin Qin, Jingkai Ying, Dingxi Yang, Hengjiang Wang, Xiaoming Tao

    Abstract: Semantic communication has shown great potential in boosting the effectiveness and reliability of communications. However, its systems to date are mostly enabled by deep learning, which requires demanding computing resources. This article proposes a framework for the computing networks enabled semantic communication system, aiming to offer sufficient computing resources for semantic processing and… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

  17. arXiv:2311.10801  [pdf, other

    q-fin.PM cs.AI cs.CE cs.LG

    Reinforcement Learning with Maskable Stock Representation for Portfolio Management in Customizable Stock Pools

    Authors: Wentao Zhang, Yilei Zhao, Shuo Sun, Jie Ying, Yonggang Xie, Zitao Song, Xinrun Wang, Bo An

    Abstract: Portfolio management (PM) is a fundamental financial trading task, which explores the optimal periodical reallocation of capitals into different stocks to pursue long-term profits. Reinforcement learning (RL) has recently shown its potential to train profitable agents for PM through interacting with financial markets. However, existing work mostly focuses on fixed stock pools, which is inconsisten… ▽ More

    Submitted 27 February, 2024; v1 submitted 17 November, 2023; originally announced November 2023.

  18. arXiv:2309.17415  [pdf, other

    cs.CL

    Intuitive or Dependent? Investigating LLMs' Behavior Style to Conflicting Prompts

    Authors: Jiahao Ying, Yixin Cao, Kai Xiong, Yidong He, Long Cui, Yongbin Liu

    Abstract: This study investigates the behaviors of Large Language Models (LLMs) when faced with conflicting prompts versus their internal memory. This will not only help to understand LLMs' decision mechanism but also benefit real-world applications, such as retrieval-augmented generation (RAG). Drawing on cognitive theory, we target the first scenario of decision-making styles where there is no superiority… ▽ More

    Submitted 20 February, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

  19. arXiv:2309.13405  [pdf, other

    cs.LG eess.SP

    Learning Large-Scale MTP$_2$ Gaussian Graphical Models via Bridge-Block Decomposition

    Authors: Xiwen Wang, Jiaxi Ying, Daniel P. Palomar

    Abstract: This paper studies the problem of learning the large-scale Gaussian graphical models that are multivariate totally positive of order two ($\text{MTP}_2$). By introducing the concept of bridge, which commonly exists in large-scale sparse graphs, we show that the entire problem can be equivalently optimized through (1) several smaller-scaled sub-problems induced by a \emph{bridge-block decomposition… ▽ More

    Submitted 29 September, 2023; v1 submitted 23 September, 2023; originally announced September 2023.

  20. arXiv:2309.02046  [pdf, other

    cs.IT math.OC

    A Fast and Provable Algorithm for Sparse Phase Retrieval

    Authors: Jian-Feng Cai, Yu Long, Ruixue Wen, Jiaxi Ying

    Abstract: We study the sparse phase retrieval problem, which seeks to recover a sparse signal from a limited set of magnitude-only measurements. In contrast to prevalent sparse phase retrieval algorithms that primarily use first-order methods, we propose an innovative second-order algorithm that employs a Newton-type method with hard thresholding. This algorithm overcomes the linear convergence limitations… ▽ More

    Submitted 19 March, 2024; v1 submitted 5 September, 2023; originally announced September 2023.

  21. arXiv:2309.00960  [pdf, other

    cs.LG eess.SP

    Network Topology Inference with Sparsity and Laplacian Constraints

    Authors: Jiaxi Ying, Xi Han, Rui Zhou, Xiwen Wang, Hing Cheung So

    Abstract: We tackle the network topology inference problem by utilizing Laplacian constrained Gaussian graphical models, which recast the task as estimating a precision matrix in the form of a graph Laplacian. Recent research \cite{ying2020nonconvex} has uncovered the limitations of the widely used $\ell_1$-norm in learning sparse graphs under this model: empirically, the number of nonzero entries in the so… ▽ More

    Submitted 2 September, 2023; originally announced September 2023.

  22. arXiv:2306.04181  [pdf, other

    cs.CL cs.LG

    Benchmarking Foundation Models with Language-Model-as-an-Examiner

    Authors: Yushi Bai, Jiahao Ying, Yixin Cao, Xin Lv, Yuze He, Xiaozhi Wang, Jifan Yu, Kaisheng Zeng, Yijia Xiao, Haozhe Lyu, Jiayin Zhang, Juanzi Li, Lei Hou

    Abstract: Numerous benchmarks have been established to assess the performance of foundation models on open-ended question answering, which serves as a comprehensive test of a model's ability to understand and generate language in a manner similar to humans. Most of these works focus on proposing new datasets, however, we see two main issues within previous benchmarking pipelines, namely testing leakage and… ▽ More

    Submitted 4 November, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: NeurIPS 2023 Datasets and Benchmarks

  23. TFDet: Target-Aware Fusion for RGB-T Pedestrian Detection

    Authors: Xue Zhang, Xiaohan Zhang, Jiangtao Wang, Jiacheng Ying, Zehua Sheng, Heng Yu, Chunguang Li, Hui-Liang Shen

    Abstract: Pedestrian detection plays a critical role in computer vision as it contributes to ensuring traffic safety. Existing methods that rely solely on RGB images suffer from performance degradation under low-light conditions due to the lack of useful information. To address this issue, recent multispectral detection approaches have combined thermal images to provide complementary information and have ob… ▽ More

    Submitted 27 August, 2024; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: This paper has been accepted by IEEE T-NNLS journal. Please jump to External DOI to view the official version

  24. arXiv:2210.15471  [pdf, other

    stat.ML cs.LG eess.SP

    Adaptive Estimation of Graphical Models under Total Positivity

    Authors: Jiaxi Ying, José Vinícius de M. Cardoso, Daniel P. Palomar

    Abstract: We consider the problem of estimating (diagonally dominant) M-matrices as precision matrices in Gaussian graphical models. These models exhibit intriguing properties, such as the existence of the maximum likelihood estimator with merely two observations for M-matrices \citep{lauritzen2019maximum,slawski2015estimation} and even one observation for diagonally dominant M-matrices \citep{truell2021max… ▽ More

    Submitted 8 June, 2023; v1 submitted 27 October, 2022; originally announced October 2022.

    Comments: 26 pages

  25. arXiv:2210.12339  [pdf, other

    cs.CL

    P$^3$LM: Probabilistically Permuted Prophet Language Modeling for Generative Pre-Training

    Authors: Junwei Bao, Yifan Wang, Jiangyong Ying, Yeyun Gong, Jing Zhao, Youzheng Wu, Xiaodong He

    Abstract: Conventional autoregressive left-to-right (L2R) sequence generation faces two issues during decoding: limited to unidirectional target sequence modeling, and constrained on strong local dependencies. To address the aforementioned problem, we propose P$^3$LM, a probabilistically permuted prophet language model, which strengthens the modeling of bidirectional information and long token dependencies… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: Accepted to EMNLP(Findings) 2022

  26. arXiv:2112.09008  [pdf, other

    cs.CR

    APTSHIELD: A Stable, Efficient and Real-time APT Detection System for Linux Hosts

    Authors: Tiantian Zhu, Jinkai Yu, Tieming Chen, Jiayu Wang, Jie Ying, Ye Tian, Mingqi Lv, Yan Chen, Yuan Fan, Ting Wang

    Abstract: Advanced Persistent Threat (APT) attack usually refers to the form of long-term, covert and sustained attack on specific targets, with an adversary using advanced attack techniques to destroy the key facilities of an organization. APT attacks have caused serious security threats and massive financial loss worldwide. Academics and industry thereby have proposed a series of solutions to detect APT a… ▽ More

    Submitted 17 December, 2021; v1 submitted 16 December, 2021; originally announced December 2021.

  27. arXiv:2112.01939  [pdf, other

    cs.LG

    Fast Projected Newton-like Method for Precision Matrix Estimation under Total Positivity

    Authors: Jian-Feng Cai, José Vinícius de M. Cardoso, Daniel P. Palomar, Jiaxi Ying

    Abstract: We study the problem of estimating precision matrices in Gaussian distributions that are multivariate totally positive of order two ($\mathrm{MTP}_2$). The precision matrix in such a distribution is an M-matrix. This problem can be formulated as a sign-constrained log-determinant program. Current algorithms are designed using the block coordinate descent method or the proximal point algorithm, whi… ▽ More

    Submitted 22 October, 2023; v1 submitted 3 December, 2021; originally announced December 2021.

  28. arXiv:2111.14072  [pdf, other

    cs.CR cs.AR

    A Comprehensive and Cross-Platform Test Suite for Memory Safety -- Towards an Open Framework for Testing Processor Hardware Supported Security Extensions

    Authors: Wei Song, Jiameng Ying, Sihao Shen, Boya Li, Hao Ma, Peng Liu

    Abstract: Memory safety remains a critical and widely violated property in reality. Numerous defense techniques have been proposed and developed but most of them are not applied or enabled by default in production-ready environment due to their substantial running cost. The situation might change in the near future because the hardware supported defenses against these attacks are finally beginning to be ado… ▽ More

    Submitted 28 November, 2021; originally announced November 2021.

  29. arXiv:2012.15410  [pdf, other

    cs.LG eess.SP q-fin.ST

    Algorithms for Learning Graphs in Financial Markets

    Authors: José Vinícius de Miranda Cardoso, Jiaxi Ying, Daniel Perez Palomar

    Abstract: In the past two decades, the field of applied finance has tremendously benefited from graph theory. As a result, novel methods ranging from asset network estimation to hierarchical asset selection and portfolio allocation are now part of practitioners' toolboxes. In this paper, we investigate the fundamental problem of learning undirected graphical models under Laplacian structural constraints fro… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    Comments: 62 pages, 25 figures

  30. arXiv:2012.01046  [pdf, other

    cs.CR

    PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter

    Authors: Fengkai Yuan, Kai Wang, Rui Hou, Xiaoxin Li, Peinan Li, Lutan Zhao, Jiameng Ying, Amro Awad, Dan Meng

    Abstract: Cache side channel attacks obtain victim cache line access footprint to infer security-critical information. Among them, cross-core attacks exploiting the shared last level cache are more threatening as their simplicity to set up and high capacity. Stateful approaches of detection-based mitigation observe precise cache behaviors and protect specific cache lines that are suspected of being attacked… ▽ More

    Submitted 7 December, 2020; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: This paper is going to appear in 2021 Design, Automation and Test in Europe Conference (DATE)

    MSC Class: 68M01 (Primary) 68M99 (Secondary) ACM Class: C.1.0; C.5.3

  31. arXiv:2006.14925  [pdf, other

    cs.LG stat.ML

    Does the $\ell_1$-norm Learn a Sparse Graph under Laplacian Constrained Graphical Models?

    Authors: Jiaxi Ying, José Vinícius de M. Cardoso, Daniel P. Palomar

    Abstract: We consider the problem of learning a sparse graph under the Laplacian constrained Gaussian graphical models. This problem can be formulated as a penalized maximum likelihood estimation of the Laplacian constrained precision matrix. Like in the classical graphical lasso problem, recent works made use of the $\ell_1$-norm regularization with the goal of promoting sparsity in Laplacian constrained p… ▽ More

    Submitted 5 September, 2023; v1 submitted 26 June, 2020; originally announced June 2020.

  32. arXiv:1909.11594  [pdf, ps, other

    stat.ML cs.LG cs.SI math.OC stat.AP

    Structured Graph Learning Via Laplacian Spectral Constraints

    Authors: Sandeep Kumar, Jiaxi Ying, Jos'e Vin'icius de M. Cardoso, Daniel P. Palomar

    Abstract: Learning a graph with a specific structure is essential for interpretability and identification of the relationships among data. It is well known that structured graph learning from observed samples is an NP-hard combinatorial problem. In this paper, we first show that for a set of important graph families it is possible to convert the structural constraints of structure into eigenvalue constraint… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: 12 Pages, Accepted for NIPS 2019. arXiv admin note: substantial text overlap with arXiv:1904.09792

  33. arXiv:1904.09792  [pdf, ps, other

    stat.ML cs.LG cs.SI math.OC

    A Unified Framework for Structured Graph Learning via Spectral Constraints

    Authors: Sandeep Kumar, Jiaxi Ying, José Vinícius de M. Cardoso, Daniel Palomar

    Abstract: Graph learning from data represents a canonical problem that has received substantial attention in the literature. However, insufficient work has been done in incorporating prior structural knowledge onto the learning of underlying graphical models from data. Learning a graph with a specific structure is essential for interpretability and identification of the relationships among data. Useful stru… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

  34. arXiv:1604.02100  [pdf, other

    stat.ML cs.IT math.NA math.SP physics.med-ph

    Hankel Matrix Nuclear Norm Regularized Tensor Completion for $N$-dimensional Exponential Signals

    Authors: Jiaxi Ying, Hengfa Lu, Qingtao Wei, Jian-Feng Cai, Di Guo, Jihui Wu, Zhong Chen, Xiaobo Qu

    Abstract: Signals are generally modeled as a superposition of exponential functions in spectroscopy of chemistry, biology and medical imaging. For fast data acquisition or other inevitable reasons, however, only a small amount of samples may be acquired and thus how to recover the full signal becomes an active research topic. But existing approaches can not efficiently recover $N$-dimensional exponential si… ▽ More

    Submitted 31 March, 2017; v1 submitted 6 April, 2016; originally announced April 2016.

    Comments: 15 pages, 12 figures