681 research outputs found
BakedAvatar: Baking Neural Fields for Real-Time Head Avatar Synthesis
Synthesizing photorealistic 4D human head avatars from videos is essential
for VR/AR, telepresence, and video game applications. Although existing Neural
Radiance Fields (NeRF)-based methods achieve high-fidelity results, the
computational expense limits their use in real-time applications. To overcome
this limitation, we introduce BakedAvatar, a novel representation for real-time
neural head avatar synthesis, deployable in a standard polygon rasterization
pipeline. Our approach extracts deformable multi-layer meshes from learned
isosurfaces of the head and computes expression-, pose-, and view-dependent
appearances that can be baked into static textures for efficient rasterization.
We thus propose a three-stage pipeline for neural head avatar synthesis, which
includes learning continuous deformation, manifold, and radiance fields,
extracting layered meshes and textures, and fine-tuning texture details with
differential rasterization. Experimental results demonstrate that our
representation generates synthesis results of comparable quality to other
state-of-the-art methods while significantly reducing the inference time
required. We further showcase various head avatar synthesis results from
monocular videos, including view synthesis, face reenactment, expression
editing, and pose editing, all at interactive frame rates.Comment: ACM Transactions on Graphics (SIGGRAPH Asia 2023). Project Page:
https://buaavrcg.github.io/BakedAvata
Federated Heterogeneous Graph Neural Network for Privacy-preserving Recommendation
The heterogeneous information network (HIN), which contains rich semantics
depicted by meta-paths, has emerged as a potent tool for mitigating data
sparsity in recommender systems. Existing HIN-based recommender systems operate
under the assumption of centralized storage and model training. However,
real-world data is often distributed due to privacy concerns, leading to the
semantic broken issue within HINs and consequent failures in centralized
HIN-based recommendations. In this paper, we suggest the HIN is partitioned
into private HINs stored on the client side and shared HINs on the server.
Following this setting, we propose a federated heterogeneous graph neural
network (FedHGNN) based framework, which facilitates collaborative training of
a recommendation model using distributed HINs while protecting user privacy.
Specifically, we first formalize the privacy definition for HIN-based federated
recommendation (FedRec) in the light of differential privacy, with the goal of
protecting user-item interactions within private HIN as well as users'
high-order patterns from shared HINs. To recover the broken meta-path based
semantics and ensure proposed privacy measures, we elaborately design a
semantic-preserving user interactions publishing method, which locally perturbs
user's high-order patterns and related user-item interactions for publishing.
Subsequently, we introduce an HGNN model for recommendation, which conducts
node- and semantic-level aggregations to capture recovered semantics. Extensive
experiments on four datasets demonstrate that our model outperforms existing
methods by a substantial margin (up to 34% in HR@10 and 42% in NDCG@10) under a
reasonable privacy budget.Comment: Accepted by WWW 202
Graph Mining for Cybersecurity: A Survey
The explosive growth of cyber attacks nowadays, such as malware, spam, and
intrusions, caused severe consequences on society. Securing cyberspace has
become an utmost concern for organizations and governments. Traditional Machine
Learning (ML) based methods are extensively used in detecting cyber threats,
but they hardly model the correlations between real-world cyber entities. In
recent years, with the proliferation of graph mining techniques, many
researchers investigated these techniques for capturing correlations between
cyber entities and achieving high performance. It is imperative to summarize
existing graph-based cybersecurity solutions to provide a guide for future
studies. Therefore, as a key contribution of this paper, we provide a
comprehensive review of graph mining for cybersecurity, including an overview
of cybersecurity tasks, the typical graph mining techniques, and the general
process of applying them to cybersecurity, as well as various solutions for
different cybersecurity tasks. For each task, we probe into relevant methods
and highlight the graph types, graph approaches, and task levels in their
modeling. Furthermore, we collect open datasets and toolkits for graph-based
cybersecurity. Finally, we outlook the potential directions of this field for
future research
InPrePPI: an integrated evaluation method based on genomic context for predicting protein-protein interactions in prokaryotic genomes
Background Although many genomic features have been used in the prediction of protein-protein interactions (PPIs), frequently only one is used in a computational method. After realizing the limited power in the prediction using only one genomic feature, investigators are now moving toward integration. So far, there have been few integration studies for PPI prediction; one failed to yield appreciable improvement of prediction and the others did not conduct performance comparison. It remains unclear whether an integration of multiple genomic features can improve the PPI prediction and, if it can, how to integrate these features.
Results In this study, we first performed a systematic evaluation on the PPI prediction in Escherichia coli (E. coli) by four genomic context based methods: the phylogenetic profile method, the gene cluster method, the gene fusion method, and the gene neighbor method. The number of predicted PPIs and the average degree in the predicted PPI networks varied greatly among the four methods. Further, no method outperformed the others when we tested using three well-defined positive datasets from the KEGG, EcoCyc, and DIP databases. Based on these comparisons, we developed a novel integrated method, named InPrePPI. InPrePPI first normalizes the AC value (an integrated value of the accuracy and coverage) of each method using three positive datasets, then calculates a weight for each method, and finally uses the weight to calculate an integrated score for each protein pair predicted by the four genomic context based methods. We demonstrate that InPrePPI outperforms each of the four individual methods and, in general, the other two existing integrated methods: the joint observation method and the integrated prediction method in STRING. These four methods and InPrePPI are implemented in a user-friendly web interface.
Conclusion This study evaluated the PPI prediction by four genomic context based methods, and presents an integrated evaluation method that shows better performance in E. coli
Y Chromosomes of 40% Chinese Are Descendants of Three Neolithic Super-grandfathers
Demographic change of human populations is one of the central questions for
delving into the past of human beings. To identify major population expansions
related to male lineages, we sequenced 78 East Asian Y chromosomes at 3.9 Mbp
of the non-recombining region (NRY), discovered >4,000 new SNPs, and identified
many new clades. The relative divergence dates can be estimated much more
precisely using molecular clock. We found that all the Paleolithic divergences
were binary; however, three strong star-like Neolithic expansions at ~6 kya
(thousand years ago) (assuming a constant substitution rate of 1e-9/bp/year)
indicates that ~40% of modern Chinese are patrilineal descendants of only three
super-grandfathers at that time. This observation suggests that the main
patrilineal expansion in China occurred in the Neolithic Era and might be
related to the development of agriculture.Comment: 29 pages of article text including 1 article figure, 9 pages of SI
text, and 2 SI figures. 5 SI tables are in a separate ancillary fil
- …