Shuo Qin
For the interacting urn model with polynomial reinforcement, it has been conjectured that almost surely one color monopolizes all the urns if the interaction parameter $p>0$. We disprove the conjecture. For the case $p=1$, we give a sufficient condition for monopoly, which improves a previous result obtained by Launay.
Shuo Qin
We prove a conjecture by Bertoin that the multi-dimensional elephant random walk on $\mathbb{Z}^d$($d\geq 3$) is transient and the expected number of zeros is finite. We also provide some estimates on the rate of escape. In dimensions $d= 1, 2$, we prove that phase transitions between recurrence and transience occur at $p=(2d+1)/(4d)$. Let $S$ be an elephant random walk with parameter $p$. For $p \leq 3/4$, we provide a Berry-Esseen type bound for properly normalized $S_n$. For $p>3/4$, the distribution of $\lim_{n\to \infty} S_n/n^{2p-1}$ will be studied.
Shuo Qin
Under suitable moment assumptions, we show that a genuinely d-dimensional step-reinforced random walk undergoes a phase transition between recurrence and transience in dimensions $d=1,2$, and that it is transient for all reinforcement parameters in dimensions $d\geq 3$, which solves a conjecture of Bertoin.
Aditya Guha Roy, Yuval Peres, Shuo Qin, Junchi Zuo
A gambler with an initial fortune $x$ starts by betting a dollar, then doubles the bet after every win and halves the bet after every loss. Let $p\in (0,1)$ be the probability of winning for each round. We show that the gambler survives with positive probability if and only if $p < 1/2$ and $x > 2$. Moreover, the ruin probability is increasing and real-analytic in $p$, but a singular, Hölder continuous function of $x$.
Rafik Aguech, Shuo Qin
We consider a two-elephant walking model in which the elephants interact dynamically. At each time step, each elephant determines its next move randomly based on its partner's past movements. We show that the asymptotic behavior of the elephants mainly depends on the sign and the absolute value of the product of their reinforcement parameters. In various regimes, we establish the law of large numbers and the central limit theorem. Our proofs are based on a connection to the random recursive trees and employ stochastic approximation techniques and martingale methods.
Yuval Peres, Shuo Qin
We study the mixing time of a non-Markovian process -- step-reinforced random walk -- on a finite group $G$. This process differs from a classical random walk on $G$ in that at each integer time, with probability $α$ the next step is chosen uniformly from the previous steps of the walk. We prove that the distribution of the walk converges to the uniform distribution exponentially fast if the walk is irreducible and aperiodic. Some quantitative bounds are provided when the non-reinforced chain is lazy, or when the step distribution is symmetric or a class function. We also show that the reinforced simple random walk on cycles undergoes a phase transition at $α=1/2$ and the reinforcement can speed up mixing for $α> 1/2$.
Shuo Qin, Pierre Tarres
We introduce the continuous-time vertex-reinforced random walk (cVRRW) as a continuous-time version of the vertex-reinforced random walk (VRRW), which might open a new perspective on the study of the VRRW. It has been proved by Limic and Volkov that for the VRRW on a complete-like graph $K_d \cup \partial K_d$, the asymptotic frequency of visits is uniform over the non-leaf vertices. We give short proofs of those results by establishing a stochastic approximation result for the cVRRW on complete-like graphs. We also prove that almost surely, the number of visits to each leaf up to time n divided by $n^{\frac{1}{d-1}}$ converges to a non-zero limit. We solve a conjecture by Limic and Volkov on the rate of convergence in the case of the complete graph.
Yuval Peres, Shuo Qin
The step-reinforced random walk (SRRW), where each step may replicate a randomly chosen past step, exhibits complex dependencies on the history. This paper introduces a generalized SRRW on groups, incorporating arbitrary transformations of past steps, which unifies several existing models in the literature. We develop a unified framework for establishing upper bounds on its transition probabilities for any reinforcement parameter $α<1$, linking the decay rate directly to the geometry of the underlying group. We prove that on Euclidean space, the walk is transient in all dimensions $d \geq 3$ for any $α<1$. On finitely generated groups, we derive the upper bounds using the isoperimetric profile of the Cayley graph, which in particular resolves an open problem regarding the exponential decay of the elephant random walk on Cayley trees.
Hao Shao, Shulun Wang, Yang Zhou, Guanglu Song, Dailan He, Shuo Qin, Zhuofan Zong, Bingqi Ma, Yu Liu, Hongsheng Li
Video face swapping is becoming increasingly popular across various applications, yet existing methods primarily focus on static images and struggle with video face swapping because of temporal consistency and complex scenarios. In this paper, we present the first diffusion-based framework specifically designed for video face swapping. Our approach introduces a novel image-video hybrid training framework that leverages both abundant static image data and temporal video sequences, addressing the inherent limitations of video-only training. The framework incorporates a specially designed diffusion model coupled with a VidFaceVAE that effectively processes both types of data to better maintain temporal coherence of the generated videos. To further disentangle identity and pose features, we construct the Attribute-Identity Disentanglement Triplet (AIDT) Dataset, where each triplet has three face images, with two images sharing the same pose and two sharing the same identity. Enhanced with a comprehensive occlusion augmentation, this dataset also improves robustness against occlusions. Additionally, we integrate 3D reconstruction techniques as input conditioning to our network for handling large pose variations. Extensive experiments demonstrate that our framework achieves superior performance in identity preservation, temporal consistency, and visual quality compared to existing methods, while requiring fewer inference steps. Our approach effectively mitigates key challenges in video face swapping, including temporal flickering, identity preservation, and robustness to occlusions and pose variations.
Jing Shao, Siyu Chen, Yangguang Li, Kun Wang, Zhenfei Yin, Yinan He, Jianing Teng, Qinghong Sun, Mengya Gao, Jihao Liu, Gengshi Huang, Guanglu Song, Yichao Wu, Yuming Huang, Fenggang Liu, Huan Peng, Shuo Qin, Chengyu Wang, Yujie Wang, Conghui He, Ding Liang, Yu Liu, Fengwei Yu, Junjie Yan, Dahua Lin, Xiaogang Wang, Yu Qiao
Enormous waves of technological innovations over the past several years, marked by the advances in AI technologies, are profoundly reshaping the industry and the society. However, down the road, a key challenge awaits us, that is, our capability of meeting rapidly-growing scenario-specific demands is severely limited by the cost of acquiring a commensurate amount of training data. This difficult situation is in essence due to limitations of the mainstream learning paradigm: we need to train a new model for each new scenario, based on a large quantity of well-annotated data and commonly from scratch. In tackling this fundamental problem, we move beyond and develop a new learning paradigm named INTERN. By learning with supervisory signals from multiple sources in multiple stages, the model being trained will develop strong generalizability. We evaluate our model on 26 well-known datasets that cover four categories of tasks in computer vision. In most cases, our models, adapted with only 10% of the training data in the target domain, outperform the counterparts trained with the full set of data, often by a significant margin. This is an important step towards a promising prospect where such a model with general vision capability can dramatically reduce our reliance on data, thus expediting the adoption of AI technologies. Furthermore, revolving around our new paradigm, we also introduce a new data system, a new architecture, and a new benchmark, which, together, form a general vision ecosystem to support its future development in an open and inclusive manner. See project website at https://opengvlab.shlab.org.cn .
Shuai Chen, Jinpeng Li, Chuanqi Yao, Wenbo Hou, Shuo Qin, Wenyao Jin, Xu Tang
Traditional neural objection detection methods use multi-scale features that allow multiple detectors to perform detecting tasks independently and in parallel. At the same time, with the handling of the prior box, the algorithm's ability to deal with scale invariance is enhanced. However, too many prior boxes and independent detectors will increase the computational redundancy of the detection algorithm. In this study, we introduce Dubox, a new one-stage approach that detects the objects without prior box. Working with multi-scale features, the designed dual scale residual unit makes dual scale detectors no longer run independently. The second scale detector learns the residual of the first. Dubox has enhanced the capacity of heuristic-guided that can further enable the first scale detector to maximize the detection of small targets and the second to detect objects that cannot be identified by the first one. Besides, for each scale detector, with the new classification-regression progressive strapped loss makes our process not based on prior boxes. Integrating these strategies, our detection algorithm has achieved excellent performance in terms of speed and accuracy. Extensive experiments on the VOC, COCO object detection benchmark have confirmed the effectiveness of this algorithm.
Xin Lu, Shuo Qin, Petter Holme, Fanhui Meng, Yanqing Hu, Fredrik Liljeros, Gad Allon
Peer influence and social contagion are key denominators in the adoption and participation of information spreading, such as news propagation, word-of-mouth or viral marketing. In this study, we argue that it is biased to only focus on the scale and coverage of information spreading, and propose that the level of influence reinforcement, quantified by the re-exposure rate, i.e., the rate of individuals who are repeatedly exposed to the same information, should be considered together to measure the effectiveness of spreading. We show that local network structural characteristics significantly affects the probability of being exposed or re-exposed to the same information. After analyzing trending news on the super large-scale online network of Sina Weibo (China's Twitter) with 430 million connected users, we find a class of users with extremely low exposure rate, even they are following tens of thousands of others; and the re-exposure rate is substantially higher for news with more transmission waves and stronger secondary forwarding. While exposure and re-exposure rate typically grow together with the scale of spreading, we find exceptional cases where it is possible to achieve a high exposure rate while maintaining low re-exposure rate, or vice versa.