1 code implementation • 26 Mar 2024 • Junhao Zheng, Chenhao Lin, Jiahao Sun, Zhengyu Zhao, Qian Li, Chao Shen
Deep learning-based monocular depth estimation (MDE), extensively applied in autonomous driving, is known to be vulnerable to adversarial attacks.
1 code implementation • 19 Mar 2024 • Zhenyu Wu, Chao Shen, Meng Jiang
Lastly it instructs the LLMs with the verification on relevant and irrelevant conditions to avoid confusion and improve reasoning paths.
Ranked #1 on Mathematical Reasoning on GSM8K
no code implementations • 19 Feb 2024 • Tianlin Li, XiaoYu Zhang, Chao Du, Tianyu Pang, Qian Liu, Qing Guo, Chao Shen, Yang Liu
Building on this insight and observation, we develop FairThinking, a pipeline designed to automatically generate roles that enable LLMs to articulate diverse perspectives for fair expressions.
1 code implementation • 18 Feb 2024 • Yichen Wang, Shangbin Feng, Abe Bohan Hou, Xiao Pu, Chao Shen, Xiaoming Liu, Yulia Tsvetkov, Tianxing He
Our experiments reveal that almost none of the existing detectors remain robust under all the attacks, and all detectors exhibit different loopholes.
no code implementations • 1 Feb 2024 • Shengchao Liu, Xiaoming Liu, Yichen Wang, Zehua Cheng, Chengzhengxu Li, Zhaohan Zhang, Yu Lan, Chao Shen
Hence, we propose a novel fine-tuned detector, Pecola, bridging metric-based and fine-tuned detectors by contrastive learning on selective perturbation.
no code implementations • 26 Jan 2024 • Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Mingli Zhu, Ruotong Wang, Li Liu, Chao Shen
We hope that our efforts could build a solid foundation of backdoor learning to facilitate researchers to investigate existing algorithms, develop more innovative algorithms, and explore the intrinsic mechanism of backdoor learning.
no code implementations • 31 Dec 2023 • XiaoYu Zhang, Juan Zhai, Shiqing Ma, Chao Shen
In response to the challenge of model design, researchers proposed Automated Machine Learning (AutoML) systems, which automatically search for model architecture and hyperparameters for a given task.
no code implementations • 15 Dec 2023 • Chen Ma, Ningfei Wang, Qi Alfred Chen, Chao Shen
Our evaluation results show that the system-level effects can be significantly improved, i. e., the vehicle crash rate of SlowTrack is around 95% on average while existing works only have around 30%.
no code implementations • 12 Dec 2023 • Qiwei Tian, Chenhao Lin, Zhengyu Zhao, Qian Li, Chao Shen
Furthermore, CA prevents the consequential model collapse, based on a novel metric, collapseness, which is incorporated into the optimization of perturbation.
1 code implementation • 11 Dec 2023 • Zhenyu Wu, Meng Jiang, Chao Shen
Given an initial answer from CoT, PRP iterates a verify-then-rectify process to progressively identify incorrect answers and rectify the reasoning paths.
no code implementations • 4 Dec 2023 • Chao Shen, Wenkang Zhan, Jian Tang, Zhaofeng Wu, Bo Xu, Chao Zhao, Zhanguo Wang
It standardizes deoxidation temperatures across various equipment and substrate materials, advancing the standardization research process in semiconductor preparation, a significant milestone in thin film growth technology.
1 code implementation • 18 Oct 2023 • Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen
Transferable adversarial examples raise critical security concerns in real-world, black-box attack scenarios.
no code implementations • 15 Oct 2023 • Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen
Instead, a one-shot adversarial augmentation prior to training is sufficient, and we name this new defense paradigm Data-centric Robust Learning (DRL).
no code implementations • 7 Oct 2023 • Chenhao Lin, Fangbin Yi, Hang Wang, Qian Li, Deng Jingyi, Chao Shen
Face forgery techniques have emerged as a forefront concern, and numerous detection approaches have been proposed to address this challenge.
1 code implementation • 14 Aug 2023 • Chengzhengxu Li, Xiaoming Liu, Yichen Wang, Duyi Li, Yu Lan, Chao Shen
However, prior discrete prompt optimization methods require expert knowledge to design the base prompt set and identify high-quality prompts, which is costly, inefficient, and subjective.
no code implementations • 4 Aug 2023 • Haotian Zhang, Huifeng Zhao, Xujun Zhang, Qun Su, Hongyan Du, Chao Shen, Zhe Wang, Dan Li, Peichen Pan, Guangyong Chen, Yu Kang, Chang-Yu Hsieh, Tingjun Hou
Drug discovery is a highly complicated process, and it is unfeasible to fully commit it to the recently developed molecular generation methods.
no code implementations • 3 Aug 2023 • Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang
Adversarial training (AT) is widely considered the state-of-the-art technique for improving the robustness of deep neural networks (DNNs) against adversarial examples (AE).
no code implementations • 22 Jun 2023 • Chao Shen, Wenkang Zhan, Kaiyao Xin, Manyang Li, Zhenyu Sun, Hui Cong, Chi Xu, Jian Tang, Zhaofeng Wu, Bo Xu, Zhongming Wei, Chunlai Xue, Chao Zhao, Zhanguo Wang
Self-assembled InAs/GaAs quantum dots (QDs) have properties highly valuable for developing various optoelectronic devices such as QD lasers and single photon sources.
no code implementations • 4 May 2023 • Xiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang
Our experiments validate the effectiveness of the four types of adversarial intrinsic regularizers and BR in enhancing black-box adversarial policy learning across a variety of environments.
no code implementations • 21 Apr 2023 • Xiaolei Liu, Ming Yi, Kangyi Ding, Bangzhou Xin, Yixiao Xu, Li Yan, Chao Shen
Experimental results show that RSBA achieves a 99. 83\% attack success rate in black-box scenarios.
no code implementations • 9 Apr 2023 • Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang
The common practice leverages incremental learning (IL), e. g., Class-based Incremental Learning (CIL) that updates output labels, to update the model with new data and a limited number of old data.
no code implementations • 7 Mar 2023 • Chenhao Lin, Pengbin Hu, Chao Shen, Qian Li
Taking full advantage of the excellent performance of StyleGAN, style transfer-based face swapping methods have been extensively investigated recently.
1 code implementation • 20 Dec 2022 • Xiaoming Liu, Zhaohan Zhang, Yichen Wang, Hang Pu, Yu Lan, Chao Shen
Machine-Generated Text (MGT) detection, a task that discriminates MGT from Human-Written Text (HWT), plays a crucial role in preventing misuse of text generative models, which excel in mimicking human writing style recently.
no code implementations • 7 Dec 2022 • Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, YiFei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang
The security of artificial intelligence (AI) is an important research area towards safe, reliable, and trustworthy AI systems.
1 code implementation • 1 Nov 2022 • Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang
In this paper, we investigate the third type of exploitation of data poisoning - increasing the risks of privacy leakage of benign training samples.
1 code implementation • 25 Jun 2022 • Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Chao Shen
However, we find that the evaluations of new methods are often unthorough to verify their claims and accurate performance, mainly due to the rapid development, diverse settings, and the difficulties of implementation and reproducibility.
1 code implementation • 6 Apr 2022 • Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang
To solve this issue, there has been a number of work trying to improve model fairness by using an adversarial game in model level.
no code implementations • 22 Mar 2022 • Niankai Yang, Chao Shen, Matthew Johnson-Roberson, Jing Sun
In the first stage, the surge velocity, heave velocity, and pitch angle setpoints are optimized by minimizing the required vehicle propulsion energy under currents, and the line-of-sight (LOS) guidance law is used to generate the yaw angle setpoint that ensures path following.
no code implementations • 4 Mar 2022 • Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li
Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos.
1 code implementation • 15 Nov 2021 • Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang
In addition, we show that our attacks can be used to enhance the performance of membership inference against GANs.
1 code implementation • MM - Proceedings of the ACM International Conference on Multimedia 2021 • Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang
In this paper, we, for the first time, propose a novel Anti-Distillation Backdoor Attack (ADBA), in which the backdoor embedded in the public teacher model can survive the knowledge distillation process and thus be transferred to secret distilled student models.
no code implementations • 19 Oct 2021 • Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang
For commercial cloud speech APIs, we propose Occam, a decision-only black-box adversarial attack, where only final decisions are available to the adversary.
no code implementations • 22 Sep 2021 • Liang Yu, Shuqi Qin, Zhanbo Xu, Xiaohong Guan, Chao Shen, Dong Yue
To overcome the challenge, we reformulate the problem as a Markov game and propose an energy management algorithm to solve it based on multi-agent discrete actor-critic with rules (MADACR).
2 code implementations • 23 Jun 2021 • Yufei Chen, Chao Shen, Cong Wang, Yang Zhang
To this end, we propose a teacher model fingerprinting attack to infer the origin of a student model, i. e., the teacher model it transfers from.
1 code implementation • 12 Jun 2021 • Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li
In deep learning, a typical strategy for transfer learning is to freeze the early layers of a pre-trained model and fine-tune the rest of its layers on the target domain.
no code implementations • 30 Dec 2020 • Yadong Zhou, Zhihao Ding, Xiaoming Liu, Chao Shen, Lingling Tong, Xiaohong Guan
While using the trending graph neural networks (GNNs) as encoder has the problem that GNNs aggregate redundant information from neighborhood and generate indistinguishable user representations, which is known as over-smoothing.
1 code implementation • 3 Dec 2020 • Xiaoming Liu, Shaocong Wu, Zhaohan Zhang, Chao Shen
To tackle this research gap, we propose a novel duet representation learning framework named \sysname to fuse local information (user-item interaction data) and global information (external knowledge graph) for the top-$N$ recommendation, which is composed of two separate sub-models.
no code implementations • 11 Sep 2020 • Fang Fang, Yanqing Xu, Zhiguo Ding, Chao Shen, Mugen Peng, George K. Karagiannidis
We adopt the partial offloading policy, in which each user can partition its computation task into offloading and locally computing parts.
no code implementations • 12 Aug 2020 • Liang Yu, Shuqi Qin, Meng Zhang, Chao Shen, Tao Jiang, Xiaohong Guan
However, it is a nontrivial task due to the following challenges.
1 code implementation • 26 Jun 2020 • Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu
It is unknown whether there are any connections and common characteristics between the defenses against these two attacks.
no code implementations • 25 Jun 2020 • Liang Yu, Yi Sun, Zhanbo Xu, Chao Shen, Dong Yue, Tao Jiang, Xiaohong Guan
In this paper, we intend to minimize the energy cost of an HVAC system in a multi-zone commercial building under dynamic pricing with the consideration of random zone occupancy, thermal comfort, and indoor air quality comfort.
no code implementations • 13 Mar 2020 • Xiaoming Liu, Qirui Li, Chao Shen, Xi Peng, Yadong Zhou, Xiaohong Guan
Graph convolution network (GCN) attracts intensive research interest with broad applications.
no code implementations • 22 Feb 2020 • Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang
This paper proposes a new scheme for privacy-preserving neural network prediction in the outsourced setting, i. e., the server cannot learn the query, (intermediate) results, and the model.
no code implementations • 29 Oct 2019 • Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu
Collaborative learning allows multiple clients to train a joint model without sharing their data with each other.
1 code implementation • 22 Oct 2019 • Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan
Machine Learning systems are vulnerable to adversarial attacks and will highly likely produce incorrect outputs under these attacks.
no code implementations • USENIX Security Symposium 2019 • Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li
We also present an algorithm that can successfully enable attacks against famous cloud-based image services (such as those from Microsoft Azure, Aliyun, Baidu, and Tencent) and cause obvious misclassification effects, even when the details of image processing (such as the exact scaling algorithm and scale dimension parameters) are hidden in the cloud.
1 code implementation • 24 Aug 2018 • Martin G. Frasch, Chao Shen, Hau-Tieng Wu, Alexander Mueller, Emily Neuhaus, Raphael A. Bernier, Dana Kamara, Theodore P. Beauchaine
High-frequency heart rate variability (HRV) has identified parasympathetic nervous system alterations in autism spectrum disorder (ASD).
Quantitative Methods Neurons and Cognition
no code implementations • 22 Oct 2017 • Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue
This paper presents a novel user authentication system through wrist-worn devices by analyzing the interaction behavior with users, which is both accurate and efficient for future usage.
no code implementations • 18 Nov 2013 • Dong-Ling Deng, Sheng-Tao Wang, Chao Shen, Lu-Ming Duan
Three-dimensional (3D) topological insulators in general need to be protected by certain kinds of symmetries other than the presumed U(1) charge conservation.