Search Results for author: Hai Jin

Found 36 papers, 20 papers with code

Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing

1 code implementation31 Mar 2024 Zhenyu Qian, Yiming Qian, Yuting Song, Fei Gao, Hai Jin, Chen Yu, Xia Xie

To equip the graph processing with both high accuracy and explainability, we introduce a novel approach that harnesses the power of a large language model (LLM), enhanced by an uncertainty-aware module to provide a confidence score on the generated answer.

Graph Classification Knowledge Graph Completion +2

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples

1 code implementation16 Mar 2024 Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin

In response to these challenges, we propose Genetic Evolution-Nurtured Adversarial Fine-tuning (Gen-AF), a two-stage adversarial fine-tuning approach aimed at enhancing the robustness of downstream models.

Self-Supervised Learning

FedRKG: A Privacy-preserving Federated Recommendation Framework via Knowledge Graph Enhancement

1 code implementation20 Jan 2024 Dezhong Yao, Tongtong Liu, Qi Cao, Hai Jin

Federated Learning (FL) has emerged as a promising approach for preserving data privacy in recommendation systems by training models locally.

Federated Learning Privacy Preserving +1

Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit

no code implementations30 Dec 2023 Yao Wan, Yang He, Zhangqian Bi, JianGuo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu

We also benchmark several state-of-the-art neural models for code intelligence, and provide an open-source toolkit tailored for the rapid prototyping of deep-learning-based code intelligence models.

Representation Learning

MISA: Unveiling the Vulnerabilities in Split Federated Learning

no code implementations18 Dec 2023 Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin

This attack unveils the vulnerabilities in SFL, challenging the conventional belief that SFL is robust against poisoning attacks.

Edge-computing Federated Learning

An Extensive Study on Adversarial Attack against Pre-trained Models of Code

1 code implementation13 Nov 2023 Xiaohu Du, Ming Wen, Zichao Wei, Shangwen Wang, Hai Jin

Although several approaches have been proposed to generate adversarial examples for PTMC, the effectiveness and efficiency of such approaches, especially on different code intelligence tasks, has not been well understood.

Adversarial Attack

AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning

1 code implementation14 Aug 2023 Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin

In this work, we propose AdvCLIP, the first attack framework for generating downstream-agnostic adversarial examples based on cross-modal pre-trained encoders.

Contrastive Learning Generative Adversarial Network +2

Downstream-agnostic Adversarial Examples

1 code implementation ICCV 2023 Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin

AdvEncoder aims to construct a universal adversarial perturbation or patch for a set of natural images that can fool all the downstream tasks inheriting the victim pre-trained encoder.

Self-Supervised Learning

Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training

1 code implementation15 Jul 2023 Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin

Building on these insights, we explore the impacts of data augmentation and gradient regularization on transferability and identify that the trade-off generally exists in the various training mechanisms, thus building a comprehensive blueprint for the regulation mechanism behind transferability.

Attribute Data Augmentation

Scalable Optimal Margin Distribution Machine

2 code implementations8 May 2023 Yilin Wang, Nan Cao, Teng Zhang, Xuanhua Shi, Hai Jin

Optimal margin Distribution Machine (ODM) is a newly proposed statistical learning framework rooting in the novel margin theory, which demonstrates better generalization performance than the traditional large margin based counterparts.

PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples

no code implementations22 Nov 2022 Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun

In addition, existing attack approaches towards point cloud classifiers cannot be applied to the completion models due to different output forms and attack purposes.

Adversarial Attack Point Cloud Classification +2

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

1 code implementation1 Jul 2022 Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan HE, Hai Jin

In this paper, we propose BadHash, the first generative-based imperceptible backdoor attack against deep hashing, which can effectively generate invisible and input-specific poisoned images with clean label.

Backdoor Attack Contrastive Learning +4

VulCNN: An Image-inspired Scalable Vulnerability Detection System

1 code implementation International Conference on Software Engineering 2022 Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin

Furthermore, we conduct a case study on more than 25 million lines of code and the result indicates that VulCNN has the ability to detect large-scale vulnerability.

Image Classification Vulnerability Detection

Entity Resolution with Hierarchical Graph Attention Networks

1 code implementation SIGMOD/PODS 2022 Dezhong Yao, Yuhong Gu, Gao Cong, Hai Jin, Xinqiao Lv

However, there is often interdependence between different pairs of ER decisions, e. g., the entities from the same data source are usually semantically related to each other.

Attribute Entity Resolution +2

Accelerating Backward Aggregation in GCN Training with Execution Path Preparing on GPUs

1 code implementation6 Apr 2022 Shaoxian Xu, Zhiyuan Shao, Ci Yang, Xiaofei Liao, Hai Jin

In this paper, we first point out that in a GCN training problem with a given training set, the aggregation stages of its backward propagation phase (called as backward aggregations in this paper) can be converted to partially-active graph processing procedures, which conduct computation on only partial vertices of the input graph.

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer

1 code implementation CVPR 2022 Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu

While deep face recognition (FR) systems have shown amazing performance in identification and verification, they also arouse privacy concerns for their excessive surveillance on users, especially for public face images widely spread on social networks.

Face Recognition

What Do They Capture? -- A Structural Analysis of Pre-Trained Language Models for Source Code

1 code implementation14 Feb 2022 Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

In this paper, we conduct a thorough structural analysis aiming to provide an interpretation of pre-trained language models for source code (e. g., CodeBERT, and GraphCodeBERT) from three distinctive perspectives: (1) attention analysis, (2) probing on the word embedding, and (3) syntax tree induction.

Code Completion Code Search +1

Cross-Language Binary-Source Code Matching with Intermediate Representations

1 code implementation19 Jan 2022 Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin

Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment.

Malware Detection

Clairvoyance: Intelligent Route Planning for Electric Buses Based on Urban Big Data

no code implementations9 Dec 2021 Xiangyong Lu, Kaoru Ota, Mianxiong Dong, Chen Yu, Hai Jin

Nowadays many cities around the world have introduced electric buses to optimize urban traffic and reduce local carbon emissions.

FedHM: Efficient Federated Learning for Heterogeneous Models via Low-rank Factorization

no code implementations29 Nov 2021 Dezhong Yao, Wanning Pan, Michael J O'Neill, Yutong Dai, Yao Wan, Hai Jin, Lichao Sun

To this end, this paper proposes FedHM, a novel heterogeneous federated model compression framework, distributing the heterogeneous low-rank models to clients and then aggregating them into a full-rank model.

Distributed Computing Federated Learning +3

Distributed Optimal Margin Distribution Machine

no code implementations29 Sep 2021 Yilin Wang, Nan Cao, Teng Zhang, Hai Jin

Optimal margin Distribution Machine (ODM), a newly proposed statistical learning framework rooting in the novel margin theory, demonstrates better generalization performance than the traditional large margin based counterparts.

Towards Making Deep Learning-based Vulnerability Detectors Robust

1 code implementation2 Aug 2021 Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin

Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention.

Local-Global Knowledge Distillation in Heterogeneous Federated Learning with Non-IID Data

no code implementations30 Jun 2021 Dezhong Yao, Wanning Pan, Yutong Dai, Yao Wan, Xiaofeng Ding, Hai Jin, Zheng Xu, Lichao Sun

Federated learning enables multiple clients to collaboratively learn a global model by periodically aggregating the clients' models without transferring the local data.

Federated Learning Knowledge Distillation

Semantic and Syntactic Enhanced Aspect Sentiment Triplet Extraction

no code implementations Findings (ACL) 2021 Zhexue Chen, Hong Huang, Bang Liu, Xuanhua Shi, Hai Jin

Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from sentences, where each triplet includes an entity, its associated sentiment, and the opinion span explaining the reason for the sentiment.

Aspect Sentiment Triplet Extraction Sentence

Sparse online relative similarity learning

no code implementations15 Apr 2021 Dezhong Yao, Peilin Zhao, Chen Yu, Hai Jin, Bin Li

This is clearly inefficient for high dimensional tasks due to its high memory and computational complexity.

Metric Learning

Significant Inverse Magnetocaloric Effect induced by Quantum Criticality

no code implementations17 Feb 2021 Tao Liu, Xin-Yang Liu, Yuan Gao, Hai Jin, Jun He, Xian-Lei Sheng, Wentao Jin, Ziyu Chen, Wei Li

Strong fluctuations in the low-$T$ quantum critical regime can give rise to a large thermal entropy change and thus significant cooling effect when approaching the QCP.

Strongly Correlated Electrons

$μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

no code implementations8 Jan 2020 Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin

Existing vulnerability detection methods based on deep learning can detect the presence of vulnerabilities (i. e., addressing the binary classification or detection problem), but cannot pinpoint types of vulnerabilities (i. e., incapable of addressing multiclass classification).

Binary Classification General Classification +1

A Survey on Graph Processing Accelerators: Challenges and Opportunities

no code implementations26 Feb 2019 Chuangyi Gui, Long Zheng, Bingsheng He, Cheng Liu, Xinyu Chen, Xiaofei Liao, Hai Jin

Graph is a well known data structure to represent the associated relationships in a variety of applications, e. g., data science and machine learning.

Distributed, Parallel, and Cluster Computing

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities

4 code implementations18 Jul 2018 Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen

Our experiments with 4 software products demonstrate the usefulness of the framework: we detect 15 vulnerabilities that are not reported in the National Vulnerability Database.

Vulnerability Detection

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

4 code implementations5 Jan 2018 Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong

Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection.

Vulnerability Detection

Differentially Private Online Learning for Cloud-Based Video Recommendation with Multimedia Big Data in Social Networks

no code implementations1 Sep 2015 Pan Zhou, Yingxue Zhou, Dapeng Wu, Hai Jin

In addition, none of them has considered both the privacy of users' contexts (e, g., social status, ages and hobbies) and video service vendors' repositories, which are extremely sensitive and of significant commercial value.

Privacy Preserving Recommendation Systems

Human mobility synthesis using matrix and tensor factorizations

no code implementations Information Fusion 2014 Dezhong Yao, Chen Yu, Hai Jin, Qiang Ding

As the tensor model has a strong ability to describe high-dimensional information, we propose an algorithm to predict human mobility in tensors of location context data.

Management Tensor Decomposition

Cannot find the paper you are looking for? You can Submit a new open access paper.