Search Results for author: Hui Guo

Found 18 papers, 3 papers with code

Pixie: Preference in Implicit and Explicit Comparisons

1 code implementation ACL 2022 Amanul Haque, Vaibhav Garg, Hui Guo, Munindar Singh

We present Pixie, a manually annotated dataset for preference classification comprising 8, 890 sentences drawn from app reviews.

Classification

Uncertainty-Aware Explainable Recommendation with Large Language Models

no code implementations31 Jan 2024 Yicui Peng, Hao Chen, ChingSheng Lin, Guo Huang, Jinrong Hu, Hui Guo, Bin Kong, Shu Hu, Xi Wu, Xin Wang

Providing explanations within the recommendation system would boost user satisfaction and foster trust, especially by elaborating on the reasons for selecting recommended items tailored to the user.

Explainable Recommendation Multi-Task Learning

Object-Driven One-Shot Fine-tuning of Text-to-Image Diffusion with Prototypical Embedding

no code implementations28 Jan 2024 Jianxiang Lu, Cong Xie, Hui Guo

Our proposed method aims to address the challenges of generalizability and fidelity in an object-driven way, using only a single input image and the object-specific regions of interest.

Object Text-to-Image Generation

FGSI: Distant Supervision for Relation Extraction method based on Fine-Grained Semantic Information

no code implementations4 Feb 2023 Chenghong Sun, Weidong Ji, Guohui Zhou, Hui Guo, Zengxiang Yin, Yuqi Yue

We propose the hypothesis that the key semantic information inside the sentence plays a key role in entity relationship extraction.

Knowledge Graphs Relation +2

Real-time Path Planning of Driver-less Mining Trains with Time-dependent Physical Constraints

no code implementations21 Dec 2022 Xiaojiang Ren, Hui Guo, Sheng Kai, Guoqiang Mao

While the increased automation levels of production and operation equipment have led to improved productivity of mining activity in open pit mines, the capacity of mine transport system become a bottleneck.

Scheduling

Detection of Real-time DeepFakes in Video Conferencing with Active Probing and Corneal Reflection

no code implementations21 Oct 2022 Hui Guo, Xin Wang, Siwei Lyu

Specifically, we authenticate video calls by displaying a distinct pattern on the screen and using the corneal reflection extracted from the images of the call participant's face.

Open-Eye: An Open Platform to Study Human Performance on Identifying AI-Synthesized Faces

no code implementations13 May 2022 Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

In this work, we develop an online platform called Open-eye to study the human performance of AI-synthesized face detection.

Face Detection

GAN-generated Faces Detection: A Survey and New Perspectives

no code implementations15 Feb 2022 Xin Wang, Hui Guo, Shu Hu, Ming-Ching Chang, Siwei Lyu

Generative Adversarial Networks (GAN) have led to the generation of very realistic face images, which have been used in fake social media accounts and other disinformation matters that can generate profound impacts.

Face Detection

Discovery methods for systematic analysis of causal molecular networks in modern omics datasets

no code implementations28 Jan 2022 Jack Kelly, Carlo Berzuini, Bernard Keavney, Maciej Tomaszewski, Hui Guo

With the increasing availability and size of multi-omics datasets, investigating the casual relationships between molecular phenotypes has become an important aspect of exploring underlying biology and genetics.

Robust Attentive Deep Neural Network for Exposing GAN-generated Faces

no code implementations5 Sep 2021 Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

However, images from existing public datasets do not represent real-world scenarios well enough in terms of view variations and data distributions (where real faces largely outnumber synthetic faces).

Face Detection

Eyes Tell All: Irregular Pupil Shapes Reveal GAN-generated Faces

no code implementations1 Sep 2021 Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

Generative adversary network (GAN) generated high-realistic human faces have been used as profile images for fake social media accounts and are visually challenging to discern from real ones.

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

no code implementations16 Apr 2021 Peilun Wu, Fan Yan, Hui Guo

Email threat is a serious issue for enterprise security, which consists of various malicious scenarios, such as phishing, fraud, blackmail and malvertisement.

Anomaly Detection Novelty Detection +1

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

no code implementations23 Oct 2020 Shiyi Yang, Peilun Wu, Hui Guo

Network intrusion detection (NID) is an essential defense strategy that is used to discover the trace of suspicious user behaviour in large-scale cyberspace, and machine learning (ML), due to its capability of automation and intelligence, has been gradually adopted as a mainstream hunting method in recent years.

Deep Attention Network Intrusion Detection

Densely Connected Residual Network for Attack Recognition

no code implementations5 Aug 2020 Peilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo

High false alarm rate and low detection rate are the major sticking points for unknown threat perception.

LuNet: A Deep Neural Network for Network Intrusion Detection

1 code implementation22 Sep 2019 Peilun Wu, Hui Guo

Our experiments on two network traffic datasets show that compared to the state-of-the-art network intrusion detection techniques, LuNet not only offers a high level of detection capability but also has a much low rate of false positive-alarm.

Network Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.