Search Results for author: Kai Zhou

Found 36 papers, 4 papers with code

Band-Attention Modulated RetNet for Face Forgery Detection

no code implementations9 Apr 2024 Zhida Zhang, Jie Cao, Wenkui Yang, Qihang Fan, Kai Zhou, Ran He

The transformer networks are extensively utilized in face forgery detection due to their scalability across large datasets. Despite their success, transformers face challenges in balancing the capture of global context, which is crucial for unveiling forgery clues, with computational complexity. To mitigate this issue, we introduce Band-Attention modulated RetNet (BAR-Net), a lightweight network designed to efficiently process extensive visual contexts while avoiding catastrophic forgetting. Our approach empowers the target token to perceive global information by assigning differential attention levels to tokens at varying distances.

Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices

no code implementations27 Mar 2024 Hanqing Fu, Gaolei Li, Jun Wu, Jianhua Li, Xi Lin, Kai Zhou, Yuchen Liu

Federated neuromorphic learning (FedNL) leverages event-driven spiking neural networks and federated learning frameworks to effectively execute intelligent analysis tasks over amounts of distributed low-power devices but also perform vulnerability to poisoning attacks.

Federated Learning

Collective Certified Robustness against Graph Injection Attacks

no code implementations3 Mar 2024 Yuni Lai, Bailin Pan, Kaihuang Chen, Yancheng Yuan, Kai Zhou

We investigate certified robustness for GNNs under graph injection attacks.

Adversarially Robust Signed Graph Contrastive Learning from Balance Augmentation

no code implementations19 Jan 2024 Jialong Zhou, Xing Ai, Yuni Lai, Kai Zhou

Similar to how structure learning can restore unsigned graphs, balance learning can be applied to signed graphs by improving the balance degree of the poisoned graph.

Contrastive Learning Link Sign Prediction

Universally Robust Graph Neural Networks by Preserving Neighbor Similarity

no code implementations18 Jan 2024 Yulin Zhu, Yuni Lai, Xing Ai, Kai Zhou

This theoretical proof explains the empirical observations that the graph attacker tends to connect dissimilar node pairs based on the similarities of neighbor features instead of ego features both on homophilic and heterophilic graphs.

Adversarial Robustness

Cost Aware Untargeted Poisoning Attack against Graph Neural Networks,

no code implementations12 Dec 2023 Yuwei Han, Yuni Lai, Yulin Zhu, Kai Zhou

Graph Neural Networks (GNNs) have become widely used in the field of graph mining.

Graph Mining

Node-aware Bi-smoothing: Certified Robustness against Graph Injection Attacks

no code implementations7 Dec 2023 Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou

Furthermore, we extend two state-of-the-art certified robustness frameworks to address node injection attacks and compare our approach against them.

Graph Learning Node Classification +1

Optimal Power Flow in Highly Renewable Power System Based on Attention Neural Networks

no code implementations23 Nov 2023 Chen Li, Alexander Kies, Kai Zhou, Markus Schlott, Omar El Sayed, Mariia Bilousova, Horst Stoecker

The Optimal Power Flow (OPF) problem is pivotal for power system operations, guiding generator output and power distribution to meet demand at minimized costs, while adhering to physical and engineering constraints.

Imitation Learning Physics-informed machine learning

Generative Diffusion Models for Lattice Field Theory

no code implementations6 Nov 2023 Lingxiao Wang, Gert Aarts, Kai Zhou

This study delves into the connection between machine learning and lattice field theory by linking generative diffusion models (DMs) with stochastic quantization, from a stochastic differential equation perspective.

Quantization

Diffusion Models as Stochastic Quantization in Lattice Field Theory

no code implementations29 Sep 2023 Lingxiao Wang, Gert Aarts, Kai Zhou

In this work, we establish a direct connection between generative diffusion models (DMs) and stochastic quantization (SQ).

Quantization

Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

no code implementations2 Aug 2023 Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou

Graph anomaly detection (GAD) has achieved success and has been widely applied in various domains, such as fraud detection, cybersecurity, finance security, and biochemistry.

Contrastive Learning Fraud Detection +1

Coupled-Space Attacks against Random-Walk-based Anomaly Detection

2 code implementations26 Jul 2023 Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou

In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.

Graph Anomaly Detection

Homophily-Driven Sanitation View for Robust Graph Contrastive Learning

no code implementations24 Jul 2023 Yulin Zhu, Xing Ai, Yevgeniy Vorobeychik, Kai Zhou

We conduct extensive experiments to evaluate the performance of our proposed model, GCHS (Graph Contrastive Learning with Homophily-driven Sanitation View), against two state of the art structural attacks on GCL.

Adversarial Robustness Contrastive Learning

Approaching epidemiological dynamics of COVID-19 with physics-informed neural networks

no code implementations17 Feb 2023 Shuai Han, Lukas Stelz, Horst Stoecker, Lingxiao Wang, Kai Zhou

A physics-informed neural network (PINN) embedded with the susceptible-infected-removed (SIR) model is devised to understand the temporal evolution dynamics of infectious diseases.

Simple yet Effective Gradient-Free Graph Convolutional Networks

no code implementations1 Feb 2023 Yulin Zhu, Xing Ai, Qimai Li, Xiao-Ming Wu, Kai Zhou

Linearized Graph Neural Networks (GNNs) have attracted great attention in recent years for graph representation learning.

Graph Representation Learning Node Classification

FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-based Node Classification

no code implementations25 Oct 2022 Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou

Graph Neural Networks (GNNs) are vulnerable to data poisoning attacks, which will generate a poisoned graph as the input to the GNN models.

Adversarial Robustness Data Poisoning +2

A Multi-user Oriented Live Free-viewpoint Video Streaming System Based On View Interpolation

no code implementations20 Dec 2021 Jingchuan Hu, Shuai Guo, Kai Zhou, Yu Dong, Jun Xu, Li Song

As an important application form of immersive multimedia services, free-viewpoint video(FVV) enables users with great immersive experience by strong interaction.

Automatic differentiation approach for reconstructing spectral functions with neural networks

no code implementations12 Dec 2021 Lingxiao Wang, Shuzhe Shi, Kai Zhou

Reconstructing spectral functions from Euclidean Green's functions is an important inverse problem in physics.

Reconstructing spectral functions via automatic differentiation

1 code implementation29 Nov 2021 Lingxiao Wang, Shuzhe Shi, Kai Zhou

Exploiting the neural networks' regularization as a non-local smoothness regulator of the spectral function, we represent spectral functions by neural networks and use the propagator's reconstruction error to optimize the network parameters unsupervisedly.

Spectral Reconstruction

Probabilistic Bearing Fault Diagnosis Using Gaussian Process with Tailored Feature Extraction

no code implementations19 Sep 2021 Mingxuan Liang, Kai Zhou

However, current deep learning methods perform the bearing fault diagnosis in the form of deterministic classification, which overlook the uncertainties that inevitably exist in actual practice.

Dimensionality Reduction Sensor Fusion

Shared Data and Algorithms for Deep Learning in Fundamental Physics

1 code implementation1 Jul 2021 Lisa Benato, Erik Buhmann, Martin Erdmann, Peter Fackeldey, Jonas Glombitza, Nikolai Hartmann, Gregor Kasieczka, William Korcari, Thomas Kuhr, Jan Steinheimer, Horst Stöcker, Tilman Plehn, Kai Zhou

We introduce a Python package that provides simply and unified access to a collection of datasets from fundamental physics research - including particle physics, astroparticle physics, and hadron- and nuclear physics - for supervised machine learning studies.

BIG-bench Machine Learning Transfer Learning

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

1 code implementation18 Jun 2021 Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques.

Anomaly Detection Combinatorial Optimization +2

The Incompressible Navier-Stokes-Fourier Limit from Boltzmann-Fermi-Dirac Equation

no code implementations4 Feb 2021 Ning Jiang, Linjie Xiong, Kai Zhou

We study Boltzmann-Fermi-Dirac equation when quantum effects are taken into account in dilute gas dynamics.

Analysis of PDEs

Machine learning spatio-temporal epidemiological model to evaluate Germany-county-level COVID-19 risk

no code implementations30 Nov 2020 Lingxiao Wang, Tian Xu, Till Hannes Stoecker, Horst Stoecker, Yin Jiang, Kai Zhou

As the COVID-19 pandemic continues to ravage the world, it is of critical significance to provide a timely risk prediction of the COVID-19 in multi-level.

BIG-bench Machine Learning

Robust Collective Classification against Structural Attacks

no code implementations26 Jul 2020 Kai Zhou, Yevgeniy Vorobeychik

Finally, we apply our approach in a transductive learning setting, and show that robust AMN is much more robust than state-of-the-art deep learning methods, while sacrificing little in accuracy on non-adversarial data.

Adversarial Robustness Classification +2

Efficient Characterization of Dynamic Response Variation Using Multi-Fidelity Data Fusion through Composite Neural Network

no code implementations7 May 2020 Kai Zhou, Jiong Tang

Uncertainties in a structure is inevitable, which generally lead to variation in dynamic response predictions.

Computing Equilibria in Binary Networked Public Goods Games

no code implementations13 Nov 2019 Sixie Yu, Kai Zhou, P. Jeffrey Brantingham, Yevgeniy Vorobeychik

Public goods games study the incentives of individuals to contribute to a public good and their behaviors in equilibria.

Computer Science and Game Theory

Adversarial Robustness of Similarity-Based Link Prediction

no code implementations3 Sep 2019 Kai Zhou, Tomasz P. Michalak, Yevgeniy Vorobeychik

We propose a novel approach for increasing robustness of similarity-based link prediction by endowing the analyst with a restricted set of reliable queries which accurately measure the existence of queried links.

Adversarial Robustness Link Prediction

Multi-layer Attention Mechanism for Speech Keyword Recognition

no code implementations10 Jul 2019 Ruisen Luo, Tianran Sun, Chen Wang, Miao Du, Zuodong Tang, Kai Zhou, Xiao-Feng Gong, Xiaomei Yang

The key idea is that, in addition to the conventional attention mechanism, information of layers prior to feature extraction and LSTM are introduced into attention weights calculations.

Ranked #4 on Keyword Spotting on Google Speech Commands (Google Speech Commands V2 20 metric)

Keyword Spotting speech-recognition +1

Attacking Similarity-Based Link Prediction in Social Networks

no code implementations22 Sep 2018 Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik

We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information.

Social and Information Networks Cryptography and Security

Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network

no code implementations1 Sep 2018 Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan

Link prediction is one of the fundamental research problems in network analysis.

Social and Information Networks Cryptography and Security 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4

Scalar Quantization as Sparse Least Square Optimization

no code implementations1 Mar 2018 Chen Wang, Xiaomei Yang, Shaomin Fei, Kai Zhou, Xiao-Feng Gong, Miao Du, Ruisen Luo

Furthermore, to compute quantization results with a given amount of values/clusters, this paper designed an iterative method and a clustering-based method, and both of them are built on sparse least square.

Clustering Quantization

An equation-of-state-meter of quantum chromodynamics transition from deep learning

no code implementations15 Jan 2018 Long-Gang Pang, Kai Zhou, Nan Su, Hannah Petersen, Horst Stöcker, Xin-Nian Wang

A primordial state of matter consisting of free quarks and gluons that existed in the early universe a few microseconds after the Big Bang is also expected to form in high-energy heavy-ion collisions.

An equation-of-state-meter of QCD transition from deep learning

no code implementations13 Dec 2016 Long-Gang Pang, Kai Zhou, Nan Su, Hannah Petersen, Horst Stöcker, Xin-Nian Wang

Supervised learning with a deep convolutional neural network is used to identify the QCD equation of state (EoS) employed in relativistic hydrodynamic simulations of heavy-ion collisions from the simulated final-state particle spectra $\rho(p_T,\Phi)$.

Cannot find the paper you are looking for? You can Submit a new open access paper.