1 code implementation • 7 Aug 2023 • Tianrui Qin, Xitong Gao, Juanjuan Zhao, Kejiang Ye, Cheng-Zhong Xu
To further evaluate the attack and defense capabilities of these poisoning methods, we have developed a benchmark -- APBench for assessing the efficacy of adversarial poisoning.
1 code implementation • 27 Mar 2023 • Tianrui Qin, Xitong Gao, Juanjuan Zhao, Kejiang Ye, Cheng-Zhong Xu
In this paper, we introduce the UEraser method, which outperforms current defenses against different types of state-of-the-art unlearnable example attacks through a combination of effective data augmentation policies and loss-maximizing adversarial augmentations.
no code implementations • 24 Jan 2023 • Jiashu Wu, Hao Dai, Yang Wang, Kejiang Ye, Chengzhong Xu
In this paper, a Geometric Graph Alignment (GGA) approach is leveraged to mask the geometric heterogeneities between domains for better intrusion knowledge transfer.
no code implementations • ICCV 2023 • Xinquan Chen, Xitong Gao, Juanjuan Zhao, Kejiang Ye, Cheng-Zhong Xu
It can generate UAEs from scratch or conditionally based on reference images.
1 code implementation • 20 Dec 2022 • Tianrui Qin, Xianghuan He, Xitong Gao, Yiren Zhao, Kejiang Ye, Cheng-Zhong Xu
Open software supply chain attacks, once successful, can exact heavy costs in mission-critical applications.
no code implementations • 28 Oct 2022 • Jiashu Wu, Yang Wang, Binhui Xie, Shuang Li, Hao Dai, Kejiang Ye, Chengzhong Xu
The scenario semantic endows source NI and II domain with characteristics from each other to ease the knowledge transfer process via a confused domain discriminator and categorical distribution knowledge preservation.
no code implementations • 16 Aug 2022 • Guoliang Li, Shuai Wang, Kejiang Ye, Miaowen Wen, Derrick Wing Kwan Ng, Marco Di Renzo
Integrated sensing and communication (ISAC) represents a paradigm shift, where previously competing wireless transmissions are jointly designed to operate in harmony via the shared use of the hardware platform for improving the spectral and energy efficiencies.
no code implementations • 29 Sep 2021 • Dongping Liao, Xitong Gao, Yiren Zhao, Hao Dai, Li Li, Kafeng Wang, Kejiang Ye, Yang Wang, Cheng-Zhong Xu
Federated learning (FL) enables edge clients to train collaboratively while preserving individual's data privacy.
1 code implementation • 4 Jul 2021 • Jiexia Ye, Furong Zheng, Juanjuan Zhao, Kejiang Ye, Chengzhong Xu
Our main novelties are three aspects: (1) We enrich the spatiotemporal information of model inputs by fusing multi-view features (time, location and traffic states) (2) We build multiple kinds of spatial correlations based on both prior knowledge and data-driven knowledge to improve model performance especially in insufficient or noisy data cases.
no code implementations • 24 May 2020 • Jiexia Ye, Juanjuan Zhao, Kejiang Ye, Cheng-Zhong Xu
Recently, various novel deep learning techniques have been developed to process graph data, called graph neural networks (GNNs).
1 code implementation • 11 May 2020 • Jiexia Ye, Juanjuan Zhao, Kejiang Ye, Cheng-Zhong Xu
However, it is well known that an individual stock price is correlated with prices of other stocks in complex ways.