Search Results for author: Kui Ren

Found 52 papers, 18 papers with code

SoK: Gradient Leakage in Federated Learning

no code implementations8 Apr 2024 Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren

While GIAs have demonstrated effectiveness under \emph{ideal settings and auxiliary assumptions}, their actual efficacy against \emph{practical FL systems} remains under-explored.

Federated Learning Misconceptions

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection

1 code implementation4 Mar 2024 Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren

In this paper, we try to tackle these challenges through three designs: (1) We present a novel framework to capture broader forgery clues by extracting multiple non-overlapping local representations and fusing them into a global semantic-rich feature.

DeepFake Detection Face Swapping

FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution

no code implementations6 Feb 2024 Qi Zhou, Dongxia Wang, Tianlin Li, Zhihong Xu, Yang Liu, Kui Ren, Wenhai Wang, Qing Guo

To expose this potential vulnerability, we aim to build an adversarial attack forcing SDEdit to generate a specific data distribution aligned with a specified attribute (e. g., female), without changing the input's attribute characteristics.

Adversarial Attack Attribute +1

LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation

no code implementations16 Jan 2024 Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Zhan Qin, Kui Ren

As personalized recommendation systems become vital in the age of information overload, traditional methods relying solely on historical user interactions often fail to fully capture the multifaceted nature of human interests.

Explainable Recommendation Recommendation Systems

Certified Minimax Unlearning with Generalization Rates and Deletion Capacity

no code implementations NeurIPS 2023 Jiaqi Liu, Jian Lou, Zhan Qin, Kui Ren

In addition, our rates of generalization and deletion capacity match the state-of-the-art rates derived previously for standard statistical learning models.

Machine Unlearning

ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach

no code implementations3 Nov 2023 Yuke Hu, Jian Lou, Jiaqi Liu, Wangze Ni, Feng Lin, Zhan Qin, Kui Ren

However, despite their promising efficiency, almost all existing machine unlearning methods handle unlearning requests independently from inference requests, which unfortunately introduces a new security issue of inference service obsolescence and a privacy vulnerability of undesirable exposure for machine unlearning in MLaaS.

Machine Unlearning

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution

1 code implementation25 Sep 2023 Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren

Evaluation results disclose an 88% success rate in bypassing Midjourney's proprietary safety filter with our attack prompts, leading to the generation of counterfeit images depicting political figures in violent scenarios.

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues

1 code implementation18 Sep 2023 Kun Pan, Yin Yifang, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren

However, the accuracy of detection models degrades significantly on images generated by new deepfake methods due to the difference in data distribution.

Continual Learning Contrastive Learning +5

Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version)

no code implementations11 Sep 2023 Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren

Based on the decision procedure to CIR, CICheck includes two variants: ED-CICheck and ED-CICheck, which detect erroneous CI tests (to enhance reliability) and prune excessive CI tests (to enhance privacy), respectively.

Causal Discovery

RemovalNet: DNN Fingerprint Removal Attacks

1 code implementation23 Aug 2023 Hongwei Yao, Zheng Li, Kunzhe Huang, Jian Lou, Zhan Qin, Kui Ren

After our DNN fingerprint removal attack, the model distance between the target and surrogate models is x100 times higher than that of the baseline attacks, (2) the RemovalNet is efficient.

Bilevel Optimization

FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis

1 code implementation10 Aug 2023 Yiling He, Jian Lou, Zhan Qin, Kui Ren

Although feature attribution (FA) methods can be used to explain deep learning, the underlying classifier is still blind to what behavior is suspicious, and the generated explanation cannot adapt to downstream tasks, incurring poor explanation fidelity and intelligibility.

Malware Analysis Multi-Task Learning

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks

no code implementations31 Jul 2023 Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren

The language models, especially the basic text classification models, have been shown to be susceptible to textual adversarial attacks such as synonym substitution and word insertion attacks.

text-classification Text Classification

FDINet: Protecting against DNN Model Extraction via Feature Distortion Index

no code implementations20 Jun 2023 Hongwei Yao, Zheng Li, Haiqin Weng, Feng Xue, Kui Ren, Zhan Qin

FDINET exhibits the capability to identify colluding adversaries with an accuracy exceeding 91%.

Model extraction

Masked Diffusion Models Are Fast Distribution Learners

1 code implementation20 Jun 2023 Jiachen Lei, Qinglong Wang, Peng Cheng, Zhongjie Ba, Zhan Qin, Zhibo Wang, Zhenguang Liu, Kui Ren

In the pre-training stage, we propose to mask a high proportion (e. g., up to 90\%) of input images to approximately represent the primer distribution and introduce a masked denoising score matching objective to train a model to denoise visible areas.

Denoising Image Generation

Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization

no code implementations13 Jun 2023 Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren

However, the vanilla Euclidean space is not efficient for modeling important motion characteristics such as the joint-wise angular acceleration, which reveals the driving force behind the motion.

Action Recognition

Privacy-preserving Adversarial Facial Features

no code implementations CVPR 2023 Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren

In this paper, we propose an adversarial features-based face privacy protection (AdvFace) approach to generate privacy-preserving adversarial features, which can disrupt the mapping from adversarial features to facial images to defend against reconstruction attacks.

Face Recognition Privacy Preserving

ANetQA: A Large-scale Benchmark for Fine-grained Compositional Reasoning over Untrimmed Videos

1 code implementation CVPR 2023 Zhou Yu, Lixiang Zheng, Zhou Zhao, Fei Wu, Jianping Fan, Kui Ren, Jun Yu

A recent benchmark AGQA poses a promising paradigm to generate QA pairs automatically from pre-annotated scene graphs, enabling it to measure diverse reasoning abilities with granular control.

Question Answering Spatio-temporal Scene Graphs +1

False Claims against Model Ownership Resolution

1 code implementation13 Apr 2023 Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan

Our core idea is that a malicious accuser can deviate (without detection) from the specified MOR process by finding (transferable) adversarial examples that successfully serve as evidence against independent suspect models.

GLOW: Global Layout Aware Attacks on Object Detection

no code implementations27 Feb 2023 Buyu Liu, BaoJun, Jianping Fan, Xi Peng, Kui Ren, Jun Yu

More desired attacks, to this end, should be able to fool defenses with such consistency checks.

Object object-detection +1

Adaptive State-Dependent Diffusion for Derivative-Free Optimization

no code implementations8 Feb 2023 Björn Engquist, Kui Ren, Yunan Yang

This paper develops and analyzes a stochastic derivative-free optimization strategy.

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks

no code implementations ICCV 2023 Xue Wang, Zhibo Wang, Haiqin Weng, Hengchang Guo, Zhifei Zhang, Lu Jin, Tao Wei, Kui Ren

Considering the insufficient study on such complex causal questions, we make the first attempt to explain different causal questions by contrastive explanations in a unified framework, ie., Counterfactual Contrastive Explanation (CCE), which visually and intuitively explains the aforementioned questions via a novel positive-negative saliency-based explanation scheme.

counterfactual

Towards Transferable Targeted Adversarial Examples

1 code implementation CVPR 2023 Zhibo Wang, Hongshan Yang, Yunhe Feng, Peng Sun, Hengchang Guo, Zhifei Zhang, Kui Ren

In this paper, we propose the Transferable Targeted Adversarial Attack (TTAA), which can capture the distribution information of the target class from both label-wise and feature-wise perspectives, to generate highly transferable targeted adversarial examples.

Adversarial Attack

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores

no code implementations1 Dec 2022 Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren

Besides, our further experiments show that PURIFIER is also effective in defending adversarial model inversion attacks and attribute inference attacks.

Attribute Inference Attack +1

Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022

1 code implementation18 Nov 2022 Jiachen Lei, Shuang Ma, Zhongjie Ba, Sai Vemprala, Ashish Kapoor, Kui Ren

In this report, we present our approach and empirical results of applying masked autoencoders in two egocentric video understanding tasks, namely, Object State Change Classification and PNR Temporal Localization, of Ego4D Challenge 2022.

Object State Change Classification Temporal Localization +1

FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model

no code implementations14 Nov 2022 Shuo Shao, Wenyuan Yang, Hanlin Gu, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren

To deter such misbehavior, it is essential to establish a mechanism for verifying the ownership of the model and as well tracing its origin to the leaker among the FL participants.

Continual Learning Federated Learning

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples

no code implementations10 Nov 2022 Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhongjie Ba, Feng Lin, Kui Ren

In this paper, we propose a voice de-identification system, which uses adversarial examples to balance the privacy and utility of voice services.

De-identification Speaker Identification

Data-Driven Joint Inversions for PDE Models

no code implementations17 Oct 2022 Kui Ren, Lu Zhang

The task of simultaneously reconstructing multiple physical coefficients in partial differential equations from observed data is ubiquitous in applications.

OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization

1 code implementation4 Oct 2022 Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Yuan Hong, Kui Ren, Zhan Qin

Although the solution based on Local Differential Privacy (LDP) addresses the above problems, it leads to the low accuracy of the trained model.

Privacy Preserving Vertical Federated Learning

Task-aware Similarity Learning for Event-triggered Time Series

no code implementations17 Jul 2022 Shaoyu Dou, Kai Yang, Yang Jiao, Chengbo Qiu, Kui Ren

The proposed framework aspires to offer a stepping stone that gives rise to a systematic approach to model and learn similarities among a multitude of event-triggered time series.

Anomaly Detection Time Series +1

Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training

no code implementations5 Jun 2022 Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren

However, most existing works are still trapped in the dilemma between higher accuracy and stronger robustness since they tend to fit a model towards robust features (not easily tampered with by adversaries) while ignoring those non-robust but highly predictive features.

Knowledge Distillation

An Algebraically Converging Stochastic Gradient Descent Algorithm for Global Optimization

no code implementations12 Apr 2022 Björn Engquist, Kui Ren, Yunan Yang

We propose a new gradient descent algorithm with added stochastic terms for finding the global optimizers of nonconvex optimization problems.

Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models

no code implementations CVPR 2022 Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren

Prioritizing fairness is of central importance in artificial intelligence (AI) systems, especially for those societal applications, e. g., hiring systems should recommend applicants equally from different demographic groups, and risk assessment systems must eliminate racism in criminal justice.

Fairness

Backdoor Defense via Decoupling the Training Process

2 code implementations ICLR 2022 Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, Kui Ren

Recent studies have revealed that deep neural networks (DNNs) are vulnerable to backdoor attacks, where attackers embed hidden backdoors in the DNN model by poisoning a few training samples.

backdoor defense Self-Supervised Learning

A Generalized Weighted Optimization Method for Computational Learning and Inversion

no code implementations ICLR 2022 Björn Engquist, Kui Ren, Yunan Yang

The generalization capacity of various machine learning models exhibits different phenomena in the under- and over-parameterized regimes.

regression

"Adversarial Examples" for Proof-of-Learning

1 code implementation21 Aug 2021 Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren

Jia et al. claimed that an adversary merely knowing the final model and training dataset cannot efficiently find a set of intermediate models with correct data points.

valid

Feature Importance-aware Transferable Adversarial Attacks

3 code implementations ICCV 2021 Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren

More specifically, we obtain feature importance by introducing the aggregate gradient, which averages the gradients with respect to feature maps of the source model, computed on a batch of random transforms of the original clean image.

Feature Importance

A range characterization of the single-quadrant ADRT

no code implementations11 Oct 2020 Weilin Li, Kui Ren, Donsub Rim

The range characterization is obtained by first showing that the ADRT is a bijection between images supported on infinite half-strips, then identifying the linear subspaces that stay finitely supported under the inversion formula.

Math

Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of Things

no code implementations12 Jun 2020 Sekhar Rajendran, Zhi Sun, Feng Lin, Kui Ren

Our proposed solution, Metasurface RF-Fingerprinting Injection (MeRFFI), is to inject a carefully-designed radio frequency fingerprint into the wireless physical layer that can increase the security of a stationary IoT device with minimal overhead.

Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition

no code implementations14 May 2020 Tianhang Zheng, Sheng Liu, Changyou Chen, Junsong Yuan, Baochun Li, Kui Ren

We first formulate generation of adversarial skeleton actions as a constrained optimization problem by representing or approximating the physiological and physical constraints with mathematical formulations.

Action Recognition Skeleton Based Action Recognition

Learn to Forget: Machine Unlearning via Neuron Masking

no code implementations24 Mar 2020 Yang Liu, Zhuo Ma, Ximeng Liu, Jian Liu, Zhongyuan Jiang, Jianfeng Ma, Philip Yu, Kui Ren

To this end, machine unlearning becomes a popular research topic, which allows users to eliminate memorization of their private data from a trained machine learning model. In this paper, we propose the first uniform metric called for-getting rate to measure the effectiveness of a machine unlearning method.

BIG-bench Machine Learning Federated Learning +2

The quadratic Wasserstein metric for inverse data matching

no code implementations15 Nov 2019 Bjorn Engquist, Kui Ren, Yunan Yang

This work characterizes, analytically and numerically, two major effects of the quadratic Wasserstein ($W_2$) distance as the measure of data discrepancy in computational solutions of inverse problems.

Data Poisoning Attack against Knowledge Graph Embedding

no code implementations26 Apr 2019 Hengtong Zhang, Tianhang Zheng, Jing Gao, Chenglin Miao, Lu Su, Yaliang Li, Kui Ren

Knowledge graph embedding (KGE) is a technique for learning continuous embeddings for entities and relations in the knowledge graph. Due to its benefit to a variety of downstream tasks such as knowledge graph completion, question answering and recommendation, KGE has gained significant attention recently.

Data Poisoning Knowledge Graph Completion +2

PointCloud Saliency Maps

3 code implementations ICCV 2019 Tianhang Zheng, Changyou Chen, Junsong Yuan, Bo Li, Kui Ren

Our motivation for constructing a saliency map is by point dropping, which is a non-differentiable operator.

Towards Differentially Private Truth Discovery for Crowd Sensing Systems

no code implementations10 Oct 2018 Yaliang Li, Houping Xiao, Zhan Qin, Chenglin Miao, Lu Su, Jing Gao, Kui Ren, Bolin Ding

To better utilize sensory data, the problem of truth discovery, whose goal is to estimate user quality and infer reliable aggregated results through quality-aware data aggregation, has emerged as a hot topic.

Privacy Preserving

Is PGD-Adversarial Training Necessary? Alternative Training via a Soft-Quantization Network with Noisy-Natural Samples Only

no code implementations10 Oct 2018 Tianhang Zheng, Changyou Chen, Kui Ren

In this paper, we give a negative answer by proposing a training paradigm that is comparable to PGD adversarial training on several standard datasets, while only using noisy-natural samples.

Adversarial Attack Quantization

WiPIN: Operation-free Passive Person Identification Using Wi-Fi Signals

no code implementations6 Oct 2018 Fei Wang, Jinsong Han, Feng Lin, Kui Ren

Wi-Fi signals-based person identification attracts increasing attention in the booming Internet-of-Things era mainly due to its pervasiveness and passiveness.

Person Identification

Distributionally Adversarial Attack

4 code implementations16 Aug 2018 Tianhang Zheng, Changyou Chen, Kui Ren

Recent work on adversarial attack has shown that Projected Gradient Descent (PGD) Adversary is a universal first-order adversary, and the classifier adversarially trained by PGD is robust against a wide range of first-order attacks.

Adversarial Attack

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

no code implementations10 Aug 2018 Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren

In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning based detectors that rely on semantic features such as control-flow-graph.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.