no code implementations • 20 Jan 2024 • Ivan Liu, Fangyuan Liu, Qi Zhong, Shiguang Ni
This study explores the use of smartphones for continuous BP monitoring, focusing on overcoming the trust barriers associated with the opacity of machine learning models in predicting BP from low-quality PPG signals.
1 code implementation • 18 Apr 2023 • Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang
To explore how to use the masked language model in adversarial detection, we propose a novel textual adversarial example detection method, namely Masked Language Model-based Detection (MLMD), which can produce clearly distinguishable signals between normal examples and adversarial examples by exploring the changes in manifolds induced by the masked language model.
no code implementations • 5 Apr 2022 • Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang
Fine-tuning attacks are effective in removing the embedded watermarks in deep learning models.
1 code implementation • 20 Feb 2022 • Yuankai Lin, Tao Cheng, Qi Zhong, Wending Zhou, Hua Yang
Our solution is to estimate independent affinity matrices in each SPN iteration, but it is over-parameterized and heavy calculation.
no code implementations • 28 Apr 2021 • Qi Zhong, Xian-Feng Han
Remarkable performance from Transformer networks in Natural Language Processing promote the development of these models in dealing with computer vision tasks such as image recognition and segmentation.
no code implementations • 25 Sep 2017 • David Fifield, Lynn Tsai, Qi Zhong
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls.
Cryptography and Security