1 code implementation • 17 May 2023 • Wenjun Peng, Jingwei Yi, Fangzhao Wu, Shangxi Wu, Bin Zhu, Lingjuan Lyu, Binxing Jiao, Tong Xu, Guangzhong Sun, Xing Xie
Companies have begun to offer Embedding as a Service (EaaS) based on these LLMs, which can benefit various natural language processing (NLP) tasks for customers.
no code implementations • 1 Mar 2023 • Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, YaoWei Wang, Changsheng Xu
In this work, we found that the backdoor attack can construct an artificial bias similar to the model bias derived in standard training.
no code implementations • 18 Feb 2022 • Shangxi Wu, Qiuyang He, Yi Zhang, Jitao Sang
Backdoor attack is a new AI security risk that has emerged in recent years.
no code implementations • 19 Nov 2020 • Shangxi Wu, Jitao Sang, Xian Zhao, Lizhang Chen
Deep learning models suffer from the problem of semantic discontinuity: small perturbations in the input space tend to cause semantic-level interference to the model output.
no code implementations • 25 May 2020 • Shangxi Wu, Jitao Sang, Kaiyuan Xu, Guanhua Zheng, Changsheng Xu
Specifically, AALP consists of an adaptive feature optimization module with Guided Dropout to systematically pursue fewer high-contribution features, and an adaptive sample weighting module by setting sample-specific training weights to balance between logits pairing loss and classification loss.
1 code implementation • 2 Jan 2020 • Bohan Liang, Shangxi Wu, Kaiyuan Xu, Jingyu Hao
Insects are abundant species on the earth, and the task of identification and identification of insects is complex and arduous.
no code implementations • 22 Apr 2019 • Jiaming Zhang, Jitao Sang, Kaiyuan Xu, Shangxi Wu, Yongli Hu, Yanfeng Sun, Jian Yu
Turing test was originally proposed to examine whether machine's behavior is indistinguishable from a human.
no code implementations • 24 Nov 2018 • Shangxi Wu, Jitao Sang, Kaiyuan Xu, Jiaming Zhang, Jian Yu
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.