no code implementations • 14 Nov 2022 • Shuo Shao, Wenyuan Yang, Hanlin Gu, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren
To deter such misbehavior, it is essential to establish a mechanism for verifying the ownership of the model and as well tracing its origin to the leaker among the FL participants.
no code implementations • 14 Nov 2022 • Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Ximeng Liu, Zhihua Xia, Gerald Schaefer, Hui Fang
In this paper, we propose a novel client-side FL watermarking scheme to tackle the copyright protection issue in secure FL with HE.
no code implementations • 11 Aug 2022 • Yufei Bo, Yiheng Duan, Shuo Shao, Meixia Tao
The intrinsic mechanism of neural network based digital modulation is mapping continuous output of the neural network encoder into discrete constellation symbols, which is a non-differentiable function that cannot be trained with existing gradient descend algorithms.
1 code implementation • 30 Apr 2022 • Hongwei Zhang, Shuo Shao, Meixia Tao, Xiaoyan Bi, Khaled B. Letaief
In practice, the semantic information is defined by the pragmatic task of the receiver and cannot be known to the transmitter.
no code implementations • 29 Jan 2022 • Jiakun Liu, Shuo Shao, Wenyi Zhang, H. Vincent Poor
A new source model, which consists of an intrinsic state part and an extrinsic observation part, is proposed and its information-theoretic characterization, namely its rate-distortion function, is defined and analyzed.
no code implementations • 24 May 2021 • Kun Wang, Jing Dong, Baoxiang Wang, Shuai Li, Shuo Shao
This paper studies \emph{differential privacy (DP)} and \emph{local differential privacy (LDP)} in cascading bandits.
no code implementations • 17 Apr 2021 • Kun Wang, Canzhe Zhao, Shuai Li, Shuo Shao
We propose the novel \emph{conservative contextual combinatorial cascading bandit ($C^4$-bandit)}, a cascading online learning game which incorporates the conservative mechanism.
1 code implementation • 3 Apr 2020 • Yuxuan Song, Minkai Xu, Lantao Yu, Hao Zhou, Shuo Shao, Yong Yu
In this paper, motivated by the inherent connections between neural joint source-channel coding and discrete representation learning, we propose a novel regularization method called Infomax Adversarial-Bit-Flip (IABF) to improve the stability and robustness of the neural joint source-channel coding scheme.
no code implementations • 21 Nov 2019 • Yuxuan Song, Lantao Yu, Zhangjie Cao, Zhiming Zhou, Jian Shen, Shuo Shao, Wei-Nan Zhang, Yong Yu
Domain adaptation aims to leverage the supervision signal of source domain to obtain an accurate model for target domain, where the labels are not available.
no code implementations • 2 Apr 2019 • Yuting Jia, Haiwen Wang, Shuo Shao, Huan Long, Yunsong Zhou, Xinbing Wang
Based on this new algorithm, four common geometric properties shared by the activation spaces are concluded, which gives a rather clear description of the activation spaces.