Search Results for author: Wenxiao Wang

Found 39 papers, 22 papers with code

Model Compression and Efficient Inference for Large Language Models: A Survey

no code implementations15 Feb 2024 Wenxiao Wang, Wei Chen, Yicong Luo, Yongliu Long, Zhengkai Lin, Liye Zhang, Binbin Lin, Deng Cai, Xiaofei He

However, Large language models have two prominent characteristics compared to smaller models: (1) Most of compression algorithms require finetuning or even retraining the model after compression.

Knowledge Distillation Model Compression +1

Regulating Intermediate 3D Features for Vision-Centric Autonomous Driving

1 code implementation19 Dec 2023 Junkai Xu, Liang Peng, Haoran Cheng, Linxuan Xia, Qi Zhou, Dan Deng, Wei Qian, Wenxiao Wang, Deng Cai

To resolve this problem, we propose to regulate intermediate dense 3D features with the help of volume rendering.

Autonomous Driving

Few-shot Hybrid Domain Adaptation of Image Generators

1 code implementation30 Oct 2023 Hengjia Li, Yang Liu, Linxuan Xia, Yuqi Lin, Tu Zheng, Zheng Yang, Wenxiao Wang, Xiaohui Zhong, Xiaobo Ren, Xiaofei He

Concretely, the distance loss blends the attributes of all target domains by reducing the distances from generated images to all target subspaces.

Domain Adaptation Semantic Similarity +1

Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks

1 code implementation29 Sep 2023 Mehrdad Saberi, Vinu Sankar Sadasivan, Keivan Rezaei, Aounon Kumar, Atoosa Chegini, Wenxiao Wang, Soheil Feizi

Moreover, we show that watermarking methods are vulnerable to spoofing attacks where the attacker aims to have real images identified as watermarked ones, damaging the reputation of the developers.

Adversarial Attack Face Swapping

M$^3$CS: Multi-Target Masked Point Modeling with Learnable Codebook and Siamese Decoders

no code implementations23 Sep 2023 Qibo Qiu, Honghui Yang, Wenxiao Wang, Shun Zhang, Haiming Gao, Haochao Ying, Wei Hua, Xiaofei He

Specifically, with masked point cloud as input, M$^3$CS introduces two decoders to predict masked representations and the original points simultaneously.

MonoNeRD: NeRF-like Representations for Monocular 3D Object Detection

1 code implementation ICCV 2023 Junkai Xu, Liang Peng, Haoran Cheng, Hao Li, Wei Qian, Ke Li, Wenxiao Wang, Deng Cai

To the best of our knowledge, this work is the first to introduce volume rendering for M3D, and demonstrates the potential of implicit reconstruction for image-based 3D perception.

Monocular 3D Object Detection Object +1

On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

no code implementations28 Jun 2023 Wenxiao Wang, Soheil Feizi

The increasing access to data poses both opportunities and risks in deep learning, as one can manipulate the behaviors of deep learning models with malicious training samples.

Data Poisoning

SelFLoc: Selective Feature Fusion for Large-scale Point Cloud-based Place Recognition

no code implementations1 Jun 2023 Qibo Qiu, Haiming Gao, Wenxiao Wang, Zhiyi Su, Tian Xie, Wei Hua, Xiaofei He

To enhance message passing along particular axes, Stacked Asymmetric Convolution Block (SACB) is designed, which is one of the main contributions in this paper.

Autonomous Vehicles

PVT-SSD: Single-Stage 3D Object Detector with Point-Voxel Transformer

1 code implementation CVPR 2023 Honghui Yang, Wenxiao Wang, Minghao Chen, Binbin Lin, Tong He, Hua Chen, Xiaofei He, Wanli Ouyang

The key to associating the two different representations is our introduced input-dependent Query Initialization module, which could efficiently generate reference points and content queries.

Autonomous Driving Quantization

Img2Vec: A Teacher of High Token-Diversity Helps Masked AutoEncoders

no code implementations25 Apr 2023 Heng Pan, Chenyang Liu, Wenxiao Wang, Li Yuan, Hongfa Wang, Zhifeng Li, Wei Liu

To study which type of deep features is appropriate for MIM as a learning target, we propose a simple MIM framework with serials of well-trained self-supervised models to convert an Image to a feature Vector as the learning target of MIM, where the feature extractor is also known as a teacher model.

Attribute Vocal Bursts Intensity Prediction

Neural Collapse Inspired Federated Learning with Non-iid Data

no code implementations27 Mar 2023 Chenxi Huang, Liang Xie, Yibo Yang, Wenxiao Wang, Binbin Lin, Deng Cai

One of the challenges in federated learning is the non-independent and identically distributed (non-iid) characteristics between heterogeneous devices, which cause significant differences in local updates and affect the performance of the central server.

Federated Learning

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

1 code implementation20 Mar 2023 Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras

After showing how DRSM is theoretically robust against attacks with contiguous adversarial bytes, we verify its performance and certified robustness experimentally, where we observe only marginal accuracy drops as the cost of robustness.

Adversarial Robustness Malware Detection

Can AI-Generated Text be Reliably Detected?

1 code implementation17 Mar 2023 Vinu Sankar Sadasivan, Aounon Kumar, Sriram Balasubramanian, Wenxiao Wang, Soheil Feizi

In particular, we develop a recursive paraphrasing attack to apply on AI text, which can break a whole range of detectors, including the ones using the watermarking schemes as well as neural network-based detectors, zero-shot classifiers, and retrieval-based detectors.

Language Modelling Large Language Model +2

CrossFormer++: A Versatile Vision Transformer Hinging on Cross-scale Attention

1 code implementation13 Mar 2023 Wenxiao Wang, Wei Chen, Qibo Qiu, Long Chen, Boxi Wu, Binbin Lin, Xiaofei He, Wei Liu

On the one hand, CEL blends each token with multiple patches of different scales, providing the self-attention module itself with cross-scale features.

Image Classification Instance Segmentation +3

Temporal Robustness against Data Poisoning

no code implementations NeurIPS 2023 Wenxiao Wang, Soheil Feizi

Data poisoning considers cases when an adversary manipulates the behavior of machine learning algorithms through malicious training data.

Data Poisoning

OBMO: One Bounding Box Multiple Objects for Monocular 3D Object Detection

1 code implementation20 Dec 2022 Chenxi Huang, Tong He, Haidong Ren, Wenxiao Wang, Binbin Lin, Deng Cai

Unfortunately, the network cannot accurately distinguish different depths from such non-discriminative visual features, resulting in unstable depth training.

Monocular 3D Object Detection object-detection

Lethal Dose Conjecture on Data Poisoning

1 code implementation5 Aug 2022 Wenxiao Wang, Alexander Levine, Soheil Feizi

Deep Partition Aggregation (DPA) and its extension, Finite Aggregation (FA) are recent approaches for provable defenses against data poisoning, where they predict through the majority vote of many base models trained from different subsets of training set using a given learner.

Data Poisoning

Masked Autoencoders for Point Cloud Self-supervised Learning

3 code implementations13 Mar 2022 Yatian Pang, Wenxiao Wang, Francis E. H. Tay, Wei Liu, Yonghong Tian, Li Yuan

Then, a standard Transformer based autoencoder, with an asymmetric design and a shifting mask tokens operation, learns high-level latent features from unmasked point patches, aiming to reconstruct the masked point patches.

3D Part Segmentation Few-Shot 3D Point Cloud Classification +2

Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation

1 code implementation5 Feb 2022 Wenxiao Wang, Alexander Levine, Soheil Feizi

DPA predicts through an aggregation of base classifiers trained on disjoint subsets of data, thus restricting its sensitivity to dataset distortions.

Data Poisoning

CrossFormer: A Versatile Vision Transformer Hinging on Cross-scale Attention

3 code implementations ICLR 2022 Wenxiao Wang, Lu Yao, Long Chen, Binbin Lin, Deng Cai, Xiaofei He, Wei Liu

On the one hand, CEL blends each embedding with multiple patches of different scales, providing the self-attention module itself with cross-scale features.

Image Classification Instance Segmentation +4

On Feature Decorrelation in Self-Supervised Learning

1 code implementation ICCV 2021 Tianyu Hua, Wenxiao Wang, Zihui Xue, Sucheng Ren, Yue Wang, Hang Zhao

In self-supervised representation learning, a common idea behind most of the state-of-the-art approaches is to enforce the robustness of the representations to predefined augmentations.

Representation Learning Self-Supervised Learning

Accelerate CNNs from Three Dimensions: A Comprehensive Pruning Framework

no code implementations10 Oct 2020 Wenxiao Wang, Minghao Chen, Shuai Zhao, Long Chen, Jinming Hu, Haifeng Liu, Deng Cai, Xiaofei He, Wei Liu

Specifically, it first casts the relationships between a certain model's accuracy and depth/width/resolution into a polynomial regression and then maximizes the polynomial to acquire the optimal values for the three dimensions.

Network Pruning Neural Architecture Search +1

DBP: Discrimination Based Block-Level Pruning for Deep Model Acceleration

no code implementations21 Dec 2019 Wenxiao Wang, Shuai Zhao, Minghao Chen, Jinming Hu, Deng Cai, Haifeng Liu

The dominant pruning methods, filter-level pruning methods, evaluate their performance through the reduction ratio of computations and deem that a higher reduction ratio of computations is equivalent to a higher acceleration ratio in terms of inference time.

Network Pruning

REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data

1 code implementation17 Nov 2019 Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song

The experimental results demonstrate that our fine-tuning based watermark removal attacks could pose real threats to the copyright of pre-trained models, and thus highlight the importance of further investigating the watermarking problem and proposing more robust watermark embedding schemes against the attacks.

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

1 code implementation CVPR 2020 Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song

This paper studies model-inversion attacks, in which the access to a model is abused to infer information about the training data.

Face Recognition regression

COP: Customized Deep Model Compression via Regularized Correlation-Based Filter-Level Pruning

1 code implementation25 Jun 2019 Wenxiao Wang, Cong Fu, Jishun Guo, Deng Cai, Xiaofei He

2) Cross-layer filter comparison is unachievable since the importance is defined locally within each layer.

Neural Network Compression

Cannot find the paper you are looking for? You can Submit a new open access paper.