Search Results for author: Zilong Zhao

Found 18 papers, 6 papers with code

Stepwise Self-Consistent Mathematical Reasoning with Large Language Models

1 code implementation24 Feb 2024 Zilong Zhao, Yao Rong, Dongyang Guo, Emek Gözlüklü, Emir Gülboy, Enkelejda Kasneci

SSC-CoT employs a strategy of selecting intermediate steps based on the intersection of various reasoning chains.

Math Mathematical Reasoning

TabuLa: Harnessing Language Models for Tabular Data Synthesis

3 code implementations19 Oct 2023 Zilong Zhao, Robert Birke, Lydia Chen

Results show that Tabula averagely reduces 46. 2% training time per epoch comparing to current LLMs-based state-of-the-art algorithm and consistently achieves even higher synthetic data utility.

Language Modelling

GTV: Generating Tabular Data via Vertical Federated Learning

no code implementations3 Feb 2023 Zilong Zhao, Han Wu, Aad van Moorsel, Lydia Y. Chen

Conditional vector for tabular GANs is a valuable tool to control specific features of generated data.

Privacy Preserving Vertical Federated Learning

Permutation-Invariant Tabular Data Synthesis

no code implementations17 Nov 2022 Yujin Zhu, Zilong Zhao, Robert Birke, Lydia Y. Chen

We show that changing the input column order worsens the statistical difference between real and synthetic data by up to 38. 67% due to the encoding of tabular data and the network architectures.

FCT-GAN: Enhancing Table Synthesis via Fourier Transform

no code implementations12 Oct 2022 Zilong Zhao, Robert Birke, Lydia Y. Chen

Mainstream state-of-the-art tabular data synthesizers draw methodologies from Generative Adversarial Networks (GANs), which are composed of a generator and a discriminator.

Generative Adversarial Network

UGformer for Robust Left Atrium and Scar Segmentation Across Scanners

no code implementations11 Oct 2022 Tianyi Liu, Size Hou, Jiayuan Zhu, Zilong Zhao, Haochuan Jiang

an enhanced transformer module with deformable convolutions to improve the blending of the transformer information with convolutional information and help predict irregular LAs and scar shapes.

Domain Generalization Image Segmentation +2

CTAB-GAN+: Enhancing Tabular Data Synthesis

2 code implementations1 Apr 2022 Zilong Zhao, Aditya Kunar, Robert Birke, Lydia Y. Chen

We extensively evaluate CTAB-GAN+ on data similarity and analysis utility against state-of-the-art tabular GANs.

Privacy Preserving

Fabricated Flips: Poisoning Federated Learning without Data

no code implementations7 Feb 2022 Jiyue Huang, Zilong Zhao, Lydia Y. Chen, Stefanie Roos

Consequently, we design REFD, a defense specifically crafted to protect against data-free attacks.

Federated Learning

Attacks and Defenses for Free-Riders in Multi-Discriminator GAN

no code implementations24 Jan 2022 Zilong Zhao, Jiyue Huang, Stefanie Roos, Lydia Y. Chen

To mitigate the model degradation, we propose a defense strategy against free-riders in MD-GAN, termed DFG.

ComicGAN: Text-to-Comic Generative Adversarial Network

no code implementations19 Sep 2021 Ben Proven-Bessel, Zilong Zhao, Lydia Chen

No existing machine learning algorithms have been developed to create comic illustrations based on descriptions of illustrations, or the dialogue in comics.

Generative Adversarial Network Image Generation

Fed-TGAN: Federated Learning Framework for Synthesizing Tabular Data

1 code implementation18 Aug 2021 Zilong Zhao, Robert Birke, Aditya Kunar, Lydia Y. Chen

And, while learning GANs to synthesize images on FL systems has just been demonstrated, it is unknown if GANs for tabular data can be learned from decentralized data sources.

Federated Learning Privacy Preserving

DTGAN: Differential Private Training for Tabular GANs

no code implementations6 Jul 2021 Aditya Kunar, Robert Birke, Zilong Zhao, Lydia Chen

Additionally, we rigorously evaluate the theoretical privacy guarantees offered by DP empirically against membership and attribute inference attacks.

Attribute

Enhancing Robustness of On-line Learning Models on Highly Noisy Data

1 code implementation19 Mar 2021 Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

Classification algorithms have been widely adopted to detect anomalies for various systems, e. g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i. e., features and labels are correctly set.

Anomaly Detection Face Recognition

CTAB-GAN: Effective Table Data Synthesizing

1 code implementation16 Feb 2021 Zilong Zhao, Aditya Kunar, Hiek Van der Scheer, Robert Birke, Lydia Y. Chen

In this paper, we develop CTAB-GAN, a novel conditional table GAN architecture that can effectively model diverse data types, including a mix of continuous and categorical variables.

Event-Based Control for Online Training of Neural Networks

no code implementations20 Mar 2020 Zilong Zhao, Sophie Cerf, Bogdan Robu, Nicolas Marchand

During its training the learning rate and the gradient are two key factors to tune for influencing the convergence speed of the model.

Image Classification

QActor: On-line Active Learning for Noisy Labeled Stream Data

no code implementations28 Jan 2020 Taraneh Younesian, Zilong Zhao, Amirmasoud Ghiassi, Robert Birke, Lydia Y. Chen

A central feature of QActor is to dynamically adjust the query limit according to the learning loss for each data batch.

Active Learning

Feedback Control for Online Training of Neural Networks

no code implementations18 Nov 2019 Zilong Zhao, Sophie Cerf, Bogdan Robu, Nicolas Marchand

Convolutional neural networks (CNNs) are commonly used for image classification tasks, raising the challenge of their application on data flows.

Image Classification

RAD: On-line Anomaly Detection for Highly Unreliable Data

no code implementations11 Nov 2019 Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen

Classification algorithms have been widely adopted to detect anomalies for various systems, e. g., IoT, cloud and face recognition, under the common assumption that the data source is clean, i. e., features and labels are correctly set.

Anomaly Detection Face Recognition

Cannot find the paper you are looking for? You can Submit a new open access paper.