Search Results for author: Chao Shen

Found 22 papers, 5 papers with code

FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons

1 code implementation6 Apr 2022 Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang

To solve this issue, there has been a number of work trying to improve model fairness by using an adversarial game in model level.


Energy-optimal Three-dimensional Path-following Control of Autonomous Underwater Vehicles under Ocean Currents

no code implementations22 Mar 2022 Niankai Yang, Chao Shen, Matthew Johnson-Roberson, Jing Sun

In the first stage, the surge velocity, heave velocity, and pitch angle setpoints are optimized by minimizing the required vehicle propulsion energy under currents, and the line-of-sight (LOS) guidance law is used to generate the yaw angle setpoint that ensures path following.

Towards Benchmarking and Evaluating Deepfake Detection

no code implementations4 Mar 2022 Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li

Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos.

DeepFake Detection Face Swapping

Property Inference Attacks Against GANs

1 code implementation15 Nov 2021 Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang

In addition, we show that our attacks can be used to enhance the performance of membership inference against GANs.

Fairness Inference Attack

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information

no code implementations19 Oct 2021 Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang

For commercial cloud speech APIs, we propose Occam, a decision-only black-box adversarial attack, where only final decisions are available to the adversary.

Adversarial Attack Speaker Recognition

Optimal Operation of a Hydrogen-based Building Multi-Energy System Based on Deep Reinforcement Learning

no code implementations22 Sep 2021 Liang Yu, Shuqi Qin, Zhanbo Xu, Xiaohong Guan, Chao Shen, Dong Yue

To overcome the challenge, we reformulate the problem as a Markov game and propose an energy management algorithm to solve it based on multi-agent discrete actor-critic with rules (MADACR).

Parameter Prediction reinforcement-learning

Teacher Model Fingerprinting Attacks Against Transfer Learning

no code implementations23 Jun 2021 Yufei Chen, Chao Shen, Cong Wang, Yang Zhang

To this end, we propose a teacher model fingerprinting attack to infer the origin of a student model, i. e., the teacher model it transfers from.

Transfer Learning

CARTL: Cooperative Adversarially-Robust Transfer Learning

1 code implementation12 Jun 2021 Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li

In deep learning, a typical strategy for transfer learning is to freeze the early layers of a pre-trained model and fine-tune the rest of its layers on the target domain.

Adversarial Robustness Transfer Learning

Infer-AVAE: An Attribute Inference Model Based on Adversarial Variational Autoencoder

no code implementations30 Dec 2020 Yadong Zhou, Zhihao Ding, Xiaoming Liu, Chao Shen, Lingling Tong, Xiaohong Guan

While using the trending graph neural networks (GNNs) as encoder has the problem that GNNs aggregate redundant information from neighborhood and generate indistinguishable user representations, which is known as over-smoothing.

Unify Local and Global Information for Top-$N$ Recommendation

no code implementations3 Dec 2020 Xiaoming Liu, Shaocong Wu, Zhaohan Zhang, Chao Shen

To tackle this research gap, we propose a novel duet representation learning framework named \sysname to fuse local information (user-item interaction data) and global information (external knowledge graph) for the top-$N$ recommendation, which is composed of two separate sub-models.

Knowledge Graph Embedding Recommendation Systems

Optimal Resource Allocation for Delay Minimization in NOMA-MEC Networks

no code implementations11 Sep 2020 Fang Fang, Yanqing Xu, Zhiguo Ding, Chao Shen, Mugen Peng, George K. Karagiannidis

We adopt the partial offloading policy, in which each user can partition its computation task into offloading and locally computing parts.


A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models

1 code implementation26 Jun 2020 Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu

In this paper, we present a unified framework for detecting malicious examples and protecting the inference results of Deep Learning models.

Adversarial Defense

Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings

no code implementations25 Jun 2020 Liang Yu, Yi Sun, Zhanbo Xu, Chao Shen, Dong Yue, Tao Jiang, Xiaohong Guan

In this paper, we intend to minimize the energy cost of an HVAC system in a multi-zone commercial building under dynamic pricing with the consideration of random zone occupancy, thermal comfort, and indoor air quality comfort.


Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

no code implementations22 Feb 2020 Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang

This paper proposes a new scheme for privacy-preserving neural network prediction in the outsourced setting, i. e., the server cannot learn the query, (intermediate) results, and the model.

Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection

no code implementations29 Oct 2019 Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu

Collaborative learning allows multiple clients to train a joint model without sharing their data with each other.

Adversarial Example Detection by Classification for Deep Speech Recognition

no code implementations22 Oct 2019 Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan

Machine Learning systems are vulnerable to adversarial attacks and will highly likely produce incorrect outputs under these attacks.

Classification General Classification +2

Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms

no code implementations USENIX Security Symposium 2019 Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li

We also present an algorithm that can successfully enable attacks against famous cloud-based image services (such as those from Microsoft Azure, Aliyun, Baidu, and Tencent) and cause obvious misclassification effects, even when the details of image processing (such as the exact scaling algorithm and scale dimension parameters) are hidden in the cloud.

Data Poisoning Image Classification

Can a composite heart rate variability biomarker shed new insights about autism spectrum disorder in school-aged children?

1 code implementation24 Aug 2018 Martin G. Frasch, Chao Shen, Hau-Tieng Wu, Alexander Mueller, Emily Neuhaus, Raphael A. Bernier, Dana Kamara, Theodore P. Beauchaine

High-frequency heart rate variability (HRV) has identified parasympathetic nervous system alterations in autism spectrum disorder (ASD).

Quantitative Methods Neurons and Cognition

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

no code implementations22 Oct 2017 Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue

This paper presents a novel user authentication system through wrist-worn devices by analyzing the interaction behavior with users, which is both accurate and efficient for future usage.

Cannot find the paper you are looking for? You can Submit a new open access paper.