no code implementations • 16 May 2023 • Moni Naor, Kobbi Nissim, Uri Stemmer, Chao Yan
We observe that when answering a stream of queries, a predictor must modify the hypothesis it uses over time, and, furthermore, that it must use the queries for this modification, hence introducing potential privacy risks with respect to the queries themselves.
1 code implementation • 2 Aug 2022 • Chao Yan, Yao Yan, Zhiyu Wan, Ziqi Zhang, Larsson Omberg, Justin Guinney, Sean D. Mooney, Bradley A. Malin
The results illustrate that there is a utility-privacy tradeoff for sharing synthetic EHR data.
no code implementations • 6 Jul 2022 • Steve Nyemba, Chao Yan, Ziqi Zhang, Amol Rajmane, Pablo Meyer, Prithwish Chakraborty, Bradley Malin
We further show that the transfer learning approach based on the BAN produces models that are better than those trained on just a single institution's data.
1 code implementation • Findings (ACL) 2022 • Zhongli Li, Wenxuan Zhang, Chao Yan, Qingyu Zhou, Chao Li, Hongzhi Liu, Yunbo Cao
Math Word Problem (MWP) solving needs to discover the quantitative relationships over natural language narratives.
no code implementations • 28 Jul 2021 • Yihong Yang, Sheng Ding, YuWen Liu, Shunmei Meng, Xiaoxiao Chi, Rui Ma, Chao Yan
However, traditional anomaly detection algorithms originally designed for anomaly detection in static data have not properly considered the inherent characteristics of data stream produced by wireless sensor such as infiniteness, correlations and concept drift, which may pose a considerable challenge on anomaly detection based on data stream, and lead to low detection accuracy and efficiency.
no code implementations • 9 Apr 2021 • Prithwish Chakraborty, James Codella, Piyush Madan, Ying Li, Hu Huang, Yoonyoung Park, Chao Yan, Ziqi Zhang, Cheng Gao, Steve Nyemba, Xu Min, Sanjib Basak, Mohamed Ghalwash, Zach Shahn, Parthasararathy Suryanarayanan, Italo Buleje, Shannon Harrer, Sarah Miller, Amol Rajmane, Colin Walsh, Jonathan Wanderer, Gigi Yuen Reed, Kenney Ng, Daby Sow, Bradley A. Malin
Deep learning architectures have an extremely high-capacity for modeling complex data in a wide variety of domains.
no code implementations • 30 Mar 2021 • Chao Yan, Xinbo Geng, Zhaohong Bie, Le Xie
Furthermore, the column-and-constraint generation algorithm is used to solve the two-stage robust planning problem and tighten theoretical guarantees.
no code implementations • 29 Mar 2021 • Kobbi Nissim, Chao Yan
We provide a lowerbound on the sample complexity of distribution-free parity learning in the realizable case in the shuffle model of differential privacy.
no code implementations • 26 Mar 2021 • Yun Zhao, Xuerui Yang, Jinchao Wang, Yongyu Gao, Chao Yan, Yuanfu Zhou
Although automatic speech recognition (ASR) systems achieved significantly improvements in recent years, spoken language recognition error occurs which can be easily spotted by human beings.
Automatic Speech Recognition
Automatic Speech Recognition (ASR)
+2
no code implementations • 20 Jan 2021 • Chao Yan, Xiaojia Xiang, Chang Wang, Zhen Lan
Developing the flocking behavior for a dynamic squad of fixed-wing UAVs is still a challenge due to kinematic complexity and environmental uncertainty.
no code implementations • 16 Nov 2020 • Yuan Chang, Chao Yan, Xingyu Liu, Xiangke Wang, Han Zhou, Xiaojia Xiang, Dengqing Tang
This paper presents a time-efficient scheme for Mars exploration by the cooperation of multiple drones and a rover.
no code implementations • 17 Mar 2020 • Chao Yan, Ziqi Zhang, Steve Nyemba, Bradley A. Malin
Sharing electronic health records (EHRs) on a large scale may lead to privacy intrusions.
no code implementations • 20 Jun 2019 • Liang Tong, Aron Laszka, Chao Yan, Ning Zhang, Yevgeniy Vorobeychik
We then use these in a double-oracle framework to obtain an approximate equilibrium of the game, which in turn yields a robust stochastic policy for the defender.
no code implementations • 22 Jan 2018 • Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin
For enhancing the privacy protections of databases, where the increasing amount of detailed personal data is stored and processed, multiple mechanisms have been developed, such as audit logging and alert triggers, which notify administrators about suspicious activities; however, the two main limitations in common are: 1) the volume of such alerts is often substantially greater than the capabilities of resource-constrained organizations, and 2) strategic attackers may disguise their actions or carefully choosing which records they touch, making incompetent the statistical detection models.