Search Results for author: Dan Peng

Found 7 papers, 1 papers with code

PocketLLM: Enabling On-Device Fine-Tuning for Personalized LLMs

no code implementations1 Jul 2024 Dan Peng, Zhihui Fu, Jun Wang

To tackle this, we propose employing derivative-free optimization techniques to enable on-device fine-tuning of LLM, even on memory-limited mobile devices.

Focused State Recognition Using EEG with Eye Movement-Assisted Annotation

no code implementations15 Jun 2024 Tian-Hua Li, Tian-Fang Ma, Dan Peng, Wei-Long Zheng, Bao-liang Lu

Utilizing deep learning models for learning EEG and eye movement features proves effective in classifying brain activities.

EEG

Decoder-free Robustness Disentanglement without (Additional) Supervision

no code implementations2 Jul 2020 Yifei Wang, Dan Peng, Furui Liu, Zhenguo Li, Zhitang Chen, Jiansheng Yang

Adversarial Training (AT) is proposed to alleviate the adversarial vulnerability of machine learning models by extracting only robust features from the input, which, however, inevitably leads to severe accuracy reduction as it discards the non-robust yet useful features.

BIG-bench Machine Learning Decoder +1

Structure Matters: Towards Generating Transferable Adversarial Images

no code implementations22 Oct 2019 Dan Peng, Zizhan Zheng, Linhao Luo, Xiaofeng Zhang

In this paper, we propose the novel concepts of structure patterns and structure-aware perturbations that relax the small perturbation constraint while still keeping images natural.

Image Classification Novel Concepts +1

DO-AutoEncoder: Learning and Intervening Bivariate Causal Mechanisms in Images

no code implementations25 Sep 2019 Tianshuo Cong, Dan Peng, Furui Liu, Zhitang Chen

Our experiments demonstrate our method is able to correctly identify the bivariate causal relationship between concepts in images and the representation learned enables a do-calculus manipulation to images, which generates artificial images that might possibly break the physical law depending on where we intervene the causal system.

Adversarial Attack Representation Learning

Structure-Preserving Transformation: Generating Diverse and Transferable Adversarial Examples

1 code implementation8 Sep 2018 Dan Peng, Zizhan Zheng, Xiaofeng Zhang

A common requirement in all these works is that the malicious perturbations should be small enough (measured by an L_p norm for some p) so that they are imperceptible to humans.

Image Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.