no code implementations • 13 Mar 2025 • Yifeng Cai, Ziqi Zhang, Ding Li, Yao Guo, Xiangqun Chen
Modern Federated Learning (FL) has become increasingly essential for handling highly heterogeneous mobile devices.
no code implementations • 15 Nov 2024 • Ding Li, Ziqi Zhang, Mengyu Yao, Yifeng Cai, Yao Guo, Xiangqun Chen
Our approach can compress the private functionalities of the large language model to lightweight slices and achieve the same level of protection as the shielding-whole-model baseline.
no code implementations • 21 Jul 2024 • Yu Zhang, Ruijie Yu, Kaipeng Zeng, Ding Li, Feng Zhu, Xiaokang Yang, Yaohui Jin, Yanyan Xu
High-throughput reaction condition (RC) screening is fundamental to chemical synthesis.
1 code implementation • 3 Apr 2024 • Jie Zhu, Jirong Zha, Ding Li, Leye Wang
In this setting, considering that self-supervised model could be trained by completely different self-supervised paradigms, e. g., masked image modeling and contrastive learning, with complex training details, we propose a unified membership inference method called PartCrop.
1 code implementation • 28 Mar 2024 • Yunpeng Zhang, Deheng Qian, Ding Li, Yifeng Pan, Yong Chen, Zhenbao Liang, Zhiyao Zhang, Shurui Zhang, Hongxu Li, Maolei Fu, Yun Ye, Zhujin Liang, Yi Shan, Dalong Du
With the representation of the ISG, the driving agents aggregate essential information from the most influential elements, including the road agents with potential collisions and the map elements to follow.
1 code implementation • 11 Oct 2023 • Ziqi Zhang, Chen Gong, Yifeng Cai, Yuanyuan Yuan, Bingyan Liu, Ding Li, Yao Guo, Xiangqun Chen
These solutions, referred to as TEE-Shielded DNN Partition (TSDP), partition a DNN model into two parts, offloading the privacy-insensitive part to the GPU while shielding the privacy-sensitive part within the TEE.
no code implementations • 3 May 2023 • Ding Li, Yongqiang Tang, Zhizhong Zhang, Wensheng Zhang
Besides, to further exploit the potential of positive pairs and increase the robustness of self-supervised representation learning, we propose a Positive Feature Transformation (PFT) strategy which adopts feature-level manipulation to increase the variance of positive pairs.
no code implementations • 19 Oct 2022 • Ding Li, Qichao Zhang, Shuai Lu, Yifeng Pan, Dongbin Zhao
Our CGTP framework is an end to end and interpretable model, including three main stages: context encoding, goal interactive prediction and trajectory interactive prediction.
no code implementations • 31 Aug 2022 • Ding Li, Yuan Xie, Wensheng Zhang, Yongqiang Tang, Zhizhong Zhang
However, the existing methods simply employed max/average pooling in this framework, which ignored the distinct contributions of different individuals to the group activity recognition.
no code implementations • 31 Aug 2022 • Ding Li, Xuebing Yang, Yongqiang Tang, Chenyang Zhang, Wensheng Zhang
And the other introduces a new metric based on mutual information between adjacent action proposals and evaluates the informativeness of video samples, named Temporal Context Inconsistency (TCI).
no code implementations • 25 Jun 2022 • Hong Zhang, Ding Li
Unified Diagnostic Services (UDS) is a diagnostic communication protocol used in electronic control units (ECUs) within automotive electronics, which is specified in the ISO 14229-1.
no code implementations • 4 Nov 2021 • Ding Li, Rui Wu, Yongqiang Tang, Zhizhong Zhang, Wensheng Zhang
Specifically, we first construct a two-dimensional map for each temporal scale to capture the temporal dependencies between candidates.
1 code implementation • 22 Oct 2021 • Bingyan Liu, Yifeng Cai, Ziqi Zhang, Yuanchun Li, Leye Wang, Ding Li, Yao Guo, Xiangqun Chen
Previous studies focus on the "symptoms" directly, as they try to improve the accuracy or detect possible attacks by adding extra steps to conventional FL models.
no code implementations • 13 Dec 2020 • Kun Zhang, Rui Wu, Ping Yao, Kai Deng, Ding Li, Renbiao Liu, Chuanguang Yang, Ge Chen, Min Du, Tianyao Zheng
We note that 2D pose estimation task is highly dependent on the contextual relationship between image patches, thus we introduce a self-supervised method for pretraining 2D pose estimation networks.
no code implementations • 26 Aug 2020 • Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
We introduce SIGL, a new tool for detecting malicious behavior during software installation.
1 code implementation • 15 May 2020 • Lei Cai, Zhengzhang Chen, Chen Luo, Jiaping Gui, Jingchao Ni, Ding Li, Haifeng Chen
Detecting anomalies in dynamic graphs is a vital task, with numerous practical applications in areas such as security, finance, and social media.
no code implementations • 17 Oct 2019 • Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu
Information systems have widely been the target of malware attacks.
no code implementations • 10 Dec 2018 • Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu
The key idea is to leverage the representation learning of the heterogeneous program behavior graph to guide the reidentification process.
1 code implementation • 25 Jun 2018 • Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhen-Yu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal
To facilitate the task of expressing anomalies based on expert knowledge, our system provides a domain-specific query language, SAQL, which allows analysts to express models for (1) rule-based anomalies, (2) time-series anomalies, (3) invariant-based anomalies, and (4) outlier-based anomalies.
Cryptography and Security Databases