Search Results for author: Hai Jin

Found 19 papers, 7 papers with code

Accelerating Backward Aggregation in GCN Training with Execution Path Preparing on GPUs

no code implementations6 Apr 2022 Shaoxian Xu, Zhiyuan Shao, Ci Yang, Xiaofei Liao, Hai Jin

In this paper, we first point out that in a GCN training problem with a given training set, the aggregation stages of its backward propagation phase (called as backward aggregations in this paper) can be converted to partially-active graph processing procedures, which conduct computation on only partial vertices of the input graph.

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer

1 code implementation7 Mar 2022 Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu

While deep face recognition (FR) systems have shown amazing performance in identification and verification, they also arouse privacy concerns for their excessive surveillance on users, especially for public face images widely spread on social networks.

Face Recognition

What Do They Capture? -- A Structural Analysis of Pre-Trained Language Models for Source Code

1 code implementation14 Feb 2022 Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin

In this paper, we conduct a thorough structural analysis aiming to provide an interpretation of pre-trained language models for source code (e. g., CodeBERT, and GraphCodeBERT) from three distinctive perspectives: (1) attention analysis, (2) probing on the word embedding, and (3) syntax tree induction.

Code Completion Code Search +1

Cross-Language Binary-Source Code Matching with Intermediate Representations

1 code implementation19 Jan 2022 Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin

Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment.

Malware Detection

Clairvoyance: Intelligent Route Planning for Electric Buses Based on Urban Big Data

no code implementations9 Dec 2021 Xiangyong Lu, Kaoru Ota, Mianxiong Dong, Chen Yu, Hai Jin

Nowadays many cities around the world have introduced electric buses to optimize urban traffic and reduce local carbon emissions.

FedHM: Efficient Federated Learning for Heterogeneous Models via Low-rank Factorization

no code implementations29 Nov 2021 Dezhong Yao, Wanning Pan, Yao Wan, Hai Jin, Lichao Sun

The underlying assumption of recent federated learning (FL) paradigms is that local models usually share the same network architecture as the global model, which becomes impractical for mobile and IoT devices with different setups of hardware and infrastructure.

Distributed Computing Federated Learning +3

Distributed Optimal Margin Distribution Machine

no code implementations29 Sep 2021 Yilin Wang, Nan Cao, Teng Zhang, Hai Jin

Optimal margin Distribution Machine (ODM), a newly proposed statistical learning framework rooting in the novel margin theory, demonstrates better generalization performance than the traditional large margin based counterparts.

Towards Making Deep Learning-based Vulnerability Detectors Robust

1 code implementation2 Aug 2021 Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin

Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention.

Local-Global Knowledge Distillation in Heterogeneous Federated Learning with Non-IID Data

no code implementations30 Jun 2021 Dezhong Yao, Wanning Pan, Yutong Dai, Yao Wan, Xiaofeng Ding, Hai Jin, Zheng Xu, Lichao Sun

Federated learning enables multiple clients to collaboratively learn a global model by periodically aggregating the clients' models without transferring the local data.

Federated Learning Knowledge Distillation

Semantic and Syntactic Enhanced Aspect Sentiment Triplet Extraction

no code implementations Findings (ACL) 2021 Zhexue Chen, Hong Huang, Bang Liu, Xuanhua Shi, Hai Jin

Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from sentences, where each triplet includes an entity, its associated sentiment, and the opinion span explaining the reason for the sentiment.

Aspect Sentiment Triplet Extraction

Sparse online relative similarity learning

no code implementations15 Apr 2021 Dezhong Yao, Peilin Zhao, Chen Yu, Hai Jin, Bin Li

This is clearly inefficient for high dimensional tasks due to its high memory and computational complexity.

Metric Learning online learning

Significant Inverse Magnetocaloric Effect induced by Quantum Criticality

no code implementations17 Feb 2021 Tao Liu, Xin-Yang Liu, Yuan Gao, Hai Jin, Jun He, Xian-Lei Sheng, Wentao Jin, Ziyu Chen, Wei Li

Strong fluctuations in the low-$T$ quantum critical regime can give rise to a large thermal entropy change and thus significant cooling effect when approaching the QCP.

Strongly Correlated Electrons

$μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

no code implementations8 Jan 2020 Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin

Existing vulnerability detection methods based on deep learning can detect the presence of vulnerabilities (i. e., addressing the binary classification or detection problem), but cannot pinpoint types of vulnerabilities (i. e., incapable of addressing multiclass classification).

General Classification Vulnerability Detection

A Survey on Graph Processing Accelerators: Challenges and Opportunities

no code implementations26 Feb 2019 Chuangyi Gui, Long Zheng, Bingsheng He, Cheng Liu, Xinyu Chen, Xiaofei Liao, Hai Jin

Graph is a well known data structure to represent the associated relationships in a variety of applications, e. g., data science and machine learning.

Distributed, Parallel, and Cluster Computing

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities

4 code implementations18 Jul 2018 Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen

Our experiments with 4 software products demonstrate the usefulness of the framework: we detect 15 vulnerabilities that are not reported in the National Vulnerability Database.

Vulnerability Detection

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

2 code implementations5 Jan 2018 Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong

Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection.

Vulnerability Detection

Differentially Private Online Learning for Cloud-Based Video Recommendation with Multimedia Big Data in Social Networks

no code implementations1 Sep 2015 Pan Zhou, Yingxue Zhou, Dapeng Wu, Hai Jin

In addition, none of them has considered both the privacy of users' contexts (e, g., social status, ages and hobbies) and video service vendors' repositories, which are extremely sensitive and of significant commercial value.

online learning Recommendation Systems

Human mobility synthesis using matrix and tensor factorizations

no code implementations Information Fusion 2014 Dezhong Yao, Chen Yu, Hai Jin, Qiang Ding

As the tensor model has a strong ability to describe high-dimensional information, we propose an algorithm to predict human mobility in tensors of location context data.

Tensor Decomposition

Cannot find the paper you are looking for? You can Submit a new open access paper.