no code implementations • COLING 2022 • Xiangyu Gui, Feng Zhao, Langjunqing Jin, Hai Jin
During the learning process, the semantics of each entity are embedded by a vector or a point in a feature space.
1 code implementation • 7 Jan 2025 • Zhangqian Bi, Yao Wan, Zhaoyang Chu, Yufei Hu, Junyi Zhang, Hongyu Zhang, Guandong Xu, Hai Jin
Pre-training a language model and then fine-tuning it has shown to be an efficient and effective technique for a wide range of code intelligence tasks, such as code generation, code summarization, and vulnerability detection.
1 code implementation • 22 Dec 2024 • Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan, Leo Yu Zhang, Dezhong Yao, Hai Jin
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving.
1 code implementation • 4 Oct 2024 • Xianlong Wang, Minghui Li, Wei Liu, Hangtao Zhang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Hai Jin
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data.
1 code implementation • 26 Sep 2024 • Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin
In the spatial domain, we disrupt the semantics of both the foreground and background in the image to confuse SAM.
1 code implementation • 21 Jun 2024 • Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin
Finally, to address the trade-off of the inconsistency in the assimilation sensitivity of different poisons by Gaussian noise, we propose a lightweight corruption compensation module to effectively eliminate residual poisons, providing a more universal defense approach.
1 code implementation • 6 Jun 2024 • Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin
First, we utilize the vulnerability patches to construct a vulnerability localization task.
2 code implementations • 5 Jun 2024 • Zihan Luo, Hong Huang, Yongkang Zhou, Jiping Zhang, Nuo Chen, Hai Jin
Despite the remarkable capabilities demonstrated by Graph Neural Networks (GNNs) in graph-related tasks, recent research has revealed the fairness vulnerabilities in GNNs when facing malicious adversarial attacks.
no code implementations • 31 May 2024 • Xiaojin Zhang, Yulin Fei, Yan Kang, Wei Chen, Lixin Fan, Hai Jin, Qiang Yang
Therefore, it is essential to evaluate the balance between the risk of privacy leakage and loss of utility when conducting effective protection mechanisms.
1 code implementation • 26 Apr 2024 • Yang Wu, Yao Wan, Hongyu Zhang, Yulei Sui, Wucai Wei, Wei Zhao, Guandong Xu, Hai Jin
In particular, we first explore the ways of transforming structured tabular data into sequential text prompts, as to feed them into LLMs and analyze which table content contributes most to the NL2Vis.
1 code implementation • 24 Apr 2024 • Zhaoyang Chu, Yao Wan, Qian Li, Yang Wu, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin
We argue that these factual reasoning-based explanations cannot answer critical what-if questions: What would happen to the GNN's decision if we were to alter the code graph into alternative structures?
1 code implementation • 22 Apr 2024 • Yao Wan, Guanghua Wan, Shijie Zhang, Hongyu Zhang, Pan Zhou, Hai Jin, Lichao Sun
Subsequently, the membership classifier can be effectively employed to deduce the membership status of a given code sample based on the output of a target code completion model.
1 code implementation • 31 Mar 2024 • Zhenyu Qian, Yiming Qian, Yuting Song, Fei Gao, Hai Jin, Chen Yu, Xia Xie
To equip the graph processing with both high accuracy and explainability, we introduce a novel approach that harnesses the power of a large language model (LLM), enhanced by an uncertainty-aware module to provide a confidence score on the generated answer.
1 code implementation • 25 Mar 2024 • Zhangqian Bi, Yao Wan, Zheng Wang, Hongyu Zhang, Batu Guan, Fangxin Lu, Zili Zhang, Yulei Sui, Hai Jin, Xuanhua Shi
Large Language Models (LLMs) have shown remarkable progress in automated code generation.
1 code implementation • 16 Mar 2024 • Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin
In response to these challenges, we propose Genetic Evolution-Nurtured Adversarial Fine-tuning (Gen-AF), a two-stage adversarial fine-tuning approach aimed at enhancing the robustness of downstream models.
1 code implementation • 20 Jan 2024 • Dezhong Yao, Tongtong Liu, Qi Cao, Hai Jin
Federated Learning (FL) has emerged as a promising approach for preserving data privacy in recommendation systems by training models locally.
no code implementations • 30 Dec 2023 • Yao Wan, Yang He, Zhangqian Bi, JianGuo Zhang, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin, Philip S. Yu
We also benchmark several state-of-the-art neural models for code intelligence, and provide an open-source toolkit tailored for the rapid prototyping of deep-learning-based code intelligence models.
no code implementations • 18 Dec 2023 • Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin
This attack unveils the vulnerabilities in SFL, challenging the conventional belief that SFL is robust against poisoning attacks.
1 code implementation • 13 Nov 2023 • Xiaohu Du, Ming Wen, Zichao Wei, Shangwen Wang, Hai Jin
Although several approaches have been proposed to generate adversarial examples for PTMC, the effectiveness and efficiency of such approaches, especially on different code intelligence tasks, has not been well understood.
1 code implementation • 14 Aug 2023 • Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin
In this work, we propose AdvCLIP, the first attack framework for generating downstream-agnostic adversarial examples based on cross-modal pre-trained encoders.
1 code implementation • ICCV 2023 • Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin
AdvEncoder aims to construct a universal adversarial perturbation or patch for a set of natural images that can fool all the downstream tasks inheriting the victim pre-trained encoder.
1 code implementation • 15 Jul 2023 • Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin
Building on these insights, we explore the impacts of data augmentation and gradient regularization on transferability and identify that the trade-off generally exists in the various training mechanisms, thus building a comprehensive blueprint for the regulation mechanism behind transferability.
2 code implementations • 8 May 2023 • Yilin Wang, Nan Cao, Teng Zhang, Xuanhua Shi, Hai Jin
Optimal margin Distribution Machine (ODM) is a newly proposed statistical learning framework rooting in the novel margin theory, which demonstrates better generalization performance than the traditional large margin based counterparts.
1 code implementation • CVPR 2023 • Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao
Deep neural networks are proven to be vulnerable to backdoor attacks.
no code implementations • 22 Nov 2022 • Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun
In addition, existing attack approaches towards point cloud classifiers cannot be applied to the completion models due to different output forms and attack purposes.
1 code implementation • 1 Jul 2022 • Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan HE, Hai Jin
In this paper, we propose BadHash, the first generative-based imperceptible backdoor attack against deep hashing, which can effectively generate invisible and input-specific poisoned images with clean label.
1 code implementation • International Conference on Software Engineering 2022 • Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin
Furthermore, we conduct a case study on more than 25 million lines of code and the result indicates that VulCNN has the ability to detect large-scale vulnerability.
1 code implementation • SIGMOD/PODS 2022 • Dezhong Yao, Yuhong Gu, Gao Cong, Hai Jin, Xinqiao Lv
However, there is often interdependence between different pairs of ER decisions, e. g., the entities from the same data source are usually semantically related to each other.
Ranked #1 on
Entity Resolution
on WDC Watches-small
1 code implementation • 6 Apr 2022 • Shaoxian Xu, Zhiyuan Shao, Ci Yang, Xiaofei Liao, Hai Jin
In this paper, we first point out that in a GCN training problem with a given training set, the aggregation stages of its backward propagation phase (called as backward aggregations in this paper) can be converted to partially-active graph processing procedures, which conduct computation on only partial vertices of the input graph.
1 code implementation • CVPR 2022 • Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu
While deep face recognition (FR) systems have shown amazing performance in identification and verification, they also arouse privacy concerns for their excessive surveillance on users, especially for public face images widely spread on social networks.
1 code implementation • 14 Feb 2022 • Yao Wan, Wei Zhao, Hongyu Zhang, Yulei Sui, Guandong Xu, Hai Jin
In this paper, we conduct a thorough structural analysis aiming to provide an interpretation of pre-trained language models for source code (e. g., CodeBERT, and GraphCodeBERT) from three distinctive perspectives: (1) attention analysis, (2) probing on the word embedding, and (3) syntax tree induction.
1 code implementation • 19 Jan 2022 • Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin
Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment.
no code implementations • 9 Dec 2021 • Xiangyong Lu, Kaoru Ota, Mianxiong Dong, Chen Yu, Hai Jin
Nowadays many cities around the world have introduced electric buses to optimize urban traffic and reduce local carbon emissions.
no code implementations • 29 Nov 2021 • Dezhong Yao, Wanning Pan, Michael J O'Neill, Yutong Dai, Yao Wan, Hai Jin, Lichao Sun
To this end, this paper proposes FedHM, a novel heterogeneous federated model compression framework, distributing the heterogeneous low-rank models to clients and then aggregating them into a full-rank model.
1 code implementation • 19 Oct 2021 • Yu Song, Jianxun Lian, Shuai Sun, Hong Huang, Yu Li, Hai Jin, Xing Xie
Then we propose a hierarchical CB (HCB) algorithm to explore users' interest in the hierarchy tree.
no code implementations • 29 Sep 2021 • Yilin Wang, Nan Cao, Teng Zhang, Hai Jin
Optimal margin Distribution Machine (ODM), a newly proposed statistical learning framework rooting in the novel margin theory, demonstrates better generalization performance than the traditional large margin based counterparts.
1 code implementation • 2 Aug 2021 • Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin
Automatically detecting software vulnerabilities in source code is an important problem that has attracted much attention.
no code implementations • 30 Jun 2021 • Dezhong Yao, Wanning Pan, Yutong Dai, Yao Wan, Xiaofeng Ding, Hai Jin, Zheng Xu, Lichao Sun
Federated learning enables multiple clients to collaboratively learn a global model by periodically aggregating the clients' models without transferring the local data.
no code implementations • Findings (ACL) 2021 • Zhexue Chen, Hong Huang, Bang Liu, Xuanhua Shi, Hai Jin
Aspect Sentiment Triplet Extraction (ASTE) aims to extract triplets from sentences, where each triplet includes an entity, its associated sentiment, and the opinion span explaining the reason for the sentiment.
no code implementations • 15 Apr 2021 • Dezhong Yao, Peilin Zhao, Chen Yu, Hai Jin, Bin Li
This is clearly inefficient for high dimensional tasks due to its high memory and computational complexity.
no code implementations • 17 Feb 2021 • Tao Liu, Xin-Yang Liu, Yuan Gao, Hai Jin, Jun He, Xian-Lei Sheng, Wentao Jin, Ziyu Chen, Wei Li
Strong fluctuations in the low-$T$ quantum critical regime can give rise to a large thermal entropy change and thus significant cooling effect when approaching the QCP.
Strongly Correlated Electrons
no code implementations • 8 Jan 2020 • Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin
Existing vulnerability detection methods based on deep learning can detect the presence of vulnerabilities (i. e., addressing the binary classification or detection problem), but cannot pinpoint types of vulnerabilities (i. e., incapable of addressing multiclass classification).
no code implementations • 26 Feb 2019 • Chuangyi Gui, Long Zheng, Bingsheng He, Cheng Liu, Xinyu Chen, Xiaofei Liao, Hai Jin
Graph is a well known data structure to represent the associated relationships in a variety of applications, e. g., data science and machine learning.
Distributed, Parallel, and Cluster Computing
4 code implementations • 18 Jul 2018 • Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen
Our experiments with 4 software products demonstrate the usefulness of the framework: we detect 15 vulnerabilities that are not reported in the National Vulnerability Database.
4 code implementations • 5 Jan 2018 • Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection.
no code implementations • 1 Sep 2015 • Pan Zhou, Yingxue Zhou, Dapeng Wu, Hai Jin
In addition, none of them has considered both the privacy of users' contexts (e, g., social status, ages and hobbies) and video service vendors' repositories, which are extremely sensitive and of significant commercial value.
no code implementations • Information Fusion 2014 • Dezhong Yao, Chen Yu, Hai Jin, Qiang Ding
As the tensor model has a strong ability to describe high-dimensional information, we propose an algorithm to predict human mobility in tensors of location context data.