Search Results for author: Han Qiu

Found 35 papers, 12 papers with code

Learning Correlation Space for Time Series

no code implementations10 Feb 2018 Han Qiu, Hoang Thanh Lam, Francesco Fusco, Mathieu Sinn

We propose an approximation algorithm for efficient correlation search in time series data.

Time Series Time Series Analysis

TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction

no code implementations26 Aug 2019 Yi Zeng, Zihao Qi, Wen-Cheng Chen, Yanzhe Huang, Xingxin Zheng, Han Qiu

With more encrypted network traffic gets involved in the Internet, how to effectively identify network traffic has become a top priority in the field.

Intrusion Detection Traffic Classification

Learning to Augment Expressions for Few-shot Fine-grained Facial Expression Recognition

no code implementations17 Jan 2020 Wenxuan Wang, Yanwei Fu, Qiang Sun, Tao Chen, Chenjie Cao, Ziqi Zheng, Guoqiang Xu, Han Qiu, Yu-Gang Jiang, xiangyang xue

Considering the phenomenon of uneven data distribution and lack of samples is common in real-world scenarios, we further evaluate several tasks of few-shot expression learning by virtue of our F2ED, which are to recognize the facial expressions given only few training instances.

Facial Expression Recognition Facial Expression Recognition (FER) +1

Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques

no code implementations20 Mar 2020 Qinkai Zheng, Han Qiu, Gerard Memmi, Isabelle Bloch

This report is about applications based on spatial-frequency transform and deep learning techniques.

Denoising

Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques

1 code implementation27 May 2020 Han Qiu, Yi Zeng, Qinkai Zheng, Tianwei Zhang, Meikang Qiu, Gerard Memmi

Extensive evaluations indicate that our solutions can effectively mitigate all existing standard and advanced attack techniques, and beat 11 state-of-the-art defense solutions published in top-tier conferences over the past 2 years.

BorderDet: Border Feature for Dense Object Detection

2 code implementations ECCV 2020 Han Qiu, Yuchen Ma, Zeming Li, Songtao Liu, Jian Sun

In this paper, We propose a simple and efficient operator called Border-Align to extract "border features" from the extreme point of the border to enhance the point feature.

Dense Object Detection Object +1

A Data Augmentation-based Defense Method Against Adversarial Attacks in Neural Networks

no code implementations30 Jul 2020 Yi Zeng, Han Qiu, Gerard Memmi, Meikang Qiu

Deep Neural Networks (DNNs) in Computer Vision (CV) are well-known to be vulnerable to Adversarial Examples (AEs), namely imperceptible perturbations added maliciously to cause wrong classification results.

Data Augmentation

Privacy-preserving Collaborative Learning with Automatic Transformation Search

3 code implementations CVPR 2021 Wei Gao, Shangwei Guo, Tianwei Zhang, Han Qiu, Yonggang Wen, Yang Liu

Comprehensive evaluations demonstrate that the policies discovered by our method can defeat existing reconstruction attacks in collaborative learning, with high efficiency and negligible impact on the model performance.

Data Augmentation Privacy Preserving

FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques

1 code implementation3 Dec 2020 Han Qiu, Yi Zeng, Tianwei Zhang, Yong Jiang, Meikang Qiu

With more and more advanced adversarial attack methods have been developed, a quantity of corresponding defense solutions were designed to enhance the robustness of DNN models.

Adversarial Attack Data Augmentation

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation

no code implementations13 Dec 2020 Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham

In this paper, we investigate the effectiveness of data augmentation techniques in mitigating backdoor attacks and enhancing DL models' robustness.

Backdoor Attack Data Augmentation

Fingerprinting Generative Adversarial Networks

no code implementations19 Jun 2021 Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu

In this paper, we present the first fingerprinting scheme for the Intellectual Property (IP) protection of GANs.

An MRC Framework for Semantic Role Labeling

1 code implementation COLING 2022 Nan Wang, Jiwei Li, Yuxian Meng, Xiaofei Sun, Han Qiu, Ziyao Wang, Guoyin Wang, Jun He

We formalize predicate disambiguation as multiple-choice machine reading comprehension, where the descriptions of candidate senses of a given predicate are used as options to select the correct sense.

Computational Efficiency Machine Reading Comprehension +3

Towards Robust Point Cloud Models with Context-Consistency Network and Adaptive Augmentation

no code implementations29 Sep 2021 Guanlin Li, Guowen Xu, Han Qiu, Ruan He, Jiwei Li, Tianwei Zhang

Extensive evaluations indicate the integration of the two techniques provides much more robustness than existing defense solutions for 3D models.

Data Augmentation

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time

no code implementations7 Oct 2021 Tian Dong, Han Qiu, Tianwei Zhang, Jiwei Li, Hewu Li, Jialiang Lu

Specifically, we design an effective method to generate a set of fingerprint samples to craft the inference process with a unique and robust inference time cost as the evidence for model ownership.

Interpreting Deep Learning Models in Natural Language Processing: A Review

no code implementations20 Oct 2021 Xiaofei Sun, Diyi Yang, Xiaoya Li, Tianwei Zhang, Yuxian Meng, Han Qiu, Guoyin Wang, Eduard Hovy, Jiwei Li

Neural network models have achieved state-of-the-art performances in a wide range of natural language processing (NLP) tasks.

A General Framework for Defending Against Backdoor Attacks via Influence Graph

no code implementations29 Nov 2021 Xiaofei Sun, Jiwei Li, Xiaoya Li, Ziyao Wang, Tianwei Zhang, Han Qiu, Fei Wu, Chun Fan

In this work, we propose a new and general framework to defend against backdoor attacks, inspired by the fact that attack triggers usually follow a \textsc{specific} type of attacking pattern, and therefore, poisoned training examples have greater impacts on each other during training.

An Interpretable Federated Learning-based Network Intrusion Detection Framework

no code implementations10 Jan 2022 Tian Dong, Song Li, Han Qiu, Jialiang Lu

Learning-based Network Intrusion Detection Systems (NIDSs) are widely deployed for defending various cyberattacks.

Federated Learning Network Intrusion Detection

Watermarking Pre-trained Encoders in Contrastive Learning

no code implementations20 Jan 2022 Yutong Wu, Han Qiu, Tianwei Zhang, Jiwei L, Meikang Qiu

It is challenging to migrate existing watermarking techniques from the classification tasks to the contrastive learning scenario, as the owner of the encoder lacks the knowledge of the downstream tasks which will be developed from the encoder in the future.

Contrastive Learning

Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing

1 code implementation22 Dec 2022 Tian Dong, Ziyuan Zhang, Han Qiu, Tianwei Zhang, Hewu Li, Terry Wang

Transforming off-the-shelf deep neural network (DNN) models into dynamic multi-exit architectures can achieve inference and transmission efficiency by fragmenting and distributing a large DNN model in edge computing scenarios (e. g., edge devices and cloud servers).

Backdoor Attack Edge-computing

Computation and Data Efficient Backdoor Attacks

no code implementations ICCV 2023 Yutong Wu, Xingshuo Han, Han Qiu, Tianwei Zhang

To address such limitations, we propose a novel confidence-based scoring methodology, which can efficiently measure the contribution of each poisoning sample based on the distance posteriors.

3D Point Cloud Classification Data Poisoning +2

Prompt Ensemble Self-training for Open-Vocabulary Domain Adaptation

no code implementations29 Jun 2023 Jiaxing Huang, Jingyi Zhang, Han Qiu, Sheng Jin, Shijian Lu

Traditional domain adaptation assumes the same vocabulary across source and target domains, which often struggles with limited transfer flexibility and efficiency while handling target domains with different vocabularies.

Unsupervised Domain Adaptation

Omnipotent Adversarial Training in the Wild

1 code implementation14 Jul 2023 Guanlin Li, Kangjie Chen, Yuan Xu, Han Qiu, Tianwei Zhang

We first introduce an oracle into the adversarial training process to help the model learn a correct data-label conditional distribution.

Adversarial Robustness

Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator

no code implementations2 Aug 2023 Xiaobei Yan, Xiaoxuan Lou, Guowen Xu, Han Qiu, Shangwei Guo, Chip Hong Chang, Tianwei Zhang

One big concern about the usage of the accelerators is the confidentiality of the deployed models: model inference execution on the accelerators could leak side-channel information, which enables an adversary to preciously recover the model details.

Model extraction

One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training

1 code implementation ICCV 2023 Jianshuo Dong, Han Qiu, Yiming Li, Tianwei Zhang, Yuanjie Li, Zeqi Lai, Chao Zhang, Shu-Tao Xia

We propose a training-assisted bit flip attack, in which the adversary is involved in the training stage to build a high-risk model to release.

Rethinking Adversarial Training with Neural Tangent Kernel

no code implementations4 Dec 2023 Guanlin Li, Han Qiu, Shangwei Guo, Jiwei Li, Tianwei Zhang

To the best of our knowledge, it is the first work leveraging the observations of kernel dynamics to improve existing AT methods.

The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Persuasive Conversation

no code implementations14 Dec 2023 Rongwu Xu, Brian S. Lin, Shujian Yang, Tianqi Zhang, Weiyan Shi, Tianwei Zhang, Zhixuan Fang, Wei Xu, Han Qiu

Therefore, in this study, we delve into LLMs' susceptibility to persuasive conversations, particularly on factual questions that they can answer correctly.

Misinformation

Visual Instruction Tuning towards General-Purpose Multimodal Model: A Survey

no code implementations27 Dec 2023 Jiaxing Huang, Jingyi Zhang, Kai Jiang, Han Qiu, Shijian Lu

Traditional computer vision generally solves each single task independently by a dedicated model with the task instruction implicitly designed in the model architecture, arising two limitations: (1) it leads to task-specific models, which require multiple models for different tasks and restrict the potential synergies from diverse tasks; (2) it leads to a pre-defined and fixed model interface that has limited interactivity and adaptability in following user' task instructions.

Instruction Following

Learning to Prompt Segment Anything Models

no code implementations9 Jan 2024 Jiaxing Huang, Kai Jiang, Jingyi Zhang, Han Qiu, Lewei Lu, Shijian Lu, Eric Xing

SAMs work with two types of prompts including spatial prompts (e. g., points) and semantic prompts (e. g., texts), which work together to prompt SAMs to segment anything on downstream datasets.

Image Segmentation Segmentation +1

CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision

1 code implementation26 Feb 2024 Hao Wang, Zeyu Gao, Chao Zhang, Zihan Sha, Mingyang Sun, Yuchen Zhou, Wenyu Zhu, Wenju Sun, Han Qiu, Xi Xiao

At the core, our approach boosts superior transfer learning capabilities by effectively aligning binary code with their semantics explanations (in natural language), resulting a model able to generate better embeddings for binary code.

Representation Learning Transfer Learning

Masked AutoDecoder is Effective Multi-Task Vision Generalist

1 code implementation12 Mar 2024 Han Qiu, Jiaxing Huang, Peng Gao, Lewei Lu, Xiaoqin Zhang, Shijian Lu

Inspired by the success of general-purpose models in NLP, recent studies attempt to unify different vision tasks in the same sequence format and employ autoregressive Transformers for sequence prediction.

Cannot find the paper you are looking for? You can Submit a new open access paper.