Search Results for author: Jian Weng

Found 16 papers, 6 papers with code

Blind quantum computation for QFT on multi-qubit states

1 code implementation30 Dec 2017 Xiaoqian Zhang, Jian Weng, Weiqi Luo, Xiaoqing Tan

If a client wants to perform quantum computing but she does not have quantum computers with relevant quantum technologies.

Quantum Physics

DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks

no code implementations16 May 2020 Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang

However, the DL models may be prone to the membership inference attack, where an attacker determines whether a given sample is from the training dataset.

Domain Adaptation Inference Attack +1

RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network

1 code implementation4 Jul 2020 Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor

Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.

Generative Adversarial Network

UNIT: Unifying Tensorized Instruction Compilation

no code implementations21 Jan 2021 Jian Weng, Animesh Jain, Jie Wang, Leyuan Wang, Yida Wang, Tony Nowatzki

However, it is hard to leverage mixed precision without hardware support because of the overhead of data casting.

US-Rule: Discovering Utility-driven Sequential Rules

no code implementations29 Nov 2021 Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu

High utility sequential pattern mining (HUSPM) is one kind of utility-driven mining.

Sequential Pattern Mining

URetinex-Net: Retinex-Based Deep Unfolding Network for Low-Light Image Enhancement

1 code implementation CVPR 2022 Wenhui Wu, Jian Weng, Pingping Zhang, Xu Wang, Wenhan Yang, Jianmin Jiang

Retinex model-based methods have shown to be effective in layer-wise manipulation with well-designed priors for low-light image enhancement.

Low-Light Image Enhancement

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing

1 code implementation23 Jan 2022 Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu

First, a CNN model to be tested is strategically partitioned into a private part kept locally by the model developer, and a public part outsourced to an outside server.

Privacy Preserving

A Robust Document Image Watermarking Scheme using Deep Neural Network

no code implementations26 Feb 2022 Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng

Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks.

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network

no code implementations10 Mar 2022 Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu

By applying this scheme, when the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the captured photographs.

Deniable Steganography

no code implementations25 May 2022 Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng

With a stego media discovered, the adversary could find out the sender or receiver and coerce them to disclose the secret message, which we name as coercive attack in this paper.

Steganalysis

Towards Target Sequential Rules

no code implementations9 Jun 2022 Wensheng Gan, Gengsen Huang, Jian Weng, Tianlong Gu, Philip S. Yu

In this paper, we provide the relevant definitions of target sequential rule and formulate the problem of targeted sequential rule mining.

Learning Second Order Local Anomaly for General Face Forgery Detection

no code implementations CVPR 2022 Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng

We also propose a Local Enhancement Module (LEM) to improve the discrimination between local features of real and forged regions, so as to ensure accuracy in calculating anomalies.

Enhancing Deep Knowledge Tracing with Auxiliary Tasks

1 code implementation14 Feb 2023 Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng

In this paper, we proposed \emph{AT-DKT} to improve the prediction performance of the original deep knowledge tracing model with two auxiliary learning tasks, i. e., \emph{question tagging (QT) prediction task} and \emph{individualized prior knowledge (IK) prediction task}.

Auxiliary Learning Knowledge Tracing

A Survey of Secure Computation Using Trusted Execution Environments

no code implementations23 Feb 2023 Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng

To the best of our knowledge, this article is the first survey to review TEE-based secure computation protocols and the comprehensive comparison can serve as a guideline for selecting suitable protocols for deployment in practice.

Privacy Preserving

Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

no code implementations20 Sep 2023 Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han

Intelligent transportation systems (ITSs) have been fueled by the rapid development of communication technologies, sensor technologies, and the Internet of Things (IoT).

Federated Learning Object Recognition

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

1 code implementation23 Feb 2024 Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Xiaochun Cao, Jian Weng

Developing robust and interpretable vision systems is a crucial step towards trustworthy artificial intelligence.

Neural Architecture Search

Cannot find the paper you are looking for? You can Submit a new open access paper.