1 code implementation • 23 Feb 2024 • Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Xiaochun Cao, Jian Weng
Developing robust and interpretable vision systems is a crucial step towards trustworthy artificial intelligence.
no code implementations • 20 Sep 2023 • Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han
Intelligent transportation systems (ITSs) have been fueled by the rapid development of communication technologies, sensor technologies, and the Internet of Things (IoT).
no code implementations • 23 Feb 2023 • Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng
To the best of our knowledge, this article is the first survey to review TEE-based secure computation protocols and the comprehensive comparison can serve as a guideline for selecting suitable protocols for deployment in practice.
1 code implementation • 14 Feb 2023 • Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng
In this paper, we proposed \emph{AT-DKT} to improve the prediction performance of the original deep knowledge tracing model with two auxiliary learning tasks, i. e., \emph{question tagging (QT) prediction task} and \emph{individualized prior knowledge (IK) prediction task}.
no code implementations • CVPR 2022 • Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng
We also propose a Local Enhancement Module (LEM) to improve the discrimination between local features of real and forged regions, so as to ensure accuracy in calculating anomalies.
no code implementations • 9 Jun 2022 • Wensheng Gan, Gengsen Huang, Jian Weng, Tianlong Gu, Philip S. Yu
In this paper, we provide the relevant definitions of target sequential rule and formulate the problem of targeted sequential rule mining.
no code implementations • 25 May 2022 • Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng
With a stego media discovered, the adversary could find out the sender or receiver and coerce them to disclose the secret message, which we name as coercive attack in this paper.
no code implementations • 10 Mar 2022 • Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jianan Liu
By applying this scheme, when the watermarked image is displayed on the screen and captured by a camera, the watermark can be still extracted from the captured photographs.
no code implementations • 26 Feb 2022 • Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng
Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks.
1 code implementation • 23 Jan 2022 • Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu
First, a CNN model to be tested is strategically partitioned into a private part kept locally by the model developer, and a public part outsourced to an outside server.
1 code implementation • CVPR 2022 • Wenhui Wu, Jian Weng, Pingping Zhang, Xu Wang, Wenhan Yang, Jianmin Jiang
Retinex model-based methods have shown to be effective in layer-wise manipulation with well-designed priors for low-light image enhancement.
no code implementations • 29 Nov 2021 • Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu
High utility sequential pattern mining (HUSPM) is one kind of utility-driven mining.
no code implementations • 21 Jan 2021 • Jian Weng, Animesh Jain, Jie Wang, Leyuan Wang, Yida Wang, Tony Nowatzki
However, it is hard to leverage mixed precision without hardware support because of the overhead of data casting.
1 code implementation • 4 Jul 2020 • Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor
Generative adversarial network (GAN) has attracted increasing attention recently owing to its impressive ability to generate realistic samples with high privacy protection.
no code implementations • 16 May 2020 • Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang
However, the DL models may be prone to the membership inference attack, where an attacker determines whether a given sample is from the training dataset.
1 code implementation • 30 Dec 2017 • Xiaoqian Zhang, Jian Weng, Weiqi Luo, Xiaoqing Tan
If a client wants to perform quantum computing but she does not have quantum computers with relevant quantum technologies.
Quantum Physics