1 code implementation • 23 Aug 2024 • Yige Li, Hanxun Huang, Yunhan Zhao, Xingjun Ma, Jun Sun
Generative Large Language Models (LLMs) have made significant strides across various tasks, but they remain vulnerable to backdoor attacks, where specific triggers in the prompt cause the LLM to generate adversary-desired responses.
no code implementations • 14 Aug 2024 • Shengping Xiao, Yongkang Li, Shufang Zhu, Jun Sun, Jianwen Li, Geguang Pu, Moshe Y. Vardi
Existing approaches rely on constructing a complete Deterministic Finite Automaton (DFA) corresponding to the LTLf specification, a process with doubly exponential complexity relative to the formula size in the worst case.
no code implementations • 9 Jul 2024 • Long H. Pham, Jun Sun
Our approach is evaluated with multiple neural networks and on two different continual learning methods.
no code implementations • 26 Jun 2024 • Yufan Cai, Zhe Hou, Xiaokun Luan, David Miguel Sanan Baena, Yun Lin, Jun Sun, Jin Song Dong
Moreover, the opaque procedure from specification to code provided by LLM is an uncontrolled black box.
1 code implementation • 3 Jun 2024 • Dong Chen, Shaoxin Lin, Muhan Zeng, Daoguang Zan, Jian-Gang Wang, Anton Cheshkov, Jun Sun, Hao Yu, Guoliang Dong, Artem Aliev, Jie Wang, Xiao Cheng, Guangtai Liang, Yuchi Ma, Pan Bian, Tao Xie, Qianxiang Wang
GitHub issue resolving recently has attracted significant attention from academia and industry.
Ranked #1 on Bug fixing on SWE-bench-lite
1 code implementation • 28 May 2024 • Wei Zhao, Zhe Li, Yige Li, Ye Zhang, Jun Sun
Large language models (LLMs) are increasingly being adopted in a wide range of real-world applications.
1 code implementation • 23 May 2024 • Jingnan Zheng, Han Wang, An Zhang, Tai D. Nguyen, Jun Sun, Tat-Seng Chua
Systematic analysis also validates that the generated test scenarios represent meaningful use cases, as well as integrate enhanced measures to probe long-tail risks.
1 code implementation • 23 May 2024 • Nay Myat Min, Long H. Pham, Jun Sun
The application of deep neural network models in various security-critical applications has raised significant security concerns, particularly the risk of backdoor attacks.
no code implementations • 23 May 2024 • Ruihan Zhang, Jun Sun
This reduced Bayes uncertainty allows a higher upper bound on probabilistic robust accuracy than that on deterministic robust accuracy.
no code implementations • 19 May 2024 • Ruihan Zhang, Jun Sun
We first show that the accuracy inevitably decreases in the pursuit of robustness due to changed Bayes error in the altered data distribution.
no code implementations • 29 Apr 2024 • Guoliang Dong, Haoyu Wang, Jun Sun, Xinyu Wang
The results show that LLMs exhibit stronger human alignment capabilities with queries in English, French, Russian, and Spanish (only 1. 04\% of harmful queries successfully jailbreak on average) compared to queries in Bengali, Georgian, Nepali and Maithili (27. 7\% of harmful queries jailbreak successfully on average).
1 code implementation • 21 Apr 2024 • Yihao Zhang, Zeming Wei, Jun Sun, Meng Sun
Since the development of Large Language Models (LLMs) has achieved remarkable success, understanding and controlling their internal complex mechanisms has become an urgent problem.
no code implementations • 27 Jan 2024 • Yige Li, Jiabo He, Hanxun Huang, Jun Sun, Xingjun Ma
Backdoor attacks have become a significant threat to the pre-training and deployment of deep neural networks (DNNs).
no code implementations • 18 Jan 2024 • Li Sun, Liuan Wang, Jun Sun, Takayuki Okatani
This study introduces an innovative method to address event-level hallucinations in MLLMs, focusing on specific temporal understanding in video content.
no code implementations • 16 Dec 2023 • Jun Sun, Xinxin Zhang, Shoukang Han, Yu-Ping Ruan, Taihao Li
Multimodal learning is susceptible to modality missing, which poses a major obstacle for its practical applications and, thus, invigorates increasing research interest.
1 code implementation • 13 Dec 2023 • Wei Zhao, Zhe Li, Jun Sun
Based on a layer-level causality analysis, we show that RLHF has the effect of overfitting a model to harmful prompts.
no code implementations • 7 Nov 2023 • Jun Sun, Zhongjie Mao, Chao Li, Chao Zhou, Xiao-Jun Wu
The common framework among recent approaches is to train the model on a large amount of unlabelled data with consistency regularization to constrain the model predictions to be invariant to input perturbation.
no code implementations • 12 Sep 2023 • Peixin Zhang, Jun Sun, Mingtian Tan, Xinyu Wang
In recent years, the security issues of artificial intelligence have become increasingly prominent due to the rapid development of deep learning research and applications.
no code implementations • 9 Aug 2023 • Li-Wei Li, Jun Sun, Chao Li, Wei Fang, Vasile Palade, Xiao-Jun Wu
Then, the correlations between the two types of diversities and the search performance are tested and analyzed on several benchmark functions, and the distance-to-average-point diversity is showed to have stronger association with the search performance during the evolving processes.
1 code implementation • 8 Aug 2023 • Boquan Li, Jun Sun, Christopher M. Poskitt, Xingmei Wang
Deepfakes are becoming increasingly credible, posing a significant threat given their potential to facilitate fraud or bypass access control systems.
no code implementations • 21 Jul 2023 • Simiao Zhang, Jitao Bai, Menghong Guan, Yihao Huang, Yueling Zhang, Jun Sun, Geguang Pu
The results demonstrate that CFU can improve the classifier on multiple fairness metrics without sacrificing its utility.
no code implementations • 12 Jun 2023 • Richard Schumi, Jun Sun
The results show that we are able to repair 100% of a set of randomly generated neural networks (which are produced with an existing AI framework testing approach) effectively and efficiently (with an average repair time of 21. 08s) and 93. 75% of a collection of real neural network bugs (with an average time of 3min 40s).
1 code implementation • 9 Jun 2023 • Qiaozhe Zhang, Ruijie Zhang, Jun Sun, Yingzhuang Liu
In addition, we provide efficient countermeasures to address the challenges in computing the pruning limit, which involves accurate spectrum estimation of a large-scale and non-positive Hessian matrix.
no code implementations • 15 Feb 2023 • Jérôme Kunegis, Pawan Kumar, Jun Sun, Anna Samoilenko, Giuseppe Pirró
In this paper we take the problem of visualising large graphs from a novel perspective: we leave the original graph's nodes and edges behind, and instead summarise its properties such as the clustering coefficient and bipartivity by generating a completely new graph whose structural properties match that of the original graph.
1 code implementation • 10 Dec 2022 • Yedi Zhang, Zhe Zhao, Fu Song, Min Zhang, Taolue Chen, Jun Sun
Experimental results on QNNs with different quantization bits confirm the effectiveness and efficiency of our approach, e. g., two orders of magnitude faster and able to solve more verification tasks in the same time limit than the state-of-the-art methods.
1 code implementation • 6 Dec 2022 • Yedi Zhang, Fu Song, Jun Sun
In this work, we propose a quantization error bound verification method, named QEBVerif, where both weights and activation tensors are quantized.
no code implementations • 30 Sep 2022 • Zhengyu Wang, Yujie Zhang, Qi Yang, Yiling Xu, Jun Sun, Shan Liu
Considering the importance of saliency detection in quality assessment, we propose an effective full-reference PCQA metric which makes the first attempt to utilize the saliency information to facilitate quality prediction, called point cloud quality assessment using 3D saliency maps (PQSM).
no code implementations • 15 Sep 2022 • Mengdi Zhang, Jun Sun
Given a discriminating neural network, the problem of fairness improvement is to systematically reduce discrimination without significantly scarifies its performance (i. e., accuracy).
no code implementations • 24 Aug 2022 • Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun
The experiment results show that TESTSGDis effective and efficient in identifying and measuring such subtle group discrimination that has never been revealed before.
no code implementations • 5 Aug 2022 • Jianlin Su, Ahmed Murtadha, Shengfeng Pan, Jing Hou, Jun Sun, Wanwei Huang, Bo Wen, Yunfeng Liu
The ultimate goal is to enable a global view that considers the beginning and the end positions to predict the entity.
no code implementations • 4 Aug 2022 • Ming Cheng, Yiling Xu, Wang Shen, M. Salman Asif, Chao Ma, Jun Sun, Zhan Ma
We utilize a disparity network to transfer spatiotemporal information across views even in large disparity scenes, based on which, we propose disparity-guided flow-based warping for LSR-HFR view and complementary warping for HSR-LFR view.
1 code implementation • CVPR 2023 • Xincheng Yao, Ruoqi Li, Jing Zhang, Jun Sun, Chongyang Zhang
In this way, our model can form a more explicit and discriminative decision boundary to distinguish known and also unseen anomalies from normal samples more effectively.
Ranked #3 on Supervised Defect Detection on SensumSODF
no code implementations • 14 May 2022 • Long H. Pham, Jun Sun
To the best of our knowledge, the only line of work which certifies the absence of backdoor is based on randomized smoothing, which is known to significantly reduce neural network performance.
no code implementations • 20 Apr 2022 • Bing Sun, Jun Sun, Hong Long Pham, Jie Shi
Results also show that thanks to the causality-based fault localization, CARE's repair focuses on the misbehavior and preserves the accuracy of the neural networks.
1 code implementation • 20 Feb 2022 • Richard Schumi, Jun Sun
In this new paradigm, AI frameworks such as TensorFlow and PyTorch play a key role, which is as essential as the compiler for traditional programs.
no code implementations • 29 Dec 2021 • Xu Song, Yongbiao Xiao, Hui Li, Xiao-Jun Wu, Jun Sun, Vasile Palade
The encoder based on Res2Net is utilized for extracting multi-scale features from the input image.
no code implementations • 29 Dec 2021 • Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong
Furthermore, such attacks are impossible to eliminate, i. e., the adversarial perturbation is still possible after applying mitigation methods such as adversarial training.
1 code implementation • CVPR 2022 • Qi Yang, Yipeng Liu, Siheng Chen, Yiling Xu, Jun Sun
We present a novel no-reference quality assessment metric, the image transferred point cloud quality assessment (IT-PCQA), for 3D point clouds.
Ranked #4 on Point Cloud Quality Assessment on WPC
no code implementations • 17 Nov 2021 • Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang
DeepFAIT consists of several important components enabling effective fairness testing of deep image classification applications: 1) a neuron selection strategy to identify the fairness-related neurons; 2) a set of multi-granularity adequacy metrics to evaluate the model's fairness; 3) a test selection algorithm for fixing the fairness issues efficiently.
1 code implementation • 10 Aug 2021 • Xiaopeng Guo, Zhijie Huang, Jie Gao, Mingyu Shang, Maojing Shu, Jun Sun
The original and adversarial examples are further used to jointly train the KT model, forcing it is not only to be robust to the adversarial examples, but also to enhance the generalization over the original ones.
no code implementations • 18 Jul 2021 • Bing Sun, Jun Sun, Ting Dai, Lijun Zhang
Our approach has been evaluated with multiple models trained on benchmark datasets and the experiment results show that our approach is effective and efficient.
no code implementations • 17 Jul 2021 • Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong
In this work, we bridge the gap by proposing a scalable and effective approach for systematically searching for discriminatory samples while extending existing fairness testing approaches to address a more challenging domain, i. e., text classification.
no code implementations • 15 Jun 2021 • Yuqi Chen, Christopher M. Poskitt, Jun Sun
Cyber-physical systems (CPSs) are widespread in critical domains, and significant damage can be caused if an attacker is able to modify the code of their programmable logic controllers (PLCs).
no code implementations • 22 May 2021 • Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen
The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated research into a multitude of attack detection mechanisms, including anomaly detectors based on neural network models.
no code implementations • 18 Mar 2021 • Yan Luo, Chongyang Zhang, Muming Zhao, Hao Zhou, Jun Sun
Consequently, we address the weakness of IoU by introducing one geometric sensitive search algorithm as a new assignment and regression metric.
1 code implementation • 13 Mar 2021 • Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun
Though various defense mechanisms have been proposed to improve robustness of deep learning software, many of them are ineffective against adaptive attacks.
1 code implementation • 4 Mar 2021 • Qi Yang, Yujie Zhang, Siheng Chen, Yiling Xu, Jun Sun, Zhan Ma
In this paper, we propose a new distortion quantification method for point clouds, the multiscale potential energy discrepancy (MPED).
1 code implementation • 22 Feb 2021 • Hongxiang Cai, Jun Sun, Yichao Xiong
We demonstrate the effectiveness of the classification perspective on scene text recognition with extensive experiments.
Ranked #6 on Scene Text Recognition on ICDAR 2003
1 code implementation • 11 Feb 2021 • Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng
A key part of RobOT is a quantitative measurement on 1) the value of each test case in improving model robustness (often via retraining), and 2) the convergence quality of the model robustness improvement.
Software Engineering
no code implementations • CVPR 2020 • Yan Luo, Chongyang Zhang, Muming Zhao, Hao Zhou, Jun Sun
i) We generate a bird view map, which is naturally free from occlusion issues, and scan all points on it to look for suitable locations for each pedestrian instance.
no code implementations • 3 Dec 2020 • Guoliang Dong, Jun Sun, Jingyi Wang, Xinyu Wang, Ting Dai
Neural networks are increasingly applied to support decision making in safety-critical applications (like autonomous cars, unmanned aerial vehicles and face recognition based authentication).
no code implementations • 15 Oct 2020 • Chi Chen, Xin Peng, Zhenchang Xing, Jun Sun, Xin Wang, Yifan Zhao, Wenyun Zhao
APIRec-CST is a deep learning model that combines the API usage with the text information in the source code based on an API Context Graph Network and a Code Token Network that simultaneously learn structural and textual features for API recommendation.
1 code implementation • 15 Oct 2020 • Pengfei Yang, Renjue Li, Jianlin Li, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue, Lijun Zhang
The core idea is to make use of the obtained constraints of the abstraction to infer new bounds for the neurons.
1 code implementation • 22 Jul 2020 • Long H. Pham, Jiaying Li, Jun Sun
Studies show that neural networks, not unlike traditional programs, are subject to bugs, e. g., adversarial samples that cause classification errors and discriminatory instances that demonstrate the lack of fairness.
1 code implementation • 31 May 2020 • Qi Yang, Zhan Ma, Yiling Xu, Zhu Li, Jun Sun
We propose the GraphSIM -- an objective metric to accurately predict the subjective quality of point cloud with superimposed geometry and color impairments.
1 code implementation • 28 May 2020 • Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang
Cyber-physical systems (CPSs) in critical infrastructure face a pervasive threat from attackers, motivating research into a variety of countermeasures for securing them.
no code implementations • 18 Apr 2020 • Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh
In this work, we present an adaptive fuzzer for smart contracts on the Ethereum platform called sFuzz.
Software Engineering
no code implementations • 9 Feb 2020 • Zi-Qi Li, Jun Sun, Xiao-Jun Wu, He-Feng Yin
Recent years have witnessed the success of dictionary learning (DL) based approaches in the domain of pattern classification.
1 code implementation • 20 Jan 2020 • Zi-Qi Li, Jun Sun, Xiao-Jun Wu, He-Feng Yin
Firstly, the coefficients of the test sample are obtained by SRC and CCRC, respectively.
no code implementations • 14 Nov 2019 • Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting
In this work, we conduct an empirical study to evaluate the relationship between coverage, robustness and attack/defense metrics for DNN.
no code implementations • 3 Nov 2019 • Jun Sun, Gang Wang, Georgios B. Giannakis, Qinmin Yang, Zaiyue Yang
Motivated by the emerging use of multi-agent reinforcement learning (MARL) in engineering applications such as networked robotics, swarming drones, and sensor networks, we investigate the policy evaluation problem in a fully decentralized setting, using temporal-difference (TD) learning with linear function approximation to handle large state spaces in practice.
no code implementations • 16 Oct 2019 • Jun Sun, Steffen Staab, Jérôme Kunegis
A detailed understanding of users contributes to the understanding of the Web's evolution, and to the development of Web applications.
no code implementations • 28 Sep 2019 • Ming Cheng, Zhan Ma, M. Salman Asif, Yiling Xu, Haojie Liu, Wenbo Bao, Jun Sun
This paper presents a dual camera system for high spatiotemporal resolution (HSTR) video acquisition, where one camera shoots a video with high spatial resolution and low frame rate (HSR-LFR) and another one captures a low spatial resolution and high frame rate (LSR-HFR) video.
1 code implementation • 22 Sep 2019 • Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang
In this work, we propose an approach to extract probabilistic automata for interpreting an important class of neural networks, i. e., recurrent neural networks.
1 code implementation • NeurIPS 2019 • Jun Sun, Tianyi Chen, Georgios B. Giannakis, Zaiyue Yang
The present paper develops a novel aggregated gradient approach for distributed machine learning that adaptively compresses the gradient communication.
no code implementations • 25 Mar 2019 • Wei Shen, Ziqiang Shi, Jun Sun
Then we use the adversarial region attention to aggregate the feature maps to obtain the adversarial features.
1 code implementation • 6 Mar 2019 • Jiangchao Yao, Ya zhang, Ivor W. Tsang, Jun Sun
We further generalize LCCN for open-set noisy labels and the semi-supervised setting.
Ranked #35 on Image Classification on Clothing1M (using extra training data)
5 code implementations • 14 Dec 2018 • Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang
We thus first propose a measure of `sensitivity' and show empirically that normal samples and adversarial samples have distinguishable sensitivity.
no code implementations • 14 May 2018 • Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang
Recently, it has been shown that deep neural networks (DNN) are subject to attacks through adversarial samples.
no code implementations • 3 Jan 2018 • Yuqi Chen, Christopher M. Poskitt, Jun Sun
Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage.
no code implementations • 12 Dec 2017 • Jingyi Wang, Jun Sun, Yifan Jia, Shengchao Qin, Zhiwu Xu
As the system is too complicated to be manually modeled, we apply latest automatic model learning techniques to construct a set of Markov chains through abstraction and refinement, based on two long system execution logs (one for training and the other for testing).
no code implementations • 2 Nov 2017 • Jiangchao Yao, Jiajie Wang, Ivor Tsang, Ya zhang, Jun Sun, Chengqi Zhang, Rui Zhang
However, the label noise among the datasets severely degenerates the \mbox{performance of deep} learning approaches.
no code implementations • 15 Sep 2017 • Jun Inoue, Yoriyuki Yamagata, Yuqi Chen, Christopher M. Poskitt, Jun Sun
In this paper, we propose and evaluate the application of unsupervised machine learning to anomaly detection for a Cyber-Physical System (CPS).
no code implementations • 10 Jul 2017 • Song Wang, Jun Sun, Satoshi Naoi
The handwritten string recognition is still a challengeable task, though the powerful deep learning tools were introduced.
no code implementations • 26 Feb 2017 • Xuefeng Xiao, Lianwen Jin, Yafeng Yang, Weixin Yang, Jun Sun, Tianhai Chang
We design a nine-layer CNN for HCCR consisting of 3, 755 classes, and devise an algorithm that can reduce the networks computational cost by nine times and compress the network to 1/18 of the original size of the baseline model, with only a 0. 21% drop in accuracy.
no code implementations • 27 Dec 2016 • Song Wang, Li Sun, Wei Fan, Jun Sun, Satoshi Naoi, Koichi Shirahata, Takuya Fukagai, Yasumoto Tomita, Atsushi Ike
In order to solve this problem, we proposed an automated CNN recommendation system for image classification task.
no code implementations • 9 Nov 2016 • Jun Sun, Jérôme Kunegis, Steffen Staab
How can we recognise social roles of people, given a completely unlabelled social network?
2 code implementations • 20 Oct 2016 • Jingyi Wang, Jun Sun, Shengchao Qin, Cyrille Jegourel
The other is a probabilistic model based on which the given property is `verified'.
Software Engineering
no code implementations • 6 Sep 2016 • Yuqi Chen, Christopher M. Poskitt, Jun Sun
Cyber-physical systems (CPS), which integrate algorithmic control with physical processes, often consist of physically distributed components communicating over a network.
no code implementations • 7 Apr 2016 • Xiaohang Ren, Kai Chen, Jun Sun
In this paper, we propose a CNN based scene text detection algorithm with a new text region extractor.
no code implementations • 7 Apr 2016 • Xiaohang Ren, Kai Chen, Jun Sun
The proposed Chinese text recognition algorithm is evaluated with two Chinese text datasets.
no code implementations • 24 Feb 2016 • Song Wang, Dongchun Ren, Li Chen, Wei Fan, Jun Sun, Satoshi Naoi
Unlike those trials, in this paper, we focused on the basic propagation function of the artificial neural network and proposed the binarized deep neural network.
no code implementations • 5 May 2015 • Shuangyong Song, Yao Meng, Zhongguang Zheng, Jun Sun
Our FRDC_QA team participated in the QA-Lab English subtask of the NTCIR-11.
no code implementations • 12 Jun 2013 • Jun Sun, Xiao-Jun Wu, Vasile Palade, Wei Fang, Yuhui Shi
The free electron model considers that electrons have both a thermal and a drift motion in a conductor that is placed in an external electric field.