no code implementations • 9 Sep 2024 • Xinhe Wang, Pingbang Hu, Junwei Deng, Jiaqi W. Ma
We present two such methods, Shadow Attack and Outlier Attack, both of which generate manipulated datasets to adversarially inflate the compensation.
no code implementations • 27 May 2024 • Junwei Deng, Ting-Wei Li, Shichang Zhang, Jiaqi Ma
Training data attribution (TDA) methods aim to quantify the influence of individual training data points on the model predictions, with broad applications in data-centric AI, such as mislabel detection, data selection, and copyright compensation.
no code implementations • 11 Dec 2023 • Junwei Deng, Shiyuan Zhang, Jiaqi Ma
This research is one of the early attempts to integrate technical advancements with economic and legal considerations in the field of music generative AI, offering a computational copyright solution for the challenges posed by the opaque nature of AI technologies.
1 code implementation • CVPR 2022 • Jason Dai, Ding Ding, Dongjie Shi, Shengsheng Huang, Jiao Wang, Xin Qiu, Kai Huang, Guoqiong Song, Yang Wang, Qiyuan Gong, Jiaming Song, Shan Yu, Le Zheng, Yina Chen, Junwei Deng, Ge Song
To address this challenge, we have open sourced BigDL 2. 0 at https://github. com/intel-analytics/BigDL/ under Apache 2. 0 license (combining the original BigDL and Analytics Zoo projects); using BigDL 2. 0, users can simply build conventional Python notebooks on their laptops (with possible AutoML support), which can then be transparently accelerated on a single node (with up-to 9. 6x speedup in our experiments), and seamlessly scaled out to a large cluster (across several hundreds servers in real-world use cases).
1 code implementation • NeurIPS 2021 • Jiaqi Ma, Junwei Deng, Qiaozhu Mei
Despite enormous successful applications of graph neural networks (GNNs), theoretical understanding of their generalization ability, especially for node-level tasks where data are not independent and identically-distributed (IID), has been sparse.
2 code implementations • 21 Jun 2021 • Jiaqi Ma, Junwei Deng, Qiaozhu Mei
This connection not only enhances our understanding on the problem of adversarial attack on GNNs, but also allows us to propose a group of effective and practical attack strategies.
no code implementations • 1 Jan 2021 • Jiaqi Ma, Junwei Deng, Qiaozhu Mei
This connection not only enhances our understanding on the problem of adversarial attack on GNNs, but also allows us to propose a group of effective black-box attack strategies.