Search Results for author: Kai Zeng

Found 21 papers, 10 papers with code

MC-LLaVA: Multi-Concept Personalized Vision-Language Model

1 code implementation18 Nov 2024 Ruichuan An, Sihan Yang, Ming Lu, Kai Zeng, Yulin Luo, Ying Chen, Jiajun Cao, Hao Liang, Qi She, Shanghang Zhang, Wentao Zhang

Specifically, MC-LLaVA uses a joint training strategy incorporating multiple concepts in a single training step, allowing VLMs to perform accurately in multi-concept personalization.

Language Modelling Question Answering +1

Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models

1 code implementation CVPR 2024 Zijin Yang, Kai Zeng, Kejiang Chen, Han Fang, Weiming Zhang, Nenghai Yu

To address this issue, we propose Gaussian Shading, a diffusion model watermarking technique that is both performance-lossless and training-free, while serving the dual purpose of copyright protection and tracing of offending content.

Denoising

Distributed Swarm Learning for Edge Internet of Things

no code implementations29 Mar 2024 Yue Wang, Zhi Tian, FXin Fan, Zhipeng Cai, Cameron Nowzari, Kai Zeng

The rapid growth of Internet of Things (IoT) has led to the widespread deployment of smart IoT devices at wireless edge for collaborative machine learning tasks, ushering in a new era of edge learning.

Provably Secure Disambiguating Neural Linguistic Steganography

1 code implementation26 Mar 2024 Yuang Qi, Kejiang Chen, Kai Zeng, Weiming Zhang, Nenghai Yu

SyncPool does not change the size of the candidate pool or the distribution of tokens and thus is applicable to provably secure language steganography methods.

Linguistic steganography

Multi-Bit Distortion-Free Watermarking for Large Language Models

no code implementations26 Feb 2024 Massieh Kordi Boroujeny, Ya Jiang, Kai Zeng, Brian Mark

Methods for watermarking large language models have been proposed that distinguish AI-generated text from human-generated text by slightly altering the model output distribution, but they also distort the quality of the text, exposing the watermark to adversarial detection.

Decoder

Quiver: Supporting GPUs for Low-Latency, High-Throughput GNN Serving with Workload Awareness

1 code implementation18 May 2023 Zeyuan Tan, Xiulong Yuan, Congjie He, Man-Kit Sit, Guo Li, Xiaoze Liu, Baole Ai, Kai Zeng, Peter Pietzuch, Luo Mai

Quiver's key idea is to exploit workload metrics for predicting the irregular computation of GNN requests, and governing the use of GPUs for graph sampling and feature aggregation: (1) for graph sampling, Quiver calculates the probabilistic sampled graph size, a metric that predicts the degree of parallelism in graph sampling.

Graph Sampling

Assessing the Socio-economic Impacts of Secure Texting and Anti-Jamming Technologies in Non-Cooperative Networks

no code implementations29 Mar 2023 Osoro B Ogutu, Edward J Oughton, Kai Zeng, Brian L. Mark

Consequently, this paper presents two open-source simulation models for assessing the socio-economic impacts of operating in untrusted non-cooperative networks.

Distributed Swarm Learning for Internet of Things at the Edge: Where Artificial Intelligence Meets Biological Intelligence

no code implementations29 Oct 2022 Yue Wang, Zhi Tian, Xin Fan, Yan Huo, Cameron Nowzari, Kai Zeng

With the proliferation of versatile Internet of Things (IoT) services, smart IoT devices are increasingly deployed at the edge of wireless networks to perform collaborative machine learning tasks using locally collected data, giving rise to the edge learning paradigm.

Learned Index with Dynamic $\epsilon$

no code implementations29 Sep 2021 Daoyuan Chen, Wuchao Li, Yaliang Li, Bolin Ding, Kai Zeng, Defu Lian, Jingren Zhou

We theoretically analyze prediction error bounds that link $\epsilon$ with data characteristics for an illustrative learned index method.

Retrieval

Cardinality Estimation in DBMS: A Comprehensive Benchmark Evaluation

1 code implementation13 Sep 2021 Yuxing Han, Ziniu Wu, Peizhi Wu, Rong Zhu, Jingyi Yang, Liang Wei Tan, Kai Zeng, Gao Cong, Yanzhao Qin, Andreas Pfadler, Zhengping Qian, Jingren Zhou, Jiangneng Li, Bin Cui

Therefore, we propose a new metric P-Error to evaluate the performance of CardEst methods, which overcomes the limitation of Q-Error and is able to reflect the overall end-to-end performance of CardEst methods.

A Unified Transferable Model for ML-Enhanced DBMS

1 code implementation6 May 2021 Ziniu Wu, Pei Yu, Peilun Yang, Rong Zhu, Yuxing Han, Yaliang Li, Defu Lian, Kai Zeng, Jingren Zhou

We propose to explore the transferabilities of the ML methods both across tasks and across DBs to tackle these fundamental drawbacks.

Management

A Pluggable Learned Index Method via Sampling and Gap Insertion

no code implementations4 Jan 2021 Yaliang Li, Daoyuan Chen, Bolin Ding, Kai Zeng, Jingren Zhou

In this paper, we propose a formal machine learning based framework to quantify the index learning objective, and study two general and pluggable techniques to enhance the learning efficiency and learning effectiveness for learned indexes.

BIG-bench Machine Learning Retrieval

BayesCard: Revitilizing Bayesian Frameworks for Cardinality Estimation

1 code implementation29 Dec 2020 Ziniu Wu, Amir Shaikhha, Rong Zhu, Kai Zeng, Yuxing Han, Jingren Zhou

Recently proposed deep learning based methods largely improve the estimation accuracy but their performance can be greatly affected by data and often difficult for system deployment.

Probabilistic Programming

FSPN: A New Class of Probabilistic Graphical Model

no code implementations18 Nov 2020 Ziniu Wu, Rong Zhu, Andreas Pfadler, Yuxing Han, Jiangneng Li, Zhengping Qian, Kai Zeng, Jingren Zhou

We introduce factorize sum split product networks (FSPNs), a new class of probabilistic graphical models (PGMs).

FLAT: Fast, Lightweight and Accurate Method for Cardinality Estimation

1 code implementation18 Nov 2020 Rong Zhu, Ziniu Wu, Yuxing Han, Kai Zeng, Andreas Pfadler, Zhengping Qian, Jingren Zhou, Bin Cui

Despite decades of research, existing methods either over simplify the models only using independent factorization which leads to inaccurate estimates, or over complicate them by lossless conditional factorization without any independent assumption which results in slow probability computation.

MicroRec: Efficient Recommendation Inference by Hardware and Data Structure Solutions

no code implementations12 Oct 2020 Wenqi Jiang, Zhenhao He, Shuai Zhang, Thomas B. Preußer, Kai Zeng, Liang Feng, Jiansong Zhang, Tongxuan Liu, Yong Li, Jingren Zhou, Ce Zhang, Gustavo Alonso

MicroRec accelerates recommendation inference by (1) redesigning the data structures involved in the embeddings to reduce the number of lookups needed and (2) taking advantage of the availability of High-Bandwidth Memory (HBM) in FPGA accelerators to tackle the latency by enabling parallel lookups.

Recommendation Systems

Intelligent Policing Strategy for Traffic Violation Prevention

no code implementations20 Sep 2019 Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng

Police officer presence at an intersection discourages a potential traffic violator from violating the law.

Multi-stage Deep Classifier Cascades for Open World Recognition

1 code implementation26 Aug 2019 Xiaojie Guo, Amir Alipour-Fanid, Lingfei Wu, Hemant Purohit, Xiang Chen, Kai Zeng, Liang Zhao

At present, object recognition studies are mostly conducted in a closed lab setting with classes in test phase typically in training phase.

Object Recognition

Who is Smarter? Intelligence Measure of Learning-based Cognitive Radios

no code implementations26 Dec 2017 Monireh Dabaghchian, Amir Alipour-Fanid, Songsong Liu, Kai Zeng, Xiaohua LI, Yu Chen

Then we apply factor analysis on the performance data to identify and quantize the intelligence factors and cognitive capabilities of the CR.

Online Learning with Randomized Feedback Graphs for Optimal PUE Attacks in Cognitive Radio Networks

no code implementations28 Sep 2017 Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng, Qingsi Wang, Peter Auer

In this paper, for the first time, we study optimal PUE attack strategies by formulating an online learning problem where the attacker needs to dynamically decide the attacking channel in each time slot based on its attacking experience.

Cannot find the paper you are looking for? You can Submit a new open access paper.