no code implementations • 29 Aug 2024 • Xing Ai, Guanyu Zhu, Yulin Zhu, Yu Zheng, Gaolei Li, Jianhua Li, Kai Zhou
Existing efforts are dedicated to purifying the maliciously modified structure or applying adaptive aggregation, thereby enhancing the robustness against adversarial structural attacks.
no code implementations • 9 Apr 2024 • Zhida Zhang, Jie Cao, Wenkui Yang, Qihang Fan, Kai Zhou, Ran He
The transformer networks are extensively utilized in face forgery detection due to their scalability across large datasets. Despite their success, transformers face challenges in balancing the capture of global context, which is crucial for unveiling forgery clues, with computational complexity. To mitigate this issue, we introduce Band-Attention modulated RetNet (BAR-Net), a lightweight network designed to efficiently process extensive visual contexts while avoiding catastrophic forgetting. Our approach empowers the target token to perceive global information by assigning differential attention levels to tokens at varying distances.
no code implementations • 27 Mar 2024 • Hanqing Fu, Gaolei Li, Jun Wu, Jianhua Li, Xi Lin, Kai Zhou, Yuchen Liu
Federated neuromorphic learning (FedNL) leverages event-driven spiking neural networks and federated learning frameworks to effectively execute intelligent analysis tasks over amounts of distributed low-power devices but also perform vulnerability to poisoning attacks.
no code implementations • 3 Mar 2024 • Yuni Lai, Bailin Pan, Kaihuang Chen, Yancheng Yuan, Kai Zhou
We investigate certified robustness for GNNs under graph injection attacks.
no code implementations • 19 Jan 2024 • Jialong Zhou, Xing Ai, Yuni Lai, Kai Zhou
Similar to how structure learning can restore unsigned graphs, balance learning can be applied to signed graphs by improving the balance degree of the poisoned graph.
no code implementations • 18 Jan 2024 • Yulin Zhu, Yuni Lai, Xing Ai, Kai Zhou
This theoretical proof explains the empirical observations that the graph attacker tends to connect dissimilar node pairs based on the similarities of neighbor features instead of ego features both on homophilic and heterophilic graphs.
no code implementations • 12 Dec 2023 • Yuwei Han, Yuni Lai, Yulin Zhu, Kai Zhou
Graph Neural Networks (GNNs) have become widely used in the field of graph mining.
no code implementations • 7 Dec 2023 • Yuni Lai, Yulin Zhu, Bailin Pan, Kai Zhou
Furthermore, we extend two state-of-the-art certified robustness frameworks to address node injection attacks and compare our approach against them.
no code implementations • 23 Nov 2023 • Chen Li, Alexander Kies, Kai Zhou, Markus Schlott, Omar El Sayed, Mariia Bilousova, Horst Stoecker
The Optimal Power Flow (OPF) problem is pivotal for power system operations, guiding generator output and power distribution to meet demand at minimized costs, while adhering to physical and engineering constraints.
no code implementations • 6 Nov 2023 • Lingxiao Wang, Gert Aarts, Kai Zhou
This study delves into the connection between machine learning and lattice field theory by linking generative diffusion models (DMs) with stochastic quantization, from a stochastic differential equation perspective.
1 code implementation • 29 Sep 2023 • Lingxiao Wang, Gert Aarts, Kai Zhou
In this work, we establish a direct connection between generative diffusion models (DMs) and stochastic quantization (SQ).
no code implementations • 2 Aug 2023 • Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou
Graph anomaly detection (GAD) has achieved success and has been widely applied in various domains, such as fraud detection, cybersecurity, finance security, and biochemistry.
2 code implementations • 26 Jul 2023 • Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou
In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.
no code implementations • 24 Jul 2023 • Yulin Zhu, Xing Ai, Yevgeniy Vorobeychik, Kai Zhou
We conduct extensive experiments to evaluate the performance of our proposed model, GCHS (Graph Contrastive Learning with Homophily-driven Sanitation View), against two state of the art structural attacks on GCL.
no code implementations • 17 Feb 2023 • Shuai Han, Lukas Stelz, Horst Stoecker, Lingxiao Wang, Kai Zhou
A physics-informed neural network (PINN) embedded with the susceptible-infected-removed (SIR) model is devised to understand the temporal evolution dynamics of infectious diseases.
no code implementations • 1 Feb 2023 • Yulin Zhu, Xing Ai, Qimai Li, Xiao-Ming Wu, Kai Zhou
Linearized Graph Neural Networks (GNNs) have attracted great attention in recent years for graph representation learning.
no code implementations • 8 Nov 2022 • Yuni Lai, Yulin Zhu, Wenqi Fan, Xiaoge Zhang, Kai Zhou
The robustness of recommender systems under node injection attacks has garnered significant attention.
no code implementations • 25 Oct 2022 • Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou
Graph Neural Networks (GNNs) are vulnerable to data poisoning attacks, which will generate a poisoned graph as the input to the GNN models.
no code implementations • 20 Dec 2021 • Jingchuan Hu, Shuai Guo, Kai Zhou, Yu Dong, Jun Xu, Li Song
As an important application form of immersive multimedia services, free-viewpoint video(FVV) enables users with great immersive experience by strong interaction.
no code implementations • 12 Dec 2021 • Lingxiao Wang, Shuzhe Shi, Kai Zhou
Reconstructing spectral functions from Euclidean Green's functions is an important inverse problem in physics.
1 code implementation • 29 Nov 2021 • Lingxiao Wang, Shuzhe Shi, Kai Zhou
Exploiting the neural networks' regularization as a non-local smoothness regulator of the spectral function, we represent spectral functions by neural networks and use the propagator's reconstruction error to optimize the network parameters unsupervisedly.
no code implementations • 19 Sep 2021 • Mingxuan Liang, Kai Zhou
However, current deep learning methods perform the bearing fault diagnosis in the form of deterministic classification, which overlook the uncertainties that inevitably exist in actual practice.
1 code implementation • 1 Jul 2021 • Lisa Benato, Erik Buhmann, Martin Erdmann, Peter Fackeldey, Jonas Glombitza, Nikolai Hartmann, Gregor Kasieczka, William Korcari, Thomas Kuhr, Jan Steinheimer, Horst Stöcker, Tilman Plehn, Kai Zhou
We introduce a Python package that provides simply and unified access to a collection of datasets from fundamental physics research - including particle physics, astroparticle physics, and hadron- and nuclear physics - for supervised machine learning studies.
1 code implementation • 18 Jun 2021 • Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou
Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques.
no code implementations • 4 Feb 2021 • Ning Jiang, Linjie Xiong, Kai Zhou
We study Boltzmann-Fermi-Dirac equation when quantum effects are taken into account in dilute gas dynamics.
Analysis of PDEs
no code implementations • 30 Nov 2020 • Lingxiao Wang, Tian Xu, Till Hannes Stoecker, Horst Stoecker, Yin Jiang, Kai Zhou
As the COVID-19 pandemic continues to ravage the world, it is of critical significance to provide a timely risk prediction of the COVID-19 in multi-level.
no code implementations • 26 Jul 2020 • Kai Zhou, Yevgeniy Vorobeychik
Finally, we apply our approach in a transductive learning setting, and show that robust AMN is much more robust than state-of-the-art deep learning methods, while sacrificing little in accuracy on non-adversarial data.
no code implementations • 7 May 2020 • Kai Zhou, Jiong Tang
Uncertainties in a structure is inevitable, which generally lead to variation in dynamic response predictions.
no code implementations • 20 Dec 2019 • Xi Liu, Rui Zhang, Yongsheng Zhou, Qianyi Jiang, Qi Song, Nan Li, Kai Zhou, Lei Wang, Dong Wang, Minghui Liao, Mingkun Yang, Xiang Bai, Baoguang Shi, Dimosthenis Karatzas, Shijian Lu, C. V. Jawahar
21 teams submit results for Task 1, 23 teams submit results for Task 2, 24 teams submit results for Task 3, and 13 teams submit results for Task 4.
no code implementations • 13 Nov 2019 • Sixie Yu, Kai Zhou, P. Jeffrey Brantingham, Yevgeniy Vorobeychik
Public goods games study the incentives of individuals to contribute to a public good and their behaviors in equilibria.
Computer Science and Game Theory
no code implementations • 3 Sep 2019 • Kai Zhou, Tomasz P. Michalak, Yevgeniy Vorobeychik
We propose a novel approach for increasing robustness of similarity-based link prediction by endowing the analyst with a restricted set of reliable queries which accurately measure the existence of queried links.
no code implementations • 10 Jul 2019 • Ruisen Luo, Tianran Sun, Chen Wang, Miao Du, Zuodong Tang, Kai Zhou, Xiao-Feng Gong, Xiaomei Yang
The key idea is that, in addition to the conventional attention mechanism, information of layers prior to feature extraction and LSTM are introduced into attention weights calculations.
Ranked #4 on Keyword Spotting on Google Speech Commands (Google Speech Commands V2 20 metric)
no code implementations • 22 Sep 2018 • Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik
We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information.
Social and Information Networks Cryptography and Security
no code implementations • 1 Sep 2018 • Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan
Link prediction is one of the fundamental research problems in network analysis.
Social and Information Networks Cryptography and Security 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4
no code implementations • 1 Mar 2018 • Chen Wang, Xiaomei Yang, Shaomin Fei, Kai Zhou, Xiao-Feng Gong, Miao Du, Ruisen Luo
Furthermore, to compute quantization results with a given amount of values/clusters, this paper designed an iterative method and a clustering-based method, and both of them are built on sparse least square.
no code implementations • 15 Jan 2018 • Long-Gang Pang, Kai Zhou, Nan Su, Hannah Petersen, Horst Stöcker, Xin-Nian Wang
A primordial state of matter consisting of free quarks and gluons that existed in the early universe a few microseconds after the Big Bang is also expected to form in high-energy heavy-ion collisions.
no code implementations • 13 Dec 2016 • Long-Gang Pang, Kai Zhou, Nan Su, Hannah Petersen, Horst Stöcker, Xin-Nian Wang
Supervised learning with a deep convolutional neural network is used to identify the QCD equation of state (EoS) employed in relativistic hydrodynamic simulations of heavy-ion collisions from the simulated final-state particle spectra $\rho(p_T,\Phi)$.