Search Results for author: Ling Liu

Found 71 papers, 33 papers with code

A Framework for Evaluating Gradient Leakage Attacks in Federated Learning

2 code implementations22 Apr 2020 Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu

FL offers default client privacy by allowing clients to keep their sensitive data on local devices and to only share local training parameter updates with the federated server.

Federated Learning

Multi-modal Molecule Structure-text Model for Text-based Retrieval and Editing

1 code implementation21 Dec 2022 Shengchao Liu, Weili Nie, Chengpeng Wang, Jiarui Lu, Zhuoran Qiao, Ling Liu, Jian Tang, Chaowei Xiao, Anima Anandkumar

Here we present a multi-modal molecule structure-text model, MoleculeSTM, by jointly learning molecules' chemical structures and textual descriptions via a contrastive learning strategy.

Contrastive Learning Drug Discovery +2

PokeLLMon: A Human-Parity Agent for Pokemon Battles with Large Language Models

1 code implementation2 Feb 2024 Sihao Hu, Tiansheng Huang, Ling Liu

We introduce PokeLLMon, the first LLM-embodied agent that achieves human-parity performance in tactical battle games, as demonstrated in Pokemon battles.

Action Generation Decision Making +1

Data Poisoning Attacks Against Federated Learning Systems

2 code implementations16 Jul 2020 Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu

Federated learning (FL) is an emerging paradigm for distributed training of large-scale deep neural networks in which participants' data remains on their own devices with only model updates being shared with a central server.

Data Poisoning Federated Learning

Robust Few-Shot Ensemble Learning with Focal Diversity-Based Pruning

2 code implementations5 Apr 2024 Selim Furkan Tekin, Fatih Ilhan, Tiansheng Huang, Sihao Hu, Ka-Ho Chow, Margaret L. Loper, Ling Liu

This paper presents FusionShot, a focal diversity optimized few-shot ensemble learning approach for boosting the robustness and generalization performance of pre-trained few-shot models.

Ensemble Learning Ensemble Pruning +1

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

2 code implementations9 Apr 2020 Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu

The rapid growth of real-time huge data capturing has pushed the deep learning and data analytic computing to the edge systems.

Autonomous Driving Object +4

Understanding Object Detection Through An Adversarial Lens

1 code implementation11 Jul 2020 Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu

We demonstrate that the proposed framework can serve as a methodical benchmark for analyzing adversarial behaviors and risks in real-time object detection systems.

Adversarial Robustness Autonomous Vehicles +3

BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection

1 code implementation29 Mar 2023 Sihao Hu, Zhen Zhang, Bingqiao Luo, Shengliang Lu, Bingsheng He, Ling Liu

As various forms of fraud proliferate on Ethereum, it is imperative to safeguard against these malicious activities to protect susceptible users from being victimized.

Fraud Detection

A Survey on Large Language Model-Based Game Agents

1 code implementation2 Apr 2024 Sihao Hu, Tiansheng Huang, Fatih Ilhan, Selim Tekin, Gaowen Liu, Ramana Kompella, Ling Liu

The development of game agents holds a critical role in advancing towards Artificial General Intelligence (AGI).

Decision Making Language Modelling +1

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

1 code implementation2 Oct 2023 Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu

The goal of auditor is to yield a broad spectrum of vulnerabilities with the hope of encompassing the correct answer, whereas the goal of critic that evaluates the validity of identified vulnerabilities is to minimize the number of false positives.

Language Modelling Large Language Model +1

Demystifying Fraudulent Transactions and Illicit Nodes in the Bitcoin Network for Financial Forensics

1 code implementation25 May 2023 Youssef Elmougy, Ling Liu

This enables both the detection of fraudulent transactions and the detection of illicit addresses (actors) in the Bitcoin network by leveraging four types of graph data: (i) the transaction-to-transaction graph, representing the money flow in the Bitcoin network, (ii) the address-to-address interaction graph, capturing the types of transaction flows between Bitcoin addresses, (iii) the address-transaction graph, representing the bi-directional money flow between addresses and transactions (BTC flow from input address to one or more transactions and BTC flow from a transaction to one or more output addresses), and (iv) the user entity graph, capturing clusters of Bitcoin addresses representing unique Bitcoin users.

Anomaly Detection Fraud Detection

Towards Demystifying Membership Inference Attacks

1 code implementation28 Jun 2018 Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, Wenqi Wei

Our empirical results additionally show that (1) using the type of target model under attack within the attack model may not increase attack effectiveness and (2) collaborative learning in federated systems exposes vulnerabilities to membership inference risks when the adversary is a participant in the federation.

Cryptography and Security

Gradient-Leakage Resilient Federated Learning

1 code implementation2 Jul 2021 Wenqi Wei, Ling Liu, Yanzhao Wu, Gong Su, Arun Iyengar

This paper presents a gradient leakage resilient approach to privacy-preserving federated learning with per training example-based client differential privacy, coined as Fed-CDP.

Federated Learning Privacy Preserving

ScaleFL: Resource-Adaptive Federated Learning With Heterogeneous Clients

1 code implementation CVPR 2023 Fatih Ilhan, Gong Su, Ling Liu

In most FL approaches, all edge clients are assumed to have sufficient computation capabilities to participate in the learning of a deep neural network (DNN) model.

Federated Learning SST-2 +1

Selecting and Composing Learning Rate Policies for Deep Neural Networks

1 code implementation24 Oct 2022 Yanzhao Wu, Ling Liu

First, we develop an LR tuning mechanism for auto-verification of a given LR policy with respect to the desired accuracy goal under the pre-defined training time constraint.

A Comparative Measurement Study of Deep Learning as a Service Framework

1 code implementation29 Oct 2018 Yanzhao Wu, Ling Liu, Calton Pu, Wenqi Cao, Semih Sahin, Wenqi Wei, Qi Zhang

Big data powered Deep Learning (DL) and its applications have blossomed in recent years, fueled by three technological trends: a large amount of digitized data openly accessible, a growing number of DL software frameworks in open source and commercial markets, and a selection of affordable parallel computing hardware devices.

Vaccine: Perturbation-aware Alignment for Large Language Model

1 code implementation2 Feb 2024 Tiansheng Huang, Sihao Hu, Ling Liu

The new paradigm of finetuning-as-a-service introduces a new attack surface for Large Language Models (LLMs): a few harmful data uploaded by users can easily trick the finetuning to produce an alignment-broken model.

Language Modelling Large Language Model

Boosting Ensemble Accuracy by Revisiting Ensemble Diversity Metrics

1 code implementation CVPR 2021 Yanzhao Wu, Ling Liu, Zhongwei Xie, Ka-Ho Chow, Wenqi Wei

Our new metrics significantly improve the intrinsic correlation between high ensemble diversity and high ensemble accuracy.

Ensemble Learning Ensemble Pruning +1

Adaptive Deep Neural Network Inference Optimization with EENet

1 code implementation15 Jan 2023 Fatih Ilhan, Ka-Ho Chow, Sihao Hu, Tiansheng Huang, Selim Tekin, Wenqi Wei, Yanzhao Wu, Myungjin Lee, Ramana Kompella, Hugo Latapie, Gaowen Liu, Ling Liu

Instead of having every sample go through all DNN layers during prediction, EENet learns an early exit scheduler, which can intelligently terminate the inference earlier for certain predictions, which the model has high confidence of early exit.

Inference Optimization Scheduling +1

Parallel Detection for Efficient Video Analytics at the Edge

1 code implementation27 Jul 2021 Yanzhao Wu, Ling Liu, Ramana Kompella

A common performance requirement in these mission-critical edge services is the near real-time latency of online object detection on edge devices.

Autonomous Driving Object +2

Deep Ensembles with Hierarchical Diversity Pruning

1 code implementation1 Jan 2021 Yanzhao Wu, Ling Liu

(3) We introduce a two phase hierarchical pruning method to effectively identify and prune those deep ensembles with high HQ diversity scores, aiming to increase the lower and upper bounds on ensemble accuracy for the selected ensembles.

Boosting Deep Ensemble Performance with Hierarchical Pruning

1 code implementation IEEE International Conference on Data Mining (ICDM) 2021 Yanzhao Wu, Ling Liu

Evaluated using two benchmark datasets, we show that the proposed focal diversity powered hierarchical pruning can find significantly smaller ensembles of deep neural network models while achieving the same or better classification generalizability.

Decision Making Ensemble Pruning +1

STDLens: Model Hijacking-Resilient Federated Learning for Object Detection

1 code implementation CVPR 2023 Ka-Ho Chow, Ling Liu, Wenqi Wei, Fatih Ilhan, Yanzhao Wu

Based on the insights, we introduce a three-tier forensic framework to identify and expel Trojaned gradients and reclaim the performance over the course of FL.

Federated Learning object-detection +1

Hierarchical Pruning of Deep Ensembles with Focal Diversity

1 code implementation17 Nov 2023 Yanzhao Wu, Ka-Ho Chow, Wenqi Wei, Ling Liu

This paper presents a novel deep ensemble pruning approach, which can efficiently identify smaller deep ensembles and provide higher ensemble accuracy than the entire deep ensemble of a large number of member networks.

Decision Making Ensemble Pruning

Exploring Model Learning Heterogeneity for Boosting Ensemble Robustness

1 code implementation3 Oct 2023 Yanzhao Wu, Ka-Ho Chow, Wenqi Wei, Ling Liu

We show that this two-tier heterogeneity driven ensemble construction method can compose an ensemble team that promotes high ensemble diversity and low negative correlation among member models of the ensemble, strengthening ensemble robustness against both negative examples and adversarial attacks.

object-detection Object Detection +1

Learning TFIDF Enhanced Joint Embedding for Recipe-Image Cross-Modal Retrieval Service

1 code implementation2 Aug 2021 Zhongwei Xie, Ling Liu, Yanzhao Wu, Lin Li, Luo Zhong

We present a Multi-modal Semantics enhanced Joint Embedding approach (MSJE) for learning a common feature space between the two modalities (text and image), with the ultimate goal of providing high-performance cross-modal retrieval services.

Cross-Modal Retrieval Retrieval

Learning Text-Image Joint Embedding for Efficient Cross-Modal Retrieval with Deep Feature Engineering

1 code implementation22 Oct 2021 Zhongwei Xie, Ling Liu, Yanzhao Wu, Luo Zhong, Lin Li

This paper introduces a two-phase deep feature engineering framework for efficient learning of semantics enhanced joint embedding, which clearly separates the deep feature engineering in data preprocessing from training the text-image joint embedding model.

Cross-Modal Retrieval Feature Engineering +1

Adversarial Examples in Deep Learning: Characterization and Divergence

no code implementations29 Jun 2018 Wenqi Wei, Ling Liu, Margaret Loper, Stacey Truex, Lei Yu, Mehmet Emre Gursoy, Yanzhao Wu

The burgeoning success of deep learning has raised the security and privacy concerns as more and more tasks are accompanied with sensitive data.

Adversarial Attack

A Computational Model for the Linguistic Notion of Morphological Paradigm

no code implementations COLING 2018 Miikka Silfverberg, Ling Liu, Mans Hulden

In supervised learning of morphological patterns, the strategy of generalizing inflectional tables into more abstract paradigms through alignment of the longest common subsequence found in an inflection table has been proposed as an efficient method to deduce the inflectional behavior of unseen word forms.

Differentially Private Model Publishing for Deep Learning

no code implementations3 Apr 2019 Lei Yu, Ling Liu, Calton Pu, Mehmet Emre Gursoy, Stacey Truex

However, when the training datasets are crowdsourced from individuals and contain sensitive information, the model parameters may encode private information and bear the risks of privacy leakage.

Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks

no code implementations21 Aug 2019 Ka-Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu

Deep neural networks (DNNs) have demonstrated impressive performance on many challenging machine learning tasks.

Denoising

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

no code implementations29 Aug 2019 Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu

In this paper we first give an overview of the concept of ensemble diversity and examine the three types of ensemble diversity in the context of DNN classifiers.

Ensemble Learning

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability

no code implementations21 Nov 2019 Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Lei Yu

Second, through MPLens, we highlight how the vulnerability of pre-trained models under membership inference attack is not uniform across all classes, particularly when the training data itself is skewed.

Inference Attack Membership Inference Attack

A Two stage Adaptive Knowledge Transfer Evolutionary Multi-tasking Based on Population Distribution for Multi/Many-Objective Optimization

no code implementations3 Jan 2020 Zhengping Liang, Weiqi Liang, Xiuju Xu, Ling Liu, Zexuan Zhu

Experimental results on multi-tasking multi-objective optimization test suites show that EMT-PD is superior to other six state-of-the-art evolutionary multi/single-tasking algorithms.

Transfer Learning

LDP-Fed: Federated Learning with Local Differential Privacy

no code implementations5 Jun 2020 Stacey Truex, Ling Liu, Ka-Ho Chow, Mehmet Emre Gursoy, Wenqi Wei

However, in federated learning model parameter updates are collected iteratively from each participant and consist of high dimensional, continuous values with high precision (10s of digits after the decimal point), making existing LDP protocols inapplicable.

Federated Learning

Secure and Utility-Aware Data Collection with Condensed Local Differential Privacy

no code implementations15 May 2019 Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, Ling Liu

In this paper, we address the small user population problem by introducing the concept of Condensed Local Differential Privacy (CLDP) as a specialization of LDP, and develop a suite of CLDP protocols that offer desirable statistical utility while preserving privacy.

Cryptography and Security Databases

Leveraging Principal Parts for Morphological Inflection

no code implementations WS 2020 Ling Liu, Mans Hulden

This paper presents the submission by the CU Ling team from the University of Colorado to SIGMORPHON 2020 shared task 0 on morphological inflection.

LEMMA Morphological Inflection

Bitcoin Transaction Forecasting with Deep Network Representation Learning

no code implementations15 Jul 2020 Wenqi Wei, Qi Zhang, Ling Liu

First, we explore three interesting properties between Bitcoin transaction accounts: topological connectivity pattern of Bitcoin accounts, transaction amount pattern, and transaction dynamics.

Representation Learning

Robust Deep Learning Ensemble against Deception

no code implementations14 Sep 2020 Wenqi Wei, Ling Liu

Third, XEnsemble provides a suite of algorithms to combine input verification and output verification to protect the DNN prediction models from both adversarial examples and out of distribution inputs.

Adversarial Robustness Denoising +1

Utility-Optimized Synthesis of Differentially Private Location Traces

no code implementations14 Sep 2020 Mehmet Emre Gursoy, Vivekanand Rajasekar, Ling Liu

Given a real trace dataset D, the differential privacy parameter epsilon controlling the strength of privacy protection, and the utility/error metric Err of interest; OptaTrace uses Bayesian optimization to optimize DPLTS such that the output error (measured in terms of given metric Err) is minimized while epsilon-differential privacy is satisfied.

Bayesian Optimization Benchmarking

IGT2P: From Interlinear Glossed Texts to Paradigms

no code implementations EMNLP 2020 Sarah Moeller, Ling Liu, Changbing Yang, Katharina Kann, Mans Hulden

An intermediate step in the linguistic analysis of an under-documented language is to find and organize inflected forms that are attested in natural speech.

POS

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks

no code implementations8 May 2021 Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu

The results demonstrate that De-Pois is effective and efficient for detecting poisoned data against all the four types of poisoning attacks, with both the accuracy and F1-score over 0. 9 on average.

Data Augmentation Data Poisoning

Computational Morphology with Neural Network Approaches

no code implementations19 May 2021 Ling Liu

Neural network approaches have been applied to computational morphology with great success, improving the performance of most tasks by a large margin and providing new perspectives for modeling.

Efficient Deep Feature Calibration for Cross-Modal Joint Embedding Learning

no code implementations2 Aug 2021 Zhongwei Xie, Ling Liu, Lin Li, Luo Zhong

This paper introduces a two-phase deep feature calibration framework for efficient learning of semantics enhanced text-image cross-modal joint embedding, which clearly separates the deep feature calibration in data preprocessing from training the joint embedding model.

Feature Engineering

Learning Joint Embedding with Modality Alignments for Cross-Modal Retrieval of Recipes and Food Images

no code implementations9 Aug 2021 Zhongwei Xie, Ling Liu, Lin Li, Luo Zhong

This paper presents a three-tier modality alignment approach to learning text-image joint embedding, coined as JEMA, for cross-modal retrieval of cooking recipes and food images.

Cross-Modal Retrieval Retrieval +1

To POS Tag or Not to POS Tag: The Impact of POS Tags on Morphological Learning in Low-Resource Settings

no code implementations ACL 2021 Sarah Moeller, Ling Liu, Mans Hulden

However, the importance and usefulness of POS tags needs to be examined as NLP expands to low-resource languages because linguists who provide many annotated resources do not place priority on early identification and tagging of POS.

POS TAG

Analogy Models for Neural Word Inflection

1 code implementation COLING 2020 Ling Liu, Mans Hulden

Analogy is assumed to be the cognitive mechanism speakers resort to in order to inflect an unknown form of a lexeme based on knowledge of other words in a language.

Hallucination LEMMA

Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding

no code implementations14 Oct 2021 Jingya Zhou, Ling Liu, Wenqi Wei, Jianxi Fan

This survey paper reviews the design principles and the different node embedding techniques for network representation learning over homogeneous networks.

Graph Mining Knowledge Graphs +3

Backtranslation in Neural Morphological Inflection

no code implementations EMNLP (insights) 2021 Ling Liu, Mans Hulden

Backtranslation is a common technique for leveraging unlabeled data in low-resource scenarios in machine translation.

Machine Translation Morphological Inflection +1

Gradient Leakage Attack Resilient Deep Learning

no code implementations25 Dec 2021 Wenqi Wei, Ling Liu

Although deep learning with differential privacy is a defacto standard for publishing deep learning models with differential privacy guarantee, we show that differentially private algorithms with fixed privacy parameters are vulnerable against gradient leakage attacks.

Detecting Annotation Errors in Morphological Data with the Transformer

no code implementations ACL 2022 Ling Liu, Mans Hulden

Annotation errors that stem from various sources are usually unavoidable when performing large-scale annotation of linguistic data.

Embedded Silicon-Organic Integrated Neuromorphic System

no code implementations18 Oct 2022 Shengjie Zheng, Ling Liu, Junjie Yang, Jianwei Zhang, Tao Su, Bin Yue, Xiaojian Li

The development of artificial intelligence (AI) and robotics are both based on the tenet of "science and technology are people-oriented", and both need to achieve efficient communication with the human brain.

Metric Learning as a Service with Covariance Embedding

no code implementations28 Nov 2022 Imam Mustafa Kamal, Hyerim Bae, Ling Liu

With the emergence of deep learning, metric learning has gained significant popularity in numerous machine learning tasks dealing with complex and large-scale datasets, such as information retrieval, object recognition and recommendation systems.

Information Retrieval Metric Learning +3

Automatic Discovery of Multi-perspective Process Model using Reinforcement Learning

no code implementations30 Nov 2022 Sunghyun Sim, Ling Liu, Hyerim Bae

Process mining is a methodology for the derivation and analysis of process models based on the event log.

Model Discovery Q-Learning +2

Securing Distributed SGD against Gradient Leakage Threats

1 code implementation10 May 2023 Wenqi Wei, Ling Liu, Jingya Zhou, Ka-Ho Chow, Yanzhao Wu

Next, we present a gradient leakage resilient approach to securing distributed SGD in federated learning, with differential privacy controlled noise as the tool.

Federated Learning

RAI4IoE: Responsible AI for Enabling the Internet of Energy

no code implementations20 Sep 2023 Minhui Xue, Surya Nepal, Ling Liu, Subbu Sethuvenkatraman, Xingliang Yuan, Carsten Rudolph, Ruoxi Sun, Greg Eisenhauer

This paper plans to develop an Equitable and Responsible AI framework with enabling techniques and algorithms for the Internet of Energy (IoE), in short, RAI4IoE.

Management

TACO: Benchmarking Generalizable Bimanual Tool-ACtion-Object Understanding

no code implementations16 Jan 2024 Yun Liu, Haolin Yang, Xu Si, Ling Liu, Zipeng Li, Yuxiang Zhang, Yebin Liu, Li Yi

Humans commonly work with multiple objects in daily life and can intuitively transfer manipulation skills to novel objects by understanding object functional regularities.

Action Recognition Benchmarking +2

Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance

no code implementations2 Feb 2024 Wenqi Wei, Ling Liu

Emerging Distributed AI systems are revolutionizing big data computing and data processing capabilities with growing economic and societal impact.

Fairness

Cannot find the paper you are looking for? You can Submit a new open access paper.