no code implementations • 1 Mar 2025 • Lixu Wang, Bingqi Shang, Yi Li, Payal Mohapatra, Wei Dong, Xiao Wang, Qi Zhu
SA, inspired by split learning (SL), segments the pre-trained ViT into a frontend and a backend, with only the frontend shared with the client for data representation extraction.
1 code implementation • 24 Dec 2024 • Jiaqi Wu, Shihao Zhang, Simin Chen, Lixu Wang, Zehua Wang, Wei Chen, Fangyuan He, Zijian Tian, F. Richard Yu, Victor C. M. Leung
These results highlight ED-TOOLBOX as a superior solution for edge object detection.
1 code implementation • 14 Jul 2024 • Chongyang Gao, Lixu Wang, Kaize Ding, Chenkai Weng, Xiao Wang, Qi Zhu
The results indicate that OOO consistently achieves the best unlearning effectiveness and utility preservation, especially when facing continuous unlearning requests.
no code implementations • 27 May 2024 • Ruochen Jiao, Shaoyuan Xie, Justin Yue, Takami Sato, Lixu Wang, YiXuan Wang, Qi Alfred Chen, Qi Zhu
Specifically, we propose three distinct attack mechanisms: word injection, scenario manipulation, and knowledge injection, targeting various components in the LLM-based decision-making pipeline.
no code implementations • 8 Mar 2024 • Lixu Wang, Xinyu Du, Qi Zhu
Cutting-edge studies focus on achieving unsupervised CDR but typically assume that the category spaces across domains are identical, an assumption that is often unrealistic in real-world scenarios.
no code implementations • 5 Feb 2024 • Payal Mohapatra, Lixu Wang, Qi Zhu
Monitoring and recognizing patterns in continuous sensing data is crucial for many practical applications.
1 code implementation • 3 Feb 2024 • Lixu Wang, Yang Zhao, Jiahua Dong, Ating Yin, Qinbin Li, Xiao Wang, Dusit Niyato, Qi Zhu
Federated Learning (FL) is a privacy-preserving distributed learning approach that is rapidly developing in an era where privacy protection is increasingly valued.
no code implementations • 20 Jan 2024 • Lixu Wang, Shichao Xu, Xinyu Du, Qi Zhu
Anomaly detection in time-series data is crucial for identifying faults, failures, threats, and outliers across a range of applications.
no code implementations • 21 Dec 2023 • Lixu Wang, Chenxi Liu, Junfeng Guo, Jiahua Dong, Xiao Wang, Heng Huang, Qi Zhu
In a privacy-focused era, Federated Learning (FL) has emerged as a promising machine learning technique.
1 code implementation • 30 Oct 2023 • Yang Zhao, Jiaxi Yang, Yiling Tao, Lixu Wang, Xiaoxiao Li, Dusit Niyato, H. Vincent Poor
The increasing demand for privacy-preserving machine learning has spurred interest in federated unlearning, which enables the selective removal of data from models trained in federated systems.
no code implementations • 20 Feb 2023 • Jiahua Dong, Yang Cong, Gan Sun, Lixu Wang, Lingjuan Lyu, Jun Li, Ender Konukoglu
Moreover, they cannot explore which 3D geometric characteristics are essential to alleviate the catastrophic forgetting on old classes of 3D objects.
2 code implementations • 25 Jan 2023 • Chenxi Liu, Lixu Wang, Lingjuan Lyu, Chen Sun, Xiao Wang, Qi Zhu
To overcome these limitations of DA and DG in handling the Unfamiliar Period during continual domain shift, we propose RaTP, a framework that focuses on improving models' target domain generalization (TDG) capability, while also achieving effective target domain adaptation (TDA) capability right after training on certain domains and forgetting alleviation (FA) capability on past domains.
no code implementations • ICCV 2023 • Junfeng Guo, Ang Li, Lixu Wang, Cong Liu
To ensure the security of RL agents against malicious backdoors, in this work, we propose the problem of Backdoor Detection in multi-agent RL systems, with the objective of detecting Trojan agents as well as the corresponding potential trigger actions, and further trying to mitigate their bad impact.
1 code implementation • CVPR 2022 • Jiahua Dong, Lixu Wang, Zhen Fang, Gan Sun, Shichao Xu, Xiao Wang, Qi Zhu
It makes the global model suffer from significant catastrophic forgetting on old classes in real-world scenarios, where local clients often collect new classes continuously and have very limited storage memory to store old classes.
1 code implementation • ICLR 2022 • Lixu Wang, Shichao Xu, Ruiqi Xu, Xiao Wang, Qi Zhu
Our NTL-based authorization approach instead provides data-centric protection, which we call applicability authorization, by significantly degrading the performance of the model on unauthorized data.
no code implementations • 15 Feb 2021 • Shichao Xu, Lixu Wang, YiXuan Wang, Qi Zhu
Data quantity and quality are crucial factors for data-driven learning methods.
no code implementations • ICCV 2021 • Shichao Xu, Lixu Wang, YiXuan Wang, Qi Zhu
Data quantity and quality are crucial factors for data-driven learning methods.
2 code implementations • 14 Aug 2020 • Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu
Our experiments demonstrate the importance of acknowledging class imbalance and taking measures as early as possible in FL training, and the effectiveness of our method in mitigating the impact.
no code implementations • 14 Oct 2019 • Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu
Federated learning (FL) has recently emerged as a new form of collaborative machine learning, where a common model can be learned while keeping all the training data on local devices.