no code implementations • 22 Jul 2024 • Jungang Yang, Zhe Ji, Liyao Xiang
Differential Privacy (DP) mechanisms, especially in high-dimensional settings, often face the challenge of maintaining privacy without compromising the data utility.
1 code implementation • 16 Mar 2024 • Hang Yin, Liyao Xiang, Dong Ding, Yuheng He, Yihan Wu, Xinbing Wang, Chenghu Zhou
We investigate the entity alignment (EA) problem with unlabeled dangling cases, meaning that partial entities have no counterparts in the other knowledge graph (KG), and this type of entity remains unlabeled.
no code implementations • 9 Mar 2024 • Hengyuan Xu, Liyao Xiang, Xingjun Ma, Borui Yang, Baochun Li
The permutation equivariance ensures minimal interference between these two sets of model weights and thus high fidelity on downstream tasks.
no code implementations • 5 Mar 2024 • Xinbing Wang, Luoyi Fu, Xiaoying Gan, Ying Wen, Guanjie Zheng, Jiaxin Ding, Liyao Xiang, Nanyang Ye, Meng Jin, Shiyu Liang, Bin Lu, Haiwen Wang, Yi Xu, Cheng Deng, Shao Zhang, Huquan Kang, Xingli Wang, Qi Li, Zhixin Guo, Jiexing Qi, Pan Liu, Yuyang Ren, Lyuwen Wu, Jungang Yang, Jianping Zhou, Chenghu Zhou
The exponential growth of scientific literature requires effective management and extraction of valuable insights.
1 code implementation • 14 Jan 2024 • Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li
However, such methods can not defend against adaptive attacks, in which an attacker takes a countermove against a known defence strategy.
no code implementations • 3 Apr 2023 • Mingxiao Li, Rui Jin, Liyao Xiang, Kaiming Shen, Shuguang Cui
The traditional methods for data compression are typically based on the symbol-level statistics, with the information source modeled as a long sequence of i. i. d.
1 code implementation • Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2021 • Dixi Yao, Liyao Xiang, Zifan Wang, Jiayu Xu, Chao Li, Xinbing Wang
Experimental results show that our system not only adapts well to, but also draws on the varying contexts, delivering a practical and efficient solution to edge-cloud model training.
Ranked #2 on Recommendation Systems on MovieLens 1M (Precision metric)
no code implementations • 24 Jun 2021 • Yuchen Li, Yifan Bao, Liyao Xiang, Junhan Liu, Cen Chen, Li Wang, Xinbing Wang
Federated learning is emerging as a machine learning technique that trains a model across multiple decentralized parties.
no code implementations • 30 Apr 2021 • Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang
The wide deployment of machine learning in recent years gives rise to a great demand for large-scale and high-dimensional data, for which the privacy raises serious concern.
no code implementations • 29 Apr 2021 • Shuang Zhang, Liyao Xiang, Xi Yu, Pengzhi Chu, Yingqi Chen, Chen Cen, Li Wang
Real-world data is usually segmented by attributes and distributed across different parties.
no code implementations • 1 Jan 2021 • Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang
We focus on certified robustness of smoothed classifiers in this work, and propose to use the worst-case population loss over noisy inputs as a robustness metric.
no code implementations • International Conference on Distributed Computing Systems 2020 • Lingdong Wang, Liyao Xiang, Jiayu Xu, Jiaju Chen, Xing Zhao, Dixi Yao, Xinbing Wang, Baochun Li
While deep neural networks (DNNs) have led to a paradigm shift, its exorbitant computational requirement has always been a roadblock in its deployment to the edge, such as wearable devices and smartphones.
Ranked #176 on Image Classification on CIFAR-10
no code implementations • 21 Oct 2020 • Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang
For smoothed classifiers, we propose the worst-case adversarial loss over input distributions as a robustness certificate.
no code implementations • 9 Oct 2020 • Hui Xu, Liyao Xiang, Youmin Le, Xiaoying Gan, Yuting Jia, Luoyi Fu, Xinbing Wang
Iterated line graphs are introduced for the first time to describe such high-order information, based on which we present a new graph matching method, called High-order Graph Matching Network (HGMN), to learn not only the local structural correspondence, but also the hyperedge relations across graphs.
no code implementations • 11 Sep 2020 • Shufan Wang, Ningyi Liao, Liyao Xiang, Nanyang Ye, Quanshi Zhang
Through experiments on a variety of adversarial pruning methods, we find that weights sparsity will not hurt but improve robustness, where both weights inheritance from the lottery ticket and adversarial training improve model robustness in network pruning.
no code implementations • 21 Jun 2020 • Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang
Compared to the traditional neural network, the RENN uses d-ary vectors/tensors as features, in which each element is a d-ary number.
no code implementations • 18 Mar 2020 • Hao Zhang, Yi-Ting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang
We propose a method to revise the neural network to construct the quaternion-valued neural network (QNN), in order to prevent intermediate-layer features from leaking input information.
no code implementations • 18 Dec 2019 • Shuang Zhang, Liyao Xiang, CongCong Li, YiXuan Wang, Quanshi Zhang, Wei Wang, Bo Li
Powered by machine learning services in the cloud, numerous learning-driven mobile applications are gaining popularity in the market.
1 code implementation • ICLR 2020 • Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang
Previous studies have found that an adversary attacker can often infer unintended input information from intermediate-layer features.