Search Results for author: Minghui Li

Found 13 papers, 7 papers with code

Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples

1 code implementation16 Mar 2024 Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin

In response to these challenges, we propose Genetic Evolution-Nurtured Adversarial Fine-tuning (Gen-AF), a two-stage adversarial fine-tuning approach aimed at enhancing the robustness of downstream models.

Self-Supervised Learning

MISA: Unveiling the Vulnerabilities in Split Federated Learning

no code implementations18 Dec 2023 Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin

This attack unveils the vulnerabilities in SFL, challenging the conventional belief that SFL is robust against poisoning attacks.

Edge-computing Federated Learning

Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations

1 code implementation30 Nov 2023 Xianlong Wang, Shengshan Hu, Minghui Li, Zhifei Yu, Ziqi Zhou, Leo Yu Zhang

Through validation experiments that commendably support our hypothesis, we further design a random matrix to boost both $\Theta_{imi}$ and $\Theta_{imc}$, achieving a notable degree of defense effect.

AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning

1 code implementation14 Aug 2023 Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin

In this work, we propose AdvCLIP, the first attack framework for generating downstream-agnostic adversarial examples based on cross-modal pre-trained encoders.

Contrastive Learning Generative Adversarial Network +2

Why Does Little Robustness Help? Understanding and Improving Adversarial Transferability from Surrogate Training

1 code implementation15 Jul 2023 Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin

Building on these insights, we explore the impacts of data augmentation and gradient regularization on transferability and identify that the trade-off generally exists in the various training mechanisms, thus building a comprehensive blueprint for the regulation mechanism behind transferability.

Attribute Data Augmentation

Streamlining Social Media Information Retrieval for COVID-19 Research with Deep Learning

2 code implementations28 Jun 2023 Yining Hua, Jiageng Wu, Shixu Lin, Minghui Li, Yujie Zhang, Dinah Foer, Siwen Wang, Peilin Zhou, Jie Yang, Li Zhou

Conclusions: This study advances public health research by implementing a novel, systematic pipeline for curating symptom lexicons from social media data.

Information Retrieval named-entity-recognition +3

RIS-Position and Orientation Estimation in MIMO-OFDM Systems with Practical Scatterers

no code implementations9 Feb 2023 Sheng Hong, Minghui Li, Cunhua Pan, Marco Di Renzo, Wei zhang, Lajos Hanzo

A two-step positioning scheme is exploited, where the channel parameters are first acquired, and the position-related parameters are then estimated.

Position

PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples

no code implementations22 Nov 2022 Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun

In addition, existing attack approaches towards point cloud classifiers cannot be applied to the completion models due to different output forms and attack purposes.

Adversarial Attack Point Cloud Classification +2

Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer

1 code implementation CVPR 2022 Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu

While deep face recognition (FR) systems have shown amazing performance in identification and verification, they also arouse privacy concerns for their excessive surveillance on users, especially for public face images widely spread on social networks.

Face Recognition

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

no code implementations22 Feb 2020 Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang

This paper proposes a new scheme for privacy-preserving neural network prediction in the outsourced setting, i. e., the server cannot learn the query, (intermediate) results, and the model.

Privacy Preserving

LARSEN-ELM: Selective Ensemble of Extreme Learning Machines using LARS for Blended Data

no code implementations9 Aug 2014 Bo Han, Bo He, Rui Nian, Mengmeng Ma, Shujing Zhang, Minghui Li, Amaury Lendasse

Extreme learning machine (ELM) as a neural network algorithm has shown its good performance, such as fast speed, simple structure etc, but also, weak robustness is an unavoidable defect in original ELM for blended data.

Cannot find the paper you are looking for? You can Submit a new open access paper.