Search Results for author: Ning Yu

Found 62 papers, 38 papers with code

基于义原表示学习的词向量表示方法(Word Representation based on Sememe Representation Learning)

no code implementations CCL 2021 Ning Yu, Jiangping Wang, Yu Shi, Jianyi Liu

“本文利用知网(HowNet)中的知识, 并将Word2vec模型的结构和思想迁移至义原表示学习过程中, 提出了一个基于义原表示学习的词向量表示方法。首先, 本文利用OpenHowNet获取义原知识库中的所有义原、所有中文词汇以及所有中文词汇和其对应的义原集合, 作为实验的数据集。然后, 基于Skip-gram模型, 训练义原表示学习模型, 进而获得词向量。最后, 通过词相似度任务、词义消歧任务、词汇类比和观察最近邻义原, 来评价本文提出的方法获取的词向量的效果。通过和基线模型比较, 发现本文提出的方法既高效又准确, 不依赖大规模语料也不需要复杂的网络结构和繁多的参数, 也能提升各种自然语言处理任务的准确率。”

Representation Learning

T2Vs Meet VLMs: A Scalable Multimodal Dataset for Visual Harmfulness Recognition

1 code implementation29 Sep 2024 Chen Yeh, You-Ming Chang, Wei-Chen Chiu, Ning Yu

To address the risks of encountering inappropriate or harmful content, researchers managed to incorporate several harmful contents datasets with machine learning methods to detect harmful concepts.

In-Context Learning Question Answering +1

Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders

no code implementations20 Aug 2024 Yuan Xin, Zheng Li, Ning Yu, Dingfan Chen, Mario Fritz, Michael Backes, Yang Zhang

Despite being prevalent in the general field of Natural Language Processing (NLP), pre-trained language models inherently carry privacy and copyright concerns due to their nature of training on large-scale web-scraped data.

Membership Inference Attack Against Masked Image Modeling

no code implementations13 Aug 2024 Zheng Li, Xinlei He, Ning Yu, Yang Zhang

Masked Image Modeling (MIM) has achieved significant success in the realm of self-supervised learning (SSL) for visual recognition.

Inference Attack Membership Inference Attack +1

Jailbreaking Text-to-Image Models with LLM-Based Agents

no code implementations1 Aug 2024 Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo

Atlas consists of two agents, namely the mutation agent and the selection agent, each comprising four key modules: a vision-language model (VLM) or LLM brain, planning, memory, and tool usage.

In-Context Learning Language Modelling +1

JIGMARK: A Black-Box Approach for Enhancing Image Watermarks against Diffusion Model Edits

1 code implementation6 Jun 2024 Minzhou Pan, Yi Zeng, Xue Lin, Ning Yu, Cho-Jui Hsieh, Peter Henderson, Ruoxi Jia

In this study, we investigate the vulnerability of image watermarks to diffusion-model-based image editing, a challenge exacerbated by the computational cost of accessing gradient information and the closed-source nature of many diffusion models.

Contrastive Learning

Detecting Adversarial Data via Perturbation Forgery

1 code implementation25 May 2024 Qian Wang, Chen Li, Yuchen Luo, Hefei Ling, Ping Li, Jiazhong Chen, Shijuan Huang, Ning Yu

By learning to distinguish this open covering from the distribution of natural data, we can develop a detector with strong generalization capabilities against all types of adversarial attacks.

FASTTRACK: Fast and Accurate Fact Tracing for LLMs

no code implementations22 Apr 2024 Si Chen, Feiyang Kang, Ning Yu, Ruoxi Jia

Existing approaches to fact tracing rely on assessing the similarity between each training sample and the query along a certain dimension, such as lexical similarity, gradient, or embedding space.

HaVTR: Improving Video-Text Retrieval Through Augmentation Using Large Foundation Models

no code implementations7 Apr 2024 Yimu Wang, Shuai Yuan, Xiangru Jian, Wei Pang, Mushi Wang, Ning Yu

While recent progress in video-text retrieval has been driven by the exploration of powerful model architectures and training strategies, the representation learning ability of video-text retrieval models is still limited due to low-quality and scarce training data annotations.

Hallucination Representation Learning +2

Reference-Based 3D-Aware Image Editing with Triplanes

no code implementations4 Apr 2024 Bahri Batuhan Bilecen, Yigit Yalin, Ning Yu, Aysegul Dundar

Generative Adversarial Networks (GANs) have emerged as powerful tools for high-quality image generation and real image editing by manipulating their latent spaces.

3D geometry Disentanglement +1

RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content

1 code implementation19 Mar 2024 Zhuowen Yuan, Zidi Xiong, Yi Zeng, Ning Yu, Ruoxi Jia, Dawn Song, Bo Li

The innovative use of constrained optimization and a fusion-based guardrail approach represents a significant step forward in developing more secure and reliable LLMs, setting a new standard for content moderation frameworks in the face of evolving digital threats.

Data Augmentation

C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models

1 code implementation5 Feb 2024 Mintong Kang, Nezihe Merve Gürel, Ning Yu, Dawn Song, Bo Li

Specifically, we provide conformal risk analysis for RAG models and certify an upper confidence bound of generation risks, which we refer to as conformal generation risk.

RAG Retrieval

Continual Adversarial Defense

1 code implementation15 Dec 2023 Qian Wang, Yaoyao Liu, Hefei Ling, Yingwei Li, Qihao Liu, Ping Li, Jiazhong Chen, Alan Yuille, Ning Yu

In response to the rapidly evolving nature of adversarial attacks against visual classifiers on a monthly basis, numerous defenses have been proposed to generalize against as many known attacks as possible.

Adversarial Defense Continual Learning +2

X-InstructBLIP: A Framework for aligning X-Modal instruction-aware representations to LLMs and Emergent Cross-modal Reasoning

2 code implementations30 Nov 2023 Artemis Panagopoulou, Le Xue, Ning Yu, Junnan Li, Dongxu Li, Shafiq Joty, ran Xu, Silvio Savarese, Caiming Xiong, Juan Carlos Niebles

To enable this framework, we devise a scalable pipeline that automatically generates high-quality, instruction-tuning datasets from readily available captioning data across different modalities, and contribute 24K QA data for audio and 250K QA data for 3D.

Visual Reasoning

Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models

1 code implementation30 Oct 2023 Minxing Zhang, Ning Yu, Rui Wen, Michael Backes, Yang Zhang

Several membership inference attacks (MIAs) have been proposed to exhibit the privacy vulnerability of generative models by classifying a query image as a training dataset member or nonmember.

Inference Attack Membership Inference Attack

AntifakePrompt: Prompt-Tuned Vision-Language Models are Fake Image Detectors

1 code implementation26 Oct 2023 You-Ming Chang, Chen Yeh, Wei-Chen Chiu, Ning Yu

Moreover, results demonstrate that (1) the deepfake detection accuracy can be significantly and consistently improved (from 71. 06% to 92. 11%, in average accuracy over unseen domains) using pretrained vision-language models with prompt tuning; (2) our superior performance is at less cost of training data and trainable parameters, resulting in an effective and efficient solution for deepfake detection.

DeepFake Detection Face Swapping +4

Generated Graph Detection

1 code implementation13 Jun 2023 Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang

Graph generative models become increasingly effective for data distribution approximation and data augmentation.

Data Augmentation Face Swapping +1

Detecting Adversarial Faces Using Only Real Face Self-Perturbations

1 code implementation22 Apr 2023 Qian Wang, Yongqin Xian, Hefei Ling, Jinyuan Zhang, Xiaorui Lin, Ping Li, Jiazhong Chen, Ning Yu

Adversarial attacks aim to disturb the functionality of a target system by adding specific noise to the input samples, bringing potential threats to security and robustness when applied to facial recognition systems.

Face Detection

RoSteALS: Robust Steganography using Autoencoder Latent Space

1 code implementation6 Apr 2023 Tu Bui, Shruti Agarwal, Ning Yu, John Collomosse

Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.

Denoising

Mask-free OVIS: Open-Vocabulary Instance Segmentation without Manual Mask Annotations

no code implementations CVPR 2023 Vibashan VS, Ning Yu, Chen Xing, Can Qin, Mingfei Gao, Juan Carlos Niebles, Vishal M. Patel, ran Xu

In summary, an OV method learns task-specific information using strong supervision from base annotations and novel category information using weak supervision from image-captions pairs.

Image Captioning Instance Segmentation +2

GlueGen: Plug and Play Multi-modal Encoders for X-to-image Generation

1 code implementation ICCV 2023 Can Qin, Ning Yu, Chen Xing, Shu Zhang, Zeyuan Chen, Stefano Ermon, Yun Fu, Caiming Xiong, ran Xu

Empirical results show that GlueNet can be trained efficiently and enables various capabilities beyond previous state-of-the-art models: 1) multilingual language models such as XLM-Roberta can be aligned with existing T2I models, allowing for the generation of high-quality images from captions beyond English; 2) GlueNet can align multi-modal encoders such as AudioCLIP with the Stable Diffusion model, enabling sound-to-image generation; 3) it can also upgrade the current text encoder of the latent diffusion model for challenging case generation.

Decoder Image Generation

Learning Prototype Classifiers for Long-Tailed Recognition

1 code implementation1 Feb 2023 Saurabh Sharma, Yongqin Xian, Ning Yu, Ambuj Singh

In this work, we show that learning prototype classifiers addresses the biased softmax problem in LTR.

Long-tail Learning

Hierarchical Point Attention for Indoor 3D Object Detection

no code implementations6 Jan 2023 Manli Shu, Le Xue, Ning Yu, Roberto Martín-Martín, Caiming Xiong, Tom Goldstein, Juan Carlos Niebles, ran Xu

By plugging our proposed modules into the state-of-the-art transformer-based 3D detectors, we improve the previous best results on both benchmarks, with more significant improvements on smaller objects.

3D Object Detection Object +1

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

no code implementations13 Oct 2022 Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang

To tackle this problem, we pioneer a systematic study on the detection and attribution of fake images generated by text-to-image generation models.

Attribute Fake Image Detection +1

SimSCOOD: Systematic Analysis of Out-of-Distribution Generalization in Fine-tuned Source Code Models

1 code implementation10 Oct 2022 Hossein Hajipour, Ning Yu, Cristian-Alexandru Staicu, Mario Fritz

In this paper, we contribute the first systematic approach that simulates various OOD scenarios along different dimensions of source code data properties and study the fine-tuned model behaviors in such scenarios.

Code Generation Out-of-Distribution Generalization

Membership Inference Attacks Against Text-to-image Generation Models

no code implementations3 Oct 2022 Yixin Wu, Ning Yu, Zheng Li, Michael Backes, Yang Zhang

The empirical results show that all of the proposed attacks can achieve significant performance, in some cases even close to an accuracy of 1, and thus the corresponding risk is much more severe than that shown by existing membership inference attacks.

Image Classification Text-to-Image Generation

UnGANable: Defending Against GAN-based Face Manipulation

1 code implementation3 Oct 2022 Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang

Extensive experiments on four popular GAN models trained on two benchmark face datasets show that UnGANable achieves remarkable effectiveness and utility performance, and outperforms multiple baseline methods.

Face Swapping Misinformation

Auditing Membership Leakages of Multi-Exit Networks

no code implementations23 Aug 2022 Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang

Furthermore, we propose a hybrid attack that exploits the exit information to improve the performance of existing attacks.

Keys to Better Image Inpainting: Structure and Texture Go Hand in Hand

1 code implementation5 Aug 2022 Jitesh Jain, Yuqian Zhou, Ning Yu, Humphrey Shi

We claim that the performance of inpainting algorithms can be better judged by the generated structures and textures.

Image Inpainting Texture Synthesis

RelaxLoss: Defending Membership Inference Attacks without Losing Utility

1 code implementation ICLR 2022 Dingfan Chen, Ning Yu, Mario Fritz

As a long-term threat to the privacy of training data, membership inference attacks (MIAs) emerge ubiquitously in machine learning models.

RepMix: Representation Mixing for Robust Attribution of Synthesized Images

1 code implementation5 Jul 2022 Tu Bui, Ning Yu, John Collomosse

Uniquely, we present a solution to this task capable of 1) matching images invariant to their semantic content; 2) robust to benign transformations (changes in quality, resolution, shape, etc.)

Image Attribution

Beyond the Spectrum: Detecting Deepfakes via Re-Synthesis

1 code implementation29 May 2021 Yang He, Ning Yu, Margret Keuper, Mario Fritz

The rapid advances in deep generative models over the past years have led to highly {realistic media, known as deepfakes,} that are commonly indistinguishable from real to human eyes.

Colorization Denoising +2

Deep Video Inpainting Detection

no code implementations26 Jan 2021 Peng Zhou, Ning Yu, Zuxuan Wu, Larry S. Davis, Abhinav Shrivastava, Ser-Nam Lim

This paper studies video inpainting detection, which localizes an inpainted region in a video both spatially and temporally.

Decoder Video Inpainting

Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs

1 code implementation CVPR 2021 Hui-Po Wang, Ning Yu, Mario Fritz

While Generative Adversarial Networks (GANs) show increasing performance and the level of realism is becoming indistinguishable from natural images, this also comes with high demands on data and computation.

Image Generation Unconditional Image Generation

Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data

1 code implementation ICCV 2021 Ning Yu, Vladislav Skripniuk, Sahar Abdelnabi, Mario Fritz

Thus, we seek a proactive and sustainable solution on deepfake detection, that is agnostic to the evolution of generative models, by introducing artificial fingerprints into the models.

DeepFake Detection Face Swapping +2

6 nm super-resolution optical transmission and scattering spectroscopic imaging of carbon nanotubes using a nanometer-scale white light source

no code implementations8 Jun 2020 Xuezhi Ma, Qiushi Liu, Ning Yu, Da Xu, Sanggon Kim, Zebin Liu, Kaili Jiang, Bryan M. Wong, Ruoxue Yan, Ming Liu

Optical hyperspectral imaging based on absorption and scattering of photons at the visible and adjacent frequencies denotes one of the most informative and inclusive characterization methods in material research.

Super-Resolution Optics Materials Science

Inclusive GAN: Improving Data and Minority Coverage in Generative Models

1 code implementation ECCV 2020 Ning Yu, Ke Li, Peng Zhou, Jitendra Malik, Larry Davis, Mario Fritz

Generative Adversarial Networks (GANs) have brought about rapid progress towards generating photorealistic images.

Long-Tailed Recognition Using Class-Balanced Experts

1 code implementation7 Apr 2020 Saurabh Sharma, Ning Yu, Mario Fritz, Bernt Schiele

Deep learning enables impressive performance in image recognition using large-scale artificially-balanced datasets.

Long-tail Learning

AI-Powered GUI Attack and Its Defensive Methods

no code implementations26 Jan 2020 Ning Yu, Zachary Tuttle, Carl Jake Thurnau, Emmanuel Mireku

Since the first Graphical User Interface (GUI) prototype was invented in the 1970s, GUI systems have been deployed into various personal computer systems and server platforms.

Object Recognition

Macrocosm: Social Media Persona Linking for Open Source Intelligence Applications

no code implementations EMNLP 2019 Graham Horwood, Ning Yu, Thomas Boggs, Changjiang Yang, Chad Holvenstot

Online Social Networks (OSNs) provide a wealth of intelligence to analysts in assisting tasks such as tracking cyber-attacks, human trafficking activities, and misinformation campaigns.

Misinformation

GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models

1 code implementation9 Sep 2019 Dingfan Chen, Ning Yu, Yang Zhang, Mario Fritz

In addition, we propose the first generic attack model that can be instantiated in a large range of settings and is applicable to various kinds of deep generative models.

Inference Attack Membership Inference Attack

Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints

2 code implementations ICCV 2019 Ning Yu, Larry Davis, Mario Fritz

Our experiments show that (1) GANs carry distinct model fingerprints and leave stable fingerprints in their generated images, which support image attribution; (2) even minor differences in GAN training can result in different fingerprints, which enables fine-grained model authentication; (3) fingerprints persist across different image frequencies and patches and are not biased by GAN artifacts; (4) fingerprint finetuning is effective in immunizing against five types of adversarial image perturbations; and (5) comparisons also show our learned fingerprints consistently outperform several baselines in a variety of setups.

Image Attribution Image Generation

Three-Stream Convolutional Networks for Video-based Person Re-Identification

no code implementations22 Nov 2017 Zeng Yu, Tianrui Li, Ning Yu, Xun Gong, Ke Chen, Yi Pan

This paper aims to develop a new architecture that can make full use of the feature maps of convolutional networks.

Video-Based Person Re-Identification

Reconstruction of Hidden Representation for Robust Feature Extraction

no code implementations8 Oct 2017 Zeng Yu, Tianrui Li, Ning Yu, Yi Pan, Hongmei Chen, Bing Liu

We believe that minimizing the reconstruction error of the hidden representation is more robust than minimizing the Frobenius norm of the Jacobian matrix of the hidden representation.

Denoising Representation Learning

Learning to Detect Multiple Photographic Defects

1 code implementation6 Dec 2016 Ning Yu, Xiaohui Shen, Zhe Lin, Radomir Mech, Connelly Barnes

Our new dataset enables us to formulate the problem as a multi-task learning problem and train a multi-column deep convolutional neural network (CNN) to simultaneously predict the severity of all the defects.

Defect Detection Multi-Task Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.