Search Results for author: Ren Wang

Found 31 papers, 10 papers with code

Efficient and Robust Continual Graph Learning for Graph Classification in Biology

no code implementations18 Nov 2024 Ding Zhang, Jane Downer, Can Chen, Ren Wang

Graph classification is essential for understanding complex biological systems, where molecular structures and interactions are naturally represented as graphs.

Graph Classification Graph Learning

Deep Adversarial Defense Against Multilevel-Lp Attacks

no code implementations12 Jul 2024 Ren Wang, YuXuan Li, Alfred Hero

Deep learning models have shown considerable vulnerability to adversarial attacks, particularly as attacker strategies become more sophisticated.

Adversarial Defense Adversarial Robustness +1

PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection

1 code implementation9 Jun 2024 Wei Li, Pin-Yu Chen, Sijia Liu, Ren Wang

PSBD is motivated by an intriguing Prediction Shift (PS) phenomenon, where poisoned models' predictions on clean data often shift away from true labels towards certain other labels with dropout applied during inference, while backdoor samples exhibit less PS.

Identifying Backdoored Graphs in Graph Neural Network Training: An Explanation-Based Approach with Novel Metrics

no code implementations26 Mar 2024 Jane Downer, Ren Wang, Binghui Wang

Graph Neural Networks (GNNs) have gained popularity in numerous domains, yet they are vulnerable to backdoor attacks that can compromise their performance and ethical application.

Graph Neural Network

Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency

1 code implementation15 Mar 2024 Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu

Based on this, we pose the backdoor data identification problem as a hierarchical data splitting optimization problem, leveraging a novel SPC-based loss function as the primary optimization objective.

backdoor defense

Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond

no code implementations22 Feb 2024 Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Yue Zhang, Ren Wang, Xiaoshuang Shi, Kaidi Xu

Uncertainty estimation is crucial for the reliability of safety-critical human and artificial intelligence (AI) interaction systems, particularly in the domain of healthcare engineering.

MedQA Question Answering +1

PINNs-Based Uncertainty Quantification for Transient Stability Analysis

no code implementations21 Nov 2023 Ren Wang, Ming Zhong, Kaidi Xu, Lola Giráldez Sánchez-Cortés, Ignacio de Cominges Guerra

This paper addresses the challenge of transient stability in power systems with missing parameters and uncertainty propagation in swing equations.

Uncertainty Quantification

Efficient and Effective Deep Multi-view Subspace Clustering

no code implementations15 Oct 2023 Yuxiu Lin, Hui Liu, Ren Wang, Qiang Guo, Caiming Zhang

i) The parameter scale of the FC layer is quadratic to sample numbers, resulting in high time and memory costs that significantly degrade their feasibility in large-scale datasets.

Clustering Computational Efficiency +1

Improving Generalization in Meta-Learning via Meta-Gradient Augmentation

1 code implementation14 Jun 2023 Ren Wang, Haoliang Sun, Qi Wei, Xiushan Nie, Yuling Ma, Yilong Yin

The key idea is to first break the rote memories by network pruning to address memorization overfitting in the inner loop, and then the gradients of pruned sub-networks naturally form the high-quality augmentation of the meta-gradient to alleviate learner overfitting in the outer loop.

Few-Shot Learning Memorization +1

Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified $\ell_p$ Attacks

1 code implementation17 Mar 2023 Ren Wang, YuXuan Li, Sijia Liu

Adversarial robustness is a key concept in measuring the ability of neural networks to defend against adversarial attacks during the inference phase.

Adversarial Defense Adversarial Robustness +1

MetaViewer: Towards A Unified Multi-View Representation

no code implementations CVPR 2023 Ren Wang, Haoliang Sun, Yuling Ma, Xiaoming Xi, Yilong Yin

To overcome them, we propose a novel bi-level-optimization-based multi-view learning framework, where the representation is learned in a uniform-to-specific manner.

MULTI-VIEW LEARNING Representation Learning

Fine-Grained Classification with Noisy Labels

no code implementations CVPR 2023 Qi Wei, Lei Feng, Haoliang Sun, Ren Wang, Chenhui Guo, Yilong Yin

To this end, we propose a novel framework called stochastic noise-tolerated supervised contrastive learning (SNSCL) that confronts label noise by encouraging distinguishable representation.

Classification Contrastive Learning +1

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

no code implementations20 Jan 2023 Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu

In this paper, we explore the potential of self-training via additional unlabeled data for mitigating backdoor attacks.

backdoor defense Representation Learning

Physics-Constrained Backdoor Attacks on Power System Fault Localization

no code implementations7 Nov 2022 Jianing Bai, Ren Wang, Zuyi Li

The advances in deep learning (DL) techniques have the potential to deliver transformative technological breakthroughs to numerous complex tasks in modern power systems that suffer from increasing uncertainty and nonlinearity.

Fault localization

Learnable Distribution Calibration for Few-Shot Class-Incremental Learning

no code implementations1 Oct 2022 Binghao Liu, Boyu Yang, Lingxi Xie, Ren Wang, Qi Tian, Qixiang Ye

LDC is built upon a parameterized calibration unit (PCU), which initializes biased distributions for all classes based on classifier vectors (memory-free) and a single covariance matrix.

class-incremental learning Few-Shot Class-Incremental Learning +3

Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning

no code implementations6 Oct 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attributes and healthcare that warrant strong privacy guarantees.

Privacy Preserving

Multi-Trigger-Key: Towards Multi-Task Privacy-Preserving In Deep Learning

no code implementations29 Sep 2021 Ren Wang, Zhe Xu, Alfred Hero

Deep learning-based Multi-Task Classification (MTC) is widely used in applications like facial attribute and healthcare that warrant strong privacy guarantees.

Attribute Deep Learning +1

Bridging Unsupervised and Supervised Depth from Focus via All-in-Focus Supervision

1 code implementation ICCV 2021 Ning-Hsu Wang, Ren Wang, Yu-Lun Liu, Yu-Hao Huang, Yu-Lin Chang, Chia-Ping Chen, Kevin Jou

In this paper, we propose a method to estimate not only a depth map but an AiF image from a set of images with different focus positions (known as a focal stack).

Depth Estimation

Deep Adversarially-Enhanced k-Nearest Neighbors

no code implementations15 Aug 2021 Ren Wang, Tianqi Chen, Alfred Hero

Recent works have theoretically and empirically shown that deep neural networks (DNNs) have an inherent vulnerability to small perturbations.

Immuno-mimetic Deep Neural Networks (Immuno-Net)

no code implementations27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Indika Rajapakse, Alfred Hero

This immuno-mimetic model leads to a new computational biology framework for robustification of deep neural networks against adversarial attacks.

Image Classification

ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred Hero

K-Nearest Neighbor (kNN)-based deep learning methods have been applied to many applications due to their simplicity and geometric interpretability.

RAILS: A Robust Adversarial Immune-inspired Learning System

1 code implementation27 Jun 2021 Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred Hero

Initializing a population of exemplars that is balanced across classes, RAILS starts from a uniform label distribution that encourages diversity and uses an evolutionary optimization process to adaptively adjust the predictive label distribution in a manner that emulates the way the natural immune system recognizes novel pathogens.

Adversarial Defense Adversarial Robustness +3

On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning

1 code implementation ICLR 2021 Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang

Despite the generalization power of the meta-model, it remains elusive that how adversarial robustness can be maintained by MAML in few-shot learning.

Adversarial Attack Adversarial Robustness +3

RAILS: A Robust Adversarial Immune-inspired Learning System

no code implementations18 Dec 2020 Ren Wang, Tianqi Chen, Stephen Lindsly, Alnawaz Rehemtulla, Alfred Hero, Indika Rajapakse

RAILS incorporates an Adaptive Immune System Emulation (AISE), which emulates in silico the biological mechanisms that are used to defend the host against attacks by pathogens.

Adversarial Defense Diversity +1

Explorable Tone Mapping Operators

no code implementations20 Oct 2020 Chien-Chuan Su, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Soo-Chang Pei

It aims to preserve visual information of HDR images in a medium with a limited dynamic range.

Diversity Tone Mapping

Singular equivalences induced by bimodules and quadratic monomial algebras

no code implementations20 Sep 2020 Xiao-Wu Chen, Jian Liu, Ren Wang

We investigate the problem when the tensor functor by a bimodule yields a singular equivalence.

Representation Theory Rings and Algebras 18G80, 16E45, 16D20, 16G20

Learning Camera-Aware Noise Models

1 code implementation ECCV 2020 Ke-Chi Chang, Ren Wang, Hung-Jin Lin, Yu-Lun Liu, Chia-Ping Chen, Yu-Lin Chang, Hwann-Tzong Chen

Modeling imaging sensor noise is a fundamental problem for image processing and computer vision applications.

Noise Estimation

Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

1 code implementation ECCV 2020 Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, JinJun Xiong, Meng Wang

When the training data are maliciously tampered, the predictions of the acquired deep neural network (DNN) can be manipulated by an adversary known as the Trojan attack (or poisoning backdoor attack).

Backdoor Attack

IOCA: High-Speed I/O-Aware LLC Management for Network-Centric Multi-Tenant Platform

no code implementations9 Jul 2020 Yifan Yuan, Mohammad Alian, Yipeng Wang, Ilia Kurakin, Ren Wang, Charlie Tai, Nam Sung Kim

In this paper, we argue that besides CPU cores, high-speed network I/O is also important for LLC management.

Hardware Architecture Operating Systems

Tensor Recovery from Noisy and Multi-Level Quantized Measurements

no code implementations5 Dec 2019 Ren Wang, Meng Wang, JinJun Xiong

Existing works on tensor recovery have focused on data losses and random noises.

Quantization

SCG: Spotting Coordinated Groups in Social Media

no code implementations16 Oct 2019 Junhao Wang, Sacha Levy, Ren Wang, Aayushi Kulshrestha, Reihaneh Rabbany

Recent events have led to a burgeoning awareness on the misuse of social media sites to affect political events, sway public opinion, and confuse the voters.

Fake News Detection Misinformation

Cannot find the paper you are looking for? You can Submit a new open access paper.